jcp_02_00020.pdf
1.9 MB
#Research
#Blue_Team
"Improved Detection and Response via Optimized Alerts: Usability Study", 2022.
📰
📚
#Blue_Team
"Improved Detection and Response via Optimized Alerts: Usability Study", 2022.
📰
📚
fuzzing_ms_rdp_client.pdf
1.3 MB
#Research
"Fuzzing Microsoft’s RDP Client using Virtual Channels", 2022.
]-> wtf - distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer for attacking user and / or kernel-mode targets running on MS Windows:
https://github.com/0vercl0k/wtf
📰
📚
"Fuzzing Microsoft’s RDP Client using Virtual Channels", 2022.
]-> wtf - distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer for attacking user and / or kernel-mode targets running on MS Windows:
https://github.com/0vercl0k/wtf
📰
📚
NIST_SP_800_160_v1_r1.pdf
5.2 MB
#Infosec_Standards
NIST SP 800-160 Vol.1, Rev.1:
"Engineering Trustworthy Secure Systems", June 2022.
📰
📚
NIST SP 800-160 Vol.1, Rev.1:
"Engineering Trustworthy Secure Systems", June 2022.
📰
📚
DroidGuard.pdf
1.1 MB
#Research
"DroidGuard: A Deep Dive into SafetyNet", 2022.
]-> https://www.sstic.org/2022/presentation/droidguard_a_deep_dive_into_safetynet
📰
📚
"DroidGuard: A Deep Dive into SafetyNet", 2022.
]-> https://www.sstic.org/2022/presentation/droidguard_a_deep_dive_into_safetynet
📰
📚
Penetration Testing of Web Applications Bug Bounty Program.pdf
2.7 MB
Penetration Testing of Web Applications Bug Bounty Program
📰
📚
📰
📚
Cybersecurity_Solutions.pdf
5.1 MB
#Analytics
"Cybersecurity Solutions for a Riskier World:
How business and government can protect themselves in the emerging risk landscape", 2022.
📰
📚
"Cybersecurity Solutions for a Riskier World:
How business and government can protect themselves in the emerging risk landscape", 2022.
📰
📚
SideWinder_Analysis.pdf
10.2 MB
#Malware_analysis
SideWinder.AntiBot.Script - Analysis of SideWinder's new infrastructure and tool
SideWinder.AntiBot.Script - Analysis of SideWinder's new infrastructure and tool
SOC.pdf
440.5 KB
Creating and Maintaining
a SOC : The details behind successful security operations centers.
📰
📚
a SOC : The details behind successful security operations centers.
📰
📚
cve_2022_27438.pdf
449.1 KB
#exploit
#Whitepaper
CVE-2022-27438:
Caphyon Advanced Installer 19.3 - "CustomDetection" Update Check RCE Vulnerability (PoC)
📰
📚
#Whitepaper
CVE-2022-27438:
Caphyon Advanced Installer 19.3 - "CustomDetection" Update Check RCE Vulnerability (PoC)
📰
📚
22WOOT.pdf
200.7 KB
#Research
#WLAN_Security
"On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats", 2022.
📰
📚
#WLAN_Security
"On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats", 2022.
📰
📚
Fight_Poison_with_Poison.pdf
20.8 MB
#Malware_analysis
"Fight Poison with Poison: Detecting Backdoor Poison Samples via Decoupling Benign Correlations", 2022.
]-> https://github.com/Unispac/Fight-Poison-With-Poison
"Fight Poison with Poison: Detecting Backdoor Poison Samples via Decoupling Benign Correlations", 2022.
]-> https://github.com/Unispac/Fight-Poison-With-Poison
Circumventing_Backdoor_Defenses.pdf
4.6 MB
#Research
"Circumventing Backdoor Defenses That Are Based on Latent Separability", 2022.
]-> Repo: https://github.com/Unispac/Circumventing-Backdoor-Defenses
📰
📚
"Circumventing Backdoor Defenses That Are Based on Latent Separability", 2022.
]-> Repo: https://github.com/Unispac/Circumventing-Backdoor-Defenses
📰
📚