https://www.omscs.gatech.edu/cs-6262-network-security - курс CS 6262 доступен на Udacity: https://classroom.udacity.com/courses/ud199
Python and Machine Learning: How to use algorithms to create yara rules with a malware zoo for hunting https://2018.pass-the-salt.org/files/talks/14-python-and-ml.pdf
We have seen machine learning is not magic, a work of featuring must be done including the of the dataset.
Here, our dataset is very heterogeneous with a big cluster of EquationGroup, and others clusters with few malwares
The machine learning is useful to make a first filter to clusterize a big dataset because the algorithms have been thought to be scalable contrary to algorithms which compare signatures. (ssdeep,impfuzzy,machoc...)
Доступен бета-тест отладчика ядра XNU для владельцев лицензий IDA Pro. Для работы требуетс достуи к сервисам Corellium.
Forwarded from Noise Security Bit
Supply Chain вектор огромен, всегда нужно помнить об этом. Не используйте рендомные зарядки для телефонов и прочего в публичных местах или от случайных людей (кстати это касается их покупки тоже 😜). Даже зарядки для лэптопа могут быть не так безобидны, как кажется на первый взгляд, особенно, если это USB-C 😱
https://twitter.com/_mg_/status/949684949614907395?s=21
https://twitter.com/_mg_/status/949684949614907395?s=21
Twitter
_MG_
BadUSB Cable #2. HID attack through an Apple MacBook USB-C charger. Great for shared workspaces! Build info coming this month. Still working out some things. These cables work on just about any device with a USB port (Mac/Win/Linux, phones too) https://t.co/b6254FvpLY
https://github.com/jnuyens/freedomev/
Unlocking the full potential of your Electric Vehicle. Freedom guaranteed.
Unlocking the full potential of your Electric Vehicle. Freedom guaranteed.
GitHub
GitHub - jnuyens/freedomev: FreedomEV repository. Unlocking the full potential of Linux on your EV!
FreedomEV repository. Unlocking the full potential of Linux on your EV! - jnuyens/freedomev