unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Version 7 of the REMnux Distro Is Now Available
10 years after the initial release of REMnux, I’m thrilled to announce that REMnux version 7 is now...
2020-07-22 22:51:50 | 阅读: 88 |
收藏
|
zeltser.com
remnux
distro
security
examining
download
Unemployment Insurance Fraud and Identity Theft: Up Close and Personal
In June 2020, the Federal Trade Commission (FTC) warned that “imposters are filing claims for unemp...
2020-07-02 12:24:04 | 阅读: 112 |
收藏
|
zeltser.com
victim
scammer
letter
york
How You Can Write Better Threat Reports
Writing about cybersecurity threats, such as phishing campaigns, malware infections, and attack gro...
2020-07-01 22:42:51 | 阅读: 98 |
收藏
|
zeltser.com
security
degree
decide
readers
Learning Malware Analysis and Cybersecurity Writing Online
You can now take my malware analysis and cybersecurity writing courses online in two formats at SAN...
2020-04-20 12:31:40 | 阅读: 94 |
收藏
|
zeltser.com
ondemand
materials
taught
sec402
How to Set Up a SpiderFoot Server for OSINT Research
SpiderFoot is a tool for gathering Open Source Intelligence (OSINT) and threat intelligence about I...
2020-04-17 10:10:28 | 阅读: 102 |
收藏
|
zeltser.com
spiderfoot
security
ssh
python3
What’s It Like for a New CISO?
As of this writing, I’ve spent six months in the role of Chief Information Security Officer (CISO)...
2020-02-14 01:38:59 | 阅读: 95 |
收藏
|
zeltser.com
ciso
security
axonius
asset
Top 10 Cybersecurity Writing Mistakes
Want to strengthen your writing in under an hour? Watch the video I recorded to help you avoid the...
2019-10-05 10:00:36 | 阅读: 152 |
收藏
|
zeltser.com
security
degree
mistakes
ciso
The State of Malware Analysis: Advice from the Trenches
What malware analysis approaches work well? Which don’t? How are the tools and methodologies evolvi...
2019-09-26 22:45:48 | 阅读: 87 |
收藏
|
zeltser.com
security
analysis
panelist
axonius
for610
Joining Axonius to Tackle Cybersecurity Asset Management
I’m drawn to large-scale problems, I guess:At the onset of cloud computing, I was helping companies...
2019-06-10 23:22:38 | 阅读: 90 |
收藏
|
zeltser.com
security
axonius
asset
cloud
Cybersecurity Advice for Political Campaigns
Political campaigns are targets of cybercriminals and nation-state adversaries, who possess formida...
2019-05-03 22:35:10 | 阅读: 81 |
收藏
|
zeltser.com
security
attackers
software
resist
political
Previous
2
3
4
5
6
7
8
9
Next