SecWiki周刊(第104期)
2016/02/22-2016/02/28
安全资讯
2015 Top Security Tools as Voted by ToolsWatch.org Readers
http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/
http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/
全球TOP500安全公司到底在做些什么
http://mp.weixin.qq.com/s?__biz=MzIwMTQ2NzY4NA==&mid=403223215&idx=1&sn=66f32613ec48196b43c15e29b592c1c1&scene=23
http://mp.weixin.qq.com/s?__biz=MzIwMTQ2NzY4NA==&mid=403223215&idx=1&sn=66f32613ec48196b43c15e29b592c1c1&scene=23
美国:《网络安全国家行动计划》(2016年2月)
http://yepeng.blog.51cto.com/3101105/1744585
http://yepeng.blog.51cto.com/3101105/1744585
安全技术
使用Zoomeye渗透网络摄像头
http://simeon.blog.51cto.com/18680/1744228
http://simeon.blog.51cto.com/18680/1744228
乌克兰电力系统遭受攻击事件综合分析报告
http://www.antiy.com/response/A_Comprehensive_Analysis_Report_on_Ukraine_Power_Grid_Outage/A_Comprehensive_Analysis_Report_on_Ukraine_Power_Grid_Outage.html
http://www.antiy.com/response/A_Comprehensive_Analysis_Report_on_Ukraine_Power_Grid_Outage/A_Comprehensive_Analysis_Report_on_Ukraine_Power_Grid_Outage.html
Kaspersky Security Analyst Summit (SAS) 2016
https://sas.kaspersky.com/
https://sas.kaspersky.com/
Linux服务器应急事件溯源报告
http://drops.wooyun.org/tips/12972
http://drops.wooyun.org/tips/12972
中国菜刀的隐形把手
http://drops.wooyun.org/papers/13128
http://drops.wooyun.org/papers/13128
js跨域请求的几种方式,及其特点(english)
https://jvaneyck.wordpress.com/2014/01/07/cross-domain-requests-in-javascript/
https://jvaneyck.wordpress.com/2014/01/07/cross-domain-requests-in-javascript/
Starting Small with Threat Intel
https://swannysec.net/2016/02/05/starting-small-with-threat-intel-pt-2.html
https://swannysec.net/2016/02/05/starting-small-with-threat-intel-pt-2.html
SANS_CTI2016议题 情报威胁(含ppt)
http://pan.baidu.com/s/1o7hebZs
http://pan.baidu.com/s/1o7hebZs
绿盟君带你看RSA2016创新沙盒
http://blog.nsfocus.net/nsfocus-takes-rsa2016-innovation-sandbox/
http://blog.nsfocus.net/nsfocus-takes-rsa2016-innovation-sandbox/
Behind the Malware – Botnet Analysis
https://blog.sucuri.net/2016/02/behind-the-malware-botnet-analysis.html
https://blog.sucuri.net/2016/02/behind-the-malware-botnet-analysis.html
如何收集厂商ip段并探测
http://www.answ.cc/?post=15
http://www.answ.cc/?post=15
傻瓜式通用钓鱼工具Weeman1.5-GreenTree
http://wps2015.jinglingshu.org/?p=187
http://wps2015.jinglingshu.org/?p=187
Data Mining Approaches for Financial Accounting Fraud Detection
https://cs.uwaterloo.ca/~palencar/cs846/presentations/student/project/dec01/01-TavaresNagpal.pdf
https://cs.uwaterloo.ca/~palencar/cs846/presentations/student/project/dec01/01-TavaresNagpal.pdf
基于多域信息融合的内部威胁检测
http://www.freebuf.com/articles/network/96778.html
http://www.freebuf.com/articles/network/96778.html
编写自己的Web日志分析脚本
http://www.freebuf.com/articles/web/96675.html
http://www.freebuf.com/articles/web/96675.html
RiS-Egress-Test-Tool
https://github.com/RawInfoSec/RiS-Egress-Test-Tool
https://github.com/RawInfoSec/RiS-Egress-Test-Tool
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第104期)
