SecWiki周刊(第411期)
2022/01/10-2022/01/16
安全技术
QRS 2021 论文录用列表
https://mp.weixin.qq.com/s/BMEXcjaFPuA00VrBDnhnlg
https://mp.weixin.qq.com/s/BMEXcjaFPuA00VrBDnhnlg
2021年侵犯个人信息十大典型案例
https://mp.weixin.qq.com/s/mL3UWks3T2s1sliH28GaqA
https://mp.weixin.qq.com/s/mL3UWks3T2s1sliH28GaqA
r3kapig技能栈1.0
https://r3kapig.com/r3kapig-skill-tree-v1.0
https://r3kapig.com/r3kapig-skill-tree-v1.0
Zeek - Detect Godzilla WebShell
https://canon88.github.io/2021/11/30/Zeek-Detect-Godzilla-WebShell/
https://canon88.github.io/2021/11/30/Zeek-Detect-Godzilla-WebShell/
从分析一个赌球APP中入门安卓逆向、开发、协议分析
https://mp.weixin.qq.com/s/s1EmuyqlfcBa25wmxC87sQ
https://mp.weixin.qq.com/s/s1EmuyqlfcBa25wmxC87sQ
Rootkit 系列研究-Windows平台的高隐匿、高持久化威胁
https://mp.weixin.qq.com/s/YE7bt6Bhz2mYYp1n-2vJtQ
https://mp.weixin.qq.com/s/YE7bt6Bhz2mYYp1n-2vJtQ
Graph Embedding实战系列:Node2vec原理与代码实战
https://mp.weixin.qq.com/s/V6DzgC1WXST7yZczKQiCXg
https://mp.weixin.qq.com/s/V6DzgC1WXST7yZczKQiCXg
初识WebAssembly
https://mp.weixin.qq.com/s/IMbAujuFHzX3JO3PFE_vLg
https://mp.weixin.qq.com/s/IMbAujuFHzX3JO3PFE_vLg
基于跨站跳转和文本数据异构图的GCN模型实现恶意网站识别
https://mp.weixin.qq.com/s/sQxa7YrNybZnP1w5iZeceA
https://mp.weixin.qq.com/s/sQxa7YrNybZnP1w5iZeceA
长安"战疫"-WriteUp
https://mp.weixin.qq.com/s/VMk7RPkvDioqMqEQdM5jFw
https://mp.weixin.qq.com/s/VMk7RPkvDioqMqEQdM5jFw
安全学术会议排行榜(2021版)
https://mp.weixin.qq.com/s/6Bd5eg9TJw5PL_Qtpq8eLg
https://mp.weixin.qq.com/s/6Bd5eg9TJw5PL_Qtpq8eLg
剖析海莲花组织恶意文件定制化策略
https://mp.weixin.qq.com/s/_ON095i-wuNHtQQgB-hSng
https://mp.weixin.qq.com/s/_ON095i-wuNHtQQgB-hSng
Gartner 2021 漏洞评估产品市场指南
https://mp.weixin.qq.com/s/Oi7id-3jJOFjS1x-PlmD6w
https://mp.weixin.qq.com/s/Oi7id-3jJOFjS1x-PlmD6w
网安新兴赛道及厂商速查· Cyber Security Billboard
https://docs.qq.com/sheet/DQ2F2a29TZFhDdFZp?tab=BB08J2
https://docs.qq.com/sheet/DQ2F2a29TZFhDdFZp?tab=BB08J2
APT组织情报研究年鉴 2021
http://blog.nsfocus.net/wp-content/uploads/2022/01/APT.pdf
http://blog.nsfocus.net/wp-content/uploads/2022/01/APT.pdf
将EXE程序通过Powershell形式实现无文件运行
http://www.bugsafe.cn/archives/294.html
http://www.bugsafe.cn/archives/294.html
ATT&CK Techniques to Security Events
https://ossemproject.com/dm/mitre_attack/attack_techniques_to_events.html
https://ossemproject.com/dm/mitre_attack/attack_techniques_to_events.html
互联网领域黑产常见攻击手法初探
https://mp.weixin.qq.com/s/RfBOC1Tiy76qQRlrjIMdTA
https://mp.weixin.qq.com/s/RfBOC1Tiy76qQRlrjIMdTA
网络空间威胁狩猎的研究综述
https://mp.weixin.qq.com/s/nSM-WoSE6IVDXZ52F9h9SQ
https://mp.weixin.qq.com/s/nSM-WoSE6IVDXZ52F9h9SQ
端到端模型在人员流失预警场景的实践
https://mp.weixin.qq.com/s/DY-gzglv73iLrANjDY4PrQ
https://mp.weixin.qq.com/s/DY-gzglv73iLrANjDY4PrQ
SecWiki周刊(第410期)
https://www.sec-wiki.com/weekly/410
https://www.sec-wiki.com/weekly/410
在互联网交换中心检测反射放大 DDoS 攻击
https://mp.weixin.qq.com/s/bH7SSb9-RW1H5VlUWog8cQ
https://mp.weixin.qq.com/s/bH7SSb9-RW1H5VlUWog8cQ
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第411期)
