DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology SecureWorld: Information Security Adaption: Survival In An Evolving Threat Landscape

1. Information Security Adaption:Survival In An Evolving ThreatLandscapeCarl HerbergerVP, Security Solutions, Radware 2. The Evolving Threat LandscapeAnatomy of an AttackSecuring…

Technology The Art of Cyber War [From Black Hat Brazil 2014]

The Art of Cyber War Werner Thalmeier – Director Security Solutions EMEA & CALA The Art of War is an ancient Chinese military treatise attributed to Sun Tzu, a high-ranking…

Technology Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.

PowerPoint Presentation Cyphort Labs Malwareâs Most Wanted Series Attack on Sony Pictures Destover Most Wanted of 2014 @belogor Sony Attack â Destover Trojan. Who is behind…

Documents Skeleton key malware detection owasp

1. OWASP IL, June 2015 2. waza 1234/ des_cbc_md5 f8fd987fa7153185 LSASS (kerberos) rc4_hmac_nt (NTLM/md4) cc36cf7a8514893e fccd332446158b1a aes128_hmac 8451bb37aa6d7ce3 d2a5c2d24d317af3…

Software Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comments

1. 1ERPScan - Invest In Security To Secure Investmentserpscan.com CHINESE ATTACK ON USIS EXPLOITING SAP VULNERABILITY Introduction On 11th of May, a security headline broke…

Technology Cisco, Sourcefire and Lancope - Better Together

1. Cisco, Sourcefire and Lancope – Better Together David Salter Technical Director, Lancope Inc. 26th February 2014© 2014 Cisco and/or its affiliates. All rights reserved.Cisco…