Zero-day attack

Results: 269



#Item
51Software maintenance / Patch / Vulnerability / Linux kernel / Zero-day attack / Software / Computing / System software

fixing bugs in binaries using r2 @noconname pancake

Add to Reading List

Source URL: radare.org

Language: English - Date: 2010-10-20 19:55:39
52Computing / Honeypot / Vulnerability / Zero-day attack / Malware / Nessus / Computer worm / Attack / Computer virus / Computer security / Computer network security / Cyberwarfare

A solution that integrates the most popular Internet services and a Private Branch Exchange - Solo

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-12-10 05:24:38
53Computer network security / Hacking / Zero-day attack / Vulnerability / 0D / Failure / Deadline / Exploit / Time limit / Computer security / Cyberwarfare / Software testing

Project Zero Make 0day Hard The mission statement: Make 0day hard.

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:19:02
54Hacking / Computing / Attack / Vulnerability / Zero-day attack / Denial-of-service attack / DNS spoofing / Domain Name System Security Extensions / Internet security / Computer network security / Cyberwarfare / Computer security

I n t e r ne t I n f r a s t r u c t u re Rev i e w Vol.21 Infrastructure Security The PlugX RAT Used in Targeted Attacks

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:08
55Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
56Computer security / McAfee / Malware / Zero-day attack / Rogue security software / Whitelist / McAfee VirusScan / ESET NOD32 / Antivirus software / System software / Software

Solution Brief The Evolving Landscape of Desktop Security The desktop security landscape has been evolving due to multiple factors, including

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:42
57Antivirus software / Shellcode / Privilege escalation / INCA Internet / Linux kernel / Architecture of Windows NT / Windows Registry / Zero-day attack / Ioctl / Computer security / System software / Software

Anti-Virus Software 0Day Party MJ0011 Agenda

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-12-06 04:41:42
58Zero-day attack / Vulnerability / VM / Malware / Failure / X86 architecture / Assembly languages / Computer security / Cyberwarfare / Computer network security

Finding 0-days by Using VulnHunt Wei Wang(alert7) Code Audit Labs of Vulnhunt Co.,Ltd 翰海源 www.vulnhunt.com

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-12-06 08:30:09
59Security / Malware / Hacking / Software testing / Buffer overflow / Address space layout randomization / Computer worm / Attack / Vulnerability / Computer security / Cyberwarfare / Computer network security

Sting: An End-to-End Self-healing System for Defending against Zero-day Worm Attacks on Commodity Software James Newsome David Brumley

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
60Security / Network security / Zero-day attack / Layered security / Pass the hash / Intrusion prevention system / Password / Malware / Attack / Computer network security / Cyberwarfare / Computer security

IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-01-08 14:04:38
UPDATE