Zero-day attack

Results: 269



#Item
1Cyberwarfare / Malware / Computer security / Computer network security / Deception / Rootkits / Zero-day / Computer virus / Ransomware / SentinelOne / Antivirus software / Computer worm

Malware and Exploits: An Introduction to Two Prominent Attack Vectors IN TODAY’S CYBER THREAT LANDSCAPE, NOT ALL ATTACKS ARE CREATED EQUAL Whether you’re a security practitioner focused on safeguarding your organizat

Add to Reading List

Source URL: www.sentinelone.com

Language: English - Date: 2016-05-23 01:13:39
2Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Internet security / Cyber-Insurance / Vulnerability / CERT Coordination Center / Zero-day / Bug bounty program / Attack

A Comparison of Market Approaches to Software Vulnerability Disclosure Rainer B¨ ohme Technische Universit¨ at Dresden

Add to Reading List

Source URL: www.is.uni-muenster.de

Language: English - Date: 2012-12-21 05:49:44
3Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2013-01-18 09:24:08
4

Zero­Day Attack Prevention via  Single Packet Authorization Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

Add to Reading List

Source URL: www.cipherdyne.com

Language: English - Date: 2015-07-08 09:34:47
    5Security / Hacking / Software testing / National security / Vulnerability / Exploit / Attack / Threat / Zero-day attack / Computer network security / Cyberwarfare / Computer security

      Christian  Gehl   Co-­‐Founder    &  CEO     www.trifense.com  

    Add to Reading List

    Source URL: www.europa.brandenburg.de

    Language: English - Date: 2012-06-20 09:00:08
    6Hacking / War / Advanced persistent threat / Military technology / Securitate / Malware / Computer insecurity / Zero-day attack / Security / Cyberwarfare / Electronic warfare

    Atacuri avansate impotriva institutiilor financiare Metode de prevenire si raspuns Teodor Cimpoesu, Cyber Security BU Director Cyber Risks, Bucuresti, 9 Oct, 2014

    Add to Reading List

    Source URL: cyberisks.ro

    Language: English - Date: 2014-10-10 03:40:58
    7Failure / Hacking / Software testing / Vulnerability / Cross-site scripting / SQL injection / CVSS / Zero-day attack / Cyberwarfare / Computer security / Computer network security

    Microsoft Word - vuln2010q3-e.doc

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2015-05-28 22:03:35
    8Security / Software testing / Hacking / Vulnerability / Software quality / Zero-day attack / Software assurance / Software bug / Patch / Computer network security / Cyberwarfare / Computer security

    문서의 제목 나눔고딕B, 54pt

    Add to Reading List

    Source URL: www.commoncriteriaportal.org

    Language: English - Date: 2013-09-12 12:11:16
    9Security / Software testing / Crime prevention / National security / Application firewall / Application security / Penetration test / Zero-day attack / Cross-site scripting / Computer network security / Cyberwarfare / Computer security

    THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY April 2015 THE EVOLUTION

    Add to Reading List

    Source URL: www.prevoty.com

    Language: English - Date: 2015-06-04 23:45:16
    10Computing / Software testing / Software engineering / Application security / Electronic commerce / Cross-site scripting / Vulnerability / Penetration test / Zero-day attack / Cyberwarfare / Computer security / Computer network security

    Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015

    Add to Reading List

    Source URL: www.prevoty.com

    Language: English - Date: 2015-06-04 23:45:14
    UPDATE