SANS ISC – Johannes Ullrich’s ‘Citrix ADC Vulnerability: How/Why Does The Exploit Work’

Thanks to SANS for publishing their SANS ISC superlative SANS ISC videos on YouTube. Enjoy!
Permalink
The post SANS ISC – Johannes Ullrich’s ‘Citrix ADC Vulnerability: How/Why Does The Exploit Work’ appeared first on Security B… Continue reading SANS ISC – Johannes Ullrich’s ‘Citrix ADC Vulnerability: How/Why Does The Exploit Work’

SANS CyberCast Hallway Talk – Johannes Ullrich’s and Didier Stevens’ ‘Microsoft Windows ‘Type 1 Font Parsing 0-Day’

Thanks to SANS for publishing their SANS ISC superlative SANS ISC videos on YouTube. Enjoy!
Permalink
The post SANS CyberCast Hallway Talk – Johannes Ullrich’s and Didier Stevens’ ‘Microsoft Windows ‘Type 1 Font Parsing 0… Continue reading SANS CyberCast Hallway Talk – Johannes Ullrich’s and Didier Stevens’ ‘Microsoft Windows ‘Type 1 Font Parsing 0-Day’

SANS Internet Storm Center Covid19 Domain Classifier, The Video

Thanks to SANS for publishing their SANS ISC superlative SANS ISC videos on YouTube. Enjoy!
Permalink
The post SANS Internet Storm Center Covid19 Domain Classifier, The Video appeared first on Security Boulevard.
Continue reading SANS Internet Storm Center Covid19 Domain Classifier, The Video

SANS OSINT Summit 2020 – Josh Huff’s ‘Real-Time OSINT: Investigating Events As They Happen’

Thanks to SANS for publishing this video of the SANS OSINT Summit 2020!
Permalink
The post SANS OSINT Summit 2020 – Josh Huff’s ‘Real-Time OSINT: Investigating Events As They Happen’ appeared first on Security Boulevard.
Continue reading SANS OSINT Summit 2020 – Josh Huff’s ‘Real-Time OSINT: Investigating Events As They Happen’

Photos: RSA Conference 2020, part 4

RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from the event, featured vendors and organization include: Shujinko, Build38, Styr… Continue reading Photos: RSA Conference 2020, part 4

What is the actual role of a threat hunter?

The role and tasks of a threat hunter are confusing, according to a ThreatQuotient and SANS study based on data collected from 575 participating companies that either work with or operate their own threat hunting teams. Threat hunter role: How threat h… Continue reading What is the actual role of a threat hunter?

[SANS ISC] My Little DoH Setup

I published the following diary on isc.sans.edu: “My Little DoH Setup“: “DoH”, this 3-letters acronym is a buzzword on the Internet in 2019! It has been implemented in Firefox, Microsoft announced that Windows will support it soon. They are pro & con about encrypting DNS requests in  HTTPS but it’s not the

[The post [SANS ISC] My Little DoH Setup has been first published on /dev/random]

Continue reading [SANS ISC] My Little DoH Setup

Spotlight on Shifting RIGHT and Security in a DevOps World

On November 4th and 5th, 2019, a two-day meeting of the minds will take place among information security experts in Denver,…
The post Spotlight on Shifting RIGHT and Security in a DevOps World appeared first on ZeroNorth.
The post Spotlight on Sh… Continue reading Spotlight on Shifting RIGHT and Security in a DevOps World

SANS DFIR, Jason Jordaan’s ‘Understanding The Forensic Science In Digital Forensics’

Thanks to SANS for publishing the SANS DFIR
superlative DFIR videos on their SANS DFIR YouTube Channel
Permalink
The post SANS DFIR, Jason Jordaan’s ‘Understanding The Forensic Science In Digital Forensics’ appeared first on Securi… Continue reading SANS DFIR, Jason Jordaan’s ‘Understanding The Forensic Science In Digital Forensics’