Hébergé par
Rackspace
Tootella
Les news du libre
Linux [fr]
Linux [en]
Sécurité
Projets
BSD
Dev
Applications
Autres
Tout
mini
=|=
Recommandation :
QCM sur TCP/IP
Dark Reading
Russian 'Fancy Bear' Hackers Hit Mac OS X With New Trojan
Ransomware: Coming To A Hospital Near You?
Cyber Risk Among Top Concerns For Business Leaders: Study
FBI Probes Dumping Of NSA Hack Tools On Public Site
Yahoo Breach Could Delay $4.8 Billion Verizon Takeover
Microsoft Launches Windows Defender App Guard For Its Edge Browser
What The WADA Hack Proves About Today's Threat Landscape
Adware Campaign Using Advanced Nation-State Obfuscation Techniques
State Of The Exploit Kit
7 New Rules For IoT Safety & Vuln Disclosure
Brèves HSC
[89] DANE et les attaques par rejeu
[88] Préqualification Nuit du Hack 2012 - Write-up 4005
[86] Analyse du protocole Microsoft SSTP
[85] Oracle 11 et l'authentification
[84] Obtenir les clés SSL en mémoire d'un processus
[83] Etendre les fonctionnalités de nmap et réaliser un scan au niveau applicatif
[82] Brève sur les interfaces RPC Windows
[81] Brève sur WMI (Windows Management Instrumentation)
[80] Malwar(e)
[79] Retour sur la vulnérabilité CVE-2008-1930 dans Wordpress
Bugtraq
Vuln: Jenkins Credentials Binding Plugin CVE-2019-1010241 Information Disclosure Vulnerability
Vuln: Qualcomm Components CVE-2019-2307 Integer Underflow Vulnerability
Vuln: LibreOffice Remote Code Execution and Unauthorized Access Vulnerabilities
Vuln: KDE KAuth CVE-2017-8422 Local Privilege Escalation Vulnerability
Bugtraq: [SECURITY] [DSA 4269-1] postgresql-9.6 security update
Bugtraq: [SECURITY] [DSA 4268-1] openjdk-8 security update
Bugtraq: [SECURITY] [DSA 4267-1] kamailio security update
Bugtraq: [CVE-2018-12584] Heap overflow vulnerability in reSIProcate through 1.10.2
More rss feeds from SecurityFocus
Cisco Security
Holiday shopping, hackers and cybersecurity
VIDEO: Cisco and Ericsson Partner to Accelerate Digital Transformation
Ericsson and Cisco Partner to Create the Networks of the Future
Cisco Announces Intent to Acquire Lancope
nc Simplifies OTT With Cisco Virtualized Video Processing
Cisco and Accenture Extend Global Alliance to Brazil to Help Clients Expand Business Opportunities, Reduce Costs and Improve Productivity
Cisco Midyear Security Report Reveals Sophisticated Cyberattacks Are Defining the Innovation Race between Adversaries and Defenders
Cybersecurity Innovation Race: 3 Things You Need to Know
Why That Home Network Will Really Matter to you Today
How Will Smart Cities Defend Against Hackers?
ImperViews
Financial Regulators Focused on Cyber Security
What Fight Club Doesn't Teach Us About the Yahoo! Breach
The Concerning Case of the Underestimated MegaBreaches
Join us at the Gartner Security and Risk Management Summit
GDPR Compliance: How to get the ball rolling today?
2015–16 Annual DDoS Threat Landscape Report
Fact Checking Cyber Espionage Tactics in the Jason Bourne Movie (Spoilers)
Big banks join forces to fight cyber crime
FBI appointed as cyber Ghostbusters. “Who are you going to call?"
Thoughts and musings from my first blackhat conference
Schneier on Security
Reforming CDA 230
Failure Modes in Machine Learning
Friday Squid Blogging: Squidfall Safety
Andy Ellis on Risk Assessment
Election Machine Insecurity Story
Becoming a Tech Policy Activist
RSA-240 Factored
The Story of Tiversa
Cameras that Automatically Detect Mobile Phone Use
Friday Squid Blogging: Squid-Like Underwater Drone
Threatpost
‘Magic’ Espionage Malware hits Thousands of UK Computers
Comment Crew Malware is After Drone Technology
ACLU Asks FTC to Investigate Carriers’ Lack of Android Security Updates
Geer, Thieme: Specialization and Institutionalization Have Transformed Security
Oracle Patches 42 Java Flaws, Adds New Code-Signing Restrictions and Warnings
Move Over Conficker, Web Threats are Top Enterprise Risk
DevOps Integration Key to Avoiding Pre-Ordained Security Failures
Bruce Schneier on the Boston Marathon Bombing and the Psychology of Fear
NQ Mobile: Android Malware Doubled in 2012
Linode Hacked Through ColdFusion Zero Day