0xgradiusContainerizing my NSM stack — Docker, Suricata and ELKEverything goes in tiny little containers and works like building blocks!Dec 31, 20171Dec 31, 20171
Mohammed LAHLOU محمد لحلوPython for information Security Pen-tester Giveaway [ARABIC]Hello & Salamu Alikum Secomunity followers today i will share with you a gift from a friend an Ethical Hacker from Egypt! he’s first course…Dec 31, 20172Dec 31, 20172
Mitch EdwardsChinese Threat Intelligence Part 2: The High PointsThis series is serving as a baseline for our future studies into Threat Intelligence in the Chinese domain. In Part 1, we discussed the…Dec 31, 2017Dec 31, 2017
Cossack LabsTop Security & Crypto Fails of 2017A Very Subjective List of the notable security and, specifically, cryptographic fails of the yearDec 31, 2017Dec 31, 2017
Syscall59 — Alan VivonainPentestsecRickdiculouslyEasy Walkthrough — VulnhubThis is a walktrough of a Rick y Morty based vulnhub named “RickdiculouslyEasy”Dec 31, 20173Dec 31, 20173
ArtsSECOWASP Top Ten: Then to NowOWASP, short for the Open Web Application Security Project, is a community of web security professionals that actively endorse the best…Dec 29, 2017Dec 29, 2017
Mitch EdwardsChinese Threat Intelligence Part 1: The High PointsThis article is going to serve as a baseline evaluation of over six years of threat intelligence research. The research began in high…Dec 28, 2017Dec 28, 2017
Threat IntelinThreat Intel7 Stories From 2017 You Need to Know AboutBefore 2017 washes away, let us reflect on some of the big infosec stories of the year.Dec 28, 2017Dec 28, 2017
Mitch Mitchell10 Cybersecurity Failures of 2017As I look back at 2017, I’ve witnessed both good and bad news. The good news is that enterprise companies, small businesses, and the…Dec 27, 20171Dec 27, 20171
WhiteSourceThree New Years Resolutions Every CISO Should AdoptAs we begin to arise from our Christmas food comas, and a moment before we make sure that our liquor cabinets are stocked and the champagne…Dec 27, 2017Dec 27, 2017