Practical Malware Analysis - Lab Write-up
https://www.jaiminton.com/Tutorials/PracticalMalwareAnalysis/#
| https://twitter.com/d1mur4tdj | |
| CYBER-MAP | https://embed.kumu.io/0b023bf1a971ba32510e86e8f1a38c38#apt-index |
| RE | https://www.begin.re/ |
| Exploits | https://sploitus.com/ |
Practical Malware Analysis - Lab Write-up
https://www.jaiminton.com/Tutorials/PracticalMalwareAnalysis/#
Chinese cyberspies go after telco providers, 5G secrets
https://therecord.media/chinese-cyberspies-go-after-telco-providers-5g-secrets/
Using Syscalls to Inject Shellcode on Windows
https://www.solomonsklash.io/syscalls-for-shellcode-injection.html
ME:(i said
I have already said on my twitter profile that we will see two worlds in the future! High-tech countries headed by the United States (democracy, the West) and countries with centralized high-tech internal cycles headed by China (Southeast Asia, Asia, Russia)
China plans for a world without American tech. A commentary from Ni Guangnan said it all, he called for a "China system" of computing as dominant as Wintel and for China to grow global reliance on its 5G tech as a countermeasure to US tech
https://www.nytimes.com/2021/03/10/business/china-us-tech-rivalry.html
-----------------------------------------------------
Inside Israel’s lucrative — and secretive —cybersurveillance industry
"You Do (Not) Understand Kerberos" slides and (spanish) video available in my blog! (english video soon)
Hope you enjoyed!
上海交通大学研究人员发表了七篇论文
#公安部研究了机器学习的应用软件的静态漏洞分析。50漏洞分析发现可以由防御者或被攻击者利用;漏洞使用后如何使用发现取决于用户。另一篇论文提出了一个机器可以区分Tor Web流量与其他流量的学习模型
信息内容分析技术国家工程实验室
—重点介绍 #使用AI修复软件漏洞,支持网络攻击和防御,并查找软件漏洞恶意软件开发过程中的利用。54件通过提出两个论点来得出结论。
杨,将他的研究描述为“数据驱动的AI智能网络威胁检测和“猎人”防御系统; #基于AI和大数据分析的检测加密流量中的恶性肿瘤;基于机器学习加密的流量(#SSL,#Tor,#VPN,#ShadowSocks)/专用互联网协议识别和调查;数据分析与机器基于学习的网络空间虚拟角色识别,匹配,和调查。