unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Mobile Screenshot prevention Cheat Sheet - Risks and Scenarios
The following article will try to analyze and explain risks and attack scenarios affecting mobile a...
2020-10-16 01:53:00 | 阅读: 143 |
收藏
|
blog.mindedsecurity.com
attacker
bill
victim
library
Mobile Screenshot prevention Cheat Sheet - Risks and Scenarios
tag:blogger.com,1999:blog-7122745763234660283.comments2020-10-15T05:05:25.351-07:00Minded Security B...
2020-10-16 01:53:00 | 阅读: 186 |
收藏
|
blog.mindedsecurity.com
00minded
351
15t05
security
Implementing Secure Biometric Authentication on Mobile Applications
Nowadays, almost every mobile device has a biometric sensor that allows developers to impleme...
2020-07-30 17:20:00 | 阅读: 161 |
收藏
|
blog.mindedsecurity.com
biometric
keychain
Implementing Secure Biometric Authentication on Mobile Applications
tag:blogger.com,1999:blog-7122745763234660283.comments2020-10-06T11:22:52.380-07:00Minded Security B...
2020-07-30 17:20:00 | 阅读: 171 |
收藏
|
blog.mindedsecurity.com
00minded
security
BadWPAD and spear-phishing using Battle.net Desktop App
In the first part, after a fast overview on the DNS Rebinding technique, we considered a practical e...
2020-7-10 20:51:0 | 阅读: 10 |
收藏
|
blog.mindedsecurity.com
5278
43434343
124000
firmware
132000
Behave! A monitoring browser extension for pages acting as "bad boi".
Browsing: What Could Go Wrong?There's so much literature about client side attacks, but most...
2020-07-01 00:52:00 | 阅读: 142 |
收藏
|
blog.mindedsecurity.com
behave
client
malicious
monitoring
Behave! A monitoring browser extension for pages acting as "bad boi".
tag:blogger.com,1999:blog-7122745763234660283.comments2020-10-06T11:22:52.380-07:00Minded Security B...
2020-07-01 00:52:00 | 阅读: 156 |
收藏
|
blog.mindedsecurity.com
06t11
380
00minded
Remote Working - Web Chats: Threats and countermeasures
IntroductionWith recent worldwide events, a sharply increasing number of companies are offering...
2020-05-18 18:59:00 | 阅读: 155 |
收藏
|
blog.mindedsecurity.com
software
chats
network
backoffice
malicious
Remote Working - Web Chats: Threats and countermeasures
tag:blogger.com,1999:blog-7122745763234660283.comments2020-10-06T11:22:52.380-07:00Minded Security B...
2020-05-18 18:59:00 | 阅读: 141 |
收藏
|
blog.mindedsecurity.com
06t11
00minded
blogminded
OWASP SAMM v2: lessons learned after 9 years of assessment
OWASP SAMM v2 is out!OWASP SAMM (Software Assurance Maturity Model) is the OWASP framework to he...
2020-04-30 22:38:00 | 阅读: 154 |
收藏
|
blog.mindedsecurity.com
security
software
samm
maturity
development
OWASP SAMM v2: lessons learned after 9 years of assessment
tag:blogger.com,1999:blog-7122745763234660283.comments2020-10-06T11:22:52.380-07:00Minded Security B...
2020-04-30 22:38:00 | 阅读: 150 |
收藏
|
blog.mindedsecurity.com
06t11
00minded
security
How to Path Traversal with Burp Community Suite
IntroductionA well-known, never out of fashion and highly impact vulnerability is the Path Tra...
2020-03-17 20:20:00 | 阅读: 153 |
收藏
|
blog.mindedsecurity.com
burp
intruder
payload
attacker
security
How to Path Traversal with Burp Community Suite
tag:blogger.com,1999:blog-7122745763234660283.comments2020-10-06T11:22:52.380-07:00Minded Security B...
2020-03-17 20:20:00 | 阅读: 143 |
收藏
|
blog.mindedsecurity.com
blogminded
380
00minded
A practical guide to testing the security of Amazon Web Services (Part 3: AWS Cognito and AWS CloudFront)
This is the last part of our 3 posts journey discussing the main Amazon Web Services and their secu...
2020-02-14 20:52:00 | 阅读: 141 |
收藏
|
blog.mindedsecurity.com
pools
buckets
cognito
cloudfront
A practical guide to testing the security of Amazon Web Services (Part 3: AWS Cognito and AWS CloudFront)
tag:blogger.com,1999:blog-7122745763234660283.comments2020-10-06T11:22:52.380-07:00Minded Security B...
2020-02-14 20:52:00 | 阅读: 153 |
收藏
|
blog.mindedsecurity.com
00minded
security
blogminded
Secure Development Lifecycle: the SDL value evolution. Part 1
Observability and metrics paradoxIt is also about observability: ”If a tree falls in a forest and...
2019-04-11 17:52:00 | 阅读: 132 |
收藏
|
blog.mindedsecurity.com
security
sdl
principles
huawei
development
Secure Development Lifecycle: the SDL value evolution. Part 1
tag:blogger.com,1999:blog-7122745763234660283.post456897804895711831..comments2020-10-06T11:22:52.38...
2019-04-11 17:52:00 | 阅读: 128 |
收藏
|
blog.mindedsecurity.com
22t02
380
development
lifecycle
Secure Development Lifecycle: the SDL value evolution. Part 2
Evolution of SDL practices: from custom to product to serviceThe increasing visibility tren...
2019-04-11 17:49:00 | 阅读: 130 |
收藏
|
blog.mindedsecurity.com
sdl
pushing
security
maturity
Secure Development Lifecycle: the SDL value evolution. Part 2
tag:blogger.com,1999:blog-7122745763234660283.comments2020-10-06T11:22:52.380-07:00Minded Security B...
2019-04-11 17:49:00 | 阅读: 139 |
收藏
|
blog.mindedsecurity.com
06t11
00minded
security
How to prevent Path Traversal in .NET
IntroductionA well-known, never out of fashion and highly impact vulnerability is the Path Trav...
2018-10-23 18:18:00 | 阅读: 108 |
收藏
|
blog.mindedsecurity.com
security
translates
minded
slash
Previous
2
3
4
5
6
7
8
9
Next