Threat hunting with Yara: The three body problem
Guest Post: Get to know how to use Yara with real-life research problems — detecting code evolution and shellcodes.
Guest Post: Get to know how to use Yara with real-life research problems — detecting code evolution and shellcodes.
Guest Post: DNS transparency is a gaping hole in Internet security.
Guest Post: How to use single sign-on to benefit technology selection and deployment.
Guest Post: How integration with OpenID Connect secured the RDAP service of ccTLD .it.
Guest Post: Where to begin when you’re tasked with selecting a strong authentication solution for your organization.
Guest Post: Researchers propose a mechanism for DNS servers to independently determine a client’s preferred protocol.
Guest Post: Learn how Source Address Validation helps mitigate source address spoofing and what the IETF is doing to make it better.
Guest Post: Reviewing and patching for past vulnerabilities can help to plan for and mitigate future attacks.
Guest Post: Understanding malware threats towards the DNS is the first step towards mitigating them.
This round of ISIF Asia grantees is the biggest ever, with 22 projects covering 18 economies. Projects range from BGP and cybersecurity through to Internet development.