Threat hunting with Yara: Measuring distance between any three elements
Guest Post: Learn how to use Yara’s math module and min/max functions to measure distance between patterns.
Guest Post: Learn how to use Yara’s math module and min/max functions to measure distance between patterns.
Guest Post: Get to know how to use Yara with real-life research problems — detecting code evolution and shellcodes.
Guest Post: DNS transparency is a gaping hole in Internet security.
Guest Post: How to use single sign-on to benefit technology selection and deployment.
Guest Post: How integration with OpenID Connect secured the RDAP service of ccTLD .it.
Guest Post: Where to begin when you’re tasked with selecting a strong authentication solution for your organization.
Guest Post: Researchers propose a mechanism for DNS servers to independently determine a client’s preferred protocol.
Guest Post: Learn how Source Address Validation helps mitigate source address spoofing and what the IETF is doing to make it better.
Guest Post: Reviewing and patching for past vulnerabilities can help to plan for and mitigate future attacks.
Guest Post: Understanding malware threats towards the DNS is the first step towards mitigating them.