The #VB2024 call for last-minute papers - presenting 'hot' research and material that is truly up-to-the-minute - is now open. To share your research with security experts around the globe submit your proposal now! https://lnkd.in/eCwcT9Gc
Virus Bulletin’s Post
More Relevant Posts
-
Tech Enthusiast || Innovator || Seeking New Opportunities to Make a Difference || CS student || member of ISTE
I am glad to share that my paper, "Review on Local News Transitions Toward Digital Media," got published in the International Journal of Information Security Engineering. STM Journals https://lnkd.in/gu4mJZXb
To view or add a comment, sign in
-
Hacker, Discrete Problem-Solver, and Straight-shooter. Available for special investigations, takedowns, evidence collection, digital clean-up, infiltration, and reputation and asset recovery.
OSSTMM 4 research update: We now know for certain security and trust are based on relative interactions. What it is depends on your relative position to it. How you are relative to it is based on the moment of time relative to the interaction (past, present, future) and according to these five properties: Characteristics, Context, Force, Resources, and Narratives.
To view or add a comment, sign in
-
The security landscape is increasingly complex, and the never-ending sea of solutions (and acronyms) isn’t helping. Thankfully, the Expel team is here to debunk 10 of the most common MDR myths. https://okt.to/ga8BvE
To view or add a comment, sign in
-
I have for some time been brewing on the idea of writing about different security topics related to OT and Critical Infrastructure but also combining that with another interest that I have, history. The aim is to combine strategic, technical and business aspects of different topics and make them interesting. You may already know the contemporary topic but might learn something about history or vice-versa :) That idea have now taken the form of a very simple blog, where I try and find historical events that can serve as analogies to different security topics: https://lnkd.in/dfAE7ekz
Intersection Security
intersectionsecurity.blogspot.com
To view or add a comment, sign in
-
Dear All, We are pleased to announce the publication of our newly generated dataset for malicious network traffic, entitled "Large-Scale Network Cyberattacks Multiclass Dataset 2024 (LSNM2024)". To the best of our knowledge, this is the most comprehensive multiclass dataset for network intrusion detection and classification, comprised of 15 different attacks covering different networking layers in addition to the normal traffic class. Download and utilize our dataset: https://lnkd.in/eAqX7vqB More information about the dataset will be published soon in our accepted and registered paper. (Please cite our conference paper should you use this dataset): Q. Abu Al-Haija, Z. Masoud, A. Yasin, K. Alesawi, Y. Alkarnawi, "Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset", 15th International Conference on Information and Communication Systems (ICICS 2024), IEEE, Aug. 2024.
To view or add a comment, sign in
-
Do you still enjoy printed books? In our world full of screens, the appeal of printed books often goes unnoticed. Yet, there's something uniquely appealing about the texture of real paper. Recently, my friend Gianluigi Me sent me his latest work, "OSINT in the Intelligence era." This book explores the diverse aspects of Open Source Intelligence (OSINT). It presents the critical roles of cyber and cognitive warfare in contemporary intelligence operations, demonstrating the multifaceted nature of OSINT. Kudos to Gianluigi for creating this valuable resource! #OSINT #intelligence #opensourceintelligence
To view or add a comment, sign in
-
“Know your enemy, know his sword.” wrote Miyamoto Musashi in his book, A Book of Five Rings: The Classic Guide to Strategy. He also wrote, “You win battles by knowing the enemy’s timing, and using a timing which the enemy does not expect.” Although this was written when swords and spears won battles, it also applies to cyberspace, where attacks are launched via keyboards and crafted packets. The more you know about your target’s infrastructure and personnel, the better you can orchestrate your attacks.
To view or add a comment, sign in
-
"We explore the security model exposed by Rook with Ceph, the leading software-defined storage platform of the Open Source world. Digging increasingly deeper in the stack, we examine options for hardening Ceph storage that are appropriate for a variety of threat profiles." https://lnkd.in/e8KsPUt5
FOSDEM 2024 - Data Security and Storage Hardening in Rook and Ceph
fosdem.org
To view or add a comment, sign in
-
Commits | Leads | Manages | Succeeds | Creates happy and resilient teams that achieve and deliver outstanding results | A personable, approachable and hands-on leader that supports individuals to step-in and step-up.
This type of public information advert signals change and worthy read. https://lnkd.in/eWzRNpQB
State Threats CNI | NPSA
npsa.gov.uk
To view or add a comment, sign in
-
"Check out our latest published paper on LinkedIn! We present a cutting-edge approach titled 'A Resilient Five-Layer Key Generation Technique for Stream Ciphers.' Our innovative method enhances the security and resilience of stream ciphers through a sophisticated five-layer key generation process. Dive into our research to discover how this technique contributes to bolstering cryptographic systems against sophisticated attacks and ensures robust data protection in sensitive applications."
To view or add a comment, sign in
1,648 followers