| | Detecting crypto currency mining in corporate environments (sans.org) |
| 2 points by christianbryant on May 9, 2015 | past |
|
| | Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) (sans.org) |
| 1 point by r721 on April 3, 2015 | past |
|
| | SANS Pen Test 2015 Challenge (sans.org) |
| 2 points by evandrix on Feb 4, 2015 | past |
|
| | The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare (sans.org) |
| 1 point by eddie_31003 on Jan 19, 2015 | past |
|
| | Using Indicators of Compromise to Hunt Down the Advanced Persistent Threat (sans.org) |
| 1 point by christianbryant on Oct 21, 2014 | past |
|
| | TrueCrypt slide removed at request of US Government? [pdf] (sans.org) |
| 31 points by chmars on May 29, 2014 | past | 15 comments |
|
| | Top 25 Software Errors (sans.org) |
| 1 point by jmduke on July 11, 2013 | past |
|
| | Java IDX Sample Files from Java Spearphishing Attack from SANS FOR508 (sans.org) |
| 1 point by Mustapha1 on Feb 16, 2013 | past |
|
| | The Year Without a Santa... Hack. (sans.org) |
| 2 points by captincaveman on Dec 18, 2012 | past |
|
| | Different ways of looking at security bugs (sans.org) |
| 3 points by kungfudoi on July 13, 2012 | past |
|
| | Is Anti-Virus Really Dead? (sans.org) |
| 19 points by PhearTheCeal on April 10, 2012 | past | 5 comments |
|
| | SANS Security Training Course - Bangalore - February (sans.org) |
| 1 point by chunky1994 on Feb 13, 2012 | past |
|
| | Software Security starts with Software Quality (sans.org) |
| 3 points by tosbourn on Jan 25, 2012 | past | 1 comment |
|
| | SQL Injection Attack happening ATM (sans.org) |
| 33 points by wglb on Dec 2, 2011 | past | 6 comments |
|
| | SANS Announces the Release of a Major Update to the 20 Critical Controls (sans.org) |
| 1 point by gapanalysis on Aug 25, 2011 | past |
|
| | "Too Important to Patch" - Wait? What? (sans.org) |
| 2 points by jsundquist on July 6, 2011 | past | 1 comment |
|
| | StartSSL suspends services after a security breach (sans.org) |
| 23 points by there on June 21, 2011 | past | 10 comments |
|
| | ISC Diary: What's The Deal With Bitcoin? (sans.org) |
| 1 point by nikunjvaidya on June 17, 2011 | past | 1 comment |
|
| | IPv6 Day Has Started (sans.org) |
| 176 points by there on June 8, 2011 | past | 57 comments |
|
| | Safer software through secure frameworks (sans.org) |
| 2 points by JimBird on June 6, 2011 | past |
|
| | Most Dangerous Software Errors (sans.org) |
| 4 points by radagaisus on June 3, 2011 | past |
|
| | Four Attacks on OAuth - How to Secure Your OAuth Implementation (sans.org) |
| 2 points by antidaily on March 7, 2011 | past | 1 comment |
|
| | Five Key Design Decisions That Affect Security in Web Applications (sans.org) |
| 1 point by there on Feb 10, 2011 | past |
|
| | IOS Push Notifications: Security Implications, Abuse Scenarios, Countermeasures (sans.org) |
| 1 point by there on Feb 7, 2011 | past |
|
| | What’s in Your iOS Image Cache? (sans.org) |
| 25 points by FSecurePal on Jan 17, 2011 | past | 9 comments |
|
| | What’s in Your iOS Image Cache? (sans.org) |
| 2 points by there on Jan 14, 2011 | past |
|
| | IT Auditing: Raising Awareness (sans.org) |
| 1 point by ninjayenn on Jan 11, 2011 | past |
|
| | How Not to Store Passwords in iOS (sans.org) |
| 3 points by barredo on Jan 5, 2011 | past |
|
| | UI Spoofing Safari on the iPhone (sans.org) |
| 2 points by ugh on Nov 30, 2010 | past |
|
| | How to Get Started With Malware Analysis (sans.org) |
| 1 point by gasull on Nov 25, 2010 | past |
|
|
| More |