Yearly Archives: 2012

Article: PHP 5.4 Remote Exploit PoC in the wild

PHP 5.4 Remote Exploit PoC in the wild http://isc.sans.edu/diary.html?rss&storyid=13255

Article: Cyber Risk Report

Cyber Risk Report http://www.cisco.com/web/about/security/intelligence/CRR_May7-13.html

Article: Understanding SQL Injection

Understanding SQL Injection http://www.cisco.com/web/about/security/intelligence/sql_injection.html

Article: Database Encryption for Application Development

Database Encryption for Application Development http://www.cisco.com/web/about/security/intelligence/db-encryption.html

Article: 10 Steps to Better Security Incident Detection

10 Steps to Better Security Incident Detection http://www.tripwire.com/en/emea/register/10-steps-to-better-security-incident-detection/

Article: Tools->Information Gathering

Tools->Information Gathering http://isc.sans.edu/diary.html?rss&storyid=13246

Article: Top 5: Corporate Losses Due to Hacking

Top 5: Corporate Losses Due to Hacking http://www.hotforsecurity.com/blog/top-5-corporate-losses-due-to-hacking-1820.html

Article: Cisco Study: IT Saying Yes To BYOD

Cisco Study: IT Saying Yes To BYOD http://newsroom.cisco.com/press-release-content?articleId=854754&type=webcontent

Article: A Security-Oriented Approach to IP Addressing

A Security-Oriented Approach to IP Addressing http://www.cisco.com/web/about/security/intelligence/security-for-ip-addr.html

Article: ExitProcess Shellcode

ExitProcess Shellcode http://blog.didierstevens.com/2012/05/14/exitprocess-shellcode/