10 conseils pour rester net sur le web | CNIL
Sécurité
CSRF, CORS, and HTTP Security headers Demystified
A Closer Look at the DarkSide Ransomware Gang
The FBI confirmed this week that a relatively new ransomware group known as DarkSide is responsible for an attack that caused Colonial Pipeline to shut down 5,550 miles of pipe, stranding countless barrels of gasoline, diesel and jet fuel on…
Security headers quick reference
This article lists the most important security headers you can use to protect your website. Use it to understand web-based security features, learn how to implement them on your website, and as a reference for when you need a reminder.
How DNSSEC works
How do you feel about a taco explaining you how DNSSEC works?
How HTTPS works
🙀 A cat explains how HTTPS works...in a comic! 😻
Humanity wastes about 500 years per day on CAPTCHAs. It’s time to end this madness
An experiment that uses hardware security keys (like a YubiKey) to replace CAPTCHAs completely. The idea is rather simple: if a real human is sitting at their keyboard or uses their phone, they can touch their security key’s button or bring it near their phone to demonstrate that they are human.
Cryptography from the Ground Up
Password policy: updating your approach
Advice for system owners responsible for determining password policies and identity management within their organisations.
Piratage d’un système informatique (professionnels)
Le piratage de système informatique professionnel est un accès non autorisé à ce système par un tiers et peut entraîner une perte totale des informations.
5 developer tools for detecting and fixing security vulnerabilities
We all know the importance of developing with customer, reliability, or security mindsets. In reality...
The hard truth about ransomware: we aren’t prepared, it’s a battle with new rules, and it hasn’t…
I’ve talked about ransomware and extortion attacks on organizations for about a decade. I recently spent a year at Microsoft in Threat…
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
A Computer Science portal for geeks. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview Questions.
Automated Human Risk Management | usecure
Raise employee cyber security awareness with user-tailored training and simulated phishing campaigns, powered through intelligent automation.
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
CVEdetails.com is a free CVE security vulnerability database/information source. You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time
DNSdumpster.com - dns recon and research, find and lookup dns records
Find dns records in order to identify the Internet footprint of an organization. Recon that enables deeper security assessments and discovery of the attack surface.
Punkspider
Sécurisez votre serveur web
Vous savez installer un serveur Linux et souhaitez renforcer ses services ? Suivez ce cours, apprenez à monter un serveur web et à gérer les services les plus courants !
Apprendre le hacking - Techniques de base hacking / sécurité informatique
Bases Hacking : apprendre la base de la sécurité informatique. Techniques de base, failles web, buffer overflows, pwn, shellcode, exploits
Sécurisez vos applications web avec l'OWASP
Pour créer une application de qualité, vous devez définir son modèle de sécurité ! Apprenez à appliquer les techniques de OWASP, une communauté qui fournit des outils inestimables pour réduire les risques de sécurité dans le développement web.
TryHackMe | Cyber Security Training
An online platform for learning and teaching cyber security, all through your browser.
Kontra Application Security Training
Kontra is an Application Security Training platform built for modern development teams.
Deviant Ollam Talks - YouTube
Qu’est-ce que la sécurité et la sûreté informatique ?
Quand le projet d'un pirate informatique est mis à mal grâce aux techniques de protection pour assurer la sécurité informatique.... Quelles sont les méthodes pour protéger les données informatiques ? Comment éviter les bugs dans un logiciel et donc les failles de sécurité ? Autant de...
US Soldiers Expose Nuclear Weapons Secrets Via Flashcard Apps - bellingcat
Online study aids used by US soldiers contained detailed information about base security and the location of nuclear devices in Europe.
Developers are Buzzing on Fuzzing
Find vulnerabilities in your code with fuzzing, a security testing technique generating a lot of attention today.
Quelles solutions pour la sécurité ?
Rien ne sert d'avoir réalisé un site conforme en tous points aux exigences si la sécurité n'est pas au rendez-vous.
Kit de sensibilisation - Cybermalveillance.gouv.fr
Le kit de sensibilisation vise à sensibiliser aux questions de sécurité du numérique, en partageant les bonnes pratiques et en améliorant les usages.
Security Assurance and Security Operations
infosec.mozilla.org : Guidelines, principles published on https://infosec.mozilla.org
Microsoft Word - Cyber-Security in smart grid - a survey - Revised version 2(3).doc - 1809.02609.pdf