Security - 🟧Sourceful
Ransomware Overview
ransomware, security, software, data
Spreadsheet listing all known as well as unidentified ransomwhare plus detection and prevention guides.
Attacking Secondary Contexts in Web Applications
security, software, web applications, JavaScript
Security considerations when using modern routing technologies for web servers by Sam Curry
Penetrum_TikTok_Security_Analysis_whitepaper
TikTok, software, security, audit, mobile
Penetrum security analysis of TikTok versions 10.0.8 - 15.2.3
APT Groups and Operations
security, programming, cybersecurity, vulnerability, hacking
Cyber security companies and Antivirus vendors use different names for the same threat actors and often refer to the reports and group names of each other. However, it is a difficult task to keep track of the different names and naming schemes. I wanted to create a reference that answers questions like "I read a report about the 'Tsar Team', is there another name for that group?" or "Attackers used 'China Chopper' webshell, which of the APT groups did use that shell too?" or "Did he just say 'NetTraveler'? So, does he talk about Chinese or Russian attackers?"
Digital Communications Protocols
chat, security, list, privacy
Information about features, functions and other data of all sorts of communication platforms (chat, etc.)
Web Application Penetration Testing Course URLs
security, software, web development
Course in web security for your application/website