uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4246 bookmarks.

Showing top Tags within 9 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   service   product   online   business   uk   tool   company   linux   code   server   system   application   web   list   video   marine   create   data   experience   description   tutorial   explanation   technology   build   blog   article   learn   world   project   boat   download   windows   security   lookup   free   performance   javascript   technical   network   control   beautiful   support   london   tools   course   file   research   purchase   library   programming   image   youtube   example   php   construction   html   opensource   quality   install   community   computer   profile   feature   power   browser   music   platform   mobile   user   process   work   database   share   manage   hardware   professional   buy   industry   internet   dance   advice   installation   developer   3d   search   material   access   customer   travel   camera   test   standard   review   documentation   css   money   engineering   develop   webdesign   engine   device   photography   digital   api   speed   source   program   management   phone   discussion   question   event   client   story   simple   water   marketing   yacht   app   content   setup   package   fast   idea   interface   account   communication   cheap   compare   script   study   market   live   easy   google   resource   operation   startup   monitor   training  


Tag selected: vulnerability.

Clear all

Showing 9 results.

Looking up vulnerability tag. Showing 9 results. Clear

Snyk | Developer security | Develop fast. Stay secure.

https://snyk.io/

Saved by uncleflo on May 11th, 2021.

Developer-first Cloud Native Application Security. Loved by both developers and security teams: Find vulnerabilities while you code, with IDE and SCM integrations. Fix quickly and early, with automated remediation and actionable insight. Prevent introducing new vulnerabilities into your code base through new dependencies and code changes. Monitor with reporting and alerts providing visibility of application security posture across development teams. Manage with security and license policies and contextual prioritization defined and customized across the organization

actionable vulnerability fix insecure scanner container securely pricing alerts disclose documentation cloud visibility dependency developer automatically govern compliance coding security secure database license application code proprietary platform learn insight automate privacy infrastructure manage enhance kit howto love webdevelopment online internet


Mandiant Advantage Threat Intelligence | FireEye

https://www.fireeye.com/mandiant/advantage.html

Saved by uncleflo on April 10th, 2021.

A global network of support experts available 24x7. We offer simple and flexible support programs to maximize the value of your FireEye products and services. The new standard in threat intelligence. Access for our registered Partners to help you be successful with FireEye.
Collateral, deal registration, request for funds, training, enablement, and more. Read our digital magazine providing expert-authored stories, information, unique insights, and advice on cyber security.

comprehensive enable alert api hacker threat attack vulnerability privacy intelligence global financial motivate emerge documentation incident detection advantage information lookup understand insight value product service flexible support program maximize


OWASP Zed Attack Proxy Project

https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

Saved by uncleflo on June 22nd, 2018.

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.

owasp proxy attack hacker hacking automation check pentesting experience application develop test vulnerability scan browser international world popular tool security continuous delivery


Varonis - Protect your data from insider threats and cyberattacks

https://www.varonis.com/

Saved by uncleflo on June 30th, 2017.

Put Least Privilege on Autopilot The Varonis Automation Engine automatically repairs and maintains file systems so that you’re less vulnerable to attacks, more compliant, and consistently meeting a least privilege model. Discover undetected security gaps and automatically repair them: fix hidden security vulnerabilities like inconsistent ACLs and global access to sensitive data.

security files vulnerability automatic system infrastructure acl autopilot fix cyberattack protect data discover howto business service company profile repair gap compliant


Realtime Visibility into Global Cyber Attacks

http://www.norse-corp.com/

Saved by uncleflo on June 27th, 2017.

WE’RE AGGRESSIVE: We believe you have to be at least as aggressive and entrepreneurial as your digital adversaries in order to defeat them. Chasing the known threats is easy. It’s the unknown that’s hard. That means we can’t just react — we have to pre-empt. We have to smash the attack chain before it gets built. WE’RE LOOKING FOR TROUBLE: We believe in taking the hits so our customers don’t have to. That’s why we wander the worst neighborhoods of the Internet, looking for trouble, just asking to be attacked. That’s why we’ve built the biggest dedicated threat detection network in the world, and populated it with millions of honeypots, agents, sensors and crawlers. WE’RE NORSE: Norse is dedicated to delivering live, accurate and unique attack intelligence that helps our customers block attacks, uncover hidden breaches and track threats emerging around the globe. Norse offerings leverage a continuously updated torrent of telemetry from the world’s largest network of dedicated threat intelligence sensors. Norse is focused on dramatically improving the performance, catch-rate and return-on-investment for enterprise security infrastructures.

security vulnerability problem infrastructure solution threat aggressive digital adversary pre-emptive intelligence realtime cyber cyberattack corporation agent crawler


The Vulnerability Coordination & Bug Bounty Platform

https://www.hackerone.com/

Saved by uncleflo on June 27th, 2017.

Someone has found a potential security issue with your technology. What happens next? Making certain this discovery leads to a positive outcome for everyone involved is crucial. Replacing an antiquated security@ mailbox with the HackerOne platform brings order and control to an otherwise chaotic process. Do you have a vulnerability disclosure policy? How is it implemented? Leverage our platform to ensure that your team has control over the entire process, from initial validation, internal escalation, communication with the hacker, and the timing and messaging surrounding any coordinated disclosure. A consistent coordination process eliminates the opportunity for miscommunication and ensures positive outcomes. Gain unparalleled insight into your security posture with metrics gleaned from around-the-clock security assessments. Monitor your program's stats in real time to effortlessly stay on top of response time, stale issues, pending disclosures, and more. Your Security Development Lifecycle (SDL) will thank you.

security hacking hacker discover replace process income vulnerability crucial discovery issue potential bounty reward finance money platform hire coordination find code site leverage assessment lifecycle disclosure question technical administration


samy is my hero.

http://fast.info.nyud.net:8090/myspace/

Saved by uncleflo on January 20th, 2015.

A few months back, I decided to make a permanent myspace account so that I could easily view pictures of random girls whenever I please without creating a new account each time. I also had a number of friends on there and figured I would see what all the hype was about. Myspace is a site for keeping up with friends, meeting new people, and even getting laid (sorry ladies, I'm taken.) It allows you to set up a profile/web page with a limited ability to make it look and feel how you wanted. Too limiting. I couldn't even fit a good line into my "headline" without taking words out and sounding like G.W.B. trying to respond to an arbitrary question. Hell, I couldn't even fit more than 12 glamour shots on my photos page. Like an illegal alien with a plan, I ventured to evade these limiting borders.

myspace hack crack user web funny humor profile restrict effect people headline cool girl account question story howto security vulnerability


Special Report: U.S. cyberwar strategy stokes fear of blowback | Reuters

http://www.reuters.com/article/2013/05/10/us-usa-cyberweapons-specialreport-idUSBRE9490EL20130510

Saved by uncleflo on September 5th, 2013.

(Reuters) - Even as the U.S. government confronts rival powers over widespread Internet espionage, it has become the biggest buyer in a burgeoning gray market where hackers and security firms sell tools for breaking into computers. The strategy is spurring concern in the technology industry and intelligence community that Washington is in effect encouraging hacking and failing to disclose to software companies and customers the vulnerabilities exploited by the purchased hacks.

special report usa strategy fear blowback market hacker news story cyber warfare monitor department defence spy tool vulnerability research national security agency


None

http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=/tmp

Saved by uncleflo on August 24th, 2013.

Common Vulnerabilities and Exposures The Standard for Information Security Vulnerability Names

exposure information standard regular common name server vulnerability security linux reference


No further bookmarks found.