امنیت سایبری | Cyber Security
14.7K subscribers
3.34K photos
524 videos
972 files
2.73K links
Cyber Security (IT & OT)
Offensive & Defensive
Awareness/Training

Group
@IntSecGroup

Contact (Advertising)
@IntSecAdmin
Download Telegram
لیست ۴۲ #آسیب_پذیری از ۱۸ تکنولوژی که گروه‌های هکری از آن ها برای initial access استفاده می‌کنند تا باج افزارهای خود را اجرا کنند.

👁 @intsec
#ransomware
#لیست آخرین استانداردهای مرتبط با کلود و رایانش ابری

☑️ ISO/IEC 17203:2017
Information technology — Open Virtualization Format (OVF) specification

☑️ ISO/IEC 17788:2014
Information technology — Cloud computing — Overview and vocabulary

☑️ ISO/IEC 17789:2014
Information technology — Cloud computing — Reference architecture

☑️ ISO/IEC 17826:2016
Information technology — Cloud Data Management Interface (CDMI)

☑️ ISO/IEC 18384-1:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 1: Terminology and concepts for SOA

☑️ ISO/IEC 18384-2:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 2: Reference Architecture for SOA Solutions

☑️ ISO/IEC 18384-3:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 3: Service Oriented Architecture ontology

☑️ ISO/IEC 19086-1:2016
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts

☑️ ISO/IEC 19086-2:2018
Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model

☑️ ISO/IEC 19086-3:2017
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements

☑️ ISO/IEC 19086-4:2019
Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII

☑️ ISO/IEC 19941:2017
Information technology — Cloud computing — Interoperability and portability

☑️ ISO/IEC 19944:2017
Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use

☑️ ISO/IEC 19944-1:2020
Cloud computing and distributed platforms ─ Data flow, data categories and data use — Part 1: Fundamentals

☑️ ISO/IEC DIS 19944-2
Cloud computing and distributed platforms — Data flow, data categories and data use — Part 2: Guidance on application and extensibility

☑️ ISO/IEC TR 22678:2019
Information technology — Cloud computing — Guidance for policy development

☑️ ISO/IEC TS 23167:2020
Information technology — Cloud computing — Common technologies and techniques

☑️ ISO/IEC TR 23186:2018
Information technology — Cloud computing — Framework of trust for processing of multi-sourced data

☑️ ISO/IEC 27017:2015
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services

☑️ ISO/IEC 27018:2019
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

☑️ ISO/IEC 27036-1:2014
Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts

☑️ ISO/IEC 27036-2:2014
Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements

☑️ ISO/IEC 27036-3:2013
Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security

☑️ ISO/IEC 27036-4:2016
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services

☑️ ISO/IEC 27040:2015
Information technology — Security techniques — Storage security

☑️ ISO/IEC TR 30102:2012
Information technology — Distributed Application Platforms and Services (DAPS) — General technical principles of Service Oriented Architecture

👁 @intsec
#Cloud #Standard #ISO #Framework
Docker Security Essentials

A guide to #auditing and securing the Docker platform and containers
| HackerSploit 2021

👁 @intsec
#Book
HackerSploit_DockerSecurity.pdf
2 MB
Docker Security Essentials

A guide to #auditing and securing the Docker platform and containers
| HackerSploit 2021

👁 @intsec
#Book
Title: An In-Depth Guide to Mobile Device #Forensics
Year: 2021
Author(s): Chuck Easttom
Publisher: CRC Press
Language: English
Pages: 249

👁 @intsec
#CT #Book
Guide to Developing A National Cyber Security #Strategy
Strategic Engagment in Cyber Security

👁️ @intsec
#استراتژی
D-STR-CYB_GUIDE.01-2018-PDF-E.pdf
950.3 KB
Guide to Developing A National Cyber Security #Strategy
Strategic Engagment in Cyber Security

👁️ @intsec
#استراتژی
Detecting the Unknown:
A Guide to #Threat Hunting

👁️ @intsec
#فرصت_همکاری کارشناس شبکه و امنیت در شرکت تکتاکام

👁 @intsec
آيين_نامه_پيشـنهادی_نظـارت_پارلمـان_و_شـورای_اروپـا_بـر_رمزدارايی.pdf
1.6 MB
آيين‌نامه پيشنهادی نظارت پارلمان و شـورای اروپا بر رمزدارايی‌ها و اصلاحيه دستورالعمل (EU) 1937/2019 توسط مرکز ملی فضای مجازی ترجمه و منتشر شد.

👁 @intsec
(ISC)² #CISSP
Certification Exam Outline
Effective Date: May 1, 2021

👁 @intsec
CISSP-Exam-Outline-English-April-2021.pdf
425.1 KB
(ISC)² #CISSP
Certification Exam Outline
Effective Date: May 1, 2021

👁 @intsec
Web Application Pentration Testing #Checklist

👁 @intsec
ماهنامه خبری امنیت ارتباطات و فناوری اطلاعات
شرکت امن افزار گستر شریف
شهریورماه ۱۴۰۰

👁 @intsec
#مجله
خبرنامه امنیتی شهریورماه.pdf
3.2 MB
ماهنامه خبری امنیت ارتباطات و فناوری اطلاعات
شرکت امن افزار گستر شریف
شهریورماه ۱۴۰۰

👁 @intsec
#مجله
توصیه نامه #آسیب_پذیری با شناسه CVE-2021-40444
مهرماه ۱۴۰۰

👁 @intsec
#PDF #Microsoft #Office #گزارش
شماره جدید ماهنامه امنیت فناوری اطلاعات (مهر ۱۴۰۰) منتشر شد.

👁 @intsec
#مجله