'ตำรวจไซเบอร์' เตือนภัย 4 เว็บไซต์อันตราย ใช้กลอุบายพูดคุยเชิงชู้สาว ก่อนชวนให้เทรดหุ้น | เดลินิวส์ [https://www.dailynews.co.th/news/4490345/] - 2025-03-13 05:32:12 - public:stevetao Cybersecurity, Security - 2 | id:1517674 -
Packet Builder for Network Engineer - Colasoft [https://www.colasoft.com/packet_builder/] - 2025-02-26 04:12:26 - public:stevetao Cybersecurity, Network, Security, Tool - 4 | id:1517560 -
Security Engineering - A Guide to Building Dependable Distributed Systems [https://www.cl.cam.ac.uk/archive/rja14/book.html] - 2025-01-30 03:55:22 - public:stevetao Book, Cybersecurity, Free, Security - 4 | id:1514573 -
Cyber Security Body of Knowledge (CyBOK) - NCSC.GOV.UK [https://www.ncsc.gov.uk/section/education-skills/cybok] - 2025-01-24 07:50:28 - public:stevetao Body-of-Knowledge, BoK, Cybersecurity, Security - 4 | id:1514508 -
Online Bachelor’s Degree in Cyber Security | EC-Council University [https://www.eccu.edu/online-cyber-security-degrees/bachelor-of-science-in-cyber-security/] - 2025-01-24 07:42:44 - public:stevetao Course, Cybersecurity, Security, Training - 4 | id:1514506 -
10 Useful Digital Forensics Software in 2025 [https://www.salvationdata.com/knowledge/digital-forensics-software/] - 2025-01-15 10:55:54 - public:stevetao Digital, Forensics, Security, Tool - 4 | id:1513274 -
Top 7 Computer Forensics Tools for Digital Evidence Collection | Infosec [https://www.infosecinstitute.com/resources/digital-forensics/7-best-computer-forensics-tools/] - 2025-01-15 10:55:28 - public:stevetao Computer, Digital, Forensics, Security - 4 | id:1513273 -
Wordlists in Cybersecurity: RockYou 2024 Includes 10 Billion Stolen Passwords [https://www.packetlabs.net/posts/wordlists-in-cybersecurity-rockyou-2024-includes-10-billion-stolen-passwords/] - 2025-01-08 07:26:19 - public:stevetao Attack, Dictionary, Password, Security - 4 | id:1513222 -
encryption - Should we sign-then-encrypt, or encrypt-then-sign? - Cryptography Stack Exchange [https://crypto.stackexchange.com/questions/5458/should-we-sign-then-encrypt-or-encrypt-then-sign] - 2025-01-08 06:36:10 - public:stevetao Encryption, Security, Signature, Tip - 4 | id:1513221 -
Examples of Defense in Depth: The Stealth Cybersecurity Essential | Learning Tree [https://www.learningtree.com/blog/defense-in-depth-the-stealth-cybersecurity-essential/] - 2025-01-08 02:37:43 - public:stevetao Defense, Defense-in-Depth, Security - 3 | id:1513218 -
Great “Defense-in-Depth“ InfoGraphic [https://blog.knowbe4.com/great-defense-in-depth-infographic] - 2025-01-08 02:35:30 - public:stevetao Defense, Defense-in-Depth, Security - 3 | id:1513217 -
Defense-in-Depth - Essential Guide to Election Security [https://essentialguide.docs.cisecurity.org/en/latest/bp/defense_in_depth.html] - 2025-01-08 02:34:24 - public:stevetao Defense, Defense-in-Depth, Security - 3 | id:1513216 -
12 วิธีการสร้างและวิเคราะห์ Threat Modeling [https://www.cyfence.com/article/12-way-to-build-threat-modeling/] - 2025-01-08 02:32:40 - public:stevetao Model, Security, Threat - 3 | id:1513215 -
Biometric security jargon: CER, EER, FRR, FAR [https://www.johndcook.com/blog/2018/10/31/biometric-security-error/] - 2025-01-07 07:04:08 - public:stevetao Access-Control, Error, Security - 3 | id:1513199 -
Threat Modeling: 12 Available Methods [https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/] - 2025-01-06 08:38:05 - public:stevetao Model, Security, Threat - 3 | id:1513194 -
What is Cyber Threat Modeling | Importance of Threat Modeling | EC-Council [https://www.eccouncil.org/threat-modeling/] - 2025-01-06 08:34:25 - public:stevetao Model, Security, Threat - 3 | id:1513193 -
Types of Security Controls - InfosecTrain [https://www.infosectrain.com/blog/types-of-security-controls/] - 2025-01-06 08:21:51 - public:stevetao Control, Security, Security-Control, Type - 4 | id:1513192 -
SABSA Executive Summary - The SABSA Institute [https://sabsa.org/sabsa-executive-summary/] - 2025-01-06 06:26:23 - public:stevetao Architecture, EA, Enterprise-Architecture, Security - 4 | id:1513190 -
SIFT Workstation | SANS Institute [https://www.sans.org/tools/sift-workstation/] - 2024-11-21 03:03:31 - public:stevetao Analysis, Forensic, Malware, Security, Tool - 5 | id:1510400 -
Malware Analysis: Tips & Tricks Poster | SANS DFIR [https://www.sans.org/posters/malware-analysis-tips-tricks-poster/] - 2024-11-21 03:02:09 - public:stevetao Analysis, Malware, Security - 3 | id:1510398 -
How You Can Start Learning Malware Analysis | SANS Institute [https://www.sans.org/blog/how-you-can-start-learning-malware-analysis/] - 2024-11-21 03:01:13 - public:stevetao Analysis, Malware, Security - 3 | id:1510397 -
Navigating the Layers of the Internet: Unveiling the Surface, Deep, and Dark Web [https://www.insightindia.com/articles/navigating-the-layers-of-the-internet-unveiling-the-surface-deep-and-dark-web-9jt312xq.html] - 2024-11-20 04:54:59 - public:stevetao Cybersecurity, Security, Web - 3 | id:1510384 -
Windows 11 Time Rules [https://www.khyrenz.com/post/windows-11-time-rules] - 2024-11-19 03:14:09 - public:stevetao Forensic, Security, Time-Rule, Windows, Windows11 - 5 | id:1510373 -
NTFS Timestamp changes on Windows 10 · Senturean [https://www.senturean.com/posts/19_04_22_win10_ntfs_time_rules/] - 2024-11-19 03:12:21 - public:stevetao Forensic, Security, Time-Rule, Windows - 4 | id:1510372 -
Government of Sikkim, India [https://sikkim.gov.in/g20content/index] - 2024-11-18 03:11:59 - public:stevetao Cartoon, Cybersecurity, Infographic, Security - 4 | id:1510361 -
Phishing vs Pharming. How to protect yourself from online scams? [https://wisdomplexus.com/blogs/phishing-vs-pharming/] - 2024-11-06 02:32:03 - public:stevetao Cybersecurity, Pharming, Phishing, Security, Social-Engineering - 5 | id:1510281 -
Explaining the Difference Between Phishing and Pharming - Cybersecurity Solutions | Email & Network Security [https://abusix.com/blog/phishing-pharming-differences/] - 2024-11-06 02:22:07 - public:stevetao Cybersecurity, Pharming, Phishing, Security, Social-Engineering - 5 | id:1510280 -
GitHub - irobust/AdvancePenTest: Advance Penetration Test Hands-On [https://github.com/irobust/AdvancePenTest] - 2024-11-05 09:11:33 - public:stevetao Penetration, Pentest, Security, Testing, Tip - 5 | id:1509385 -
Introduction - OWASP Cheat Sheet Series [https://cheatsheetseries.owasp.org/] - 2024-11-05 02:48:23 - public:stevetao Cheat-Sheet, OWASP, Security - 3 | id:1509384 -
BuiltWith Technology Lookup [https://builtwith.com/] - 2024-11-04 07:05:50 - public:stevetao Penetration, PenTest, Security, Testing - 4 | id:1509377 -
OWASP IoT Security Verification Standard | OWASP Foundation [https://owasp.org/www-project-iot-security-verification-standard/] - 2024-11-04 06:36:13 - public:stevetao Internet-of-thing, IoT, OWASP, Security, Standard, Verification - 6 | id:1509375 -
OWASP MASVS - OWASP Mobile Application Security [https://mas.owasp.org/MASVS/] - 2024-11-04 06:35:40 - public:stevetao Mobile, OWASP, Security, Standard, Verification - 5 | id:1509374 -
OWASP Application Security Verification Standard (ASVS) | OWASP Foundation [https://owasp.org/www-project-application-security-verification-standard/] - 2024-11-04 06:34:49 - public:stevetao OWASP, Security, Software-Verification, Standard - 4 | id:1509373 -
ATT&CK® Navigator [https://mitre-attack.github.io/attack-navigator/] - 2024-11-04 03:54:48 - public:stevetao Guideline, Penetration, PenTest, Security, Testing - 5 | id:1509371 -
D3FEND Matrix | MITRE D3FEND™ [https://d3fend.mitre.org/] - 2024-11-04 03:23:35 - public:stevetao Guideline, Penetration, PenTest, Security, Testing - 5 | id:1509370 -
MITRE ATT&CK® [https://attack.mitre.org/] - 2024-11-04 03:22:50 - public:stevetao Guideline, Penetration, PenTest, Security, Testing - 5 | id:1509369 -
The Penetration Testing Execution Standard [http://www.pentest-standard.org/index.php/Main_Page] - 2024-11-04 03:19:36 - public:stevetao Guideline, Penetration, PenTest, Security, Testing - 5 | id:1509368 -
OWASP Web Security Testing Guide | OWASP Foundation [https://owasp.org/www-project-web-security-testing-guide/] - 2024-11-04 03:12:15 - public:stevetao Guideline, Security, Testing - 3 | id:1509367 -
VirusTotal [https://www.virustotal.com/gui/] - 2024-10-08 04:08:42 - public:stevetao Computer, Malware, Security - 3 | id:1506867 -
CIC Honeynet [https://www.honeynetproject.com/] - 2024-10-07 05:56:22 - public:stevetao Computer, Cybersecurity, Honeypot, Security - 4 | id:1506850 -
OWASP Web Security Testing Guide | OWASP Foundation [https://owasp.org/www-project-web-security-testing-guide/] - 2024-10-02 03:10:51 - public:stevetao OWASP, Security, Software-Testing, Testing, Web - 5 | id:1502069 -
INE Security - INE Security [https://security.ine.com/] - 2024-09-30 07:29:45 - public:stevetao Certification, Security - 2 | id:1497756 -
Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers [https://www.exploit-db.com/] - 2024-09-30 07:24:46 - public:stevetao Cybersecurity, Database, Security - 3 | id:1497755 -
Security Certification Roadmap - Paul Jerimy Media [https://pauljerimy.com/security-certification-roadmap/] - 2024-09-30 02:47:11 - public:stevetao Certification, Cybersecurity, Roadmap, Security - 4 | id:1497754 -
3S กับโครงการ OAP Award | วิฑูรย์ สิมะโชคดี [https://www.bangkokbiznews.com/health/labour/1066692] - 2024-04-23 10:52:30 - public:stevetao 3S, Safeguard, Safety, Security - 4 | id:1491043 -
กรอบการทำงานของ 22 หน่วยงานภายใต้กระทรวงเกษตรและสหกรณ์ ขับเคลื่อนร่วมกัน “3S” คือ “Safety“ ความปลอดภัยของอาหาร “Security“ ความมั่นคง มั่งคั่ง ของภาคการเกษตรและอาหาร และ “Sustainability“ ความยั่งยืนของภาคการเกษตร วันที่ 30 กันยายน 2563 การเกษตรต่างประเทศ [https://www.moac.go.th/foreignagri-news-preview-422791792930] - 2024-04-23 10:50:41 - public:stevetao 3S, Safety, Security, Sustainability - 4 | id:1491041 -
Essential Eight Maturity Model | Cyber.gov.au [https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model] - 2024-01-01 12:30:25 - public:stevetao Maturity, Model, Security - 3 | id:1488995 -
Communicate Better with the Organizational Security Maturity Model [https://fractionalciso.com/communicate-better-with-the-organizational-security-maturity-model/] - 2023-05-27 06:48:17 - public:stevetao Cybersecurity, Maturity, Model, Security - 4 | id:1420517 -
NIST CSF – Cyber Oak Solutions [https://cyberoaksolutions.com/nist-csf/] - 2023-05-27 06:47:10 - public:stevetao Cybersecurity, Model, NIST-CSF, Security - 4 | id:1420516 -
Level Setting Supplier Cybersecurity Maturity | Motional [https://motional.com/news/level-setting-supplier-cybersecurity-maturity] - 2023-05-27 06:44:29 - public:stevetao CMMI, Cybersecurity, Maturity, Model, Security - 5 | id:1420515 -