heystack

Discover the best public
Google docs

Find docs created by community members like you.
Give feedback, collaborate and create your own.
  1. Home
  2. /
  3. Security
Best documents
Hot documents
New documents
Hall of fame

Security - 🟧Heystack

Attacking Secondary Contexts in Web Applications

security, software, web applications, JavaScript

Security considerations when using modern routing technologies for web servers by Sam Curry

Ransomware Overview

ransomware, security, software, data

Spreadsheet listing all known as well as unidentified ransomwhare plus detection and prevention guides.

Polynetwork and Hacker Communicate

cryptocurrency, finance, programming, crypto, hack, DAO, security, defi

On the 10th of August 2021, the decentralized finance (defi) project Poly Network suffered a loss of over $600 million in various tokens due to smart contract bug. Exploiter has communicated with Poly team via blockchain messages and returned some of the funds. This sheets keeps track of the communication and the transfers.

APT Groups and Operations

security, programming, cybersecurity, vulnerability, hacking

Cyber security companies and Antivirus vendors use different names for the same threat actors and often refer to the reports and group names of each other. However, it is a difficult task to keep track of the different names and naming schemes. I wanted to create a reference that answers questions like "I read a report about the 'Tsar Team', is there another name for that group?" or "Attackers used 'China Chopper' webshell, which of the APT groups did use that shell too?" or "Did he just say 'NetTraveler'? So, does he talk about Chinese or Russian attackers?"

Bsides Ahmedabad - Dark side of DeFi

crypto, DeFi, security

A presentation about smart contract miss-use and how to protect yourself in this space.

Digital Communications Protocols

chat, security, list, privacy

Information about features, functions and other data of all sorts of communication platforms (chat, etc.)

Crypto Best Security Practices ⚠️

cryptocurrency, crypto, security, infosec, NFT, wallets

Now that the NFT bull run is back it's important to make sure your assets are secure. Here is a 17 page document that covers the basics. Thought this might save a life or two. Enjoy and stay safe, friends!

Graded Cyber Policy Papers

cyber, politics, security, infosec

A collection of studies about cyber security in military and civilian context.