Help
RSS
API
Feed
Maltego
Contact
Domain > www.taosecurity.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2020-09-18
52.85.121.24
(
ClassC
)
2024-10-02
18.161.6.88
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Wed, 02 Oct 2024 07:07:32 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://www.taosecurity.com/X-Cache: Redirect from cloudfrontVia: 1.1 4e4278a2778e72cc34feef6db603088c.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P1X-Amz-Cf-Id: QHFUYqZ9p1t3-Ab-Hf0W5ne2eRuyfNM7psI4enJ0B5qhgChP2b37ow html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 31822Connection: keep-aliveLast-Modified: Wed, 08 Feb 2023 18:23:08 GMTx-amz-server-side-encryption: AES256x-amz-version-id: ZxJwx9PuPnTBoRYuktiIegBdEgbSa6w4Accept-Ranges: bytesServer: AmazonS3Date: Tue, 01 Oct 2024 12:37:36 GMTETag: 194a971fd5ee7331f03a86aa7769a79cVary: Accept-EncodingX-Cache: Hit from cloudfrontVia: 1.1 288c777a01e22425da9494dad7a69734.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P1X-Amz-Cf-Id: fB5Gtd9TKTx_TsNG5EzUql8G3N3PFuFNVZfErOf0E4VgLdR9UExMXgAge: 66597 !DOCTYPE html>html >head> !-- Site made with Mobirise Website Builder v5.6.13, https://mobirise.com --> meta charsetUTF-8> meta http-equivX-UA-Compatible contentIEedge> meta namegenerator contentMobirise v5.6.13, mobirise.com> meta nametwitter:card contentsummary_large_image/> meta nametwitter:image:src content> meta propertyog:image content> meta nametwitter:title contentTaoSecurity> meta nameviewport contentwidthdevice-width, initial-scale1, minimum-scale1> link relshortcut icon hrefassets/images/favicon.ico typeimage/x-icon> meta namedescription contentTaoSecurity is the home of Richard Bejtlich, focused on network security monitoring and digital security.> title>TaoSecurity/title> link relstylesheet hrefassets/web/assets/mobirise-icons/mobirise-icons.css> link relstylesheet hrefassets/bootstrap/css/bootstrap.min.css> link relstylesheet hrefassets/bootstrap/css/bootstrap-grid.min.css> link relstylesheet hrefassets/bootstrap/css/bootstrap-reboot.min.css> link relstylesheet hrefassets/tether/tether.min.css> link relstylesheet hrefassets/dropdown/css/style.css> link relstylesheet hrefassets/socicon/css/styles.css> link relstylesheet hrefassets/theme/css/style.css> link relpreload hrefhttps://fonts.googleapis.com/css?familyRubik:300,300i,400,400i,500,500i,700,700i,900,900i&displayswap asstyle onloadthis.onloadnull;this.relstylesheet> noscript>link relstylesheet hrefhttps://fonts.googleapis.com/css?familyRubik:300,300i,400,400i,500,500i,700,700i,900,900i&displayswap>/noscript> link relpreload asstyle hrefassets/mobirise/css/mbr-additional.css>link relstylesheet hrefassets/mobirise/css/mbr-additional.css typetext/css> /head>body> section classmenu cid-ruT9ZFu2r1 oncemenu idmenu2-1> nav classnavbar navbar-expand beta-menu navbar-dropdown align-items-center navbar-fixed-top navbar-toggleable-sm> button classnavbar-toggler navbar-toggler-right typebutton data-togglecollapse data-target#navbarSupportedContent aria-controlsnavbarSupportedContent aria-expandedfalse aria-labelToggle navigation> div classhamburger> span>/span> span>/span> span>/span> span>/span> /div> /button> div classmenu-logo> div classnavbar-brand> span classnavbar-logo> a hrefhttps://www.taosecurity.com> img srcassets/images/taosecurity-r-small.jpg altMobirise title styleheight: 3.8rem;> /a> /span> span classnavbar-caption-wrap>a classnavbar-caption text-black display-7 hrefhttps://www.taosecurity.com> KNOW YOUR NETWORK br>BEFORE AN INTRUDER DOES. ®/a>/span> /div> /div> div classcollapse navbar-collapse idnavbarSupportedContent> ul classnavbar-nav nav-dropdown nav-right data-app-modern-menutrue>li classnav-item> a classnav-link link text-black display-7 hrefhttps://taosecurity.blogspot.com target_blank>TaoSecurity Blog/a> /li> li classnav-item>a classnav-link link text-black text-primary display-7 hrefhttps://infosec.exchange/@taosecurity target_blank>Mastodon/a>/li>li classnav-item>a classnav-link link text-black display-7 hrefhttps://www.linkedin.com/in/richardbejtlich target_blank>LinkedIn/a>/li>li classnav-item>a classnav-link link text-black display-7 hrefindex.html#content9-2> Books/a>/li>li classnav-item>a classnav-link link text-black display-7 hrefhttps://tinyurl.com/bejvideo target_blank> Videos/a>/li>/ul> /div> /nav>/section>section classcid-ruPG347BeZ mbr-fullscreen mbr-parallax-background idheader2-0> div classmbr-overlay styleopacity: 0.7; background-color: rgb(35, 35, 35);>/div> div classcontainer align-center> div classrow justify-content-md-center> div classmbr-white col-md-10> h1 classmbr-section-title mbr-bold pb-3 mbr-fonts-style display-2>span stylefont-weight: normal;>TaoSecurity/span>/h1> p classmbr-text pb-3 mbr-fonts-style display-5>Since 1998 Richard Bejtlich has defended Western interests from intruders. Mr. Bejtlich promotes Network Security Monitoring solutions to help global organizations stay in business by detecting and responding to digital threats. Visit a hrefhttps://taosecurity.blogspot.com target_blank>TaoSecurity Blog/a> or follow a hrefhttps://infosec.exchange/@taosecurity target_blank classtext-primary>@taosecurity/a> for the latest news./p> div classmbr-section-btn>a classbtn btn-md btn-primary display-4 hrefindex.html#content9-2>LEARN MORE/a>/div> /div> /div> /div> div classmbr-arrow hidden-sm-down aria-hiddentrue> a href#next> i classmbri-down mbr-iconfont>/i> /a> /div>/section>section classmbr-section article content9 cid-ruTbtKw1zl idcontent9-2> div classcontainer> div classinner-container stylewidth: 79%;> hr classline stylewidth: 47%;> div classsection-text align-center mbr-fonts-style display-5> Since 2004, Mr. Bejtlich has authored or co-authored nine books, and contributed to seven others. His a hrefhttps://www.amazon.com/-/e/B001IR3KOW target_blank>Amazon Author Page/a> has more details./div> hr classline stylewidth: 47%;> /div> /div>/section>section classcarousel slide cid-s9lq8wPtDM data-intervalfalse idslider2-9> div classcontainer content-slider> div classcontent-slider-wrap> div>div classmbr-slider slide carousel data-keyboardfalse data-bs-keyboardfalse data-ridecarousel data-bs-ridecarousel data-interval4000 data-bs-interval4000 data-bs-pausehover data-pausehover>ol classcarousel-indicators>li data-app-prevent-settings data-target#slider2-9 data-bs-target#slider2-9 data-slide-to0 data-bs-slide-to0>/li>li data-app-prevent-settings data-target#slider2-9 data-bs-target#slider2-9 data-slide-to1 data-bs-slide-to1>/li>li data-app-prevent-settings data-target#slider2-9 data-bs-target#slider2-9 class active data-slide-to2 data-bs-slide-to2>/li>li data-app-prevent-settings data-target#slider2-9 data-bs-target#slider2-9 data-slide-to3 data-bs-slide-to3>/li>/ol>div classcarousel-inner rolelistbox>div classcarousel-item slider-fullscreen-image data-bg-video-slidefalse stylebackground-image: url(assets/images/the-best-of-taosecurity-blog-volume-1.png);>div classcontainer container-slide>div classimage_wrapper>img srcassets/images/the-best-of-taosecurity-blog-volume-1.png altThe Best of TaoSecurity Blog, Volume 1 titleThe Best of TaoSecurity Blog, Volume 1>div classcarousel-caption justify-content-center>div classcol-10 align-center>/div>/div>/div>/div>/div>div classcarousel-item slider-fullscreen-image data-bg-video-slidefalse stylebackground-image: url(assets/images/the-best-of-taosecurity-blog-volume-2.png);>div classcontainer container-slide>div classimage_wrapper>img srcassets/images/the-best-of-taosecurity-blog-volume-2.png altThe Best of TaoSecurity Blog, Volume 2 titleThe Best of TaoSecurity Blog, Volume 2>div classcarousel-caption justify-content-center>div classcol-10 align-center>/div>/div>/div>/div>/div>div classcarousel-item slider-fullscreen-image active data-bg-video-slidefalse stylebackground-image: url(assets/images/the-best-of-taosecurity-blog-volume-3-1410x2250.png);>div classcontainer container-slide>div classimage_wrapper>img srcassets/images/the-best-of-taosecurity-blog-volume-3-1410x2250.png altThe Best of TaoSecurity Blog, Volume 3 titleThe Best of TaoSecurity Blog, Volume 3>div classcarousel-caption justify-content-center>div classcol-10 align-center>/div>/div>/div>/div>/div>div classcarousel-item slider-fullscreen-image data-bg-video-slidefalse stylebackground-image: url(assets/images/the-best-of-taosecurity-blog-volume-4-1410x2250.png);>div classcontainer container-slide>div classimage_wrapper>img srcassets/images/the-best-of-taosecurity-blog-volume-4-1410x2250.png altThe Best of TaoSecurity Blog, Volume 3 titleThe Best of TaoSecurity Blog, Volume 3>div classcarousel-caption justify-content-center>div classcol-10 align-center>/div>/div>/div>/div>/div>/div>a data-app-prevent-settings classcarousel-control carousel-control-prev rolebutton data-slideprev data-bs-slideprev href#slider2-9>span aria-hiddentrue classmbri-left mbr-iconfont>/span>span classsr-only visually-hidden>Previous/span>/a>a data-app-prevent-settings classcarousel-control carousel-control-next rolebutton data-slidenext data-bs-slidenext href#slider2-9>span aria-hiddentrue classmbri-right mbr-iconfont>/span>span classsr-only visually-hidden>Next/span>/a>/div>/div> /div> /div>/section>section classmbr-section article content10 cid-s9locmuJFj idcontent10-7> div classcontainer> div classinner-container stylewidth: 95%;> hr classline stylewidth: 25%;> div classsection-text align-center mbr-white mbr-fonts-style display-7>p> Mr. Bejtlichs newest books are a hrefhttps://amzn.to/2YROn3i target_blank>The Best of TaoSecurity Blog, Volume 1: Milestones, Philosophy and Strategy, Risk, and Advice/a>, a hrefhttps://amzn.to/3lARczz target_blank>The Best of TaoSecurity Blog, Volume 2: /a>span stylefont-size: 1rem;>a hrefhttps://amzn.to/3lARczz target_blank>Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent Threat/a>, a hrefhttps://amzn.to/2GBGuZZ target_blank>The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices/a>, and a hrefhttps://amzn.to/3mFnIlb target_blank>The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship/a>./span>/p>p>span stylefont-size: 1rem;>br>/span>span stylefont-size: 1rem;>Since 2003, cybersecurity author Richard Bejtlich has been writing posts on /span>a hrefhttps://taosecurity.blogspot.com target_blank stylefont-size: 1rem; background-color: rgb(46, 46, 46);>TaoSecurity Blog/a>span stylefont-size: 1rem;>, a site with 18 million views since 2011. Now, after re-reading over 3,000 posts and approximately one million words, he has selected and republished the very best entries from 17 years of writing./span>/p>p>span stylefont-size: 1rem;>br>/span>span stylefont-size: 1rem;>In the a hrefhttps://amzn.to/3lBm1UM target_blank>first volume/a>, Mr. Bejtlich shares his thoughts on leadership, the intruders dilemma, managing burnout, controls versus assessments, insider versus outsider threats, security return on investment, threats versus vulnerabilities, controls and compliance, the post that got him hired at a Fortune 5 company as their first director of incident response, and much more./span>/p>p>span stylefont-size: 1rem;>br>/span>span stylefont-size: 1rem;>In the a hrefhttps://amzn.to/34YcQaN target_blank>second volume/a>, Mr. Bejtlich addresses how to detect and respond to intrusions using third party threat intelligence sources, network data, application and infrastructure data, and endpoint data. He assesses government and private security initiatives and applies counterintelligence and counteradversary mindsets to defend digital assets. He documents the events of the last 20 years of Chinese hacking from the perspective of a defender on the front lines, in the pre- and post-APT era./span>/p>br>p>span stylefont-size: 1rem;>In the a hrefhttps://amzn.to/2GBGuZZ target_blank>third volume/a>, Mr. Bejtlich addresses the evolution of his security mindset, influenced by current events and advice from his so-called set of wise people. He talks about why speed is not the key to John Boyds OODA loop, and why security strategies designed for and by the security 1% may be irrelevant at best, or harmful at worst, for the remaining 99%. /span>/p>br>p>span stylefont-size: 1rem;>In the a hrefhttps://amzn.to/3mFnIlb target_blank>fourth volume/a>, Mr. Bejtlich collects material that has not been published elsewhere, including articles that are no longer available or are stored in assorted digital or physical archives. Highlights include Congressional testimony, his very first articles on network security, and material never previously published from his abandoned war studies PhD program at Kings College London./span>/p>br>p>span stylefont-size: 1rem;>He has written new commentaries to accompany each post, some of which would qualify as blog entries in their own right. Read how the security industry, defensive methodologies, and strategies to improve national security have evolved in these new books, written by one of the authors who has seen it all and survived to blog about it./span>/p>/div> hr classline stylewidth: 25%;> /div> /div>/section>section classfeatures17 cid-ruPRoKqUHy idfeatures17-d> div classcontainer-fluid> div classmedia-container-row> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://amzn.to/2LpNhpL target_blank>img srcassets/images/cover-ryg-432x570.jpg altReach Your Goal Book Cover titleReach Your Goal>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7> Reach Your Goal/h4> p classmbr-text mbr-fonts-style display-7> My book on stretching, available in a a hrefhttps://www.blurb.com/b/9204875-reach-your-goal-collector-s-edition target_blank>color-photo Collectors Edition/a>, or a a hrefhttps://amzn.to/2LpNhpL target_blank>black-and-white-photo Amazon Edition/a>. /p> /div> /div> /div> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://amzn.to/2RLM5hn target_blank>img srcassets/images/cover-pnsm-432x570.png altMobirise title>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7> The Practice of Network Security Monitoring/h4> p classmbr-text mbr-fonts-style display-7> My latest book on NSM, published by No Starch (use code NSM101 to save 30% when a hrefhttps://nostarch.com/nsm target_blank>buying from the publisher/a>). /p> /div> /div> /div> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://amzn.to/2XfBeCH target_blank>img srcassets/images/cover-tao-432x570.jpg altThe Tao of Network Security Monitoring Book Cover titleThe Tao of Network Security Monitoring>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7>The Tao of Network Security Monitoring/h4> p classmbr-text mbr-fonts-style display-7> My breakthrough book on NSM, published by a hrefhttps://www.informit.com/store/tao-of-network-security-monitoring-beyond-intrusion-9780321246776 target_blank>Addison-Wesley/a>. /p> /div> /div> /div> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://amzn.to/2RNX1eK>img srcassets/images/cover-ed-432x570.jpg altExtrusion Detection Book Cover titleExtrusion Detection>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7> Extrusion Detection/h4> p classmbr-text mbr-fonts-style display-7> My pioneering book on detecting intrusions by watching outbound traffic, published by a hrefhttps://www.informit.com/store/extrusion-detection-security-monitoring-for-internal-9780321349965 target_blank>Addison-Wesley/a>./p> /div> /div> /div> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://amzn.to/2Nnh1pW target_blank>img srcassets/images/cover-rdf-432x570.jpg altReal Digital Forensics Book Cover titleReal Digital Forensics>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7> Real Digital Forensics/h4> p classmbr-text mbr-fonts-style display-7> My book on investigating intrusions, co-authored with Keith Jones and Curtis Rose, published by a hrefhttps://www.informit.com/store/real-digital-forensics-computer-security-and-incident-9780321240699 target_blank>Addison-Wesley/a>./p> /div> /div> /div> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://amzn.to/2Xhu6pe target_blank>img srcassets/images/cover-so-387x499.jpg altSecurity Onion Documentation Book Cover titleSecurity Onion Documentation>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7>Security Onion Documentation/h4> p classmbr-text mbr-fonts-style display-7> I wrote the foreword to the printed version of the Security Onion documentation book./p> /div> /div> /div> /div> /div>/section>section classfeatures17 cid-ruQ6IgWX5p idfeatures17-n> div classcontainer-fluid> div classmedia-container-row> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://stratcomcoe.org/centre-contributes-new-book-cyber-war-perspective-russian-aggression-against-ukraine target_blank>img srcassets/images/cover-cwp-500x660.jpg altCyber War in Perspective Book Cover titleCyber War in Perspective>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7> Cyber War in Perspective/h4> p classmbr-text mbr-fonts-style display-7> I wrote chapter 18, a case study which examines the Ukraine crisis between 2013-2015, demonstrating that cyber attacks have been used in a broader strategy of information warfare. The entire book, edited by Kenneth Geers, is available a hrefhttps://web.archive.org/web/20190630155747/https://ccdcoe.org/uploads/2018/10/CyberWarinPerspective_full_book.pdf target_blank>online/a> and was a hrefhttps://stratcomcoe.org/centre-contributes-new-book-cyber-war-perspective-russian-aggression-against-ukraine target_blank>published by the CCDCOE/a>. /p> /div> /div> /div> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://amzn.to/2XDS0um target_blank>img srcassets/images/cover-pma-500x660.png altPractical Malware Analysis Book Cover titlePractical Malware Analysis>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7> Practical Malware Analysis/h4> p classmbr-text mbr-fonts-style display-7> I wrote the foreword for this ground-breaking book by Michael Sikorski and Andrew Honig, published by a hrefhttps://nostarch.com/malware target_blank>No Starch/a>. /p> /div> /div> /div> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://amzn.to/2JcNHgo target_blank>img srcassets/images/cover-lf-500x660.jpg altLinux Firewalls Book Cover titleLinux Firewalls>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7> Linux Firewalls/h4> p classmbr-text mbr-fonts-style display-7> I wrote the foreword for this innovative book by Michael Rash, published by a hrefhttps://nostarch.com/firewalls.htm target_blank>No Starch/a>. /p> /div> /div> /div> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://amzn.to/2IY0og5 target_blank>img srcassets/images/cover-ir2-500x660.jpg altIncident Response and Computer Forensics Second Edition Book Cover titleIncident Response and Computer Forensics Second Edition>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7>Incident Response and Computer Forensics Second Edition/h4> p classmbr-text mbr-fonts-style display-7> I contributed the material for chapter 8 (Collecting Network-Based Evidence) and chapter 14 (Analyzing Network Traffic) in the second edition of this book by Kevin Mandia, Chris Prosise, and Matt Pepe. I recommend buying the newer third edition, by Jason Luttgens, Matt Pepe, and Kevin Mandia, published by a hrefhttps://www.mheducation.com/highered/product/incident-response-computer-forensics-third-edition-luttgens-pepe/9780071798686.html target_blank>McGraw-Hill/a>. /p> /div> /div> /div> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://amzn.to/2XjF3qf target_blank>img srcassets/images/cover-he4-500x660.png altHacking Exposed Fourth Edition Book Cover titleHacking Exposed Fourth Edition>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7> Hacking Exposed Fourth Edition/h4> p classmbr-text mbr-fonts-style display-7> I contributed Case Study: Network Security Monitoring to the fourth edition of this book by Stuart McClure, Joel Scambray, and George Kurtz. It contained the first discussion of NSM in a book, aside from the academic papers by NSM inventor Todd Heberlein. I recommend buying the newer seventh edition, published by a hrefhttps://www.mheducation.com/highered/product/hacking-exposed-7-mcclure-scambray/9780071780285.html target_blank>McGraw-Hill/a>. /p> /div> /div> /div> div classcard p-3 col-12 col-md-6 col-lg-2> div classcard-wrapper> div classcard-img> a hrefhttps://www.threathunting.net/reading-list target_blank>img srcassets/images/huntpedia-resized.jpg altAmerican Ulysses Book Cover titleAmerican Ulysses>/a> /div> div classcard-box> h4 classcard-title pb-3 mbr-fonts-style display-7> Huntpedia/h4> p classmbr-text mbr-fonts-style display-7>I contributed the foreword for this collection of essays published by Sqrrl, prior to their acquisition by Amazon. David Bianco hosts a copy at a hrefhttps://www.threathunting.net/files/huntpedia.pdf target_blank>ThreatHunting.net/a>. My last name is spelled correctly on the cover and in my signature, but not elsewhere./p> /div> /div> /div> /div> /div>/section>section oncefooters classcid-ruTvcdsrhZ idfooter7-4> div classcontainer> div classmedia-container-row align-center mbr-white> div classrow row-links> ul classfoot-menu> li classfoot-menu-item mbr-fonts-style display-7>a href#top>Home/a>/li>/ul> /div> div classrow social-row> div classsocial-list align-right pb-2> div classsoc-item> a hrefhttps://infosec.exchange/@taosecurity target_blank> span classmbr-iconfont mbr-iconfont-social socicon-mastodon socicon>/span> /a> /div>div classsoc-item> a hrefhttp://tinyurl.com/bejvideo target_blank> span classmbr-iconfont mbr-iconfont-social socicon-youtube socicon>/span> /a> /div>div classsoc-item> a hrefhttps://www.linkedin.com/in/richardbejtlich target_blank> span classmbr-iconfont mbr-iconfont-social socicon-linkedin socicon>/span> /a> /div>div classsoc-item> a hrefhttps://taosecurity.blogspot.com target_blank> span classmbr-iconfont mbr-iconfont-social socicon-blogger socicon>/span> /a> /div>div classsoc-item> a hrefhttp://www.amazon.com/-/e/B001IR3KOW target_blank> span classmbr-iconfont mbr-iconfont-social socicon-amazon socicon>/span> /a> /div>div classsoc-item> a hrefhttp://instagram.com/taosecurity target_blank> span classmbr-iconfont mbr-iconfont-social socicon-instagram socicon>/span> /a> /div>div classsoc-item> a hrefhttps://github.com/taosecurity target_blank> span classmbr-iconfont mbr-iconfont-social socicon-github socicon>/span> /a> /div>div classsoc-item> a hrefhttps://brookings.academia.edu/RichardBejtlich target_blank> span classmbr-iconfont mbr-iconfont-social socicon-amplement socicon>/span> /a> /div>div classsoc-item> a hrefhttps://scholar.google.com/citations?userE3e83moAAAAJ&hlen target_blank> span classmbr-iconfont mbr-iconfont-social socicon-google-scholar socicon>/span> /a> /div>/div> /div> div classrow row-copirayt> p classmbr-text mb-0 mbr-fonts-style mbr-white align-center display-7> © Copyright 2000-2023 TaoSecurity - All Rights Reserved - As an Amazon Associate I earn from qualifying purchases.br>/p> /div> /div> /div>/section>section classdisplay-7 stylepadding: 0;align-items: center;justify-content: center;flex-wrap: wrap; align-content: center;display: flex;position: relative;height: 4rem;>a hrefhttps://mobiri.se/1390313 styleflex: 1 1;height: 4rem;position: absolute;width: 100%;z-index: 1;>img alt styleheight: 4rem; srcdata:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw>/a>p stylemargin: 0;text-align: center; classdisplay-7>Created with /p>a stylez-index:1 hrefhttps://mobirise.com/offline-website-builder.html>Offline Website Software/a>/section>script srcassets/popper/popper.min.js>/script> script srcassets/web/assets/jquery/jquery.min.js>/script> script srcassets/bootstrap/js/bootstrap.min.js>/script> script srcassets/tether/tether.min.js>/script> script srcassets/smoothscroll/smooth-scroll.js>/script> script srcassets/parallax/jarallax.min.js>/script> script srcassets/ytplayer/jquery.mb.ytplayer.min.js>/script> script srcassets/vimeoplayer/jquery.mb.vimeo_player.js>/script> script srcassets/bootstrapcarouselswipe/bootstrap-carousel-swipe.js>/script> script srcassets/dropdown/js/nav-dropdown.js>/script> script srcassets/dropdown/js/navbar-dropdown.js>/script> script srcassets/touchswipe/jquery.touch-swipe.min.js>/script> script srcassets/theme/js/script.js>/script> script srcassets/slidervideo/script.js>/script> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]