Publication content 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 9 article(s) - 2012 Twenty critical security controls for effective cyber-defense November 29, 2012 Voir l’article Fighting rootkits on Windows 64-bit platforms October 30, 2012 Voir l’article Report for the SSTIC 2012 conference (Part 2) September 28, 2012 Voir l’article Report for the SSTIC 2012 conference (Part 1) September 6, 2012 Voir l’article A Trojan uses Sendspace to store stolen documents June 1, 2012 Voir l’article Adobe Reader X: is the sandbox feature effective? May 3, 2012 Voir l’article JSSI 2012 conference overview March 30, 2012 Voir l’article RSA recommendations about APT attacks March 1, 2012 Voir l’article Cyber-attack: the Stratfor case February 8, 2012 Voir l’article
Publication content 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 9 article(s) - 2012 Twenty critical security controls for effective cyber-defense November 29, 2012 Voir l’article Fighting rootkits on Windows 64-bit platforms October 30, 2012 Voir l’article Report for the SSTIC 2012 conference (Part 2) September 28, 2012 Voir l’article Report for the SSTIC 2012 conference (Part 1) September 6, 2012 Voir l’article A Trojan uses Sendspace to store stolen documents June 1, 2012 Voir l’article Adobe Reader X: is the sandbox feature effective? May 3, 2012 Voir l’article JSSI 2012 conference overview March 30, 2012 Voir l’article RSA recommendations about APT attacks March 1, 2012 Voir l’article Cyber-attack: the Stratfor case February 8, 2012 Voir l’article