unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Randall Munroe’s XKCD ‘The Future of Orion’
2024-11-20 02:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
comic
handelman
humor
Unraveling Raspberry Robin's Layers: Analyzing Obfuscation Techniques and Core Mechanisms
IntroductionDiscovered in 2021, Raspberry Robin (also known as Roshtyak) is a malicious download...
2024-11-20 01:6:57 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
robin
raspberry
windows
analysis
payload
Why Shadow APIs provide a defenseless path for threat actors
In API security, one of the least visible and most dangerous issues today is the prevalence of S...
2024-11-20 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
attackers
development
DEF CON 32 – Bricked & Abandoned: How To Keep IoT From Becoming An IoTrash
Authors/Presenters: Paul Rob...
2024-11-20 00:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
roberts
permalink
7 Common Web App Security Vulnerabilities Explained
Web applications have increasingly become the backbone of many businesses, but also, unfortunate...
2024-11-19 23:54:25 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
malicious
software
database
Achieving DORA Compliance: A Guide to Meeting Key ICT Control Requirements Using CimTrak
2024-11-19 23:30:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
dora
security
cimcor
resilience
cimtrak
CISA Director Easterly to Leave When Trump Assumes Presidency
Jen Easterly, who has steered CISA for more than three years for the Biden Administration and ch...
2024-11-19 23:8:53 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
easterly
biden
trump
Assess Like Your Organization Depended On It
2024-11-19 22:41:17 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
exposures
ensuring
Enzoic Acquires VeriClouds
Enzoic and VeriClouds join fo...
2024-11-19 22:1:15 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
vericlouds
enzoic
monitoring
transition
Why shift left alone isn’t enough to manage software risk
Application security wouldn’t be what it is today without “shift left,” the concept that securit...
2024-11-19 21:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
appsec
developers
development
Cybersecurity is Everyone’s Responsibility
In today’s interconnected world, cybersecurity is not just an IT concern — it is everyone’s resp...
2024-11-19 19:49:2 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
phishing
smith
processes
Cracking the Code: Tackling the Top 5 Cloud Security Challenges
The traditional security measures that organizations have long used to protect on-premises data...
2024-11-19 19:14:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
perimeter
network
development
Unlocking the Power and Potential of GenAI in Software Development
As GenAI becomes an indispens...
2024-11-19 18:47:3 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
genai
security
development
software
developers
Open-Source Security Tools are Free… And Other Lies We Tell Ourselves
When deciding what approach to use for security tooling, it seems like there are two choices:Sel...
2024-11-19 18:39:36 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
fish
kidney
sell
fishing
Ransomware Evolution: From Triple-Quadruple Extortion to RaaS
In 1989, the first ransomware attack was recorded. It was the foundational ground that laid the...
2024-11-19 14:12:40 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
extortion
attackers
security
software
Fraud Awareness Week: How to Effectively Protect Your Data and Combat Fraudsters
Fraud Awareness Week: How to...
2024-11-19 13:28:22 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
thales
cpl
thalesgroup
encryption
Barracuda Networks Report Sees Sextortion Becoming More Personalized
A report published by Barracuda Networks warns that sextortion attacks are getting even more per...
2024-11-19 12:19:22 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
demands
sextortion
barracuda
extortion
Navigating AI Governance: Insights into ISO 42001 & NIST AI RMF
As businesses increasingly turn to artificial intelligence (AI) to enhance innovation and operat...
2024-11-19 08:7:10 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
governance
42001
ethical
ensuring
Ace AI: Generate Playbooks with Built-In Expertise Across Every Relevant Domain
We’ve assembled a dream team that is ready to go to work for our customers. The team includes:...
2024-11-19 05:42:15 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
playbooks
soar
security
playbook
d3
ASPM vs. CSPM: Key Differences
With dozens of cybersecurity...
2024-11-19 04:52:59 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
cspm
aspm
cloud
monitoring
Previous
-122
-121
-120
-119
-118
-117
-116
-115
Next