unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
5-Star Fraud: The FTC’s Ban on Fake Reviews
What HappenedIn August 2024, the United States Federal Trade Commission (FTC) took a decisive s...
2024-11-20 06:11:40 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
reviews
ftc
bots
kasada
consumers
Imperva and the Secure by Design Pledge: A Commitment to Cybersecurity Excellence
The Cybersecurity and Infrastructure Security Agency (CISA) has introduced a voluntary “Secure b...
2024-11-20 05:45:22 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
imperva
pledge
passwords
EPA IG Office: ‘High-Risk’ Security Flaws in Hundreds of Water Systems
More than 300 drinking water systems in the United States that serve almost 110 million people h...
2024-11-20 05:15:39 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
water
security
drinking
epa
Randall Munroe’s XKCD ‘The Future of Orion’
2024-11-20 02:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
comic
handelman
humor
Unraveling Raspberry Robin's Layers: Analyzing Obfuscation Techniques and Core Mechanisms
IntroductionDiscovered in 2021, Raspberry Robin (also known as Roshtyak) is a malicious download...
2024-11-20 01:6:57 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
robin
raspberry
windows
analysis
payload
Why Shadow APIs provide a defenseless path for threat actors
In API security, one of the least visible and most dangerous issues today is the prevalence of S...
2024-11-20 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
attackers
development
Ransomware is doubling down—What you need to know about the recent surge
You might have heard of r...
2024-11-20 00:49:43 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
bloggers
q2
momentum
doubling
Adware on the rise—Why your phone isn’t as safe as you think
Picture this: you downloa...
2024-11-20 00:49:2 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
harmless
cleaner
bombarded
network
syndicated
DEF CON 32 – Bricked & Abandoned: How To Keep IoT From Becoming An IoTrash
Authors/Presenters: Paul Rob...
2024-11-20 00:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
roberts
permalink
7 Common Web App Security Vulnerabilities Explained
Web applications have increasingly become the backbone of many businesses, but also, unfortunate...
2024-11-19 23:54:25 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
malicious
software
database
State of SIEM Detection Risk: A Wake-Up Call for Enterprise Security Teams
Joe Ariganello VP of Product...
2024-11-19 23:31:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
mixmode
threats
processes
joe
Achieving DORA Compliance: A Guide to Meeting Key ICT Control Requirements Using CimTrak
The Digital Operational R...
2024-11-19 23:30:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
dora
security
cimcor
resilience
cimtrak
CISA Director Easterly to Leave When Trump Assumes Presidency
Jen Easterly, who has steered CISA for more than three years for the Biden Administration and ch...
2024-11-19 23:8:53 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
easterly
biden
trump
Assess Like Your Organization Depended On It
Introduction Without an accurate understanding of vulnerabilities, misconfigurations, and expos...
2024-11-19 22:41:17 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
exposures
ensuring
Enzoic Acquires VeriClouds
Enzoic and VeriClouds join fo...
2024-11-19 22:1:15 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
vericlouds
enzoic
monitoring
transition
Why shift left alone isn’t enough to manage software risk
Application security wouldn’t be what it is today without “shift left,” the concept that securit...
2024-11-19 21:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
appsec
developers
development
Cybersecurity is Everyone’s Responsibility
In today’s interconnected world, cybersecurity is not just an IT concern — it is everyone’s resp...
2024-11-19 19:49:2 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
phishing
smith
processes
Cracking the Code: Tackling the Top 5 Cloud Security Challenges
The traditional security measures that organizations have long used to protect on-premises data...
2024-11-19 19:14:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
perimeter
network
development
Unlocking the Power and Potential of GenAI in Software Development
As GenAI becomes an indispens...
2024-11-19 18:47:3 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
genai
security
development
software
developers
Open-Source Security Tools are Free… And Other Lies We Tell Ourselves
When deciding what approach to use for security tooling, it seems like there are two choices:Sel...
2024-11-19 18:39:36 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
fish
kidney
sell
fishing
Previous
-125
-124
-123
-122
-121
-120
-119
-118
Next