unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Fortinet Adds Data Loss Prevention Capability Following Acquistion of Next DLP
Fortinet has added a data loss prevention (DLP) platform to its portfolio that is based on the t...
2024-11-6 01:16:41 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
fortidlp
shah
workflows
mistakes
Google Uses Its Big Sleep AI Agent to Find SQLite Security Flaw
Google researchers in June introduced Project Naptime, an initiative to explore how large langua...
2024-11-6 00:33:49 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
defenders
attackers
Why PKIaaS is a Smarter and Secure Alternative to On-Premises PKI
Private PKI (Public Key Infrastructure) is critical for trusted authentication and secure commun...
2024-11-5 23:59:1 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
pkiaas
security
cloud
premises
avx
Sanitize Client-Side: Why Server-Side HTML Sanitization is Doomed to Fail
The battle against Cross-Site Scripting (XSS) has been going on for years, with developers and s...
2024-11-5 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
sanitizer
php
client
sanitizers
Strengthen Cyber Resilience: A Checklist for ITOps and SecOps Collaboration
In the past year, half of organizations (54%) have experienced a cybersecurity incident, and in...
2024-11-5 20:22:54 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
network
secops
itops
resilience
security
Pacific Rim: Chronicling a 5-year Hacking Escapade
Contributors to this post: Mickey Shkatov, Alex BazhaniukSo What Happened?Last week, Sophos re...
2024-11-5 20:14:22 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
attackers
sophos
firmware
pacific
rim
AIs Discovering Vulnerabilities
I’ve been writing about the p...
2024-11-5 20:8:9 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ais
software
security
schneier
Recovering From a Breach: 4 Steps Every Organization Should Take
Many of the conversations around cybersecurity revolve around prevention. From how to stave off...
2024-11-5 19:51:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
sso
rebuilding
downstream
identify
How PTaaS Supports Shift-Left Security Practices?
Security and development teams often face a tough challenge: delivering a secure, quality produc...
2024-11-5 19:19:34 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ptaas
development
developers
Three ‘Must Solve” Challenges Hindering Cloud-Native Detection and Response
According to Gartner, the market for cloud computing services is expected to reach $675 billion...
2024-11-5 17:46:7 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
nhis
identities
nhi
Leveraging Tabletop exercises to Enhance OT security maturity
Has your organization tested...
2024-11-5 16:37:57 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
tabletop
gaps
threats
stage
SWIFT
What is the SWIFT CSP?The SW...
2024-11-5 16:12:1 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
centraleyes
cscf
attestation
How Cybersecurity Training Must Adapt to a New Era of Threats
The first-ever National Cybersecurity Awareness Month took place two decades ago — a time when m...
2024-11-5 16:5:16 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
leaders
phishing
cisos
Hackers Exploit DocuSign APIs for Phishing Campaign
Cybercriminals are exploiting DocuSign’s APIs to send highly authentic-looking fake invoices, wh...
2024-11-5 15:18:13 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
docusign
novikov
modeling
malicious
attackers
The Role of Secrets Management in Securing Financial Services
The Role of Secrets Managemen...
2024-11-5 12:30:44 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
thales
cpl
thalesgroup
safeguard
What is a Cyber Range?
Today, we’re diving into the fascinating world of cyber ranges—a critical component in the ever-...
2024-11-5 11:16:47 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
drills
network
talent
FIDO: Consumers are Adopting Passkeys for Authentication
There appears to be growing momentum behind the use of passkeys as an alternative identity verif...
2024-11-5 06:24:1 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
passkeys
fido
SLSA Framework: What is It and How to Gain Visibility
In Part 2 of this blog series, we uncover the details of SLSA provenance from end to end. Previo...
2024-11-5 06:19:39 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
provenance
slsa
software
artifacts
artifact
MDR vs. MSSP: Making the Right Choice for Your Business
Protecting against cyber threats with limited resources presents an insurmountable challenge for...
2024-11-5 04:11:49 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
mdr
security
mssps
mssp
monitoring
DEF CON 32 – OH MY DC Abusing OIDC All The Way To Your Cloud
2024-11-5 04:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
presenters
boulevard
Previous
-31
-30
-29
-28
-27
-26
-25
-24
Next