unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Canadian Man Accused of Snowflake Data Breach Arrested
Canadian authorities late last month arrested a man suspected of hacking and extorting dozens of...
2024-11-6 06:19:4 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
snowflake
krebs
judische
moucka
at&t
The Ultimate Cybersecurity Checklist for Protecting Your Business
From startups to global enterprises, every organization is a potential cyberattack target in to...
2024-11-6 04:55:28 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
checklist
cloud
DEF CON 32 – Open Sesame: How Vulnerable Is Your Stuff In Electronic Lockers
Tuesday, November 5, 2024...
2024-11-6 04:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
network
bloggers
presenters
Team Cymru Supports INTERPOL’s Operation Synergia II to Dismantle 22,000 Cybercrime Servers
As part of Team Cymru's missi...
2024-11-6 03:26:36 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
interpol
synergia
cymru
malicious
communities
CISA Unveils Guidelines to Combat AI-Driven Cyber Threats
AI in SaaS is unavoidable. The top half of ServiceNow’s homepage is dedicated to putting AI to w...
2024-11-6 03:16:25 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
guidelines
genai
threats
govern
Randall Munroe’s XKCD ‘Demons’
via the c...
2024-11-6 02:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
marc
wit
permalink
munroe
Fortinet Adds Data Loss Prevention Capability Following Acquistion of Next DLP
Fortinet has added a data loss prevention (DLP) platform to its portfolio that is based on the t...
2024-11-6 01:16:41 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
fortidlp
shah
workflows
mistakes
Potential Cybersecurity Threats to the 2024 U.S. Election: Voter Database Leaks
As the 2024 U.S. presidential election takes place, cybersecurity analysts are on high alert, wa...
2024-11-6 01:2:21 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
voter
election
voters
political
narratives
The Future of Identity Protection: Real-Time Threats and Scams
In today’s digital landscape, protecting your identity from real-time threats is more critical t...
2024-11-6 00:44:58 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
threats
constella
fullz
doxing
monitoring
Google Uses Its Big Sleep AI Agent to Find SQLite Security Flaw
Google researchers in June introduced Project Naptime, an initiative to explore how large langua...
2024-11-6 00:33:49 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
defenders
attackers
DEF CON 32 – MaLDAPtive: Obfuscation and De-Obfuscation
Authors/Presenters: Daniel Bo...
2024-11-6 00:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
convention
handelman
nocookie
Why PKIaaS is a Smarter and Secure Alternative to On-Premises PKI
Private PKI (Public Key Infrastructure) is critical for trusted authentication and secure commun...
2024-11-5 23:59:1 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
pkiaas
security
cloud
premises
avx
Sanitize Client-Side: Why Server-Side HTML Sanitization is Doomed to Fail
The battle against Cross-Site Scripting (XSS) has been going on for years, with developers and s...
2024-11-5 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sanitizer
php
client
sanitizers
SEC action raises the bar on software transparency
The U.S. Securities and Exchange Commission (SEC) recently announced fines amounting to nearly $...
2024-11-5 22:8:50 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
firms
filings
Strengthen Cyber Resilience: A Checklist for ITOps and SecOps Collaboration
In the past year, half of organizations (54%) have experienced a cybersecurity incident, and in...
2024-11-5 20:22:54 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
network
secops
itops
resilience
security
Pacific Rim: Chronicling a 5-year Hacking Escapade
Contributors to this post: Mickey Shkatov, Alex BazhaniukSo What Happened?Last week, Sophos re...
2024-11-5 20:14:22 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
attackers
sophos
firmware
pacific
rim
AIs Discovering Vulnerabilities
I’ve been writing about the p...
2024-11-5 20:8:9 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ais
software
security
schneier
Recovering From a Breach: 4 Steps Every Organization Should Take
Many of the conversations around cybersecurity revolve around prevention. From how to stave off...
2024-11-5 19:51:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
sso
rebuilding
downstream
identify
How PTaaS Supports Shift-Left Security Practices?
Security and development teams often face a tough challenge: delivering a secure, quality produc...
2024-11-5 19:19:34 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ptaas
development
developers
Three ‘Must Solve” Challenges Hindering Cloud-Native Detection and Response
According to Gartner, the market for cloud computing services is expected to reach $675 billion...
2024-11-5 17:46:7 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
nhis
identities
nhi
Previous
-36
-35
-34
-33
-32
-31
-30
-29
Next