unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Mitigating Lurking Threats in the Software Supply Chain
Software supply chain security threats and vulnerabilities aren’t new. What is new is the voracity...
2024-3-12 21:0:47 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
threats
malicious
foss
MSP Case Study: ClearView IT Boosts Customer Domain Protection with PowerDMARC’s MSP Program
Reading Time: 2 min“Very easy and intuitive multi-tenant management. Flexible partne...
2024-3-12 20:31:48 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
clearview
powerdmarc
dmarc
msp
The Rise of AI Worms in Cybersecurity
The swift advancement of generative AI systems like OpenAI’s ChatGPT and Google’s Gemini has brough...
2024-3-12 15:22:30 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
worm
security
worms
malicious
Alert: FBI Warns Of BlackCat Ransomware Healthcare Attack
In recent months, a concerning trend has emerged within the healthcare sector: the resurgence of Bl...
2024-3-12 15:0:45 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
ransomware
blackcat
security
network
Blog: Why Hackers Love Phones – Keep your Eye on the Device
This is the third article in a guest blog series from Intellyx. Catch up on the first article here...
2024-3-12 13:59:25 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
approov
phones
intellyx
Enable Sharing of Datamodel Acceleration Summaries between Search Heads
IntroductionIf you’re running Splunk Enterprise Security Suite, you are already leveraging accel...
2024-3-12 11:28:56 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
datamodels
summaries
heads
datamodel
Oh No! My JSON Keys and Values are Separated! How Can I Extract Them For My Searches?
Splunk will be able to parse the fields timestamp, level, message, user, user{}.id, user{}.username...
2024-3-12 11:28:53 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
donutid
mvindex
username
associate
GUEST ESSAY: A DIY guide to recognizing – and derailing – Generative AI voice scams
By Alexander KonovalovAmericans lost a record $10 billion to scams last year — and s...
2024-3-12 06:40:26 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
cloning
alexander
konovalov
security
unusual
Using AI to Reduce False Positives in Secrets Scanners
Get an overview of how secrets scanners work, and how Legit is dramatically reducing secret-scannin...
2024-3-12 04:28:9 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
scanners
positives
development
legit
rates
Introducing Salt Security’s New AI-Powered Knowledge Base Assistant: Pepper!
Going to a vendor’s Knowledge Base (KB) is often the first place practitioners go to ge...
2024-3-12 04:6:45 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
pepper
salt
security
navigating
answers
USENIX Security ’23 – PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis
Authors/Presenters: Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yi...
2024-3-12 03:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
3pv9s9o
yaoxuan
DARPA awards $1 million to Trail of Bits for AI Cyber Challenge
By Michael D. BrownWe’re excited to share that Trail of Bits has been selected as one of the seven...
2024-3-12 01:46:31 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
aixcc
crs
llms
trail
Announcing Our UK R&D Center and Data Centers in Canada and Germany
Coro’s customers deserve the strongest cybersecurity available. That’s why we’re excit...
2024-3-12 01:34:48 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
coro
centers
security
canada
GSA Small Business Office and FedRAMP PMO looking for Small Business Cloud Solutions
General Services Administration (GSA), Office of Small and Disadvantaged Business Util...
2024-3-12 01:19:42 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
fedramp
cloud
csps
stackarmor
pmo
Irony of Ironies: CISA Hacked — ‘by China’
U.S. Cybersecurity and Infrastructure Security Agency penetrated in February, via vuln in Ivanti.CI...
2024-3-12 01:17:53 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
security
ivanti
goblin
magnet
SBOMs and medical devices: An essential step — but no security cureall
The U.S. Federal Government has been hard at work releasing a plethora of guidelines — and mandates...
2024-3-12 01:12:34 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
software
fda
mdms
security
Randall Munroe’s XKCD ‘Earth/Venus Venn Diagram’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-3-12 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
irony
boulevard
ironies
Effective Supply Chain Risk Management
Whether we’re talking about mechanical components, or accounting software, countless b...
2024-3-12 00:56:48 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
vehicle
tier
jm
supplier
Phobos Unleashed: Navigating the Maze of Ransomware’s Ever-Evolving Threat
Threat Overview – PhobosThe Phobos Ransomware variant has been active since May of 201...
2024-3-12 00:10:30 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
phobos
hunt
windows
shadow
Threat Groups Rush to Exploit JetBrains’ TeamCity CI/CD Security Flaws
The cyberthreats to users of JetBrains’ TeamCity CI/CD platform continue to mount a week after the...
2024-3-11 23:7:30 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
jetbrains
rapid7
teamcity
Previous
177
178
179
180
181
182
183
184
Next