unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
5 Ways to Prevent Prompt Injection Attacks
Prompt injection attacks are a form of cybersecurity threat that specifically target systems powere...
2024-3-4 22:0:9 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
injection
malicious
security
prompts
attackers
Revolutionizing Identity Theft with AI
How are we revolutionizing identity theft with AI? In an age where digital footprints are as unique...
2024-3-4 21:25:6 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
constella
threats
simulations
security
LLM Prompt Injection Worm
Researchers have demonstrated a worm that spreads through prompt injection. Details:I...
2024-3-4 20:1:52 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
genai
worm
malicious
injection
schneier
In the News | Equip and Educate Students to Combat Cyberthreats
This article was originally published in EdTech Magazine on 2.22.24 by Charlie Sander,...
2024-3-4 19:12:48 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
schools
magazine
Cybersecurity’s “Shift Up” Moment With CRQ | Kovrr
What Is a “Shift Up” Strategy, and Why It’s NecessaryToday, cybersecurity is evolving into cybe...
2024-3-4 18:59:25 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
regulatory
economic
Ubuntu 18.04 Security Updates for Linux Kernel Vulnerabilities
Recently, Ubuntu has rolled out security updates addressing several Linux kernel vulnerabilities in...
2024-3-4 17:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
attacker
tuxcare
utilize
Risk and Regulation: A Strategic Guide to Compliance Risk Assessment
Compliance Risk Assessments For a Dynamic Regulatory TerrainCrafting an effective compliance progr...
2024-3-4 15:44:31 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
regulatory
identify
centraleyes
regulations
ensuring
A Guide to Cybersecurity Compliance in the Manufacturing Sector
The manufacturing sector is one of the most extensive, exceptionally varied, and swiftly evolving s...
2024-3-4 15:24:43 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
regulations
sectrio
LockBit Ransomware Bounty: US Offers $15 Million In Reward
In a landscape where cyber threats loom large, the hunt for cybercriminals intensifies. Today, we’r...
2024-3-4 15:0:15 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
lockbit
ransomware
affiliates
criminal
threats
USENIX Security ’23 – Liang Niu, Shujaat Mirza, Zayd Maradni, Christina Pöpper – CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s...
2024-3-4 00:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
presenter
commitment
Human Brain Chip Implants: Helpful? Safe? Ethical?
Major developments regarding implanting chips in human brains have been announced in 2...
2024-3-3 18:48:16 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
brain
neuralink
percent
implants
chip
USENIX Security ’23 – Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem
Authors/Presenters: Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapia...
2024-3-3 00:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
serge
reardon
Deepfactor 3.5 Includes Enhanced Vulnerability Prioritization with EPSS Support and Reachability Analysis for Golang
Deepfactor Release 3.5 OverviewAs with every release, we continue to enhance our SCA c...
2024-3-2 06:13:49 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
deepfactor
epss
scoring
A Deep Dive into the 2024 Prudential and LoanDepot Breaches
Financial Giants Under SiegeIt’s only the first quarter of 2024 and major breaches are already sta...
2024-3-2 05:6:33 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
loandepot
ransomware
votiro
security
prudential
SafeBreach Coverage for AA24-060A (Phobos Ransomware) and AA24-060B (Ivanti Connect Secure)
Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach On February 29th, the Cyberse...
2024-3-2 04:38:29 | 阅读: 73 |
收藏
|
Security Boulevard - securityboulevard.com
phobos
aa24
ransomware
ivanti
060a
Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware
On February 29, 2024, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bure...
2024-3-2 04:16:13 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
security
windows
phobos
attackiq
USENIX Security ’23 – Vivek Nair, Dawn Song – Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management
Home » Security Bloggers Network » USENIX Security ’23 – Vivek Nair, Dawn Song – Multi-Factor Key...
2024-3-2 04:0:0 | 阅读: 24 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
bloggers
network
youtube
What Does The Mother of All Breaches (MOAB) Mean for Organizations?
What does the colossal data leak, the Mother of All Breaches (MOAB), mean for businesses around the...
2024-3-2 03:48:22 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
moab
security
stuffing
attackers
CISA, Mandiant Warn of a Worsening Situation for Ivanti Users
The federal government and cybersecurity teams are warning organizations that threat groups are exp...
2024-3-2 02:6:12 | 阅读: 22 |
收藏
|
Security Boulevard - securityboulevard.com
ivanti
mandiant
ict
espionage
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #280 – The Tech Stack and the Architect
via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lau...
2024-3-2 02:0:0 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
software
comic
ratnaravi
marc
architect
Previous
185
186
187
188
189
190
191
192
Next