unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Benefits of Schools Adopting AI for Cybersecurity
In the US, K-12 school systems are struggling to keep their IT environments safe as cyber threats i...
2024-3-1 02:51:22 | 阅读: 29 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
schools
ONCDs’ call for memory safety brings considerable challenges, changes, and costs
The recent publication Back to the Building Blocks: A Path Toward Secure and Measurable Software by...
2024-3-1 02:30:28 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
memory
security
software
development
transition
Daniel Stori’s ‘Security Engineer Interview’
via the inimitable Daniel Stori at Turnoff.US.Permalink*** This is a Security B...
2024-3-1 02:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
turnoff
bloggers
network
authored
Security Vulnerabilities Popping Up on Hugging Face’s AI Platform
Hugging Face is emerging as a significant player in the rapidly expanding generative AI space, with...
2024-3-1 01:39:47 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
hugging
malicious
pytorch
security
conversion
What is the difference between an SCA scan and a container scan?
Are Software composition analysis (SCA) scans and container scans the same thing? The short answer...
2024-3-1 01:28:10 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
containers
security
mend
prioritize
How DSPM Can Help You to Safely Use Microsoft Copilot?
In the rapidly evolving landscape of workplace technology, Microsoft CoPilot has emerged as a groun...
2024-3-1 01:22:54 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
copilot
symmetry
microsoft
security
What are the elements of an SBOM?
A software bill of materials (SBOM) is not just a list, but a detailed inventory th...
2024-3-1 00:58:10 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
software
bill
materials
security
Ex-Cybercrime Forum Community Member Runs a Profitable Penetration Testing Business – An Analysis
Since 2021 as a part of an in-house research and capability building project I’ve been collecting...
2024-3-1 00:43:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
hxxp
a7
analysis
GitHub Fights Forks — Millions of Them — Huge Software Supply Chain Security FAIL
Scrotebots clone thousands of projects, injecting malware millions of times.GitHub is u...
2024-3-1 00:37:11 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
github
software
security
malicious
richi
USENIX Security ’23 – Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek – A Study of Multi-Factor and Risk-Based Authentication Availability
Home » Security Bloggers Network » USENIX Security ’23 – Anthony Gavazzi, Ryan Williams, Engin Ki...
2024-3-1 00:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
bloggers
youtube
Fraud Detection: Time is Not on Our Side
Financial institutions are dedicated to providing their customers with a frictionless experience th...
2024-2-29 23:0:48 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
generative
scientists
CNCF Graduates Falco Project to Improve Linux Security
The Cloud Native Computing Foundation (CNCF) announced today that Falco, an open source...
2024-2-29 23:0:20 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
falco
security
ebpf
threats
sysdig
5 Facts About File Integrity Monitoring and HIPAA Integrity Controls
The risks of being found non-compliant with HIPAA guidelines are among the most pre...
2024-2-29 23:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
hipaa
cimcor
healthcare
security
network
A CISO’s Guide to SaaS Security Posture Management
The role of a chief information security officer (CISO) is becoming increasingly important as the d...
2024-2-29 22:0:59 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
sspm
posture
cloud
monitoring
Building Your Cyber Incident Response Team
When you’re blindsided by a sudden cyber attack, it pays to have a band of heroes you can call upon...
2024-2-29 19:5:35 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
district
cirt
threats
Ivanti Pulse Secure Found Using End of Life CentOS 6 OS
Ivanti Pulse Secure VPN appliances have recently been a target of several sophisticated attacks, hi...
2024-2-29 17:0:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
ivanti
pulse
eclypsium
What is cyber hygiene and why businesses should know about it
Prioritize cyber hygiene for robust security. Automate practices, stay quantum-ready, and collabora...
2024-2-29 16:40:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
hygiene
security
threats
software
Unleashing the Power of Outcome-Driven Cybersecurity: The CARE Model and Live Patching
As a CIO, security officer, or compliance officer, have you adopted the CARE model yet? In your rol...
2024-2-29 16:0:52 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
ransomware
outcome
threats
AWS SNS Bulk Smishing: Protect Systems From Exploitation
In recent cybersecurity developments, a malevolent Python script named SNS Sender has surfaced as a...
2024-2-29 15:0:14 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
sns
smishing
security
bulk
phishing
How better key management can close cloud security gaps troubling US government
How better key management can close cloud security gaps troubling US government madhav...
2024-2-29 13:38:19 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
encryption
security
thales
hyok
Previous
187
188
189
190
191
192
193
194
Next