unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
A demand for real consequences: Sonatype’s response to CISA’s Secure by Design
In the fast-changing fields of cybersecurity and software development, the importan...
2024-2-24 05:15:39 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
sonatype
development
Avast Hit With $16.5 Million Fine for Selling Customer Data
Avast Software will pay a $16.5 million fine to settle a federal complaint accusing the antivirus v...
2024-2-24 04:45:53 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
jumpshot
ftc
consumers
selling
sold
USENIX Security ’23 – Yu-Fu Fu, Jaehyuk Lee, Taesoo Kim – autofz: Automated Fuzzer Composition at Runtime
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’...
2024-2-24 04:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
fu
kim
Daniel Stori’s ‘Rest Easy, Sysadmin’
via the inimitable Daniel Stori at Turnoff.US.Permalink*** This is a Security B...
2024-2-24 02:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
authored
network
marc
Top 10 Questions to Ask a Bot Management Provider
1. Is the bot management solution delivered as a service (is it a SaaS solution)?Compared to softw...
2024-2-24 01:56:58 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
software
processes
security
ux
How to Handle Mobile App Secrets
Sponsorships AvailableC.J. MayInformation security professional and passionate programm...
2024-2-24 00:0:10 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
client
analysis
gitguardian
developer
USENIX Security ’23 – Hui Peng, Zhihao Yao, Ardalan Amiri Sani, Dave (Jing) Tian, Mathias Payer – GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation
Friday, February 23, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsFe...
2024-2-24 00:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
cloud
bloggers
webinars
HP’s Threat Report – New Threats, Bigger Problems
HP issues a threat report quarterly (this month’s came with a video), and this quarter’...
2024-2-23 23:30:56 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
threats
bigger
security
quarter
What the Upcoming DORA Regulation Means for Your Business
The EU’s Digital Operational Resilience Act (DORA) is just a year away. It impacts...
2024-2-23 23:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
dora
comforte
tens
operational
resilience
Hackers Exploit ConnectWise Bugs to Deploy LockBit Ransomware
Cyberattacks exploiting critical vulnerabilities in ConnectWise’s remote monitoring and management...
2024-2-23 22:49:39 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
lockbit
ransomware
sophos
Securing Sensitive Information in Cloud Repositories
In the digital era, the paradigm of data storage and management has shifted significantly towards c...
2024-2-23 22:0:44 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
encryption
involves
network
Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24
Insight #1The post quantum encryption era is upon us, and Apple is leading the cha...
2024-2-23 22:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
encryption
lindner
insight
contrast
Organizations Unprepared to Face Cloud Security Threats
Cloud infrastructures present a slew of challenges for IT security professionals, including the pre...
2024-2-23 21:0:54 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
fatigue
attackers
Mitigating Employee Sabotage: Proactive Strategies for Businesses
What is Employee Sabotage?In the intricate web of modern business operations, the threat of...
2024-2-23 18:41:11 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
sabotage
insider
strategic
security
Why is Cybersecurity Important for Driverless Vehicles?
Driverless vehicles represent a groundbreaking technological advancement in transportation, promisi...
2024-2-23 18:18:37 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
vehicles
driverless
autonomous
Adversarial machine learning: what is it and are we ready? ⎜Anmol Agarwal
Welcome to the Elephant in AppSec, the podcast to explore, challenge, and boldly face...
2024-2-23 17:46:50 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
machine
anmol
security
appsec
adversarial
What is Advanced Threat Protection and How to Use It in Your Business
As businesses accelerate their digital initiatives, the shadow of cybersecurity threats grows. Ever...
2024-2-23 16:0:43 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
atp
security
threats
cloud
Alert: Coyote Trojan Strike Compromises 61 Brazilian Banks
Financial cyberattacks pose a significant threat to the stability of global economies and the secur...
2024-2-23 15:0:38 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
coyote
trojan
brazilian
malicious
nim
A Buyer’s Guide to OT/ICS Security Solutions
The interconnectedness of these systems, once confined to physical processes, has opened a new era...
2024-2-23 14:31:9 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
costs
investment
operational
NSFOCUS Innovative DDoS Protection Technology Secures Your Network Perimeter
Cybersecurity is crucial for national security in the digital world, where major powers clash over...
2024-2-23 09:30:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
network
security
monitoring
innovative
innovation
Previous
192
193
194
195
196
197
198
199
Next