unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Using Proactive Intelligence Against Adversary Infrastructure
Organizations cannot and will never keep bad actors from breaching their perimeter: They’ll al...
2024-2-7 23:30:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
pdns
hyas
resiliency
Harnessing Artificial Intelligence for Ransomware Mitigation
Bad actors are highly intelligent and can easily circumvent existing security measures. Need more p...
2024-2-7 23:1:54 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
machine
ransomware
security
backup
intelligent
IBM Shows How Generative AI Tools Can Hijack Live Calls
IBM researchers have discovered a way to use generative AI tools to hijack live audio calls and man...
2024-2-7 22:55:24 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
lee
generative
cloning
speech
llm
‘Total Bollocks’ — No, Your Toothbrush isn’t DDoS’ing
Were 3 million toothbrushes hacked into a botnet? Or does a Fortinet spokeschild have e...
2024-2-7 22:25:16 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
richi
swiss
toothbrush
jennings
Binary type inference in Ghidra
By Ian SmithTrail of Bits is releasing BTIGhidra, a Ghidra extension that helps reverse engineers...
2024-2-7 22:0:39 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
btighidra
inference
ghidra
constraints
analysis
The 8 Must Haves for the Next Generation of SIEM
Security information and event management (SIEM) tools have evolved significantly in the 18 years s...
2024-2-7 22:0:24 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
siems
monitoring
costs
Part 3: The anatomy of supply chain attacks: Non-human identities & TPRM failure
“Identity is the new perimeter.” This catch phrase is present in almost every website of identity...
2024-2-7 21:6:23 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackers
identities
workshop
tprm
Menlo Security’s Global Channel Leader Todd Wilson Recognized as 2024 CRN® Channel Chief
Mountain View, CA, February 7, 2024 – Menlo Security, a leader in browser security, CRN® a brand o...
2024-2-7 21:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
menlo
security
crn
wilson
todd
Super Bowl of Passwords: Chiefs vs. 49ers in the Battle of Cybersecurity
As we approach Super Bowl LVIII, with the Kansas City Chiefs and the San Francisco 49ers vying for...
2024-2-7 20:3:30 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
security
attackers
enzoic
stuffing
Response to Ivanti’s Recent Zero-day Vulnerability Exploitation
On January 10, 2024, the software company Ivanti disclosed two vulnerabilities impac...
2024-2-7 17:55:41 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackiq
network
ivanti
remote
Navigating the ISO 27001 Certification Process: Step-by-Step
ISO-what now? Navigating ISO 27001 is tricky (to say the least), and it can easily feel like tryi...
2024-2-7 14:8:50 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
27001
security
isms
scytale
compliant
What is a Behavioral Risk Indicator? Demystifying Insider Risk Indicators
Insiders – the people with legitimate access to an organization’s data and systems – are the root c...
2024-2-7 13:0:26 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
insider
behavioral
indicator
dtex
correlated
Jenkins Arbitrary File Leak Vulnerability, CVE-2024-23897, Can Lead To RCE
IntroductionJenkins, a Java-based open-source automation server widely used by developers for appl...
2024-2-7 07:44:5 | 阅读: 44 |
收藏
|
Security Boulevard - securityboulevard.com
jenkins
23897
security
426
zscaler
Mastering SBOMs: Best practices
In our recent webinar, Mastering SBOMs: Best Practices, speakers, including Ilkka T...
2024-2-7 07:3:20 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
sboms
mastering
software
smith
Legit Security Named in the 2024 Gartner® Emerging Tech Impact Radar: Cloud-Native Platforms report
Legit Security Named a Sample Vendor for Software Supply Chain Security in the 2024 Gar...
2024-2-7 06:3:28 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
security
legit
software
development
radar
USENIX Security ’23 – Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai – PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’...
2024-2-7 04:0:0 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
authored
greybox
Identity Protection Action Items Following Midnight Blizzard Attack
In light of the Midnight Blizzard’s attack, it’s evident that our cybersecurity strateg...
2024-2-7 03:6:49 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
silverfort
midnight
blizzard
microsoft
Report Surfaces Extent of SaaS Application Insecurity
An analysis of how 493 organizations are employing software-as-a-service (SaaS) applica...
2024-2-7 02:10:42 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
finds
senderovitz
wing
involving
New Ivanti Connect Secure Zero-Day Exploited by Threat Actors
Software company Ivanti has recently raised the alarm about two new vulnerabilities imp...
2024-2-7 02:4:5 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
ivanti
nuspire
directive
gateways
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #277 – When Fixing a Legacy System
via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lau...
2024-2-7 02:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
agile
comic
nygaard
ratnaravi
handelman
Previous
208
209
210
211
212
213
214
215
Next