unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Benefits of Using DCIM Software for Data Center Cable Management
In the ever-evolving landscape of information technology, the management of data centers has become...
2024-1-19 07:34:43 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
dcim
software
cabling
centers
cable
New Paper: “Future of the SOC: Evolution or Optimization — Choose Your Path” (Paper 4 of 4.5)
New Paper: “Future of the SOC: Evolution or Optimization — Choose Your Path” (Paper 4 o...
2024-1-19 06:9:33 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
processes
anton
optimize
decide
What Existing Security Threats Do AI and LLMs Amplify? What Can We Do About Them?
In my previous blog post, we saw how the growth of generative AI and Large Language Mod...
2024-1-19 05:49:41 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
llms
llm
security
threats
generative
Defining Good: A Strategic Approach to API Risk Reduction
The cost of not knowing what good is.Could you imagine our interstate highway system without roadw...
2024-1-19 04:6:17 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
salt
governance
asset
USENIX Security ’23 – Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang – MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries
Hot TopicsDefining Good: A Strategic Approach to API Risk Reduction USENIX Security ’23 - Xi...
2024-1-19 04:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
handelman
network
API security risks, testing, protection best practices
As per the State of Developer Experience report released in 2023, 98% of developers perceive APIs a...
2024-1-19 03:59:4 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
injection
entro
Stopping Alert Fatigue in 3 Simple Steps
We live in a world filled with constant notifications. From medical devices to severe weather warni...
2024-1-19 03:16:59 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
fatigue
cycode
aspm
PixieFail Bugs in UEFI Open Source Implementation Threaten Computers
A collection of security vulnerabilities found within the de facto open source implementation of th...
2024-1-19 02:54:24 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
network
edk
quarkslab
remote
Randall Munroe’s XKCD ‘Bug Thread’
Security Boulevard The Home of the Security Bloggers Network ...
2024-1-19 02:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
boulevard
bloggers
network
Massive ‘New’ Leaked Credentials List: Naz.API Pwns Troy
Stop reusing passwords, already. Here’s what else you should do.Almost 71 million sets of unique cr...
2024-1-19 01:18:40 | 阅读: 27 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
troy
naz
stuffing
pwned
Meet Turbine Canvas and Embrace the Art of Powerful Simplicity
Automation is critical for effective security operations (SecOps) in modern organizations. Success...
2024-1-19 01:0:0 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
turbine
workflows
playbooks
secops
intuitive
Continuous Compliance Steps Cybersecurity Departments Should Be Taking to Prepare for CMMC 2.0
By: Igor Volovich, VP, Compliance StrategyHistorically, compliance has been seen as a box one coul...
2024-1-19 00:44:52 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
cmmc
security
posture
maturity
Protect AI Report Surfaces MLflow Security Vulnerabilities
A report published by Protect AI today identifies remote code execution (RCE) vulnerabilities in an...
2024-1-18 23:44:56 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
mlflow
software
remote
Making Secure Boot Even More Secure
Secure Boot lays the foundation for the security of the entire computer system. However, in practic...
2024-1-18 23:30:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
grub
shim
tpm
security
grub2
GitHub, PyTorch and More Organizations Found Vulnerable to Self-Hosted Runner Attacks
Last July, we published an article exploring the dangers of vulnerable self-hosted runners and how...
2024-1-18 22:12:19 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
github
runners
security
khan
runner
SOC-as-a-Service: The Five Must-Have Features
With 32% of UK organizations experiencing a cyberattack in 2022, it’s not surprising most businesse...
2024-1-18 22:0:6 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
outsourced
security
threats
agreed
Are You Ready for PCI DSS 4.0?
The Payment Card Industry Data Security Standard (PCI DSS) is the global benchmark for ensuring com...
2024-1-18 21:47:57 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
dss
security
comply
imperva
Cyber Lingo: What is end-to-end encryption?
Cryptography can be traced back thousands of years to 1900 BC when Egyptians used unusual hieroglyp...
2024-1-18 21:37:18 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
encryption
security
armor
Advisory Issued for Androxgh0st Malware
CISA and the FBI have issued a cybersecurity advisory regarding the escalating threat o...
2024-1-18 21:4:38 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
androxgh0st
centraleyes
security
cloud
Why is data security important?
Most K-12 technology directors can’t stop talking about cybersecurity. But have you ever wondered w...
2024-1-18 19:4:16 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
district
districts
network
Previous
227
228
229
230
231
232
233
234
Next