unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Randall Munroe’s XKCD ‘Sheet Bend’
Security Boulevard The Home of the Security Bloggers Network ...
2024-1-17 02:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
boulevard
bloggers
network
OpenAI: We’ll Stop GPT Misuse for Election Misinfo
Sam says avoid AI abuse—protect the democratic process.With elections coming up in the US and other...
2024-1-17 01:16:19 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
openai
elections
generative
chatbots
politics
The No-Nonsense Guide to Bypassing API Auth Using NoSQL Injection
IntroductionSometimes, the way to bypass API auth is easier than you think. That’s all thanks to m...
2024-1-17 01:0:0 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
nosql
injection
bypass
username
SBOM Examples
There is lot of talk about Software Bill of Materials (SBOMs) in industry publications, social medi...
2024-1-17 00:37:15 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
software
codesecure
sentry
network
USENIX Security ’23 – Fieke Miedema, Kelvin Lubbertsen, Verena Schrama, Rolf van Wegberg – Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics of a Bitcoin Mixing Service
Hot TopicsRandall Munroe’s XKCD ‘Sheet Bend’ OpenAI: We’ll Stop GPT Misuse for Election Misi...
2024-1-17 00:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
handelman
youtube
Getting Started: A Beginner’s Guide for Improving Privacy
Welcome to the world of online/digital privacy!Like its sister guide for cybersecurity, this pr...
2024-1-17 00:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
oriented
visited
advice
The State of Software Supply Chain Security 2024: Key takeaways
Software supply chain attacks are now mainstream events — a change in tactics by cyber-attackers th...
2024-1-16 23:55:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
malicious
3cx
A (partial) history of software supply chain attacks
The widespread campaign of software supply chain hacks that were behind the attack on...
2024-1-16 23:30:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
incomplete
chronology
Understanding Cloud Workload Protection: Technologies and Best Practices
A cloud workload refers to an application or storage element within a cloud environment, whether it...
2024-1-16 23:0:35 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
workloads
workload
threats
The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part One
On August 10, 2023, the Cyber Safety Review Board (CSRB) publicly released a critical report detail...
2024-1-16 22:0:28 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
band
microsoft
lapsus
csrb
bang
GitLab Fixes Password Reset Bug That Allows Account Takeover
GitLab is releasing a patch to fix a vulnerability in its email verification process that bad actor...
2024-1-16 21:5:44 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
gitlab
software
security
myers
Now you can easily gain comprehensive insights into your compliance posture
We are excited to announce our new Compliance Matrix feature, which helps you gain a f...
2024-1-16 19:27:12 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
security
grows
glance
posture
aligned
Top 9 Cyber Risk Scenarios That Can Lead to Financial Loss in 2024 | Kovrr Blog
Pursuing a cybersecurity initiative takes more than a simple decision made by an organization’s chi...
2024-1-16 18:49:32 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
cisos
costs
ransomware
expenses
malicious
Russian Hackers Orchestrate Ukrainian Telecom Giant Attack
In a recent revelation by Ukraine’s top cyber official, Illia Vitiuk, it has been unveiled that the...
2024-1-16 15:0:45 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
telecom
ukrainian
kyivstar
vitiuk
ukraine
Cyber Attack on Telecommunications Company
Isn’t it fascinating that the most expensive consequence of a cyber attack is information loss, whi...
2024-1-16 14:4:44 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
telecom
threats
security
kyivstar
Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467)
Cybersecurity researchers recently uncovered a critical flaw in the widely used Apache OFBiz Enterp...
2024-1-16 13:27:10 | 阅读: 41 |
收藏
|
Security Boulevard - securityboulevard.com
ofbiz
51467
bypass
49070
NSFOCUS Reveals New Botnet Family RDDoS
1. Introduction of the New Botnet RDDoSIn early November 2023, NSFOCUS’s Global Threat Hunting Sys...
2024-1-16 12:13:54 | 阅读: 25 |
收藏
|
Security Boulevard - securityboulevard.com
rddos
security
analysis
network
trojan
Enhancing Data Center Efficiency and Sustainability with Power Capacity Effectiveness
The digital age demands the optimization of data centers, serving as critical hubs for information...
2024-1-16 04:53:38 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
pce
centers
efficiency
What is Identity Threat Detection and Response?
Identity Threat Detection and Response (ITDR) remains crucial for preventing unauthoriz...
2024-1-16 00:47:57 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
itdr
security
identities
threats
The Impact of OpenAI’s GPT Store
In recent years, the world of Artificial Intelligence (AI) has been buzzing with groundbreaking ad...
2024-1-16 00:45:16 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
gpt
security
openai
consultant
Previous
230
231
232
233
234
235
236
237
Next