unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How to Recover After Failing a Cybersecurity Audit
While it’s important to adhere to compliance regulations, blunders do happen. What does it mean whe...
2024-1-12 22:57:50 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
failing
fines
violations
API Predictions for 2024
Is Salt Security a fortune teller? We’re not sure if we’d go as far as to say that, but we certainl...
2024-1-12 22:45:44 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
salt
software
development
constantly
Writeup for CVE-2023-43208: NextGen Mirth Connect Pre-Auth RCE
IntroductionIn Oct. 2023, we released an advisory for CVE-2023-43208, a pre-authenticated remote c...
2024-1-12 22:15:26 | 阅读: 25 |
收藏
|
Security Boulevard - securityboulevard.com
mirth
payload
37679
functors
Improving Cybersecurity Response With Open Source Endpoint Visibility
In today’s complex digital landscape, the many different endpoints within an enterprise – from serv...
2024-1-12 22:0:46 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
osquery
security
identify
network
Cybersecurity Insights with Contrast CISO David Lindner | 1/12/24
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-1-12 22:0:0 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
cloud
ciso
The State of Open Source Cloud-Native Security
In recent years, there’s been a significant emphasis on securing the software supply chain. Especia...
2024-1-12 21:0:12 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
aikas
cloud
sboms
How Votiro is Redefining Threat Analytics
The threat of malware has existed for decades, yet it still poses significant challenges to traditi...
2024-1-12 20:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
votiro
threats
analysis
security
The Crucial Role of ITGCs in Risk Mitigation
Insight from Industry experts Paul Haley (GRC and SOX Compliance Strategist, HALEY Consulting an...
2024-1-12 18:38:52 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
itgcs
erp
governance
Three Tips To Use AI Securely at Work
How can developers use AI securely in their tooling and processes, software, and in general? In mi...
2024-1-12 15:0:17 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
llm
simon
openai
gum
securely
Cloud Atlas Phishing Attacks: Russian Companies Beware
The landscape of cybersecurity threats 2024 presents unprecedented challenges, requiring a proactiv...
2024-1-12 15:0:13 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
atlas
phishing
threats
Do More with Security Orchestration, Automation, and Response (SOAR)
Today, security operations center (SOC) teams face dual challenges of acquiring both the right cali...
2024-1-12 15:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
soar
threats
logrhythm
alarms
Preventing Domain Spam – How to Get Whitelisted Quickly?
Domain spam is a common problem these days. It is the practice of sending unsolicited emails in bu...
2024-1-12 13:43:46 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
whitelist
blocklists
security
malicious
Why is my SSL expiring every 3 months?
Digital certificates, used with the protocol ‘TLS’ (Transport Layer Security, previously known as ‘...
2024-1-12 13:30:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
expiration
security
validity
sectigo
shorter
Application Security Testing (AST) Explained
The typical global enterprise has over 12,000 web-based applications, including APIs, SaaS applicat...
2024-1-12 06:59:54 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
cycode
developers
Top Tools for Automating SBOMs
We’ve talked a lot about why software bills of materials (SBOMs) are important and how they communi...
2024-1-12 05:30:43 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
sboms
spdx
cyclonedx
syft
mend
Prioritize Risk and Eliminate SCA Alert Fatigue with SCA 2.0
Countless data breaches are exposed daily, and finding the vulnerabilities that are leading to thes...
2024-1-12 04:28:50 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
deepfactor
security
development
software
USENIX Security ’23 – Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu ‘TPatch: A Triggered Physical Adversarial Patch’
Hot TopicsUSENIX Security ’23 - Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu ‘...
2024-1-12 04:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
handelman
youtube
Three ways to manage cybersecurity tool sprawl in your software supply chain
Sprawl happensSoftware development organizations evolve. Teams grow. The number of projects increa...
2024-1-12 03:43:31 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
ox
sprawl
tooling
Securing Public Sector Against IoT Malware in 2024
The rapid proliferation of the Internet of Things (IoT) represents vast opportunities for the publi...
2024-1-12 03:35:16 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
threatlabz
threats
zscaler
Netskope Report Surfaces Raft of Cybersecurity Challenges
A report published by Netskope today revealed that, on average, 29 out of every 10,000 enterprise u...
2024-1-12 03:25:45 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
generative
netskope
microsoft
Previous
233
234
235
236
237
238
239
240
Next