unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Top CISOs to Follow in 2024: Germany Edition
Chief Information Security Officers (CISOs) play an integral role in protecting companies from cyb...
2023-12-13 17:26:38 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cisos
ciso
experienced
threats
Python 2 EOL: Coping with Legacy System Challenges
Python 2 was officially maintained and supported until January 1, 2020.The system becomes high...
2023-12-13 16:0:28 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
python
eol
tuxcare
security
migration
How CSRD and EED are Reshaping Data Center Sustainability Reporting
With greater scrutiny of environmental impacts and a burgeoning consciousness about the social res...
2023-12-13 06:44:16 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
csrd
efficiency
iec
30314
Snyk Launches ASPM Platform to Secure Software Supply Chains
Snyk today added an application security posture management (ASPM) platform to its port...
2023-12-13 05:12:44 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
developers
snyk
security
Understanding the Impact of the new Apache Struts File Upload Vulnerability
IntroductionRecently researcher Steven Seeley discovered a way to abuse the popular Apache Struts...
2023-12-13 05:8:33 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
struts
50164
attacker
Patch Tuesday Update – December 2023
Hot TopicsPython 2 EOL: Coping with Legacy System Challenges How CSRD and EED are Reshaping...
2023-12-13 04:43:46 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
windows
microsoft
elevation
remote
spoofing
Mastering SDLC Security: Best Practices, DevSecOps, and Threat Modeling
In the ever-evolving landscape of software development, it’s become absolutely paramount to ensure...
2023-12-13 04:27:14 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
sdlc
development
DEF CON 31 – David Pekoske’s, Sean Lyngaas’, Jen Easterly’s ‘All Information Looks Like Noise Until You Break The Code’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-13 04:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
redundant
CISA Unveils Tools to Strengthen Google Cloud Services
As organizations continue their migration to the cloud, threat groups are not far behind. According...
2023-12-13 03:35:1 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
baselines
security
duffy
scuba
Threat Actors Exploiting Adobe ColdFusion Vulnerability: A Critical Situation for Federal Agencies
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a cybersecu...
2023-12-13 03:21:25 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
coldfusion
nuspire
security
26360
Apple Bops Beeper, but iMessage Android Whac-A-Mole Ensues
Beeper’s reverse engineered iMessage integration, once killed by Tim’s crew, rises phœnix like.Appl...
2023-12-13 02:27:50 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
imessage
beeper
security
client
bringing
News alert: Detectify’s EASM research reveals top overlooked vulnerabilities from 2023
Stockhom, Sweden & Boston, Mass., Dec. 12, 2023 – Detectify, the External Attack Surf...
2023-12-13 02:0:14 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
detectify
security
easm
industries
Unlocking Enhanced Security: The Role of Advanced Network Segmentation Strategies
What is Network Segmentation?Network segmentation is the practice of dividing a computer network i...
2023-12-13 02:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
network
security
dividing
segments
Randall Munroe’s XKCD ‘Snow’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-13 02:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
Finding “dark data” in an API
What if I told you that dark data is lying in wait in some of your API responses?You know the data...
2023-12-13 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
developers
burp
dana
epp
Firmware and Supply Chain Requirements in the Latest CMS Acceptable Risk Safeguards (ARS)
The Centers for Medicare & Medicaid Services (CMS) is a critical part of the U.S. Department of Hea...
2023-12-13 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
firmware
eclypsium
security
ars
software
The hidden HR cost of mismanaged secrets
For large-scale organizations, managing digital secrets is more than just an IT task; it’s a fundam...
2023-12-13 00:41:11 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
entro
ensuring
lifecycle
Lazarus Group Exploits Log4j Flaw in New Malware Campaign
The notorious North Korea-backed Lazarus Group continues to change up its tactics to evade detectio...
2023-12-13 00:20:54 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
andariel
log4j
north
talos
ninerat
Why Biden’s EO on AI Conflates the Role of Red-Teaming
The recent release of president Joe Biden’s executive order on artificial intelligence (AI) marks a...
2023-12-12 23:0:14 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
broad
bias
provisions
datasets
Reco Employs Graph and AI Technologies to Secure SaaS Apps
Reco today launched a platform that makes use of machine learning algorithms and graph technology t...
2023-12-12 22:3:7 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
reco
security
klein
budget
Previous
261
262
263
264
265
266
267
268
Next