unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion
Authors/Presenters:Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong,...
2024-6-26 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
zhong
presenters
Why Shadow AI is a Bigger Challenge than Shadow IT | Grip
If the 2024 RSA Conference is any indication of cybersecurity priorities, shadow AI is a key focus—...
2024-6-26 02:52:47 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
rogue
casbs
introduces
Proxies as a Service: How to Identify Proxy Providers via Bots as a Service
Bots as a Service DetectionIn this section, we present an initial approach we took to detect a scr...
2024-6-26 02:8:38 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
baas
proxy
datadome
subnet
subnets
$50 Million in BEC Losses
The Eastern District of New York has announced charges against four men for their roles in a Busine...
2024-6-26 02:7:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
funds
york
romance
ademoroti
schemes
Patch or Perish: Secure Your Data Center with Firmware Management
In the dynamic world of data centers, where uptime and security are paramount, firmware management...
2024-6-26 01:44:32 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
firmware
security
hardware
uptime
software
Why SaaS Identity Abuse is This Year’s Ransomware
Scattered Spider made headlines in 2023 with successful ransomware attacks against tw...
2024-6-26 01:0:39 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
ransomware
resorts
mgm
katie
SonarQube 10.6 Release Announcement
We are thrilled to announce the 10.6 release of SonarQube including some significant changes:Sona...
2024-6-26 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
sonarqube
fips
kubernetes
announce
autoscaling
Daniel Stori’s ‘The Over Engineer’
Security Boulevard The Home of the Security Bloggers Network ...
2024-6-26 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
boulevard
bloggers
network
Google’s Project Naptime Aims for AI-Based Vulnerability Research
Security analysts at Google are developing a framework that they hope will enable large language mo...
2024-6-26 00:35:21 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
llms
security
llm
naptime
Microsoft Privacy FAIL: Windows 11 Silently Backs Up to OneDrive
Copying users’ files and deleting some? Even a cartoon hound knows this isn’t fine.Microsoft real...
2024-6-26 00:33:29 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
backup
richi
windows
worse
Five Signs You’re Using “Good Enough” Automation
In an industry grappling with a surplus of vendors, a persistent cybersecurity talent shortage, and...
2024-6-26 00:30:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
premium
scalability
grows
settling
Hacking APIs with HTTPie
Hacking APIs is an art; like any artist, the right tools make all the difference. While curl has l...
2024-6-26 00:0:0 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
httpie
proxy
burp
httpbin
scoop
Airbnb’s Ban on Indoor Security Cameras: What It Means for Your Personal Cybersecurity
Effective April 30, 2024 Airbnb, the global vacation rental giant, announced a significant policy c...
2024-6-25 23:48:54 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cameras
security
indoor
rental
airbnb
How platform engineering helps you get a good start on Secure by Design
Designing software from the ground up to be secure, as recommended by the Secure by Design initiati...
2024-6-25 22:5:8 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
development
developers
software
heckathorn
How AttackIQ Can Bolster CORA Compliance in the Federal Government
In the ever-evolving cybersecurity landscape, federal agencies face a growing impera...
2024-6-25 20:42:40 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cora
security
attackiq
threats
assessments
Top 6 Compliance Reporting Tools in 2024
What is a Compliance Report?A compliance report describes how successfully or poorly a company com...
2024-6-25 19:15:25 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
regulatory
centraleyes
regulations
processes
security
Reverse engineering eBPF programs
eBPF is one of the most widely used technologies in today’s computing ecosystem, starting from the...
2024-6-25 17:4:19 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ebpf
prog
ppid
comm
tgid
Addressing Node.js Vulnerabilities in Ubuntu
Node.js is an open-source, cross-platform JavaScript runtime environment built on the powerful V8 e...
2024-6-25 17:0:24 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
tuxcare
bypass
attacker
What is Cyberbullying: Parents Guide
Cyberbullying is a modern issue where technology is used to harass, embarrass, or target someone. I...
2024-6-25 16:19:2 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
bullying
parents
signs
sternx
TuxCare Extended Lifecycle Support Services Now Offered through Virtuozzo
PALO ALTO, Calif. – June 25, 2024 – TuxCare, the enterprise solutions division of CloudLinux and a...
2024-6-25 16:0:35 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
tuxcare
virtuozzo
cloud
lifecycle
els
Previous
84
85
86
87
88
89
90
91
Next