unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Randall Munroe’s XKCD ‘Olympic Sports’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-8-2 01:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
encryption
enhanced
Demystifying Github Cached Views – The Hidden Danger
Over the past few days, a discussion has been happening on HackerNews around counter-i...
2024-8-2 00:59:43 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
github
network
gitguardian
repository
security
Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover
Even within organizations that have achieved a mature security posture, targeted NTLM relay attacks...
2024-8-2 00:12:53 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
srvnet
tcpip
machine
windows
As Breach Costs Surge, Companies Need a Better Way to Find Shadow Data
Data breaches are on the rise. In the US, last year broke new records in terms of b...
2024-8-1 23:21:5 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
costs
shadow
comforte
reveals
security
Why SAFE. Why Now.
It may feel like beating a dead horse to say it, but the threat of software supply chain attacks is...
2024-8-1 23:16:53 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
sscs
threats
USENIX Security ’23 – SHELTER: Extending Arm CCA with Isolation in User Space
Authors/Presenters:Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoya...
2024-8-1 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
network
situated
The Enterprise Identity Universe: Users, Non-Humans, and Consumers [Infographic]
Remember when managing identities at work was all about people? Times have changed. Now, digital i...
2024-8-1 22:25:28 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
identities
nhis
machine
universe
humans
8 Essential Considerations for Post-Quantum Cryptography Migration
A primer on how to best prepare for the migration to PQCThe United Nations has proclaimed 2025 the...
2024-8-1 22:6:19 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
pqc
migration
appviewx
security
transition
Strata Identity to Demonstrate How to Modernize Legacy Identity Systems to Microsoft Entra ID at Black Hat 2024
MEDIA ADVISORYPresenters at Microsoft Booth 1240 will also show how Strata’s Maverics “Disconnect...
2024-8-1 21:0:21 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
strata
microsoft
maverics
cloud
entra
Attack Detection and Threat Hunting – Common Topics We’re Asked About
This article is the fifth in a series of five covering key API security topics and provides some an...
2024-8-1 21:0:8 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cequence
security
lake
analysis
identify
One Does Not Simply … Get a Cybersecurity Job
August 1, 2024Where to BeginWith thousands of unfilled positions reported year over year, w...
2024-8-1 21:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
positions
career
The Cyber Fallout: Navigating the Aftermath of a Credit Union Breach
Nestled in the digital crosshairs, financial institutions (including credit unions) stand on the fr...
2024-8-1 21:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
patelco
security
threats
ddr
votiro
Building Trustworthy AI: Contending with Data Poisoning
Executive SummaryAs Artificial Intelligence (AI) and Machine Learning (ML) systems are adopted and...
2024-8-1 20:28:47 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
poisoning
appendix
datasets
adopted
Democratizing Defense: AttackIQ Flex 2.0 Empowers Every Organization
AttackIQ FlexPublishedAugust 1, 2024Revolutionizing security testing with conti...
2024-8-1 20:10:13 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackiq
agentless
assessments
network
Applying Vulnerability Management to Zero Trust: Insights from Fortra’s Tyler Reguly
Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here....
2024-8-1 18:31:6 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
tyler
neal
security
dennis
elliot
Securing Artifacts: Keyless Signing with Sigstore and CI/MON
Artifact integrity is crucial in maintaining software security and trustworthiness. High-profile br...
2024-8-1 17:0:58 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
sigstore
cimon
artifact
slsa
keyless
kvmCTF: Google’s $250K Bounty for KVM Zero-Day Vulnerabilities
In October 2023, Google announced the launch of kvmCTF, a new vulnerability reward program (VRP) de...
2024-8-1 17:0:47 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
kvmctf
security
reward
memory
Insider Risk Digest: July
Welcome to this month’s Insider Risk Digest. This month, we explore a range of insider threats a...
2024-8-1 16:5:49 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
insider
roche
rok
foresight
korean
Black Hat Fireside Chat: Consumers demand secure mobile apps; it’s high time for brands to deliver
By Byron V. AcohidoTwo-plus decades of enduring wave after wave of mobile app malware...
2024-8-1 15:22:55 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
consumers
brands
security
appdome
developers
Best 5 SOC 2 Compliance Software in 2024
If you’ve landed here, chances are you know just how challenging getting SOC 2 certification can be...
2024-8-1 15:2:4 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
centraleyes
monitoring
processes
software
Previous
103
104
105
106
107
108
109
110
Next