unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
CrowdStrike Sued? — Delta Dials David Boies
Delta Airlines calls in attorneys Boies Schiller Flexner to claw back airline’s cash.CrowdStrike...
2024-8-1 00:2:3 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
delta
crowdstrike
airlines
richi
saturday
Navigating the Evolving Landscape of Cybersecurity
A Focus on Vulnerability ManagementIn recent years, the cybersecurity landscape has undergone sig...
2024-7-31 23:31:6 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
kev
epss
scoring
Black Hat Preview: CrowdStrike, Disinformation Lead The Narrative
The stakes have rarely been higher.As cybersecurity experts make their way to the one-armed bandit...
2024-7-31 23:25:36 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
crowdstrike
security
election
USENIX Security ’23 – Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild
Authors/Presenters:Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand...
2024-7-31 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
security
pearce
Cyberse and the Marketplace Era of Cybersecurity Purchasing
One of the biggest breakthroughs in cybersecurity has nothing to do with products or services.It'...
2024-7-31 21:15:40 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
marketplace
purchasing
buying
Data Breaches for the Month July 2024
Every month, we witness a significant rise in data breaches. Over the past six months, India has ex...
2024-7-31 20:50:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
strobes
india
sharp
xdspy
Tenable Considering a Potential Sale: Report
Cybersecurity company Tenable reportedly is considering a potential sale as it considers its option...
2024-7-31 20:9:24 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
tenable
cloud
deals
Are you ready for modern supply chain threats? Update your approach
In today’s intricately interconnected and complex software development ecosystem, a single compromi...
2024-7-31 20:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
puppet
3cx
windows
8 supply chain security talks you don’t want to miss at Black Hat
Numerous reports have highlighted the increased number of software supply chain attacks in recent y...
2024-7-31 20:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
python
wednesday
development
The Cost of Insider Threats: Financial and Reputational Impact
In today’s interconnected world, insider threats pose a significant risk to organisations of all...
2024-7-31 19:37:38 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
insider
threats
costs
Top CVEs of July 2024: Key Vulnerabilities and Mitigations
July 2024 has surfaced a series of significant vulnerabilities that could compromise the security o...
2024-7-31 19:6:33 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
attacker
malicious
security
bamboo
How Bots and AI are Fueling Disinformation
Twain famously quipped, “A lie can travel halfway around the world while the truth is putting on it...
2024-7-31 18:4:17 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
bots
brands
malicious
truth
From Geopolitics to Boardrooms: The Impact of the Kaspersky Ban
On the heels of the recent U.S. ban on Kaspersky antivirus software, it was expected that Kaspersky...
2024-7-31 17:23:49 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
ban
software
russia
Gray Box Testing in Cybersecurity: Finding the Right Balance for Security
One critical method employed by security professionals to test systems’ strength and resilience i...
2024-7-31 17:11:47 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
gray
security
identify
testers
Ghostscript Vulnerability Actively Exploited in Attacks
A significant remote code execution (RCE) vulnerability was identified in the Ghostscript library,...
2024-7-31 17:0:22 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
ghostscript
attackers
security
29510
postscript
An Introduction to Cloud Computing for Linux Users
Linux, the open-source operating system renowned for its stability, security, and customizability,...
2024-7-31 16:0:56 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
software
tuxcare
crucial
Email Attacks Surge, Ransomware Threat Remains Elevated
There has been a dramatic rise in email attacks and ransomware incidents, with an Acronis report no...
2024-7-31 15:56:37 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
ransomware
phishing
acronis
llms
If You are Reachable, You Are Breachable, and Firewalls & VPNs are the Front Door
This year has witnessed a string of critical vulnerabilities in VPNs and firewalls, spanning many o...
2024-7-31 14:0:27 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
network
firewalls
vpns
security
cloud
IBM: Cost of Data Breach on Average Reaches $4.9 Million
An IBM analysis of 604 organizations published today finds the average cost of each breach, includi...
2024-7-31 13:31:56 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
respondents
costs
finds
cloud
NSFOCUS RSAS New Features Unleashed
NSFOCUS Remote Security Assessment Security (RSAS) is a specialized, all-encompassing vulnerabilit...
2024-7-31 10:47:31 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
rsas
asset
efficiency
Previous
105
106
107
108
109
110
111
112
Next