unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Future of Work: Understanding AI Agents and Digital Coworkers
The workplace is transformin...
2024-11-8 03:9:51 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
agents
coworkers
robots
humans
The Global Effort to Maintain Supply Chain Security | Part Two
Various Cybersecurity Experts, CISO GlobalNovember 7, 2024A well-run kitchen requires a...
2024-11-8 03:3:44 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
kitchen
ingredients
ciso
software
A Critical Guide to Securing Large Language Models
A Critical Guide to Securing...
2024-11-8 02:7:40 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ciphertrust
encryption
llms
cte
thales
Randall Munroe’s XKCD ‘Probabilistic Uncertainty’
via the c...
2024-11-8 02:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
marc
permalink
syndicated
handelman
Bot Attacks Are Coming to Town: How to Safeguard Your Customers’ Holiday Travel
The Importance of Customer Security for Travel PlatformsPurchasing a plane ticket, booking a hotel...
2024-11-8 01:36:54 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
travel
phishing
threats
datadome
signals
Fortinet Extends Generative AI Reach Across Portfolio
Fortinet today extended the reach of its generative artificial intelligence (AI) capabilities to...
2024-11-8 01:27:25 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
agents
generative
employing
maddison
The Story of BIX, a Specialized AI Agent for Cybersecurity, Built with NVIDIA AI
BIX isn’t just an AI assistan...
2024-11-8 00:46:47 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
balbix
bix
changer
reduction
gaurav
DEF CON 32 – Windows Downdate: Downgrade Attacks Using Windows Updates
Authors/Presenters: Alon Levi...
2024-11-8 00:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
authored
handelman
CVE-2024-38213: From Crumbs to Full Compromise in a Stealthy Cyber Attack
Threat actors are becoming increasingly creative, using vulnerabilities to infiltrate organizations...
2024-11-7 23:37:33 | 阅读: 22 |
收藏
|
Security Boulevard - securityboulevard.com
38213
malicious
windows
veriti
AppOmni and Cisco Partner to Extend SaaS Security with End-to-End Zero Trust From Endpoint to the Application
Cisco selects AppOmni to join its Global Price List as part of its SolutionsPlus Program for eas...
2024-11-7 23:32:11 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
appomni
security
partnership
principles
Prevent Security Breaches in Self-Hosted Environments with GitGuardian’s Custom Host for Validity Checks
As organizations grow more complex, secrets are increasingly leaking at various stages of the S...
2024-11-7 23:30:40 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
validity
security
gitguardian
noise
bitbucket
A Beginner’s Guide to PCI DSS 4.0: Requirements 1-4
Valid card data is highly...
2024-11-7 23:30:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
comforte
dss
security
40bn
onerous
Shifting Left for Proactive IT Security and ITSM
As organizations prioriti...
2024-11-7 23:15:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
itsm
cimcor
proactive
shifting
Adversary AI Threat Intelligence Content Added to the Tidal Cyber Knowledge Base
GenAI has become more preva...
2024-11-7 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
tidal
rachel
repository
threats
Permiso Adds Three More Open Source Cybersecurity Tools
Permiso today made available...
2024-11-7 22:43:34 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
bohannon
permiso
NIS2 Compliance: How to Get There
Later in the month, our found...
2024-11-7 21:56:49 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
nis2
utm
security
hut
Context Is King: From Vulnerability Management to Exposure Management
VM remains a cornerstone of...
2024-11-7 21:30:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
exposure
asset
signals
security
tenable
Runtime security in multi-cloud environments: best practices and importance
Understanding Runtime Security in Multi-Cloud EnvironmentsRuntime security in multi-cloud envir...
2024-11-7 20:43:5 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
analysis
monitoring
threats
Subverting LLM Coders
Abstract: Large Language Models (LLMs) have transformed code com-pletion tasks, providing context-...
2024-11-7 20:7:46 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
codebreaker
malicious
security
llms
extensive
NIST CSF 2.0 Critical
What is NIST CSF 2.0 Critical?NIST CSF CRITICAL is a custom cybersecurity framework designed to...
2024-11-7 17:6:31 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
csf
security
centraleyes
posture
Previous
12
13
14
15
16
17
18
19
Next