unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting
Authors/Presenters:Leo Stone, Rishi Ranjan, Stefan Nagy, Matthew Hicks Many thanks t...
2024-6-18 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
leo
publishing
Randall Munroe’s XKCD ‘Broken Model’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-6-18 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
usenix
boulevard
Leveraging ASNs and Pivoting to Uncover Malware Campaigns
Identifying and Mitigating Complex Malware Campaigns with ASNsThis week, I spent a good deal o...
2024-6-18 00:0:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
asns
cti
uncover
pivoting
hyas
Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing
Revolutionizing Cybersecurity with NodeZero™ for Comprehensive Risk Assessment and PrioritizationT...
2024-6-17 23:53:45 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
nodezero
security
autonomous
Open Source Licensing 101: Everything You Need to Know
Open-source software has revolutionized the tech industry, fostering collaboration, innovation, an...
2024-6-17 23:17:17 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
software
permissive
copyleft
patent
gpl
Four Common Firewall Misconfigurations That Give Access To Bad Actors
When Jody Brazil first launched FireMon, it was out of necessity to log firewall po...
2024-6-17 22:5:46 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
woods
firemon
network
Leadership Expansion: Introducing Our New SVP of Sales and SVP of Customer
It’s an exciting time here at Hyperproof! We are thrilled to announce that two new sen...
2024-6-17 22:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
hyperproof
mike
jay
svp
hussein
Finding mispriced opcodes with fuzzing
By Max AmmannFuzzing—a testing technique that tries to find bugs by repeatedly executing test case...
2024-6-17 21:0:43 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
fuel
corpus
fuzzer
harness
sway
Mobile SDK Security: Effective Testing Methodology
In mobile penetration testing, third-party modules or libraries are often considered out of scope f...
2024-6-17 20:54:12 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
analysis
encryption
Optimizing SCA Use in CI Pipelines for Advanced DevSecOps
With the continuously accelerating speed of application development, integrating DevSecOps automati...
2024-6-17 20:44:34 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
deepfactor
security
jenkins
integrating
The Ultimate Guide to Troubleshooting Vulnerability Scan Failures
Vulnerability scans evaluate systems, networks, and applications to uncover security vulnerabilitie...
2024-6-17 19:35:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
failures
requirement
Using LLMs to Exploit Vulnerabilities
Interesting research: “Teams of LLM Agents can Exploit Zero-Day Vulnerabilities.”Abst...
2024-6-17 19:8:19 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
agents
llm
planning
schneier
Ubuntu 23.10 Reaches End of Life on July 11, 2024
Ubuntu 23.10, codenamed “Mantic Minotaur,” was released on October 12, 2023, nearly nine months ago...
2024-6-17 17:0:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
interim
tuxcare
kernelcare
upgrading
How Automated Linux Patching Boosts Healthcare Security
Healthcare organizations worldwide are facing a surge in cyberattacks.The healthcare industry is...
2024-6-17 16:0:53 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
security
patient
tuxcare
7000 LockBit Ransomware Decryption Keys Distributed By FBI
In a significant move aimed at aiding victims of cyberattacks, the U.S. Federal Bureau...
2024-6-17 15:0:24 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
lockbit
security
assistance
The Seven Things You Need to Know About Cyber Insurance
Cyber insurance is not cybersecurity. But cyber insurance and cybersecurity, when combined, can pro...
2024-6-17 14:0:22 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
insurance
security
sell
analysis
USENIX Security ’23 – We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets
Authors/Presenters:Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Rob...
2024-6-17 03:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
marriott
jörg
How we differentiate ARMO Platform from Open Source Kubescape
First update: June 11th, 2023 / Second update: June 16th, 2024In August 2021 we launched Kubescape...
2024-6-17 01:5:58 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
armo
security
kubescape
kubernetes
rbac
What is Identity Threat Detection And Response (ITDR)
Identity Threat Detection and Response (ITDR) is a framework that focuses on protecting your organi...
2024-6-16 18:34:3 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
itdr
identities
security
astrix
cloud
Microsoft Accepts Responsibility for U.S. Government Security Breaches
read file error: read notes: is a directory...
2024-6-16 01:23:1 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
smith
security
software
Previous
146
147
148
149
150
151
152
153
Next