unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Eclypsium CEO Yuriy Bulygin: Beware Compromised Firmware and Baseboard Management Controllers
The post Eclypsium CEO Yuriy Bulygin: Beware Compromised Firmware and Baseboard Ma...
2024-6-13 06:47:45 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
eclypsium
security
beware
baseboard
yuriy
UEFI Firmware Exploit Evades EDR
The post UEFI Firmware Exploit Evades EDR appeared first on Eclypsium | Supply Cha...
2024-6-13 06:43:53 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
eclypsium
evades
firmware
garland
Attacking an Internal Windows Medical Device from the Internet
The post Attacking an Internal Windows Medical Device from the Internet appeared f...
2024-6-13 06:40:22 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
eclypsium
windows
syndicated
appeared
Eclypsium Overview
The post Eclypsium Overview appeared first on Eclypsium | Supply Chain Security fo...
2024-6-13 06:36:11 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
eclypsium
security
appeared
bloggers
garland
What is ISO 27001 Compliance?
ISO 27001 compliance involves adhering to the International Organization for Standardization’s stan...
2024-6-13 05:38:33 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
27001
qmulos
automating
identify
What is Continuous Authority to Operate (cATO)?
Continuous Authority to Operate (cATO) is a dynamic approach to cybersecurity compliance that invol...
2024-6-13 05:35:35 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cato
posture
assessments
processes
Financial Institutions Must Reexamine Their Technology Setup
In today’s fast-evolving financial landscape where customer expectations and technological advancem...
2024-6-13 03:46:7 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
instant
issuance
entrust
institution
USENIX Security ’23 – Precise and Generalized Robustness Certification for Neural Networks
Authors/Presenters:Yuanyuan Yuan, Shuai Wang, Zhendong Su Many thanks to USENIX for...
2024-6-13 03:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
handelman
presenters
Proactive Application Security: Learning from the Recent GitHub Extortion Campaigns
A new threat actor group known as Gitloker has launched an alarming campaign that wipes victims’ Gi...
2024-6-13 02:22:42 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
github
ox
backup
attackers
Enhancing Corporate Security: The Value of Intelligence in Weather Related Threats
Article How to ensure the safety of corporate assets and personnel amidst increasingly frequent...
2024-6-13 01:27:51 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
tornadoes
severe
threats
Daniel Stori’s ‘Just Touch It’
via the inimitable Daniel Stori at Turnoff.US!Permalink*** This is a Security B...
2024-6-13 01:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
inimitable
authored
stori
permalink
Streamlining CLI Authentication: Implementing OAuth Login in Python
Pierre Lalanne Engineering Manager at GitGuardianWhen building an application t...
2024-6-12 23:43:53 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
ggshield
gitguardian
security
python
library
Ransomware Group Jumps on PHP Vulnerability
A long-running ransomware campaign that has been targeting Windows and Linux systems since 2019 is...
2024-6-12 23:43:29 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
php
windows
security
network
Billions: The New Significance of Billion-Dollar Scale in Cybersecurity
It seems like everywhere you look in (and around) the cybersecurity industry right now, there's a...
2024-6-12 23:20:4 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
dollar
raised
wiz
Understanding Audit Readiness Assessments: Their Importance and Whether You Need Them
As a compliance management software company, we at Hyperproof believe it’s important to hold oursel...
2024-6-12 23:0:49 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
auditor
readiness
hyperproof
27001
security
USENIX Security ’23 – CSHER: A System For Compact Storage With HE-Retrieval
Authors/Presenters:Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald Many thanks to...
2024-6-12 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
presenters
adi
The Ultimate Guide to Compliance Management System
In today’s business world, it’s important for organizations to follow laws and regul...
2024-6-12 22:45:10 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
sovy
regulations
regulatory
laws
ethical
Snowflake and the Continuing Identity Threat Detection Gap Across SaaS and Cloud
Snowflake link and broader impact identifiedThe next major development in this incident came wh...
2024-6-12 22:33:18 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
snowflake
security
cloud
mandiant
CVE-2024-29824 Deep Dive: Ivanti EPM SQL Injection Remote Code Execution Vulnerability
Ivanti Endpoint Manager (EPM) is an enterprise endpoint management solution that allows for centra...
2024-6-12 22:27:47 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
injection
remote
ivanti
Using AI for Political Polling
Public polling is a critical function of modern political campaigns and movements, but it isn’t wha...
2024-6-12 19:2:27 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
polling
agents
political
humans
demographic
Previous
150
151
152
153
154
155
156
157
Next