unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Cloud Monitor Automation Thwarts Phishing & Malware Emails
We recently hosted Michael Tapia, Chief Technology Director at Clint ISD in Texas, and...
2024-5-4 05:33:9 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
kobe
brummet
MY TAKE: Is Satya Nadella’s ‘Secure Future Initiative’ a deja vu of ‘Trustworthy Computing?’
By Byron V. AcohidoSAN FRANCISCO — On the eve of what promises to be a news-packed R...
2024-5-4 03:36:29 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
microsoft
software
development
sfi
Palo Alto Networks Extends SASE Reach to Unmanaged Devices
Palo Alto Networks this week extended its secure access service edge (SASE) platform to make it pos...
2024-5-4 03:3:10 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
alto
prisma
palo
USENIX Security ’23 – Cryptographic Deniability: A Multi-perspective Study of User Perceptions and Expectations
Authors/Presenters: Tarun Kumar Yadav, Devashish Gosain, Kent SeamonsMany thanks to U...
2024-5-4 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
gosain
network
The impact of automating open source dependency management
Recently, I chatted with developers from a customer in a heavily regulated industry...
2024-5-4 02:51:15 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
regulated
crucial
jamie
coleman
Unlocking SMB Cybersecurity: The Rise of Virtual CISOs in 2024 and Beyond
This year, virtual CISOs must begin making a difference in our industry. For the longest time,...
2024-5-4 02:49:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
smbs
security
experienced
vciso
Vulnerability of the Month – Controversy of the JetBrains TeamCity CVE-2024-27198 & CVE-2024-27199
In this blog series, we look at a new CVE each month and discuss its impact, discovery, and remedi...
2024-5-4 02:42:28 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
teamcity
jetbrains
rapid7
security
Navigating Container Security with AttackIQ’s Optimization Solutions
Understanding Container Security ChallengesThe use of containers introduces a complex layer of...
2024-5-4 02:15:17 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackiq
containers
enhancing
IronRadar Reforged
What is IronRadarSM, and why is it important?Cybersecurity organizations are fight...
2024-5-4 01:36:42 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
ironnet
network
feeds
feasible
CEO Discusses MDR Service With a Risk-Based Approach
Every organization has its own combination of cyber risks, including endpoints, internet-connected...
2024-5-4 01:31:31 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
doug
mdr
pondurance
network
GitLab ‘Perfect 10’ Bug Gets a CISA Warning: PATCH NOW
U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns GitLab users of 100-day-old, max...
2024-5-4 01:5:12 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
gitlab
richi
exploited
attacker
7028
Our New “Days of Rage” Protest Activity and Considerations for Corporate Security
3 TakeawaysPerspective is important, 1968-1972 was much more violent in America Understand your...
2024-5-4 00:51:3 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
protests
facilities
campus
executives
Understanding the Link Between API Exposure and Vulnerability Risks
In a digital+ world, there is no escaping “vulnerabilities.” As software development grows more com...
2024-5-3 23:21:45 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
exposure
hygiene
assessing
Randall Munroe’s XKCD ‘Alphabetical Cartogram’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-5-3 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
libraryhome
Streamline NIS2 Compliance with Automation
It’s no secret that NIS2 is around the corner, and that this directive is full of stringent rules,...
2024-5-3 22:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
nis2
security
swimlane
turbine
directive
Cybersecurity Insights with Contrast CISO David Lindner | 5/3/24
Insight #1Here we go again: Verizon’s new Data Breach Investigations Report (DBIR)...
2024-5-3 21:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
appsec
lindner
network
dast
A Closer Look at Top 5 Vulnerabilities of April 2024
Keeping pace with the latest cybersecurity threats is vital for organizations of all sizes. Here at...
2024-5-3 20:30:33 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackers
software
flowmon
Insider Risk Digest: April
Dive into our latest Insider Risk Digest, where we unravel recent cases of espionage, insider b...
2024-5-3 19:14:52 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
insider
rowe
european
jr
espionage
CVE-2024-27322 Should Never Have Been Assigned And R Data Files Are Still Super Risky Even In R 4.4.0
I had not planned to blog this (this is an incredibly time-crunched week for me) but CERT/CC and CI...
2024-5-3 18:12:52 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
quit
srcref
srcfile
abused
rud
The Persistent Threat of Path Traversal Vulnerabilities in Software Development
Path traversal vulnerabilities, or directory traversal, are now subject to a government advisory fo...
2024-5-3 17:35:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
crucial
development
Previous
180
181
182
183
184
185
186
187
Next