unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information
Authors/Presenters: *Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyan...
2024-4-20 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
nocookie
marriott
What is Mobile Application Security Testing? Explained
Mobile application security testing is a critical aspect of modern software development, driven by...
2024-4-20 17:46:39 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
developers
passwords
Baby ASO: A Minimal Viable Transformation for Your SOC
Vaguely relevant but very cyber image from Dall-EOne pattern I spotted after looking at the evolut...
2024-4-20 06:43:41 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
anton
aso
dna
LabHost Phishing Platform is Latest Target of International Law Agencies
The takedown this week of a massive phishing-as-a-service (PhaaS) operation spanned law enforcement...
2024-4-20 03:46:36 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
labhost
police
phaas
Choosing SOC Tools? Read This First [2024 Guide]
Security operations centers (SOCs) are the front lines in the battle against cyber threats. They us...
2024-4-20 03:17:47 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
notable
threats
soar
network
USENIX Security ’23 – GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation
Authors/Presenters: *Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel G...
2024-4-20 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
presenters
shahin
SafeBreach Coverage for AA24-109A (Akira Ransomware)
Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach On April 18th, the United Sta...
2024-4-20 02:56:25 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
akira
ransomware
windows
mimikatz
safebreach
Taking Time to Understand NIS2 Reporting Requirements
The newest version of the European Union Network and Information Systems directive, or NIS2, came i...
2024-4-20 01:53:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
nis2
security
directive
imperva
Daniel Stori’s ‘WC’
via the inimitable Daniel Stori at Turnoff.US!Permalink*** This is a Security B...
2024-4-20 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
inimitable
authored
geek
permalink
USENIX Security ’23 – Inductive Graph Unlearning
Authors/Presenters: *Cheng-Long Wang, Mengdi Huai, Di Wang*Many thanks to USENIX for...
2024-4-19 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
tj6
outstanding
From DAST to dawn: why fuzzing is better solution | Code Intelligence
Security testing allows you to evaluate the robustness of applications and systems...
2024-4-19 22:52:45 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
dast
security
attackers
weaknesses
software
Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24
Insight #1One of the most significant errors an organization can make is assuming...
2024-4-19 21:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
smbs
lindner
prevalent
Scaling Application Security With Application Security Posture Management (ASPM)
Did you know that the total number of data breaches more than tripled between 2013 and 2022? These...
2024-4-19 19:51:53 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
aspm
cloud
posture
development
Crunching Some Numbers on PHP Support
PHP Extended Lifecycle Support (ELS) allows you to continue using older versions of PHP while still...
2024-4-19 16:0:45 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
php
security
tuxcare
ensuring
crunching
Google Chrome DBSC Protection Tested Against Cookie Attacks
In light of cookie stealing attacks and to ensure Chrome browser protection, Google has recently pi...
2024-4-19 15:0:58 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
dbsc
chrome
security
malicious
What is SOC 2 Compliance Audit?
Our digital world is based on connectivity, but with that comes great responsibility. Businesses ma...
2024-4-19 13:31:50 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
auditor
audits
commitment
The Dark Side of EDR: Repurpose EDR as an Offensive Tool
Endpoint detection and response (EDR) solutions have become a key component of many enterprise end...
2024-4-19 12:30:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cortex
security
ransomware
bypass
lua
NTA Email Alert Configuration
There are two separate email configurations on NTA which do not affect each other. One...
2024-4-19 10:12:48 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
nta
network
threshold
protects
The Ultimate Guide to SBIR and STTR Program Budgeting
The world advances based on innovation, and innovation can come from anywhere. The trouble is that...
2024-4-19 08:42:5 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
sbir
sttr
funding
fund
innovation
Finding Losses in Gains: Loss of Funds in Forks of Gains Network
SummaryDuring a recent exploration of a fork of Gains Network, we discovered two critical issues...
2024-4-19 08:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
openprice
gains
pairindex
trader
profit
Previous
194
195
196
197
198
199
200
201
Next