unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Irony of Ironies: CISA Hacked — ‘by China’
U.S. Cybersecurity and Infrastructure Security Agency penetrated in February, via vuln in Ivanti.CI...
2024-3-12 01:17:53 | 阅读: 24 |
收藏
|
Security Boulevard - securityboulevard.com
security
ivanti
goblin
magnet
SBOMs and medical devices: An essential step — but no security cureall
The U.S. Federal Government has been hard at work releasing a plethora of guidelines — and mandates...
2024-3-12 01:12:34 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
software
fda
mdms
security
Randall Munroe’s XKCD ‘Earth/Venus Venn Diagram’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-3-12 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
irony
boulevard
ironies
Effective Supply Chain Risk Management
Whether we’re talking about mechanical components, or accounting software, countless b...
2024-3-12 00:56:48 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
vehicle
tier
jm
supplier
Phobos Unleashed: Navigating the Maze of Ransomware’s Ever-Evolving Threat
Threat Overview – PhobosThe Phobos Ransomware variant has been active since May of 201...
2024-3-12 00:10:30 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
phobos
hunt
windows
shadow
Threat Groups Rush to Exploit JetBrains’ TeamCity CI/CD Security Flaws
The cyberthreats to users of JetBrains’ TeamCity CI/CD platform continue to mount a week after the...
2024-3-11 23:7:30 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
jetbrains
rapid7
teamcity
USENIX Security ’23 – Yifan Yan, Xudong Pan, Mi Zhang, Min Yang – Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation
Home » Security Bloggers Network » USENIX Security ’23 – Yifan Yan, Xudong Pan, Mi Zhang, Min Yan...
2024-3-11 23:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
bloggers
network
Synthetic Identities, Synthetic Shoppers, and the Impact on eCommerce & Retail
Synthetic identity fraud continues to be a major point of concern for retailers. In fact, the Feder...
2024-3-11 22:28:6 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
synthetic
shoppers
retailers
shopper
ecommerce
Beware of OpenAI and ChatGPT-4 Turbo in Healthcare Orgs’ API Attack Surface
The rise of OpenAI and new changes with ChatGPT-4 Turbo will help to revolutionize the way healthca...
2024-3-11 22:0:24 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
chatgpt
cloud
healthcare
openai
Four Reasons Why SSH Key Management Is Challenging
SSH or secure shell is a secure network protocol that enables two devices or machines to connect an...
2024-3-11 21:45:26 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ssh
security
network
remote
lifecycle
Nation-state hackers access Microsoft source code and steal secrets
On January 12th Microsoft first detected a breach by Russian-backed nation-state hackers launched...
2024-3-11 21:37:26 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
attackers
attacker
stage
security
NextChat: An AI Chatbot That Lets You Talk to Anyone You Want To
With the advent of generative AI, AI chatbots are everywhere. While users can chat with large-langa...
2024-3-11 21:1:55 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
nextchat
security
49785
horizon3
ssrf
How to Streamline the Vulnerability Management Life Cycle
Today, organizations of all sizes face significant challenges due to the increasing number of vulne...
2024-3-11 21:0:20 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
addressing
Why WeSecureApp Rocks at Busting Payment Tampering Vulnerabilities
IntroductionHey folks, if you’ve been in the web security world for any length of time, you know t...
2024-3-11 17:48:35 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
tampering
wesecureapp
security
coupon
discount
What is Multi-Factor Authentication (MFA): What are its Benefits?
In today’s digital age, securing your online accounts and sensitive information is more crucial tha...
2024-3-11 17:22:9 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
otps
requiring
Three Major Challenges Faced by WAF in the Banking Industry
As the digital transformation is deepening, the banking industry is making efforts to build digital...
2024-3-11 16:21:31 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
centralized
analysis
banks
software
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when...
2024-3-11 12:0:22 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
spoofed
episodes
rats
HIPAA and Privacy Act Training Challenge Exam [XLS download]
Contemporary healthcare organizations are obligated to protect a vast amount of sensitive patient d...
2024-3-11 09:30:2 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
hipaa
healthcare
phi
patient
security
USENIX Security ’23 – Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang – Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Home » Security Bloggers Network » USENIX Security ’23 – Jialai Wang, Ziyuan Zhang, Meiqi Wang, H...
2024-3-10 23:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
bloggers
youtube
The Growing Threat of Application-Layer DDoS Attacks
In the cat-and-mouse game between DDoS hackers and defenders, it seems protection vendors have made...
2024-3-10 21:0:29 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
constantly
hire
floods
security
network
Previous
232
233
234
235
236
237
238
239
Next