unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Entro Streamlines Machine Identity Life Cycle Management
Entro has added a life cycle management capability to its namesake platform for discovering and man...
2024-3-5 04:29:11 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
identities
machine
software
alvas
USENIX Security ’23 – Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao – Glaze: Protecting Artists From Style Mimicry By Text-to-Image Models
Distinguished Paper Award Winner and Co-Winner of the 2023 Internet Defense PrizeMany...
2024-3-5 04:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
winner
security
usenix
youtube
anaheim
Researchers Give Birth to the First GenAI Worm
It was bound to happen — researchers have created a 1st generation AI worm that can s...
2024-3-5 03:9:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
worm
malicious
genai
propagate
security
Daniel Stori’s ‘Obfuscated Code’
via the inimitable Daniel Stori at Turnoff.US.Permalink*** This is a Security B...
2024-3-5 02:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
inimitable
geek
daniel
CISA Warns Phobos Ransomware Groups Attacking Critical Infrastructure
Phobos, a complex ransomware-as-a-service (RaaS) operation that has been around for five years and...
2024-3-5 01:3:23 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
phobos
ransomware
faust
smokeloader
affiliates
Demystifying the Maze: A Guide to Cyber Risk Quantification Methods
Cybersecurity is no longer just about firewalls and antivirus software. In today’s...
2024-3-5 00:38:23 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
cybersaint
firewalls
compass
USENIX Security ’23 – Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan – Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
Home » Security Bloggers Network » USENIX Security ’23 – Evangelos Bitsikas, Theodor Schnitzler,...
2024-3-5 00:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
bloggers
youtube
network
HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)
Today Yubico announced the expansion of its YubiKey Bio Series to include multi-protoc...
2024-3-4 23:17:33 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
hypr
yubikey
bio
Response to CISA Advisory (AA24-060B): Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways
On February 29, 2024, the U.S. Cybersecurity & Infrastructure Security Agency (CISA)...
2024-3-4 23:1:19 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackiq
centre
ivanti
BlackFog Wins teissAwards2024 for Best Threat Intelligence Technology
BlackFog shines as innovator with anti data exfiltrationCheyenne, Wyoming, March 4—BlackFog,...
2024-3-4 22:49:5 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
blackfog
ransomware
award
security
awards
5 Ways to Prevent Prompt Injection Attacks
Prompt injection attacks are a form of cybersecurity threat that specifically target systems powere...
2024-3-4 22:0:9 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
injection
malicious
security
prompts
attackers
Revolutionizing Identity Theft with AI
How are we revolutionizing identity theft with AI? In an age where digital footprints are as unique...
2024-3-4 21:25:6 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
constella
threats
simulations
security
LLM Prompt Injection Worm
Researchers have demonstrated a worm that spreads through prompt injection. Details:I...
2024-3-4 20:1:52 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
genai
worm
malicious
injection
schneier
In the News | Equip and Educate Students to Combat Cyberthreats
This article was originally published in EdTech Magazine on 2.22.24 by Charlie Sander,...
2024-3-4 19:12:48 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
schools
magazine
Cybersecurity’s “Shift Up” Moment With CRQ | Kovrr
What Is a “Shift Up” Strategy, and Why It’s NecessaryToday, cybersecurity is evolving into cybe...
2024-3-4 18:59:25 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
regulatory
economic
Ubuntu 18.04 Security Updates for Linux Kernel Vulnerabilities
Recently, Ubuntu has rolled out security updates addressing several Linux kernel vulnerabilities in...
2024-3-4 17:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
attacker
tuxcare
utilize
Risk and Regulation: A Strategic Guide to Compliance Risk Assessment
Compliance Risk Assessments For a Dynamic Regulatory TerrainCrafting an effective compliance progr...
2024-3-4 15:44:31 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
regulatory
identify
centraleyes
regulations
ensuring
A Guide to Cybersecurity Compliance in the Manufacturing Sector
The manufacturing sector is one of the most extensive, exceptionally varied, and swiftly evolving s...
2024-3-4 15:24:43 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
regulations
sectrio
LockBit Ransomware Bounty: US Offers $15 Million In Reward
In a landscape where cyber threats loom large, the hunt for cybercriminals intensifies. Today, we’r...
2024-3-4 15:0:15 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
lockbit
ransomware
affiliates
criminal
threats
USENIX Security ’23 – Liang Niu, Shujaat Mirza, Zayd Maradni, Christina Pöpper – CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s...
2024-3-4 00:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
presenter
commitment
Previous
239
240
241
242
243
244
245
246
Next