unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Third-Party Cybersecurity Risk Management: A Short Guide for 2024
Third-parties are an important part of your extended enterprise. They’re your vendors, your partne...
2024-2-1 05:24:56 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
leaders
flare
parties
AppOmni Harnesses Google Data Center in Australia to Address Regional Demand for Specialised SaaS Security Solutions
San Francisco, CA – [January 31, 2024] – AppOmni, the pioneer of SaaS security posture management...
2024-2-1 04:12:27 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
appomni
security
centre
australia
posture
USENIX Security ’23 – Evading Provenance-Based ML Detectors With Adversarial System Action
Author/Presenters: Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, James Wei, Feng...
2024-2-1 04:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
originating
presenter
Shadow SaaS from Business-Led IT Leads to IAM Technical Debt
In today’s rapidly evolving digital landscape, security and risk management leaders ar...
2024-2-1 03:51:4 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
debt
shadow
grip
integrating
How to Prepare for a Cyberattack
Deciphering the Cyber Invasion TerrainWe exist in an era deeply entrenched in digital dependence,...
2024-2-1 03:35:51 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
duplication
software
039
threats
News alert: Reken raises $10M from Greycroft to protect against generative AI-enabled fraud
San Francisco, Calif., Jan. 31, 2024 – Reken, an AI & cybersecurity company, today announced the cl...
2024-2-1 02:25:46 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
reken
greycroft
generative
threats
shuman
New Threat Intelligence Reveals Top 5 Threats to Mobile Devices
Mobile devices are facing a growing number of threats, particularly from bot attacks. The surge in...
2024-2-1 02:22:43 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
threats
arkose
security
attackers
Daniel Stori’s ‘Help’
via the webcomic talent of the inimitable Daniel Stori at Turnoff.US.Permalink*...
2024-2-1 02:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
security
permalink
syndicated
marc
Russian Internet Outage: DNSSEC Oops or Ukraine Hack?
Government ministry denies hackers hacked its network infrastructure.The Russian internet was down...
2024-2-1 01:42:12 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
dnssec
outage
russia
ukrainian
richi
Tax Season is Upon Us, and So Are the Scammers
It’s still relatively early in the year, but bad actors are already targeting accounting and financ...
2024-2-1 00:59:44 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
tax
ta576
larson
proofpoint
irs
Guardians of IoT: Addressing IoT security vulnerabilities in electric vehicles and charging stations
The surge in electric vehicles (EVs) and expanding EV charging infrastructure represen...
2024-2-1 00:23:35 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
charging
vehicle
security
signals
Supply Chain Security and NIS2: What You Need to Know
The Network Information Systems Directive (NIS2) and its predecessor NIS focus on risk management...
2024-2-1 00:13:38 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
nis2
security
nis
flare
7 types of food delivery scams and how to stop them
Business is booming for online food delivery services and apps, meal kit providers, and grocery op...
2024-2-1 00:4:16 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
food
sift
fraudsters
security
software
USENIX Security ’23 – Black-box Adversarial Example Attack Towards FCG Based Android Malware Detection Under Incomplete Feature Information
Author/Presenters: Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan,...
2024-2-1 00:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
yuan
youtube
jre11w
A Recap of Cybersecurity in 2023 and What’s Ahead for 2024
With high-profile breaches in the news across the world and increasingly sophisticated threat...
2024-1-31 23:30:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
hyas
jay
joe
The Crucial Role of CSPM Tools and Practices to Secure Cloud-Based IT Systems
The migration to cloud-based systems has become a necessity for organizations seeking to stay compe...
2024-1-31 23:0:40 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
cspm
ensuring
posture
Introducing DIFFER, a new tool for testing and validating transformed programs
By Michael BrownWe recently released a new differential testing tool, called DIFFER, for finding b...
2024-1-31 22:30:48 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
differ
software
debloating
comparators
US Sanctions Three for Cyber Work for ISIS
The United States is hitting two Egyptian nationals with sanctions for allegedly creating and maint...
2024-1-31 22:23:10 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
isis
ehf
mu
mawji
syria
Protect AI Acquires Laiyer AI to Better Secure AI Models
Protect AI announced today it has acquired Laiyer AI, a provider of open source softwar...
2024-1-31 22:0:52 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
software
laiyer
llm
regulations
Confronting the SaaS Data Protection and Security Crisis
With SaaS becoming an indispensable part of the business landscape, a rapidly emerging crisis is on...
2024-1-31 22:0:19 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
backup
cloud
ransomware
apocalypse
Previous
269
270
271
272
273
274
275
276
Next