unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Datadog Report Surfaces Pair of Sophisticated AWS Attacks
A report published by Datadog suggests that cybercriminal activity aimed specifically at cloud infr...
2024-1-30 04:32:7 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
containers
ecs
malicious
clusters
Public Trust Certificates: A 2023 Recap and Projections for 2024
Looking Back at 20232023 was a year of change for Public Trust Certificates – discussions on reduc...
2024-1-30 04:20:36 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
brs
entrust
cabf
attestation
revocation
USENIX Security ’23 – Yizheng Chen, Zhoujie Ding, David Wagner – # Continuous Learning for Android Malware Detection
Tuesday, January 30, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsFe...
2024-1-30 04:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
bloggers
network
webinars
CVE-2024-23897: Assessing the Impact of the Jenkins Arbitrary File Leak Vulnerability
Last Wednesday, on January 24, 2024, the Jenkins team issued a security advisory disclosing a criti...
2024-1-30 03:14:38 | 阅读: 28 |
收藏
|
Security Boulevard - securityboulevard.com
jenkins
attacker
nodezero
windows
23897
Randall Munroe’s XKCD ‘Fast Radio Bursts’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-1-30 02:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
nayak
hamza
USENIX Security ’23 – Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz – Automated Cookie Notice Analysis and Enforcement
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-1-30 00:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
bloggers
network
Protecting Business from the Inside Out: A Layered Approach to Cybersecurity
In the ever-evolving world of cyber threats, protecting a business is akin to fortifying a castle....
2024-1-29 23:57:33 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
castle
network
Decoding the Maze: A Guide to Cyber Security Risk Assessment Models
In today’s digital age, organizations face the constant threat of cyber attacks. Sa...
2024-1-29 22:50:5 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cybersaint
security
clearly
delfin
Introducing the Wallarm 2024 API ThreatStatsTM Report
The Wallarm Security Research team is pleased to share the latest version of our API ThreatStats re...
2024-1-29 22:7:29 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
wallarm
analysis
threats
Why CNAPP Will Be a Key Enabler for DevSecOps in 2024
A cloud-native application protection platform, or CNAPP, provides comprehensive security coverage...
2024-1-29 22:0:37 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
cnapp
cloud
development
unified
Improved SoD Results Accuracy
Use enhanced AND/OR logic to exclude false positives for given rules and reduce the total number...
2024-1-29 21:6:31 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
positives
violations
enhanced
reducing
unnecessary
Mitigate Enterprise Software Supply Chain Security Risks – Insights Into the Gartner Report
Gain insights into the Gartner® report and learn how to mitigate enterprise software supply chain r...
2024-1-29 21:6:17 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
sboms
assessments
development
Improved Access Review
Periodic Access Review (PAR) is the periodic process of attesting that a set of employees has the a...
2024-1-29 21:2:7 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
periodic
safepaas
erp
iga
grained
What the Charges Against the SolarWinds CISO Mean for Security in 2024
The indictment of the SolarWinds CISO by the Securities and Exchange Commission (SEC) served as a h...
2024-1-29 21:0:34 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
cisos
ciso
Fix Available for Critical Jenkins Flaw That Leads to RCE Attacks
Organizations are being urged to fix two security vulnerabilities in Jenkins that could allow unaut...
2024-1-29 20:0:7 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
jenkins
attackers
maintainers
security
Difference in Traditional Vulnerability Management vs. Risk-based Vulnerability Management
The key difference between risk-based vulnerability management (RBVM) and traditional vulnerability...
2024-1-29 19:16:50 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
rbvm
security
strobes
threats
Ten Simple Steps to Improve SOC Efficiency
Even the most sophisticated Security Operations Centers can struggle to improve SOC efficiency Any...
2024-1-29 17:36:49 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
efficiency
threats
CISA Mandates Urgent Patching for Citrix NetScaler Vulnerabilities
In a recent move to bolster cybersecurity defenses, CISA has issued a directive to U.S. federal age...
2024-1-29 17:0:11 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
netscaler
citrix
security
adc
Cybersecurity in Review: The Alarming Trend of Unsupported Systems
Quick question: when is it ok to run a networked system without updates? If the answer takes more...
2024-1-29 16:0:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
eol
tuxcare
unsupported
migration
DEEP TECH NEWS: Respecting individual rights by using ‘privacy preserving aggregate statistics’
By Byron V. AcohidoTo sell us more goods and services, the algorithms of Google, Facebook and Ama...
2024-1-29 15:20:52 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
boyle
aggregate
analysis
preserving
pieces
Previous
272
273
274
275
276
277
278
279
Next