unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
K-12 Google & Microsoft 365 Data Loss Prevention using Cloud Monitor by ManagedMethods
Far too often, we hear about schools facing cybersecurity crises because of a simple human err...
2024-10-21 19:5:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
district
dlp
microsoft
Escape vs Qualys
Qualys has often been synonymous with DAST and has been a major player in the application security...
2024-10-21 18:25:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
qualys
security
dast
developers
New Anti-Bot Services on the Dark Web Help Phishing Pages Bypass Google’s Red Page
Novel anti-bot services are being advertised on the dark web, offering cybercriminals advanced too...
2024-10-21 17:0:32 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
security
slashnext
bots
otus
Policy as code in Kubernetes: security with seccomp and network policies
The dynamic world of Kubernetes and cloud security is constantly evolving. As we explore this compl...
2024-10-21 12:21:6 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
kubernetes
security
network
seccomp
gitops
BSides Exeter – Ross Bevington’s Turning The Tables: Using Cyber Deception To Hunt Phishers At Scale
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-10-21 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
bloggers
Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion
Over the past 6 months I have been researching ransomware, and not even from the technical angle (w...
2024-10-21 02:51:18 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
security
attackers
cloud
downtime
DEF CON 32 – AppSec Considerations From The Casino Industry
Authors/Presenters:Aleise McGowan, Tennisha MartinOur sincere appreciation to DEF CON...
2024-10-20 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
aleise
publishing
USENIX NSDI ’24 – Reasoning About Network Traffic Load Property at Production Scale
Authors/Presenters:Ruihan Li, Fangdan Ye, Yifei Yuan, Ruizhen Yang, Bingchuan Tian, Tia...
2024-10-20 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
presenters
yifei
marc
USENIX NSDI ’24 – Crescent: Emulating Heterogeneous Production Network at Scale
Authors/Presenters:Zhaoyu Gao, Anubhavnidhi Abhashkumar, Zhen Sun, Weirong Jiang, Yi Wa...
2024-10-20 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
presenters
youtube
abhashkumar
regency
USENIX NSDI ’24 – A High-Performance Design, Implementation, Deployment, and Evaluation of The Slim Fly Network
Authors/Presenters:Nils Blach, Maciej Besta, Daniele De Sensi, Jens Domke, Hussein Hara...
2024-10-19 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
usenix
regency
security
Managing Foreign Government Information (FGI) on a Network
If you’re a firm that works with foreign governments, in addition to certifications like ISO 27001...
2024-10-19 07:12:7 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
fgi
marking
security
classified
Pentesting Authentication
Why Pentest Authentication?Authentication controls are the first line of defense to protect applic...
2024-10-19 05:46:6 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
bypass
pentesters
Get an Untrusted Security Advisor! Have Fun, Reduce Fail!
Many organizations are looking for trusted advisors, and this applies to our beloved domain of cybe...
2024-10-19 05:35:28 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
llms
llm
advisor
genai
Is End-User Cybersecurity Training Useless? Spoiler Alert: It’s Not!
Chris Clements, VP of Solutions Architecture October 18, 2024Because of the frequency of p...
2024-10-19 03:33:40 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
security
chris
seatbelts
USENIX NSDI ’24 – MESSI: Behavioral Testing of BGP Implementations
Authors/Presenters:Rathin Singha, Rajdeep Mondal, Ryan Beckett, Siva Kesava Reddy Kakar...
2024-10-19 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
usenix
youtube
nocookie
AI-Generated Personas: Trust and Deception
And the Ethical Dilemma of Using AI to Create Fake Online PersonalitiesIn recent years, advancemen...
2024-10-19 02:36:43 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
personas
ethical
dod
stylegan
moral
Seceon at GITEX Global 2024: Driving Cybersecurity Innovation with Tech First Gulf
In today’s ever-evolving cybersecurity landscape, organizations are grappling with a delicate balan...
2024-10-19 01:53:55 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
seceon
gitex
gulf
efficiency
Daniel Stori’s Turnoff.US: ‘bash-gptl’
via the inimitable Daniel Stori at Turnoff.US!Permalink*** This is a Security B...
2024-10-19 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
geek
security
bloggers
USENIX NSDI ’24 – Netcastle: Network Infrastructure Testing At Scale
Authors/Presenters:Rob Sherwood, Jinghao Shi, Ying Zhang, Neil Spring, Srikanth Sundare...
2024-10-18 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
usenix
shi
youtube
saha
The transformation of open source: Lessons from the past decade
Over the past decade, the world of open source software has undergone a seismic tra...
2024-10-18 22:45:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
decade
syndicated
network
Previous
29
30
31
32
33
34
35
36
Next