unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
SCADA systems: How secure are the systems running our infrastructure?⎥Malav Vyas (Security Researcher at Palo Alto Networks)
Welcome to the Elephant in AppSec, the podcast to explore, challenge, and boldly face the AppSec E...
2024-1-5 18:10:13 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
scada
security
malav
tristan
$22 Million Wake-up Call to Improve Security
A former Jacksonville Jaguars staff member is facing the possibility of a 30-year prison sentence a...
2024-1-5 16:9:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
processes
monitoring
reviews
duties
JavaScript Malware: 50,000+ Bank Users at Risk Worldwide
In a disconcerting revelation, a newly identified strain of JavaScript malware has set its sights o...
2024-1-5 15:0:55 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
malicious
phishing
How Can Data Breach Be A Trouble For Your Industry?
Recent developments in the modern world have brought attention to the significance of cybersecurity...
2024-1-5 14:32:1 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
sands
security
marina
bay
threats
Troubleshooting for NTA and ADS Automatic Diversion
When NTA detects abnormal traffic, it can notify ADS to divert the traffic. ADS sends r...
2024-1-5 12:10:18 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
diversion
injection
nta
network
security
Survey Surfaces Lack of Confidence in Existing Cybersecurity Tools
A survey of 214 senior executives involved in cybersecurity decisions found more than h...
2024-1-5 05:9:39 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
mcgarry
senior
stacks
fewer
SentinelOne Acquires PingSafe to Advance CNAPP Ambitions
SentinelOne this week announced it is acquiring PingSafe to add a cloud-native applicat...
2024-1-5 04:8:44 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
cnapp
pingsafe
cnapps
threats
USENIX Security ’23 – Sathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves – ‘Diving into Robocall Content With SnorCall’
No one specificallySomeone on our general security teamA dedicated person/team that handles...
2024-1-5 04:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
developers
architects
Software Supply Chain Security Deconstructed
In the last several years, software supply chain security has become a critical focus for organizat...
2024-1-5 03:28:58 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
developers
cycode
Netography Fusion Expands Microsoft Integrations for Greater Context Enrichment and Faster Compromise Detection
Netography Fusion Expands Microsoft Integrations for Greater Context Enrichment and Faster Compromi...
2024-1-5 02:30:4 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
fusion
cloud
defender
network
Your Guide to Building a Successful Attack Surface Management Strategy
At its core, Attack Surface Management (ASM) is the process of identifying and managin...
2024-1-5 02:18:15 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
identify
asset
Randall Munroe’s XKCD ‘2024’
No one specificallySomeone on our general security teamA dedicated person/team that handles...
2024-1-5 02:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
architects
developers
From Log4j to Long4j
Two years ago, many of us in the Java community woke up to a “December to Remember” thanks to a rem...
2024-1-5 01:50:41 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
log4j
security
azul
fatigue
library
Structuring the Unstructured: Consolidating Reports into One Cohesive Record
Article Discover how combining your investigative research into a configurable, cohesive report...
2024-1-5 01:10:3 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ontic
cohesive
EDR – More Than An Acronym
Cyber threat actors continue to focus much of their sights and tactics on compromising endpoint dev...
2024-1-5 01:3:27 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
mdr
threats
nuspire
network
Embattled LastPass Enforcing 12-Character Passwords for All
Password manager vendor LastPass, beset by high-profile data breaches from 2022 that affected milli...
2024-1-5 00:0:17 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
lastpass
passwords
kosak
requirement
fewer
USENIX Security ’23 – Changlai Du, Hexuan Yu, Yang Xiao, Y. Thomas Hou, Angelos D. Keromytis, Wenjing Lou – ‘UCBlocker: Unwanted Call Blocking Using Anonymous Authentication’
Home » Promo » Cybersecurity » USENIX Security ’23 – Changlai Du, Hexuan Yu, Yang Xiao, Y. Thomas...
2024-1-5 00:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
handelman
Enhancing Web Security: NSFOCUS WAF Integration Solutions
According to an industry report, over 75% of cybersecurity attacks target the web application layer...
2024-1-4 23:30:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
reputation
network
isop
‘everything’ matters — why the npm package sparked controversy
Cloud Security, Governance and Skills in 2024 ...
2024-1-4 23:15:12 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
governance
23andMe: It’s YOUR Fault We Lost Your Data
DNA testing firm doubles down on blaming victims and sics lawyer on them.Millions of 23andMe users...
2024-1-4 22:21:26 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
23andme
passwords
security
recycled
firm
Previous
295
296
297
298
299
300
301
302
Next