unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How Exertis and Seceon Are Redefining Cybersecurity for MSPs: A Partnership Built on Innovation
At Seceon’s 2024 Innovation and Certification Days, we had the privilege of showcasing one of the s...
2024-10-14 21:1:2 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
seceon
security
msps
exertis
Make Deployments Great Again: How to Use Helm with Continuous Deployment (CD)
Tiexin GuoOS Developer @Ubuntu CNCF ambassador | LinkedInAs Kubernetes (K8s) bec...
2024-10-14 21:0:17 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
argo
helm
gitops
argocd
chart
HICP vs. HIPAA: Understanding the Differences and Their Impact on Healthcare Compliance
When it comes to healthcare data security, HIPAA is the name everyone knows. It’s been around for d...
2024-10-14 19:46:37 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
hicp
hipaa
healthcare
threats
Perfectl Malware
Perfectl in an impressive piece of malware:The malware has been circulating since at...
2024-10-14 19:6:27 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
perfctl
security
schneier
malicious
machine
India, Latin America, or Vietnam: Where Should You Outsource Software Development in 2024?
As global markets become more interconnected and businesses strive for agility and cost-efficiency,...
2024-10-14 18:11:46 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
india
development
software
vietnam
outsourcing
IP Disclosure of Servers Behind WAFs Using Wordpress XML-RPC
By the end of the 90s, communication between distributed systems had become a crucial necessity. On...
2024-10-14 17:5:49 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securityboulevard.com
i4
wordpress
pingback
methodname
methodcall
Toxic Triad of Cloud Vulnerabilities Puts Businesses at Risk
Publicly exposed, critically vulnerable and highly privileged workloads are putting organizations a...
2024-10-14 16:30:52 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
workloads
kubernetes
Happy United States of America Indigenous Peoples’ Day
A Proclamation on Indigenous Peoples’ Day, 2021Since time immemorial, American Indians, Alas...
2024-10-14 16:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
indigenous
peoples
tribal
nations
nation
GUEST ESSAY: Achieving end-to-end data security with the right ‘fully homomorphic encryption’
By Ravi SrivatsavEveryone knows the cost and frequency of data breaches are rising. The question...
2024-10-14 15:59:7 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
fhe
encryption
security
hardware
Scytale Makes Tekpon’s Top Compliance Software List (Again!)
New York, NY, 14 October, 2024We’re so excited to once again be featured in Tekpon’s l...
2024-10-14 15:20:47 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
scytale
tekpon
software
proud
excited
Happy Canadian Thanksgiving / Joyeux Canadien Action de Grâce
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-10-14 15:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
webinars
security
boulevard
Kentucky Consumer Data Protection Act (KCDPA)
What is the KCDPA?The Kentucky Consumer Data Protection Act (KCDPA) is a state-level privacy law d...
2024-10-14 14:33:4 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
kcdpa
kentucky
security
consumers
ensuring
Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits
In the milestone 350th episode of the Shared Security Podcast, the hosts reflect on 15...
2024-10-14 12:0:18 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
satellite
emergency
ConfusedPilot: UT Austin & Symmetry Systems Uncover Novel Attack on RAG-based AI Systems
Executive SummaryResearchers at the Spark Research Lab (University of Texas at Austin)1, under the...
2024-10-14 05:40:22 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
austin
rag
symmetry
USENIX NSDI ’24 – Spectrumize: Spectrum-Efficient Satellite Networks for the Internet of Things
Authors/Presenters:Vaibhav Singh, Tusher Chakraborty, Suraj Jog, Om Chabra, Deepak Vasi...
2024-10-13 23:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
presenters
sincere
deepak
Patch-22: The Catch of Waiting to Fix Cybersecurity Vulnerabilities
One of the biggest dilemmas for security teams is when to patch vulnerabilities. This is a classic...
2024-10-13 21:35:14 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
veriti
security
unpatched
attackers
Misinformation, Online Scams Surging Following Historic Hurricanes
Bad actors often take advantage of natural disasters, and especially hurricanes, in ti...
2024-10-13 17:7:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
hurricane
lohrmann
stories
helene
USENIX NSDI ’24 – Known Knowns and Unknowns: Near-Realtime Earth Observation Via Query Bifurcation In Serval
Authors/Presenters:Bill Tao, Om Chabra, Ishani Janveja, Indranil Gupta, Deepak Vasisht...
2024-10-12 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
presenters
permalink
symposium
Transforming Cyber Risk Quantification and Vulnerability Prioritization with KnightVision
In today’s complex cyber landscape, managing risks effectively isn’t just about ide...
2024-10-12 09:20:12 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
cybersaint
Cost of Online Brand Impersonation: Customer Acquisition and Loyalty
Online brand impersonation is an insidious threat compared to more straightforward attacks. Ransomw...
2024-10-12 06:17:13 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
reputation
relations
acquire
acquisition
Previous
35
36
37
38
39
40
41
42
Next