unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Model Extraction Attack on Neural Networks
Adi Shamir et al. have a new model extraction attack on neural networks:Polynomial Ti...
2023-10-10 19:9:49 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
polynomial
network
schneier
carlini
security
Security and Safety of Decentralized Finance (DeFi) Platforms
In recent years, Decentralized Finance, commonly referred to as DeFi, has surged in popularity as a...
2023-10-10 18:14:10 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
defi
security
finance
GUEST ESSAY: How tech tricks used by Amazon, Netflix aid Ukraine in repelling Russia’s invasion
By Mark RushtonAs tragic as it is, we are in a space where video has become a crucia...
2023-10-10 15:3:18 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
ukraine
military
security
isr
ukrainian
Meet Hackie-AI, The New Kid on the Block.
2 min read·Just now—Seeing global hackers on Interpol, FBI, and Scotland Yard’...
2023-10-10 03:48:40 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
hackie
llms
cisos
The Ultimate Guide to Compliance Framework Crosswalking
The compliance landscape is complex and ever-evolving, with new framework and control requirements...
2023-10-10 03:18:17 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
identify
client
processes
obligations
FTC: Americans lost $2.7 Billion Since 2021 to Social Media Scams
Americans lost a whopping $2.7 billion in scams that reached them via social media, and the actual...
2023-10-10 03:15:28 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
ftc
fletcher
investment
consumers
accounted
Perfect Loader Implementations
Thank you to SpecterOps for supporting this research and to Lee and Sarah for proofreading and edit...
2023-10-10 01:28:18 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
loader
memory
windows
library
developers
Security Scanning Tools Defined: SAST, IaC, SCA, DAST, IAST/RASP, Container Runtime Security and Runtime SCA
Security Scanning Tools OverviewThere are significant changes happening in the world of software d...
2023-10-10 01:17:43 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
security
dast
software
deepfactor
How to Protect Against Data Lake Hacking
Data lakes, or centralized repositories for large-scale data, are a popular solution for data stora...
2023-10-10 00:31:15 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
lake
monitoring
lakes
cloud
ssn
A Growing Cyberwar in the Widening Israeli-Hamas Conflict
The unprecedented assault by Hamas on Israel over the weekend brought with it cyberattacks by a num...
2023-10-10 00:30:38 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
israel
israeli
kinetic
hamas
Unlock 2023’s Patch Management Best Practices: What You’re Missing
IntroductionIn 2023, patch management best practices are more crucial than ever for safeguarding y...
2023-10-10 00:29:37 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
network
software
security
crucial
News alert: Georgia State receives a $10 million grant to research AI, robotics and edge computing
Atlanta, GA, Oct. 9, 2023 — Jonathan Shihao Ji, a computer science professor at Georgia State Univ...
2023-10-10 00:27:37 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ji
georgia
spot
robotics
robot
Huge DNA PII Leak: 23andMe Must Share the Blame
23andMe says it’s not a breach—just credential stuffing. I’m not so sure.Hackers claim...
2023-10-9 23:52:46 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
23andme
dna
richi
stuffing
genetic
Introducing the SaaS Event Maturity Matrix (EMM)
AppOmni has determined that on average a single instance of SaaS has 256 SaaS-to-SaaS...
2023-10-9 23:42:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
appomni
maturity
excessive
network
syndicated
Survey Sees Many Cybersecurity Professionals Willing to Jump Ship
Despite an uncertain economy, a survey of 301 IT and cybersecurity professionals found half of cybe...
2023-10-9 23:7:1 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
shortage
security
somewhat
respondents
How Process Automation Can Help Streamline Security
There is increasing awareness that cybersecurity is “everyone’s job,” as NIST, a government agency...
2023-10-9 21:0:3 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
phishing
processes
rogue
AI More Helpful Than Harmful in Cybersecurity
While headlines scream about the security threats associated with AI, security professionals tend t...
2023-10-9 20:0:36 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
security
phishing
respondents
capers
threats
EasyDMARC Becomes fTLD Strategic Partner
fTLD and EasyDMARC Join Forces to Provide Banks with the Ultimate Defense against Phish...
2023-10-9 19:50:7 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
ftld
easydmarc
insurance
phishing
security
Cloud Security Solutions for Healthcare Challenges
Cloud Security Challenges faced by Healthcare IndustryHere are some of the major challenges faced...
2023-10-9 19:9:52 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
cloud
security
patient
AI Risks
There is no shortage of researchers and industry titans willing to warn us about the potential dest...
2023-10-9 19:3:23 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
humanity
society
existential
development
Previous
382
383
384
385
386
387
388
389
Next