unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
CrowdStrike Gets Grilled By U.S. Lawmakers Over Faulty Software Update
In what has become an annual ritual between Silicon Valley and the Beltway, a House sub...
2024-9-25 04:16:37 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
crowdstrike
swartz
meyers
jon
USENIX NSDI ’24 – A Large-Scale Deployment of DCTCP
Authors/Presenters:Abhishek Dhamija, Balasubramanian Madhavan, Hechao Li, Jie Meng, Shr...
2024-9-25 03:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
presenters
prashanth
network
Diddy Do It? Or Did Cybercriminals? How Hackers Are Turning Scandals Into Cyber Attacks
Attackers often capitalize on public interest in high-profile scandals to spread malwa...
2024-9-25 02:37:33 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
diddy
attackers
malicious
pysilon
How to Improve Security Posture with Automation
Securing your organization’s network and data has never been more crucial. As cyber threats grow mo...
2024-9-25 02:27:35 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
threats
ensuring
guidelines
Automating Certificate Lifecycle Management in Windows OS with AppViewX AVX ONE CLM
It is a common experience that automating certificate lifecycle management (CLM) in a Windows OS en...
2024-9-25 02:3:5 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
windows
appviewx
clm
avx
automating
5 Common Data Security Challenges Businesses Face and How to Overcome Them
Data security has always been important to businesses, especially those that handle se...
2024-9-25 01:11:45 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
processes
leaders
footprint
tonic
Dockerize Mongo to Get Consistent Data Across Your Development Environments
We have all lamented, with great chagrin, the proverbial “works on my machine” problem...
2024-9-25 01:11:45 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
mongo
seeder
github
database
gist
Your Data is Safe — Math Guarantees It!
Hot off the heels of the Privacy Hub, we’re introducing more privacy protecting featur...
2024-9-25 01:11:45 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
tonic
reveal
patients
CRQ Loss Exceedance Curves for Risk Management | Kovrr
TL;DROn-demand cyber risk quantification (CRQ) platforms leverage probabilistic statistical mode...
2024-9-25 01:11:10 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
exceedance
crq
curves
lec
kovrr
Randall Munroe’s XKCD ‘Maslow’s Pyramid’
via the comic humor & dry wit of Randall Munroe, creator of XKCDPermalink*** Th...
2024-9-25 01:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
humor
network
comic
randall
SBOM-a-Rama Fall 2024: Sonatype’s top 5 takeaways
Tuesday, September 24, 2024 Community Chats Webinars LibraryHomeCybersecurity News...
2024-9-25 01:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
governance
crq
pushes
Microsoft Pushes Governance, Sheds Unused Apps in Security Push
Microsoft executives said the IT giant has taken numerous steps as it bulks up the security of its...
2024-9-25 00:32:14 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
security
cloud
sfi
senior
Join KubeCrash Fall 2024 for Platform Engineering the Cloud Native Way
I’m excited to be back at KubeCrash this fall! Mark your calendars to join us on Wednesday, October...
2024-9-25 00:25:33 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
kubecrash
cloud
cncf
fairwinds
intuit
SaaS Data Breaches on the Rise
SaaS is an integral part of the IT infrastructure for companies of all sizes nowadays. This model l...
2024-9-25 00:11:24 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
nuspire
cloud
dormant
GUEST ESSAY: Massive NPD breach tells us its high time to replace SSNs as an authenticator
By Ambuj KumarEver since the massive National Public Data (NPD) breach was disclosed a few weeks...
2024-9-24 23:46:44 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
npd
security
ssn
bureaus
pii
Anatomy of an Attack | ADR vs WAF and EDR Technology | Contrast Security
In today’s rapidly evolving cyber threat landscape, organizations face increasingly...
2024-9-24 21:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
contrast
adr
threats
influencers
Modernize your chaos engineering with commercial software transparency
While surprise is a major advantage in battle, it’s a nightmare for application security (AppSec) t...
2024-9-24 20:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
software
sscs
security
birenshtok
experiments
Israel’s Pager Attacks and Supply Chain Vulnerabilities
Israel’s brazen attacks on Hezbollah last week, in which hundreds of pagers and two-way radios expl...
2024-9-24 19:5:34 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
israel
hezbollah
security
chains
eavesdrop
Sophisticated Spear Phishing Attack Falls Flat Against ITDR
Last month, a threat actor used stolen credentials in an unsuccessful attempt to access a client’s...
2024-9-24 18:37:22 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
college
phishing
shield
adaptive
Ubuntu 22.04.5 LTS Released with Linux Kernel 6.8
Canonical has officially released Ubuntu 22.04.5 LTS, the fifth and final planned point release of...
2024-9-24 17:0:41 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
kernelcare
software
flavors
tuxcare
Previous
52
53
54
55
56
57
58
59
Next