unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
NEWS ANALYSIS Q&A: The early going of Generative AI and LLMs impacting cybersecurity
By Byron V. AcohidoThe art of detecting subtle anomalies, predicting emergent vulnerabilities and...
2024-8-20 15:59:55 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
threats
security
loveland
genai
Exploring AI: Regulations and Threat Mitigation
Exploring AI: Regulations and Threat Mitigationjosh.pearson@t…Tue, 08/20/2024 – 07:05...
2024-8-20 15:5:26 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
blueprint
bill
security
cpl
thales
GoGra Backdoor: Unnamed South Asian Media Outlet Targeted
As per recent reports, an unnamed media organization in South Asia had fallen prey to t...
2024-8-20 15:0:8 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
gogra
harvester
threats
tuxcare
nation
How to Patch your Linux Kernel before it gets exploited?
Linux Kernel server patch management is essential for ensuring the security, stability, and perform...
2024-8-20 14:0:22 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
thin
software
kratikal
Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the tr...
2024-8-20 07:30:18 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
malicious
slashnext
invoice
analysis
Why a Savvy Security Strategy is Essential | Grip
In today’s fast-paced digital era, enterprises face an ever-growing landscape of cyber...
2024-8-20 07:17:12 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
savvy
monitoring
operational
audits
Crypto enthusiasts flood npm with more than 281,000 bogus packages overnight
Crypto enthusiasts have lately been flooding software registries like npm and PyPI with thousan...
2024-8-20 04:16:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
overnight
bogus
enthusiasts
flood
test
New AI technologies are advancing cyberattacks and wreaking havoc on traditional identity verificat...
2024-8-20 04:0:52 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
competitive
security
leaders
bake
comparing
What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF
On July 19, 2024, a flawed update in CrowdStrike Falcon’s channel file 291 led to a logic error th...
2024-8-20 03:36:15 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
ebpf
security
cilium
cves
Echoes of Rome: Leveraging Ancient Tactics for Modern Malware
Threat Intelligence ReportDate: August 19, 2024Prepared by: David Brunsdon, Threat Intelligen...
2024-8-20 03:5:3 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
inbox
pdr
moscow
ltd
USENIX Security ’23 – Side-Channel Attacks on Optane Persistent Memory
Home » Security Bloggers Network » USENIX Security ’23 – Side-Channel Attacks on Optane Persisten...
2024-8-20 03:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
bloggers
youtube
Extortion Group Exploits Cloud Misconfigurations, Targets 110,000 Domains
Threat actors armed with advanced automation techniques and an expansive knowledge of cloud archite...
2024-8-20 02:30:39 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
attackers
inadequate
Black Hat Fireside Chat: Why grasping the context of code is a recipe for keeping software secure
By Byron V. AcohidoPresident Biden’s call for the mainstreaming of Software Bill of M...
2024-8-20 01:25:29 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
software
sboms
ingredients
security
acohido
Daniel Stori’s ‘The War For Port 80’
Application Security Check Up ...
2024-8-20 01:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
Deepfakes Are Having a Deeper Impact on These Three Industries
Artificial intelligence (AI) is having a profound impact on business, and it hasn’t all been positi...
2024-8-20 00:23:15 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
industries
security
deepfakes
hasn
USENIX Security ’23 – Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
Application Security Check Up ...
2024-8-19 23:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
Mandatory MFA is Coming to Microsoft Azure
Microsoft is making multi-factor authentication (MFA) mandatory for all sign-ins to Azu...
2024-8-19 22:38:21 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
security
entra
shahid
Top 10 Penetration Testing Solutions in 2024
In today’s digital world, where data is constantly swirling in that mystical cloud, se...
2024-8-19 22:25:35 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
scytale
assessments
threats
Fuel Your B2B SaaS Startup’s Growth: 6 Essential Channels
2. Content MarketingContent marketing establishes thought leadership and builds trust with potenti...
2024-8-19 22:23:25 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
startups
plg
growth
advertising
abm
The Essential Guide to Evaluating Competitive Identity Verification Solutions
Strategically CompareWhy waste time comparing apples and oranges? When performing a competitive bak...
2024-8-19 18:40:13 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
crucial
comparing
accuracy
evolving
denials
Previous
86
87
88
89
90
91
92
93
Next