unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Ransomware Surge Exploits Cybersecurity Gaps Caused by M&A
Evolving threat actor tactics are capitalizing on business and technology consolidation to launch w...
2024-8-17 01:3:22 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
security
claims
resilience
Randall Munroe’s XKCD ‘Helium Synthesis’
Regular vulnerability assessments/pen testingAutomated security testing within CI/CD pipelinesC...
2024-8-17 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
assessments
security
reviews
audits
hoc
Survey: Senior Executives Being Held More Accountable for Cybersecurity
A global survey of 1,850 IT and cybersecurity decision-makers finds more than half (51%) reporting...
2024-8-17 00:53:4 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
candidates
respondents
rashotte
What is Email deliverability testing, and how can it help?
Reading Time: 6 minAccording to research by Statista, the total number of emails sent in 2022 is...
2024-8-17 00:24:20 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
reputation
engagement
rates
monitoring
USENIX Security ’23 – Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems
Regular vulnerability assessments/pen testingAutomated security testing within CI/CD pipelinesC...
2024-8-16 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
assessments
reviews
audits
hoc
Cybersecurity Insights with Contrast CISO David Lindner | 8/16/24
Regular vulnerability assessments/pen testingAutomated security testing within CI/CD pipelinesC...
2024-8-16 21:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
assessments
reviews
audits
hoc
How Kratikal’s GDPR Compliance Services Will Help Secure Businesses?
The internet’s widespread availability has changed the world. It has transformed how we talk...
2024-8-16 20:8:11 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
kratikal
security
authorities
unset
crucial
ESG Survey Report Finds AI, Secrets, and Misconfigurations Plague AppSec Teams
Find out how your peers are managing application security challenges. Application development is c...
2024-8-16 18:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
development
cloud
developers
CVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution Vulnerability
In a recent security advisory, Microsoft disclosed a high-severity vulnerability identi...
2024-8-16 17:49:7 | 阅读: 53 |
收藏
|
Security Boulevard - securityboulevard.com
38063
attacker
windows
remote
security
Holding Trust for Ransom: What’s at Stake as Business Trust Erodes
In today’s evolving business landscape, trust is paramount — but it’s getting harder to earn and ea...
2024-8-16 16:26:17 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
resilience
accuracy
Striking a Balance Between Business Growth, Risk Management and Cybersecurity
Following the pandemic, substantial shifts in the business environment and culture have emerged, wa...
2024-8-16 16:4:59 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
growth
objectives
leaders
Essential Linux Security Tools: A Comprehensive Overview for Security Professionals
Combining multiple Linux security tools to protect against various threats is crucial for a robust...
2024-8-16 16:0:36 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
threats
analysis
monitoring
Sitting Ducks Attack: Over 1M Domains At Risk Of Takeover!
In the world of cybercrime, over 1 million domains now face a risk of threat actor-initiated takeov...
2024-8-16 15:0:34 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
ducks
sitting
malicious
security
tuxcare
Elevate Your Risk Management Strategy with NSFOCUS CTEM
As cybersecurity, data protection, and personal information security regulations become increasing...
2024-8-16 13:56:26 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
ctem
asset
security
network
What’s Different About Data Security in the Cloud? Almost Everything.
In 2019, most organizations already had digital transformation plans in place. These plans included...
2024-8-16 06:7:32 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
gaps
USENIX Security ’23 – TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks
Regular vulnerability assessments/pen testingAutomated security testing within CI/CD pipelinesC...
2024-8-16 03:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
assessments
security
hoc
formal
pipelines
How to Align Infosec to Business Operations: Sam Curry’s Cybersecurity Playbook for Executives
This cybersecurity playbook is inspired by Sam Curry’s insights on the crucial role of building re...
2024-8-16 02:18:35 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
playbook
The Hidden Cost of Click Fraud: Why Data You Can Trust, Matters
Hot TopicsUSENIX Security ’23 - TRIDENT: Towards Detecting and Mitigating Web-based Social En...
2024-8-16 02:15:44 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
clicks
genuine
ctr
inaccurate
security
ReliaQuest: Watch Out for Info-Stealers and RATs
Threat actors are gravitating toward info-stealing malware like LummaC2 and remote access trojans (...
2024-8-16 01:53:41 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
socgholish
lummac2
reliaquest
evans
software
Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrations
Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrationsjosh.p...
2024-8-16 01:28:57 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
pqc
thales
security
cpl
encryption
Previous
88
89
90
91
92
93
94
95
Next