unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – VulChecker: Graph-based Vulnerability Localization in Source Code
Authors/Presenters:Yisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthe...
2024-8-11 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
lee
george
Book Review: ‘Why Cybersecurity Fails in America’
Carter Schoenberg is a trusted security expert who has vast experience in the public a...
2024-8-11 17:28:36 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
carter
lohrmann
schoenberg
stories
QuickShell: Sharing Is Caring about an RCE Attack Chain on Quick Share
Authors: Shmuel Cohen, Sr. Security Researcher | Or Yair, Security Research Team LeadGoogle’s Quic...
2024-8-11 03:0:0 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
windows
remote
responder
download
Специални Поздрави За Всички Който "Го Правят" В България
Кой е човека който дава определение на това какво е циганин? Ако си циганин да ти еб...
2024-8-11 02:46:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
си
на
ти
майка
да
Emulating Humans for Cybercrime Purposes
It’s 2009 and I just stumbled upon the extremely sophisticated Xedant Human Emulator...
2024-8-11 02:46:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
danchev
emulating
emulation
dancho
USENIX Security ’23 – V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-Source Software Components Using Code Classification Techniques
Authors/Presenters:Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh Many thanks to U...
2024-8-10 23:0:0 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
choi
anaheim
Move From FedRAMP to DoD with Impact Level Assessment
We’ve written extensively before about FedRAMP’s impact levels. As a brief refresher, there are fou...
2024-8-10 08:20:55 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
dod
fedramp
security
moderate
cloud
Cyber attacks 2024: The biggest attacks of the first half of 2024
Use these patterns to your advantage, by integrating the stories into upcoming conversations and wo...
2024-8-10 03:45:54 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
takeaways
london
drugs
healthcare
USENIX Security ’23 – Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities
Authors/Presenters:Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Era...
2024-8-10 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
publishing
presenter
Sonatype’s summer webinar series: Future cybersecurity requirements
Sonatype kicked off its Summer of Software Regulations & Compliance webinar series...
2024-8-10 03:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
regulations
webinar
kicked
Behind the Scenes at Black Hat 2024
Another year, another Black Hat USA! It was an amazing few days engaging with colleagues, reconnect...
2024-8-10 02:18:14 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
swimlane
lyborg
ciso
joined
HPE Infuses AI Into Network Detection and Response Platform
Hewlett Packard Enterprise (HPE) this week at the Black Hat USA 2024 conference extended its networ...
2024-8-10 01:45:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
hpe
security
network
aruba
Aqua Security Researchers Disclose Series of AWS Flaws
Aqua Security this week at the Black Hat USA 2024 conference revealed that it has discovered six vu...
2024-8-10 01:7:52 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
aqua
Randall Munroe’s XKCD ‘University Age’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-8-10 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
aqua
Preview of State of GitHub Actions Security Report: Security of GH Workflows Building Blocks
Understand the security status of GitHub Actions workflows and how to mitigate the risk.We recentl...
2024-8-9 23:23:33 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
github
security
workflows
runners
runner
USENIX Security ’23 – Trojan Source: Invisible Vulnerabilities
Authors/Presenters:Nicholas Boucher, Ross Anderson Many thanks to USENIX for publish...
2024-8-9 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
authored
nocookie
The Role of Microsegmentation in Kubernetes Environments
Optimizing Kubernetes security and efficiency of through granular controlKubernetes stands out as...
2024-8-9 21:59:45 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
kubernetes
security
network
Trail of Bits’ Buttercup heads to DARPA’s AIxCC
With DARPA’s AI Cyber Challenge (AIxCC) semifinal starting today at DEF CON 2024, we want to introd...
2024-8-9 21:10:29 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
buttercup
competition
aixcc
Cybersecurity Insights with Contrast CISO David Lindner | 8/9/24
Insight #1As I watch the sea of news out of Black Hat, from CrowdStrike fallout t...
2024-8-9 21:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
lindner
analysis
powers
responseis
Exploring the dynamic landscape of cybersecurity threats
Hello, My name is Chen, and I work as a threat intelligence analyst at Salt Security. Every day, I...
2024-8-9 20:0:2 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
cves
salt
threats
Previous
94
95
96
97
98
99
100
101
Next