unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel
OverviewLeveraging NSFOCUS’s Global Threat Hunting System, NSFOCUS Security Labs (NSL) captured a...
2024-8-8 10:20:41 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
synchronize
abcsync
actor240524
analysis
aaaaa
Olympic scams: Be aware this summer
Fake ticketsWhat happensScammers create websites or ads that offer tickets to Olympic events at a...
2024-8-8 03:52:9 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
olympics
olympic
fans
fraudulent
merchandise
Democracy’s Challenge: Secure Elections Worldwide
LAS VEGAS — The U.S. presidential election is less than three months away, and many cybersecurity e...
2024-8-8 03:31:25 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
chief
election
genai
USENIX Security ’23 – Eos: Efficient Private Delegation of zkSNARK Provers
Authors/Presenters:Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang Ma...
2024-8-8 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
chiesa
presenters
D3 Introduces Program to Help SOC Teams Migrate Successfully from Legacy SOAR
VANCOUVER, British Columbia–D3, the leader in smart security orchestration, automation, and respons...
2024-8-8 02:23:42 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
soar
d3
migration
security
transition
MSP Case Study: CloudIntellect Helped Clients Gain Granular Visibility on Email Channels with PowerDMARC
Reading Time: 2 min“The most comprehensive DMARC reporting platform. Bar none!”Howa...
2024-8-8 02:13:50 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
dmarc
powerdmarc
msp
security
Student Devices Wiped — Mobile Guardian Hacked AGAIN
MDM software for schools is breached for second time this year—13,000 devices wiped in Singapore ...
2024-8-8 02:3:54 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
guardian
security
singapore
wiped
richi
Windows Downdate: Downgrade Attacks Using Windows Updates
Downgrade attacks—also known as version-rollback attacks—are a type of attack designed to revert a...
2024-8-8 02:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
windows
downgrade
security
hypervisor
microsoft
Botnet 7777: Are You Betting on a Compromised Router?
Firstly, we extend our thanks to Chris Fearnley and Gi7w0rm, two threat researchers who assisted us...
2024-8-8 01:0:9 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
quad7
7777
63256
routers
11288
Randall Munroe’s XKCD ‘Matter’
via the comic & dry wit of Randall Munroe, creator of XKCDPermalink*** This is...
2024-8-8 01:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
creator
wit
munroe
syndicated
How Sonar Helps Meeting NIST SSDF Code Security Requirements
What is the NIST SSDF?The NIST Secure Software Development Framework (SSDF) brings tog...
2024-8-8 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
sonarqube
security
software
sonar
Tenable Adds Ability to Prioritize Vulnerabilities by Threat Level
Tenable this week at the Black Hat USA 2024 conference added an ability to identify the vulnerabili...
2024-8-8 00:16:8 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
tenable
developers
millard
Why Governments Worldwide Recommend Protective DNS
HYAS Protect protective DNS uses advanced data analytics to proactively block cyber threats, a...
2024-8-7 23:47:8 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
hyas
protective
security
threats
network
How Fairwinds Delivers On EKS Internally, AWS EKS Delivery Designation
The Amazon Web Services (AWS) Service Delivery designation is a specialized program designed to val...
2024-8-7 23:13:36 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
kubernetes
eks
fairwinds
security
designation
USENIX Security ’23 – Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree
Authors/Presenters:Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong M...
2024-8-7 23:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
presenter
glfoza0
This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
As technology advances, threat actors increasingly leverage these innovations to conduct social eng...
2024-8-7 22:21:27 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
soundux
voicemeeter
vishing
speech
voices
Sysdig Adds Ability to Correlate Identities to Cloud Computing Breaches
Sysdig today extended the reach of the cloud detection and response platform by adding...
2024-8-7 22:0:30 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
sysdig
levine
workloads
Rubrik Allies With Mandiant to Increase Cyber Resiliency Capability
Rubrik at the Black Hat USA 2024 conference today revealed it is partnering with the Ma...
2024-8-7 21:0:13 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
rubrik
cloud
stone
pristine
mandiant
How to Choose the Best Data Masking Software Based on Gartner Peer Insights
Choosing the right data masking software can be overwhelming with so many options available. Gartne...
2024-8-7 20:47:40 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
masking
adm
reviews
ideal
security
RL Spectra Advanced File Analysis and Malware Detection Suite Updates
ReversingLabs is proud to announce new features for Spectra Analyze (formerly A1000) and Spectra De...
2024-8-7 20:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
spectra
network
rl
analysis
Previous
97
98
99
100
101
102
103
104
Next