unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Top Ten Cybersecurity Misconfigurations
1. Who are the Top 10 Cybersecurity Misconfigurations for?2. Top cybersecurity misconfiguratio...
2023-10-30 17:50:48 | 阅读: 4 |
收藏
|
Tarlogic Security - www.tarlogic.com
software
network
security
RDDoS attacks and DDoS-as-a-Service: Extortion and Business Continuity
1. Targeted denial-of-service attacks, a classic that never dies2. DDoS-as-a-Service: Exponent...
2023-10-17 15:25:13 | 阅读: 20 |
收藏
|
Tarlogic Security - www.tarlogic.com
rddos
hostile
continuity
attackers
criminal
CVE-2023-38545: Heap overflow vulnerability in curl (SOCKS 5)
What is the vulnerability?Key features of CVE-2023-38545 vulnerabilityMitigation & Vulnera...
2023-10-13 17:38:57 | 阅读: 16 |
收藏
|
Tarlogic Security - www.tarlogic.com
proxy
38545
client
handshake
passes
CVE-2023-38545: Heap overflow vulnerability in curl (SOCKS 5)
What is the vulnerability?Key features of CVE-2023-38545 vulnerabilityMitigation & Vulnera...
2023-10-13 17:38:57 | 阅读: 8 |
收藏
|
Tarlogic Security - www.tarlogic.com
proxy
38545
client
handshake
overflow
Cyberattacks against the healthcare sector put people’s well-being at risk
1. The assets of healthcare organizations and their cyber exposure2. The undeniable value of m...
2023-10-3 17:8:25 | 阅读: 10 |
收藏
|
Tarlogic Security - www.tarlogic.com
healthcare
security
ransomware
economic
CVE-2023-42115: Vulnerabilities without security patch in Exim
Exim has multiple critical vulnerabilities, including CVE-2023-4863, that allow attackers t...
2023-9-30 20:20:28 | 阅读: 56 |
收藏
|
Tarlogic Security - www.tarlogic.com
exim
security
remote
Bluetooth vulnerabilities in smart locks
Introduction to BluetoothSecurity in our Bluetooth deviceBluetooth communications analysisDe...
2023-9-29 15:38:28 | 阅读: 11 |
收藏
|
Tarlogic Security - www.tarlogic.com
security
gap
gatt
Cyber resilience. A concept that combines security and business
1. What is cyber resilience?2. Characteristics and objectives of cyber resilient systems2.1. O...
2023-9-27 19:1:47 | 阅读: 9 |
收藏
|
Tarlogic Security - www.tarlogic.com
resilience
security
continuity
threats
Hardware vulnerabilities in smart locks
Obtaining information for hardware analysis of smart locksAspects to review during hardware an...
2023-9-21 18:22:36 | 阅读: 12 |
收藏
|
Tarlogic Security - www.tarlogic.com
hardware
spi
firmware
swd
CVE-2023-4863: Heap buffer overflow in Google libwebp (WebP)
The vulnerability CVE-2023-4863 is found in the open source Libwebp library and affects bro...
2023-9-19 16:14:45 | 阅读: 38 |
收藏
|
Tarlogic Security - www.tarlogic.com
4863
mozilla
brave
opera
chromium
Best practices in cybersecurity for AI
1. The complex AI threat landscape1.1. Theft, manipulation, destruction… Categorizing threats2...
2023-9-19 15:11:50 | 阅读: 13 |
收藏
|
Tarlogic Security - www.tarlogic.com
security
threats
enisa
Top 10 vulnerabilities in LLM applications such as ChatGPT
1. Prompt injections1.1. Prevention2. Insecure handling of outputs2.1. Prevention3. Poisoning...
2023-9-12 17:0:29 | 阅读: 14 |
收藏
|
Tarlogic Security - www.tarlogic.com
llm
security
generative
What are the AI security risks?
1. AI is one of the great allies of cybersecurity1.1. And AI cybersecurity2. Data, models, cyb...
2023-9-7 21:51:4 | 阅读: 7 |
收藏
|
Tarlogic Security - www.tarlogic.com
security
artificial
software
development
OWASP SAMM: Assessing and Improving Enterprise Software Security
OWASP SAMM is a model that helps companies assess their software security posture and implemen...
2023-8-28 19:25:50 | 阅读: 8 |
收藏
|
Tarlogic Security - www.tarlogic.com
security
software
samm
maturity
posture
The 4 keys to the NIST Cybersecurity Framework v2
1. Main novelties of the NIST Cybersecurity Framework v21.1. A multi-sectoral and global tool1...
2023-8-16 16:44:50 | 阅读: 12 |
收藏
|
Tarlogic Security - www.tarlogic.com
security
governance
objectives
outcomes
DevSecOps: Producing software quickly, continuously, and securely
1. What is behind the DevSecOps concept?2. From DevOps to DevSecOps or how security emerged as...
2023-8-8 18:48:39 | 阅读: 9 |
收藏
|
Tarlogic Security - www.tarlogic.com
security
software
development
lifecycle
CVE-2023-35082: Unauthenticated API Access Vulnerability in MobileIron Core
CVE-2023-35082 is a critical vulnerability that allows access to APIs in older versions of Mobi...
2023-8-7 21:52:59 | 阅读: 37 |
收藏
|
Tarlogic Security - www.tarlogic.com
mobileiron
35082
ivanti
security
mifs
CVE-2023-35078: Remote authentication bypass in Ivanti EPMM API
CVE-2023-35078 is a critical vulnerability that allows access to restricted functionality o...
2023-8-2 22:24:24 | 阅读: 16 |
收藏
|
Tarlogic Security - www.tarlogic.com
ivanti
security
epmm
35078
SSVC: How to make decisions about IT vulnerabilities
1. SSVC, qualitative data to manage IT vulnerabilities2. Decision points that mark the decisio...
2023-7-31 17:57:15 | 阅读: 11 |
收藏
|
Tarlogic Security - www.tarlogic.com
ssvc
mission
security
epss
What are advanced persistent threats?
1. Deconstructing the APT concept2. How do advanced persistent threats differ from traditional...
2023-7-26 17:7:43 | 阅读: 17 |
收藏
|
Tarlogic Security - www.tarlogic.com
threats
objectives
resilience
hostile
Previous
-7
-6
-5
-4
-3
-2
-1
0
Next