unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How to Improve Security Posture with Automation
Securing your organization’s network and data has never been more crucial. As cyber threats grow mo...
2024-9-25 02:27:35 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
threats
ensuring
guidelines
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
Sep 24, 2024APIs are essential to modern application architectures, drivingrapid development, seaml...
2024-9-25 02:12:0 | 阅读: 7 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
imperva
insecurity
library
bots
Automating Certificate Lifecycle Management in Windows OS with AppViewX AVX ONE CLM
It is a common experience that automating certificate lifecycle management (CLM) in a Windows OS en...
2024-9-25 02:3:5 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
windows
appviewx
clm
avx
automating
OSINT : User Privacy in Linux
Linux telemetry involves gathering and sending data from a Linux-based system to an...
2024-9-25 01:57:57 | 阅读: 18 |
收藏
|
Hacking Articles - www.hackingarticles.in
gnome
gsettings
flatpak
permanently
proton
Study finds many European car resellers fail to delete driver data
European auto resellers are violating the continent’s tough data privacy laws, according to a new s...
2024-9-25 01:46:29 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
eardley
dealerships
resold
vehicles
cars
Infostealer malware bypasses Chrome’s new cookie-theft defenses
error code: 1106...
2024-9-25 01:45:17 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Hackers deploy AI-written malware in targeted attacks
error code: 1106...
2024-9-25 01:15:20 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Critical Ivanti vTM auth bypass bug now exploited in attacks
error code: 1106...
2024-9-25 01:15:19 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
5 Common Data Security Challenges Businesses Face and How to Overcome Them
Data security has always been important to businesses, especially those that handle se...
2024-9-25 01:11:45 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
processes
leaders
footprint
tonic
Dockerize Mongo to Get Consistent Data Across Your Development Environments
We have all lamented, with great chagrin, the proverbial “works on my machine” problem...
2024-9-25 01:11:45 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
mongo
seeder
github
database
gist
Your Data is Safe — Math Guarantees It!
Hot off the heels of the Privacy Hub, we’re introducing more privacy protecting featur...
2024-9-25 01:11:45 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
tonic
reveal
patients
CRQ Loss Exceedance Curves for Risk Management | Kovrr
TL;DROn-demand cyber risk quantification (CRQ) platforms leverage probabilistic statistical mode...
2024-9-25 01:11:10 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
exceedance
crq
curves
lec
kovrr
In Our Innovation Era: Seamless Messaging, 77 Language Translations, Tag Search, and More
2024-9-25 01:7:43 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
Randall Munroe’s XKCD ‘Maslow’s Pyramid’
via the comic humor & dry wit of Randall Munroe, creator of XKCDPermalink*** Th...
2024-9-25 01:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
humor
network
comic
randall
SBOM-a-Rama Fall 2024: Sonatype’s top 5 takeaways
Tuesday, September 24, 2024 Community Chats Webinars LibraryHomeCybersecurity News...
2024-9-25 01:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
governance
crq
pushes
Discover Replit: Your Ultimate Guide to Coding with AI Agents
Did you know that coding tools have evolved so rapidly that they’re now shaping the future of progra...
2024-9-25 00:45:37 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
replit
development
software
github
cloud
Optimizing Your Resume for the Silicon Valley Fast Lane
2024-9-25 00:43:44 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
Unknown Botnet Using Mozilla/5.0 (X11; Linux x86_ User Agent Ignoring Crawl Delay on WordPress Sites
A mysterious botnet, identified by the user-agent string Mozilla/5.0 (X11; Linux x86_64), is aggress...
2024-9-25 00:41:41 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
177
181
186
179
233
Driving Efficiency in Document Processing: A Technical Product Manager's Journey
IntroductionAs a Technical Product Manager specializing in document processing solutions, I've led...
2024-9-25 00:40:24 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
accuracy
nlp
efficiency
leveraging
development
Revolutionizing Product Management: The Confluence of AI, NLP and Agile Methodologies
Introduction: The Paradigm Shift of AI and NLP in Product ManagementThe convergence of Artificial I...
2024-9-25 00:37:39 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
nlp
agile
sprint
analysis
predictive
Previous
570
571
572
573
574
575
576
577
Next