unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Blocking Traffic Manipulation in AWS Starts With IAM
Tl;DRCloud networking is a fragile, high-value target – DNS and traffic routing incidents can...
2025-11-19 13:28:13 | 阅读: 26 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
privileged
attacker
cnapps
lightsail
Automating SaaS Onboarding: Simplifying and Testing Your Enterprise SSO Flows
Single Sign On (SSO) has transformed into a security mandate in the age of cloud-driven business...
2025-11-19 12:16:3 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
sso
onboarding
testrigor
ssojet
flows
eSchool News: How K-12 IT Teams Lock Down QR-Based SSO Without Hurting Usability
This article was originally published in eSchool News on 11/10/25 by Charlie Sander.Phishing vi...
2025-11-19 12:1:0 | 阅读: 20 |
收藏
|
Security Boulevard - securityboulevard.com
qr
percent
malicious
sso
schools
The Top 8 Continuous Control Monitoring Solutions
Modern enterprises can no...
2025-11-19 12:0:1 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
cybersaint
monitoring
escalating
workforces
Sue The Hackers – Google Sues Over Phishing as a Service
When something goes wrong, after exhausting all other possible alternatives, a company may go t...
2025-11-19 11:20:54 | 阅读: 26 |
收藏
|
Security Boulevard - securityboulevard.com
lighthouse
civil
phishing
cfaa
lawsuit
From Exposure to Action: How Proactive Identity Monitoring Turns Breached Data into Defense
Every 39 seconds, somewhere in the world, a new cyberattack is launched — and far too often, it’...
2025-11-19 09:0:0 | 阅读: 42 |
收藏
|
Security Boulevard - securityboulevard.com
monitoring
exposure
constella
proactive
security
CredShields Joins Forces with Checkmarx to Bring Smart Contract Security to Enterprise AppSec Programs
Singapore, Singapore, Novembe...
2025-11-19 08:20:55 | 阅读: 22 |
收藏
|
Security Boulevard - securityboulevard.com
security
credshields
checkmarx
web3
Google Email Deliverability: How to Avoid Spam Folders
Key TakeawaysGmail uses AI-based filters and engagement signals to sort emails into the Prim...
2025-11-19 06:57:25 | 阅读: 22 |
收藏
|
Security Boulevard - securityboulevard.com
reputation
rates
engagement
Record-Breaking Cloud Incident Brings Outage Through the Internet
November 18, 2025 – Cloudflar...
2025-11-19 06:55:17 | 阅读: 25 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
outage
microsoft
security
network
Email Deliverability Consultant: How to Boost Campaign ROI
Key TakeawaysProfessional deliverability consulting delivers measurable financial returns th...
2025-11-19 06:8:46 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
reputation
inbox
consultant
How to Enable Safe File Handling for Clinical and Research Portals
Healthcare has opened a new digital front door. From electronic medical records (EMRs) and telemedi...
2025-11-19 00:53:0 | 阅读: 30 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
menlo
security
patient
cdr
Anthropic Disruption of an AI-Run Attack and What It Means for Agentic Identity
Identity Practices That Reduce the Attack SurfaceThis is where enterprises are now experiencing te...
2025-11-19 00:33:25 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
distinct
agents
lived
workloads
suited
What is Single Sign-On and why do I need to create an account?
Understanding Single Sign-On (SSO)Okay, so you're probably tired of making a zillion different...
2025-11-19 00:16:46 | 阅读: 37 |
收藏
|
Security Boulevard - securityboulevard.com
sso
security
ssojet
passwords
Comprehensive Guide to Risk-Based Authorization for Identity and Access Management
Understanding Risk-Based AuthorizationOkay, so you're telling me that just 'allowing' access is...
2025-11-19 00:10:14 | 阅读: 36 |
收藏
|
Security Boulevard - securityboulevard.com
rba
security
mojoauth
involves
4 U.S. Citizens, Ukrainian Plead Guilty in N. Korea IT Worker Scheme
There’s been extensive changes in cybersecurity policy in the shift from the Biden to Trump Admi...
2025-11-18 23:11:42 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
north
korean
remote
identities
guilty
What defines a smart approach to Non-Human Identity management
Why Are Non-Human Identities Crucial to Cloud Security?Where cloud technologies dominate operat...
2025-11-18 22:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
nhi
security
identities
nhis
machine
How safe are automated NHI lifecycle management systems
Can Automated NHI Lifecycle Management Systems Be Trusted?Confidence and assurance are paramoun...
2025-11-18 22:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
nhi
lifecycle
identities
machine
How certain can we be about cloud compliance with Agentic AI
Are Non-Human Identities the Missing Link in Cloud Security?Are we adequately equipping ourselv...
2025-11-18 22:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
nhi
nhis
identities
The 4 Most Common AI Agent Deployment Patterns And What They Mean for Identity Security
88% of teams plan to increase their use of AI agents in the next 12 months. Yet most identity syste...
2025-11-18 21:29:51 | 阅读: 24 |
收藏
|
Security Boulevard - securityboulevard.com
agents
security
delegation
llm
autonomous
NDSS 2025 – EvoCrawl: Exploring Web Application Code And State Using Evolutionary Search
SESSIONSession 3C: Mobile Se...
2025-11-18 20:0:0 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
evocrawl
network
ndss
symposium
Previous
11
12
13
14
15
16
17
18
Next