unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Beyond the Annual Pen Test: The Case for Continuous Security Validation
渗透测试是关键手段,模拟攻击发现漏洞;应频繁进行而非一年一次;帮助应对威胁变化;确保合规性。...
2025-9-8 12:0:0 | 阅读: 10 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
defenses
threats
attackers
Password Security, Part 1: The Dark Side of Passwords
文章探讨了密码破解技术及其对组织安全的影响,分析了彩虹表攻击、暴力破解、字典攻击等常见方法,并强调弱密码和重复使用是主要威胁。...
2025-9-2 16:11:35 | 阅读: 12 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
passwords
security
cracking
rainbow
roughly
The Rise of Infostealers: How Digital Identity Theft Fuels the Cybercrime Economy
文章探讨了信息窃取软件(infostealers)的威胁及其在网络安全中的作用。这些恶意软件能够窃取敏感数据并绕过多因素认证,常通过钓鱼邮件或虚假网站传播。它们生成的日志文件在暗网上以低价出售,成为网络犯罪的重要工具。文章还分析了2024年Snowflake云平台入侵事件,并指出未来可能出现更隐蔽的服务器端信息窃取软件。...
2025-8-29 10:28:0 | 阅读: 20 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
victim
infostealer
security
snowflake
Your Privileged Accounts Are Showing
特权访问管理(PAM)已成为企业网络安全的核心需求。面对日益严峻的威胁环境,攻击者常通过弱密码和过度授权账户入侵系统。成熟的PAM方案能限制访问权限、监控会话行为、自动轮换凭证并提供审计功能。如今,保险公司和监管机构对企业的PAM能力提出更高要求,未达标的企业可能面临保费增加或无法投保的风险。实施有效的PAM不仅能提升安全性,还能降低风险敞口并带来显著的业务价值。...
2025-8-28 11:0:0 | 阅读: 16 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
pam
privileged
security
passwords
insurers
Automating CloudFront C2 with AI – Reduce Errors & Save Time
文章介绍了一种利用AWS CloudFront隐藏C2服务器真实来源的方法,并通过AI生成Python脚本自动化设置过程,节省时间和减少错误。...
2025-8-27 12:0:0 | 阅读: 14 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
c2
cloudfront
security
certbot
redirector
Goodbye Legacy MFA: Be Ready for the new Microsoft Authentication Methods Policy
微软宣布将于2025年9月30日弃用旧版多因素认证(MFA)和自服务密码重置(SSPR)策略,并将其统一到新的认证方法策略中。此举旨在提升安全性、简化管理和减少攻击面。新策略将集中管理MFA、无密码登录等多种认证方式,并提供更灵活的控制选项。及时迁移可避免潜在的安全漏洞和用户锁定问题。...
2025-8-26 19:43:8 | 阅读: 18 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
migration
microsoft
sspr
security
IAM in Practice: Where Identity Management Falls Short
研究显示多数组织的身份识别与访问管理(IAM)平台成熟度处于中等水平。仅50%认为其平台有效管理用户访问配置,46%对认证和授权持同样看法。机器身份管理、访问审查自动化及特权访问控制等方面存在显著差距。技术采用方面进展缓慢,多数仍在规划向云或SaaS迁移。...
2025-8-25 10:32:0 | 阅读: 7 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
babbili
identities
privileged
cloud
How to Ruin a PAM Rollout in 3 Easy Steps (And What to Do Instead)
特权访问管理是现代网络安全的关键。成功实施需避免设定不现实时间表、忽视人因及跳过发现阶段,并将其视为持续过程。这可降低风险并提升业务价值。...
2025-8-22 09:54:0 | 阅读: 15 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
pam
privileged
rollout
security
planning
AI Moves Fast. Your Data Security Needs to Move Faster.
生成式AI改变了企业对数据的使用方式,但也带来了敏感数据泄露的风险。传统安全方法已无法应对现代数据挑战。通过结合DSPM(数据安全态势管理)和DLP(数据丢失防护),企业可实时监控、分类和控制数据流动,形成闭环系统以应对AI时代的威胁。...
2025-8-21 10:20:0 | 阅读: 7 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
dspm
dlp
adoption
cyera
Insights from an AWS Verified Access Security Assessment
Organizations must continuously evaluate their access control mechanisms to ensure secure a...
2025-8-20 12:0:0 | 阅读: 15 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
ava
client
cloud
network
What Should CISOs Prioritize Today?
随着企业对 browsers 的依赖增加, 它们成为高风险资产. 传统工具无法应对 browser-based 威胁; CISO 需要专门的安全解决方案....
2025-8-19 10:33:0 | 阅读: 7 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
cloud
attackers
threats
network
Choosing the Right Cloud Security Assessment: A Decision Maker’s Guide
文章探讨了云平台带来的复杂安全挑战,包括数百种服务、复杂的标识模型和共享责任框架。传统的安全测试无法直接应用于云环境。文章提出了一种实用框架,帮助安全领导者选择适合组织需求的安全评估方法,并避免常见误区。...
2025-8-18 12:0:0 | 阅读: 12 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
cloud
assessments
reviews
A Practical Path to Cybersecurity Risk Quantification
网络安全风险量化(CRQ)帮助企业量化网络威胁的财务影响,并通过FAIR框架建模风险概率与损失幅度。该方法识别关键风险并评估其潜在成本,助力优化资源分配与提升决策质量。...
2025-8-15 20:13:8 | 阅读: 16 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
crq
security
fair
modeling
Crisis Action Management Planning (CAMP) for Business Resilience
August 13, 2025Crises aren’t a matter of if—they’re a matter of when. Just as seas...
2025-8-13 21:39:0 | 阅读: 8 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
crisis
resilience
camp
disruptions
Prompt Injection: The AI Vulnerability We Still Can’t Fix
文章探讨了提示注入攻击对大型语言模型(LLMs)的威胁,这种攻击通过混淆系统指令和用户输入来操控模型行为。尽管安全研究人员最初认为可以通过类似SQL注入的方法防御,但发现这种方法难以实现。提示注入因其简单性和高破坏性被OWASP列为LLMs首要风险。文章还讨论了直接和间接提示注入的区别、检测挑战及防御策略,包括输入输出验证、传统安全实践、提示强化和持续的人工监督等。...
2025-8-13 19:0:0 | 阅读: 7 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
injection
security
defenses
llms
llm
Purple Teaming Part 2: Inside the Lifecycle, from Preparation to Protection
文章介绍了紫队(Purple Teaming)的概念及其在网络安全测试中的应用。通过红蓝团队协作,紫队采用持续改进的方法提升安全成熟度。文章详细描述了紫队的生命周期阶段:准备、执行、识别和修复,并强调与第三方合作可带来专业视角和最新威胁情报支持。...
2025-8-11 14:32:14 | 阅读: 9 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
purple
security
engagement
nathan
teaming
Drawing the Line: How to Define Third-Party Cyber Risk Appetite That Actually Works
文章探讨了第三方网络风险 Appetite 的重要性,指出企业在与供应商和合作伙伴合作时需明确可接受的风险范围。通过定义风险 Appetite 和 Tolerance,企业可以在保障安全的同时加速创新,并在采购、上boarding和持续监控中保持一致性和效率。明确的风险 Appetite 有助于企业平衡敏捷性和安全性,减少潜在风险对声誉、运营和合规的影响。...
2025-8-6 21:41:35 | 阅读: 11 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
appetite
security
certified
regulatory
onboarding
GRITREP: Observed Malicious Driver Use Associated with Akira SonicWall Campaign
近期Akira勒索软件利用SonicWall VPN漏洞展开攻击,通过rwdrv.sys和hlpdrv.sys驱动绕过杀毒软件检测。研究人员提供YARA规则用于检测,并建议加强VPN安全配置。...
2025-8-5 22:20:45 | 阅读: 27 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
hlpdrv
imports
ntoskrnl
akira
ransomware
The Secret Life of APIs: Uncovering Hidden Endpoints and More
文章探讨了单页应用(SPA)中隐藏在JavaScript代码中的API端点和敏感信息,通过手动检查和自动化工具(如Burp Suite的JS Miner扩展)发现潜在的安全漏洞。实际案例展示了如何通过分析JavaScript代码发现管理界面或利用自定义认证头绕过权限控制,强调了深入挖掘JavaScript代码的重要性。...
2025-8-4 13:0:0 | 阅读: 16 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
burp
security
privileged
snipped
Purple Teaming Part 1: The Key to Better Cybersecurity Testing
文章介绍了紫色团队的概念及其在网络安全测试中的优势。传统渗透测试存在局限性,而紫色团队通过结合红队和蓝队的能力,采用标准化框架(如MITRE ATT&CK),设定明确目标,并优化警报响应机制,提升组织的实时检测和防御能力。这种方法帮助组织从被动测试转向主动防御。...
2025-7-30 18:0:4 | 阅读: 8 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
purple
security
teaming
objectives
threats
Previous
2
3
4
5
6
7
8
9
Next