unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Why Attackers Target On-prem Active Directory
文章分析了黑客针对企业Active Directory的攻击情况,指出其成为高价值目标的原因,并列举了五个主要漏洞:影子管理员、遗留设置、服务账户、未修补漏洞及过多特权账户。同时强调组织应立即进行安全评估、制定补丁策略和加强混合环境的安全性以应对威胁。...
2025-7-29 22:0:10 | 阅读: 31 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
attackers
derek
entra
cloud
Reflections on SciPy 2025: How Python is Shaping AI and Cybersecurity
SciPy 2025大会在华盛顿州塔科马举行,为期七天的活动汇聚了研究人员、工程师和开源贡献者,探讨Python在科学、数据工程与网络安全中的应用。会议亮点包括可解释性AI工具(如SHAP和LIME)、数据转换框架Ibis、图数据分析工具NetworkX以及大型语言模型的实际部署挑战与安全措施。...
2025-7-25 18:48:53 | 阅读: 23 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
scipy
keegan
The Strategic Power of Cyber Risk Appetite: Making Security Decisions with Clarity and Confidence
网络安全中的风险承受能力定义了组织愿意接受的威胁类型和水平以实现业务目标。它作为决策工具帮助优先处理关键问题、权衡取舍并统一领导层行动。有效的风险承受能力需反映现实、指导决策并与业务战略对齐。通过将其嵌入日常运营和培训中,并定期审查,组织能更高效地管理风险。...
2025-7-23 17:3:9 | 阅读: 13 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
appetite
security
leaders
strategic
The Identity Security Crisis: What the Data Tells Us
身份攻击已成为组织日常问题,50%的机构在过去一年遭受此类事件。泄露凭证、身份盗窃和钓鱼是主要原因。尽管风险高企,但仅39%的机构采用身份验证方案。技术、人才和资源短缺是主要障碍。...
2025-7-22 13:43:55 | 阅读: 14 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
laura
experienced
gap
The CRQ Mandate: Why Financial Risk Insight Is the Future of Cybersecurity
文章探讨了网络安全从技术问题转向战略业务机会的趋势,强调了量化网络风险(CRQ)的重要性。CRQ通过将技术风险转化为具体财务影响,帮助组织识别关键风险、优化资源分配并提升决策能力。其应用不仅增强风险管理的透明度和可比性,还助力企业与管理层沟通、优化预算分配及强化保险谈判地位。数据显示采用CRQ的组织在风险管理和预算合理性方面有显著提升。...
2025-7-21 15:43:27 | 阅读: 16 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
crq
ben
F5 on How Fragmented Application Access Is Sabotaging Your Security
文章探讨了现代应用环境的安全挑战,指出分布式架构和多部署模型导致安全策略不一致和管理复杂性增加。强调通过零信任、多因素认证、单点登录和上下文访问控制等措施加强身份和访问管理的重要性,以平衡安全性和用户体验。...
2025-7-18 11:57:0 | 阅读: 9 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
sso
spot
The Crucial Role of Business Impact Analysis (BIA) in Cyber Resilience
文章介绍了业务影响分析(BIA)的重要性及其在网络安全和业务连续性中的作用。通过识别关键资产、系统和流程,BIA帮助组织评估风险、制定应对策略并提升整体韧性。结合NIST框架和业务连续性管理生命周期,BIA支持持续改进和适应新兴威胁。...
2025-7-17 19:17:7 | 阅读: 14 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
bia
resilience
continuity
planning
processes
Insights from the GRIT Q2 2025 Ransomware & Cyber Threat Report
勒索软件威胁加剧,活跃团伙数量激增58%,制造业成主要目标(增长44%),DragonForce团伙迅速扩张。全球执法行动加强,逮捕270人并打击暗网市场。...
2025-7-10 11:5:0 | 阅读: 4 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
ransomware
security
q2
dragonforce
What Innovative Solutions or Technologies Are on the Horizon to Combat Social Engineering and Malware?
文章探讨了社会工程学和恶意软件对网络安全构成的威胁,并指出传统防御措施如防火墙和安全意识培训已不足以应对日益复杂的攻击。作者提出了一种主动的社会工程防御框架SED,并介绍了其他创新技术如AI用户行为分析和零信任架构,强调组织需转向预测性策略以应对未来威胁。...
2025-7-9 14:47:22 | 阅读: 16 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
threats
phishing
doppel
attackers
Playing the Cybersecurity Odds: How to Bet Smart in an Uncertain Economy
文章探讨了在不确定经济环境下如何通过风险管理提升网络安全策略的有效性。强调将技术威胁转化为业务风险语言的重要性,并介绍了FAIR等框架帮助量化风险、优化投资决策。...
2025-7-7 13:0:0 | 阅读: 29 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
fair
ben
odds
How Ransomware Groups Exploit “Business as Usual” in FinServ
2025年第一季度金融服务行业遭受最多网络攻击。尽管勒索软件攻击减少(归因于安全投资增加、合规加强及执法打击),但该行业仍面临威胁。恶意软件GootLoader和GootKit通过钓鱼邮件和SEO中毒传播,利用文档驱动的工作流程进行攻击。建议加强员工培训、检测规则配置等措施以防范威胁。...
2025-7-3 19:0:0 | 阅读: 27 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
ransomware
gootloader
gootkit
attackers
expel
Tabletop Exercises vs. IR Maturity Assessments — What’s the Difference?
文章介绍了两种提升组织事件响应能力的服务:桌面演练和事件响应成熟度评估(IRMA)。桌面演练通过模拟真实场景测试团队应对能力,而IRMA则全面评估整个响应流程的技术和战略准备情况。两者结合使用可帮助组织减少风险、满足合规要求并提升应对能力。...
2025-7-2 20:55:49 | 阅读: 18 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
tabletop
security
maturity
exercises
readiness
Setting Boundaries: How to Define and Enforce Third-Party Cyber Risk Tolerance
文章指出第三方供应商在企业运营中至关重要但其带来的网络安全风险日益突出传统年度评估已不足以应对威胁需通过明确的风险容忍度和持续监控来管理第三方安全问题以保护数据和声誉并确保业务韧性。...
2025-6-30 13:0:0 | 阅读: 19 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
tolerance
thresholds
certified
parties
The Birth and Death of “LoopyTicket” – Our Story on CVE-2025-33073
研究人员在实验中意外发现Kerberos Reflection攻击漏洞(CVE-2025-33073),通过设置特定DNS记录并结合工具(如PetitPotam和krbrelayx),成功反射认证并获取域控制器的SAM hive。该漏洞利用需满足网络访问、域用户凭证、SMB签名未启用等条件,并可扩展至成员服务器。...
2025-6-27 13:0:0 | 阅读: 78 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
htp
client
loaded
dc01
planet
The Cyber Risk-Business Alignment Imperative: Insights from the 2025 State of Cyber Risk Management Report
文章探讨了网络风险管理的重要性,指出成熟策略结合自动化和AI能有效降低风险,并强调数据整合和跨部门沟通对提升组织韧性的作用。...
2025-6-26 11:0:0 | 阅读: 28 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
maturity
appetite
assessments
Expert Guidance, Real Impact: What the NTAS Advisory Means for Your Organization
中东紧张局势加剧引发网络安全威胁上升,美国Homeland Security发布警告称可能面临报复性网络攻击。专家建议企业加强风险管理、身份认证、云安全和物联网防护等措施以应对潜在威胁。...
2025-6-25 21:11:56 | 阅读: 36 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
guidepoint
cloud
threats
attackers
Why IAM Maturity Still Eludes Most Organizations — And What High Performers Are Doing Differently
文章指出身份和访问管理(IAM)在当前威胁环境中的重要性,尽管投入增加但多数组织仍未能达到成熟水平。研究显示高绩效者采用生物识别、自动化等先进技术,而其他组织则面临资源不足、流程手动化等问题。...
2025-6-25 16:10:0 | 阅读: 36 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
performers
security
investment
maturity
identities
Identity saw a large push for MFA in 2024, but now that bad actors are stealing credentials, what’s next?
文章指出,随着威胁 actors 的不断进化,传统的多因素认证(MFA)已不足以应对日益复杂的网络攻击。未来的身份安全需要结合自适应认证、无密码方案以及自动化零信任模型来增强防护能力。同时,人工智能在攻击和防御中的应用将改变身份安全的格局。...
2025-6-24 13:0:0 | 阅读: 16 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
attackers
adaptive
adapt
Future-Proofing Your AWS Security: Expert Insights from Re:Inforce 2025
GuidePoint Security参加了AWS Re:Inforce 2025大会,探讨云安全挑战并分享新技术如Security Hub增强、GuardDuty扩展及AI集成。...
2025-6-23 19:56:24 | 阅读: 24 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
security
cloud
eks
guidepoint
analyzer
Embracing the Gigawave: Reflections from Zenith Live 2025
文章探讨了人工智能(AI)作为当前时代的核心驱动力及其带来的机遇与风险。强调了零信任架构在保障AI安全中的关键作用,并介绍了Zscaler的相关创新技术及成功案例。...
2025-6-20 13:0:0 | 阅读: 60 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
zscaler
security
era
industries
securely
Previous
3
4
5
6
7
8
9
10
Next