unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Identity Security Is the Missing Link To Combatting Advanced OT Threats
日益复杂的网络威胁尤其是"living-off-the-land"(LotL)攻击正利用身份漏洞入侵关键基础设施。这些攻击利用现有工具而非恶意软件以规避检测,在OT环境中尤其危险因 legacy系统缺乏监控且常与IT共享资源。强化身份安全与统一暴露管理可帮助检测、优先处理及缓解跨IT与OT环境的风险。...
2025-2-26 14:0:0 | 阅读: 8 |
收藏
|
Tenable Blog - www.tenable.com
security
attackers
exposure
tenable
identify
Identity Is the New Battleground: Why Proactive Security Is the Way Forward
文章指出身份安全面临多重挑战:身份蔓延导致盲点增加攻击面;传统安全措施难以应对AI驱动的复杂攻击;需采取主动策略并借助工具如Tenable Identity 360进行风险评估和管理以加强防护。...
2025-2-24 14:0:0 | 阅读: 9 |
收藏
|
Tenable Blog - www.tenable.com
security
attackers
identities
exposure
proactive
Cybersecurity Snapshot: Ghost Ransomware Group Targets Known Vulns, CISA Warns, While Report Finds Many Cyber Pros Want To Switch Jobs
文章讨论了Ghost勒索软件团伙利用已知漏洞攻击组织的问题,并提供了缓解建议。同时,探讨了如何吸引和留住网络安全人才的方法,并介绍了CIS关于恶意软件的最新报告、AI安全黑客马拉松、更新后的CIS基准以及国际执法行动打击勒索软件团伙的情况。...
2025-2-21 14:0:0 | 阅读: 19 |
收藏
|
Tenable Blog - www.tenable.com
security
ransomware
benchmarks
software
How To Reduce DNS Infrastructure Risk To Secure Your Cloud Attack Surface
文章探讨了DNS基础设施管理不当带来的安全风险,特别是随着云服务的扩展。DNS漏洞可能导致子域名被接管,进而引发钓鱼、邮件劫持、跨站脚本攻击等威胁。文章还介绍了如何通过最佳实践和Tenable插件检测、预防和缓解这些风险。...
2025-2-19 14:0:0 | 阅读: 8 |
收藏
|
Tenable Blog - www.tenable.com
cloud
subdomain
security
cname
attacker
Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat
本文总结了六项网络安全关键议题:美国政府呼吁采用安全编码实践以防止缓冲区溢出攻击;欧洲刑警组织建议金融机构为量子计算威胁做好准备;Tenable调查显示云安全仍是主要挑战;Google报告强调国际合作对打击网络犯罪的重要性;美国两党提出法案以加重网络犯罪惩罚;NCC Group报告指出2024年勒索软件攻击激增15%。...
2025-2-14 14:0:0 | 阅读: 10 |
收藏
|
Tenable Blog - www.tenable.com
security
ransomware
overflow
tenable
cloud
Frequently Asked Questions About DeepSeek Large Language Model (LLM)
文章介绍了DeepSeek开源大语言模型及其V3和R1版本的技术特点与性能优势,并探讨了运行要求、与其他模型的差异及安全隐私问题。部分国家和地区已禁止或考虑禁止使用DeepSeek。...
2025-2-13 14:30:0 | 阅读: 5 |
收藏
|
Tenable Blog - www.tenable.com
deepseek
llms
tenable
security
reasoning
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)
微软在2025年2月修复了55个CVE漏洞,其中包括3个关键漏洞和4个零日漏洞(其中两个已被利用)。受影响的组件包括Active Directory、Azure、Office和Windows等。远程代码执行(RCE)占38.2%,权限提升(EoP)占34.5%。...
2025-2-11 18:44:43 | 阅读: 178 |
收藏
|
Tenable Blog - www.tenable.com
tenable
microsoft
security
nessus
cloud
Cybersecurity Snapshot: Cyber Agencies Offer Best Practices for Network Edge Security, While OWASP Ranks Top Risks of Non-Human Identities
Check out recommendations from CISA and others on how to protect network edge devices and applicatio...
2025-2-7 15:0:0 | 阅读: 15 |
收藏
|
Tenable Blog - www.tenable.com
security
ransomware
nhis
refers
cmc
Tenable Supercharges Exposure Management with Acquisition of Vulcan Cyber
2025-2-7 14:19:0 | 阅读: 3 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
cloud
nessus
exposure
CISA Releases FOCAL Plan to Help Federal Agencies Reduce Cyber Risk
2025-2-4 14:0:0 | 阅读: 10 |
收藏
|
Tenable Blog - www.tenable.com
focal
security
tenable
operational
Cybersecurity Snapshot: CSA Offers Tips for Deploying AI Securely, While Deloitte Says Cyber Teams’ GenAI Use Yields Top ROI
Check out the Cloud Security Alliance’s recommendations for rolling out AI apps securely. Meanwhile,...
2025-1-31 14:0:0 | 阅读: 10 |
收藏
|
Tenable Blog - www.tenable.com
security
generative
ciso
cxos
What Makes This “Data Privacy Day” Different?
As we celebrate Data Privacy Day, Bernard Montel, Tenable’s EMEA Technical Director and Security Str...
2025-1-28 05:1:0 | 阅读: 16 |
收藏
|
Tenable Blog - www.tenable.com
cloud
security
tenable
posture
dspm
How To Clean Up Your Cloud Environment Using Tenable Cloud Security
You must periodically review your cloud environments to remove old and unused resources because they...
2025-1-27 14:0:0 | 阅读: 9 |
收藏
|
Tenable Blog - www.tenable.com
cloud
security
tenable
iac
buckets
Cybersecurity Snapshot: WEF Offers AI Security Best Practices, as DORA Regulation Places Strict Cyber Rules on Banks
Check out tips for adopting AI securely from the World Economic Forum. Plus, the EU’s DORA cyber rul...
2025-1-24 14:0:0 | 阅读: 14 |
收藏
|
Tenable Blog - www.tenable.com
cloud
dora
benchmarks
ransomware
CVE-2025-23006: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Reportedly Exploited
2025-1-23 17:54:0 | 阅读: 34 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
sma
scott
sma100
Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
Salt Typhoon, a state-sponsored actor linked to the People’s Republic of China, has breached at leas...
2025-1-23 14:0:0 | 阅读: 14 |
收藏
|
Tenable Blog - www.tenable.com
typhoon
tenable
salt
security
Oracle January 2025 Critical Patch Update Addresses 186 CVEs
2025-1-22 17:52:40 | 阅读: 159 |
收藏
|
Tenable Blog - www.tenable.com
security
tenable
quarter
scott
318
Cybersecurity Snapshot: CISA Lists Security Features OT Products Should Have and Publishes AI Collaboration Playbook
Shopping for OT systems? A new CISA guide outlines OT cyber features to look for. Meanwhile, the U.S...
2025-1-17 14:0:0 | 阅读: 10 |
收藏
|
Tenable Blog - www.tenable.com
security
development
software
New Cybersecurity Executive Order: What It Means for Federal Agencies
The Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity includes...
2025-1-16 14:52:0 | 阅读: 14 |
收藏
|
Tenable Blog - www.tenable.com
security
eo
cloud
software
5 Things Government Agencies Need to Know About Zero Trust
2025-1-15 14:0:0 | 阅读: 4 |
收藏
|
Tenable Blog - www.tenable.com
security
exposure
tenable
robert
Previous
3
4
5
6
7
8
9
10
Next