unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Web App Scanning 101: What Security Pros Need to Know About CI/CD Pipelines
Git, repositories and pipelines…oh my! We unpack standard practices in the web app development proce...
2024-12-19 14:0:0 | 阅读: 5 |
收藏
|
Tenable Blog - www.tenable.com
tenable
developers
security
software
jenkins
Cybersecurity Snapshot: Telecoms May Face Tougher Regulations After Salt Typhoon Hacks, as Study Finds Cyber Pros More Stressed at Work
The FCC wants stronger cyber regulations for telecoms after cyber espionage breaches. Meanwhile, fin...
2024-12-13 14:0:0 | 阅读: 11 |
收藏
|
Tenable Blog - www.tenable.com
security
tenable
fcc
salt
New CISA Hardening Guidance Provides Valuable Insights for Network Security Engineers
Recent guidance from CISA and the FBI highlights best practices to monitor and harden network infras...
2024-12-11 22:0:0 | 阅读: 7 |
收藏
|
Tenable Blog - www.tenable.com
network
security
benchmarks
palo
alto
Microsoft Patch Tuesday 2024 Year in Review
2024-12-11 05:52:31 | 阅读: 9 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
nessus
cloud
Microsoft’s December 2024 Patch Tuesday Addresses 70 CVEs (CVE-2024-49138)
2024-12-11 02:47:36 | 阅读: 107 |
收藏
|
Tenable Blog - www.tenable.com
tenable
microsoft
security
cloud
Data Security in Healthcare: How Tenable Cloud Security Can Help
2024-12-9 22:0:0 | 阅读: 3 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
cloud
nessus
healthcare
Cybersecurity Snapshot: Study Raises Open Source Security Red Flags, as Cyber Agencies Offer Prevention Tips Against Telecom Spying Attacks
Don’t miss the Linux Foundation’s deep dive into open source software security. Plus, cyber agencies...
2024-12-6 22:0:0 | 阅读: 4 |
收藏
|
Tenable Blog - www.tenable.com
security
software
network
ransomware
foss
Making Zero Trust Architecture Achievable
2024-12-5 22:0:0 | 阅读: 7 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
cloud
nessus
If You Only Have 1 Minute: Quick Tips for Effective Exposure Response
2024-12-2 22:2:0 | 阅读: 6 |
收藏
|
Tenable Blog - www.tenable.com
tenable
nessus
cloud
exposure
security
If You Only Have 2 Minutes: Best Practices for Setting Exposure Response SLAs
2024-12-2 22:1:0 | 阅读: 5 |
收藏
|
Tenable Blog - www.tenable.com
tenable
exposure
nessus
cloud
security
If You Only Have 3 Minutes: Key Elements of Effective Exposure Response
2024-12-2 22:0:0 | 阅读: 4 |
收藏
|
Tenable Blog - www.tenable.com
tenable
exposure
cloud
nessus
security
Cybersecurity Snapshot: AI Security Roundup: Best Practices, Research and Insights
In this special edition, we’ve selected the most-read Cybersecurity Snapshot items about AI security...
2024-11-29 22:0:0 | 阅读: 7 |
收藏
|
Tenable Blog - www.tenable.com
security
generative
alliance
threats
Walking the Walk: How Tenable Embraces Its "Secure by Design" Pledge to CISA
As a cybersecurity leader, Tenable was proud to be one of the original signatories of CISA’s “Secure...
2024-11-25 22:0:0 | 阅读: 5 |
收藏
|
Tenable Blog - www.tenable.com
security
tenable
pledge
passwords
Cybersecurity Snapshot: Prompt Injection and Data Disclosure Top OWASP’s List of Cyber Risks for GenAI LLM Apps
Don’t miss OWASP’s update to its “Top 10 Risks for LLMs” list. Plus, the ranking of the most harmful...
2024-11-22 22:0:0 | 阅读: 13 |
收藏
|
Tenable Blog - www.tenable.com
security
software
water
ransomware
Active Directory Under Attack: Five Eyes Guidance Targets Crucial Security Gaps
A landmark global report from cybersecurity agencies emphasizes 17 attack techniques against Microso...
2024-11-22 00:38:0 | 阅读: 6 |
收藏
|
Tenable Blog - www.tenable.com
security
attackers
monitoring
ensuring
Five Cyber Agencies Sound Alarm About Active Directory Attacks: Beyond the Basics
2024-11-22 00:36:0 | 阅读: 4 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cloud
security
nessus
attackers
Volt Typhoon: What State and Local Government Officials Need to Know
2024-11-19 22:1:0 | 阅读: 3 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
cloud
nessus
volt
Volt Typhoon: U.S. Critical Infrastructure Targeted by State-Sponsored Actors
Volt Typhoon, a state-sponsored actor linked to the People’s Republic of China, has consistently tar...
2024-11-19 22:0:0 | 阅读: 6 |
收藏
|
Tenable Blog - www.tenable.com
typhoon
volt
tenable
security
CVE-2024-0012, CVE-2024-9474: Zero-Day Vulnerabilities in Palo Alto PAN-OS Exploited In The Wild
2024-11-19 03:22:2 | 阅读: 29 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cloud
nessus
pan
security
New AWS Control Policy on the Block
AWS has released an important new feature that allows you to apply permission boundaries around reso...
2024-11-19 02:0:0 | 阅读: 6 |
收藏
|
Tenable Blog - www.tenable.com
rcps
security
rcp
cloud
scps
Previous
4
5
6
7
8
9
10
11
Next