unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
A Deep Dive into ISO 27001 Password Requirements
No matter how you choose to look at it, passwords are the digital equivalent of keys to your bu...
2025-1-16 15:5:38 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
27001
security
passwords
scytale
importance
New Cybersecurity Executive Order: What It Means for Federal Agencies
The Executive Order on Stren...
2025-1-16 14:52:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
eo
cloud
software
Network Detection and Response (NDR) Done Right from the Ground Up
Swiftly identifying network issues is crucial for delivering both robust cyber protection and a...
2025-1-16 13:7:21 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ndr
network
security
positives
What is an Uncensored Model and Why Do I Need It
GenAI is revolutionizing every industry to the point that a new GenAI model is released daily su...
2025-1-16 12:50:28 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
uncensored
censorship
genai
Top Digital Tools for the Classroom
Digital tools are reshaping the traditional K-12 learning experience, unleashing a wave of benef...
2025-1-16 12:5:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
classroom
teachers
educators
ensuring
Best AutoSPF Alternatives: Detailed Feature Comparison
Today, the email authentication market is full of SPF flattening tools that help you simplify a...
2025-1-16 10:39:35 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
spf
flattening
autospf
powerdmarc
10 Essential GRC Policy Management Best Practices
Policy management is the sturdy scaffolding that supports governance, risk, and compliance (GRC)...
2025-1-16 08:6:32 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
grc
centraleyes
regulatory
governance
adherence
Infectious Prompt Injection Attacks on Multi-Agent AI Systems
When disruptive technology becomes part of our lives, there’s always going to be an adversarial...
2025-1-16 07:56:33 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
injection
agrawal
harmful
malicious
Microsoft’s January Security Update of High-Risk Vulnerabilities in Multiple Products
OverviewOn January 14, NSFOCUS CERT detected that Microsoft released a security update patch fo...
2025-1-16 03:8:49 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
windows
microsoft
remote
security
telephony
Fortinet OS & FortiProxy Authentication Bypass Vulnerability (CVE-2024-55591) Notification
OverviewRecently, NSFOCUS CERT detected that Fortinet has issued a security notification and fi...
2025-1-16 02:47:21 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
fortiproxy
security
bypass
network
7 Essential Security Operations Center Tools for 2025
Equipping your security operations center (SOC) team with the right tools is essential to their su...
2025-1-16 01:50:49 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
threats
security
swimlane
turbine
processes
News alert: Aembit announces speakers for NHIcon event, highlighting non-human identity security
Silver Spring, MD, Jan. 15,...
2025-1-16 00:44:58 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
aembit
identities
nhicon
founder
News alert: Sweet Security’s LLM-powered detection engine reduces cloud noise to 0.04%
Tel Aviv, Israel, Jan. 15, 2025, CyberNewswire — Sweet Security, a leader in cloud runtime detec...
2025-1-16 00:26:48 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
sweet
cloud
security
llm
noise
News alert: Wultra secures €3M funding to help financial firms mitigate coming quantum threats
Prague, Czech Republic, Jan. 15, 2025, CyberNewswire — Quantum computing is set to revolutionize t...
2025-1-16 00:5:35 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ventures
wultra
tensor
fund
GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesia
Since 1974, gambling has been officially illegal in Indonesia. However, the digital revolution o...
2025-1-15 23:53:37 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
gsocket
gambling
php
moodle
imperva
RansomHub Affiliate leverages Python-based backdoor
January 15, 2025In an incident response in Q4 of 2024, GuidePoint Security identified evidence...
2025-1-15 21:53:41 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
python
c2
guidepoint
network
proxy
DEF CON 32 – Small Satellite Modeling and Defender Software
Author/Presenter: Kyle Murbac...
2025-1-15 20:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
syndicated
publishing
youtube
kyle
FBI Deletes PlugX Malware From Computers Infected by China Group
The FBI, with the help of French law enforcement and a private cybersecurity company, deleted a...
2025-1-15 18:49:16 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
plugx
c2
french
affidavit
Protecting the software supply chain: Insights from our expert panel
As software grows increas...
2025-1-15 18:39:9 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
software
sonatype
security
linskens
Saving CI/CD time with Ephemeral test databases
In previous articles, we’ve...
2025-1-15 18:2:3 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
ephemeral
tonic
database
rds
deployments
Previous
5
6
7
8
9
10
11
12
Next