unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
What role do NHIs play in our organization’s security posture?
非人类身份(NHIs)在组织安全中扮演关键角色,涉及自动化系统、服务器等机器身份的管理。有效管理NHIs及其访问凭证可降低风险、提高合规性、增强效率和可见性,并降低成本。...
2025-3-6 22:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
nhis
nhi
identities
posture
What Is Data Leak Prevention? Benefits and Best Practices
Today’s organizations work with incredible quantities of data. From corporate trade secrets to c...
2025-3-6 21:45:10 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
leakage
legit
monitoring
exposure
What Is an Identity Provider (IdP) and How Does It Work?
Managing online accounts shouldn’t feel like a chore. But when so many websites and systems requ...
2025-3-6 21:44:13 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
idps
idp
cloud
Patch Management Guide: Benefits and Best Practices
Developers periodically review software and release patches to remedy any bugs. When patches hap...
2025-3-6 21:43:8 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
avoids
legit
DEF CON 32 – War Stories – Hacking Millions Of Modems And Investigating Who Hacked My Modem
2025-3-6 20:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
network
boulevard
Votiro’s Proven Protection: Retroscan for Zero-Day Threats
文章讨论了零日威胁如何绕过传统安全防御,并介绍Votiro的Content Disarm and Reconstruction (CDR)技术通过主动分解和重建文件来消除潜在威胁。其 Retroscan功能可回溯验证已处理文件的安全性,确保即使在病毒定义更新后仍能检测到隐藏威胁,从而提升组织的网络安全防护能力。...
2025-3-6 19:0:8 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
votiro
security
retroscan
threats
cdr
Daniel Stori’s Turnoff.US: ‘Docker Panacea’
via the i...
2025-3-6 18:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
network
marc
geek
panacea
Emulating the Relentless RansomHub Ransomware
RansomHub is a Ransomware-as-a-Service (RaaS) operation that emerged in early 2024, targeting organ...
2025-3-6 17:48:35 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
windows
security
ransomhub
attackiq
Why Understanding Your Secrets is the Key to Faster Remediation
API密钥、密码和令牌等“秘密”是访问非人类身份的关键。泄露这些秘密可能导致攻击者入侵系统。修复泄露的平均时间为27天,因缺乏对秘密用途和影响的了解而延迟修复。通过明确所有权、提供决策依据和指导即时修复等方法,可加快 remediation 过程并减少风险。...
2025-3-6 17:37:10 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
developers
workflows
attackers
rotation
Inside Black Basta Ransomware Group’s Chat Leak
Internal conflicts within the notorious Black Basta ransomware group have led to a massive leak...
2025-3-6 17:30:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
basta
cves
ransomware
Top 5 Ways Automation Increases Profitability
文章指出自动化是提升企业盈利能力的关键策略。通过消除重复性任务、优化资源分配和提高效率,企业可以降低成本、减少客户流失并实现可持续增长。自动化还能增强安全性、提升服务质量并赋能员工专注于高价值工作,从而推动业务扩展和利润增长。...
2025-3-6 17:23:56 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
client
costs
msps
Decrypting the Forest From the Trees
SCCM 的森林发现账户密码可被解密,尤其是当站点服务器为受管客户端时,可通过管理服务 API 实现。...
2025-3-6 16:46:10 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
forest
sccm
decrypted
database
forests
Data Security in the Age of AI with Rob Truesdell
Rob Truesdell探讨了企业在AI时代重新思考数据安全的重要性,指出传统安全工具在连接敏感数据与大型语言模型时的不足,并强调随着软件行业快速发展至2027年预计达到100万组织规模,这一问题尤为关键。...
2025-3-6 16:46:3 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
alan
shimel
conferences
york
Cybersecurity Requirements of Cloud Computing with Brooke Motta
RAD Security CEO探讨云计算环境下的网络安全需求及行业趋势,包括平台化安全解决方案、专用工具与集成方法的辩论、AI工作负载带来的新风险及合规趋势。她还强调了保持安全与快速软件开发同步的重要性,并指出AI在攻防中的作用及常见安全误区。...
2025-3-6 15:53:21 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
motta
brooke
development
cloud
Credit Card Fraud: How Does It Work?
文章详细介绍了信用卡欺诈的五个步骤:卡片被攻破、地下市场分发、卡片验证、卡片的货币化以及清除痕迹,并探讨了犯罪分子使用的工具和防御措施。...
2025-3-6 15:44:4 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
carding
software
charges
purchases
The Fallacy of Arbitrary Severity Scales
文章探讨了网络安全领域中传统漏洞评分系统的局限性及其对防御策略的影响。当前工具依赖于基于已知指标的任意评分体系,缺乏对漏洞可利用性、业务影响及特定环境因素的考量。这导致安全团队难以区分真正威胁与干扰。作者呼吁采用更智能的优先级划分方法,结合漏洞验证、业务影响及实际环境等多维度数据重新评估风险,并强调新兴技术与文化转变的重要性以实现更有效的安全管理。...
2025-3-6 15:30:1 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
scales
categorized
Chainguard “FIPS” Apache Cassandra
Chainguard 修改 Apache Cassandra 使其符合 FIPS 加密标准,解决了政府、医疗和金融等行业长期以来的合规难题。通过模块化加密系统实现无缝切换,无需修改基础设施或承担风险。 Chainguard 还计划将类似升级扩展到 Apache Kafka 和 Spark 等工具。...
2025-3-6 14:51:9 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
fips
chainguard
cassandra
security
centraleyes
Deciphering Black Basta’s Infrastructure from the Chat Leak
By Oleg Lypko, with Estelle Ruellan and Tammy Harper (Flare Research)This article has original...
2025-3-6 14:47:16 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
basta
tramp
flare
ransomware
gg
The cybersecurity ‘fog of war’: How to apply data science to cut through
文章探讨了网络安全团队在应对快速变化的网络攻击时面临的“战争迷雾”问题,并提出了通过态势感知、威胁情报、事件响应规划和异常检测四大支柱来提升决策能力。同时强调了数据科学在解决数据管理、威胁综合、检测工程和团队技能方面的重要性。...
2025-3-6 14:43:34 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
fog
greksza
shook
Hackers Made $600,000 Selling Stolen Taylor Swift Concert Tickets
A group that hacked into StubHub’s computer system and stole more than 900 digital event tickets...
2025-3-6 14:40:4 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
tour
stubhub
york
rose
arrested
Previous
9
10
11
12
13
14
15
16
Next