unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Impact of SEC Cyber Rules on Corporate Risk Management
If you work in cybersecurity, follow regulatory changes, or are part of the industry, you’ve likely...
2024-7-19 00:56:5 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
regulatory
security
proactive
expertise
Below The Surface Summer 2024
Welcome to the Summer 2024 edition of the Below the Surface Threat Report. As the heat...
2024-7-19 00:5:53 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
summer
eclypsium
appliances
What You Need to Know to Align With the DoD’s New Zero Trust Overlays
The U.S. Department of Defense’s new document, Zero Trust Overlays, provides the most up-to-date gu...
2024-7-19 00:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
firmware
software
workload
overlays
Securing Cloud Applications: SCIM’s Role in Modern Identity Management
System for Cross-domain Identity Management (SCIM) is an open standard designed to simplify user i...
2024-7-18 23:20:1 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
scim
sso
client
consistent
USENIX Security ’23 – Fuzz The Power: Dual-Role State Guided Black-box Fuzzing for USB Power Delivery
Authors/Presenters:Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick...
2024-7-18 23:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
kim
security
kyungtae
eBPF use cases
What is eBPF and how can it be used within the Kubernetes environment?In the dynamic world of cont...
2024-7-18 21:52:22 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ebpf
network
security
kubernetes
cloud
ESET: Chinese Adware Opens Windows Systems to More Threats
Malware aimed at Chinese-speaking people that passed itself off as a tool for improving the web bro...
2024-7-18 21:44:26 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
processes
hotpage
windows
microsoft
Fraudster’s Fumble: From Phish to Failure
July 18, 2024Additional Contributor: Jake Plant, Strategic Delivery ManagerIntroductionIn contem...
2024-7-18 21:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
attacker
victim
bec
billpay
guidepoint
7.6 Million Reasons: The Evolve Bank Breach and the Rising Ransomware Tide
The hits just keep on coming for financial institutions. Evolve Bank & Trust is the next of many to...
2024-7-18 21:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
ddr
ransomware
evolve
threats
Phishing Threat Actor Leverages AI to Target Multiple Crypto Brands
A crypto phishing campaign has been identified in which a threat actor employs AI-generated content...
2024-7-18 20:51:34 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
duncan
lure
brands
lures
Why SSL certificate renewal automation is essential for businesses of all sizes
Automating SSL certificate renewals is essential for businesses of all sizes to avoid outages and s...
2024-7-18 20:6:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
renewal
renewals
sectigo
validity
security
Strengthening Security Posture in the World of Outsourced Ransomware-as-a-Service (RaaS)
Gone are the days of easy-to-track, stand-alone ransomware groups who carried out attacks with thei...
2024-7-18 19:18:39 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
affiliates
ransomware
security
lockbit
The Difference Between Mitigation and Remediation: A Cyber Practitioner’s Guide
In the cyber security arena, the decision to mitigate or remediate a vulnerability can be pivotal....
2024-7-18 18:10:32 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
operational
exploited
AI-Enabled Digital Messaging: From Political Campaigns to Influence Operations
NisosAI-Enabled Digital Messaging: From Political Campaigns to Influence Operations...
2024-7-18 17:0:18 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
appendix
nisos
elections
election
Data Breaches Impact Growing Number of Victims, ITRC Finds
The number of data breach victims in the first half (H1) of 2024 has surged to 1,078,989,742, marki...
2024-7-18 16:51:2 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
kowski
q2
compromises
surge
No Trespassing: Challenges In Stopping Unauthorized AI Data Scraping
Generative AI (GenAI) relies on training Large Language Models (LLMs) with huge volumes of data. To...
2024-7-18 16:30:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
scraping
scrapers
bytespider
kasada
genai
Content Scraping: What It is and How to Prevent It
Content scraping is when automated scraper bots gather content such as text, pictures, or video fro...
2024-7-18 16:28:26 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
scraping
bots
scraped
scraper
scrapers
CapraRAT Spyware Masks As Popular Android Apps
In the realm of cybercrime, a threat actor by the name of Transparent Tribe is rapidly spreading th...
2024-7-18 15:0:12 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
spyware
caprarat
tktols
maeps
Hacker Leaks Data of More Than 15 Million Trello Users
A threat actor who in January slipped through what they said was an unsecured API to steal personal...
2024-7-18 12:1:45 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
trello
breached
matched
at&t
emo
The Path to Modernizing Your Home-Grown Case Management System
Article Learn how to leverage your current challenges to drive support for a purpose-built case...
2024-7-18 03:57:23 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
grown
disparate
ontic
pieced
Previous
117
118
119
120
121
122
123
124
Next