unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Deepfake Threats and Biometric Security Vulnerabilities
The swift growth in digital authentication services offers governments and organizations the chance...
2024-7-10 17:39:4 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
injection
security
bypass
biometric
Beyond Checklists: The Rise of Automated Vendor Assessment and Enhanced Security
This year marks a turning point in how companies manage the inherent security risks associated with...
2024-7-10 16:39:16 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
enhanced
proactive
assessments
posture
Emerging Technology Highlights New Converged Risks and Asymmetric Threats
Article Protecting high-profile individuals and events as the digital threat landsc...
2024-7-10 05:24:41 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ontic
threats
randolph
chuck
Patch Tuesday Update – July 2024
CVE/AdvisoryTitleTagMicrosoft Severity RatingBase ScoreMicrosoft ImpactExploitedPublicly D...
2024-7-10 05:3:46 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
remote
windows
elevation
bypass
security
Strategies to Safeguard the Finance Industry Against Deepfake Onslaught
With the rise of deepfake technology, the financial sector faces a new and growing threat landscape...
2024-7-10 04:59:43 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
deepfakes
deepfake
finance
security
safeguard
Microsoft in Cybersecurity Leadership Crisis – Open Letter to the CEO
There is no indication that the root of Microsoft’s cybersecurity issues is being addressed. In...
2024-7-10 04:57:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
security
leadership
satya
China-Backed Threat Group Rapidly Exploits New Flaws: Agencies
A state-sponsored cyberespionage group from China is attacking networks in the United States and Ch...
2024-7-10 03:25:56 | 阅读: 24 |
收藏
|
Security Boulevard - securityboulevard.com
apt40
security
software
facing
USENIX Security ’23 – Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis
Authors/Presenters:Rasoul Jahanshahi, Boston University; Babak Amin Azad and Nick Nikif...
2024-7-10 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
boston
youtube
security
presenter
USENIX Security ’23 – USENIX Security ’23 – AnimateDead: Debloating Web Applications Using Concolic Execution
Authors/Presenters:Babak Amin Azad, Rasoul Jahanshahi, Chris Tsoukaladelis, Manuel Egel...
2024-7-10 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
7i
Protecting Travel Rewards: Combating Travel Points Theft in the Hospitality Sector
Frequent travelers and credit card users are familiar with travel points and rewards programs that...
2024-7-10 02:5:22 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
travel
bots
security
consumers
datadome
Randall Munroe’s XKCD ‘Alien Theories’
Permalink*** This is a Security Bloggers Network syndicated blog from Infosecuri...
2024-7-10 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
permalink
network
syndicated
marc
handelman
Biggest Ever Password Leak — but is ObamaCare’s RockYou2024 Really NEW?
Ten billion plain-text passwords in a file: Sky falling or situation normal?The internet’s bigges...
2024-7-10 00:45:49 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
stuffing
richi
rockyou
The Pivotal Role Protective DNS Plays In Cyber Defense
Bad actors will always find a way to penetrate organizations if they want to. Businesses need...
2024-7-10 00:25:18 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
pdns
protective
threats
security
operational
Year in Review: GitGuardian’s Own Security Team
Kayssar Daher Lead Security Engineer at GitGuardianI'm a systems security & data priva...
2024-7-10 00:0:41 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
gitguardian
velocity
workflows
priorities
Finding hidden API parameters
One of the primary ways to find security vulnerabilities in an API is to get it to work in ways the...
2024-7-10 00:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
miner
burp
security
distribute
USENIX Security ’23 – Cookie Crumbles: Breaking and Fixing Web Session Integrity
Authors/Presenters:Marco Squarcina, Pedro Adão, Lorenzo Veronese, Matteo Maffei Many...
2024-7-9 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
nocookie
bloggers
Securing Developer Tools: Unpatched Code Vulnerabilities in Gogs (2/2)
In last week's blog post, we examined an unfixed vulnerability in Gogs, an open-source solution for...
2024-7-9 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
gogs
treepath
repository
maintainers
The Alert Avalanche: Why Prioritizing Security Alerts is a Matter of Survival
Joe Ariganello VP of Product Marketing Joe is the VP of Product Marketing at MixMode. He has led p...
2024-7-9 22:30:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
mixmode
positives
fatigue
Mastering the Art of GRC Automation: Key Deliverables
What are GRC Automation Deliverables?In the realm of Governance, Risk, and Compliance (GRC), autom...
2024-7-9 22:30:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
grc
automating
processes
dashboards
Limitations of current automatic specification generation tools
Have you ever wondered how automatic specification generation can streamline API security scanning...
2024-7-9 22:19:24 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
analysis
limitations
annotations
development
Previous
125
126
127
128
129
130
131
132
Next