unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
LockBit Claims Ransomware Attack on U.S. Federal Reserve
The LockBit ransomware group is claiming that it hacked into systems at the U.S. Federal Reserve an...
2024-6-26 03:16:5 | 阅读: 31 |
收藏
|
Security Boulevard - securityboulevard.com
lockbit
ransomware
fed
khoroshev
USENIX Security ’23 – Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion
Authors/Presenters:Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong,...
2024-6-26 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
zhong
presenters
Why Shadow AI is a Bigger Challenge than Shadow IT | Grip
If the 2024 RSA Conference is any indication of cybersecurity priorities, shadow AI is a key focus—...
2024-6-26 02:52:47 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
rogue
casbs
introduces
Proxies as a Service: How to Identify Proxy Providers via Bots as a Service
Bots as a Service DetectionIn this section, we present an initial approach we took to detect a scr...
2024-6-26 02:8:38 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
baas
proxy
datadome
subnet
subnets
$50 Million in BEC Losses
The Eastern District of New York has announced charges against four men for their roles in a Busine...
2024-6-26 02:7:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
funds
york
romance
ademoroti
schemes
Patch or Perish: Secure Your Data Center with Firmware Management
In the dynamic world of data centers, where uptime and security are paramount, firmware management...
2024-6-26 01:44:32 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
firmware
security
hardware
uptime
software
Why SaaS Identity Abuse is This Year’s Ransomware
Scattered Spider made headlines in 2023 with successful ransomware attacks against tw...
2024-6-26 01:0:39 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
ransomware
resorts
mgm
katie
SonarQube 10.6 Release Announcement
We are thrilled to announce the 10.6 release of SonarQube including some significant changes:Sona...
2024-6-26 01:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
sonarqube
fips
kubernetes
announce
autoscaling
Daniel Stori’s ‘The Over Engineer’
Security Boulevard The Home of the Security Bloggers Network ...
2024-6-26 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
boulevard
bloggers
network
Google’s Project Naptime Aims for AI-Based Vulnerability Research
Security analysts at Google are developing a framework that they hope will enable large language mo...
2024-6-26 00:35:21 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
llms
security
llm
naptime
Microsoft Privacy FAIL: Windows 11 Silently Backs Up to OneDrive
Copying users’ files and deleting some? Even a cartoon hound knows this isn’t fine.Microsoft real...
2024-6-26 00:33:29 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
backup
richi
windows
worse
Five Signs You’re Using “Good Enough” Automation
In an industry grappling with a surplus of vendors, a persistent cybersecurity talent shortage, and...
2024-6-26 00:30:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
premium
scalability
grows
settling
Hacking APIs with HTTPie
Hacking APIs is an art; like any artist, the right tools make all the difference. While curl has l...
2024-6-26 00:0:0 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
httpie
proxy
burp
httpbin
scoop
Airbnb’s Ban on Indoor Security Cameras: What It Means for Your Personal Cybersecurity
Effective April 30, 2024 Airbnb, the global vacation rental giant, announced a significant policy c...
2024-6-25 23:48:54 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cameras
security
indoor
rental
airbnb
How platform engineering helps you get a good start on Secure by Design
Designing software from the ground up to be secure, as recommended by the Secure by Design initiati...
2024-6-25 22:5:8 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
development
developers
software
heckathorn
How AttackIQ Can Bolster CORA Compliance in the Federal Government
In the ever-evolving cybersecurity landscape, federal agencies face a growing impera...
2024-6-25 20:42:40 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cora
security
attackiq
threats
assessments
Top 6 Compliance Reporting Tools in 2024
What is a Compliance Report?A compliance report describes how successfully or poorly a company com...
2024-6-25 19:15:25 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
regulatory
centraleyes
regulations
processes
security
Reverse engineering eBPF programs
eBPF is one of the most widely used technologies in today’s computing ecosystem, starting from the...
2024-6-25 17:4:19 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ebpf
prog
ppid
comm
tgid
Addressing Node.js Vulnerabilities in Ubuntu
Node.js is an open-source, cross-platform JavaScript runtime environment built on the powerful V8 e...
2024-6-25 17:0:24 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
tuxcare
bypass
attacker
What is Cyberbullying: Parents Guide
Cyberbullying is a modern issue where technology is used to harass, embarrass, or target someone. I...
2024-6-25 16:19:2 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
bullying
parents
signs
sternx
Previous
138
139
140
141
142
143
144
145
Next