unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Randall Munroe’s XKCD ‘Pascal’s Wager Triangle’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-6-22 01:0:0 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
dealerships
1inch
cdk
Vendor-Neutral Asset Auto-Discovery: The Cornerstone of DCIM Software
The landscape of modern data centers is increasingly complex, characterized by a multitude of dive...
2024-6-22 00:57:35 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
asset
operational
dcim
centers
software
30,000 Dealerships Down — ‘Ransomware’ Outage Outrage no. 2 at CDK Global
Car and truck dealers fall back on pen and paper as huge SaaS provider gets hacked (again).CDK Glo...
2024-6-21 23:30:42 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
cdk
dealers
software
equity
richi
USENIX Security ’23 – KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations
Authors/Presenters: Tingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao...
2024-6-21 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
yin
originating
Hunting for Credential Theft – Identify When an InfoStealer May be Stealing Sensitive Access
Threat Overview – Hunting for Credential Theft – Identify When an InfoStealer May be Stealing Sensi...
2024-6-21 22:30:37 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
hunt
windows
onenote
identify
microsoft
News Alert: 1inch partners with Blockaid to enhance Web3 security through the 1inch Shield
Dubai, UAE, June 20, 2024, CyberNewsWire — 1inch, a leading DeFi aggregator that provides advanced...
2024-6-21 21:52:43 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
1inch
web3
blockaid
security
defi
News Alert: INE Security lays out strategies for optimizing security teams to mitigate AI risks
Cary, NC, June 20, 2024, CyberNewsWire — 2024 is rapidly shaping up to be a defining year in gener...
2024-6-21 21:1:5 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
ine
threats
Cybersecurity Insights with Contrast CISO David Lindner | 6/21/24
Insight #1It’s easy to get distracted by listicles about the hottest IT security c...
2024-6-21 21:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
lindner
salary
bump
Understanding Access Control Models: RBAC, ABAC, and DAC
Access control is a fundamental aspect of information security, ensuring that only aut...
2024-6-21 18:31:51 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
dac
rbac
abac
security
How to Identify and Protect Against Phishing Emails Leveraging Data Broker Information
Reading Time: 5 minAs technological advancements accelerate and internet usage increases, more a...
2024-6-21 16:11:8 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
brokers
phishers
deceive
passwords
CISA Alert: Urgent Patching Required for Linux Kernel Vulnerability
Given the active exploitation of this Linux kernel vulnerability, federal agencies are strongly ur...
2024-6-21 16:0:45 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
1086
tuxcare
security
cloudlinux
network
Python Developers Targeted Via Fake Crytic-Compilers Package
As per recent reports, cybersecurity experts uncovered a troubling development on the Python Packag...
2024-6-21 15:0:46 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
crytic
python
compilers
malicious
developers
It’s a Hard Time to Be a CISO. Transformational Leadership is More Important Than Ever.
Modern chief information security officers (CISOs) are navigating tough circumstances due to comple...
2024-6-21 15:0:37 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
cisos
ciso
stress
How to find Kaspersky products with runZero
Kaspersky, the Moscow-based cyber security company that competes with the likes of Norton, Trellix...
2024-6-21 11:37:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
cloud
runzero
Report Details Reemergence of Lockbit 3.0 Ransomware Syndicate
An analysis of ransomware attacks claimed to have been perpetrated by cybercriminal syndicates that...
2024-6-21 07:29:14 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
lockbit
affiliates
america
Cyber A.I. Group Announces the Engagement of Walter L. Hughes as Chief Executive Officer
Miami, United States, June 20th, 2024, CyberNewsWireHighly Successful Technology Executive to Dri...
2024-6-21 04:45:34 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
capital
trilogy
hughes
mr
Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code
AI promises many advantages when it comes to application development. But it’s also giving threat a...
2024-6-21 04:23:17 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
malicious
developers
llm
hallucinate
security
Why Devs Aren’t Responsible for Non-Human Credential Hygiene
How Developers Became Accidental Gatekeepers of Non-Human CredentialsApplications have evolved fro...
2024-6-21 03:49:26 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
developers
workload
workloads
Identity Fraud Does Not Discriminate
From banking to real estate, healthcare, ride sharing, and more, it’s increasingly clear that no se...
2024-6-21 03:21:43 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
entrust
industries
american
security
onfido
Digital Identity: There’s a Lot at Stake
Midway through 2024, we’ve moved beyond digital transformation to become digital first. From shoppi...
2024-6-21 03:4:48 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
eudi
identities
wallets
stake
security
Previous
141
142
143
144
145
146
147
148
Next