unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet
Authors/Presenters:Nurullah Erinola, Marcel Maehren, Robert Merget, Juraj Somorovsky, J...
2024-6-15 23:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
nocookie
marriott
FedRAMP vs. ISO 27001: How They Compare and Which Do You Need?
In the world of security, there are many different frameworks that may be relevant or important to...
2024-6-15 06:19:39 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
fedramp
security
27001
cloud
pursue
Contrast Security | PwC Luxembourg Award | Runtime Security
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-6-15 06:4:33 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
fedramp
digest
boulevard
Liquidmatrix Security Digest Podcast – Episode 79
Episode 0x79We have no idea what’s going on either… But we’re going to keep doing t...
2024-6-15 05:41:44 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
episode
digest
tired
Understanding Apple’s On-Device and Server Foundation Models release
By Artem DinaburgEarlier this week, at Apple’s WWDC, we finally witnessed Apple’s AI strategy. The...
2024-6-15 04:49:37 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
adapters
vocabulary
inference
adapter
PCC: Bold step forward, not without flaws
By Adelin TraversEarlier this week, Apple announced Private Cloud Compute (or PCC for short). With...
2024-6-15 03:46:48 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
pcc
security
cloud
hardware
compute
USENIX Security ’23 – Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Authors/Presenters:Tomas Hlavacek, Haya Shulman, Niklas Vogel, Michael Waidner Many t...
2024-6-15 03:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
originating
pet25jtvwls
CVE of the month, CheckPoint Security Gateway exploit CVE-2024-24919
Another month brings with it another bunch of CVEs we can analyze, while WordPress plugins certain...
2024-6-15 02:17:41 | 阅读: 24 |
收藏
|
Security Boulevard - securityboulevard.com
security
checkpoint
gateways
watchtowr
exploited
A New Tactic in the Rapid Evolution of QR Code Scams
read file error: read notes: is a directory...
2024-6-15 01:36:56 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
qr
security
phishing
fuchs
malicious
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #293 – Holacracy
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-6-15 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
tactic
Better SaaS Security with AppOmni and Okta Identity Engine
By Alex Carroll, Senior Solutions Engineer, AppOmniStrong SaaS security starts with accurate confi...
2024-6-15 00:55:40 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
okta
appomni
security
oie
From Check-In to Check-Out: Calculating the Cost of Online Threats for the Travel Industry
The travel and hospitality industry faces significant financial risks from online fraud and cyber a...
2024-6-15 00:48:45 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
costs
travel
losses
threats
booking
We Love What’s Broken … Yes, This Of Course Means SIEM!
We Love What’s Broken … Yes, This Of Course Means SIEM!SIEM challenges never stopped m...
2024-6-15 00:46:11 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
anton
cloud
network
detections
Protect, Detect, and Respond Using a Risk-Based Approach
The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides guideli...
2024-6-15 00:38:54 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
pondurance
dustin
threats
considers
The Growing Importance of Securing Local Access in SaaS Applications
read file error: read notes: is a directory...
2024-6-15 00:13:37 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
idp
attackers
pathways
Proactive Intelligence Against Infostealers: Lessons from the Snowflake Data Breach
After major cyber attacks or data breaches, cybersecurity companies and professiona...
2024-6-15 00:5:1 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
ironnet
snowflake
universally
bloggers
proactive
Ensuring Data-Centric Security on IBM z Series: comforte’s Customer Success Stories and Best Practices
In today’s rapidly evolving digital landscape, the importance of data security cann...
2024-6-15 00:4:40 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
comforte
centric
stories
importance
USENIX Security ’23 – HOLMES: Efficient Distribution Testing for Secure Collaborative Learning
Authors/Presenters:Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Ralu...
2024-6-14 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
raluca
sotiraki
Recall ‘Delayed Indefinitely’ — Microsoft Privacy Disaster is Cut from Copilot+ PCs
Redmond realizes Recall requires radical rethink.As you might recall, last week we said Microsoft...
2024-6-14 22:48:54 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
recall
microsoft
windows
security
copilot
Conducting Third Party Security Assessment: A Step-by-Step Strategy
Cybersecurity threats are on the rise, and as organizations increasingly rely on third-party vendor...
2024-6-14 21:27:34 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
assessments
identify
crucial
parties
Previous
147
148
149
150
151
152
153
154
Next