unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Why SAST + DAST can’t be enough
Static and dynamic app testing are cornerstones for any comprehensive AppSec program, yet they...
2024-6-6 23:51:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
analysis
hardcoded
Automation Takes Off: A New Dawn for Enterprises to Guard Against the Cyberattack Barrage
According to a recent Morgan Stanley report, “2024 Outlook – Rising Demand to Meet Rising Threats,”...
2024-6-6 23:45:35 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
processes
intelligent
SHARED INTEL Q&A: Forrester report shows Identity and Access Management (IAM) in flux
By Byron V. AcohidoIdentity and Access Management (IAM) is at a crossroads.A new Forrester Trend...
2024-6-6 23:26:18 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cairns
threats
lw
security
cisos
USENIX Security ’23 – Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone
Authors/Presenters:Qi Xia, Qian Chen, Shouhuai Xu Many thanks to USENIX for publishi...
2024-6-6 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
qian
Automating SCCM with Ludus: A Configuration Manager for Your Configuration Manager
TL;DR: Using Ludus as the backend, and with the help of Erik at Bad Sector Labs, I present a fully...
2024-6-6 22:50:53 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
sccm
ludus
client
pxe
naa
Leveraging Escalation Attacks in Penetration Testing Environments – Part 1
June 6, 2024Authors: George Raileanu and Eugene MarIntroductionTogether we aim to explore vulner...
2024-6-6 20:50:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
certipy
windows
ip6
network
machine
Leveraging Escalation Attacks in Penetration Testing Environments – Part 2
June 6, 2024Authors: George Raileanu and Eugene MarIn this post, we’ll cover the two most common...
2024-6-6 20:49:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
tas
tasca01
certipy
esc1
Listen up: 10 cybersecurity podcasts you can learn from
Regardless of where you are in your career in cybersecurity – whether you have been a trusted expe...
2024-6-6 20:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
notable
episode
interviews
Security Posture Drift: Tracking & Managing Security Posture Over Time
Given the high level of complexity in securing enterprise IT systems, it can be extremely difficul...
2024-6-6 20:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
drift
safebreach
Mastering Cyber Risk Quantification Methods: A Strategic Approach
Quantitative Risk models have long been applied in the financial and insurable risk fields and are...
2024-6-6 19:22:55 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
centraleyes
security
threats
Webinar: How to build relationships with developers
2024-6-6 17:8:36 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
developers
webinar
advice
Digital natives are not cybersecurity natives
At TurkuSec meetup in April, I had the opportunity to share my insights on a pressing i...
2024-6-6 15:59:56 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
natives
latto
olds
GHOSTENGINE Exploit: Vulnerable Drivers Facing Attack
A recent revelation in the cybersecurity realm uncovers a concerning development dubbed GHOSTENGINE...
2024-6-6 15:0:17 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ghostengine
security
threats
malicious
7 Reasons Why You Need To Replace Your Microsoft CA
Maintaining a robust and efficient Public Key Infrastructure (PKI) has never been more important fo...
2024-6-6 14:57:4 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
security
pkiaas
windows
hardware
Generative AI, Confidential Computing, and Post-Quantum Cryptography, Among Interesting Topics at Google Cloud NEXT
Generative AI, Confidential Computing, and Post-Quantum Cryptography, Among Interesting...
2024-6-6 13:18:27 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
thales
security
generative
Symmetry Systems Recognized as a Strong Performer in the 2024 Gartner® Peer Insights™ Voice of the Customer for Data Security Posture Management report
San Mateo, Calif. – JUNE 6, 2024 – Symmetry Systems, the data+AI security company, today announced...
2024-6-6 12:55:4 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
symmetry
security
posture
ratings
reviews
IoT Security Means Remediation Not Mitigation
A topic that I recently got asked about was vulnerability mitigation for IoT systems, w...
2024-6-6 10:9:53 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
network
security
viakoo
BTS #31 – Managing Complex Digital Supply Chains – Cassie Crossley
Cassie has a long history of successfully managing a variety of security programs. T...
2024-6-6 05:49:16 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
eclypsium
cassie
bts
chains
Safeguarding AWS AI Services: Protecting Sensitive Permissions
As AI continues to grow in importance, ensuring the security of AI services is crucial. Our team at...
2024-6-6 03:47:10 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
tactic
grants
attacker
security
policymitre
Cybersecurity Training Reduces Phishing Threats – With Numbers to Prove It
There is a clear link between security awareness training and resilience against cyber threats. A f...
2024-6-6 03:45:59 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
kron
phishing
security
industries
knowbe4
Previous
156
157
158
159
160
161
162
163
Next