unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Securing Your Snowflake Environments
SaaS breaches have increased 4x in the last year. We have seen a sequence of breaches that have imp...
2024-6-3 22:33:3 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
snowflake
security
attackers
identities
eliminate
A Practical Guide for Handling Unauthorized Access to Snowflake
In the last year, we have seen a sequence of breaches that have impacted major SaaS ven...
2024-6-3 22:23:38 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
snowflake
attackers
privileged
security
suspend
Gearing up for Cybersecurity Awareness Month
Throughout my years at Social-Engineer, LLC, I have had the pleasure of giving speeches for many di...
2024-6-3 20:0:34 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
vishing
attacker
llc
NYDFS Cybersecurity Regulation: Automated Blocking of Commonly Used Passwords
Overview of the NYDFS Cybersecurity Regulation UpdateOn November 1, 2023, the New York Department...
2024-6-3 19:31:12 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
enzoic
passwords
regulation
nydfs
Seeing Like a Data Structure
Technology was once simply a tool—and a small one at that—used to amplify human intent and capacity...
2024-6-3 19:6:54 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
society
abstraction
scott
rigid
era
CVE-2024-24919 Exploitation, Veriti Proactive Remediation
Over the past few days, there has been a significant rise in exploitation attempts of...
2024-6-3 19:0:45 | 阅读: 23 |
收藏
|
Security Boulevard - securityboulevard.com
security
veriti
24919
proactive
threats
Shining the Light on Shadow IT: Top Five SaaS Security Tips for Third-Party Risk Management
Security teams often grapple with the uncertainty of data exposure in their SaaS supply chain, espe...
2024-6-3 19:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
tprm
posture
diligence
Top 5 CVEs and Vulnerabilities of May 2024
May brought a fresh batch of security headaches. This month, we’re focusing on critical vulnerabili...
2024-6-3 18:46:53 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
gitlab
attackers
qnap
software
l-Tag DKIM Vulnerability: What Can You Do to Secure Your Email?
DKIM is a crucial email authentication method designed to ensure the integrity of emails. While it...
2024-6-3 15:45:52 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
dkim
recipient
bimi
esps
relaxed
Data Breaches in May 2024 – Infographic
Has your data ever felt…exposed? We’ve all heard about data breaches, but have you ever stopped to...
2024-6-3 15:25:3 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
wesecureapp
cloud
indian
Insider Risk Digest: May
Welcome to this month’s Insider Risk Digest. This edition reveals a University of Florida profes...
2024-6-3 15:22:49 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
insider
european
drugs
parliament
digest
Comprehensive Guide to NIST SP 800-171 Revision 3 Compliance
Few documents carry as much weight as the NIST Special Publication (SP) 800-171. Designed to safegu...
2024-6-3 13:39:14 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
revision
security
cmmc
families
Liquidmatrix Security Digest Podcast – Episode 77
Episode 0x77I’m not cool and neither are you. Ok, so it’s been a long time – but we...
2024-6-3 04:14:42 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
episode
digest
mailbag
USENIX Security ’23 – Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations
Authors/Presenters:Zhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, Yu Jiang, Ting...
2024-6-2 23:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
yu
usenix
situated
Defending Against Persistent Phishing: A Real-World Case Study
One of the scariest acronyms in a CISO’s knowledge base is APT – Advanced Persistent Th...
2024-6-2 20:19:3 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
attacker
cybeready
semi
security
Navigating Email: From Spam Wars to Trusted Relationships
Some call it spam. Others call it marketing. Recipients want it to stop, while senders...
2024-6-2 17:12:5 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
lohrmann
meeting
dan
heard
USENIX Security ’23 – Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance
Authors/Presenters: Jiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian Many thanks to U...
2024-6-1 23:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
authored
permalink
Disgraced, Twice Impeached, Former President Joins His Long List Of Campaign And Administration Officials And Advisors As A Convicted Felon
2024-6-1 22:54:2 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
convictions
sentence
trump
prison
convicted
What is an IS (RBI) Audit?
RBI has issued comprehensive master directions and guidelines for banks and non-banking financial c...
2024-6-1 15:5:57 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
rbi
audits
banks
The Ultimate Guide to FedRAMP Marketplace Designations
Whenever a government agency, contractor, or subcontractor wants to work with a cloud service provi...
2024-6-1 07:36:36 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
fedramp
cloud
marketplace
designation
security
Previous
160
161
162
163
164
165
166
167
Next