unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Understanding Credential Phishing
Credential phishing is a type of cyberattack where attackers attempt to deceive your employees int...
2024-6-1 07:21:30 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
slashnext
security
microsoft
webpages
Adaptive DDoS Defense’s Value in the Security Ecosystem
When it comes to distributed denial of service (DDoS) attacks, it’s imperative to rely on timely an...
2024-6-1 06:38:6 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
adaptive
remediate
actionable
attackers
identify
Understanding Business Email Compromise (BEC)
What is Business Email Compromise?Business Email Compromise (BEC) is a sophisticated...
2024-6-1 06:34:7 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
bec
attackers
slashnext
recipient
identify
Risk vs. Threat vs. Vulnerability: What is the difference?
If your team is trained on the differences between these terms, when a risk, threat, or vulnerabili...
2024-6-1 05:9:5 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
phishing
likelihood
Compromising ByteDance’s Rspack using GitHub Actions Vulnerabilities
OverviewRecently, we identified several critical Pwn Request vulnerabilities within GitHub Actions...
2024-6-1 04:23:14 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
rspack
github
repository
runner
Impart Security: Leading the Charge in API Security with SOC 2 Type 2 Certification | Impart Security
We’re incredibly proud to share some exciting news at Impart Security: We’ve achie...
2024-6-1 03:30:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
impart
dedication
newsletter
proud
Malicious PyPI Package ‘Pytoileur’ Targets Windows and Leverages Stack Overflow for Distribution
The Python Package Index (PyPI) is the most popular Python programming language software repository...
2024-5-30 07:35:13 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
pypi
malicious
pytoileur
sonatype
NIST Struggles with NVD Backlog as 93% of Flaws Remain Unanalyzed
The funding cutbacks announced in February have continued to hobble NIST’s ability to keep the gove...
2024-5-30 05:32:13 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
nvd
garrity
budget
database
Ticketmaster Hacked, Personal Data of 560 Million Customers Leaked, ShinyHunters Claim
The threat group ShinyHunters claims to have captured 1.3 terabytes of Ticketmaster customer data,...
2024-5-30 05:31:43 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
bambenek
chaudhuri
I have an SBOM, now what?
Just as the food industry tracks the origins and safety of ingredients to ensure pr...
2024-5-30 05:5:10 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
food
ingredients
bloggers
origins
Scammers Build Fraud Campaigns Around Free Piano Offers
Scammers are betting that if people are offered a free – yet unsolicited – piano, somebody will jum...
2024-5-30 03:44:48 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
piano
aff
proofpoint
shipping
larson
Weighing the Risk: The Cost of Skipping Pen Tests
read file error: read notes: is a directory...
2024-5-30 03:18:37 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
fines
respondents
cmmc
proactive
USENIX Security ’23 – Dubhe: Succinct Zero-Knowledge Proofs for Standard AES and related Applications
Authors/Presenters:Changchang Ding and Yan Huang Many thanks to USENIX for publishin...
2024-5-30 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
originating
huang
Must-See Sessions at IT Nation Secure 2024
read file error: read notes: is a directory...
2024-5-30 02:34:37 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
2024time
etlocation
nation
seceon
Christie’s Auction House Hacked, Sensitive Data from 500,000 Customers Stolen
A cyberattack targeted Christie’s, a leading London-based auction house, at the beginning of May.A...
2024-5-30 01:29:52 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
christie
security
auction
ransomware
chaudhuri
Randall Munroe’s XKCD ‘Local Group’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-5-30 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
christie
boulevard
evaluation
Top 5 Evaluation Criteria For Choosing The Right ITDR Tool
Identity is now a top priority for security decision makers. The need to overcome malicious TTPs, s...
2024-5-29 23:16:57 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
itdr
security
anomalies
malicious
criteria
USENIX Security ’23 – PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding
Authors/Presenters:Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang Many th...
2024-5-29 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
kehuan
anaheim
Augmented NDR: Gartner Unveils The Future of Threat Detection with AI
Joe Ariganello VP of Product Marketing Joe is the VP of Product Marketing at MixMode....
2024-5-29 22:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
ndr
augmented
network
ndrs
The High Stakes of Healthcare Cybersecurity: Preventing the Next Big Breach
In 2024, there’s more than one healthcare crisis to look out for. In this case, it’s cyber attacks...
2024-5-29 22:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
threats
ransomware
ddr
attackers
Previous
161
162
163
164
165
166
167
168
Next