unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
ThreatAlert® on Google Cloud Platform: A Proven Solution for Comprehensive Security
Alec Meyer, Sr. Cloud Solutions SpecialistAs cloud adoption continues its meteoric rise, so too d...
2024-5-25 04:18:52 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
gcp
cloud
threatalert
fedramp
New Publication From the Cloud Security Alliance (CSA): Hardware Security Modules as a Service
I’ve been part of the Cloud Security Alliance (CSA) Cloud Key Management working group...
2024-5-25 03:41:1 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
csa
hsms
cloud
hsmaas
USENIX Security ’23 – Detecting Union Type Confusion in Component Object Model
Authors/Presenters:Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Moh...
2024-5-25 03:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
permalink
Emulating the Open-Source Remote Access Trojan (RAT) AsyncRAT
AsyncRAT is an open-source Remote Access Trojan (RAT) written in .NET and designed for Windows syst...
2024-5-25 02:31:59 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
asyncrat
malicious
windows
powershell
Resolving the Zero Trust Encryption Paradox
PKI and cryptography are critical components of a Zero Trust strategy, driving the use of encryptio...
2024-5-25 01:54:22 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
encryption
ownership
paradox
entrust
identify
Black Basta Ascension Attack Redux — can Patients Die of Ransomware?
16 days on, huge hospital system continues to be paralyzed by ransomware—and patient safety is at r...
2024-5-25 01:45:34 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
ascension
patient
basta
hospitals
ransomware
Zero Trust and AI: You Can’t Have One Without the Other
Cyberattacks were forecast to have cost the global economy $8 trillion USD in 2023, and...
2024-5-25 01:32:13 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
entrust
emerging
respondents
deepfakes
The Rise and Risks of Shadow AI
Shadow AI, the internaluse of AI tools and services without the enterprise oversigh...
2024-5-25 01:20:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
oversight
shadow
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #291 — The RTE and SMs
Permalink*** This is a Security Bloggers Network syndicated blog from Infosecuri...
2024-5-25 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
network
rte
bloggers
security
syndicated
Brand impersonation attacks: How to take responsibility for your customers
These attacks typically start with outreach from the brand, like in the shoebox story when the vict...
2024-5-24 23:19:14 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
xz
threats
stories
Evolving Detection Engineering Capabilities with Breach & Attack Simulation (BAS)
Threat actors are constantly updating their tactics, techniques and procedures (TTPs). In response...
2024-5-24 23:6:14 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
bas
detections
safebreach
threats
USENIX Security ’23 – Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness
Authors/Presenters:Yuhang Wu, Zhenpeng Lin, Yueqi Chen, Dang K Le, Dongliang Mu, Xinyu...
2024-5-24 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
presenters
anaheim
EDR-Killing Malware and the Need for Network Detection
A recent blog by Elastic Security Labs details GHOSTENGINE, a crypto miner that lev...
2024-5-24 21:3:18 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
network
security
ironnet
ndr
Cybersecurity Insights with Contrast CISO David Lindner | 5/24/24
Insight #1Tool consolidation continues, with Palo Alto’s plans to absorb IBM’s QRa...
2024-5-24 21:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
responding
lindner
CISO Cite Human Error as Top IT Security Risk
Human error is responsible for most cybersecurity risks, with nearly three-quarters (74%) of chief...
2024-5-24 19:0:31 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cisos
security
ransomware
threats
Customized Vulnerability Management Dashboard for CISOs
CISOs require a central hub for visualizing critical security data. Strobes RBVM empowe...
2024-5-24 17:53:37 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
widgets
security
strobes
rbvm
What are the Hallmarks of Strong Software Security?
Reading Time: 4 minWhy is software security so important? Simply put, there are more threats the...
2024-5-24 16:7:57 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
appsec
software
parties
Essential Strategies for Recovering from Ransomware Attacks
Ransomware is a serious threat, so be prepared!The average ransom demand is high, and paying does...
2024-5-24 16:0:47 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
recovering
paying
crucial
attackers
Ekran System Enhances Privileged Access Management: New Workforce Password Management Feature
At Ekran System, we constantly enhance the capabilities of our platform, ensuring that organization...
2024-5-24 14:39:59 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
wpm
ekran
pam
workforce
security
What is Cloud Penetration Testing?
The digital era is constantly evolving, and businesses are rapidly migrating towards cloud-based so...
2024-5-24 13:41:35 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
identify
kratikal
Previous
165
166
167
168
169
170
171
172
Next