unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs
Authors/Presenters: Yudi Zhao, Yuan Zhang, Min Yang Many thanks to USENIX for publish...
2024-5-6 23:0:0 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
publishing
originating
Critical Risk Launches Critical Start Cyber Risk Register
Managed detection and response specialist Critical Start has released its Cyber Risk Register, a so...
2024-5-6 22:0:50 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
pandey
monitoring
morales
jones
Identity, Credential Misconfigurations Open Worrying Security Gaps
Identity and credential misconfigurations pose a major security risk to organizations, with compani...
2024-5-6 21:0:12 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
exposures
siksik
exposure
cves
Introducing Aembit Preview for Workload Discovery
At Aembit, we often see clients initiate their journey with us when they face specific challenges...
2024-5-6 21:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
workload
workloads
aembit
approaches
developers
Embracing quantum readiness
Prepare for quantum computing’s cybersecurity impact. Embrace quantum readiness now to safeguard di...
2024-5-6 20:24:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
readiness
sectigo
stage
resistant
threats
Tracking CVE-2024-2876: Why does the latest WordPress exploit compromise over 90,000 websites?
A highly concerning security loophole was recently discovered in a WordPress plugin called “Email S...
2024-5-6 19:11:50 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
wallarm
wordpress
2876
27956
security
Got Your Eyes on Cyber Essentials Plus? We’ve Got You Covered!
With data breaches and hacking attacks in the headlines way too often, strengthening di...
2024-5-6 19:8:55 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
essentials
scytale
threats
security
Manual vs Automated Risk Management: What You Need to Know
Murphy’s Law in Modern Risk ManagementMurphy’s Law is a timeless reminder of life’s unpredictabili...
2024-5-6 14:5:44 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
centraleyes
assessments
analysis
modeling
Understanding GitGuardian’s Self-Hosted Solution
At GitGuardian, as cybersecurity experts, we understand there are a variety of reasons our custome...
2024-5-6 14:0:50 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
gitguardian
security
kubernetes
software
helm
Using MITM to bypass FIDO2 phishing-resistant protection
FIDO2 is a modern authentication group term for passwordless authentication. The Fast Identity Onli...
2024-5-6 13:37:10 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
fido2
security
fido
client
USENIX Security ’23 – A Bug’s Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs – Distinguished Paper Award Winner
Authors/Presenters: Gertjan Franken, Tom Van Goethem, Lieven Desmet, Wouter Joosen Ma...
2024-5-5 23:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
van
9idhb0gi
GenAI Continues to Dominate CIO and CISO Conversations
The NASCIO Midyear Conference this past week highlighted the good, the bad and the sca...
2024-5-5 17:52:7 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
nascio
midyear
cios
lohrmann
cio
RSAC 2024 Innovation Sandbox | Reality Defender: Deepfake Detection Platform
read file error: read notes: is a directory...
2024-5-5 09:25:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
deepfake
defender
innovation
rsac
deepfakes
USENIX Security ’23 – Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs
Authors/Presenters: Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li Qiushi Wu,...
2024-5-4 23:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
mathias
nocookie
The Escalating Threat of Exposed Credentials
The menace posed by exposed credentials has surged alarmingly in recent years. In 2023...
2024-5-4 22:42:1 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
bradley
tony
escalating
security
RSAC 2024 Innovation Sandbox | Dropzone AI: Automated Investigation and Security Operations
The RSA Conference 2024 will kick off on May 6. Known as the “Oscars of Cybersecurity,” the RSAC I...
2024-5-4 09:30:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
dropzone
analysis
innovation
rsac
The Real Risk is Not Knowing Your Real Risk: Perspectives from Asia Pacific Tour with EY
Recently, I wrapped up my first work trip with Balbix—a whirlwind tour of customer roun...
2024-5-4 09:6:40 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
balbix
ey
tour
wrapped
joined
DD2345 Military Critical Technical Data Agreement and CMMC
What is the government if not an organization dedicated to the creation of paperwork? All of that p...
2024-5-4 08:18:6 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
2345
cmmc
jcp
itar
mctd
Airsoft Data Breach Exposes Data of 75,000 Players
Failure to properly configure authentication led to malicious actors exploiting the database backup...
2024-5-4 07:15:8 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
walker
passwords
airsoft
soroko
Get SOAR Savvy Before RSAC 2024: 5 Reads to Level Up Your SOC
For security leaders heading to RSAC 2024 in need of a refresher on all things SOAR (Security Autom...
2024-5-4 06:28:4 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
soar
security
d3
playbooks
whitepaper
Previous
179
180
181
182
183
184
185
186
Next