unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Vulnerabilities for AI and ML Applications are Skyrocketing
The number of AI-related Zero Days has tripled since November 2023, according to the latest finding...
2024-4-19 05:1:16 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
salvati
adoption
tooling
Cheap ‘Junk-Gun Ransomware’ Emerging on the Dark Web
Headlines about ransomware in recent years has focused on the most prolific gangs like LockBit, Bla...
2024-4-19 04:36:36 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
junk
gun
sophos
cheap
Companies Didn’t Prioritize Third-Party Sources of CVEs, Here’s What Happened
Last December, Veracode reported that more than a third of Java applications still use vulnerable v...
2024-4-19 04:1:36 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
azul
log4j
cves
log4shell
What Makes Containers Vulnerable?
When looking for sensitive information and other valuable assets, attackers rarely access their tar...
2024-4-19 03:4:15 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
containers
network
mend
USENIX Security ’23 – NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers
Authors/Presenters: *Yehuda Afek and Anat Bremler-Barr, Shani Stajnrod*Many thanks to...
2024-4-19 03:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
bremler
marc
DevOps pioneers navigate organizational transformation
read file error: read notes: is a directory...
2024-4-19 01:49:47 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
pioneers
webinar
catalyzing
bloggers
To Breach or Not to Breach
The rapid adoption of could computing was yesterday’s news 5 years ago. Today’s news is that one of...
2024-4-19 01:6:54 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
efficiency
operational
efficacy
cloud
Randall Munroe’s XKCD ‘Eclipse Path Maps’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-4-19 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
usenix
software
What to Consider When Choosing a Software Composition Analysis (SCA) Tool
Given the widespread use of third-party components in application development, identify...
2024-4-19 00:46:54 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
analysis
software
development
House Passes Privacy-Preserving Bill, but Biden Blasts it
“Threatens national security.” The White House is no fan of the FANFSA bill.The Fourth Amendment is...
2024-4-19 00:31:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
bill
brokers
warrant
amendment
buying
DataDome Renews SOC 2 Type 2 Compliance
As we continue maintaining a secure environment for our customers’ data, we are thrill...
2024-4-19 00:15:57 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
datadome
commitment
uphold
validates
Fixing a $12bn Challenge for Banks Through Data-Centric Security
The challenges presented by cyber risk have always loomed large for IT and business...
2024-4-18 23:34:45 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
12bn
comforte
security
leaders
syndicated
USENIX Security ’23 – Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security
Authors/Presenters: *Alden Hilton, Casey Deccio, Jacob Davis,*Many thanks to USENIX f...
2024-4-18 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
security
presenters
marriott
Strengthening Cyber Resilience: A Milestone Partnership
As the CEO of HYAS, I am thrilled to announce a pivotal partnership with ZainTECH, a trailblaze...
2024-4-18 22:30:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
hyas
zaintech
threats
proactive
Understanding the Different Types of Audit Evidence
Audit evidence lies at the heart of cybersecurity audits and assessments, providing tangible proof...
2024-4-18 21:43:41 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
audits
auditors
processes
Stale Accounts in Active Directory
What are Stale Accounts in Active Directory?Accounts that have not been used in the pa...
2024-4-18 20:44:55 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
stale
enzoic
inactive
syndicated
remained
Why Understanding Your Open Source Licenses Matters
When choosing software for a project, developers have a number of factors to consider. Prime on th...
2024-4-18 20:30:6 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
software
gitguardian
security
licensing
bsl
DAST is dead, why Business Logic Security Testing takes center stage
“DAST is dead”—that’s the phrase that appears every year on social media and in cybersecurity news...
2024-4-18 20:0:47 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
dast
zap
sdlc
Roku experiences another data breach; Apple notifies users about mercenary spyware attacks
It’s rare to see a data breach study observers call a “mixed bag.” Normally, reports on data breach...
2024-4-18 19:30:28 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
roku
spyware
blackcloak
mercenary
experienced
April Product Update
The CyberSaint team is dedicated to providing new features to CyberStrong and advan...
2024-4-18 19:15:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cybersaint
cyberstrong
syndicated
bloggers
network
Previous
195
196
197
198
199
200
201
202
Next