unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
What is Web Application Security Testing?
Web application security testing aims to detect, prevent, and address security vulnerabilities with...
2024-4-13 16:54:51 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
malicious
Another CVE (PAN-OS Zero-Day), Another Reason to Consider Zero Trust
A Year of Critical Zero Days: Firewalls, VPNs, and more This past year has been, in many ways, the...
2024-4-13 13:23:31 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
vpns
network
firewalls
CISA Warns of Compromised Microsoft Accounts
CISA issued a fresh CISA emergency directive in early April instructing U.S. federal agencies to mi...
2024-4-13 06:47:28 | 阅读: 25 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
security
directive
enzoic
Balbix Guide to XZ Utils Backdoor
XZ Utils is a collection of open-source command-line tools for lossless data compressio...
2024-4-13 04:7:24 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
xz
balbix
lzma
embedding
bloggers
USENIX Security ’23 – Fast IDentity Online with Anonymous Credentials (FIDO-AC)
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-4-13 03:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
boulevard
bloggers
NVD’s Backlog Triggers Public Response from Cybersec Leaders
Just a few weeks ago, we wrote about how the National Vulnerability Database (NVD) is seriously beh...
2024-4-13 02:39:55 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
nvd
backlog
mend
congress
letter
How to Reduce the Risk of Using External AI Models in Your SDLC
Understand how AI models add risk and how to address it.In the rapidly evolving landscape of artif...
2024-4-13 02:16:2 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
reputation
malicious
development
hugging
The XZ backdoor: What security managers can learn
In the case of the XZ breach, this backdoor could give the attacker access to anything from login i...
2024-4-13 01:49:25 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
network
xz
monitoring
Why you need an SBOM (Software Bill Of Materials)
There's been a lot of talk about SBOMs in tech media. This blog post will help answer three crucia...
2024-4-13 01:49:14 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
babel
analysis
gitguardian
Shadow AI: The Murky Threat to Enterprise Adoption of Generative AI
Generative AI (GenAI) technologies, especially large language models like OpenAI’s GPT-4, continue...
2024-4-13 01:42:54 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
genai
hardware
shadow
laws
Sisense Hacked: CISA Warns Customers at Risk
The analytics firm kept big organizations’ secrets in an insecure AWS bucket. The government says v...
2024-4-13 01:8:2 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
sisense
security
passwords
attackers
richi
Randall Munroe’s XKCD ‘Tick Marks’
via the comic artistry and dry wit of Randall Munroe, creator of XKCDPermalink*...
2024-4-13 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
marc
syndicated
authored
How to find Palo Alto Network firewalls running PAN-OS 11.1, 11.0, and 10.2
Latest Palo Alto Networks vulnerabilityPalo Alto Networks disclosed that certain versi...
2024-4-13 00:54:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
pan
palo
alto
telemetry
The essential duo of SCA and SBOM management
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-4-12 23:15:5 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
cloud
segregation
boulevard
USENIX Security ’23 – PatchVerif: Discovering Faulty Patches in Robotic Vehicles
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-4-12 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
webinars
network
usenix
Podcast Episode 14: University of Richmond’s Winning Strategies of an All-Female CTF Squad
Discover the thrill of victory and the fascinating challenges faced in the world of c...
2024-4-12 21:56:11 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
female
richmond
security
winning
Cybersecurity Insights with Contrast CISO David Lindner | 4/12/24
Insight #1I was at the Kernelcon conference last week and heard that Gen AI is goi...
2024-4-12 21:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
lindner
heard
contrast
Case Study Segregation of Duties Oracle ERP Cloud
1. Rule Selection and AlignmentThis involves aligning controls across the enterprise by selecting...
2024-4-12 16:54:49 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
corrective
cloud
erp
safepaas
alignment
TheMoon Botnet Facilitates Faceless To Exploit EoL Devices
In a digital landscape fraught with threats, vigilance is paramount. The cybercriminals are exploit...
2024-4-12 15:0:40 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
themoon
faceless
security
threats
lumen
What is ISO 27001 Compliance?
In 2024, information security is a major concern that will never go away totally. ISO 27001 is a gl...
2024-4-12 14:34:44 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
27001
security
isms
kratikal
iec
Previous
200
201
202
203
204
205
206
207
Next