unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
What’s The Best Content Filter For Schools?
Content filtering is an essential part of the K-12 cybersecurity and safety landscape. But which co...
2024-3-21 19:5:31 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
districts
schools
cloud
software
Public AI as an Alternative to Corporate AI
This mini-essay was my contribution to a round table on Power and Governance in the Age...
2024-3-21 19:3:18 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
society
schneier
development
March Product Update
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-3-21 19:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
CVE-2023-48788: Fortinet FortiClientEMS SQL Injection Deep Dive
In a recent PSIRT, Fortinet acknowledged CVE-2023-48788 – a SQL injection in FortiClient EMS that...
2024-3-21 18:58:56 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
injection
fcmdaemon
client
database
fctdas
EPA and White House Send Water Industry Cybersecurity Warning
The Biden administration issues a cybersecurity call to action for the US water industry amid flood...
2024-3-21 18:37:51 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
water
security
epa
threats
Evolving Cyber Threats: Insights and Strategies from the 2023 FBI IC3 Report
Latest FBI IC3 Report shows a record year for cybercrime: record-setting $12.5 billion in lossesT...
2024-3-21 18:0:53 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
bec
ic3
security
losses
threats
Python Snake Info Stealer Spreading Via Facebook Messages
As per recent reports, threat actors are increasingly leveraging Facebook messages to distribute th...
2024-3-21 15:0:31 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
python
snake
stealer
facebook
coc
CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling
IP address spoofing involves creating IP packets with a fake source IP address. This is typically d...
2024-3-21 15:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
loopback
network
crash
recipient
zephyr
Aligning With NSA’s Cloud Security Guidance: Four Takeaways
The National Security Agency (NSA), in conjunction with the Cybersecurity and Infrastructure Secur...
2024-3-21 13:3:54 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
hypr
phishing
resistant
Bridging the Gap: Integrating SOCs into Application Security for Enhanced Cyber Resilience
Historically, Security Operations Centers (SOCs) and Application Security (AppSec) programs have op...
2024-3-21 12:0:47 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
appsec
security
socs
playbooks
software
How to Build a Phishing Playbook Part 3: Playbook Development
Welcome the third part of our series on how to build an automated incident response playbook for ph...
2024-3-21 04:1:48 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
playbook
phishing
soar
triage
enrichment
UnitedHealth Group: Unable or Unwilling to Disclose Materiality of Cyber Attack?
Following an attack targeting UnitedHealth Group’s digital claims processing, many Amer...
2024-3-21 03:33:1 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
axio
materiality
incredibly
bloggers
USENIX Security ’23 – How The Great Firewall Of China Detects And Blocks Fully Encrypted Traffic
Authors/Presenters: Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Ander...
2024-3-21 03:0:0 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
handelman
originating
Why an Identity-First Security Strategy Is so Important
With the turn of the 20th century and the rise of the internet, transactions and services became in...
2024-3-21 02:48:9 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
phishing
identities
sprawl
Dataproof Uses LogRhythm’s SOC Services to Deliver End-to-End Cyber Resilience in Africa
Dataproof Communications is a leading IT Services and Consulting Company specializing in cyberse...
2024-3-21 02:34:18 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
logrhythm
dataproof
threats
security
Five Key Findings from the 2023 FBI Internet Crime Report
The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the...
2024-3-21 01:40:44 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
phishing
crime
losses
complaints
Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets
On March 19th, news broke that researchers uncovered more than 19.8 million plaintext credentials...
2024-3-21 01:10:39 | 阅读: 21 |
收藏
|
Security Boulevard - securityboulevard.com
security
developers
passwords
iac
Randall Munroe’s XKCD ‘Schwa’
via the comic artistry and dry wit of Randall Munroe, creator of XKCDPermalink*...
2024-3-21 01:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
comic
security
authored
permalink
New Sysrv Botnet Variant Makes Use of Google Subdomain to Spread XMRig Miner
Sysrv is a well-documented botnet first identified in 2020, with the main payload being a worm writ...
2024-3-21 00:56:29 | 阅读: 23 |
收藏
|
Security Boulevard - securityboulevard.com
sysrv
xmrig
imperva
hxxps
stage
Digital Banking — At Risk! A Needed Defense Update
Over 12 years ago, I came across this new online security solution that let me look at my entire se...
2024-3-21 00:39:54 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
generative
banks
constantly
guys
security
Previous
221
222
223
224
225
226
227
228
Next