unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
OpenSSL Patching: A Comprehensive Guide for System Administrators
Timely patching of OpenSSL vulnerabilities is essential, as attackers often exploit unpatched syst...
2024-3-15 16:0:20 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
libcare
tuxcare
timely
Crypto Phishing Kit Impersonating Login Pages: Stay Informed
In the ever-evolving landscape of cybersecurity, a fresh menace has emerged, targeting crypto enthu...
2024-3-15 15:0:19 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
security
labhost
Overcoming our “bossypants” bias
This is the fifth post in a series of posts inspired by reading Sheryl Sandberg’s book, Lean In: Wo...
2024-3-15 10:53:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
sandberg
leadership
female
men
lean
NTA and Router SNMP Configuration Example
NTA can monitor the CPU and memory usage, as well as traffic on the router interfaces w...
2024-3-15 09:43:42 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
nta
security
network
v2c
routers
Look Good & Gain Peace of Mind with Fairwinds’ Managed Kubernetes
Identifying and remediating Common Vulnerabilities and Exposures (CVEs) as soon as possible is impo...
2024-3-15 05:20:36 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
fairwinds
kubernetes
client
sre
Navigating the Digital Operational Resilience Act (DORA)
In the rapidly evolving landscape of cyber risk management, the impending Digital Opera...
2024-3-15 04:15:10 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
dora
resilience
balbix
security
operational
Secure Software Development Attestation Form: Sonatype helps you comply
On March 11, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and...
2024-3-15 04:15:5 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
software
development
security
sonatype
attestation
USENIX Security ’23 – Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance
Authors/Presenters: Youngwook Do, Nivedita Arora, Ali Mirzazadeh, Injoo Moon, Eryue Xu,...
2024-3-15 03:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
xu
ali
Beware the Ides of March 2024: Analyzing CISA KEV Data to Understand Danger
In our continuing series on the CISA Known Exploited Vulnerabilities (KEV) catalog, we provide an u...
2024-3-15 01:58:1 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
network
security
kev
exploited
Keeping Customer Data Safe: AI’s Privacy Paradox
Keeping Customer Data Safe: AI’s Privacy Paradoxandrew.gertz@t…Thu, 03/14/2024 – 17:3...
2024-3-15 01:38:40 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
consumers
generative
brands
experiences
regulatory
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #282 – ReadMe
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-3-15 01:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
powering
paradox
Introducing Escape rules – Rules that adapt for you
Today, we’re launching customization improvements to Escape’s automated testing capabi...
2024-3-15 00:41:19 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
workshop
maintenance
adapt
Revolutionizing Legal Data Security and Compliance
PreVeil’s Encrypted Email and Filesharing Solution for Law FirmsIn an era where law firms are incr...
2024-3-15 00:19:39 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
preveil
security
firms
encryption
SOC Best Practices You Should Implement
Implementing best practices in the Security Operations Center (SOC) has always been imperative for...
2024-3-15 00:0:26 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
monitoring
analysis
Researchers Find Flaws in OpenAI ChatGPT, Google Gemini
The number of generative AI chatbots and their adoption by enterprises have exploded in the year-pl...
2024-3-14 23:53:5 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
generative
chatgpt
security
gemini
hiddenlayer
Three Mechanisms to Protect Your Git Repositories
Your version control system, like Git, is a primary vector for secret sprawl, unintentional source...
2024-3-14 23:39:4 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
github
codeowners
rulesets
repository
gitlab
Accelerating the Journey to PCI DSS 4.0 Compliance with ACI Worldwide
Regulatory compliance is a fact of life for any business. And for those that accept...
2024-3-14 23:30:0 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
comforte
dss
worldwide
cdes
Getting to High-Fidelity Detections Faster with Context Creation Models
Getting to High-Fidelity Detections Faster with Context Creation ModelsBy James PittmanMy young k...
2024-3-14 23:0:49 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
netography
network
chaining
fusion
hitting
USENIX Security ’23 – Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks
Authors/Presenters: Xinfeng Li, Xiaoyu Ji, and Chen Yan, Chaohao Li, Yichen Li, Zhennin...
2024-3-14 23:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
authored
Symmetry Systems Launches Data+AI Security Product line for Enterprise Gen AI including Microsoft Copilot
Symmetry’s industry-leading Data+AI security capabilities will help modern organizations adopt Gen...
2024-3-14 22:28:17 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
symmetry
security
copilot
microsoft
agents
Previous
227
228
229
230
231
232
233
234
Next