unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Randall Munroe’s XKCD ‘Physics vs. Magic’
via the comic artistry and dry wit of Randall Munroe, creator of XKCDPermalink*...
2024-3-14 01:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
bloggers
marc
dry
munroe
Google Splashes the Cash in Bug Bounty Bonanza: $59 Million to Date
Last year, $GOOG paid $10 million to ethical hackers for finding vulnerabilities.Google...
2024-3-14 00:57:9 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
richi
vrp
ethical
jennings
Security Flaws within ChatGPT Ecosystem Allowed Access to Accounts On Third-Party Websites and Sensitive Data
Salt Labs researchers identified generative AI ecosystems as a new interesting attack vector. vulne...
2024-3-14 00:50:30 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
chatgpt
attacker
victim
security
pluginlab
JetBrains Says Rapid7’s Fast Release of Flaw Details Harmed Users
JetBrains is continuing to criticize Rapid7’s policy for disclosing vulnerabilities its researchers...
2024-3-14 00:18:41 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
jetbrains
rapid7
gallo
coordinated
Summoning RAGnarok With Your Nemesis
I hope I’m Not Too LateWith the explosion of large language model (LLM) use, everyone is rushing t...
2024-3-14 00:18:29 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
nemesis
llm
embedding
ragnarok
reranker
The Macros Playbook: Maximizing Benefits, Minimizing Risks
Macros have become essential in business for automating tasks, improving accuracy, and customizing...
2024-3-13 23:38:30 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
macros
software
security
development
malicious
Don’t Miss These Emerging Trends in Cloud Application Security
Get details on trends and best practices in cloud application security.As businesses rapidly integ...
2024-3-13 23:35:12 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
development
software
emerging
USENIX Security ’23 – Dilawer Ahmed, Aafaq Sabir, Anupam Das – Spying Through Your Voice Assistants: Realistic Voice Command Fingerprinting
Wednesday, March 13, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsFe...
2024-3-13 23:0:0 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
bloggers
network
Motion Picture Association Updates Cybersecurity Best Practices
The motion picture industry is a high-profile, multi-billion industry that has been targeted by sop...
2024-3-13 22:0:51 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
mpa
motion
ericom
film
sony
Secure your blockchain project from the start
Systemic security issues in blockchain projects often appear early in development. With...
2024-3-13 21:0:45 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
stage
development
blockchain
trail
Building a Security Culture of Shared Responsibility
With the growing awareness and realization that human error is the root cause behind three-quarters...
2024-3-13 21:0:45 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
attitudes
leaders
leadership
perpetuity
New Phishing Campaign Delivers Remote Access Trojans (RATs)
Sophisticated phishing campaign leverages public services, where remote access Trojans are being de...
2024-3-13 20:36:54 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
vcurms
malicious
trojans
SVG Files Abused in Emerging Campaigns
By Max GannonScalable Vector Graphic files, or SVG files, are image files that have become an adv...
2024-3-13 20:30:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
autosmuggle
xworm
malicious
tesla
download
How Real-Time Personal Cybersecurity and Botnet Detection Protects Corporate Executives
The specter of botnet infections looms large over corporate executives, posing not just a threat to...
2024-3-13 20:15:17 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
executives
security
blackcloak
threats
Phishing Threats Rise as Malicious Actors Target Messaging Platforms
As messaging apps continue to gain popularity, threat actors are exploiting a combination of trust,...
2024-3-13 20:0:34 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
becenti
malicious
security
threats
Charting a Course for Cybersecurity
Over the past months, headlines have been marked by persistent conflicts in Ukraine and...
2024-3-13 19:27:57 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
enzoic
Proliferation of digital identities: increase in digital certificates
Digital identities are crucial in today’s virtual landscape. For businesses, secure verification wi...
2024-3-13 18:30:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
identities
lifecycle
sectigo
security
What is Identity Governance: 5 Steps to Build Your Framework
From financial records to employees’ personal details, almost all information nowadays is highly se...
2024-3-13 16:38:15 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
governance
security
apono
audits
Mitigating Risks in the Age of AI Agents
#TLDRAI agent technology, using Large Language Models, is transforming modern enterprises as it pr...
2024-3-13 12:40:37 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
agents
security
symmetry
software
exposure
Tweaks Stealer Targets Roblox Users Through YouTube and Discord
IntroductionZscaler’s ThreatLabz recently discovered a new campaign distributing an infostealer cal...
2024-3-13 05:52:56 | 阅读: 20 |
收藏
|
Security Boulevard - securityboulevard.com
tweaks
roblox
youtube
fps
attackers
Previous
229
230
231
232
233
234
235
236
Next