unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
CISA Warns Phobos Ransomware Groups Attacking Critical Infrastructure
Phobos, a complex ransomware-as-a-service (RaaS) operation that has been around for five years and...
2024-3-5 01:3:23 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
phobos
ransomware
faust
smokeloader
affiliates
Demystifying the Maze: A Guide to Cyber Risk Quantification Methods
Cybersecurity is no longer just about firewalls and antivirus software. In today’s...
2024-3-5 00:38:23 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
cybersaint
firewalls
compass
USENIX Security ’23 – Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan – Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
Home » Security Bloggers Network » USENIX Security ’23 – Evangelos Bitsikas, Theodor Schnitzler,...
2024-3-5 00:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
bloggers
youtube
network
HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)
Today Yubico announced the expansion of its YubiKey Bio Series to include multi-protoc...
2024-3-4 23:17:33 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
hypr
yubikey
bio
Response to CISA Advisory (AA24-060B): Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways
On February 29, 2024, the U.S. Cybersecurity & Infrastructure Security Agency (CISA)...
2024-3-4 23:1:19 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackiq
centre
ivanti
BlackFog Wins teissAwards2024 for Best Threat Intelligence Technology
BlackFog shines as innovator with anti data exfiltrationCheyenne, Wyoming, March 4—BlackFog,...
2024-3-4 22:49:5 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
blackfog
ransomware
award
security
awards
5 Ways to Prevent Prompt Injection Attacks
Prompt injection attacks are a form of cybersecurity threat that specifically target systems powere...
2024-3-4 22:0:9 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
injection
malicious
security
prompts
attackers
Revolutionizing Identity Theft with AI
How are we revolutionizing identity theft with AI? In an age where digital footprints are as unique...
2024-3-4 21:25:6 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
constella
threats
simulations
security
LLM Prompt Injection Worm
Researchers have demonstrated a worm that spreads through prompt injection. Details:I...
2024-3-4 20:1:52 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
genai
worm
malicious
injection
schneier
In the News | Equip and Educate Students to Combat Cyberthreats
This article was originally published in EdTech Magazine on 2.22.24 by Charlie Sander,...
2024-3-4 19:12:48 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
schools
magazine
Cybersecurity’s “Shift Up” Moment With CRQ | Kovrr
What Is a “Shift Up” Strategy, and Why It’s NecessaryToday, cybersecurity is evolving into cybe...
2024-3-4 18:59:25 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
regulatory
economic
Ubuntu 18.04 Security Updates for Linux Kernel Vulnerabilities
Recently, Ubuntu has rolled out security updates addressing several Linux kernel vulnerabilities in...
2024-3-4 17:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
attacker
tuxcare
utilize
Risk and Regulation: A Strategic Guide to Compliance Risk Assessment
Compliance Risk Assessments For a Dynamic Regulatory TerrainCrafting an effective compliance progr...
2024-3-4 15:44:31 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
regulatory
identify
centraleyes
regulations
ensuring
A Guide to Cybersecurity Compliance in the Manufacturing Sector
The manufacturing sector is one of the most extensive, exceptionally varied, and swiftly evolving s...
2024-3-4 15:24:43 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
regulations
sectrio
LockBit Ransomware Bounty: US Offers $15 Million In Reward
In a landscape where cyber threats loom large, the hunt for cybercriminals intensifies. Today, we’r...
2024-3-4 15:0:15 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
lockbit
ransomware
affiliates
criminal
threats
USENIX Security ’23 – Liang Niu, Shujaat Mirza, Zayd Maradni, Christina Pöpper – CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s...
2024-3-4 00:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
presenter
commitment
Human Brain Chip Implants: Helpful? Safe? Ethical?
Major developments regarding implanting chips in human brains have been announced in 2...
2024-3-3 18:48:16 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
brain
neuralink
percent
implants
chip
USENIX Security ’23 – Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem
Authors/Presenters: Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapia...
2024-3-3 00:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
serge
reardon
Deepfactor 3.5 Includes Enhanced Vulnerability Prioritization with EPSS Support and Reachability Analysis for Golang
Deepfactor Release 3.5 OverviewAs with every release, we continue to enhance our SCA c...
2024-3-2 06:13:49 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
deepfactor
epss
scoring
A Deep Dive into the 2024 Prudential and LoanDepot Breaches
Financial Giants Under SiegeIt’s only the first quarter of 2024 and major breaches are already sta...
2024-3-2 05:6:33 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
loandepot
ransomware
votiro
security
prudential
Previous
239
240
241
242
243
244
245
246
Next