unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
SafeBreach Coverage for AA24-060A (Phobos Ransomware) and AA24-060B (Ivanti Connect Secure)
Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach On February 29th, the Cyberse...
2024-3-2 04:38:29 | 阅读: 73 |
收藏
|
Security Boulevard - securityboulevard.com
phobos
aa24
ransomware
ivanti
060a
Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware
On February 29, 2024, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bure...
2024-3-2 04:16:13 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
security
windows
phobos
attackiq
USENIX Security ’23 – Vivek Nair, Dawn Song – Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management
Home » Security Bloggers Network » USENIX Security ’23 – Vivek Nair, Dawn Song – Multi-Factor Key...
2024-3-2 04:0:0 | 阅读: 25 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
bloggers
network
youtube
What Does The Mother of All Breaches (MOAB) Mean for Organizations?
What does the colossal data leak, the Mother of All Breaches (MOAB), mean for businesses around the...
2024-3-2 03:48:22 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
moab
security
stuffing
attackers
CISA, Mandiant Warn of a Worsening Situation for Ivanti Users
The federal government and cybersecurity teams are warning organizations that threat groups are exp...
2024-3-2 02:6:12 | 阅读: 22 |
收藏
|
Security Boulevard - securityboulevard.com
ivanti
mandiant
ict
espionage
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #280 – The Tech Stack and the Architect
via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lau...
2024-3-2 02:0:0 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
software
comic
ratnaravi
marc
architect
Panda is Not Cute Anymore
SecureIQLab’s threat intel and research team recently discovered a data dump purporting to belong t...
2024-3-2 01:34:44 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
breached
telecom
trojans
flexing
How to secure your API secret keys from being exposed?
The uncontrolled sprawl of exposed, insecure APIs puts sensitive personal and corporate data at hi...
2024-3-2 01:6:6 | 阅读: 21 |
收藏
|
Security Boulevard - securityboulevard.com
security
exposure
importance
opensea
microsoft
Cheap Video Doorbell Cams: Tools of Stalkers and Thieves
Amazon, Sears and Shein still sell security swerving stuff.Cheap Chinese doorbell camer...
2024-3-2 00:43:56 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
doorbell
cameras
doorbells
richi
What is a Shadow API? Understanding the risks and strategies to prevent their sprawl
API Sprawl is a serious challenge in 2024, and shadow APIs are part of the problem. But do you act...
2024-3-2 00:7:7 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
monitoring
flask
swagger
USENIX Security ’23 – Conor Gilsenan, Fuzail Shakir, Noura Alomar, Serge Egelman – Security and Privacy Failures in Popular 2FA Apps
Home » Security Bloggers Network » USENIX Security ’23 – Conor Gilsenan, Fuzail Shakir, Noura Alo...
2024-3-2 00:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
bloggers
youtube
network
One Time Passcode scams
Yesterday’s useful advice from a TV commentator on matters of IT security can be boiled...
2024-3-1 23:40:39 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
passcode
advice
scammer
commentator
security
Vishing, Smishing Thrive in Gap in Enterprise, CSP Security Views
There is a significant gap between enterprises’ high expectations that their communications service...
2024-3-1 23:30:39 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
enea
csps
network
How we applied advanced fuzzing techniques to cURL
By Shaun MiraniNear the end of 2022, Trail of Bits was hired by the Open Source Technology Improve...
2024-3-1 22:30:25 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
fuzzer
hsts
curlopt
tlv
security
IT Leaders Lack Confidence in IoT Security Plans
There is a significant lack of confidence among IT leaders regarding their internet-of-things (IoT)...
2024-3-1 22:0:38 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
leaders
asset
network
Report: Average Initial Ransomware Demand in 2023 Reached $600K
A report published by Arctic Wolf, a provider of managed security services, found the median initia...
2024-3-1 21:16:34 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
arctic
wolf
ransomware
What is Cloud Segmentation?
What is cloud segmentation, how is it achievable, and how can it help organizations stay cybersecur...
2024-3-1 20:57:57 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
regulatory
segments
SEC’s Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure Rule: What You Should Know
There's a lot of talk about the Securities and Exchange Commission's (SEC) "Cybersecurity Risk Man...
2024-3-1 17:0:24 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
annual
gitguardian
NSFOCUS Research Labs Acknowledged by MSRC for Reporting Azure Database Service RCE Vulnerability
OverviewNSFOCUS received acknowledgments from the Microsoft Security Response Center...
2024-3-1 16:30:1 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
database
security
network
machine
The Importance of Timely Patch Management for QEMU in Linux
Neglecting patch management for QEMU poses serious risks, including data breaches, privilege escal...
2024-3-1 16:0:34 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
timely
qemucare
tuxcare
Previous
240
241
242
243
244
245
246
247
Next