unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks
Authors/Presenters: Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. A...
2024-2-9 04:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
matthew
youtube
Volt Typhoon: SafeBreach Coverage for US-CERT Alert (AA24-038A)
Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach On February 7th, the Cybersec...
2024-2-9 03:52:41 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
network
volt
typhoon
safebreach
windows
2024 Annual State of Email Security Report: What to Expect
The Cofense 2024 Annual State of Email Security Report sheds light on emerging trends in the cyber...
2024-2-9 03:46:5 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
segs
malicious
cofense
New Web API V2
Why a new API?SonarQube can be accessed through its graphical user interface or Web API. The Web A...
2024-2-9 03:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
sonarqube
openapi
favor
graphical
verbs
China-Sponsored Hackers Lie in Wait to Attack U.S. Infrastructure
Hackers with the Chinese state-sponsored threat group Volt Typhoon continue to hide away in compute...
2024-2-9 02:10:59 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
volt
typhoon
security
doj
american
Randall Munroe’s XKCD ‘Log Cabin’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-2-9 02:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
sponsored
webinars
boulevard
The Art of Bot Detection: How DataDome Uses Picasso for Device Class Fingerprinting
Catching sophisticated bots requires all kinds of signals—from behavioral signals, to proxy detecti...
2024-2-9 01:40:21 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
picasso
rendering
signals
identify
Linux Vendors Squawk: PATCH NOW — CVSS 9.8 Bootkit Bug in shim.efi
A Microsoft researcher found it—and it’s somehow Microsoft’s fault.A critical vulnerabi...
2024-2-9 01:26:59 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
shim
richi
microsoft
jennings
booting
Report Details Scope of Global Threat to Elections
A report published today by Tidal Cyber, a provider of a cybersecurity posture management platform,...
2024-2-9 00:17:29 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
election
elections
officials
identifies
USENIX Security ’23 – Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang – AURC: Detecting Errors in Program Code and Documentation
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’...
2024-2-9 00:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
marc
authored
Cybersecurity in the Boardroom: A Strategic Driver for Growth
Cybersecurity has struggled for many years to make it onto the boardroom agenda. Th...
2024-2-8 23:30:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
comforte
strategic
boardroom
importance
The Next Year in Cybersecurity: Quantum, Generative AI and LLMs & Passwords
While the world will always be unpredictable, several strong trends in cybersecurity point to promi...
2024-2-8 23:0:46 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
llms
quorum
incredible
How to Enrich Data for Fraud Reduction, Risk Management and Mitigation in BFSI
In today’s digital age, the banking, financial services and insurance (BFSI) sector are grappling w...
2024-2-8 23:0:35 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
insurance
bfsi
loans
identify
enrichment
Ransomware Payments in 2023 Hit $1 Billion: Chainalysis
Ransomware gangs raked in more than $1 billion in ransom payments last year as they exploited secur...
2024-2-8 22:24:19 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
alphv
santos
moveit
software
2024 Cyberthreat Forecast: AI Attacks, Passkey Solutions and SMBs in the Crosshairs
Amid the excitement of the AI boom, security leaders are gearing up to address the paradigm shift a...
2024-2-8 22:0:24 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
generative
passwords
smbs
AZT: Quit Bugging the CISO + CIO
Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show note...
2024-2-8 21:11:31 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
weisong
elliot
neal
client
On Software Liabilities
Over on Lawfare, Jim Dempsey published a really interesting proposal for software liabi...
2024-2-8 20:0:19 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
software
liability
network
shouldn
SMTP Yahoo Error Codes Explained
Reading Time: 5 minIf Yahoo mail delivery issues have been bugging you recently, this article is...
2024-2-8 17:57:33 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
yahoo
dmarc
permanent
554
Writing Custom Security Tests
Have you ever considered the potential gaps that may arise when relying solely on security tests i...
2024-2-8 17:26:40 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
detector
mutate
nuclei
NSFOCUS WAF Security Reports
NSFOCUS WAF security reports are divided into classification-specific alert reports an...
2024-2-8 10:59:53 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
measurement
monthly
network
occurrence
Previous
261
262
263
264
265
266
267
268
Next