unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
CTEM: Navigating the Future of Attack Surface
This article introduces the concept of Continuous Threat Exposure Management (CTEM), delving into t...
2024-2-8 09:30:0 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
ctem
asset
exposure
repair
Google Cybersecurity Action Team Threat Horizons Report #9 Is Out!
This is my completely informal, uncertified, unreviewed and otherwise completely unoffi...
2024-2-8 08:4:55 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
horizons
security
anton
Are You Prepared for FedRAMP Rev. 5?
This year we joined other organizations in going through the FedRAMP Revision 5 transition project...
2024-2-8 07:47:4 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
fedramp
revision
transition
security
network
Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents
Cloudflare-Atlassian BreachOn Thanksgiving Day, November 23, 2023, Cloudflare’s Atlassian systems...
2024-2-8 05:36:6 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
atlassian
privileged
lateral
hijacking
operational
Product Highlight | Google Docs Phishing Scam Alert
Our customer support team is always busy helping customers audit and improve their Goog...
2024-2-8 05:22:43 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
security
microsoft
districts
How Swimlane Turbine Leverages AI to Simplify Automation
In modern software development, the tandem of AI and automation is a game-changer. It delivers sub...
2024-2-8 04:18:26 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
python
turbine
hero
chatbot
developers
Implement Continuous Threat Exposure Management: A Quick Guide for 2024
This year, Gartner named “Continuous Threat Exposure Management (CTEM)” as one of the top trends f...
2024-2-8 04:2:31 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ctem
security
threats
exposure
USENIX Security ’23 – Hengkai Ye, Song Liu, Zhechang Zhang, and Hong Hu – VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’...
2024-2-8 04:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
presenter
anaheim
Google Pushes Software Security Via Rust, AI-Based Fuzzing
Google is making moves to help developers ensure that their code is secure.The IT giant this week s...
2024-2-8 02:43:27 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
llms
memory
software
Randall Munroe’s XKCD ‘Relationship Advice’
via the comic artistry and dry wit of Randall Munroe, creator of XKCDPermalink*...
2024-2-8 02:0:0 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
comic
permalink
security
bloggers
Credential Stuffing: Who Owns the Risk?
Kasada was recently in the news after identifying a credential stuffing campaign targeting Australi...
2024-2-8 00:3:47 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
stuffing
security
kasada
tension
kasadaiq
USENIX Security ’23 – Hengkai Ye, Song Liu, Zhechang Zhang, and Hong Hu – VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’...
2024-2-8 00:0:0 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
hu
youtube
Lloyd’s of London Announces Investment in Axio
Funds to support further development of insurance solutions within the London insurance...
2024-2-7 23:35:30 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
axio
london
announces
insurance
investment
Using Proactive Intelligence Against Adversary Infrastructure
Organizations cannot and will never keep bad actors from breaching their perimeter: They’ll al...
2024-2-7 23:30:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
pdns
hyas
resiliency
Harnessing Artificial Intelligence for Ransomware Mitigation
Bad actors are highly intelligent and can easily circumvent existing security measures. Need more p...
2024-2-7 23:1:54 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
machine
ransomware
security
backup
intelligent
IBM Shows How Generative AI Tools Can Hijack Live Calls
IBM researchers have discovered a way to use generative AI tools to hijack live audio calls and man...
2024-2-7 22:55:24 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
lee
generative
cloning
speech
llm
‘Total Bollocks’ — No, Your Toothbrush isn’t DDoS’ing
Were 3 million toothbrushes hacked into a botnet? Or does a Fortinet spokeschild have e...
2024-2-7 22:25:16 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
richi
swiss
toothbrush
jennings
Binary type inference in Ghidra
By Ian SmithTrail of Bits is releasing BTIGhidra, a Ghidra extension that helps reverse engineers...
2024-2-7 22:0:39 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
btighidra
inference
ghidra
constraints
analysis
The 8 Must Haves for the Next Generation of SIEM
Security information and event management (SIEM) tools have evolved significantly in the 18 years s...
2024-2-7 22:0:24 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
siems
monitoring
costs
Part 3: The anatomy of supply chain attacks: Non-human identities & TPRM failure
“Identity is the new perimeter.” This catch phrase is present in almost every website of identity...
2024-2-7 21:6:23 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackers
identities
workshop
tprm
Previous
262
263
264
265
266
267
268
269
Next