unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
A Self-Enforcing Protocol to Solve Gerrymandering
In 2009, I wrote:There are several ways two people can divide a piece of cake in half...
2024-2-2 20:1:55 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
districts
fair
enforcing
schneier
Essential Business Continuity Requires Application Resilience
For organizations playing a crucial role in infrastructure and the economy, application resilience...
2024-2-2 19:58:9 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
resilience
truefort
disaster
economy
How Does Cybersecurity Services Prevent Businesses From Cyber Attacks?
In the contemporary digital landscape, new threats emerge constantly. If someone connects to the In...
2024-2-2 14:24:59 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
kratikal
threats
reputation
Passkeys and The Beginning of Stronger Authentication
Passkeys and The Beginning of Stronger Authentication madhavFri, 02/02/2024 – 05:23...
2024-2-2 13:23:35 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
passkeys
passwords
security
synced
FBI Issues Ominous Warning of Imminent Cyber Attack on Critical Infrastructure
In testimony before the House Select Committee on the Chinese Communist Party yesterday, FBI Direct...
2024-2-2 11:0:31 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ordr
threats
wray
security
asset
USENIX Security ’23 – Cas Cremers, Charlie Jacomme, Aurora Naska – Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations
Thursday, February 1, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsF...
2024-2-2 04:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
bloggers
network
webinars
jacomme
Improving Cybersecurity: Different Certifications Explained
In the ever-evolving landscape of cybersecurity, the choice of cryptographic algorithms and certifi...
2024-2-2 03:13:3 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
ecc
imperva
security
2k
encryption
Diving into the 2024 Security Megatrends
Cybersecurity is a fast-paced and constantly changing industry. Ongoing technological a...
2024-2-2 02:48:54 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
megatrends
nuspire
ensuring
What Will the Future of Cybersecurity Bring?
Our world is reliant on technology. It shapes and influences nearly everything we do—from the mome...
2024-2-2 02:31:56 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
cloud
phishing
Telegram is a Wide-Open Marketplace for Phishing Tools
The encrypted messaging app Telegram has become a veritable marketplace for bad actors who want to...
2024-2-2 02:5:15 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
guardio
kits
zaytsev
tal
The SOC 2 Effect: Elevating Security and Trust in Netography Fusion
The SOC 2 Effect: Elevating Security and Trust in Netography FusionRaymond Kirk, Produ...
2024-2-2 02:0:34 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
netography
security
fusion
elevating
Randall Munroe’s XKCD ‘US Survey Foot’
via the comic artistry and dry wit of Randall Munroe, creator of XKCDPermalink*...
2024-2-2 02:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
artistry
munroe
security
Improved Security Agility and Adaptability with Dynamic Runtime Lists | Impart Security
We’re proud to announce Impart Security’s newest release, Dynamic Runtime Lists, wh...
2024-2-2 01:13:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
impart
agility
enhance
Optimize Control Health Management Across Business Levels: Introducing Scopes
Managing controls across multiple business units becomes increasingly challenging and costly as op...
2024-2-2 01:8:42 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
scopes
hyperproof
security
operational
departments
FBI Warning: China Will Hack US Infra. (via Router Botnet)
FBI head Wray won’t tolerate China’s “real-world threat to our physical safety.”Harsh rhetoric agai...
2024-2-2 00:49:38 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
wray
typhoon
volt
sponsored
security
Nisos: Top 5 Social Media Content Evasion Tactics
NisosNisos: Top 5 Social Media Content Evasion TacticsUsers spreading violative c...
2024-2-2 00:48:50 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
nisos
narratives
influence
amplify
malign
USENIX Security ’23 – TreeSync: Authenticated Group Management for Messaging Layer Security
Sponsorships AvailableAuthor/Presenters: Théophile Wallez, Inria Paris; Jonathan Protzenko, Benj...
2024-2-2 00:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
inria
paris
winner
benjamin
karthikeyan
Aim Security to Limit Exposure of Sensitive Data to Generative AI Services
Aim Security this week emerged from stealth to launch a platform that leverages large l...
2024-2-1 23:26:56 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
generative
getz
prompts
aim
security
The Who, What, and Why of API Specifications
Here at Cequence we have covered the ups and downs of API specs throughout the years. Discussions o...
2024-2-1 22:39:18 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
cequence
development
wizard
The State of Ransomware 2024
2024 has started out with the highest number of January attacks we’ve ever recorded, with 76 atta...
2024-2-1 22:32:24 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
claimed
claims
exfiltrated
cyberattack
Previous
267
268
269
270
271
272
273
274
Next