unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
SBOM Use Cases and Why Binary Composition Analysis Matters
Software bill of materials (SBOM) use cases are used both by software product consumers and softwar...
2024-1-19 22:50:38 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
sboms
software
consumers
security
How to Shine in Your Next Cybersecurity Audit
“Be prepared!” It’s been the motto of the Scouts of America for almost 120 years. And it’s a motto...
2024-1-19 22:0:54 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
audits
prepared
auditors
security
Ransomware Activity Surged in 2023, Likely to Evolve in 2024
Last year was marked by an onslaught of ransomware attacks, impacting organizations across the boar...
2024-1-19 21:0:18 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
security
rapid7
evolving
The Difference Between Pivoting vs. Lateral Movement
The distinction between pivoting vs lateral movement can be central to applicable prote...
2024-1-19 19:46:28 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
network
lateral
pivoting
security
PolyCrypt Runtime Crypter Being Sold On Cybercrime Forums
This article provides a comprehensive look at crypters, software that disguises malware to evade...
2024-1-19 19:30:32 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
crypters
polycrypt
malicious
crypter
software
How SoundCloud Beats Fraudulent Traffic with DataDome and AWS
It was an easy decision. DataDome delivered the best value for money with the mos...
2024-1-19 17:0:58 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
rafal
datadome
soundcloud
fans
GAO Report Details FedRAMP ATO Challenges and Costs
The US Government Accountability Office (GAO) released a report on The Federal Risk and Authorizat...
2024-1-19 15:34:29 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
fedramp
costs
csps
ato
cloud
Orange Spain Outage: BGP Traffic Hijacked by Threat Actor
In a recent cybersecurity incident, Orange Spain faced a significant internet outage on January 3,...
2024-1-19 15:0:37 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
orange
spain
outage
rpki
ripe
What is Mobile Application Testing? How to Conduct It
A survey indicates that more than 98% of mobile applications lack security. This is primarily attri...
2024-1-19 13:44:33 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
kratikal
development
The Unseen Threats: Anticipating Cybersecurity Risks in 2024
Cybersecurity risks increase every year and bludgeon victims who fail to prepare properly. It can...
2024-1-19 08:35:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
cisos
attackers
nation
The Benefits of Using DCIM Software for Data Center Cable Management
In the ever-evolving landscape of information technology, the management of data centers has become...
2024-1-19 07:34:43 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
dcim
software
cabling
centers
cable
New Paper: “Future of the SOC: Evolution or Optimization — Choose Your Path” (Paper 4 of 4.5)
New Paper: “Future of the SOC: Evolution or Optimization — Choose Your Path” (Paper 4 o...
2024-1-19 06:9:33 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
processes
anton
optimize
decide
What Existing Security Threats Do AI and LLMs Amplify? What Can We Do About Them?
In my previous blog post, we saw how the growth of generative AI and Large Language Mod...
2024-1-19 05:49:41 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
llms
llm
security
threats
generative
Defining Good: A Strategic Approach to API Risk Reduction
The cost of not knowing what good is.Could you imagine our interstate highway system without roadw...
2024-1-19 04:6:17 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
salt
governance
asset
USENIX Security ’23 – Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang – MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries
Hot TopicsDefining Good: A Strategic Approach to API Risk Reduction USENIX Security ’23 - Xi...
2024-1-19 04:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
handelman
network
API security risks, testing, protection best practices
As per the State of Developer Experience report released in 2023, 98% of developers perceive APIs a...
2024-1-19 03:59:4 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
injection
entro
Stopping Alert Fatigue in 3 Simple Steps
We live in a world filled with constant notifications. From medical devices to severe weather warni...
2024-1-19 03:16:59 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
fatigue
cycode
aspm
PixieFail Bugs in UEFI Open Source Implementation Threaten Computers
A collection of security vulnerabilities found within the de facto open source implementation of th...
2024-1-19 02:54:24 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
network
edk
quarkslab
remote
Randall Munroe’s XKCD ‘Bug Thread’
Security Boulevard The Home of the Security Bloggers Network ...
2024-1-19 02:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
boulevard
bloggers
network
Massive ‘New’ Leaked Credentials List: Naz.API Pwns Troy
Stop reusing passwords, already. Here’s what else you should do.Almost 71 million sets of unique cr...
2024-1-19 01:18:40 | 阅读: 29 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
troy
naz
stuffing
pwned
Previous
281
282
283
284
285
286
287
288
Next