unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
GitHub Actions hack bolsters case for complex binary analysis
A novel attack method on GitHub illustrates yet again why application security (AppSec) teams shou...
2024-1-17 20:30:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
github
runners
runner
Lessons learned upgrading to React 18 in SonarQube
The SonarQube interface is written in React and we recently went through the process of upgrading f...
2024-1-17 15:0:0 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
setstate
shouldfetch
batching
Top Insider Risk Management Predictions for 2024
The global demand for enhanced insider risk management capabilities will continue to skyrocket acro...
2024-1-17 13:0:9 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
insider
security
outsmarted
excellence
dtex
Key Considerations for Successful Cybersecurity Supply Chain Risk Management (C-SCRM)
What is C-SCRMCybersecurity Supply Chain Risk Management (C-SCRM) is the strategic process of iden...
2024-1-17 06:10:11 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
scrm
security
eclypsium
identify
Netcraft Report Surfaces Spike in Online Healthcare Product Scams
A report published today by Netcraft, a provider of cybersecurity services, finds the v...
2024-1-17 05:31:45 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
netcraft
inexpensive
tlds
goods
involving
Our Journey in Building AI-First Security Features | Impart Security
We recently announced a new LLM-powered enhancement to our API Discovery feature called Spec Enrich...
2024-1-17 05:22:0 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
llms
enrichment
prompts
llm
Why the US Needs Comprehensive Cybersecurity Legislation
Taking a hands-off approach to cybersecurity is no longer good enough for any organization. In 2023...
2024-1-17 04:2:19 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
water
legislation
drinking
USENIX Security ’23 – Christof Ferreira Torres, Fiona Willi, Shweta Shinde – Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3
Hot TopicsNetcraft Report Surfaces Spike in Online Healthcare Product Scams Our Journey in B...
2024-1-17 04:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
marc
What is content abuse?
One of the most challenging parts of doing business online is the risk of fraud. While some types o...
2024-1-17 02:27:35 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
sift
reviews
ugc
fraudsters
utm
A New Breed Of Security Leadership: How the Digital Age Is Transforming the Security Professional
Article By: Chuck Randolph | January 16, 2024This article was originally...
2024-1-17 02:7:52 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
randolph
chuck
ontic
breed
Randall Munroe’s XKCD ‘Sheet Bend’
Security Boulevard The Home of the Security Bloggers Network ...
2024-1-17 02:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
boulevard
bloggers
network
OpenAI: We’ll Stop GPT Misuse for Election Misinfo
Sam says avoid AI abuse—protect the democratic process.With elections coming up in the US and other...
2024-1-17 01:16:19 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
openai
elections
generative
chatbots
politics
The No-Nonsense Guide to Bypassing API Auth Using NoSQL Injection
IntroductionSometimes, the way to bypass API auth is easier than you think. That’s all thanks to m...
2024-1-17 01:0:0 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
nosql
injection
bypass
username
SBOM Examples
There is lot of talk about Software Bill of Materials (SBOMs) in industry publications, social medi...
2024-1-17 00:37:15 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
software
codesecure
sentry
network
USENIX Security ’23 – Fieke Miedema, Kelvin Lubbertsen, Verena Schrama, Rolf van Wegberg – Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics of a Bitcoin Mixing Service
Hot TopicsRandall Munroe’s XKCD ‘Sheet Bend’ OpenAI: We’ll Stop GPT Misuse for Election Misi...
2024-1-17 00:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
handelman
youtube
Getting Started: A Beginner’s Guide for Improving Privacy
Welcome to the world of online/digital privacy!Like its sister guide for cybersecurity, this pr...
2024-1-17 00:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
oriented
visited
advice
The State of Software Supply Chain Security 2024: Key takeaways
Software supply chain attacks are now mainstream events — a change in tactics by cyber-attackers th...
2024-1-16 23:55:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
malicious
3cx
A (partial) history of software supply chain attacks
The widespread campaign of software supply chain hacks that were behind the attack on...
2024-1-16 23:30:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
incomplete
chronology
Understanding Cloud Workload Protection: Technologies and Best Practices
A cloud workload refers to an application or storage element within a cloud environment, whether it...
2024-1-16 23:0:35 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
workloads
workload
threats
The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part One
On August 10, 2023, the Cyber Safety Review Board (CSRB) publicly released a critical report detail...
2024-1-16 22:0:28 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
band
microsoft
lapsus
csrb
bang
Previous
284
285
286
287
288
289
290
291
Next