unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Firmware Guide for Pen Testers
Contributions from Mathew Mullins, Supply Chain Security Consultant here at Eclypsium.Introduction...
2024-8-14 00:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
firmware
emba
netgear
security
NIST Announces the First 3 Post-Quantum Cryptography Standards – Ready or Not?
The Wait is Over. It’s Ready, Set, Go for PQC Migration!After 8 long years of rigorous research an...
2024-8-13 23:24:13 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
pqc
encryption
crystals
dsa
appviewx
USENIX Security ’23 – Formal Analysis of SPDM: Security Protocol and Data Model Version 1.2
Authors/Presenters:Cas Cremers, Alexander Dax, Aurora Naska Many thanks to USENIX fo...
2024-8-13 23:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
security
alexander
handelman
Sleeping With the Phishes
PHISHING SCHOOLHiding C2 With Stealthy Callback ChannelsWrite a custom command and control (C2) i...
2024-8-13 22:26:27 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
c2
outbound
network
doh
stealthy
6 Best ISO 27001 Compliance Software in 2024
With more sensitive data moving to the cloud, the threat of a breach or cyberattack is more pressi...
2024-8-13 22:19:56 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
software
27001
scytale
isms
proactive
Cato Network Reports Spike in Attempts to Exploit Log4j Vulnerabilities
A report published today by Cato Networks finds three years after its discovery in 2021 there was a...
2024-8-13 21:52:23 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
log4j
intelbroker
maor
What is Nassef from Darkode Up To?
In this post I’ll elaborate more on some of the current activities of a well known Dar...
2024-8-13 21:27:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
hxxp
darkode
tonymontana
portfolio
security
Cequence Storms Black Hat with API Security Testing for Generative AI Applications
That’s a wrap for Black Hat 2024! We had a great show and met many of you at the booth...
2024-8-13 21:0:2 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cequence
security
llm
generative
vercara
Understanding the OWASP Top 10 Application Vulnerabilities
The OWASP Top 10 provides a standardized catalog of the most critical security risks to web applica...
2024-8-13 19:48:43 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
failures
malicious
How to Prepare for SOC 2 and ISO 27001 Audit? Tips for Jira Admins
Security, reliability and credibility are the words every IT and security team wants to hear when l...
2024-8-13 19:41:48 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
27001
iec
backup
jira
Three Reasons to Take a New Cyber-Resilient Approach to Data Protection
Ransomware attacks today have become more sophisticated and can have more massive consequences than...
2024-8-13 19:7:10 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
security
immutable
resilience
On the Voynich Manuscript
Really interesting article on the ancient-manuscript scholars who are applying their te...
2024-8-13 19:4:21 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
manuscript
voynich
scholars
bowern
schneier
The Crucial Role of Firewall Rule Histories
One often overlooked aspect in the aftermath of a breach is the meticulous examination of firewall...
2024-8-13 18:8:49 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
histories
attackers
network
identify
Ubuntu Fixes Multiple OpenSSL Vulnerabilities
Several security issues have recently been discovered in OpenSSL that could result in denial-of-ser...
2024-8-13 17:0:7 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
libcare
tuxcare
attacker
What is the Critical Pathway to Insider Risk (CPIR)?
Home » Security Bloggers Network » What is the Critical Pathway to Insider Risk (CPIR)?...
2024-8-13 16:47:48 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cpir
insider
pathway
signpost
signpostsix
Black Hat Fireside Chat: Here’s how ‘Active ASPM’ is helping to triage and remediate coding flaws
By Byron V. AcohidoApplication Security Posture Management (ASPM) arose a few years a...
2024-8-13 15:29:22 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
aspm
acohido
ox
ziv
An Overview: Why are SSL/TLS Certificates Getting Revoked?
SSL, or Secure Sockets Layer, is a protocol designed to encrypt, secure, and authenticate communica...
2024-8-13 13:45:15 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
digicert
revoked
kratikal
cas
Constella Intelligence Unveils 2024 Identity Breach Report: Welcome to the GenAI Attack Revolution
How Artificial Intelligence and Massive Data Sets Are Both Fueling and Fighting the New Wave of Cyb...
2024-8-13 13:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
constella
threats
phishing
involving
Ransomware Attack Fetched A Record $75 Million
LAS VEGAS — Ransomware attacks are escalating in scale and frequency. But one recent payout, a reco...
2024-8-13 06:38:47 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
zscaler
extortion
threatlabz
angels
USENIX Security ’23 – Automated Security Analysis of Exposure Notification Systems
Authors/Presenters:Kevin Morio, Ilkan Esiyok, Dennis Jackson, Mozilla; Robert Künnemann...
2024-8-13 03:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
presenters
ilkan
Previous
92
93
94
95
96
97
98
99
Next