unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat
本文总结了六项网络安全关键议题:美国政府呼吁采用安全编码实践以防止缓冲区溢出攻击;欧洲刑警组织建议金融机构为量子计算威胁做好准备;Tenable调查显示云安全仍是主要挑战;Google报告强调国际合作对打击网络犯罪的重要性;美国两党提出法案以加重网络犯罪惩罚;NCC Group报告指出2024年勒索软件攻击激增15%。...
2025-2-14 14:0:0 | 阅读: 1 |
收藏
|
Tenable Blog - www.tenable.com
security
ransomware
overflow
tenable
cloud
Frequently Asked Questions About DeepSeek Large Language Model (LLM)
文章介绍了DeepSeek开源大语言模型及其V3和R1版本的技术特点与性能优势,并探讨了运行要求、与其他模型的差异及安全隐私问题。部分国家和地区已禁止或考虑禁止使用DeepSeek。...
2025-2-13 14:30:0 | 阅读: 0 |
收藏
|
Tenable Blog - www.tenable.com
deepseek
llms
tenable
security
reasoning
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)
微软在2025年2月修复了55个CVE漏洞,其中包括3个关键漏洞和4个零日漏洞(其中两个已被利用)。受影响的组件包括Active Directory、Azure、Office和Windows等。远程代码执行(RCE)占38.2%,权限提升(EoP)占34.5%。...
2025-2-11 18:44:43 | 阅读: 2 |
收藏
|
Tenable Blog - www.tenable.com
tenable
microsoft
security
nessus
cloud
Cybersecurity Snapshot: Cyber Agencies Offer Best Practices for Network Edge Security, While OWASP Ranks Top Risks of Non-Human Identities
Check out recommendations from CISA and others on how to protect network edge devices and applicatio...
2025-2-7 15:0:0 | 阅读: 5 |
收藏
|
Tenable Blog - www.tenable.com
security
ransomware
nhis
refers
cmc
Tenable Supercharges Exposure Management with Acquisition of Vulcan Cyber
2025-2-7 14:19:0 | 阅读: 0 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
cloud
nessus
exposure
CISA Releases FOCAL Plan to Help Federal Agencies Reduce Cyber Risk
2025-2-4 14:0:0 | 阅读: 7 |
收藏
|
Tenable Blog - www.tenable.com
focal
security
tenable
operational
Cybersecurity Snapshot: CSA Offers Tips for Deploying AI Securely, While Deloitte Says Cyber Teams’ GenAI Use Yields Top ROI
Check out the Cloud Security Alliance’s recommendations for rolling out AI apps securely. Meanwhile,...
2025-1-31 14:0:0 | 阅读: 5 |
收藏
|
Tenable Blog - www.tenable.com
security
generative
ciso
cxos
What Makes This “Data Privacy Day” Different?
As we celebrate Data Privacy Day, Bernard Montel, Tenable’s EMEA Technical Director and Security Str...
2025-1-28 05:1:0 | 阅读: 12 |
收藏
|
Tenable Blog - www.tenable.com
cloud
security
tenable
posture
dspm
How To Clean Up Your Cloud Environment Using Tenable Cloud Security
You must periodically review your cloud environments to remove old and unused resources because they...
2025-1-27 14:0:0 | 阅读: 6 |
收藏
|
Tenable Blog - www.tenable.com
cloud
security
tenable
iac
buckets
Cybersecurity Snapshot: WEF Offers AI Security Best Practices, as DORA Regulation Places Strict Cyber Rules on Banks
Check out tips for adopting AI securely from the World Economic Forum. Plus, the EU’s DORA cyber rul...
2025-1-24 14:0:0 | 阅读: 11 |
收藏
|
Tenable Blog - www.tenable.com
cloud
dora
benchmarks
ransomware
CVE-2025-23006: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Reportedly Exploited
2025-1-23 17:54:0 | 阅读: 20 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
sma
scott
sma100
Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
Salt Typhoon, a state-sponsored actor linked to the People’s Republic of China, has breached at leas...
2025-1-23 14:0:0 | 阅读: 11 |
收藏
|
Tenable Blog - www.tenable.com
typhoon
tenable
salt
security
Oracle January 2025 Critical Patch Update Addresses 186 CVEs
2025-1-22 17:52:40 | 阅读: 43 |
收藏
|
Tenable Blog - www.tenable.com
security
tenable
quarter
scott
318
Cybersecurity Snapshot: CISA Lists Security Features OT Products Should Have and Publishes AI Collaboration Playbook
Shopping for OT systems? A new CISA guide outlines OT cyber features to look for. Meanwhile, the U.S...
2025-1-17 14:0:0 | 阅读: 7 |
收藏
|
Tenable Blog - www.tenable.com
security
development
software
New Cybersecurity Executive Order: What It Means for Federal Agencies
The Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity includes...
2025-1-16 14:52:0 | 阅读: 11 |
收藏
|
Tenable Blog - www.tenable.com
security
eo
cloud
software
5 Things Government Agencies Need to Know About Zero Trust
2025-1-15 14:0:0 | 阅读: 1 |
收藏
|
Tenable Blog - www.tenable.com
security
exposure
tenable
robert
CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild
2025-1-14 20:0:29 | 阅读: 25 |
收藏
|
Tenable Blog - www.tenable.com
attacker
fg
tenable
fortiproxy
security
Microsoft’s January 2025 Patch Tuesday Addresses 157 CVEs (CVE-2025-21333, CVE-2025-21334, CVE-2025-21335)
2025-1-14 18:53:51 | 阅读: 21 |
收藏
|
Tenable Blog - www.tenable.com
tenable
microsoft
security
cloud
CVE-2025-0282: Ivanti Connect Secure Zero-Day Vulnerability Exploited In The Wild
2025-1-8 19:16:44 | 阅读: 29 |
收藏
|
Tenable Blog - www.tenable.com
ivanti
pulse
tenable
zta
neurons
Tenable Chairman and CEO Amit Yoran Has Died
2025-1-5 22:0:52 | 阅读: 0 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cloud
nessus
lumin
security
Previous
1
2
3
4
5
6
7
8
Next