unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Elasticidad de la nube
Descripción general de la elasticidad de la nubeLa flexibilidad es uno de los atributos cardi...
2024-8-7 18:14:41 | 阅读: 0 |
收藏
|
Wallarm Blog - lab.wallarm.com
nube
servicios
recursos
cloud
demanda
CIRCIA – Ley de notificación de incidentes cibernéticos para infraestructuras críticas
¿Qué es CIRCIA?CIRCIA, o Cyber Incident Reporting for Critical Infrastructure Act, es una pro...
2024-8-6 21:35:16 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
circia
ley
seguridad
340 secretos JWT débiles que debes revisar en tu código
¿Qué pasa con JWT?El token web JSON, usualmente identificado por sus siglas JWT, brinda un re...
2024-8-2 20:14:57 | 阅读: 3 |
收藏
|
Wallarm Blog - lab.wallarm.com
código
secretos
débiles
análisis
Definición de la tríada de la CIA. Ejemplos de confidencialidad, integridad y disponibilidad
Definición de la tríada de la CIAEl Modelo AIC o la Triada AIC es una estrategia clave para a...
2024-8-1 20:42:46 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
datos
protección
cia
sistemas
Falla en la lógica empresarial
¿Qué son las fallas de la lógica empresarial?Las fallas de lógica empresarial, también conoci...
2024-7-31 19:36:3 | 阅读: 0 |
收藏
|
Wallarm Blog - lab.wallarm.com
lógica
empresarial
sistema
fallas
usuario
CVE-2024-41110: Once Again, Docker Addresses API Vulnerability That Can Bypass Auth Plugins
SummaryA significant vulnerability (CVE-2024-41110) was recently discovered in Docker Eng...
2024-7-31 02:52:9 | 阅读: 22 |
收藏
|
Wallarm Blog - lab.wallarm.com
authz
v27
v26
flows
Ataque de puerta trasera
We're sorry, but we can't find the page you were looking for. It's probably some thing w...
2024-7-30 18:23:47 | 阅读: 0 |
收藏
|
Wallarm Blog - lab.wallarm.com
sorry
meantime
Sistema Automático de Identificación de Huellas Dactilares – AFIS
We're sorry, but we can't find the page you were looking for. It's probably some thing w...
2024-7-29 17:1:7 | 阅读: 0 |
收藏
|
Wallarm Blog - lab.wallarm.com
sorry
meantime
How Can Deliberately Flawed APIs Help In Mastering API Security?
In our recent webinar, we delved into the concept of creating an API security playground tail...
2024-7-24 22:3:8 | 阅读: 3 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
damn
github
Two of Wallarm’s Open-source Tools Have Been Accepted into Black Hat Arsenal 2024
We're gearing up with some seriously cool stuff for Black Hat! But first, a little sneak peek...
2024-7-19 17:31:27 | 阅读: 2 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gotestwaf
wallarm
arsenal
stickers
Polyfill.io Supply Chain Attack: Malicious JavaScript Injection Puts Over 100k Websites At Risk
Polyfill.io helps web developers achieve cross-browser compatibility by automatically managin...
2024-7-10 13:50:5 | 阅读: 13 |
收藏
|
Wallarm Blog - lab.wallarm.com
polyfill
malicious
wallarm
waap
CVE-2024-6387: New OpenSSH RegreSSHion Vulnerability Gives Hackers Root Access on Linux Servers – 700,000+ Linux Boxes Potentially at Risk
Labeled as CVE-2024-6387, the recently discovered vulnerability in OpenSSH has become a serio...
2024-7-7 05:46:49 | 阅读: 15 |
收藏
|
Wallarm Blog - lab.wallarm.com
openssh
ssh
remote
qualys
security
CVE-2024-5655: GitLab Fixes CI/CD Vulnerability & 13 Other Flaws With Latest Patch Release
A security flaw that impacts specific versions of GitLab's Comm...
2024-7-2 02:21:39 | 阅读: 18 |
收藏
|
Wallarm Blog - lab.wallarm.com
gitlab
security
pipelines
attackers
development
CVE-2024-36680: SQL Injection Vulnerability in Facebook’s PrestaShop Module Exposes Thousands of E-commerce Sites to Credit Card Fraud
SQL Injection Exposure in Promokit.eu Threatens Facebook's PrestaShop Customers PrestaSho...
2024-6-27 06:45:21 | 阅读: 29 |
收藏
|
Wallarm Blog - lab.wallarm.com
prestashop
promokit
facebook
pkfacebook
php
CVE-2024-3080: ASUS warns Customers about the latest Authentication Bypass Vulnerability detected Across seven Router Models
ASUS announces major Firmware UpdateASUS recently issued a firmware update to resolve a criti...
2024-6-22 01:13:45 | 阅读: 15 |
收藏
|
Wallarm Blog - lab.wallarm.com
asus
network
firmware
routers
attackers
PCI DSS v4.0: What You Need to Know and What the End of v3.2.1 Means for the Future of Digital Payments
On March 31st, 2024, The Payments Card Industry Standards Security Council (PCI SSC) official...
2024-6-20 22:3:22 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
software
requirement
dss
Zero-Day Marketplace Explained: How Zerodium, BugTraq, and Fear contributed to the Rise of the Zero-Day Vulnerability Black Market
Whenever a company is notified about or discovers a critical flaw in their system/application...
2024-6-18 04:33:54 | 阅读: 26 |
收藏
|
Wallarm Blog - lab.wallarm.com
software
bugtraq
mailing
CVE-2024-29849: Veeam discloses Critical Vulnerability that allows attackers to bypass user authentication on its Backup Enterprise Manager web interface
On May 21, 2024, Veeam revealed a severe flaw across its Veeam Backup Enterprise Manager (VBEM...
2024-6-11 00:52:29 | 阅读: 25 |
收藏
|
Wallarm Blog - lab.wallarm.com
veeam
backup
attacker
29849
sso
CVE-2024-24919: Check Point’s Quantum Gateway comes under Attack as Hackers exploit Zero-Day Vulnerability
Active Exploits target Check Point Security Gateway Zero-Day Information Disclosure flawCheck...
2024-6-3 19:10:13 | 阅读: 20 |
收藏
|
Wallarm Blog - lab.wallarm.com
24919
security
remote
attackers
r81
Vulnerabilities in BIG-IP Next Central Manager allows control of managed devices
IntroductionIn May 2024, new vulnerabilities have been identified in BIG-IP Next Central Mana...
2024-5-22 00:56:30 | 阅读: 10 |
收藏
|
Wallarm Blog - lab.wallarm.com
attacker
injection
odata
security
Previous
2
3
4
5
6
7
8
9
Next