unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Zero-Day Marketplace Explained: How Zerodium, BugTraq, and Fear contributed to the Rise of the Zero-Day Vulnerability Black Market
Whenever a company is notified about or discovers a critical flaw in their system/application...
2024-6-18 04:33:54 | 阅读: 26 |
收藏
|
Wallarm Blog - lab.wallarm.com
software
bugtraq
mailing
CVE-2024-29849: Veeam discloses Critical Vulnerability that allows attackers to bypass user authentication on its Backup Enterprise Manager web interface
On May 21, 2024, Veeam revealed a severe flaw across its Veeam Backup Enterprise Manager (VBEM...
2024-6-11 00:52:29 | 阅读: 24 |
收藏
|
Wallarm Blog - lab.wallarm.com
veeam
backup
attacker
29849
sso
CVE-2024-24919: Check Point’s Quantum Gateway comes under Attack as Hackers exploit Zero-Day Vulnerability
Active Exploits target Check Point Security Gateway Zero-Day Information Disclosure flawCheck...
2024-6-3 19:10:13 | 阅读: 20 |
收藏
|
Wallarm Blog - lab.wallarm.com
24919
security
remote
attackers
r81
Vulnerabilities in BIG-IP Next Central Manager allows control of managed devices
IntroductionIn May 2024, new vulnerabilities have been identified in BIG-IP Next Central Mana...
2024-5-22 00:56:30 | 阅读: 10 |
收藏
|
Wallarm Blog - lab.wallarm.com
attacker
injection
odata
security
Dell Data Breach: Personal Information of 49 Million Customers Compromised due to latest API Abuse
Dell recently issued a notice regarding a data breach that occurred on May 9, which has report...
2024-5-20 22:44:6 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
dell
menelik
security
notebooks
desktops
Best API Security Product: Wallarm wins 2024 Cybersecurity Excellence Award
We are thrilled to announce that Wallarm has clinched the sought-after 2024 Cybersecurity Exce...
2024-5-8 09:13:9 | 阅读: 4 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
resilience
award
Tracking CVE-2024-2876: Why does the latest WordPress exploit compromise over 90,000 websites?
A highly concerning security loophole was recently discovered in a WordPress plugin called "Em...
2024-5-6 19:11:50 | 阅读: 28 |
收藏
|
Wallarm Blog - lab.wallarm.com
wordpress
wallarm
subscribers
waap
27956
Introducing the Wallarm Q1 2024 API ThreatStats™ Report
As we have in previous editions of the ThreatStats report, we highlight the industry’s top API...
2024-4-30 23:2:12 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
threats
software
threatstats
sdlc
Wallarm’s Open Source API Firewall debuts at Blackhat Asia 2024 – Introduces Key New Features & Functionalities
Wallarm introduced its ongoing Open Source API Firewall project to the world at the recently c...
2024-4-22 20:47:25 | 阅读: 5 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
preventing
denylist
openapi
How to track and stop CVE-2024-3400: Palo Alto Devices API Exploit Causing Critical Infrastructure and Enterprise Epidemics
A severe command injection vulnerability in the GlobalProtect Gateway feature of PAN-OS versio...
2024-4-14 05:57:47 | 阅读: 99 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
3400
wallarm
pan
Top 3 API Leaks Identified by Cybersecurity & InfoSec Experts
APIs (Application Programming Interfaces) have proliferated widely, which increases their susc...
2024-4-8 23:21:4 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
exposure
development
addressing
Spoutible Enhances Platform Security through Partnership with Wallarm
Spoutible, the rapidly growing social media platform known for its commitment to fostering a...
2024-3-26 23:23:19 | 阅读: 17 |
收藏
|
Wallarm Blog - lab.wallarm.com
spoutible
security
wallarm
partnership
commitment
Protected: Top 4 Industries at Risk of Credential Stuffing and Account Takeover (ATO) attacks
Wallarm — API Security — Protected: Top 4 Industries at Risk of Credential Stuffing and Acco...
2024-3-26 02:15:0 | 阅读: 10 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
csf
industries
stuffing
Top 5 Data Breaches That Cost Millions
“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using...
2024-3-18 23:0:11 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
mgm
microsoft
american
ransomware
Top 6 Data Breaches That Cost Millions
“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using...
2024-3-18 23:0:11 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
mgm
american
ransomware
security
Test and evaluate your WAF before hackers
Since 1991, Web Application Firewall, commonly referred to as WAF, has become one of the most...
2024-3-11 21:57:52 | 阅读: 17 |
收藏
|
Wallarm Blog - lab.wallarm.com
gotestwaf
injection
payload
grpc
security
Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens
Government bodies are clamping down heavily on institutions and organizations that handle sen...
2024-3-8 09:46:55 | 阅读: 20 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
trls
cloud
Improving Security with Wallarm’s NIST CSF 2.0 Dashboard
Ensuring the security of web applications and APIs is more critical than ever. With threats b...
2024-2-27 02:39:21 | 阅读: 24 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
csf
wallarm
threats
avro vs protobuf
A Kickoff Discussion on Core Aspects of Avro & ProtobufWhen deliberating on the subject of da...
2024-2-8 19:19:51 | 阅读: 14 |
收藏
|
Wallarm Blog - lab.wallarm.com
avro
protobuf
python
flexibility
efficiency
Digital Experience Monitoring | What Is DEM?
Introduction to Digital Experience Monitoring: Illuminating the BasicsIn an era governed by t...
2024-2-7 18:23:5 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
dem
dueo
monitoring
039
python
Previous
2
3
4
5
6
7
8
9
Next