unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Dell Data Breach: Personal Information of 49 Million Customers Compromised due to latest API Abuse
Dell recently issued a notice regarding a data breach that occurred on May 9, which has report...
2024-5-20 22:44:6 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
dell
menelik
security
notebooks
desktops
Best API Security Product: Wallarm wins 2024 Cybersecurity Excellence Award
We are thrilled to announce that Wallarm has clinched the sought-after 2024 Cybersecurity Exce...
2024-5-8 09:13:9 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
resilience
award
Tracking CVE-2024-2876: Why does the latest WordPress exploit compromise over 90,000 websites?
A highly concerning security loophole was recently discovered in a WordPress plugin called "Em...
2024-5-6 19:11:50 | 阅读: 32 |
收藏
|
Wallarm Blog - lab.wallarm.com
wordpress
wallarm
subscribers
waap
27956
Introducing the Wallarm Q1 2024 API ThreatStats™ Report
As we have in previous editions of the ThreatStats report, we highlight the industry’s top API...
2024-4-30 23:2:12 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
threats
software
threatstats
sdlc
Wallarm’s Open Source API Firewall debuts at Blackhat Asia 2024 – Introduces Key New Features & Functionalities
Wallarm introduced its ongoing Open Source API Firewall project to the world at the recently c...
2024-4-22 20:47:25 | 阅读: 7 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
preventing
denylist
openapi
How to track and stop CVE-2024-3400: Palo Alto Devices API Exploit Causing Critical Infrastructure and Enterprise Epidemics
A severe command injection vulnerability in the GlobalProtect Gateway feature of PAN-OS versio...
2024-4-14 05:57:47 | 阅读: 99 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
3400
wallarm
pan
Top 3 API Leaks Identified by Cybersecurity & InfoSec Experts
APIs (Application Programming Interfaces) have proliferated widely, which increases their susc...
2024-4-8 23:21:4 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
exposure
development
addressing
Spoutible Enhances Platform Security through Partnership with Wallarm
Spoutible, the rapidly growing social media platform known for its commitment to fostering a...
2024-3-26 23:23:19 | 阅读: 17 |
收藏
|
Wallarm Blog - lab.wallarm.com
spoutible
security
wallarm
partnership
commitment
Protected: Top 4 Industries at Risk of Credential Stuffing and Account Takeover (ATO) attacks
Wallarm — API Security — Protected: Top 4 Industries at Risk of Credential Stuffing and Acco...
2024-3-26 02:15:0 | 阅读: 10 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
csf
industries
stuffing
Top 5 Data Breaches That Cost Millions
“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using...
2024-3-18 23:0:11 | 阅读: 11 |
收藏
|
Wallarm Blog - lab.wallarm.com
mgm
microsoft
american
ransomware
Top 6 Data Breaches That Cost Millions
“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using...
2024-3-18 23:0:11 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
mgm
american
ransomware
security
Test and evaluate your WAF before hackers
Since 1991, Web Application Firewall, commonly referred to as WAF, has become one of the most...
2024-3-11 21:57:52 | 阅读: 17 |
收藏
|
Wallarm Blog - lab.wallarm.com
gotestwaf
injection
payload
grpc
security
Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens
Government bodies are clamping down heavily on institutions and organizations that handle sen...
2024-3-8 09:46:55 | 阅读: 20 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
trls
cloud
Improving Security with Wallarm’s NIST CSF 2.0 Dashboard
Ensuring the security of web applications and APIs is more critical than ever. With threats b...
2024-2-27 02:39:21 | 阅读: 24 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
csf
wallarm
threats
avro vs protobuf
A Kickoff Discussion on Core Aspects of Avro & ProtobufWhen deliberating on the subject of da...
2024-2-8 19:19:51 | 阅读: 14 |
收藏
|
Wallarm Blog - lab.wallarm.com
avro
protobuf
python
flexibility
efficiency
Digital Experience Monitoring | What Is DEM?
Introduction to Digital Experience Monitoring: Illuminating the BasicsIn an era governed by t...
2024-2-7 18:23:5 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
dem
dueo
monitoring
039
python
Directory Traversal: Examples, Testing, and Prevention
Unveiling the Enigma of Path Navigation: An Exhaustive Exploration and InsightPath Navigation...
2024-2-6 21:47:58 | 阅读: 17 |
收藏
|
Wallarm Blog - lab.wallarm.com
navigation
security
039
How to comply with GDPR requirements
Understanding the Basics of GDPR ComplianceWithin the sphere of cybersecurity, significant s...
2024-2-5 19:45:59 | 阅读: 11 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
adherence
guidelines
dg
gdpa
Blocking Compromised Tokens with Wallarm
In our Annual API ThreatStats report, we highlighted the increa...
2024-2-3 10:13:21 | 阅读: 10 |
收藏
|
Wallarm Blog - lab.wallarm.com
wallarm
attackers
postman
ranking
Wallarm’s Crusade Against Rising Credential Stuffing Threats
Credential Stuffing, a vital yet often overlooked aspect of cybersecurity, needs to be address...
2024-2-2 23:42:37 | 阅读: 15 |
收藏
|
Wallarm Blog - lab.wallarm.com
stuffing
security
wallarm
passwords
Previous
3
4
5
6
7
8
9
10
Next