unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
DEF CON 31 XR Village – Whitney Phillips’ ‘Augmented Reality And Implications On Mobile Security’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-11 00:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
workloads
failures
designing
resiliency
Navigating an AI-Enhanced Landscape of Cybersecurity in 2024: A Proactive Approach to Phishing Training in Enterprises
As we stand at the precipice of 2024, the intersection of artificial intelligence (AI)...
2023-12-10 20:20:10 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
security
cybeready
threats
The SOC 2 Compliance Checklist for 2023
SOC 2 is the gold standard in Information Security certifications and shows the world just how seri...
2023-12-10 20:15:21 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
centraleyes
checklist
preparation
processes
2023 Cyber Review: The Year GenAI Stole the Show
This was a year unlike any other in the brief history of the cybersecurity industry, w...
2023-12-10 18:2:3 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
security
genai
lohrmann
Why Your Business Needs a Solid Server Backup Strategy: Expert Insights
Importance of Server Backup: Understanding the BasicsIn today’s digital landscape, the importance...
2023-12-10 15:34:17 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
backup
cloud
offsite
disaster
security
DEF CON 31 Car Hacking Village – Euntae Jang’s, Donghyon Jeong’s, Jonghyuk Song’s ‘Automotive USB Fuzzing’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-10 00:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
adapt
Top 5 Privileged Access Governance Capabilities for Compliance and Audit
Table of ContentsManaging your Privileged Access Governance Compliance and Audit Capabilities...
2023-12-9 19:35:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
governance
privileged
security
ensuring
processes
WTH is Modern SOC, Part 1
In recent weeks, coincidentally, I’ve had several conversations that reminded me about the confusio...
2023-12-9 04:31:39 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
anton
security
humans
soar
1990s
Key takeaways from Sift’s live session with iGaming Business on differentiating between players and fraudsters
Navigating the complex world of online gaming is no easy task for operators. Whether it’s account t...
2023-12-9 04:1:9 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
igaming
fraudsters
sift
players
curtis
DEF CON 31 – John Novak’s ‘Azure B2C 0Day – An Exploit Chain From Public Keys To Microsoft Bug Bounty’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-9 04:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
workload
The Endless Pursuit of the Ecosystem
"I'll just make a few quick changes to the ecosystem this week. Seems like a nice way to come back...
2023-12-9 02:23:32 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
estates
juggernauts
combining
Randall Munroe’s XKCD ‘Compact Graphs’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-9 02:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
sudden
Six Top Tips For Holistic AppSec and Software Supply Chain Security
Developing applications and working within the software supply chain requires hard skills such as c...
2023-12-9 01:20:1 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
developers
development
mend
On-Prem SIEM vs. Cloud-Native SIEM: Which One Is Right for You?
Security information and event management (SIEM) solutions are essential for organizations of all s...
2023-12-9 01:12:49 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
prem
security
software
Trojan Malware Hidden in Cracked macOS Software, Kaspersky Says
Newly discovered cracked applications being distributed by unauthorized websites are delivering Tro...
2023-12-9 00:25:22 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cracked
software
puzan
proxy
Russian FSB Targets US and UK Politicians in Sneaky Spear-Phish Plan
“Star Blizzard” FSB team called out by Five Eyes governments (again).The U.S. and UK, backed by Aus...
2023-12-9 00:14:1 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
blizzard
fsb
russia
callisto
phishing
DEF CON 31 – Alexander Dalsgaard Krog’s, Alexander Skovsende’s ‘Backdoor In The Core – Altering Intel x86 Instruction Set At Runtime’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-9 00:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
workloads
failures
designing
servicing
Russian Threat Actors Exploit Outlook Flaw to Hijack Exchange Accounts
Microsoft’s recent warning regarding active exploits by Russian state-sponsored threat...
2023-12-8 23:12:50 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
security
software
nuspire
23397
AWS Misconfiguration Leads to Buckets of Data
Misconfigured AWS Role Leads to Cloud Initial Access and Data CompromiseThere are two...
2023-12-8 23:1:28 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
nodezero
privileges
cloud
buckets
horizon3
Gartner® Strategic Technology Trends for 2024
Hot TopicsDEF CON 31 - John Novak’s ‘Azure B2C 0Day - An Exploit Chain From Public Keys To Mi...
2023-12-8 22:51:34 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
strategic
security
safebreach
investments
deliberate
Previous
1
2
3
4
5
6
7
8
Next