unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Supply Chain Ransomware Attack Hits Starbucks, UK Grocers
Starbucks was among other corporations affected by a ransomware attack last week on managed serv...
2024-11-26 23:37:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
software
yonder
starbucks
chains
QNAP’s Buggy Security Fix Causes Chaos
NAS maker does a CrowdStrike—cleanup on /dev/dsk/c1t2d3s4 pleaseStorage queens QNAP squashed so...
2024-11-26 22:54:57 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
qnap
firmware
qts
20241114
2950
How Proactive Security Could Have Stopped the Summit Pathology Data Breach
2024-11-26 22:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
summit
patient
healthcare
pathology
security
November Product Update
The CyberSaint team has b...
2024-11-26 19:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cybersaint
thrilled
cyberstrong
security
additions
RF Fortune Telling: Frequency Hopping Predictability
In the world of wireless communications, security vulnerabilities in implemented protocols canre...
2024-11-26 10:18:3 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
hopping
security
prng
attacker
11 Tips to Streamline Your Data Center Operations with DCIM Software
Managing a data center is a complex task, requiring seamless coordination of resources, equipment,...
2024-11-26 09:9:44 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
dcim
software
asset
cooling
maintenance
Understanding the NYDFS Cybersecurity Regulation
Whether you’re a small financial service provider or a major institution, if you’re doing busine...
2024-11-26 05:57:44 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
nydfs
security
regulation
york
CMMC Compliance Requirements: A Complete Guide
Department of Defense (DoD) data is some of the most sensitive out there. That’s why the DoD des...
2024-11-26 05:56:55 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cmmc
dod
security
threats
What Is CI/CD Security? Risks and Best Practices
Continuous integration and continuous delivery (CI/CD) pipelines are invaluable in software deve...
2024-11-26 05:23:24 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
stage
pipelines
legit
Life in the Swimlane with Dylan Dartnell, Professional Services Engineer
Welcome to the “Life in the Swimlane” blog series. Here we will feature interviews with Swimlaners...
2024-11-26 05:9:23 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
swimlane
passionate
teaching
security
mountains
DEF CON 32 – From Getting JTAG On The iPhone 15 To Hacking Apple’s USB-C Controller
Monday, November 25, 2024...
2024-11-26 04:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
presenters
You Have Less Than Two Months to Become DORA Compliant
If you represent a financial services company that is based in the European Union or does busine...
2024-11-26 03:14:29 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
dora
azul
compliant
ict
security
5 Traditional Approaches to Generating Test Data
“As a rule, software systems...
2024-11-26 03:5:36 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
mock
dummy
software
subsetting
development
Machine Learning in Cyber Security: Harnessing the Power of Five AI Tribes
Machine learning algorithms form a critical defense mechanism against cyber threats, enhancing t...
2024-11-26 02:2:8 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
machine
tribes
reasoning
analogizers
Randall Munroe’s XKCD ‘Arizona Chess’
via the c...
2024-11-26 02:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
comic
wit
permalink
3014
The Quest to Minimize False Positives Reaches Another Significant Milestone
It was just a few months ago that we announced GitGuardian's bespoke machine learning model, FP...
2024-11-26 01:9:54 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
positives
remover
gitguardian
precision
security
Privileged Account Security in Active Directory
Privileged accounts in Active Directory (AD) are the keys to your organization’s most sensitive...
2024-11-26 00:1:3 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
privileged
security
enzoic
passwords
monitoring
DEF CON 32 – Behind Enemy Lines: Going Undercover To Breach LockBit Ransomware Op
Monday, November 25, 2024...
2024-11-26 00:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
network
presenters
boulevard
OWASP Top 10 for LLM adds risks: Get on target to secure your AI models
An updated version of the OWASP Top 10 for LLM Applications has been released, with a key outli...
2024-11-25 23:35:27 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
llm
security
deepfake
threats
bleeker
How to Read, Review, and Analyze a SOC 2 Report
We get it – the hype surrounding the infamous SOC 2 compliance report is real. But trust us: ge...
2024-11-25 23:12:11 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
opinion
auditor
scytale
assertion
Previous
-19
-18
-17
-16
-15
-14
-13
-12
Next