unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Randall Munroe’s XKCD ‘D Combinatorics’
via the c...
2024-11-27 02:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
comic
bloggers
network
3015
DEF CON 32 – The Rise and Fall of Binary Exploitation
Authors/Presenters: Stephen S...
2024-11-27 00:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
authored
publishing
Supply Chain Ransomware Attack Hits Starbucks, UK Grocers
Starbucks was among other corporations affected by a ransomware attack last week on managed serv...
2024-11-26 23:37:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
software
yonder
starbucks
chains
Secure Workload Access in Minutes with Aembit’s New QuickStart Guide
2024-11-26 23:23:2 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
aembit
quickstart
workloads
security
helm
QNAP’s Buggy Security Fix Causes Chaos
NAS maker does a CrowdStrike—cleanup on /dev/dsk/c1t2d3s4 pleaseStorage queens QNAP squashed so...
2024-11-26 22:54:57 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
qnap
firmware
qts
20241114
2950
How Proactive Security Could Have Stopped the Summit Pathology Data Breach
Healthcare data breaches are on the rise, growing in both frequency and severity, and their impact...
2024-11-26 22:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
summit
patient
healthcare
pathology
security
November Product Update
The CyberSaint team has b...
2024-11-26 19:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cybersaint
thrilled
cyberstrong
security
additions
A CISO’s Guide to Bot Protection Effectiveness – Breaking Open the Black Box
Executive SummaryBot protection has become a critical yet often opaque security control for mod...
2024-11-26 16:0:42 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
operational
monitoring
threats
RF Fortune Telling: Frequency Hopping Predictability
In the world of wireless communications, security vulnerabilities in implemented protocols canre...
2024-11-26 10:18:3 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
hopping
security
prng
attacker
11 Tips to Streamline Your Data Center Operations with DCIM Software
Managing a data center is a complex task, requiring seamless coordination of resources, equipment,...
2024-11-26 09:9:44 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
dcim
software
asset
cooling
maintenance
Understanding the NYDFS Cybersecurity Regulation
Whether you’re a small financial service provider or a major institution, if you’re doing busine...
2024-11-26 05:57:44 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
nydfs
security
regulation
york
CMMC Compliance Requirements: A Complete Guide
Department of Defense (DoD) data is some of the most sensitive out there. That’s why the DoD des...
2024-11-26 05:56:55 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cmmc
dod
security
threats
What Is CI/CD Security? Risks and Best Practices
Continuous integration and continuous delivery (CI/CD) pipelines are invaluable in software deve...
2024-11-26 05:23:24 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
stage
pipelines
legit
Life in the Swimlane with Dylan Dartnell, Professional Services Engineer
Welcome to the “Life in the Swimlane” blog series. Here we will feature interviews with Swimlaners...
2024-11-26 05:9:23 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
swimlane
passionate
teaching
security
mountains
DEF CON 32 – From Getting JTAG On The iPhone 15 To Hacking Apple’s USB-C Controller
Monday, November 25, 2024...
2024-11-26 04:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
presenters
You Have Less Than Two Months to Become DORA Compliant
If you represent a financial services company that is based in the European Union or does busine...
2024-11-26 03:14:29 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
dora
azul
compliant
ict
security
5 Traditional Approaches to Generating Test Data
“As a rule, software systems...
2024-11-26 03:5:36 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
mock
dummy
software
subsetting
development
Machine Learning in Cyber Security: Harnessing the Power of Five AI Tribes
Machine learning algorithms form a critical defense mechanism against cyber threats, enhancing t...
2024-11-26 02:2:8 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
machine
tribes
reasoning
analogizers
Randall Munroe’s XKCD ‘Arizona Chess’
via the c...
2024-11-26 02:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
comic
wit
permalink
3014
The Quest to Minimize False Positives Reaches Another Significant Milestone
It was just a few months ago that we announced GitGuardian's bespoke machine learning model, FP...
2024-11-26 01:9:54 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
positives
remover
gitguardian
precision
security
Previous
-20
-19
-18
-17
-16
-15
-14
-13
Next