unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Anatomy of an Attack | ADR vs WAF and EDR Technology | Contrast Security
2024-9-24 21:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
contrast
adr
threats
influencers
Modernize your chaos engineering with commercial software transparency
While surprise is a major advantage in battle, it’s a nightmare for application security (AppSec) t...
2024-9-24 20:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
software
sscs
security
birenshtok
experiments
Israel’s Pager Attacks and Supply Chain Vulnerabilities
Israel’s brazen attacks on Hezbollah last week, in which hundreds of pagers and two-way radios expl...
2024-9-24 19:5:34 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
israel
hezbollah
security
chains
eavesdrop
Sophisticated Spear Phishing Attack Falls Flat Against ITDR
2024-9-24 18:37:22 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
college
phishing
shield
adaptive
Ubuntu 22.04.5 LTS Released with Linux Kernel 6.8
Canonical has officially released Ubuntu 22.04.5 LTS, the fifth and final planned point release of...
2024-9-24 17:0:41 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
kernelcare
software
flavors
tuxcare
TuxCare Expands Presence in South America through New Strategic Partnership
PALO ALTO, Calif. – September 24, 2024 – TuxCare, a global innovator in enterprise-grad...
2024-9-24 16:0:51 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
tuxcare
iss
security
kernelcare
partnership
HTTP Headers Phishing Campaigns Used For Credential Theft
With rapid advancements in technology, threat actor attack methodologies are now evolving at an unp...
2024-9-24 15:0:13 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
malicious
tuxcare
harvesting
How to Choose the Right VMDR Tool?
The increasing complexity of IT infrastructure is creating new hurdles for organizations trying to...
2024-9-24 13:51:23 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
autosect
security
vmdr
threats
ColorTokens Acquires PureID to Advance Zero-Trust IT
ColorTokens, a provider of an Xshield platform for applying microsegmentation to networks, has acqu...
2024-9-24 13:48:28 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
identities
pureid
software
muralidhar
Key Takeaways from the Thales Data Threat Report: EME Edition
2024-9-24 13:23:35 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
eme
respondents
thales
emerging
security
What Is Noise-Down Automation?
You may have noticed a strong theme recently on our website, social media, and content: noise. No m...
2024-9-24 06:16:11 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
noise
security
soar
playbooks
positives
Qmulos at the Forefront of OSCAL: Empowering Federal Agencies to Achieve OMB M-24-15 with Modern Compliance Technology
What is M-24-15 and What are the Challenges of ComplianceM-24-15 builds on the FedRAMP Authorizati...
2024-9-24 04:30:34 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
fedramp
cloud
oscal
processes
The CMMC Rule is Final!
Last week, the CMMC Final Rule (known as CFR 32) was released from OIRA, meaning no more changes ca...
2024-9-24 03:4:48 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cmmc
assessments
preveil
contractors
compliant
USENIX NSDI ’24 – Towards Intelligent Automobile Cockpit via A New Container Architecture
Authors/Presenters:Lin Jiang, Feiyu Zhang, Jiang MingOur sincere thanks to USENIX, an...
2024-9-24 03:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
jiang
usenix
presenters
bloggers
Podcast Episode 19: Interview with Bill McInnis from Nucleus Security
Unlock the secrets to revolutionizing your cybersecurity strategy with insights from...
2024-9-24 02:51:21 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
nucleus
bill
security
Randall Munroe’s XKCD ‘Tectonic Surfing’
Application Security Check Up ...
2024-9-24 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
2024 NIST Password Guidelines: Enhancing Security Practices
The NIST password guidelines have come a long way, adapting to the forever changing cybersecurity...
2024-9-23 23:59:39 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
guidelines
passwords
security
expiration
stronger
USENIX NSDI ’24 – Can’t Be Late: Optimizing Spot Instance Savings under Deadlines
Monday, September 23, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsF...
2024-9-23 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
network
nsdi
Exploring the foundations of lattice-based cryptography
Lattice-based cryptography is a quantum-resistant encryption method that uses complex mathematical...
2024-9-23 22:28:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
lattice
encryption
security
lattices
lwe
Freemium Model Optimization for B2B SaaS: A Strategic Growth Approach
In the hyper-competitive realm of B2B SaaS, traditional growth methods often fall short of deliver...
2024-9-23 22:24:53 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
freemium
b2b
conversion
growth
premium
Previous
-57
-56
-55
-54
-53
-52
-51
-50
Next