unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’
Interpol and law enforcement agencies from 19 African countries arrested more than a 1,000 and s...
2024-11-28 03:28:48 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
arrested
africa
interpol
serengeti
Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform
Exabeam has allied with Wiz to gain access to security data collected from a cloud-native applic...
2024-11-27 21:16:40 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
exabeam
wilson
wiz
Protecting Web-Based Work: Connecting People, Web Browsers and Security
The web browser has transformed significantly in recent years, becoming one of the most used too...
2024-11-27 16:3:19 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
phishing
malicious
AWS re:Invent 2024: Optimize Your Kubernetes with Fairwinds and NetApp
AWS re:Invent 2024 is next we...
2024-11-27 05:28:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
kubernetes
fairwinds
netapp
spot
ocean
Key takeaways from the latest DoD Enterprise DevSecOps Fundamentals update
As the cybersecurity land...
2024-11-27 05:15:53 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
dod
network
security
sonatype
DEF CON 32 – Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panel
Tuesday, November 26, 2024...
2024-11-27 04:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
network
boulevard
Randall Munroe’s XKCD ‘D Combinatorics’
via the c...
2024-11-27 02:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
comic
bloggers
network
3015
Why you should stay “professionally detached” from the vulns you find
Security research is a unique blend of art and science. Uncovering vulnerabilities in web applic...
2024-11-27 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
detached
detachment
DEF CON 32 – The Rise and Fall of Binary Exploitation
Authors/Presenters: Stephen S...
2024-11-27 00:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
authored
publishing
Supply Chain Ransomware Attack Hits Starbucks, UK Grocers
Starbucks was among other corporations affected by a ransomware attack last week on managed serv...
2024-11-26 23:37:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
software
yonder
starbucks
chains
The Elephant in AppSec Talks Highlight: Shifting Left Doesn’t Mean Anything Anymore
"A bunch of marketing teams for various vendors, got a hold of this [idea of shift left] and the...
2024-11-26 23:24:43 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
tanya
developers
shifting
appsec
Secure Workload Access in Minutes with Aembit’s New QuickStart Guide
5) Verifying and Troubleshooting:Follow simple steps to ensure your configuration is correct.Use...
2024-11-26 23:23:2 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
aembit
quickstart
workloads
security
helm
QNAP’s Buggy Security Fix Causes Chaos
NAS maker does a CrowdStrike—cleanup on /dev/dsk/c1t2d3s4 pleaseStorage queens QNAP squashed so...
2024-11-26 22:54:57 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
qnap
firmware
qts
20241114
2950
How Proactive Security Could Have Stopped the Summit Pathology Data Breach
Healthcare data breaches are on the rise, growing in both frequency and severity, and their impact...
2024-11-26 22:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
summit
patient
healthcare
pathology
security
November Product Update
The CyberSaint team has b...
2024-11-26 19:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cybersaint
thrilled
cyberstrong
security
additions
A CISO’s Guide to Bot Protection Effectiveness – Breaking Open the Black Box
Executive SummaryBot protection has become a critical yet often opaque security control for mod...
2024-11-26 16:0:42 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
operational
monitoring
threats
RF Fortune Telling: Frequency Hopping Predictability
In the world of wireless communications, security vulnerabilities in implemented protocols canre...
2024-11-26 10:18:3 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
hopping
security
prng
attacker
11 Tips to Streamline Your Data Center Operations with DCIM Software
Managing a data center is a complex task, requiring seamless coordination of resources, equipment,...
2024-11-26 09:9:44 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
dcim
software
asset
cooling
maintenance
Understanding the NYDFS Cybersecurity Regulation
Whether you’re a small financial service provider or a major institution, if you’re doing busine...
2024-11-26 05:57:44 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
nydfs
security
regulation
york
CMMC Compliance Requirements: A Complete Guide
Department of Defense (DoD) data is some of the most sensitive out there. That’s why the DoD des...
2024-11-26 05:56:55 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cmmc
dod
security
threats
Previous
-57
-56
-55
-54
-53
-52
-51
-50
Next