unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Mobile Phishing Attacks Explode, Enterprise Devices Targeted
Mobile phishing attacks are on the rise, with 82% of phishing sites now targeting mobile devices, m...
2024-9-25 17:31:14 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
phishing
threats
crucial
mdm
Symmetry Systems Shines as Finalist in Cloud Security Alliance Startup Pitchapalooza
Missed the Cloud Security Alliance Startup Pitchapalooza? Watch the Recording Now!Earlier this yea...
2024-9-25 06:22:7 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
claude
symmetry
Congressional Staffers’ Data Leaked on Dark Web: Report
Personal data from almost 3,200 Capitol Hill staffers, including passwords and IP addresses, report...
2024-9-25 05:11:55 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
election
proton
security
staffers
trump
CrowdStrike Gets Grilled By U.S. Lawmakers Over Faulty Software Update
In what has become an annual ritual between Silicon Valley and the Beltway, a House sub...
2024-9-25 04:16:37 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
crowdstrike
swartz
meyers
jon
USENIX NSDI ’24 – A Large-Scale Deployment of DCTCP
Authors/Presenters:Abhishek Dhamija, Balasubramanian Madhavan, Hechao Li, Jie Meng, Shr...
2024-9-25 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
presenters
prashanth
network
Diddy Do It? Or Did Cybercriminals? How Hackers Are Turning Scandals Into Cyber Attacks
Attackers often capitalize on public interest in high-profile scandals to spread malwa...
2024-9-25 02:37:33 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
diddy
attackers
malicious
pysilon
How to Improve Security Posture with Automation
Securing your organization’s network and data has never been more crucial. As cyber threats grow mo...
2024-9-25 02:27:35 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
threats
ensuring
guidelines
Automating Certificate Lifecycle Management in Windows OS with AppViewX AVX ONE CLM
It is a common experience that automating certificate lifecycle management (CLM) in a Windows OS en...
2024-9-25 02:3:5 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
windows
appviewx
clm
avx
automating
Dockerize Mongo to Get Consistent Data Across Your Development Environments
We have all lamented, with great chagrin, the proverbial “works on my machine” problem...
2024-9-25 01:11:45 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
mongo
seeder
github
database
gist
Your Data is Safe — Math Guarantees It!
2024-9-25 01:11:45 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
tonic
reveal
patients
CRQ Loss Exceedance Curves for Risk Management | Kovrr
TL;DROn-demand cyber risk quantification (CRQ) platforms leverage probabilistic statistical mode...
2024-9-25 01:11:10 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
exceedance
crq
curves
lec
kovrr
Randall Munroe’s XKCD ‘Maslow’s Pyramid’
via the comic humor & dry wit of Randall Munroe, creator of XKCDPermalink*** Th...
2024-9-25 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
humor
network
comic
randall
SBOM-a-Rama Fall 2024: Sonatype’s top 5 takeaways
Tuesday, September 24, 2024 Community Chats Webinars LibraryHomeCybersecurity News...
2024-9-25 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
governance
crq
pushes
Microsoft Pushes Governance, Sheds Unused Apps in Security Push
Microsoft executives said the IT giant has taken numerous steps as it bulks up the security of its...
2024-9-25 00:32:14 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
security
cloud
sfi
senior
Join KubeCrash Fall 2024 for Platform Engineering the Cloud Native Way
I’m excited to be back at KubeCrash this fall! Mark your calendars to join us on Wednesday, October...
2024-9-25 00:25:33 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
kubecrash
cloud
cncf
fairwinds
intuit
SaaS Data Breaches on the Rise
SaaS is an integral part of the IT infrastructure for companies of all sizes nowadays. This model l...
2024-9-25 00:11:24 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
nuspire
cloud
dormant
GUEST ESSAY: Massive NPD breach tells us its high time to replace SSNs as an authenticator
By Ambuj KumarEver since the massive National Public Data (NPD) breach was disclosed a few weeks...
2024-9-24 23:46:44 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
npd
security
ssn
bureaus
pii
Anatomy of an Attack | ADR vs WAF and EDR Technology | Contrast Security
In today’s rapidly evolving cyber threat landscape, organizations face increasingly...
2024-9-24 21:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
contrast
adr
threats
influencers
Modernize your chaos engineering with commercial software transparency
While surprise is a major advantage in battle, it’s a nightmare for application security (AppSec) t...
2024-9-24 20:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
software
sscs
security
birenshtok
experiments
Israel’s Pager Attacks and Supply Chain Vulnerabilities
Israel’s brazen attacks on Hezbollah last week, in which hundreds of pagers and two-way radios expl...
2024-9-24 19:5:34 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
israel
hezbollah
security
chains
eavesdrop
Previous
-67
-66
-65
-64
-63
-62
-61
-60
Next