unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Black Basta Ransomware Attack: Microsoft Quick Assist Flaw
Recent reports claim that the Microsoft Threat Intelligence team stated that a cybercriminal group,...
2024-5-28 15:0:44 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
microsoft
assist
basta
threats
D3 Is Security Automation that Makes Your Team Better
Who do you want running your security operations: robots or cyborgs?For our less nerdy readers, ro...
2024-5-28 07:49:18 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
d3
playbooks
playbook
Current State of Transport Layer Security (TLS) Post-Quantum Cryptography
In May 2024, a comprehensive Transport Layer Security (TLS) scan conducted by TrustFour across the...
2024-5-28 05:1:33 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
kyber768
x25519
exchange
draft
security
City of Helsinki Data Breach: What You Need to Know
On May 2, 2024, the City of Helsinki announced the data breach targeting its Education Division. Ho...
2024-5-28 00:17:52 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
helsinki
security
network
personnel
tuxcare
Alert: Google Chrome Zero-Day Patch Fixes Critical Flaw
In recent cybersecurity news, Google has swiftly addressed a critical security concern...
2024-5-28 00:8:45 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
chrome
security
4947
tuxcare
Ascension Cyber Attack Leaves Healthcare Sector Reeling
Major Catholic health system, Ascension, experienced a cyber attack on May 9th which unlocked cons...
2024-5-27 23:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ascension
healthcare
basta
patient
ransomware
Scytale Launches Vendor Risk Management, Ensuring a Seamless and Integrated Process for Managing Vendors
Scytale’s Vendor Risk Management ensures your vendors adhere to top data security practices to main...
2024-5-27 22:25:25 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
scytale
ensuring
regulations
seamless
processes
Continuous Threat Exposure Management (CTEM) – The Ultimate Guide for CISOs
A security breach. Headlines scream, investors panic, and fingers get pointed. But what if you cou...
2024-5-27 21:3:22 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ctem
security
exposure
threats
Rising Like A Phoenix, ShowMeCon 2024 Resurrects A Security Community In The Midwest
St. Charles, MO, is known as the launching point for a famous exploratory mission from U.S. histor...
2024-5-27 21:0:4 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
showmecon
alex
valerie
stories
Uncontrolled AI: Navigating Ethical Dilemmas and Shadow AI Risks
Generative AI has captured the world’s imagination, evident in its remarkable adoption rate and pop...
2024-5-27 18:54:18 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
generative
governance
adoption
NetworkMiner 2.9 Released
NetworkMiner 2.9 brings several new and improved features to help analysts make sense of network t...
2024-5-27 17:50:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
tzsp
ja4
vnc
stealc
Understanding and Mitigating Privilege Escalation Vulnerabilities in the Linux Kernel
Privilege escalation is a critical security issue in Linux systems, potentially leading to full sy...
2024-5-27 17:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackers
privileges
software
AI Governance
What is the Centraleyes AI Governance Framework?The AI Governance assessment, created by the Analy...
2024-5-27 16:15:10 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
governance
security
centraleyes
tailored
The Importance of Patching Vulnerabilities in Cybersecurity
One of the most critical yet often overlooked aspects of cybersecurity is the timely patching of vu...
2024-5-27 16:0:40 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
unpatched
security
timely
Lunch & Learn With Dr. Freund During The Gartner Risk Summit | Kovrr
Kovrr is thrilled to announce an exclusive Lunch & Learn session, “Practical Cyber...
2024-5-27 15:0:28 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
freund
crq
kovrr
United States Memorial Day 2024
Photograph Courtesy of the United States Marine Corps, Photographer: Caitlin Brink,...
2024-5-27 15:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
photograph
authored
handelman
Microsoft’s Copilot+ Recall Feature, Slack’s AI Training Controversy
Episode 331 of the Shared Security Podcast discusses privacy and security concerns related to two m...
2024-5-27 12:0:11 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
recall
youtube
microsoft
4 Reasons Why SaaS Security Must Change | Grip
Innovation has always been a catalyst for transformation, driving significant changes across indust...
2024-5-26 23:6:2 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
sso
gaps
shadow
pace
USENIX Security ’23 – ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
Authors/Presenters:Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hoss...
2024-5-26 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
ahmad
marco
Navigating the AI Revolution: The Global Battle for Tech Supremacy
Artificial intelligence is yielding unprecedented benefits, battles, opportunities and...
2024-5-26 17:32:43 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
artificial
lohrmann
humans
beijing
Previous
109
110
111
112
113
114
115
116
Next