unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
North Korea IT Worker Scam Brings Malware and Funds Nukes
Pictured: Several successful American IT professionals.The U.S. Justice Department says N. Korean h...
2024-5-18 02:41:37 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
north
remote
arrested
didenko
chapman
Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta
On May 10, 2024, the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Inv...
2024-5-18 01:54:37 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
security
basta
powershell
attackiq
An Analysis of AI usage in Federal Agencies
From this we can see that all the agencies that we have inferred information about have a reasonabl...
2024-5-18 01:54:21 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
machine
cloud
initiatives
approaches
security
Enabling Continuous Zero Trust in Multi-Cloud Environments with Netography Fusion
Enabling Continuous Zero Trust in Multi-Cloud Environments with Netography Fusionby Patrick Bedwel...
2024-5-18 01:39:18 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
network
fusion
netography
security
The Dell API Breach: It could have been prevented
As you may have seen in the news, a hacker stole 49 million customer records from Dell....
2024-5-18 01:26:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
dell
salt
attacker
security
supplier
Randall Munroe’s XKCD ‘Elementary Physics Paths’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-5-18 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
analysis
boulevard
How To Deploy HYAS Protect
HYAS Protect protective DNS includes a user-friendly interface and four core deployment method...
2024-5-17 23:23:20 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
hyas
protective
network
security
malicious
USENIX Security ’23 – EnigMap: External-Memory Oblivious Map for Secure Enclaves
Authors/Presenters: Afonso Tinoco, Sixiang Gao, Elaine Shi Many thanks to USENIX for...
2024-5-17 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
anaheim
publishing
New Survey Finds a Paradox of Confidence in Software Supply Chain Security
Get results of and analysis on ESG’s new survey on supply chain security. New research reveals tha...
2024-5-17 22:7:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
development
percent
sprawl
RSA Conference 2024: AI and the Future Of Security
The first week of May saw security practitioners from all over the globe come to the city by the b...
2024-5-17 21:0:51 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
llms
gitguardian
cloud
openai
Lookback Analysis in ERP Audit
Today, data is the key driver of success, and even small decisions can have a significant impact. T...
2024-5-17 20:52:6 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
analysis
lookback
governance
identify
historical
FBI Seizes BreachForums Website
The FBI has seized the BreachForums website, used by ransomware criminals to leak stole...
2024-5-17 19:9:17 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
raidforums
schneier
breached
ic3
Ransomware Attacks Evolve as Average Ransom Demand Tops $1.26 Million
Ransomware claims surged by 64% year-over-year, particularly among mid-market and emerging business...
2024-5-17 19:0:44 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
tyra
vpns
bay
victim
How to achieve ITGC automation
Company type: Public Fortune 500Industry: Food Retail Primary ERP systems: Oracle...
2024-5-17 15:52:1 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
monitoring
processes
itgc
regulatory
erp
How to Get a VAPT Certificate?
In today’s digital age, cybersecurity is more important than ever. Businesses that maintain the dat...
2024-5-17 13:32:47 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
vapt
security
identify
How to Adapt to Executive Order 14028
In May 2021, the White House released the Executive Order on Improving the Nation’s Cybersecurity,...
2024-5-17 05:57:21 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
software
14028
security
eo
How to do Penetration Testing effectively
Do you want to enhance your organisation’s cybersecurity by identifying and addressing vulnerabilit...
2024-5-17 05:39:3 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
ethical
Hackers Use Fake DocuSign Templates to Scam Organizations
A surge in phishing attacks that use emails appearing to be from DocuSign is being fueled by a Russ...
2024-5-17 05:30:48 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
docusign
phishing
kelley
abnormal
marketplace
What is Web Application Penetration Testing? [+ Checklist]
Secure code ensures the Internet runs smoothly, safely, and securely. This includes examples from o...
2024-5-17 04:24:15 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cyphere
identify
ensuring
USENIX Security ’23 – Reusable Enclaves For Confidential Serverless Computing
Authors/Presenters:Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, TYinqian Zhang...
2024-5-17 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
marriott
Previous
117
118
119
120
121
122
123
124
Next