unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Understanding Cybersecurity Vulnerabilities
What is a cybersecurity vulnerability, how do they happen, and what can organizations do to avoid f...
2024-4-27 01:13:24 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
threats
Bridging the Gap: Uniting Development and AppSec
We recently hosted a webinar on integrating development and security functions to increase organiza...
2024-4-27 00:5:39 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
development
processes
developers
ox
Open-Source Software Security
Tiexin GuoSenior DevOps Consultant, Amazon Web Services Author | 4th CoffeeOn Mar...
2024-4-26 23:0:14 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
trivy
osv
USENIX Security ’23 – Union Under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain
Authors/Presenters: Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi XingMany...
2024-4-26 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
jia
nocookie
How to secure GraphQL APIs: challenges and best practices
GraphQL APIs, while offering robust features and flexibility, present unique security challenges c...
2024-4-26 21:51:53 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
limiting
attackers
armor
Agile by Design: Cybersecurity at the Heart of Transformation
Unlock the dynamic interplay between cybersecurity and agility in today’s business lan...
2024-4-26 21:20:27 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
agility
innovation
security
Announcing two new LMS libraries
By Will SongThe Trail of Bits cryptography team is pleased to announce the open-sourcing of our pu...
2024-4-26 21:0:32 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
lms
schemes
security
stateful
Cybersecurity Insights with Contrast CISO David Lindner | 4/26/24
Insight #1AI is clearly becoming a problem, with headlines capturing incidents suc...
2024-4-26 21:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
deepfake
ciso
lindner
nevada
Segregation of Duties Remediation in Oracle ERP Cloud
Controlling Risk: An Approach to Automating the Management ofSegregation of Duties and Corrective...
2024-4-26 20:55:28 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
segregation
duties
conflicts
corrective
analysis
Fix SPF Permerror: Overcome SPF Too Many DNS Lookups Limit
Reading Time: 8 minAn SPF Permerror indicates that a permanent error was encountered while proce...
2024-4-26 20:14:33 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
spf
permerror
evaluation
incorrect
limits
Announcing the General Availability of TitaniumScale v5.0: Enhancing File Analysis for Advanced Threat Detection
ReversingLabs TitaniumScale delivers high-volume, high-speed file analysis that seamlessly integrat...
2024-4-26 20:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
analysis
c1000
security
PCI DSS (Payment Card Industry Data Security Standard)
The Payment Card Industry Data Security Standard (PCI DSS) is a critical ally, providing a robust...
2024-4-26 19:58:49 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
dss
cardholder
requirement
ensuring
The ultimate cyber spring-cleaning checklist
A cluttered digital space can lead to stress, decreased productivity, and even make...
2024-4-26 19:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cleaning
decreased
security
checklist
cluttered
SPF Softfail Vs Hardfail: What’s the Difference?
Reading Time: 5 minSPF or Sender Policy Framework is an email authentication Protocol that helps...
2024-4-26 16:16:21 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
spf
hardfail
softfail
dmarc
The Art of Linux Auditing: From Risk Assessment to Compliance
Linux auditing is a thorough analysis of your Linux IT infrastructure, uncovering potential gaps i...
2024-4-26 16:0:12 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
audits
regulations
tuxcare
What is Network Pen Testing?
With cyber threats constantly evolving, protecting your network’s security is important. Net...
2024-4-26 11:47:37 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
network
security
threats
emerging
RSAC 2024 Innovation Sandbox | The Future Frontline: Harmonic Security’s Data Protection in the AI Era
The RSA Conference 2024 will kick off on May 6. Known as the “Oscars of Cybersecurity,” the RSAC I...
2024-4-26 09:57:5 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
harmonic
efficiency
innovation
generative
How to Migrate from FedRAMP Rev 4 to FedRAMP Rev 5
The stereotype of the government as a slow-moving behemoth is not ill-fitting, but when it makes ad...
2024-4-26 08:22:4 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
fedramp
csps
ato
security
transition
NodeZero: Testing for Exploitability of Palo Alto Networks CVE-2024-3400
On April 12 (and then updated again on April 20), Palo Alto Networks released an advisory about a v...
2024-4-26 05:39:47 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
nodezero
palo
alto
pan
horizon3
Understanding the Change Healthcare Breach and Its Impact on Security Compliance
Healthcare ransomware incidents are far too common, but none have wreaked as much havoc as the rec...
2024-4-26 05:24:21 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
security
claims
hitrust
Previous
133
134
135
136
137
138
139
140
Next