unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Navigating SAP Security Notes: June 2024 Patch Tuesday
SAP published 10 new and two updated Security Notes for June 2024 Patch Tuesday. Compared to May’s...
2024-6-12 04:30:26 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
pathlock
tuesday
exploited
Patch Tuesday Update – June 2024
Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.44.0 and FVM...
2024-6-12 04:18:21 | 阅读: 28 |
收藏
|
Security Boulevard - securityboulevard.com
windows
elevation
remote
microsoft
dynamics
Asset Discovery: A Must Have for Understanding Your Complete Attack Surface
Justin Stouder, FireMon’s Asset Manager GM, met with a large financial services company a few yea...
2024-6-12 04:4:42 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
stouder
asset
security
firemon
ciso
USENIX Security ’23 – A Verified Confidential Computing As A Service Framework For Privacy Preservation
Authors/Presenters:Hongbo Chen, Haobin Hiroki Chen, Mingshen Sun, Kang Li, Zhaofeng Che...
2024-6-12 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
hongbo
network
The Surprising Supporter Behind the Push to Modernize GSOCs: The C-Suite
Article The increased attention from the C-Suite signals that executives want better alignment b...
2024-6-12 02:20:20 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
gsoc
leaders
threats
ontic
Network Equipment, IoT Devices are Big Security Risks: Forescout
IT systems – and this year networking equipment in particular – continue to pose the most security...
2024-6-12 02:9:16 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
robots
network
iomt
security
PreVeil Email: Enhancing Traditional Email with Secure and Private Communication
PreVeil Email offers a secure and private enhancement to conventional email solutions s...
2024-6-12 01:20:39 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
preveil
security
inbox
o365
dual
The TIDE: Threat-Informed Defense Education (Qilin, RansomHub, BlackSuit)
This is our second installment of The TIDE, which is your guide to all things Threat-...
2024-6-12 01:7:1 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
qilin
ransomware
tidal
blacksuit
defensive
Lateral Movement with the .NET Profiler
Lateral Movement with the .NET ProfilerThe accompanying code for this blogpost can be found HERE....
2024-6-12 00:35:52 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
profiler
payload
lateral
loaded
profiling
7 Deadly Sins of API Security Testing
Okay, so today, I want to discuss the seven deadly sins of API security testing. I covered this top...
2024-6-12 00:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
developers
asvs
analysis
Microsoft, Google Come to the Aid of Rural Hospitals
Microsoft and Google will provide free or low-cost cybersecurity tools and services to rural hospit...
2024-6-11 23:56:13 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
hospitals
rural
security
microsoft
What is the Difference Between Non-Human Identity Management, Machine Identity Management, and Workload Identity and Access Management?
Each of these technologies uses a different method to address the security issues surrounding non-h...
2024-6-11 23:52:6 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
workload
identities
security
machine
workloads
Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked
“UNC5537” breached at least 165 Snowflake instances, including Ticketmaster, LendingTree and, alleg...
2024-6-11 23:15:47 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
snowflake
lendingtree
unc5537
mandiant
richi
File Integrity Monitoring vs. File Activity Monitoring: Which is Best?
2024 has already been a tumultuous year for information security.Verizon’s 2024 Da...
2024-6-11 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
network
monitoring
cimcor
security
criminal
USENIX Security ’23 – HECO: Fully Homomorphic Encryption Compiler
Authors/Presenters:Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi Many...
2024-6-11 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
handelman
patrick
‘cors-parser’ npm package hides cross-platform backdoor in PNG files
‘cors-parser’ is neither a cure for Cross-Origin Resource Sharing (CORS) vulnerabil...
2024-6-11 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
cure
sharma
employs
authored
Verizon DBIR 2024: The rise in software supply chain attacks explained
The Verizon Data Breach Investigations Report (DBIR) is considered to be one of the leading annual...
2024-6-11 22:33:27 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
verizon
dbir
rl
Securing the Unseen: Protecting Sensitive Information in Highly Regulated Industries
Businesses live and die by their data. It drives decision-making, enhances customer experiences, an...
2024-6-11 21:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
ddr
industries
threats
regulated
security
The Policy Blocklist: what is it, and why should you be on it?
It’s not always “bad” to be listed on one of Spamhaus’ DNS Blocklists. Despite what you...
2024-6-11 21:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
spamhaus
blocklist
pbl
dnsbl
authored
Risks of poor PKI management
Public Key Infrastructure (PKI) is essential for businesses to maintain data security and protect d...
2024-6-11 19:38:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
revocation
operational
processes
Previous
140
141
142
143
144
145
146
147
Next