unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Potential Cybersecurity Threats to the 2024 U.S. Election: Voter Database Leaks
As the 2024 U.S. presidential election takes place, cybersecurity analysts are on high alert, wa...
2024-11-6 01:2:21 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
voter
election
voters
political
narratives
The Future of Identity Protection: Real-Time Threats and Scams
In today’s digital landscape, protecting your identity from real-time threats is more critical t...
2024-11-6 00:44:58 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
threats
constella
fullz
doxing
monitoring
Google Uses Its Big Sleep AI Agent to Find SQLite Security Flaw
Google researchers in June introduced Project Naptime, an initiative to explore how large langua...
2024-11-6 00:33:49 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
defenders
attackers
DEF CON 32 – MaLDAPtive: Obfuscation and De-Obfuscation
Authors/Presenters: Daniel Bo...
2024-11-6 00:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
convention
handelman
nocookie
Why PKIaaS is a Smarter and Secure Alternative to On-Premises PKI
Private PKI (Public Key Infrastructure) is critical for trusted authentication and secure commun...
2024-11-5 23:59:1 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
pkiaas
security
cloud
premises
avx
Sanitize Client-Side: Why Server-Side HTML Sanitization is Doomed to Fail
The battle against Cross-Site Scripting (XSS) has been going on for years, with developers and s...
2024-11-5 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sanitizer
php
client
sanitizers
SEC action raises the bar on software transparency
The U.S. Securities and Exchange Commission (SEC) recently announced fines amounting to nearly $...
2024-11-5 22:8:50 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
firms
filings
Strengthen Cyber Resilience: A Checklist for ITOps and SecOps Collaboration
In the past year, half of organizations (54%) have experienced a cybersecurity incident, and in...
2024-11-5 20:22:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
network
secops
itops
resilience
security
Pacific Rim: Chronicling a 5-year Hacking Escapade
Contributors to this post: Mickey Shkatov, Alex BazhaniukSo What Happened?Last week, Sophos re...
2024-11-5 20:14:22 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
attackers
sophos
firmware
pacific
rim
AIs Discovering Vulnerabilities
I’ve been writing about the p...
2024-11-5 20:8:9 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
ais
software
security
schneier
Recovering From a Breach: 4 Steps Every Organization Should Take
Many of the conversations around cybersecurity revolve around prevention. From how to stave off...
2024-11-5 19:51:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
sso
rebuilding
downstream
identify
How PTaaS Supports Shift-Left Security Practices?
Security and development teams often face a tough challenge: delivering a secure, quality produc...
2024-11-5 19:19:34 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ptaas
development
developers
Three ‘Must Solve” Challenges Hindering Cloud-Native Detection and Response
According to Gartner, the market for cloud computing services is expected to reach $675 billion...
2024-11-5 17:46:7 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
nhis
identities
nhi
Leveraging Tabletop exercises to Enhance OT security maturity
Has your organization tested...
2024-11-5 16:37:57 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
tabletop
gaps
threats
stage
SWIFT
What is the SWIFT CSP?The SW...
2024-11-5 16:12:1 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
centraleyes
cscf
attestation
How Cybersecurity Training Must Adapt to a New Era of Threats
The first-ever National Cybersecurity Awareness Month took place two decades ago — a time when m...
2024-11-5 16:5:16 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
leaders
phishing
cisos
Hackers Exploit DocuSign APIs for Phishing Campaign
Cybercriminals are exploiting DocuSign’s APIs to send highly authentic-looking fake invoices, wh...
2024-11-5 15:18:13 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
docusign
novikov
modeling
malicious
attackers
The Role of Secrets Management in Securing Financial Services
The Role of Secrets Managemen...
2024-11-5 12:30:44 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
thales
cpl
thalesgroup
safeguard
What is a Cyber Range?
Today, we’re diving into the fascinating world of cyber ranges—a critical component in the ever-...
2024-11-5 11:16:47 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
drills
network
talent
FIDO: Consumers are Adopting Passkeys for Authentication
There appears to be growing momentum behind the use of passkeys as an alternative identity verif...
2024-11-5 06:24:1 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
passkeys
fido
Previous
17
18
19
20
21
22
23
24
Next