unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Russian Hackers Access Source Code in Ongoing Attack on Microsoft
The Russian state-sponsored bad actors who hacked into the corporate email accounts of executives a...
2024-3-9 04:20:24 | 阅读: 31 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
blizzard
midnight
security
friday
USENIX Security ’23 – Work-From-Home And COVID-19: Trajectories Of Endpoint Security Management In A Security Operations Center
Authors/Presenters: Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru...
2024-3-9 04:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
alexandru
hahn
Exploit Targets Critical Vulnerability in JetBrains’ TeamCity, Company Advises Immediate Update
A critical vulnerability, identified as CVE-2024-27198, has been discovered in JetBrain...
2024-3-9 02:46:34 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
teamcity
jetbrains
security
nuspire
immediate
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #281 – The Needed Changes
via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lau...
2024-3-9 02:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
agile
comic
mikkel
luxshan
handelman
Response to ScreenConnect’s Recent Zero-day Vulnerability Exploitation
On February 19, 2024, ConnectWise published a security advisory detailing the discovery of two sign...
2024-3-9 01:37:9 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackiq
rundll32
ransomware
Change Healthcare Gets Pharmacy Systems Up After Ransomware Attack
There is some relief coming for beleaguered pharmacies, hospitals, and patient now that UnitedHealt...
2024-3-9 01:15:26 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
hospitals
blackcat
healthcare
funding
Understanding the White House Report on Secure and Measurable Software
Get details on the new White House ONCD report, how to address it, and how Legit can help.The Whit...
2024-3-9 00:58:13 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
memory
development
legit
TikTok Ban Incoming — but ByteDance Fights Back
ByteDance mobilizing addicted user base, as U.S. TikTok ban steamrolls through Capitol...
2024-3-9 00:10:44 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
richi
ban
committee
security
bytedance
Meet the Female Engineers Behind Kasada’s Mobile Bot Defense
In honor of International Women’s Day, we’re highlighting some kick-ass women at Kasada who are at...
2024-3-9 00:8:39 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
liz
mira
kasada
software
USENIX Security ’23 – Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem
*Distinguished Paper Award Winner*Authors/Presenters:*Omer Akgul, Taha Eghtesad, Amit...
2024-3-9 00:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
daniel
grossklags
Out of the kernel, into the tokens
By Max Ammann and Emilio LópezOur application security team leaves no stone unturned; our audits d...
2024-3-8 22:0:48 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
kaslr
jose
bypass
syslog
security
Are You Ready to Protect Your Company From Insider Threats? Probably Not
These are tense times in many workplaces.In the tech sector, 1,000 tech companies laid off more tha...
2024-3-8 22:0:34 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
insider
threats
insiders
security
13 Women to Know in Cybersecurity
Conservative estimates have the current cybersecurity workforce as about 25% female, but that numbe...
2024-3-8 21:51:45 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
katie
software
eva
A Taxonomy of Prompt Injection Attacks
Researchers ran a global prompt hacking competition, and have documented the results in...
2024-3-8 20:6:58 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
llms
injection
security
schneier
competition
Secure ERP Cloud Migration Infrastructure Access Governance
In today’s constantly changing environment, remote work has become widespread, causing businesses t...
2024-3-8 18:45:36 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
governance
database
privileged
Why Edtech Industries Need Cybersecurity?
As educational technology (edtech) industries gets better, it changes the way how students learn. B...
2024-3-8 16:42:23 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
edtech
security
industries
educational
Making Waves: Empowering Women in Cybersecurity
Making Waves: Empowering Women in CybersecuritymadhavFri, 03/08/2024 – 05:01As Inte...
2024-3-8 13:1:14 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
diversity
career
makers
thales
What Happened in Cybersecurity in 2023: A Summary of Security Incidents, Vulnerability Information, and Cybersecurity Trends
The year 2023 witnessed a dynamic and complex cybersecurity landscape, with various se...
2024-3-8 11:26:29 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
became
Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens
Government bodies are clamping down heavily on institutions and organizations that handle sensitive...
2024-3-8 09:46:55 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
wallarm
trls
expiry
News alert: Badge expands availability of ‘Enroll Once and Authenticate on Any Device’ software
San Francisco, Calif., Mar. 7, 2024 — Badge Inc., the award-winning privacy company e...
2024-3-8 09:17:4 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
badge
radiant
security
preserving
Previous
179
180
181
182
183
184
185
186
Next