unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Randall Munroe’s XKCD ‘Call My Cell’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-3-6 02:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
ransomware
boulevard
How a Fortune 500 data company leveraged SafeBreach to transition to 100% cloud
When a large data company decided to migrate their systems fully to the cloud, their cybersecurity...
2024-3-6 01:7:29 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
safebreach
security
knew
posture
Cloudflare Unveils a Firewall Designed to Keep LLMs Safe
Cloudflare wants to help organizations wall off their large-language models (LLMs) from cyberthreat...
2024-3-6 00:59:48 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
llms
identify
sdd
molteni
threats
Chat GPT and Nation-State Attackers: A New Era of AI-generated Attacks
Joe Ariganello VP of Product Marketing Joe is the VP of Product Marketing at MixMode....
2024-3-6 00:40:22 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
mixmode
attackers
phishing
chatgpt
security
Android and Windows RATs Distributed Via Online Meeting Lures
IntroductionBeginning in December 2023, Zscaler’s ThreatLabz discovered a threat actor creating fra...
2024-3-6 00:30:1 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
windows
skype
zscaler
security
dcrat
Mend.io Launches Mend AI
Securing AI is a top cybersecurity priority and concern for governments and businesses...
2024-3-6 00:26:39 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
mend
security
identify
software
codebase
How Could Platformization Work in Cybersecurity?
The idea of a cybersecurity platform seems unreasonable because…well, it is unreasonable. That's t...
2024-3-5 23:41:17 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
incentives
spectrum
How DataDome’s Anti-DDoS Mode Protected a Leading US News Website
DDoS Attack OverviewThe graph below (Figure 1) represents the bot traffic detected over time by ou...
2024-3-5 23:31:45 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
attacker
mozilla
agents
windows
chrome
CMMC Compliance Basics: 4 Steps to Success
The Cybersecurity Maturity Model Certification (CMMC) provides a structured approac...
2024-3-5 23:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cmmc
cimcor
bloggers
authored
Betting on a New Approach with Active ASPM
Streamlining Application Security at 888 Holdings with OX SecurityIn betting and gamin...
2024-3-5 22:38:35 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
ox
888
holdings
appsec
Cryptographic design review of Ockam
By Marc Ilunga, Jim Miller, Fredrik Dahlgren, and Joop van de PolIn October 2023, Ockam hired Trai...
2024-3-5 22:0:38 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ockam
security
identities
guarantees
modeling
5 Security Benefits of Configuration as Code (CaC)
Configuration-as-code (CaC) is a DevOps practice where infrastructure setup and management are auto...
2024-3-5 22:0:18 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
reducing
identify
consistency
Evolving Threats from Within: Insights from the 2024 Data Exposure Report
In today’s hyper-connected world, insider-driven data loss remains a significant threat across ind...
2024-3-5 22:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
dlp
insider
leaders
NIST updates supply chain guidance: 3 ways to pump up your CI/CD security
The final version of guidelines to help organizations secure their software supply chain has been r...
2024-3-5 21:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
development
attestation
hughes
Tax Season Phishing Surge: Cyber Exploits with AsyncRAT
Rise of AsyncRAT: Navigating Tax-Themed Cyber Threats and WinRAR Vulnerabilities In t...
2024-3-5 20:56:51 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
tax
asyncrat
security
phishing
winrar
Pure360 SPF and DKIM configuration: Step By Step Guideline
This instructional article will demonstrate the Pure360 configuration process of Sender...
2024-3-5 20:53:51 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
spf
dkim
pure360
easydmarc
spf1
Oracle RightNow SPF and DKIM configuration: Step By Step Guideline
This instructional article will demonstrate the Oracle RightNow configuration process o...
2024-3-5 20:47:35 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
spf
dkim
rightnow
easydmarc
spf1
Sensitive data exposure: How to prevent it and where do we stand in 2024
Do you fully grasp the magnitude of sensitive data exposure? It stands as one of the most prevalen...
2024-3-5 17:23:56 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
exposure
security
phishing
A Step-by-Step Guide to Creating an AWS IAM Policy Document
Keeping your cloud resources safe from prying eyes and bad actors is a continuous and relentless ch...
2024-3-5 16:43:20 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
apono
security
cloud
buckets
reviewing
Overview of AI Regulations and Regulatory Proposals of 2023
“AI is too important not to regulate—and too important not to regulate well,” asserts Google, captu...
2024-3-5 13:59:55 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
regulatory
regulations
development
regulation
Previous
183
184
185
186
187
188
189
190
Next