unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Demo Video: Why UEFI Malware Is the Next Frontier of Endpoint Security
Two of the most common misunderstandings that we encounter when discussing how Eclypsium can help p...
2023-12-14 02:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
blacklotus
eclypsium
windows
uncovered
At a Glance: The Year in Cybersecurity 2023
As 2023 closes, it’s worth reviewing what, exactly, just happened within the cybersecurity landscap...
2023-12-14 01:54:2 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
ransomware
threats
Taking a Proactive Approach to Mitigating Ransomware Part 2: Avoiding Vulnerabilities in SAP Applications
Hot TopicsDaniel Stori's 'Docker Panacea' Taking a Proactive Approach to Mitigating Ransomwa...
2023-12-14 01:25:35 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
onapsis
ransomware
proactive
Russia Hacks Ukraine, Ukraine Hacks Russia — Day#658
Russia takes down Kyivstar cellular system, Ukraine destroys Russian tax system.Ukraine’s biggest m...
2023-12-14 01:25:4 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
ukraine
russia
tax
kyivstar
gur
Cyber Risk Quantification Framework: A Beginner’s Guide
In an era dominated by interconnected systems and the ever-expanding digital landsc...
2023-12-14 00:30:2 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
cybersaint
tide
bloggers
Artificial Intelligence and Cybersecurity: An easy approach
In our fast-paced digital world, staying safe online is a top priority. Let’s explore the dynamic...
2023-12-14 00:26:31 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
superhero
spotting
artificial
DEF CON 31 – Dr. Bramwell Brizendine’s And Shiva Shashank Kusuma’s ‘Advanced ROP Framework Pushing ROP To Its Limits’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-14 00:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
maintaining
Stopping Lateral Movement Means Identifying the Small Hops That Take Attackers Far
Today’s attackers rarely conduct lateral movement manually. For attackers, lateral movement is an e...
2023-12-13 23:0:21 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
network
attackers
lateral
attacker
security
FCC Warns Carriers to Protect Customers Against SIM Swaps
A month after issuing new rules to push back against SIM-swap and similar schemes, the Federal Comm...
2023-12-13 22:40:47 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
swapping
fcc
victim
lapsus
carriers
Clang Sanitizers: Keeping Your Code Clean and Secure
Hot TopicsClang Sanitizers: Keeping Your Code Clean and Secure How Google is Using Clang San...
2023-12-13 22:26:2 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
sanitizers
memory
security
How Google is Using Clang Sanitizers to Make Android More Secure
Google is committed to making Android the most secure mobile operating system on the ma...
2023-12-13 22:5:54 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
sanitizers
baseband
security
identify
Inside the Challenges of XDR Implementation and How to Overcome Them
Cybersecurity teams are under growing pressure to do more with less: The skills gap, now at an esti...
2023-12-13 22:0:1 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
expertise
positives
Are HTTP Content-Security-Policy (CSP) Headers Sufficient to Secure Your Client Side?
Modern web frameworks have shifted business logic from the server side to the client side (web brow...
2023-12-13 21:49:22 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
client
imperva
malicious
limitations
Attack Surface Management: What is it? Why do you need it?
Traditional asset inventory and vulnerability management software can’t keep up to date with the gr...
2023-12-13 21:36:9 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
network
strobes
Cofense Adds Vishing Simulation to its Popular PhishMe® Email Security Awareness Training
LEESBURG, Va. – December 13, 2023 – Cofense, the leading provider of email security awareness trai...
2023-12-13 21:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cofense
vishing
security
threats
phishing
A Critical Remote Code Execution(RCE) Vulnerability in Apache Struts2 Flaw Puts Your Web Apps at Risk
The web development world is constantly on guard against security threats, and a recent discovery i...
2023-12-13 18:36:24 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
malicious
attacker
security
50164
remote
Top CISOs to Follow in 2024: Germany Edition
Chief Information Security Officers (CISOs) play an integral role in protecting companies from cyb...
2023-12-13 17:26:38 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cisos
ciso
experienced
threats
Python 2 EOL: Coping with Legacy System Challenges
Python 2 was officially maintained and supported until January 1, 2020.The system becomes high...
2023-12-13 16:0:28 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
python
eol
tuxcare
security
migration
How CSRD and EED are Reshaping Data Center Sustainability Reporting
With greater scrutiny of environmental impacts and a burgeoning consciousness about the social res...
2023-12-13 06:44:16 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
csrd
efficiency
iec
30314
Snyk Launches ASPM Platform to Secure Software Supply Chains
Snyk today added an application security posture management (ASPM) platform to its port...
2023-12-13 05:12:44 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
developers
snyk
security
Previous
259
260
261
262
263
264
265
266
Next