unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Understanding the Impact of the new Apache Struts File Upload Vulnerability
IntroductionRecently researcher Steven Seeley discovered a way to abuse the popular Apache Struts...
2023-12-13 05:8:33 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
struts
50164
attacker
Patch Tuesday Update – December 2023
Hot TopicsPython 2 EOL: Coping with Legacy System Challenges How CSRD and EED are Reshaping...
2023-12-13 04:43:46 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
windows
microsoft
elevation
remote
spoofing
Mastering SDLC Security: Best Practices, DevSecOps, and Threat Modeling
In the ever-evolving landscape of software development, it’s become absolutely paramount to ensure...
2023-12-13 04:27:14 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
sdlc
development
DEF CON 31 – David Pekoske’s, Sean Lyngaas’, Jen Easterly’s ‘All Information Looks Like Noise Until You Break The Code’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-13 04:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
redundant
CISA Unveils Tools to Strengthen Google Cloud Services
As organizations continue their migration to the cloud, threat groups are not far behind. According...
2023-12-13 03:35:1 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
baselines
security
duffy
scuba
Threat Actors Exploiting Adobe ColdFusion Vulnerability: A Critical Situation for Federal Agencies
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a cybersecu...
2023-12-13 03:21:25 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
coldfusion
nuspire
security
26360
Apple Bops Beeper, but iMessage Android Whac-A-Mole Ensues
Beeper’s reverse engineered iMessage integration, once killed by Tim’s crew, rises phœnix like.Appl...
2023-12-13 02:27:50 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
imessage
beeper
security
client
bringing
News alert: Detectify’s EASM research reveals top overlooked vulnerabilities from 2023
Stockhom, Sweden & Boston, Mass., Dec. 12, 2023 – Detectify, the External Attack Surf...
2023-12-13 02:0:14 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
detectify
security
easm
industries
Unlocking Enhanced Security: The Role of Advanced Network Segmentation Strategies
What is Network Segmentation?Network segmentation is the practice of dividing a computer network i...
2023-12-13 02:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
network
security
dividing
segments
Randall Munroe’s XKCD ‘Snow’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-13 02:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
Finding “dark data” in an API
What if I told you that dark data is lying in wait in some of your API responses?You know the data...
2023-12-13 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
developers
burp
dana
epp
Firmware and Supply Chain Requirements in the Latest CMS Acceptable Risk Safeguards (ARS)
The Centers for Medicare & Medicaid Services (CMS) is a critical part of the U.S. Department of Hea...
2023-12-13 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
firmware
eclypsium
security
ars
software
The hidden HR cost of mismanaged secrets
For large-scale organizations, managing digital secrets is more than just an IT task; it’s a fundam...
2023-12-13 00:41:11 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
entro
ensuring
lifecycle
Lazarus Group Exploits Log4j Flaw in New Malware Campaign
The notorious North Korea-backed Lazarus Group continues to change up its tactics to evade detectio...
2023-12-13 00:20:54 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
andariel
log4j
north
talos
ninerat
Why Biden’s EO on AI Conflates the Role of Red-Teaming
The recent release of president Joe Biden’s executive order on artificial intelligence (AI) marks a...
2023-12-12 23:0:14 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
broad
bias
provisions
datasets
Reco Employs Graph and AI Technologies to Secure SaaS Apps
Reco today launched a platform that makes use of machine learning algorithms and graph technology t...
2023-12-12 22:3:7 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
reco
security
klein
budget
Why Automation and Consolidation are Key to Restoring Confidence in Cybersecurity
The economic climate is putting cybersecurity teams under increasing pressure. Our research shows t...
2023-12-12 22:0:23 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
leaders
Stepping into 2024 with a look at emerging cybersecurity risks
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-12 22:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
redundant
Top CISOs in the USA to Follow in 2024
The threat of cybercrime looms over organizations of all shapes and sizes, but specific leaders in...
2023-12-12 20:56:18 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
cisos
ciso
chief
Anatomy of a Ransomware Attack: INC Ransom Breaches Yamaha
Yamaha Motor Philippines Inc. (YMPI), a wholly owned subsidiary of Yamaha Motor Co., Ltd., a global...
2023-12-12 20:30:14 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
yamaha
ransomware
sectrio
fig
philippines
Previous
260
261
262
263
264
265
266
267
Next