unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
CISA: Hackers Use ColdFusion Flaw to Breach Federal Agency
A security flaw in Adobe’s ColdFusion application development tool that was patched in March contin...
2023-12-7 04:23:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
coldfusion
malicious
passwords
software
security
Adobe ColdFusion Vulnerability: SafeBreach Coverage for US-CERT Alert (AA23-339A)
Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach On December 5th, the Cybersecur...
2023-12-7 04:20:2 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
coldfusion
network
forkdump
security
73c864
DEF CON 31 – Joe Slowik’s ‘Contextualizing The Vulkan Leaks & State Sponsored Offensive Ops’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-7 04:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
workloads
failures
designing
adapt
BlackCloak’s Approach to Executive Cyber Health: Understanding, Measuring, and Securing
The personal digital well-being of executives is increasingly under threat. BlackCloak...
2023-12-7 03:20:17 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
blackcloak
security
executives
leadership
Top insights from SiGMA Malta to uplevel your 2024 iGaming fraud prevention strategy
The Sift team recently had the pleasure of attending SiGMA Malta, which brought togethe...
2023-12-7 03:13:53 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
igaming
sift
malta
sigma
growth
Taking a Proactive Approach to Mitigating Ransomware Part 1: You Can’t Neglect the Application Layer
Hot TopicsDEF CON 31 - Joe Slowik’s ‘Contextualizing The Vulkan Leaks & State Sponsored Offen...
2023-12-7 02:42:28 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
security
proactive
monitoring
Randall Munroe’s XKCD ‘Space Typography’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-7 02:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
sudden
Use Windows 10? You Must PAY for Security
From October 2025, Microsoft will start charging for security updates to Windows 10.Windows 10 will...
2023-12-7 01:31:29 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
windows
microsoft
security
consumers
pcs
Defense-in-Depth: A Comprehensive Approach to Modern Cybersecurity
Joe Ariganello VP of Product Marketing Joe is the VP of Product Marketing at MixMode. He has led p...
2023-12-7 00:47:59 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
mixmode
posture
network
What goes great with SLSA? Sonatype.
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-7 00:43:26 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
sudden
Russian-Backed Hackers Target High-Value US, European Entities
Hackers linked to Russia’s military intelligence unit exploited previously patched Microsoft vulner...
2023-12-7 00:27:48 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
fancy
bear
proofpoint
microsoft
phishing
DEF CON 31 – Good Pseudonym’s ‘Calling It A 0 Day – Hacking At PBX UC Systems’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-7 00:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
workloads
failures
designing
redundant
Ostrich Cyber-Risk Announces Partnership with C-Risk to Strengthen Cybersecurity Resilience and Innovation
SALT LAKE CITY, — Ostrich Cyber-Risk (Ostrich), a pioneer and prestigious provider...
2023-12-6 23:30:25 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ostrich
partnership
crq
security
5 Security Benefits of Application Mapping
Modern businesses rely on myriad software applications to perform their daily operations. These app...
2023-12-6 23:0:24 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
identify
aid
downtime
involves
Survey Surfaces Wasted Efforts Collecting Cybersecurity Data
A survey of 500 full-time security decision-makers and practitioners published today found that sec...
2023-12-6 22:0:42 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
normalized
coates
Understanding Each Link of the Cyberattack Impact Chain
It’s often difficult to fully appreciate the impact of a successful cyberattack. Some consequences...
2023-12-6 22:0:41 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cyberattack
mgm
csat
How Votiro Protects Microsoft O365 from File-borne Threats
Microsoft Office 365 (O365) continues to be a key platform where businesses and individuals connect...
2023-12-6 22:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
votiro
o365
security
cloud
microsoft
Understanding VAPT: A Simple Guide to Vulnerability Assessment and Penetration Testing
What is VAPT?Vulnerability Assessment and Penetration Testing (VAPT) is a two-step security testin...
2023-12-6 21:36:37 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
vapt
identify
Publishing Trail of Bits’ CodeQL queries
By Paweł PłatekWe are publishing a set of custom CodeQL queries for Go and C. We have used them to...
2023-12-6 21:30:25 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cutset
tob
ecdsa
minversion
trim
Top Characteristics of a QR Code Phishing Email
By Max GannonQR codes in the phishing threat landscape are a major topic of interest and worth pa...
2023-12-6 21:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
qr
phishing
subjects
redirection
bing
Previous
266
267
268
269
270
271
272
273
Next