unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
API Security Day – powered by APIDays & Escape
Are you ready to dive deep i...
2024-11-15 19:22:6 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
cto
bpce
groupe
Zero-Day Exploits Surge in 2023, Cisco, Fortinet Vulnerabilities Targeted
In 2023, cybercriminals increasingly relied on zero-day vulnerabilities to infiltrate enterprise...
2024-11-15 17:31:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
attackers
security
guenther
ransomware
What is Digital Lending Application (DLA) Audit?
Digital lending has emerged as a game-changer, reshaping the borrowing experience with unprecede...
2024-11-15 14:56:31 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
lending
regulatory
lenders
dlas
borrowers
Palo Alto Networks Issues AI Red Alert
SANTA CLARA, Calif. — With great promise comes potential peril. And while artificial intelligenc...
2024-11-15 10:37:51 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
alto
palo
security
processes
DEF CON 32 – Redefining V2G: How To Use Your Vehicle As Game Controller
Authors/Presenters: Timm Laus...
2024-11-15 04:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
convention
handelman
How to Mask Sensitive Data in Files, from CSV to JSON
TLDR: Tonic’s file connector...
2024-11-15 03:54:51 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
tonic
connector
database
pipelines
cloud
Generating High Quality Test Data for MySQL Through De-identification and Synthesis
A Little Bit About MySQLMyS...
2024-11-15 03:54:51 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
tonic
pii
developers
mock
synthetic
Is SOAR Obsolete?
You may have heard that SOAR is dead. Vendors have become afraid of the term, repositioning thei...
2024-11-15 03:10:9 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
soar
security
d3
obsolete
How to Defend Non-Human Identities from Infostealers
Infostealers are getting bolder – and more ambitious.Long focused on stealing human credentials –...
2024-11-15 02:6:3 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
workloads
identities
cloud
attackers
Blinded by Silence
Blinded by Silence: How Attackers Disable EDROverviewEndpoint Detection and Response systems...
2024-11-15 02:2:47 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
windows
edrsilencer
wfp
microsoft
Randall Munroe’s XKCD ‘Geometriphylogenetics’
via the c...
2024-11-15 02:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
munroe
creator
permalink
authored
Busting Ransomware’s Billion-Dollar Boom with Network Observability and Security
Busting Ransomware’s Billion-Dollar Boom with Network Observability and Securityby Mal Fitzgera...
2024-11-15 01:56:22 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
network
ransomware
cloud
netography
security
Who’s Afraid of a Toxic Cloud Trilogy?
The Tenable Cloud Risk Repor...
2024-11-15 01:19:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
toxic
security
trilogy
Black Friday bots are coming—is your e-commerce site prepared?
Commerce of all kinds surge...
2024-11-15 00:59:16 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
monday
friday
datadome
season
bots
From risks to resilience: Best practices for software supply chain security
Friday, November 15, 2024...
2024-11-15 00:55:15 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
friday
NIST Clears Backlog of Known Security Flaws but Not All Vulnerabilities
The federal agency that for much of the year has struggled to keep up-to-date a detailed databas...
2024-11-15 00:41:27 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
backlog
nvd
budget
security
ISO/IEC 27001 Certification: Process and Costs
To safeguard your company’s data against hackers, scammers, and other web criminals, you need an...
2024-11-15 00:35:47 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
27001
iec
auditor
isms
DEF CON 32 – Redefining V2G: How To Use Your Vehicle As Game Controller
Authors/Presenters: Timm Laus...
2024-11-15 00:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
convention
lauser
Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy
Businesses are increasingly reliant on Customer Identity and Access Management (CIAM) solutions...
2024-11-14 23:23:15 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
ciam
scalability
ease
Major cyber attacks and data breaches of 2024
As 2024 draws to a close, the cybersecurity landscape continues to evolve, marked by both familiar...
2024-11-14 23:19:10 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackers
network
Previous
8
9
10
11
12
13
14
15
Next