unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Microsoft’s November 2024 Patch Tuesday Addresses 87 CVEs (CVE-2024-43451, CVE-2024-49039)
4Critical82Important1Mode...
2024-11-13 03:2:10 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
remote
client
windows
microsoft
cvssv3
Randall Munroe’s XKCD ‘Proterozoic Rocks’
Permalin...
2024-11-13 02:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
bloggers
network
syndicated
authored
3008
Scaling Global Protection: DataDome Expands to Over 30 Points of Presence (PoP) Worldwide
At DataDome, our mission is...
2024-11-13 01:2:4 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
datadome
pops
expanded
security
ensuring
Is the latest book on “Pentesting APIs” any good?
The folks over at Packt Publishing sent me a gift recently. It was a copy of one of their latest...
2024-11-13 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
felt
gathering
injection
epp
Infostealer Malware: An Introduction
Infostealer malware represents one of the most underrated threats to corporate and consumer inf...
2024-11-13 00:11:54 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
infostealer
stealer
victim
security
flare
Fake IP checker utilities on npm are crypto stealers
Recently identified npm p...
2024-11-13 00:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
stealers
sonatype
syndicated
developers
malicious
DEF CON 32 – Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows
Tuesday, November 12, 2024...
2024-11-13 00:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
network
presenters
Explore Tidal Cyber with our Demo Video Library
Are you interested in diggi...
2024-11-12 23:23:8 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
tidal
defensive
threats
defenses
security
ARMO selected by Orange Business to Secure its Managed Kubernetes Services
We’re honored to share a new...
2024-11-12 23:6:6 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
kubernetes
orange
armo
security
cloud
Creating an Effective User Access Review Program in 12 Simple Steps
User access reviews are periodic evaluations of access rights to ensure they align with users’...
2024-11-12 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
reviews
uar
hyperproof
security
Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT
November 12, 2024In an era where cyber threats to critical infrastructure are growing in both...
2024-11-12 22:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
iiot
threats
operational
Insurance Firm Introduces Liability Coverage for CISOs
A national insurance firm is offering liability insurance coverage for chief information securit...
2024-11-12 21:50:59 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cisos
insurance
liability
ciso
Gauging the Safety Level of Your Software with Spectra Assure
It’s been a little over a year since we first introduced security levels into Spectra Assure™ w...
2024-11-12 21:3:12 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
spectra
assure
violations
OWASP Top 10 for LLM and new tooling guidance targets GenAl security
New guidance for organizations seeking to protect the generative AI tools they’re running has be...
2024-11-12 21:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
llm
deepfake
bleeker
deepfakes
Transforming Security: How SAST Enhances Your Secure Code Review Process?
Secure coding has become a critical aspect of software development, and the need for effective sec...
2024-11-12 20:27:20 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
development
reviews
developers
5 Best Vendor Risk Management Solutions
Managing vendor risk can feel a lot like trying to keep up with a game where new problems keep...
2024-11-12 19:1:2 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
scytale
security
software
processes
vrm
GUEST ESSAY: The promise and pitfalls of using augmented reality– ‘AR’ — in cybersecurity
Augmented reality use cases have become prevalent in our society.The technology, which first em...
2024-11-12 15:11:53 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
augmented
phishing
enhance
Fraudsters Abuse DocuSign API for Legit-Looking Invoices
I didn’t see much visibili...
2024-11-12 14:18:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
docusign
developers
fraudsters
minded
Top Mobile Security Risks of 2024 by OWASP
As technology gains popularity, it often attracts more vulnerabilities and becomes a target for...
2024-11-12 13:47:25 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
encryption
developers
6 Things to Know About Improving Threat Intelligence Collection
Flare recently hosted our first Threat Intel Workshop with Senior Threat Intelligence Researche...
2024-11-12 04:27:15 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
flare
illicit
attacker
gathering
Previous
9
10
11
12
13
14
15
16
Next