unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
PreVeil Email: Enhancing Traditional Email with Secure and Private Communication
PreVeil Email offers a secure and private enhancement to conventional email solutions s...
2024-6-12 01:20:39 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
preveil
security
inbox
o365
dual
The TIDE: Threat-Informed Defense Education (Qilin, RansomHub, BlackSuit)
This is our second installment of The TIDE, which is your guide to all things Threat-...
2024-6-12 01:7:1 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
qilin
ransomware
tidal
blacksuit
defensive
Lateral Movement with the .NET Profiler
Lateral Movement with the .NET ProfilerThe accompanying code for this blogpost can be found HERE....
2024-6-12 00:35:52 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
profiler
payload
lateral
loaded
profiling
7 Deadly Sins of API Security Testing
Okay, so today, I want to discuss the seven deadly sins of API security testing. I covered this top...
2024-6-12 00:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
developers
asvs
analysis
Microsoft, Google Come to the Aid of Rural Hospitals
Microsoft and Google will provide free or low-cost cybersecurity tools and services to rural hospit...
2024-6-11 23:56:13 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
hospitals
rural
security
microsoft
What is the Difference Between Non-Human Identity Management, Machine Identity Management, and Workload Identity and Access Management?
Each of these technologies uses a different method to address the security issues surrounding non-h...
2024-6-11 23:52:6 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
workload
identities
security
machine
workloads
Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked
“UNC5537” breached at least 165 Snowflake instances, including Ticketmaster, LendingTree and, alleg...
2024-6-11 23:15:47 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
snowflake
lendingtree
unc5537
mandiant
richi
File Integrity Monitoring vs. File Activity Monitoring: Which is Best?
2024 has already been a tumultuous year for information security.Verizon’s 2024 Da...
2024-6-11 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
network
monitoring
cimcor
security
criminal
USENIX Security ’23 – HECO: Fully Homomorphic Encryption Compiler
Authors/Presenters:Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi Many...
2024-6-11 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
handelman
patrick
‘cors-parser’ npm package hides cross-platform backdoor in PNG files
‘cors-parser’ is neither a cure for Cross-Origin Resource Sharing (CORS) vulnerabil...
2024-6-11 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
cure
sharma
employs
authored
Verizon DBIR 2024: The rise in software supply chain attacks explained
The Verizon Data Breach Investigations Report (DBIR) is considered to be one of the leading annual...
2024-6-11 22:33:27 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
verizon
dbir
rl
Securing the Unseen: Protecting Sensitive Information in Highly Regulated Industries
Businesses live and die by their data. It drives decision-making, enhances customer experiences, an...
2024-6-11 21:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
ddr
industries
threats
regulated
security
The Policy Blocklist: what is it, and why should you be on it?
It’s not always “bad” to be listed on one of Spamhaus’ DNS Blocklists. Despite what you...
2024-6-11 21:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
spamhaus
blocklist
pbl
dnsbl
authored
Risks of poor PKI management
Public Key Infrastructure (PKI) is essential for businesses to maintain data security and protect d...
2024-6-11 19:38:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
revocation
operational
processes
Recent glibc Vulnerabilities and How to Protect Your Linux System
The GNU C Library, commonly known as glibc, is a critical component in many Linux distributions. It...
2024-6-11 17:0:3 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
nscd
tuxcare
security
library
Software Supply Chain Risks ⎪Cassie Crossley (VP Supply Chain Security, Schneider Electric)
Understanding and mitigating software supply chain risks and vulnerabilities has never been more c...
2024-6-11 16:32:14 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
governance
cassie
development
RSAC Fireside Chat: Ontinue ups the ‘MXDR’ ante — by emphasizing wider automation, collaboration
By Byron V. AcohidoCompanies that need to protect assets spread across hybrid cloud i...
2024-6-11 15:55:53 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ontinue
mxdr
security
haydon
Case Study: How Sungage Financial improved their application security within 1 week
Sungage Financial is dedicated to financing a sustainable future for homeowners across the United...
2024-6-11 15:42:15 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
sungage
evan
software
APT28 HeadLace Malware Targeting European Networks Unveiled
In recent months, a series of cyber onslaughts have shaken networks across Europe, with the insidio...
2024-6-11 15:0:23 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
apt28
headlace
european
security
A Comprehensive Guide to API Penetration Testing
What is API Penetration Testing?API penetration testing, or API pentesting, is a specialised form...
2024-6-11 07:21:6 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
injection
Previous
97
98
99
100
101
102
103
104
Next