unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
What is Mobile Application Penetration Testing: Benefits & Tools
Mobile applications are ubiquitous, but their security can be a concern. Unlike web applications, i...
2024-6-11 07:11:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
analysis
identify
attackers
Cloud Penetration Testing: Tools, Methodology & Prerequisites
Businesses increasingly migrate to cloud-based solutions for storage, applications, and critical fu...
2024-6-11 06:39:15 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
weaknesses
attackers
The Tolly Group Report Highlights SlashNext’s Gen AI-Powered Email Security Prowess
In the ever-evolving landscape of cyberthreats, email remains a prime target for malicious actors,...
2024-6-11 05:44:37 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
slashnext
security
threats
phishing
bec
Growing Cyber Threats Amid Israel-Palestine Tensions
Growing Cyber Threats Focus on Ransomware, Infostealers, and DefacementsThis blog cont...
2024-6-11 05:5:5 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
israel
defacements
defaced
handala
Ghostwriter v4.2
Ghostwriter v4.2: Project Documents & Reporting EnhancementsAfter April’s massive Ghostwriter v4....
2024-6-11 04:1:29 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
ghostwriter
jinja2
templating
specterops
The Critical Role of Autonomous Penetration Testing in Strengthening Defense in Depth
A Modern Approach to Comprehensive CybersecurityDefense in Depth (DID) is crucial in cybersecurity...
2024-6-11 03:21:15 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
nodezero
jon
threats
USENIX Security ’23 – ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption
Authors/Presenters:Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim...
2024-6-11 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
lee
kim
Is CVSS Alone Failing Us? Insights From Our Webinar With Verizon
In a recent webinar with Verizon, we discussed how organizations measure and prioritize...
2024-6-11 02:55:51 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
verizon
webinar
balbix
scoring
failing
Update: CVE-2024-4577 quickly weaponized to distribute “TellYouThePass” Ransomware
IntroductionRecently, Imperva Threat Research reported on attacker activity leveraging the new PHP...
2024-6-11 02:5:51 | 阅读: 91 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
imperva
4577
reveals
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #292 – We’re Doing DevOps
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-6-11 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
4577
ransomware
CVE-2024-29849: Veeam discloses Critical Vulnerability that allows attackers to bypass user authentication on its Backup Enterprise Manager web interface
On May 21, 2024, Veeam revealed a severe flaw across its Veeam Backup Enterprise Manage...
2024-6-11 00:52:29 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
veeam
backup
29849
attacker
News Alert: Criminal IP unveils innovative fraud detection data products on Snowflake Marketplace
Torrance, Calif., June 10, 2024, CyberNewsWire — AI SPERA, a leader in Cyber Threat I...
2024-6-10 23:58:26 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
criminal
snowflake
security
spera
cti
Breach Debrief Series: Snowflake MFA Meltdown Creates Data Leak Blizzard
On May 27, a threat actor group called ShinyHunters announced that it was selling 560 million recor...
2024-6-10 23:42:12 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
snowflake
security
sso
adaptive
shield
Fortinet to Expand AI, Cloud Security with Lacework Acquisition
Fortinet, known for network security capabilities within its Fortinet Security Fabric cybersecurity...
2024-6-10 23:16:34 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
lacework
threats
unified
Seceon’s Q2 2024 Partner Training: Insights and Highlights
Seceon’s Quater Training event, held from May 20th to 22nd, was a dynamic convergence of industry l...
2024-6-10 22:6:57 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
seceon
security
certified
innovation
Criminal IP Unveils Innovative Fraud Detection Data Products on Snowflake Marketplace
Torrance, United States / California, June 10th, 2024, CyberNewsWireAI SPERA, a leader in Cyber T...
2024-6-10 22:0:25 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
criminal
snowflake
spera
cti
marketplace
Tips to prevent data breaches
Could the Ticketmaster Data Breach Been Prevented?In a recent regulatory filing to the US Securi...
2024-6-10 21:19:41 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
nation
governance
identify
How to Create a Cyber Risk Assessment Report
In today’s fast-paced digital landscape, conducting a cyber risk assessment is cruc...
2024-6-10 18:30:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
cybersaint
network
posture
evaluates
Identity Data Automation: The What and Why
Identity Governance and Administration (IGA) has a long and often tortured history. Eme...
2024-6-10 17:1:52 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
iga
processes
redesign
utm
fulfilment
Utah Consumer Privacy Act (UCPA)
What is the Utah Consumer Privacy Act?The Utah Consumer Privacy Act, or UCPA, is a state-level dat...
2024-6-10 15:49:28 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
ucpa
utah
consumers
security
centraleyes
Previous
98
99
100
101
102
103
104
105
Next