unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
2022 software security predictions that should be on your radar
Our 2022 software security predictions are in. The experts weigh in on the trends and how they’ll...
2021-12-17 01:00:00 | 阅读: 17 |
收藏
|
www.synopsys.com
software
security
appsec
ransomware
Detecting Log4j (Log4Shell): Mitigating the impact on your organization
The discovery of Log4j has DevOps teams working tirelessly to mitigate the issue. Here are six act...
2021-12-16 02:00:00 | 阅读: 28 |
收藏
|
www.synopsys.com
security
software
log4j
duck
network
How to cyber security: Software supply chain risk management
Posted by on Tuesday, December 14, 2021...
2021-12-15 01:00:00 | 阅读: 14 |
收藏
|
www.synopsys.com
software
security
developers
likewise
CyRC Vulnerability Analysis: Remote code execution zero-day exploit in Java logging library (log4j)
Posted by on Friday, December 10, 2021...
2021-12-11 06:41:42 | 阅读: 55 |
收藏
|
www.synopsys.com
log4j
security
log4j2
duck
jndi
Safety Detectives interview with Tim Mackey
Tim Mackey talks about his journey working in cybersecurity, today’s cyberthreat landscape, and ho...
2021-12-09 00:51:29 | 阅读: 17 |
收藏
|
www.synopsys.com
software
security
electrical
supplier
CyRC Vulnerability Advisory: Multiple vulnerabilities discovered in GOautodial
Posted by on Tuesday, December 7, 2021...
2021-12-07 23:00:00 | 阅读: 29 |
收藏
|
www.synopsys.com
goautodial
php
attacker
43175
Six Python security best practices for developers
Python is a valuable programming language, but using it without proper security best practices put...
2021-11-30 03:00:00 | 阅读: 22 |
收藏
|
www.synopsys.com
python
security
development
injection
software
Effective software security activities for managing supply chain risks
Posted by on Monday, November 22, 2021...
2021-11-22 23:18:06 | 阅读: 19 |
收藏
|
www.synopsys.com
software
security
cloud
malicious
bsimm12
Don’t let Trojan Source sneak into your code
Posted by on Wednesday, November 17, 2021...
2021-11-18 00:00:00 | 阅读: 28 |
收藏
|
www.synopsys.com
trojan
codebase
severe
codebases
bidi
What vulnerabilities and security issues plague web and mobile apps?
Posted by on Tuesday, November 16, 2021...
2021-11-16 23:00:00 | 阅读: 19 |
收藏
|
www.synopsys.com
security
software
percent
attackers
A stitch in BIND saves nine
A vulnerability was discovered in the named DNS server implementation contained in the development...
2021-11-11 23:29:11 | 阅读: 32 |
收藏
|
www.synopsys.com
software
development
security
fuzzer
Software risks in private equity buyouts
2021-11-05 02:00:00 | 阅读: 16 |
收藏
|
www.synopsys.com
software
phil
diligence
security
duck
Top seven logging and monitoring best practices
Posted by on Monday, November 1, 2021...
2021-11-02 00:01:00 | 阅读: 32 |
收藏
|
www.synopsys.com
monitoring
security
monitored
pii
enforce
AppSec Decoded: Why Biden’s executive order should be on your radar
Posted by on Thursday, October 28, 2021...
2021-10-29 01:41:51 | 阅读: 40 |
收藏
|
www.synopsys.com
security
eo
biden
appsec
decoded
How to cybersecurity: Heartbleed deep dive
Over seven years later, the Heartbleed vulnerability still offers important lessons in application...
2021-10-26 02:02:13 | 阅读: 33 |
收藏
|
www.synopsys.com
heartbleed
security
heartbeat
payload
software
Top 10 Spring Security best practices for Java developers
Spring Security enables developers to build secure Spring applications. Get started with our top 1...
2021-10-18 23:33:47 | 阅读: 36 |
收藏
|
www.synopsys.com
security
malicious
database
aspects
The state of mergers and acquisitions wheeling and dealing
Posted by on Friday, October 15, 2021...
2021-10-16 00:00:00 | 阅读: 34 |
收藏
|
www.synopsys.com
buyers
strategic
sellers
diligence
advisors
CyRC Vulnerability Advisory: SQL injection, path traversal leading to arbitrary file deletion and XSS in Nagios XI
Posted by on Wednesday, October 13, 2021...
2021-10-13 22:00:00 | 阅读: 33 |
收藏
|
www.synopsys.com
nagios
xi
nagvis
security
Building a software Bill of Materials with Black Duck
Posted by on Tuesday, October 12, 2021...
2021-10-13 00:00:00 | 阅读: 34 |
收藏
|
www.synopsys.com
duck
software
spdx
comply
development
BSIMM: Top five software security activities that create a better software security initiative
Looking to build trust in your software? Start with BSIMM12’s top five software security activitie...
2021-10-07 22:11:46 | 阅读: 35 |
收藏
|
www.synopsys.com
security
software
bsimm12
pii
bsimm
Previous
11
12
13
14
15
16
17
18
Next