unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Best of 2024: If You are Reachable, You Are Breachable, and Firewalls & VPNs are the Front Door
This year has witnessed a string of critical vulnerabilities in VPNs and firewalls, spanning man...
2025-1-3 19:34:36 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
network
vpns
firewalls
cloud
security
Randall Munroe’s XKCD ‘Time Capsule Instructions’
2025-1-3 18:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
webinars
security
boulevard
dozendevops
Looking into 2025: Reflections & Observations from the Tidal Cyber Founders
We want to wish you a Happy...
2025-1-3 18:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
tidal
informed
defenses
cti
What is wrong with the current state of DAST? Feedback from my conversations with AppSec engineers
When I launched this study, my goal was to determine whether most, if not all, AppSec engineers...
2025-1-3 17:21:24 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
dast
security
appsec
maturity
tuning
DEF CON 32 – You Got A Lighter I Need To Do Some Electroporation
Authors/Presenters: J. Utley,...
2025-1-3 16:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
handelman
hill
originating
Clarification on Shor’s Algorithm and GNFS Comparison
Some of our astute readers noticed an apparent anomaly in the graph comparing the complexities...
2025-1-3 15:38:34 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
gnfs
strength
b1
2048
shor
Addressing PKI Management Pitfalls: From Chaos to Clarity
Effective Public Key Infrastructure (PKI) management needs to combine ways of handling PKI infra...
2025-1-3 15:3:2 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
clm
appviewx
lifecycle
ownership
Best of 2024: So-Phish-ticated Attacks
August 27, 2024Authors: Rui Ataide, Hermes BojaxhiThe GuidePoint Research and Intelligence T...
2025-1-3 14:30:13 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
guidepoint
resemble
What Is Threat Detection and Response (TDR)? A Guide
Cyberthreats are evolving fast, and staying ahead requires more than basic defenses. Threat dete...
2025-1-3 14:23:20 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
tdr
threats
identify
legit
10 Best Security Code Review Tools to Improve Code Quality
Poor code quality can jeopardize your application’s performance and scalability. But more import...
2025-1-3 14:21:59 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
analysis
development
What Is SAST? How It Works and the Best Tools
Securing applications from vulnerabilities starts with analyzing your source code before it beco...
2025-1-3 14:20:8 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
development
analysis
integrate
What Is Encryption Key Management? Importance and Best Practices
Encryption is a powerful tool for safeguarding sensitive data, but its effectiveness hinges on p...
2025-1-3 14:16:51 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
encryption
security
protects
legit
cloud
What Is Software Composition Analysis (SCA)? Tools and Benefits
Modern software development uses open-source components to save time and resources. But with tha...
2025-1-3 14:14:23 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
licensing
analysis
Adopt a Personal Safety Plan Outside of Work
Digital security and personal...
2025-1-3 12:45:33 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
enhance
software
blackcloak
Consent Phishing: The New, Smarter Way to Phish
What is consent phishing?Most people are familiar with the two most common types of phishing —...
2025-1-3 11:32:59 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
malicious
idp
security
squarex
The Critical Risk of Using Dummy Email Domains in Payment Gateways
During our recent security as...
2025-1-3 06:41:30 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
dummy
assessments
juspay
development
Justify Your Security Investment with Smart NHIDR Practices
Are Your Security Practices Up to the Challenge?As organizations continue to invest more heavil...
2025-1-2 22:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
nhidr
nhis
investment
Achieve Peace of Mind with Secure Secrets Vaulting
What Does Secrets Vaulting Hold for your Business?In a world where data is the new gold, organi...
2025-1-2 22:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
vaulting
nhis
security
identities
PCI DSS 4.0.1: A Comprehensive Guide to Successfully Meeting Requirements 6.4.3 and 11.6.1
PCI DSS 4 Compliance requires a clear understanding of the latest requirements, particularly Re...
2025-1-2 21:16:23 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
dss
requirement
monitoring
security
ensuring
Best of 2024: National Public Data (NPD) Breach: Essential Guide to Protecting Your Identity
Following the publication of our in-depth analysis on the National Public Data (NPD) breach last...
2025-1-2 20:59:59 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ssn
ssns
security
npd
constella
Previous
15
16
17
18
19
20
21
22
Next