unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Agentless is a DAM Better Option for Securing Cloud Data
When it comes to on-premises database activity monitoring (DAM), security teams have consistently r...
2024-8-21 00:17:50 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
dam
database
cloud
security
agents
From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents
In the fast-paced world of software development, efficiently managing security incidents is crucia...
2024-8-20 23:0:57 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
gitguardian
ignoring
closing
threats
INE Security Alert: The Steep Cost of Neglecting Cybersecurity Training
Cary, North Carolina, August 20th, 2024, CyberNewsWireIn modern business, cybersecurity is not me...
2024-8-20 23:0:43 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
ine
costs
USENIX Security ’23 – Pspray: Timing Side-Channel Based Linux Kernel Heap Exploitation Technique
Home » Security Bloggers Network » USENIX Security ’23 – Pspray: Timing Side-Channel Based Linux...
2024-8-20 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
bloggers
youtube
network
Navigating the Uncharted: A Framework for Attack Path Discovery
This is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the focu...
2024-8-20 22:46:44 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
quadrant
violation
trustworthy
tradecraft
Embracing Zero Trust: DoD’s New Cybersecurity Paradigm (Part 2)
The Department of Defense’s (DoD) approach to Zero Trust leverages automation and analytics usi...
2024-8-20 22:15:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
cimcor
dod
bloggers
leverages
A Comprehensive Outlook on OT Asset Inventory Management
Cybersecurity concerns in operational environments have also heightened the importance of asset inv...
2024-8-20 21:35:7 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
asset
security
operational
sectrio
regulatory
Leveraging OT Asset Inventory for Operational Excellence: The Benefits
To put it in simple words, it’s an all-inclusive catalog of all your hardware, software...
2024-8-20 21:16:44 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
asset
security
sectrio
informed
accurate
Unleashing the Power of API Security: Join Our API Bites Bootcamp Series
API Security: A 2024 Initiative for All OrganizationsIn the rapidly evolving digital landscape, AP...
2024-8-20 21:0:15 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
bootcamp
bites
cequence
threats
Survey Surfaces Widespread Mishandling of Sensitive Data
Perforce Software today published a survey of 250 IT professionals that finds the amount of sensiti...
2024-8-20 20:59:16 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
respondents
wells
masking
concerned
involving
Overturning of Chevron Deference’s Impact on Cybersecurity Regulation
Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here....
2024-8-20 18:30:59 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
regulation
neal
ilona
elliot
cohen
Security Alert: U.S. Political Donation Sites at Risk
Hot TopicsINE Security Alert: The Steep Cost of Neglecting Cybersecurity Training USENIX Sec...
2024-8-20 18:0:45 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
donation
datadome
stuffing
attackers
Multi-Domain vs Wildcard SSL Certificates: Differences & Uses
Digital certificates take many forms but they share the same primary goal: to authenticate a websit...
2024-8-20 17:46:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
wildcard
retailers
sectigo
processes
unlimited
That was then, this is now….Modernizing AppSec in Fast-Paced Development Environments
You are the weakest link. Hello. Ninety-one percent of organizations experienced at least one sof...
2024-8-20 17:8:55 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
appsec
software
development
Ubuntu Addresses Multiple OpenJDK 8 Vulnerabilities
Several vulnerabilities have recently been identified in OpenJDK 8, which could potentially lead to...
2024-8-20 17:0:57 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
openjdk
security
attacker
hotspot
NEWS ANALYSIS Q&A: The early going of Generative AI and LLMs impacting cybersecurity
By Byron V. AcohidoThe art of detecting subtle anomalies, predicting emergent vulnerabilities and...
2024-8-20 15:59:55 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
threats
security
loveland
genai
Exploring AI: Regulations and Threat Mitigation
Exploring AI: Regulations and Threat Mitigationjosh.pearson@t…Tue, 08/20/2024 – 07:05...
2024-8-20 15:5:26 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
blueprint
bill
security
cpl
thales
GoGra Backdoor: Unnamed South Asian Media Outlet Targeted
As per recent reports, an unnamed media organization in South Asia had fallen prey to t...
2024-8-20 15:0:8 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
gogra
harvester
threats
tuxcare
nation
How to Patch your Linux Kernel before it gets exploited?
Linux Kernel server patch management is essential for ensuring the security, stability, and perform...
2024-8-20 14:0:22 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
thin
software
kratikal
Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the tr...
2024-8-20 07:30:18 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
malicious
slashnext
invoice
analysis
Previous
19
20
21
22
23
24
25
26
Next