unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Consolidation: The wave of the (AST) future
Reducing complexity and providing insight into software risk, consolidation is the wave of the app...
2023-7-12 04:49:20 | 阅读: 11 |
收藏
|
Software Integrity Blog - www.synopsys.com
security
software
development
appsec
AppSec integrations enable a more secure SDLC
AppSec integrations can help keep development secure at the speed your business requires.Whether...
2023-7-12 01:8:16 | 阅读: 16 |
收藏
|
Software Integrity Blog - www.synopsys.com
security
development
software
polaris
Challenges of interoperability in fuzz testing
Understanding how to overcome the challenges of interoperability in fuzz testing helps ensure effi...
2023-7-6 06:9:54 | 阅读: 24 |
收藏
|
Software Integrity Blog - www.synopsys.com
defensics
avrcp
sut
sequences
Defending against malicious packages in the npm ecosystem and beyond
Posted by on Friday, June 30, 2023...
2023-7-1 00:25:30 | 阅读: 17 |
收藏
|
Software Integrity Blog - www.synopsys.com
malicious
software
security
ecosystems
maintenance
Creating a well-rounded Microsoft 365 security program
Addressing the many security vulnerabilities in the Microsoft 365 productivity suite requires base...
2023-6-28 06:16:3 | 阅读: 12 |
收藏
|
Software Integrity Blog - www.synopsys.com
security
m365
microsoft
baselines
posture
Podcast: The current state of DevOps
Posted by on Monday, June 26, 2023...
2023-6-26 23:59:52 | 阅读: 9 |
收藏
|
Software Integrity Blog - www.synopsys.com
security
software
routh
cso
2023 OSSRA deep dive: High-risk vulnerabilities
The 2023 OSSRA report indicates that organizations are failing to patch high-risk vulnerabilities;...
2023-6-26 23:44:12 | 阅读: 12 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
ossra
security
attackers
FDA: SBOMs requirement for connected medical devices
Posted by on Friday, June 23, 2023...
2023-6-23 20:0:35 | 阅读: 6 |
收藏
|
Software Integrity Blog - www.synopsys.com
fda
cbom
sboms
software
Continuous scanning in your production environment is more important than ever
Posted by on Thursday, June 15, 2023...
2023-6-16 05:52:8 | 阅读: 9 |
收藏
|
Software Integrity Blog - www.synopsys.com
security
whitehat
incremental
Software quality: Gauging strengths and weaknesses
Posted by on Friday, June 9, 2023...
2023-6-9 20:0:57 | 阅读: 14 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
diligence
sellers
buyers
seller
AppSec Decoded: Ease of use with Polaris
Posted by on Thursday, June 8, 2023...
2023-6-9 03:8:19 | 阅读: 12 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
polaris
security
developers
development
Enhancing cloud security posture with an effective cloud governance framework
Posted by on Monday, June 5, 2023...
2023-6-6 01:52:12 | 阅读: 17 |
收藏
|
Software Integrity Blog - www.synopsys.com
cloud
security
governance
posture
insider
Fuzz Testing and Medical Devices
Posted by on Friday, June 2, 2023...
2023-6-3 05:7:51 | 阅读: 18 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
security
urgent11
CyRC Vulnerability Advisory: CVE-2023-32353, Apple iTunes local privilege escalation on Windows
Posted by on Thursday, June 1, 2023...
2023-6-1 20:0:11 | 阅读: 20 |
收藏
|
Software Integrity Blog - www.synopsys.com
itunes
windows
cyrc
microsoft
Synopsys named in 2023 Fortress Cyber Security Awards
Home Application Securi...
2023-6-1 07:41:56 | 阅读: 15 |
收藏
|
Software Integrity Blog - www.synopsys.com
security
award
fortress
winners
editorial
An Enterprise Guide: Periodic Cloud Security Risk Assessments
Posted by on Wednesday, May 31, 2023...
2023-5-31 22:26:54 | 阅读: 32 |
收藏
|
Software Integrity Blog - www.synopsys.com
cloud
security
assessments
experienced
threats
Connecting the dots: Development + business risk + due diligence
Posted by on Friday, May 26, 2023...
2023-5-26 20:0:16 | 阅读: 15 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
diligence
development
security
debt
AppSec Decoded: Easy to scale with Polaris
Posted by on Wednesday, May 24, 2023...
2023-5-25 02:40:14 | 阅读: 16 |
收藏
|
Software Integrity Blog - www.synopsys.com
polaris
software
security
ghosh
cloud
Eliminate malicious code in your software supply chain
Posted by on Wednesday, May 17, 2023...
2023-5-18 00:30:43 | 阅读: 17 |
收藏
|
Software Integrity Blog - www.synopsys.com
malicious
software
analysis
hiding
recognize
Detection strategies to unmask the source of malicious code
Posted by on Wednesday, May 17, 2023...
2023-5-17 22:35:58 | 阅读: 19 |
收藏
|
Software Integrity Blog - www.synopsys.com
malicious
insider
software
inserted
stage
Previous
2
3
4
5
6
7
8
9
Next