unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
800% Growth: LLM Attacker Summaries a Hit with Customers
We are excited to share the tremendous response to our Large Language Model (LLM) attac...
2024-9-12 05:57:35 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
llm
security
salt
attacker
Vulnerability handling requirements for NIS2 compliance
In a previous blog post, we covered two foundational elements of the Network and Information Se...
2024-9-12 05:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
nis2
network
sonatype
FFIEC Will Sunset the Cybersecurity Assessment Tool: Everything You Need to be Prepared
The Federal Financial Institutions Examination Council (FFIEC) has officially announced that its Cy...
2024-9-12 04:41:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ffiec
security
regulatory
USENIX Security ’23 – Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities
Wednesday, September 11, 2024 Community Chats Webinars LibraryHomeCybersecurity Ne...
2024-9-12 03:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
network
Customer Story | Protecting Students and Data in Google Workspace at Santa Rita Union School District
Santa Rita USD’s IT Team Partners with ManagedMethods to Improve Google Security and SafetySanta R...
2024-9-12 02:5:47 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
district
krisha
cloud
rita
New Findings on the National Public Data Breach: Poor Security Measures and the Role of Infostealer Malware as a Possible Vector of Attack
In recent months, the National Public Data (NPD) breach has been a topic of intense scr...
2024-9-12 02:4:14 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
npd
infostealer
infections
autofill
Microsoft Fixes Four 0-Days — One Exploited for SIX YEARS
This month Redmond fixes 79 security flaws in Windows and other products.As regular as clockwork,...
2024-9-12 01:28:43 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
windows
security
exploited
microsoft
richi
Understand Blocked Requests Faster with Rule Tracing | Impart Security
Introducing Rule TracingWe’re excited to announce the release of Rule Tracing, a powerful new feat...
2024-9-12 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
analysis
impart
broader
tune
In Memoriam: 9/11 Victims
Application Security Check Up ...
2024-9-12 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
Can AI Help Fix Security Vulnerabilities?
We get a lot of questions from our customers around the topic of artificial intelligenc...
2024-9-12 00:10:6 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
codesonar
security
gitlab
codesecure
How to Handle Secrets in Go
Tiexin GuoOS Developer @Ubuntu CNCF ambassador | LinkedInIn my previous blogs, I...
2024-9-12 00:0:47 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
eof
cloud
username
A Webinar Recap: The FCC Schools and Libraries Cybersecurity Pilot Program
Recently, we hosted a live webinar that discusses everything you need to know about the FCC School...
2024-9-11 23:28:17 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
fcc
pilot
eligible
Navigating the Risks of Namespace Collision: A Critical Security Challenge
In today’s digital landscape, organizations face a multitude of cybersecurity threats, one of which...
2024-9-11 23:10:17 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
appviewx
collisions
avx
security
collision
ADCS Attack Paths in BloodHound — Part 3
ADCS Attack Paths in BloodHound — Part 3In Part 1 of this series, we explained how we incorporated...
2024-9-11 21:46:28 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
bloodhound
upn
esc6
schannel
victim
SpecterOps Extends Reach of BloodHound Tool for Mapping Microsoft AD Attacks
SpecterOps has added the ability to track attack paths across instances of Microsoft Az...
2024-9-11 20:59:6 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
entra
kohler
visualize
The SBOM Survival Guide: Why SBOM Compliance is Set to Ignite IoT Security
The EU Cyber Resilience Act is set to become law this year, reinforcing the global trend towards tr...
2024-9-11 20:47:25 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
Evaluating the Effectiveness of Reward Modeling of Generative AI Systems
New research evaluating the effectiveness of reward modeling during Reinforcement Learning from Hum...
2024-9-11 19:3:11 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
alignment
rms
modeling
reward
Debian 12.7 Released with 55 Security Updates and 51 Bug Fixes
The Debian Project has officially released Debian 12.7, the latest point release in the Debian GNU/...
2024-9-11 17:0:46 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
tuxcare
bookworm
kernelcare
endian
6 Questions to Answer Before Choosing an Identity Provider
Managing identities online has become a critical aspect of business operations. Whether you’re a st...
2024-9-11 16:51:9 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
okta
auth0
security
keycloak
Why CRQ Models Are Better than CRQ Frameworks | Kovrr
TL;DRData-driven cyber risk management is essential to navigate the current threat landscape...
2024-9-11 16:15:25 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
crq
cisos
kovrr
Previous
22
23
24
25
26
27
28
29
Next