unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
SLAP/FLOP: Apple Silicon’s ‘Son of Spectre’ Critical Flaws
Want more “speculative execution” bugs? “You’re gonna be in a great mood all day.”Apple’s lates...
2025-1-29 17:47:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
speculative
memory
slap
spectre
Our Digital Footprints are Breadcrumbs for Mapping our Personal Behavior
You can no longer finish a coffee run or a simple subway commute without encountering some kind...
2025-1-29 16:40:56 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
ashley
coffee
captured
security
behaviors
How to Find Old Accounts for Deletion
Old accounts are often unmaintained and forgotten – which can b...
2025-1-29 16:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
forgotten
footprint
keychain
Codefinger Ransomware: Detection and Mitigation Using MixMode
MixMode Threat ResearchMixM...
2025-1-29 16:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
mixmode
security
threats
codefinger
ransomware
Flare Academy is Here!
We’re excited to share that w...
2025-1-29 14:47:56 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
flare
academy
security
Ongoing report: Babuk2 (Babuk-Bjorka)
January 29, 2025Editor’s no...
2025-1-29 14:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
victim
dls
grit
claims
Why API Security is Essential for the Hospitality Sector: Safeguarding Your Guests and Your Rewards
Trust is the cornerstone of the hospitality industry. Guests rely on you to safeguard their pers...
2025-1-29 13:0:10 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
salt
loyalty
guests
hospitality
Using AI To Help Keep Your Financial Data Safe
Cyberattacks against the financial industry are on the rise. Statista reported that unauthorized...
2025-1-29 12:59:21 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
encryption
threats
malicious
weaknesses
DeepSeek’s Deep Risks: What You Need to Know | Grip Security
With great innovation comes significant responsibility—and, unfortunately, substantial risk, if you...
2025-1-29 10:35:24 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
deepseek
security
grip
generative
chatgpt
Threat Actors Exploit Government Website Vulnerabilities for Phishing Campaigns
Author: Max GannonCofense Intelligence has continually observed the abuse or usage of legitimat...
2025-1-29 06:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
abused
phishing
hxxps
urlscan
How Compliance Automation Enhances Data Security
Protecting sensitive data is critical for businesses of all sizes. Organizations face increasing pr...
2025-1-29 01:24:10 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
swimlane
automating
regulatory
Cross-post: Office of the CISO 2024 Year in Review: AI Trust and Security
[written together with Marina Kaganovich, Executive Trust Lead, Office of the CISO @ Google Clou...
2025-1-28 23:34:45 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
saif
cloud
governance
cisos
Relax with Top-tier Cloud-Native Security
Could There be a Simpler Way to Enhance Cloud-Native Security?Where maintaining top-tier securi...
2025-1-28 22:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
nhi
nhis
cloud
identities
Improving Secrets Management in Healthcare Systems
Why is Secrets Management Crucial in Healthcare Systems?Have you ever considered how privileged...
2025-1-28 22:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
healthcare
nhis
threats
nhi
Keeping Your Automated Systems Safe and Secure
Can NHI Management Be the Key to Unlocking Cybersecurity for Automated Systems?Where data is th...
2025-1-28 22:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
nhi
nhis
security
identities
Reverse engineering your test data: It’s not as safe as you think it is
“Is it safe?” Laurence Olivier’s Nazi Dentist from Hell quietly asked this innocent question in the...
2025-1-28 21:50:51 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
datasets
identify
anonymized
discomfort
What is the role of data synthesis in my CI/CD pipeline, anyway?
Oh, data synthesis, how we d...
2025-1-28 21:44:22 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
synthesis
database
development
crash
developers
DeepSeek: The Silent AI Takeover That Could Cripple Markets and Fuel China’s Cyberwarfare
David Jemmett, CEO & Founder of CISO Global January 28, 2025Unlike Western AI systems go...
2025-1-28 21:7:5 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
deepseek
ciso
jemmett
markets
DEF CON 32 – Top War Stories From A TryHard Bug Bounty Hunter
Author/Presenter: Justin Rhyn...
2025-1-28 20:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
publishing
marc
presenter
AI is a double-edged sword: Why you need new controls to manage risk
As with just about every part of business today, cybersecurity has been awash in the promises of...
2025-1-28 19:55:27 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
harkins
threats
malcolm
Previous
-1
0
1
2
3
4
5
6
Next