unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Moline-Coal Valley School District Shifts from Reactive to Proactive Student Safety & Google Security
Moline-Coal Valley School District replaced Syscloud with Cloud Monitor to improve student safety and cybersecurity in their Google Workspace environment, reducing false positives and enabling faster, more effective incident response....
2025-10-1 21:8:8 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
district
craig
cloud
moline
valley
USENIX 2025: PEPR ’25 – Network Structure And Privacy: The Re-Identification Risk In Graph Data
USENIX感谢其在YouTube频道上发布的杰出演讲者在USENIX Enigma '23大会上的优秀内容。...
2025-10-1 19:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
handelman
network
Passwordless 101 for SaaS: Magic Links, OTP, or Passkeys?
文章探讨了无密码认证在SaaS中的应用,介绍了三种主要方法:魔法链接、一次性密码(OTP)和密钥。每种方法各有优缺点,适用于不同场景。魔法链接简单但依赖邮箱;OTP常见但易受攻击;密钥安全性强但需现代设备支持。选择合适的认证方式需权衡用户体验、安全性和实施成本。...
2025-10-1 18:46:53 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
fallback
passwords
otps
Top Strategies for Effective and Secure Identity Risk Monitoring
文章探讨了数字时代身份风险管理的重要性,强调通过实时监控、数据分析和暗网扫描等技术手段保护个人及职业安全。结合OSINT调查与先进欺诈检测技术,提升威胁识别能力。同时,倡导建立积极的安全文化,以应对日益复杂的网络威胁。...
2025-10-1 17:34:46 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
monitoring
threats
constella
security
CISA Ends Funding for MS-ISAC Program for State and Local Governments
美国网络安全机构CISA终止了与Center for Internet Security (CIS)长达21年的合作协议,并转向新模式,提供直接资金和免费工具支持州及地方政府的网络安全工作。这一变化可能导致资源获取方式转变及潜在挑战。...
2025-10-1 17:28:48 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
funding
security
isac
expired
Randall Munroe’s XKCD ‘’Mantle Model”
微软预览Graph框架以整合网络安全工具;CISA终止MS-ISAC项目资助。...
2025-10-1 17:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
Microsoft Previews Graph Framework to Better Integrate Cybersecurity Tools
微软推出基于数据湖和MCP服务器的Sentinel图实例,整合Defender和Purview等安全工具,旨在简化上下文管理、减少误报并实时应对攻击。专家认为此举提升效率,并引发集成平台与最佳工具策略的讨论。...
2025-10-1 16:59:6 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
agents
simpler
breed
USENIX 2025: Building An End-to-End De-Identification Pipeline For Advertising Activity Data At LinkedIn
LinkedIn的Saikrishna Badrinarayanan和Chris Harris介绍了他们在USENIX Enigma ’23上展示的端到端去识别化管道,用于处理广告活动数据以保护用户隐私。...
2025-10-1 15:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
webinars
bloggers
Proofpoint Previews Strategy for Applying AI Agents to Better Secure Data
Proofpoint推出一系列AI代理和工具,旨在自动化安全任务、监控数据访问并治理AI使用,以应对网络安全新挑战。...
2025-10-1 14:27:26 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
proofpoint
agents
security
choi
satori
200,000 More SIM Cards Found Linked to Secret Telecom Network in NYC
美国联邦调查发现纽约及其周边隐藏的庞大通讯系统包含至少六处地点及30万张SIM卡和300多台服务器。该系统可发送大量匿名加密短信并干扰通信网络及紧急服务。调查指向外国威胁行为者及犯罪组织关联。...
2025-10-1 14:18:5 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
york
officials
network
unnamed
Tonic.ai + Microsoft: Accelerating AI adoption with privacy-compliant synthetic data
Tonic.ai加入微软Pegasus计划,通过Azure Marketplace提供合成数据技术,帮助企业解决数据隐私和合规问题,加速AI应用。...
2025-10-1 13:55:1 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
tonic
synthetic
partnership
adoption
Announcing the HYPR Help Desk Application: Turn Your Biggest Risk into Your Strongest Defense
文章讨论了企业帮助台作为安全漏洞的风险,指出传统验证方法(如知识型问题和短信验证码)易被攻击者利用。通过引入HYPR的生物识别和政府颁发ID验证技术,可有效提升帮助台的安全性并减少账户接管风险。...
2025-10-1 13:30:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
desk
hypr
agents
affirm
security
Securing the Skies: Software Supply Chain Readiness for Unmanned Aircraft Systems
宣布HYPR Help Desk应用程序:将您最大的风险变成最强的防御。...
2025-10-1 13:0:1 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
webinars
security
boulevard
threats
Developer survey request
文章探讨了人工智能在软件开发中的应用及其对开发者工作流程的影响。通过年度开发者调查,研究团队旨在深入了解开发者如何利用AI工具,并评估其对代码审查和安全性的影响。参与者有机会获得限量版帽子作为感谢。...
2025-10-1 13:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
reviewing
software
developer
security
developers
The Next Evolution for the Intrusion Kill Chain Prevention Strategy
Rick Howard, a cybersecurity expert, discusses the evolution of network defense strategies, including the Lockheed Martin Cyber Kill Chain, the Diamond Model, and the MITRE ATT&CK framework. These models aim to identify adversary tactics and techniques to improve detection and prevention. Tidal Cyber addresses a key challenge by leveraging large language models to extract adversary procedures from intelligence reports, enabling better defense strategies....
2025-10-1 12:40:38 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
tidal
lockheed
martin
Top Data Breaches In September 2025
2025年9月的数据泄露事件涉及汽车、奢侈品时尚、航空和金融科技等多个行业。攻击者通过针对第三方供应商和共享平台,引发了广泛的连锁反应。这些事件凸显了加强第三方风险管理的重要性,并强调了企业需重视供应链安全与持续威胁管理。...
2025-10-1 10:42:47 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
exposure
volvo
ransomware
What is Identity and Access Management (IAM)?
身份和访问管理(IAM)是通过框架和技术控制用户身份验证和权限分配的系统。它平衡安全性和便利性,确保敏感数据仅限授权访问。关键技术包括单点登录(SSO)、多因素认证(MFA)和基于角色的访问控制(RBAC)。随着网络安全威胁增加和远程工作的普及,IAM成为现代企业的重要防线。...
2025-10-1 08:42:40 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
passwords
sso
cloud
Top CVEs & Vulnerabilities of September 2025
2025年9月披露了多个关键安全漏洞,包括FreePBX认证绕过导致SQL注入和远程代码执行、Cisco防火墙缓冲区溢出引发根权限远程代码执行、Android运行时内存错误导致沙盒逃逸和权限提升等。这些漏洞影响广泛且已被积极利用,修复迫在眉睫。...
2025-10-1 08:8:16 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
hpc
network
asa
ftd
remote
An Inclusive Guide to Retina Scan Authentication
视网膜扫描技术通过捕捉眼睛后部血管的复杂模式进行身份验证。该技术利用红外光吸收特性生成独特的血管图像,并将其转换为数字模板用于认证。相比指纹和面部识别,视网膜扫描更难伪造且受环境因素影响较小。尽管在医疗、金融和政府等领域已得到应用,但成本高、隐私问题及对某些眼部疾病患者的限制仍需解决。...
2025-10-1 07:47:34 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
retina
security
retinal
scanners
What happens when you forget to delete a secret?
孤儿密钥是常见的安全盲点,指API密钥、令牌等在不再需要时仍保持活跃状态。攻击者可利用这些密钥进行未经授权的访问、横向移动和权限提升。集中化管理平台通过自动轮换、审计日志和集成开发流程解决这一问题。...
2025-10-1 00:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
orphaned
security
developers
forgotten
centralized
Previous
-66
-65
-64
-63
-62
-61
-60
-59
Next