unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Black Hat Fireside Chat: Token’s wearable MFA solution combines PKI, biometrics — in a ring
By Byron V. AcohidoLAS VEGAS — Humans, unsurprisingly, remain the weak link in cybers...
2024-8-6 00:7:16 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
acohido
sensor
security
network
hardware
National Public Data Sued for Hack that Exposed Data of 2.9 Billion People
A class-action complaint has been filed against a background-check company in connection to a data...
2024-8-6 00:2:33 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
complaint
pii
plaintiff
court
plaintiffs
USENIX Security ’23 – FedVal: Different Good Or Different Bad In Federated Learning
Authors/Presenters:Viktor Valadi, AI Sweden; Xinchi Qiu, Pedro Porto Buarque de Gusmão,...
2024-8-5 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
buarque
USENIX Security ’23 – FedVal: Different Good Or Different Bad In Federated Learning
Authors/Presenters:Viktor Valadi, AI Sweden; Xinchi Qiu, Pedro Porto Buarque de Gusmão,...
2024-8-5 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
nicholas
valadi
Government Emails at Risk: Critical Cross-Site Scripting Vulnerability in Roundcube Webmail
Key InformationSonar’s Vulnerability Research Team recently discovered a critical Cro...
2024-8-5 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
roundcube
victim
attacker
maintainers
attackers
AI Policy and Governance: Shaping the Future of Artificial Intelligence
Welcome to the exciting and complex world of AI policy and governance! As AI continues to revoluti...
2024-8-5 22:44:35 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
governance
ethical
development
regulation
Novel SLUBStick Linux Exploit Gives Attackers Full System Control
A newly discovered technique for exploiting flaws in the Linux kernel could allow bad actors to byp...
2024-8-5 22:33:41 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
slubstick
memory
allocator
security
slab
Leveraging CRQ to Comply With DORA Regulations | Kovrr
TL;DRDigital transactions, both large and small, have become the dominant method of managing...
2024-8-5 22:25:38 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ict
crq
dora
kovrr
resilience
Salt Security Provides Free Scans for XXS Vulnerabilities Involving OAuth Protocol
Salt Security is making available a free scanning tool that it has been using to assess...
2024-8-5 21:21:11 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
security
balmas
victim
employ
employed
Cloud cryptography demystified: Google Cloud Platform
By Scott ArciszewskiThis post, the second in our series on cryptography in the cloud, provides an...
2024-8-5 21:0:3 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
tink
kms
encryption
client
Leveraging CRQ to Understand Ransomware Costs | Kovrr
Today, decision makers at the world’s largest enterprises, from the CISO to the CEO, are increasing...
2024-8-5 20:41:55 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
costs
losses
insurance
7 features to look for in a PII Data Discovery Software: A guide for infosec and devops Professionals
When working in non-production environments such as testing and development, it’s crucial to ensure...
2024-8-5 19:23:25 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
pii
masking
software
regulations
security
Azure Just-in-Time Access Simplified
In today’s rapidly evolving cloud landscape, organizations are grappling with the intricate challen...
2024-8-5 18:32:11 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
privileges
elevated
Multiple Tomcat Vulnerabilities Fixed in Ubuntu and Debian
Tomcat, a widely-used servlet and JSP engine, has recently undergone several security updates to ad...
2024-8-5 17:0:52 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
esm
tuxcare
eol
DSPM: A Cybersecurity Approach Tailor-Made for This AI Era
Is our organization’s data resilient against cyberattacks, even when the identity is compromised? A...
2024-8-5 16:24:15 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
dspm
cloud
security
shadow
approaches
Strategies for Mitigating LLM Risks in Cybersecurity
While most CISOs and CIOs have created AI policies, it is no surprise that more extensive due dilig...
2024-8-5 16:2:24 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
llms
llm
security
Effective Third-Party Risk Management Under PCI DSS 4.0
The Payment Card Industry Data Security Standard (PCI DSS) aims to improve credit, debit and cash c...
2024-8-5 15:39:59 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
dss
assessments
monitoring
guidelines
How Strobes Uncover Hidden Cloud Risks Within Your Organization?
The cloud has revolutionized how businesses operate, offering unprecedented agility and scalability...
2024-8-5 15:39:14 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
strobes
cloud
security
asset
casm
The Top 7 AI Compliance Tools of 2024
How AI is Revolutionizing ComplianceArtificial intelligence has revolutionized compliance practice...
2024-8-5 15:11:58 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
regulatory
processes
machine
centraleyes
identify
The Great CrowdStrike Crash, AI’s Role in Employee Smiles
In episode 341, we cover the unprecedented global IT outage caused by a CrowdStrike update crash, a...
2024-8-5 12:0:24 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
crowdstrike
smiles
youtube
Previous
100
101
102
103
104
105
106
107
Next