unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Microsoft Recall is a Privacy Disaster
It remembers everything you do on your PC. Security experts are raging at Redmond to stop Recall’s...
2024-6-7 01:20:11 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
security
recall
worst
richi
How to Address the FBI Warning on Synthetic Identities: The North Korean Infiltration of Fake Employees
With fake and synthetic identities emerging as a potent tool for nefarious actors, the threat of cy...
2024-6-7 01:7:35 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
identities
synthetic
constella
kye
threats
Shadow IT and Zombie Accounts: Sabotaging Your SaaS Security
Software as a Service (SaaS) is a double-edged sword. SaaS apps can boost workforce...
2024-6-7 01:5:34 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
zombie
shadow
grip
passwords
Cyber Lingo: What is pretexting in cyber security?
The goal of pretexting is to gather information that can be used to access systems, steal identitie...
2024-6-7 01:0:19 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
pretexting
security
scammer
spot
cra
Operation Overlord, D-Day June 6th, 1944
Taxis to Hell – and Back – Into the Jaws of Death is a photograph taken on June 6, 1...
2024-6-7 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
coast
1st
carlo
kingdom
Prompt Injection Vulnerability in EmailGPT Discovered
Prompt injection vulnerabilities have been discovered in EmailGPT, an API service and Google Chrome...
2024-6-7 00:11:34 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
prompts
emailgpt
schwake
Why SAST + DAST can’t be enough
Static and dynamic app testing are cornerstones for any comprehensive AppSec program, yet they...
2024-6-6 23:51:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
analysis
hardcoded
Automation Takes Off: A New Dawn for Enterprises to Guard Against the Cyberattack Barrage
According to a recent Morgan Stanley report, “2024 Outlook – Rising Demand to Meet Rising Threats,”...
2024-6-6 23:45:35 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
processes
intelligent
SHARED INTEL Q&A: Forrester report shows Identity and Access Management (IAM) in flux
By Byron V. AcohidoIdentity and Access Management (IAM) is at a crossroads.A new Forrester Trend...
2024-6-6 23:26:18 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cairns
threats
lw
security
cisos
USENIX Security ’23 – Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone
Authors/Presenters:Qi Xia, Qian Chen, Shouhuai Xu Many thanks to USENIX for publishi...
2024-6-6 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
qian
Automating SCCM with Ludus: A Configuration Manager for Your Configuration Manager
TL;DR: Using Ludus as the backend, and with the help of Erik at Bad Sector Labs, I present a fully...
2024-6-6 22:50:53 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
sccm
ludus
client
pxe
naa
Leveraging Escalation Attacks in Penetration Testing Environments – Part 1
June 6, 2024Authors: George Raileanu and Eugene MarIntroductionTogether we aim to explore vulner...
2024-6-6 20:50:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
certipy
windows
ip6
network
machine
Leveraging Escalation Attacks in Penetration Testing Environments – Part 2
June 6, 2024Authors: George Raileanu and Eugene MarIn this post, we’ll cover the two most common...
2024-6-6 20:49:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
tas
tasca01
certipy
esc1
Listen up: 10 cybersecurity podcasts you can learn from
Regardless of where you are in your career in cybersecurity – whether you have been a trusted expe...
2024-6-6 20:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
notable
episode
interviews
Security Posture Drift: Tracking & Managing Security Posture Over Time
Given the high level of complexity in securing enterprise IT systems, it can be extremely difficul...
2024-6-6 20:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
drift
safebreach
Mastering Cyber Risk Quantification Methods: A Strategic Approach
Quantitative Risk models have long been applied in the financial and insurable risk fields and are...
2024-6-6 19:22:55 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
centraleyes
security
threats
Webinar: How to build relationships with developers
2024-6-6 17:8:36 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
developers
webinar
advice
Digital natives are not cybersecurity natives
At TurkuSec meetup in April, I had the opportunity to share my insights on a pressing i...
2024-6-6 15:59:56 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
natives
latto
olds
GHOSTENGINE Exploit: Vulnerable Drivers Facing Attack
A recent revelation in the cybersecurity realm uncovers a concerning development dubbed GHOSTENGINE...
2024-6-6 15:0:17 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ghostengine
security
threats
malicious
7 Reasons Why You Need To Replace Your Microsoft CA
Maintaining a robust and efficient Public Key Infrastructure (PKI) has never been more important fo...
2024-6-6 14:57:4 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
security
pkiaas
windows
hardware
Previous
101
102
103
104
105
106
107
108
Next