unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Threats That Hide in Your Microsoft Office Documents
By Nathaniel RaymondMicrosoft Office documents in the Office365 software suite have become a mains...
2024-5-29 06:27:23 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
qr
11882
phishing
macros
How to Turn on Two-Factor Authentication for Emails?
Reading Time: 6 minEmail has been one of the most widely used ways of sharing data among profess...
2024-5-29 04:47:15 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
tap
backup
OpenAI Launches Security Committee Amid Ongoing Criticism
OpenAI has a new Safety and Security Committee in place fewer than two weeks after disbanding its “...
2024-5-29 03:1:11 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
openai
security
committee
altman
leike
USENIX Security ’23 – xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses
Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu Many thanks to USENIX for publishing th...
2024-5-29 03:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
originating
USENIX Security ’23 – xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses
Authors/Presenters:Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu Many thanks to USENI...
2024-5-29 03:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
hongda
x20ulmufp8c
Beyond CAPTCHA: Arkose MatchKey, An AI-Resistant Attack Innovation
Generative AI and general AI platforms often include advanced computer vision technologies. These s...
2024-5-29 02:58:46 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
arkose
bots
resistant
matchkey
captchas
Lessons Learned from Part 1 of Our Cyber Incident Response Webinar Series
Setting the Stage for Cyber Chaos In the first installment of our two-part webinar series, Nuspire...
2024-5-29 02:16:45 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
nuspire
chris
webinar
mike
tabletop
Randall Munroe’s XKCD ‘Room Code’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-5-29 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
generative
boulevard
‘Microsoft’ Scammers Steal the Most, says FTC
And “pig butchering” scams are on the rise via social media.Scammers impersonating Microsoft, Publi...
2024-5-29 00:54:17 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
pig
squad
geek
ftc
butchering
The Rise of Generative AI is Transforming Threat Intelligence – Five Trends to Watch
2023 was the year of generative artificial intelligence (GenAI). From the rise of ChatGPT to the ma...
2024-5-29 00:38:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
genai
threats
attackers
underground
stages
HP Report Surfaces Shifts in Cyber Attack Tactics
HP Wolf Security has published a report that finds that the tactics and techniques being used by cy...
2024-5-29 00:12:46 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
threats
security
wolf
holland
Kasada Achieves 2024 Great Place to Work® Certification for Second Consecutive Year
NEW YORK – May 28, 2024 – Kasada, the pioneers transcending bot management by countering the human...
2024-5-29 00:7:56 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
kasada
workplace
commitment
leadership
career
USENIX Security ’23 – Generative Intrusion Detection and Prevention on Data Stream
Authors/Presenters: HyungBin Seo, MyungKeun Yoon Many thanks to USENIX for publishin...
2024-5-28 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
commitment
nocookie
Threats of the Week: Black Basta, Scattered Spider, and FIN7 Malvertising
The only way that we can help our community and our enterprise customers continue to...
2024-5-28 22:24:3 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
basta
ttps
fin7
spider
User Guide: PCI 4.0 Requirement 11.6 – Detecting and Responding to Unauthorized Changes on Payment Pages with Feroot
Protecting your e-commerce platform from unauthorized changes and skimming attacks is p...
2024-5-28 21:53:50 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
feroot
inspector
skimming
security
requirement
RSAC Fireside Chat: Dispersive adapts WWII radio-signal masking tool to obfuscating network traffic
By Byron V. AcohidoSpread spectrum technology helped prevent the jamming of WWII rad...
2024-5-28 21:44:7 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
network
dispersive
spectrum
acohido
resiliency
INE Security Enables CISOs to Secure Board Support for Cybersecurity Training
Cary, United States, May 28th, 2024, CyberNewsWireIf there is a single theme circulating among Ch...
2024-5-28 21:33:27 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cisos
security
investment
ine
I Failed a Pentest: What do I Do?
Penetration testing, commonly known as pentesting, is an essential practice for security teams. It...
2024-5-28 20:25:21 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
identify
compromises
addressing
The Link Between Cybersecurity and Reputation Management for Executives
The link between cybersecurity and personal reputation management for executives is significant. As...
2024-5-28 19:0:59 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
reputation
executives
blackcloak
threats
Vendor Risk Management Best Practices in 2024
‘Vendor Risk Management’ is more than just a buzzword in the information security and compliance l...
2024-5-28 15:35:10 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
diligence
scytale
Previous
108
109
110
111
112
113
114
115
Next