unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Crowdstrike outage: Growing scams amid global outage
On July 18th newsrooms were buzzing about the Crowdstrike outage that was wiping out...
2024-7-29 22:58:13 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
crowdstrike
outage
security
vigilant
giant
The NIS2 Directive: Implications for Your Organization
Meeting the NIS2 Directive requirements can seem like a big challenge for any organization. This EU...
2024-7-29 21:47:21 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
nis2
directive
encryption
API Posture Management – Common Topics We’re Asked About
This article is the second in a series of six covering key API security topics and provides some an...
2024-7-29 21:0:10 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
cequence
posture
identify
exposure
DON’T GET PWNED! Securing Yourself at Black Hat
Black Hat, one of the world’s largest security conferences, is a veritable playground for hackers....
2024-7-29 20:15:58 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
cautious
wary
Over 1 Million websites are at risk of sensitive information leakage – XSS is dead. Long live XSS
IntroCross-site scripting (aka XSS) has rightfully claimed its place as one of the most popular we...
2024-7-29 20:12:57 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
hotjar
attacker
security
salt
victim
Why Biometrics are Key to a Safe Paris Olympics
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the tou...
2024-7-29 16:47:17 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
biometrics
olympics
facial
identify
france
Russia-Backed Brute-Force Campaign Targets Microsoft Infrastructure in EU
The European Union (EU) is currently confronting a significant surge in cyberattacks, primarily ori...
2024-7-29 16:31:25 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
crawler
security
heimdal
microsoft
proxy
Hallucination Control: Benefits and Risks of Deploying LLMs as Part of Security Processes
Large language models (LLMs) trained on vast quantities of data can make security operations teams...
2024-7-29 16:11:18 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
llms
security
llm
workflows
Linux Evolution: A Comprehensive Timeline
Linus Torvalds, a Finnish computer science student, started Linux as a hobby project in 1991.Linu...
2024-7-29 16:0:42 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
torvalds
linus
1991
tuxcare
1994
Fighting Fire with Fire: Using AI to Thwart Cybercriminals
Organizations are increasingly implementing generative AI (GenAI) solutions to boost productivity a...
2024-7-29 15:50:48 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
malicious
threats
genai
Cryptocurrency Theft: WazirX Loses $230 Million Amid Breach
WazirX, an Indian cryptocurrency exchange, has recently confirmed that it was targeted by threat ac...
2024-7-29 15:0:44 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
wazirx
liminal
stated
wallets
exchange
Deepfakes, AI, and the Future of Cybersecurity: Insights from Dan DeCloss of PlexTrac
In this episode, host Tom Eston welcomes Dan DeCloss, founder and CTO of PlexTrac. They exchange in...
2024-7-29 12:0:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
dan
plextrac
USENIX Security ’23 – Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages
Authors/Presenters:Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Bac...
2024-7-28 23:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
backes
authored
USENIX Security ’23 – Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware
Authors/Presenters:Mingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal,...
2024-7-27 23:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
presenters
o0swc0cwqy4
FAQ: How Are STIGs, SRGs, SCAP, and CCIs Related?
In the world of government-adjacent security and compliance, there are many different terms and acr...
2024-7-27 07:11:15 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
scap
stigs
stig
ccis
security
Response to CISA Advisory (AA24-207A): North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs
On July 25, 2024, the United States Federal Bureau of Investigation (FBI), the Cyber National Missi...
2024-7-27 04:16:6 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackiq
network
andariel
remote
CrowdStrike Update Created Widespread Outage
As a recap, a widespread Microsoft Windows outage began on July 19 and expanded throughout the day...
2024-7-27 03:43:3 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
crowdstrike
pondurance
microsoft
phishing
windows
Negotiate Your Next Cyber Insurance Policy With This 6-Step Playbook
TL;DR: Cyber liability insurance is essential, but premiums are increasing, and numerou...
2024-7-27 03:0:43 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
insurance
balbix
premiums
security
liability
USENIX Security ’23 – SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning
Authors/Presenters:Salim Al Wahaibi, Myles Foley, Sergio Maffeis Many thanks to USEN...
2024-7-27 03:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
nocookie
foley
What is Cloud Security Automation? Why You Need it
Ensuring the security of cloud-based systems has become paramount for businesses around the world....
2024-7-27 02:19:2 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
swimlane
turbine
threats
Previous
108
109
110
111
112
113
114
115
Next