unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
From Exposure to Action: How Proactive Identity Monitoring Turns Breached Data into Defense
Every 39 seconds, somewhere in the world, a new cyberattack is launched — and far too often, it’...
2025-11-19 09:0:0 | 阅读: 42 |
收藏
|
Security Boulevard - securityboulevard.com
monitoring
exposure
constella
proactive
security
CredShields Joins Forces with Checkmarx to Bring Smart Contract Security to Enterprise AppSec Programs
Singapore, Singapore, Novembe...
2025-11-19 08:20:55 | 阅读: 21 |
收藏
|
Security Boulevard - securityboulevard.com
security
credshields
checkmarx
web3
Google Email Deliverability: How to Avoid Spam Folders
Key TakeawaysGmail uses AI-based filters and engagement signals to sort emails into the Prim...
2025-11-19 06:57:25 | 阅读: 22 |
收藏
|
Security Boulevard - securityboulevard.com
reputation
rates
engagement
Record-Breaking Cloud Incident Brings Outage Through the Internet
November 18, 2025 – Cloudflar...
2025-11-19 06:55:17 | 阅读: 25 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
outage
microsoft
security
network
Email Deliverability Consultant: How to Boost Campaign ROI
Key TakeawaysProfessional deliverability consulting delivers measurable financial returns th...
2025-11-19 06:8:46 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
reputation
inbox
consultant
How to Enable Safe File Handling for Clinical and Research Portals
Healthcare has opened a new digital front door. From electronic medical records (EMRs) and telemedi...
2025-11-19 00:53:0 | 阅读: 30 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
menlo
security
patient
cdr
Anthropic Disruption of an AI-Run Attack and What It Means for Agentic Identity
Identity Practices That Reduce the Attack SurfaceThis is where enterprises are now experiencing te...
2025-11-19 00:33:25 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
distinct
agents
lived
workloads
suited
What is Single Sign-On and why do I need to create an account?
Understanding Single Sign-On (SSO)Okay, so you're probably tired of making a zillion different...
2025-11-19 00:16:46 | 阅读: 37 |
收藏
|
Security Boulevard - securityboulevard.com
sso
security
ssojet
passwords
Comprehensive Guide to Risk-Based Authorization for Identity and Access Management
Understanding Risk-Based AuthorizationOkay, so you're telling me that just 'allowing' access is...
2025-11-19 00:10:14 | 阅读: 36 |
收藏
|
Security Boulevard - securityboulevard.com
rba
security
mojoauth
involves
4 U.S. Citizens, Ukrainian Plead Guilty in N. Korea IT Worker Scheme
There’s been extensive changes in cybersecurity policy in the shift from the Biden to Trump Admi...
2025-11-18 23:11:42 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
north
korean
remote
identities
guilty
What defines a smart approach to Non-Human Identity management
Why Are Non-Human Identities Crucial to Cloud Security?Where cloud technologies dominate operat...
2025-11-18 22:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
nhi
security
identities
nhis
machine
How safe are automated NHI lifecycle management systems
Can Automated NHI Lifecycle Management Systems Be Trusted?Confidence and assurance are paramoun...
2025-11-18 22:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
nhi
lifecycle
identities
machine
How certain can we be about cloud compliance with Agentic AI
Are Non-Human Identities the Missing Link in Cloud Security?Are we adequately equipping ourselv...
2025-11-18 22:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
nhi
nhis
identities
The 4 Most Common AI Agent Deployment Patterns And What They Mean for Identity Security
88% of teams plan to increase their use of AI agents in the next 12 months. Yet most identity syste...
2025-11-18 21:29:51 | 阅读: 24 |
收藏
|
Security Boulevard - securityboulevard.com
agents
security
delegation
llm
autonomous
NDSS 2025 – EvoCrawl: Exploring Web Application Code And State Using Evolutionary Search
SESSIONSession 3C: Mobile Se...
2025-11-18 20:0:0 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
evocrawl
network
ndss
symposium
Updated Response to CISA Advisory (AA24-109A): #StopRansomware: Akira Ransomware
On April 18, 2024, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau...
2025-11-18 19:53:44 | 阅读: 25 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
akira
security
windows
attackiq
Microsoft Fends Off Massive DDoS Attack by Aisuru Botnet Operators
Microsoft late last month was the victim of a massive distributed denial-of-service (DDoS) attac...
2025-11-18 19:30:46 | 阅读: 25 |
收藏
|
Security Boulevard - securityboulevard.com
aisuru
krebs
security
tbps
victim
News alert: SpyCloud forecasts Top 10 identity threats set to define 2026 security landscape
AUSTIN, Texas, Nov. 18, 2025, CyberNewswire — SpyCloud, the leader in identity threat protection,...
2025-11-18 19:21:10 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
spycloud
2026
threats
security
identities
Prioritizing Executive Security to Manage Risk
Executives and their families...
2025-11-18 18:5:35 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
techstrong
families
executives
pulsemeter
security
From Cloud to Code: Salt Cloud Connect Now Scans GitHub
One of our most-loved features is Salt Cloud Connect.In a world of complex deployments, it’s a...
2025-11-18 17:3:9 | 阅读: 27 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
salt
github
security
agentless
Previous
11
12
13
14
15
16
17
18
Next