unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Story 4: Detecting compromised secrets & naughty 3rd-party vendors
Join Astrix customers as they lead the non-human identity security frontier in this series “The As...
2024-7-16 18:16:44 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
astrix
nhis
estate
How to Configure Brevo SPF, DKIM, and DMARC Records? A Step-by-Step Guide
Reading Time: 4 minAuthenticating your email domain can be beneficial to domain owners in more w...
2024-7-16 18:1:50 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
brevo
dmarc
dkim
spf
Patch Squid Vulnerabilities Affecting Ubuntu 16.04/18.04
Several security issues were discovered in Squid, a web proxy cache server. These vulnerabilities h...
2024-7-16 17:0:27 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
squid
security
tuxcare
attacker
Velvet Ant Exploits Cisco Zero-Day Flaw
Recent events in the cybersecurity landscape have brought to light the activities of a China-nexus...
2024-7-16 15:0:57 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
nexus
switches
ant
velvet
security
How U.S. Businesses can Fight the Deepfake Threat
Not all that long ago, the idea of artificial intelligence (AI) surpassing that of humans was confi...
2024-7-16 14:20:21 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
deepfake
deepfakes
threats
Critical Vulnerability Discovered in OpenSSH Impacting Large User
In a significant development for cybersecurity, a new vulnerability has been detected in OpenSSH, t...
2024-7-16 13:34:45 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
openssh
remote
security
kratikal
Critical Security Update for Adobe Commerce (Magento) Users
By Source DefenseIn the rapidly evolving world of e-commerce, security remains a top priority. As...
2024-7-16 05:39:50 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
client
crucial
deadline
USENIX Security ’23 – FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks
Authors/Presenters:Cyrill Krähenbühl, Marc Wyss, David Basin, Vincent Lenders, Adrian P...
2024-7-16 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
marc
martin
Response to CISA Advisory (AA24-193A): CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth
On July 11, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) released a Cybersecur...
2024-7-16 02:59:57 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
remote
windows
attackiq
network
Caught in the Act: StealC, the Cyber Thief in C
Weekly Threat Intelligence ReportDate: July 15, 2024Prepared by: David Brunsdon, Threat Intel...
2024-7-16 02:49:34 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
hyas
stealc
library
mozilla
insight
Hacking Scientific Citations
Some scholars are inflating their reference counts by sneaking them into metadata:Cit...
2024-7-16 01:13:8 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
scientific
citations
publication
journals
benefited
Randall Munroe’s XKCD ‘Number Line Branch’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-7-16 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
artificial
Beware of the Latest Phishing Tactic Targeting Employees
Found in Environments Protected By: Google, Outlook 365, ProofpointBy Sabi Kiss, Cofense Phishing...
2024-7-16 00:43:6 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
cofense
handbook
recipients
trademarks
Mythic 3.3 Beta: Rise of the Events
A brief overview of Mythic 3.3’s new featuresEventing FlowsMythic 3.3 UpdatesMythic 3.3 has too...
2024-7-16 00:35:52 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
mythic
payload
containers
eventing
dead
CEO Corner: Building a Stronger Future Together: Nuspire and PDI Technologies
I’m thrilled to share some exciting news with you that will not only take our ability to serve you...
2024-7-16 00:0:30 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
nuspire
pdi
security
evolving
What Happens When Scammers Get Their Hands on Artificial Intelligence?
The Rise of AI in Our Daily LivesArtificial Intelligence (AI) has become a big part of our everyd...
2024-7-15 23:2:47 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
staying
phishing
deepfake
imagine
spot
USENIX Security ’23 – Back to School: On the (In)Security of Academic VPNs
Authors/Presenters:Ka Lok Wu, Man Hong Hue, Ngai Man Poon, Kin Man Leung, Wai Yin Po, K...
2024-7-15 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
sze
kin
usenix
youtube
Encoding Differentials: Why Charset Matters
Do you notice something in the following HTTP response?HTTP/1.1 200 OKServer: Some ServerContent...
2024-7-15 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
jp
attacker
jis
decoded
encodings
Olympic Gold at Risk: AI Cybercriminals Target 2024 Games.
The Summer Olympic Games will be held in Paris this year, and while the athletes will be focused on...
2024-7-15 20:7:8 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
athletes
attackers
security
phishing
cyberthreat
Best Strategies to Reduce Generative AI Risk
Generative AI stands as one of the most transformative technologies of our era. However, with its v...
2024-7-15 19:36:4 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
generative
ethical
nuclear
development
regulations
Previous
120
121
122
123
124
125
126
127
Next