unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications
Authors/Presenters:Simon Koch, Benjamin Altpeter, Martin Johns Many thanks to USENIX...
2024-7-6 23:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
fi59lpspkuw
altpeter
Researchers Discover Cache of Billion Stolen Passwords
Researchers claim to have uncovered what they claim is the biggest cache of stolen credentials ever...
2024-7-6 21:44:41 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
passkeys
ashley
Simplifying Infrastructure Management with Imperva’s Terraform Module for Cloud WAF
In today’s rapidly evolving technological landscape, managing infrastructure efficiently is paramou...
2024-7-6 04:25:1 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
imperva
simplifying
balancing
The five most common pitfalls of cyber security awareness training
The most common pitfalls Boring content How it happensOne of the most common pitfalls is having...
2024-7-6 03:59:27 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
scheduling
audits
threats
customize
USENIX Security ’23 – Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing
Authors/Presenters:Brian Jay Tang, Kang G. Shin Many thanks to USENIX for publishing...
2024-7-6 03:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
presenters
anaheim
How DataDome Detects Puppeteer Extra Stealth
What is Puppeteer Extra Stealth?Puppeteer Extra Stealth is a plugin that enhances Puppeteer with a...
2024-7-6 02:30:2 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
stealth
datadome
proxy
puppeteer
Randall Munroe’s XKCD ‘Routine Maintenance’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-7-6 01:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
4x
polyfill
‘Polyfill’ Supply Chain Threat: 4x Worse Than We Thought
Chinese company takes over widely used free web service—almost 400,000 websites at risk.Last week,...
2024-7-6 00:59:56 | 阅读: 21 |
收藏
|
Security Boulevard - securityboulevard.com
polyfill
malicious
richi
funnull
inevitable
Extending Modern Identity Protection for Comprehensive Security
TechSpective Podcast Episode 134 There is a lot of talk about identity protection–pas...
2024-7-5 23:44:16 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
bradley
tony
extending
Protecting People, Not Just Data
As I sit here, reflecting on the recent news of the ransomware attack on pathology lab Synnovis, I...
2024-7-5 23:3:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
oliver
synnovis
USENIX Security ’23 – Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones
Authors/Presenters:Daniel Hugenroth, Alastair R. Beresford Many thanks to USENIX for...
2024-7-5 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
authored
presenter
How to Prepare for the EU’s NIS2 Directive
The Network and Information Systems Directive 2 (NIS2) is sweeping legislation designed to improve...
2024-7-5 22:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
nis2
security
authorities
directive
Why API Discovery is Important for Financial Companies
Technology and finance have a symbiotic relationship, with technology acting as the main driver of...
2024-7-5 21:43:54 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
agentless
operational
efficiency
Twilio’s Authy Breach: The Attack via an Unsecured API Endpoint
In a recent incident, Twilio's Authy app has suffered a significant breach, exposing 3...
2024-7-5 21:14:13 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
twilio
authy
The Pros and Cons of Secure Access Service Edge (SASE)
Software-Defined Wide Area Network (SD-WAN) manages and optimizes the delivery of network services...
2024-7-5 16:0:50 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
cloud
remote
software
Extending the Reach and Capabilities of Digital Signing With Standards
Since the concept of business and legal relationships emerged, trust and identity have played a fun...
2024-7-5 15:30:7 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
adoption
electronic
efficiency
security
ltv
Fickle Malware Leads to UAC Bypass and Data Exfiltration
A new Rust-based malware called Fickle Stealer has emerged, targeting sensitive information through...
2024-7-5 15:0:31 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
fickle
stealer
powershell
bypass
attacker
Understanding API Key Verification
Application programming interfaces (APIs) enable different software components to communicate, allo...
2024-7-5 15:0:18 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
centralized
security
payload
Smashing Silos With a Vulnerability Operations Center (VOC)
Navigating vulnerability management (VM) is like piecing together a complex, seemingly endless puzz...
2024-7-5 14:0:54 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
voc
threats
processes
The Runtime Secrets’ Security Gap
Claude Robitaille CEO and Founder of NearEDGESecrets management remains one of the...
2024-7-4 23:47:8 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
tang
security
encryption
clevis
nsl
Previous
128
129
130
131
132
133
134
135
Next