unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications
Authors/Presenters:Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller Many thanks to...
2024-7-4 03:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
thomas
youtube
CVE of the month, the supply chain attack hidden for 10 years CVE-2024-38368
We have a big one this month and it's brand new. CVE-2024-38368 is a vulnerability that affects th...
2024-7-4 02:32:42 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
pods
security
cocoapods
cocoapod
evasec
Threat Hunting Workshop 11: Hunting for Command and Control
Get ready to elevate your threat hunting skills with Intel 471’s exhilarating and in...
2024-7-4 01:55:8 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
workshop
security
471
cyborg
tactic
Randall Munroe’s XKCD ‘Bad Map Projection: Exterior Kansas’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-7-4 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
humor
webinars
xkcd
projection
You’re Telling Me That Ad Was Fake? Malvertising Is Sneakier Than Ever | Avast
Finding a space online that’s not rife with ads seems like an unlikely dream—unless...
2024-7-4 00:39:7 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
rife
dream
security
bloggers
CISO Panel: How Security Teams Are Evolving Their Strategies in 2024
The cybersecurity industry is experiencing significant shifts in 2024. LogRhythm’s State of the Sec...
2024-7-4 00:14:44 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
logrhythm
evolving
New Open SSH Vulnerability
It’s a serious one:The vulnerability, which is a signal handler race condition in Ope...
2024-7-3 23:27:11 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackers
schneier
sshd
remote
USENIX Security ’23 – TVA: A Multi-Party Computation System For Secure And Expressive Time Series Analytics
Authors/Presenters:Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Maya...
2024-7-3 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
kalavri
outstanding
RegreSSHion CVE-2024-6387: A Targeted Exploit in the Wild
A critical security flaw, known as regression and cataloged under CVE-2024-6387, has b...
2024-7-3 21:42:47 | 阅读: 48 |
收藏
|
Security Boulevard - securityboulevard.com
attacker
6387
regresshion
ssh
Data Breaches in June 2024 – Infographic
Have you ever gotten that sinking feeling that your personal information might be out in the open?...
2024-7-3 21:29:39 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
wesecureapp
levi
teamviewer
highlights
Survey Surfaces Growing Lack of Cybersecurity Confidence
A survey of 706 IT and security professionals finds half are not very confident that they can stop...
2024-7-3 20:44:53 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
silos
respondents
mukkamala
Man-In-The-Middle Attacks are Still a Serious Security Threat
Man-in-the-middle attacks, a type of cybersecurity threat where a malicious actor intercepts commun...
2024-7-3 17:20:5 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
malicious
How to Achieve Crypto Resilience for a Post-Quantum World
Quantum computing may be the greatest cybersecurity threat the world has ever seen – and that’s no...
2024-7-3 16:53:8 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
pqc
security
migration
cisos
ecc
The Secret Threat Hiding in Your SaaS Stack: Shadow IT
Organizations increasingly rely on software-as-a-Service (SaaS) applications to power their busines...
2024-7-3 15:57:12 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
software
departments
sso
approval
The Role of Automation in Enforcing the Principle of Least Privilege
As businesses continue to expand their reliance on cloud security and privileged access management,...
2024-7-3 15:47:32 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
principle
privileges
privileged
operational
Boardroom Blindspot: How New Frameworks for Cyber Metrics are Reshaping Boardroom Conversations
Organizations have come a long way in stepping up cybersecurity risk reporting, but there’s still r...
2024-7-3 15:21:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cisos
boards
leaders
regulations
Embracing the Absurd: Finding Freedom in Cyber Security
Life can be overwhelming. When you’re young, change is exciting, but as we grow older,...
2024-7-3 15:1:18 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
certainty
absurdity
Researchers Uncover UEFI Vulnerability Affecting Intel CPUs
Cybersecurity researchers have recently uncovered a UEFI vulnerability in the Phoenix SecureCore UE...
2024-7-3 15:0:26 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
firmware
lake
security
affecting
attackers
The Value of HR in Your Insider Risk Management Program
Companies hire people, and while every one of those individuals presents a potential risk, not all...
2024-7-3 12:0:38 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
insider
irm
threats
vetting
importance
How do you assess the risk of AI within your operations?
How do you assess the risk of AI within your operations?How do you assess the risk of AI within...
2024-7-3 06:47:21 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ethical
security
regulatory
assessing
Previous
130
131
132
133
134
135
136
137
Next