unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
What Are the Cybersecurity Threats When Allowing Third-Party Cookies on Mac?
Reading Time: 5 minHave you ever wondered about the risks of allowing cookies on your Mac? Many...
2024-6-29 17:38:26 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
habits
clearing
safely
Generative AI vs. Predictive AI: A Cybersecurity Perspective
In the context of cybersecurity, AI promises considerable benefits however there’s still a lot of c...
2024-6-29 16:40:21 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
predictive
generative
genai
security
SBOM Attestation by 3PAOs: Everything You Need to Know
In the past, we’ve written a lot about FedRAMP certification and the way the Ignyte platform can he...
2024-6-29 06:4:31 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
software
development
security
attestation
artifacts
DAST Vs. Penetration Testing: Comprehensive Guide to Application Security Testing
For two decades or so now, web applications have been the backbone of many businesses, making their...
2024-6-29 05:14:33 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
dast
security
identify
analysis
What is Crowdsourced Penetration Testing: Benefits,Risks,Comparisons
Organisations of all sizes rely heavily on new technology such as cloud, mobile, web applications,...
2024-6-29 05:9:8 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
testers
Unfurling Hemlock Tossing ‘Cluster Bombs’ of Malware
A threat group likely from Eastern Europe has been showering victims with hundreds of thousands of...
2024-6-29 05:8:34 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
hemlock
unfurling
garcia
security
loader
USENIX Security ’23 – PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack
Authors/Presenters:Xinben Gao, Lan Zhang Many thanks to USENIX for publishing their...
2024-6-29 03:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
presenters
commitment
How LogRhythm Helps You Comply with NERC CIP-015-01
NERC-CIP aims to secure and manage the security of the Bulk Electric System (BES) in No...
2024-6-29 02:43:34 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
logrhythm
nerc
cip
015
network
HYAS Protects Against Polyfill.io Supply Chain Attack with DNS Safeguards
Weekly Threat Intelligence ReportDate: June 28, 2024Prepared by: David Brunsdon, Threat Intel...
2024-6-29 02:15:6 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
hyas
polyfill
security
insight
malicious
Liquidmatrix Security Digest Podcast – Episode 7A
Episode 0x7A4-peat 4-peat! Turns out this is actually habit forming. The weekly ven...
2024-6-29 01:52:37 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
episode
security
digest
7a
Attention: Google To Distrust Entrust TLS Certificates
Crypto-Agility Required to Migrate to a New Certificate Authority (CA) Seamlessly and Highlights Ne...
2024-6-29 01:43:15 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
entrust
security
agility
migration
chrome
Temu is Malware — It Sells Your Info, Accuses Ark. AG
Chinese fast-fashion-cum-junk retailer “is a data‑theft business.”Do you have the Temu app install...
2024-6-29 01:18:14 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
temu
claims
allegations
retailer
richi
Randall Munroe’s XKCD ‘Situation’
Permalink*** This is a Security Bloggers Network syndicated blog from Infosecuri...
2024-6-29 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
handelman
xkcd
permalink
security
network
Skeleton Key the Latest Jailbreak Threat to AI Models: Microsoft
Microsoft researchers are detailing a new AI jailbreak technique that works by causing a large lang...
2024-6-29 00:57:36 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
jailbreak
russinovich
microsoft
skeleton
harmful
The Eureka Moment: Discovering Application Traffic Observability
The Eureka Moment: Discovering Application Traffic Observabilityby David MeltzerIf you’ve been pa...
2024-6-29 00:0:19 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
network
cloud
fusion
USENIX Security ’23 – Extracting Training Data from Diffusion Models
Authors/Presenters:Nicholas Carlini, Jamie Hayes, DeepMind; Milad Nasr Matthew Jagielsk...
2024-6-28 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
anaheim
publishing
What Is Application Security Posture Management (ASPM): A Comprehensive Guide
Get details on what ASPM is, the problems it solves, and what to look for. Software development i...
2024-6-28 22:15:25 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
aspm
software
development
Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024
When you think of Seattle, you might immediately think of Starbucks, the Space Needle. or maybe ev...
2024-6-28 22:8:31 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
food
cloud
slsa
Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 6/28
Insight #1Most ransomware deploys a remote-access Trojan (RAT), which allows for...
2024-6-28 21:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
insight
tom
contrast
kellermann
AppViewX AVX ONE Certificate Lifecycle Management Integration With HashiCorp Vault
HashiCorp Vault is a robust and versatile open-source solution for comprehensive secrets management...
2024-6-28 19:59:28 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
hashicorp
avx
appviewx
lifecycle
security
Previous
134
135
136
137
138
139
140
141
Next