unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How to Enhance Security Without Affecting the Customer Experience
Navigating the landscape of customer interactions is a delicate balancing act that requires constan...
2024-6-28 18:25:27 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
goldilocks
proposed
considering
The Urgency to Uplevel AppSec: Securing Your Organization’s Vulnerable Building Blocks
The number of attacks targeting web applications and application programming interfaces (APIs) has...
2024-6-28 17:15:58 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
attackers
security
software
shellshock
Introduction to NTA Auto-learning Function
The implementation of DDoS attack alerting relies on setting alert thresholds. Setting...
2024-6-28 17:6:49 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
thresholds
nta
threshold
network
security
Cyberattack Rate Surges as Novel Malware Growth Accelerates
The rate of cyberattacks is rising as the threat level continues to evolve, according to BlackBerry...
2024-6-28 16:23:14 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
blackberry
threats
cyberthreat
ransomware
News Alert: Infinidat introduces advanced cyber resiliency and recovery solution for enterprises
Waltham, Mass., June 27, 2024, CyberNewsWire — Infinidat, a leading provider of enterprise storage...
2024-6-28 06:14:30 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
infinidat
infinisafe
security
Webinar: How to secure Microsoft Copilot & Gen AI
July 10, 1:00 pm Eastern Time As organizations rapidly adopt Microsoft Copilot and other...
2024-6-28 04:56:38 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
microsoft
copilot
webinar
symmetry
Kimsuky deploys TRANSLATEXT to target South Korean academia
IntroductionIn March 2024, Zscaler ThreatLabz observed new activity from Kimsuky (aka APT43, Emeral...
2024-6-28 04:32:20 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
translatext
security
github
korean
c2
How to Advance Breach Protection Against Non-Human Identity Threats in Workloads
For example, the recent breach at Dropbox, which involved unauthorized access through a compromised...
2024-6-28 03:46:43 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
workloads
periodic
reducing
Container Security Scanning: Vulnerabilities, Risks and Tooling
Tiexin GuoSenior DevOps Consultant, Amazon Web Services Author | 4th CoffeeOver t...
2024-6-28 03:34:33 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
python
23t20
snyk
USENIX Security ’23 – In the Quest to Protect Users from Side-Channel Attacks — A User-Centred Design Space to Mitigate Thermal Attacks on Public Payment Terminals
Authors/Presenters:Karola Marky, Shaun Macdonald, Yasmeen Abdrabou, Mohamed Khamis M...
2024-6-28 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
marky
outstanding
Third-Party Trust Issues: AppSec Learns from Polyfill
By now, you’ve likely seen the LinkedIn posts, the media stories, and even some formerly-known-as “...
2024-6-28 01:58:10 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
polyfill
security
appsec
software
Daniel Stori’s ‘Java Attacks!’
via the inimitable Daniel Stori at Turnoff.US!Permalink*** This is a Security B...
2024-6-28 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
handelman
inimitable
daniel
network
The True Cost of Bad Code in Software Development
Bad software code is simply a part of doing business. Technical debt has never been mor...
2024-6-28 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
software
development
costs
developers
debt
Boost Hybrid Cloud Strategy with Cloudera and comforte’s Data-Centric Security
Meta Description: Discover how data-centric security supports the hybrid cloud stra...
2024-6-28 00:45:14 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
cloudera
comforte
centric
VMware vCenter RCE Vulnerability: What You Need to Know
VMware, the virtualization technology giant owned by Broadcom, has recently released a...
2024-6-28 00:21:29 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
vcenter
nuspire
vsphere
network
Polyfill – Additional Analysis and Discovery: Signs of PII and Credential Harvesting, Broad Exposure through Digital Supply Chain
By Source Defense6.27.24 – Initial Findings (Additional Research will Include Updated Date Stamp)I...
2024-6-28 00:1:56 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
polyfill
exposure
malicious
security
The Evolving SSL/TLS Certificate Lifecycle & How to Manage the Changes
Certificates are dynamic security solutions within PKI, crucial for verifying identities and encryp...
2024-6-28 00:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
lifecycle
security
validity
periods
lifespans
Identity Gaps: The Need to Use Both x.509 & FIDO
Over the last month, several large organizations suffered from major cybersecurity breaches involvi...
2024-6-27 23:6:9 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
fido
cloud
phishing
security
snowflake
A Step-by-Step Guide to Getting a SOC 2® Report
Ensuring the security of your customers’ and partners’ data is paramount in today’s digital enviro...
2024-6-27 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
auditor
criteria
security
opinion
LogRhythm Partners with The National Museum of Computing to Preserve Technological Heritage and Promote Inclusion in the Cybersecurity Industry
LogRhythm is sponsoring TNMoC to bolster engagement in computing and recently held its Customer Adv...
2024-6-27 21:15:31 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
logrhythm
museum
tnmoc
inspire
Previous
135
136
137
138
139
140
141
142
Next