unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation
Authors/Presenters: *Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel G...
2024-4-20 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
presenters
shahin
SafeBreach Coverage for AA24-109A (Akira Ransomware)
Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach On April 18th, the United Sta...
2024-4-20 02:56:25 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
akira
ransomware
windows
mimikatz
safebreach
Taking Time to Understand NIS2 Reporting Requirements
The newest version of the European Union Network and Information Systems directive, or NIS2, came i...
2024-4-20 01:53:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
nis2
security
directive
imperva
Daniel Stori’s ‘WC’
via the inimitable Daniel Stori at Turnoff.US!Permalink*** This is a Security B...
2024-4-20 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
inimitable
authored
geek
permalink
USENIX Security ’23 – Inductive Graph Unlearning
Authors/Presenters: *Cheng-Long Wang, Mengdi Huai, Di Wang*Many thanks to USENIX for...
2024-4-19 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
tj6
outstanding
From DAST to dawn: why fuzzing is better solution | Code Intelligence
Security testing allows you to evaluate the robustness of applications and systems...
2024-4-19 22:52:45 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
dast
security
attackers
weaknesses
software
Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24
Insight #1One of the most significant errors an organization can make is assuming...
2024-4-19 21:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
smbs
lindner
prevalent
Scaling Application Security With Application Security Posture Management (ASPM)
Did you know that the total number of data breaches more than tripled between 2013 and 2022? These...
2024-4-19 19:51:53 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
aspm
cloud
posture
development
Crunching Some Numbers on PHP Support
PHP Extended Lifecycle Support (ELS) allows you to continue using older versions of PHP while still...
2024-4-19 16:0:45 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
php
security
tuxcare
ensuring
crunching
Google Chrome DBSC Protection Tested Against Cookie Attacks
In light of cookie stealing attacks and to ensure Chrome browser protection, Google has recently pi...
2024-4-19 15:0:58 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
dbsc
chrome
security
malicious
What is SOC 2 Compliance Audit?
Our digital world is based on connectivity, but with that comes great responsibility. Businesses ma...
2024-4-19 13:31:50 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
auditor
audits
commitment
The Dark Side of EDR: Repurpose EDR as an Offensive Tool
Endpoint detection and response (EDR) solutions have become a key component of many enterprise end...
2024-4-19 12:30:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cortex
security
ransomware
bypass
lua
NTA Email Alert Configuration
There are two separate email configurations on NTA which do not affect each other. One...
2024-4-19 10:12:48 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
nta
network
threshold
protects
The Ultimate Guide to SBIR and STTR Program Budgeting
The world advances based on innovation, and innovation can come from anywhere. The trouble is that...
2024-4-19 08:42:5 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sbir
sttr
funding
fund
innovation
Finding Losses in Gains: Loss of Funds in Forks of Gains Network
SummaryDuring a recent exploration of a fork of Gains Network, we discovered two critical issues...
2024-4-19 08:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
openprice
gains
pairindex
trader
profit
Vulnerabilities for AI and ML Applications are Skyrocketing
The number of AI-related Zero Days has tripled since November 2023, according to the latest finding...
2024-4-19 05:1:16 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
salvati
adoption
tooling
Cheap ‘Junk-Gun Ransomware’ Emerging on the Dark Web
Headlines about ransomware in recent years has focused on the most prolific gangs like LockBit, Bla...
2024-4-19 04:36:36 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
junk
gun
sophos
cheap
Companies Didn’t Prioritize Third-Party Sources of CVEs, Here’s What Happened
Last December, Veracode reported that more than a third of Java applications still use vulnerable v...
2024-4-19 04:1:36 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
azul
log4j
cves
log4shell
What Makes Containers Vulnerable?
When looking for sensitive information and other valuable assets, attackers rarely access their tar...
2024-4-19 03:4:15 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
containers
network
mend
USENIX Security ’23 – NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers
Authors/Presenters: *Yehuda Afek and Anat Bremler-Barr, Shani Stajnrod*Many thanks to...
2024-4-19 03:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
bremler
marc
Previous
140
141
142
143
144
145
146
147
Next