unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked
“UNC5537” breached at least 165 Snowflake instances, including Ticketmaster, LendingTree and, alleg...
2024-6-11 23:15:47 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
snowflake
lendingtree
unc5537
mandiant
richi
File Integrity Monitoring vs. File Activity Monitoring: Which is Best?
2024 has already been a tumultuous year for information security.Verizon’s 2024 Da...
2024-6-11 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
network
monitoring
cimcor
security
criminal
USENIX Security ’23 – HECO: Fully Homomorphic Encryption Compiler
Authors/Presenters:Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi Many...
2024-6-11 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
handelman
patrick
‘cors-parser’ npm package hides cross-platform backdoor in PNG files
‘cors-parser’ is neither a cure for Cross-Origin Resource Sharing (CORS) vulnerabil...
2024-6-11 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
cure
sharma
employs
authored
Verizon DBIR 2024: The rise in software supply chain attacks explained
The Verizon Data Breach Investigations Report (DBIR) is considered to be one of the leading annual...
2024-6-11 22:33:27 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
verizon
dbir
rl
Securing the Unseen: Protecting Sensitive Information in Highly Regulated Industries
Businesses live and die by their data. It drives decision-making, enhances customer experiences, an...
2024-6-11 21:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
ddr
industries
threats
regulated
security
The Policy Blocklist: what is it, and why should you be on it?
It’s not always “bad” to be listed on one of Spamhaus’ DNS Blocklists. Despite what you...
2024-6-11 21:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
spamhaus
blocklist
pbl
dnsbl
authored
Risks of poor PKI management
Public Key Infrastructure (PKI) is essential for businesses to maintain data security and protect d...
2024-6-11 19:38:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
revocation
operational
processes
Recent glibc Vulnerabilities and How to Protect Your Linux System
The GNU C Library, commonly known as glibc, is a critical component in many Linux distributions. It...
2024-6-11 17:0:3 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
nscd
tuxcare
security
library
Software Supply Chain Risks ⎪Cassie Crossley (VP Supply Chain Security, Schneider Electric)
Understanding and mitigating software supply chain risks and vulnerabilities has never been more c...
2024-6-11 16:32:14 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
governance
cassie
development
RSAC Fireside Chat: Ontinue ups the ‘MXDR’ ante — by emphasizing wider automation, collaboration
By Byron V. AcohidoCompanies that need to protect assets spread across hybrid cloud i...
2024-6-11 15:55:53 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ontinue
mxdr
security
haydon
Case Study: How Sungage Financial improved their application security within 1 week
Sungage Financial is dedicated to financing a sustainable future for homeowners across the United...
2024-6-11 15:42:15 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
sungage
evan
software
APT28 HeadLace Malware Targeting European Networks Unveiled
In recent months, a series of cyber onslaughts have shaken networks across Europe, with the insidio...
2024-6-11 15:0:23 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
apt28
headlace
european
security
A Comprehensive Guide to API Penetration Testing
What is API Penetration Testing?API penetration testing, or API pentesting, is a specialised form...
2024-6-11 07:21:6 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
injection
What is Mobile Application Penetration Testing: Benefits & Tools
Mobile applications are ubiquitous, but their security can be a concern. Unlike web applications, i...
2024-6-11 07:11:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
analysis
identify
attackers
Cloud Penetration Testing: Tools, Methodology & Prerequisites
Businesses increasingly migrate to cloud-based solutions for storage, applications, and critical fu...
2024-6-11 06:39:15 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
weaknesses
attackers
The Tolly Group Report Highlights SlashNext’s Gen AI-Powered Email Security Prowess
In the ever-evolving landscape of cyberthreats, email remains a prime target for malicious actors,...
2024-6-11 05:44:37 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
slashnext
security
threats
phishing
bec
Growing Cyber Threats Amid Israel-Palestine Tensions
Growing Cyber Threats Focus on Ransomware, Infostealers, and DefacementsThis blog cont...
2024-6-11 05:5:5 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
israel
defacements
defaced
handala
Ghostwriter v4.2
Ghostwriter v4.2: Project Documents & Reporting EnhancementsAfter April’s massive Ghostwriter v4....
2024-6-11 04:1:29 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
ghostwriter
jinja2
templating
specterops
The Critical Role of Autonomous Penetration Testing in Strengthening Defense in Depth
A Modern Approach to Comprehensive CybersecurityDefense in Depth (DID) is crucial in cybersecurity...
2024-6-11 03:21:15 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
nodezero
jon
threats
Previous
152
153
154
155
156
157
158
159
Next