unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Guide: What is FedRAMP Tailored and What is The Difference?
In the past, we’ve talked a lot about the various FedRAMP guidelines required to reach either a sin...
2024-5-24 09:10:47 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
tailored
fedramp
cloud
moderate
Optimizing CI/CD Security: Best Practices for a Robust Software Delivery Pipeline
Tools Workload IAM automatically manages access. Secrets management tools such as AWS Secrets Mana...
2024-5-24 05:42:1 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
workload
monitoring
developers
Ad Protect: Mastering the Detection of Bot-Driven Ad Fraud
Digital ad fraud is taking billions out of marketing budgets, highlighting the need for precise det...
2024-5-24 05:35:20 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
datadome
clicks
bots
advertisers
fraudulent
Leading LLMs Insecure, Highly Vulnerable to Basic Jailbreaks
There are significant security concerns in the deployment of leading large language models (LLMs),...
2024-5-24 05:16:39 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
llms
security
ringel
safeguards
caspi
Business Entities
Product Update: Version 4.4We’re thrilled to share Version 4.4 release with new feature update...
2024-5-24 04:56:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
outlet
circuits
outlets
associate
Apple API Allows Wi-Fi AP Location Tracking
Apple location service returns far more data than it should to people who have no business knowing...
2024-5-24 03:27:22 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
bssids
rye
nearby
wps
richi
USENIX Security ’23 – AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel Objects
Authors/Presenters:Ruipeng Wang, Kaixiang Chen, Chao Zhang, Zulie Pan, Qianyu Li, Silia...
2024-5-24 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
authored
originating
GitHub Issues Patch for Critical Exploit in Enterprise Server
A critical vulnerability in the GitHub Enterprise Server (GHES), a self-hosted version of GitHub, h...
2024-5-24 02:26:41 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
sso
github
assertions
Deep Dive: How to Improve Kubernetes Management with IaC Tools
In container orchestration, Kubernetes has become the go-to solution for deploying and managing con...
2024-5-24 01:19:23 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
kubernetes
cloud
iac
atlantis
clusters
Randall Munroe’s XKCD ‘Exponential Growth’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-5-24 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
primum
oath
The WAF Oath: Primum Non Nocere | Impart Security
I have found at least one common theme while working with different WAF solutions over the past 17...
2024-5-24 00:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
positives
threshold
detections
wafs
tuning
Automata in Action: New Vulnerabilities Discovered in HP UEFI
Eclypsium has discovered new vulnerabilities in a particular Unified Extensible Firmware Interface...
2024-5-24 00:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
getvariable
security
char16
grs
Who Will Control Our AI Future? A Guide to Power, Influence, and Responsible AI Development
Artificial Intelligence (AI) has permeated our world, from tailored online experiences...
2024-5-23 23:25:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
development
governments
innovation
regulations
influence
What’s the State of Identity Assurance Today? Recap of the 2024 Report
Identity security is at a crossroads. As digital transformation accelerates, organizations are inc...
2024-5-23 23:7:28 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
hypr
assurance
USENIX Security ’23 – A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel
Authors/Presenters: Guoren Li, Hang Zhang, Jinmeng Zhou, Wenbo Shen, Yulei Sui, Zhiyun...
2024-5-23 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
situated
What America’s Federal Privacy Bill Means for Data Protection
After years of false starts, the US is edging closer to a federal data privacy law....
2024-5-23 22:44:19 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
comforte
closer
syndicated
bipartisan
Navigating Compliance Frameworks with Deepfactor: PCI DSS, SOC2, and NIST 800-53
Security compliance frameworks have witnessed an increased adoption over the last few decades to ca...
2024-5-23 21:0:18 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
deepfactor
soc2
dss
Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques
May 23, 2024NTLM (NT LAN Manager) relaying is an attack technique that has been around for years y...
2024-5-23 20:50:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
client
loaded
babysteps
win11
22h2
Hospitals Hacked: Urgent Care Needed
In recent research by Veriti, a significant cyber security breach at Change Healthcare highlighted...
2024-5-23 20:48:45 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
security
veriti
regional
operational
Personal AI Assistants and Privacy
Microsoft is trying to create a personal digital assistant:At a Build conference even...
2024-5-23 19:0:36 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
trustworthy
schneier
understood
biases
security
Previous
166
167
168
169
170
171
172
173
Next