unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Alert: FBI Warns Of BlackCat Ransomware Healthcare Attack
In recent months, a concerning trend has emerged within the healthcare sector: the resurgence of Bl...
2024-3-12 15:0:45 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
ransomware
blackcat
security
network
Blog: Why Hackers Love Phones – Keep your Eye on the Device
This is the third article in a guest blog series from Intellyx. Catch up on the first article here...
2024-3-12 13:59:25 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
approov
phones
intellyx
Enable Sharing of Datamodel Acceleration Summaries between Search Heads
IntroductionIf you’re running Splunk Enterprise Security Suite, you are already leveraging accel...
2024-3-12 11:28:56 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
datamodels
summaries
heads
datamodel
Oh No! My JSON Keys and Values are Separated! How Can I Extract Them For My Searches?
Splunk will be able to parse the fields timestamp, level, message, user, user{}.id, user{}.username...
2024-3-12 11:28:53 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
donutid
mvindex
username
associate
GUEST ESSAY: A DIY guide to recognizing – and derailing – Generative AI voice scams
By Alexander KonovalovAmericans lost a record $10 billion to scams last year — and s...
2024-3-12 06:40:26 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
cloning
alexander
konovalov
security
unusual
Using AI to Reduce False Positives in Secrets Scanners
Get an overview of how secrets scanners work, and how Legit is dramatically reducing secret-scannin...
2024-3-12 04:28:9 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
scanners
positives
development
legit
rates
Introducing Salt Security’s New AI-Powered Knowledge Base Assistant: Pepper!
Going to a vendor’s Knowledge Base (KB) is often the first place practitioners go to ge...
2024-3-12 04:6:45 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
pepper
salt
security
navigating
answers
USENIX Security ’23 – PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis
Authors/Presenters: Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yi...
2024-3-12 03:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
3pv9s9o
yaoxuan
DARPA awards $1 million to Trail of Bits for AI Cyber Challenge
By Michael D. BrownWe’re excited to share that Trail of Bits has been selected as one of the seven...
2024-3-12 01:46:31 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
aixcc
crs
llms
trail
Announcing Our UK R&D Center and Data Centers in Canada and Germany
Coro’s customers deserve the strongest cybersecurity available. That’s why we’re excit...
2024-3-12 01:34:48 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
coro
centers
security
canada
GSA Small Business Office and FedRAMP PMO looking for Small Business Cloud Solutions
General Services Administration (GSA), Office of Small and Disadvantaged Business Util...
2024-3-12 01:19:42 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
fedramp
cloud
csps
stackarmor
pmo
Irony of Ironies: CISA Hacked — ‘by China’
U.S. Cybersecurity and Infrastructure Security Agency penetrated in February, via vuln in Ivanti.CI...
2024-3-12 01:17:53 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
security
ivanti
goblin
magnet
SBOMs and medical devices: An essential step — but no security cureall
The U.S. Federal Government has been hard at work releasing a plethora of guidelines — and mandates...
2024-3-12 01:12:34 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
software
fda
mdms
security
Randall Munroe’s XKCD ‘Earth/Venus Venn Diagram’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-3-12 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
irony
boulevard
ironies
Effective Supply Chain Risk Management
Whether we’re talking about mechanical components, or accounting software, countless b...
2024-3-12 00:56:48 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
vehicle
tier
jm
supplier
Phobos Unleashed: Navigating the Maze of Ransomware’s Ever-Evolving Threat
Threat Overview – PhobosThe Phobos Ransomware variant has been active since May of 201...
2024-3-12 00:10:30 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
phobos
hunt
windows
shadow
Threat Groups Rush to Exploit JetBrains’ TeamCity CI/CD Security Flaws
The cyberthreats to users of JetBrains’ TeamCity CI/CD platform continue to mount a week after the...
2024-3-11 23:7:30 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
jetbrains
rapid7
teamcity
USENIX Security ’23 – Yifan Yan, Xudong Pan, Mi Zhang, Min Yang – Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation
Home » Security Bloggers Network » USENIX Security ’23 – Yifan Yan, Xudong Pan, Mi Zhang, Min Yan...
2024-3-11 23:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
bloggers
network
Synthetic Identities, Synthetic Shoppers, and the Impact on eCommerce & Retail
Synthetic identity fraud continues to be a major point of concern for retailers. In fact, the Feder...
2024-3-11 22:28:6 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
synthetic
shoppers
retailers
shopper
ecommerce
Beware of OpenAI and ChatGPT-4 Turbo in Healthcare Orgs’ API Attack Surface
The rise of OpenAI and new changes with ChatGPT-4 Turbo will help to revolutionize the way healthca...
2024-3-11 22:0:24 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
chatgpt
cloud
healthcare
openai
Previous
177
178
179
180
181
182
183
184
Next