unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
What is Network Pen Testing?
With cyber threats constantly evolving, protecting your network’s security is important. Net...
2024-4-26 11:47:37 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
network
security
threats
emerging
RSAC 2024 Innovation Sandbox | The Future Frontline: Harmonic Security’s Data Protection in the AI Era
The RSA Conference 2024 will kick off on May 6. Known as the “Oscars of Cybersecurity,” the RSAC I...
2024-4-26 09:57:5 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
harmonic
efficiency
innovation
generative
How to Migrate from FedRAMP Rev 4 to FedRAMP Rev 5
The stereotype of the government as a slow-moving behemoth is not ill-fitting, but when it makes ad...
2024-4-26 08:22:4 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
fedramp
csps
ato
security
transition
NodeZero: Testing for Exploitability of Palo Alto Networks CVE-2024-3400
On April 12 (and then updated again on April 20), Palo Alto Networks released an advisory about a v...
2024-4-26 05:39:47 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
nodezero
palo
alto
pan
horizon3
Understanding the Change Healthcare Breach and Its Impact on Security Compliance
Healthcare ransomware incidents are far too common, but none have wreaked as much havoc as the rec...
2024-4-26 05:24:21 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
security
claims
hitrust
Why Zero Trust is a Must for Strong Corporate Governance
Gone are the days of delegating technology and cybersecurity concerns to be solved sole...
2024-4-26 04:0:55 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
governance
csf
strategic
leadership
Securing CI/CD Pipelines: The Role of Workload Identity Federation
Increased Attack SurfaceLong-lived credentials stored in CI/CD pipelines increase an organization’...
2024-4-26 03:50:21 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
workload
federation
lived
security
pipelines
Quick Guide to the OWASP OSS Risk Top 10
CVEs, or known and cataloged software vulnerabilities, dominate the discussion about open source so...
2024-4-26 03:7:53 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
developers
security
software
cves
N.A. Developers Optimistic About Generative AI and Code Security
Developers in North America are more likely than their counterparts in other regions to see generat...
2024-4-26 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
generative
development
security
developers
USENIX Security ’23 – LibScan: Towards More Precise Third-Party Library Identification for Android Applications
Authors/Presenters: *Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang...
2024-4-26 03:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
siqi
cong
Defending Against ArcaneDoor: How Eclypsium Protects Network Devices
IntroductionIn coordination with multiple government agencies, Cisco announced yesterday the disco...
2024-4-26 02:59:16 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
arcanedoor
network
security
eclypsium
dancer
MDR Can Make an Impact on Cyber Insurance
Over the past few years, cyberattacks have increased in number and complexity, and the cost to rec...
2024-4-26 02:58:14 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
mdr
insurance
insurers
dwell
cyberattack
AI Adoption Prompts Security Advisory from NSA
The National Security Agency (NSA) has issued a report warning of the risks from insecurely deploye...
2024-4-26 02:39:24 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
fowler
christman
crucial
AI Data Poisoning: How Misleading Data Is Evading Cybersecurity Protections
You’d be hard-pressed to find a cybersecurity provider that doesn’t tout its AI-based defenses as a...
2024-4-26 02:38:15 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
kasada
harvested
poisoning
defenses
Nemesis 1.0.0
In August of last year, @tifkin_, @0xdab0, and I released Nemesis, our offensive data enrichment pl...
2024-4-26 02:28:18 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
nemesis
helm
chart
hasura
c2
How Momentum is Building for the US Government to Play a Larger Role in Protecting K12 Schools from Cyberattacks
Ransomware (a type of malicious software designed to block access to a computer system or encrypt f...
2024-4-26 02:24:52 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
schools
security
k12
council
The Role of Threat Intelligence in Financial Data Protection
As the financial industry increasingly adopts digital processes, it faces a growing array of cybers...
2024-4-26 01:3:50 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
monitoring
Randall Munroe’s XKCD ‘Pendulum Types’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-4-26 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
usenix
Architecting Cyber Resilience: Building Your Breach and Attack Simulation Program
In recent years, breach and attack simulation (BAS) has gained significant traction among enterpri...
2024-4-26 00:32:52 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
bas
safebreach
regeneron
humana
Watch: “Behavior Doesn’t Lie:” The Power of ML for Identity Threat Detection and Response
Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular b...
2024-4-25 23:54:34 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
jim
pam
combat
accurately
Previous
188
189
190
191
192
193
194
195
Next