unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
A Step-by-Step Guide to Securely Upgrading Your EKS Clusters
As an agile open source project, Kubernetes continues to evolve, as does the cloud computing landsc...
2024-4-22 23:30:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
kubernetes
eks
plane
upgrades
clusters
USENIX Security ’23 – The Case for Learned Provenance Graph Storage Systems
Authors/Presenters: *Hailun Ding, Juan Zhai, Dong Deng, and Shiqing Ma*Many thanks to...
2024-4-22 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
bloggers
4qp3oxyd5ba
Do You Really Think You Can Truly “Start UGLY” To Fight Innovation
“Starting ugly” in the context of launching a digital product generally means releasing a basic, of...
2024-4-22 22:45:46 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ugly
software
startups
ishir
innovation
How will SB 1047 Impact Bay Area AI Startups
The state of California has consistently positioned itself at the forefront of technological innov...
2024-4-22 22:38:15 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
development
1047
bay
innovation
california
Biometrics: A Flash Point in AI Regulation
According to proprietary verification data from Onfido (now a part of Entrust), deepfak...
2024-4-22 21:59:34 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
biometrics
biometric
deepfakes
entrust
bias
Dependency Confusion Vulnerability Found in an Archived Apache Project
Get details on the Legit research team’s discovery of a dependency confusion vulnerability in an ar...
2024-4-22 21:4:29 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
confusion
archived
software
harness
The 10 Women in Cybersecurity You Need to Follow
As I get ready to present RAD Security as one of the 10 finalists for the RSA Conferenc...
2024-4-22 21:0:13 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
founder
cloud
fortune
Cloud Security Stories: From Risky Permissions to Ransomware Execution
In the sprawling cloud infrastructure of GlobalTech Inc., a meticulously planned ransomware attack...
2024-4-22 20:10:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
globaltech
cloud
kms
security
encryption
Story 1: Removing super-admin tokens across 33 GitHub tenants in 2 hours
Join Astrix customers as they lead the non-human identity security frontier in this series “The As...
2024-4-22 18:54:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
astrix
github
nhi
expiration
Understanding Spectre V2: A New Threat to Linux Systems
Recently, researchers uncovered a significant threat dubbed Spectre v2, a variant of the notorious...
2024-4-22 17:0:22 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
spectre
tuxcare
security
speculative
bhi
The Essential KVM Cheat Sheet for System Administrators
The virsh command is used for managing guest virtual machines. You can start, stop, reboot, and g...
2024-4-22 16:0:27 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
virsh
machine
vms
cheat
Click Fraud: What it is & How it Works
What is click fraud?Click fraud happens when someone or something clicks an ad, button, or link w...
2024-4-22 16:0:15 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
advertisers
bots
publisher
clicks
publishers
GUEST ESSAY: Here’s why securing smart cities’ critical infrastructure has become a top priority
By Zac AmosCritical infrastructure like electrical, emergency, water, transportation...
2024-4-22 15:33:48 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cities
water
plant
security
TA547 Phishing Attack: German Companies Hit With Infostealer
Researchers at Proofpoint have found out that the TA547 phishing attack campaigns have...
2024-4-22 15:0:16 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ta547
phishing
german
infostealer
Scytale’s Multi-Framework Cross-Mapping: Your Shortcut to a Complete Compliance Program
In the world of compliance, where the landscape is as diverse as it is complex, companies often fi...
2024-4-22 14:50:40 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
scytale
security
27001
shortcut
compliant
10 Essentials Every Anti-Phishing Course Must Have
In August 2023, Russian threat actors targeted several government agencies worldwide with Microsoft...
2024-4-22 11:19:14 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
security
simulations
learners
cybeready
What is HSM Integration?
HSM Integration refers to the process of incorporating a Hardware Security Module (HSM...
2024-4-22 08:30:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
hsm
hsms
akeyless
ensuring
Akira Ransomware Group Takes In $42 million from 250 Attacks in a Year
The Akira ransomware has been around for just more than a year, but has caused its share of damage,...
2024-4-22 07:57:9 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
akira
ransomware
encryption
windows
security
USENIX Security ’23 – On the Security Risks of Knowledge Graph Reasoning
Authors/Presenters: *Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu...
2024-4-21 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
publishing
sspxsbmgqao
Review: ‘Artificial Intelligence — A Primer for State and Local Governments’
A new book by Alan Shark offers an excellent guide and an AI road map for state and lo...
2024-4-21 17:51:10 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
lohrmann
governments
shark
artificial
Previous
193
194
195
196
197
198
199
200
Next