unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Guarding Your Business: A Guide to Employee Training for Cybersecurity Vigilance
Protecting your business from scams and cybersecurity threats not only bolsters your bu...
2024-3-14 04:4:6 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
guarding
security
vigilance
USENIX Security ’23 – Guangke Chen, Yedi Zhang, Zhe Zhao, Fu Song – QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Wednesday, March 13, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsFe...
2024-3-14 03:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
bloggers
webinars
network
Envisioning a mobile-powered government workforce
ATARC’s Future of Secure Work Working Group, of which Privoro’s Heather McMahon is...
2024-3-14 02:37:9 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
privoro
workforce
security
seamlessly
envisioning
Interview: How Awareness Training Protects Schools from Cyberattacks
When it comes to strengthening the cyber defenses of a K12 school or university, the size of softwa...
2024-3-14 02:33:31 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
schools
security
coro
k12
Microsoft’s February 2024 Patch Tuesday Addresses 2 Zero-Days and 73 Vulnerabilities
Microsoft’s Patch Tuesday for March 2024 has once again highlighted the importance of r...
2024-3-14 01:13:45 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
nuspire
security
tuesday
Randall Munroe’s XKCD ‘Physics vs. Magic’
via the comic artistry and dry wit of Randall Munroe, creator of XKCDPermalink*...
2024-3-14 01:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
bloggers
marc
dry
munroe
Google Splashes the Cash in Bug Bounty Bonanza: $59 Million to Date
Last year, $GOOG paid $10 million to ethical hackers for finding vulnerabilities.Google...
2024-3-14 00:57:9 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
richi
vrp
ethical
jennings
Security Flaws within ChatGPT Ecosystem Allowed Access to Accounts On Third-Party Websites and Sensitive Data
Salt Labs researchers identified generative AI ecosystems as a new interesting attack vector. vulne...
2024-3-14 00:50:30 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
chatgpt
attacker
victim
security
pluginlab
JetBrains Says Rapid7’s Fast Release of Flaw Details Harmed Users
JetBrains is continuing to criticize Rapid7’s policy for disclosing vulnerabilities its researchers...
2024-3-14 00:18:41 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
jetbrains
rapid7
gallo
coordinated
Summoning RAGnarok With Your Nemesis
I hope I’m Not Too LateWith the explosion of large language model (LLM) use, everyone is rushing t...
2024-3-14 00:18:29 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
nemesis
llm
embedding
ragnarok
reranker
The Macros Playbook: Maximizing Benefits, Minimizing Risks
Macros have become essential in business for automating tasks, improving accuracy, and customizing...
2024-3-13 23:38:30 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
macros
software
security
development
malicious
Don’t Miss These Emerging Trends in Cloud Application Security
Get details on trends and best practices in cloud application security.As businesses rapidly integ...
2024-3-13 23:35:12 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
development
software
emerging
USENIX Security ’23 – Dilawer Ahmed, Aafaq Sabir, Anupam Das – Spying Through Your Voice Assistants: Realistic Voice Command Fingerprinting
Wednesday, March 13, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsFe...
2024-3-13 23:0:0 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
bloggers
network
Motion Picture Association Updates Cybersecurity Best Practices
The motion picture industry is a high-profile, multi-billion industry that has been targeted by sop...
2024-3-13 22:0:51 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
mpa
motion
ericom
film
sony
Secure your blockchain project from the start
Systemic security issues in blockchain projects often appear early in development. With...
2024-3-13 21:0:45 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
stage
development
blockchain
trail
Building a Security Culture of Shared Responsibility
With the growing awareness and realization that human error is the root cause behind three-quarters...
2024-3-13 21:0:45 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
attitudes
leaders
leadership
perpetuity
New Phishing Campaign Delivers Remote Access Trojans (RATs)
Sophisticated phishing campaign leverages public services, where remote access Trojans are being de...
2024-3-13 20:36:54 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
vcurms
malicious
trojans
SVG Files Abused in Emerging Campaigns
By Max GannonScalable Vector Graphic files, or SVG files, are image files that have become an adv...
2024-3-13 20:30:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
autosmuggle
xworm
malicious
tesla
download
How Real-Time Personal Cybersecurity and Botnet Detection Protects Corporate Executives
The specter of botnet infections looms large over corporate executives, posing not just a threat to...
2024-3-13 20:15:17 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
executives
security
blackcloak
threats
Phishing Threats Rise as Malicious Actors Target Messaging Platforms
As messaging apps continue to gain popularity, threat actors are exploiting a combination of trust,...
2024-3-13 20:0:34 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
becenti
malicious
security
threats
Previous
229
230
231
232
233
234
235
236
Next