unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Google and Yahoo DMARC Requirement: Answering Your Webinar Questions
In our recent webinar, “Email Revolution: Meeting Google and Yahoo’s DMARC Requirement for 2024,” w...
2024-2-27 19:18:45 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
dmarc
spf
dkim
reject
Several OpenJDK Vulnerabilities Fixed
Recently, several vulnerabilities have been discovered in the OpenJDK Java runtime, which may resul...
2024-2-27 17:0:13 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
graalvm
openjdk
deployments
sandboxed
5 Benefits of Identity and Access Management
As remote work extends its footprint through technologies like virtual private networks (VPNs), vir...
2024-2-27 16:12:50 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
identities
remote
sso
governance
How to fix “No SPF record found” in 2024?
Reading Time: 7 minGetting the “No SPF Record Found” error means that your domain is missing an...
2024-2-27 16:2:43 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
spf
powerdmarc
specifies
dmarc
Weak or Misconfigured Multi-Factor Authentication (MFA) Methods
This article is part of a series where we look at a recent NSA/CISA Joint Cybersecurity...
2024-2-27 16:0:24 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
emerging
Bumblebee Malware Targets US Businesses With New Methods
A recent report revealed that, four months after its sudden disappearance, the notorious Bumblebee...
2024-2-27 15:0:17 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
bumblebee
tuxcare
qakbot
bazaloader
Identity first: Best Practices of B2B IAM
Identity first: Best Practices of B2B IAMmadhavTue, 02/27/2024 – 05:18In today’s ev...
2024-2-27 13:18:5 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
identities
b2b
thales
NSFGPT: A Large Model for Security Applications that Attracts Gartner’s Attention
NSFGPT is a large security model tailored for the security industry, based on the Security Large La...
2024-2-27 09:30:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
nsfgpt
efficiency
generative
network
Malicious Packages in npm, PyPI Highlight Supply Chain Threat
Threat groups continue to look to open source software repositories to launch supply-chain attacks,...
2024-2-27 06:6:7 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
malicious
software
phylum
developers
pypi
USENIX Security ’23 – Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions
Authors/Presenters: Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, Christop...
2024-2-27 04:0:0 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
trent
Save Time and Steps with Ignyte’s Control Inheritance Automation
If you are managing multiple GRC frameworks for multiple environments, then you know how powerful...
2024-2-27 02:50:14 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
inheritance
ignyte
security
ccp
enclave
Making Companies Whole: The Impact of Cyber Insurance on Materiality
Monday, February 26, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsFe...
2024-2-27 02:40:6 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
Randall Munroe’s XKCD ‘Light Leap Years’
via the comic artistry and dry wit of Randall Munroe, creator of XKCDPermalink*...
2024-2-27 02:0:0 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
artistry
permalink
syndicated
2897
USENIX Security ’23 – Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom – The Gates of Time: Improving Cache Attacks with Transient Execution
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s...
2024-2-27 00:0:0 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
william
LockBit Ransomware Group Returns After Law Enforcement Operation
The LockBit ransomware group is swinging back days after U.S. and UK law enforcement agencies annou...
2024-2-26 23:14:35 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
lockbit
ransomware
trial
doj
affiliates
The xSPM Trend: Security Posture Management for Everything
Before we dive into the xSPM trend, let’s define what security posture management (SPM) is. SPM ref...
2024-2-26 23:0:15 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
xspm
cloud
kubernetes
Profiling the xDedic Cybercrime Service Enterprise
The popular cybercrime-friendly xDedic service was recently shut down and in this a...
2024-2-26 22:17:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
investhost
comname
xdedic
responding
253
Lost to the Highest Bidder: The Economics of Cybersecurity Staffing
For about a decade, much has been written about the scarcity of qualified cybersecurity talent. The...
2024-2-26 22:0:32 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
talent
staffing
retain
Circomspect has been integrated into the Sindri CLI
By Jim MillerOur tool Circomspect is now integrated into the Sindri command-line inter...
2024-2-26 22:0:2 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
circomspect
sindri
circuits
developers
circom
Report: Cyberattacks Against Software Supply Chains Become More Targeted
An analysis of 203 million files spanning three million software packages conducted by Phylum, a pr...
2024-2-26 21:37:31 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
software
developers
malicious
security
phylum
Previous
245
246
247
248
249
250
251
252
Next