unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Part 3: The anatomy of supply chain attacks: Non-human identities & TPRM failure
“Identity is the new perimeter.” This catch phrase is present in almost every website of identity...
2024-2-7 21:6:23 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackers
identities
workshop
tprm
Menlo Security’s Global Channel Leader Todd Wilson Recognized as 2024 CRN® Channel Chief
Mountain View, CA, February 7, 2024 – Menlo Security, a leader in browser security, CRN® a brand o...
2024-2-7 21:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
menlo
security
crn
wilson
todd
Super Bowl of Passwords: Chiefs vs. 49ers in the Battle of Cybersecurity
As we approach Super Bowl LVIII, with the Kansas City Chiefs and the San Francisco 49ers vying for...
2024-2-7 20:3:30 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
security
attackers
enzoic
stuffing
Response to Ivanti’s Recent Zero-day Vulnerability Exploitation
On January 10, 2024, the software company Ivanti disclosed two vulnerabilities impac...
2024-2-7 17:55:41 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackiq
network
ivanti
remote
Navigating the ISO 27001 Certification Process: Step-by-Step
ISO-what now? Navigating ISO 27001 is tricky (to say the least), and it can easily feel like tryi...
2024-2-7 14:8:50 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
27001
security
isms
scytale
compliant
What is a Behavioral Risk Indicator? Demystifying Insider Risk Indicators
Insiders – the people with legitimate access to an organization’s data and systems – are the root c...
2024-2-7 13:0:26 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
insider
behavioral
indicator
dtex
correlated
Jenkins Arbitrary File Leak Vulnerability, CVE-2024-23897, Can Lead To RCE
IntroductionJenkins, a Java-based open-source automation server widely used by developers for appl...
2024-2-7 07:44:5 | 阅读: 44 |
收藏
|
Security Boulevard - securityboulevard.com
jenkins
23897
security
426
zscaler
Mastering SBOMs: Best practices
In our recent webinar, Mastering SBOMs: Best Practices, speakers, including Ilkka T...
2024-2-7 07:3:20 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
sboms
mastering
software
smith
Legit Security Named in the 2024 Gartner® Emerging Tech Impact Radar: Cloud-Native Platforms report
Legit Security Named a Sample Vendor for Software Supply Chain Security in the 2024 Gar...
2024-2-7 06:3:28 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
security
legit
software
development
radar
USENIX Security ’23 – Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai – PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’...
2024-2-7 04:0:0 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
authored
greybox
Identity Protection Action Items Following Midnight Blizzard Attack
In light of the Midnight Blizzard’s attack, it’s evident that our cybersecurity strateg...
2024-2-7 03:6:49 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
silverfort
midnight
blizzard
microsoft
Report Surfaces Extent of SaaS Application Insecurity
An analysis of how 493 organizations are employing software-as-a-service (SaaS) applica...
2024-2-7 02:10:42 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
finds
senderovitz
wing
involving
New Ivanti Connect Secure Zero-Day Exploited by Threat Actors
Software company Ivanti has recently raised the alarm about two new vulnerabilities imp...
2024-2-7 02:4:5 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
ivanti
nuspire
directive
gateways
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #277 – When Fixing a Legacy System
via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lau...
2024-2-7 02:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
agile
comic
nygaard
ratnaravi
handelman
The Spbglobal and Gocco Ransomware Incident and its Broader Implications
In a digital era where data breaches have become almost a daily occurrence, the recent ransomware a...
2024-2-7 01:52:15 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
constella
identities
gocco
spbglobal
Coro Named Best in Security Software by G2
Cybersecurity is a crowded space. You can blame all the attackers, and the havoc they create, for t...
2024-2-7 01:7:55 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
g2
coro
software
security
USENIX Security ’23 – Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, and Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran – HyPFuzz: Formal-Assisted Processor Fuzzing
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’...
2024-2-7 00:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
commitment
andersen
US Uses Visa Restrictions in Struggle Against Spyware
The United States will impose visa restrictions on foreign individuals who have been involving the...
2024-2-6 23:58:58 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
spyware
governments
software
visa
society
Generative AI in Software Testing and Quality Assurance Domain
What is Generative AI in QA : Generative AI is referred to an advance approach in testing that aug...
2024-2-6 23:18:29 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
generative
qa
mabl
software
requirement
2024 K8s Benchmark Report: The Latest Trends in Workload Reliability
According to Gartner, cloud computing will become an essential component of maintaining business co...
2024-2-6 23:15:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
kubernetes
workloads
liveness
probes
containers
Previous
263
264
265
266
267
268
269
270
Next