unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Navigating Cybersecurity Budget Constraints for K-12 Schools
K-12 education is one of the most targeted industries for ransomware. Damage can include permanent...
2024-2-6 05:38:57 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
schools
security
budget
coro
CVE-2024-21893: Another Ivanti Vulnerability Exploited in the Wild. Verify with NodeZero Today!
On 22 January, Ivanti published an advisory stating that they discovered two new, high-...
2024-2-6 04:27:19 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
ivanti
21893
nodezero
zta
horizon3
USENIX Security ’23 – FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets
Authors/Presenters: Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chu...
2024-2-6 04:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
marc
yuqing
Migrate Off That Old SIEM Already!
This is cross-posted from Google Cloud Community site, and written jointly with Dave Herrald.If yo...
2024-2-6 03:11:41 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
migration
security
migrate
cloud
migrations
CFO Deepfake Fools Staff — Fakers Steal $26M via Video
Spearphish pivots to deepfake Zoom call, leads to swift exit of cash.A poor peon in the...
2024-2-6 02:28:15 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
deepfake
richi
kong
hong
deepfakes
Survey Surfaces Willingness to Switch Data Protection Platforms
A survey of 1,200 IT leaders conducted by Veeam Software suggests expectations of what a modern dat...
2024-2-6 02:14:45 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
respondents
ransomware
quarter
suggests
Beyond the basics: advanced insights into secrets management challenges
Cybersecurity is high stakes, and secrets management is the bedrock upon which your security archit...
2024-2-6 02:8:30 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
kubernetes
entro
encryption
threats
Breach analysis: Cloudflare falls victim to Okta attack
In a not-so-surprising turn of events, one of the victims in Okta’s supply chain attack reveals fu...
2024-2-6 01:58:41 | 阅读: 22 |
收藏
|
Security Boulevard - securityboulevard.com
astrix
okta
security
attackers
breached
Five Lessons from the Microsoft Identity Breach
Written by Adam KoblentzIn my last post, I briefly recapped Microsoft’s recent identity compromi...
2024-2-6 01:41:27 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
security
identities
lesson
okta
CSO’s Guide: Water-Tight Account Security For Your Company
In today's escalating threat landscape, account takeover and credential compromise remain top atta...
2024-2-6 00:58:2 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
logins
deception
Top 2024 Scams: The top predicted scams for this year
What to doBefore acting on a video or audio request, think of the tone of the message. Did the wor...
2024-2-5 23:43:42 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
elderly
security
boss
How to Protect Against Supply-Chain Attacks | ARIA Cybersecurity
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-2-5 23:18:27 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
Top Trends in Cybersecurity, Ransomware and AI in 2024
According to research from VMware Carbon Black, ransomware attacks surged by 148% during the onset...
2024-2-5 23:0:58 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
defenses
security
threats
AnyDesk Revokes Certificates, Urges Password Changes After Attack
Remote access software maker AnyDesk has revoked all security-related certificates and is urging us...
2024-2-5 22:40:24 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
passwords
resecurity
executives
Home Network Security for Corporate Executives and Board Members: A Necessity for Remote Work Cybersecurity
The importance of robust home network security for board members and corporate executives cannot be...
2024-2-5 22:15:35 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
executives
network
remote
Key Considerations for NIST 800-53 Control Family Selection
As an information security professional, you understand the critical importance of selecting the r...
2024-2-5 22:6:33 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
families
scytale
personnel
Improving the state of Cosmos fuzzing
By Gustavo GriecoCosmos is a platform enabling the creation of blockchains in Go (or other languag...
2024-2-5 22:0:53 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cosmos
simulation
elapsed
execs
fuzzer
Are Passwords Killing Your Customer Experience?
In Mel Brooks’ 1987 parody Spaceballs, the password for the infamous “air shield” guarding the plan...
2024-2-5 22:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
consumers
security
passkeys
Secureworks Applies Multiple Forms of AI to Assess Threat Risks
Secureworks has added a threat score capability that leverages artificial intelligence...
2024-2-5 21:19:26 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
falkenhagen
threats
expertise
secureworks
Two Practical Examples of Modern Cloud SecOps
We started this series detailing the major ways cloud affects SecOps before delving into updating o...
2024-2-5 20:0:26 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
secops
cloud
tooling
security
responder
Previous
265
266
267
268
269
270
271
272
Next