unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Nisos: Top 5 Social Media Content Evasion Tactics
NisosNisos: Top 5 Social Media Content Evasion TacticsUsers spreading violative c...
2024-2-2 00:48:50 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
nisos
narratives
influence
amplify
malign
USENIX Security ’23 – TreeSync: Authenticated Group Management for Messaging Layer Security
Sponsorships AvailableAuthor/Presenters: Théophile Wallez, Inria Paris; Jonathan Protzenko, Benj...
2024-2-2 00:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
inria
paris
winner
benjamin
karthikeyan
Aim Security to Limit Exposure of Sensitive Data to Generative AI Services
Aim Security this week emerged from stealth to launch a platform that leverages large l...
2024-2-1 23:26:56 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
generative
getz
prompts
aim
security
The Who, What, and Why of API Specifications
Here at Cequence we have covered the ups and downs of API specs throughout the years. Discussions o...
2024-2-1 22:39:18 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
cequence
development
wizard
The State of Ransomware 2024
2024 has started out with the highest number of January attacks we’ve ever recorded, with 76 atta...
2024-2-1 22:32:24 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
claimed
claims
exfiltrated
cyberattack
Optimizing Data Lakes: Streamlining Storage with Effective Object Management
Data lakes are a popular solution for data storage, and for good reason. Data lakes are flexible an...
2024-2-1 22:26:58 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
unused
lake
lakes
monitoring
etl
Biden Will Veto Efforts to Spike SEC Breach Disclosure Rule
President Biden is warning Congressional Republicans that he will veto any attempts to overturn the...
2024-2-1 22:20:45 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
biden
investors
In 2023, Cybercriminals Were Still Using Social Engineering to Steal Your Credentials
Over my career as a security professional, I’ve seen firsthand what cyberadversaries can do. From h...
2024-2-1 22:0:14 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
phishing
behavioral
ueba
Cycode Discovers a Supply Chain Vulnerability in Bazel
Executive SummaryThe Cycode Research Team discovered a software supply chain vulnerability in one...
2024-2-1 21:58:22 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
github
bazel
cycode
composite
The Evolution of CAPTCHA & The Rise of Invisible Challenges
In the ever-evolving cybersecurity landscape, the struggle between humans and bots is constant. Inn...
2024-2-1 21:51:1 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
invisible
bots
captchas
captcha
humans
Understanding Gmail and Yahoo Error Codes
Google and Yahoo’s new sender requirements have come into force, and the two email giants have star...
2024-2-1 21:20:38 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
yahoo
dkim
550
dmarc
Is Your Remote Workforce Truly Safe? Three Reasons Zero-Trust is the Answer
When it comes to cybersecurity, it may be tempting to cut corners. After all, who thinks they will...
2024-2-1 21:0:8 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
remote
workforce
insider
principles
Lessons from the Mercedes-Benz GitHub source code leak
The German automotive giant Mercedes-Benz found itself on the wrong end of a software supply chain...
2024-2-1 21:0:0 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
mercedes
software
benz
github
Strengthening Cybersecurity in Local Government: How to Protect Networks Amid an Epidemic
February 1, 2024By: Randy Griffith, Senior Security Consultant, Strategy and RiskIn the ever-e...
2024-2-1 18:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
cloud
monitoring
CISA and FBI Warn of AndroxGh0st Malware Threat
CISA and FBI have jointly issued a warning about the threat posed by AndroxGh0st malware, emphasizi...
2024-2-1 17:0:8 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
androxgh0st
cloud
tuxcare
posed
The True Cost of Employee Fraud
In a shocking disclosure last week, the respected Eugene Weekly, a 40-year-old newspaper with a cir...
2024-2-1 16:46:55 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
governance
eugene
security
weekly
newspaper
Trends and Innovations in Enterprise Live Patching Services for Cybersecurity
Live patching plays a vital role in helping enterprises stay secureLive patching is becoming c...
2024-2-1 16:0:58 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
tuxcare
innovations
GitHub Vulnerability: Key Rotation Amid High-Severity Threat
In recent developments, GitHub, a Microsoft-owned subsidiary, has taken proactive measures to addre...
2024-2-1 15:0:22 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
github
security
ghes
codespaces
injection
ESG Research Unearths Critical Insights for Future-Proofing Encryption and Key Management
ESG Research Unearths Critical Insights for Future-Proofing Encryption and Key Manageme...
2024-2-1 13:14:19 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
encryption
strategic
security
cloud
esg
Stopping Credential Stuffing Attacks: We Need to Do Better
Do you know what 23andMe, Jason’s Deli, North Face, and Hot Topic have in common? They’...
2024-2-1 08:23:52 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
stuffing
passwords
attackers
wallarm
reused
Previous
268
269
270
271
272
273
274
275
Next