unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How Kratikal Helps Businesses Prevent Cyber Attacks?
The rise in cyber attacks has become a major worry. This issue is for organizations where data stor...
2024-1-27 13:46:44 | 阅读: 45 |
收藏
|
Security Boulevard - securityboulevard.com
kratikal
security
cloud
Cybersecurity Standards vs Procedures vs Controls vs Policies
Cybersecurity is a vast and complex field, and it’s made more complicated as technology – both infr...
2024-1-27 04:43:17 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
security
processes
ideals
USENIX Security ’23 – Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, and Luyi Xing – Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels
Hot TopicsCybersecurity Standards vs Procedures vs Controls vs Policies USENIX Security ’23...
2024-1-27 04:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
yue
hot
DevSecOps maturity model: A beginner’s guide
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-1-27 03:59:19 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
Zero-day Confluence RCE Vulnerability Blocked by Contrast Runtime Security | CVE-2023-22527 | Contrast Security
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-1-27 03:19:18 | 阅读: 48 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
yue
boulevard
What is DMARC?
With the rising volume of fraudulent emails and AI-enhanced phishing scams, industry giants such as...
2024-1-27 02:10:0 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
dmarc
reject
security
phishing
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #276 – Bringing Business and IT Together
Hot TopicsCybersecurity Standards vs Procedures vs Controls vs Policies USENIX Security ’23...
2024-1-27 02:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
agile
comic
nygaard
mikkel
luxshan
Cyber security and AI: Should machines be included in your training program?
The way AI stores data is a huge concern. As security managers, it makes sense that we are hesitant...
2024-1-27 01:5:36 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
chatgpt
situations
jargon
gpt
New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying
Table of ContentsRansomware BansPayment RatesTypes of RansomwareAttack Vectors & TTPsIndustrie...
2024-1-27 00:47:5 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
victim
ban
network
q4
USENIX Security ’23 – POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices
Hot TopicsCybersecurity Standards vs Procedures vs Controls vs Policies USENIX Security ’23...
2024-1-27 00:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
zhu
yue
security
xing
haojin
Novel Threat Tactics, Notable Vulnerabilities, Current Trends, and Data Leaks
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecu...
2024-1-26 23:56:48 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
software
microsoft
ransomware
novel
QR Code Scammers are Changing Tactics to Evade Detection
Check Point researchers last year saw a 587% increase between August and September of phishing atta...
2024-1-26 22:53:37 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
qr
fuchs
victim
security
90 Days of Learning, Good Surprises and Extreme Optimism
January is often a time for reflection, and setting goals and aspirations for the months and the ye...
2024-1-26 22:48:59 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
salt
security
capital
threats
Why We Need to Cultivate a Confidential Computing Ecosystem
Researchers have been working on solutions for runtime security for years now. Computing data and d...
2024-1-26 22:0:13 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
cloud
hardware
Cybersecurity Insights with Contrast CISO David Lindner | 1/26/24
Insight #1Spray and pray: That’s the modus operandi behind the latest successful attack agains...
2024-1-26 22:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
lindner
syndicated
pray
modus
Web Vulnerability Submissions Exploded in 2023
There was an alarming surge of user-submitted web vulnerability submissions in 2023—with a 30% incr...
2024-1-26 21:0:25 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
submissions
scoped
guenther
Chatbots and Human Conversation
For most of history, communicating with a computer has not been like communicating with a person. I...
2024-1-26 20:9:45 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
chatbots
schneier
openai
New and challenging risks in 2024
A recent Global Risk Perception Survey released by the World Economic Forum (WEF) highlighted a bar...
2024-1-26 19:20:4 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
safepaas
economic
governance
decade
committees
Weekly Blog Wrap-Up (January 22- January 25, 2023)
Welcome to the TuxCare Weekly Blog Wrap-Up – your go-to resource for the latest insight...
2024-1-26 16:0:20 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
tuxcare
network
weekly
Collaboration Achievement: NSFOCUS and China University of Geosciences Article Secures Spotlight in Acclaimed Journal TIFS
In a recent achievement, the paper BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis, a...
2024-1-26 15:42:18 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
security
geosciences
journal
tifs
Previous
273
274
275
276
277
278
279
280
Next