unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Black Basta Extortion Group Racks Up $107 Million in Ransom Payments
Anyone who wonders why the threat of ransomware continues to grow need only to take a look at Black...
2023-12-1 00:27:5 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
basta
ransomware
corvus
elliptic
qakbot
Secure IT onboarding and offboarding checklists
Ensuring the security of an organization’s data, assets, and secrets has become more important than...
2023-12-1 00:4:39 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
onboarding
offboarding
entro
threats
Life in the Swimlane with Senior Customer Success Manager, Sylina Barwick
Welcome to the “Life in the Swimlane” blog series. Here we will feature interviews with Swimlaners...
2023-12-1 00:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
swimlane
florida
passionate
enjoy
denver
DEF CON 31 – Tomer Bar’s And Omer Attias’s ‘Defender Pretender When Windows Defender Updates Become A Security Risk’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-1 00:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
workloads
failures
designing
software
The AI executive order: What AppSec teams need to know
The White House’s sweeping executive order (EO) on artificial intelligence has put the onus on sof...
2023-11-30 23:39:44 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
eo
software
rose
developers
The Elephant in AppSec Podcast⎥Lack of effective DAST tools⎥Aleksandr Krasnov (Meta, Thinkific, Dropbox)
Welcome to the Elephant in AppSec, the podcast to explore, challenge, and boldly face the AppSec E...
2023-11-30 22:36:38 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
dast
developers
semgrep
yeah
Don’t Waste Budget on Application Security (AppSec) Testing Tools like DAST, SAST, and SCA that Aren’t Working | Contrast Security
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-11-30 22:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
servicing
What Is The Cyber Kill Chain? Process & Model
Grasping the Fundamentals: A Study of the Cyber Harm LadderNavigating the multifaceted universe of...
2023-11-30 21:8:18 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
harm
victim
threats
payload
ladder
Different Types of CISOs, Diverse Missions
I have been having a lot of discussions recently about what is going on with the CISO profession, s...
2023-11-30 21:0:57 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
ciso
chief
officer
cisos
Choosing the Right Microsoft Dynamics 365 Consulting Services
Licenses and Product Line: Find a group with industry experience, Microsoft certification, and res...
2023-11-30 20:51:30 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
dynamics
peoplactive
microsoft
consulting
strategic
AZT: From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.
Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show note...
2023-11-30 19:30:36 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
yeah
hector
monsegur
neal
elliot
A Pocket Guide to Multi-Channel Phishing Defense
Imagine this scenario, highlighting the need for multi-channel phishing defense: Your company’s Fi...
2023-11-30 16:30:26 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
security
bolster
malicious
attackers
Service Account Protection Is a Necessity, not a Luxury
The role of service accounts in today’s complex enterprise environment cannot be overstated. These...
2023-11-30 16:13:55 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
osterman
operational
network
AlmaLinux Under the Hood: Key Features Every System Administrator Should Know
System administrators face the continuous challenge of ensuring reliability, security, and efficien...
2023-11-30 16:0:37 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
almalinux
security
ensuring
tuxcare
lifecycle
Marketers’ Guide To Inboxing In 2024: Meet And Beat The New Sender Requirements
Google and Yahoo are shaking up the email marketing game, and it’s time to get in on the action.Th...
2023-11-30 15:10:19 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
recipients
easydmarc
unsubscribe
yahoo
DarkCasino WinRAR Exploit: A New APT Threat Emerges
In a recent cybersecurity revelation, a formidable and highly sophisticated cyber threat has surfac...
2023-11-30 15:0:35 | 阅读: 18 |
收藏
|
Security Boulevard - securityboulevard.com
darkcasino
winrar
phishing
darkme
Apache ActiveMQ Jolokia Remote Code Execution Vulnerability (CVE-2022-41678) Notification
OverviewRecently, NSFOCUS CERT found a remote code execution vulnerability in Apache ActiveMQ Jolo...
2023-11-30 14:24:8 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
activemq
security
jolokia
network
remote
Detecting AiTM Phishing Sites with Fuzzy Hashing
BackgroundIn this blog, we will cover how Obsidian detects phishing kits or Phishing-as-a-Service...
2023-11-30 04:55:50 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
erp
phishing
fuzzy
tlsh
tycoon
DEF CON 31 – Mark Colaluca’a And Nick Saunders’ ‘Defending KA-SAT’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-11-30 04:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
workloads
failures
designing
redundant
Strengthening Cybersecurity to Enhance Compliance: The Splunk and CrowdStrike Advantage
In today’s digital age, businesses constantly face unprecedented cybersecurity challenges. The ever...
2023-11-30 03:42:58 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
crowdstrike
threats
falcon
Previous
328
329
330
331
332
333
334
335
Next