unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-Source Software Components Using Code Classification Techniques
Authors/Presenters:Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh Many thanks to U...
2024-8-10 23:0:0 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
choi
anaheim
Move From FedRAMP to DoD with Impact Level Assessment
We’ve written extensively before about FedRAMP’s impact levels. As a brief refresher, there are fou...
2024-8-10 08:20:55 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
dod
fedramp
security
moderate
cloud
Cyber attacks 2024: The biggest attacks of the first half of 2024
Use these patterns to your advantage, by integrating the stories into upcoming conversations and wo...
2024-8-10 03:45:54 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
takeaways
london
drugs
healthcare
USENIX Security ’23 – Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities
Authors/Presenters:Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Era...
2024-8-10 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
publishing
presenter
Sonatype’s summer webinar series: Future cybersecurity requirements
Sonatype kicked off its Summer of Software Regulations & Compliance webinar series...
2024-8-10 03:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
regulations
webinar
kicked
Behind the Scenes at Black Hat 2024
Another year, another Black Hat USA! It was an amazing few days engaging with colleagues, reconnect...
2024-8-10 02:18:14 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
swimlane
lyborg
ciso
joined
HPE Infuses AI Into Network Detection and Response Platform
Hewlett Packard Enterprise (HPE) this week at the Black Hat USA 2024 conference extended its networ...
2024-8-10 01:45:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
hpe
security
network
aruba
Aqua Security Researchers Disclose Series of AWS Flaws
Aqua Security this week at the Black Hat USA 2024 conference revealed that it has discovered six vu...
2024-8-10 01:7:52 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
aqua
Randall Munroe’s XKCD ‘University Age’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-8-10 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
aqua
Preview of State of GitHub Actions Security Report: Security of GH Workflows Building Blocks
Understand the security status of GitHub Actions workflows and how to mitigate the risk.We recentl...
2024-8-9 23:23:33 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
github
security
workflows
runners
runner
USENIX Security ’23 – Trojan Source: Invisible Vulnerabilities
Authors/Presenters:Nicholas Boucher, Ross Anderson Many thanks to USENIX for publish...
2024-8-9 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
authored
nocookie
The Role of Microsegmentation in Kubernetes Environments
Optimizing Kubernetes security and efficiency of through granular controlKubernetes stands out as...
2024-8-9 21:59:45 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
kubernetes
security
network
Trail of Bits’ Buttercup heads to DARPA’s AIxCC
With DARPA’s AI Cyber Challenge (AIxCC) semifinal starting today at DEF CON 2024, we want to introd...
2024-8-9 21:10:29 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
buttercup
competition
aixcc
Cybersecurity Insights with Contrast CISO David Lindner | 8/9/24
Insight #1As I watch the sea of news out of Black Hat, from CrowdStrike fallout t...
2024-8-9 21:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
lindner
analysis
powers
responseis
Exploring the dynamic landscape of cybersecurity threats
Hello, My name is Chen, and I work as a threat intelligence analyst at Salt Security. Every day, I...
2024-8-9 20:0:2 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
cves
salt
threats
Automated vs Manual: Web Penetration Testing
Penetration testing plays a key role in evaluating a company’s infrastructure security, and this bl...
2024-8-9 18:46:36 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
analysis
kratikal
testers
Entrust distrust: How to move to a new Certificate Authority
Entrust, a once-trusted Certificate Authority (CA), has faced a significant setback as Google and M...
2024-8-9 16:29:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
entrust
sectigo
security
lifecycle
transition
7 Types of Intrusion Detection Systems that Identify Network Anomalies
With so much sensitive data now online, network safeguarding has become a big industry. In 2023, th...
2024-8-9 16:0:52 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
network
security
threats
anomalies
idss
PowerDMARC Integrates with SecLytics for Predictive Threat Intelligence Analysis
Reading Time: 5 minPredictive threat intelligence data is vital in cyber attack detection as it...
2024-8-9 15:26:34 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
seclytics
malicious
threats
analysis
predictive
CrowdStrike Alert: Phishing Attacks Targets German Customers
In a recent turn of events, CrowdStrike has issued a warning pertaining to an unfamiliar threat act...
2024-8-9 15:0:15 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
crowdstrike
phishing
malicious
german
spear
Previous
39
40
41
42
43
44
45
46
Next