unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Navigating the DORA Landscape with AttackIQ’s Automated Assessment
The financial services and insurance industries have always been in the center of targeted waves...
2024-8-6 20:35:21 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
dora
security
assessments
attackiq
Orca Security Extends Visibility Into the Cloud Security
Orca Security this week added an ability to classify cloud security threats in a way th...
2024-8-6 20:35:20 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
orca
geron
Minimizing the Impact of Ransomware in the Cloud
It’s no secret that ransomware is a critical threat in today’s business landscape. According to one...
2024-8-6 20:12:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ransomware
cloud
processes
mgm
I Have An SBOM, Now What ?!?
A Software Bill of Material (SBOM) lists the software components that are used in a piece of softwa...
2024-8-6 20:7:33 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
software
development
licensing
analysis
Cyber Risk Landscape Peer Report: 4 action items for your organization
Traditional measures to detect and respond to cyberattacks are inadequate to protect organizations...
2024-8-6 20:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
watkins
software
reduction
5 Best Practices for Managing Endpoints On a Global Scale
Managing hundreds or thousands of endpoints is hard enough when they’re all located in the same off...
2024-8-6 19:32:37 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
network
zones
geographic
distances
software
APIs, Web Applications Under Siege as Attack Surface Expands
Attackers are increasingly targeting web applications and APIs, with a nearly 50% year-over-year gr...
2024-8-6 16:34:58 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
development
injection
governance
How to Secure Your Organization from Shadow IT?
“Shadow IT” isn’t just a catchy term; it goes beyond official procedures. It also shows unmet emplo...
2024-8-6 14:24:3 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
cloud
kratikal
costs
7 Data Security Systems & Products Driving Value
In 2022, it’s not enough for businesses to rely on antivirus products or malware protection alone....
2024-8-6 12:42:39 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
symmetry
cloud
dataguard
operational
MSN: Russia takes aim at Sitting Ducks domains, bags 30,000+
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-8-6 05:26:53 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
gradient
Human vs AI Agents in Cybersecurity: Who Should Guard Your Data?
In the ever-evolving landscape of cybersecurity, we face a pivotal question: Should we entrust the...
2024-8-6 04:36:18 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
agents
threats
humans
hydra
USENIX Security ’23 – Gradient Obfuscation Gives a False Sense of Security in Federated Learning
Authors/Presenters:Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai Many t...
2024-8-6 03:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
jin
network
How Using a VPN May Benefit Your Privacy
In the title of this post, keep in mind the keyword is may; as a forewarning, this is not a post...
2024-8-6 01:30:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
network
unfamiliar
parties
security
tunnel
Randall Munroe’s XKCD ‘Exam Numbers’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-8-6 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
webinars
security
boulevard
ftc
TikTok Abuses Kids, say DoJ and FTC
U.S. Justice Dept. and Federal Trade Commission file lawsuit, alleging TikTok broke COPPA law.T...
2024-8-6 00:19:9 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
lawsuit
collecting
richi
kid
addressed
Black Hat Fireside Chat: Token’s wearable MFA solution combines PKI, biometrics — in a ring
By Byron V. AcohidoLAS VEGAS — Humans, unsurprisingly, remain the weak link in cybers...
2024-8-6 00:7:16 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
acohido
sensor
security
network
hardware
National Public Data Sued for Hack that Exposed Data of 2.9 Billion People
A class-action complaint has been filed against a background-check company in connection to a data...
2024-8-6 00:2:33 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
complaint
pii
plaintiff
court
plaintiffs
USENIX Security ’23 – FedVal: Different Good Or Different Bad In Federated Learning
Authors/Presenters:Viktor Valadi, AI Sweden; Xinchi Qiu, Pedro Porto Buarque de Gusmão,...
2024-8-5 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
buarque
USENIX Security ’23 – FedVal: Different Good Or Different Bad In Federated Learning
Authors/Presenters:Viktor Valadi, AI Sweden; Xinchi Qiu, Pedro Porto Buarque de Gusmão,...
2024-8-5 23:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
nicholas
valadi
Government Emails at Risk: Critical Cross-Site Scripting Vulnerability in Roundcube Webmail
Key InformationSonar’s Vulnerability Research Team recently discovered a critical Cro...
2024-8-5 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
roundcube
victim
attacker
maintainers
attackers
Previous
44
45
46
47
48
49
50
51
Next