unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The New Era of SOCs: Simplifying Cybersecurity for SMBs
The cybersecurity landscape is undergoing a significant shift. Traditionally, security...
2024-9-17 15:13:24 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
smbs
unified
socs
Alert: Head Mare Associated With WinRAR Vulnerability Attack
As per recent reports, a threat actor group known as Head Mare has been linked with cyberattacks th...
2024-9-17 15:0:44 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
mare
winrar
sectors
russia
hacktivist
What is Cross-Site Scripting and How to Prevent it?
Cross-site scripting (XSS) is a web application vulnerability that enables an attacker to run malic...
2024-9-17 14:31:11 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
malicious
payload
attacker
security
MSSPs Say Client Communication Is Too Hard. Here’s How We’re Helping.
We recently published the results of our 2024 MSSP Survey, an exploration of the current state of t...
2024-9-17 06:59:49 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
client
mssps
soar
security
mssp
After CrowdStrike Crash, Microsoft Mulls New Windows Security Tools
Microsoft officials have been putting a focus on how security vendors and their software interacts...
2024-9-17 03:51:57 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
windows
microsoft
crowdstrike
summit
USENIX Security ’23 – AutoFR: Automated Filter Rule Generation for Adblocking
Monday, September 16, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsF...
2024-9-17 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
network
crash
A Personally Identifiable Cyber Jihadist Domain Portfolio
Hot TopicsAfter CrowdStrike Crash, Microsoft Mulls New Windows Security Tools A Personally I...
2024-9-17 01:53:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
comhxxp
orghxxp
nethxxp
palestine
infohxxp
Point Product vs. CDN for Bot Protection: Striking the Right Balance
Hot TopicsA Personally Identifiable Cyber Jihadist Domain Portfolio Point Product vs. CDN fo...
2024-9-17 01:44:42 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
threats
bots
security
specialized
cdns
The Intersection Between a Snowden Slide and a Supposedly Malicious MD5
This is from the “correct if I’m wrong but this is publicly accessible information so why shouldn’...
2024-9-17 01:35:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
mcee
security
hxxp
phoned
The Top 7 AlgoSec Alternatives
When evaluating alternatives to AlgoSec, it’s crucial to consider factors such as ease of use, scal...
2024-9-17 01:34:37 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
firemon
algosec
alto
Randall Munroe’s XKCD ‘Asteroid News’
Application Security Check Up ...
2024-9-17 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
Top 5 Enterprise Tufin Competitors
When evaluating Tufin software competitors, it’s crucial to consider factors such as ease of use, s...
2024-9-17 00:53:46 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
firemon
skybox
cloud
Harnessing the Power of GRC Software for Enhanced Business Resilience and Compliance
Have you ever tried to fix a leaky faucet only to discover that the whole plumbing system is outdat...
2024-9-17 00:50:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
grc
resilience
plumbing
processes
ensuring
Apple Seeks to Drop Its Lawsuit Against Spyware Maker NSO
Apple executives want to withdraw their three-year-old lawsuit against notorious spyware maker NSO...
2024-9-16 23:36:18 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
spyware
governments
suit
filed
lawsuit
Five Tools That Can Help Organizations Combat AI-powered Deception
The digital deception game is on track to becoming more intense. We’re talking about artificial int...
2024-9-16 23:34:57 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
watermarks
deepfake
blockchain
biased
deception
CVE-2024-8190: Investigating CISA KEV Ivanti Cloud Service Appliance Command Injection Vulnerability
On September 10, 2024, Ivanti released a security advisory for a command injection vulnerability fo...
2024-9-16 23:26:28 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
ivanti
php
injection
appliance
csa
Why Are So Many Public Sector Organizations Getting Attacked?
Hot TopicsWhy Are So Many Public Sector Organizations Getting Attacked? DORA Compliance Chec...
2024-9-16 23:13:31 | 阅读: 27 |
收藏
|
Security Boulevard - securityboulevard.com
security
phishing
stu
software
The Art of Translating Tech: A Guide to Creating Accessible Cybersecurity Content
In the rapidly evolving world of cybersecurity, effective communication is as crucial as the techn...
2024-9-16 23:8:36 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
audience
network
translating
security
DORA Compliance Checklist: From Preparation to Implementation
Think of the Digital Operational Resilience Act (DORA) as the EU’s way of making sure that financi...
2024-9-16 23:1:36 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
dora
ict
checklist
resilience
USENIX Security ’23 – Attacks are Forwarded: Breaking the Isolation of MicroVM-Based Containers Through Operation Forwarding
Monday, September 16, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsF...
2024-9-16 23:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
webinars
Previous
60
61
62
63
64
65
66
67
Next