unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How CTI Analysts Use Threat-Informed Defense to Overcome Top Challenges
Recently, I introduced you to our heroes of Threat-Informed Defense. They comprise ou...
2024-8-22 02:30:0 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
cti
informed
security
tidal
threats
Enhance Your Identity Governance and Administration Strategy
As organizations increasingly depend on digital tools to drive productivity, managing...
2024-8-22 01:52:25 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
governance
security
shadow
grip
iga
Randall Munroe’s XKCD ‘Ferris Wheels’
Application Security Check Up ...
2024-8-22 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
What’s New in CodeSonar 8.2
CodeSonar 8.2 is a significant upgrade, containing new features and integrations, impro...
2024-8-22 00:31:36 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
codesonar
codesecure
misra
upgraded
download
CrowdStrike Threat Hunting Report Reveals Growing Stealth of Insider Threats
Hot TopicsThe Great Cloud Security Debate: CSP vs. Third-Party Security Tools Backdoor in RF...
2024-8-21 23:34:37 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
insider
crowdstrike
dtex
security
insiders
How Pen Testing is Evolving and Where it’s Headed Next
The last thing a thriving company needs is to be blindsided by a cyberattack — especially when ther...
2024-8-21 23:5:14 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackers
blindsided
USENIX Security ’23 – ICSPatch: Automated Vulnerability Localization And Non-Intrusive Hotpatching In Industrial Control Systems Using Data Dependence Graphs
Wednesday, August 21, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsF...
2024-8-21 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
webinars
boulevard
Patch Tuesday not Done ’til LINUX Won’t Run?
“Something has gone seriously wrong.” You can say that again, Microsoft.Redmond Reboot ReduxWhat’s...
2024-8-21 22:34:47 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
windows
dual
sbat
richi
HITRUST vs SOC 2: Navigating the Complexities of Data Security and Compliance
The world is becoming increasingly more tech-driven, so having solid data security and compliance...
2024-8-21 21:32:38 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
hitrust
healthcare
regulations
security
industries
Survey Surfaces Growing SaaS Application Security Concerns
A survey of 300 application and software development, IT and security leaders finds nearly half (45...
2024-8-21 20:53:21 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
nathan
sanctioned
threats
conducted
Hybrid API Security: The Best of Both Worlds
In API security, organizations frequently encounter a tough decision: whether to opt fo...
2024-8-21 20:0:1 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
salt
scalability
premises
cloud
A misuse of Spamhaus blocklists: PART 1 – blocking outbound email
One issue our folks handling tickets submitted by blocked users experience are messages like: Help!...
2024-8-21 20:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
spamhaus
blocklists
dnsbl
rejecting
security
Time to Upgrade: Linux Kernel 6.9 is End of Life
After nearly three months, Linux kernel 6.9 has officially reached the end of life on August 2nd, 2...
2024-8-21 17:0:55 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
tuxcare
eol
fedora
NSFOCUS Honored as a Representative Vendor in Gartner’s 2024 Market Guide for Security Threat Intelligence Products and Services
SANTA CLARA, Calif., August 21, 2024 – We are thrilled to announce that NSFOCUS has been recognized...
2024-8-21 16:17:28 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
The Zenbleed Vulnerability: How to Protect Your Zen 2 CPUs
The Zenbleed vulnerability exploits a flaw in the speculative execution mechanism of AMD Zen 2 CPU...
2024-8-21 16:0:19 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
zenbleed
processors
security
zen
speculative
Security Alert: U.K. Political Donation Sites at Risk
Hot TopicsSurvey Surfaces Growing SaaS Application Security Concerns Hybrid API Security: Th...
2024-8-21 15:31:45 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
donation
datadome
donations
donors
McAfee Unveils Tool to Identify Potential Deep Fakes
McAfee today added a tool to detect deep fakes to its portfolio, that will initially be...
2024-8-21 14:43:27 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
mcafee
pcs
fakes
grobman
involving
Why I Joined Balbix: Embracing the AI-Powered Future of Cybersecurity
After spending over 15 years in the cybersecurity field, working across various roles, and witnessi...
2024-8-21 08:53:47 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
balbix
security
bhatia
svp
intricacies
Black Hat USA 2024: Key Takeaways from the Premier Cybersecurity Event
The annual pilgrimage to Las Vegas for Black Hat USA 2024 has concluded, and as always, it did not...
2024-8-21 04:5:35 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
software
threats
USENIX Security ’23 – CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
Home » Security Bloggers Network » USENIX Security ’23 – CipherH: Automated Detection of Cipherte...
2024-8-21 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
bloggers
network
Previous
84
85
86
87
88
89
90
91
Next