unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Coming Soon: NEW Classroom Manager by ManagedMethods
Classroom Manager is purpose-built for K-12 cybersecurity, safety, and complianceAt ManagedMethods...
2024-8-16 00:45:17 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
classroom
teachers
scenes
A Gap in the Armor: What Was Missing from Black Hat 2024
Along with 30,000+ of my closest friends, HYAS participated in both the Black Hat 2024 cyber se...
2024-8-16 00:0:19 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
hyas
talking
security
network
resiliency
Don’t Mess With Texas Privacy: AG Sues GM for $18 BILLION
“General Motors has engaged in egregious business practices that violated Texans’ privacy … in unth...
2024-8-15 23:41:35 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
gm
texas
paxton
selling
richi
NIST Releases First Post-Quantum Encryption Algorithms
From the Federal Register:After three rounds of evaluation and analysis, NIST selected four algor...
2024-8-15 23:37:42 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
crystals
encryption
fips
schneier
dsa
5 SecOps automation challenges — and how to overcome them
A confluence of factors is driving the need for greater automation of security operations centers (...
2024-8-15 23:36:52 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
pandey
secops
processes
passi
USENIX Security ’23 – Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations
Regular vulnerability assessments/pen testingAutomated security testing within CI/CD pipelinesC...
2024-8-15 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
assessments
security
hoc
formal
pipelines
How to Maximize Network Security With AI and ML
There is an increased focus on how advances in artificial intelligence (AI) and machine learning (M...
2024-8-15 21:50:57 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
threats
datasets
evolving
DEF CON Calls for Cybersecurity Volunteers to Defend Critical Infrastructure
DEF CON conference organizations are looking for volunteers to join a Franklin initiative to help s...
2024-8-15 21:17:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
initiative
defend
expertise
braun
Zero Compromise with Content Disarm and Reconstruction (CDR), Powered by Zscaler Browser Isolation and Votiro
Authors: Amit Jain and Eric Avigdor Files are the core of business operations, whether your e...
2024-8-15 21:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
votiro
threats
zscaler
security
cdr
Google: Iranian Group APT42 Behind Trump, Biden Hack Attempts
The bad actors behind the hacks of the Biden-Harris and Trump campaigns is an Iranian-backed threat...
2024-8-15 20:59:45 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
apt42
trump
phishing
iranian
biden
Balbix Recognized in Three 2024 Gartner® Hype Cycle™ Reports
Gaurav BangaGaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several com...
2024-8-15 20:53:46 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
gaurav
banga
served
career
intellisync
TracFone Breach Underscores Critical Need for Mobile Carrier API Security
The recent Federal Communications Commission (FCC) settlement with TracFone Wireless, I...
2024-8-15 20:0:1 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
salt
carrier
tracfone
carriers
Your Employees are Already Using GenAI. How Will You Communicate the Security Risks?
Did you know that 75% of people are already using Generative AI (GenAI) at work? GenAI tools are de...
2024-8-15 19:47:26 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
genai
phishing
security
llm
The Key Components of HRIPA Compliance
Data breaches and privacy concerns are all too common today. That’s why the Australian Health Recor...
2024-8-15 19:36:16 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
hripa
healthcare
deceased
principles
patients
Beyond Zero-Trust: The Impact of Adaptive Micro-Segmentation on Network Security
Today’s organizations need new methods to fortify their network and contain cyberthreats that are g...
2024-8-15 18:12:31 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
adaptive
posture
If you query the legacy DNSBLs via GoDaddy move to Spamhaus Technology’s free Data Query Service
Currently accessing the free legacy DNS Blocklists (DNSBLs) via the Public Mirrors, and using GoDad...
2024-8-15 18:0:13 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
spamhaus
security
dnsbls
godaddy
network
GRIT Ransomware Report: July 2024
August 15, 2024Additional contributors to this report: Jason Baker, Justin Timothy, Ryan Silver, a...
2024-8-15 18:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
grit
affiliates
victim
lockbit
Human Error – An Overlooked Aspect of Cyber Risk
The dependence on digital infrastructure has made cybersecurity solutions an absolute n...
2024-8-15 17:45:13 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
phishing
ransomware
software
Patching Recent Linux Kernel Vulnerabilities with KernelCare
Several security vulnerabilities were discovered in the Linux kernel. These issues could potentiall...
2024-8-15 17:0:47 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
kernelcare
tuxcare
memory
Hackers Use BingoMod Android RAT For Fraudulent Transactions
Recent media reports have cited cybersecurity researchers discovering a new Android remote access t...
2024-8-15 15:0:56 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
bingomod
remote
fraudulent
security
Previous
89
90
91
92
93
94
95
96
Next