unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Navigating Retail: Overcoming the Top 3 Identity Security Challenges
As retailers compete in an increasingly competitive marketplace, they invest a great deal of resour...
2024-6-18 13:33:41 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
retail
silverfort
retailers
lateral
Key Takeaways From Horizon3.ai’s Analysis of an Entra ID Compromise
As enterprises shift from on-premises to cloud systems, hybrid cloud solutions have be...
2024-6-18 08:59:27 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
entra
cloud
microsoft
t1003
hypr
Enhancing Enterprise Browser Security
TechSpective Podcast Episode 133 Nick Edwards, Vice President of Product Management a...
2024-6-18 06:1:34 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
bradley
tony
nick
Chariot Continuous Threat Exposure Management (CTEM) Updates
Our engineering team has been hard at work, reworking our flagship platform to enhance the Chariot...
2024-6-18 05:19:4 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
chariot
praetorian
exposure
ctem
identify
From Risk to Resolution: OX Security’s Integrations with KEV and EPSS Drive Smarter Vulnerability Prioritization
In June 2023, a critical vulnerability (CVE-2023-34362) in the MOVEit Transfer file transfer softwa...
2024-6-18 03:54:5 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
kev
security
exploited
ox
APIs: The Silent Heroes of Data Center Management
In the intricate ecosystem of data center operations, managing and optimizing infrastructure is a...
2024-6-18 03:38:5 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
dcim
software
innovation
strategic
planning
USENIX Security ’23 – No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting
Authors/Presenters:Leo Stone, Rishi Ranjan, Stefan Nagy, Matthew Hicks Many thanks t...
2024-6-18 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
leo
publishing
Randall Munroe’s XKCD ‘Broken Model’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-6-18 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
usenix
boulevard
Leveraging ASNs and Pivoting to Uncover Malware Campaigns
Identifying and Mitigating Complex Malware Campaigns with ASNsThis week, I spent a good deal o...
2024-6-18 00:0:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
asns
cti
uncover
pivoting
hyas
Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing
Revolutionizing Cybersecurity with NodeZero™ for Comprehensive Risk Assessment and PrioritizationT...
2024-6-17 23:53:45 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
nodezero
security
autonomous
Open Source Licensing 101: Everything You Need to Know
Open-source software has revolutionized the tech industry, fostering collaboration, innovation, an...
2024-6-17 23:17:17 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
software
permissive
copyleft
patent
gpl
Four Common Firewall Misconfigurations That Give Access To Bad Actors
When Jody Brazil first launched FireMon, it was out of necessity to log firewall po...
2024-6-17 22:5:46 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
woods
firemon
network
Leadership Expansion: Introducing Our New SVP of Sales and SVP of Customer
It’s an exciting time here at Hyperproof! We are thrilled to announce that two new sen...
2024-6-17 22:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
hyperproof
mike
jay
svp
hussein
Finding mispriced opcodes with fuzzing
By Max AmmannFuzzing—a testing technique that tries to find bugs by repeatedly executing test case...
2024-6-17 21:0:43 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
fuel
corpus
fuzzer
harness
sway
Mobile SDK Security: Effective Testing Methodology
In mobile penetration testing, third-party modules or libraries are often considered out of scope f...
2024-6-17 20:54:12 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
analysis
encryption
Optimizing SCA Use in CI Pipelines for Advanced DevSecOps
With the continuously accelerating speed of application development, integrating DevSecOps automati...
2024-6-17 20:44:34 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
deepfactor
security
jenkins
integrating
The Ultimate Guide to Troubleshooting Vulnerability Scan Failures
Vulnerability scans evaluate systems, networks, and applications to uncover security vulnerabilitie...
2024-6-17 19:35:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
failures
requirement
Using LLMs to Exploit Vulnerabilities
Interesting research: “Teams of LLM Agents can Exploit Zero-Day Vulnerabilities.”Abst...
2024-6-17 19:8:19 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
agents
llm
planning
schneier
Ubuntu 23.10 Reaches End of Life on July 11, 2024
Ubuntu 23.10, codenamed “Mantic Minotaur,” was released on October 12, 2023, nearly nine months ago...
2024-6-17 17:0:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
interim
tuxcare
kernelcare
upgrading
How Automated Linux Patching Boosts Healthcare Security
Healthcare organizations worldwide are facing a surge in cyberattacks.The healthcare industry is...
2024-6-17 16:0:53 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
security
patient
tuxcare
Previous
91
92
93
94
95
96
97
98
Next