unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Strobes Integrates with Azure Repos: Enhancing Code Security
As software development reaches new heights, ensuring the security and management of your code is m...
2024-8-14 19:2:43 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
strobes
security
repos
development
NIST Releases Post Quantum Cryptography Standards
The National Institute of Standards and Technology (NIST) released its first three post-quantum cry...
2024-8-14 18:59:54 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
encryption
pqc
qkd
crystals
fips
Putting Threat Modeling Into Practice: A Guide for Business Leaders
Recognizing the value of threat modeling, a process that helps identify potential risks and threats...
2024-8-14 18:6:22 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
modeling
security
development
software
leaders
Update from the Ransomware Trenches
August 14, 2024Authors: Rui Ataide, Hermes BojaxhiGuidePoint’s DFIR team is frequently called upo...
2024-8-14 18:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
rhysida
hxxp
encryption
trojan
unverified
How LLMs are Revolutionizing Data Loss Prevention
Regarding large language models and data loss prevention, most discussions today revolve around the...
2024-8-14 17:34:30 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
dlp
llms
security
accurate
cloud
Scytale Leads the Way for the EU’s NIS2 Directive
Scytale announces full support for the NIS2 Directive, strengthening cybersecurity for...
2024-8-14 17:9:54 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
nis2
scytale
directive
security
Two Python Vulnerabilities Addressed in Ubuntu
Canonical has released critical security updates to address two vulnerabilities in Pyth...
2024-8-14 17:0:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
python
tuxcare
incorrect
Will GitOps Solve Configuration Security Issues?
More and more enterprises today are turning to GitOps as a way to better control and audit technolo...
2024-8-14 16:58:39 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
gitops
security
versioning
iac
identify
7 Essential Steps for Conducting a Vulnerability Assessment
A vulnerability assessment is one of the most critical components of an organization’s vulnerabilit...
2024-8-14 16:0:37 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
threats
conducting
Transform Your MSP’s Financial Future
Learn How Kaseya is Changing the Game for MSPsAs an MSP, you know how essential you...
2024-8-14 05:57:58 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
msps
msp
margins
profit
firms
Patch Tuesday Update – August 2024
CVE/AdvisoryTitleTagMicrosoft Severity RatingBase ScoreMicrosoft ImpactExploitedPublicly...
2024-8-14 04:33:15 | 阅读: 26 |
收藏
|
Security Boulevard - securityboulevard.com
windows
elevation
remote
microsoft
security
FBI Disrupts Operations of the Dispossessor Ransomware Group
The FBI and international law enforcement agencies have seized two dozen servers and nine domains b...
2024-8-14 04:7:26 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
lockbit
victim
USENIX Security ’23 – One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat
Authors/Presenters:Chao Wang, Yue Zhang, Zhiqiang Lin Many thanks to USENIX for publ...
2024-8-14 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
security
lin
nocookie
SBOMs Critical to Software Supply Chain Security
By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndi...
2024-8-14 02:42:22 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
sboms
developers
friedman
Gartner® Insights: Navigating the Evolving API Protection Market and Taking Action
Securing your API ecosystem is increasingly complex, leaving organizations unsure where...
2024-8-14 01:56:25 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
salt
posture
governance
evolving
WTH? DPRK WFH Ransomware Redux: 3rd Person Charged
North Korean army of remote IT workers enabled by Matthew Isaac Knoot, alleges DoJ.The U.S. Justi...
2024-8-14 01:55:0 | 阅读: 19 |
收藏
|
Security Boulevard - securityboulevard.com
north
korean
knoot
remote
wouldn
Randall Munroe’s XKCD ‘Meteor Shower PSA’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-8-14 01:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
ransomware
webinars
wth
3rd
Biden-Harris Campaign, Trump Operative Stone Also Target of Hackers
The case of the apparent hack of the Trump campaign continues to expand, with reports of both the B...
2024-8-14 00:52:48 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
trump
microsoft
iranian
stone
4 Executive Travel Vulnerabilities You May be Overlooking
Article Learn how to minimize the impact of vulnerabilities like social media use, private jet...
2024-8-14 00:29:33 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
travel
lgbtq
security
traveling
The Post-Quantum Cryptography Algorithms are finalized! Now what?
With the recent release from NIST about their final, published Post-Quantum Cryptography (PQC) alg...
2024-8-14 00:11:52 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
thales
pqc
sensors
security
network
Previous
91
92
93
94
95
96
97
98
Next