unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – Automated Security Analysis of Exposure Notification Systems
Authors/Presenters:Kevin Morio, Ilkan Esiyok, Dennis Jackson, Mozilla; Robert Künnemann...
2024-8-13 03:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
presenters
ilkan
DOJ Shuts Down Another North Korean ‘Laptop Farm’
Federal law enforcement is continuing to target participants in ongoing North Korean schemes to get...
2024-8-13 02:50:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
north
korean
knoot
hired
operatives
CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz
IntroductionOn August 5, 2024, researchers at SonicWall discovered a zero-day security flaw in Apac...
2024-8-13 01:11:50 | 阅读: 23 |
收藏
|
Security Boulevard - securityboulevard.com
38856
36104
ofbiz
security
Randall Munroe’s XKCD ‘Vice President First Names’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-8-13 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
shuts
Privacy Risks in Google’s New Play Store Personalization
Personolization is a double edged sword. On one hand, it enhances user experiences by...
2024-8-13 00:46:49 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
dmcc
competition
dma
approov
News alert: Criminal IP and Maltego team up to broaden threat intelligence data search
Torrance, Calif., Aug. 12, 2024, CyberNewsWire — Criminal IP, an expanding Cyber Thre...
2024-8-13 00:14:43 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
criminal
maltego
spera
marketplace
visualize
AppViewX Automated Certificate Management for PingAccess
In today’s rapidly evolving digital landscape, ensuring the security of web applications is essenti...
2024-8-12 23:20:53 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
appviewx
avx
pingaccess
security
renewal
USENIX Security ’23 – DISTDET: A Cost-Effective Distributed Cyber Threat Detection System
Authors/Presenters:Feng Dong, Liu Wang Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo...
2024-8-12 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
luo
presenters
HYAS Investigates Threat Actors Hidden In Gaming Services
Threat Intelligence ReportDate: August 12, 2024Prepared by: David Brunsdon, Threat Intelligen...
2024-8-12 22:36:12 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
gg
reverse
hyas
playit
ply
How to Achieve POPIA Compliance: Complete Checklist
Ready to tackle POPIA compliance? If you’re navigating the data protection maze in South Africa, y...
2024-8-12 22:21:10 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
popia
achieving
regulator
engage
checklist
Trump Campaign Hack Points to Growing U.S. Election Threats
The apparent hack of ex-President Trump’s campaign, allegedly by Iranian bad actors, comes just as...
2024-8-12 22:20:1 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
election
iranian
trump
russia
elections
The Value in Root Cause Analysis for Vulnerability Management
Since the publishing of common vulnerabilities and exposures (CVEs) began more than 20 years ago, t...
2024-8-12 22:10:8 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
development
cves
Criminal IP and Maltego Collaborate to Broaden Threat Intelligence Data Search
Torrance, United States / California, August 12th, 2024, CyberNewsWireCriminal IP, an expanding C...
2024-8-12 22:0:20 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
criminal
maltego
spera
visualized
analysis
Survey: Cybersecurity Teams Investing in Automation to Reduce Noise Levels
A global survey of 300 IT and security professionals suggests that while security budgets are incre...
2024-8-12 20:59:4 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
respondents
noise
ctem
AI Integration, Budget Pressures Challenge CISOs
Chief information security officers (CISOs) are struggling to manage cybersecurity effectively due...
2024-8-12 17:56:28 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cisos
cios
security
ctos
How Outdated Security Measures Can Devastate Your Organization
In today’s digital world, data exfiltration is a stealthy threat that often flies under the radar....
2024-8-12 17:3:27 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
transfers
seceon
subtle
Addressing Tomcat Vulnerabilities in End-of-Life Ubuntu Systems
Apache Tomcat is a widely used open-source web server and servlet container, but like any software,...
2024-8-12 17:0:41 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
tuxcare
attacker
remote
Crowdstrike, or “How to Own the Planet”
I recently wrote about reliable software. I also usually write about cybersecurity and major incide...
2024-8-12 16:0:9 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
crowdstrike
software
windows
security
tuxcare
MY TAKE: Black Hat USA 2024’s big takeaway – GenAI factors into the quest for digital resiliency
LAS VEGAS – Here’s what I discovered last week here at Black Hat USA 2024: GenAI is very much in...
2024-8-12 15:42:21 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
aspm
software
genai
USENIX Security ’23 – VulChecker: Graph-based Vulnerability Localization in Source Code
Authors/Presenters:Yisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthe...
2024-8-11 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
lee
george
Previous
93
94
95
96
97
98
99
100
Next