unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Announcing the 2025 State of Application Risk Report
Use the data and analysis in this report to prioritize your 2025 AppSec efforts.We’re pleased t...
2025-1-22 21:53:22 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
toxic
security
development
UK Mail Check: DMARC Reporting Changes to Know
The UK National Cyber Security Centre (NCSC), the country’s technical authority for cyber securi...
2025-1-22 20:51:18 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
dmarc
security
dmarcian
ncsc
aggregate
DEF CON 32 – The Village Peoples’ Panel What Really Goes On In A Village
Wednesday, January 22, 2025...
2025-1-22 20:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
network
boulevard
Proactive compliance with Sonatype: Automating reporting for U.S. Army SBOM requirements
We’ve been closely follow...
2025-1-22 19:38:2 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
closely
authored
chains
regulatory
Life in the Swimlane with Marian Fehrenbacher, HR Assistant & Office Manager
Welcome to the “Life in the Swimlane” blog series. Here we will feature interviews with Swimlaners...
2025-1-22 19:31:52 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
swimlane
yoga
families
security
excites
Google Cloud Security Threat Horizons Report #11 Is Out!
This is my completely informa...
2025-1-22 19:0:50 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
horizons
cloud
security
anton
Randall Munroe’s XKCD ‘Human Altitude’
via the c...
2025-1-22 18:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
3039
munroe
creator
comic
Filtered to Perfection: Votiro’s Two-Layer Approach to Cybersecurity
The Coffee-Making Process Meets CybersecurityIt’s early morning and you’re gearing up for a busy d...
2025-1-22 17:33:2 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
votiro
coffee
masking
cup
Entra Connect Attacker Tradecraft: Part 2
Now that we know how to add credentials to an on-premises user, lets pose a question:“Given acc...
2025-1-22 17:32:2 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
entra
metaverse
connector
hotnops
aad
Rethinking Credential Security
A Candid Conversation with Enzoic’s CTOThe digital landscape is evolving, and with it comes a w...
2025-1-22 17:15:31 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
enzoic
security
mike
roi
interviewer
DEF CON 32 – UDSonCAN Attacks Discovering Safety Critical Risks By Fuzzing
Wednesday, January 22, 2025...
2025-1-22 16:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
youtube
boulevard
How to Handle Secrets at the Command Line [cheat sheet included]
If developers all share one thing in common, it is their use of the command line to get their j...
2025-1-22 15:38:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
passwords
encryption
sops
gitguardian
Authentication and Single Sign-On: Essential Technical Foundations
Authentication and Single Sign-On (SSO) are fundamental aspects of modern web security, but imp...
2025-1-22 15:15:9 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
database
username
crucial
Security is Actually a Data Search Problem: How We Win by Treating it Like One
The security industry is at a crossroads, and its current trajectory is failing us. As security...
2025-1-22 14:15:8 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
defenders
attackers
threats
security
Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps
Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent Pro...
2025-1-22 13:0:52 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
harvesting
attackers
cloud
gravatar
at&t
The Quiet Rise of the ‘API Tsunami’
As enterprises increasingly adopt cloud-native architectures, microservices, and third-party int...
2025-1-22 13:0:1 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
sprawl
centralized
attackers
salt
Why Hedge Funds Must Prioritize Secrets Security
Proprietary algorithms, sensitive client data, and advanced trading infrastructure are critical...
2025-1-22 11:38:53 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
hedge
funds
security
fund
developers
A Record-Breaking Year for CVEs and How Veriti Helped Customers Be Proactive
2024 was a watershed moment...
2025-1-22 11:20:17 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
veriti
cves
exposures
DataDome Unveils DDoS Protect to Block Attack Traffic at the Edge
DDoS Protect Safeguards Businesses Against Service Downtime, Wasted Resources, and Reputational Dam...
2025-1-22 10:0:49 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
datadome
downtime
security
threats
network
Developing Security Protocols for Agentic AI Applications
Agentic artificial intelligence can be a powerful, practical tool for almost any department — as...
2025-1-22 09:25:31 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
agentic
security
encryption
objectives
autonomous
Previous
4
5
6
7
8
9
10
11
Next