unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
What is an Uncensored Model and Why Do I Need It
GenAI is revolutionizing every industry to the point that a new GenAI model is released daily su...
2025-1-16 12:50:28 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
uncensored
censorship
genai
Top Digital Tools for the Classroom
Digital tools are reshaping the traditional K-12 learning experience, unleashing a wave of benef...
2025-1-16 12:5:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
classroom
teachers
educators
ensuring
Best AutoSPF Alternatives: Detailed Feature Comparison
Today, the email authentication market is full of SPF flattening tools that help you simplify a...
2025-1-16 10:39:35 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
spf
flattening
autospf
powerdmarc
10 Essential GRC Policy Management Best Practices
Policy management is the sturdy scaffolding that supports governance, risk, and compliance (GRC)...
2025-1-16 08:6:32 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
grc
centraleyes
regulatory
governance
adherence
Infectious Prompt Injection Attacks on Multi-Agent AI Systems
When disruptive technology becomes part of our lives, there’s always going to be an adversarial...
2025-1-16 07:56:33 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
injection
agrawal
harmful
malicious
Microsoft’s January Security Update of High-Risk Vulnerabilities in Multiple Products
OverviewOn January 14, NSFOCUS CERT detected that Microsoft released a security update patch fo...
2025-1-16 03:8:49 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
windows
microsoft
remote
security
telephony
Fortinet OS & FortiProxy Authentication Bypass Vulnerability (CVE-2024-55591) Notification
OverviewRecently, NSFOCUS CERT detected that Fortinet has issued a security notification and fi...
2025-1-16 02:47:21 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
fortiproxy
security
bypass
network
7 Essential Security Operations Center Tools for 2025
Equipping your security operations center (SOC) team with the right tools is essential to their su...
2025-1-16 01:50:49 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
threats
security
swimlane
turbine
processes
News alert: Aembit announces speakers for NHIcon event, highlighting non-human identity security
Silver Spring, MD, Jan. 15,...
2025-1-16 00:44:58 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
aembit
identities
nhicon
founder
News alert: Sweet Security’s LLM-powered detection engine reduces cloud noise to 0.04%
Tel Aviv, Israel, Jan. 15, 2025, CyberNewswire — Sweet Security, a leader in cloud runtime detec...
2025-1-16 00:26:48 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
sweet
cloud
security
llm
noise
News alert: Wultra secures €3M funding to help financial firms mitigate coming quantum threats
Prague, Czech Republic, Jan. 15, 2025, CyberNewswire — Quantum computing is set to revolutionize t...
2025-1-16 00:5:35 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ventures
wultra
tensor
fund
GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesia
Since 1974, gambling has been officially illegal in Indonesia. However, the digital revolution o...
2025-1-15 23:53:37 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
gsocket
gambling
php
moodle
imperva
RansomHub Affiliate leverages Python-based backdoor
January 15, 2025In an incident response in Q4 of 2024, GuidePoint Security identified evidence...
2025-1-15 21:53:41 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
python
c2
guidepoint
network
proxy
DEF CON 32 – Small Satellite Modeling and Defender Software
Author/Presenter: Kyle Murbac...
2025-1-15 20:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
syndicated
publishing
youtube
kyle
FBI Deletes PlugX Malware From Computers Infected by China Group
The FBI, with the help of French law enforcement and a private cybersecurity company, deleted a...
2025-1-15 18:49:16 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
plugx
c2
french
affidavit
Protecting the software supply chain: Insights from our expert panel
As software grows increas...
2025-1-15 18:39:9 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
software
sonatype
security
linskens
Saving CI/CD time with Ephemeral test databases
In previous articles, we’ve...
2025-1-15 18:2:3 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
ephemeral
tonic
database
rds
deployments
Allstate Violates Drivers’ Privacy, Texas AG Alleges
“We will hold all these companies accountable,” rants state attorney general Ken Paxton (pictu...
2025-1-15 17:37:10 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
allstate
arity
texas
driving
paxton
Intune Attack Paths — Part 1
Intune Attack Paths — Part 1Prior WorkSeveral people have recently produced high-quality work...
2025-1-15 17:33:8 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
intune
entra
seattle
rbac
microsoft
OWASP Top 10: What’s C Got to Do With It?
Deb Radcliff interviews OWASP Top Ten core team member Brian Glas.What do the OWASP Top Ten web...
2025-1-15 16:25:43 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
ten
sboms
codesecure
glas
Previous
5
6
7
8
9
10
11
12
Next