unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
2024网安周 | 流量预警,多图来袭!一文看遍2024年网络安全博览会
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-823410639月8日上午,2024年国家网络安全宣传周开幕式在广东省广州市举行。作为历年网安周的重磅活动之一,2024年国家网络安全...
2024-9-10 20:17:53 | 阅读: 1 |
收藏
|
中国信息安全 - mp.weixin.qq.com
安全
网络
中国
专区
2024网安周 | 《网络安全人才实战能力白皮书-安全测试评估篇》正式发布
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-823410639月10日,国内首个聚焦“安全测试评估”的白皮书——《网络安全人才实战能力白皮书-安全测试评估篇》(以下简称“白皮书”)...
2024-9-10 20:17:53 | 阅读: 0 |
收藏
|
中国信息安全 - mp.weixin.qq.com
安全
网络
用人
2024网安周 | 2024年国家网络安全宣传周“网络安全技术高峰论坛主论坛暨粤港澳大湾区网络安全大会”在广州市举行
环境异常 当前环境异常,完成验证后即可继续访问。 去验证...
2024-9-10 20:17:53 | 阅读: 0 |
收藏
|
中国信息安全 - mp.weixin.qq.com
发布 | 国家密码管理局发布《电子政务电子认证服务管理办法》全文
电子政务电子认证服务管理办法第一章 总 则第一条 为了规范电子政务电子认证服务行为,对电子政务电子认证服务机构实施监督管理,保障电子政务安全可靠,维护有关各方合法权益,根据《中华人民共和国密码法》、《...
2024-9-10 20:17:53 | 阅读: 0 |
收藏
|
中国信息安全 - mp.weixin.qq.com
证书
资质
安全
2024网安周 | 2024年人工智能技术赋能网络安全应用测试结果公布
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-823410639月9日上午,在广州召开的国家网络安全宣传周网络安全技术高峰论坛主论坛上,发布了2024年人工智能技术赋能网络安全应用测...
2024-9-10 20:17:53 | 阅读: 0 |
收藏
|
中国信息安全 - mp.weixin.qq.com
安全
网络
中国
信息
发布 | 《粤港澳大湾区(内地、澳门)个人信息跨境流动标准合同实施指引》全文
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063国家互联网信息办公室澳门特别行政区政府经济及科技发展局澳门特别行政区政府个人资料保护局公 告2024年第1号落实《中华人...
2024-9-10 20:17:53 | 阅读: 0 |
收藏
|
中国信息安全 - mp.weixin.qq.com
信息
澳门
行政区
权威解读 | 《电子政务电子认证服务管理办法》
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063根据《中华人民共和国密码法》(以下简称《密码法》)、《中华人民共和国电子签名法》(以下简称《电子签名法》)和《商用密码管...
2024-9-10 20:17:53 | 阅读: 0 |
收藏
|
中国信息安全 - mp.weixin.qq.com
资质
安全
信息
Russian pro-democracy nonprofit investigates alleged data breach by Kremlin-backed hackers
The U.S.-based Free Russia Foundation nonprofit said it is investigating a data breach after thousa...
2024-9-10 20:16:28 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
russia
ukraine
coldriver
nonprofit
political
Poland thwarted cyberattacks that were carried out by Russia and Belarus
Poland thwarted cyberattacks that were carried out by Russia and Belarus Pierluigi Paganini Se...
2024-9-10 20:0:37 | 阅读: 0 |
收藏
|
Security Affairs - securityaffairs.com
poland
russia
ukraine
polish
Fake recruiter coding tests target devs with malicious Python packages
ReversingLabs researchers have identified new, malicious software packages believe to be linked to...
2024-9-10 20:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
malicious
python
developer
github
developers
Experts Identify 3 Chinese-Linked Clusters Behind Cyberattacks in Southeast Asia
Malware / Cyber EspionageA trio of threat activity clusters linked to China has been observed comp...
2024-9-10 19:43:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
charlie
security
c2
bravo
Invisible Salamanders Are Not What You Think
Ever since the Invisible Salamanders paper was published, there has been a quiet renaissance w...
2024-9-10 19:39:15 | 阅读: 0 |
收藏
|
Dhole Moments - soatok.blog
aead
invisible
salamanders
modes
assumption
Looking Toward U.S. Federal Privacy Regulation, How Software Companies can Prepare
In the last decade, there has been a marked rise in the creation of state-level privacy laws and re...
2024-9-10 19:30:7 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
laws
regulations
software
developers
security
Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches
Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the s...
2024-9-10 19:21:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
shadow
security
sspm
sspms
approved
Risk Assessment and Gap Analysis for Industrial Control System infrastructure: the core essentials
Conducting a risk assessment and gap analysis exercise for Industrial Control System en...
2024-9-10 19:2:49 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
gap
analysis
security
sectrio
planning
NoName ransomware gang deploying RansomHub malware in recent attacks
error code: 1106...
2024-9-10 18:45:19 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Why ‘Shift-Left’ Isn’t Good Enough? Our conversation with Chris Romeo
Are you confident that shifting security left in your software development lifecycle is enough to...
2024-9-10 18:40:3 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
chris
romeo
dast
development
Just-in-Time Access: Key Benefits for Cloud Platforms
In today’s digital landscape, cloud platforms have become the backbone of modern business operation...
2024-9-10 18:29:5 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
privileged
pam
efficiency
New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers
A new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breachin...
2024-9-10 18:10:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
acoustic
pixels
lcd
guri
software
谈谈俄乌战场攻防欺骗之道
# 气球大战 # 俄乌战争中最近上演的“气球大战”备受关注,当看似普通的气球飘向空中,谁能想到,它们竟然成为了战场上的“黑科技”。 俄军的这些气球不是普通的气球,它们被巧妙地设计成能...
2024-9-10 18:7:36 | 阅读: 0 |
收藏
|
默安科技 - mp.weixin.qq.com
攻击
气球
无人机
俄军
Previous
1
2
3
4
5
6
7
8
Next