unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data
SaaS Security / Browser SecuritySaaS applications are dominating the corporate landscape. Their in...
2024-5-3 18:42:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
shadow
monitoring
proxy
leaders
CVE-2024-27322 Should Never Have Been Assigned And R Data Files Are Still Super Risky Even In R 4.4.0
I had not planned to blog this (this is an incredibly time-crunched week for me) but CERT/CC and CI...
2024-5-3 18:12:52 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
quit
srcref
srcfile
abused
rud
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean thre...
2024-5-3 17:37:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
dmarc
security
north
journalist
korea
The Persistent Threat of Path Traversal Vulnerabilities in Software Development
Path traversal vulnerabilities, or directory traversal, are now subject to a government advisory fo...
2024-5-3 17:35:54 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
crucial
development
Top 7 VAPT Testing Tools
2024-5-3 17:26:59 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
vapt
security
autosect
posture
#FIRSTCON24
Certego è stata selezionata tra le aziende che parteciperanno in qualità di speaker al #FIRSTCON24,...
2024-5-3 17:16:59 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.certego.net
di
della
che
sicurezza
più
Java 应用安全之 JEB Floating License 绕过
最近一朋友单位采购了 JEB Pro 用于 Android 逆向,但使用的是 Floating License,因此只能在公司内网中使用。这样一来朋友在节假日就没法卷了,于是找到了我看有没有兴趣研究一...
2024-5-3 17:7:40 | 阅读: 5 |
收藏
|
Sec-News 安全文摘 - govuln.com
jeb
ju
aw
pnfsoftware
nz
Movavi Slideshow Maker - 简单精美的相册视频制作工具 (Win/Mac)
多媒体类, 视频音乐 Windows, Mac 2024-05-03当今智能手机的拍照功能越来越强大,让我们在旅行、聚会、团建时总是忍不住疯狂拍照!但拍完之后,往往就没有之后了……这些美...
2024-5-3 17:3:31 | 阅读: 0 |
收藏
|
异次元软件世界 - www.iplaysoft.com
movavi
maker
slideshow
剪辑
特效
Linux Kprobe原理探究
之前在分析其他安全厂商App的防护策略时,想要设计个风控分析沙盒来实现对于App行为的全面监控,包括:◆App访问、操作了哪些文件◆执行了哪些操作◆对于相关操作进行针对性的修改等等其中很棘手的问题在于...
2024-5-3 17:2:42 | 阅读: 4 |
收藏
|
看雪学苑 - mp.weixin.qq.com
kprobe
kprobes
指令
insn
brk
适合初学者!一起探索Linux Pwn世界
想要在CTF比赛中游刃有余地完成PWN赛题,带领团队独当一面吗?想在二进制安全领域打牢地基,为今后的安全生涯建立强有力的后盾支撑吗?热爱二进制安全的学生及安全从业者们有福啦!平台最新打造课程《CTF...
2024-5-3 17:2:42 | 阅读: 5 |
收藏
|
看雪学苑 - mp.weixin.qq.com
安全
二进制
后盾
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360
May 3, 2024It's the most boring part of incident response. Skip it at yourperil, however. In this i...
2024-5-3 17:0:0 | 阅读: 3 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
verizon
graylog
esw
Eni conferma: la società libica Mellitah Oil and Gas è stata vittima di un attacco informatico
L’Eni conferma che la società libica Mellitah Oil and Gas, partecipata anche dalla stessa multinazio...
2024-5-3 16:48:43 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.agenzianova.com
di
eni
oil
nova
mellitah
Bitbot's Presale Passes $3M After AI Development Update
Bitbot's Presale Passes $3M After AI Development Update by@chainwireToo Long; Didn't ReadAI-powered...
2024-5-3 16:41:16 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
presale
bitbot
blockchain
stage
3m
Gli LLM non riescono (ancora) a sfruttare le vulnerabilità in autonomia
2024-5-3 16:30:26 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.securityinfo.it
di
che
gli
llm
UNI CEI EN 17740:2024 sui profili professionali privacy
venerdì 3 maggio 2024 UNI CEI EN 17740:2024 sui profili professionali priva...
2024-5-3 16:15:0 | 阅读: 4 |
收藏
|
IT Service Management News - blog.cesaregallotti.it
uni
17740
cei
profili
questa
What is Proxmox VE – and Why You Should Live Patch It
Proxmox VE, like any software, is vulnerable to security threats. Patching helps address these vul...
2024-5-3 16:0:34 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
proxmox
containers
downtime
tuxcare
RSAC Fireside Chat: The necessary care and feeding of DDoS detection and protection systems
By Byron V. AcohidoAt the start, Distributed Denial of Service (DDoS) attacks were of...
2024-5-3 15:46:5 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
acohido
security
abdelhalim
a10
adapt
GUEST ESSAY: A primer on how, why ‘dynamic baselining’ fosters accurate DDoS protection
By Ahmed AbdelhalimBusinesses today need protection from increasingly frequent and s...
2024-5-3 15:30:13 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
baselining
accurate
security
network
burden
src漏洞挖掘浅谈
渗透测试的灵魂是信息收集,本体是在漏洞利用。收集到的资产和信息越多,你的突破点就越多,因为你找到了别人没有找到的,你测了他没有测试的,你已经领先在了起跑线上,而src得用大量的时间去做信息收集,src...
2024-5-3 15:24:1 | 阅读: 0 |
收藏
|
迪哥讲事 - mp.weixin.qq.com
漏洞
挖掘
数据
信息
绕过
FIN7 Cybercrime Group Strikes US Auto Sector Using Carbanak
Recent reports have highlighted that the notorious FIN7 cybercrime group has targeted the U.S. auto...
2024-5-3 15:0:46 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
fin7
threats
security
carbanak
Previous
3
4
5
6
7
8
9
10
Next