unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
SHiFT: Semi-hosted Fuzz Testing for Embedded Applications
Authors: Alejandro Mera and Changming Liu, Northeastern University; Ruimin Sun, Florida Internationa...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
mcu
firmware
positives
emulation
security
CAMP: Compositional Amplification Attacks against DNS
Authors: Huayi Duan, Marco Bearzi, Jodok Vieli, David Basin, Adrian Perrig, and Si Liu, ETH Zürich;...
2024-5-3 03:57:42 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
camp
vieli
Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps
Authors: Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, and Jason Polakis, University of Illi...
2024-5-3 03:57:42 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
security
inspectron
developers
porting
masood
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware
Authors: Haichuan Xu, Mingxuan Yao, and Runze Zhang, Georgia Institute of Technology; Mohamed Mousta...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
dva
a11y
victim
georgia
guided
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Authors: Zihao Zhan and Yirui Yang, University of Florida; Haoqi Shan, University of Florida, CertiK...
2024-5-3 03:57:42 | 阅读: 0 |
收藏
|
USENIX - www.usenix.org
charging
chargers
voltschemer
threats
voltage
SoK: State of the Krawlers – Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements
Authors: Aleksei Stafeev and Giancarlo Pellegrino, CISPA Helmholtz Center for Information SecurityAb...
2024-5-3 03:57:42 | 阅读: 0 |
收藏
|
USENIX - www.usenix.org
crawling
security
evaluations
begins
literature
That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality Applications
Authors: Carter Slocum, Yicheng Zhang, Erfan Shayegani, Pedram Zaree, and Nael Abu-Ghazaleh, Univers...
2024-5-3 03:57:42 | 阅读: 0 |
收藏
|
USENIX - www.usenix.org
security
erfan
usenix
committed
Application Security: Trends and Predictions for 2024
Too Long; Didn't ReadStay ahead of emerging threats in 2024 by diving into growing security trends l...
2024-5-3 03:53:38 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
gilad
emerging
firsthand
maayan
What to Expect at RSA 2024: Will AI Wreak Havoc on Cybersecurity?
As artificial intelligence leaders debate what constitutes safe AI and whether it means we’re on a...
2024-5-3 03:53:37 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
defenses
threats
genai
Pro-Russia hackers target critical infrastructure in North America and Europe
Pro-Russia hackers target critical infrastructure in North America and EuropeGovernment agenci...
2024-5-3 03:52:6 | 阅读: 6 |
收藏
|
Security Affairs - securityaffairs.com
russia
north
hacktivists
passwords
security
$SNUKE Presale Reaches 300 $SOL Milestone
$SNUKE Presale Reaches 300 $SOL Milestone by@chainwireToo Long; Didn't Read$SNUKE, a meme coin with...
2024-5-3 03:49:43 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
presale
blockchain
snuke
sol
vested
Machine Identities in Small Businesses: The Key to Security and Efficiency
ReadWriteNotificationssee moreMachine Identities in Small Businesses: The Key to Security and Effic...
2024-5-3 03:48:7 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
gupta
security
stories
Alleged China-based hackers using ‘Cuttlefish’ malware platform to target Turkey
Hackers with alleged connections to China are using a malware platform called “Cuttlefish” to targe...
2024-5-3 03:46:24 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
cuttlefish
network
lotus
cloud
turkey
CISA urges software devs to weed out path traversal vulnerabilities
error code: 1106...
2024-5-3 03:45:17 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Kaseya Connect Global 2024 Day Two Recap: Embracing AI and Autonomous Automation
As we wrapped up another exhilarating day at Kaseya Connect Global 2024 in Las Vegas, the spotlight...
2024-5-3 03:12:17 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
backup
security
autonomous
highlighted
USENIX Security ’23 – Account Security Interfaces: Important, Unintuitive, and Untrustworth – Distinguished Paper Award Winner
Authors/Presenters: Alaa Daffalla Marina Bohuk, Nicola Dell, Rosanna Bellini, Thomas Ri...
2024-5-3 03:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
security
bohuk
thomas
AppLayer Unveils Fastest EVM Network And $1.5M Network Incentive Program
AppLayer Unveils Fastest EVM Network And $1.5M Network Incentive Program by@chainwireToo Long; Didn'...
2024-5-3 02:50:30 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
evm
network
applayer
blockchain
featured
Police shuts down 12 fraud call centres, arrests 21 suspects
error code: 1106...
2024-5-3 02:30:15 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Acid Rain, Pikabot, VenomRAT, Mallox Ransomware, and More: Hacker’s Playbook Threat Coverage Round-up: March-April 2024
Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach In this version of the Hacker’s...
2024-5-3 02:28:19 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
safebreach
latrodectus
pikabot
mallox
Scans Probing for LB-Link and Vinga WR-AC1200 routers CVE-2023-24796, (Thu, May 2nd)
Before diving into the vulnerability, a bit about the affected devices. LB-Link, the make of the de...
2024-5-3 02:7:5 | 阅读: 5 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
firmware
goform
limitclient
systools
buying
Previous
6
7
8
9
10
11
12
13
Next