unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Sextortion, ora i cybercriminali usano gli indirizzi di casa
2024-11-28 00:30:32 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.securityinfo.it
di
che
sextortion
più
questo
Top Threat Intelligence Tools: Enhancing Cybersecurity Readiness
The cybersecurity landscape is evolving at an unprecedented pace. For organizations, keeping ahe...
2024-11-28 00:23:29 | 阅读: 2 |
收藏
|
VMRay - www.vmray.com
threats
vmray
security
misp
Everyday Ghidra: Ghidra Data Types — Creating Custom GDTs From Windows Headers — Part 2
2024-11-28 00:35:3 | 阅读: 2 |
收藏
|
Reverse Engineering - www.reddit.com
agree
reddit
continuing
acknowledge
agreement
Microsoft says it's not using your Word, Excel data for AI training
Microsoft has denied claims that it uses Microsoft 365 apps (including Word, Excel, and Pow...
2024-11-28 03:0:24 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
microsoft
experiences
powerpoint
suggestions
cloud
Critical Flaw in ProjectSend Under Active Exploitation Against Public-Facing Servers
Vulnerability / Software SecurityA critical security flaw impacting the ProjectSend open-source fi...
2024-11-28 00:5:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
attacker
projectsend
vulncheck
malicious
r1605
Cloudflare says it lost 55% of logs pushed to customers for 3.5 hours
Internet security giant Cloudflare announced that it lost 55% of all logs pushed to customer...
2024-11-28 00:30:21 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
buftee
failsafe
forwarding
logfwdr
Breaking Down Adversarial Machine Learning Attacks Through Red Team Challenges
2024-11-28 00:27:55 | 阅读: 1 |
收藏
|
Boschko Security Blog - boschko.ca
gradient
wolf
granny
adversarial
timber
Appeals court overturns Treasury sanctions against crypto mixer Tornado Cash
A U.S. federal appeals court has ruled that the Treasury Department exceeded its authority by sanct...
2024-11-28 02:15:49 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
tornado
court
laundering
ieepa
software
Chinese hackers breached T-Mobile's routers to scope out network
T-Mobile says the Chinese "Salt Typhoon" hackers who recently compromised its systems as par...
2024-11-28 01:0:22 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
network
typhoon
telecom
salt
simon
BIC, Starbucks, Morrisons continue recovery after Blue Yonder ransomware attack
Several major companies are in the process of recovering after a ransomware attack on a third-party...
2024-11-28 01:45:47 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ransomware
yonder
outage
Researchers discover first UEFI bootkit malware for Linux
The first UEFI bootkit specifically targeting Linux systems has been discovered, marking a s...
2024-11-28 01:45:19 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
bootkitty
eset
bootkit
malicious
security
Judge rejects data brokers’ bid to throw out case brought by law enforcement officers
A New Jersey federal judge on Tuesday denied data brokers’ requests to dismiss a case brought by st...
2024-11-28 01:15:44 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
jersey
judge
daniel
brokers
sued
India’s new cyber rules for telecoms come with big privacy risks, experts say
India’s telecommunications regulator has rolled out rules designed to protect the country’s critica...
2024-11-28 01:0:50 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
telecom
india
indian
maheshwari
How Can You Get Unbanned from Omegle?
The first time I heard about Omegle was maybe three or four years ago. I don’t even remember where I...
2024-11-28 01:0:16 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
omegle
bans
ban
proxy
proxies
How Configuration-level Pruning Reduces Optimization Time in DBMS Tuning
Authors:(1) Limeng Zhang, Centre for Research on Engineering Software Technologies (CREST), The Un...
2024-11-28 01:0:12 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
importance
tuning
dimensional
pruning
subspace
DIA Launches Lasernet Testnet: A New Era for Oracle Infrastructure
DIA has announced the testnet launch of Lasernet, an Ethereum Layer-2 rollup specifically designed f...
2024-11-28 00:5:45 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
lasernet
dia
scalability
blockchain
The HackerNoon Newsletter: The Long Road Home: A Story of Loss, Learning, and Renaissance - PART 4 (11/27/2024)
2024-11-28 00:5:38 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
hackernoon
reddit
profound
security
edwinliavaa
Prune Your Way to Better Database Management System Performance
Authors:(1) Limeng Zhang, Centre for Research on Engineering Software Technologies (CREST), The Un...
2024-11-28 00:0:11 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
workload
pruning
latent
dimensional
tuning
SEC Consult SA-20241127-0 :: Stored Cross-Site Scripting in Omada Identity (CVE-2024-52951)
Full Disclosuremailing list archivesFrom: SEC Consult Vulnerability Lab via Full...
2024-11-28 02:58:42 | 阅读: 0 |
收藏
|
Full Disclosure - seclists.org
security
hotfix
omada
v15u1
309
SEC Consult SA-20241125-0 :: Unlocked JTAG interface and buffer overflow in Siemens SM-2558 Protocol Element, Siemens CP-2016 & CP-2019
Full Disclosuremailing list archivesFrom: SEC Consult Vulnerability Lab via Full...
2024-11-28 02:58:39 | 阅读: 0 |
收藏
|
Full Disclosure - seclists.org
sm
2558
jtag
siemens
overflow
Previous
-57
-56
-55
-54
-53
-52
-51
-50
Next