unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Introduction to Procedural Debugging through Binary Libification
2024-11-8 09:32:14 | 阅读: 12 |
收藏
|
Reverse Engineering - www.reddit.com
agree
reddit
acknowledge
agreement
continuing
Texas-based oilfield supplier faces disruptions following ransomware attack
A key supplier for oilfields said a ransomware attack last week has caused disruptions and limited...
2024-11-8 09:30:50 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ransomware
thursday
disruptions
newpark
oilfields
派早报:澳大利亚计划立法禁止 16 岁以下的青少年使用社交媒体等
你可能错过的新鲜事澳大利亚计划立法禁止 16 岁以下的青少年使用社交媒体11 月 7 日,澳大利亚计划立法,禁止 16 岁以下青少年使用社交媒体。澳大利亚宣布新法案,要求所有社交媒体平台限制未满...
2024-11-8 08:29:18 | 阅读: 3 |
收藏
|
少数派 - sspai.com
少数派
青少年
openai
安全
zeabur
科技爱好者周刊(第 324 期):人类已知的最大质数
这里记录每周值得分享的科技内容,周五发布。...
2024-11-8 08:15:38 | 阅读: 12 |
收藏
|
阮一峰的网络日志 - www.ruanyifeng.com
质数
梅森
开源
美国
寻呼机
A beginner's roadmap for playing CTFs: 10 practical tips for beginners
Capture The Flag (CTF) challenges are fun to play, form a powerful training ground and help drastica...
2024-11-8 08:0:0 | 阅读: 2 |
收藏
|
Intigriti - blog.intigriti.com
participate
intigriti
rewards
ctfs
What if My Tribe Is Wrong?
written on Friday, November 8, 2024 I wrote in the past about how I'm a pes...
2024-11-8 08:0:0 | 阅读: 0 |
收藏
|
Armin Ronacher's Thoughts and Writings - lucumr.pocoo.org
him
trump
rhetoric
wishing
hitler
Defending the Tor network: Mitigating IP spoofing against Tor
At the end of October, Tor directory authorities, relay operators, and even the Tor Project sysadmin...
2024-11-8 08:0:0 | 阅读: 1 |
收藏
|
Tor Project blog - blog.torproject.org
complaints
authorities
network
relays
spoofed
Beating the dead horse, only to inject it some more…
The windows shatter attack is so old that it’s time for someone to reinvent it. This someone...
2024-11-8 07:50:33 | 阅读: 13 |
收藏
|
Hexacorn - www.hexacorn.com
wscadminui
hwnd
foobar
Highlights from the InCyber Montreal Forum
I had a tremendous time at...
2024-11-8 07:2:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
incyber
security
montreal
japan
speakers
North Korea allegedly targeting crypto businesses with Mac-focused malware
Mac users in the crypto industry are being targeted with malware by suspected North Korean hackers...
2024-11-8 07:0:51 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
bluenoroff
north
phishing
malicious
korea
U.S. CISA adds Palo Alto Expedition, Android, CyberPanel and Nostromo nhttpd bugs to its Known Exploited Vulnerabilities catalog
U.S. CISA adds Palo Alto Expedition, Android, CyberPanel and Nostromo nhttpd bugs to...
2024-11-8 06:49:32 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
expedition
alto
palo
security
AI in Gaming: A Case Study in Virtual Economies
Newer technology is always a game-changing thing. In the case of video games, it’s literally so. And...
2024-11-8 06:42:6 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
economies
economy
skins
marketplace
players
From Data to Cloud: Bridging Security Gaps with DSPM and CSPM
Over the past few years, busi...
2024-11-8 06:39:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
cspm
dspm
bridging
North Korean hackers use new macOS malware against crypto firms
error code: 1106...
2024-11-8 06:30:18 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
How MicroStrategy Exposes the Absurdity of the Stock Market
This year, MicroStrategy bought over $700 million in Bitcoin. That’s on top of more than $6 billion...
2024-11-8 06:17:21 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
sell
bitcoins
equity
profits
Multiple Vulnerabilities in the Mazda In-Vehicle Infotainment (IVI) System
Multiple vulnerabilities have been discovered in the...
2024-11-8 06:9:4 | 阅读: 8 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
software
srv
attacker
mcu
Win32.Trojan.Japaneno - A full Malware Analysis.
2024-11-8 06:0:20 | 阅读: 4 |
收藏
|
Reverse Engineering - www.reddit.com
agree
reddit
continuing
agreement
username
Rekt Raises $1.5M Seed Round Backed By Angels and Community, Following Sell-Out Of Rekt Drinks
WILMINGTON, Delaware, November 7th, 2024/Chainwire/--Rekt Brands Inc. (Rekt), the parent company beh...
2024-11-8 06:0:5 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
rekt
rektguy
brands
drinks
web3
Primer on Large Language Model (LLM) Inference Optimizations: 2. Introduction to Artificial Intelligence (AI) Accelerators
Exploration of AI accelerators and their impact on deploying Large Language Models (LLMs) at scale.P...
2024-11-8 05:48:1 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
inference
parallelism
llm
workloads
Embracing the Open-Source Revolution: A New Pathway for MSP Growth
By Doug Milburn and Tom LawrenceIn recent years, the role of Managed Service Providers (MSPs) has r...
2024-11-8 05:18:47 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
msps
software
lawrence
client
proprietary
Previous
141
142
143
144
145
146
147
148
Next