unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Helldown ransomware exploits Zyxel VPN flaw to breach networks
The new 'Helldown' ransomware operation is believed to target vulnerabilities in Zyxel firew...
2024-11-20 01:15:19 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
helldown
sekoia
zyxel
victim
ransomware
Unraveling Raspberry Robin's Layers: Analyzing Obfuscation Techniques and Core Mechanisms
IntroductionDiscovered in 2021, Raspberry Robin (also known as Roshtyak) is a malicious download...
2024-11-20 01:6:57 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
robin
raspberry
windows
analysis
payload
Disorder in the Court: Unintended Consequences of ATO
The most common ATO threat that individuals and businesses imagine affecting them is their accou...
2024-11-20 01:0:21 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
ato
phishing
enzoic
Why Shadow APIs provide a defenseless path for threat actors
In API security, one of the least visible and most dangerous issues today is the prevalence of S...
2024-11-20 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
attackers
development
Bringing Artisan Baking to Your Door Step: Interview with SOTY 2024 Nominee, Atome Bakery
Hey Hackers,Atome Bakery has been nominated in HackerNoon's annual Startups of The Year awards in V...
2024-11-20 00:56:50 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
bakery
atome
artisan
bread
growth
Crypto Tool or Data Thief? How Meme-Token-Hunter-Bot and Its Clones Steal from macOS Users
Authors: Kseniia Yamburh, Malware Research Engineer at Moonlock by MacPaw & Mykhailo Pazyniuk, Malwa...
2024-11-20 00:55:17 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
meme
ssh
mhtbot
attackers
moonlock
Looking at the Internals of the Kenwood DMX958XR IVI
For the upcoming Pwn2Own Automotive contest, a total...
2024-11-20 00:52:27 | 阅读: 2 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
dmx958xr
ivi
automotive
boards
murata
Ransomware is doubling down—What you need to know about the recent surge
You might have heard of r...
2024-11-20 00:49:43 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
bloggers
q2
momentum
doubling
Adware on the rise—Why your phone isn’t as safe as you think
Picture this: you downloa...
2024-11-20 00:49:2 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
harmless
cleaner
bombarded
network
syndicated
Building a Flexible Framework for Multimodal Data Input in Large Language Models
My Open Source Project: A Flexible Multimodal Language Model Framework for PyTorchThe promise of mu...
2024-11-20 00:46:50 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
anymodal
multimodal
llm
tokenizer
vit
Similarities Between SOX And SEC's Cyber Rule - Padraic O'Reilly - BSW #373
Nov 19, 2024The Sarbanes-Oxley (SOX) Act was a watershed moment in corporategovernance, fundamental...
2024-11-20 00:16:0 | 阅读: 1 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
sox
cybersaint
ensuring
Trader Loses $26M in ezETH Tokens: Media Blames User, Hacker Calls Out ERC-20 Flaws
My name is Dexaran. I’m a hacker, I’ve designed and executed one of the largest consensus-level at...
2024-11-20 00:15:43 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
security
erc
github
eips
Checkmarx Advances Software Supply Chain Security
Software...
2024-11-20 00:5:25 | 阅读: 0 |
收藏
|
Checkmarx.com - checkmarx.com
security
software
checkmarx
repository
cloud
The HackerNoon Newsletter: Is AI Progress Slowing? The Scaling Debate OpenAI Doesn’t Want to Have (11/19/2024)
2024-11-20 00:4:45 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
perplexity
fits
scaling
hackernoon
openai
从一道pwn题深入理解vm逆向
2024-11-20 00:1:19 | 阅读: 0 |
收藏
|
先知安全技术社区 - xz.aliyun.com
Ablative Study on Domain Adapter, Motion Module Design, and MotionLoRA Efficiency
Authors:(1) Yuwei Guo, The Chinese University of Hong Kong;(2) Ceyuan Yang, Shanghai Artificial I...
2024-11-20 00:0:15 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
motion
motionlora
efficiency
adapter
shanghai
DEF CON 32 – Bricked & Abandoned: How To Keep IoT From Becoming An IoTrash
Authors/Presenters: Paul Rob...
2024-11-20 00:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
roberts
permalink
The Essential Guide to Social Share Images in 2024
As developers, we spend hours crafting great content, but often overlook how it appears when shared...
2024-11-19 23:57:53 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
og
1200
sharp
developers
facebook
7 Common Web App Security Vulnerabilities Explained
Web applications have increasingly become the backbone of many businesses, but also, unfortunate...
2024-11-19 23:54:25 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
malicious
software
database
Botnet fueling residential proxies disrupted in cybercrime crackdown
The Ngioweb botnet, which supplies most of the 35,000 bots in the cybercriminal NSOCKS proxy...
2024-11-19 23:45:19 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
ngioweb
nsocks
proxy
c2
lotus
Previous
15
16
17
18
19
20
21
22
Next