unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Leveraging LLMs for Generation of Unusual Text Inputs in Mobile App Tests: Discussion and Validity
Too Long; Didn't ReadUsing InputBlaster, a novel approach in leveraging LLMs for automated generatio...
2024-4-26 04:0:2 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
papers
academic
llms
resembles
Securing CI/CD Pipelines: The Role of Workload Identity Federation
Increased Attack SurfaceLong-lived credentials stored in CI/CD pipelines increase an organization’...
2024-4-26 03:50:21 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
workload
federation
lived
security
pipelines
What is a Zero-Day Vulnerability?
Navigating the world of website security can feel like stepping into a minefield, especially when y...
2024-4-26 03:37:52 | 阅读: 6 |
收藏
|
Sucuri Blog - blog.sucuri.net
security
software
exploited
developers
Researchers sinkhole PlugX malware server with 2.5 million unique IPs
error code: 1106...
2024-4-26 03:30:15 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Velocity Labs And Ramp Network Facilitate Fiat To Crypto Onramp On Polkadot Via Asset Hub Support
Velocity Labs And Ramp Network Facilitate Fiat To Crypto Onramp On Polkadot Via Asset Hub Support by...
2024-4-26 03:22:0 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
asset
ramp
blockchain
parachain
onramp
Proof of Pitch: Transforming The Pitch Competition Landscape With AI-Driven Insights And Top Web3 VC
Proof of Pitch: Transforming The Pitch Competition Landscape With AI-Driven Insights And Top Web3 VC...
2024-4-26 03:20:44 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
pitch
blockchain
web3
vested
competition
Quick Guide to the OWASP OSS Risk Top 10
CVEs, or known and cataloged software vulnerabilities, dominate the discussion about open source so...
2024-4-26 03:7:53 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
developers
security
software
cves
N.A. Developers Optimistic About Generative AI and Code Security
Developers in North America are more likely than their counterparts in other regions to see generat...
2024-4-26 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
generative
development
security
developers
USENIX Security ’23 – LibScan: Towards More Precise Third-Party Library Identification for Android Applications
Authors/Presenters: *Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang...
2024-4-26 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
siqi
cong
Autonomous - I don't think that word means what you think it means - Adam Shostack, Ely Kahn - ESW #359
Apr 25, 2024A clear pattern with startups getting funding this week are"autonomous" products and fe...
2024-4-26 03:0:0 | 阅读: 1 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
adam
security
threats
modeling
Defending Against ArcaneDoor: How Eclypsium Protects Network Devices
IntroductionIn coordination with multiple government agencies, Cisco announced yesterday the disco...
2024-4-26 02:59:16 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
arcanedoor
network
security
eclypsium
dancer
MDR Can Make an Impact on Cyber Insurance
Over the past few years, cyberattacks have increased in number and complexity, and the cost to rec...
2024-4-26 02:58:14 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
mdr
insurance
insurers
dwell
cyberattack
EVE-NG Workbook (Amazon Kindle)
Developing automations that interact with network devices requires having a development environment...
2024-4-26 02:46:41 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
eve
network
workbook
automations
development
AI Adoption Prompts Security Advisory from NSA
The National Security Agency (NSA) has issued a report warning of the risks from insecurely deploye...
2024-4-26 02:39:24 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
fowler
christman
crucial
AI Data Poisoning: How Misleading Data Is Evading Cybersecurity Protections
You’d be hard-pressed to find a cybersecurity provider that doesn’t tout its AI-based defenses as a...
2024-4-26 02:38:15 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
kasada
harvested
poisoning
defenses
Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster!
We at IncludeSec sometimes have the need to develop fuzzing harnesses for our clients as part o...
2024-4-26 02:30:28 | 阅读: 2 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
jerryscript
jerry
ecma
buildid
Nemesis 1.0.0
2024-4-26 02:28:18 | 阅读: 5 |
收藏
|
Posts By SpecterOps Team Members - Medium - posts.specterops.io
Nemesis 1.0.0
In August of last year, @tifkin_, @0xdab0, and I released Nemesis, our offensive data enrichment pl...
2024-4-26 02:28:18 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
nemesis
helm
chart
hasura
c2
How Momentum is Building for the US Government to Play a Larger Role in Protecting K12 Schools from Cyberattacks
Ransomware (a type of malicious software designed to block access to a computer system or encrypt f...
2024-4-26 02:24:52 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
schools
security
k12
council
The private sector probably isn’t coming to save the NVD
Thursday, April 25, 2024...
2024-4-26 02:1:59 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.talosintelligence.com
nvd
talos
network
security
Previous
26
27
28
29
30
31
32
33
Next