unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The TechBeat: From Clicks to Value: TapSwap's Sustainable Approach to Tap-to-Earn (9/28/2024)
2024-9-28 14:10:55 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
hackernoon
blockchain
introduces
ecommerce
openai
U.S. Charges Three Iranian Nationals for Election Interference and Cybercrimes
Election Security / CybercrimeU.S. federal prosecutors on Friday unsealed criminal charges against...
2024-9-28 14:3:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
election
iran
iranian
irgc
jalili
CISCN刷题笔记分享
2024-9-28 12:47:10 | 阅读: 2 |
收藏
|
先知安全技术社区 - xz.aliyun.com
SDRplay Announce their Upcoming nRSP-ST Networked Receiver
September 28, 2024SDRplay has recently announced the upcoming release of their "nRSP-ST" netw...
2024-9-28 12:18:45 | 阅读: 8 |
收藏
|
rtl-sdr.com - www.rtl-sdr.com
nrsp
iq
receiver
remote
sdrplay
通知 | 国家网信办就《终端设备直连卫星服务管理规定(征求意见稿)》公开征求意见(附全文)
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063国家互联网信息办公室关于《终端设备直连卫星服务管理规定(征求意见稿)》公开征求意见的通知为了促进和规范终端设备直连卫星服...
2024-9-28 11:46:55 | 阅读: 2 |
收藏
|
中国信息安全 - mp.weixin.qq.com
安全
信息
网络
数据
专家解读 | 制度与产业共行,发展与安全并重——以终端设备直连卫星服务赋能新质生产力发展
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063文 | 中国法学会法治研究所研究员 刘金瑞近年来,终端设备直连卫星产业已成为全球卫星移动通信领域发展的重点之一,更成为促...
2024-9-28 11:46:55 | 阅读: 5 |
收藏
|
中国信息安全 - mp.weixin.qq.com
网络
信息
安全
Zimbra - Remote Command Execution (CVE-2024-45519)
Zimbra, a widely used email and collaboration platform, recently released a critica...
2024-9-28 10:33:5 | 阅读: 180 |
收藏
|
ProjectDiscovery.io | Blog - blog.projectdiscovery.io
zimbra
postjournal
rcpt
mynetworks
【邀请函】知远防务论坛•2024:"国家关键基础设施-网络危机应对"桌面推演
邀请函国家关键基础设施对国家安全、经济发展、社会稳定等具有重要意义,一旦遭遇自然灾害或受到破坏将造成严重影响。当前,国际环境日趋复杂,世界各国面临的国家网络安全挑战、混合威胁等明显增多。为妥善应对挑战...
2024-9-28 09:52:1 | 阅读: 10 |
收藏
|
丁爸 情报分析师的工具箱 - mp.weixin.qq.com
推演
网络
攻击
【情报实战】黎巴嫩寻呼机爆炸事件调查:硬件拆解和改装操作分析
今天给大家推送土耳其网络防御中心负责人阿里坎·基拉兹(Alican Kiraz)对类似BP机进行拆解和改装的分析文章。首先,如今便携式个人设备中使用的锂离子电池总是受到人们的关注。突然爆炸或设备起火的...
2024-9-28 09:52:1 | 阅读: 5 |
收藏
|
丁爸 情报分析师的工具箱 - mp.weixin.qq.com
炸药
振动
马达
装置
雷管
How AI Models See Generational Stereotypes: Boomers, Gen X, Millennials, Zoomers – And Yes, Beer!
What happens when you ask an AI model to depict different generations? We wanted to find out. With a...
2024-9-28 09:35:23 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
generations
boomers
millennials
stereotypes
beer
When Is ISO 27001 Considered Mandatory? 5 Examples
ISO 27001 is the international standard for information security and protection. It’s roughly equiv...
2024-9-28 08:58:10 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
27001
security
regulations
isms
hipaa
使用 Tailscale Funnel 暴露本地服务
之前我介绍过 Tailscale,也介绍过如何使用 Tailscale 的出口节点功能配置流量出口,今天再介绍一个 Tailscale 的功能 Tailscale Funnel,可以将本地服务完全地...
2024-9-28 08:0:0 | 阅读: 3 |
收藏
|
Verne in GitHub - blog.einverne.info
tailscale
funnel
端口
tailnet
webhook
罗永浩:还了8个亿,钱能铺13个足球场;PS5 Pro 11月7日国内发售;游戏科学CEO:让「黑猴」团队「躺」两年|极客早知道
淘宝已支持微信支付9 月 27 日淘宝正式宣布,淘宝已支持支付宝、微信支付等多种支付方式,更新 APP 至最新版即可体验。从具体展示的页面看,消费者在完成商品选购后,在支付页面选择「微信支付」,即可完...
2024-9-28 07:50:37 | 阅读: 5 |
收藏
|
极客公园 - mp.weixin.qq.com
alphachip
神话
dlc
数据
必选
Communities Matter: Here’s How to Build a Great One
We’ve all been there: the startup journey could be challenging and… lonely. That’s why you need to b...
2024-9-28 07:20:10 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
growth
carefully
whom
startups
Locked In – The Cybersecurity Event of the Year
Please fill out the form to read this article*** This is a Security Blogge...
2024-9-28 06:55:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
bloggers
network
authored
The Tor Project and Tails have merged operations
The Tor Project and Tails have merged operations Pierluigi Paganini September 27, 2024The T...
2024-9-28 06:35:19 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
tails
merged
enhance
expand
An Anti-Facial Recognition Mask: Fighting for Privacy
My Thoughts to Protect PrivacyA mask designed to deny AI-based facial recognition from all angles....
2024-9-28 05:48:21 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
facial
cameras
feeling
wearing
realized
How Long Does it Take You to Successfully Identify Phishing Emails?
Please fill out the form to read this article*** This is a Security Blogge...
2024-9-28 05:48:14 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
enhanced
authored
bacot
identify
Debunking Hiring Superstitions: Things That Aren't Really a Thing
(This post originally appeared on AdatoSystems.com)According to medical experts, people believe sup...
2024-9-28 05:30:23 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
candidate
employer
minds
bias
recruiter
The Kaseya Advantage: 10 Years and $12B in the Making
Please fill out the form to read this article*** This is a Security Blogge...
2024-9-28 05:26:25 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
bloggers
network
syndicated
authored
12b
Previous
330
331
332
333
334
335
336
337
Next