unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Blockchain Startup Hyve Unveils High-Speed Data Protocol, Challenging Industry Standards
Hyve, a blockchain infrastructure startup, has stepped out of stealth mode to reveal HyveDA, its inn...
2024-10-17 21:35:54 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
hyveda
hyve
throughput
Red Hat Security Advisory 2024-8124-03
The following advisory data is extracted from:https://security.access.redhat.com/data/csaf/v2/advi...
2024-10-17 21:35:16 | 阅读: 2 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
redhat
security
openjdk
bugzilla
rhsa
Michael Saylor Wants To Turn MicroStrategy Into a Trillion-Dollar Bitcoin Bank
MSTR SaylorMichael Saylor is tall with smart eyes, a rectangular face, white hair, and a white bear...
2024-10-17 21:8:47 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
btc
saylor
mstr
asset
Ukraine tracks emailed bomb threats to Russia-linked group
A hacker group tracked as UAC-0050 may be behind a recent large-scale information campaign targetin...
2024-10-17 21:0:48 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ukrainian
ukraine
0050
fire
What is DORA (Digital Operational Resilience Act)?
The Digital Operational Resilience Act (DORA) is a significant regulation introduced by...
2024-10-17 21:0:22 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cequence
dora
security
resilience
operational
Increased LLM Vulnerabilities from Fine-tuning and Quantization: Problem Formulation and Experiments
Authors:(1) Divyanshu Kumar, Enkrypt AI;(2) Anurakt Kumar, Enkrypt AI;(3) Sahil Agarwa, Enkrypt...
2024-10-17 21:0:21 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
llm
prompts
tap
enkrypt
Quarterly GRIT Ransomware Report — Q3 2024
2024-10-17 21:0:0 | 阅读: 3 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
The story of web framework Hono, from the creator of Hono
2024-10-1710 min readHono is a fast, lightweight web framework that runs anywhere JavaScript does, b...
2024-10-17 21:0:0 | 阅读: 3 |
收藏
|
The Cloudflare Blog - blog.cloudflare.com
hono
client
jsx
kv
bun
H100 算力价格暴跌 75%,对 AI 创业公司意味什么?
买不如租作者 | Eugene CheahOneFlow 编译原标题:2美元/小时出租H100:GPU泡沫破灭前夜红杉资本的报告曾指出,AI 产业的年产值超过 6000 亿美元,才够支付数据中心、加速...
2024-10-17 20:55:0 | 阅读: 14 |
收藏
|
极客公园 - mp.weixin.qq.com
模型
h100
集群
微调
租赁
Call stack spoofing explained using APT41 malware
2024-10-17 20:54:11 | 阅读: 4 |
收藏
|
Reverse Engineering - www.reddit.com
agree
reddit
continuing
acknowledge
agreement
如何在 Excel/Word 中插入对勾符号和叉号?6种方法!
在 Excel/Word 中,插入对勾符号(✓)和叉号(×)有多种方式,本文将详细介绍六种常用方法,并解释如何格式化包含对勾符号的单元格以及如何统计这些符号的...
2024-10-17 20:49:13 | 阅读: 6 |
收藏
|
阿小信的博客 - blog.axiaoxin.com
叉号
单元格
wingdings
252
对话框
Google and Microsoft Bet on Nuclear Power to Fuel AI Growth
With the proliferation of Artificial Intelligence, we have been left with the question of how to pow...
2024-10-17 20:47:4 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
nuclear
electricity
centers
emissions
reactors
Quick Start Guide for DolphinScheduler: Installation and Configuration Using Docker Compose
DolphinScheduler is a powerful open-source distributed task scheduling system widely used in the big...
2024-10-17 20:41:2 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
database
zookeeper
scheduling
monitoring
The Newest PSR Protections
What Organizations Should KnowThe PSR establishes economic regulations in the UK for payment syste...
2024-10-17 20:21:6 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
psr
enzoic
protections
passwords
Independent Russian news site rides out a week of DDoS incidents
The Russian independent media outlet Novaya Gazeta Europe was targeted by several large-scale distr...
2024-10-17 20:15:42 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
novaya
gazeta
russia
outlet
meduza
Comprehensive Threat Intelligence Report: The Rise of Nation-State Cyber Attacks and Their Convergence with Cybercrime
TLP: WHITEThis threat intelligence report was written in tandem between Krypt3ia and the ICE...
2024-10-17 20:15:0 | 阅读: 2 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
nation
warfare
military
north
korea
面对英特尔CPU触目惊心的安全漏洞, 除了排查,更要加速信创发展
10月16日,中国网络空间安全协会发布题为《漏洞频发、故障率高 应系统排查英特尔产品网络安全风险》公众号文章,明确指出了英特尔的四项安全问题:一是安全漏洞问题频发;二是可靠性差,漠视用户投诉;三是假借...
2024-10-17 20:11:0 | 阅读: 13 |
收藏
|
安全牛 - mp.weixin.qq.com
安全
漏洞
网络
信息
SC27网络安全国际标准公开征集提案,AI安全、数据安全等优先;科技巨头遭遇数据危机,思科发生大规模信息泄露 | 牛览
新闻速览•全国网安标委公开征集SC27网络安全国际标准提案,优先AI安全、数据安全、密码算法等方向•简化评估流程,美国国防部推出新版网络安全成熟度认证模型认证•科技巨头遭遇数据危机,思科发生大规模信息...
2024-10-17 20:11:0 | 阅读: 5 |
收藏
|
安全牛 - mp.weixin.qq.com
安全
漏洞
网络
攻击
MFA Compromise: The Mechanics Behind This Escalating Threat Vector
Multi-factor authentication (MFA) was once perceived as a powerful defense tactic – a silver bullet...
2024-10-17 20:0:4 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
security
reverse
arkose
attackers
Bridging the IT Skills Gap with Essential Data Expertise and Growth Strategies
The fast evolution of technology in the IT industry has made it increasingly important for professi...
2024-10-17 20:0:1 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
gap
addressing
gaps
skill
Previous
350
351
352
353
354
355
356
357
Next