unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Open Art By Blum, TONX, and TON Society Draws 11,280+ Registered Attendees
SINGAPORE - 9:00PM, September 24, 2024 — The Open Art, hosted by Blum, TONX, and TON Society and co-...
2024-9-25 17:24:0 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
ton
tonx
blum
founder
attendees
每日安全动态推送(9-25)
Tencent Security Xuanwu Lab Daily News• SecToday Next:https://sectoday.tencent.com/event/Qj7JIpIBcIs...
2024-9-25 17:12:5 | 阅读: 1 |
收藏
|
腾讯玄武实验室 - mp.weixin.qq.com
sectoday
网络
sectodaybot
漏洞
安全
SBF 前女友 Caroline Ellison 被判两年徒刑
卷入 FTX 加密货币交易所金融欺诈案的公司高管 Caroline Ellison 被判两年徒刑,她是公司联合创始人 Sam Bankman-Fried(SBF) 的前女友。SBF 此前被...
2024-9-25 17:9:52 | 阅读: 0 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
sbf
ellison
ftx
欺诈
交易所
A Multi-layered Approach to Detecting Impersonation Scams
I am your bank.I am your police.I am your lover.The Nature and Scale of the Problem Scams...
2024-9-25 17:1:40 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
behavioural
victim
fraudster
Optimizing Prompts with LLMs: Key Findings and Future Directions
Authors:(1) Chengrun Yang, Google DeepMind and Equal contribution;(2) Xuezhi Wang, Google DeepMin...
2024-9-25 17:0:23 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
arxiv
preprint
zhou
prompts
denny
POC系统配套自动化工具发布
一键检测系统历史漏洞,信安之路POC管理平台配套自动化工具,支持单网站检测以及指定目标文件两种方式,所需POC一次解锁,终身可用,效果如图:1、单网站检测2、多网站检测首次使用该工具,需要注册信安之路...
2024-9-25 16:38:11 | 阅读: 8 |
收藏
|
信安之路 - mp.weixin.qq.com
nuclei
xazlsec
渗透
myh0st
终身
Advantage Attacker: EDR Bypass Tools | Scarecrow
Over the last 10-12 years, EDR solutions have become a mainstay in endpoint defense. The reason...
2024-9-25 16:31:50 | 阅读: 31 |
收藏
|
VMRay - www.vmray.com
sideloading
scarecrow
bypass
injection
clp
火狐浏览器默认开启广告跟踪引起投诉 其工程师称用户无法做出明智决定
JSP3/2.0.14 ...
2024-9-25 16:31:35 | 阅读: 1 |
收藏
|
蓝点网 - www.landiannews.com
jsp3
Kite 待办 – 即开即用,无需注册,简洁轻量的桌面待办清单[Windows]
2024-9-25 16:23:8 | 阅读: 2 |
收藏
|
小众软件 - www.appinn.com
kite
单机
轻量
倒计时
番茄
加密货币交易所币安协助印度政府逮捕4名利用博彩游戏进行欺诈的犯罪分子
JSP3/2.0.14 ...
2024-9-25 16:17:53 | 阅读: 1 |
收藏
|
蓝点网 - www.landiannews.com
jsp3
U.S. CISA adds Ivanti Virtual Traffic Manager flaw to its Known Exploited Vulnerabilities catalog
U.S. CISA adds Ivanti Virtual Traffic Manager flaw to its Known Exploited Vulnerabilities catalog...
2024-9-25 16:8:23 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
ivanti
vtm
catalog
老牌音乐播放器Winamp源代码终于公布 但禁止任何人修改和分叉该项目
JSP3/2.0.14 ...
2024-9-25 16:4:20 | 阅读: 1 |
收藏
|
蓝点网 - www.landiannews.com
jsp3
Exploiting AMD atdcm64a.sys arbitrary pointer dereference – Part 1
After attending the OST2 – Exp4011 course, taught by Cedric Halbronn...
2024-9-25 16:1:43 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - security.humanativaspa.it
windows
pseudocode
reversing
New Phone, Who Dis? The Importance of Verifying Threats in the Age of Fake RaaS
2024-9-25 16:1:41 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.kelacyber.com
ransomware
lockbit
kela
victim
fear
How Scary is that Data Leak, Really? According to Cyber Threat Intelligence, You Might Be Able to Sleep Easy
2024-9-25 16:1:40 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - www.kelacyber.com
database
scraped
security
claimed
okta
Sharing is Caring: Ransomware and Extortion Actors Increase Threat Levels through Cooperation
2024-9-25 16:1:39 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - www.kelacyber.com
lockbit
affiliate
victim
ransomware
alphv
Catch Me If You Can: The LockBit Edition – Explained
2024-9-25 16:1:38 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - www.kelacyber.com
lockbit
ransomware
kela
khoroshev
victim
BreachForums Seized by FBI: Inside the Notorious Cybercrime Marketplace
2024-9-25 16:1:36 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - www.kelacyber.com
forums
seized
raidforums
NIST and CTI: The Perfect Match for Building a Cyber Resilient Organization
2024-9-25 16:1:35 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.kelacyber.com
cti
security
threats
monitoring
The Power of KELA’s Cyber Intelligence Platform: Blocking Ransomware Attacks and Driving ROI
2024-9-25 16:1:34 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.kelacyber.com
kela
ransomware
security
healthcare
brokers
Previous
366
367
368
369
370
371
372
373
Next