unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks
Cyber Espionage / Threat IntelligenceThreat actors with ties to North Korea have been observed del...
2024-10-3 21:0:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
veilshell
north
korea
powershell
stage
Cybersecurity Awareness Month: Essential Cybersecurity Tips from a CISO for a Safer Digital World
2024-10-3 21:0:0 | 阅读: 0 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
The AI Threat: Misinformation and the 2024 Elections
Cody CornellCody is responsible for the strategic direction of Swimlane and the development of our...
2024-10-3 21:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
cody
cornell
swimlane
streamline
Why You Have to Love 1-to-1 Meetings to Succeed in Your Career
Management is about people and helping your team achieve company goals. Whether you’re stepping into...
2024-10-3 20:55:28 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
meetings
alex
meeting
papergone
121s
Maximize Vercel's FREE Plan: Enable Auto Deployment for All Members
Earlier, Vercel's free pricing plan allowed multiple members to commit changes that would automatica...
2024-10-3 20:49:41 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
github
repository
vercel
pushes
triggering
As ransomware attacks surge, UK privacy regulator investigating fewer incidents than ever
As ransomware data breaches reach record high levels across the United Kingdom, the number of incid...
2024-10-3 20:31:28 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ransomware
bill
Learn How to Translate Your Published Story into 77 Languages
All published stories can now be translated into any language! We’ve added 77 languages to the Hacke...
2024-10-3 20:30:17 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
stories
translation
translated
hackernoon
Radiology provider exposed tens of thousands of patient files
An anonymous person has disclosed that they gained online access to a r...
2024-10-3 20:6:25 | 阅读: 1 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
patient
med
advice
dates
Sellafield, UK’s largest nuclear site, fined £330,000 for cybersecurity failings
The company managing the Sellafield nuclear site in the United Kingdom has been fined £332,500 ($43...
2024-10-3 20:1:38 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
nuclear
security
failings
sellafield
OptOut: Imperceptible Revolution
We live at a pivotal moment in history, during a true revolution. Of course, many people understand...
2024-10-3 19:43:42 | 阅读: 11 |
收藏
|
Hacker Noon - hackernoon.com
labor
development
machine
software
commodity
Coding Exercise: Database Migration Tool in Nodejs
I want to have a database migration tool that has the following properties:Every migration is writ...
2024-10-3 19:41:4 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
database
migrations
adapter
migration
transact
StealC Malware Analysis Part 3
In the first article of the series, we saw how to unpack the first stage pkr_ce1a manually and using...
2024-10-3 19:39:0 | 阅读: 17 |
收藏
|
Lexfo's security blog - blog.lexfo.fr
xored
c4
callers
stealc
decoded
StealC Malware Analysis Part 2
Stage 2 informationIn the previous article, we retrieved Stage2 (a PE) encrypted and embedded in Sta...
2024-10-3 19:38:0 | 阅读: 9 |
收藏
|
Lexfo's security blog - blog.lexfo.fr
jitter
miasm
stage
syncupd
c2
StealC Malware Analysis Part 1
This series of blog posts is aimed at a technical audience interested in reverse engineering and, mo...
2024-10-3 19:37:0 | 阅读: 16 |
收藏
|
Lexfo's security blog - blog.lexfo.fr
miasm
jitter
libbase
shellcode
memory
RAG Revisited
RAG. RAG. RAG.In the race to implement artificial intelligence in business processes and products,...
2024-10-3 19:34:25 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
rag
llms
costs
agents
precise
2024’s Best Open Source Cybersecurity Tools
Please fill out the form to read this article*** This is a Security Blogge...
2024-10-3 19:16:24 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
centraleyes
syndicated
authored
rebecca
kappel
Weird Zimbra Vulnerability
Please fill out the form to read this article*** This is a Security Blogge...
2024-10-3 19:4:20 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
schneier
security
weird
zimbra
bloggers
3 ways to get Remote Code Execution in Kafka UI
Thursday, October 3, 2024 3 ways to get Remote Code Execution in Kafka UI...
2024-10-3 18:48:0 | 阅读: 8 |
收藏
|
Artsploit - artsploit.blogspot.com
remote
github
security
thursday
thrilled
Hunting for IoCs: from singles searches to an automated and repeatable process
Table of contentsHow Sekoia can help you scale in IoC hunting and retro huntingKey...
2024-10-3 18:47:2 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
defend
threats
security
retro
Release Notes: Safebrowsing, Private AI Assistant, Splunk Integration, and more
Welcome to ANY.RUN‘s m...
2024-10-3 18:2:27 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
security
threats
analysis
ransomware
Previous
485
486
487
488
489
490
491
492
Next