unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
2024 年 Ig 诺贝尔奖公布结果
2024 年 Ig 诺贝尔奖在 MIT 公布了结果。2020-2023 年的颁奖典礼因新冠疫情以在线方式举行,今年是过去五年首次恢复线下颁奖。获奖者没有差旅费补贴,需要自掏腰包。获奖者包括...
2024-9-13 22:32:47 | 阅读: 0 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
ig
获奖者
半球
假药
improbable
A new vault of Reverse Engineering Resources
2024-9-13 22:23:38 | 阅读: 4 |
收藏
|
Reverse Engineering - www.reddit.com
reddit
agree
agreement
continuing
username
Lehigh Valley Health Network hospital network has agreed to a $65 million settlement after data breach
Lehigh Valley Health Network hospital network has agreed to a $65 million settlement after data br...
2024-9-13 22:8:38 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
network
valley
lehigh
settlement
lvhn
AI in Cybersecurity: Experts Discuss Opportunities, Misconceptions and the Path Forward
Artificial intelligence (AI) is no longer just a buzzword in the cybersecurity industry—it’s an ess...
2024-9-13 22:7:22 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
nuspire
marcy
security
michael
Crypto After All These Years: What Keeps Us Hooked?
tl;drPeople come for the long-term vision but stay for the short-term gains.Success is measured o...
2024-9-13 22:0:11 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
liquidity
capital
investors
venture
Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers
Virtual Reality / VulnerabilityDetails have emerged about a now-patched security flaw impacting Ap...
2024-9-13 21:51:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
gaze
avatar
gazeploit
persona
typing
Un malware Linux colpisce Weblogic Server per eseguire un cryptominer
2024-9-13 21:45:32 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.securityinfo.it
di
che
uno
weblogic
attacchi
Binary Ninja Ultimate
Today, we are releasing the newest edition of our flagship product: Binary Ninja Ultimate.Th...
2024-9-13 21:33:7 | 阅读: 3 |
收藏
|
Binary Ninja - binary.ninja
client
floating
eula
6025
17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London
British authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyb...
2024-9-13 21:29:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
tfl
scattered
spider
cloud
crime
How Binius Reduces Computational Complexity with Towers of Binary Fields
Reducing computational complexity has always been one of the primary goals of blockchain technology....
2024-9-13 21:23:19 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
binius
tau
mathbb
tower
ldots
Top 5 Vulnerability Management Mistakes Companies Make (Plus a Bonus Mistake to Avoid)
Are you confident your vulnerability management is doing its job, or do you sometimes feel like it’...
2024-9-13 21:18:48 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
monitoring
asset
threats
Serverless Databases in 2024: The State of Serverless Solutions for Modern Apps
As we're into the last quarter of 2024, we have seen an explosion of new dev tools, companies, and p...
2024-9-13 21:16:31 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
database
client
neon
supabase
cloud
Integrating SOAR with Existing Security Systems
Effective Security Operations Center (SOC) management is more complex than ever. Analysts are plague...
2024-9-13 21:13:7 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
security
soar
playbooks
stage
Compiling NuttX Documentation locally
These are the steps I took to compile NuttX Documentation:$ sudo apt install python3-sphinx...
2024-9-13 21:5:21 | 阅读: 4 |
收藏
|
Alan C. Assis - acassis.wordpress.com
sphinx
rtd
tabs
copybutton
braindamage
Finding Honeypot Data Clusters Using DBSCAN: Part 2, (Fri, Aug 23rd)
In an earlier diary [1], I reviewed how using tools like DBSCAN [2] can be useful to group similar...
2024-9-13 21:4:13 | 阅读: 6 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
honeypot
ocean
eps
passwd
dbscan
Largest crypto exchange in Indonesia pledges to reimburse users after $22 million theft
A major cryptocurrency exchange in Southeast Asia has paused operations after $22 million in coins...
2024-9-13 21:1:28 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
indodax
security
careful
maintenance
fund
Friends don’t let friends reuse nonces
By Joe DoyleIf you’ve encountered cryptography software, you’ve probably heard t...
2024-9-13 21:0:54 | 阅读: 6 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
tux
alice
noise
reuse
Friends don’t let friends reuse nonces
By Joe DoyleIf you’ve encountered cryptography software, you’ve probably heard the advice to never...
2024-9-13 21:0:54 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
tux
alice
noise
reuse
nonces
The Good, the Bad and the Ugly in Cybersecurity – Week 37
The Good | Cybercrime Syndicate Members Arrested In Singapore & Dark Market Admins Indicted for Fra...
2024-9-13 21:0:14 | 阅读: 10 |
收藏
|
SentinelOne - www.sentinelone.com
oilrig
iraqi
c2
wwh
club
Identity, Endpoints, and the Cloud Drive the Microsoft Security Product E5 Decision
September 13, 2024 2 Minute Read...
2024-9-13 21:0:0 | 阅读: 4 |
收藏
|
Trustwave Blog - www.trustwave.com
microsoft
security
cloud
broggy
defender
Previous
537
538
539
540
541
542
543
544
Next