unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
White House Wants to Tighten Internet Routing Security
The White House is taking another step in trying to shore up the security issues with the Gateway B...
2024-9-5 03:24:35 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
roa
rov
oncd
roadmap
How AI Is Using Tongue Color to Predict Diseases With High Accuracy
The health care industry often takes ages to adopt new technologies because it must jump through num...
2024-9-5 03:0:28 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
tongue
diagnosis
machine
diseases
diagnostic
Can Cryptocurrency Enable a Stateless, Global Economy?
When Bitcoin was released to the world in 2008 it was celebrated as a pivotal moment in technology a...
2024-9-5 03:0:27 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
currencies
blockchains
truly
fiat
Theory Coherent Shrinkage of Time Varying Parameters in VARs: Analysis at the ZLB
Andrea Renzetti, Department of Economics, Alma Mater Studiorium Universit`a di Bologna, Piazza Scara...
2024-9-5 03:0:22 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
zlb
tvp
nk
shocks
economy
Simulating Photon-Triggered Jets in Quark-Gluon Plasma: Results and Discussion
Authors:(1) Chathuranga Sirimanna, Department of Physics, Duke University, Durham, Department of P...
2024-9-5 03:0:19 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
jetscape
phys
jet
photons
lett
0 dependencies!
Here’s a tiny little done-in-a-couple-hours project consisting of a single static Web page and a cu...
2024-9-5 03:0:0 | 阅读: 3 |
收藏
|
ongoing by Tim Bray - www.tbray.org
badge
software
library
standing
USENIX Security ’23 – Downfall: Exploiting Speculative Data Gathering
Thursday, September 5, 2024 Community Chats Webinars LibraryHomeCybersecurity News...
2024-9-5 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
network
cloud
Announcing Fibratus 2.2.0 - adversary tradecraft detection, protection, and hunting
2024-9-5 02:58:5 | 阅读: 7 |
收藏
|
Reverse Engineering - www.reddit.com
agree
reddit
agreement
continuing
username
Bitoro To launch Perpetual Futures ‘ZK Chain’ To Enhance Liquidity
**ROAD TOWN, BVI, September 4th, 2024/Chainwire/--**Bitoro is thrilled to announce the upcoming laun...
2024-9-5 02:49:33 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
bitoro
bitorocore
zksync
zk
liquidity
Cisco fixes root escalation vulnerability with public exploit code
error code: 1106...
2024-9-5 02:45:19 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Looking for Missed Alarm Bugs in a Formal Verification Tool
[This piece is co-authored with Vsevolod Livinskii.]Formal verification isn’t some sort of magi...
2024-9-5 02:29:3 | 阅读: 6 |
收藏
|
Embedded in Academia - blog.regehr.org
alive2
alarm
missed
minotaur
candidate
INE Security Announces 5 Practical Steps To Elevate Cyber Defense Strategies
CARY, North Carolina, September 4th, 2024/CyberNewsWire/--In a proactive response to the rapidly evo...
2024-9-5 02:23:5 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
security
ine
threats
skill
August Recap: New AWS Sensitive Permissions and Services
As AWS continues to evolve, new services and permissions are frequently introduced to e...
2024-9-5 02:16:45 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
ami
tactic
malicious
security
grants
New Eucleak attack lets threat actors clone YubiKey FIDO keys
error code: 1106...
2024-9-5 02:0:25 | 阅读: 20 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Simulating Photon-Triggered Jets in Quark-Gluon Plasma: Using JETSCAPE framework
Authors:(1) Chathuranga Sirimanna, Department of Physics, Duke University, Durham, Department of P...
2024-9-5 02:0:22 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
jetscape
pb
pythia
shower
partons
FBI Warns of North Korea Attacks Against the Crypto Industry
The decentralized finance (DeFi) andcryptocurrency industries are being targeted by North Korean...
2024-9-5 01:38:0 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
north
security
korean
network
github
Top 10 Benefits of Outsourcing Your Data Protection Officer
1. Cost EfficiencySavings on Recruitment and TrainingHiring a full-time DPO involves costs associ...
2024-9-5 01:33:31 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
outsourced
dpo
dpos
laws
outsourcing
Nuke Silicon Valley - Decentralize AI
There are the unavoidable “Three M’s” talking points in almost all of The Joe Rogan Experience episo...
2024-9-5 01:16:35 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
joe
thiel
peter
talking
Avoid Email Spam By Building a Secure Form in Python
A valid email address is a gateway for establishing direct communication, generating leads, getting...
2024-9-5 01:8:54 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
flask
hcaptcha
database
signup
python
How Bots and AI Are Fueling Disinformation
Mark Twain famously quipped, “A lie can travel halfway around the world while the truth is putting...
2024-9-5 01:0:32 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
bots
truth
brands
network
Previous
636
637
638
639
640
641
642
643
Next