unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Where does In-context Translation Happen in Large Language Models: Characterising Redundancy in Laye
Authors:(1) Suzanna Sia, Johns Hopkins University;(2) David Mueller;(3) Kevin Duh.Table of Lin...
2024-8-31 01:0:20 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
redundancy
gptneo
masking
redundant
transformer
Where does In-context Translation Happen in Large Language Models: Data and Settings
Authors:(1) Suzanna Sia, Johns Hopkins University;(2) David Mueller;(3) Kevin Duh.Table of Lin...
2024-8-31 01:0:19 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
llama7b
sentence
french
heads
trained
Where does In-context Translation Happen in Large Language Models: Appendix
Authors:(1) Suzanna Sia, Johns Hopkins University;(2) David Mueller;(3) Kevin Duh.Table of Lin...
2024-8-31 01:0:15 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
sentence
l0
prompts
masking
gates
Randall Munroe’s XKCD ‘Stranded’
Application Security Check Up ...
2024-8-31 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
Weekly#6
Contents News | Article枯れた技術の水平思考JS Dates Are About to Be...
2024-8-31 00:44:39 | 阅读: 13 |
收藏
|
Taxodium - taxodium.ink
菊花
夜行军
行军
向前走
向前
WordPress Vulnerability & Patch Roundup August 2024
Vulnerability reports and responsible disclosures are essential for website security awareness and e...
2024-8-31 00:32:30 | 阅读: 8 |
收藏
|
Sucuri Blog - blog.sucuri.net
software
security
contributor
The Impact of Generative AI on Tech Outsourcing Models
Generative AI has upended the tech industry, and many wonder how much it will impact formerly outsou...
2024-8-31 00:20:19 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
generative
outsourcing
outsourced
duties
developers
The Noonification: Bitcoin L2s Are Eating the World (8/30/2024)
2024-8-31 00:4:23 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
drawings
hackernoon
strawberry
eating
emerging
HHS drops appeal of hospital web tracking decision
The Biden administration on Thursday walked away from its appeal of a federal court decision which...
2024-8-31 00:2:9 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
hospitals
hhs
appeal
hospital
aha
North Korean threat actor Citrine Sleet exploiting Chromium zero-day
On August 19, 2024, Microsoft identified a North Korean threat actor exploiting a zero-da...
2024-8-31 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
sleet
domainlist
citrine
defender
Weekly#6
Table of ContentsNews | Article枯れた技術の水平思考JS Dates Are About to Be FixedYou Are NOT Dumb, Y...
2024-8-31 00:0:0 | 阅读: 2 |
收藏
|
Taxodium - taxodium.ink
菊花
行军
夜行军
向前
向前走
Evolution of Attack Surface Management
The Early Days: Basic Asset ManagementWhile it was not called ASM, the concept of managing at...
2024-8-30 23:52:51 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
monitoring
identify
asset
Evolution of Attack Surface Management
The Early Days: Basic Asset ManagementWhile it was not called ASM, the concept of managing attack...
2024-8-30 23:52:51 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
monitoring
identify
asset
Iranian cybercriminals are targeting WhatsApp users in spear phishing campaign
An Iranian state-sponsored group often referred to as Iran’s Islamic Re...
2024-8-30 23:45:41 | 阅读: 6 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
phishing
iranian
iran
microsoft
president
What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374
Aug 30, 2024The top priority on the CISCritical Security Controls list has never changed:inventory...
2024-8-30 23:34:0 | 阅读: 2 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
security
asset
ed
Google Chrome V8 Type Confusion
© 2024 Packet Storm. All rights reserved. ...
2024-8-30 23:20:56 | 阅读: 1 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
Researchers uncover ‘SlowTempest’ espionage campaign within China
People and organizations in China are being targeted as part of a “highly coordinated” espionage op...
2024-8-30 23:17:5 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
peck
securonix
attackers
software
sectors
【生物安全】最近美国东部马脑炎、猴痘、禽流感、西尼罗河病毒等传染病风险激增
美国新罕布什尔州一人死于蚊媒病毒东部马脑炎,马萨诸塞州卫生官员警告称,多个州已发现该疾病,10 个县面临高度或严重风险。总体情况是:根据美国疾病控制与预防中心的数据,目前尚无疫苗或药物可以治疗 EEE...
2024-8-30 23:16:56 | 阅读: 5 |
收藏
|
丁爸 情报分析师的工具箱 - mp.weixin.qq.com
病毒
东部
脑炎
病例
美国
Cacti Arbitrary File Write / Remote Code Execution
© 2024 Packet Storm. All rights reserved. ...
2024-8-30 23:16:0 | 阅读: 7 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
GNUnet P2P Framework 0.22.0
GNUnet P2P Framework 0.22.0Posted Aug 30, 2024Authored by Christi...
2024-8-30 23:11:40 | 阅读: 5 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
gnunet
hkdf
kem
hpke
network
Previous
681
682
683
684
685
686
687
688
Next