unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
US offers $2.5 million reward for hacker linked to Angler Exploit Kit
error code: 1106...
2024-8-29 05:15:17 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
How to Create a Monorepo With Vite, Cloudflare, Remix, PNPM and Turborepo (No Build Step)
IntroductionI needed a way to use Remix with Vite and Cloudflare Workers-Pages with minimal configu...
2024-8-29 05:8:3 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
remix
libs
pnpm
drizzle
repository
U.S. CISA adds Google Chromium V8 bug to its Known Exploited Vulnerabilities catalog
U.S. CISA adds Google Chromium V8 bug to its Known Exploited Vulnerabilities catalogU.S. Cyber...
2024-8-29 05:1:51 | 阅读: 14 |
收藏
|
Security Affairs - securityaffairs.com
exploited
catalog
security
chromium
AccentFold: Enhancing Accent Recognition - Conclusion, Limitations, and References
Authors:(1) Abraham Owodunni, Intron Health, Masakhane, and this author contributed equally;(2) A...
2024-8-29 05:0:26 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
speech
arxiv
linguistics
asr
accents
Exploits, Vulnerabilities and Payloads – Who Knew?
I can’t count how many times I’ve heard vulnerabilities called exploits and exploits called vulner...
2024-8-29 04:46:20 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
windows
exploited
payload
software
Product Release: Selective Sync + Account Recovery
Selective SyncPreVeil is introducing a new feature to help make folder syncing easy a...
2024-8-29 04:29:56 | 阅读: 15 |
收藏
|
Security Boulevard - securityboulevard.com
preveil
selective
fragment
network
passwords
The Top C# .NET UI Controls
When you're choosing UI controls for C# .NET development, there are many things you should consider....
2024-8-29 04:29:5 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
navigation
mvc
charts
editors
Young Consulting data breach impacts 954,177 individuals
Young Consulting data breach impacts 954,177 individualsA ransomware attack by the BlackSuit g...
2024-8-29 04:17:8 | 阅读: 10 |
收藏
|
Security Affairs - securityaffairs.com
consulting
young
ransomware
shield
blacksuit
Cisco: BlackByte ransomware gang only posting 20% to 30% of successful attacks
The BlackByte ransomware gang is only posting a fraction of its successful attacks on its leak site...
2024-8-29 04:17:4 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
blackbyte
talos
37085
ransomware
Indagini francesi su Durov e problemi tra Israele e data leak scomodi su Telegram. Si tiene tutto, tranne Israele?
Pavel Durov, il fondatore di Telegram, è stato recentemente fermato in F...
2024-8-29 04:2:20 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.insicurezzadigitale.com
di
che
ha
contro
durov
CulturaX: A High-Quality, Multilingual Dataset for LLMs - Conclusion and References
Authors:(1) Thuat Nguyen, Dept. of Computer Science, University of Oregon, OR, USA;(2) Chien Van...
2024-8-29 04:0:32 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
association
linguistics
arxiv
proceedings
Mythic 3.3 — Out of Beta
2024-8-29 03:22:11 | 阅读: 2 |
收藏
|
Posts By SpecterOps Team Members - Medium - posts.specterops.io
Mythic 3.3 — Out of Beta
Mythic 3.3 — Out of BetaMythic 3.3 was released in a Beta six weeks ago, and since then there has...
2024-8-29 03:22:11 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
mythic
tasking
agents
scroll
preference
Telegram CEO's arrest sparks flurry of questions over motivation, privacy impact
Updated at 4:45pm EST with new details about charges against Durov. When Eva Galperin heard that P...
2024-8-29 03:2:8 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
durov
french
arrest
governments
galperin
Why I Chose to Open Source Aloha: My Commitment to Privacy and Collaboration
My name is Andrew Frost Moroz, and I’m the creator of Aloha Browser, an alternative to mainstream br...
2024-8-29 03:0:33 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
aloha
developers
security
library
AccentFold: Enhancing Accent Recognition - Empirical Study of AccentFold
Authors:(1) Abraham Owodunni, Intron Health, Masakhane, and this author contributed equally;(2) A...
2024-8-29 03:0:31 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
accentfold
accents
accent
wer
trained
Crypto ≠ One-Size-Fits-All: The Key to Driving Adoption in Africa
Crypto needs emerging markets (and in part thanks to Gary Gensler, thanks Gary) many in the Western...
2024-8-29 03:0:28 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
africa
continent
stablecoins
offramps
Unlocking Creative Potential: Exploring Latent Spaces in 3D Generative Design
The creative process in design has always been about pushing boundaries, exploring new frontiers, an...
2024-8-29 03:0:25 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
latent
generative
designs
exploration
designers
PoorTry Windows driver evolves into a full-featured EDR wiper
error code: 1106...
2024-8-29 03:0:21 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Q Numbers Redux
Back in July I wrote about Q numbers, which make it possible to compare numeric values using a...
2024-8-29 03:0:0 | 阅读: 10 |
收藏
|
ongoing by Tim Bray - www.tbray.org
numbits
arne
automaton
integers
hormann
Previous
703
704
705
706
707
708
709
710
Next