unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Google Chrome 今年至今修复了 10 个 0day
Google Chrome 浏览器今年至今修复了 10 个 0day。其中第 10 个是安全研究员 TheDog 报告的 CVE-2024-7965,是编译器后端在选择要生成的 JIT 编...
2024-8-27 23:0:57 | 阅读: 1 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
chrome
7965
7971
exploited
信息
Red Hat Security Advisory 2024-5871-03
The following advisory data is extracted from:https://access.redhat.com/security/data/csaf/v2/advi...
2024-8-27 23:0:37 | 阅读: 6 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
security
redhat
rhsa
bind9
1737
Red Hat Security Advisory 2024-5858-03
The following advisory data is extracted from:https://access.redhat.com/security/data/csaf/v2/advi...
2024-8-27 23:0:24 | 阅读: 3 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
security
redhat
bugzilla
kpatch
rhsa
How to Choose an LLM in Software Development
With so many Large Language Models (LLMs) out there, selecting the right LLM is crucial for any org...
2024-8-27 23:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
llm
llms
trained
security
openai
miniProxy 1.0.0 Remote File Inclusion
==================================================================================================...
2024-8-27 22:59:44 | 阅读: 0 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
miniproxy
php
vulnweb
tos
Medicine Tracker System 1.0 Insecure Settings
==================================================================================================...
2024-8-27 22:59:20 | 阅读: 0 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
enggine
admin123
liquidworm
indoushka
download
Medical Hub Directory Site 1.0 Insecure Settings
==================================================================================================...
2024-8-27 22:59:1 | 阅读: 0 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
indoushka
windows
php
jericho
hussin
Cloud Storage Bucket Security: PII Leak Brings Renewed Focus to Storage Bucket Access Controls
Key Takeaways News of a Google Cloud Storage bucket data leak has once again drawn public attenti...
2024-8-27 22:47:2 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
cloud
buckets
monitoring
security
Consciousness: Why Philosophy of Mind May No Longer Be Relevant to Neuroscience
If the purpose is to understand how the brain works, where in the brain is physicalism? Or, where...
2024-8-27 22:44:40 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
neurons
brain
philosophy
theory
Your Car’s Secret Weakness: The Hidden Dangers of Bluetooth
2024-8-27 22:41:40 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
JSON解析差异-风险研究
2024-8-27 22:39:46 | 阅读: 0 |
收藏
|
先知安全技术社区 - xz.aliyun.com
High-Risk CVE-2024-7965 Vulnerability in Chrome’s V8 Engine Requires Quick Fix
Key TakeawaysCISA has included a type of confusion vulnerability affecting Google...
2024-8-27 22:32:4 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
chrome
security
7965
exploited
6613
How to identify unknown assets while pen testing
error code: 1106...
2024-8-27 22:30:21 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
New 0-Day Attacks Linked to China’s ‘Volt Typhoon’
Malicious hackers are exploiting a zero-day vulnerability in Versa Director, a software...
2024-8-27 22:26:41 | 阅读: 8 |
收藏
|
Krebs on Security - krebsonsecurity.com
versa
typhoon
volt
security
lotus
Chinese government hackers targeted U.S. internet providers with zero-day exploit, researchers say
A group of hackers linked to the Chinese government used a previously unknown vulnerability in soft...
2024-8-27 22:17:44 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - techcrunch.com
versa
lotus
horka
techcrunch
software
Microsoft Sway abused in massive QR code phishing campaign
error code: 1106...
2024-8-27 22:15:18 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Chinese Volt Typhoon hackers exploited Versa zero-day to breach ISPs, MSPs
error code: 1106...
2024-8-27 22:15:17 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
An Architect’s Guide to the Top 10 Tools Needed to Build the Modern Data Lake
I previously wrote about the modern data lake reference architecture, addressing the challenges in e...
2024-8-27 22:11:57 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
lake
warehouse
machine
generative
hugging
Chinese Volt Typhoon Exploits Versa Director Flaw, Targets U.S. and Global IT Sectors
The China-nexus cyber espionage group tracked as Volt Typhoon has been attributed with moderate con...
2024-8-27 22:0:0 | 阅读: 22 |
收藏
|
The Hacker News - thehackernews.com
versa
volt
typhoon
malicious
security
Secure Your Sprawling Attack Surface With Risk-based Vulnerability Management
The cloud, artificial intelligence (AI), machine learning and other technological breakthroughs are...
2024-8-27 22:0:0 | 阅读: 9 |
收藏
|
Tenable Blog - www.tenable.com
security
tenable
asset
attackers
Previous
720
721
722
723
724
725
726
727
Next