unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Is Now the Right Time to Start Using Azure Data Studio?
The first time I tried Azure Data Studio a few years ago, I was not impressed because it was a simpl...
2024-8-21 03:0:34 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
profiler
ssms
developers
appreciate
wider
The Cybersecurity Paradox: Why Free Costs Too Much
Well, well, well. Look what the cat dragged in from cyberspace. The cybersecurity industry is pullin...
2024-8-21 03:0:30 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
outsourcing
expertise
talent
software
USENIX Security ’23 – CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
Home » Security Bloggers Network » USENIX Security ’23 – CipherH: Automated Detection of Cipherte...
2024-8-21 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
bloggers
network
2024 Pollscrolling
The 2024 US election has, in the last few weeks, become the most interesting one I can recall. I’m...
2024-8-21 03:0:0 | 阅读: 3 |
收藏
|
ongoing by Tim Bray - www.tbray.org
polls
538
bias
trump
harris
Ransomware payments rose from $449.1 million to $459.8 million
Ransomware payments rose from $449.1 million to $459.8 millionBlockchain analysis firm Chainal...
2024-8-21 02:53:6 | 阅读: 6 |
收藏
|
Security Affairs - securityaffairs.com
ransomware
strains
459
illicit
449
Microsoft launches unified Teams app for personal, work accounts
error code: 1106...
2024-8-21 02:45:16 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Man who hacked Hawaii state registry to forge his own death certificate sentenced to 81 months
A Kentucky man who hacked into a state registry and faked his own death to avoid paying child suppo...
2024-8-21 02:31:24 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
death
kipf
belonging
hawaii
sold
Hackers target bank clients in Czechia, Hungary and Georgia in novel phishing campaign
Hackers set up malicious banking applications that were nearly identical to legitimate European one...
2024-8-21 02:1:33 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
phishing
eset
malicious
ukraine
pwa
Hackers use PHP exploit to backdoor Windows systems with new malware
error code: 1106...
2024-8-21 02:0:26 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Oregon Zoo warns visitors their credit card details were stolen
error code: 1106...
2024-8-21 01:45:19 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Identity Crisis: Hidden Threats In Digital Infrastructure
As enterprises accelerate the adoption of cloud technologies and expand their infrastructures, a gl...
2024-8-21 01:38:15 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
identities
shadow
security
network
sirm
Previously unseen Msupedge backdoor targeted a university in Taiwan
Previously unseen Msupedge backdoor targeted a university in TaiwanExperts spotted a previousl...
2024-8-21 01:27:22 | 阅读: 15 |
收藏
|
Security Affairs - securityaffairs.com
msupedge
symantec
taiwan
1678
download
What You Get with AKS, EKS, GKE vs. Managed Kubernetes-as-a-Service
Managed Kubernetes is a service offered by cloud providers, such as Amazon Web Services (AWS), Micr...
2024-8-21 01:6:13 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
kubernetes
fairwinds
cloud
security
gke
Data breach: The StormouS group exfiltrates 100GB from the servers of the Italian company Teleco srl
2024-8-21 01:2:4 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.suspectfile.com
The Fallout and Lessons Learned from the CrowdStrike Fiasco - Shimon Modi, Jeff Pollard, Allie Mellen, Boaz Barzel - ASW #296
Aug 20, 2024This week, Jeff Pollard and Allie Mellen join us to discuss thefallout and lessons lear...
2024-8-21 01:2:0 | 阅读: 4 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
security
dataminr
appsec
development
Surge in Software Supply Chain Attacks Demands Heightened Third-Party Vigilance
Key Takeaways Attacks on the software supply chain have occurred at a rate of at least one...
2024-8-21 01:1:28 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
software
security
ransomware
cyble
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #304 – Fail Fast
Application Security Check Up ...
2024-8-21 01:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
Aliens Landed in Palo Alto in October of 2027
On the 8th of October in 2027, an alien craft was seen entering the atmosphere over the Atlantic ar...
2024-8-21 00:41:38 | 阅读: 4 |
收藏
|
Unsupervised Learning - danielmiessler.com
craft
aleta
palo
alto
dominion
Widespread Cloud Exposure: Extortion Campaign Used Exposed AWS ENV Files to Target 110,000 Domains
Key TakeawaysA sophisticated cloud extortion campaign used misconfigured AWS .env files to...
2024-8-21 00:31:25 | 阅读: 27 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
cloud
attackers
214
217
security
August Windows updates break dual boot on some Linux systems
error code: 1106...
2024-8-21 00:30:20 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Previous
786
787
788
789
790
791
792
793
Next