unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
New Alpha Release: Tor Browser 14.0a2
Tor Browser 14.0a2 is now available from the Tor Browser download page and also from our distributio...
2024-8-20 08:0:0 | 阅读: 0 |
收藏
|
Tor Project blog - blog.torproject.org
mozilla
windows
geckoview
gitlab
upstream
Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the tr...
2024-8-20 07:30:18 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
malicious
slashnext
invoice
analysis
Pirated guided hacking?
2024-8-20 07:24:15 | 阅读: 13 |
收藏
|
Reverse Engineering - www.reddit.com
agree
reddit
username
acknowledge
continuing
Why a Savvy Security Strategy is Essential | Grip
In today’s fast-paced digital era, enterprises face an ever-growing landscape of cyber...
2024-8-20 07:17:12 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
savvy
monitoring
operational
audits
Should small businesses worry about the NIS2 Directive in Europe?
The EU tightens cybersecurity requirements for critical infrastructure and services with the new NIS...
2024-8-20 06:15:0 | 阅读: 0 |
收藏
|
Blog | Avast EN - blog.avast.com
directive
nis2
security
annual
What Is Your Perspective?
The above image is a beautiful image of a butterfly meshed in vibrant colors with musical notes all...
2024-8-20 06:7:52 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
security
network
MIFARE Classic: exposing the static encrypted nonce variant... and a few hardware backdoors
We studied the most secure stat...
2024-8-20 06:0:0 | 阅读: 3 |
收藏
|
Quarkslab's blog - blog.quarkslab.com
fm11rf08s
mifare
annexes
fudan
hardware
INFINIT Opening DApp Creation To All With First-Ever DeFi Abstraction Layer
BANGKOK Thailand, August 19th, 2024/Chainwire/--INFINIT, the first-of-its-kind DeFi abstraction laye...
2024-8-20 05:30:26 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
infinit
defi
developers
customized
Master Thinkers: 5 Habits That They Have
Navigating complex problems, generating insights, and finding solutions that others didn’t know exis...
2024-8-20 05:26:6 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
thinkers
brain
mental
thoughts
beliefs
Startups Dilemma: Build vs Buy
Picture this: you're a startup founder (or CTO) with a vision of a product burning bright in your mi...
2024-8-20 05:15:32 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
software
shelf
infra
simplicity
integrate
Toyota confirms breach after stolen data leaks on hacking forum
error code: 1106...
2024-8-20 05:0:22 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Why Cyber Resilience Matters - Andrew Harding, Theresa Lanowitz - BSW #361
Aug 19, 2024What are the barriers to cyber resilience today? Why is it sodifficult? And what is com...
2024-8-20 04:59:0 | 阅读: 8 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
levelblue
security
menlo
resilience
Ethical Considerations of Hiring Fairly in the Age of AI & Algorithms
Artificial intelligence (AI) continues to infiltrate numerous sectors, and recruitment is no excepti...
2024-8-20 04:42:50 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
recruitment
hiring
candidates
bias
efficiency
Ransomware rakes in record-breaking $450 million in first half of 2024
error code: 1106...
2024-8-20 04:30:20 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
The 4 Components of Top AI Model Ecosystems
Table of ContentsThe ModelPost-trainingInternal toolingAgentsSummary I have been thinking a lot abou...
2024-8-20 04:27:20 | 阅读: 13 |
收藏
|
Unsupervised Learning - danielmiessler.com
tooling
weights
competition
agents
matters
Crypto enthusiasts flood npm with more than 281,000 bogus packages overnight
Crypto enthusiasts have lately been flooding software registries like npm and PyPI with thousan...
2024-8-20 04:16:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
overnight
bogus
enthusiasts
flood
test
New AI technologies are advancing cyberattacks and wreaking havoc on traditional identity verificat...
2024-8-20 04:0:52 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
competitive
security
leaders
bake
comparing
CISA adds Jenkins Command Line Interface (CLI) bug to its Known Exploited Vulnerabilities catalog
CISA adds Jenkins Command Line Interface (CLI) bug to its Known Exploited Vulnerabilities catalog...
2024-8-20 03:46:56 | 阅读: 16 |
收藏
|
Security Affairs - securityaffairs.com
jenkins
catalog
exploited
23897
Announcing new EDR capabilities for Webroot Endpoint Protection
by | Aug 19, 2024 | Threat LabRe...
2024-8-20 03:45:45 | 阅读: 19 |
收藏
|
Webroot Blog - www.webroot.com
webroot
security
defenders
network
What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF
On July 19, 2024, a flawed update in CrowdStrike Falcon's channel file 291 led to a logic err...
2024-8-20 03:36:15 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
ebpf
cilium
security
cves
Previous
798
799
800
801
802
803
804
805
Next