unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Background-check giant confirms security incident leaked millions of SSNs
One of the largest companies that conducts background checks confirmed that it is the source of a d...
2024-8-17 03:46:23 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
database
security
summer
breached
Microsoft: Enable MFA or lose access to admin portals in October
error code: 1106...
2024-8-17 03:15:19 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Introducing LFG!: Your All-in-One Web3 Edutainment Super App
We are excited to announce the brand upgrade and a complete UI/UX overhaul of LFG!, transforming it...
2024-8-17 03:4:7 | 阅读: 27 |
收藏
|
Hacker Noon - hackernoon.com
lfg
web3
earn
rewards
Why Talk About Digital Habits?
It doesn’t require the perspicacity of Sherlock Holmes to realize that the internet has altered our...
2024-8-17 03:0:21 | 阅读: 9 |
收藏
|
Hacker Noon - hackernoon.com
development
dimension
quintarelli
immaterial
editora
The Surprising Lessons I've Learned as a Tech Lead
Hello Everyone! After a period of absence from writing, I'm back, trying to get back into the swing...
2024-8-17 03:0:20 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
senior
development
developer
career
experiences
A Biosignature Based on Modeling Panspermia and Terraformation: Appendix
Table of LinksAbstract and 1. Introduction2. Methods2.1. Modeling Panspermia and Terraformation2...
2024-8-17 03:0:17 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
terraformed
planets
mantel
coefficient
planet
Code and the Art of Motorcycle Maintenance: Typical Rookie Faults
Coding is easy, they say, it’s just like riding a bike. Well, programming is actually a motorbike, a...
2024-8-17 03:0:15 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
developers
crucial
readability
software
riding
Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - Brett Stone-Gross, Rakesh Nair, Rekha Shenoy, Marty Momdjian - ESW #372
Aug 16, 2024In this conversation, the hosts discuss patchless patching,vulnerabilities in the Windo...
2024-8-17 03:0:0 | 阅读: 9 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
security
ransomware
sponsored
devo
USENIX Security ’23 – Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol
Regular vulnerability assessments/pen testingAutomated security testing within CI/CD pipelinesC...
2024-8-17 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
assessments
security
hoc
formal
pipelines
Setting custom variables in AutoPkg using the VariablePlaceholder processor
Home > AutoPkg > Setting custom variables in AutoPkg using the VariablePlaceholder processor...
2024-8-17 02:50:51 | 阅读: 8 |
收藏
|
Der Flounder - derflounder.wordpress.com
autopkg
carousel
recipe
Routers from China-based TP-Link a national security threat, US lawmakers claim
Two members of Congress are calling on the Commerce Department to investigate the cybersecurity ris...
2024-8-17 02:46:23 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
routers
security
concern
claimed
Assura, Inc Makes the Inc. 5000 Again for the 4th Year; Coming in at No. 2594!!
Assura Makes Inc. 5000 for the 4th time with three-year revenue growth of 44 percent!RICHMOND, Va....
2024-8-17 02:40:48 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
assura
growth
2594
4th
Lawmakers Ask for Probe of Chinese Router Maker TP-Link
Two U.S. lawmakers are asking the Department of Commerce to investigate giant Wi-Fi router vendor T...
2024-8-17 02:4:34 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
routers
prc
security
soho
volt
Why Training is Critical to Implementing Cisco HyperShield
Cary, United States / North Carolina, August 16th, 2024, CyberNewsWireINE Security Experts Explai...
2024-8-17 02:1:33 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
hypershield
ine
network
A Biosignature Based on Modeling Panspermia and Terraformation: References
Table of LinksAbstract and 1. Introduction2. Methods2.1. Modeling Panspermia and Terraformation2...
2024-8-17 02:0:15 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
doi
journal
1038
astronomy
Russian national sentenced to 40 months for selling stolen data on the dark web
Russian national sentenced to 40 months for selling stolen data on the dark webA Russian natio...
2024-8-17 01:56:33 | 阅读: 5 |
收藏
|
Security Affairs - securityaffairs.com
kavzharadze
slilpp
marketplace
sentenced
selling
Ransomware attack on Flint affecting city services as FBI investigates incident
Phones and computers used by government workers in Flint, Michigan are facing outages due to a rans...
2024-8-17 01:46:23 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
water
ransomware
michigan
flint
residents
Unveiling Top API Vulnerabilities and Emerging Trends: Introducing the Wallarm Q2 2024 API ThreatStats™ Report
As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulne...
2024-8-17 01:40:19 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
quarter
q2
threatstats
Unveiling Top API Vulnerabilities and Emerging Trends: Introducing the Wallarm Q2 2024 API ThreatStats™ Report
As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulnerabil...
2024-8-17 01:40:19 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
q2
threatstats
quarter
A wild week in phishing, and what it means for you
2024-08-166 min readBeing a bad guy on the Internet is a really good business. In more than 90% of c...
2024-8-17 01:34:14 | 阅读: 8 |
收藏
|
The Cloudflare Blog - blog.cloudflare.com
phishing
security
chart
cloud
dlp
Previous
821
822
823
824
825
826
827
828
Next