unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - Brett Stone-Gross, Rakesh Nair, Rekha Shenoy, Marty Momdjian - ESW #372
Aug 15, 2024In this conversation, the hosts discuss patchless patching,vulnerabilities in the Windo...
2024-8-16 03:0:0 | 阅读: 0 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
security
ransomware
sponsored
devo
Dozens of Google products targeted by scammers via malicious search ads
In a previous blog, we saw criminals distribute malware via malicious ads for Google Authentica...
2024-8-16 02:48:18 | 阅读: 5 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
malicious
looker
advertiser
windows
How to Align Infosec to Business Operations: Sam Curry’s Cybersecurity Playbook for Executives
This cybersecurity playbook is inspired by Sam Curry’s insights on the crucial role of building re...
2024-8-16 02:18:35 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
playbook
The Hidden Cost of Click Fraud: Why Data You Can Trust, Matters
Hot TopicsUSENIX Security ’23 - TRIDENT: Towards Detecting and Mitigating Web-based Social En...
2024-8-16 02:15:44 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
clicks
genuine
ctr
inaccurate
security
Ransomware gang deploys new malware to kill security software
error code: 1106...
2024-8-16 02:15:18 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
AI, election security headline discussions at Black Hat and DEF CON
Thursday, August 15,...
2024-8-16 02:1:57 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.talosintelligence.com
talos
security
software
ReliaQuest: Watch Out for Info-Stealers and RATs
Threat actors are gravitating toward info-stealing malware like LummaC2 and remote access trojans (...
2024-8-16 01:53:41 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
socgholish
lummac2
reliaquest
evans
software
Google disrupted hacking campaigns carried out by Iran-linked APT42
Google disrupted hacking campaigns carried out by Iran-linked APT42Google disrupted a hacking...
2024-8-16 01:30:57 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
apt42
phishing
iran
trump
disrupted
Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrations
Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrationsjosh.p...
2024-8-16 01:28:57 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
pqc
thales
security
cpl
encryption
Google: Iranian hackers targeting affiliates of both US presidential campaigns
Hackers allegedly connected to the government of Iran have ramped up phishing attacks against high-...
2024-8-16 01:16:22 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
apt42
iran
officials
trump
affiliated
The Polar Bear in Your Kitchen: A Cybersecurity Analogy
August 15, 2024Chris Clements, VP of Solutions Architecture at CISO Global High-Tech Pest Con...
2024-8-16 01:15:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
polar
bear
ciso
Randall Munroe’s XKCD ‘Celestial Event’
Regular vulnerability assessments/pen testingAutomated security testing within CI/CD pipelinesC...
2024-8-16 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
assessments
reviews
audits
hoc
Coming Soon: NEW Classroom Manager by ManagedMethods
Classroom Manager is purpose-built for K-12 cybersecurity, safety, and complianceAt ManagedMethods...
2024-8-16 00:45:17 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
classroom
teachers
scenes
Tusk: unraveling a complex infostealer campaign
SummaryKaspersky Global Emergency Response Team (GERT) has identified a complex campa...
2024-8-16 00:15:13 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
inactive
trojan
shop
tidyme
The Noonification: AI the Quest for Superintelligence (8/15/2024)
2024-8-16 00:4:24 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
monopoly
ripple
hackernoon
laws
A Gap in the Armor: What Was Missing from Black Hat 2024
Along with 30,000+ of my closest friends, HYAS participated in both the Black Hat 2024 cyber se...
2024-8-16 00:0:19 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
hyas
talking
security
network
resiliency
The Systemic Impact of Deplatforming on Social Media: Acknowledgements, Data, and References
Authors:(1) Amin Mekacher, City University of London, Department of Mathematics, London EC1V 0HB,...
2024-8-15 23:56:3 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
proceedings
gettr
london
york
journal
The Systemic Impact of Deplatforming on Social Media: Methods
Authors:(1) Amin Mekacher, City University of London, Department of Mathematics, London EC1V 0HB,...
2024-8-15 23:55:23 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
gettr
toxicity
matched
london
cohort
The Systemic Impact of Deplatforming on Social Media: Discussion & Conclusion
Authors:(1) Amin Mekacher, City University of London, Department of Mathematics, London EC1V 0HB,...
2024-8-15 23:54:42 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
gettr
london
matched
banned
The Systemic Impact of Deplatforming on Social Media: Results
Authors:(1) Amin Mekacher, City University of London, Department of Mathematics, London EC1V 0HB,...
2024-8-15 23:53:44 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
cohort
matched
gettr
banned
quote
Previous
835
836
837
838
839
840
841
842
Next