unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
银河系也许不会与仙女座星系相撞
天文学家多年来一直认为,银河系(Milky Way)将在几十亿年之后与它最近的邻居仙女座星系(Andromeda)合并,这一事件被称为 Milkomeda,银河系和仙女座将在数十亿年之后稳...
2024-8-13 22:49:26 | 阅读: 6 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
星系
银河
银河系
几率
仙女
中科院计算所 | NetGPT:网络流量的生成式预训练 Transfomer 模型
论文题目:NetGPT: Generative Pretrained Transformer for Network Traffic论文作者:Xuying Meng, Chungang Lin, Ye...
2024-8-13 22:46:31 | 阅读: 10 |
收藏
|
安全学术圈 - mp.weixin.qq.com
流量
模型
数据
netgpt
网络
‘Prolific’ malvertising scammer arrested and extradited to US to face charges
A Belarusian-Ukrainian national dubbed "one of the world’s most prolific Russian-speaking cybercrim...
2024-8-13 22:46:25 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ransomware
nca
silnikau
court
wire
CVE-2024-6619
Disclosure PolicyTeam82 is committed to privately reporting vulnerab...
2024-8-13 22:36:0 | 阅读: 4 |
收藏
|
Team82 Disclosure Dashboard - claroty.com
pgp
team82
coordinated
privately
CVE-2024-6618
Disclosure PolicyTeam82 is committed to privately reporting vulnerab...
2024-8-13 22:34:0 | 阅读: 16 |
收藏
|
Team82 Disclosure Dashboard - claroty.com
pgp
coordinated
team82
Sleeping With the Phishes
2024-8-13 22:26:27 | 阅读: 5 |
收藏
|
Posts By SpecterOps Team Members - Medium - posts.specterops.io
Sleeping With the Phishes
PHISHING SCHOOLHiding C2 With Stealthy Callback ChannelsWrite a custom command and control (C2) i...
2024-8-13 22:26:27 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
c2
outbound
network
doh
stealthy
6 Best ISO 27001 Compliance Software in 2024
With more sensitive data moving to the cloud, the threat of a breach or cyberattack is more pressi...
2024-8-13 22:19:56 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
software
27001
scytale
isms
proactive
How to Prevent Your First AI Data Breach
error code: 1106...
2024-8-13 22:15:18 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
GhostWrite: New T-Head CPU Bugs Expose Devices to Unrestricted Attacks
Vulnerability / Hardware SecurityA team of researchers from the CISPA Helmholtz Center for Informa...
2024-8-13 22:2:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
memory
security
hardware
attacker
ghostwrite
China-linked hackers could be behind cyberattacks on Russian state agencies, researchers say
Hackers have targeted dozens of computers belonging to Russian state agencies and tech companies wi...
2024-8-13 22:1:28 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
malicious
plugy
apt27
apt31
Cato Network Reports Spike in Attempts to Exploit Log4j Vulnerabilities
A report published today by Cato Networks finds three years after its discovery in 2021 there was a...
2024-8-13 21:52:23 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
log4j
intelbroker
maor
Ransom Cartel, Reveton ransomware owner arrested, charged in US
error code: 1106...
2024-8-13 21:45:18 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Will the real #GrimResource please stand up? – Abusing the MSC file format
In this blog post we describe how the MSC file format can be leveraged to execute arbitrary code v...
2024-8-13 21:34:59 | 阅读: 14 |
收藏
|
Outflank Blog - www.outflank.nl
snap
msc
mmc
security
pane
CryptoCore: Unmasking the Sophisticated Cryptocurrency Scam Operations
2024-8-13 21:32:8 | 阅读: 53 |
收藏
|
Over Security - Cybersecurity news aggregator - decoded.avast.io
youtube
hijacked
cryptocore
wallets
deepfake
What is Nassef from Darkode Up To?
In this post I'll elaborate more on some of the current activities of a well known Darkode forum me...
2024-8-13 21:27:0 | 阅读: 2 |
收藏
|
Dancho Danchev's Blog - ddanchev.blogspot.com
suhxxp
comhxxp
darkode
nethxxp
hxxp
What is Nassef from Darkode Up To?
In this post I’ll elaborate more on some of the current activities of a well known Dar...
2024-8-13 21:27:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
hxxp
darkode
tonymontana
portfolio
security
Mr. Robot
2024-8-13 21:21:33 | 阅读: 4 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Over 100 Ukrainian computers infected with backdoor malware, researchers say
Ukrainian researchers have discovered a phishing campaign targeting local state agencies with remot...
2024-8-13 21:16:26 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ukraine
remote
ukrainian
meshagent
malicious
Microsoft PlayReady WMRMECC256 Key / root key issue (attack #5)
Full Disclosuremailing list archivesFrom: Security Explorations <contact () secu...
2024-8-13 21:14:9 | 阅读: 13 |
收藏
|
Full Disclosure - seclists.org
playready
client
security
canal
Previous
864
865
866
867
868
869
870
871
Next