unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Horizon3.ai Partners with FedHIVE to Revolutionize Cybersecurity in the Public Sector
2024-8-13 21:2:51 | 阅读: 6 |
收藏
|
Horizon3.ai - www.businesswire.com
Proactive Security | Enhancing Risk Visibility with Extended Security Posture Management (xSPM)
As part of ongoing growth and digital transformation, many enterprises encounter the challenge of m...
2024-8-13 21:0:38 | 阅读: 9 |
收藏
|
SentinelOne - www.sentinelone.com
security
xspm
posture
threats
Memes Pose a Threat to the US Financial System: RAND Report
Govts, institutions use the same ‘memetic engineering’ tactics they seek to demonize: perspectiveMe...
2024-8-13 21:0:37 | 阅读: 9 |
收藏
|
Hacker Noon - hackernoon.com
memetic
threats
memes
economic
Introducing HTTP request traffic insights on Cloudflare Radar
2024-08-137 min readHistorically, traffic graphs on Cloudflare Radar have displayed two metrics: tot...
2024-8-13 21:0:24 | 阅读: 3 |
收藏
|
The Cloudflare Blog - blog.cloudflare.com
radar
graphs
normalized
metric
summer
Cequence Storms Black Hat with API Security Testing for Generative AI Applications
That’s a wrap for Black Hat 2024! We had a great show and met many of you at the booth...
2024-8-13 21:0:2 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cequence
security
llm
generative
vercara
Dispelling Continuous Threat Exposure Management (CTEM) Myths
2024-8-13 21:0:0 | 阅读: 3 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
Researchers Uncover Vulnerabilities in AI-Powered Azure Health Bot Service
Healthcare / VulnerabilityCybersecurity researchers have discovered two security flaws in Microsof...
2024-8-13 21:0:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
microsoft
tenable
security
healthcare
exploited
Preparation Is Not Optional: 10 Incident Response Readiness Considerations for Any Organization
Let’s face it: Cyberthreats aren’t going anywhere. As technology continues to evolve and grow, so...
2024-8-13 21:0:0 | 阅读: 4 |
收藏
|
Fortinet Threat Research Blog - feeds.fortinet.com
security
assessments
readiness
Compromising Microsoft's AI Healthcare Chatbot Service
Tenable Research discovered multiple privilege-escalation issues in the Azure Health Bot Service via...
2024-8-13 21:0:0 | 阅读: 5 |
收藏
|
Tenable Blog - www.tenable.com
tenable
microsoft
healthcare
cloud
security
A refresher on Talos’ open-source tools and the importance of the open-source community
Tuesday, August 13, 2...
2024-8-13 20:31:55 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.talosintelligence.com
software
security
talos
snort
network
Russia is pushing disinformation about Kursk operation, Ukrainian officials say
The Ukrainian security service (SBU) is warning of a new Kremlin disinformation campaign related to...
2024-8-13 20:31:26 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ukraine
kursk
russia
ukrainian
直播预告|字节跳动5篇论文中选 ACL 2024 Oral,与多位研究员在线畅聊!
作为享誉盛名的计算语言学和自然语言处理领域的顶会,ACL 2024 正在泰国曼谷举行。字节跳动多篇论文被 ACL 2024 录用,其中 5 篇研究成果中选 Oral。本周,我们将在大会展台(Booth...
2024-8-13 20:18:59 | 阅读: 8 |
收藏
|
字节跳动技术团队 - mp.weixin.qq.com
模型
数据
模态
离散
流式
OpenAI「草莓」提前曝光?ChatGPT 版搜索引擎惊现神秘模型|AGI 掘金资讯
2024-8-13 20:18:59 | 阅读: 4 |
收藏
|
字节跳动技术团队 - mp.weixin.qq.com
模型
agi
安全
flux
The Anticompetitive Effects Arising From Google’s Conduct
United States of America v. Google LLC., Court Filing, retrieved on April 30, 2024, is part of Hacke...
2024-8-13 20:15:16 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
5776
rivals
pls
whinston
competitive
APT trends report Q2 2024
For over six years now, Kaspersky’s Global Research and Analysis Team (GReAT) has been...
2024-8-13 20:15:12 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
c2
qsc
albanian
windows
malicious
Suspected 'hostile state' behind hack of Poland’s anti-doping agency and leak of athletes' data
Hackers “supported by the services of [a] hostile state” are believed to be behind the leak of over...
2024-8-13 20:1:31 | 阅读: 29 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
athletes
ukrainian
polada
paris
doping
Your Subconscious Mind Creates Your Reality (It's Ridiculously Powerful)
You might not realize it, but something besides yourself is running the show – often without your p...
2024-8-13 20:0:21 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
fears
hypnosis
truth
Retail Data Security: DSPM is Fundamental to Retail Success
Securing customer data is critical for retailers. Data breaches undermine customer tru...
2024-8-13 19:58:10 | 阅读: 5 |
收藏
|
Forcepoint - www.forcepoint.com
dspm
security
retailers
posture
retail
Understanding the OWASP Top 10 Application Vulnerabilities
The OWASP Top 10 provides a standardized catalog of the most critical security risks to web applica...
2024-8-13 19:48:43 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
failures
malicious
How to Prepare for SOC 2 and ISO 27001 Audit? Tips for Jira Admins
Security, reliability and credibility are the words every IT and security team wants to hear when l...
2024-8-13 19:41:48 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
27001
iec
backup
jira
Previous
865
866
867
868
869
870
871
872
Next