unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
DEFCON CTF 32决赛战报,全球第五,中国队伍第一!
在今年5月6日结束的线上初赛中,Straw Hat以全球第四的成绩成功晋级DEFCON CTF 32决赛。 8月12日北京时间4点,DEFCON CTF 32决赛正式结束,最终Straw...
2024-8-12 21:51:14 | 阅读: 6 |
收藏
|
白帽100安全攻防实验室 - mp.weixin.qq.com
straw
defcon
远程
sec3
Why Should Artificial Intelligence Be Decentralized?
The intersection of Web3 and artificial intelligence, especially in the form of generative neural ne...
2024-8-12 21:48:11 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
artificial
network
An Advanced and Efficient EVM for ZK Apps - Key Takeaways from the Horizen 2.0 Whitepaper
TL;DRHorizen is an OG blockchain launched in 2017 with a long history of ZK dedicationHorizen 2.0...
2024-8-12 21:35:19 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
zk
horizen
evm
developers
We Swapped the Bitcoin Logo With Gary Gensler's Face; Here's What Happened Next
Have you ever come across situational marketing cases like this? Share it with me in the comments or...
2024-8-12 21:26:5 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
coinstats
situational
ugc
gary
crashed
Exploring JavaScript Variable Declarations: Var, Let, and Const
JavaScript, a language known for its flexibility, offers three distinct ways to declare variables: v...
2024-8-12 21:17:32 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
letvariable
reassigned
varvariable
scoped
Britain and France to discuss misuse of commercial cyber intrusion tools
The United Kingdom and France will soon launch a consultation on how to tackle “the proliferation a...
2024-8-12 21:16:31 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
mall
pall
ukraine
What Your First Year of Business Tells You About the Future
SourceIn the first year of business, it is easy to become fixated on celebrating individual accompl...
2024-8-12 21:6:42 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
growth
development
profit
enhance
planning
Why Agile Alone Might Not Be So Agile: A Witty Look at Methodology Madness
Agile methodology, once hailed as the silver bullet for software development and project management,...
2024-8-12 21:1:41 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
agile
scrum
masters
development
rigid
Advancing Threat Intelligence: JA4 fingerprints and inter-request signals
2024-08-1216 min readFor many years, Cloudflare has used advanced fingerprinting techniques to help...
2024-8-12 21:0:52 | 阅读: 8 |
收藏
|
The Cloudflare Blog - blog.cloudflare.com
ja4
1h
fingerprint
signals
Singularity MDR | A Scalable Solution for Broader Detection & Response Coverage
The world has changed – and by a lot. Over the last several years, global companies have rapidly ac...
2024-8-12 21:0:16 | 阅读: 2 |
收藏
|
SentinelOne - www.sentinelone.com
mdr
security
singularity
dfir
objectives
Survey: Cybersecurity Teams Investing in Automation to Reduce Noise Levels
A global survey of 300 IT and security professionals suggests that while security budgets are incre...
2024-8-12 20:59:4 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
respondents
noise
ctem
疯文快道 – 快速输入 颜文字/绘文字/表情图/常用语|高自定义工具[Windows]
2024-8-12 20:55:39 | 阅读: 1 |
收藏
|
小众软件 - www.appinn.com
emoji
pad
常用语
moji
windows
Why Is Decentralized AI a Key to a More Secure Digital World?
Cyber threats are just as constant as they are sophisticated, so safeguarding our online presence ha...
2024-8-12 20:48:6 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
network
threats
defenses
DSPM Ensures Regulatory Compliance in GenAI Deployments
Data security solutions are the brakes for organizations; they allow them to quickly take advan...
2024-8-12 20:24:36 | 阅读: 2 |
收藏
|
Forcepoint - www.forcepoint.com
dspm
regulatory
microsoft
copilot
chatgpt
From Fries to Flaws : My Journey into Web App Security (Part V)
2024-8-12 20:20:51 | 阅读: 6 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
From Fries to Flaws : My Journey into Web App Security (Part V)
2024-8-12 20:20:51 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
$800 Improper Authorization Flaw: Unauthorized Project Reclaiming Post Transfer
2024-8-12 20:20:49 | 阅读: 3 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
$800 Improper Authorization Flaw: Unauthorized Project Reclaiming Post Transfer
2024-8-12 20:20:49 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
From Fries to Flaws : My Journey into Web App Security (Part IV)
2024-8-12 20:20:7 | 阅读: 4 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
From Fries to Flaws : My Journey into Web App Security (Part IV)
2024-8-12 20:20:7 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Previous
878
879
880
881
882
883
884
885
Next