unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Role of Threat Intelligence in Preventing Ransomware
The ransomware threat landscape remains a persistently nefarious one. The threat stays consisten...
2024-11-14 02:57:28 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
nuspire
security
ttps
Response to CISA Advisory (AA24-317A): 2023 Top Routinely Exploited Vulnerabilities
On November 12, 2024, the...
2024-11-14 02:52:41 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
attackiq
security
log4shell
emulated
replay
Chinese national faces 20 years in US prison for laundering pig-butchering proceeds
One of the ringleaders of a scheme to launder millions stolen through cryptocurrency investment sca...
2024-11-14 02:45:46 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
victim
criminal
funds
investment
pleaded
Critical bug in EoL D-Link NAS devices now exploited in attacks
error code: 1106...
2024-11-14 02:45:16 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
New Google Pixel AI feature analyzes phone conversations for scams
error code: 1106...
2024-11-14 02:15:18 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Visualizing Promptable and Open-Vocabulary Segmentation Across Multiple Datasets
Authors:(1) Zhaoqing Wang, The University of Sydney and AI2Robotics;(2) Xiaobo Xia, The Universit...
2024-11-14 02:0:16 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
sydney
ai2robotics
melbourne
Randall Munroe’s XKCD ‘Number Shortage’
via the c...
2024-11-14 02:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
randall
creator
munroe
Safer with Google: New intelligent, real-time protections on Android to keep you safe
Security Blog The latest news and insights from Google on security a...
2024-11-14 01:59:0 | 阅读: 3 |
收藏
|
Google Online Security Blog - security.googleblog.com
security
Go — ing Rogue: The Malware Development Odyssey (Part III)
2024-11-14 01:52:23 | 阅读: 0 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Privilege Escalation Techniques for Ethical Hackers
2024-11-14 01:51:54 | 阅读: 5 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Mend.io is a Strong Performer in the Forrester Wave™ Software Composition Analysis, Q4 2024
It should be no surprise that the world runs on open source software. According to the latest Fo...
2024-11-14 01:49:57 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
mend
software
security
analysis
composition
Mobile Application Penetration Testing Checklist
2024-11-14 01:49:52 | 阅读: 3 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
Mobile Application Penetration Testing Checklist
2024-11-14 01:49:52 | 阅读: 0 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER
Company doesn’t make storage devices now; has zero interest in fixing catastrophic vulnerabilit...
2024-11-14 01:22:8 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
eol
firmware
richi
eos
security
PlatformEngineering.com: Strengthening Security in the Software Development Lifecycle
The Techstrong Group is thrilled to announce the launch of PlatformEngineering.com, a new platfo...
2024-11-14 01:6:40 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
cloud
techstrong
boulevard
DODO Launches DEXpert Platform for Decentralized Exchange Development
DODO, a decentralized finance (DeFi) protocol, announced today the release of DEXpert, a toolkit des...
2024-11-14 01:3:50 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
dexpert
liquidity
dodo
meme
defi
Evaluating Promptable Segmentation with Uniform Point Grids and Bounding Boxes on Diverse Datasets
Authors:(1) Zhaoqing Wang, The University of Sydney and AI2Robotics;(2) Xiaobo Xia, The Universit...
2024-11-14 01:0:27 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
iou
evaluation
fig
sydney
Karma: Love on the Blockchain and the Gamification of Helping Others
I've written several articles here on HackerNoon about the concept of Karma. I’ve always thought of...
2024-11-14 01:0:25 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
karma
favors
economy
favor
ledger
Optimizing User Acquisition with Google DV360: Creative Strategies for Success
We’ve all seen significant changes in user acquisition (UA) advertising in the last few years. But w...
2024-11-14 01:0:21 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
dv360
creatives
youtube
banners
ctv
Microsoft Data Security Index annual report highlights evolving generative AI security needs
Generative AI presents companies of all sizes with opportunities to increase efficiency and drive i...
2024-11-14 01:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
generative
adoption
microsoft
increases
Previous
90
91
92
93
94
95
96
97
Next