unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Samsung zero-day flaw actively exploited in the wild
Samsung zero-day flaw actively exploited in the wildGoogle’s Threat Analysis Group (TAG) resea...
2024-10-22 23:41:35 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
samsung
exploited
analysis
security
memory
Linux Dangling PFN Mapping / Use-After-Free
© 2024 Packet Storm. All rights reserved. ...
2024-10-22 23:39:0 | 阅读: 0 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
AI chatbots can be tricked by hackers into helping them steal your private data
Security researchers have uncovered a new flaw in some AI chatbots that could have allowed hackers...
2024-10-22 23:36:46 | 阅读: 0 |
收藏
|
Graham Cluley - www.bitdefender.com
chatbots
malicious
letter
attacker
chatglm
Ubuntu Security Notice USN-7042-3
==========================================================================Ubuntu Security Notice U...
2024-10-22 23:34:40 | 阅读: 0 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
cups
browsed
usn
security
7042
雷神众测漏洞周报2024.10.14-2024.10.20
摘要以下内容,均摘自于互联网,由于传播,利用此文所提供的信息而造成的任何直接或间接的后果和损失,均由使用者本人负责,雷神众测以及文章作者不承担任何责任。雷神众测拥有该文章的修改和解释权。如欲转载或传播...
2024-10-22 23:33:0 | 阅读: 4 |
收藏
|
雷神众测 - mp.weixin.qq.com
漏洞
solr
攻击
dynamics
攻击者
INE Security Launches New Training Solutions to Enhance Cyber Hygiene for SMBs
Cary, NC, October 22nd, 2024, CyberNewsWireINE Security offers essential advice to protect digita...
2024-10-22 23:29:27 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ine
network
software
Red Hat Security Advisory 2024-8014-03
The following advisory data is extracted from:https://security.access.redhat.com/data/csaf/v2/advi...
2024-10-22 23:15:17 | 阅读: 4 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
redhat
netobserv
network
bugzilla
Red Hat Security Advisory 2024-7759-03
The following advisory data is extracted from:https://security.access.redhat.com/data/csaf/v2/advi...
2024-10-22 23:15:9 | 阅读: 2 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
security
redhat
kubernetes
clusters
From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25
2024-10-22 23:11:11 | 阅读: 0 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
remote
cloud
0G Foundation Launches Node Sale for Decentralized AI Network Verification
The 0G Foundation announced Tuesday it will launch a public sale of nodes for its decentralized arti...
2024-10-22 23:9:52 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
sale
network
protectai/vulnhuntr: Zero shot vulnerability discovery using LLMs
A tool to identify remotely exploitable vulnerabilities using LLMs and static code analysis.Worl...
2024-10-22 23:4:15 | 阅读: 2 |
收藏
|
Sec-News 安全文摘 - govuln.com
llm
vulnhuntr
analysis
gpt
macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools
Last week, researchers at Trend Micro published a report on a macOS malware sample that had credibl...
2024-10-22 23:1:7 | 阅读: 6 |
收藏
|
SentinelOne - www.sentinelone.com
mkgo
filemanager
notlockbit
ransomware
Startups of The Year: How To Vote
It’s time to support the best startups!You learned how to nominate, now it’s time to learn how to v...
2024-10-22 23:0:15 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
startups
hackernoon
votes
industries
nominated
USENIX NSDI ’24 – Approximate Caching for Efficiently Serving Text-to-Image Diffusion Models
Authors/Presenters:Shubham Agarwal, Subrata Mitra, Sarthak Chakraborty, Srikrishna Kara...
2024-10-22 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
usenix
publishing
saini
DEF CON 32 – AppSec Village – Your CI CD Pipeline Is Vulnerable, But It’s Not Your Fault
Authors/Presenters:Elad Pticha, Oreen LivniOur sincere appreciation to DEF CON, and t...
2024-10-22 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
nocookie
vegas
publishing
The Power of Taint Analysis: Uncovering Critical Code Vulnerability in OpenAPI Generator
The OpenAPI Generator is a popular tool with more than 20k stars on GitHub that allows users to aut...
2024-10-22 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
openapi
sonarcloud
taint
security
From Staging to Full Admin Control In Prod: A Breakdown of Critical Authentication Flaws
In today’s cybersecurity landscape, misconfigurations and broken auth...
2024-10-22 22:59:39 | 阅读: 0 |
收藏
|
Security Breached Blog - blog.securitybreached.org
staging
security
subdomain
username
快速搭建一套强大的私有客服系统(CRM Chat)
本系统(CRMChat)是采用Swoole4+Tp6+Redis+Vue+Mysql开发的独立高性能客服系统,客服系统用户端支持Pc端、移动端、小程序、文章中接入客服,利用超链接、网页内嵌、二维码、...
2024-10-22 22:59:0 | 阅读: 2 |
收藏
|
黑海洋 - WIKI - www.upx8.com
用户端
crmchat
wap
账号
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
Oct 22, 2024Getting C-Suite execs aligned on cyber resilience andcybersecurity can be a challenge....
2024-10-22 22:56:0 | 阅读: 0 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
levelblue
resilience
execs
bsw
苹果更新 iOS 计算器移除 C 按键
苹果更新了其 iOS 操作系统的计算器应用,移除了 C 按键,用退格键功能取代了它。C 按键在传统计算器中被用于清除数字。C 按键源于早期计算器的设计,在 1960 年代其硬件构造十分简单...
2024-10-22 22:49:58 | 阅读: 0 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
暂存
1960
苹果
十几个
Previous
92
93
94
95
96
97
98
99
Next