unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
McLaren hospitals disruption linked to INC ransomware attack
error code: 1106...
2024-8-8 03:0:20 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Smart Contract Templates: Foundations, Design and Research - Smart Contract Designs
Authors:(1) Christopher D. Clack, Centre for Blockchain Technologies, Department of Computer Scien...
2024-8-8 03:0:18 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
prose
currency
court
admissible
USENIX Security ’23 – Eos: Efficient Private Delegation of zkSNARK Provers
Authors/Presenters:Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang Ma...
2024-8-8 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
chiesa
presenters
D3 Introduces Program to Help SOC Teams Migrate Successfully from Legacy SOAR
VANCOUVER, British Columbia–D3, the leader in smart security orchestration, automation, and respons...
2024-8-8 02:23:42 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
soar
d3
migration
security
transition
Evaluating Startup Predictions with Backtesting and Portfolio Simulation
Table of LinksAbstract and 1. Introduction2 Related works3 Dataset Overview, Preprocessing, and...
2024-8-8 02:20:38 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
portfolio
backtest
fund
threshold
unicorn
How Founders, Investors, and Investment Rounds Inform Startup Success Predictions
Table of LinksAbstract and 1. Introduction2 Related works3 Dataset Overview, Preprocessing, and...
2024-8-8 02:20:18 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
founders
categorical
numerical
investor
investment
Unicorns vs Failures: Constructing Comprehensive Datasets for Predictive Modeling
Table of LinksAbstract and 1. Introduction2 Related works3 Dataset Overview, Preprocessing, and...
2024-8-8 02:20:9 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
unicorns
valuation
ipo
acq
MSP Case Study: CloudIntellect Helped Clients Gain Granular Visibility on Email Channels with PowerDMARC
Reading Time: 2 min“The most comprehensive DMARC reporting platform. Bar none!”Howa...
2024-8-8 02:13:50 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
dmarc
powerdmarc
msp
security
Listen to the whispers: web timing attacks that actually work
Published: 07 August 2024 at 18:10 UTC...
2024-8-8 02:10:21 | 阅读: 14 |
收藏
|
PortSwigger Research - portswigger.net
timing
noise
reverse
injection
ssrf
Student Devices Wiped — Mobile Guardian Hacked AGAIN
MDM software for schools is breached for second time this year—13,000 devices wiped in Singapore ...
2024-8-8 02:3:54 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
guardian
security
singapore
wiped
richi
Windows Downdate: Downgrade Attacks Using Windows Updates
Downgrade attacks—also known as version-rollback attacks—are a type of attack designed to revert a...
2024-8-8 02:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
windows
downgrade
security
hypervisor
microsoft
The Fall of Sheikh Hasina: Footage from the Streets of Bangladesh
Bangladesh’s Prime Minister Sheikh Hasina was forced to resign and flee the country...
2024-8-8 01:2:53 | 阅读: 13 |
收藏
|
bellingcat - www.bellingcat.com
police
protesters
hasina
protests
bangladesh
macOS Sequoia brings better Gatekeeper, stalkerware protections
error code: 1106...
2024-8-8 01:0:21 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Botnet 7777: Are You Betting on a Compromised Router?
Firstly, we extend our thanks to Chris Fearnley and Gi7w0rm, two threat researchers who assisted us...
2024-8-8 01:0:9 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
quad7
7777
63256
routers
11288
Randall Munroe’s XKCD ‘Matter’
via the comic & dry wit of Randall Munroe, creator of XKCDPermalink*** This is...
2024-8-8 01:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
creator
wit
munroe
syndicated
How Sonar Helps Meeting NIST SSDF Code Security Requirements
What is the NIST SSDF?The NIST Secure Software Development Framework (SSDF) brings tog...
2024-8-8 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
sonarqube
security
software
sonar
Tenable Adds Ability to Prioritize Vulnerabilities by Threat Level
Tenable this week at the Black Hat USA 2024 conference added an ability to identify the vulnerabili...
2024-8-8 00:16:8 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
tenable
developers
millard
Valve 也许在开发《半条命3》
过去几天社交媒体上开始流传 Valve 可能在开发《半条命》系列新作的消息。原因是演员 Natasha Chandel 在个人履历里披露她参与了 Valve 代号为 White Sands...
2024-8-8 00:8:37 | 阅读: 4 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
valve
半条命
半条
sands
研究称猫表现出对其它宠物死亡的悲痛之情
猫通常被认为是独立、冷漠和善变的动物,但发表在《Applied Animal Behaviour Science》上的一项研究发现,猫并没有那么反社会,它们会对同一家庭的其它宠物死亡表现出...
2024-8-7 23:53:37 | 阅读: 8 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
死去
dogs
家犬
黑猩猩
家中
Why Governments Worldwide Recommend Protective DNS
HYAS Protect protective DNS uses advanced data analytics to proactively block cyber threats, a...
2024-8-7 23:47:8 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
hyas
protective
security
threats
network
Previous
925
926
927
928
929
930
931
932
Next