unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Detecting Risky Third-party Drivers on Windows Assets
Kernel-mode drivers are critical yet risky components of the Windows operating system. Learn about t...
2024-8-7 23:0:0 | 阅读: 10 |
收藏
|
Tenable Blog - www.tenable.com
windows
security
tenable
machine
loldrivers
USENIX Security ’23 – Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree
Authors/Presenters:Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong M...
2024-8-7 23:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
presenter
glfoza0
Firebeam CVE-2024-26229 Plugin
© 2022 Packet Storm. All rights reserved. ...
2024-8-7 22:52:37 | 阅读: 16 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
WordPress PayPlus Payment Gateway SQL Injection
#!/usr/bin/env python3.11import requestsimport timedef exploit(url): payload = {"wc-api": "payp...
2024-8-7 22:50:34 | 阅读: 7 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
payload
timedef
wc
payplus
windows
Gentoo Linux Security Advisory 202408-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Gentoo Linux Security Advis...
2024-8-7 22:47:17 | 阅读: 4 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
gentoo
security
202408
glsa
adenial
Debian Security Advisory 5739-1
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- --------------------------------------------------...
2024-8-7 22:46:19 | 阅读: 5 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
security
pgp
wpa
inversion
5739
Ubuntu Security Notice USN-6945-1
==========================================================================Ubuntu Security Notice U...
2024-8-7 22:46:7 | 阅读: 8 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
wpa
launchpad
security
6ubuntu2
Gentoo Linux Security Advisory 202408-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Gentoo Linux Security Advis...
2024-8-7 22:45:53 | 阅读: 0 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
gentoo
aiohttp
security
202408
vuln
Unleashing the Power of Microsoft Security with Trustwave
Tectonic shifts are occurring across the cyber landscape, and organizations ar...
2024-8-7 22:36:38 | 阅读: 3 |
收藏
|
Trustwave Blog - www.trustwave.com
microsoft
security
client
defender
accelerator
Facial authentication is surging across sports leagues. A tech exec explains the interest.
When thousands of NFL fans enter stadiums this fall, their faces will be scanned by technology from...
2024-8-7 22:31:28 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ticketing
rfn
jb
browns
wicket
This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
As technology advances, threat actors increasingly leverage these innovations to conduct social eng...
2024-8-7 22:21:27 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
soundux
voicemeeter
vishing
speech
voices
New Linux Kernel Exploit Technique 'SLUBStick' Discovered by Researchers
Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dubbed SLU...
2024-8-7 22:10:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
slubstick
memory
security
reliably
Sysdig Adds Ability to Correlate Identities to Cloud Computing Breaches
Sysdig today extended the reach of the cloud detection and response platform by adding...
2024-8-7 22:0:30 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
sysdig
levine
workloads
Securing the AI Attack Surface: Separating the Unknown from the Well Understood
2024-8-7 22:0:0 | 阅读: 1 |
收藏
|
Tenable Blog - www.tenable.com
tenable
nessus
cloud
llm
security
Roundcube Webmail Flaws Allow Hackers to Steal Emails and Passwords
Email Security / VulnerabilityCybersecurity researchers have disclosed details of security flaws i...
2024-8-7 21:29:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
victim
attacker
security
roundcube
malicious
Version Tracking in Ghidra
Skip to content...
2024-8-7 21:26:27 | 阅读: 3 |
收藏
|
Nettitude Labs - labs.nettitude.com
markup
correlators
correlator
ghidra
newer
60 Hurts per Second – How We Got Access to Enough Solar Power to Run the United States
The electricity grid – the buzzing, crackling marvel that supplies the lifeblood of modernity - is b...
2024-8-7 21:16:54 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bitdefender.com
grid
solar
solarman
deye
electricity
Beyond the best: A new era of recommendations
By Josiah DykstraWe continuously aim to question assumptions and challenge conve...
2024-8-7 21:0:41 | 阅读: 2 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
advice
readers
phrase
thoughtful
integrating
Defusing AD-Based Risks | Best Practices for Securing Modern Directory Services
If you are on a corporate network, it likely runs and authenticates on Microsoft Active Directory (...
2024-8-7 21:0:39 | 阅读: 9 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
attackers
security
network
entra
Rubrik Allies With Mandiant to Increase Cyber Resiliency Capability
Rubrik at the Black Hat USA 2024 conference today revealed it is partnering with the Ma...
2024-8-7 21:0:13 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
rubrik
cloud
stone
pristine
mandiant
Previous
927
928
929
930
931
932
933
934
Next