unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Leveraging CRQ to Comply With DORA Regulations | Kovrr
TL;DRDigital transactions, both large and small, have become the dominant method of managing...
2024-8-5 22:25:38 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ict
crq
dora
kovrr
resilience
用 iframe 显示 HTML 例子
1234 <!DOCTYPE> <html> <body>hello world</body...
2024-8-5 22:21:36 | 阅读: 7 |
收藏
|
Taxodium - taxodium.ink
srcdoc
setq
sgml
quote
escaped
I Led Dozens of Meta System Design Interviews, Here's The Right Way to Prep
When coordinating your interview at Meta (formerly Facebook), you'll be asked whether you want to do...
2024-8-5 22:4:12 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
scalability
interviews
moderation
Meet Stellar: HackerNoon Company of the Week
Hey Hackers!Welcome back to another edition of HackerNoon’s Company of the Week! This series aims t...
2024-8-5 22:0:22 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
stellar
hackernoon
blockchain
developers
Introducing the Vanguard Awards
This year at Black Hat USA, Trend Micro’s Zero Day Initiative (ZDI) will award our inaugural Vang...
2024-8-5 22:0:0 | 阅读: 3 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
award
awards
submissions
zdi
enclosure
I Stopped Writing Code and You Can Too: 11 AI Code Gen Hints.
Hint 1: If you have a creative task such as code architecture, you want to use the so-called chain o...
2024-8-5 21:50:38 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
explaining
precise
prompts
analysis
initiate
MEV Bots: How Do They Influence The Crypto Market?
In theory, validators should determine the inclusion of transactions in a block. Still, in practice,...
2024-8-5 21:45:54 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
mev
validators
blockchain
network
searchers
No More AI Costs: How to Run Meta Llama 3.1 Locally
I'm excited to tell you about Meta's Llama 3.1, a powerful AI language model you can use for free. I...
2024-8-5 21:43:30 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
llama
ollama
cloud
machine
download
西雅图是美国最“智能”的城市
一项研究根据免费 WiFi 热点数、AI 和物联网公司数量和密度、平均宽带下载速度、每家 ISP 的 5G 覆盖率中位数,机场数量,根据 PM2.5 空气质量评估绿色基础设施、树木覆盖率...
2024-8-5 21:39:21 | 阅读: 0 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
宽带
西雅图
空气
迈阿密
汽车
Essential 2024 AI & Big Data Conferences: Oxycon, World AI Summit, AI Summit NY, Analytics Summit
In 2023, I wrote about essential developers’ conferences to attend, highlighting their significance...
2024-8-5 21:35:15 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
summit
conferences
attend
speakers
oxycon
Chameleon is now targeting employees: Masquerading as a CRM app
Chameleon is back in Canada and EuropeIn July 2024 Mobile Threat Intelligence analysts observ...
2024-8-5 21:31:44 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
chameleon
bypassing
canada
canadian
Salt Security Provides Free Scans for XXS Vulnerabilities Involving OAuth Protocol
Salt Security is making available a free scanning tool that it has been using to assess...
2024-8-5 21:21:11 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
security
balmas
victim
employ
employed
Researchers Uncover Flaws in Windows Smart App Control and SmartScreen
Threat Intelligence / VulnerabilityCybersecurity researchers have uncovered design weaknesses in M...
2024-8-5 21:2:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
reputation
security
involves
smartscreen
malicious
PinnacleOne ExecBrief | The Escalation of Nation-State Sabotage and Its Implications for the Private Sector
Last week, we highlighted how the recent CrowdStrike disruption underscored the complexity of today...
2024-8-5 21:0:47 | 阅读: 8 |
收藏
|
SentinelOne - www.sentinelone.com
sabotage
security
france
cables
Cloud cryptography demystified: Google Cloud Platform
By Scott ArciszewskiThis post, the second in our series on cryptography in the c...
2024-8-5 21:0:3 | 阅读: 3 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
cloud
tink
kms
encryption
client
Cloud cryptography demystified: Google Cloud Platform
By Scott ArciszewskiThis post, the second in our series on cryptography in the cloud, provides an...
2024-8-5 21:0:3 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
tink
kms
encryption
client
Your Exposure Ends Here: Introducing the New Tenable Brand
2024-8-5 21:0:0 | 阅读: 9 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cloud
security
nessus
exposure
Kazakh Organizations Targeted by 'Bloody Wolf' Cyber Attacks
Network Security / Threat IntelligenceOrganizations in Kazakhstan are the target of a threat activ...
2024-8-5 20:42:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
kazakhstan
strrat
network
windows
security
Leveraging CRQ to Understand Ransomware Costs | Kovrr
Today, decision makers at the world’s largest enterprises, from the CISO to the CEO, are increasing...
2024-8-5 20:41:55 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
costs
losses
insurance
Turning Data into Action: Intelligence-Driven Vulnerability Management
Prioritizing vulnerabilities with context has always been a challenge for vulnerability management t...
2024-8-5 20:40:0 | 阅读: 8 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cves
kev
exposure
Previous
951
952
953
954
955
956
957
958
Next