unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Suspects in 'Russian Coms' spoofing service arrested in London, as NCA announces takedown
The two individuals suspected of developing and being the administrators of the “Russian Coms” call...
2024-8-1 23:31:29 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
nca
crime
coms
arrested
police
FBI warns of scammers posing as crypto exchange employees
error code: 1106...
2024-8-1 23:30:21 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
As Breach Costs Surge, Companies Need a Better Way to Find Shadow Data
Data breaches are on the rise. In the US, last year broke new records in terms of b...
2024-8-1 23:21:5 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
costs
shadow
comforte
reveals
security
Why SAFE. Why Now.
It may feel like beating a dead horse to say it, but the threat of software supply chain attacks is...
2024-8-1 23:16:53 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
sscs
threats
PK Fail - John Loucaides - PSW #837
Aug 1, 2024John is one of the foremost experts in UEFI and joins us to talkabout PK Fail! What happ...
2024-8-1 23:16:0 | 阅读: 4 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
psw
sitting
837
2024john
为应对气候危机巴西提议对全球超级富豪征收 2% 的税
巴西提议对全球资产超过 10 亿美元的超级富豪征收 2% 的财富税,认为每年可带来 2500 亿美元,可用于应对气候危机、解决贫困和不平等问题,而且该税只影响极少数人。巴西国家气候变化秘书...
2024-8-1 23:15:3 | 阅读: 2 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
美国
征收
巴西
富豪
全球性
Pharma Giant Cencora confirmed the theft of personal and health information
Pharma Giant Cencora confirmed the theft of personal and health informationPharma company Cenc...
2024-8-1 23:2:57 | 阅读: 10 |
收藏
|
Security Affairs - securityaffairs.com
cencora
exfiltrated
lash
ransomware
filing
Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 3
To wrap up this blog series we wanted to include one more technique that you can use when exploiti...
2024-8-1 23:0:0 | 阅读: 15 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
windows
papercut
zdi
USENIX Security ’23 – SHELTER: Extending Arm CCA with Isolation in User Space
Authors/Presenters:Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoya...
2024-8-1 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
network
situated
Digital Synergy: How the Merger of AI and Blockchain Will Play Out
In November 2022, OpenAI introduced the chatbot ChatGPT. Two months after its launch, the number of...
2024-8-1 22:47:34 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
artificial
zkml
autonomous
Implementing Slack Notifications in Your Next Application
NB: There are better and more robust ways to handle notifications. This is just a temporary solution...
2024-8-1 22:39:38 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
webhook
axios
webhooks
The Enterprise Identity Universe: Users, Non-Humans, and Consumers [Infographic]
Remember when managing identities at work was all about people? Times have changed. Now, digital i...
2024-8-1 22:25:28 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
identities
nhis
machine
universe
humans
Essential Metrics to Evaluate After Your First Year in Business
SourceAfter the first year in business, it is necessary to look at certain performance metrics so a...
2024-8-1 22:23:43 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
costs
retention
profit
growth
efficiency
A recent spate of Internet disruptions
2024-08-017 min readCloudflare Radar is constantly monitoring the Internet for widespread disruption...
2024-8-1 22:21:15 | 阅读: 7 |
收藏
|
The Cloudflare Blog - blog.cloudflare.com
disruption
network
pakistan
radar
Five Questions to Ask Yourself Before Creating a Web Project
There are a million reasons for tech projects to fail. Miscalculated business models, overestimated...
2024-8-1 22:11:38 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
security
software
crucial
developers
development
Over 1 Million Domains at Risk of 'Sitting Ducks' Domain Hijacking Technique
Vulnerability / Threat IntelligenceOver a million domains are susceptible to takeover by malicious...
2024-8-1 22:10:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
ducks
sitting
burton
registrar
8 Essential Considerations for Post-Quantum Cryptography Migration
A primer on how to best prepare for the migration to PQCThe United Nations has proclaimed 2025 the...
2024-8-1 22:6:19 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
pqc
migration
appviewx
security
transition
US reportedly preparing to release Russian hackers as part of prisoner swap
Russia is reportedly seeking the return of several alleged hackers, spies and assassins as part of...
2024-8-1 22:1:30 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
russia
vinnik
prison
exchange
sentenced
Two Memorable Dates in Seismology: Omori (1894)
Authors:(1) Anatol Guglielmi, Schmidt Institute of Physics of the Earth, Russian Academy of Scienc...
2024-8-1 22:0:18 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
omori
epoch
earthquake
aftershocks
physics
Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture
As digital architects, we have a crucial duty to create and safeguard a landscape where security is...
2024-8-1 21:56:4 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
security
vpc
subnets
buckets
network
Previous
983
984
985
986
987
988
989
990
Next