unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
US reportedly preparing to release Russian hackers as part of prisoner swap
Russia is reportedly seeking the return of several alleged hackers, spies and assassins as part of...
2024-8-1 22:1:30 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
russia
vinnik
prison
exchange
sentenced
Two Memorable Dates in Seismology: Omori (1894)
Authors:(1) Anatol Guglielmi, Schmidt Institute of Physics of the Earth, Russian Academy of Scienc...
2024-8-1 22:0:18 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
omori
epoch
earthquake
aftershocks
physics
Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture
As digital architects, we have a crucial duty to create and safeguard a landscape where security is...
2024-8-1 21:56:4 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
security
vpc
subnets
buckets
network
Crypto Growth: Creating Effective User Personas
Each crypto company, whether it is a payment provider, crypto wallet operator, crypto exchange, or e...
2024-8-1 21:50:13 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
personas
persona
pain
income
Grandoreiro Malware: Spear Phishing, Outlook Exploits, and More
Grandoreiro, a banking trojan that once preyed on Latin American financial institutions, has reeme...
2024-8-1 21:46:58 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - flashpoint.io
grandoreiro
loader
security
c2
flashpoint
Introducing the Proof of Scan v2, ASIC-resistant
Nearly two years have passed since the launch of the Proof of Scan** consensus protocol, which intro...
2024-8-1 21:42:21 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
pow
3dpass
grid2d
calculation
network
Hackers Distributing Malicious Python Packages via Popular Developer Q&A Platform
Malware / Developer SecurityIn yet another sign that threat actors are always looking out for new...
2024-8-1 21:32:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
raydium
python
pypi
solana
malicious
The Complete Guide to Successful Cloud Migration: Strategies and Best Practices
The expanding network of connected devices has fueled a massive surge in data creation. Businesses a...
2024-8-1 21:30:15 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
cloud
migration
security
costs
workloads
Exodus Marketplace: A Haven for Exiled Criminals
Cyble Research & Intelligence Labs’ (CRIL) ongoing monitoring of Dark-web logs and marketplaces...
2024-8-1 21:16:23 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
exodus
markets
infostealer
forums
Strata Identity to Demonstrate How to Modernize Legacy Identity Systems to Microsoft Entra ID at Black Hat 2024
MEDIA ADVISORYPresenters at Microsoft Booth 1240 will also show how Strata’s Maverics “Disconnect...
2024-8-1 21:0:21 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
strata
microsoft
maverics
cloud
entra
Attack Detection and Threat Hunting – Common Topics We’re Asked About
This article is the fifth in a series of five covering key API security topics and provides some an...
2024-8-1 21:0:8 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cequence
security
lake
analysis
identify
One Does Not Simply … Get a Cybersecurity Job
2024-8-1 21:0:0 | 阅读: 4 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
One Does Not Simply … Get a Cybersecurity Job
August 1, 2024Where to BeginWith thousands of unfilled positions reported year over year, w...
2024-8-1 21:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
positions
career
The Cyber Fallout: Navigating the Aftermath of a Credit Union Breach
Nestled in the digital crosshairs, financial institutions (including credit unions) stand on the fr...
2024-8-1 21:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
patelco
security
threats
ddr
votiro
实战-搞定小程序加解密通过遍历导致信息泄露
2024-8-1 20:58:43 | 阅读: 0 |
收藏
|
先知安全技术社区 - xz.aliyun.com
Approfondimento sul regolamento eIDAS n. 2024/1183
giovedì 1 agosto 2024 Approfondimento sul regolamento eIDAS n. 2024/1183...
2024-8-1 20:52:0 | 阅读: 5 |
收藏
|
IT Service Management News - blog.cesaregallotti.it
sono
regolamento
diritto
economia
commento
New Android Banking Trojan BingoMod Steals Money, Wipes Devices
Banking Trojan / Cyber FraudCybersecurity researchers have uncovered a new Android remote access t...
2024-8-1 20:52:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
bingomod
remote
initiate
trojan
Data Exfiltration Prevention: How to Protect PHI, PII and More
Data exfiltration prevention: it’s the thing the good guys wish they had when the b...
2024-8-1 20:42:53 | 阅读: 0 |
收藏
|
Forcepoint - www.forcepoint.com
security
dlp
network
lionel
identify
Definición de la tríada de la CIA. Ejemplos de confidencialidad, integridad y disponibilidad
Definición de la tríada de la CIAEl Modelo AIC o la Triada AIC es una estrategia clave para a...
2024-8-1 20:42:46 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
datos
protección
cia
sistemas
Building Trustworthy AI: Contending with Data Poisoning
Executive SummaryAs Artificial Intelligence (AI) and Machine Learning (ML) systems are adopted and...
2024-8-1 20:28:47 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
poisoning
appendix
datasets
adopted
Previous
984
985
986
987
988
989
990
991
Next