unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Airsoft Data Breach Exposes Data of 75,000 Players
Failure to properly configure authentication led to malicious actors exploiting the database backup...
2024-5-4 07:15:8 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
walker
passwords
airsoft
soroko
Android bug can leak DNS traffic with VPN kill switch enabled
error code: 1106...
2024-5-4 05:15:16 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
BiFi - Bitcoin Sats Given as Freely as WiFi
ReadWriteNotificationssee moreBiFi - Bitcoin Sats Given as Freely as WiFi by@maken8 New Story by M...
2024-5-4 04:58:54 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
marvin
bro
charity
ken
ssaurel
LockBit published data stolen from Simone Veil hospital in Cannes
LockBit published data stolen from Simone Veil hospital in CannesLockBit ransomware operators...
2024-5-4 04:58:33 | 阅读: 3 |
收藏
|
Security Affairs - securityaffairs.com
hospital
cannes
veil
ransomware
simone
The Noonification: Mayday (5/3/2024)
ReadWriteNotificationssee moreThe Noonification: Mayday (5/3/2024) by@noonification New Story by N...
2024-5-4 04:42:16 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
stories
stakingfarm
hackernoon
techbeat
You get a passkey, you get a passkey, everyone should get a passkey
Microsoft is rolling out passkey support for all consumer accounts....
2024-5-4 04:21:40 | 阅读: 3 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
passkey
security
microsoft
passkeys
fingerprint
Illinois’ biometric data privacy law could soon be less costly for violators
A proposal to reduce the potential damages that companies must pay for violating Illinois’ one-of-a...
2024-5-4 04:16:19 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
bill
bipa
court
cunningham
illinois
Cybersecurity Is a Top Investor Concern
Too Long; Didn't ReadIn the changing institutional investment landscape, top concerns include the sh...
2024-5-4 04:14:43 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
forces
specificity
SourceSync - Dynamic pdb generation and synchronisation between decompiler and debugger
2024-5-4 04:4:23 | 阅读: 3 |
收藏
|
Reverse Engineering - www.reddit.com
reddit
advertise
housewives
johnson
Sui Turns One: Debut Year Of Growth and Tech Breakthroughs Puts Sui At Forefront Of Web3
ReadWriteNotificationssee moreSui Turns One: Debut Year Of Growth and Tech Breakthroughs Puts Sui A...
2024-5-4 04:1:3 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
chainwire
web3
sui
growth
saakuru
Penguiana Presale Goes Live With Almost 300 SOL Raised In 2 Hours
Penguiana Presale Goes Live With Almost 300 SOL Raised In 2 Hours by@chainwireToo Long; Didn't ReadP...
2024-5-4 04:0:12 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
sol
raised
presale
authorthe
NSA warns of North Korean hackers exploiting weak DMARC email policies
error code: 1106...
2024-5-4 03:30:16 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Email security loopholes are latest path for North Korean social engineering attacks
Hackers connected to the government of North Korea are exploiting loopholes in email security syste...
2024-5-4 03:16:20 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
north
korean
korea
dmarc
spoofed
Palo Alto Networks Extends SASE Reach to Unmanaged Devices
Palo Alto Networks this week extended its secure access service edge (SASE) platform to make it pos...
2024-5-4 03:3:10 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
alto
prisma
palo
USENIX Security ’23 – Cryptographic Deniability: A Multi-perspective Study of User Perceptions and Expectations
Authors/Presenters: Tarun Kumar Yadav, Devashish Gosain, Kent SeamonsMany thanks to U...
2024-5-4 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
gosain
network
How to Stake ETH by StakingFarm: The Ultimate Guide
ReadWriteNotificationssee moreHow to Stake ETH by StakingFarm: The Ultimate Guide by@stakingfarm Ne...
2024-5-4 02:59:11 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
stakingfarm
stories
staking
saakuru
biggest
The impact of automating open source dependency management
Recently, I chatted with developers from a customer in a heavily regulated industry...
2024-5-4 02:51:15 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
regulated
crucial
jamie
coleman
Unlocking SMB Cybersecurity: The Rise of Virtual CISOs in 2024 and Beyond
This year, virtual CISOs must begin making a difference in our industry. For the longest time,...
2024-5-4 02:49:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
smbs
security
experienced
vciso
Russia-linked APT28 and crooks are still using the Moobot botnet
Russia-linked APT28 and crooks are still using the Moobot botnetThe Ubiquiti EdgeRouter botnet...
2024-5-4 02:39:14 | 阅读: 6 |
收藏
|
Security Affairs - securityaffairs.com
edgerouter
apt28
russia
phishing
pawn
Navigating Container Security with AttackIQ’s Optimization Solutions
Understanding Container Security ChallengesThe use of containers introduces a complex layer of...
2024-5-4 02:15:17 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackiq
containers
enhancing
Previous
1
2
3
4
5
6
7
8
Next