unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices
2024-4-25 00:1:50 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.talosintelligence.com
asa
memory
runner
security
csco
Response to CVE-2023-26756 - Revive Adserver
Full Disclosuremailing list archivesFrom: Matteo Beccati <php () beccati com>D...
2024-4-25 02:43:55 | 阅读: 8 |
收藏
|
Full Disclosure - seclists.org
beccati
adserver
revive
matteo
26756
ArcaneDoor hackers exploit Cisco zero-days to breach govt networks
error code: 1106...
2024-4-25 01:15:15 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Introducing the nanoMIPS Architecture Plugin for Binary Ninja
One of the more frustrating situations as a reverse engineer is when the architecture of your ta...
2024-4-25 01:33:37 | 阅读: 6 |
收藏
|
Binary Ninja - binary.ninja
nanomips
firmware
md1rom
analysis
acdeqswxz
DirectDefense Report Sees Shifts in Cyberattack Patterns
DirectDefense, Inc. today published an analysis of more than two million hours of alert investigati...
2024-4-25 00:3:7 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
broome
security
threats
France seeks new EU sanctions to target Russian disinformation
France is asking Brussels to impose new sanctions to fight Russian disinformation ahead of the upco...
2024-4-25 01:31:30 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
russia
french
european
france
Anti-Trump PAC Lincoln Project scammed for $35,000 after vendor email hack
The anti-Donald Trump super PAC Lincoln Project lost $35,000 to a business email compromise (BEC)...
2024-4-25 00:16:23 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
lincoln
bec
minchak
trump
election
Nitsa Nakos: Illuminating Success With the Art of Conscious Leadership
Too Long; Didn't ReadNitsa Nakos is an entrepreneur, conscious leader, visionary, and professional n...
2024-4-25 00:0:3 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
conscious
readnitsa
nitsa
leadership
thriving
Ransomware remoti, cosa sono e le misure preventive per proteggersi
Crescono i ransomware remoti ovvero quelli che nei loro attacchi sfruttano la crittografia remota....
2024-4-25 03:31:56 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
ransomware
dei
dati
Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks
Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks...
2024-4-25 04:30:37 | 阅读: 2 |
收藏
|
Security Affairs - securityaffairs.com
asa
dancer
attackers
network
runner
The Family of Safe Golang Libraries is Growing!
2024-4-25 00:56:35 | 阅读: 1 |
收藏
|
Sec-News 安全文摘 - govuln.com
Habemus I2S in STM32F7
a blog about computers and other funny things ...
2024-4-25 03:21:10 | 阅读: 1 |
收藏
|
Alan C. Assis - acassis.wordpress.com
funny
GDPR, ecco perché le nuove regole procedurali sono momento cruciale per la data protection
L’adozione di nuove regole procedurali per l’applicazione del Regolamento Generale sulla Protezione...
2024-4-25 03:31:59 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
dei
delle
che
autorità
NIS 2 e i requisiti e controlli della ISO/IEC 27001: analisi puntuale e confronto tra le norme
Entro il mese di ottobre dovrà essere recepita nell’ordinamento nazionale la Direttiva (UE) 2022/255...
2024-4-25 03:31:58 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
delle
controllo
che
della
Strategia regolatoria della Cina sull’AI: equilibrio tra innovazione e controllo
L’aumento sempre più costante dell’intelligenza artificiale (IA) nel mondo ha portato all’esigenza d...
2024-4-25 03:31:57 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
ia
che
cina
dell
Cookie, 9 siti su 10 non sono compliant al GDPR: ecco perché serve tanta consapevolezza
Oltre 100mila siti web (europei) scandagliati e quasi tutti non conformi al GDPR. Alcuni ricercatori...
2024-4-25 03:31:55 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
della
dei
siti
NIS 2, verso una nuova gestione della cyber security: l’approccio multirischio
La Direttiva UE 2022/2555 del Parlamento europeo e del Consiglio, nota come Direttiva NIS 2, rappres...
2024-4-25 03:31:54 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
sicurezza
dei
della
gestione
Come diventare Security administrator: guida a una professione ambita
Il Security administrator deve avere le spalle larghe e una resistenza allo stress superiore. È la f...
2024-4-25 03:31:53 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
security
che
della
dei
Defense in depth -- the Microsoft way (part 87): shipping more rotten software to billions of unsuspecting customers
Full Disclosuremailing list archivesFrom: "Stefan Kanthak" <stefan.kanthak () ne...
2024-4-25 02:44:13 | 阅读: 1 |
收藏
|
Full Disclosure - seclists.org
microsoft
zlib
windows
stefan
USENIX Security ’23 – Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB)
Authors/Presenters: *Federico Cernera, Massimo La Morgia, Alessandro Mei, and Francesco...
2024-4-25 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
hlegyqwmung
morgia
Previous
1
2
3
4
5
6
7
8
Next