unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
One Month On, Have Spot Ethereum ETFs Been a Success?
There are many factors that make Ethereum a fundamentally different cryptocurrency from Bitcoin, and...
2024-9-5 09:26:55 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
etfs
spot
ether
street
wall
新型PyPI攻击技术可能导致超2.2万软件包被劫持
主站 分类 漏洞 工具 极客...
2024-9-5 09:26:45 | 阅读: 12 |
收藏
|
FreeBuf网络安全行业门户 - www.freebuf.com
攻击
安全
pypi
劫持
jfrog
从thinkphp教你学会sql注入代码审计(全)
2024-9-5 09:18:19 | 阅读: 2 |
收藏
|
先知安全技术社区 - xz.aliyun.com
Attack Surface [Guest Diary], (Wed, Sep 4th)
[This is a Guest Diary by Joshua Tyrrell, an ISC intern as part of the SANS.edu BACS program]Mana...
2024-9-5 09:15:9 | 阅读: 9 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
network
geo
software
walls
malicious
A Powerful Approach to SaaS ITDR – Avoiding False Positives on Improbable Travel
In the world of SaaS ITDR, the journey taken matters. There are solutions that began from an ITDR p...
2024-9-5 09:14:33 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
itdr
adaptive
shield
improbable
travel
Vitalik's Shit Post Is Very ‘Demure’ and ‘Mindful’ of Ethereum
Last week, I suspected that Vitalik's X account might have been hacked when I saw a post featuring a...
2024-9-5 09:3:28 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
vitalik
shit
memes
meme
charts
How to Set Up GitHub Actions and PyPI Integration for Python Projects
How to Use GitHub Actions and Create Integration With pypi for Python ProjectsIntroductionWhen I w...
2024-9-5 08:50:30 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
python
github
poetry
pypi
sqlalchemy
OpenAI 前科学家新公司融资 10 亿美元;飞书 CEO:今年 ARR 超 3 亿美元;淘宝计划接入微信支付 | 极客早知道
OpenAI 前首席科学家的 AI 公司融资 10 亿美元,估值或约 50 亿美元由 OpenAI 前首席科学家 Ilya Sutskever 联合创立的 AI 初创公司 Safe Superinte...
2024-9-5 08:49:54 | 阅读: 3 |
收藏
|
极客公园 - mp.weixin.qq.com
飞书
gpt
ssi
笔记
openai
派早报:英特尔发布酷睿 Ultra 200V 系列处理器、淘宝将接入微信支付等
你可能错过的新鲜事英特尔发布酷睿 Ultra 200V 系列处理器9 月 3 日,英特尔公司在柏林举办发布会,推出酷睿 Ultra 200V 系列处理器。该处理器系列分为 5、7、9 三个类目,共...
2024-9-5 08:31:48 | 阅读: 7 |
收藏
|
少数派 - sspai.com
少数派
200v
xe
ultra
gopro
Hacking misconfigured AWS S3 buckets: A complete guide
AWS S3 (Simple Storage Service) buckets are a popular storage service used by software companies and...
2024-9-5 08:0:0 | 阅读: 2 |
收藏
|
Intigriti - blog.intigriti.com
buckets
security
developers
requestmake
versioning
'A newspaper without borders': Mediapart now available as .onion
We are excited to officially welcome Mediapart.fr, an independent French investigative online newspa...
2024-9-5 08:0:0 | 阅读: 2 |
收藏
|
Tor Project blog - blog.torproject.org
onionspray
mediapart
readers
network
yassine
OpenAI 的 Whisper 以及相关模型和项目
自动语音识别技术 (Automatic Speech Recognition,简称 ASR)最近得到了非常大的提升,这个技术允许计算机通过识别语音将其转录成文本,在日常生活中有着非常广泛的应用,比如...
2024-9-5 08:0:0 | 阅读: 3 |
收藏
|
Verne in GitHub - blog.einverne.info
whisper
模型
数据
openai
distil
Pwn2Own Automotive 2024: Hacking the Autel MaxiCharger
Septe...
2024-9-5 08:0:0 | 阅读: 15 |
收藏
|
Sector 7 - sector7.computest.nl
charger
firmware
byref
autel
Elevate Your Scraping Project With Puppeteer Extra
As highlighted in our guide to web scraping with Puppeteer, this browser automation library is a fan...
2024-9-5 07:58:15 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
puppeteer
scraping
stealth
anonymize
chromium
Why We Can’t Put Down Our Phones: The Psychological Barriers to Reducing Screen Time
The amount of time we’re locked in looking at our screens is reaching alarming levels. While you mig...
2024-9-5 07:38:45 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
mental
phones
adults
habits
constantly
Smashing Security podcast #383: The Godfather club, and AirTags to the rescue
Skip to contentThere’s a whole new dating scam that could mean you end up out of pocket (o...
2024-9-5 07:1:12 | 阅读: 9 |
收藏
|
Graham Cluley - grahamcluley.com
security
dating
smashing
romance
graham
Theory Coherent Shrinkage of Time Varying Parameters in VARs: A Appendix
Andrea Renzetti, Department of Economics, Alma Mater Studiorium Universit`a di Bologna, Piazza Scara...
2024-9-5 07:0:13 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
tvp
coherent
theory
forecasting
keynesian
Cypherpunks Write Code: Bram Cohen & BitTorrent
Surely, BitTorrent sounds like something familiar, right? It’s that famous file-sharing protocol tha...
2024-9-5 06:59:58 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
cohen
bittorrent
cypherpunk
chia
cypherpunks
BC.GAME Unveils Brand Upgrade To Enhance Its iGaming Platform
WILLEMSTAD, Curacao, September 4th, 2024/Chainwire/--BC.GAMEBC.GAME, the global iGaming leader, has...
2024-9-5 06:25:3 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
commitment
innovative
igaming
reflects
innovation
Google fixed actively exploited Android flaw CVE-2024-32896
Google fixed actively exploited Android flaw CVE-2024-32896 Pierluigi Paganini September 04, 2...
2024-9-5 06:18:55 | 阅读: 22 |
收藏
|
Security Affairs - securityaffairs.com
32896
addressed
security
exploited
tracked
Previous
1082
1083
1084
1085
1086
1087
1088
1089
Next