unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Daniel Jeffries Tried To Predict Bitcoin’s Future in 2017: How We Can Learn From It
A fiction author and a futurist, Daniel Jeffries is one of the most popular writers in HackerNoon’s...
2024-9-12 07:59:9 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
jeffries
daniel
governance
blockchain
UK designates the data center sector part of its ‘Critical National Infrastructure’
The British government announced on Thursday it had designated the data center sector as a part of...
2024-9-12 07:16:35 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
centres
cni
blackouts
water
security
Imperva Protects Against Critical Apache OFBiz Vulnerability (CVE-2024-45195)
Recently, a critical vulnerability in the widely used Apache OFBiz framework was disclo...
2024-9-12 06:54:3 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
imperva
ofbiz
security
45195
protects
5 Stages of Shadow IT Grief | Grip
Shadow IT? It’s not an organizational priority…or is it? Shadow IT: You’ve heard the term more tim...
2024-9-12 06:53:42 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
grief
stage
grip
Rundll32.exe bomb
This is a silly example of a basic mistake leading to a funny discovery…When I was expe...
2024-9-12 06:8:46 | 阅读: 10 |
收藏
|
Hexacorn - www.hexacorn.com
rundll32
uxlib
syswow64
wdsutil
phantom
800% Growth: LLM Attacker Summaries a Hit with Customers
We are excited to share the tremendous response to our Large Language Model (LLM) attac...
2024-9-12 05:57:35 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
llm
security
salt
attacker
How to Deploy a Smart Contract to Ethereum Network Using dRPC API Key and Endpoint
IntroductionFrom understanding the tech stack for Web3 DApp development, you must have learned the...
2024-9-12 05:19:23 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
coffee
quantity
ether
totalcost
buyer
Fake password manager coding test used to hack Python developers
error code: 1106...
2024-9-12 05:15:19 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Analysis of the Jante’s Law Process and Proof of Conjecture: Coupling Y (⋅) and Z(⋅)
Authors:(1) Edward Crane, School of Mathematics, University of Bristol, BS8 1TH, UK;(2) Stanislav...
2024-9-12 05:0:21 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
chocolate
convex
geometry
theorem
outer
Vulnerability handling requirements for NIS2 compliance
In a previous blog post, we covered two foundational elements of the Network and Information Se...
2024-9-12 05:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
nis2
network
sonatype
FFIEC Will Sunset the Cybersecurity Assessment Tool: Everything You Need to be Prepared
The Federal Financial Institutions Examination Council (FFIEC) has officially announced that its Cy...
2024-9-12 04:41:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ffiec
security
regulatory
Short-term Memory Effects in the Phototactic Behavior of Microalgae: Discussion and References
Authors:(1) Taha Laroussi, Laboratoire d’Hydrodynamique (LadHyX), CNRS, Ecole Polytechnique, Insti...
2024-9-12 04:0:16 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
phototaxis
stimuli
experiments
threshold
forth
[2024]windows快捷方式深度研究与RCE漏洞挖掘.pdf
huoji windows,漏洞,快捷方式 2024-09-12 15 次浏览 0 次点赞本文由 huoji 创作,采用 知识共享署名 3.0,可自由转载、引用,但需署...
2024-9-12 03:52:51 | 阅读: 22 |
收藏
|
白帽Wiki - 一个简单的wiki - key08.com
署名
huoji
windows
漏洞
共享
TD Bank fined $28 million for sharing inaccurate and negative data on customers
The Consumer Financial Protection Bureau (CFPB) on Wednesday fined TD Bank $28 million for allegedl...
2024-9-12 03:16:24 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
cfpb
fraudulent
deposit
consumers
boston
[2022] 微软的代码虚拟机"战斗之鸟"(warbird)深度研究与逆向 #2
本文由 huoji 创作,采用 知识共享署名 3.0,可自由转载、引用,但需署名作者且注明文章出处。 ...
2024-9-12 03:12:0 | 阅读: 8 |
收藏
|
白帽Wiki - 一个简单的wiki - key08.com
署名
huoji
共享
How HeyFood Grew From a Small Campus Tool to 100k Users in 5 Cities
What To Expect:How HeyFood got to its first users within the student communityExpanding outside U...
2024-9-12 03:0:24 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
heyfood
courage
ibadan
riders
growth
Analysis of the Jante’s Law Process and Proof of Conjecture: Proof of Theorem 1
Authors:(1) Edward Crane, School of Mathematics, University of Bristol, BS8 1TH, UK;(2) Stanislav...
2024-9-12 03:0:19 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
absolutely
lund
theorem
USENIX Security ’23 – Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities
Wednesday, September 11, 2024 Community Chats Webinars LibraryHomeCybersecurity Ne...
2024-9-12 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
network
MarginNote 4 - 颠覆学习方式的 iPad Mac 读书阅读笔记工具 (思维导图/知识整理)
开学限时优惠 文档办公 Mac, iOS 2024-09-12 无论是学习、科研、工作,我们常常都要阅读大量资料/文献/论文等。尽管有很多优秀的商务型 PDF 阅读器可使用 (如...
2024-9-12 02:36:44 | 阅读: 14 |
收藏
|
异次元软件世界 - www.iplaysoft.com
marginnote
笔记
阅读器
epub
SiteCheck Remote Website Scanner — Mid-Year 2024 Report
Conducting an external website scan for indicators of compromise is one of the easiest ways to iden...
2024-9-12 02:32:40 | 阅读: 13 |
收藏
|
Sucuri Blog - blog.sucuri.net
malicious
injections
balada
sitecheck
remote
Previous
1151
1152
1153
1154
1155
1156
1157
1158
Next