unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
自托管的开源视频分享平台 MediaCMS
MediaCMS 是一个现代化的开源的视频和媒体 CMS,使用 Django 和 React 实现。MediaCMS 也提供了完善的 RESTful API 接口。特点可定制,提供了丰富的插...
2024-9-12 08:0:0 | 阅读: 7 |
收藏
|
Verne in GitHub - blog.einverne.info
mediacms
restful
django
ffmpeg
控制
【生物战】俄罗斯国家杜马报告
今天给大家推送总共有207页的俄罗斯议会(国家杜马)关于美国在乌克兰建立生物实验室,以及在卢斯甘克发动生物恐怖袭击的情况报告。文本是俄罗斯议会委员会关于美国在乌克兰建立生物实验室的调查报告,旨在调查美...
2024-9-12 07:59:47 | 阅读: 5 |
收藏
|
丁爸 情报分析师的工具箱 - mp.weixin.qq.com
美国
安全
威胁
Daniel Jeffries Tried To Predict Bitcoin’s Future in 2017: How We Can Learn From It
A fiction author and a futurist, Daniel Jeffries is one of the most popular writers in HackerNoon’s...
2024-9-12 07:59:9 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
jeffries
daniel
governance
blockchain
UK designates the data center sector part of its ‘Critical National Infrastructure’
The British government announced on Thursday it had designated the data center sector as a part of...
2024-9-12 07:16:35 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
centres
cni
blackouts
water
security
Imperva Protects Against Critical Apache OFBiz Vulnerability (CVE-2024-45195)
Recently, a critical vulnerability in the widely used Apache OFBiz framework was disclo...
2024-9-12 06:54:3 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
imperva
ofbiz
security
45195
protects
5 Stages of Shadow IT Grief | Grip
Shadow IT? It’s not an organizational priority…or is it? Shadow IT: You’ve heard the term more tim...
2024-9-12 06:53:42 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
grief
stage
grip
Rundll32.exe bomb
This is a silly example of a basic mistake leading to a funny discovery…When I was expe...
2024-9-12 06:8:46 | 阅读: 10 |
收藏
|
Hexacorn - www.hexacorn.com
rundll32
uxlib
syswow64
wdsutil
phantom
800% Growth: LLM Attacker Summaries a Hit with Customers
We are excited to share the tremendous response to our Large Language Model (LLM) attac...
2024-9-12 05:57:35 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
llm
security
salt
attacker
How to Deploy a Smart Contract to Ethereum Network Using dRPC API Key and Endpoint
IntroductionFrom understanding the tech stack for Web3 DApp development, you must have learned the...
2024-9-12 05:19:23 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
coffee
quantity
ether
totalcost
buyer
Fake password manager coding test used to hack Python developers
error code: 1106...
2024-9-12 05:15:19 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Analysis of the Jante’s Law Process and Proof of Conjecture: Coupling Y (⋅) and Z(⋅)
Authors:(1) Edward Crane, School of Mathematics, University of Bristol, BS8 1TH, UK;(2) Stanislav...
2024-9-12 05:0:21 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
chocolate
convex
geometry
theorem
outer
Vulnerability handling requirements for NIS2 compliance
In a previous blog post, we covered two foundational elements of the Network and Information Se...
2024-9-12 05:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
nis2
network
sonatype
FFIEC Will Sunset the Cybersecurity Assessment Tool: Everything You Need to be Prepared
The Federal Financial Institutions Examination Council (FFIEC) has officially announced that its Cy...
2024-9-12 04:41:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ffiec
security
regulatory
Short-term Memory Effects in the Phototactic Behavior of Microalgae: Discussion and References
Authors:(1) Taha Laroussi, Laboratoire d’Hydrodynamique (LadHyX), CNRS, Ecole Polytechnique, Insti...
2024-9-12 04:0:16 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
phototaxis
stimuli
experiments
threshold
forth
[2024]windows快捷方式深度研究与RCE漏洞挖掘.pdf
huoji windows,漏洞,快捷方式 2024-09-12 15 次浏览 0 次点赞本文由 huoji 创作,采用 知识共享署名 3.0,可自由转载、引用,但需署...
2024-9-12 03:52:51 | 阅读: 22 |
收藏
|
白帽Wiki - 一个简单的wiki - key08.com
署名
huoji
windows
漏洞
共享
TD Bank fined $28 million for sharing inaccurate and negative data on customers
The Consumer Financial Protection Bureau (CFPB) on Wednesday fined TD Bank $28 million for allegedl...
2024-9-12 03:16:24 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
cfpb
fraudulent
deposit
consumers
boston
[2022] 微软的代码虚拟机"战斗之鸟"(warbird)深度研究与逆向 #2
本文由 huoji 创作,采用 知识共享署名 3.0,可自由转载、引用,但需署名作者且注明文章出处。 ...
2024-9-12 03:12:0 | 阅读: 8 |
收藏
|
白帽Wiki - 一个简单的wiki - key08.com
署名
huoji
共享
How HeyFood Grew From a Small Campus Tool to 100k Users in 5 Cities
What To Expect:How HeyFood got to its first users within the student communityExpanding outside U...
2024-9-12 03:0:24 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
heyfood
courage
ibadan
riders
growth
Analysis of the Jante’s Law Process and Proof of Conjecture: Proof of Theorem 1
Authors:(1) Edward Crane, School of Mathematics, University of Bristol, BS8 1TH, UK;(2) Stanislav...
2024-9-12 03:0:19 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
absolutely
lund
theorem
USENIX Security ’23 – Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities
Wednesday, September 11, 2024 Community Chats Webinars LibraryHomeCybersecurity Ne...
2024-9-12 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
network
Previous
1157
1158
1159
1160
1161
1162
1163
1164
Next