unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How One Consultancy Behemoth Uses HYAS for Unrivaled Cybersecurity
One financial services and consulting behemoth designed its cybersecurity stack with an unders...
2024-9-10 23:46:34 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
hyas
msp
firm
insight
How Effective Threat Hunting Programs are Shaping Cybersecurity
49% have experienced a major security breach in the past 12 months, according to respondents to our...
2024-9-10 23:37:3 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
trained
identify
respondents
hunters
Firmware 1.0 Released
2024-9-10 23:31:28 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.flipper.net
flipper
firmware
library
catalog
parsers
Wix.com to block Russian users starting September 12
error code: 1106...
2024-9-10 23:30:20 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
推荐:图说安全年度打卡活动
事先说明:这是一篇推文;为什么要发它?因为我认识主理人,他很有货;之前我在他的群里潜水,看坚持每天发干货真是了不起。干货,包括:安全从业人员的高度认知,跳出工作来谈生活;丰富的从业经验以及见解,让我每...
2024-9-10 23:19:31 | 阅读: 0 |
收藏
|
我的安全视界观 - mp.weixin.qq.com
安全
sdl
漏洞
sop
I Tried Perplexity For a Week, And I Don't Think AI Search Engines Can Replace Google.. Yet
The fact that I began this experiment a week later than I had originally planned should tell you all...
2024-9-10 23:17:17 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
perplexity
openai
hackernoon
necessarily
investors
thinkphp最新CVE-2024-44902反序列化漏洞
2024-9-10 23:5:51 | 阅读: 5 |
收藏
|
先知安全技术社区 - xz.aliyun.com
CISA Adds Three Critical Vulnerabilities to Known Exploited Vulnerabilities Catalog
Key TakeawaysCISA has updated its Known Exploited Vulnerabilities (KEV) Catalog wi...
2024-9-10 23:1:26 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
security
exploited
imagemagick
1000253
USENIX Security ’23 – Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code Analysis
Tuesday, September 10, 2024 Community Chats Webinars LibraryHomeCybersecurity News...
2024-9-10 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
usenix
network
webinars
Flipper Zero releases Firmware 1.0 after three years of development
error code: 1106...
2024-9-10 22:45:19 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Navigating Endpoint Privilege Management: Insights for CISOs and Admins
error code: 1106...
2024-9-10 22:45:18 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Microsoft to start force-upgrading Windows 22H2 systems next month
error code: 1106...
2024-9-10 22:45:17 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Phishing Via Typosquatting and Brand Impersonation: Trends and Tactics
Introduction Following the 2024 ThreatLabz Phishing Report, Zscaler ThreatLabz has been closely tra...
2024-9-10 22:36:51 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
brands
threatlabz
CrowdStrike 称尚未有客户正式提起诉讼
美国网络安全公司 CrowdStrike 今年 7 月因为有问题的更新导致了全世界的 Windows 主机蓝屏死机,有逾 800 万台 PC 受到影响,是过去十年最严重的安全事故。达美航空...
2024-9-10 22:14:12 | 阅读: 4 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
crowdstrike
威胁
安全
收场
万台
Another Wave: A BASIC ELIZA Turns the PC Generation On to AI
Table of LinksAbstract and 1. IntroductionWhy ELIZA?The Intelligence EngineersNewell, Shaw, and...
2024-9-10 22:7:52 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
eliza
lisp
hobbyists
cosell
The Accidental AI: How ELIZA's Lisp Adaptation Derailed Its Original Research Intent
Table of LinksAbstract and 1. IntroductionWhy ELIZA?The Intelligence EngineersNewell, Shaw, and...
2024-9-10 22:7:42 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
eliza
lisp
weizenbaum
cosell
bbn
Finally, ELIZA: A Platform, Not a ChatBot!
Table of LinksAbstract and 1. IntroductionWhy ELIZA?The Intelligence EngineersNewell, Shaw, and...
2024-9-10 22:7:32 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
eliza
weizenbaum
machine
garfinkel
The Threads Come Together: Interpretation, Language, Lists, Graphs, and Recursion
Table of LinksAbstract and 1. IntroductionWhy ELIZA?The Intelligence EngineersNewell, Shaw, and...
2024-9-10 22:7:26 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
eliza
sentences
graphs
cognitive
Interpretation is the Core of Intelligence
Table of LinksAbstract and 1. IntroductionWhy ELIZA?The Intelligence EngineersNewell, Shaw, and...
2024-9-10 22:7:15 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
eliza
weizenbaum
mental
colby
Weizenbaum’s Gomoku and the Art of Creating an Illusion of Intelligence
Table of LinksAbstract and 1. IntroductionWhy ELIZA?The Intelligence EngineersNewell, Shaw, and...
2024-9-10 22:7:4 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
weizenbaum
eliza
intelligent
gomoku
Previous
1193
1194
1195
1196
1197
1198
1199
1200
Next