unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Crypto ≠ One-Size-Fits-All: The Key to Driving Adoption in Africa
Crypto needs emerging markets (and in part thanks to Gary Gensler, thanks Gary) many in the Western...
2024-8-29 03:0:28 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
africa
continent
stablecoins
offramps
Unlocking Creative Potential: Exploring Latent Spaces in 3D Generative Design
The creative process in design has always been about pushing boundaries, exploring new frontiers, an...
2024-8-29 03:0:25 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
latent
generative
designs
exploration
designers
PoorTry Windows driver evolves into a full-featured EDR wiper
error code: 1106...
2024-8-29 03:0:21 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Q Numbers Redux
Back in July I wrote about Q numbers, which make it possible to compare numeric values using a...
2024-8-29 03:0:0 | 阅读: 10 |
收藏
|
ongoing by Tim Bray - www.tbray.org
numbits
arne
automaton
integers
hormann
USENIX Security ’23 – Extending A Hand To Attackers: Browser Privilege Escalation Attacks Via Extensions
Thursday, August 29, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsFe...
2024-8-29 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
usenix
webinars
bloggers
The art and science behind Microsoft threat hunting: Part 3
Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined...
2024-8-29 03:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
hunt
hunters
informed
Choosing the Right DSPM Vendor: The Map is Not the Territory
There’s a well known mental model that lays out the premise that “the map is not the territory.” It...
2024-8-29 02:56:32 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
dspm
security
territory
posture
New Tickler malware used to backdoor US govt, defense orgs
error code: 1106...
2024-8-29 02:45:18 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Data Masking Challenges in Complex Data Environments and How to Tackle them
As a database administrator, you don’t just maintain systems—you protect your organization’s most s...
2024-8-29 02:8:12 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
masking
security
masked
referential
adm
DataDome Releases Fastly Compute Server-Side Integration
Hot TopicsDataDome Releases Fastly Compute Server-Side Integration China Cyberwar Coming? Ve...
2024-8-29 02:6:40 | 阅读: 21 |
收藏
|
Security Boulevard - securityboulevard.com
fastly
compute
datadome
expand
CulturaX: A High-Quality, Multilingual Dataset for LLMs - Related Work
Authors:(1) Thuat Nguyen, Dept. of Computer Science, University of Oregon, OR, USA;(2) Chien Van...
2024-8-29 02:0:22 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
llms
datasets
usa
oregon
dept
DICK’s shuts down email, locks employee accounts after cyberattack
error code: 1106...
2024-8-29 01:45:18 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Special Bulletin: US Election Phishing Alert
Threat Intelligence ReportDate: August 28, 2024Prepared by: David Brunsdon, Threat Intelligen...
2024-8-29 01:43:38 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
hyas
election
donations
political
phishing
CODAC Behavioral Healthcare, US Marshalls are latest ransomware targets
The Qilin ransomware group listed CODAC Behavioral Healthcare, a nonprofit health care treatmen...
2024-8-29 01:36:41 | 阅读: 4 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
healthcare
ransomware
behavioral
codac
qilin
Google increases Chrome bug bounty rewards up to $250,000
error code: 1106...
2024-8-29 01:30:21 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Iranian hackers work with ransomware gangs to extort breached orgs
error code: 1106...
2024-8-29 01:30:20 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
AccentFold: Enhancing Accent Recognition - What Information Does AccentFold capture?
Authors:(1) Abraham Owodunni, Intron Health, Masakhane, and this author contributed equally;(2) A...
2024-8-29 01:0:33 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
accents
accent
embeddings
speakers
accentfold
Fortra fixes critical FileCatalyst Workflow hardcoded password issue
error code: 1106...
2024-8-29 01:0:22 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
China Cyberwar Coming? Versa’s Vice: Volt Typhoon’s Target
Versa Networks criticized for swerving the blame.A huge, gaping vulnerability in Versa Director al...
2024-8-29 00:57:30 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
versa
typhoon
volt
isps
blame
Poor Randomness: Securing Random Number Generation in Spring Applications
Welcome to my three-part deep dive into the world of Java cryptography!In this series, we'll explor...
2024-8-29 00:32:42 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
security
digit
randomness
Previous
1335
1336
1337
1338
1339
1340
1341
1342
Next