unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Qilin ransomware steals credentials stored in Google Chrome
Qilin ransomware steals credentials stored in Google ChromeSophos researchers investigated a Q...
2024-8-24 05:55:17 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
ransomware
qilin
chrome
attackers
gpo
Enhancing School Safety with Cloud Monitor: A Powerful Cyber Safety Protection Tool
As the back-to-school season begins, K-12 tech leaders face many cybersecurity and safety challenge...
2024-8-24 05:33:0 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
schools
robert
predation
webinar
DOJ joins suit against Georgia Tech over cybersecurity failures with Defense Department
The Justice Department said it joined a whistleblower lawsuit over claims that the Georgia Institut...
2024-8-24 05:17:4 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
georgia
antonakakis
lawsuit
justice
Audit: FBI is Losing Track of Storage Devices Holding Sensitive Data
The FBI’s poor handling of electronic storage media bound for destruction opens the possibility tha...
2024-8-24 03:58:52 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
drives
facility
electronic
amu
security
Mahjong Meta Verse: The Evolution Of Mahjong Meta Into a Web3 Gaming Theme Park
HONG KONG, China, August 23rd, 2024/Chainwire/--Since its launch, Mahjong Meta has been dedicated to...
2024-8-24 03:47:40 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
mahjong
verse
players
themed
competitive
Solving DeFi’s Complexity Problem As Adoption Stalls
Decentralized Finance (DeFi) has the potential to revolutionize the financial landscape by offering...
2024-8-24 03:45:33 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
defi
blockchain
liquidity
regulatory
American Radio Relay League confirms $1 million ransom payment
error code: 1106...
2024-8-24 03:45:19 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
USENIX Security ’23 – That Person Moves Like A Car: Misclassification Attack Detection For Autonomous Systems Using Spatiotemporal Consistency
Saturday, August 24, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsFe...
2024-8-24 03:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
network
novel
Response to CISA Advisory (AA24-234A): Strengthening Defenses Through Effective Event Logging and Threat Detection
On August 21st, 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CIS...
2024-8-24 02:54:30 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackiq
windows
behaviors
Faking your own death, Fake Reviews, Solar Winds, Recall, Winux, Kubernetes, and More - SWN #409
This feed includes all episodes of Paul's Security Weekly, Enterpr...
2024-8-24 02:40:0 | 阅读: 3 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
security
weekly
paul
shop
episodes
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for July
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecu...
2024-8-24 02:31:13 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
aitm
phishing
threats
ssh
Psst, Your DNS is Showing: Uncovering Vulnerabilities in DNS and Password Managers.
The Domain Name System (DNS) is often likened to the internet’s phone book, translating human-friend...
2024-8-24 02:18:14 | 阅读: 13 |
收藏
|
Hacker Noon - hackernoon.com
phishing
spoofing
security
criminal
dnstwister
Microsoft shares temp fix for Linux boot issues on dual-boot systems
error code: 1106...
2024-8-24 02:15:18 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Law and AI: The Most Important Question That Law Firms Need to Answer
The legal sector, famously traditional and often perceived as a tech laggard, is now quite emphatica...
2024-8-24 02:8:27 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
firms
lawyers
client
lawyer
firm
Phishing attacks target mobile users via progressive web applications (PWA)
Phishing attacks target mobile users via progressive web applications (PWA)Cybercriminals use...
2024-8-24 02:4:32 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
phishing
pwa
progressive
eset
webapk
OpenAI Made an AI Detection Tool, So Why Isn’t It Releasing It?
OpenAI became an overnight household name, at least in tech circles, by releasing ChatGPT in Novembe...
2024-8-24 02:3:51 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
software
openai
detector
fear
releasing
Why Transparency Is Key to the Future of AI and All It Can Be
Move over EigenLayer. RWAs, hop in the back seat. AI is proving it will be the top narrative in cryp...
2024-8-24 02:0:2 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
ethical
ensuring
Identities Aren’t for Sale: TSA Biometrics Technology and the Need for Consumer Consent
Earlier this summer, over a dozen bipartisan senators signed an amendment to the FAA reauthorizatio...
2024-8-24 01:59:3 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
tsa
sale
identities
security
Fake funeral “live stream” scams target grieving users on Facebook
Some scammers have the morals of an alley cat. But some sink even lower.Over the last few m...
2024-8-24 01:33:8 | 阅读: 1 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
funeral
membership
facebook
favorite
movies
Pool Your Cybersecurity Resources to Build the Perfect Security Ecosystem
Cybersecurity has never been something to set once and leave running in the background — it is a co...
2024-8-24 01:16:56 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
microsoft
ransomware
Previous
1416
1417
1418
1419
1420
1421
1422
1423
Next