unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
INE Security Alert: The Steep Cost Of Neglecting Cybersecurity Training
CARY, North Carolina, August 20th, 2024, CyberNewsWireIn modern business, cybersecurity is not mere...
2024-8-21 05:56:50 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
security
threats
ine
fines
11 Cybersecurity Risks for NFT Buyers
While securing a non-fungible token (NFT) might sound like a good idea, doing so comes with cybersec...
2024-8-21 05:34:51 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
nfts
buyers
marketplace
investment
Toyota confirms third-party data breach impacting customers
error code: 1106...
2024-8-21 05:30:19 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Microchip Technology discloses cyberattack impacting operations
error code: 1106...
2024-8-21 05:15:18 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
AI Business: Enterprise Models for LLMs Profitability
What can large language models [LLMs] do for prompt and quality sleep? All humans sleep. There are s...
2024-8-21 04:57:14 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
llms
dominant
memory
stating
cognitive
Strengthening Cloud Security: A Comprehensive Approach
In the evolving landscape of cloud and hybrid...
2024-8-21 04:41:42 | 阅读: 6 |
收藏
|
Horizon3.ai - www.horizon3.ai
cloud
nodezero
security
visits
evolving
Detecting AWS Account Compromise: Key Indicators in CloudTrail Logs for Stolen API Keys
Cybersecurity / Cloud SecurityAs cloud infrastructure becomes the backbone of modern enterprises,...
2024-8-21 04:13:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
cloudtrail
unusual
monitoring
attacker
Black Hat USA 2024: Key Takeaways from the Premier Cybersecurity Event
The annual pilgrimage to Las Vegas for Black Hat USA 2024 has concluded, and as always, it did not...
2024-8-21 04:5:35 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
software
threats
Czech Mobile Users Targeted in New Banking Credential Theft Scheme
Mobile Security / Banking FraudMobile users in the Czech Republic are the target of a novel phishi...
2024-8-21 03:59:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
pwa
phishing
webapk
eset
security
Cisco employees face a month of silence ahead of second layoff in 2024
After tech giant Cisco announced plans for its second round of layoffs this year, employees tell Te...
2024-8-21 03:47:2 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - techcrunch.com
layoffs
techcrunch
quarter
anonymous
robbins
Why you need to know about ransomware
Last month, a strange thing happened in cybersecurity: a type of cyberthreat typically reserved...
2024-8-21 03:28:43 | 阅读: 0 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
ransomware
hospitals
schools
everyday
software
Fuzzing the physical dimensions https://www.twitch.tv/gamozo
2024-8-21 03:15:49 | 阅读: 0 |
收藏
|
Twitter @Brandon Falk - x.com
How the Moon Impacts Subsea Communication Cables: GPS Long-Term Stabilized RF Phase Meter
Table of LinksAbstract and IntroductionGPS Long-Term Stabilized RF Phase MeterSimple and Accurat...
2024-8-21 03:0:53 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
meter
cable
optical
carrier
drift
Local Development With Subdomains, Mobile Testing, and OAuth: is it More Cost Effective?
tl;drFor many applications, especially when starting out, localhost has all the functionality neede...
2024-8-21 03:0:50 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
ngrok
network
mazaar
development
accomplish
Bulleted Notes eBook Summary: A Different Way to Chat with PDF
Last year, I began manually summarizing a collection of books to integrate psychological concepts fr...
2024-8-21 03:0:39 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
bulleted
instruct
mistral
ebook
chunking
The Modern Educator and the Perceived Silliness of Gamification in Education
Art created by the authorEducation is a very crucial and serious domain in life, and it comes in va...
2024-8-21 03:0:36 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
videogames
pokemon
educators
teach
Is Now the Right Time to Start Using Azure Data Studio?
The first time I tried Azure Data Studio a few years ago, I was not impressed because it was a simpl...
2024-8-21 03:0:34 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
profiler
ssms
developers
appreciate
wider
The Cybersecurity Paradox: Why Free Costs Too Much
Well, well, well. Look what the cat dragged in from cyberspace. The cybersecurity industry is pullin...
2024-8-21 03:0:30 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
outsourcing
expertise
talent
software
USENIX Security ’23 – CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
Home » Security Bloggers Network » USENIX Security ’23 – CipherH: Automated Detection of Cipherte...
2024-8-21 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
bloggers
network
2024 Pollscrolling
The 2024 US election has, in the last few weeks, become the most interesting one I can recall. I’m...
2024-8-21 03:0:0 | 阅读: 3 |
收藏
|
ongoing by Tim Bray - www.tbray.org
polls
538
bias
trump
harris
Previous
1459
1460
1461
1462
1463
1464
1465
1466
Next