unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The 4 Components of Top AI Model Ecosystems
Table of ContentsThe ModelPost-trainingInternal toolingAgentsSummary I have been thinking a lot abou...
2024-8-20 04:27:20 | 阅读: 13 |
收藏
|
Unsupervised Learning - danielmiessler.com
tooling
weights
competition
agents
matters
Crypto enthusiasts flood npm with more than 281,000 bogus packages overnight
Crypto enthusiasts have lately been flooding software registries like npm and PyPI with thousan...
2024-8-20 04:16:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
overnight
bogus
enthusiasts
flood
test
New AI technologies are advancing cyberattacks and wreaking havoc on traditional identity verificat...
2024-8-20 04:0:52 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
competitive
security
leaders
bake
comparing
CISA adds Jenkins Command Line Interface (CLI) bug to its Known Exploited Vulnerabilities catalog
CISA adds Jenkins Command Line Interface (CLI) bug to its Known Exploited Vulnerabilities catalog...
2024-8-20 03:46:56 | 阅读: 16 |
收藏
|
Security Affairs - securityaffairs.com
jenkins
catalog
exploited
23897
Announcing new EDR capabilities for Webroot Endpoint Protection
by | Aug 19, 2024 | Threat LabRe...
2024-8-20 03:45:45 | 阅读: 19 |
收藏
|
Webroot Blog - www.webroot.com
webroot
security
defenders
network
What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF
On July 19, 2024, a flawed update in CrowdStrike Falcon's channel file 291 led to a logic err...
2024-8-20 03:36:15 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
ebpf
cilium
security
cves
What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF
On July 19, 2024, a flawed update in CrowdStrike Falcon’s channel file 291 led to a logic error th...
2024-8-20 03:36:15 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
ebpf
security
cilium
cves
CISA warns of Jenkins RCE bug exploited in ransomware attacks
error code: 1106...
2024-8-20 03:30:18 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Echoes of Rome: Leveraging Ancient Tactics for Modern Malware
Threat Intelligence ReportDate: August 19, 2024Prepared by: David Brunsdon, Threat Intelligen...
2024-8-20 03:5:3 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
inbox
pdr
moscow
ltd
USENIX Security ’23 – Side-Channel Attacks on Optane Persistent Memory
Home » Security Bloggers Network » USENIX Security ’23 – Side-Channel Attacks on Optane Persisten...
2024-8-20 03:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
bloggers
youtube
Extortion Group Exploits Cloud Misconfigurations, Targets 110,000 Domains
Threat actors armed with advanced automation techniques and an expansive knowledge of cloud archite...
2024-8-20 02:30:39 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
attackers
inadequate
From Vietnamese Upbringing to Marketing to a Global Audience: a Candid Convo with Linh Dao Smooke
In this podcast “You don't know Vietnam”, host Ian Payton of We Create Content, helps demystify Viet...
2024-8-20 02:6:0 | 阅读: 11 |
收藏
|
Hacker Noon - hackernoon.com
vietnam
dao
vietnamese
ian
linh
Columbus officials warn victims, witnesses after ransomware leak of prosecutor files
City leaders in Columbus warned victims and witnesses of crimes to stay alert about potential threa...
2024-8-20 02:1:36 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ransomware
ginther
columbus
cities
klein
Researchers uncovered new infrastructure linked to the cybercrime group FIN7
Researchers uncovered new infrastructure linked to the cybercrime group FIN7Team Cymru, Silent...
2024-8-20 01:52:25 | 阅读: 22 |
收藏
|
Security Affairs - securityaffairs.com
stark
fin7
industries
clusters
cymru
Black Hat Fireside Chat: Why grasping the context of code is a recipe for keeping software secure
By Byron V. AcohidoPresident Biden’s call for the mainstreaming of Software Bill of M...
2024-8-20 01:25:29 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
software
sboms
ingredients
security
acohido
Cybercriminals siphon credit card numbers from Oregon Zoo website
Cybercriminals were able to steal the credit card information of more than 100,000 people this year...
2024-8-20 01:16:22 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
zoo
oregon
regulators
sale
carding
Daniel Stori’s ‘The War For Port 80’
Application Security Check Up ...
2024-8-20 01:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
National Public Data Published Its Own Passwords
New details are emerging about a breach at National Public Data (NPD), a consumer data...
2024-8-20 00:45:6 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - krebsonsecurity.com
npd
freeze
verini
bureaus
AI: How ChatGPT and Big Tech are Shaping the Future of Artificial Intelligence
ChatGPT gained mainstream popularity in 2023 and changed how Big Tech companies approached artificia...
2024-8-20 00:42:34 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
suleyman
agi
regulation
governance
llms
Meet the Market Makers Behind the Memecoin Revolution
Meme coins have been one of the leading narratives of crypto in 2024, much to the chagrin of many se...
2024-8-20 00:37:41 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
meme
gotbit
coin
coins
solana
Previous
1479
1480
1481
1482
1483
1484
1485
1486
Next