unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Floki Becomes Official Cryptocurrency Partner Of Nottingham Forest F.C.
MIAMI, Florida, August 15th, 2024, Chainwire/Floki has partnered with Nottingham Forest football clu...
2024-8-16 06:56:56 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
floki
nottingham
forest
league
followers
iOS's Local HTML Preview Woes? Solved. Open Source. Ad-Free.
IntroductionLet's face it, iOS's built-in HTML preview is a letdown. External CSS? Gone. JavaScri...
2024-8-16 06:44:12 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
chatgpt
github
gist
aimarkdown
NationalPublicData.com Hack Exposes a Nation’s Data
A great many readers this month reported receiving alerts that their Social Security Nu...
2024-8-16 06:38:36 | 阅读: 4 |
收藏
|
Krebs on Security - krebsonsecurity.com
usdod
ssn
verini
brokers
ssns
What’s Different About Data Security in the Cloud? Almost Everything.
In 2019, most organizations already had digital transformation plans in place. These plans included...
2024-8-16 06:7:32 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
gaps
A Legal Outlook on the Apple Antitrust Lawsuit
The Apple lawsuit is the loudest case that focuses on Apple distribution agreements within anticompe...
2024-8-16 06:3:5 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
lawsuit
antitrust
competition
justice
monopoly
Microsoft removes FAT32 partition size limit in Windows 11
error code: 1106...
2024-8-16 06:0:20 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Five Key Takeaways from Flashpoint’s Black Hat USA 2024 Breakfast Briefing
Black Hat USA 2024 was a hub of critical discussions on the evolving landscape of cybersecurity, a...
2024-8-16 05:31:50 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - flashpoint.io
ransomware
flashpoint
threats
briefing
Cybersecurity Myths - Eugene Spafford - PSW #839
Aug 15, 2024Early on in his career Spaf was working with microcode andcontinued to work on technica...
2024-8-16 05:0:0 | 阅读: 5 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
psw
attackers
delve
Google to remove app from Pixel devices following claims that it made phones vulnerable
Google and a cybersecurity company are disputing over claims that an application on Android phones...
2024-8-16 04:16:22 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
iverify
verizon
software
palantir
A group linked to RansomHub operation employs EDR-killing tool EDRKillShifter
A group linked to RansomHub operation employs EDR-killing tool EDRKillShifterA cybercrime grou...
2024-8-16 04:12:37 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
ransomhub
ransomware
knight
sophos
Clapper Launches “the Newsroom” to Promote Unbiased News and Combat Censorship
As the social media landscape continues to evolve, Clapper, a platform designed for adults seeking a...
2024-8-16 03:54:40 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
clapper
newsroom
speech
dialogue
commitment
10 Methods to Build Your Telegram Crypto Community
The blockchain industry is already saturated with so many sub-platforms promoting various blockchain...
2024-8-16 03:0:21 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
tips
hamster
growth
organic
Innovation Culture Roadmap: What Works and What Doesn't
Recent McKinsey research highlights that the most innovative companies embed innovation deeply withi...
2024-8-16 03:0:19 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
innovation
mistakes
processes
innovative
USENIX Security ’23 – TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks
Regular vulnerability assessments/pen testingAutomated security testing within CI/CD pipelinesC...
2024-8-16 03:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
assessments
security
hoc
formal
pipelines
Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - Brett Stone-Gross, Rakesh Nair, Rekha Shenoy, Marty Momdjian - ESW #372
Aug 15, 2024In this conversation, the hosts discuss patchless patching,vulnerabilities in the Windo...
2024-8-16 03:0:0 | 阅读: 1 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
security
ransomware
sponsored
devo
Dozens of Google products targeted by scammers via malicious search ads
In a previous blog, we saw criminals distribute malware via malicious ads for Google Authentica...
2024-8-16 02:48:18 | 阅读: 5 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
malicious
looker
advertiser
windows
How to Align Infosec to Business Operations: Sam Curry’s Cybersecurity Playbook for Executives
This cybersecurity playbook is inspired by Sam Curry’s insights on the crucial role of building re...
2024-8-16 02:18:35 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
playbook
The Hidden Cost of Click Fraud: Why Data You Can Trust, Matters
Hot TopicsUSENIX Security ’23 - TRIDENT: Towards Detecting and Mitigating Web-based Social En...
2024-8-16 02:15:44 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
clicks
genuine
ctr
inaccurate
security
Ransomware gang deploys new malware to kill security software
error code: 1106...
2024-8-16 02:15:18 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
AI, election security headline discussions at Black Hat and DEF CON
Thursday, August 15,...
2024-8-16 02:1:57 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.talosintelligence.com
talos
security
software
Previous
1526
1527
1528
1529
1530
1531
1532
1533
Next