unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
A group linked to RansomHub operation employs EDR-killing tool EDRKillShifter
A group linked to RansomHub operation employs EDR-killing tool EDRKillShifterA cybercrime grou...
2024-8-16 04:12:37 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
ransomhub
ransomware
knight
sophos
Clapper Launches “the Newsroom” to Promote Unbiased News and Combat Censorship
As the social media landscape continues to evolve, Clapper, a platform designed for adults seeking a...
2024-8-16 03:54:40 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
clapper
newsroom
speech
dialogue
commitment
10 Methods to Build Your Telegram Crypto Community
The blockchain industry is already saturated with so many sub-platforms promoting various blockchain...
2024-8-16 03:0:21 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
tips
hamster
growth
organic
Innovation Culture Roadmap: What Works and What Doesn't
Recent McKinsey research highlights that the most innovative companies embed innovation deeply withi...
2024-8-16 03:0:19 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
innovation
mistakes
processes
innovative
USENIX Security ’23 – TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks
Regular vulnerability assessments/pen testingAutomated security testing within CI/CD pipelinesC...
2024-8-16 03:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
assessments
security
hoc
formal
pipelines
Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - Brett Stone-Gross, Rakesh Nair, Rekha Shenoy, Marty Momdjian - ESW #372
Aug 15, 2024In this conversation, the hosts discuss patchless patching,vulnerabilities in the Windo...
2024-8-16 03:0:0 | 阅读: 1 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
security
ransomware
sponsored
devo
Dozens of Google products targeted by scammers via malicious search ads
In a previous blog, we saw criminals distribute malware via malicious ads for Google Authentica...
2024-8-16 02:48:18 | 阅读: 5 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
malicious
looker
advertiser
windows
How to Align Infosec to Business Operations: Sam Curry’s Cybersecurity Playbook for Executives
This cybersecurity playbook is inspired by Sam Curry’s insights on the crucial role of building re...
2024-8-16 02:18:35 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
playbook
The Hidden Cost of Click Fraud: Why Data You Can Trust, Matters
Hot TopicsUSENIX Security ’23 - TRIDENT: Towards Detecting and Mitigating Web-based Social En...
2024-8-16 02:15:44 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
clicks
genuine
ctr
inaccurate
security
Ransomware gang deploys new malware to kill security software
error code: 1106...
2024-8-16 02:15:18 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
AI, election security headline discussions at Black Hat and DEF CON
Thursday, August 15,...
2024-8-16 02:1:57 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.talosintelligence.com
talos
security
software
ReliaQuest: Watch Out for Info-Stealers and RATs
Threat actors are gravitating toward info-stealing malware like LummaC2 and remote access trojans (...
2024-8-16 01:53:41 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
socgholish
lummac2
reliaquest
evans
software
Google disrupted hacking campaigns carried out by Iran-linked APT42
Google disrupted hacking campaigns carried out by Iran-linked APT42Google disrupted a hacking...
2024-8-16 01:30:57 | 阅读: 8 |
收藏
|
Security Affairs - securityaffairs.com
apt42
phishing
iran
trump
disrupted
Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrations
Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrationsjosh.p...
2024-8-16 01:28:57 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
pqc
thales
security
cpl
encryption
Google: Iranian hackers targeting affiliates of both US presidential campaigns
Hackers allegedly connected to the government of Iran have ramped up phishing attacks against high-...
2024-8-16 01:16:22 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
apt42
iran
officials
trump
affiliated
The Polar Bear in Your Kitchen: A Cybersecurity Analogy
August 15, 2024Chris Clements, VP of Solutions Architecture at CISO Global High-Tech Pest Con...
2024-8-16 01:15:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
polar
bear
ciso
Randall Munroe’s XKCD ‘Celestial Event’
Regular vulnerability assessments/pen testingAutomated security testing within CI/CD pipelinesC...
2024-8-16 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
assessments
reviews
audits
hoc
Coming Soon: NEW Classroom Manager by ManagedMethods
Classroom Manager is purpose-built for K-12 cybersecurity, safety, and complianceAt ManagedMethods...
2024-8-16 00:45:17 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
classroom
teachers
scenes
Tusk: unraveling a complex infostealer campaign
SummaryKaspersky Global Emergency Response Team (GERT) has identified a complex campa...
2024-8-16 00:15:13 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
inactive
trojan
shop
tidyme
The Noonification: AI the Quest for Superintelligence (8/15/2024)
2024-8-16 00:4:24 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
monopoly
ripple
hackernoon
laws
Previous
1527
1528
1529
1530
1531
1532
1533
1534
Next