unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
NIST releases first encryption tools to resist quantum computing
error code: 1106...
2024-8-15 03:45:18 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
‘It was Iran,’ Trump says of presidential campaign hack
In his first public comments since his campaign revealed it had been hacked, former President Donal...
2024-8-15 03:16:22 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
iran
trump
tehran
reporters
praised
The Future of Search: AI-Powered Transformation
In the rapidly evolving landscape of artificial intelligence, traditional marketing pl...
2024-8-15 03:6:2 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
relevance
brands
Biotech company hacked in 2023 pays states $4.5 million over breached data
Three state governments have announced a $4.5 million payment from Enzo Biochem — a biotech company...
2024-8-15 03:1:26 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
enzo
york
oag
agreement
ransomware
Decentralized AI: Largest Companies Will Lose the Status of Monopoly
The Internet is only nearly 25 years old. In my mind, the Internet has been normal since Google appe...
2024-8-15 03:0:22 | 阅读: 13 |
收藏
|
Hacker Noon - hackernoon.com
network
icp
artificial
Traffic-Based Anomaly Detection in Log Files
Welcome to the final part of the series. In this article, we will explore how to detect high traffic...
2024-8-15 03:0:19 | 阅读: 9 |
收藏
|
Hacker Noon - hackernoon.com
logstate
logevent
anomalies
USENIX Security ’23 – Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
Authors/Presenters:uhong Nan, Sun Yat-sen University; Xueqiang Wang, University of Cent...
2024-8-15 03:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
indiana
bloomington
security
youtube
wu
8 Must-Ask Questions for AI Security Vendors
I attended the Black Hat conference last week, and to no surprise, artificial intelligence (AI) wa...
2024-8-15 02:52:14 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
swimlane
hero
security
turbine
regulations
Microsoft retires Windows updates causing 0x80070643 errors
error code: 1106...
2024-8-15 02:45:17 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Harris-Trump Presidential Election: Looking at the Threats and Cybersecurity Challenges
With less than three months to go until the 2024 US presidential election and...
2024-8-15 02:9:15 | 阅读: 10 |
收藏
|
Trustwave Blog - www.trustwave.com
election
influence
microsoft
odni
deepfakes
Microsoft Word and Sandboxes
Today's post is a brief one on some Microsoft Word and sandbox detection / discovery / fun.Collect...
2024-8-15 01:45:17 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - bartblaze.blogspot.com
microsoft
username
asd
sandboxes
userinfo
Five Gartner Reports. Four Categories. What Does OX Security Do Anyway?
Analyst firms play an important role in the tech vendor landscape. Their reports help buyers and wo...
2024-8-15 01:43:16 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
ox
aspm
software
sscs
China-linked APT Earth Baku targets Europe, the Middle East, and Africa
China-linked APT Earth Baku targets Europe, the Middle East, and AfricaChina-linked threat act...
2024-8-15 01:39:5 | 阅读: 16 |
收藏
|
Security Affairs - securityaffairs.com
baku
earth
sneakcross
encryption
August Patch Pileup: Microsoft’s Zero-Day Doozy Dump
Patch Tuesday—ten zero-days, seven Critical vulns, zero time to waste.It’s that time again. This mo...
2024-8-15 01:32:13 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
windows
microsoft
attackers
richi
Your SOHO Router is a Juicy Target for Hackers
Your home or small office (SOHO router) is likely being targeted by cybercriminals, malware, and...
2024-8-15 01:30:0 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
routers
security
soho
firmware
What is Threat Intelligence?
This article provides a comprehensive overview of threat intelligence services, highlighting the im...
2024-8-15 01:17:19 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
threats
security
analysis
stage
Black Basta-Linked Attackers Target Users with SystemBC Malware
Malware / Network SecurityAn ongoing social engineering campaign with alleged links to the Black B...
2024-8-15 01:13:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
loader
stealer
remote
download
ransomware
4 Effective Ways to Find Influencers-Affordable Influencer Marketplace
In today's digital age, influencer marketing has become a pivotal strategy for brand promotion and g...
2024-8-15 01:10:22 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
influencers
influencer
hashtags
conversion
fans
FaceStudio: Put Your Face Everywhere in Seconds: Conclusion and References
Table of LinksAbstract and 1 Introduction2. Related Work3. Method and 3.1. Hybrid Guidance Strat...
2024-8-15 01:0:22 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
arxiv
preprint
diffusion
liu
shot
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #303 — The Scrum Master To-Do List
via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lau...
2024-8-15 01:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
software
comic
respected
permalink
security
Previous
1541
1542
1543
1544
1545
1546
1547
1548
Next