unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
VALR CMO Ben Caselin Reveals How Digital Assets are Reshaping Finance in Unexpected Ways
In Hong Kong, where towering skyscrapers kiss the clouds and neon lights paint the night sky, a diff...
2024-8-14 03:22:52 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
caselin
kong
hong
finance
revolution
Kelp DAO Introduces 'Gain Vault' Program with Integrated L2 Access
Kelp DAO, a liquid restaking platform, has announced the launch of its 'Kelp Gain Vaults' program. T...
2024-8-14 03:21:21 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
defi
kelp
vaults
airdrop
l2
Internet Computer Protocol Enhances Bitcoin Functionality
The Internet Computer Protocol (ICP) has recently implemented significant upgrades that promise to e...
2024-8-14 03:20:12 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
icp
schnorr
threshold
developers
Talos discovers Microsoft kernel mode driver vulnerabilities that could lead to SYSTEM privileges; Seven other critical issues disclosed
Tuesday, August 13, 2...
2024-8-14 03:16:48 | 阅读: 28 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.talosintelligence.com
microsoft
windows
security
tuesday
Carbon black supplier Orion loses $60 million in business email compromise scam
About $60 million was stolen from one of the leading suppliers of carbon products after an employee...
2024-8-14 03:16:22 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
funds
transfers
wire
carbon
involve
Microsoft’s August 2024 Patch Tuesday Addresses 88 CVEs
2024-8-14 03:5:26 | 阅读: 14 |
收藏
|
Tenable Blog - www.tenable.com
tenable
microsoft
windows
security
The "Good Work" Theory
Quality of work is a key factor in the perceived extrinsic and intrinsic volumes of time decayed on...
2024-8-14 03:0:25 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
constraints
passion
naïve
sentiments
empathy
Flighty App Can Now Predict Flight Delays: Here’s How You Can Also Do It Using Machine Learning
Top flight tracking app, Flighty, is using machine learning as well as the data from the aviation a...
2024-8-14 03:0:22 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
flight
df
sequences
lstm
scaler
Basic Infrastructure
Recently, I was looking at the infrastructure bills for our CoSocial co-op member-owned Mastodo...
2024-8-14 03:0:0 | 阅读: 8 |
收藏
|
ongoing by Tim Bray - www.tbray.org
cloud
mastodon
backup
USENIX Security ’23 – One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat
Authors/Presenters:Chao Wang, Yue Zhang, Zhiqiang Lin Many thanks to USENIX for publ...
2024-8-14 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
security
lin
nocookie
Microsoft August 2024 Patch Tuesday fixes 9 zero-days, 6 exploited
error code: 1106...
2024-8-14 02:45:18 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
SBOMs Critical to Software Supply Chain Security
By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndi...
2024-8-14 02:42:22 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
sboms
developers
friedman
Inside the "3 Billion People" National Public Data Breach
I decided to write this post because there's no concise way to explain the nuances of what's bein...
2024-8-14 02:31:2 | 阅读: 28 |
收藏
|
Troy Hunt's Blog - www.troyhunt.com
npd
corpus
hibp
ssn
9b
When Appsec Needs to Start Small - Kalyani Pawar, Danny Jenkins, Nikos Kiourtis - ASW #295
Aug 13, 2024Startups and small orgs don't have the luxury of massive budgetsand large teams. How do...
2024-8-14 02:28:0 | 阅读: 6 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
security
asw
threats
defcon
Microsoft fixes issue that sent PCs into BitLocker recovery
error code: 1106...
2024-8-14 02:15:19 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
National Public Data (unverified) - 133,957,569 breached accounts
Here's an overview of the various breaches that have been consolidated into this Have I BeenPwned....
2024-8-14 02:9:46 | 阅读: 20 |
收藏
|
Have I Been Pwned latest breaches - haveibeenpwned.com
passwords
hibp
permalink
suffered
birth
A PoC exploit code is available for critical Ivanti vTM bug
A PoC exploit code is available for critical Ivanti vTM bugIvanti warned of a critical authent...
2024-8-14 02:5:50 | 阅读: 81 |
收藏
|
Security Affairs - securityaffairs.com
vtm
ivanti
bypass
attackers
The August 2024 Security Update Review
I have successfully survived Summer Hacker Camp, and I hope you have too. And we return just in t...
2024-8-14 02:5:1 | 阅读: 16 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
microsoft
windows
attacker
substance
elevation
Gartner® Insights: Navigating the Evolving API Protection Market and Taking Action
Securing your API ecosystem is increasingly complex, leaving organizations unsure where...
2024-8-14 01:56:25 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
salt
posture
governance
evolving
Re: Microsoft PlayReady WMRMECC256 Key / root key issue (attack #5)
Full Disclosuremailing list archivesFrom: Security Explorations <contact () secu...
2024-8-14 01:56:14 | 阅读: 18 |
收藏
|
Full Disclosure - seclists.org
security
wmrmecc256
microsoft
mailing
Previous
1557
1558
1559
1560
1561
1562
1563
1564
Next