unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX Security ’23 – DISTDET: A Cost-Effective Distributed Cyber Threat Detection System
Authors/Presenters:Feng Dong, Liu Wang Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo...
2024-8-12 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
luo
presenters
Computer Laboratory Management 1.0 SQL Injection
# Exploit Title: Computer Laboratory Management - SQL Injection (Authenticated)# Date: 11/08/2024#...
2024-8-12 22:58:59 | 阅读: 5 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
php
windows
injection
lms
20sleep
Gentoo Linux Security Advisory 202408-26
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Gentoo Linux Security Advisor...
2024-8-12 22:58:31 | 阅读: 2 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
gentoo
security
matio
202408
Courier Management System 2020-1.0 SQL Injection
## Titles: courier-management-system-2020-1.0 Multiple-SQLi## Author: nu11secur1ty## Date: 08/12/2...
2024-8-12 22:57:36 | 阅读: 2 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
courier
oastify
payload
qpq
Gentoo Linux Security Advisory 202408-25
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Gentoo Linux Security Advis...
2024-8-12 22:56:53 | 阅读: 2 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
gentoo
security
runc
nvd
vuln
Backdoor.Win32.Nightmare.25 MVID-2024-0687 Code Execution
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.co...
2024-8-12 22:56:10 | 阅读: 3 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
malvuln
doom
sm
226
ftpon
As he retires after two decades at Homeland Security, Brandon Wales reflects on CISA’s future
Brandon Wales sails into the sunset this week. The outgoing executive director of the Cybersecurit...
2024-8-12 22:46:26 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
election
security
rfn
bw
ransomware
web-pwn-详细入门
2024-8-12 22:38:50 | 阅读: 2 |
收藏
|
先知安全技术社区 - xz.aliyun.com
HYAS Investigates Threat Actors Hidden In Gaming Services
Threat Intelligence ReportDate: August 12, 2024Prepared by: David Brunsdon, Threat Intelligen...
2024-8-12 22:36:12 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
gg
reverse
hyas
playit
ply
Criminal IP and Maltego Join Forces for Enhanced Cyber Threat Search
error code: 1106...
2024-8-12 22:30:20 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
How to Achieve POPIA Compliance: Complete Checklist
Ready to tackle POPIA compliance? If you’re navigating the data protection maze in South Africa, y...
2024-8-12 22:21:10 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
popia
achieving
regulator
engage
checklist
Trump Campaign Hack Points to Growing U.S. Election Threats
The apparent hack of ex-President Trump’s campaign, allegedly by Iranian bad actors, comes just as...
2024-8-12 22:20:1 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
election
iranian
trump
russia
elections
Google Manifest V3 and Malwarebytes Browser Guard
We wanted to update you on some changes that Google’s making, and what...
2024-8-12 22:17:19 | 阅读: 4 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
chrome
blockers
brought
limitations
shipped
The Value in Root Cause Analysis for Vulnerability Management
Since the publishing of common vulnerabilities and exposures (CVEs) began more than 20 years ago, t...
2024-8-12 22:10:8 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
development
cves
Criminal IP and Maltego Collaborate to Broaden Threat Intelligence Data Search
Torrance, United States / California, August 12th, 2024, CyberNewsWireCriminal IP, an expanding C...
2024-8-12 22:0:20 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
criminal
maltego
spera
visualized
analysis
5 Trends Shaping MSP Cybersecurity Operations
Managed service providers (MSPs) are businesses that offer various services to manage a company's IT...
2024-8-12 21:58:29 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
msps
security
network
cloud
DEFCON CTF 32决赛战报,全球第五,中国队伍第一!
在今年5月6日结束的线上初赛中,Straw Hat以全球第四的成绩成功晋级DEFCON CTF 32决赛。 8月12日北京时间4点,DEFCON CTF 32决赛正式结束,最终Straw...
2024-8-12 21:51:14 | 阅读: 6 |
收藏
|
白帽100安全攻防实验室 - mp.weixin.qq.com
straw
defcon
远程
sec3
Why Should Artificial Intelligence Be Decentralized?
The intersection of Web3 and artificial intelligence, especially in the form of generative neural ne...
2024-8-12 21:48:11 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
artificial
network
An Advanced and Efficient EVM for ZK Apps - Key Takeaways from the Horizen 2.0 Whitepaper
TL;DRHorizen is an OG blockchain launched in 2017 with a long history of ZK dedicationHorizen 2.0...
2024-8-12 21:35:19 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
zk
horizen
evm
developers
We Swapped the Bitcoin Logo With Gary Gensler's Face; Here's What Happened Next
Have you ever come across situational marketing cases like this? Share it with me in the comments or...
2024-8-12 21:26:5 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
coinstats
situational
ugc
gary
crashed
Previous
1573
1574
1575
1576
1577
1578
1579
1580
Next