unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Democracy’s Challenge: Secure Elections Worldwide
LAS VEGAS — The U.S. presidential election is less than three months away, and many cybersecurity e...
2024-8-8 03:31:25 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
chief
election
genai
Cybercrime Rapper Sues Bank over Fraud Investigation
A partial selfie posted by Puchmade Dev to his Twitter account. Yes, that is a function...
2024-8-8 03:15:5 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - krebsonsecurity.com
punchmade
turner
pnc
him
lawsuit
UK IT provider faces $7.7 million fine for 2022 ransomware breach
error code: 1106...
2024-8-8 03:0:22 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
McLaren hospitals disruption linked to INC ransomware attack
error code: 1106...
2024-8-8 03:0:20 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Smart Contract Templates: Foundations, Design and Research - Smart Contract Designs
Authors:(1) Christopher D. Clack, Centre for Blockchain Technologies, Department of Computer Scien...
2024-8-8 03:0:18 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
prose
currency
court
admissible
USENIX Security ’23 – Eos: Efficient Private Delegation of zkSNARK Provers
Authors/Presenters:Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang Ma...
2024-8-8 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
chiesa
presenters
D3 Introduces Program to Help SOC Teams Migrate Successfully from Legacy SOAR
VANCOUVER, British Columbia–D3, the leader in smart security orchestration, automation, and respons...
2024-8-8 02:23:42 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
soar
d3
migration
security
transition
Evaluating Startup Predictions with Backtesting and Portfolio Simulation
Table of LinksAbstract and 1. Introduction2 Related works3 Dataset Overview, Preprocessing, and...
2024-8-8 02:20:38 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
portfolio
backtest
fund
threshold
unicorn
How Founders, Investors, and Investment Rounds Inform Startup Success Predictions
Table of LinksAbstract and 1. Introduction2 Related works3 Dataset Overview, Preprocessing, and...
2024-8-8 02:20:18 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
founders
categorical
numerical
investor
investment
Unicorns vs Failures: Constructing Comprehensive Datasets for Predictive Modeling
Table of LinksAbstract and 1. Introduction2 Related works3 Dataset Overview, Preprocessing, and...
2024-8-8 02:20:9 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
unicorns
valuation
ipo
acq
MSP Case Study: CloudIntellect Helped Clients Gain Granular Visibility on Email Channels with PowerDMARC
Reading Time: 2 min“The most comprehensive DMARC reporting platform. Bar none!”Howa...
2024-8-8 02:13:50 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
dmarc
powerdmarc
msp
security
Listen to the whispers: web timing attacks that actually work
Published: 07 August 2024 at 18:10 UTC...
2024-8-8 02:10:21 | 阅读: 14 |
收藏
|
PortSwigger Research - portswigger.net
timing
noise
reverse
injection
ssrf
Student Devices Wiped — Mobile Guardian Hacked AGAIN
MDM software for schools is breached for second time this year—13,000 devices wiped in Singapore ...
2024-8-8 02:3:54 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
guardian
security
singapore
wiped
richi
Windows Downdate: Downgrade Attacks Using Windows Updates
Downgrade attacks—also known as version-rollback attacks—are a type of attack designed to revert a...
2024-8-8 02:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
windows
downgrade
security
hypervisor
microsoft
The Fall of Sheikh Hasina: Footage from the Streets of Bangladesh
Bangladesh’s Prime Minister Sheikh Hasina was forced to resign and flee the country...
2024-8-8 01:2:53 | 阅读: 13 |
收藏
|
bellingcat - www.bellingcat.com
police
protesters
hasina
protests
bangladesh
macOS Sequoia brings better Gatekeeper, stalkerware protections
error code: 1106...
2024-8-8 01:0:21 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Botnet 7777: Are You Betting on a Compromised Router?
Firstly, we extend our thanks to Chris Fearnley and Gi7w0rm, two threat researchers who assisted us...
2024-8-8 01:0:9 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
quad7
7777
63256
routers
11288
Randall Munroe’s XKCD ‘Matter’
via the comic & dry wit of Randall Munroe, creator of XKCDPermalink*** This is...
2024-8-8 01:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
creator
wit
munroe
syndicated
How Sonar Helps Meeting NIST SSDF Code Security Requirements
What is the NIST SSDF?The NIST Secure Software Development Framework (SSDF) brings tog...
2024-8-8 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
sonarqube
security
software
sonar
Tenable Adds Ability to Prioritize Vulnerabilities by Threat Level
Tenable this week at the Black Hat USA 2024 conference added an ability to identify the vulnerabili...
2024-8-8 00:16:8 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
tenable
developers
millard
Previous
1619
1620
1621
1622
1623
1624
1625
1626
Next