unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Essential 2024 AI & Big Data Conferences: Oxycon, World AI Summit, AI Summit NY, Analytics Summit
In 2023, I wrote about essential developers’ conferences to attend, highlighting their significance...
2024-8-5 21:35:15 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
summit
conferences
attend
speakers
oxycon
Chameleon is now targeting employees: Masquerading as a CRM app
Chameleon is back in Canada and EuropeIn July 2024 Mobile Threat Intelligence analysts observ...
2024-8-5 21:31:44 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
chameleon
bypassing
canada
canadian
Phishing: Methodology, Common Techniques and Tools
We can’t talk about social engineering without mentioning phishing. Similarly, email is es...
2024-8-5 21:22:8 | 阅读: 0 |
收藏
|
VAADATA – Ethical Hacking Services - www.vaadata.com
phishing
attacker
victim
dropbox
Salt Security Provides Free Scans for XXS Vulnerabilities Involving OAuth Protocol
Salt Security is making available a free scanning tool that it has been using to assess...
2024-8-5 21:21:11 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
security
balmas
victim
employ
employed
Researchers Uncover Flaws in Windows Smart App Control and SmartScreen
Threat Intelligence / VulnerabilityCybersecurity researchers have uncovered design weaknesses in M...
2024-8-5 21:2:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
reputation
security
involves
smartscreen
malicious
PinnacleOne ExecBrief | The Escalation of Nation-State Sabotage and Its Implications for the Private Sector
Last week, we highlighted how the recent CrowdStrike disruption underscored the complexity of today...
2024-8-5 21:0:47 | 阅读: 8 |
收藏
|
SentinelOne - www.sentinelone.com
sabotage
security
france
cables
Cloud cryptography demystified: Google Cloud Platform
By Scott ArciszewskiThis post, the second in our series on cryptography in the c...
2024-8-5 21:0:3 | 阅读: 3 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
cloud
tink
kms
encryption
client
Cloud cryptography demystified: Google Cloud Platform
By Scott ArciszewskiThis post, the second in our series on cryptography in the cloud, provides an...
2024-8-5 21:0:3 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
tink
kms
encryption
client
Your Exposure Ends Here: Introducing the New Tenable Brand
2024-8-5 21:0:0 | 阅读: 9 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cloud
security
nessus
exposure
Kazakh Organizations Targeted by 'Bloody Wolf' Cyber Attacks
Network Security / Threat IntelligenceOrganizations in Kazakhstan are the target of a threat activ...
2024-8-5 20:42:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
kazakhstan
strrat
network
windows
security
Leveraging CRQ to Understand Ransomware Costs | Kovrr
Today, decision makers at the world’s largest enterprises, from the CISO to the CEO, are increasing...
2024-8-5 20:41:55 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
costs
losses
insurance
Turning Data into Action: Intelligence-Driven Vulnerability Management
Prioritizing vulnerabilities with context has always been a challenge for vulnerability management t...
2024-8-5 20:40:0 | 阅读: 8 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cves
kev
exposure
Kerberos 中针对 RODC 的 Key List Attack 分析
2024-8-5 20:34:53 | 阅读: 0 |
收藏
|
先知安全技术社区 - xz.aliyun.com
Replacement for Action Fraud, UK’s cybercrime reporting service, delayed again until 2025
The launch date for the repeatedly delayed replacement service for Action Fraud, the much-criticize...
2024-8-5 20:16:26 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
police
london
adams
committee
crime
Le telecomunicazioni sono i bersagli principali dei cyberattacchi
2024-8-5 20:15:31 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.securityinfo.it
di
attacchi
sono
minacce
sulle
Keytronic incurred approximately $17 million of expenses following ransomware attack
Keytronic incurred approximately $17 million of expenses following ransomware attackPrinted ci...
2024-8-5 20:10:44 | 阅读: 6 |
收藏
|
Security Affairs - securityaffairs.com
ransomware
expenses
keytronic
Keep Your Data Safe with This PII Compliance Checklist
Because of that, employment history and a dozen other data points like it are known as Personal...
2024-8-5 20:4:5 | 阅读: 8 |
收藏
|
Forcepoint - www.forcepoint.com
pii
security
threats
identify
enforce
Ryan Pentney reflects on 10 years of Talos and his many roles from the Sourcefire days
2024-8-5 20:2:2 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.talosintelligence.com
pentney
talos
sourcefire
snort
joined
物理学家李政道去世,享年 97 岁
1957 年诺贝尔物理学奖得主、物理学家李政道于 8 月 4 日在旧金山家中去世,享年 97 岁。李政道 1926 年出生于上海,祖籍江苏苏州,父亲李骏康是金陵大学农化系首届毕业生,祖父李...
2024-8-5 19:58:40 | 阅读: 0 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
李政道
物理学
1957
苏州
弘扬数字时代青年力量,ISC.AI 2024漏洞生态与实战人才发展论坛召开
近日,ISC.AI 2024漏洞生态与实战人才发展论坛在北京国家会议中心顺利召开。论坛上,360与中国光华科技基金会共同发布“数字时代青年力量”数字安全科技人才激励计划并开启“时代青年榜样”评选,进一...
2024-8-5 19:29:33 | 阅读: 0 |
收藏
|
360漏洞云 - mp.weixin.qq.com
安全
漏洞
青年
网络
中国
Previous
1655
1656
1657
1658
1659
1660
1661
1662
Next