unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Internal Monologue Capture
I can’t stop thinking about a new concept AI applications could benefit from. I’m calling it i...
2024-8-1 08:0:0 | 阅读: 7 |
收藏
|
Joseph Thacker - josephthacker.com
monologue
thoughts
imagine
expertise
constantly
SSRF: A complete guide to exploiting advanced SSRF vulnerabilities
SSRF—short for Server-Side Request Forgery—vulnerabilities are amongst one of the most impactful web...
2024-8-1 08:0:0 | 阅读: 2 |
收藏
|
Intigriti - blog.intigriti.com
ssrf
bypass
behalf
attacker
Artificial Intelligence: Is Google Already a Loser in the Search Engine Battle?
“Some say Google is God “ Sergey BrinWhen it comes to longevity in the tech industry, IBM stands...
2024-8-1 07:28:51 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
chatgpt
battle
generative
giant
vast
Tools to Bypass AI Detection in 2024
The question of human authorship, once a non-issue, now occupies the minds of creators across variou...
2024-8-1 07:21:22 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
detectors
deceptioner
cons
pros
humanizeai
IVY - The Future of Cryptocurrency Trading: Artificial Intelligence and Blockchain in Operation
A fully automated artificial intelligence-based crypto trading system is a new service with the pote...
2024-8-1 07:17:46 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
ivy
blockchain
artificial
network
Time Travel Theories and the Fallacy of No Change to the Present
Table of LinksI. IntroductionII. PseudoscienceIII. Unidentified AssumptionIV. False Assumption...
2024-8-1 07:17:41 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
timelike
1994
letters
thorne
curves
Pharma giant Cencora says personal health data leaked during February cyber incident
Pharmaceutical company Cencora confirmed on Wednesday that personal health data was exfiltrated dur...
2024-8-1 07:16:22 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
cencora
ransomware
filing
wednesday
fortune
【AI速读】俄乌战争给印度哪些启示?
《乌克兰战争的军事视角和战略反思》由印度国防研究与分析研究所(Manohar Parrikar Institute for Defence Studies and Analyses, MP-IDSA)...
2024-8-1 06:45:26 | 阅读: 3 |
收藏
|
丁爸 情报分析师的工具箱 - mp.weixin.qq.com
安全
北约
西方
立场
反思
【AI速读】美军从乌克兰学习低成本无人机声音定位防空网络
文本讨论了美国军方对乌克兰使用声学传感器网络探测和跟踪无人机系统的兴趣,以及这种技术作为低成本防空选项的可能性。这项由两位乌克兰工程师在车库里研发的技术已经展示了其有效性,并且可能被整合到美国自身的防...
2024-8-1 06:45:26 | 阅读: 5 |
收藏
|
丁爸 情报分析师的工具箱 - mp.weixin.qq.com
网络
无人机
美国
防空
声学
Evolving development with software composition analysis and software bills of materials
Software development is as dynamic as it is challenging, so understanding what goes...
2024-8-1 06:17:7 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
software
sonatype
development
linskens
authored
Large Language Models on Memory-Constrained Devices Using Flash Memory: Conclusion & Discussion
Authors:(1) Keivan Alizadeh;(2) Iman Mirzadeh, Major Contribution;(3) Dmitry Belenko, Major Cont...
2024-8-1 06:0:16 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
inference
arxiv
memory
annual
How to Scrape Data Off Wikipedia: Three Ways (No Code and Code)
I needed some data for my side project. Google helped me find only outdated CSVs, expensive closed s...
2024-8-1 05:48:5 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
pandas
soup
python
wiki
sheets
Declarative Shadow DOM: The Magic Pill for Server-Side Rendering and Web Components
Server Side Rendering Web componentsGenerating static HTML from JavaScript on the server called Ser...
2024-8-1 05:40:33 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
shadow
paragraph
shadowroot
declarative
How to Receive Files from multipart/form-data Responses Using RestTemplate in Java
When working with APIs, there may be a need to send a request with JSON data and receive a response...
2024-8-1 05:34:48 | 阅读: 9 |
收藏
|
Hacker Noon - hackernoon.com
httpheaders
restclient
resultmodel
bodypart
The Machines Arena Launches Exciting Play 2 Airdrop Event: Unlocking $TMA Tokens Through Gaming
**REYKJAVIK, Iceland, July 30th, 2024/GamingWire/--**The Machines Arena(TMA)the competitive hero sho...
2024-8-1 05:31:27 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
players
directive
p2a
leaderboard
arena
Credit card users get mysterious shopify-charge.com charges
error code: 1106...
2024-8-1 05:30:35 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Harnessing Public Web Data for AI
Organizations strive to acquire data through effective, reliable, and accessible means. As far back...
2024-8-1 05:29:55 | 阅读: 10 |
收藏
|
Hacker Noon - hackernoon.com
bright
scraping
developers
developer
datasets
Ethernity Launches The First Entertainment-Focused Layer 2 Chain On Optimism’s Superchain
LOS ANGELES, United States, July 31st, 2024/Chainwire/--Ethernity, a pioneer in blockchain entertain...
2024-8-1 05:28:28 | 阅读: 10 |
收藏
|
Hacker Noon - hackernoon.com
ethernity
optimism
gelato
web3
A ransomware attack disrupted operations at OneBlood blood bank
A ransomware attack disrupted operations at OneBlood blood bankOneBlood, a non-profit blood ba...
2024-8-1 05:19:0 | 阅读: 16 |
收藏
|
Security Affairs - securityaffairs.com
hospital
blood
oneblood
ransomware
hospitals
CISA, FBI warn of potential DDoS attacks on 2024 elections
Two federal agencies urged voters to be prepared for distributed denial-of-service (DDoS) attacks o...
2024-8-1 05:16:26 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
election
voter
timely
cloud
Previous
1709
1710
1711
1712
1713
1714
1715
1716
Next