unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
(CVE-2024-7009) Calibre SQLite Injection
SummaryProductCalibreVendorCalibreSeverityMediumAffected Versions<= 7.15.0 (lates...
2024-7-31 08:0:0 | 阅读: 9 |
收藏
|
Advisories on STAR Labs - starlabs.sg
fts
calibre
library
stemming
database
The Cyber Security and Resilience Bill: what it means for businesses and how to get ahead
Cybersecurity and resilience have always been key priorities for information security experts, but r...
2024-7-31 08:0:0 | 阅读: 0 |
收藏
|
Intigriti - blog.intigriti.com
security
resilience
bill
Communication just got easier: Introducing our improved submission messaging
Today, we're announcing a major upgrade to our submission messaging system, designed to streamline p...
2024-7-31 08:0:0 | 阅读: 1 |
收藏
|
Intigriti - blog.intigriti.com
mentions
submissions
submission
inbox
identify
How to optimize your vulnerability management process
Effective vulnerability management is no longer just an IT concern; it's a fundamental business impe...
2024-7-31 08:0:0 | 阅读: 1 |
收藏
|
Intigriti - blog.intigriti.com
security
threats
involves
New Alpha Release: Tor Browser 14.0a1
Tor Browser 14.0a1 is now available from the Tor Browser download page and also from our distributio...
2024-7-31 08:0:0 | 阅读: 0 |
收藏
|
Tor Project blog - blog.torproject.org
esr
mozilla
windows
upstream
security
派早报:抖音上线违规作品修改功能等
你可能错过的新鲜事抖音上线违规作品修改功能7 月 29 日,抖音安全中心发布抖音作品修改功能上线公告,公告称为避免因个别违规点影响作品传播,抖音即日起上线作品修改功能。该功能目前仅在粉丝量大于 1...
2024-7-31 08:0:0 | 阅读: 7 |
收藏
|
少数派 - sspai.com
少数派
afmf
perplexity
出版商
hynix
New Release Tor Browser 140A1
Tor Browser 14.0a1 is now available from the Tor Browser download page and also from our distributio...
2024-7-31 08:0:0 | 阅读: 1 |
收藏
|
Tor Project blog - blog.torproject.org
esr
mozilla
windows
upstream
keyrings
Senate passes landmark bill protecting children’s online safety and privacy
The U.S. Senate on Tuesday overwhelmingly passed legislation which significantly broadens online pr...
2024-7-31 07:46:25 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
bill
teens
parents
american
coppa
Is Your MFA Broken?
Multifactor authentication (MFA) has formally been around for more than two decades, gaining the mo...
2024-7-31 06:58:41 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
resistant
fido
axiad
ThreatLabz Ransomware Report: Unveiling a $75M Ransom Payout Amid Rising Attacks
Ransomware has been a daunting threat to organizations worldwide for decades. Recent trends show th...
2024-7-31 06:32:39 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
threatlabz
zscaler
threats
families
Stealth AI Review: The Reliable Undetectable AI Writing Tool
The challenge of maintaining originality and passing AI detection has become increasingly significan...
2024-7-31 06:30:11 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
stealth
ensuring
enhance
originality
Ubook - 699,908 breached accounts
Here's an overview of the various breaches that have been consolidated into this Have I BeenPwned....
2024-7-31 06:25:42 | 阅读: 7 |
收藏
|
Have I Been Pwned latest breaches - haveibeenpwned.com
passwords
hibp
permalink
suffered
birth
Chiplab Introduction
2024-7-31 06:7:57 | 阅读: 6 |
收藏
|
Reverse Engineering - www.reddit.com
reddit
agree
agreement
continuing
acknowledge
Stealthly Review: Bypassing AI Detection With Humanized Content
As AI detectors increasingly permeate the AI writing landscape, the need for tools that can effectiv...
2024-7-31 06:4:13 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
stealthly
detectors
humanized
detector
How to Deal With the Issue of Toxic Productivity
What’s one of the most underrated feelings of the modern day? Feeling happy with where and who you a...
2024-7-31 05:38:33 | 阅读: 88 |
收藏
|
Hacker Noon - hackernoon.com
productive
toxic
breaks
feeling
Massive SMS stealer campaign infects Android devices in 113 countries
error code: 1106...
2024-7-31 05:30:20 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Detection Rules & MITRE ATT&CK Techniques
We Can Do BetterAs a Detection Engineer and Threat Hunter, I love MITRE ATT&CK and I whole-hearted...
2024-7-31 05:15:52 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
precision
mappings
accuracy
snapattack
tactic
Proofpoint Platform Exploited to Send Millions of Spoofed Phishing Emails
A hacker for months exploited a misconfiguration in cybersecurity firm Proofpoint’s email protectio...
2024-7-31 05:12:43 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
proofpoint
spoofed
tal
security
phishing
CISA adds VMware ESXi bug to its Known Exploited Vulnerabilities catalog
CISA adds VMware ESXi bug to its Known Exploited Vulnerabilities catalogU.S. Cybersecurity and...
2024-7-31 05:8:27 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
exploited
microsoft
catalog
security
GUEST ESSAY: CrowdStrike outage fallout — stricter regulations required to achieve resiliency
By Sumedh BardeWhat does the recent CrowdStrike outage tell us about the state of di...
2024-7-31 05:0:23 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
crowdstrike
resiliency
barde
mistake
outage
Previous
1728
1729
1730
1731
1732
1733
1734
1735
Next