unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Why MSPs must offer 24/7 cybersecurity protection and response — and how OpenText MDR can help
In today’s cyber threat landscape, good enough is no longer good enough. Cyberattacks don’t...
2025-1-13 19:59:39 | 阅读: 2 |
收藏
|
Webroot Blog - www.webroot.com
msps
security
opentext
mdr
threats
Part 16: Tool Description
2025-1-13 19:2:47 | 阅读: 1 |
收藏
|
Posts By SpecterOps Team Members - Medium - posts.specterops.io
mediatek — Linux Wireless documentation
2025-1-13 18:50:28 | 阅读: 3 |
收藏
|
wireless.docs.kernel.org
802
chip
pcie
11a
5ghz
Poland uncovers Russia-linked disinformation campaign targeting upcoming presidential election
A Russia-linked disinformation campaign has made attempts to influence Poland’s upcoming presidenti...
2025-1-13 18:46:23 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
poland
russia
gawkowski
ukraine
‘Codefinger’ hackers encrypting Amazon cloud storage buckets
Cybercriminals have begun to encrypt data held in Amazon storage tools used by thousands of organiz...
2025-1-13 18:31:28 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ransomware
encryption
halcyon
sse
Microsoft: macOS bug lets hackers install malicious kernel drivers
Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integr...
2025-1-13 18:30:34 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
security
attackers
bypass
microsoft
dubbed
Pastor’s “dream” crypto scheme alleged to be a multi-million dollar scam
A federal grand jury has indicted a 51-year-old church pastor on 26 counts of fraud, after alleged...
2025-1-13 18:17:44 | 阅读: 0 |
收藏
|
Graham Cluley - www.bitdefender.com
pinillo
funds
investors
alleged
church
Hackers exploit critical Aviatrix Controller RCE flaw in attacks
Threat actors are exploiting a critical remote command execution vulnerability, tracked as C...
2025-1-13 18:0:34 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
aviatrix
cloud
50603
4996
wiz
Texas sues Allstate, alleging it violated data privacy rights of 45 million Americans
Texas’ attorney general is suing the insurance giant Allstate and its subsidiary Arity for allegedl...
2025-1-13 17:16:19 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
arity
allstate
insurers
paxton
driving
Email info
2025-1-13 17:9:52 | 阅读: 0 |
收藏
|
Your Open Hacker Community - www.reddit.com
agree
reddit
continuing
acknowledge
username
UK domain registry Nominet confirms breach via Ivanti zero-day
Nominet, the official .UK domain registry and one of the largest country code registries, ha...
2025-1-13 17:0:30 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
ivanti
nominet
security
appliances
suspected
The Permission Slip Attack, Leveraging a Confused Deputy in Android with 'pSlip'
2025-1-13 16:54:34 | 阅读: 0 |
收藏
|
Reverse Engineering - www.reddit.com
agree
reddit
username
continuing
acknowledge
Welcome to HackerNoon Decoded: The Best of 2024
Welcome to HackerNoon Decoded—the ultimate recap of the stories, writers, and trends that defined 20...
2025-1-13 16:47:15 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
stories
hackernoon
polls
voted
decoded
5 Cities That Developed New Crypto Projects and Initiatives in 2024
Distributed Ledger Technology (DLT) and cryptocurrencies are everywhere now, being applied in a wide...
2025-1-13 16:47:10 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
dlt
obyte
hong
bonds
quarkid
The Evolution of Cybercrime Cartels: From Lone Wolves to Sophisticated Syndicates
In the early days of the internet, cybercriminals often operated as isolated “lone wolves,” exec...
2025-1-13 16:45:32 | 阅读: 4 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
organized
ransomware
syndicates
How to generate safe, useful test data for Amazon Redshift
Let’s Talk About RedshiftIn 2013, Amazon Redshift hit the data warehousing market. It came in with...
2025-1-13 16:42:39 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
redshift
tonic
database
mpp
mock
How to create realistic test data for Databricks with Tonic
A long time ago (2013, to be...
2025-1-13 16:36:1 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
databricks
tonic
realistic
spark
lakehouse
Some Video Editors Are a Special Kind of Hell
I lost three hours of work yesterday because Chrome took a nice ol’ dump while I was editing footage...
2025-1-13 16:32:53 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
flixier
canva
footage
editors
edited
Hawk and Griffin Models: Superior NLP Performance with Minimal Training Data
Authors:(1) Soham De, Google DeepMind and with Equal contributions;(2) Samuel L. Smith, Google De...
2025-1-13 16:28:52 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
deepmind
trained
griffin
hawk
How to create realistic, safe, document-based test data for MongoDB
An Overview of MongoDBMongo...
2025-1-13 16:28:46 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
database
tonic
nosql
mongo
rdbms
Previous
1
2
3
4
5
6
7
8
Next