unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
Supply Chain Attack / MalwareA new software supply chain attack campaign has been observed using s...
2026-5-1 09:43:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
github
knot
ssh
sleeper
Overview of Content Published in April
Overview of Content Published in April Filed under: Announcement — Didier Stevens @ 9:28...
2026-5-1 09:28:46 | 阅读: 3 |
收藏
|
Didier Stevens - blog.didierstevens.com
didier
stevens
isc
diary
Billions of meals at risk due to Iran war, says fertiliser boss
2026-5-1 09:27:45 | 阅读: 3 |
收藏
|
Technical Information Security Content & Discussion - www.reddit.com
Anthropic launches Claude Security to counter rapid AI-Powered exploits
Anthropic launches Claude Security to counter rapid AI-Powered exploits...
2026-5-1 09:15:2 | 阅读: 3 |
收藏
|
Security Affairs - securityaffairs.com
claude
security
anthropic
mythos
Geofence Warrants and Artificial Intelligence – What Happens When Robots Enforce the 4th Amendment?
The Fourth Amendment was written for a world of desks, drawers, and locked trunks. The modern invest...
2026-5-1 09:12:54 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
warrant
warrants
geofence
fourth
court
How to Safely Integrate AI Into Structured Backend Systems
New StorybySwapneswar Sundar RaybySwapneswar Sundar Ray@swapneswarsundarrayBuilding AI-driven enter...
2026-5-1 09:3:47 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
sundar
ray
workflows
The Overlap of Cybersecurity and Financial Risk: Protecting Sensitive Data in Commodity Markets
Every organization that operates in a digital space needs to prioritize cybersecurity, but some...
2026-5-1 09:0:17 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
markets
minimize
espionage
SonicWall patches three SonicOS flaws in Gen 6, 7 and 8 firewalls. Patch them now
SonicWall patches three SonicOS flaws in Gen 6, 7 and 8 firewalls. Patch them now...
2026-5-1 08:42:36 | 阅读: 3 |
收藏
|
Security Affairs - securityaffairs.com
sonicos
firewalls
tracked
firmware
Handled, Not Hosted: Administrative Activity Inside a Bulletproof Hoster
2026-5-1 08:32:46 | 阅读: 2 |
收藏
|
Technical Information Security Content & Discussion - www.reddit.com
How to Build a Browser-Based Voice Assistant With the AssemblyAI Voice Agent API
New StorybyAssemblyAIbyAssemblyAI@assemblyaiAssemblyAI builds advanced speech language models that...
2026-5-1 08:29:42 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
speech
7 Things You Can Build With a Single WebSocket (Using AssemblyAI’s Voice Agent API)
New StorybyAssemblyAIbyAssemblyAI@assemblyaiAssemblyAI builds advanced speech language models that...
2026-5-1 08:23:23 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
speech
How to Evaluate STT for Voice Agents in Production
New StorybySpeechmaticsbySpeechmatics@speechmaticsSpeechmatics builds world-leading speech technolo...
2026-5-1 08:4:2 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
speech
machine
featured
Uphold refutes Misstatements in New York Attorney General’s Press Release Regarding Cred, LLC Fraud
New StorybyBlockchain WirebyBlockchain Wire@blockchainwireThe #1 Press Release Wire Service for Blo...
2026-5-1 08:0:6 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
lending
wire
relations
blockchain
China Has its Sights Set on Scammers, Just Not Those Targeting Americans
China may be trying to stem the tide of scams coming out of Southeast Asia, but it seems the cou...
2026-5-1 07:19:59 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
criminal
ford
investment
economic
security
15-year-old: How to learn real cybersecurity and hacking skills, and what path to follow?
2026-5-1 07:12:44 | 阅读: 2 |
收藏
|
Your Open Hacker Community - www.reddit.com
Networks of Browser Extensions Are Spyware in Disguise
Browser extensions are collecting and reselling user data—perfectly legally—and opening up a sle...
2026-5-1 07:9:59 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
odom
layerx
collecting
security
behaviors
BTCC Exchange and the Argentine Football Association Unite as Legends in New Campaign Video
New StorybyChainwirebyChainwire@chainwireThe world's leading crypto & blockchain press release dist...
2026-5-1 07:9:44 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
stories
repodec
btcc
3 ways custom scan checks turn practitioner knowledge into scalable automation
Hassan Ud-Deen |Friday, 1 May 2026...
2026-5-1 06:52:0 | 阅读: 13 |
收藏
|
PortSwigger Blog - portswigger.net
burp
expertise
dast
security
senior
Announcing PAI 5.0
An open-source Life Operating System for your Digital AssistantApril 30, 2026Hey all, Kai here. Supe...
2026-5-1 05:2:47 | 阅读: 17 |
收藏
|
Unsupervised Learning - danielmiessler.com
pai
claude
elevenlabs
ideal
Deterministic Routing: The Hidden Key to Low Latency
New StorybyRitvik PandyabyRitvik Pandya@ritvikpandyaEngineering leader at JPMorgan Chase building s...
2026-5-1 04:42:41 | 阅读: 25 |
收藏
|
Hacker Noon - hackernoon.com
pandya
chase
geographic
jpmorgan
Previous
1
2
3
4
5
6
7
8
Next