unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Does it matter if iptables isn't running on my honeypot?, (Thu, Apr 25th)
I've been working on comparing data from different DShield [1] honeypots to understand differences...
2024-4-25 08:8:21 | 阅读: 1 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
honeypot
dpt
honeypots
highlighted
cowrie
Smashing Security podcast #369: Keeping the lights on after a ransomware attack
Skip to contentLeicester City Council suffers a crippling ransomware attack, and a massive...
2024-4-25 07:1:58 | 阅读: 4 |
收藏
|
Graham Cluley - grahamcluley.com
security
india
smashing
leicester
graham
Cradlepoint Adds SASE Platform for 5G Wireless Networks
Cradlepoint, a unit of Ericsson, today launched a secure access service edge (SASE) platform for br...
2024-4-25 06:27:3 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
network
remote
offices
cradlepoint
campbell
Feds accuse founders of cryptocurrency mixer of ‘large-scale money laundering’
The two founders of a cryptocurrency mixing service that allegedly obfuscated the origins of at lea...
2024-4-25 06:1:30 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
samourai
prosecutors
mixer
founders
doj
My 30-Day Journey on a Dark Web Marketplace That Belonged to a Cyber Gang
Too Long; Didn't ReadOnce I completed the sign-up portion, I was able to sign in and was greeted wit...
2024-4-25 05:50:53 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
wealth
security
ethical
chats
BTS #28 – 5G Hackathons – Casey Ellis
Casey recently was involved in an event that brought hackers and 5G technology toget...
2024-4-25 05:46:15 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
eclypsium
security
casey
ellis
bts
CCPA Compliance with Accutive Data Discovery and Masking: Understanding and protecting your sensitive data
What is the CCPA, the California Consumer Privacy Act?CCPA, or the California Consumer Privacy Ac...
2024-4-25 05:21:5 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ccpa
adm
california
consumers
identifiers
US charges Samourai cryptomixer founders for laundering $100 million
error code: 1106...
2024-4-25 05:0:16 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
A New Frontier For Crypto Gaming: What To Expect
Too Long; Didn't ReadCrypto games reward players with cryptocurrency for their time and effort. As p...
2024-4-25 04:49:20 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
lim
heading
blockchain
players
gamers
Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks
Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks...
2024-4-25 04:30:37 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
asa
dancer
attackers
network
runner
What Are SEIPs? The New Way Engineering Leaders Measure Successful AI Adoption
Too Long; Didn't ReadSoftware Engineering Intelligence Platforms (SEIPs) track performance not just...
2024-4-25 04:17:4 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
seips
predictive
emps
integrate
contextual
Maximum severity Flowmon bug has a public exploit, patch now
error code: 1106...
2024-4-25 04:15:16 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
XOCIETY Brings AAA Gaming To Web3 With Sui
Too Long; Didn't ReadXOCIETY, one of Web3’s most anticipated games, is partnering with Mysten Labs,...
2024-4-25 03:57:0 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
sui
advancement
xociety
anticipated
innovative
Solana-Based Memecoin Hipposol Is Set On A Moonbound Mission
Too Long; Didn't ReadHipposol is a new memecoin launching on the secure and swift Solana blockchain....
2024-4-25 03:55:48 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
hippo
hippos
solana
presale
GDPR, ecco perché le nuove regole procedurali sono momento cruciale per la data protection
L’adozione di nuove regole procedurali per l’applicazione del Regolamento Generale sulla Protezione...
2024-4-25 03:31:59 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
dei
delle
che
autorità
NIS 2 e i requisiti e controlli della ISO/IEC 27001: analisi puntuale e confronto tra le norme
Entro il mese di ottobre dovrà essere recepita nell’ordinamento nazionale la Direttiva (UE) 2022/255...
2024-4-25 03:31:58 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
delle
controllo
che
della
Strategia regolatoria della Cina sull’AI: equilibrio tra innovazione e controllo
L’aumento sempre più costante dell’intelligenza artificiale (IA) nel mondo ha portato all’esigenza d...
2024-4-25 03:31:57 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
ia
che
cina
dell
Ransomware remoti, cosa sono e le misure preventive per proteggersi
Crescono i ransomware remoti ovvero quelli che nei loro attacchi sfruttano la crittografia remota....
2024-4-25 03:31:56 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
ransomware
dei
dati
Cookie, 9 siti su 10 non sono compliant al GDPR: ecco perché serve tanta consapevolezza
Oltre 100mila siti web (europei) scandagliati e quasi tutti non conformi al GDPR. Alcuni ricercatori...
2024-4-25 03:31:55 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
della
dei
siti
NIS 2, verso una nuova gestione della cyber security: l’approccio multirischio
La Direttiva UE 2022/2555 del Parlamento europeo e del Consiglio, nota come Direttiva NIS 2, rappres...
2024-4-25 03:31:54 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
sicurezza
dei
della
gestione
Previous
1
2
3
4
5
6
7
8
Next