unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
GDPR, ecco perché le nuove regole procedurali sono momento cruciale per la data protection
L’adozione di nuove regole procedurali per l’applicazione del Regolamento Generale sulla Protezione...
2024-4-25 03:31:59 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
dei
delle
che
autorità
NIS 2 e i requisiti e controlli della ISO/IEC 27001: analisi puntuale e confronto tra le norme
Entro il mese di ottobre dovrà essere recepita nell’ordinamento nazionale la Direttiva (UE) 2022/255...
2024-4-25 03:31:58 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
delle
controllo
che
della
Strategia regolatoria della Cina sull’AI: equilibrio tra innovazione e controllo
L’aumento sempre più costante dell’intelligenza artificiale (IA) nel mondo ha portato all’esigenza d...
2024-4-25 03:31:57 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
ia
che
cina
dell
Ransomware remoti, cosa sono e le misure preventive per proteggersi
Crescono i ransomware remoti ovvero quelli che nei loro attacchi sfruttano la crittografia remota....
2024-4-25 03:31:56 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
ransomware
dei
dati
Cookie, 9 siti su 10 non sono compliant al GDPR: ecco perché serve tanta consapevolezza
Oltre 100mila siti web (europei) scandagliati e quasi tutti non conformi al GDPR. Alcuni ricercatori...
2024-4-25 03:31:55 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
della
dei
siti
NIS 2, verso una nuova gestione della cyber security: l’approccio multirischio
La Direttiva UE 2022/2555 del Parlamento europeo e del Consiglio, nota come Direttiva NIS 2, rappres...
2024-4-25 03:31:54 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
sicurezza
dei
della
gestione
Come diventare Security administrator: guida a una professione ambita
Il Security administrator deve avere le spalle larghe e una resistenza allo stress superiore. È la f...
2024-4-25 03:31:53 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
security
che
della
dei
Habemus I2S in STM32F7
a blog about computers and other funny things ...
2024-4-25 03:21:10 | 阅读: 1 |
收藏
|
Alan C. Assis - acassis.wordpress.com
funny
USENIX Security ’23 – Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB)
Authors/Presenters: *Federico Cernera, Massimo La Morgia, Alessandro Mei, and Francesco...
2024-4-25 03:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
security
usenix
hlegyqwmung
morgia
USENIX Security ’23 – Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB)
Authors/Presenters: *Federico Cernera, Massimo La Morgia, Alessandro Mei, and Francesco...
2024-4-25 03:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
cernera
francesco
Defense in depth -- the Microsoft way (part 87): shipping more rotten software to billions of unsuspecting customers
Full Disclosuremailing list archivesFrom: "Stefan Kanthak" <stefan.kanthak () ne...
2024-4-25 02:44:13 | 阅读: 0 |
收藏
|
Full Disclosure - seclists.org
microsoft
zlib
windows
stefan
Response to CVE-2023-26756 - Revive Adserver
Full Disclosuremailing list archivesFrom: Matteo Beccati <php () beccati com>D...
2024-4-25 02:43:55 | 阅读: 5 |
收藏
|
Full Disclosure - seclists.org
beccati
adserver
revive
matteo
26756
CoralRaider Group Delivers Three Infostealers via CDN Cache
A threat group that’s been around since last year and was first identified earlier this month is us...
2024-4-25 02:35:57 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cryptbot
malicious
lummac2
coralraider
Introducing the nanoMIPS Architecture Plugin for Binary Ninja
One of the more frustrating situations as a reverse engineer is when the architecture of your ta...
2024-4-25 01:33:37 | 阅读: 6 |
收藏
|
Binary Ninja - binary.ninja
nanomips
firmware
md1rom
analysis
acdeqswxz
France seeks new EU sanctions to target Russian disinformation
France is asking Brussels to impose new sanctions to fight Russian disinformation ahead of the upco...
2024-4-25 01:31:30 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
russia
french
european
france
ArcaneDoor hackers exploit Cisco zero-days to breach govt networks
error code: 1106...
2024-4-25 01:15:15 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Daniel Stori’s ‘New Job’
via the inimitable Daniel Stori at Turnoff.US!Permalink*** This is a Security B...
2024-4-25 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
syndicated
authored
inimitable
The Family of Safe Golang Libraries is Growing!
2024-4-25 00:56:35 | 阅读: 1 |
收藏
|
Sec-News 安全文摘 - govuln.com
Anti-Trump PAC Lincoln Project scammed for $35,000 after vendor email hack
The anti-Donald Trump super PAC Lincoln Project lost $35,000 to a business email compromise (BEC)...
2024-4-25 00:16:23 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
lincoln
bec
minchak
trump
election
DirectDefense Report Sees Shifts in Cyberattack Patterns
DirectDefense, Inc. today published an analysis of more than two million hours of alert investigati...
2024-4-25 00:3:7 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
broome
security
threats
Previous
1
2
3
4
5
6
7
8
Next