unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
A license (metadata) to kill (for)…
Many forensic artifacts can be looked at from many different angles. A few years ago I proposed...
2024-4-27 07:40:21 | 阅读: 1 |
收藏
|
Hexacorn - www.hexacorn.com
analysis
artifacts
software
gpl
licensing
"How Many Colors Can the Human Eye See?": The Application
Too Long; Didn't ReadFor instance, from this graph, we can conclude that given the same time to comp...
2024-4-27 05:46:1 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
conclude
younger
participate
dehancer
Know-your-customer executive order facing stiff opposition from cloud industry
A controversial executive order that would require U.S. cloud companies to more closely monitor the...
2024-4-27 05:31:25 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
cloud
security
microsoft
proposed
netchoice
FBI: Fraudsters using fake online dating verification apps to scam lovers
Cybercriminals are taking advantage of people’s fears about online dating by getting them to downlo...
2024-4-27 05:31:24 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
dating
victim
butchering
jonathan
Working Together From Afar: Easy Strategies for Remote Team Collaboration
Too Long; Didn't ReadRemote paintings is turning into greater common in recent times, and it is esse...
2024-4-27 05:14:43 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
ahmed
ashif
graduate
passion
cricket
Navigating Complex Search Tasks with AI Copilots: The Undiscovered Country and References
Too Long; Didn't ReadExploring AI copilots: Supporting complex search tasks with advancements in gen...
2024-4-27 05:0:2 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
papers
academic
resembles
llms
Self-Hacking: How I learned to love the Cold again
Alright, here’s how I got back into (loving) the cold, and why I did it.Normally, I don’t spill much...
2024-4-27 04:31:57 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
cold
water
daniele
warm
pain
Hackers accessed more than 19,000 accounts on California state welfare platform
More than 19,000 online accounts on a California state platform for welfare programs may have been...
2024-4-27 04:31:28 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
benefitscal
california
passwords
welfare
assistance
Sandbox Evasion Techniques – Part 1
This post is the first part in a series on sandbox evasion techniques used by malware today. Aft...
2024-4-27 04:25:3 | 阅读: 3 |
收藏
|
VMRay - www.vmray.com
analysis
malicious
sandboxes
vmray
gaps
Congress picked a direct fight with ByteDance and TikTok. The privacy implications are less clear.
The recent congressional battle over the future of TikTok was largely about data — specifically, bl...
2024-4-27 04:16:26 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
americans
legislation
congress
Navigating Complex Search Tasks with AI Copilots: Opportunities
Too Long; Didn't ReadExploring AI copilots: Supporting complex search tasks with advancements in gen...
2024-4-27 03:0:4 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
papers
academic
llms
resembles
copilots
USENIX Security ’23 – UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware
Authors/Presenters: Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yu...
2024-4-27 03:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
tian
lyu
TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland - SWN #381
Apr 26, 2024TikTok, Flowmon, Arcane Door, Brokewell, RuggedCom, Deepfakes,Non-Competes, Aaran Leyla...
2024-4-27 02:56:0 | 阅读: 5 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
swn
security
arcane
ruggedcom
Cisco Confirms Two Exploits Found in Shadow Brokers' Data Dump
Cisco has confirmed the legitimacy of two exploits found in a data dump of code relea...
2024-4-27 02:20:43 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.tripwire.com
epicbanana
asa
software
security
Understanding Cybersecurity Vulnerabilities
What is a cybersecurity vulnerability, how do they happen, and what can organizations do to avoid f...
2024-4-27 01:13:24 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
threats
April 2024 Web Server Survey
In the April 2024 survey we received responses from 1,092,963,063 sites across 267,934...
2024-4-27 01:2:11 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.netcraft.com
percent
developer
freenginx
openresty
upstream
Navigating Complex Search Tasks with AI Copilots: Challenges
Too Long; Didn't ReadExploring AI copilots: Supporting complex search tasks with advancements in gen...
2024-4-27 01:0:3 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
papers
academic
llms
resembles
Telegram is down with "Connecting" error
error code: 1106...
2024-4-27 00:45:17 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Kaiser’s website tracking tools may have compromised data on 13 million customers
The healthcare giant Kaiser Permanente is notifying more than 13 million customers that their perso...
2024-4-27 00:31:20 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
kaiser
permanente
notifying
techcrunch
bing
How Do You Acquire Customers as a Startup? Well, I Got My First 100 Via Reddit
How Do You Acquire Customers as a Startup? Well, I Got My First 100 Via Reddit by@austinngoToo Long;...
2024-4-27 00:27:11 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
saner
1st
reddit
founder
hate
Previous
1
2
3
4
5
6
7
8
Next