unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Awesome Cloudflare(Cloudflare开源工具)
Awesome Cloudflare是什么Awesome Cloudflare是一个精选的 Cloudflare 工具、开源项目、指南、博客和其他资源列...
2024-5-3 13:47:7 | 阅读: 12 |
收藏
|
黑海洋 - WIKI - www.upx8.com
kv
数据
开源
数据库
cloudflared
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Vulnerability / Software SecurityHPE Aruba Networking (formerly Aruba Networks) has released secur...
2024-5-3 12:50:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
arubaos
papi
overflow
security
software
12.5 GPT 与进阶技巧:AI 内容检测
作为 2024 年五一「生产力超频」系列目优惠活动的一部分,本期设置为限时免费,欢迎观看。我们将在 5 月 1 日至 7 日,为热门付费栏目「生产力超频」全系列设置七折优惠;同时,我们将每天从不...
2024-5-3 11:58:35 | 阅读: 8 |
收藏
|
少数派 - sspai.com
gpt
准确率
辨别
CISA urges software devs to weed out path traversal vulnerabilities
error code: 1106...
2024-5-3 03:45:17 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Dropbox Sign customer data accessed in breach
Dropbox is reporting a recent “security incident” in which an attacker gained unauthorized acce...
2024-5-3 04:44:53 | 阅读: 6 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
dropbox
attacker
security
passwords
微软确认无法解决Windows 10恢复环境导致的0x80070643错误代码
2024-5-3 13:9:20 | 阅读: 6 |
收藏
|
蓝点网 - www.landiannews.com
windows
winre
备份
蓝点
微信小程序:24 小时内通知开发者删除你的“个人信息”:位置、手机号、昵称、头像
2024-5-3 18:52:43 | 阅读: 6 |
收藏
|
小众软件 - www.appinn.com
信息
昵称
chatgpt
wechat
CVE-2024-2887: A Pwn2Own Winning Bug in Google Chrome
In this guest blog from Master of Pwn winner Manfred P...
2024-5-3 00:14:11 | 阅读: 5 |
收藏
|
Zero Day Initiative - Blog - www.thezdi.com
recursive
webassembly
confusion
declared
Investigation uncovers substantial spyware exports to Indonesia
Powerful and invasive foreign commercial spyware and surveillance products are being procured by or...
2024-5-3 00:1:20 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
spyware
amnesty
indonesia
indonesian
invasive
As Pro-Russia Hactivists Target OT Systems, Here’s What You Need To Know
2024-5-3 01:48:0 | 阅读: 5 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
cloud
nessus
edwards
Alleged China-based hackers using ‘Cuttlefish’ malware platform to target Turkey
Hackers with alleged connections to China are using a malware platform called “Cuttlefish” to targe...
2024-5-3 03:46:24 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
cuttlefish
network
lotus
cloud
turkey
Pro-Russia hackers target critical infrastructure in North America and Europe
Pro-Russia hackers target critical infrastructure in North America and EuropeGovernment agenci...
2024-5-3 03:52:6 | 阅读: 5 |
收藏
|
Security Affairs - securityaffairs.com
russia
north
hacktivists
passwords
security
Scans Probing for LB-Link and Vinga WR-AC1200 routers CVE-2023-24796, (Thu, May 2nd)
Before diving into the vulnerability, a bit about the affected devices. LB-Link, the make of the de...
2024-5-3 02:7:5 | 阅读: 5 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
firmware
goform
limitclient
systools
buying
Bitwarden launches new MFA Authenticator app for iOS, Android
error code: 1106...
2024-5-3 04:30:19 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Acid Rain, Pikabot, VenomRAT, Mallox Ransomware, and More: Hacker’s Playbook Threat Coverage Round-up: March-April 2024
Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach In this version of the Hacker’s...
2024-5-3 02:28:19 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
safebreach
latrodectus
pikabot
mallox
GUEST ESSAY: A primer on how, why ‘dynamic baselining’ fosters accurate DDoS protection
By Ahmed AbdelhalimBusinesses today need protection from increasingly frequent and s...
2024-5-3 15:30:13 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
baselining
accurate
security
network
burden
Java 应用安全之 JEB Floating License 绕过
最近一朋友单位采购了 JEB Pro 用于 Android 逆向,但使用的是 Floating License,因此只能在公司内网中使用。这样一来朋友在节假日就没法卷了,于是找到了我看有没有兴趣研究一...
2024-5-3 17:7:40 | 阅读: 5 |
收藏
|
Sec-News 安全文摘 - govuln.com
jeb
ju
aw
pnfsoftware
nz
适合初学者!一起探索Linux Pwn世界
想要在CTF比赛中游刃有余地完成PWN赛题,带领团队独当一面吗?想在二进制安全领域打牢地基,为今后的安全生涯建立强有力的后盾支撑吗?热爱二进制安全的学生及安全从业者们有福啦!平台最新打造课程《CTF...
2024-5-3 17:2:42 | 阅读: 5 |
收藏
|
看雪学苑 - mp.weixin.qq.com
安全
二进制
后盾
Elliptic Shows How an AI Model Can Identify Bitcoin Laundering
Cryptocurrency for several years has been pointed to as a key enabler of ransomware groups, allowin...
2024-5-3 04:26:31 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
laundering
illicit
blockchain
identify
subgraphs
CEO who sold fake Cisco devices to US military gets 6 years in prison
error code: 1106...
2024-5-3 06:15:16 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Previous
-2
-1
0
1
2
3
4
5
Next