unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Beyond Agile: Why Sentient IAM Is the Strategic Edge for 2025
Agile and Zero Trust have reshaped how businesses think about technology and security, but let’s fa...
2024-11-24 05:57:56 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sentient
alignment
leadership
agile
leaders
Hackers abuse Avast anti-rootkit driver to disable defenses
A new malicious campaign is using a legitimate but old and vulnerable Avast Anti-Rootkit d...
2024-11-24 05:15:20 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
security
trellix
processes
windows
malicious
Microsoft testing Windows 11 support for third-party passkeys
Microsoft is now testing WebAuthn API updates that add support for support for using third-...
2024-11-24 05:15:19 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
windows
passkey
webauthn
passkeys
Windows 11 24H2 update blocked on PCs with Assassin's Creed, Star Wars Outlaws
Microsoft is blocking the Windows 11 24H2 update on computers with some Ubisoft games, like...
2024-11-24 05:15:18 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
windows
24h2
ubisoft
microsoft
creed
Portability of old Windows programs…
Many people believe that native Windows programs are so deeply integrated with OS that there is...
2024-11-24 03:2:44 | 阅读: 3 |
收藏
|
Hexacorn - www.hexacorn.com
windows
calculator
revert
sfp
kinda
Methods to bypass 403 & 401
2024-11-24 02:42:38 | 阅读: 4 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Methods to bypass 403 & 401
2024-11-24 02:42:38 | 阅读: 1 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
Disallowed but Discoverable: The Hacker’s robots.txt Playbook
2024-11-24 02:41:25 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Disallowed but Discoverable: The Hacker’s robots.txt Playbook
2024-11-24 02:41:25 | 阅读: 0 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
Building a Virtual Ethical Hacking Home Lab — Part 4: Attack Machine Setup
2024-11-24 02:41:11 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
A cyberattack on gambling giant IGT disrupted portions of its IT systems
A cyberattack on gambling giant IGT disrupted portions of its IT systems...
2024-11-24 01:7:28 | 阅读: 1 |
收藏
|
Security Affairs - securityaffairs.com
gambling
igt
cyberattack
promptly
Decrypting a PDF With a User Password, (Sat, Nov 23rd)
In diary entry "Analyzing an Encrypted Phishing PDF", I decrypted a phishing PDF document. Because...
2024-11-24 01:6:46 | 阅读: 1 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
phishing
qpdf
pdfid
didier
suitable
Using MLLMs for Diffusion Synthesis That Synergizes Both Sides: How Is This Possible?
Table of LinksAbstract and 1 Introduction2 Background & Problem Statement2.1 How can we use MLLMs...
2024-11-24 01:0:14 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
megvii
mllms
multimodal
internship
Get to Know More About DreamLLM: The Background on This Learning Framework
Authors:(1) Runpei Dong, Xi’an Jiaotong University and Internship at MEGVII;(2) Chunrui Han, MEGV...
2024-11-24 00:30:17 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
megvii
internship
tsinghua
jiaotong
xi
The HackerNoon Newsletter: Educational Byte: Are Privacy Coins Like Monero and Zcash Legal? (11/23/2024)
2024-11-24 00:5:7 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
obsolete
corruption
satellite
contest
hackernoon
What Is DreamLLM? Everything You Need to Know About the Learning Framework
Table of LinksAbstract and 1 Introduction2 Background & Problem Statement2.1 How can we use MLLMs...
2024-11-24 00:0:16 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
multimodal
dreamllm
megvii
interleaved
DEF CON 32 – Troll Trapping Through TAS Tools Exposing Speedrunning Cheaters
Saturday, November 23, 2024...
2024-11-24 00:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
youtube
boulevard
成年黑猩猩会通过游戏促进社会关系
部分黑猩猩和人类一样,会在一生中经常与同伴玩耍,尤其是在需要集体合作之前。对生活在科特迪瓦 Tai 森林里的 3 个黑猩猩群体的观察发现,成年雄性和雌性经常在一起玩耍。这些游戏通常包括身体...
2024-11-23 23:25:40 | 阅读: 8 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
玩耍
黑猩猩
猩猩
集体
雌性
The rise and fall of the ‘Scattered Spider’ hackers
After evading capture for more than two years following a hacking spree that targeted some of the w...
2024-11-23 23:16:25 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - techcrunch.com
spider
scattered
mgm
authorities
美国再次指责中国黑客入侵其电信基础设施
上个月《华尔街日报》报道称中国黑客入侵了美国的电信基础设施,本周《华盛顿邮报》和《纽约时报》公布了更多信息。黑客组织被称为 Salt Typhoon,他们能利用美国执法机构在电信基础设施中...
2024-11-23 23:9:57 | 阅读: 5 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
黑客
加密
salt
美国
typhoon
Previous
-8
-7
-6
-5
-4
-3
-2
-1
Next