unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Beyond Agile: Why Sentient IAM Is the Strategic Edge for 2025
Agile and Zero Trust have reshaped how businesses think about technology and security, but let’s fa...
2024-11-24 05:57:56 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
sentient
alignment
leadership
agile
leaders
Hackers abuse Avast anti-rootkit driver to disable defenses
A new malicious campaign is using a legitimate but old and vulnerable Avast Anti-Rootkit d...
2024-11-24 05:15:20 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
security
trellix
processes
windows
malicious
Microsoft testing Windows 11 support for third-party passkeys
Microsoft is now testing WebAuthn API updates that add support for support for using third-...
2024-11-24 05:15:19 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
windows
passkey
webauthn
passkeys
Windows 11 24H2 update blocked on PCs with Assassin's Creed, Star Wars Outlaws
Microsoft is blocking the Windows 11 24H2 update on computers with some Ubisoft games, like...
2024-11-24 05:15:18 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
windows
24h2
ubisoft
microsoft
creed
Portability of old Windows programs…
Many people believe that native Windows programs are so deeply integrated with OS that there is...
2024-11-24 03:2:44 | 阅读: 3 |
收藏
|
Hexacorn - www.hexacorn.com
windows
calculator
revert
sfp
kinda
2001: A Bitcoin Odyssey
Editor’s note: this is a work of fiction.A StoryPrologue: The Bitcoin RenaissanceIn the later hal...
2024-11-24 03:0:14 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
robots
hole
kirk
spock
wallets
Mispricing Opportunity: Lending to Immigrant Founders
Mispricing Opportunities: Underserved Small Business SegmentsImmigrant communities are the heartbea...
2024-11-24 03:0:10 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
funding
immigrant
financing
investors
loans
Methods to bypass 403 & 401
2024-11-24 02:42:38 | 阅读: 4 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Methods to bypass 403 & 401
2024-11-24 02:42:38 | 阅读: 1 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
Disallowed but Discoverable: The Hacker’s robots.txt Playbook
2024-11-24 02:41:25 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Disallowed but Discoverable: The Hacker’s robots.txt Playbook
2024-11-24 02:41:25 | 阅读: 0 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
Building a Virtual Ethical Hacking Home Lab — Part 4: Attack Machine Setup
2024-11-24 02:41:11 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
A cyberattack on gambling giant IGT disrupted portions of its IT systems
A cyberattack on gambling giant IGT disrupted portions of its IT systems...
2024-11-24 01:7:28 | 阅读: 1 |
收藏
|
Security Affairs - securityaffairs.com
gambling
igt
cyberattack
promptly
Decrypting a PDF With a User Password, (Sat, Nov 23rd)
In diary entry "Analyzing an Encrypted Phishing PDF", I decrypted a phishing PDF document. Because...
2024-11-24 01:6:46 | 阅读: 1 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
phishing
qpdf
pdfid
didier
suitable
Using MLLMs for Diffusion Synthesis That Synergizes Both Sides: How Is This Possible?
Table of LinksAbstract and 1 Introduction2 Background & Problem Statement2.1 How can we use MLLMs...
2024-11-24 01:0:14 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
megvii
mllms
multimodal
internship
Get to Know More About DreamLLM: The Background on This Learning Framework
Authors:(1) Runpei Dong, Xi’an Jiaotong University and Internship at MEGVII;(2) Chunrui Han, MEGV...
2024-11-24 00:30:17 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
megvii
internship
tsinghua
jiaotong
xi
The HackerNoon Newsletter: Educational Byte: Are Privacy Coins Like Monero and Zcash Legal? (11/23/2024)
2024-11-24 00:5:7 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
obsolete
corruption
satellite
contest
hackernoon
What Is DreamLLM? Everything You Need to Know About the Learning Framework
Table of LinksAbstract and 1 Introduction2 Background & Problem Statement2.1 How can we use MLLMs...
2024-11-24 00:0:16 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
multimodal
dreamllm
megvii
interleaved
DEF CON 32 – Troll Trapping Through TAS Tools Exposing Speedrunning Cheaters
Saturday, November 23, 2024...
2024-11-24 00:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
youtube
boulevard
成年黑猩猩会通过游戏促进社会关系
部分黑猩猩和人类一样,会在一生中经常与同伴玩耍,尤其是在需要集体合作之前。对生活在科特迪瓦 Tai 森林里的 3 个黑猩猩群体的观察发现,成年雄性和雌性经常在一起玩耍。这些游戏通常包括身体...
2024-11-23 23:25:40 | 阅读: 9 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
玩耍
黑猩猩
猩猩
集体
雌性
Previous
-9
-8
-7
-6
-5
-4
-3
-2
Next