unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Decoding Split Window Sensitivity in Signature Isolation Forests
Authors:(1) Guillaume Staerman, INRIA, CEA, Univ. Paris-Saclay, France;(2) Marta Campi, CERIAH, I...
2024-11-21 04:0:11 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
sif
windows
curves
anomalies
analysis
DEF CON 32 – A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth
Wednesday, November 20, 2024...
2024-11-21 04:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
youtube
AIntivirus Announces Initiative Inspired By The Legacy Of John McAfee
**BARCELONA, Spain, November 20th, 2024/Chainwire/--**AIntivirus, a global initiative aimed at comba...
2024-11-21 03:57:11 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
aintivirus
mcafee
corruption
systemic
AI Platform bitGPT Experiences Significant Growth Following Binance Demonstration
**TALLINN, Estonia, November 20th, 2024/Chainwire/--**Following its global unveiling on the main sta...
2024-11-21 03:48:53 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
bitgpt
web3
agents
blockchain
economy
Fueling KYVE’s Expansion Era: A New Age Of Interoperable Data Opportunities For All
FRANKFURT, Germany, November 20th, 2024/Chainwire/--KYVE is entering its expansion era, introducing...
2024-11-21 03:40:16 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
kyve
blockchain
network
historical
ventures
PlayBlock Rockets To 8 Globally In Blockchain Transactions And Turnover Following DappRadar Listing
RAMAT GAN, Israel, November 20th, 2024/Chainwire/--Playnance proudly announces the official listing...
2024-11-21 03:30:54 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
playblock
playnance
upvsdown
blockchain
web3
US charges five linked to Scattered Spider cybercrime gang
The U.S. Justice Department has charged five suspects believed to be part of the financially...
2024-11-21 03:30:21 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
scattered
spider
phishing
wire
conspiracy
How to Move from Manual to Certificate Automation with ACME
For IT teams, managing certificates can feel like a relentless cycle of tracking expiration date...
2024-11-21 03:29:11 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
acme
clm
security
client
processes
How to Motivate Employees and Stakeholders to Encourage a Culture of Cybersecurity
Cybersecurity impacts us all. Third parties process and handle data every day, whether they’re...
2024-11-21 03:29:4 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
hyperproof
threats
Microsoft Adds Raft of Zero-Trust Tools and Platforms
Microsoft this week launched...
2024-11-21 03:17:27 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
windows
security
nadella
Ubuntu Linux impacted by decade-old 'needrestart' flaw that gives root
Five local privilege escalation (LPE) vulnerabilities have been discovered in the needrestar...
2024-11-21 03:15:18 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
needrestart
attacker
interpreter
malicious
First Digital’s FDUSD Stablecoin Is Officially Live On Sui
Grand Cayman, Cayman Islands, November 20th, 2024/Chainwire/--FDUSD becomes the second native stable...
2024-11-21 03:7:33 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
sui
fdusd
defi
stablecoin
leveraging
Spelunking in Comments and Documentation for Security Footguns
When we perform security assessments at Include Security, we like to have a holistic view of th...
2024-11-21 03:0:43 | 阅读: 2 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
security
library
hop
redirecturl
footguns
Why Everyone is Wrong About the Future of Work™
Why are we constantly worrying about the future of work™?If you’re working, you know how it’s done:...
2024-11-21 03:0:23 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
narrative
remote
framing
stories
contests
Redefining Anomaly Detection with Signature Isolation Forests
Authors:(1) Guillaume Staerman, INRIA, CEA, Univ. Paris-Saclay, France;(2) Marta Campi, CERIAH, I...
2024-11-21 03:0:18 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
sif
fif
forest
experiments
numerical
iOS vs. Android Monetization: Why Not Understanding the Differences Could Harm Your Business
Navigating the mobile app landscape is no easy feat. Even if, by the end of 2024, mobile apps are ex...
2024-11-21 03:0:15 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
engagement
spending
purchases
Better - An AI Powered Code Reviewer
Code reviews have always been crucial in maintaining high standards and reinforcing best practices i...
2024-11-21 03:0:11 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
github
suggestions
rawcomments
modelname
anthropic
Securing the Software Supply Chain: Checkmarx One Expands its Offerings
The software supply chain is under siege. Threat actors increasingly exploit weaknesses in code...
2024-11-21 02:56:52 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
software
repository
sboms
checkmarx
Forums Refresh
Over the past year we have been hard at work on refreshing the Kali Forums, and today we are proud t...
2024-11-21 02:45:13 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.kali.org
forums
discourse
posting
moderators
xenforo
Shift Left and Shift Up Workload Attack Surface Protection
Executive Summary:In today’s security landscape, the concept of a hardened perimeter is increasing...
2024-11-21 02:32:5 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
workload
security
mtls
workloads
network
Previous
23
24
25
26
27
28
29
30
Next