unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
关于安卓注入几种方式的讨论,开源注入模块实现
一概念在android系统中,进程之间是相互隔离的,两个进程之间是没办法直接跨进程访问其他进程的空间信息的。那么在android平台中要对某个app进程进行内存操作,并获取目标进程的地址空间内信息或者...
2024-10-26 01:59:0 | 阅读: 18 |
收藏
|
看雪学苑 - mp.weixin.qq.com
注入
dlopen
nullptr
zygisk
jni
Fortinet安全产品出现高危零日漏洞,恶意组织积极利用
网络安全公司Fortinet日前披露了自家软件产品FortiManager存在的一个关键零日漏洞,能够允许未经身份验证的远程攻击者通过特制请求执行任意代码或命令。目前该漏洞已在野外被积极利用。 该漏洞...
2024-10-26 01:59:0 | 阅读: 10 |
收藏
|
看雪学苑 - mp.weixin.qq.com
漏洞
cloud
补丁
数据
更新2节:静态查看Native代码逻辑 | 看雪安卓高级研修班(月薪一万计划)
2024-10-10 更新 课时4:静态查看Native代码逻辑2024-10-09 更新 课时3:静态查看Java代码逻辑*购买即赠送【pixel 1代】测试手机一部随着移动设备的流行和普及,手机、...
2024-10-26 01:59:0 | 阅读: 6 |
收藏
|
看雪学苑 - mp.weixin.qq.com
逆向
编程
安全
漏洞
研修班
思科紧急修复已遭利用的 ASA 和 FTD 软件漏洞
聚焦源代码安全,网罗国内外最新资讯!编译:代码卫士本周三,思科表示修复ASA中一个拒绝服务(DoS)漏洞CVE-2024-20481(CVSS评分5.8)。该漏洞影响思科 ASA 和 FTD 软件的...
2024-10-26 01:40:0 | 阅读: 8 |
收藏
|
代码卫士 - mp.weixin.qq.com
攻击
思科
漏洞
攻击者
asa
苹果创建 Private Cloud Compute VM 助力漏洞挖掘
聚焦源代码安全,网罗国内外最新资讯!编译:代码卫士苹果创建了一个虚拟研究环境,供研究员测试其Private Cloud Compute(PCC,私有云计算)系统的安全,并发布一些“关键组件”的源代码...
2024-10-26 01:40:0 | 阅读: 12 |
收藏
|
代码卫士 - mp.weixin.qq.com
苹果
pcc
安全
漏洞
数据
US offers $10 million bounty for members of Iranian hacking gang
A US $10 million reward is being offered to anyone who has information about four members of an Ir...
2024-10-26 01:33:14 | 阅读: 3 |
收藏
|
Graham Cluley - www.bitdefender.com
water
rewards
justice
reward
shahid
The Windows Registry Adventure #4: Hives and the registry layout
Posted by Mateusz Jurczyk, Google Project Zero To a normal user or even a Win32 application de...
2024-10-26 01:30:0 | 阅读: 9 |
收藏
|
Project Zero - googleprojectzero.blogspot.com
hives
windows
machine
security
loaded
Yaklang里传来,Java-hack升级啦~
Yaklang里传来,Java-hack升级啦~隔壁抽鞭子的黑工厂里,牛牛更新了吗~?TemplatesImpl 类:TemplatesImpl对象的成员方法有一段类字节码,在反序列化时会加载并实例化...
2024-10-26 01:30:0 | 阅读: 12 |
收藏
|
Yak Project - mp.weixin.qq.com
payload
yaklang
transformer
node1
SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection
The number of cybersecurity incidents has doubled since the pandemic and its costing organizatio...
2024-10-26 01:18:57 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
cse
desikan
network
Four REvil members sentenced to more than four years in prison
Four members of the ransomware gang REvil were sentenced to multiple years in prison in Russia for...
2024-10-26 01:15:49 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
puzyrevsky
prison
authorities
sentenced
outlet
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
Oct 25, 2024Ever heard someone say, "the attacker only has to be right once,but the defender has to...
2024-10-26 01:5:0 | 阅读: 1 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
okta
security
defender
logan
Cyber Scams & Why We Fall for Them
Gary Perkins, Chief Information Security OfficerOctober 25, 2024Social engineers rely on...
2024-10-26 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackers
ciso
phishing
Why Running Two SaaS Products is My Ultimate Safety Net and Growth Strategy
I currently run two profitable SaaS products, ResumeMaker.Online and aiCarousels.com. They serve dif...
2024-10-26 00:55:18 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
resumemaker
screwed
codebase
smarter
cons
CISOs as Organizational Bridge Builders for Cybersecurity Culture
As of 2023, 100% of Fortune 500 companies had a CISO role or its equivalent. This figure was only 70...
2024-10-26 00:47:52 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
cisos
security
ciso
strategic
The First Wi-Fi Training and Certification Mini-Event
Next month, Peter Mackenzie and I are co-hosting the first Wireless Tech Summit, a Wi-Fi...
2024-10-26 00:45:54 | 阅读: 6 |
收藏
|
Security Uncorked - securityuncorked.com
security
peter
network
certified
cwnp
I professionisti della sicurezza informatica rischiano il burnout
2024-10-26 00:45:35 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.securityinfo.it
di
lavoro
più
sicurezza
Amazon seizes domains used in rogue Remote Desktop campaign to steal data
error code: 1106...
2024-10-26 00:45:21 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Validator or Node Operator? Understanding Key Advantages and Differences with Ethereum’s DVT
Ethereum Staking is a fundamental activity for consolidating the crypto economic security of the net...
2024-10-26 00:42:25 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
validator
validators
dvt
network
staking
DePINscan: The Ultimate Tool for Exploring Decentralized Networks
The world of decentralized technologies is quickly evolving. One of the most promising developments...
2024-10-26 00:32:58 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
depinscan
depin
depins
investors
Kremlin-linked hackers target Ukraine’s state, military agencies in new espionage campaign
A hacker group associated with a Russian intelligence agency has been targeting Ukrainian state and...
2024-10-26 00:30:48 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
apt29
ukraine
attributed
microsoft
espionage
Previous
274
275
276
277
278
279
280
281
Next