unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Best Practices for SmartScreen AppRep
Last year, I wrote about how Windows integrates SmartScreen Application Reputation to help ensur...
2024-11-16 03:46:24 | 阅读: 8 |
收藏
|
text/plain - textslashplain.com
software
reputation
smartscreen
windows
security
Le falle di sicurezza nei toolkit ML più diffusi
2024-11-16 03:45:34 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.securityinfo.it
di
che
falle
modelli
Botnet exploits GeoVision zero-day to install Mirai malware
error code: 1106...
2024-11-16 03:45:20 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Bitfinex hacker Ilya Lichtenstein was sentenced to 5 years in prison
Bitfinex hacker Ilya Lichtenstein was sentenced to 5 years in prison...
2024-11-16 03:34:53 | 阅读: 5 |
收藏
|
Security Affairs - securityaffairs.com
bitfinex
ilya
prison
laundering
Executive Perspectives, Episode 3, Bobby Mehta
In the latest installment of our Executive Perspectives interview series, Axio CEO Scott Kannry...
2024-11-16 03:15:56 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
axio
mehta
episode
sitting
Palo Alto updates advisory about firewall bug after discovering exploitation attempts
Cybersecurity company Palo Alto Networks is warning customers that hackers are attempting to exploi...
2024-11-16 03:0:50 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
alto
palo
warned
friday
FTC reports 50% drop in unwanted call complaints since 2021
error code: 1106...
2024-11-16 03:0:22 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Testing ADA on Synthetic and Real-World Data
Authors:(1) Nora Schneider, Computer Science Department, ETH Zurich, Zurich, Switzerland ([email p...
2024-11-16 03:0:22 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
experiments
zurich
mixup
ada
switzerland
Java Backend Observability with OpenTelemetry Traces and Minimal Code
Hello everyone! I'm Dmitriy Apanasevich, Java Developer at MY.GAMES, working on the game Rush Royale...
2024-11-16 03:0:18 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
traces
collector
otlp
sampling
How Hyperparameter Tuning Enhances Anchor Data Augmentation for Robust Regression
Authors:(1) Nora Schneider, Computer Science Department, ETH Zurich, Zurich, Switzerland ([email p...
2024-11-16 02:45:10 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
zurich
anchor
ada
switzerland
nonlinear
ADA: A Powerful Data Augmentation Technique for Improved Regression Robustness
Authors:(1) Nora Schneider, Computer Science Department, ETH Zurich, Zurich, Switzerland ([email p...
2024-11-16 02:15:10 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
arxiv
preprint
mixup
machine
Daniel Stori’s Turnoff.US: ‘I Love Windows Powershell’
via the i...
2024-11-16 02:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
bloggers
permalink
stori
Metrics That Matter: How Security Professionals Can Show Value
ArticleBuild a metrics pr...
2024-11-16 01:58:6 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
ontic
randolph
magazine
chuck
Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations
Cyber Espionage / MalwareCybersecurity researchers have shed light on a new remote access trojan a...
2024-11-16 01:57:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
wezrat
chrome
remote
israeli
Clever PayPal-based Attack
Do not call that number! This...
2024-11-16 01:47:15 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
bogus
cryptosmith
brilliant
security
bloggers
Retrofitting Spatial Safety to hundreds of millions of lines of C++
Security Blog The latest news and insights from Google on security a...
2024-11-16 01:42:0 | 阅读: 5 |
收藏
|
Google Online Security Blog - security.googleblog.com
security
Defensive Technology: Controlled Folder Access
Most client software’s threat models (e.g. Edge, Chrome) explicitly exclude threats where the lo...
2024-11-16 01:39:17 | 阅读: 7 |
收藏
|
text/plain - textslashplain.com
cfa
windows
ransomware
defender
security
Comprehensive Risk Analysis: Inversion6 Transforms Client Assessments
The ChallengeAddressing Sc...
2024-11-16 01:34:34 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
inversion6
appomni
assessments
What To Use Instead of PGP
It’s been more than five years since The PGP Problem was published, and I still hear from peop...
2024-11-16 01:17:24 | 阅读: 6 |
收藏
|
Dhole Moments - soatok.blog
pgp
sigstore
encryption
software
latacora
Ten Lessons Learned from The Mother of All Breaches Data Leak
What a year after the Mother of All Breaches data leak has taught us on cybersecurity, data prot...
2024-11-16 01:9:21 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
lesson
passwords
mother
Previous
68
69
70
71
72
73
74
75
Next