unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks
Data Breach / Law EnforcementThe U.S. Department of Justice (DoJ) on Thursday announced the senten...
2026-5-1 09:56:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
ransomware
blackcat
martino
defendants
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
Supply Chain Attack / MalwareA new software supply chain attack campaign has been observed using s...
2026-5-1 09:43:0 | 阅读: 25 |
收藏
|
The Hacker News - thehackernews.com
github
knot
ssh
sleeper
关于举办“CCF-INFORSEC网络空间安全前沿创新论坛”的通知
环境异常 当前环境异常,完成验证后即可继续访问。 去验证...
2026-5-1 09:30:0 | 阅读: 7 |
收藏
|
网安国际 - mp.weixin.qq.com
Overview of Content Published in April
Overview of Content Published in April Filed under: Announcement — Didier Stevens @ 9:28...
2026-5-1 09:28:46 | 阅读: 22 |
收藏
|
Didier Stevens - blog.didierstevens.com
didier
stevens
isc
diary
Billions of meals at risk due to Iran war, says fertiliser boss
2026-5-1 09:27:45 | 阅读: 34 |
收藏
|
Technical Information Security Content & Discussion - www.reddit.com
Anthropic launches Claude Security to counter rapid AI-Powered exploits
Anthropic launches Claude Security to counter rapid AI-Powered exploits...
2026-5-1 09:15:2 | 阅读: 31 |
收藏
|
Security Affairs - securityaffairs.com
claude
security
anthropic
mythos
Geofence Warrants and Artificial Intelligence – What Happens When Robots Enforce the 4th Amendment?
The Fourth Amendment was written for a world of desks, drawers, and locked trunks. The modern invest...
2026-5-1 09:12:54 | 阅读: 21 |
收藏
|
Security Boulevard - securityboulevard.com
warrant
warrants
geofence
fourth
court
How to Safely Integrate AI Into Structured Backend Systems
New StorybySwapneswar Sundar RaybySwapneswar Sundar Ray@swapneswarsundarrayBuilding AI-driven enter...
2026-5-1 09:3:47 | 阅读: 19 |
收藏
|
Hacker Noon - hackernoon.com
sundar
ray
workflows
The Overlap of Cybersecurity and Financial Risk: Protecting Sensitive Data in Commodity Markets
Every organization that operates in a digital space needs to prioritize cybersecurity, but some...
2026-5-1 09:0:17 | 阅读: 17 |
收藏
|
Security Boulevard - securityboulevard.com
security
markets
minimize
espionage
本周看什么 | 最近值得一看的 10 部作品
☕️ TL;DR近期佳作推荐:[电影] 燃比娃、[电影] 世界的主人、[韩剧] 努力克服自卑的我们、[韩剧] 稻草人、[日剧] 月夜行路:答案在名作中、[英剧] 半个男人、[美剧] 逆转狂篮 第二季、...
2026-5-1 09:0:0 | 阅读: 23 |
收藏
|
少数派 - sspai.com
主演
上映
执导
内地
片长
SonicWall patches three SonicOS flaws in Gen 6, 7 and 8 firewalls. Patch them now
SonicWall patches three SonicOS flaws in Gen 6, 7 and 8 firewalls. Patch them now...
2026-5-1 08:42:36 | 阅读: 28 |
收藏
|
Security Affairs - securityaffairs.com
sonicos
firewalls
tracked
firmware
Handled, Not Hosted: Administrative Activity Inside a Bulletproof Hoster
2026-5-1 08:32:46 | 阅读: 20 |
收藏
|
Technical Information Security Content & Discussion - www.reddit.com
How to Build a Browser-Based Voice Assistant With the AssemblyAI Voice Agent API
New StorybyAssemblyAIbyAssemblyAI@assemblyaiAssemblyAI builds advanced speech language models that...
2026-5-1 08:29:42 | 阅读: 17 |
收藏
|
Hacker Noon - hackernoon.com
speech
7 Things You Can Build With a Single WebSocket (Using AssemblyAI’s Voice Agent API)
New StorybyAssemblyAIbyAssemblyAI@assemblyaiAssemblyAI builds advanced speech language models that...
2026-5-1 08:23:23 | 阅读: 21 |
收藏
|
Hacker Noon - hackernoon.com
speech
How to Evaluate STT for Voice Agents in Production
New StorybySpeechmaticsbySpeechmatics@speechmaticsSpeechmatics builds world-leading speech technolo...
2026-5-1 08:4:2 | 阅读: 21 |
收藏
|
Hacker Noon - hackernoon.com
speech
machine
featured
Uphold refutes Misstatements in New York Attorney General’s Press Release Regarding Cred, LLC Fraud
New StorybyBlockchain WirebyBlockchain Wire@blockchainwireThe #1 Press Release Wire Service for Blo...
2026-5-1 08:0:6 | 阅读: 20 |
收藏
|
Hacker Noon - hackernoon.com
lending
wire
relations
blockchain
活动预告|CodeWisdom软件智能化开发系列学术报告第19期:AI Agent安全:内外兼修
环境异常 当前环境异常,完成验证后即可继续访问。 去验证...
2026-5-1 07:33:0 | 阅读: 9 |
收藏
|
CodeWisdom - mp.weixin.qq.com
China Has its Sights Set on Scammers, Just Not Those Targeting Americans
China may be trying to stem the tide of scams coming out of Southeast Asia, but it seems the cou...
2026-5-1 07:19:59 | 阅读: 21 |
收藏
|
Security Boulevard - securityboulevard.com
criminal
ford
investment
economic
security
15-year-old: How to learn real cybersecurity and hacking skills, and what path to follow?
2026-5-1 07:12:44 | 阅读: 27 |
收藏
|
Your Open Hacker Community - www.reddit.com
Networks of Browser Extensions Are Spyware in Disguise
Browser extensions are collecting and reselling user data—perfectly legally—and opening up a sle...
2026-5-1 07:9:59 | 阅读: 23 |
收藏
|
Security Boulevard - securityboulevard.com
odom
layerx
collecting
security
behaviors
Previous
89
90
91
92
93
94
95
96
Next