unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Disabling the floating thumbnail preview for screenshots on macOS Tahoe
Home > Documentation, macOS > Disabling the floating thumbnail preview for screenshots on macOS...
2025-11-27 20:4:32 | 阅读: 5 |
收藏
|
Der Flounder - derflounder.wordpress.com
thumbnail
floating
tahoe
Asahi says crooks stole data of approximately 2M customers and employees
Asahi says crooks stole data of approximately 2M customers and employees...
2025-11-27 20:3:37 | 阅读: 6 |
收藏
|
Security Affairs - securityaffairs.com
asahi
ransomware
stole
japan
gender
How Crypto is Getting Centralized (and What We Can Do About It)
New StorybyObytebyObyte@obyteA ledger without middlemenNovember 27th, 2025Translations ENKOESHIVIPT...
2025-11-27 20:2:8 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
governance
ledger
obytea
Agentic UX Over "Chat": How to Design Multi-Agent Systems People Actually Trust
New StorybyVictor ChurchillbyVictor Churchill@designchurchillVictor is a Senior Product Designer at...
2025-11-27 19:38:41 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
papers
modelsjun
waypoint
senior
churchill
Poland detains Russian citizen suspected of hacking local firms
Polish authorities detained a Russian citizen suspected of hacking into the IT systems of local com...
2025-11-27 19:1:14 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
poland
warsaw
authorities
moscow
sabotage
The minefield between syntaxes: exploiting syntax confusions in the wild
This writeup details innovative ‘syntax confusion’ techniques exploiting how two or mo...
2025-11-27 18:36:19 | 阅读: 4 |
收藏
|
Technical Information Security Content & Discussion - www.reddit.com
confuse
parsers
ambiguous
brumens
Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
Malware / Social EngineeringThe threat actor known as Bloody Wolf has been attributed to a cyber a...
2025-11-27 18:13:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
netsupport
wolf
uzbekistan
bloody
kyrgyzstan
C-Level e cyber security: il ransomware è la minaccia più urgente
Il ransomware (il “virus del riscatto”) non è più un rischio astratto, ma una minaccia concreta e qu...
2025-11-27 17:16:36 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
più
ha
nel
Windows PHP Web Shell & Reverse Shell Techniques
Windows Web Shell & Reverse Shell Techniques: Complete GuideUpdated on November 27, 2025...
2025-11-27 17:10:0 | 阅读: 11 |
收藏
|
Hacking Dream - www.hackingdream.net
windows
php
powershell
reverse
noprofile
PHP Web Shell and Reverse Shell Techniques for Linux: 45+ Methods for Penetration Testing
PHP Web Shell and Reverse Shell Techniques: 45+ Methods for Penetration Testing (2025)Updated o...
2025-11-27 17:7:0 | 阅读: 12 |
收藏
|
Hacking Dream - www.hackingdream.net
php
reverse
4444
shells
python
论文|源于大数据营销行业的个人信息黑灰产业链解析
环境异常 当前环境异常,完成验证后即可继续访问。 去验证...
2025-11-27 17:6:0 | 阅读: 2 |
收藏
|
网安杂谈 - mp.weixin.qq.com
Deepfake e chatbot, serve educazione finanziaria per difendersi: i dati del Crif
Secondo una ricerca del Crif, presentata in occasione dell’evento Tomorrow Speaks 2025, quello attua...
2025-11-27 17:1:41 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
più
digitale
deepfake
What the Recent Amazon and Microsoft Cloud Outages Taught the UK Payments Industry
New StorybyNodabyNoda@nodaNoda is a global Open Banking platform.November 27th, 2025Translations EN...
2025-11-27 16:53:34 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
cloud
nodanoda
stories
mlops
XGecu T76 on Windows 11 ARM
Apple . GeneralOn November 27, 2025 by Jonathan ZdziarskiRunning the XGecu T76...
2025-11-27 16:52:23 | 阅读: 6 |
收藏
|
Zdziarski's Blog of Things - www.zdziarski.com
winusb
t76
xgecu
zadig
software
APT cinese mette nel mirino l'Uzbekistan
In November, TG Soft's Anti-Malware Research Center (C.R.A.M) identified a cyber-espionage campaig...
2025-11-27 16:37:25 | 阅读: 1 |
收藏
|
TG Soft Software House - News - www.tgsoft.it
gamehook
beacon
filter64
graphics
Gli LLM malevoli aiutano i piccoli cybercriminali, ma non sono (ancora) così pericolosi
2025-11-27 16:30:35 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - www.securityinfo.it
di
llm
che
generare
malevoli
How Saurav Kant Kumar Is Using AI to Strengthen Industries—and the Workforce
New StorybyJon Stojan JournalistbyJon Stojan Journalist@jonstojanjournalistJon Stojan is a professi...
2025-11-27 16:29:59 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
web3
stojan
journalist
milestone
delivering
Engineering Intelligence: Visionary of Autonomous Infrastructure and Fluid Digital Evolution
New StorybyJon Stojan JournalistbyJon Stojan Journalist@jonstojanjournalistJon Stojan is a professi...
2025-11-27 16:14:59 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
stojan
journalist
ink
committed
The HackerNoon Newsletter: Everyones Using the Wrong Algebra in AI (11/27/2025)
← PreviousThe HackerNoon Newsletter: Inside My $1,000 Homelab: How I Rebuilt Big Tech Services in a...
2025-11-27 16:1:51 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
rack
previousthe
hackernoon
newsletter
homelab
KDE Plasma 6.8 将只支持 Wayland
KDE Plasma 团队宣布即将发布的 v6.8 将只支持 Wayland,停止支持 X11。KDE Plasma 6.7 系列的最后一个版本预计会在 2027 年初发布,对 X11 会...
2025-11-27 16:1:18 | 阅读: 1 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
kde
plasma
wayland
2027
almalinux
Previous
90
91
92
93
94
95
96
97
Next