unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Mend.io is a Strong Performer in the Forrester Wave™ Software Composition Analysis, Q4 2024
It should be no surprise that the world runs on open source software. According to the latest Fo...
2024-11-14 01:49:57 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
mend
software
security
analysis
composition
Mobile Application Penetration Testing Checklist
2024-11-14 01:49:52 | 阅读: 3 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
Mobile Application Penetration Testing Checklist
2024-11-14 01:49:52 | 阅读: 0 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER
Company doesn’t make storage devices now; has zero interest in fixing catastrophic vulnerabilit...
2024-11-14 01:22:8 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
eol
firmware
richi
eos
security
PlatformEngineering.com: Strengthening Security in the Software Development Lifecycle
The Techstrong Group is thrilled to announce the launch of PlatformEngineering.com, a new platfo...
2024-11-14 01:6:40 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
cloud
techstrong
boulevard
DODO Launches DEXpert Platform for Decentralized Exchange Development
DODO, a decentralized finance (DeFi) protocol, announced today the release of DEXpert, a toolkit des...
2024-11-14 01:3:50 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
dexpert
liquidity
dodo
meme
defi
Evaluating Promptable Segmentation with Uniform Point Grids and Bounding Boxes on Diverse Datasets
Authors:(1) Zhaoqing Wang, The University of Sydney and AI2Robotics;(2) Xiaobo Xia, The Universit...
2024-11-14 01:0:27 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
iou
evaluation
fig
sydney
Karma: Love on the Blockchain and the Gamification of Helping Others
I've written several articles here on HackerNoon about the concept of Karma. I’ve always thought of...
2024-11-14 01:0:25 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
karma
favors
economy
favor
ledger
Optimizing User Acquisition with Google DV360: Creative Strategies for Success
We’ve all seen significant changes in user acquisition (UA) advertising in the last few years. But w...
2024-11-14 01:0:21 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
dv360
creatives
youtube
banners
ctv
Microsoft Data Security Index annual report highlights evolving generative AI security needs
Generative AI presents companies of all sizes with opportunities to increase efficiency and drive i...
2024-11-14 01:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
generative
adoption
microsoft
increases
Infostealer Malware: An Introduction
Infostealer malware represents one of the most underrated threats to corporate and consumer inf...
2024-11-14 00:44:47 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
infostealer
stealer
victim
security
flare
Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 89 flaws
error code: 1106...
2024-11-14 00:30:22 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Siemens Energy Omnivise T3000 8.2 SP3 Privilege Escalation / File Download
SEC Consult Vulnerability Lab Security Advisory < 20241112-0 >====================================...
2024-11-14 00:10:5 | 阅读: 8 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
passwd
t3000
productcert
security
passwords
Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disruptive Attacks Against Israel
Threat Intelligence / Cyber EspionageA threat actor affiliated with Hamas has expanded its malicio...
2024-11-14 00:9:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
hamas
israel
espionage
wirte
israeli
TX Text Control .NET Server For ASP.NET Arbitrary File Read / Write
Hej,Let's keep it short ...=====Intro=====A "sudo make me a sandwich" security issue has been iden...
2024-11-14 00:7:45 | 阅读: 4 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
textcontrol
security
hej
The HackerNoon Newsletter: 21 Cranium-Catching Bitcoin Marketing Ideas For Dummies Savvyies (11/13/2024)
2024-11-14 00:5:23 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
hackernoon
investing
dummies
esg
cranium
Wisconsin city of Sheboygan says ransom demanded after cyberattack
Cybercriminals have demanded a ransom from officials in the city of Sheboygan, Wisconsin this week...
2024-11-14 00:0:50 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ransomware
network
sheboygan
wisconsin
county
Advanced Open-Vocabulary Segmentation with Uni-OVSeg
Authors:(1) Zhaoqing Wang, The University of Sydney and AI2Robotics;(2) Xiaobo Xia, The Universit...
2024-11-14 00:0:24 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
downscaled
encoder
adapter
embeddings
bounding
Shoukathali Jambagi on Strategic Vision and Business Process Transformation
Few professionals have taken the integration of technology and business objectives as far as Shoukat...
2024-11-14 00:0:21 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
jambagi
goals
strategic
growth
Tech Innovation and Cross-Industry Impact: Syed Aamir Aarfi on AI/ML Integration
As technology surges forward, the integration of emerging innovations into established industries ha...
2024-11-14 00:0:18 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
aarfi
industries
operational
experiences
machine
Previous
93
94
95
96
97
98
99
100
Next