unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
CEO who sold fake Cisco devices to US military gets 6 years in prison
error code: 1106...
2024-5-3 06:15:16 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Organizations patch CISA KEV list bugs 3.5 times faster than others, researchers find
Researchers have found that a catalog of exploited vulnerabilities maintained by the federal govern...
2024-5-3 05:31:20 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
kev
bitsight
ransomware
exploited
Kicking Off With Crypto - PSW #827
May 2, 2024The Security Weekly crew discusses some of the latest articlesand research in cryptograp...
2024-5-3 05:15:0 | 阅读: 2 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
psw
security
introduces
chens
Ukrainian REvil gang member sentenced to 13 years in prison
Ukrainian REvil gang member sentenced to 13 years in prisonA Ukrainian national, a member of t...
2024-5-3 05:11:38 | 阅读: 2 |
收藏
|
Security Affairs - securityaffairs.com
ransomware
vasinskyi
sentenced
rabotnik
conspiracy
Tips and stories for your team on World Password Day
What tips can I share with my team?A simple way to observe World Password Day is by sending passwo...
2024-5-3 04:50:36 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
stories
tips
strength
Dropbox Sign customer data accessed in breach
Dropbox is reporting a recent “security incident” in which an attacker gained unauthorized acce...
2024-5-3 04:44:53 | 阅读: 3 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
dropbox
attacker
security
passwords
Bitwarden launches new MFA Authenticator app for iOS, Android
error code: 1106...
2024-5-3 04:30:19 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Elliptic Shows How an AI Model Can Identify Bitcoin Laundering
Cryptocurrency for several years has been pointed to as a key enabler of ransomware groups, allowin...
2024-5-3 04:26:31 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
laundering
illicit
blockchain
identify
subgraphs
Towards Generic Database Management System Fuzzing
Authors: Yupeng Yang and Yongheng Chen, Georgia Institute of Technology; Rui Zhong, Palo Alto Networ...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
relational
dbmss
buzzbee
limitations
georgia
Speculative Denial-of-Service Attacks In Ethereum
Authors: Aviv Yaish, The Hebrew University; Kaihua Qin and Liyi Zhou, Imperial College London, UC Be...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
mempurge
blockchain
turing
london
'I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators
Authors: Ananta Soneji, Arizona State University; Vaughn Hamilton, Max Planck Institute for Software...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
creators
onlyfans
arizona
vaughn
prominence
PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector
Authors: Guy N. Rothblum, Apple; Eran Omri, Ariel University and Ariel Cyber Innovation Center; Juny...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
norm
overhead
dimensional
bounded
SHiFT: Semi-hosted Fuzz Testing for Embedded Applications
Authors: Alejandro Mera and Changming Liu, Northeastern University; Ruimin Sun, Florida Internationa...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
mcu
firmware
positives
emulation
security
CAMP: Compositional Amplification Attacks against DNS
Authors: Huayi Duan, Marco Bearzi, Jodok Vieli, David Basin, Adrian Perrig, and Si Liu, ETH Zürich;...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
camp
vieli
Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps
Authors: Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, and Jason Polakis, University of Illi...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
security
inspectron
developers
porting
masood
What to Expect at RSA 2024: Will AI Wreak Havoc on Cybersecurity?
As artificial intelligence leaders debate what constitutes safe AI and whether it means we’re on a...
2024-5-3 03:53:37 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
defenses
threats
genai
Pro-Russia hackers target critical infrastructure in North America and Europe
Pro-Russia hackers target critical infrastructure in North America and EuropeGovernment agenci...
2024-5-3 03:52:6 | 阅读: 3 |
收藏
|
Security Affairs - securityaffairs.com
russia
north
hacktivists
passwords
security
Alleged China-based hackers using ‘Cuttlefish’ malware platform to target Turkey
Hackers with alleged connections to China are using a malware platform called “Cuttlefish” to targe...
2024-5-3 03:46:24 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
cuttlefish
network
lotus
cloud
turkey
CISA urges software devs to weed out path traversal vulnerabilities
error code: 1106...
2024-5-3 03:45:17 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Kaseya Connect Global 2024 Day Two Recap: Embracing AI and Autonomous Automation
As we wrapped up another exhilarating day at Kaseya Connect Global 2024 in Las Vegas, the spotlight...
2024-5-3 03:12:17 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
backup
security
autonomous
highlighted
Previous
1
2
3
4
5
6
7
8
Next