unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Calling Conventions Explained
2024-5-3 07:57:9 | 阅读: 1 |
收藏
|
Reverse Engineering - www.reddit.com
reddit
johnson
housewives
advertise
Mal.Metrica Redirects Users to Scam Sites
One of our analysts recently identified a new Mal.Metrica redirect scam on compromised websites, bu...
2024-5-3 06:43:38 | 阅读: 1 |
收藏
|
Sucuri Blog - blog.sucuri.net
metrica
mal
wordpress
scammy
CEO who sold fake Cisco devices to US military gets 6 years in prison
error code: 1106...
2024-5-3 06:15:16 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Organizations patch CISA KEV list bugs 3.5 times faster than others, researchers find
Researchers have found that a catalog of exploited vulnerabilities maintained by the federal govern...
2024-5-3 05:31:20 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
kev
bitsight
ransomware
exploited
Kicking Off With Crypto - PSW #827
May 2, 2024The Security Weekly crew discusses some of the latest articlesand research in cryptograp...
2024-5-3 05:15:0 | 阅读: 3 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
psw
security
introduces
chens
Ukrainian REvil gang member sentenced to 13 years in prison
Ukrainian REvil gang member sentenced to 13 years in prisonA Ukrainian national, a member of t...
2024-5-3 05:11:38 | 阅读: 3 |
收藏
|
Security Affairs - securityaffairs.com
ransomware
vasinskyi
sentenced
rabotnik
conspiracy
Tips and stories for your team on World Password Day
What tips can I share with my team?A simple way to observe World Password Day is by sending passwo...
2024-5-3 04:50:36 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
stories
tips
strength
Dropbox Sign customer data accessed in breach
Dropbox is reporting a recent “security incident” in which an attacker gained unauthorized acce...
2024-5-3 04:44:53 | 阅读: 4 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
dropbox
attacker
security
passwords
Bitwarden launches new MFA Authenticator app for iOS, Android
error code: 1106...
2024-5-3 04:30:19 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Why OpenAI Should Become Open-Source
Too Long; Didn't ReadOpenAI is in a high-stakes legal battle with Elon Musk. Musk is suing the compa...
2024-5-3 04:28:27 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
musk
honest
innovation
sourcing
Elliptic Shows How an AI Model Can Identify Bitcoin Laundering
Cryptocurrency for several years has been pointed to as a key enabler of ransomware groups, allowin...
2024-5-3 04:26:31 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
laundering
illicit
blockchain
identify
subgraphs
New Digital Nomad Visas Ittrza
Too Long; Didn't ReadItaly, Turkey, and South Africa have launched their digital nomad visa programs...
2024-5-3 04:2:31 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
visa
africa
nomad
nations
regulation
Towards Generic Database Management System Fuzzing
Authors: Yupeng Yang and Yongheng Chen, Georgia Institute of Technology; Rui Zhong, Palo Alto Networ...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
relational
dbmss
buzzbee
limitations
georgia
Speculative Denial-of-Service Attacks In Ethereum
Authors: Aviv Yaish, The Hebrew University; Kaihua Qin and Liyi Zhou, Imperial College London, UC Be...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
mempurge
blockchain
turing
london
'I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators
Authors: Ananta Soneji, Arizona State University; Vaughn Hamilton, Max Planck Institute for Software...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
creators
onlyfans
arizona
vaughn
prominence
PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector
Authors: Guy N. Rothblum, Apple; Eran Omri, Ariel University and Ariel Cyber Innovation Center; Juny...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
norm
overhead
dimensional
bounded
SHiFT: Semi-hosted Fuzz Testing for Embedded Applications
Authors: Alejandro Mera and Changming Liu, Northeastern University; Ruimin Sun, Florida Internationa...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
mcu
firmware
positives
emulation
security
CAMP: Compositional Amplification Attacks against DNS
Authors: Huayi Duan, Marco Bearzi, Jodok Vieli, David Basin, Adrian Perrig, and Si Liu, ETH Zürich;...
2024-5-3 03:57:42 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
camp
vieli
Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps
Authors: Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, and Jason Polakis, University of Illi...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
security
inspectron
developers
porting
masood
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware
Authors: Haichuan Xu, Mingxuan Yao, and Runze Zhang, Georgia Institute of Technology; Mohamed Mousta...
2024-5-3 03:57:42 | 阅读: 1 |
收藏
|
USENIX - www.usenix.org
dva
a11y
victim
georgia
guided
Previous
1
2
3
4
5
6
7
8
Next