unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Microsoft Developer Blogs Search Tool
2024-5-3 11:39:41 | 阅读: 3 |
收藏
|
Reverse Engineering - www.reddit.com
reddit
advertise
johnson
housewives
基于 langchaingo 对接大模型 ollama 实现本地知识库问答系统
2024-5-3 10:14:2 | 阅读: 2 |
收藏
|
cloud world - cloudsjhan.github.io
模型
ollama
qdrant
qwen
llm
ISC Stormcast For Friday, May 3rd, 2024 https://isc.sans.edu/podcastdetail/8966, (Fri, May 3rd)
2024-5-3 10:0:2 | 阅读: 2 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
feeds
isc
papers
friday
8966
QCSuper: Capture 2G/3G/4G/5G Radio Frames with Qualcomm Phones
May 3, 2024In the past, we've shown how it's possible to use RTL-SDRs or other SDR devices to...
2024-5-3 09:48:18 | 阅读: 3 |
收藏
|
rtl-sdr.com - www.rtl-sdr.com
software
sdr
qcsuper
phones
qualcomm
Weekly Update 398
How many different angles can you have on one data breach? Facial recognition (which probably isn...
2024-5-3 08:57:10 | 阅读: 2 |
收藏
|
Troy Hunt's Blog - www.troyhunt.com
fashion
biometrics
showdown
criminal
weekly
Calling Conventions Explained
2024-5-3 07:57:9 | 阅读: 3 |
收藏
|
Reverse Engineering - www.reddit.com
reddit
johnson
housewives
advertise
Mal.Metrica Redirects Users to Scam Sites
One of our analysts recently identified a new Mal.Metrica redirect scam on compromised websites, bu...
2024-5-3 06:43:38 | 阅读: 3 |
收藏
|
Sucuri Blog - blog.sucuri.net
metrica
mal
wordpress
scammy
CEO who sold fake Cisco devices to US military gets 6 years in prison
error code: 1106...
2024-5-3 06:15:16 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Organizations patch CISA KEV list bugs 3.5 times faster than others, researchers find
Researchers have found that a catalog of exploited vulnerabilities maintained by the federal govern...
2024-5-3 05:31:20 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
kev
bitsight
ransomware
exploited
Kicking Off With Crypto - PSW #827
May 2, 2024The Security Weekly crew discusses some of the latest articlesand research in cryptograp...
2024-5-3 05:15:0 | 阅读: 3 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
psw
security
introduces
chens
Ukrainian REvil gang member sentenced to 13 years in prison
Ukrainian REvil gang member sentenced to 13 years in prisonA Ukrainian national, a member of t...
2024-5-3 05:11:38 | 阅读: 3 |
收藏
|
Security Affairs - securityaffairs.com
ransomware
vasinskyi
sentenced
rabotnik
conspiracy
Tips and stories for your team on World Password Day
What tips can I share with my team?A simple way to observe World Password Day is by sending passwo...
2024-5-3 04:50:36 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
stories
tips
strength
Dropbox Sign customer data accessed in breach
Dropbox is reporting a recent “security incident” in which an attacker gained unauthorized acce...
2024-5-3 04:44:53 | 阅读: 4 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
dropbox
attacker
security
passwords
Bitwarden launches new MFA Authenticator app for iOS, Android
error code: 1106...
2024-5-3 04:30:19 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Why OpenAI Should Become Open-Source
Too Long; Didn't ReadOpenAI is in a high-stakes legal battle with Elon Musk. Musk is suing the compa...
2024-5-3 04:28:27 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
musk
honest
innovation
sourcing
Elliptic Shows How an AI Model Can Identify Bitcoin Laundering
Cryptocurrency for several years has been pointed to as a key enabler of ransomware groups, allowin...
2024-5-3 04:26:31 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
laundering
illicit
blockchain
identify
subgraphs
Why CAPTCHAs Are Not the Future of Bot Detection
CAPTCHAs, once seen as the gold standard for differentiating between humans and bots, are quickly b...
2024-5-3 04:11:53 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
captchas
kasada
captcha
security
bots
New Digital Nomad Visas Ittrza
Too Long; Didn't ReadItaly, Turkey, and South Africa have launched their digital nomad visa programs...
2024-5-3 04:2:31 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
visa
africa
nomad
nations
regulation
Towards Generic Database Management System Fuzzing
Authors: Yupeng Yang and Yongheng Chen, Georgia Institute of Technology; Rui Zhong, Palo Alto Networ...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
relational
dbmss
buzzbee
limitations
georgia
Speculative Denial-of-Service Attacks In Ethereum
Authors: Aviv Yaish, The Hebrew University; Kaihua Qin and Liyi Zhou, Imperial College London, UC Be...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
mempurge
blockchain
turing
london
Previous
1
2
3
4
5
6
7
8
Next