unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Clang's -O0 output: branch displacement and size increase
tl;dr Clang 19 will remove the -mrelax-all default at-O0, significantly decreasing...
2024-4-27 15:0:0 | 阅读: 2 |
收藏
|
MaskRay - maskray.me
mrelax
o0
assembler
je
dependent
Rust下的二进制漏洞 CVE-2024-27284 分析
2024-4-27 12:29:34 | 阅读: 1 |
收藏
|
Sec-News 安全文摘 - govuln.com
CrushFTP后利用提权分析(CVE-2024-4040)
写在前面这个漏洞的利用最终还是被曝光了,这里也不做重复的分析,具体可以点击访问CVE-2024-4040了解漏洞的详情,在这里作者在分析利用的时候仍然使用的sessions.obj文件去读取历史coo...
2024-4-27 12:27:3 | 阅读: 1 |
收藏
|
Sec-News 安全文摘 - govuln.com
username
logins
deskeyspec
y4tacker
secretkey
浅析CrushFTP之VFS逃逸
写在前面本篇的内容可能并不是最新的漏洞(毕竟我也没最新版代码),是去年十一月份更新的漏洞,只是当时由于各种各样的项目导致分析被搁置了许久,再次关注它则是因为看到出了新的安全公告,又想起来当时并未分析完...
2024-4-27 12:26:41 | 阅读: 1 |
收藏
|
Sec-News 安全文摘 - govuln.com
7e
numchars
漏洞
dots
passwd
Examining the Deception infrastructure in place behind code.microsoft.com
The domain name code.microsoft.com has an interesting story behind it. T...
2024-4-27 12:26:19 | 阅读: 1 |
收藏
|
Sec-News 安全文摘 - govuln.com
microsoft
subdomain
honeypot
security
dangling
A license (metadata) to kill (for)…
Many forensic artifacts can be looked at from many different angles. A few years ago I proposed...
2024-4-27 07:40:21 | 阅读: 2 |
收藏
|
Hexacorn - www.hexacorn.com
analysis
artifacts
software
gpl
licensing
"How Many Colors Can the Human Eye See?": The Application
Too Long; Didn't ReadFor instance, from this graph, we can conclude that given the same time to comp...
2024-4-27 05:46:1 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
conclude
younger
participate
dehancer
Know-your-customer executive order facing stiff opposition from cloud industry
A controversial executive order that would require U.S. cloud companies to more closely monitor the...
2024-4-27 05:31:25 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
cloud
security
microsoft
proposed
netchoice
FBI: Fraudsters using fake online dating verification apps to scam lovers
Cybercriminals are taking advantage of people’s fears about online dating by getting them to downlo...
2024-4-27 05:31:24 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
dating
victim
butchering
jonathan
Working Together From Afar: Easy Strategies for Remote Team Collaboration
Too Long; Didn't ReadRemote paintings is turning into greater common in recent times, and it is esse...
2024-4-27 05:14:43 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
ahmed
ashif
graduate
passion
cricket
Navigating Complex Search Tasks with AI Copilots: The Undiscovered Country and References
Too Long; Didn't ReadExploring AI copilots: Supporting complex search tasks with advancements in gen...
2024-4-27 05:0:2 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
papers
academic
resembles
llms
Self-Hacking: How I learned to love the Cold again
Alright, here’s how I got back into (loving) the cold, and why I did it.Normally, I don’t spill much...
2024-4-27 04:31:57 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.adainese.it
cold
water
daniele
warm
pain
Hackers accessed more than 19,000 accounts on California state welfare platform
More than 19,000 online accounts on a California state platform for welfare programs may have been...
2024-4-27 04:31:28 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
benefitscal
california
passwords
welfare
assistance
Sandbox Evasion Techniques – Part 1
This post is the first part in a series on sandbox evasion techniques used by malware today. Aft...
2024-4-27 04:25:3 | 阅读: 3 |
收藏
|
VMRay - www.vmray.com
analysis
malicious
sandboxes
vmray
gaps
Congress picked a direct fight with ByteDance and TikTok. The privacy implications are less clear.
The recent congressional battle over the future of TikTok was largely about data — specifically, bl...
2024-4-27 04:16:26 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
americans
legislation
congress
Navigating Complex Search Tasks with AI Copilots: Opportunities
Too Long; Didn't ReadExploring AI copilots: Supporting complex search tasks with advancements in gen...
2024-4-27 03:0:4 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
papers
academic
llms
resembles
copilots
USENIX Security ’23 – UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware
Authors/Presenters: Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yu...
2024-4-27 03:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
security
tian
lyu
TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland - SWN #381
Apr 26, 2024TikTok, Flowmon, Arcane Door, Brokewell, RuggedCom, Deepfakes,Non-Competes, Aaran Leyla...
2024-4-27 02:56:0 | 阅读: 5 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
swn
security
arcane
ruggedcom
Cisco Confirms Two Exploits Found in Shadow Brokers' Data Dump
Cisco has confirmed the legitimacy of two exploits found in a data dump of code relea...
2024-4-27 02:20:43 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.tripwire.com
epicbanana
asa
software
security
Understanding Cybersecurity Vulnerabilities
What is a cybersecurity vulnerability, how do they happen, and what can organizations do to avoid f...
2024-4-27 01:13:24 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
threats
Previous
1
2
3
4
5
6
7
8
Next