unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
MindManager 23 - full disclosure
Full Disclosuremailing list archivesFrom: Pawel Karwowski via Fulldisclosure <fu...
2024-4-19 21:47:16 | 阅读: 2 |
收藏
|
Full Disclosure - seclists.org
eviden
repair
karwowski
pawel
Ukrainian sentenced to 15 years in prison for spreading Russian propaganda
A Ukrainian man was sentenced to 15 years in prison for creating and spreading Russian propaganda,...
2024-4-19 21:46:19 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ukraine
ukrainian
sbu
russia
invasion
BlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Tool
Network Security / Firmware SecurityTechnology, research, and government sectors in the Asia-Pacif...
2024-4-19 21:44:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
waterbear
network
deuterbear
analysis
earth
Ukrainian soldiers’ apps increasingly targeted for spying, cyber agency warns
Hackers are increasingly trying to plant data-stealing malware on messaging apps used by the Ukrain...
2024-4-19 21:1:19 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ukrainian
ukraine
military
0184
forces
The Good, the Bad and the Ugly in Cybersecurity – Week 16
The Good | DoJ Indicts Cryptojacking Criminal and Botnet Operator Supporting Ransomware ActorsThe...
2024-4-19 21:0:56 | 阅读: 5 |
收藏
|
SentinelOne - www.sentinelone.com
sandworm
water
network
palo
parks
Unlocking the Power of Offensive Security: Trustwave's Proactive Approach to Cyber Defense
Clients often conflate Offensive Security with penetration testing, yet they s...
2024-4-19 21:0:0 | 阅读: 2 |
收藏
|
Trustwave Blog - www.trustwave.com
security
exercises
threats
Operational Technology in the DoD: Ensuring a Secure and Efficient Power Grid
In an evolving threat landscape, the DoD must make sure that its mission-critical operations don’t e...
2024-4-19 21:0:0 | 阅读: 4 |
收藏
|
Tenable Blog - www.tenable.com
dod
security
grid
operational
Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24
Insight #1One of the most significant errors an organization can make is assuming...
2024-4-19 21:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
smbs
lindner
prevalent
一切为了 AI Google 合并 Android 和硬件团队
为了更好的将 AI 整合到产品中,Google 合并了 Android 和硬件团队。CEO Sundar Pichai 周四宣布了内部重组,成立了名为 Platforms and Devi...
2024-4-19 20:55:15 | 阅读: 2 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
osterloh
rick
chrome
reorg
此举
软件故障导致老虎机多吐出逾 200 万美元
澳大利亚 Star Casino 赌场的票据式老虎机(TICO)因软件故障导致其在兑换时多吐出了 205 万美元。赌场经理 Nicholas Weeks 解释说,TICO 机器的一项功能...
2024-4-19 20:38:31 | 阅读: 2 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
tico
casino
赌场
theregister
Forcepoint Introduces New Partner Enablement Framework
Today, here at Forcepoint, we’re exc...
2024-4-19 20:12:4 | 阅读: 2 |
收藏
|
Forcepoint - www.forcepoint.com
enablement
dan
stacie
strategic
What’s the deal with the massive backlog of vulnerabilities at the NVD?
Friday, April 19, 2024 08...
2024-4-19 20:1:53 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.talosintelligence.com
nvd
cves
security
backlog
微软网络工程师建议用户不要使用iPerf3工具 因为在Windows上并不好
2024-4-19 19:54:26 | 阅读: 10 |
收藏
|
蓝点网 - www.landiannews.com
windows
iperf3
网络
esnet
winsock
Scaling Application Security With Application Security Posture Management (ASPM)
Did you know that the total number of data breaches more than tripled between 2013 and 2022? These...
2024-4-19 19:51:53 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
aspm
cloud
posture
development
如何显示或隐藏在 Flutter 中输入的密码
2024-4-19 19:34:53 | 阅读: 2 |
收藏
|
体验盒子 - www.uedbox.com
isobscure
obscuretext
icons
微信公众平台为大量公众号开通留言功能 各位运营者赶紧去看看吧
2024-4-19 19:22:32 | 阅读: 3 |
收藏
|
蓝点网 - www.landiannews.com
蓝点
账号
公证
过户
感谢您
How Attackers Can Own a Business Without Touching the Endpoint
Attackers are increasingly making use of "networkless" attack techniques targeting cloud apps and i...
2024-4-19 19:8:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
cloud
identities
phishing
security
okta
Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers
Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit...
2024-4-19 19:1:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
ransomware
akira
lockbit
agenda
victim
【公益译文】2022~2023年物联网僵尸网络报告
阅读: 10一、前言本报告调查了我们从2022年7月初到2023年1月底在受CUJO AI保护的消费者网络中观察到的物联网僵尸网络活动。如需了解更多信息,请访...
2024-4-19 19:0:56 | 阅读: 3 |
收藏
|
绿盟科技技术博客 - blog.nsfocus.net
漏洞
网络
僵尸
二进制
Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security
2024-4-19 19:0:0 | 阅读: 4 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
cloud
benchmarks
nessus
Previous
4
5
6
7
8
9
10
11
Next