unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How Simply Browsing The Internet Gives Scammers An Advantage – And What You Can Do About It
Data privacy has become one of the most talked about topics in 2023. According to recent statistics,...
2023-8-24 21:7:16 | 阅读: 8 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
brokers
incogni
sold
broker
brokering
Post-AI Marketing – More Human than Ever
At the end of 2022, I thought I was out of a job. That’s when I first logged into ChatGPT and asked...
2023-7-28 16:41:4 | 阅读: 13 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
outline
bolded
draft
damn
felt
The Development of Zero Trust Security
A Robust Cybersecurity Framework Introduction In a world where cybersecurity threats continue to evo...
2023-7-28 16:35:44 | 阅读: 15 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
security
threats
perimeter
defenses
Security of Zero Trust
Introduction In today's digital age, where cyber threats loom large and data breaches make headlines...
2023-7-28 16:26:17 | 阅读: 13 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
network
security
worldwide
What is Zero Trust Network Architecture (ZTNA)?
Overview In an era of a rapidly expanding digital landscape and day-to-day advancing cyber threats,...
2023-7-28 16:15:57 | 阅读: 10 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
security
network
era
adopt
jon
Privacy: Protecting your personal information Online
With the growth of technology, the ways of marketing have observed a paradigm shift. In the past, th...
2023-7-28 15:53:4 | 阅读: 10 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
warehouses
publicity
audience
growth
amounts
Keys to Mitigating Insider Threats
Cyber threats can come from anywhere. For organizations facing an onslaught of external attacks, it’...
2023-7-28 15:42:48 | 阅读: 8 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
insider
threats
facebook
underbelly
outline
How the Human Factor Plays a Role in Android Security
When it comes to security, we should have a thorough understanding of how various components impact...
2023-7-28 15:39:49 | 阅读: 11 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
security
threats
seduced
persuaded
disregarded
From SEH Overwrite with Egg Hunter to Get a Shell
Introduction The Windows operating system has a default "handler" that catches any exception that is...
2023-7-28 15:37:3 | 阅读: 17 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
shellcode
windows
egg
seh
Interview with D4RKR4BB1T
Background: My name is Pavel M. Kravchenko. I was born 23-10-1996 in the US to a Russian mother, and...
2023-7-27 23:35:35 | 阅读: 18 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
hunt
legally
pavel
kravchenko
Authenticity Verification of Findings in OSINT: Tools to Ensure Data Credibility
This is a continuation of the article: OSINT: A THOUGHTFULNESS ABOUT THE ADVANTAGES AND DISADVANT...
2023-6-20 17:35:23 | 阅读: 13 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
advantages
constantly
Protecting Yourself From People Like Me
As a pentester, part of my job is running social engineering exercises. To be successful, I look...
2023-6-8 01:10:31 | 阅读: 24 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
calculated
uncovered
exercises
loved
ourselves
Cyber Threat with Chat GPT
Repetitive tasks, tons of labor hours going into mundane tasks, delayed response to complex custo...
2023-6-8 00:46:22 | 阅读: 40 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
chatgpt
industries
engagement
efficiency
The Issue of Overlooking Personal Network Security and Its Implications
Technology is an integrated part of society in nearly every aspect of life these days, and this l...
2023-6-7 19:29:14 | 阅读: 17 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
network
abundance
forgetting
realize
facebook
Penetration Testing with Burp Suite: Enhancing Web Application Security
In today's interconnected world, web applications play a critical role in various aspects of our...
2023-6-7 18:37:0 | 阅读: 21 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
weaknesses
attackers
identify
security
Risks and Opportunities: Exploring the Impact of Google's New TLDs
In its expansion of top-level domains (TLDs), Google Registry has introduced eight new domains, i...
2023-6-7 18:26:11 | 阅读: 16 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
security
arises
aim
tlds
graduates
VPN vs. MPLS: Choosing the Right Solution for Your Business
The corporate world of today is all about connectivity. Having a dependable and secure network is e...
2023-5-30 21:33:0 | 阅读: 19 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
network
mpls
vpns
remote
security
Regular Expression Denial of Service
Service uptime and availability is a crucial factor that determines the success of online busines...
2023-5-24 18:54:39 | 阅读: 22 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
redos
evolving
facebook
External Understanding: Dissecting APIs inside of IoT devices (Part2)
Introduction If you have not read Part 1, it is highly suggested that you do so. This article is...
2023-5-23 20:22:37 | 阅读: 25 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
daap
talking
breakdown
suggested
dissecting
External Understanding: Dissecting APIs inside of IoT devices (Part 1)
Introduction As the world of IoT evolves, so does the security within this realm, like most field...
2023-5-18 18:1:53 | 阅读: 28 |
收藏
|
Hakin9 – IT Security Magazine - hakin9.org
security
realm
brands
reversed
internals
Previous
2
3
4
5
6
7
8
9
Next