unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
思科紧急修复已遭利用的 ASA 和 FTD 软件漏洞
聚焦源代码安全,网罗国内外最新资讯!编译:代码卫士本周三,思科表示修复ASA中一个拒绝服务(DoS)漏洞CVE-2024-20481(CVSS评分5.8)。该漏洞影响思科 ASA 和 FTD 软件的...
2024-10-26 01:40:0 | 阅读: 8 |
收藏
|
代码卫士 - mp.weixin.qq.com
攻击
思科
漏洞
攻击者
asa
苹果创建 Private Cloud Compute VM 助力漏洞挖掘
聚焦源代码安全,网罗国内外最新资讯!编译:代码卫士苹果创建了一个虚拟研究环境,供研究员测试其Private Cloud Compute(PCC,私有云计算)系统的安全,并发布一些“关键组件”的源代码...
2024-10-26 01:40:0 | 阅读: 10 |
收藏
|
代码卫士 - mp.weixin.qq.com
苹果
pcc
安全
漏洞
数据
US offers $10 million bounty for members of Iranian hacking gang
A US $10 million reward is being offered to anyone who has information about four members of an Ir...
2024-10-26 01:33:14 | 阅读: 3 |
收藏
|
Graham Cluley - www.bitdefender.com
water
rewards
justice
reward
shahid
The Windows Registry Adventure #4: Hives and the registry layout
Posted by Mateusz Jurczyk, Google Project Zero To a normal user or even a Win32 application de...
2024-10-26 01:30:0 | 阅读: 8 |
收藏
|
Project Zero - googleprojectzero.blogspot.com
hives
windows
machine
security
loaded
Yaklang里传来,Java-hack升级啦~
Yaklang里传来,Java-hack升级啦~隔壁抽鞭子的黑工厂里,牛牛更新了吗~?TemplatesImpl 类:TemplatesImpl对象的成员方法有一段类字节码,在反序列化时会加载并实例化...
2024-10-26 01:30:0 | 阅读: 12 |
收藏
|
Yak Project - mp.weixin.qq.com
payload
yaklang
transformer
node1
SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection
The number of cybersecurity incidents has doubled since the pandemic and its costing organizatio...
2024-10-26 01:18:57 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
cse
desikan
network
Four REvil members sentenced to more than four years in prison
Four members of the ransomware gang REvil were sentenced to multiple years in prison in Russia for...
2024-10-26 01:15:49 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
puzyrevsky
prison
authorities
sentenced
outlet
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
Oct 25, 2024Ever heard someone say, "the attacker only has to be right once,but the defender has to...
2024-10-26 01:5:0 | 阅读: 0 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
okta
security
defender
logan
Cyber Scams & Why We Fall for Them
Gary Perkins, Chief Information Security OfficerOctober 25, 2024Social engineers rely on...
2024-10-26 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
attackers
ciso
phishing
Why Running Two SaaS Products is My Ultimate Safety Net and Growth Strategy
I currently run two profitable SaaS products, ResumeMaker.Online and aiCarousels.com. They serve dif...
2024-10-26 00:55:18 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
resumemaker
screwed
codebase
smarter
cons
CISOs as Organizational Bridge Builders for Cybersecurity Culture
As of 2023, 100% of Fortune 500 companies had a CISO role or its equivalent. This figure was only 70...
2024-10-26 00:47:52 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
cisos
security
ciso
strategic
The First Wi-Fi Training and Certification Mini-Event
Next month, Peter Mackenzie and I are co-hosting the first Wireless Tech Summit, a Wi-Fi...
2024-10-26 00:45:54 | 阅读: 6 |
收藏
|
Security Uncorked - securityuncorked.com
security
peter
network
certified
cwnp
I professionisti della sicurezza informatica rischiano il burnout
2024-10-26 00:45:35 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.securityinfo.it
di
lavoro
più
sicurezza
Amazon seizes domains used in rogue Remote Desktop campaign to steal data
error code: 1106...
2024-10-26 00:45:21 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Validator or Node Operator? Understanding Key Advantages and Differences with Ethereum’s DVT
Ethereum Staking is a fundamental activity for consolidating the crypto economic security of the net...
2024-10-26 00:42:25 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
validator
validators
dvt
network
staking
DePINscan: The Ultimate Tool for Exploring Decentralized Networks
The world of decentralized technologies is quickly evolving. One of the most promising developments...
2024-10-26 00:32:58 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
depinscan
depin
depins
investors
Kremlin-linked hackers target Ukraine’s state, military agencies in new espionage campaign
A hacker group associated with a Russian intelligence agency has been targeting Ukrainian state and...
2024-10-26 00:30:48 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
apt29
ukraine
attributed
microsoft
espionage
The Top Angular Spreadsheet Tools
Microsoft Excel has become the standard for traditional software that provides spreadsheet capabilit...
2024-10-26 00:30:36 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
spreadsheet
formatting
spreadjs
angular
charts
Into the Stratosphere: How AST SpaceMobile Became the Stock of 2024 With Room for Further Growth
AST SpaceMobile has spent much of 2024 showcasing the rate of growth that wouldn’t seem out of place...
2024-10-26 00:25:19 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
spacemobile
asts
satellites
investors
satellite
Quantum Computing and AI: A Revolution in Technological Synergy
The Combination of Quantum Computing & Classical AI is UnstoppableThe convergence of quantum comput...
2024-10-26 00:20:16 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
classical
machine
simulations
enhanced
climate
Previous
264
265
266
267
268
269
270
271
Next