unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Reddit 限制社区 Moderator 将 subreddit 设为私有
去年 Reddit 大幅提高了 API 的价格,导致了众多第三方客户端被迫关闭。社区就 API 定价举行了大规模抗议,数以千计的 subreddit 从公开切换到私有或变成 NSFW。这一...
2024-10-1 21:59:43 | 阅读: 2 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
reddit
subreddit
抗议
nsfw
moderator
BudTrader - 2,721,185 breached accounts
Here's an overview of the various breaches that have been consolidated into this Have I BeenPwned....
2024-10-1 21:51:19 | 阅读: 3 |
收藏
|
Have I Been Pwned latest breaches - haveibeenpwned.com
passwords
hibp
permalink
suffered
birth
Ubuntu Security Notice USN-7048-1
==========================================================================Ubuntu Security Notice U...
2024-10-1 21:47:26 | 阅读: 3 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
security
launchpad
1ubuntu7
usn
1ubuntu5
Ubuntu Security Notice USN-7015-3
==========================================================================Ubuntu Security Notice U...
2024-10-1 21:47:9 | 阅读: 4 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
python2
python
7015
security
remote
Ubuntu Security Notice USN-7046-1
==========================================================================Ubuntu Security Notice U...
2024-10-1 21:46:56 | 阅读: 2 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
1ubuntu0
flatpak
bubblewrap
launchpad
libflatpak0
Red Hat Security Advisory 2024-7443-03
The following advisory data is extracted from:https://access.redhat.com/security/data/csaf/v2/advi...
2024-10-1 21:46:38 | 阅读: 0 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
security
redhat
rhacs
rhsa
7443
Red Hat Security Advisory 2024-7442-03
The following advisory data is extracted from:https://access.redhat.com/security/data/csaf/v2/advi...
2024-10-1 21:46:28 | 阅读: 1 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
security
redhat
jboss
ion
rhsa
Red Hat Security Advisory 2024-7441-03
The following advisory data is extracted from:https://access.redhat.com/security/data/csaf/v2/advi...
2024-10-1 21:46:17 | 阅读: 0 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
security
redhat
jboss
ion
rhsa
Red Hat Security Advisory 2024-7436-03
The following advisory data is extracted from:https://access.redhat.com/security/data/csaf/v2/advi...
2024-10-1 21:46:6 | 阅读: 0 |
收藏
|
Files ≈ Packet Storm - packetstormsecurity.com
redhat
winc
security
windows
ocpbugs
这些值得一看的软件|但不一定有用[24101]
2024-10-1 21:38:2 | 阅读: 7 |
收藏
|
小众软件 - www.appinn.com
油耗
隐藏
windows
用车
Hurricane Helene Aftermath - Cyber Security Awareness Month, (Tue, Oct 1st)
For a few years now, October has been "National Cyber Security Awareness Month". This year, it is a...
2024-10-1 21:35:16 | 阅读: 3 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
disaster
cable
disasters
donation
charity
Silent Intrusion: Unraveling the Sophisticated Attack Leveraging VS Code for Unauthorized Access
Key takeawaysCyble Research and Intelligence Labs (CRIL) uncovered a sophisticated attack...
2024-10-1 21:16:26 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
vscode
victim
remote
tunnel
python
俄罗斯考虑屏蔽 Discord
自 9 月 20 日以来,俄罗斯媒体监管机构 Roskomnadzor 发出了五项与 Discord 相关的裁决。俄罗斯日报《生意人报(Kommersant)》表示,对 Discord 的...
2024-10-1 21:11:39 | 阅读: 0 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
生意人
kommersant
下达
slashdot
0052226
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community
On the eastern shores of San Francisco, you will find The Embarcadero. Embarcadero, which means “p...
2024-10-1 21:4:6 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
developers
appsec
reeny
securely
Lumoz: Leading ZK-PoW Algorithm, ZK Computation Efficiency Improved by 50%
Abstract: The new optimization plan preserves the original decentralized and market-driven ZK comput...
2024-10-1 21:3:7 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
zk
lumoz
computation
pow
Securing the software supply chain with the SLSA framework
By Cliff SmithSoftware supply chain security has been a hot topic since the Sola...
2024-10-1 21:0:58 | 阅读: 1 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
provenance
slsa
software
artifact
security
Securing the software supply chain with the SLSA framework
By Cliff SmithSoftware supply chain security has been a hot topic since the Solarwinds breach back...
2024-10-1 21:0:58 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
provenance
slsa
software
security
artifact
Exabeam Brings AI Security Operations to On-Premises, Cloud Native and Hybrid Environments
Security operations platform provider Exabeam announced its first product release since acquiring L...
2024-10-1 21:0:2 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
exabeam
cloud
threats
logrhythm
CMMC 2.0: A Roadmap to Compliance with Trustwave
October 01, 2024 4 Minute Read...
2024-10-1 21:0:0 | 阅读: 6 |
收藏
|
Trustwave Blog - www.trustwave.com
cmmc
security
dod
accelerator
microsoft
How to Unlock Advanced IoT Visibility for Cyber-Physical Systems
As the number of IoT devices deployed globally continues to rise, cyber-physical systems and busines...
2024-10-1 21:0:0 | 阅读: 3 |
收藏
|
Tenable Blog - www.tenable.com
security
leaders
asset
unified
Previous
502
503
504
505
506
507
508
509
Next