unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Using Generative AI to Understand How an Obfuscated Script Works
Tackling Code ObfuscationWhen facing a new technical challenge, I’m someone who often feels “i...
2024-3-28 21:30:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
certutil
generative
b64
windows
hyas
Telegram测试P2PL服务 利用用户手机向其他用户发送验证码
2024-3-28 21:28:43 | 阅读: 5 |
收藏
|
蓝点网 - www.landiannews.com
蓝点
p2pl
premium
otp
C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements
Jerusalem, Israel, March 28th, 2024, Cyberwire In 2023 alone, more than 10 customers and partners...
2024-3-28 21:23:11 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
c2a
evsec
software
regulation
Russian researchers say espionage operation using WinRAR bug is linked to Ukraine
Russian security researchers said they have discovered a new cyber-espionage group with links to Uk...
2024-3-28 21:16:13 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ukraine
phantomrat
phantomcore
russia
winrar
DinodasRAT Linux implant targeting entities worldwide
DinodasRAT, also known as XDealer, is a multi-platform backdoor written in C++ that of...
2024-3-28 21:0:51 | 阅读: 3 |
收藏
|
Securelist - securelist.com
c2
dinodasrat
windows
encryption
network
How a Security Data Fabric Approach Can Transform the GRC Function
New data privacy regulations are being added all the time – including statewide, national and indus...
2024-3-28 21:0:42 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
fabric
grc
Trustwave MailMarshal Unveils Major Upgrades to Combat New Email Security Threats
Trustwave MailMarshal will receive a massive upgrade on March 28 that will add...
2024-3-28 21:0:0 | 阅读: 0 |
收藏
|
Trustwave Blog - www.trustwave.com
mailmarshal
threats
malicious
qr
dane
What Do You Know About Document-Driven Development?
Too Long; Didn't ReadDocumentation plays a vital role in software development, ensuring understandin...
2024-3-28 20:48:59 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
development
stages
adr
evolving
New Webinar: Avoiding Application Security Blind Spots with OPSWAT and F5
Application Security / WebinarConsidering the ever-changing state of cybersecurity, it's never too...
2024-3-28 20:43:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
opswat
webinar
spots
研究发现连续两晚睡眠断断续续会让人感觉老了几岁
研究发现连续两晚睡眠断断续续会让人感觉老了几岁。瑞典心理学家发现,当参与者连续两晚只睡四个小时,他们会觉得老了四岁多,部分人甚至声称感觉老了几十岁。当被允许在床上睡九个小时,研究参与者声称...
2024-3-28 20:31:49 | 阅读: 0 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
瑞典
proceedings
royal
SCCM Exploitation: Account Compromise Through Automatic Client Push & AD System Discovery
2024-3-28 20:25:0 | 阅读: 0 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
Google: China dominates government exploitation of zero-day vulnerabilities in 2023
Google: China dominates government exploitation of zero-day vulnerabilities in 2023Google’s Th...
2024-3-28 20:14:47 | 阅读: 6 |
收藏
|
Security Affairs - securityaffairs.com
exploited
chrome
mandiant
北漂安服仔坦白局|“月入一万”的副业分享
主站 分类 漏洞 工具 极客...
2024-3-28 20:12:3 | 阅读: 0 |
收藏
|
FreeBuf网络安全行业门户 - www.freebuf.com
安全
帮会
副业
网络
Public Report – Google Privacy Sandbox Aggregation Service and Coordinator
During the winter of 2022, Google engaged NCC Group to conduct an in-depth...
2024-3-28 19:59:0 | 阅读: 2 |
收藏
|
NCC Group Research - research.nccgroup.com
aggregation
ltair
security
initiative
vultur
A Private Utopia: Anarcho-capitalism, DLT, and Cryptocurrencies
by Obyte5mMarch 28th, 2024Too Long; Didn't ReadThe convergence of cryptocurrencies with anarcho-ca...
2024-3-28 19:40:59 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
investment
advice
presents
regard
28th
Destructive IoT Malware Emulation – Part 1 of 3 – Environment Setup
Everyone who has delved a bit into malware analysis knows that you don’t actually need...
2024-3-28 19:39:46 | 阅读: 2 |
收藏
|
cyber.wtf - cyber.wtf
qiling
emulation
acidrain
0x3
sda
Solana Drainer’s Source Code Saga: Tracing Its Lineage to the Developers of MS Drainer
Key TakeawaysThreat actors (TAs) are actively exploiting platforms like Google Ads and soc...
2024-3-28 19:31:43 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
drainer
solana
tas
phishing
malicious
PyPi Is Under Attack: Project Creation and User Registration Suspended
By...
2024-3-28 19:31:30 | 阅读: 6 |
收藏
|
Checkmarx.com - checkmarx.com
2024remove
projectpy
projectbip
malicious
software
Rrgen - A Header Only C++ Library For Storing Safe, Randomly Generated Data Into Modern Containers
This library was developed to combat insecure methods of storing random data into modern C++...
2024-3-28 19:30:0 | 阅读: 1 |
收藏
|
KitPloit - PenTest Tools! - www.kitploit.com
rrgen
rrstack
rrlist
rrand
rrvec
Update Chrome now! Google patches possible drive-by vulnerability
Google has released an update to Chrome which includes seven security fixes. Version 123.0.6312...
2024-3-28 19:25:58 | 阅读: 1 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
memory
chrome
attacker
corruption
Previous
7
8
9
10
11
12
13
14
Next