Aggregator
安全通告 - 涉及华为某打印机产品的系统命令注入漏洞
2 years 3 months ago
Sensor Intel Series: Top CVEs in March 2023
2 years 3 months ago
Some IoT vulnerabilities, some Microsoft Exchange vulnerabilities, but not too much going on in March.
密码保护:OSDA-LAB-Challenge11 笔记
2 years 3 months ago
无法提供摘要。这是一篇受保护的文章。
glzjin
ATT&CK v13 Enters the Room
2 years 3 months ago
Amy L. Robertson
Critical Flaw in Sophos Web Appliance
2 years 3 months ago
Summary
Sophos has released an update to mitigate three vulnerabilities in the Sophos Web Appliance (SWA). The most important of these three flaws is rated as critical and if exploited could lead to the execution of arbitrary code.
Threat Type
Vulnerability
Overview
**Update 04/25/2023**
According to multiple sources, now that the patch for this vulnerability has been reverse engineered, functional Proof of Concept (POC) exploit code has been released. The POC code is available now to the public on Github
Our Journey with FlexBase Emissions
2 years 3 months ago
Katie Robinson
Akamai Prolexic Now Comes With a Network Cloud Firewall
2 years 3 months ago
Sven Dummer
CHIPS for America Outlines Vision for the National Semiconductor Technology Center
2 years 3 months ago
Today, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) released a paper outlining its vision and strategy for a National Semiconductor Technology Center (NSTC), a key component of the research and development
Leah Kauffman
监管政策一图概览:“深度伪造”技术的样态、场景和风险
2 years 3 months ago
深度伪造技术在近几年迅速兴起,这种技术可以利用人工智能和大数据生成虚假图片、视频、文本等,其逼真程度往往让人难辨真伪,给政治安全、经济安全、社会安全、国民安全等国家安全领域带来了诸多风险。
监管政策一图概览:“深度伪造”技术的样态、场景和风险
2 years 3 months ago
深度伪造技术在近几年迅速兴起,这种技术可以利用人工智能和大数据生成虚假图片、视频、文本等,其逼真程度往往让人难辨真伪,给政治安全、经济安全、社会安全、国民安全等国家安全领域带来了诸多风险。
监管政策一图概览:“深度伪造”技术的样态、场景和风险
2 years 3 months ago
深度伪造技术在近几年迅速兴起,这种技术可以利用人工智能和大数据生成虚假图片、视频、文本等,其逼真程度往往让人难辨真伪,给政治安全、经济安全、社会安全、国民安全等国家安全领域带来了诸多风险。
监管政策一图概览:“深度伪造”技术的样态、场景和风险
2 years 3 months ago
深度伪造技术在近几年迅速兴起,这种技术可以利用人工智能和大数据生成虚假图片、视频、文本等,其逼真程度往往让人难辨真伪,给政治安全、经济安全、社会安全、国民安全等国家安全领域带来了诸多风险。
监管政策一图概览:“深度伪造”技术的样态、场景和风险
2 years 3 months ago
深度伪造技术在近几年迅速兴起,这种技术可以利用人工智能和大数据生成虚假图片、视频、文本等,其逼真程度往往让人难辨真伪,给政治安全、经济安全、社会安全、国民安全等国家安全领域带来了诸多风险。
New Vulnerability: PaperCut MF/NG
2 years 3 months ago
On Friday, April 21, 2023, CISA added CVE-2023-27350 (a critical unauthenticated remote code execution vulnerability) impacting PaperCut MF and PaperCut NG to the Known Exploited Vulnerabilities (KEV) list. PaperCut MF and PaperCut NG are both enterprise printer management software.
Active Exploitation Attempts (CVE-2023-1389) Against TP-Link Archer Gigabit Internet Routers
2 years 3 months ago
GreyNoise, in conjunction with TrinityCyber, has observed active exploitation attempts using weaknesses found in CVE-2023-1389 against TP-Link Archer gigabit routers. This post provides information about a new GreyNoise tag for this activity as well as details on the exploit attempt and how organizations can keep themselves safe from harm.
密码保护:OSDA-LAB-Challenge10 笔记
2 years 3 months ago
无法提供摘要。这是一篇受保护的文章。
glzjin
修改itunes备份苹果手机默认路径
2 years 3 months ago
最近手机空间越来越小,备份以后删除一些不必要的文件就显得很重要了。 但是默认情况下itunes备份ios数据是 […]
梧桐雨
Akamai Brand Protector Solves the Growing Problem of Impersonation Attacks
2 years 3 months ago
Danielle Walter
同程黑盒漏洞扫描系统 - 飞刃(nextscan)正式发布
2 years 3 months ago