不安全
Need residential network security consultant in Dallas area
11 months 2 weeks ago
击穿星巴克获取 1 亿用户详细信息
11 months 2 weeks ago
背景 有一种攻击叫做: 次级上下文穿越攻击, 也许单听名字你不理解这是怎么样一种攻击。但是下面我将用星巴克被攻陷的一个真实案例来跟你介绍这种巧妙的攻击方式以及它给我带来了怎么样的思考!正文 在尝试了一
Best course for beginner in hacking and cyber security
11 months 2 weeks ago
Insurance company accused of using secret software to illegally collect and sell location data on millions of Americans
11 months 2 weeks ago
Insurance company Allstate and its subsidiary Arity unlawfully collecte
A new campaign is likely targeting a zero-day in Fortinet FortiGate firewalls
11 months 2 weeks ago
A new campaign is likely targeting a zero-day in Fortinet FortiGate firewalls
Threat Brief: Y2Q and the Convergence of AI Compute and Quantum Computing Power
11 months 2 weeks ago
OverviewY2Q, shorthand for “Year to Quantum” – marks the critical point when quantum compute
Products and people are in place for CISA to succeed, agency’s departing No. 2 official says
11 months 2 weeks ago
Nitin Natarajan joined the Cybersecurity and Infrastructure Security Agency (CISA) in the early day
Threat Intelligence Pivoting: Actionable Insights Behind Indicators
11 months 2 weeks ago
Pivoting in cyber thre
The First Password on the Internet
11 months 2 weeks ago
It was created in 1973 by Peter Kirstein:So from the beginning I put password protection
BSIMM15: New focus on securing AI and the software supply chain
11 months 2 weeks ago
Three BSIMM15 software security trends Regulatory pressures to secure the software supply chain
268 - WhatsApp vs. NSO and CCC Talks
11 months 2 weeks ago
Home Blog Podcast Vulns About Us Contact
One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networks
11 months 2 weeks ago
Executive SummaryWhen launching and persisting attacks at scale, threat actors can
How To Make Cross-Chain Tokens Fungible Again: Part I
11 months 2 weeks ago
IntroductionThe modular maxis say the future of crypto is a million (or more) interconnected domain
【安全圈】不干净的视频评论区,攻击者利用Youtube传播窃密软件
11 months 2 weeks ago
关键词趋势科技的一项调查研究发现,为了尽可能传播恶意软件,攻击者正利用Youtube评论区、谷歌搜索等渠道提供其恶意下载链接。研究人员称,为了增加其恶意内容的可信度,攻击者以一些热门Youtube频道
【安全圈】AI抢不走的工作,微软力挺红队测试仍需人类“掌舵”
11 months 2 weeks ago
关键词人工智能随着AI的快速发展,安全专家担心人工智能会取代他们的工作,但微软的研究人员坚持认为,有效的红队测试仍然依赖于人类的专业知识、文化意识和情商——这些品质是机器无法复制的。微软的AI红队严格
【安全圈】为网络安全研究人员定制的虚假漏洞利用攻击利用恶意软件
11 months 2 weeks ago
关键词恶意软件根据Trend Micro的最新研究,针对CVE-2024-49113这个曾经存在于Microsoft的Windows轻量级目录访问协议(LDAP)中的拒绝服务(DoS)漏洞,识别出了一
【安全圈】2025年首个满分漏洞,PoC已公布,可部署后门
11 months 2 weeks ago
关键词安全漏洞云攻击者正在大肆利用名为Max - Critical Aviatrix RCE漏洞(编号CVE - 2024 - 50603),此漏洞在CVSS评分中高达10分(满分10分),能够在受影
工信部认可!360荣获车联网产品安全漏洞专业库“优秀技术支撑单位”
11 months 2 weeks ago
近日,由中汽数据有限公司主办的车联网产品安全漏洞专业库(NVDB-CAVD)2024年终总结会在北京圆满落幕。360数字安全集团受邀出席,荣获工业和信息化网络安全威胁和漏洞信息共享平台车联网产品安全漏
2025 Prediction 3: Digital Security Will Expand Beyond Privacy Concerns To Include Holistic, Integrated Cyber and Physical Protection
11 months 2 weeks ago
On January 7, we published a press release to share our five predictions for cybersecurity in 20
Checked
23 minutes 17 seconds ago
unSafe.sh - 不安全
不安全 feed