不安全
Analyzing an esp32 flash dump with ghidra
1 year 3 months ago
Come mitigare le frodi bancarie con nuove procedure
1 year 3 months ago
Secondo il Forrester Fraud Research Report 2023 di E
Congressional Staffers’ Data Leaked on Dark Web: Report
1 year 3 months ago
Personal data from almost 3,200 Capitol Hill staffers, including passwords and IP addresses, report
Investigating Infrastructure and Tactics of Phishing-as-a-Service Platform Sniper Dz
1 year 3 months ago
Executive SummaryWe have been monitoring a widely popular phishing-as-a-service (P
Linux i915 PTE Use-After-Free
1 year 3 months ago
Linux i915 PTE Use-After-FreeI found a bug in the i915 code that allows a process with access to a
Apple iOS 17.2.1 Screen Time Passcode Retrieval / Mitigation Bypass
1 year 3 months ago
Apple iOS 17.2.1 Screen Time Passcode Retrieval / Mitigation BypassDocument Title:===============
Elaine's Realtime CRM Automation 6.18.17 Cross Site Scripting
1 year 3 months ago
# Exploit Title: Reflected XSS in Elaine's Realtime CRM Automation v6.18.17# Date: 09/2024# Exploi
C3pbot, Kaspersky, Octo2 , Honkai: Star Rail, ServiceNow, LinkedIn... - SWN #416
1 year 3 months ago
Welcome to the Security Weekly Podcast Network, your all-in-one so
CrowdStrike Gets Grilled By U.S. Lawmakers Over Faulty Software Update
1 year 3 months ago
In what has become an annual ritual between Silicon Valley and the Beltway, a House sub
A generative artificial intelligence malware used in phishing attacks
1 year 3 months ago
A generative artificial intelligence malware used in phishing attacks Pierluigi Paganini Septe
Kansas water plant cyberattack forces switch to manual operations
1 year 3 months ago
error code: 1106
Are You Hungry, Bro? Let’s Hack Your Favorite Food Delivery App
1 year 3 months ago
The way a top hacker views the world is miles apart from the daily grind of tech workers clocking i
How to Figure Out What Users Want, Fast
1 year 3 months ago
And how to score a Lambo as a result - well, sort of.TL;DRClickbait headline ✅The Startup Roller
USENIX NSDI ’24 – A Large-Scale Deployment of DCTCP
1 year 3 months ago
Authors/Presenters:Abhishek Dhamija, Balasubramanian Madhavan, Hechao Li, Jie Meng, Shr
Diddy Do It? Or Did Cybercriminals? How Hackers Are Turning Scandals Into Cyber Attacks
1 year 3 months ago
Attackers often capitalize on public interest in high-profile scandals to spread malwa
U.S. govt agency CMS says data breach impacted 3.1 million people
1 year 3 months ago
error code: 1106
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
1 year 3 months ago
Sep 24, 2024APIs are essential to modern application architectures, drivingrapid development, seaml
OSINT : User Privacy in Linux
1 year 3 months ago
Linux telemetry involves gathering and sending data from a Linux-based system to an
Study finds many European car resellers fail to delete driver data
1 year 3 months ago
European auto resellers are violating the continent’s tough data privacy laws, according to a new s
Checked
4 hours 48 minutes ago
unSafe.sh - 不安全
不安全 feed