不安全
【资料】全源情报分析指南
11 months ago
环境异常 当前环境异常,完成验证后即可继续访问。 去验证
Over 5,000 WordPress sites caught in WP3.XYZ malware attack
11 months ago
Need residential network security consultant in Dallas area
11 months ago
击穿星巴克获取 1 亿用户详细信息
11 months ago
背景 有一种攻击叫做: 次级上下文穿越攻击, 也许单听名字你不理解这是怎么样一种攻击。但是下面我将用星巴克被攻陷的一个真实案例来跟你介绍这种巧妙的攻击方式以及它给我带来了怎么样的思考!正文 在尝试了一
Best course for beginner in hacking and cyber security
11 months ago
Insurance company accused of using secret software to illegally collect and sell location data on millions of Americans
11 months ago
Insurance company Allstate and its subsidiary Arity unlawfully collecte
A new campaign is likely targeting a zero-day in Fortinet FortiGate firewalls
11 months ago
A new campaign is likely targeting a zero-day in Fortinet FortiGate firewalls
Threat Brief: Y2Q and the Convergence of AI Compute and Quantum Computing Power
11 months ago
OverviewY2Q, shorthand for “Year to Quantum” – marks the critical point when quantum compute
Products and people are in place for CISA to succeed, agency’s departing No. 2 official says
11 months ago
Nitin Natarajan joined the Cybersecurity and Infrastructure Security Agency (CISA) in the early day
Threat Intelligence Pivoting: Actionable Insights Behind Indicators
11 months ago
Pivoting in cyber thre
The First Password on the Internet
11 months ago
It was created in 1973 by Peter Kirstein:So from the beginning I put password protection
BSIMM15: New focus on securing AI and the software supply chain
11 months ago
Three BSIMM15 software security trends Regulatory pressures to secure the software supply chain
268 - WhatsApp vs. NSO and CCC Talks
11 months ago
Home Blog Podcast Vulns About Us Contact
One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networks
11 months ago
Executive SummaryWhen launching and persisting attacks at scale, threat actors can
How To Make Cross-Chain Tokens Fungible Again: Part I
11 months ago
IntroductionThe modular maxis say the future of crypto is a million (or more) interconnected domain
【安全圈】不干净的视频评论区,攻击者利用Youtube传播窃密软件
11 months ago
关键词趋势科技的一项调查研究发现,为了尽可能传播恶意软件,攻击者正利用Youtube评论区、谷歌搜索等渠道提供其恶意下载链接。研究人员称,为了增加其恶意内容的可信度,攻击者以一些热门Youtube频道
【安全圈】AI抢不走的工作,微软力挺红队测试仍需人类“掌舵”
11 months ago
关键词人工智能随着AI的快速发展,安全专家担心人工智能会取代他们的工作,但微软的研究人员坚持认为,有效的红队测试仍然依赖于人类的专业知识、文化意识和情商——这些品质是机器无法复制的。微软的AI红队严格
【安全圈】为网络安全研究人员定制的虚假漏洞利用攻击利用恶意软件
11 months ago
关键词恶意软件根据Trend Micro的最新研究,针对CVE-2024-49113这个曾经存在于Microsoft的Windows轻量级目录访问协议(LDAP)中的拒绝服务(DoS)漏洞,识别出了一
【安全圈】2025年首个满分漏洞,PoC已公布,可部署后门
11 months ago
关键词安全漏洞云攻击者正在大肆利用名为Max - Critical Aviatrix RCE漏洞(编号CVE - 2024 - 50603),此漏洞在CVSS评分中高达10分(满分10分),能够在受影
Checked
5 hours 49 minutes ago
unSafe.sh - 不安全
不安全 feed