不安全
Re @_FriedrichMerz Die Gelegenheit dazu gab es doch neulich schon - da haben sie den eigenen Antrag zurückgezogen, obgleich er wahrscheinlich angenom...
11 months 1 week ago
Escape vs Probely (acquired by Snyk)
11 months 1 week ago
Finding the right tools for your AppSec team can be a daunting task. Especially, when it comes
Breaking Down the Baseband : Shannon in a nutshell
11 months 1 week ago
Over the past 30 years, technology has revolutionized communications. Mobile phones, now owned by ab
Lithuania’s New Cyber Command is a Strategic Step Towards National and NATO Cybersecurity Resilience
11 months 1 week ago
ProductsFor Enterprises(B2B)
AI Chatbot Helps Manage Telegram Communities Like a Pro
11 months 1 week ago
Communities, chats, and forums are an endless source of information on a multitude of topics. Slack
Get real about container security: 4 essential practices to manage risk
11 months 1 week ago
The use of container technologies for software development and release has proliferated over the
JS利用
11 months 1 week ago
hakrawler — 简单、快速的网络爬虫,旨在轻松、快速地发现网络应用程序中的端点和资产crawley——用 Golang 编写的快速、功能丰富的 unix 方式网络抓取/爬虫katana — 下
how to find out an email from someone's Instagram account
11 months 1 week ago
Educational Byte: Cryptocurrency Mining and Centralization Issues
11 months 1 week ago
As you may know, anything and everything in the digital realm can be replicated —copied and pasted.
How can I turn a Sony Smart TV (non-Android) into a streaming TV with all the essential apps for free binge-watching?
11 months 1 week ago
Product Review: How Reco Discovers Shadow AI in SaaS
11 months 1 week ago
As SaaS providers race to integrate AI into their product offerings to stay competitive and relevan
U.S. CISA adds Ivanti Connect Secure, Policy Secure, and ZTA Gateways flaw to its Known Exploited Vulnerabilities catalog
11 months 1 week ago
U.S. CISA adds Ivanti Connect Secure, Policy Secure, and ZTA Gateways flaw to its Kno
The (Almost) Forgotten Vulnerable Driver
11 months 1 week ago
Vulnerable Windows drivers remain one of the most exploited methods attackers use to gain access
Nuovo formato per ClamAV disponibile tramite il flusso IoC del CERT-AGID
11 months 1 week ago
09/01/2025 ClamAVIoC Da oggi, il Fluss
Fortinet CISO Details ‘Phish-Free’ Phishing Scheme Using PayPal
11 months 1 week ago
A hacker is using Microsoft 365 test domains and distribution lists they create in a phishing ca
finidng ip/adress
11 months 1 week ago
United Nations aviation agency hacked, recruitment database plundered
11 months 1 week ago
The United Nations' aviation agency has confirmed that hackers have compromised its systems, and a
【安全圈】Redis服务器曝2个严重的RCE漏洞,数百万系统面临风险
11 months 1 week ago
关键词安全漏洞在广泛使用的内存数据库Redis里,发现了两个严重漏洞,这可能使数百万系统面临拒绝服务(DoS)攻击和远程代码执行(RCE)的风险。这些漏洞被标记为CVE - 2024 - 51741和
【安全圈】2025年需要防范这五大恶意软件
11 months 1 week ago
关键词恶意软件2024年发生了多起引人注目的网络攻击,像戴尔和TicketMaster这样的大公司也都成为了数据泄露和其他基础设施攻击的受害者。到2025年,这样的趋势还将持续下去。正所谓知己知彼百战
Checked
19 hours 33 minutes ago
unSafe.sh - 不安全
不安全 feed