Aggregator
【安全圈】迄今为止最大BEC骗局被侦破!国际刑警组织利用I-GRIP为企业追回 4100 万美元
8 months 2 weeks ago
【安全圈】自2018年一直被黑客利用,Windows又一“后门”揭秘
8 months 2 weeks ago
【安全圈】知名黑客公开近30亿条国家公共数据,包括全名、地址、SSN...
8 months 2 weeks ago
Максим Макаров о роли программного обеспечения в цифровой трансформации бизнеса
8 months 2 weeks ago
Статья рассматривает цифровую трансформацию как ключевой компонент стратегии изменений в современном бизнесе. Подчеркивается значимость правильных технологий в сочетании с людьми, процессами и операциями для адаптации к меняющимся потребностям клиентов, стимулирования роста и инноваций. Особое внимание уделено роли программного обеспечения в этом процессе в контексте современной промышленной революции и цифровизации.
SAC и SmartScreen: благие намерения или реальная угроза?
8 months 2 weeks ago
Исследование раскрывает уязвимости в механизмах безопасности Windows с 2018 года.
Dataprise Acquires Phoenix IT Adding Cyber Incident Response & Remediation Services
8 months 2 weeks ago
Votiro Unveils New Data Privacy Features and Integrations
8 months 2 weeks ago
通过Elasticsearch服务发现的信息泄露
8 months 2 weeks ago
Кибервойны XXI века: кто встанет на защиту цифрового пространства?
8 months 2 weeks ago
EC-Council инвестирует миллионы в будущее информационной безопасности.
每日安全动态推送(8-7)
8 months 2 weeks ago
Tencent Security Xuanwu Lab Daily News• GitHub - Aegrah/PANIX: Customizable Linux Persistence Tool f
Why tech-savvy leadership is key to cyber insurance readiness
8 months 2 weeks ago
Having knowledgeable leaders at the helm is crucial for protecting the organization and securing the best possible cyber insurance coverage
微软宣布绩效改革:员工工资与安全直接挂钩
8 months 2 weeks ago
缺乏安全意识的员工可能会影响晋升、薪资增长和奖金的发放。
巴黎奥运会比赛场馆遭勒索软件攻击
8 months 2 weeks ago
自奥运会开赛以来,法国已经阻止了数十起网络攻击。
США приравняют вымогательство к терроризму
8 months 2 weeks ago
Страны-укрыватели киберпреступников рискуют попасть под санкции США.
Microsoft 365 Anti-phishing Feature Bypassed Using CSS Style Tags
8 months 2 weeks ago
Phishing is the most effective method for an attacker to infiltrate an organization. Several attack methods and techniques are available for an attacker to send a phishing email. On the other hand, email clients such as Outlook or Gmail also have security measures to warn users whenever they receive an unknown email. One such security […]
The post Microsoft 365 Anti-phishing Feature Bypassed Using CSS Style Tags appeared first on Cyber Security News.
Guru Baran
Building a Local Security AI Big Model Attack and Defence Knowledge Base from Scratch
8 months 2 weeks ago
Author:Hcamael@Knownsec 404 Team
Chinese version: https://paper.seebug.org/3210/
In this paper, we will systematically share the problems encountered and their solutions during the process of build...
原创 Paper | 从零开始搭建本地安全 AI 大模型攻防知识库
8 months 2 weeks ago
本文系统地分享了从零开始搭建本地大模型问答知识库过程中所遇到的问题及其解决方案。
从零开始搭建本地安全 AI 大模型攻防知识库
8 months 2 weeks ago
作者:Hcamael@知道创宇404实验室
英文版: https://paper.seebug.org/3211/
本文将系统分享从零开始搭建本地大模型问答知识库过程中所遇到的问题及其解决方案。
1 概述
目前,搭建大语言问答知识库能采用的方法主要包括微调模型、再次训练模型以及增强检索生成(RAG,Retrieval Augmented Generation)三种方案。
而我们的目标是希望能...
CVE-2024-5290 | Canonical wpa_supplicant uncontrolled search path
8 months 2 weeks ago
A vulnerability was found in Canonical wpa_supplicant and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to uncontrolled search path.
This vulnerability is handled as CVE-2024-5290. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com