Aggregator
Dark web threats and dark market predictions for 2025
8 months 3 weeks ago
Review of last year’s predictionsThe number of services providing AV evasion for malw
ESET Threat Report H2 2024
8 months 3 weeks ago
A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
安卓高研2w班内容更新:第18章课时4-课时8
8 months 3 weeks ago
近期更新:1. 2024-12-16 更新 课时8.环境课.p6刷安卓15和KSU导证书抓包eBPF升内核2. 2024-12-16 更新 课时7. 定制KernelSU绕过frida检测思路介绍3.
《电力监控系统安全防护规定》发布,强化新型电力系统安全防护体系
8 months 3 weeks ago
随着全球网络安全要求的日益严格,中国的电力行业也在不断推进自身的安全防护工作。为了深化能源管理体制改革,确保电力监控系统在新的技术环境下保持安全稳定,国家发展改革委员会于2024年12月12日正式发布
某云音乐爬取:反调试绕过、js调用栈回溯、Web算法逆向
8 months 3 weeks ago
一前言本文以某云音乐爬虫案例为基础,详细探讨了从工具准备到目标数据爬取的全过程,包括爬取目标的需求分析、关键数据的识别以及加密参数的解析和破解。在学习其他案例是发现很多爬虫文章都是莫名其妙的获得某些数
安卓高研2w班内容更新:第18章课时4-课时8
8 months 3 weeks ago
为了能抓到包,无数安全研究人员使出浑身解数,我们可以按照OSI七层模型或TCP/IP四层模型,将这些方法进行粗略的分类。
《电力监控系统安全防护规定》发布,强化新型电力系统安全防护体系
8 months 3 weeks ago
《电力监控系统安全防护规定》全文发布,2025年起施行
某云音乐爬取:反调试绕过、js调用栈回溯、Web算法逆向
8 months 3 weeks ago
看雪论坛作者ID:Brinmon
От рецепта карри до картин Да Винчи: Google учит Astra понимать вас с полуслова
8 months 3 weeks ago
Репортаж из секретной лаборатории DeepMind.
派评 | 近期值得关注的 App
8 months 3 weeks ago
欢迎收看本期《派评》。你可以通过文章目录快速跳转到你感兴趣的内容。如果发现了其它感兴趣的 App 或者关注的话题,也欢迎在评论区和我们讨论。不容错过的 App 更新除了「新鲜」App,App Stor
python打包成exe教程
8 months 3 weeks ago
注意,最好用管理员权限运行cmd,否则可能安装包过程中报错普通打包下载pyinstaller,cmd执行:pip install pyinstaller打包,cm
python打包成exe教程
8 months 3 weeks ago
注意,最好用管理员权限运行cmd,否则可能安装包过程中报错普通打包下载pyinstaller,cmd执行:pip install pyinstaller打包,cmd执行:pyinstaller ...
黑海洋
CBDCs Hold Promise and Peril in Global Finance Overhaul, Study Finds
8 months 3 weeks ago
This research examines the diverse implications of Central Bank Digital Currencies (CBDCs) on econom
Xfce 4.20 释出
8 months 3 weeks ago
Xfce 轻量级桌面环境项目在大约两年的开发之后释出了 v4.20 版本。主要新特性包括:实验性支持 Wayland,同时继续支持 X11,Xfce 还没有原生的 Wayland 合成器,Xfwm4 未来会支持;改进了图标和缩略图缩放,Exo-Icon-View 能处理 10 万文件而不会卡死;新的 libxfce4windowing 库;改进 Thunar 文件管理器,性能优化,等等。
Xfce 4.20 释出
8 months 3 weeks ago
Xfce 轻量级桌面环境项目在大约两年的开发之后释出了 v4.20 版本。主要新特性包括:实验性支持 Wayland,同时继续支持 X11,Xfce 还没有原生的 Wayland 合成器,
CVE-2024-12478 | InvoicePlane up to 1.6.1 upload_file unrestricted upload
8 months 3 weeks ago
A vulnerability was found in InvoicePlane up to 1.6.1. It has been declared as critical. This vulnerability affects the function upload_file of the file /index.php/upload/upload_file/1/1. The manipulation of the argument file leads to unrestricted upload.
This vulnerability was named CVE-2024-12478. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
It is recommended to upgrade the affected component.
The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
vuldb.com
CVE-2024-12362 | InvoicePlane up to 1.6.1 invoices.php download invoice path traversal
8 months 3 weeks ago
A vulnerability was found in InvoicePlane up to 1.6.1. It has been classified as problematic. This affects the function download of the file invoices.php. The manipulation of the argument invoice leads to path traversal.
This vulnerability is uniquely identified as CVE-2024-12362. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
It is recommended to upgrade the affected component.
The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
vuldb.com
CVE-2024-12667 | InvoicePlane up to 1.6.1 /invoices/view session expiration
8 months 3 weeks ago
A vulnerability was found in InvoicePlane up to 1.6.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /invoices/view. The manipulation leads to session expiration.
This vulnerability is handled as CVE-2024-12667. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
It is recommended to upgrade the affected component.
The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
vuldb.com
Как «угнать» любую нейросеть за 24 часа? TPUXtract раскрывает все секреты
8 months 3 weeks ago
ЭМ-излучение становится главным оружием кибершпионов.