unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Bitrise Mobile Report: New Benchmarks & 28% Faster Build Times
New StorybyBitrisebyBitrise@bitriseThe CI/CD Platform built for Mobile DevOpsNovember 27th, 2025Tra...
2025-11-27 20:50:14 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
web3
stem
milestone
bitrisethe
girls
How Decentralized Finance and Gaming are Reshaping Digital Economies
New StorybyBernardbyBernard@bernardmutugiWelcome to my space. I write cool web 3 stuffNovember 27th...
2025-11-27 20:38:38 | 阅读: 9 |
收藏
|
Hacker Noon - hackernoon.com
stories
repodec
farmadeline
metaverse
Technance Introduces Institutional-Grade Infrastructure for Exchanges, Fintech Platforms & Web3 Apps
New StorybyChainwirebyChainwire@chainwireThe world's leading crypto & blockchain press release dist...
2025-11-27 20:34:49 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
stories
repodec
development
Custom Logic in Webflow: How to Push No-Code to Its Limits
2025-11-27 20:32:25 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
tips
development
startups
pieces
AI Models Keep Breaking in Production; Strong Documentation Can Fix It
New StorybySapan PandyabySapan Pandya@sapan-pandyaA software engineer & independent researcher with...
2025-11-27 20:23:48 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
software
regulated
designing
pandya
sapan
Stablecoin Regulation as a Threat to Stablecoins Themselves
New StorybyChristopher Louis TsubyChristopher Louis Tsu@louistsuChief Executive Officer at Venom Fo...
2025-11-27 20:17:38 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
louis
venom
regulation
tsu
officer
Clean Code in Go (Part 4): Package Architecture, Dependency Flow, and Scalability
New StorybyVladimir YakovlevbyVladimir Yakovlev@yakovlefTeam Lead | Software EngineerNovember 27th,...
2025-11-27 20:12:5 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
yakovlev
stories
software
omeyeroct
Stop Treating Risk Assessment Like Corporate Horoscopes
New StorybyHuibyHui@huizhudevAI Prompt Engineer, SEOer and GEO/AEOer.November 27th, 2025Your browse...
2025-11-27 20:6:14 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
seoer
geo
aeoer
huizhudevai
llm
Disabling the floating thumbnail preview for screenshots on macOS Tahoe
Home > Documentation, macOS > Disabling the floating thumbnail preview for screenshots on macOS...
2025-11-27 20:4:32 | 阅读: 5 |
收藏
|
Der Flounder - derflounder.wordpress.com
thumbnail
floating
tahoe
Asahi says crooks stole data of approximately 2M customers and employees
Asahi says crooks stole data of approximately 2M customers and employees...
2025-11-27 20:3:37 | 阅读: 6 |
收藏
|
Security Affairs - securityaffairs.com
asahi
ransomware
stole
japan
gender
How Crypto is Getting Centralized (and What We Can Do About It)
New StorybyObytebyObyte@obyteA ledger without middlemenNovember 27th, 2025Translations ENKOESHIVIPT...
2025-11-27 20:2:8 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
governance
ledger
obytea
Agentic UX Over "Chat": How to Design Multi-Agent Systems People Actually Trust
New StorybyVictor ChurchillbyVictor Churchill@designchurchillVictor is a Senior Product Designer at...
2025-11-27 19:38:41 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
papers
modelsjun
waypoint
senior
churchill
Poland detains Russian citizen suspected of hacking local firms
Polish authorities detained a Russian citizen suspected of hacking into the IT systems of local com...
2025-11-27 19:1:14 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
poland
warsaw
authorities
moscow
sabotage
The minefield between syntaxes: exploiting syntax confusions in the wild
This writeup details innovative ‘syntax confusion’ techniques exploiting how two or mo...
2025-11-27 18:36:19 | 阅读: 4 |
收藏
|
Technical Information Security Content & Discussion - www.reddit.com
confuse
parsers
ambiguous
brumens
Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
Malware / Social EngineeringThe threat actor known as Bloody Wolf has been attributed to a cyber a...
2025-11-27 18:13:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
netsupport
wolf
uzbekistan
bloody
kyrgyzstan
C-Level e cyber security: il ransomware è la minaccia più urgente
Il ransomware (il “virus del riscatto”) non è più un rischio astratto, ma una minaccia concreta e qu...
2025-11-27 17:16:36 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
più
ha
nel
Windows PHP Web Shell & Reverse Shell Techniques
Windows Web Shell & Reverse Shell Techniques: Complete GuideUpdated on November 27, 2025...
2025-11-27 17:10:0 | 阅读: 11 |
收藏
|
Hacking Dream - www.hackingdream.net
windows
php
powershell
reverse
noprofile
PHP Web Shell and Reverse Shell Techniques for Linux: 45+ Methods for Penetration Testing
PHP Web Shell and Reverse Shell Techniques: 45+ Methods for Penetration Testing (2025)Updated o...
2025-11-27 17:7:0 | 阅读: 12 |
收藏
|
Hacking Dream - www.hackingdream.net
php
reverse
4444
shells
python
论文|源于大数据营销行业的个人信息黑灰产业链解析
环境异常 当前环境异常,完成验证后即可继续访问。 去验证...
2025-11-27 17:6:0 | 阅读: 2 |
收藏
|
网安杂谈 - mp.weixin.qq.com
Deepfake e chatbot, serve educazione finanziaria per difendersi: i dati del Crif
Secondo una ricerca del Crif, presentata in occasione dell’evento Tomorrow Speaks 2025, quello attua...
2025-11-27 17:1:41 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
più
digitale
deepfake
Previous
83
84
85
86
87
88
89
90
Next