unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Friday Squid Blogging: Opioid Alternatives from Squid Research
Is there nothing that squid research can’t solve?“If you’re working with an organism like...
2025-1-17 22:2:23 | 阅读: 2 |
收藏
|
Schneier on Security - www.schneier.com
squid
organism
pain
joe
genetic
[Phishing kit] MonCompteFormation ‘Lead’ phishing kit – an analysis
In mid-December 2024, while checking the new findings of Stalkphish.io (our phishing URL detectio...
2025-1-17 22:1:2 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - stalkphish.com
phishing
cpf
php
stalkphish
formation
‘Surveillance pricing’ means higher costs for consumers, preliminary FTC report says
Businesses charge customers more for products based on insights gleaned from their consumer data an...
2025-1-17 21:45:46 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
pricing
ftc
consumers
prices
revionics
Retries in open bullet
2025-1-17 21:23:24 | 阅读: 0 |
收藏
|
Your Open Hacker Community - www.reddit.com
agree
reddit
acknowledge
username
continuing
Malicious PyPi package steals Discord auth tokens from devs
A malicious package named 'pycord-self' on the Python package index (PyPI) targets Discord d...
2025-1-17 20:30:19 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
malicious
victim
developers
pypi
Otelier data breach exposes info, hotel reservations of millions
Hotel management platform Otelier suffered a data breach after threat actors breached its Am...
2025-1-17 20:30:17 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
otelier
hotel
marriott
hilton
hyatt
Expanded Damage Assessment: Unauthorized Access to FBI Informant Communications via AT&T Breach
OverviewIn a catastrophic breach of AT&T’s network infrastructure, the Chinese state-sponsor...
2025-1-17 20:28:38 | 阅读: 2 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
informants
typhoon
salt
espionage
security
Homeland Security nominee Kristi Noem bashes CISA, says agency must be 'smaller, more nimble'
South Dakota Governor Kristi Noem had harsh criticism for the nation’s leading cybersecurity agency...
2025-1-17 20:0:54 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
noem
security
trump
The Good, the Bad, and the Politics of Biden’s Cybersecurity Order
President Biden’s last-minute, expansive cybersecurity executive order, which touches everything...
2025-1-17 18:55:33 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
eo
threats
Costa Rica refinery cyberattack was first deployment for new US response program, ambassador says
A potentially catastrophic ransomware attack on Costa Rica’s largest oil refinery last year was the...
2025-1-17 18:45:51 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
costa
falcon
ransomware
rica
fick
This is HUGE: Biden’s Cybersecurity Exec. Order — Big Parting Gift to Trump
Joseph Robinette Biden Jr. (pictured) hits the emergency “do something” button.Yesterday’s Bid...
2025-1-17 18:23:39 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
biden
richi
software
US sanctions hacker and company allegedly behind Treasury and telecom breaches
The China-based hackers allegedly responsible for breaches of the Treasury Department and at least...
2025-1-17 17:45:49 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
treasury
salt
typhoon
sanctions
Cohesity Extends Services Reach to Incident Response Platforms
Cohesity has extended its Cyb...
2025-1-17 17:15:2 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cohesity
expertise
hoff
downtime
Unveiling 2024’s Attack Trends: Insights from Source Defense Research
by Source DefenseIn 2024, Magecart attacks reached new levels of sophistication, targeting thou...
2025-1-17 17:8:31 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
attackers
malicious
dss
magecart
security
DORA Regulations Explained: A Guide to Meeting ICT Risk Management Standards
The Digital Operational Resilience Act (DORA) is set to become a...
2025-1-17 17:0:57 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.kelacyber.com
kela
dora
ict
threats
resilience
US sanctions Chinese firm, hacker behind telecom and Treasury hacks
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned...
2025-1-17 17:0:21 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
treasury
typhoon
juxinhe
sichuan
kecheng
Microsoft fixes Office 365 apps crashing on Windows Server systems
Microsoft has fixed a known issue that caused Microsoft 365 applications and Classic Outloo...
2025-1-17 17:0:20 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
microsoft
windows
outage
18227
Earth’s Aerial Biosphere Offers Insights into Venusian Microbial Survival
Authors:(1) Sara Seager, Departments of Earth, Atmospheric and Planetary Sciences, Physics, Aerona...
2025-1-17 17:0:14 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
earth
clouds
cloud
droplets
microbes
Microbial Life on Venus Requires a Unique Life Cycle to Overcome Extreme Conditions
Authors:(1) Sara Seager, Departments of Earth, Atmospheric and Planetary Sciences, Physics, Aerona...
2025-1-17 17:0:11 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
venus
microbiol
clouds
atmosphere
sci
Researchers Proposes a Life Cycle for Venusian Microbes
Authors:(1) Sara Seager, Departments of Earth, Atmospheric and Planetary Sciences, Physics, Aerona...
2025-1-17 17:0:9 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
spores
haze
earth
droplet
venusian
Previous
1
2
3
4
5
6
7
8
Next