unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Apple fixes two zero-days used in attacks on Intel-based Macs
Apple released emergency security updates to fix two zero-day vulnerabilities that were expl...
2024-11-20 06:0:21 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
exploited
security
44308
DO it again: how we used Durable Objects to add WebSockets support and authentication to AI Gateway
2024-11-195 min readIn October 2024, we talked about storing billions of logs from your AI applicati...
2024-11-20 06:0:0 | 阅读: 3 |
收藏
|
The Cloudflare Blog - blog.cloudflare.com
universal
cf
aig
client
eventid
Biometric Frontiers: Unlocking The Future Of Engagement - Andras Cser, Enza Iannopollo - ASW #308
Nov 19, 2024This week's interview dives deep into the state of biometricswith two Forrester Researc...
2024-11-20 06:0:0 | 阅读: 2 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
biometrics
security
forrester
andras
Apple Fixes Two Exploited Vulnerabilities, (Tue, Nov 19th)
Today, Apple released updates patching two vulnerabilities that have already been exploited. Intere...
2024-11-20 05:56:52 | 阅读: 5 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
malicious
exploited
attacker
Imperva and the Secure by Design Pledge: A Commitment to Cybersecurity Excellence
The Cybersecurity and Infrastructure Security Agency (CISA) has introduced a voluntary “Secure b...
2024-11-20 05:45:22 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
imperva
pledge
passwords
CISA tags Progress Kemp LoadMaster flaw as exploited in attacks
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added three new flaws in...
2024-11-20 05:30:22 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
loadmaster
injection
7591
remote
kev
EPA IG Office: ‘High-Risk’ Security Flaws in Hundreds of Water Systems
More than 300 drinking water systems in the United States that serve almost 110 million people h...
2024-11-20 05:15:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
water
security
drinking
epa
Ensuring Reproducibility in AI Research: Code and Pre-trained Weights Open-Sourced
Authors:(1) Yuwei Guo, The Chinese University of Hong Kong;(2) Ceyuan Yang, Shanghai Artificial I...
2024-11-20 05:0:11 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
arxiv
diffusion
preprint
pp
proceedings
What is the Signature Isolation Forest?
Authors:(1) Guillaume Staerman, INRIA, CEA, Univ. Paris-Saclay, France;(2) Marta Campi, CERIAH, I...
2024-11-20 04:58:28 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
fif
anomaly
forest
sif
A Easy P4 in 10 min The Story of Finding Interesting Vulnerability inVDP program
2024-11-20 04:30:36 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
HTB — Included
2024-11-20 04:30:34 | 阅读: 2 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Leviathan6 : Over The Wire
2024-11-20 04:30:27 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
A Step-by-Step Walkthrough of the Netsquare CTF Challenge
2024-11-20 04:30:24 | 阅读: 2 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Defending Web Portals: Harnessing ModSecurity, Honeypots, and AppSensor for Robust Security
2024-11-20 04:30:19 | 阅读: 0 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Ford investgates alleged breach following customer data leak
Ford is investigating allegations that it suffered a data breach after a threat actor claime...
2024-11-20 04:15:20 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
ford
allegations
intelbroker
supposedly
Oracle warns of Agile PLM file disclosure flaw exploited in attacks
Oracle has fixed an unauthenticated file disclosure flaw in Oracle Agile Product Lifecycle M...
2024-11-20 04:0:24 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
exploited
plm
agile
crowdstrike
download
AnimateDiff Ethics Statement: Ensuring Responsible Use of Generative AI for Animation
Authors:(1) Yuwei Guo, The Chinese University of Hong Kong;(2) Ceyuan Yang, Shanghai Artificial I...
2024-11-20 04:0:15 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
artificial
shanghai
motion
kong
hong
DEF CON 32 – Breaching AWS Through Shadow Resources
Authors/Presenters: Yakir Kad...
2024-11-20 04:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
katchinskiy
originating
michael
Keanu (KNU) Meme Token Launches On Pump.fun
SAN FRANCISCO, USA, November 19th, 2024/Chainwire/--The Keanu(KNU)token, a new Solana-based meme coi...
2024-11-20 03:34:9 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
keanu
meme
cultural
coin
knu
Google DeGoogled, Hammerbarn, Blofeld, VMWare, DeepData, SafePay, Josh Marpet and... - SWN #432
Welcome to the Security Weekly Podcast Network, your all-in-one so...
2024-11-20 03:14:0 | 阅读: 3 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
security
weekly
informed
voices
Previous
12
13
14
15
16
17
18
19
Next