unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
NIST AI Risk Management Framework Explained
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-10-8 21:52:54 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
comsecurity
Qualcomm fixed a zero-day exploited limited, targeted attacks
Qualcomm fixed a zero-day exploited limited, targeted attacksQualcomm warns of 20 flaws in its...
2024-10-8 21:50:9 | 阅读: 8 |
收藏
|
Security Affairs - securityaffairs.com
snapdragon
qualcomm
43047
fds
dma
科沃斯的 Deebot 扫地机器人收集客户的照片和声音训练 AI
科沃斯的 Deebot 扫地机器人会收集客户室内的照片、视频和声音去训练其 AI 模型。该公司表示客户是自愿参加其产品改进计划。但用户通过科沃斯的手机应用选择加入该计划时并不知道机器人会收...
2024-10-8 21:48:33 | 阅读: 4 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
沃斯
数据
deebot
安全
自愿
Ukrainian pleads guilty to running Raccoon Infostealer malware, agrees to pay nearly $1 million
A Ukrainian national pleaded guilty in U.S. federal court Monday to operating the Raccoon Infosteal...
2024-10-8 21:46:30 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
raccoon
infostealer
sokolovsky
netherlands
sold
Apple Issues Urgent Security Advisory for iOS and iPadOS Vulnerabilities
ProductsFor Enterprises(B2B)...
2024-10-8 21:46:28 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
cyble
security
threats
Casio reports IT systems failure after weekend network breach
error code: 1106...
2024-10-8 21:45:19 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Don’t Treat DAST Like Dessert
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-10-8 21:21:53 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
dozendevops
Thymeleaf模板生成过程以及注入原因分析
2024-10-8 21:20:7 | 阅读: 2 |
收藏
|
先知安全技术社区 - xz.aliyun.com
Ukraine's defense ministry launches military CERT to counter Russian cyberattacks
Ukraine’s defense ministry has created an incident response center to counter cyberattacks, includi...
2024-10-8 21:16:25 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ministry
military
ukraine
russia
ADT says hacker stole encrypted internal employee data after compromising business partner
Home security giant ADT said in a regulatory filing on Monday that a hacker compromised the systems...
2024-10-8 21:16:24 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
adt
filing
security
occurred
exfiltrated
What is CNAPP | Cloud-Native Application Protection Platform
What is a CNAPP?A cloud-native app...
2024-10-8 21:15:0 | 阅读: 4 |
收藏
|
Uptycs Blog - www.uptycs.com
cloud
security
cnapp
uptycs
development
Startups of The Year 2024: 1,658 Startups Nominated in Beverly Hills, CA
Beverly Hills, CA - October 8, 2024 - HackerNoon, the independent technology publishing platform, i...
2024-10-8 21:0:17 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
startups
hackernoon
hills
beverly
award
NIST CSF 2.0 Is Here: How Will You Adapt?
2024-10-8 21:0:0 | 阅读: 3 |
收藏
|
GuidePoint Security - www.guidepointsecurity.com
Analyzing Latrodectus: The New Face of Malware Loaders
October 08, 2024 4 Minute Read...
2024-10-8 21:0:0 | 阅读: 5 |
收藏
|
Trustwave Blog - www.trustwave.com
latrodectus
malicious
ta577
download
icedid
Cloudflare acquires Kivera to add simple, preventive cloud security to Cloudflare One
2024-10-086 min readWe’re excited to announce that Kivera, a cloud security, data protection, and co...
2024-10-8 21:0:0 | 阅读: 6 |
收藏
|
The Cloudflare Blog - blog.cloudflare.com
cloud
security
kivera
attackers
Leveraging Kubernetes virtual machines at Cloudflare with KubeVirt
2024-10-087 min readCloudflare runs several multi-tenant Kubernetes clusters across our core data ce...
2024-10-8 21:0:0 | 阅读: 8 |
收藏
|
The Cloudflare Blog - blog.cloudflare.com
kubernetes
kubevirt
clusters
machine
cri
CISA and NSA Cloud Security Best Practices: Deep Dive
Recent cloud security guidance from CISA and the NSA offers a wealth of recommendations to help orga...
2024-10-8 20:59:59 | 阅读: 4 |
收藏
|
Tenable Blog - www.tenable.com
cloud
security
foundations
encryption
network
Hacker cinesi all’attacco dei provider internet USA: il nuovo fronte dello spionaggio cyber
Da quanto ha riportato qualche giorno fa il Wall Street Journal, pare che hacker cinesi supportati d...
2024-10-8 20:46:58 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
della
sono
dispositivi
Data Governance Act, approvato il decreto di recepimento: tutte le novità
Sarà l’AgID (Agenzia per l’Italia Digitale) la nuova autorità competente per l’applicazione del Data...
2024-10-8 20:46:56 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
dati
dei
che
delle
NIS 2 e recepimento italiano: regole e adempimenti per le aziende
La pubblicazione in Gazzetta Ufficiale del D.lgs. 138 del 2024 di recepimento della NIS 2 ha definit...
2024-10-8 20:46:55 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.cybersecurity360.it
di
che
nis
soggetti
sicurezza
Previous
446
447
448
449
450
451
452
453
Next