unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
500 Blog Posts To Learn About Future Of Ai
New StorybyLearn RepobyLearn Repo@learnLets geek out. The HackerNoon library is now ranked by readi...
2026-5-6 14:0:56 | 阅读: 13 |
收藏
|
Hacker Noon - hackernoon.com
ranked
geek
hackernoon
library
learnlets
【漏洞通告】Ollama 越界读取漏洞(CVE-2026-7482)
环境异常 当前环境异常,完成验证后即可继续访问。 去验证...
2026-5-6 13:45:0 | 阅读: 1 |
收藏
|
深信服千里目安全技术中心 - mp.weixin.qq.com
【漏洞通告】Android ADB认证绕过漏洞(CVE-2026-0073)
环境异常 当前环境异常,完成验证后即可继续访问。 去验证...
2026-5-6 13:45:0 | 阅读: 1 |
收藏
|
深信服千里目安全技术中心 - mp.weixin.qq.com
【恶意文件通告】Daemon Tools 官方安装包供应链污染事件
环境异常 当前环境异常,完成验证后即可继续访问。 去验证...
2026-5-6 13:45:0 | 阅读: 1 |
收藏
|
深信服千里目安全技术中心 - mp.weixin.qq.com
Anthropic’s CEO warns the “moment of danger” is real. But most are looking in the wrong place.
Anthropic CEO Dario Amodei warns that AI’s rapid evolution is outpacing safety frameworks. Learn why...
2026-5-6 13:40:0 | 阅读: 22 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
exposure
defenders
pyghidra-mcp Meets Ghidra GUI: Drive Project-Wide RE with Local AI
2026-5-6 13:35:48 | 阅读: 29 |
收藏
|
Reverse Engineering - www.reddit.com
pyghidra-mcp Meets Ghidra GUI: Drive Project-Wide RE with Local AI
2026-5-6 13:34:15 | 阅读: 23 |
收藏
|
Technical Information Security Content & Discussion - www.reddit.com
Chrome的AI功能会额外占用电脑4GB存储
Chrome的AI功能会额外占用电脑4GB存储由于一个大型设备端人工智能模型文件,谷歌 Chrome 可能正在占用比预期更多的存储空间,在某些情况下,该文件会被自动下载到浏览器的系统文件夹中。注意到桌...
2026-5-6 13:33:29 | 阅读: 20 |
收藏
|
黑海洋 - WIKI - blog.upx8.com
模型
chrome
谷歌
浏览器
weights
Vulnerability Garden
2026-5-6 13:6:18 | 阅读: 12 |
收藏
|
Technical Information Security Content & Discussion - www.reddit.com
商汤科技押注成本效率作为AI竞争优势
中国人工智能公司商汤科技正押注成本效率作为竞争优势。据联合创始人兼首席科学家林达华称,该公司借鉴了深度求索在财务和技术限制下交付高性能模型的方法。林达华表示,虽然 ChatGPT Images 2.0...
2026-5-6 13:2:27 | 阅读: 21 |
收藏
|
黑海洋 - WIKI - blog.upx8.com
模型
openai
美丽
押注
Google Chrome 被发现在合格设备上静默下载 Gemini Nano
Google Chrome 被发现在合格设备上静默下载了 4GB 大小的 Gemini Nano 模型,而且会在用户删除之后重新下载。Gemini Nano 就是 Google 受争议的...
2026-5-6 13:0:53 | 阅读: 19 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
nano
模型
chrome
gemini
浏览器
OceanLotus suspected of using PyPI to deliver ZiChatBot malware
IntroductionThrough our daily threat hunting, we noticed that, beginning in July 2025...
2026-5-6 13:0:34 | 阅读: 25 |
收藏
|
Securelist - securelist.com
zichatbot
malicious
library
colorinal
python
LABScon25 Replay | Please Connect to the Foreign Entity to Enhance Your User Experience
In this LABScon 25 presentation, Joe FitzPatrick explores how networked devices manufactu...
2026-5-6 13:0:29 | 阅读: 19 |
收藏
|
SentinelLabs - www.sentinelone.com
labscon
hardware
joe
security
2026
MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack
The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and S...
2026-5-6 13:0:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
ransomware
microsoft
extortion
rapid7
remote
Designing Data-Driven Intelligent Systems for Customer Lifecycle Optimization
New StorybyAnilbyAnil@anilguntupalliSr, Enterprise engineerMay 6th, 2026‘An abstract system where s...
2026-5-6 13:0:0 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
2026
adaptive
technov
CVE-2026-42208: Pre-Authentication SQL Injection in LiteLLM Proxy
TL;DR Bishop Fox researchers reproduced and confirmed CVE-2026-42208, a critical pre-authentication...
2026-5-6 13:0:0 | 阅读: 13 |
收藏
|
bishopfox.com - bishopfox.com
litellm
proxy
bearer
database
attacker
Otto Support - Excessive Agency and Tool Privileges
TL;DR: AI agents handed more tools than the task requires have already wiped production environ...
2026-5-6 13:0:0 | 阅读: 4 |
收藏
|
bishopfox.com - bishopfox.com
agents
excessive
2026
mcp
Why Modern Systems Are Built Around Logs, State, and Time
New StorybySeshendranath BallabySeshendranath Balla@seshendranathVersatile Senior Data Engineering...
2026-5-6 12:59:59 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
balla
designing
expertise
senior
Attackers adopt JavaScript runtime Bun to spread NWHStealer
In our previous research, we analyzed a Windows infostealer we track as NWHStealer. The attac...
2026-5-6 12:50:55 | 阅读: 26 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
bun
loader
c2
stealer
nwhstealer
Millions of students’ personal data stolen in major education breach
Instructure, the company behind the Canvas learning management system (LMS), confirmed a cybe...
2026-5-6 12:45:54 | 阅读: 23 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
instructure
district
teachers
security
passwords
Previous
46
47
48
49
50
51
52
53
Next