unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 0 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
textit
CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 0 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
BumbleBee: Secure Two-party Inference Framework for Large Transformers
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 0 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
ISC Stormcast For Wednesday, October 2nd, 2024 https://isc.sans.edu/podcastdetail/9162, (Wed, Oct 2nd)
2024-10-2 10:0:2 | 阅读: 9 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
network
monitoring
papers
feeds
isc
Regex Cheat Sheet - A Regular Expressions Guide
Too Long; Didn't ReadThis blog post is firstly published on my personal blogging site [kanby.net] Th...
2024-10-2 09:59:39 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
readthis
firstly
blogging
kanby
OpenAI 开发者大会曝大量小工具;最高涨 113%,9 月车企销量大涨;特朗普加密币平台正式开放 | 极客早知道
OpenAI 开发者大会派礼包:大幅降低模型成本,AI 语音加持 App,小模型「蹭」大模型性能美东时间 10 月 1 日周二,OpenAI 举行了年度开发者大会 DevDay。OpenAI 在 De...
2024-10-2 08:56:48 | 阅读: 3 |
收藏
|
极客公园 - mp.weixin.qq.com
模型
汽车
hololens
wlf
高盛
CISA: Thousands of bugs remediated in second year of vulnerability disclosure program
Thousands of vulnerabilities were identified and remediated through a government clearinghouse in 2...
2024-10-2 08:31:29 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
vdp
submissions
remediated
My Obsidian + Hugo Blogging Setup: A Smooth Blogging Workflow
In this post, I go through how I have set up my Obsidian and Hugo blogging workflow. I use a single...
2024-10-2 08:23:18 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
hugo
hotkey
github
propose
userprofile
Justifying cybersecurity budgets: The power of cyber threat analysis
Cybersecurity is not just an IT concern, but a business imperative. Cyber threats pose significant f...
2024-10-2 08:0:0 | 阅读: 2 |
收藏
|
Intigriti - blog.intigriti.com
security
analysis
threats
Overview of Content Published in September
Overview of Content Published in September Filed under: Announcement — Didier Stevens @...
2024-10-2 08:0:0 | 阅读: 7 |
收藏
|
Didier Stevens - blog.didierstevens.com
filed
didier
stevens
Where's the AI Revenue? Plus, Will the Trillion-Dollar AI Gamble Pay Off?
The latest edition of One More Thing in AI Newsletter.Technology is best when it brings people tog...
2024-10-2 07:53:5 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
gpus
costs
sachs
goldman
chips
Why AI Doesn’t Matter (What Actually Does)
AI is the buzzword everyone’s throwing around, but does it really live up to the hype? The truth is...
2024-10-2 07:40:33 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
innovation
humans
chess
hype
crew
How to Build a SOAR Playbook: Start with the Artifacts
Developing SOAR (Security Orchestration, Automation, and Response) playbooks can be daunting, espec...
2024-10-2 07:35:46 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
playbook
security
artifacts
soar
enrichment
Rails Thruster 101: A Quick Guide
The Rails World 2024 conference ended last week, and a lot of new components of the Rails ecosystem...
2024-10-2 07:12:45 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
thruster
rails
kamal
puma
efficiently
Machine Learning Visualizations
Visualization is an important part of data exploration for machine learning and data science.There...
2024-10-2 06:45:56 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
plot
co2
csvfile
python
counts
Arc browser launches bug bounty program after fixing RCE bug
error code: 1106...
2024-10-2 06:45:18 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Non-Material Motivation: Why It Matters and How It Works
If you've ever led a team of at least three people and were responsible for the team’s results, you’...
2024-10-2 06:33:5 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
motivation
formula
salary
praise
autonomy
I’m a professional
read file error: read notes: is a directory...
2024-10-2 06:22:46 | 阅读: 9 |
收藏
|
daniel.haxx.se - daniel.haxx.se
microsoft
mvp
filling
award
daniel
How to Build a Microservices Architecture with Node.js and RabbitMQ
IntroductionThe microservice architecture is an approach to building scalable software by breaking...
2024-10-2 05:28:44 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
rabbitmq
software
amqp
Fake Disney+ activation page redirects to pornographic scam
A common way to activate digital subscriptions such as Netflix, Prime o...
2024-10-2 05:16:38 | 阅读: 13 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
disney
malicious
microsoft
tips
threats
Previous
499
500
501
502
503
504
505
506
Next