unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
LC 多云攻击面资产梳理开源工具
LC(List Cloud)是一个多云攻击面资产梳理的工具,使用 LC 可以让甲方蓝队在管理多云时快速梳理出可能暴露在公网上的资产。功能列出多个配置的云资产支持多个云服务商支持多个云服务...
2024-5-16 05:16:40 | 阅读: 1 |
收藏
|
TeamsSix - www.teamssix.com
lc
brew
多云
ep
Notes on ThroughTek Kalay Vulnerabilities and Their Impact on the IoT Ecosystem
Since 2014, Bitdefender IoT researchers have been looking into the world's most popular IoT device...
2024-5-15 21:1:57 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bitdefender.com
cam
chained
kalay
throughtek
New Consent and Bot Management features for Cloudflare Zaraz
05/15/20243 min readManaging consent online can be challenging. After you’ve figured out the necessa...
2024-5-15 21:0:50 | 阅读: 1 |
收藏
|
The Cloudflare Blog - blog.cloudflare.com
zaraz
advertising
iab
tcf
signals
Securing Peace of Mind with Breach Response Warranty
Running a business means accepting all of its fluctuating risks and uncertainties. For business lea...
2024-5-15 21:0:15 | 阅读: 2 |
收藏
|
SentinelOne - www.sentinelone.com
warranty
insurance
leaders
relief
smbs
Defending the Energy Sector Against Cyber Threats: Insights from Trustwave SpiderLabs
It has always been clear, even before the Colonial Pipeline attack, that the e...
2024-5-15 21:0:0 | 阅读: 1 |
收藏
|
Trustwave Blog - www.trustwave.com
security
ransomware
blackcat
lockbit
alphv
The Importance of Data Posture and How to Evaluate It
Get Visibility and Control Over Your Data What is Data Posture?Data pos...
2024-5-15 20:44:13 | 阅读: 1 |
收藏
|
Forcepoint - www.forcepoint.com
dspm
security
posture
proactive
regulatory
Subhunter - A Fast Subdomain Takeover Tool
Subdomain takeover is a common vulnerability that allows an attacker to gain control over a...
2024-5-15 20:30:0 | 阅读: 0 |
收藏
|
KitPloit - PenTest Tools! - www.kitploit.com
ubereats
subhunter
subdomain
merchants
testauth
Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions
Cyber Espionage / Threat IntelligenceAn unnamed European Ministry of Foreign Affairs (MFA) and its...
2024-5-15 20:29:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
lunarmail
turla
lunarweb
jurčacko
espionage
2024年度CCF-腾讯犀牛鸟基金(安全类题目)
CCF-腾讯犀牛鸟基金(以下简称犀牛鸟基金)于2013年由腾讯公司和中国计算机学会(CCF)共同发起,致力于面向海内外青年学者搭建产学研合作及学术交流的平台。十二年来,犀牛鸟基金为全球范围内最具创新力...
2024-5-15 20:10:11 | 阅读: 0 |
收藏
|
安全学术圈 - mp.weixin.qq.com
申请人
腾讯
ccf
犀牛
安全
Got MFA? If not, Now is the Time!, (Wed, May 15th)
I had an interesting call from a client recently - they had a number of "net use" and "psexec" comm...
2024-5-15 20:4:47 | 阅读: 1 |
收藏
|
SANS Internet Storm Center, InfoCON: green - isc.sans.edu
attacker
ipinfo
rejected
subnets
attackers
(Toy) Disassembler for X86-64 implemented from scratch in C++
2024-5-15 20:3:35 | 阅读: 1 |
收藏
|
Reverse Engineering - www.reddit.com
movies
reddit
advertise
electronics
Apple and Google join forces to stop unwanted tracking
Apple and Google have announced an industry specification for Bluetooth...
2024-5-15 19:58:3 | 阅读: 1 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
unwanted
trackers
airtags
airtag
pushed
(Cyber) Risk = Probability of Occurrence x Damage
Here's How to Enhance Your Cyber Resilience with CVSSIn late 2023, the Common Vulnerability Scori...
2024-5-15 19:38:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
ndr
network
security
threats
Ebury Botnet Malware Compromises 400,000 Linux Servers Over Past 14 Years
A malware botnet called Ebury is estimated to have compromised 400,000 Linux servers since 2009, ou...
2024-5-15 18:56:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
ebury
eset
redirection
senakh
It's Time to Master the Lift & Shift: Migrating from VMware vSphere to Microsoft Azure
Enterprise Security / Cloud ComputingWhile cloud adoption has been top of mind for many IT profess...
2024-5-15 18:55:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
migration
zerto
cloud
microsoft
vsphere
Adobe fixed multiple critical flaws in Acrobat and Reader
Adobe fixed multiple critical flaws in Acrobat and ReaderAdobe addressed multiple code executi...
2024-5-15 18:46:3 | 阅读: 5 |
收藏
|
Security Affairs - securityaffairs.com
8cvss
hcve
apsb24
嵌入式系统设计师考前几页纸
给的PDF里都是图片,看着太模糊了,手敲了一遍,这么看着清晰点CPU中的相关组件程序计数器是用于存放下一条指令所在单元地址的地方。在程序执行前,必须将程序的起始地址,即程序的一条指令所在的内存单元...
2024-5-15 18:28:17 | 阅读: 3 |
收藏
|
晨旭的博客~ - www.chenxublog.com
数据
控制
指令
串行
嵌入
专题·网安人才培养 | 沈昌祥院士:以科学的网络安全观加快网络空间安全学科建设与人才培养
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063文 | 中国工程院院士 沈昌祥信息时代,网络空间已成为陆、海、空、天之外人类活动的“第五空间”,是国家主权的新疆域,没有网...
2024-5-15 18:6:1 | 阅读: 3 |
收藏
|
中国信息安全 - mp.weixin.qq.com
安全
网络
信息
观点 | 构建网络空间命运共同体发展新阶段“新”在哪
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063文 | 复旦大学美国研究中心教授、博导 蔡翠红网络空间是人类共同的精神家园,也是人类社会的重要组成部分。网络空间的发展和治...
2024-5-15 18:6:1 | 阅读: 3 |
收藏
|
中国信息安全 - mp.weixin.qq.com
网络
共同体
命运
安全
关注 | 中美举行人工智能政府间对话首次会议
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063当地时间2024年5月14日,中美人工智能政府间对话首次会议在瑞士日内瓦举行。会议由中国外交部北美大洋洲司司长杨涛和美国国...
2024-5-15 18:6:1 | 阅读: 2 |
收藏
|
中国信息安全 - mp.weixin.qq.com
安全
中方
中国
风险
Previous
1
2
3
4
5
6
7
8
Next