unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Ukrainian REvil gang member sentenced to 13 years in prison
Ukrainian REvil gang member sentenced to 13 years in prisonA Ukrainian national, a member of t...
2024-5-3 05:11:38 | 阅读: 3 |
收藏
|
Security Affairs - securityaffairs.com
ransomware
vasinskyi
sentenced
rabotnik
conspiracy
Tips and stories for your team on World Password Day
What tips can I share with my team?A simple way to observe World Password Day is by sending passwo...
2024-5-3 04:50:36 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
passwords
stories
tips
strength
Dropbox Sign customer data accessed in breach
Dropbox is reporting a recent “security incident” in which an attacker gained unauthorized acce...
2024-5-3 04:44:53 | 阅读: 6 |
收藏
|
Malwarebytes Labs - www.malwarebytes.com
dropbox
attacker
security
passwords
Bitwarden launches new MFA Authenticator app for iOS, Android
error code: 1106...
2024-5-3 04:30:19 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Why OpenAI Should Become Open-Source
Too Long; Didn't ReadOpenAI is in a high-stakes legal battle with Elon Musk. Musk is suing the compa...
2024-5-3 04:28:27 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
musk
honest
innovation
sourcing
Elliptic Shows How an AI Model Can Identify Bitcoin Laundering
Cryptocurrency for several years has been pointed to as a key enabler of ransomware groups, allowin...
2024-5-3 04:26:31 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
laundering
illicit
blockchain
identify
subgraphs
Why CAPTCHAs Are Not the Future of Bot Detection
CAPTCHAs, once seen as the gold standard for differentiating between humans and bots, are quickly b...
2024-5-3 04:11:53 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
captchas
kasada
captcha
security
bots
New Digital Nomad Visas Ittrza
Too Long; Didn't ReadItaly, Turkey, and South Africa have launched their digital nomad visa programs...
2024-5-3 04:2:31 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
visa
africa
nomad
nations
regulation
Towards Generic Database Management System Fuzzing
Authors: Yupeng Yang and Yongheng Chen, Georgia Institute of Technology; Rui Zhong, Palo Alto Networ...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
relational
dbmss
buzzbee
limitations
georgia
Speculative Denial-of-Service Attacks In Ethereum
Authors: Aviv Yaish, The Hebrew University; Kaihua Qin and Liyi Zhou, Imperial College London, UC Be...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
mempurge
blockchain
turing
london
'I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators
Authors: Ananta Soneji, Arizona State University; Vaughn Hamilton, Max Planck Institute for Software...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
creators
onlyfans
arizona
vaughn
prominence
PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector
Authors: Guy N. Rothblum, Apple; Eran Omri, Ariel University and Ariel Cyber Innovation Center; Juny...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
norm
overhead
dimensional
bounded
SHiFT: Semi-hosted Fuzz Testing for Embedded Applications
Authors: Alejandro Mera and Changming Liu, Northeastern University; Ruimin Sun, Florida Internationa...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
mcu
firmware
positives
emulation
security
CAMP: Compositional Amplification Attacks against DNS
Authors: Huayi Duan, Marco Bearzi, Jodok Vieli, David Basin, Adrian Perrig, and Si Liu, ETH Zürich;...
2024-5-3 03:57:42 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
camp
vieli
Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps
Authors: Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, and Jason Polakis, University of Illi...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
security
inspectron
developers
porting
masood
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware
Authors: Haichuan Xu, Mingxuan Yao, and Runze Zhang, Georgia Institute of Technology; Mohamed Mousta...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
dva
a11y
victim
georgia
guided
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
2024-5-3 03:57:42 | 阅读: 0 |
收藏
|
USENIX - www.usenix.org
charging
chargers
voltschemer
threats
voltage
Application Security: Trends and Predictions for 2024
Too Long; Didn't ReadStay ahead of emerging threats in 2024 by diving into growing security trends l...
2024-5-3 03:53:38 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
gilad
emerging
firsthand
maayan
What to Expect at RSA 2024: Will AI Wreak Havoc on Cybersecurity?
As artificial intelligence leaders debate what constitutes safe AI and whether it means we’re on a...
2024-5-3 03:53:37 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
defenses
threats
genai
Pro-Russia hackers target critical infrastructure in North America and Europe
Pro-Russia hackers target critical infrastructure in North America and EuropeGovernment agenci...
2024-5-3 03:52:6 | 阅读: 4 |
收藏
|
Security Affairs - securityaffairs.com
russia
north
hacktivists
passwords
security
Previous
2
3
4
5
6
7
8
9
Next