不安全
InForSec祝网络安全华人学者春节愉快!
1 year 2 months ago
Got bored, reversed the WMI. Made a novel virus that never touches the filesystem
1 year 2 months ago
初一 | 新春纳福
1 year 2 months ago
Programmatic handling of CORS-configuration errors with jub0bs/cors
1 year 2 months ago
TL;DR ¶jub0bs/cors v0.5.0 now lets you handle CORS-configuration errorsprogramma
I ransomware contro le appliance ESXi sfruttano il tunneling SSH per la persistenza
1 year 2 months ago
Best practices for key derivation
1 year 2 months ago
By Marc IlungaKey derivation is essential in many cryptographic applications, in
A diversity of downtime: the Q4 2024 Internet disruption summary
1 year 2 months ago
2025-01-2812 min readCloudflare’s network spans more than 330 cities in over 120 countries, where we
GRIT 2025 Report: Post-Compromise Detection Strategies
1 year 2 months ago
January 28, 2025This blog marks the beginning of a series based
Bypassing character blocklists with unicode overflows
1 year 2 months ago
Published: 28 January 2025 at 13:58 UTC
BloodHound Community Edition Custom Queries
1 year 2 months ago
This blog post introduces our new custom queries for BloodHound Community Edition (CE) and
MacOS hardware encrypted volume
1 year 2 months ago
The complexities of scaling AppSec teams and how to address them in 2025
1 year 2 months ago
Tom Ryder |28 January 2025 at 13:08
Critical Vulnerabilities in Node.js Expose Systems to Remote Attacks
1 year 2 months ago
Critical security vulnerabilities in multiple Node.js versions (v18.x, v20.x, v22.x, v23.x) pose h
CISA Under Trump
1 year 2 months ago
CISA Under TrumpJen Easterly is out as the Director of CISA. Read her final interview:The
Ransomware Threats, Led by FunkSec, Rise to New Heights
1 year 2 months ago
Ransomware attacks surged to a record high in December 2024, with 574 incidents reported, accord
how to find people on other websites?
1 year 2 months ago
结合Windows符号链接增强BYOVD技术的新方法
1 year 2 months ago
A new method of exploiting the “Bring Your Own Vulnerable Driver” (BYOVD)
AI SOC Analysts: Propelling SecOps into the future
1 year 2 months ago
Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up
How ANY.RUN Helps Healthcare Organizations Against Ransomware: Interlock Case Study
1 year 2 months ago
Ransomware attacks hav
Checked
12 hours 48 minutes ago
unSafe.sh - 不安全
不安全 feed