不安全
Help Needed!
1 year 2 months ago
New to hashcat,trying to run this command but it just leaves a new line and then stops , w
Hackers imitate Kremlin-linked group to target Russian entities
1 year 2 months ago
A little-known hacking group has been mimicking the tactics of a prominent Kremlin-linked threat ac
Tesla EV charger hacked twice on second day of Pwn2Own Tokyo
1 year 2 months ago
Security researchers hacked Tesla's Wall Connector electric vehicle charger twice on the se
Stealthy 'Magic Packet' malware targets Juniper VPN gateways
1 year 2 months ago
A malicious campaign has been specifically targeting Juniper edge devices, many acting as VP
9 Internal Data Breach Examples to Learn From
1 year 2 months ago
In the past year, 68% of
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits
1 year 2 months ago
Firmware Security / VulnerabilityAn exhaustive evaluation of three firewall models from Palo Alto
Where to get hands on experience
1 year 2 months ago
AI Is Now Creating Antidotes for Snake Venom
1 year 2 months ago
Using artificial intelligence (AI) technology, a research team from the University of Washington fou
SonarQube Server 2025.1 LTA Release Announcement
1 year 2 months ago
Since the last SonarQube Server 9.9 LTA, we’ve been busy here at Sonar, packing a lot into our r
泛滥的影子AI带来的安全风险
1 year 2 months ago
Anuj Jaiswal, Chief Product Officer, FortanixJanuary 23, 20253 Min ReadSource: LuckyStep48 via Alamy
针对企业级Juniper路由器的后门攻击
1 year 2 months ago
Source: LJSphotography via Alamy Stock PhotoDozens of organizations have been infected with router m
Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks
1 year 2 months ago
Cybersecurity researchers are calling attention to a new malware campaign that leverages fake CAPTC
Third Interdisciplinary Workshop on Reimagining Democracy (IWORD 2024)
1 year 2 months ago
Last month, Henry Farrell and I convened the Third Interdisciplinary Workshop on Reimagini
Europe's New Crypto Law Gives NFTs a Free Pass (For Now)
1 year 2 months ago
Crypto is here to stay, and regulators worldwide know it. The European Union set out to be one of th
BSIMM15 highlights compliance and AI security: Why modern tooling is key
1 year 2 months ago
An increase in compliance activities such as the creation of software bills of materials (SBOMs)
Custom Backdoor Exploiting Magic Packet Vulnerability in Juniper Routers
1 year 2 months ago
Malware / Enterprise SecurityEnterprise-grade Juniper Networks routers have become the target of
Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel
1 year 2 months ago
IntroductionOn November 20, 2024, Shubham Shah and I discovered a security vulnerability in Subaru’
Inside Fedrok AG: Building a Transparent Carbon Credit Ecosystem
1 year 2 months ago
In a candid discussion with HackerNoon, the leadership team of Fedrok AG detail their journey into e
Warning: Don’t sell or buy a second hand iPhone with TikTok already installed
1 year 2 months ago
After TikTok was briefly banned in the US last weekend, an unusual phenomenon unearthed. Report
Checked
6 hours 32 minutes ago
unSafe.sh - 不安全
不安全 feed