不安全
Kazakh Organizations Targeted by 'Bloody Wolf' Cyber Attacks
1 year 7 months ago
Network Security / Threat IntelligenceOrganizations in Kazakhstan are the target of a threat activ
Leveraging CRQ to Understand Ransomware Costs | Kovrr
1 year 7 months ago
Today, decision makers at the world’s largest enterprises, from the CISO to the CEO, are increasing
Turning Data into Action: Intelligence-Driven Vulnerability Management
1 year 7 months ago
Prioritizing vulnerabilities with context has always been a challenge for vulnerability management t
Replacement for Action Fraud, UK’s cybercrime reporting service, delayed again until 2025
1 year 7 months ago
The launch date for the repeatedly delayed replacement service for Action Fraud, the much-criticize
Le telecomunicazioni sono i bersagli principali dei cyberattacchi
1 year 7 months ago
Keytronic incurred approximately $17 million of expenses following ransomware attack
1 year 7 months ago
Keytronic incurred approximately $17 million of expenses following ransomware attackPrinted ci
Keep Your Data Safe with This PII Compliance Checklist
1 year 7 months ago
Because of that, employment history and a dozen other data points like it are known as Personal
Ryan Pentney reflects on 10 years of Talos and his many roles from the Sourcefire days
1 year 7 months ago
Maximizing Disk Imaging Speeds
1 year 7 months ago
In the field of digital forensics, properly handling the ta
产学研集聚ISC人工智能安全趋势发展论坛,共探大模型安全生态
1 year 7 months ago
胡金鱼
ISC.AI 2024:360携手共青团发布数字安全科技人才激励计划
1 year 7 months ago
胡金鱼
/r/ReverseEngineering's Weekly Questions Thread
1 year 7 months ago
Using the RTL-SDR Blog V3 as a DVB-T Receiver in OpenPli Enigma2
1 year 7 months ago
August 5, 2024The RTL-SDR hardware began its life as a DVB-T TV receiver USB stick, but these
China-linked APT41 breached Taiwanese research institute
1 year 7 months ago
China-linked APT41 breached Taiwanese research institute China-linked group APT41 breached a T
Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access
1 year 7 months ago
Network Security / VulnerabilityA high-severity security bypass vulnerability has been disclosed i
俄APT组织利用虚假汽车销售广告传播HeadLace后门
1 year 7 months ago
主站 分类 漏洞 工具 极客
Tech Minds: A Beginners Guide to the Radioberry HF SDR Transceiver Pi Hat
1 year 7 months ago
August 5, 2024Recently on the Tech Minds YouTube channel, Matt uploaded a video explaining ho
物理学家称流言像核裂变一样传播
1 year 7 months ago
互联网上的流言蜚语被普遍认为像传染病一样扩散,但山东师范大学的物理学家 Wenrong Zheng 认为传染病模型并不能准确描述流言的传播方式:传染病模型将流言的传播视为被动感染的过程,忽
安全红队和MDR之间的关键联系
1 year 7 months ago
由于很多企业的安全运营能力和专业安全人才有限,因此难以快速检测和响应各种安全威胁。在此情况下,托管式威胁检测和响应服务(MDR)开始得到企业组织的关注。相比EDR(端点威胁检测与响应)和XDR(可扩展
Checked
6 hours 56 minutes ago
unSafe.sh - 不安全
不安全 feed