不安全
The J-Magic Show: Magic Packets and Where to Find Them | by @lumentechco - Backdoor targeting #Juniper routers listens for a hidden "magic packet" to ...
1 year 2 months ago
ETW Threat Intelligence and Hardware Breakpoints
1 year 2 months ago
Modern Endpoint Detection and Response (EDR) solutions rely heavily on Windows’ Event Tracing fo
The HackerNoon Newsletter: Surviving the Google SERP Data Crisis (1/23/2025)
1 year 2 months ago
HackerNoon Decoded 2024: Celebrating Our Cybersecurity Community!
1 year 2 months ago
Welcome to HackerNoon Decoded: Cybersecurity Edition—the ultimate recap of the stories, writers, and
Meet TILDI TECH, Space Copy & Tech Lead Journal: HackerNoon Startups of the Week
1 year 2 months ago
Welcome to HackerNoon Startups of the Week! Each week, we highlight standout startups from our Start
SecWiki News 2025-01-23 Review
1 year 2 months ago
2025-01-22期刊征文-暗网抑制前沿进展 ourren || discuss
Need help with creating zip bombs (for educational purposes)
1 year 2 months ago
import os, zipfiledef create_file(filename): with open(filename, 'w') as f: for
Protecting the Backbone of Modern Development: Scanning Secrets in Container Registries
1 year 2 months ago
In November 2024, we investigated Docker Hub, the leading public container registry, uncovering
SonicWall warns of SMA1000 RCE flaw exploited in zero-day attacks
1 year 2 months ago
SonicWall is warning about a pre-authentication deserialization vulnerability in SonicWall S
Management software on Dell precision 3470
1 year 2 months ago
This vulnerability, affecting the SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) and reported by MSTIC, loo...
1 year 2 months ago
Help Needed!
1 year 2 months ago
New to hashcat,trying to run this command but it just leaves a new line and then stops , w
Hackers imitate Kremlin-linked group to target Russian entities
1 year 2 months ago
A little-known hacking group has been mimicking the tactics of a prominent Kremlin-linked threat ac
Tesla EV charger hacked twice on second day of Pwn2Own Tokyo
1 year 2 months ago
Security researchers hacked Tesla's Wall Connector electric vehicle charger twice on the se
Stealthy 'Magic Packet' malware targets Juniper VPN gateways
1 year 2 months ago
A malicious campaign has been specifically targeting Juniper edge devices, many acting as VP
9 Internal Data Breach Examples to Learn From
1 year 2 months ago
In the past year, 68% of
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits
1 year 2 months ago
Firmware Security / VulnerabilityAn exhaustive evaluation of three firewall models from Palo Alto
Where to get hands on experience
1 year 2 months ago
AI Is Now Creating Antidotes for Snake Venom
1 year 2 months ago
Using artificial intelligence (AI) technology, a research team from the University of Washington fou
Checked
13 hours 26 minutes ago
unSafe.sh - 不安全
不安全 feed