不安全
5 Must-Have Tools for Effective Dynamic Malware Analysis
3 months 2 weeks ago
Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample
Fusion Fireside #4: Special PSR edition with our guest Chris Bone
3 months 2 weeks ago
PSR is just a weekend away. That’s why we’re excited to release a special episode of Fusion Fi
Finding a needle in a haystack: Machine learning at the forefront of threat hunting research
3 months 2 weeks ago
IntroductionIn the ever-evolving landscape of cybersecurity, logs, that is informatio
Apparate: Early-Exit Models for ML Latency and Throughput Optimization - Abstract and Introduction
3 months 2 weeks ago
Authors:(1) Yinwei Dai, Princeton University (Equal contributions);(2) Rui Pan, Princeton Univers
Andariel Hacking Group Shifts Focus to Financial Attacks on U.S. Organizations
3 months 2 weeks ago
Three different organizations in the U.S. were targeted in August 2024 by a North Korean state-spon
Face Off: US Election Debate Sparks New Wave of Crypto-Doubling Scams
3 months 2 weeks ago
In the wake of the second US presidential election debate between Democrat Kamala Harris and Re
How to download ida free on the new website without creating an account?
3 months 2 weeks ago
Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 2
3 months 2 weeks ago
NotebookLM:Google打造的AI驱动笔记工具,让你的文档“活”起来
3 months 2 weeks ago
大家好,本文给大家介绍一个 Google 推出的实验性 AI 产品 - NotebookLM。作为一个 IT 狗,看到这种新玩意儿总是忍不住想上手试试。这次体
Microsoft Alert: New INC Ransomware Targets US Healthcare
3 months 2 weeks ago
As per a recent Microsoft alert, a threat actor with malicious financial motives has been observed
Police arrested four new individuals linked to the LockBit ransomware operation
3 months 2 weeks ago
Police arrested four new individuals linked to the LockBit ransomware operationAn internationa
Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw
3 months 2 weeks ago
Email Security / VulnerabilityCybersecurity researchers are warning about active exploitation atte
PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data
3 months 2 weeks ago
Supply Chain Attack / CryptocurrencyA new set of malicious packages has been unearthed in the Pyth
墨问便签——记录即创作
3 months 2 weeks ago
最近,很多人开始关注一个叫「墨问便签」的小程序产品,它在创作者圈子里逐渐火了起来。墨问便签不仅支持文字记录,还能通过图片、语音等多种方式记录您的灵感和思考。便
如何使用 pip 安装 requirements.txt 文件中的依赖包,以及如何生成 requirements.txt
3 months 2 weeks ago
在 Python 项目中,依赖管理是一个非常重要的环节。为了方便团队协作和项目部署,我们通常会使用 requirements.txt 文件来列出项目所需的所有
ISC Stormcast For Wednesday, October 2nd, 2024 https://isc.sans.edu/podcastdetail/9162, (Wed, Oct 2nd)
3 months 2 weeks ago
CISA: Thousands of bugs remediated in second year of vulnerability disclosure program
3 months 2 weeks ago
Thousands of vulnerabilities were identified and remediated through a government clearinghouse in 2
Overview of Content Published in September
3 months 2 weeks ago
Overview of Content Published in September Filed under: Announcement — Didier Stevens @
How to Build a SOAR Playbook: Start with the Artifacts
3 months 2 weeks ago
Developing SOAR (Security Orchestration, Automation, and Response) playbooks can be daunting, espec
Checked
2 hours 3 minutes ago
unSafe.sh - 不安全
不安全 feed