Aggregator
AI 的「i」,原来是斜杠青年的「金箍棒」!
8 months 1 week ago
如果他可以,那你也可以。
AI 是如何利用语言技巧「操纵」人类的?
8 months 1 week ago
蔡康永老师看了都想拜师。
AI 的「i」,原来是斜杠青年的「金箍棒」!
8 months 1 week ago
如果他可以,那你也可以。整理 | 汤一涛编辑 | 靖宇12 年前,赵纯想开始给韩寒的电子杂志写小说,后来陆续出版了《坏一坏》和《人生灿灿》两本书。3 年前,他还一行代码都不会写。再之后,他的身份从小说
AI 是如何利用语言技巧「操纵」人类的?
8 months 1 week ago
蔡康永老师看了都想拜师。作者 | Moonshot编辑 | 靖宇AI 说话没有情感的论调,已经是过去式了。曾几何时,语言被认为是我们智人特有的能力,人类通过语言传递信息和情绪,表达抽象和具体的概念。正
CVE-2012-3399 | Artis.imag Basilic 1.5.14 file input validation (EDB-19631 / Nessus ID 59850)
8 months 1 week ago
A vulnerability, which was classified as critical, has been found in Artis.imag Basilic 1.5.14. Affected by this issue is some unknown functionality. The manipulation of the argument file leads to improper input validation.
This vulnerability is handled as CVE-2012-3399. The attack may be launched remotely. Furthermore, there is an exploit available.
vuldb.com
Pointer Overflow CTF - 2024 Web全write up
8 months 1 week ago
Pointer Overflow CTF - 2024 Web全write up
某渗透中代码审计到内网遨游
8 months 1 week ago
某渗透中代码审计到内网遨游
初识AFL:工具安装与基本用法
8 months 1 week ago
初识AFL:工具安装与基本用法
银狐黑产组织最新免杀样本详细分析
8 months 1 week ago
银狐黑产组织最新免杀样本详细分析
2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto
8 months 1 week ago
2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto
某系统代码审计到getshell
8 months 1 week ago
某系统代码审计到getshell
某系统审计权限绕过-CVE-2024-9554
8 months 1 week ago
某系统审计权限绕过-CVE-2024-9554
2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP
8 months 1 week ago
2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP
代码审计-某物联网系统RCE
8 months 1 week ago
代码审计-某物联网系统RCE
2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解
8 months 1 week ago
2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解
2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE
8 months 1 week ago
2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE
基于优化的大模型越狱技术分析与实战
8 months 1 week ago
基于优化的大模型越狱技术分析与实战
How Will Health Data Privacy, Cyber Regs Shape Up in 2025?
8 months 1 week ago
Washington and Nevada were among states enacting new data privacy laws in 2024, and that trend among states will likely continue into 2025 as the next presidential administration comes into office promising to reduce federal regulations, said attorney Melissa Crespo of law firm Morrison Foerster.
Why Cloud Identity Attacks Outpace On-Premises Risks
8 months 1 week ago
Blackpoint Cyber CEO Jon Murchison on MSP Cloud Identity Risks
With a 30-to-1 ratio of cloud to on-premises attacks, Blackpoint Cyber CEO Jon Murchison stresses the importance of enhanced identity detection and AI-driven solutions. He also outlines strategic moves for managed service providers to align with Microsoft’s ecosystem.
With a 30-to-1 ratio of cloud to on-premises attacks, Blackpoint Cyber CEO Jon Murchison stresses the importance of enhanced identity detection and AI-driven solutions. He also outlines strategic moves for managed service providers to align with Microsoft’s ecosystem.