Aggregator
RapidDNS Pro 上线:解锁百万级数据导出,与终身会员计划
2 months 1 week ago
大家好,我是 RapidDNS 的开发者——男人老白。有些老朋友可能知道,RapidDNS 已经默默运行了 5 年,如今正式迈入了第 6 个年头。
写在黄金5000点 | 黄金
2 months 1 week ago
黄金5000点就是顶点吗?
伪装成Chrome安装程序银狐黑产最新攻击样本与威胁情报
2 months 1 week ago
伪装成Chrome安装程序银狐最新攻击样本与威胁情报
年底了,该上才艺了!
2 months 1 week ago
今年微步干啥了?
JVN: Schneider Electric製EcoStruxure Process Expertにおけるインストール時のファイルアクセス権の設定が不適切な脆弱性
2 months 1 week ago
Schneider Electricが提供するEcoStruxure Process Expertには、インストール時のファイルアクセス権の設定が不適切な脆弱性が存在します。
JVN: AutomationDirect製CLICK Programmable Logic Controllerにおける複数の脆弱性
2 months 1 week ago
AutomationDirectが提供するCLICK Programmable Logic Controllerには、複数の脆弱性が存在します。
JVN: Rockwell Automation製CompactLogix 5370における数値の入力に対する不適切な検証の脆弱性
2 months 1 week ago
Rockwell Automationが提供するCompactLogix 5370には、数値の入力に対する不適切な検証の脆弱性が存在します。
JVN: Johnson Controls製iSTAR Configuration Utility (ICU) toolにおけるスタックベースのバッファオーバーフローの脆弱性
2 months 1 week ago
Johnson Controlsが提供するiSTAR Configuration Utility (ICU) toolには、スタックベースのバッファオーバーフローの脆弱性が存在します。
JVN: 複数のWeintek製品における複数の脆弱性
2 months 1 week ago
Weintekが提供する複数の製品には、複数の脆弱性が存在します。
What is User Managed Access?
2 months 1 week ago
Deep dive into User Managed Access (UMA). Learn how UMA 2.0 works with OAuth2 and OIDC to provide user-centric privacy and resource sharing in Enterprise SSO.
The post What is User Managed Access? appeared first on Security Boulevard.
SSOJet - Enterprise SSO & Identity Solutions
A One-Page Introduction to CardSpace Technology
2 months 1 week ago
Explore the fundamentals of CardSpace technology, its role in the identity metasystem, and lessons for modern enterprise SSO and CIAM solutions.
The post A One-Page Introduction to CardSpace Technology appeared first on Security Boulevard.
SSOJet - Enterprise SSO & Identity Solutions
Anomaly Detection in Post-Quantum AI Orchestration Workflows
2 months 1 week ago
Discover how to secure AI orchestration workflows using post-quantum cryptography and AI-driven anomaly detection for Model Context Protocol (MCP) environments.
The post Anomaly Detection in Post-Quantum AI Orchestration Workflows appeared first on Security Boulevard.
Read the Gopher Security's Quantum Safety Blog
唐云阳:电子数据完整性的功能扩张及其反思 |《环球法律评论》2025年第6期
2 months 1 week ago
本文系《电子数据完整性的功能扩张及其反思》一文的正文,注释从略,全文发表于《环球法律评论》2025年第6期,原文请参见环球法律评论网站:https://globallawreview.ajcass.com,或点击文末左下角“阅读原文”。
【虚假视频的技术识别与制作源头追溯】
2 months 1 week ago
随着生成式人工智能技术的飞速发展,AI换脸(深度伪造)技术已从娱乐工具演变为新型网络犯罪的利器。
Pwn2Own: Researchers Earn $1 Million for 76 Zero-Days
2 months 1 week ago
Discover how TrendAI Zero Day Initiative (ZDI) identified critical vulnerabilities across connected vehicles, EV chargers, and automotive systems.
Trend Micro Research
Embracing Choice in Cybersecurity: TrendAI Vision One™ and SentinelOne Integration
2 months 1 week ago
Discover how the TrendAI Vision One and SentinelOne integration exemplifies our commitment to endpoint flexibility.
Jenny Hua
美团 EvoCUA 刷新开源 SOTA,会用电脑还会持续进化的智能体!
2 months 1 week ago
美团技术团队推出了 EvoCUA 模型并在 Github、Huggingface 开源,通过构建可验证数据合成引擎与十万级并发的交互沙盒,将训练范式从传统的“静态轨迹模仿”转变为高效的“经验进化学习”。
美团技术团队
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups
2 months 1 week ago
PeckBirdy is a sophisticated JScript-based C&C framework used by China-aligned APT groups to exploit LOLBins across multiple environments, delivering advanced backdoors to target gambling industries and Asian government entities.
Ted Lee
威努特DeepSeek一体机赋能企业AI应用和数字化转型
2 months 1 week ago
为企业提供一站式的大模型落地服务。