Aggregator
数据安全及数据安全CTF题目解题方法的总结
Post-Quantum Key Exchange for MCP Authentication
Explore post-quantum key exchange methods for securing Model Context Protocol (MCP) authentication. Learn about PQuAKE, implementation strategies, and future-proofing AI infrastructure against quantum threats.
The post Post-Quantum Key Exchange for MCP Authentication appeared first on Security Boulevard.
2025 强网杯 车联网赛道writeup
资产收集神器
香港大埔突发大火致多人死亡,谈谈个人看法
当“修仙”照进现实:在996的裂缝里,我们都在等一场逆袭
安全测试扫描工具ZAP
当“修仙”照进现实:在996的裂缝里,我们都在等一场逆袭
香港大埔突发大火致多人死亡,谈谈个人看法
安全测试扫描工具ZAP
PAM Backdoor分析
PAM Backdoor分析
科技爱好者周刊(第 375 期):一扇门的 Bug
R-HORIZON:探索长程推理边界,复旦NLP&美团LongCat联合提出LRMs能力评测新框架
威努特荣获机械工业科技进步奖二等奖!
CVE-2025-57833:Potential SQL injection in FilteredRelation column aliases
某管理系统源代码审计
Shiro反序列化 逆向分析代码及漏洞利用
Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
Hidden vulnerabilities in legacy code often create unseen risks for modern development environments. One such issue recently surfaced within the Python ecosystem, where outdated bootstrap scripts associated with the zc.buildout tool expose users to domain takeover attacks. These scripts, designed to automate the installation of package dependencies, contain hardcoded references to external domains that are […]
The post Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise appeared first on Cyber Security News.