-
-
### Describe the bug
Angel drainer a notorious drainer that has drained over $100m from Metamask users is bypassing phishing detection by changing their c2 domain every 5 minutes to avoid detection b…
-
To whom it may concern,
Fleek is a web hosting and storage provider, offering secure and scalable services for users to host websites and content. We operate the "on-fleek.app" sub-domain for user-…
-
Problem Statement - The Internet is frequently used by criminals for illegal activities, such as financial fraud, phishing, online gambling, fake TV shopping, fraudulent prize-winning, and spam SMS in…
-
#### List the website(s) you're having issues with:
`https://www.abs-cbn.com`
`https://www.abs-cbn.com/news/nation/2024/11/23/-unconstitutional-vp-duterte-draws-flak-for-acting-as-lawyer-o…
-
**Issue by [stanlenoir](https://github.com/stanlenoir)**
_Thursday Nov 26, 2015 at 09:21 GMT_
_Originally opened as https://github.com/adobe/brackets/issues/11958_
----
Since two days i got every f…
-
I'm working on a malicious url detection with lstm project and I found a **link on GitHub** :
https://github.com/incertum/cyber-matrix-ai/blob/master/Malicious-URL-Detection-Deep-Learning/Featureles…
-
WDYT? Is this publication in scope?
```
@inproceedings{Breier_2015,
author = {Breier, Jakub and He, Wei},
booktitle = {2015 International Workshop on Secure Internet of Things (SIoT)},
doi = {10.11…
aewag updated
2 weeks ago
-
您好,请问您说的malicious_web_page_detection_based_on_url和特征工程的部分在哪里可以查看呢?非常感谢啦!
-
The aud claim of a service account access token in K8s MUST include the URL of an OAuth server, and MUST NOT include the Kubernetes API server itself.
This ensures that these access tokens cannot b…