issues
search
chainreactors
/
picker
将repo变成RSS订阅,文章整理归档, 讨论的社区
GNU General Public License v3.0
110
stars
19
forks
source link
[每日信息流] 2024-09-25
#659
Closed
chainreactorbot
closed
3 weeks ago
chainreactorbot
commented
1 month ago
每日安全资讯(2024-09-25)
SecWiki News
[ ]
SecWiki News 2024-09-24 Review
Hacking Articles
[ ]
OSINT : User Privacy in Linux
Security Boulevard
[ ]
Congressional Staffers’ Data Leaked on Dark Web: Report
[ ]
CrowdStrike Gets Grilled By U.S. Lawmakers Over Faulty Software Update
[ ]
USENIX NSDI ’24 – A Large-Scale Deployment of DCTCP
[ ]
Diddy Do It? Or Did Cybercriminals? How Hackers Are Turning Scandals Into Cyber Attacks
[ ]
Automating Certificate Lifecycle Management in Windows OS with AppViewX AVX ONE CLM
[ ]
CRQ Loss Exceedance Curves for Risk Management | Kovrr
[ ]
SBOM-a-Rama Fall 2024: Sonatype’s top 5 takeaways
[ ]
Randall Munroe’s XKCD ‘Maslow’s Pyramid’
[ ]
Microsoft Pushes Governance, Sheds Unused Apps in Security Push
[ ]
Join KubeCrash Fall 2024 for Platform Engineering the Cloud Native Way
Doonsec's feed
[ ]
【漏洞预警】Apache Tomcat资源分配控制不当漏洞可致拒绝服务CVE-2024-38286
[ ]
【AI速读】以色列和黎巴嫩真主党:当前的暴力和潜在的升级
[ ]
财富的真相,
[ ]
Thinkphp5.1.0-Thinkphp5.1. 文件包含漏洞(CNVD-2024-29981)
[ ]
相比较chatgpt,o1会不会更好?
[ ]
杜叔叔:Telegram 更新服务条款,违规用户信息披露政策
[ ]
【年会】中国法学会网络与信息法学研究会2024年年会暨第二届数字法治大会圆满闭幕
[ ]
【年会】中国法学会网络与信息法学研究会2024年年会暨第二届数字法治大会分论坛成功举行
[ ]
警惕风险突出的100个高危漏洞
[ ]
企业和个人注意暗网中潜伏的威胁
[ ]
专题·大模型安全 | 生成式人工智能对国家安全的挑战
[ ]
【干货】笑傲职场的独家经验(1)
[ ]
【干货原创】实网攻防演习常态化,会带来什么变化01
[ ]
【干货原创】K12教育,鲜为人知的模式秘密
[ ]
原创文章目录
[ ]
冷硬缓存——利用缓存滥用绕过 RPC 接口安全
[ ]
记一次攻防演练被某部委安全团队拷打全过程
[ ]
红队安全攻防知识库
[ ]
2024全国民营企业科技创新与标准创新大会暨全国知名民企助力创新龙江建设大会在哈举行,安天代表龙江民营企业做主旨发言
[ ]
成都网安周暨CCS2024 | 大模型安全与产业应用创新研讨活动成功举办
[ ]
百度安全与云安全联盟CSA大中华区联合发布《AI安全产业图谱(2024)》
[ ]
FTP,SSH,MYSQL,MSSQL等弱口令爆破工具 - week-passwd
[ ]
卫星互联网安全产业化提速——盛邦安全董事长权小文接受中国证券报采访
[ ]
关于提交2024年中关村仿生机器人大赛初赛展示材料的通知
[ ]
专家解读 | 凝聚合力 为人工智能持续向善发展保驾护航
[ ]
赛迪研究院开展“根在基层”——县域新型工业化路径及模式探索主题青年调研活动
[ ]
警惕 | 风险突出的100个高危漏洞
[ ]
专家观点 | 公共数据确权授权规则亟须规范
[ ]
前沿 | 谷歌前CEO:人工智能时代需要新式武器
[ ]
国际 | 日本加快网络信息战布局
[ ]
评论 | 退改签骗局频发背后是个人信息保护之困
[ ]
CTF战队公开交流群
[ ]
国家信息中心与华为联合发布《城市算力网:网络直连篇研究报告》
[ ]
背调公司发生超大规模数据泄漏,一亿美国人隐私信息暴露
[ ]
数据被删改、登记本不翼而飞!记者披露无锡虹桥医院调查细节
[ ]
乌克兰因安全风险首次禁用Telegram
[ ]
智库专题 | 中小企业信息系统安全研究
[ ]
关注 | 欧盟建立人工智能工厂提升创新竞争力
[ ]
专访肖棉文 | 华大基因网络安全守护者,从个人热爱到企业责任
[ ]
年度AI安全创新产品等你来评 | WitAwards 2024 评选
[ ]
美国100万卡巴斯基用户发现:电脑的安全软件已自动替换为UltraAV
[ ]
PingCastle:一款针对活动目录AD的安全强化工具
[ ]
国投智能(美亚柏科)25周年庆家属开放日活动成功举行
[ ]
【相关分享】两份edu的渗透测试分享
[ ]
2024健身打卡第 49 天
[ ]
你活得不快乐的原因是:既无法忍受目前的状态,又没能力改变这一切,可以像只猪一样懒,却无法像只猪一样懒得心安理得。
[ ]
乌克兰报告揭示俄网攻最新动向:从破坏行动转向情报窃取
[ ]
腾讯安全攻击面管理、嵌入式安全审计平台两大产品荣膺网络安全优秀创新成果优胜奖
[ ]
电报xa0Telegram 的划时代转折点,网络犯罪分子的 IP 和电话将被通报给当局!
[ ]
MoneyGram 网络攻击导致全球服务中断
[ ]
【成功复现】Docassemble任意文件读取漏洞(CVE-2024-27292)
[ ]
地理冷知识,颠覆你的世界观!
[ ]
优秀攻击团队 | 云弈科技信息通信领域获佳绩
[ ]
网络安全行业证书 明天涨价 懂的都懂
[ ]
模型对抗时代,金融行业智能化风险经营怎么做? | 产业安全专家谈
[ ]
2024年度关键信息基础设施安全保护论坛取得圆满成功
[ ]
关保联盟第一届第三次关保联盟会员大会成功举办
[ ]
293.4万元网络安全监管服务项目
[ ]
CCS2024 | 共话大模型安全 共探产业应用创新
[ ]
CCS2024 | 白帽安全攻防技术交流 洞见未来共筑安全基石
[ ]
m0leCon CTF 2025 Teaser re Embedded encryption RISCV 对称密码
[ ]
Telegram更新隐私条款,将与执法机构共享嫌犯信息
[ ]
新课来袭 | WMBa0带你领略Android逆向的魅力!在CTF赛场上所向披靡
[ ]
红队武器库2.0版本,内含数百款渗透工具
[ ]
【$4133.70】利用 YouTube 窃取文件
[ ]
活动预告︱悬镜安全受邀参与2024开放原子开源生态大会
[ ]
奇安信集团董事长齐向东赴准能集团调研
[ ]
“银狐”木马肆虐不息,EDR护航终端安全无忧
奇安信攻防社区
[ ]
管道竞争-m0leCon CTF Teaser 2025-ducts
[ ]
操纵解码越狱大模型
Files ≈ Packet Storm
[ ]
ABB Cylon Aspect 3.08.01 Remote Code Execution
[ ]
ABB Cylon Aspect 3.08.01 Arbitrary File Deletion
[ ]
Zeek 6.0.7
[ ]
Traccar 5.12 Remote Code Execution
[ ]
Ubuntu Security Notice USN-7030-1
[ ]
Gentoo Linux Security Advisory 202409-24
[ ]
Gentoo Linux Security Advisory 202409-23
[ ]
Apple iOS 17.2.1 Screen Time Passcode Retrieval / Mitigation Bypass
[ ]
Ubuntu Security Notice USN-7029-1
[ ]
Netman 204 4.05 SQL Injection / Unauthenticated Password Reset
[ ]
Gentoo Linux Security Advisory 202409-22
[ ]
Elaine's Realtime CRM Automation 6.18.17 Cross Site Scripting
[ ]
Ubuntu Security Notice USN-7007-3
[ ]
PHP ACRSS 1.0 Cross Site Request Forgery
[ ]
Gentoo Linux Security Advisory 202409-21
[ ]
Reservation Management System 1.0 Backup Disclosure
[ ]
Rail Pass Management System 1.0 Insecure Settings
[ ]
Red Hat Security Advisory 2024-7052-03
[ ]
Red Hat Security Advisory 2024-7005-03
[ ]
Red Hat Security Advisory 2024-7004-03
[ ]
PreSchool Enrollment System 1.0 Insecure Settings
[ ]
PHP SPM 1.0 Cross Site Request Forgery
[ ]
Red Hat Security Advisory 2024-7003-03
[ ]
Ubuntu Security Notice USN-7021-2
[ ]
Red Hat Security Advisory 2024-7002-03
嘶吼 RoarTalk – 网络安全行业综合服务平台,4hou.com
[ ]
最具成长潜力奖!2024中国互联网发展创新与投资大赛(深圳)落幕,爱加密载誉而归
[ ]
11周年 | 初心不改,焕新前行,奔赴下一个10年
[ ]
喜迁新址,筑梦新程,乔迁庆典圆满完成,爱加密再启新篇
[ ]
盛邦安全入选IDC《中国WAAP厂商技术能力评估,2024》报告,获满分评价!
[ ]
盛邦安全权小文:多源异构数据融合技术在威胁情报实战化趋势下将“大有可为”
[ ]
勒索软件团伙滥用 Microsoft Azure 工具窃取数据
[ ]
《网络安全人才实战能力白皮书-安全测试评估篇》发布
Recent Commits to cve:main
[ ]
Update Tue Sep 24 22:31:38 UTC 2024
[ ]
Update Tue Sep 24 14:30:42 UTC 2024
[ ]
Update Tue Sep 24 06:40:46 UTC 2024
Der Flounder
[ ]
Managing Gatekeeper with configuration profiles on macOS Sequoia
Private Feed for M09Ic
[ ]
spf13 starred NullTale/LutLight2D
[ ]
panjf2000 starred localsend/localsend
[ ]
BishopFox made BishopFox/BrokenHill public
[ ]
kpcyrd starred WinampDesktop/winamp
[ ]
kpcyrd starred alexcrichton/tar-rs
[ ]
TideSec released v2.5.1 增加自动更新 at TideSec/TscanPlus
[ ]
Ridter starred outlaws-bai/Galaxy
[ ]
Ridter starred BlackSnufkin/NyxInvoke
[ ]
Ridter starred Pennyw0rth/NetExec-Lab
[ ]
Ridter starred BeyondDimension/SteamTools
[ ]
Ridter starred Dump-GUY/EXE-or-DLL-or-ShellCode
[ ]
Ridter starred sec-consult/msiscan
[ ]
Ridter starred Ivan1ee/Sharp4SoapShell
[ ]
mgeeky starred evilashz/PigSyscall
[ ]
zer0yu starred raminfp/the-art-of-fuzzing
[ ]
mgeeky starred Dec0ne/HWSyscalls
[ ]
h3zh1 pushed to master in chainreactors/malefic
[ ]
uknowsec made uknowsec/ProxyPool public
[ ]
mgeeky starred mandiant/flare-vm
[ ]
gh0stkey starred YouChenJun/Keydd
[ ]
gh0stkey starred honmashironeko/ProxyCat
[ ]
HuYlllc pushed to dev in chainreactors/malice-network
[ ]
h3zh1 pushed to dev in chainreactors/malice-network
Trustwave Blog
[ ]
Microsoft Copilot for Security – Proper Configuration is the Key
obaby@mars
[ ]
100行代码实现 favicon 小工具
一个被知识诅咒的人
[ ]
深入理解华为仓颉语言的存储数据类型
[ ]
Go语言Mutex的优化与TryLock机制解析
Perception Point
[ ]
You Don’t Need an Agent to Secure Your Browser
CXSECURITY Database RSS Feed - CXSecurity.com
[ ]
Linux i915 PTE Use-After-Free
[ ]
Apple iOS 17.2.1 Screen Time Passcode Retrieval / Mitigation Bypass
[ ]
Elaine's Realtime CRM Automation 6.18.17 Cross Site Scripting
安全客-有思想的安全新媒体
[ ]
德国查封了 47 家与“地下经济”有关的加密货币交易所
[ ]
Ivanti 云服务设备再遭攻击:新漏洞广泛利用,安全问题频发
[ ]
威胁行为者在复杂的凭证窃取活动中利用与HR相关的钓鱼战术
[ ]
黑客从亚洲加密平台 BingX 窃取了超过 4400 万美元
[ ]
Sam Altman表示ChatGPT将带来难以想象的繁荣并解决气候问题
[ ]
Windows Server 2025 将获得无需重启的热补丁选项
[ ]
ESET 修复了其产品中的两个权限提升漏洞
[ ]
新Necro特洛伊木马通过Google Play和非官方应用程序瞄准超过1100万台Android设备
[ ]
WordPress 主题“Houzez”和相关插件漏洞暴露了数千个网站
[ ]
开挂神器能让企业管理有多轻松?这才是真正的职场爽文
SpiderLabs Blog
[ ]
HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content
Payatu
[ ]
How to Pentest React Native Apps – An Introduction
blog.avast.com EN
[ ]
A new wave of personalized sextortion scams—Using Google Street View images to startle targets
Trail of Bits Blog
[ ]
A few notes on AWS Nitro Enclaves: Attack surface
Reverse Engineering
[ ]
MITM proxy to strip PII when using ChatGPT using local LLM
Hex Rays
[ ]
Unveiling IDA Pro 9.0: Introducing the FLIRT Manager And Thousands Of New Signatures
PortSwigger Blog
[ ]
API Security: The 6 biggest challenges AppSec teams face, and how to solve them.
bishopfox.com
[ ]
Broken Hill: A Productionized Greedy Coordinate Gradient Attack Tool for Use Against Large Language Models
安全牛
[ ]
新场景安全需求快速释放,A股市场网络安全板块性价比凸显;德勤因服务器配置不当遭入侵,大量内部通讯信息或泄露 | 牛览
[ ]
活动预告 | 《新一代网络安全服务应用指南(2024版)》线上发布会即将举办
FreeBuf网络安全行业门户
[ ]
专访肖棉文 | 华大基因网络安全守护者,从个人热爱到企业责任
[ ]
FreeBuf早报 | MoneyGram服务被迫下线三天;IDC发布CNAPP市场份额报告
[ ]
年度AI安全创新产品等你来评 | WitAwards 2024 评选
[ ]
美国100万卡巴斯基用户发现:电脑的安全软件已自动替换为UltraAV
[ ]
又一安卓恶意软件曝光,至少1100 万台设备已“中招”!
奇客Solidot–传递最新科技情报
[ ]
Starlink 卫星影响射电望远镜的观测
[ ]
创业公司推出 Fair Source 许可证以避免开源授权的陷阱
[ ]
1100 万设备感染了 Google Play 托管的僵尸网络恶意程序
[ ]
卫星照片显示俄罗斯洲际弹道导弹发生爆炸
[ ]
研究建议做重要决策前睡个觉
[ ]
OpenAI CEO 称距离超级 AI 可能只有几千日
[ ]
微软停止开发 Windows Server Update Services
[ ]
Telegram 将向政府提供 IP 和电话号码等数据
[ ]
国际工会联合会认为亚马逊、特斯拉和 Meta 有害于民主
[ ]
部分美国卡巴斯基用户被自动更新到 UltraAV
[ ]
Telegram 以版权侵犯为由删除 Z-Library 帖子
KitPloit - PenTest & Hacking Tools
[ ]
SafeLine - Serve As A Reverse Proxy To Protect Your Web Services From Attacks And Exploits
腾讯玄武实验室
[ ]
每日安全动态推送(9-24)
代码卫士
[ ]
CISA:不安全软件的生产者就是恶棍的帮凶
[ ]
无提前通知,卡巴斯基自动删除并替换为 UltraAV
吾爱破解论坛
[ ]
拦截 Chrome DevTools Protocol 实现忽略与自定义 debugger
安全内参
[ ]
乌克兰报告揭示俄网攻最新动向:从破坏行动转向情报窃取
[ ]
背调公司发生超大规模数据泄漏,一亿美国人隐私信息暴露
dotNet安全矩阵
[ ]
.NET 一款通过核心进程转储凭据的工具
[ ]
.NET 内网攻防实战电子报刊
[ ]
37套.NET系统漏洞威胁情报(09.24更新)
中国信息安全
[ ]
专题·大模型安全 | 生成式人工智能对国家安全的挑战
[ ]
专家解读 | 凝聚合力 为人工智能持续向善发展保驾护航
[ ]
警惕 | 风险突出的100个高危漏洞
[ ]
专家观点 | 公共数据确权授权规则亟须规范
[ ]
前沿 | 谷歌前CEO:人工智能时代需要新式武器
[ ]
国际 | 日本加快网络信息战布局
[ ]
评论 | 退改签骗局频发背后是个人信息保护之困
补天平台
[ ]
【补天训练“赢”】Day1安全团队上干货:独家思路+动手实操+小班特训!
极客公园
[ ]
没有 Mate 70,华为发布了26 万的智界 R7 ,和即将铺开的「纯血鸿蒙」
[ ]
这个「微博」,几万个 AI 和你互动,成就你的「大 V 梦」
[ ]
价格战,让中国车市损失1380亿;今年全球机器人出货超4700万;Telegram创始人服软:向政府提供更多数据 | 极客早知道
全频带阻塞干扰
[ ]
关于反偷拍的一些想法
嘶吼专业版
[ ]
勒索软件团伙滥用 Microsoft Azure 工具窃取数据
[ ]
《网络安全人才实战能力白皮书-安全测试评估篇》发布
国家互联网应急中心CNCERT
[ ]
CNVD漏洞周报2024年第38期
[ ]
上周关注度较高的产品安全漏洞(20240916-20240922)
百度安全实验室
[ ]
成都网安周暨CCS2024 | 大模型安全与产业应用创新研讨活动成功举办
[ ]
百度安全与云安全联盟CSA大中华区联合发布《AI安全产业图谱(2024)》
OPPO安全中心
[ ]
2024年8月奖励公告
Yak Project
[ ]
聚焦AI+YAK生态!万径安全获数千万元深创投独家投资
山石网科安全技术研究院
[ ]
山石网科安研院第二季度原创技术文章合辑
安全419
[ ]
CCS2024 | 大咖访谈:威努特董事长兼CEO龙国东
[ ]
资料下载 | 网络安全标准实践指南、人工智能生成合成内容标识办法、人工智能安全治理体系1.0
TrustedSec
[ ]
Pull Your SOCs Up
Qualys Security Blog
[ ]
Enhancing Cloud-Native Security: Qualys Introduces Scanning for Container-Optimized OS in Google Kubernetes Engine
白泽安全实验室
[ ]
美国网军司令部举办了首次进攻性Cyber Flag演习
bellingcat
[ ]
Find the Right Open Source Research Tools With Bellingcat’s New Online Investigations Toolkit
Over Security - Cybersecurity news aggregator
[ ]
Windows 10 KB5043131 update released with 9 changes and fixes
[ ]
AutoCanada says ransomware attack "may" impact employee data
[ ]
Reverse engineering of esp32 flash dumps with ghidra or IDA Pro
[ ]
Analyzing an esp32 flash dump with ghidra
[ ]
Come mitigare le frodi bancarie con nuove procedure
[ ]
Kansas water plant cyberattack forces switch to manual operations
[ ]
U.S. govt agency CMS says data breach impacted 3.1 million people
[ ]
Study finds many European car resellers fail to delete driver data
[ ]
Infostealer malware bypasses Chrome’s new cookie-theft defenses
[ ]
Hackers deploy AI-written malware in targeted attacks
[ ]
Critical Ivanti vTM auth bypass bug now exploited in attacks
[ ]
Exclusive: State Department cyber bureau preps funding blitz aimed at boosting allies defenses
[ ]
Il trojan Necro ha attaccato 11 milioni di utenti Android
[ ]
Sweden says Iran behind cyberattack calling for revenge on Quran burners
[ ]
New twist on sextortion scam includes pictures of people's homes
[ ]
Generative AI Security: Getting ready for Salesforce Einstein Copilot
[ ]
La conformità alla NIS2 negli ambienti OT passa per lo Zero Trust e la segmentazione di rete
[ ]
Cyberthreats to railroads loom as industry and TSA grow an uneasy partnership
[ ]
TikTok blocks dozens of Kremlin-backed media accounts
[ ]
New Octo Android malware version impersonates NordVPN, Google Chrome
[ ]
MoneyGram confirms a cyberattack is behind dayslong outage
[ ]
Pro-Russia hackers aim DDoS campaign at Austrian websites ahead of elections
[ ]
MoneyGram says cyber incident causing network outages
[ ]
Threat Actor 888 Allegedly Claims Leak of SAP Employees Data
[ ]
Introducing Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser
[ ]
Web tracking report: who monitored users’ online activities in 2023–2024 the most
[ ]
Email, Email on the Wall, Who Sent You, After All?
[ ]
Octo2: European Banks Already Under Attack by New Malware Variant
[ ]
Critical Vulnerability Discovered in Versa Director: What Organizations Need to Know
Securityinfo.it
[ ]
Il trojan Necro ha attaccato 11 milioni di utenti Android
[ ]
La conformità alla NIS2 negli ambienti OT passa per lo Zero Trust e la segmentazione di rete
ICT Security Magazine
[ ]
XDR (eXtended Detection and Response): Il Futuro della Cybersecurity Aziendale
[ ]
Forum ICT Security 2024 – Anticipazione Agenda
[ ]
Un’introduzione a Self-Sovereign Identity
SANS Internet Storm Center, InfoCON: green
[ ]
Exploitation of RAISECOM Gateway Devices Vulnerability CVE-2024-7120, (Tue, Sep 24th)
[ ]
ISC Stormcast For Tuesday, September 24th, 2024 https://isc.sans.edu/podcastdetail/9150, (Tue, Sep 24th)
Schneier on Security
[ ]
Israel’s Pager Attacks and Supply Chain Vulnerabilities
Instapaper: Unread
[ ]
Russian APT Hackers Tools Matrix Unveiled
[ ]
Telegram says it will share phone numbers and IP addresses of ‘bad actors’ to authorities
[ ]
La polizia tedesca ha infiltrato TOR la rete anonima è ancora sicura
[ ]
Where's your BitLocker recovery key How to save a copy before the next Windows meltdown
[ ]
Le linee guida dell’Acn per difendere le Asl dagli attacchi cyber
[ ]
Guerre di Rete - Cercapersone esplosi una ricostruzione
[ ]
I cavi sottomarini sono a rischio sabotaggio
[ ]
Cybersecurity Italia prima della classe
[ ]
Police are using AI to write crime reports. What could go wrong
The Hacker News
[ ]
Necro Android Malware Found in Popular Camera and Browser Apps on Play Store
[ ]
U.S. Proposes Ban on Connected Vehicles Using Chinese and Russian Tech
[ ]
Discover Latest Ransomware Tactics and Zero Trust Strategies in This Expert Webinar
[ ]
Kaspersky Exits U.S., Automatically Replaces Software With UltraAV, Raising Concerns
[ ]
The SSPM Justification Kit
[ ]
New Octo2 Android Banking Trojan Emerges with Device Takeover Capabilities
[ ]
Telegram Agrees to Share User Data With Authorities for Criminal Investigations
Securelist
[ ]
Web tracking report: who monitored users’ online activities in 2023–2024 the most
Graham Cluley
[ ]
Warnings after new Valencia ransomware group strikes businesses and leaks data
[ ]
The AI Fix #17: Why AI is an AWFUL writer and LinkedIn’s outrageous land grab
[ ]
Citing security fears, Ukraine bans Telegram on government and military devices
[ ]
Two men arrested one month after $230 million of cryptocurrency stolen from a single victim
The Register - Security
[ ]
Who’s watching you the closest online? Google, duh
[ ]
Russia's digital warfare on Ukraine shows no signs of slowing: Malware hits surge
[ ]
10 nasty software bugs put thousands of fuel storage tanks at risk of cyberattacks
[ ]
How to spot a North Korean agent before they get comfy inside payroll
[ ]
A data leak and a data breach
[ ]
Some US Kaspersky customers find their security software replaced by 'UltraAV'
Security Current
[ ]
CISOs Connect™ Announces Winners of Its Inaugural A100 Breakthrough Security Leaders Awards
Full Disclosure
[ ]
CyberDanube Security Research 20240919-0 | Multiple Vulnerabilities in Netman204
[ ]
Submit Exploit CVE-2024-42831
NetSPI
[ ]
Backdooring Azure Automation Account Packages and Runtime Environments
Deeplinks
[ ]
EFF to Federal Trial Court: Section 230’s Little-Known Third Immunity for User-Empowerment Tools Covers Unfollow Everything 2.0
Information Security
[ ]
Linux commands CHEATSHEET for HACKERS
[ ]
Prevent Conflicts of Interest
[ ]
Why You Should Use 2FA for Online Security!
Palo Alto Networks Blog
[ ]
Forrester Names Palo Alto Networks a Leader in Attack Surface Management
TorrentFreak
[ ]
“Anne Frank” Copyright Dispute Triggers VPN and Geoblocking Questions at EU’s Highest Court
[ ]
Amazon Joins the MPA as its Newest Anti-Piracy Member Since Netflix in 2019
IT Service Management News
[ ]
ISO Survey 2023
KitPloit - PenTest Tools!
[ ]
SafeLine - Serve As A Reverse Proxy To Protect Your Web Services From Attacks And Exploits
Deep Web
[ ]
Is paying by qr save?
netsecstudents: Subreddit for students studying Network Security and its related subjects
[ ]
Active Directory Methodology in Pentesting: A Comprehensive Guide
[ ]
Is building a DNS Sinkhole with Threat Intelligence good final year project?
Security Affairs
[ ]
A generative artificial intelligence malware used in phishing attacks
[ ]
A cyberattack on MoneyGram caused its service outage
[ ]
Did Israel infiltrate Lebanese telecoms networks?
[ ]
Telegram will provide user data to law enforcement in response to legal requests
Computer Forensics
[ ]
Bypass NTFS permissions
[ ]
How much math do I need to know? Beginning my journey in DF
[ ]
Cuckoo Spear and NoopDoor
Social Engineering
[ ]
How to be more confident - writing by Daniel Katana
[ ]
How do I make myself off putting ?
Your Open Hacker Community
[ ]
how hard is it to bypass windows lockscreen?
网安寻路人
[ ]
美发布“关于开发高级人工智能(AI)模型和计算集群报告要求”的拟议规则通知
每日安全资讯(2024-09-25)