PyBot/resources/JSON/uni_rss.json

642 lines
47 KiB
JSON
Raw Normal View History

2025-03-14 11:50:28 +08:00
[
{
"title": "老显卡福音美团开源首发INT8无损满血版DeepSeek R1",
"link": "https://tech.meituan.com/2025/03/07/meituan-int8-deepseek-r1.html",
"author": "美团技术团队",
"description": "DeepSeek R1模型权重原生为FP8类型仅能被英伟达新型GPU支持。美团技术团队进行了INT8精度量化的尝试量化后模型精度基本无损可部署到A100等其他型号GPU从而解锁了芯片限制相比BF16实现了50%的吞吐提升降低了推理成本。相关技术已在Hugging Face上开源。",
"published": "2025-03-07 08:00:00",
"source": "美团技术团队"
},
{
"title": "上下文感知的聚合页广告优化实践",
"link": "https://tech.meituan.com/2025/03/02/context-enhanced-learning-for-intelligent-marketing.html",
"author": "美团技术团队",
"description": "聚合页广告将商家和优惠信息以多种形式聚合展示给用户,是美团广告业务中一个重要的业务场景。本文从最能影响用户决策的“发券”和“排序”两个方向出发,介绍了上下文感知建模在广告场景的落地方案,证明了聚合页上下文感知的收益空间。希望能对从事相关研究的同学带来一些启发或帮助。",
"published": "2025-03-02 08:00:00",
"source": "美团技术团队"
},
{
"title": "行为正则化与顺序策略优化结合的离线多智能体学习算法",
"link": "https://tech.meituan.com/2025/02/21/marl-in-meituan.html",
"author": "美团技术团队",
"description": "离线多智能体强化学习MARL是一个新兴领域目标是在从预先收集的数据集中学习最佳的多智能体策略。随着人工智能技术的发展多智能体系统在诸如自动驾驶、智能家居、机器人协作以及智能调度决策等方面展现了巨大的应用潜力。但现有的离线MARL方法也面临很多挑战仍存在不协调行为和分布外联合动作的问题。为了应对这些挑战中山大学计算机学院、美团履约平台技术部开展了学术合作项目并取得了一些的成果希望分享给大家。",
"published": "2025-02-21 08:00:00",
"source": "美团技术团队"
},
{
"title": "预测技术在美团弹性伸缩场景的探索与应用",
"link": "https://tech.meituan.com/2025/02/14/prediction-technology-in-meituan-elastic-scaling.html",
"author": "美团技术团队",
"description": "在管理企业大规模服务弹性伸缩的场景下Web应用的负载时序数据分析和预测至关重要。然而由于应用的周期性特征和负载的复杂性寻找一种能够适应所有应用的预测模型成为了一项挑战。美团与中国人民大学信息学院柴云鹏教授团队展开了“预测技术在弹性伸缩场景的应用”科研合作取得了较好的成果。希望能给从事相关研究工作的同学带来一些帮助或启发。",
"published": "2025-02-14 08:00:00",
"source": "美团技术团队"
},
{
"title": "美团技术年货 | 600+页电子书,算法、工程、测试、数据、安全系列大合集",
"link": "https://tech.meituan.com/2025/01/16/2024-spring-festival-present.html",
"author": "美团技术团队",
"description": "值蛇年春节到来之际我们精选过去一年公众号30多篇技术文章和科研论文整理制作成一本600多页的电子书作为一份特别的新年礼物献给每一位热爱技术的你。愿大家乘风破浪勇往直前",
"published": "2025-01-16 08:00:00",
"source": "美团技术团队"
},
{
"title": "鸿蒙应用签名实操及机制探究",
"link": "https://tech.meituan.com/2025/01/06/openharmony.html",
"author": "美团技术团队",
"description": "本文对鸿蒙公开资料进行了深入分析和解读,梳理了鸿蒙单框架应用的签名机制,拆解每一步的实操过程和背后的实现原理,并对源码分析整理签名的校验机制。从中管中窥豹,探究鸿蒙系统的安全设计思路,希望能给从事鸿蒙研发的同学提供一些借鉴。",
"published": "2025-01-06 08:00:00",
"source": "美团技术团队"
},
{
"title": "2024 | 美团技术团队热门技术文章汇总",
"link": "https://tech.meituan.com/2024/12/26/2024-happy-new-year-top10.html",
"author": "美团技术团队",
"description": "本文整理了2024年美团技术团队最为热门的10篇技术文章这些文章覆盖了基础理论、数据存储、因果推断、搜索推荐、智能测试、知识图谱、领域驱动设计等多个技术领域期望这些精选内容能为大家带来一些启发或帮助。愿大家在新的一年里持续深耕技术沃土稳步前行不断攀登新的高峰。",
"published": "2024-12-26 08:00:00",
"source": "美团技术团队"
},
{
"title": "AutoConsisUI内容一致性智能检测",
"link": "https://tech.meituan.com/2024/11/21/autoconsis-ui-meituan.html",
"author": "美团技术团队",
"description": "美团到店研发平台质量工程部与复旦大学计算机学院周扬帆教授团队展开了大前端智能化测试领域的科研合作从UI界面内容一致性校验入手并实现了一套自动化智能检测流程相关论文被软件工程领域具有国际影响力的会议ICSE 2024CCF-A类会议的Software In Practice Track软件工程实践应用收录。",
"published": "2024-11-21 08:00:00",
"source": "美团技术团队"
},
{
"title": "CIKM 2024 | 美团技术团队精选论文解读",
"link": "https://tech.meituan.com/2024/10/31/cikm-2024-meituan.html",
"author": "美团技术团队",
"description": "本文精选了美团技术团队被 CIKM 2024 收录的 8 篇论文进行解读覆盖了自监督学习、解释生成、CTR预测、跨域推荐、向量召回、图像生成、时效预测等多个技术领域。这些论文有美团独立研究还有跟高校、科研机构合作的成果。希望能给从事相关研究工作的同学带来一些帮助或启发。",
"published": "2024-10-31 08:00:00",
"source": "美团技术团队"
},
{
"title": "大前端:如何突破动态化容器的天花板?",
"link": "https://tech.meituan.com/2024/10/18/recce-in-meituan.html",
"author": "美团技术团队",
"description": "长久以来,容器要实现动态化和双端复用,难免要牺牲掉一些性能。有没有办法让动态化容器的性能尽可能接近原生?美团金服大前端团队给出了一种解决方案,尝试突破动态化容器的天花板。",
"published": "2024-10-18 08:00:00",
"source": "美团技术团队"
},
{
"title": "僵尸网络911 S5的数字遗产",
"link": "https://blog.netlab.360.com/911s5/",
"author": "lvxing",
"description": "<h1 id=\"%E6%A6%82%E8%BF%B0\">&#x6982;&#x8ff0;</h1><p>2024&#x5e74;5&#x6708;29&#x65e5;&#xff0c;&#x7f8e;&#x56fd;&#x53f8;&#x6cd5;&#x90e8;&#x53d1;&#x5e03;&#x901a;&#x544a;&#xff0c;&#x58f0;&#x79f0;&#x5176;&#x6267;&#x6cd5;&#x6d3b;&#x52a8;&#x6467;&#x6bc1;&#x4e86;&quot;&#x53f2;&#x4e0a;&#x6700;&#x5927;&#x7684;&#x50f5;&#x5c38;&#x7f51;&#x7edc;&quot; 911 S5&#xff0c;&#x67e5;&#x5c01;&#x4e86;&#x76f8;&#x5173;&#x57df;&#x540d;</p>",
"published": "Fri, 14 Jun 2024 09:20:11 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Heads up! Xdr33, A Variant Of CIAs HIVE Attack Kit Emerges",
"link": "https://blog.netlab.360.com/headsup_xdr33_variant_of_ciahive_emeerges/",
"author": "Alex.Turing",
"description": "<h1 id=\"overview\">Overview</h1>\n<p>On Oct 21, 2022, 360Netlab&apos;s honeypot system captured a suspicious ELF file <code>ee07a74d12c0bb3594965b51d0e45b6f</code>, which propagated via F5 vulnerability with zero VT detection, our system observces that it communicates with IP <code>45.9.150.144</code> using SSL with <strong>forged Kaspersky certificates</strong>, this caught our attention. After further lookup,</p>",
"published": "Tue, 10 Jan 2023 14:00:37 GMT",
"source": "360 Netlab Blog"
},
{
"title": "警惕魔改后的CIA攻击套件Hive进入黑灰产领域",
"link": "https://blog.netlab.360.com/warning-hive-variant-xdr33-is-coming_cn/",
"author": "Alex.Turing",
"description": "<!--kg-card-begin: markdown--><h1 id=\"id\">&#x6982;&#x8ff0;</h1>\n<p>2022&#x5e74;10&#x6708;21&#x65e5;&#xff0c;360Netlab&#x7684;&#x871c;&#x7f50;&#x7cfb;&#x7edf;&#x6355;&#x83b7;&#x4e86;&#x4e00;&#x4e2a;&#x901a;&#x8fc7;F5&#x6f0f;&#x6d1e;&#x4f20;&#x64ad;&#xff0c;VT 0&#x68c0;&#x6d4b;&#x7684;&#x53ef;&#x7591;ELF&#x6587;&#x4ef6;<code>ee07a74d12c0bb3594965b51d0e45b6f</code>&#xff0c;&#x6d41;&#x91cf;&#x76d1;&#x63a7;&#x7cfb;&#x7edf;&#x63d0;&#x793a;&#x5b83;&#x548c;</p>",
"published": "Mon, 09 Jan 2023 03:13:20 GMT",
"source": "360 Netlab Blog"
},
{
"title": "快讯使用21个漏洞传播的DDoS家族WSzero已经发展到第4个版本",
"link": "https://blog.netlab.360.com/new-ddos-botnet-wszeor/",
"author": "Hui Wang",
"description": "<!--kg-card-begin: markdown--><h2 id=\"id\">&#x6982;&#x8ff0;</h2>\n<p>&#x8fd1;&#x671f;&#xff0c;&#x6211;&#x4eec;&#x7684;BotMon&#x7cfb;&#x7edf;&#x8fde;&#x7eed;&#x6355;&#x83b7;&#x5230;&#x4e00;&#x4e2a;&#x7531;Go&#x7f16;&#x5199;&#x7684;DDoS&#x7c7b;&#x578b;&#x7684;&#x50f5;&#x5c38;&#x7f51;&#x7edc;&#x5bb6;&#x65cf;&#xff0c;&#x5b83;&#x7528;&#x4e8e;DDoS&#x653b;&#x51fb;&#xff0c;&#x4f7f;&#x7528;&#x4e86;&#x5305;&#x62ec;SSH/Telnet&#x5f31;&#x53e3;</p>",
"published": "Wed, 07 Dec 2022 12:58:21 GMT",
"source": "360 Netlab Blog"
},
{
"title": "P2P Botnets: Review - Status - Continuous Monitoring",
"link": "https://blog.netlab.360.com/p2p-botnets-review-status-continuous-monitoring/",
"author": "360Netlab",
"description": "<h1 id=\"origins\">Origins</h1>\n<p>P2P networks are more scalable and robust than traditional C/S structures, and these advantages were recognized by the botnet authors early on and used in their botnets. In terms of time, <a href=\"https://en.wikipedia.org/wiki/Storm_botnet?ref=blog.netlab.360.com\">Storm</a>, which appeared in 2007, can be considered the progenitor of this area, when botnet threats were</p>",
"published": "Thu, 03 Nov 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "P2P 僵尸网络:回顾·现状·持续监测",
"link": "https://blog.netlab.360.com/p2p-botnet-monitor/",
"author": "360Netlab",
"description": "<!--kg-card-begin: markdown--><h1 id=\"id\">&#x7f18;&#x8d77;</h1>\n<p>P2P&#x7ed3;&#x6784;&#x7684;&#x7f51;&#x7edc;&#x6bd4;&#x4f20;&#x7edf;&#x7684;C/S&#x7ed3;&#x6784;&#x5177;&#x6709;&#x66f4;&#x597d;&#x7684;&#x53ef;&#x6269;&#x5c55;&#x6027;&#x548c;&#x5065;&#x58ee;&#x6027;&#xff0c;&#x8fd9;&#x4e9b;&#x4f18;&#x70b9;&#x5f88;&#x65e9;&#x5c31;&#x4e3a;botnet&#x7684;&#x4f5c;&#x8005;&#x6240;&#x8ba4;&#x8bc6;&#x5230;&#x5e76;&#x88ab;&#x7528;&#x5230;</p>",
"published": "Wed, 02 Nov 2022 03:11:33 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Fodcha Is Coming Back, Raising A Wave of Ransom DDoS",
"link": "https://blog.netlab.360.com/fodcha-is-coming-back-with-rddos/",
"author": "Alex.Turing",
"description": "<h1 id=\"background\">Background</h1>\n<p>On April 13, 2022, 360Netlab first disclosed the <code>Fodcha</code> botnet. After our article was published, Fodcha suffered a crackdown from the relevant authorities, and its authors quickly responded by leaving <code>&quot;Netlab pls leave me alone I surrender&quot;</code> in an updated sample.No surprise, Fodcha&apos;s authors</p>",
"published": "Mon, 31 Oct 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "卷土重来的DDoS狂魔Fodcha僵尸网络再次露出獠牙",
"link": "https://blog.netlab.360.com/ddosmonster_the_return_of__fodcha_cn/",
"author": "Alex.Turing",
"description": "<h1 id=\"%E8%83%8C%E6%99%AF\">&#x80cc;&#x666f;</h1>\n<p>2022&#x5e74;4&#x6708;13&#x65e5;&#xff0c;360Netlab&#x9996;&#x6b21;&#x5411;&#x793e;&#x533a;&#x62ab;&#x9732;&#x4e86;Fodcha&#x50f5;&#x5c38;&#x7f51;&#x7edc;&#xff0c;&#x5728;&#x6211;&#x4eec;&#x7684;&#x6587;&#x7ae0;&#x53d1;&#x8868;&#x4e4b;&#x540e;&#xff0c;Fodcha&#x906d;&#x53d7;&#x5230;&#x76f8;&#x5173;&#x90e8;&#x95e8;&#x7684;&#x6253;&#x51fb;&#xff0c;&#x5176;&#x4f5c;&#x8005;</p>",
"published": "Thu, 27 Oct 2022 02:49:26 GMT",
"source": "360 Netlab Blog"
},
{
"title": "PureCrypter is busy pumping out various malicious malware families",
"link": "https://blog.netlab.360.com/purecrypter-is-busy-pumping-out-various-malicious-malware-families/",
"author": "wanghao",
"description": "<p>In our daily botnet analysis work, it is common to encounter various loaders.Compared to other types of malware, loaders are unique in that they are mainly used to &quot;promote&quot;, i.e., download and run other malware on the infected machine. According to our observations, most loaders are</p>",
"published": "Mon, 29 Aug 2022 13:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "PureCrypter Loader持续活跃已经传播了10多个其它家族",
"link": "https://blog.netlab.360.com/purecrypter/",
"author": "wanghao",
"description": "<!--kg-card-begin: markdown--><p>&#x5728;&#x6211;&#x4eec;&#x7684;&#x65e5;&#x5e38;botnet&#x5206;&#x6790;&#x5de5;&#x4f5c;&#x4e2d;&#xff0c;&#x78b0;&#x5230;&#x5404;&#x79cd;loader&#x662f;&#x5e38;&#x4e8b;&#x3002;&#x8ddf;&#x5176;&#x5b83;&#x79cd;&#x7c7b;&#x7684;malware&#x76f8;&#x6bd4;&#xff0c;loader&#x7684;&#x7279;&#x6b8a;&#x4e4b;&#x5904;&#x5728;&#x4e8e;&#x5b83;&#x4e3b;&#x8981;&#x7528;&#x6765;&#x201c;&#x63a8;&#x5e7f;&#x201d;&#xff0c;</p>",
"published": "Mon, 29 Aug 2022 01:20:17 GMT",
"source": "360 Netlab Blog"
},
{
"title": "A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information",
"link": "https://blog.netlab.360.com/a-new-botnet-orchard-generates-dga-domains-with-bitcoin-transaction-information/",
"author": "daji",
"description": "<p>DGA is one of the classic techniques for botnets to hide their C2s, attacker only needs to selectively register a very small number of C2 domains, while for the defenders, it is difficult to determine in advance which domain names will be generated and registered.</p><p>360 netlab has long focused</p>",
"published": "Fri, 05 Aug 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "DGA家族Orchard持续变化新版本用比特币交易信息生成DGA域名",
"link": "https://blog.netlab.360.com/orchard-dga/",
"author": "daji",
"description": "<!--kg-card-begin: markdown--><p>DGA&#x662f;&#x4e00;&#x79cd;&#x7ecf;&#x5178;&#x7684;botnet&#x5bf9;&#x6297;&#x68c0;&#x6d4b;&#x7684;&#x6280;&#x672f;&#xff0c;&#x5176;&#x539f;&#x7406;&#x662f;&#x4f7f;&#x7528;&#x67d0;&#x79cd;DGA&#x7b97;&#x6cd5;&#xff0c;&#x7ed3;&#x5408;&#x7279;&#x5b9a;&#x7684;&#x79cd;&#x5b50;&#x548c;&#x5f53;&#x524d;&#x65e5;&#x671f;&#xff0c;&#x5b9a;&#x671f;&#x751f;&#x6210;&#x5927;&#x91cf;&#x7684;&#x57df;&#x540d;</p>",
"published": "Fri, 05 Aug 2022 03:31:07 GMT",
"source": "360 Netlab Blog"
},
{
"title": "公有云网络安全威胁情报202204",
"link": "https://blog.netlab.360.com/public-cloud-threat-intelligence-202204/",
"author": "360Netlab",
"description": "<!--kg-card-begin: markdown--><h2 id=\"id\">&#x6982;&#x8ff0;</h2>\n<!--kg-card-end: markdown--><blockquote>&#x672c;&#x6587;&#x805a;&#x7126;&#x4e8e;&#x4e91;&#x4e0a;&#x91cd;&#x70b9;&#x8d44;&#x4ea7;&#x7684;&#x626b;&#x63cf;&#x653b;&#x51fb;&#x3001;&#x4e91;&#x670d;&#x52a1;&#x5668;&#x603b;&#x4f53;&#x653b;&#x51fb;&#x60c5;&#x51b5;&#x5206;&#x6790;&#x3001;&#x70ed;&#x95e8;&#x6f0f;&#x6d1e;&#x53ca;&#x6076;&#x610f;&#x7a0b;&#x5e8f;&#x7684;&#x653b;&#x51fb;&#x5a01;&#x80c1;&#x3002;</blockquote><!--kg-card-begin: markdown--><ul>\n<li><a href=\"https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com\">360&#x9ad8;&#x7ea7;</a></li></ul>",
"published": "Wed, 11 May 2022 02:53:55 GMT",
"source": "360 Netlab Blog"
},
{
"title": "公有云网络安全威胁情报202203",
"link": "https://blog.netlab.360.com/public-cloud-threat-intelligence-202203/",
"author": "360Netlab",
"description": "<h3 id=\"-\">&#x6982;&#x8ff0;</h3><blockquote>&#x672c;&#x6587;&#x805a;&#x7126;&#x4e8e;&#x4e91;&#x4e0a;&#x91cd;&#x70b9;&#x8d44;&#x4ea7;&#x7684;&#x626b;&#x63cf;&#x653b;&#x51fb;&#x3001;&#x4e91;&#x670d;&#x52a1;&#x5668;&#x603b;&#x4f53;&#x653b;&#x51fb;&#x60c5;&#x51b5;&#x5206;&#x6790;&#x3001;&#x70ed;&#x95e8;&#x6f0f;&#x6d1e;&#x53ca;&#x6076;&#x610f;&#x7a0b;&#x5e8f;&#x7684;&#x653b;&#x51fb;&#x5a01;&#x80c1;&#x3002;</blockquote><ul><li><a href=\"https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com\">360&#x9ad8;&#x7ea7;</a></li></ul>",
"published": "Tue, 19 Apr 2022 02:24:17 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Fodcha, a new DDos botnet",
"link": "https://blog.netlab.360.com/fodcha-a-new-ddos-botnet/",
"author": "Hui Wang",
"description": "<h2 id=\"overview\">Overview</h2><p>Recently, CNCERT and 360netlab worked together and discovered a rapidly spreading DDoS botnet on the Internet. The global infection looks fairly big as just in China there are more than 10,000 daily active bots (IPs) and alsomore than 100 DDoS victims beingtargeted on a daily basis. We named</p>",
"published": "Wed, 13 Apr 2022 14:01:14 GMT",
"source": "360 Netlab Blog"
},
{
"title": "机器学习的逻辑回归模型",
"link": "https://paper.seebug.org/3303/",
"author": "",
"description": ".katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日\n1. 前言\n在「机器学习的线性回归模型」文章中我们学习了监督学习中如何使用线性回归模型拟合连...",
"published": "2025-03-13 15:37:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最憋屈的漏洞披露",
"link": "https://paper.seebug.org/3304/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/Y8-wT88VnLeMUiD-HssPyw\n在网络安全领域漏洞披露一直被视为保护用户的重要环节但在现实中这一过程却充满了争议和矛盾。究竟什么才算得上“负责任的披露”当厂商在信息公开和补丁发布上占据主导地位而安全研究者则需要耗费大量精力进行沟通与博弈这一模式是否还能真正实现保护用户安全的初衷...",
"published": "2025-03-12 16:28:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最“安全”的防线",
"link": "https://paper.seebug.org/3302/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/LaM5iz_EKbAK_lkaAcBshw\n在攻防对抗日益激烈的2024年安全软件一直被视为企业安全防线的重要基石。然而这些安全软件本身也可能存在漏洞甚至被攻击者利用作为入侵的跳板来对用户造成危害。多年来因为安全软件而导致的事故不禁让人产生一个疑问——安全软件真的可信吗\n安全软件被滥用为攻击工...",
"published": "2025-03-11 16:39:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最难以阻挡的攻防趋势",
"link": "https://paper.seebug.org/3301/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/lUA03YjBiCAatcJh-bUHEQ\n近年来漏洞攻防不断演进。从多年前仅需一个栈溢出就能攻破系统到如今需要运用各种精妙的手法来突破系统的层层防御。“盾”与“矛”始终处于动态对抗每当新的防御措施出现新的攻击手段随之而来。防御机制的升级促使攻击者寻找新的突破口而攻击方法的创新又推动着防御技术...",
"published": "2025-03-10 16:19:00",
"source": "知道创宇404实验室"
},
{
"title": "机器学习的线性回归模型",
"link": "https://paper.seebug.org/3300/",
"author": "",
"description": ".katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\n跟随着 ChatGPT 等大语言模型掀起的人工智能的浪潮,在这个时间点学习 A...",
"published": "2025-03-07 15:22:00",
"source": "知道创宇404实验室"
},
{
"title": "Llama 的悖论:深入探索 Llama.cpp 的堆迷宫,从堆溢出到远程代码执行",
"link": "https://paper.seebug.org/3299/",
"author": "",
"description": "作者Patrick Peng \n译者知道创宇404实验室翻译组\n原文链接https://retr0.blog/blog/llama-rpc-rce\n我一直对 Llama.cpp 情有独钟,它堪称我在人工智能与机器学习研究领域孜孜以求的“终极目标”。不仅如此,能在如此复杂且成熟的人工智能项目中挖掘出堆栈/堆溢出导致的远程代码执行漏洞,听起来就格外酷炫。当然,我内心深处渴望在人工智能项目中...",
"published": "2025-03-06 14:27:00",
"source": "知道创宇404实验室"
},
{
"title": "Emoji攻击增强针对Judge LLMs检测的越狱攻击",
"link": "https://paper.seebug.org/3297/",
"author": "",
"description": "作者Zhipeng Wei, Yuqi Liu, N. Benjamin Erichson\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/html/2411.01077v2\n摘要\n越狱Jailbreaking技术可以欺骗大型语言模型LLMs使其生成受限制的输出从而构成严重威胁。其中一种防御方法是使用另一个 LLM 作为 Judge裁判来评估...",
"published": "2025-03-04 17:37:00",
"source": "知道创宇404实验室"
},
{
"title": "模型序列化攻击",
"link": "https://paper.seebug.org/3298/",
"author": "",
"description": "译者知道创宇404实验室翻译组\n原文链接https://github.com/protectai/modelscan/blob/main/docs/model_serialization_attacks.md\n机器学习ML模型是基于机器学习的应用程序的核心资产。安全地存储和检索模型对成功至关重要。根据使用的机器学习库模型可以以多种常见格式保存。流行的选择包括Pickle、HDF5...",
"published": "2025-03-04 15:09:00",
"source": "知道创宇404实验室"
},
{
"title": "关于 Chat Template 注入方式的学习",
"link": "https://paper.seebug.org/3296/",
"author": "",
"description": "作者: dawu@知道创宇404实验室\n日期: 2025年2月28日 \n1. 前言\n伴随着年后 DeepSeek R1 模型的火热,号称能运行 DeepSeek R1 “满血版” 的 Ktransformers 框架也受到了大量关注。在使用该框架和阅读相关源码时,我发现框架在借助聊天模版(chat template) 将用户输入转化为输入模型的 token 列表的过程中,可能会存在类似于拼...",
"published": "2025-03-03 14:35:00",
"source": "知道创宇404实验室"
},
{
"title": "从零开始搭建:基于本地 DeepSeek 的 Web 蜜罐自动化识别",
"link": "https://paper.seebug.org/3295/",
"author": "",
"description": "作者wh0am1i@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\npocsuite3 框架可以通过 --dork 或 --dork-zoomeye 参数获取 ZoomEye 网络空间测绘平台的搜索引擎数据。但随着近几年网络空间领域的攻防对抗升级导致网络空间中存在大量的蜜罐。为了过滤掉这些蜜罐ZoomEye 中加入了自动标注蜜罐的识别算法, 同时 pocsuite3 ...",
"published": "2025-02-28 14:18:00",
"source": "知道创宇404实验室"
},
{
"title": "DeepSeek 启示:深度揭秘基于 PTX 的 GPU 底层优化技术",
"link": "https://paper.seebug.org/3294/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/FVVes7UIK_OORUk3fXy9mQ\n一、概述\n近日DeepSeek连续不断地开源了多个项目一时间引发了关于GPU底层优化的热潮这在如今国内算力被广泛打压的背景下给我国在现代高性能计算HPC和人工智能AI领域带来了希望其中尤其引人瞩目的是关于底层PTX优化技术引入这在一定程度...",
"published": "2025-02-27 15:24:00",
"source": "知道创宇404实验室"
},
{
"title": "银狐突袭DeepSeek本地化部署暗藏“致命陷阱”",
"link": "https://paper.seebug.org/3293/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/VUzwaR7eti2YoNebGFz80A\n一、前言\n近期国产大模型DeepSeek凭借其高效的推理能力、创新性的优化技术、低门槛本地化部署能力、灵活的开源商业授权等迅速成为开源生态中的“现象级选手”。然而技术普及的加速期往往伴随着网络安全攻防对抗的升级。当前大量政府、企业和个人开发者在基于D...",
"published": "2025-02-27 10:47:00",
"source": "知道创宇404实验室"
},
{
"title": "使用 DeepSeek-R1 在固件漏洞挖掘领域的新实践",
"link": "https://paper.seebug.org/3292/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/rZ4iGXs2O_xYD1yEOyu3CQ\n1. 前言\n在数字化时代固件是硬件设备的核心软件组件直接控制着硬件的运行状态和功能其安全性至关重要。一旦固件存在安全漏洞黑客即可利用来攻击设备的运行或者控制设备发起其它网络攻击典型有Mirai病毒利用设备固件漏洞发起大规模的分布式拒绝服务。因此挖...",
"published": "2025-02-26 15:20:00",
"source": "知道创宇404实验室"
},
{
"title": "Fuzz 工作流解析与 AI 引入方案分享",
"link": "https://paper.seebug.org/3291/",
"author": "",
"description": "作者ghost461@知道创宇404实验室\n时间2025年2月26日\n本文为知道创宇404实验室内部分享沙龙“404 Open Day”的议题内容作为目前团队AI安全研究系列的一部分分享出来与大家一同交流学习。\n1. 概述\n本文受 Google 安全博客的《Leveling Up Fuzzing: Finding more vulnerabilities with AI》启发结合自...",
"published": "2025-02-26 14:10:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最悲剧的后门",
"link": "https://paper.seebug.org/3290/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/BZtSTpTQbNiAY_KDhnqc8Q\n“看到了软件的源码就意味着没有后门吗”\n1983年的图灵奖颁奖仪式上Ken Thompson抛出了这个问题。作为历史上唯三在40岁以下获得图灵奖的传奇之一他在获奖演讲中向听众展示了如何通过在编译器中植入后门来骇入由无害源码编译得到的Unix系统。Ken...",
"published": "2025-02-25 17:17:00",
"source": "知道创宇404实验室"
},
{
"title": "AI 帮你高效构建代码安全策略【大模型应用实践系列四】",
"link": "https://security.tencent.com/index.php/blog/msg/213",
"author": "",
"description": "腾讯啄木鸟代码安全团队依托混元大模型的超强代码理解和安全分析能力在SQL注入威胁检测场景验证中新增识别上百个漏洞检测策略相比传统方法人效比提升3.8倍在Github高star项目上斩获10+0day漏洞。",
"published": "2025-01-08 10:26:57",
"source": "腾讯安全响应中心"
},
{
"title": "AI猎手我们用大模型挖到了0day漏洞【大模型应用实践系列三】",
"link": "https://security.tencent.com/index.php/blog/msg/212",
"author": "",
"description": "AI版“赏金猎人”登场基于混元大模型能力打造的自动漏洞挖掘工具7*24小时自动感知、追踪、挖橱0day。 AI猎人VS黑客的角逐战正式开始。",
"published": "2025-01-03 10:23:17",
"source": "腾讯安全响应中心"
},
{
"title": "AI助力明文密码泄漏无处遁形【大模型应用实践系列二】",
"link": "https://security.tencent.com/index.php/blog/msg/211",
"author": "",
"description": "本文聚焦于密钥硬编码的问题,分析了传统检测策略的缺陷,并详细介绍了大模型在该场景下的优势、检测实施方案和效果。我们将继续推出更多关于大模型在研发安全、网络安全、威胁情报等领域的应用探索与总结",
"published": "2024-12-05 17:14:13",
"source": "腾讯安全响应中心"
},
{
"title": "大模型应用实践AI助力Code Review安全漏洞发现",
"link": "https://security.tencent.com/index.php/blog/msg/210",
"author": "",
"description": "借助混元大模型腾讯啄木鸟代码安全团队在代码评审Code Review下文简称CR场景下的安全漏洞检出能力取得显著提升日均发现和阻断300+个代码安全风险,极大提升了公司核心数据资产安全性。",
"published": "2024-11-27 10:39:46",
"source": "腾讯安全响应中心"
},
{
"title": "警惕Hugging Face开源组件风险被利用于大模型供应链攻击",
"link": "https://security.tencent.com/index.php/blog/msg/209",
"author": "",
"description": "著名AI社区Hugging Face开源组件datasets存在不安全特性可引发供应链后门投毒攻击风险。",
"published": "2023-11-03 14:00:00",
"source": "腾讯安全响应中心"
},
{
"title": "虚拟货币挖矿检测与防御",
"link": "https://security.tencent.com/index.php/blog/msg/208",
"author": "",
"description": "从流量和主机层入手,分析挖矿木马的防御之策。",
"published": "2021-11-18 18:00:58",
"source": "腾讯安全响应中心"
},
{
"title": "安全通知NPM官方仓库遭遇coa等恶意包投毒攻击",
"link": "https://security.tencent.com/index.php/blog/msg/207",
"author": "",
"description": "腾讯洋葱入侵检测系统发现开源软件沙箱主机出现异常行为跟进发现npm官方仓库的coa、rc被投毒攻击已经在腾讯软件源紧急拦截相关版本。目前npm官方仓库已将相应版本的恶意包删除但由于国内开源镜像站均同步npm官方仓库且存在缓存所以恶意包还可能通过各个开源镜像站影响广大用户。",
"published": "2021-11-05 21:31:07",
"source": "腾讯安全响应中心"
},
{
"title": "云原生安全攻防使用eBPF逃逸容器技术分析与实践",
"link": "https://security.tencent.com/index.php/blog/msg/206",
"author": "",
"description": "在新版本容器运行时中适用的攻击手法,并使用新方式把“任意文件写”转化为“远程代码执行”。",
"published": "2021-11-03 18:56:37",
"source": "腾讯安全响应中心"
},
{
"title": "Ghostscript沙箱绕过(CVE-2021-3781)分析",
"link": "https://security.tencent.com/index.php/blog/msg/205",
"author": "",
"description": "完整分析从ImageMagick到Ghostscript的攻击利用链",
"published": "2021-10-29 18:40:35",
"source": "腾讯安全响应中心"
},
{
"title": "实时中文语音克隆——开源项目MockingBird体验",
"link": "https://security.tencent.com/index.php/blog/msg/204",
"author": "",
"description": "5秒内克隆生成任意声音以语音克隆开源项目MockingBird为例看AI项目面临的安全风险",
"published": "2021-10-27 22:06:51",
"source": "腾讯安全响应中心"
},
{
"title": "关于BGP那些事儿",
"link": "https://security.tencent.com/index.php/blog/msg/203",
"author": "",
"description": "这是Facebook创立以来最严重的一次网络访问事故在这起故障中我们又看到了BGP的身影",
"published": "2021-10-19 18:10:52",
"source": "腾讯安全响应中心"
},
{
"title": "红蓝对抗之隐蔽通信应用及防御",
"link": "https://security.tencent.com/index.php/blog/msg/202",
"author": "",
"description": "腾讯蓝军和红军十多年案例经验、总结沉淀",
"published": "2021-09-27 16:40:43",
"source": "腾讯安全响应中心"
},
{
"title": "Web应用组件自动化发现的探索",
"link": "https://security.tencent.com/index.php/blog/msg/201",
"author": "",
"description": "另一种方式的指纹识别",
"published": "2021-09-17 19:30:59",
"source": "腾讯安全响应中心"
},
{
"title": "云原生——容器和应用安全运营实践思考",
"link": "https://security.tencent.com/index.php/blog/msg/200",
"author": "",
"description": "从安全攻击面出发,以防御视角分享我们在云原生安全运营上的一些实践和思考",
"published": "2021-09-07 18:00:59",
"source": "腾讯安全响应中心"
},
{
"title": "自动化数据分析下的威胁发现",
"link": "https://security.tencent.com/index.php/blog/msg/199",
"author": "",
"description": "企业防御之安全运营数据分析",
"published": "2021-08-16 18:41:00",
"source": "腾讯安全响应中心"
},
{
"title": "可信安全网络 —— 安全左移之DDoS对抗",
"link": "https://security.tencent.com/index.php/blog/msg/198",
"author": "",
"description": "DDoS对抗新思路",
"published": "2021-07-28 18:13:13",
"source": "腾讯安全响应中心"
},
{
"title": "攻防启示Chromium组件风险剖析与收敛",
"link": "https://security.tencent.com/index.php/blog/msg/197",
"author": "",
"description": "Chromium内核的安全问题早已悄无声息地牵动着互联网生活方方面面。基于对实战经历的复盘本文将从Chromium架构及安全机制概况入手剖析Chromium组件在多场景下给企业带来的安全风险并一探收敛方案。",
"published": "2021-07-15 10:30:58",
"source": "腾讯安全响应中心"
},
{
"title": "腾讯 SOAR 的安全运营探索",
"link": "https://security.tencent.com/index.php/blog/msg/196",
"author": "",
"description": "与业界先行者相比,我们数据面板、剧本等平台功能方面仍有一些差距,未来也会持续建设",
"published": "2021-07-09 17:55:48",
"source": "腾讯安全响应中心"
},
{
"title": "警惕!这种新型挖矿可能盯上你主机",
"link": "https://security.tencent.com/index.php/blog/msg/195",
"author": "",
"description": "除了门罗币这种不消耗CPU资源的虚拟货币可能成为黑产的新宠儿提前预知方能不乱阵脚。",
"published": "2021-07-01 20:27:10",
"source": "腾讯安全响应中心"
},
{
"title": "腾讯自研HIDS「洋葱」后台上云架构演进实践",
"link": "https://security.tencent.com/index.php/blog/msg/194",
"author": "",
"description": "云计算时代,洋葱拥抱云原生方案实践,希望能为大家系统上云提供参考。",
"published": "2021-06-17 18:16:08",
"source": "腾讯安全响应中心"
},
{
"title": "荣誉 | 美团SRC2024年终奖励荣耀揭晓",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493717&idx=1&sn=fe94bf647a29fff908cc7ed29b70554c&chksm=ec180986db6f80904efbb237256479db8ebb60e2521763cbbb272c604f641c3549211606bcc5&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "向每一位守护者致敬!",
"published": "2025-01-17 18:01:00",
"source": "微信公众号"
},
{
"title": "美团SRC邀您领取新年礼盒啦",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493717&idx=2&sn=f317d3190e4e199c933d1b29fa2f2d94&chksm=ec180986db6f809093c190d72edcad5b3b289422052597427f2eeb42ea44a93a729aff84a87c&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "获取方式见文中。",
"published": "2025-01-17 18:01:00",
"source": "微信公众号"
},
{
"title": "鸿蒙应用签名实操及机制探究",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493695&idx=1&sn=89a37bdee61841877d1acf28b8a68cbf&chksm=ec1809ecdb6f80faccbf32d3be7076832bfb6b0d443881e05d93cac96cecaad3952bdf8fba50&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "本文对鸿蒙公开资料进行了深入分析和解读,梳理了鸿蒙单框架应用的签名机制,拆解每一步的实操过程和背后的实现原理,并对源码分析整理签名的校验机制。",
"published": "2024-12-31 10:01:00",
"source": "微信公众号"
},
{
"title": "白帽世界大会 | 美团SRC期待与您在澳门相见",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493590&idx=1&sn=0281d8d3faa07d26a91b338102cb7c61&chksm=ec180605db6f8f138853b493e0e34cf24d9ccc265a72fc721fba5cfbd25c0854f757b3cd0e16&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "HackProve World 2025用真正的技术验证数字世界的安全。",
"published": "2024-12-19 17:31:00",
"source": "微信公众号"
},
{
"title": "年末冲刺2024漏洞马拉松『美团站』正式启动",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493372&idx=1&sn=f8ed6cc9dc514805d164f9d47277e8f5&chksm=ec18072fdb6f8e39c609c95ac1b0aba49aa2e9f70246d4c7af7ce82ca6d40ee9caa7fef0e362&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间即日起至2024年12月15日。",
"published": "2024-12-03 18:30:00",
"source": "微信公众号"
},
{
"title": "活动|短视频激励系统专测开启!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493353&idx=1&sn=60d8aea7934fa17d1e2077e2b879d3ae&chksm=ec18073adb6f8e2cdb2c0881302bcad6094724119dd5f6d5e0ecccc18fc1e2323067d6d00593&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间11月25日-11月28日",
"published": "2024-11-25 10:00:00",
"source": "微信公众号"
},
{
"title": "活动美团SRC七周年多重惊喜派送中",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493342&idx=1&sn=5aadfd7e004ccab04ad3286741aeca6f&chksm=ec18070ddb6f8e1b739a0a4e922e09723ce21d5d296c78c97d8c69a515bcf67f4c84e27e7972&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间11月11日10: 00-11月18日0: 00",
"published": "2024-11-11 10:08:00",
"source": "微信公众号"
},
{
"title": "活动正式开启美团SRC邀您加入双11安全保卫战",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493302&idx=1&sn=38e8eb7b46ba68d83932055efcf06386&chksm=ec180765db6f8e73f7e8e9039563065a99de826daeafcb49ee5b0231e48816907e306d43fe1c&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "美团SRC活动时间2024.09.19-09.30",
"published": "2024-09-18 19:36:05",
"source": "微信公众号"
},
{
"title": "你的中秋福利已上线美团SRC预祝各位中秋佳节愉快",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493276&idx=1&sn=02f5b0a74938d0be8764ba9658a0c98e&chksm=ec18074fdb6f8e593725883103e1ae90af22dda6af3e178d008da8c28713a6d0ba252605396e&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "兑换时间9月5日18:00起。",
"published": "2024-09-05 11:42:42",
"source": "微信公众号"
},
{
"title": "美团安全25届秋招启动心动offer等你拿",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493276&idx=2&sn=ca4080f1e1607bb22730e538f02ea6a0&chksm=ec18074fdb6f8e5920d56d573dd6c838afb76315ebd36dc1f113f5a747fdf584302ecd8faf0b&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "网申时间即日起至2024年10月31日。",
"published": "2024-09-05 11:42:42",
"source": "微信公众号"
},
{
"title": "美团安全亮相KCon 2024分享RDI技术新视角",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493266&idx=1&sn=148ab2c53446796b415384e9fd0dbaf2&chksm=ec180741db6f8e572f536ff844ca8d39d378c9d8a24b6cdbaaad31101f21175ab9637b7f578d&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "RDI技术以其高效和隐蔽的特性在恶意代码开发中占据了不可替代的地位尤其是在现代C2架构中发挥着关键作用。",
"published": "2024-09-04 10:27:03",
"source": "微信公众号"
},
{
"title": "美团安全25届秋招启动心动offer等你拿",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493248&idx=1&sn=74436f59fe2d7b203814c0aa0c91800a&chksm=ec180753db6f8e45010393fcad6b673a46c7db73b98e93dbdff667495e798104c8ec3b8345b8&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "网申时间即日起至2024年10月31日。",
"published": "2024-08-28 10:27:44",
"source": "微信公众号"
},
{
"title": "美团安全团队在第五期移动互联网APP产品安全漏洞技术沙龙中分享移动应用自动化安全实践历程",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493233&idx=1&sn=fcbc3a07cee5cf64e3c6b24925e2bd46&chksm=ec1807a2db6f8eb4f9e072ab8c517a39542fe6943b282abfc2271cd3ac558ac504c019e15748&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-08-20 14:21:24",
"source": "微信公众号"
},
{
"title": "新机会,新挑战,新可能,美团信息安全部邀你加入~",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493119&idx=1&sn=ce5d6f489f9d802e5ff5075d90c1ca17&chksm=ec18042cdb6f8d3a4e15bdc3051d92275f75a65008e0b8ce8f0a67746aa967ad5e8cdd1be831&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "欢迎向我们投递简历或推荐身边朋友投递简历!",
"published": "2024-07-29 14:37:08",
"source": "微信公众号"
},
{
"title": "活动 | 开店宝专测已开启,邀你参加!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493104&idx=1&sn=3f5514acce114a1dfeb40fbba5738023&chksm=ec180423db6f8d356d65dc19e7934dca55a1fb1c9ff7b8428f7962b13e552a13af3920ba89b0&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间6月24日—6月30日",
"published": "2024-06-24 10:06:08",
"source": "微信公众号"
},
{
"title": "美团安全团队携议题亮相CSOP大会共探网络安全高效运营之道",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493090&idx=1&sn=8b1c7315ef4ae4b2331c0f75d181825e&chksm=ec180431db6f8d27893e8aa04f4f005c2dfa6ce34ad5d62215a6ce17fe070977e33e213ec309&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "议题聚焦于SOC平台的构建历程从概念的萌芽到实践的落地再到不断的优化升级各阶段进行深入探讨。",
"published": "2024-05-17 18:54:11",
"source": "微信公众号"
},
{
"title": "招聘 | 美团安全实习生招聘正在进行中",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493059&idx=1&sn=362fa696530db9493fa8c165e6f64e6b&chksm=ec180410db6f8d06d8e74196d9ef89d31c92ce0964c8fddc638fe17e2642ff0b9806086b55e5&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "一起成长一起BETTER",
"published": "2024-05-07 17:27:47",
"source": "微信公众号"
},
{
"title": "活动 | 优选专测,提供测试账号,速来!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493041&idx=1&sn=daf61012fec9f3aa6fd227dd1f39b828&chksm=ec180462db6f8d74fdff596bd8b60fab42607b31db7c8a820b9a1007af9036c59da29cc74151&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "4月23日至4月30日000邀你参与优选业务专测",
"published": "2024-04-23 09:56:55",
"source": "微信公众号"
},
{
"title": "特别漏洞奖励,祝你挖洞把把都超神~",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493024&idx=1&sn=c0b762ef29c35ece879f1fdb7560c710&chksm=ec180473db6f8d65ce15c48fdcd8ef0c2525421c8f95a70f6cb7f7d282ccc304faf03ac0c8a8&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-03-26 19:58:18",
"source": "微信公众号"
},
{
"title": "3倍活动戳这里",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493024&idx=2&sn=9ca5dd0591b7ffb8dd9cbd166d94826d&chksm=ec180473db6f8d65e4e4b185143fe292dc4aac665b4ae9e5607d14a79213d690aec68dce3daa&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-03-26 19:58:18",
"source": "微信公众号"
}
]