英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

excursive    
a. 游览的,离题的,散漫的

游览的,离题的,散漫的

excursive
adj 1: (of e.g. speech and writing) tending to depart from the
main point or cover a wide range of subjects; "amusingly
digressive with satirical thrusts at women's fashions
among other things"; "a rambling discursive book"; "his
excursive remarks"; "a rambling speech about this and
that" [synonym: {digressive}, {discursive}, {excursive},
{rambling}]

Excursive \Ex*cur"sive\, a.
Prone to make excursions; wandering; roving; exploring; as,
an excursive fancy.
[1913 Webster]

The course of excursive . . . understandings. --I.
Taylor.
-- {Ex*cur"sive*ly}, adv. -- {Ex*cur"sive*ness},, n.
[1913 Webster]


请选择你想看的字典辞典:
单词字典翻译
excursive查看 excursive 在百度字典中的解释百度英翻中〔查看〕
excursive查看 excursive 在Google字典中的解释Google英翻中〔查看〕
excursive查看 excursive 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Dark Web Profile: ShinyHunters
    By providing access to extensive collections of breached data, including information that may have been compromised by threat actors like ShinyHunters, the tool enables organizations to rapidly identify and understand the extent of breaches affecting them
  • Threat Actor: ShinyHunters - Joe Shenouda | Threat Intelligence
    The threat actor known as ShinyHunters emerged around 2020, initially operating as a prolific data breach and extortion group focused on selling massive user databases on dark web forums
  • ShinyHunters Threat Actor Profile - DataBreach. io
    Stolen Salesforce data is frequently repurposed to build targeted social engineering campaigns against additional victims ShinyHunters operates public data leak sites and Telegram channels to announce breaches and issue extortion demands, typically setting deadlines before publishing stolen data
  • Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft | Google . . .
    ShinyHunters-branded operations are using sophisticated vishing and victim-branded sites to steal data from cloud-based SaaS applications
  • ShinyHunters Wage Broad Corporate Extortion Spree
    In May 2025, a prolific and amorphous English-speaking cybercrime group known as ShinyHunters launched a social engineering campaign that used voice phishing to trick targets into connecting a
  • How ShinyHunters Breached Google, Adidas, Louis Vuitton and More in . . .
    This comprehensive technical analysis reveals how the notorious cybercriminal group ShinyHunters, in apparent collaboration with Scattered Spider, has executed one of the most successful social engineering campaigns targeting Salesforce Customer Relationship Management (CRM) platforms
  • ShinyHunters Calling: Financially Motivated Data Extortion Group . . .
    EclecticIQ analysts assess with high confidence that the threat actor persona named Yukari (aka Yuki, Yuka, yukimane or yukafeet) is an active member of both ShinyHunters and Scattered Spider, very likely responsible for initial compromise, SIM swapping attacks, and voice call phishing
  • ShinyHunters: A Threat Profile - Vali Cyber
    ShinyHunters emerges and sells leaks large user databases (e g , Tokopedia, Wattpad; multiple 2020 breaches) Claims around Microsoft GitHub private repos and a 2021 AT T dataset appear during this period (AT T initially denied origin; later litigation coverage ties data back to earlier exposure)
  • ShinyHunters Weaponized a Security Tool to Breach 400 Companies via . . .
    ShinyHunters turned Mandiant's AuraInspector audit tool into a weapon, breaching 300-400 companies through Salesforce Experience Cloud misconfigurations Victims include cybersecurity firm Aura com The irony is not lost on anyone
  • Threat Spotlight: ShinyHunters Fast-Tracks Saas Access with Subdomain . . .
    The financially motivated threat group “ShinyHunters” appears to be shifting to subdomain impersonation to drive initial access It’s highly likely that this is a deliberate move away from using newly registered lookalike domains to an approach that can slip past traditional “new domain” controls





中文字典-英文字典  2005-2009