unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
AI attack agents are accelerators, not autonomous weapons: the Anthropic attack
AI attack agents are accelerators, not autonomous weapons: the Anthropic attack...
2025-11-24 09:38:37 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
autonomous
weapons
agents
anthropic
attackers
Scattered Spider alleged members deny TfL charges
Scattered Spider alleged members deny TfL charges Pierluigi Pag...
2025-11-24 08:24:35 | 阅读: 8 |
收藏
|
Security Affairs - securityaffairs.com
charges
london
tfl
flowers
jubair
Iberia discloses security incident tied to supplier breach
Iberia discloses security incident tied to supplier breach Pier...
2025-11-23 17:25:24 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
iberia
supplier
security
airline
loyalty
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 72
We use cookies on our website to give you the most relevant experience by remembering your preferenc...
2025-11-23 13:28:3 | 阅读: 19 |
收藏
|
Security Affairs - securityaffairs.com
remembering
repeat
visits
Security Affairs newsletter Round 551 by Pierluigi Paganini – INTERNATIONAL EDITION
We use cookies on our website to give you the most relevant experience by remembering your preferenc...
2025-11-23 13:18:21 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
remembering
repeat
visits
SonicWall flags SSLVPN flaw allowing firewall crashes
SonicWall flags SSLVPN flaw allowing firewall crashes Pierluigi...
2025-11-23 10:34:28 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
sslvpn
sonicos
firewalls
nssp
overflow
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks...
2025-11-22 17:11:49 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
apt24
badaudio
payload
malicious
gtig
U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities catalog
U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilitie...
2025-11-22 10:34:44 | 阅读: 10 |
收藏
|
Security Affairs - securityaffairs.com
catalog
fusion
exploited
attacker
CrowdStrike denies breach after insider sent internal screenshots to hackers
CrowdStrike denies breach after insider sent internal screenshots to hackers...
2025-11-21 21:31:45 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
insider
crowdstrike
paganini
SolarWinds addressed three critical flaws in Serv-U
SolarWinds addressed three critical flaws in Serv-U Pierluigi P...
2025-11-21 14:8:37 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
serv
privileges
remote
windows
paganini
Massive data leak hits Italian railway operator Ferrovie dello Stato via Almaviva hack
Massive data leak hits Italian railway operator Ferrovie dello Stato via Almaviva hac...
2025-11-21 12:14:14 | 阅读: 22 |
收藏
|
Security Affairs - securityaffairs.com
almaviva
security
italiane
stato
dello
Salesforce alerts users to potential data exposure via Gainsight OAuth apps
Salesforce alerts users to potential data exposure via Gainsight OAuth apps...
2025-11-21 10:4:40 | 阅读: 5 |
收藏
|
Security Affairs - securityaffairs.com
salesforce
gainsight
salesloft
unusual
Researchers devised a new enumeration technique that exposed 3.5B WhatsApp profiles
Researchers devised a new enumeration technique that exposed 3.5B WhatsApp profiles...
2025-11-20 22:56:3 | 阅读: 5 |
收藏
|
Security Affairs - securityaffairs.com
limiting
facebook
texts
revealing
contacts
Sturnus: New Android banking trojan targets WhatsApp, Telegram, and Signal
Sturnus: New Android banking trojan targets WhatsApp, Telegram, and Signal...
2025-11-20 20:44:38 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
sturnus
monitoring
trojan
overlay
Coordinated sanctions hit Russian bulletproof hosting providers enabling top ransomware Ops
Coordinated sanctions hit Russian bulletproof hosting providers enabling top ransomwa...
2025-11-20 19:12:57 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
bulletproof
designated
sanctions
aeza
ofac
Cyber-enabled kinetic targeting: Iran-linked actor uses cyber operations to support physical attacks
Cyber-enabled kinetic targeting: Iran-linked actor uses cyber operations to support p...
2025-11-20 10:28:13 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
kinetic
iran
missile
ais
warfare
U.S. CISA adds a Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog
U.S. CISA adds a Google Chromium V8 flaw to its Known Exploited Vulnerabilities catal...
2025-11-19 21:12:26 | 阅读: 8 |
收藏
|
Security Affairs - securityaffairs.com
exploited
catalog
chrome
security
7-Zip RCE flaw (CVE-2025-11001) actively exploited in attacks in the wild
7-Zip RCE flaw (CVE-2025-11001) actively exploited in attacks in the wild...
2025-11-19 19:23:13 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
11001
attackers
exploited
security
remote
Operation WrtHug hijacks 50,000+ ASUS routers to build a global botnet
Operation WrtHug hijacks 50,000+ ASUS routers to build a global botnet...
2025-11-19 18:31:36 | 阅读: 20 |
收藏
|
Security Affairs - securityaffairs.com
asus
routers
wrthug
security
U.S. CISA adds a new Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog
U.S. CISA adds a new Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities ca...
2025-11-19 13:43:3 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
fortiweb
exploited
catalog
attacker
Previous
3
4
5
6
7
8
9
10
Next