unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Sweden’s liquor supply severely impacted by ransomware attack on logistics company
Sweden’s liquor supply severely impacted by ransomware attack on logistics companyA ransomware...
2024-4-26 14:51:46 | 阅读: 24 |
收藏
|
Security Affairs - securityaffairs.com
skanlog
ransomware
beverages
alcoholic
CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog
CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog...
2024-4-26 04:17:47 | 阅读: 16 |
收藏
|
Security Affairs - securityaffairs.com
asa
crushftp
dancer
catalog
CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog
CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalogU...
2024-4-25 21:33:55 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
catalog
microsoft
38028
gooseegg
DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions
DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transact...
2024-4-25 21:11:18 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
samourai
doj
hill
mixer
criminal
Google fixed critical Chrome vulnerability CVE-2024-4058
Google fixed critical Chrome vulnerability CVE-2024-4058Google addressed a critical Chrome vul...
2024-4-25 16:7:59 | 阅读: 15 |
收藏
|
Security Affairs - securityaffairs.com
4058
tracked
chrome
resides
Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks
Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks...
2024-4-25 04:30:37 | 阅读: 22 |
收藏
|
Security Affairs - securityaffairs.com
asa
dancer
attackers
network
runner
Hackers hijacked the eScan Antivirus update mechanism in malware campaign
Hackers hijacked the eScan Antivirus update mechanism in malware campaignA malware campaign ha...
2024-4-24 21:52:29 | 阅读: 5 |
收藏
|
Security Affairs - securityaffairs.com
escan
guptiminer
malicious
distribute
backdoors
US offers a $10 million reward for information on four Iranian nationals
US offers a $10 million reward for information on four Iranian nationalsThe Treasury Departmen...
2024-4-24 15:12:48 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
iranian
treasury
ofac
nationals
persons
The street lights in Leicester City cannot be turned off due to a cyber attack
The street lights in Leicester City cannot be turned off due to a cyber attackA cyber attack o...
2024-4-24 14:41:50 | 阅读: 11 |
收藏
|
Security Affairs - securityaffairs.com
council
lights
street
leicester
faults
North Korea-linked APT groups target South Korean defense contractors
North Korea-linked APT groups target South Korean defense contractorsThe National Police Agenc...
2024-4-24 03:24:20 | 阅读: 8 |
收藏
|
Security Affairs - securityaffairs.com
korea
police
north
attackers
U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity
U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activityThe...
2024-4-23 15:49:13 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
spyware
security
visa
cytrox
development
A cyber attack paralyzed operations at Synlab Italia
A cyber attack paralyzed operations at Synlab ItaliaA cyber attack has been disrupting operati...
2024-4-23 14:50:19 | 阅读: 6 |
收藏
|
Security Affairs - securityaffairs.com
synlab
italian
patients
italia
ransomware
Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw
read file error: read notes: is a directory...
2024-4-23 05:3:45 | 阅读: 37 |
收藏
|
Security Affairs - securityaffairs.com
gooseegg
apt28
microsoft
38028
malicious
Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities
Hackers threaten to leak a copy of the World-Check database used to assess potential risks associa...
2024-4-22 21:19:39 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
database
ghostr
regulatory
security
gained
Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities
Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilitiesResearcher...
2024-4-22 18:25:7 | 阅读: 13 |
收藏
|
Security Affairs - securityaffairs.com
microsoft
windows
privileges
elevation
A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites
A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sitesJapan’s CERT w...
2024-4-22 14:58:46 | 阅读: 24 |
收藏
|
Security Affairs - securityaffairs.com
wordpress
forminator
28890
attacker
Akira ransomware received $42M in ransom payments from over 250 victims
Akira ransomware received $42M in ransom payments from over 250 victimsGovernment agencies rev...
2024-4-22 04:7:55 | 阅读: 13 |
收藏
|
Security Affairs - securityaffairs.com
akira
ransomware
security
encryption
megazord
DuneQuixote campaign targets the Middle East with a complex backdoor
DuneQuixote campaign targets the Middle East with a complex backdoorThreat actors target gover...
2024-4-22 00:38:20 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
c2
dunequixote
cr4t
analysis
implants
Security Affairs newsletter Round 468 by Pierluigi Paganini – INTERNATIONAL EDITION
Security Affairs newsletter Round 468 by Pierluigi Paganini – INTERNATIONAL EDITION | Critical C...
2024-4-21 21:37:54 | 阅读: 10 |
收藏
|
Security Affairs - securityaffairs.com
ransomware
exploited
security
catalog
Critical CrushFTP zero-day exploited in attacks in the wild
Critical CrushFTP zero-day exploited in attacks in the wildThreat actors exploited a critical...
2024-4-21 05:39:46 | 阅读: 16 |
收藏
|
Security Affairs - securityaffairs.com
crushftp
exploited
download
crowdstrike
software
Previous
39
40
41
42
43
44
45
46
Next