unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability
Data Privacy / Mobile SecurityApple has released iOS and iPadOS updates to address two security is...
2024-10-5 12:50:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
inch
passwords
microphone
voiceover
U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown
Phishing Attack / CybercrimeMicrosoft and the U.S. Department of Justice (DoJ) on Thursday announc...
2024-10-4 21:6:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
phishing
microsoft
coldriver
officials
callisto
How to Get Going with CTEM When You Don't Know Where to Start
Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations cont...
2024-10-4 17:53:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
ctem
security
stage
Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors
Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) a...
2024-10-4 17:50:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
cups
volumetric
tbps
network
bandwidth
WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks
Website Security / VulnerabilityA new high-severity security flaw has been disclosed in the LiteSp...
2024-10-4 17:11:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
wordpress
security
injection
thereby
addressed
Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks
Mobile Security / TechnologyGoogle has revealed the various security guardrails that have been inc...
2024-10-4 01:0:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
cellular
network
baseband
2g
The Secret Weakness Execs Are Overlooking: Non-Human Identities
For years, securing a company's systems was synonymous with securing its "perimeter." There was wha...
2024-10-3 23:6:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
identities
nhis
gitguardian
perimeter
New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking
Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed perfctl...
2024-10-3 22:15:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
perfctl
software
security
miner
North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks
Cyber Espionage / Threat IntelligenceThreat actors with ties to North Korea have been observed del...
2024-10-3 21:0:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
veilshell
north
korea
powershell
stage
INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa
Cybercrime / Financial FraudINTERPOL has announced the arrest of eight individuals in Côte d'Ivoir...
2024-10-3 17:10:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
nigeria
authorities
justice
dubbed
suspect
LockBit Ransomware and Evil Corp Leaders Arrested and Sanctioned in Joint Global Effort
A new wave of international law enforcement actions has led to four arrests and the takedown of nin...
2024-10-3 15:15:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
lockbit
ryzhenkov
ransomware
sanctions
yakubets
Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch
Vulnerability / Endpoint SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA)...
2024-10-3 14:6:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
ivanti
epm
injection
csa
Fake Trading Apps Target Victims Globally via Apple App Store and Google Play
A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Googl...
2024-10-3 00:54:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
finans
investments
funds
download
phishing
China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration
Cyber Espionage / Cloud SecurityA previously undocumented threat actor called CeranaKeeper has bee...
2024-10-2 23:21:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
toolset
dropbox
abuses
eset
Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals
Cybercrime / Threat IntelligenceA spear-phishing email campaign has been observed targeting recrui...
2024-10-2 23:8:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
eggs
phishing
malicious
fin7
spear
Alert: Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities
Vulnerability / Network SecurityA little over a dozen new security vulnerabilities have been disco...
2024-10-2 21:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
overflow
security
draytek
forescout
Alert: Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit
Vulnerability / Data BreachCybersecurity researchers have disclosed that 5% of all Adobe Commerce...
2024-10-2 20:13:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
cosmicsting
magento
remote
encryption
security
5 Must-Have Tools for Effective Dynamic Malware Analysis
Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample...
2024-10-2 19:0:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
analysis
malicious
network
ttps
phishing
Andariel Hacking Group Shifts Focus to Financial Attacks on U.S. Organizations
Three different organizations in the U.S. were targeted in August 2024 by a North Korean state-spon...
2024-10-2 18:0:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
andariel
north
korean
financially
ransomware
Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw
Email Security / VulnerabilityCybersecurity researchers are warning about active exploitation atte...
2024-10-2 13:56:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
zimbra
postjournal
proofpoint
synacor
Previous
1
2
3
4
5
6
7
8
Next