unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution
Vulnerability / Threat IntelligenceA critical security flaw has been disclosed in the Cacti open-s...
2025-1-29 10:21:0 | 阅读: 43 |
收藏
|
The Hacker News - thehackernews.com
security
addressed
remote
permit
network
UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents
Cyber Espionage / Threat IntelligenceThe advanced persistent threat (APT) group known as UAC-0063...
2025-1-29 05:52:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
downexpyer
0063
hatvibe
downex
zugec
Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer
Vulnerability / Software SecurityBroadcom has alerted of a high-severity security flaw in VMware A...
2025-1-29 05:29:0 | 阅读: 38 |
收藏
|
The Hacker News - thehackernews.com
balancer
avi
2p2
security
database
Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability
Vulnerability / Network SecurityCybersecurity researchers are warning that a critical zero-day vul...
2025-1-29 05:11:0 | 阅读: 25 |
收藏
|
The Hacker News - thehackernews.com
simplehelp
security
zyxel
vulncheck
cpe
PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks
Phishing Attack / Network SecurityA financially motivated threat actor has been linked to an ongoi...
2025-1-28 16:34:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
victim
network
machine
tornet
salting
OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking
Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability af...
2025-1-28 14:2:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
airline
victim
salt
rental
rentals
AI SOC Analysts: Propelling SecOps into the future
Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up...
2025-1-28 11:20:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
threats
prophet
proactive
Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations
Ransomware / Threat IntelligenceCybersecurity researchers have found that ransomware attacks targe...
2025-1-28 11:1:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
rid
privileges
appliances
windows
leveraging
How Long Does It Take Hackers to Crack Modern Hashing Algorithms?
While passwords remain the first line of defense for protecting user accounts against unauthorized...
2025-1-28 10:30:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
passwords
hashing
cracking
hashed
bcrypt
E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministries
Cybersecurity / Cyber EspionageThe Council of the European Union has sanctioned three individuals...
2025-1-28 10:16:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
council
29155
ukraine
affairs
european
Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks
Artificial Intelligence / TechnologyDeepSeek, the Chinese AI startup that has captured much of th...
2025-1-28 05:49:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
deepseek
malicious
openai
artificial
h800
Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More
Vulnerability / Endpoint SecurityApple has released software updates to address several security f...
2025-1-28 03:23:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
security
exploited
inch
termination
3rd
GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs
Vulnerability / Software SecurityMultiple security vulnerabilities have been disclosed in GitHub D...
2025-1-27 14:17:0 | 阅读: 20 |
收藏
|
The Hacker News - thehackernews.com
github
carriage
codespaces
security
cloning
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]
Welcome to your weekly cybersecurity scoop! Ever thought about how the same AI meant to protect our...
2025-1-27 12:39:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
security
network
attacker
analysis
Do We Really Need The OWASP NHI Top 10?
The Open Web Application Security Project has recently introduced a new Top 10 project - the Non-Hu...
2025-1-27 11:20:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
nhi
nhis
security
developers
development
GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities
Cyber Espionage / Threat IntelligenceA previously unknown threat actor has been observed copying t...
2025-1-27 07:59:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
ultravnc
werewolf
knownsec
phishing
MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks
Threat hunters have detailed an ongoing campaign that leverages a malware loader called MintsLoader...
2025-1-27 07:16:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
loader
powershell
mintsloader
jinx
wordpress
Meta's Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks
A high-severity security flaw has been disclosed in Meta's Llama large language model (LLM) framew...
2025-1-26 10:15:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
security
llama
chatgpt
llms
malicious
RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations
Telecom Security / VulnerabilityA group of academics has disclosed details of over 100 security vu...
2025-1-24 12:58:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
network
lte
cellular
security
2025 State of SaaS Backup and Recovery Report
The modern workplace has undergone a seismic transformation over recent years, with hybrid work bec...
2025-1-24 11:0:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
cloud
backup
adoption
smbs
microsoft
Previous
11
12
13
14
15
16
17
18
Next