unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
研究人员披露了一种名为CometJacking的新攻击,通过恶意链接劫持Perplexity的AI浏览器Comet,窃取用户敏感数据。该攻击利用Base64编码隐藏指令,在用户不知情的情况下提取邮件、日历等服务数据。专家指出AI浏览器需内置安全设计以应对此类威胁。...
2025-10-4 14:37:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
security
comet
malicious
perplexity
prompts
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day
威胁情报公司GreyNoise发现针对Palo Alto Networks登录门户的扫描活动激增,10月3日观察到近500%的增长,1300个IP地址参与其中,93%为可疑。这些活动与近期针对Cisco ASA设备的扫描相似。...
2025-10-4 10:39:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
alto
palo
greynoise
asa
portals
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer
Detour Dog, a threat actor, distributes Strela Stealer via malicious SVG files and DNS TXT records. They exploit WordPress sites for code injection and use botnets like REM Proxy and Tofsee to spread malware. Infected sites mostly function normally but occasionally redirect users to scams or execute remote code. This marks Detour Dog's shift from traffic forwarding to malware distribution for financial gain....
2025-10-3 18:11:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
detour
dog
stealer
c2
strela
Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads
Rhadamanthys信息窃取工具更新后支持设备和浏览器指纹收集,并推出Elysium Proxy Bot和Crypt Service等新工具。开发者将其重新品牌为RHAD安全和Mythical Origin Labs,并提供三种订阅套餐。该工具采用Lua脚本进行数据窃取和指纹识别,并通过PNG等文件隐藏payload以规避检测。...
2025-10-3 15:58:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
stealer
lumma
machine
payload
Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL
巴西用户成为新型自我传播恶意软件SORVEPOTEL的目标,该软件通过WhatsApp传播。攻击利用钓鱼信息和恶意ZIP附件感染Windows系统,并自动扩散至所有联系人和群组,导致账户因垃圾信息被封禁。主要影响巴西企业和多个行业。...
2025-10-3 12:2:0 | 阅读: 21 |
收藏
|
The Hacker News - thehackernews.com
attachment
windows
sorvepotel
malicious
propagation
Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security
Passwork 7是一款统一的内部部署密码与密钥管理平台,提供简化的工作流程、灵活的数据组织结构及强大的安全措施。支持角色和分组权限管理、内部外部共享机制,并集成了开发工具API。其设计注重用户体验与合规性,适合各类规模的企业使用。...
2025-10-3 11:30:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
passwork
security
vaults
workflows
passwords
New "Cavalry Werewolf" Attack Hits Russian Agencies with FoalShell and StallionRAT
Cavalry Werewolf 使用恶意软件 FoalShell 和 StallionRAT 通过伪装成吉尔吉斯斯坦政府官员的钓鱼邮件攻击俄罗斯公共部门及能源、采矿、制造企业,并与多个黑客组织关联。...
2025-10-3 10:30:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
attackers
cavalry
werewolf
deviceid
foalshell
CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild
美国网络安全机构CISA将影响Smartbedded Meteobridge设备的高危漏洞CVE-2025-4008加入已知被利用漏洞目录。该漏洞为命令注入型,可使攻击者远程执行任意代码并获取root权限。此外还有四个其他严重漏洞被披露,并要求相关机构在指定日期前完成修复以应对活跃攻击威胁。...
2025-10-3 08:23:0 | 阅读: 25 |
收藏
|
The Hacker News - thehackernews.com
meteobridge
remote
injection
attackers
security
Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
Confucius组织针对巴基斯坦发起钓鱼攻击,利用WooperStealer和Anondoor恶意软件。通过.PPSX和.LNK文件触发DLL侧加载技术窃取数据,并采用Python后门Anondoor提升技术能力。...
2025-10-2 14:44:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
confucius
anondoor
malicious
pakistan
Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown
恶意Python包soopsocks伪装成SOCKS5代理工具,在PyPI上提供下载后被发现具有后门功能,可自动化安装并提升权限,在Windows系统中投放额外载荷,并将系统信息发送至Discord webhook。该事件凸显软件供应链安全风险,GitHub已限制npm令牌寿命以减少攻击风险,Socket推出防火墙工具以阻止恶意包传播。...
2025-10-2 13:7:0 | 阅读: 22 |
收藏
|
The Hacker News - thehackernews.com
python
windows
powershell
malicious
proxy
Automating Pentest Delivery: 7 Key Workflows for Maximum Impact
文章探讨了渗透测试在发现安全漏洞中的重要性,并强调了通过自动化实时交付测试结果以减少延迟和错误的必要性。作者提出了七个关键工作流程,帮助团队提高效率和准确性。...
2025-10-2 11:55:0 | 阅读: 20 |
收藏
|
The Hacker News - thehackernews.com
workflows
security
ensuring
plextrac
ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More
本周网络安全威胁频发,从未修补的汽车漏洞到劫持云服务,技术无处不存风险。攻击者利用防火墙漏洞、脆弱的SQL服务器和Chrome设置中毒传播恶意扩展。防御方面,AI实时阻断勒索软件,但隐私争议升温。从手机应用到汽车,战场日益扩大。...
2025-10-2 11:30:0 | 阅读: 24 |
收藏
|
The Hacker News - thehackernews.com
security
ransomware
phishing
malicious
microsoft
Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware
Google Mandiant和GTIG发现了一个与Cl0p团伙相关的网络攻击活动,涉及向企业高管发送勒索邮件并声称窃取了Oracle E-Business Suite数据。邮件中的联系地址与Cl0p的数据泄露网站一致,但目前尚无确凿证据证明其直接关联。攻击者可能通过滥用密码重置功能获取访问权限。...
2025-10-2 11:25:0 | 阅读: 23 |
收藏
|
The Hacker News - thehackernews.com
cl0p
mandiant
extortion
malicious
carmakal
How to Close Threat Detection Gaps: Your SOC's Action Plan
read file error: read notes: is a directory...
2025-10-2 11:0:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
socs
threats
feeds
gaps
Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro
研究人员发现两个针对阿联酋用户的安卓间谍软件活动ProSpy和ToSpy,伪装成Signal和ToTok等应用诱骗用户下载。这些恶意软件通过虚假网站和社会工程学传播,窃取设备数据并保持持久访问。...
2025-10-2 09:24:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
totok
spyware
prospy
tospy
eset
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
研究人员展示了一种方法,可在DDR4系统上绕过Intel SGX的安全机制,通过物理设备提取密钥,从而被动解密敏感数据。该方法名为WireTap,利用内存加密的可预测性,针对SGX的签名 enclave发起攻击,影响基于SGX的区块链部署。Intel表示此攻击超出其威胁模型范围,建议加强物理环境安全。...
2025-10-1 17:20:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
sgx
memory
encryption
wiretap
security
OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps
OneLogin IAM系统发现高危漏洞(CVE-2025-59363),CVSS评分7.7。攻击者可利用有效API凭证获取所有OIDC应用的客户端密钥,导致未授权访问和潜在横向移动。修复已发布。...
2025-10-1 13:27:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
client
onelogin
security
oidc
clutch
How Leading Security Teams Blend AI + Human Workflows (Free Webinar)
文章探讨了AI在现代自动化中的角色及其潜在问题。过度依赖AI可能导致系统脆弱性增加、决策不透明以及难以审计。作者建议结合人类判断、传统自动化和AI技术,构建可靠、可解释的工作流程,并邀请观众参加网络研讨会以获取实用策略。...
2025-10-1 12:45:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
workflows
security
webinar
agents
clarity
Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover
Red Hat OpenShift AI服务发现严重漏洞(CVE-2025-10725),CVSS评分9.9。该漏洞允许低权限用户通过认证账户提升权限至集群管理员级别,进而控制整个基础设施。受影响版本包括OpenShift AI 2.19、2.21及RHOAI。建议限制系统组权限,遵循最小权限原则。...
2025-10-1 12:36:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
openshift
security
attacker
cloud
privileges
2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising
Bitdefender报告指出,企业面临攻击面扩大、内部沟通不畅及AI威胁增加等问题,需加强防御并改善管理协调。...
2025-10-1 11:7:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
bitdefender
security
executives
threats
gap
Previous
15
16
17
18
19
20
21
22
Next