unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Why IT Admins Choose Samsung for Mobile Security
Mobile Security / Data ProtectionEver wonder how some IT teams keep corporate data safe without sl...
2025-11-21 11:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
knox
samsung
security
threats
emm
APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware...
2025-11-21 10:42:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
badaudio
apt24
phishing
malicious
nexus
SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
Compliance / Cyber AttackThe U.S. Securities and Exchange Commission (SEC) has abandoned its lawsu...
2025-11-21 08:5:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
brown
investors
commission
district
Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
Data Breach / SaaS SecuritySalesforce has warned of detected "unusual activity" related to Gainsig...
2025-11-21 05:32:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
salesforce
gainsight
salesloft
hubspot
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
Vulnerability / Cloud ComputingOligo Security has warned of ongoing attacks exploiting a two-year-...
2025-11-20 17:24:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
ray
clusters
malicious
gitlab
Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that's target...
2025-11-20 16:57:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
c2
tsundere
powershell
pm2
stealer
ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves
This week has been crazy in the world of hacking and online security. From Thailand to London to the...
2025-11-20 12:29:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
security
laundering
glob
microsoft
mehta
CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat
Online Fraud / Web SecurityCTM360 has identified a rapidly expanding WhatsApp account-hacking camp...
2025-11-20 11:30:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
ctm360
attackers
hackonchat
contacts
New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices
Malware / Mobile SecurityCybersecurity researchers have disclosed details of a new Android banking...
2025-11-20 11:4:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
sturnus
overlay
monitoring
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
Cyber Warfare / Threat IntelligenceThreat actors with ties to Iran engaged in cyber warfare as par...
2025-11-20 07:35:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
warfare
kinetic
iran
vessel
shipping
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
Malvertising / Artificial IntelligenceThreat actors are leveraging bogus installers masquerading a...
2025-11-20 04:6:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
installers
malicious
acronis
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
Vulnerability / Threat IntelligenceA recently disclosed security flaw impacting 7-Zip has come und...
2025-11-19 16:27:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
symbolic
remote
england
exploited
Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices
Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of...
2025-11-19 15:35:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
c2
stealer
eternidade
brazil
brazilian
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
Vulnerability / Threat IntelligenceA newly discovered campaign has compromised tens of thousands o...
2025-11-19 13:0:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
asus
routers
taiwan
aicloud
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
The challenge facing security leaders is monumental: Securing environments where failure is not an...
2025-11-19 11:55:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
ringfencing
security
containment
processes
network
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
Cyber Espionage / MalwareThe threat actor known as PlushDaemon has been observed using a previously...
2025-11-19 10:0:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
software
slowstepper
edgestepper
plushdaemon
eset
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
AI Security / SaaS SecurityMalicious actors can exploit default configurations in ServiceNow's Now...
2025-11-19 09:59:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
agents
assist
injection
llm
security
Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
Vulnerability / Network SecurityFortinet has warned of a new security flaw in FortiWeb that it sai...
2025-11-19 04:20:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
fortiweb
security
defenders
attacker
58034
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have in...
2025-11-18 18:31:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
phishing
security
bitb
attacker
malicious
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
Bug Bounty / Data PrivacyMeta on Tuesday said it has made available a tool called WhatsApp Researc...
2025-11-18 15:56:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
attacker
bounties
malicious
security
gegenhuber
Previous
3
4
5
6
7
8
9
10
Next