unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
Cloud Security / ComplianceYou've probably already moved some of your business to the cloud—or you...
2025-11-18 15:25:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
cloud
spots
webinar
cyberark
security
Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion
Malware / Social EngineeringCybersecurity researchers have disclosed details of a cyber attack tar...
2025-11-18 14:0:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
c2
tuoni
morphisec
powershell
teaming
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
Cyber Espionage / MalwareSuspected espionage-driven threat actors from Iran have been observed dep...
2025-11-18 12:54:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
windows
unc1549
tunneler
phishing
network
Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities
Identity security fabric (ISF) is a unified architectural framework that brings together disparate...
2025-11-18 11:0:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
fabric
governance
identities
agents
Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
Cybersecurity researchers have discovered a set of seven npm packages published by a single threat...
2025-11-18 10:37:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
cloaking
adspect
security
victim
malicious
Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet
Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-o...
2025-11-18 08:17:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
aisuru
microsoft
security
botnets
netscout
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability
Browser Security / VulnerabilityGoogle on Monday released security updates for its Chrome browser...
2025-11-18 04:44:0 | 阅读: 29 |
收藏
|
The Hacker News - thehackernews.com
chrome
confusion
7444
13223
exploited
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT
Cybersecurity researchers have discovered malware campaigns using the now-prevalent ClickFix social...
2025-11-17 16:53:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
amatera
phishing
stealer
powershell
malicious
⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More
Cybersecurity / Hacking NewsThis week showed just how fast things can go wrong when no one's watc...
2025-11-17 12:34:0 | 阅读: 34 |
收藏
|
The Hacker News - thehackernews.com
security
remote
stealer
ransomware
software
5 Reasons Why Attackers Are Phishing Over LinkedIn
Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking...
2025-11-17 11:55:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
phishing
attackers
security
malicious
attacker
Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codena...
2025-11-17 11:20:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
security
gh0st
processes
windows
nsis
Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time
Vulnerability / Mobile SecurityGoogle has disclosed that the company's continued adoption of the R...
2025-11-17 06:2:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
memory
security
overflow
resulted
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against...
2025-11-15 16:35:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
rondodox
vulncheck
24893
fresh
adopting
Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies
The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty...
2025-11-15 10:21:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
currency
identities
didenko
north
guilty
North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
Malware / Threat IntelligenceThe North Korean threat actors behind the Contagious Interview campai...
2025-11-14 18:25:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
contagious
keeper
payload
nviso
tsunamikit
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting m...
2025-11-14 15:20:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
mcp
sglang
vllm
malicious
attacker
Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and...
2025-11-14 14:40:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
inda
tamecat
apt42
powershell
Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns
Ransomware / Threat IntelligenceKey Takeaways:85 active ransomware and extortion groups observe...
2025-11-14 10:37:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
ransomware
lockbit
affiliates
dragonforce
affiliate
Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign
State-sponsored threat actors from China used artificial intelligence (AI) technology developed by...
2025-11-14 09:53:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
claude
anthropic
lateral
autonomous
harvesting
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
Threat Intelligence / VulnerabilityCybersecurity researchers are sounding the alert about an authe...
2025-11-14 09:0:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
fortiweb
testpoint
aft3
watchtowr
bypass
Previous
4
5
6
7
8
9
10
11
Next