unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?
IntroductionThe infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain at...
2024-5-24 18:35:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
cisos
ciso
mdr
development
Google Detects 4th Chrome Zero-Day in May Actively Under Attack - Update ASAP
Vulnerability / Browser SecurityGoogle on Thursday rolled out fixes to address a high-severity sec...
2024-5-24 18:10:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
confusion
chrome
4947
security
Courtroom Software Backdoored to Deliver RustDoor Malware in Supply Chain Attack
Supply Chain Attack / MalwareMalicious actors have backdoored the installer associated with courtr...
2024-5-24 17:48:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
javs
software
windows
rustdoor
fffmpeg
Japanese Experts Warn of BLOODALCHEMY Malware Targeting Government Agencies
APT Malware / Cyber EspionageCybersecurity researchers have discovered that the malware known as B...
2024-5-24 17:13:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
shadowpad
deed
shellcode
espionage
Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern
Ransomware / VirtualizationRansomware attacks targeting VMware ESXi infrastructure following an es...
2024-5-24 01:3:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
ransomware
tmchecker
encrypting
morlock
CISA Warns of Actively Exploited Apache Flink Security Vulnerability
Threat Intelligence / Vulnerability,The U.S. Cybersecurity and Infrastructure Security Agency (CIS...
2024-5-24 00:44:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
17519
security
exploited
attacker
extensive
New Frontiers, Old Tactics: Chinese Espionage Group Targets Africa & Caribbean Govts
Cyber Espionage / Network SecurityThe China-linked threat actor known as Sharp Panda has expanded...
2024-5-23 21:50:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
network
sharp
espionage
africa
dragon
Are Your SaaS Backups as Secure as Your Production Data?
Conversations about data security tend to diverge into three main threads:How can we protect the...
2024-5-23 19:14:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
backup
github
security
attacker
cloud
Inside Operation Diplomatic Specter: Chinese APT Group's Stealthy Tactics Exposed
Cyber Espionage / Network SecurityGovernmental entities in the Middle East, Africa, and Asia are t...
2024-5-23 19:14:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
diplomatic
sta
0043
espionage
missions
Ivanti Patches Critical Remote Code Execution Flaws in Endpoint Manager
Endpoint Security / VulnerabilityIvanti on Tuesday rolled out fixes to address multiple critical s...
2024-5-23 17:21:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
remote
security
genie
attacker
exploited
The End of an Era: Microsoft Phases Out VBScript for JavaScript and PowerShell
Endpoint Security / Data PrivacyMicrosoft on Wednesday outlined its plans to deprecate Visual Basi...
2024-5-23 13:33:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
microsoft
recall
vbscript
windows
snapshots
Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries
Cybersecurity researchers have disclosed details of a previously undocumented threat group called U...
2024-5-22 22:15:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
sea
haze
unfading
bitdefender
gh0st
Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats
ICS Security / VulnerabilityRockwell Automation is urging its customers to disconnect all industri...
2024-5-22 20:21:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
malicious
plc
exposure
facing
The Ultimate SaaS Security Posture Management Checklist, 2025 Edition
Since the first edition of The Ultimate SaaS Security Posture Management (SSPM) Checklist was relea...
2024-5-22 18:1:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
sspm
genai
posture
checklist
GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack
Cybersecurity researchers have discovered a new cryptojacking campaign that employs vulnerable driv...
2024-5-22 16:57:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
miner
powershell
byovd
windows
MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks
Vulnerability / Data BreachAn unknown threat actor is exploiting known security flaws in Microsoft...
2024-5-22 15:41:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
microsoft
exchange
africa
capturing
urged
QNAP Patches New Flaws in QTS and QuTS hero Impacting NAS Appliances
Data Security / Vulnerability Taiwanese company QNAP has rolled out fixes for a set of medium-seve...
2024-5-22 13:15:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
qnap
qts
watchtowr
network
Zoom Adopts NIST-Approved Post-Quantum End-to-End Encryption for Meetings
Encryption / Quantum ComputingPopular enterprise services provider Zoom has announced the rollout...
2024-5-22 12:46:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
e2ee
security
encryption
posed
resistant
Critical Veeam Backup Enterprise Manager Flaw Allows Authentication Bypass
Enterprise Security / VulnerabilityUsers of Veeam Backup Enterprise Manager are being urged to upd...
2024-5-22 11:45:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
veeam
backup
security
29212
remote
Critical GitHub Enterprise Server Flaw Allows Authentication Bypass
Vulnerability / Software DevelopmentGitHub has rolled out fixes to address a maximum severity flaw...
2024-5-22 00:16:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
ghes
assertions
sso
software
Previous
52
53
54
55
56
57
58
59
Next