unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
Cryptocurrency / Threat IntelligenceA new malware campaign has been exploiting the updating mechan...
2024-4-24 15:2:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
guptiminer
windows
korean
escan
network
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
A new ongoing malware campaign has been observed distributing three different stealers, such as Cry...
2024-4-24 12:50:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
network
powershell
shortcut
stealer
payload
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Supply Chain Attack / Application SecurityResearchers have identified a dependency confusion vulne...
2024-4-23 22:0:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
security
cordova
confusion
harness
archived
Webinar: Learn Proactive Supply Chain Threat Hunting Techniques
Threat Hunting / Software SecurityIn the high-stakes world of cybersecurity, the battleground has...
2024-4-23 19:28:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
threats
software
exclusive
defenses
Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases
End-to-End Encryption / PrivacyEuropean Police Chiefs said that the complementary partnership betw...
2024-4-23 18:45:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
encryption
crime
nudity
e2ee
sexual
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Cybersecurity breaches can be devastating for both individuals and businesses alike. While many peo...
2024-4-23 18:22:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
threats
security
cyberattack
German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies
Counterintelligence / National SecurityGerman authorities said they have issued arrest warrants ag...
2024-4-23 18:16:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
german
arrest
germany
defendants
U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse
Spyware / Cyber EspionageThe U.S. Department of State on Monday said it's taking steps to impose v...
2024-4-23 14:43:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
spyware
visa
journalists
intellexa
development
Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware
National Security Agency / Threat IntelligenceThe Russia-linked nation-state threat actor tracked...
2024-4-23 12:23:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
gooseegg
powershell
blizzard
forest
microsoft
Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft
Network Security / Endpoint SecurityThe threat actor known as ToddyCat has been observed using a w...
2024-4-22 23:11:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
attackers
microsoft
reverse
toddycat
Pentera's 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have...
2024-4-22 19:30:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
cisos
cloud
importance
MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws
Network Security / CybersecurityThe MITRE Corporation revealed that it was the target of a nation-...
2024-4-22 19:5:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
network
exploited
security
nerve
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Between crossovers - Do threat actors play dirty or desperate? In our dataset of over 11,000 victi...
2024-4-22 18:22:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
victim
cy
extortion
security
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Rootkit / Software SecurityNew research has found that the DOS-to-NT path conversion process could...
2024-4-22 17:22:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
microsoft
software
windows
conversion
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
Cryptocurrency / Artificial IntelligenceMicrosoft has revealed that North Korea-linked state-spons...
2024-4-22 15:12:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
north
sleet
firm
windows
korean
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
A new information stealer has been found leveraging Lua bytecode for added stealth and sophisticati...
2024-4-21 16:42:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
stealer
redline
mcafee
microsoft
bytecode
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Vulnerability / Network SecurityPalo Alto Networks has shared more details of a critical security...
2024-4-20 13:53:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
pan
attacker
security
3400
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
Vulnerability / Endpoint SecurityUsers of the CrushFTP enterprise file transfer software are being...
2024-4-20 13:18:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
crushftp
crowdstrike
security
v11
politically
BlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Tool
Network Security / Firmware SecurityTechnology, research, and government sectors in the Asia-Pacif...
2024-4-19 21:44:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
waterbear
network
deuterbear
analysis
earth
How Attackers Can Own a Business Without Touching the Endpoint
Attackers are increasingly making use of "networkless" attack techniques targeting cloud apps and i...
2024-4-19 19:8:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
cloud
identities
phishing
security
okta
Previous
59
60
61
62
63
64
65
66
Next