unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Apple Expands Spyware Alert System to Warn Users of Mercenary Attacks
Spyware / Cyber EspionageApple on Wednesday revised its documentation pertaining to its mercenary...
2024-4-11 14:44:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
spyware
security
mercenary
attackers
Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability
Vulnerability / Threat MitigationFortinet has released patches to address a critical security flaw...
2024-4-11 13:23:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
exploited
tracked
'eXotic Visit' Spyware Campaign Targets Android Users in India and Pakistan
Mobile Security / SpywareAn active Android malware campaign dubbed eXotic Visit has been primarily...
2024-4-10 22:24:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
pakistan
security
chitchat
hospital
Štefanko
Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files
Cyber Crime / MalvertisingCybersecurity researchers have discovered a new Raspberry Robin campaign...
2024-4-10 21:10:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
robin
raspberry
analysis
wsf
Beware: GitHub's Fake Popularity Scam Tricking Developers into Downloading Malware
Software Security / Supply Chain AttackThreat actors are now taking advantage of GitHub's search f...
2024-4-10 20:38:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
stars
malicious
github
tea
attackers
Hands-on Review: Cynomi AI-powered vCISO Platform
The need for vCISO services is growing. SMBs and SMEs are dealing with more third-party risks, tigh...
2024-4-10 19:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
cynomi
security
client
vciso
posture
Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel
Hardware Security / LinuxCybersecurity researchers have disclosed what they say is the "first nati...
2024-4-10 17:26:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
bhi
attacker
privileged
ebpf
Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses
Webinar / Identity SecurityWe all know passwords and firewalls are important, but what about the i...
2024-4-10 17:2:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
webinar
ites
exposures
threats
Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included
Microsoft has released security updates for the month of April 2024 to remediate a record 149 flaws...
2024-4-10 12:57:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
microsoft
security
bypass
software
malicious
Critical 'BatBadBut' Rust Vulnerability Exposes Windows Systems to Attacks
Software Security / VulnerabilityA critical security flaw in the Rust standard library could be ex...
2024-4-10 11:5:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
windows
security
impacts
ryotak
library
10-Year-Old 'RUBYCARP' Romanian Hacker Group Surfaces with Botnet
A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-ru...
2024-4-9 22:1:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
phishing
rubycarp
irc
security
sysdig
Hackers Targeting Human Rights Activists in Morocco and Western Sahara
Cyber Espionage / MalwareHuman rights activists in Morocco and the Western Sahara region are the t...
2024-4-9 21:45:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
sahara
radar
addax
starry
talos
Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access
read file error: read notes: is a directory...
2024-4-9 21:5:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
webos
6320
security
6318
CL0P's Ransomware Rampage - Security Measures for 2024
2023 CL0P Growth Emerging in early 2019, CL0P was first introduced as a more advanced version of i...
2024-4-9 19:24:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
ransomware
cl0p
securityhq
lockbit
extortion
Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing
Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-th...
2024-4-9 15:24:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
scrubcrypt
venom
remcos
batcloak
lin
Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks
Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect...
2024-4-9 13:46:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
attackers
security
botnets
network
Google Chrome Adds V8 Sandbox - A New Defense Against Browser Attacks
Software Security / CybersecurityGoogle has announced support for what's called a V8 Sandbox in th...
2024-4-8 21:51:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
memory
corruption
security
attacker
Watch Out for 'Latrodectus' - This Malware Could Be In Your Inbox
Cybercrime / Network SecurityThreat hunters have discovered a new malware called Latrodectus that...
2024-4-8 19:29:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
icedid
latrodectus
c2
ta578
processes
The Drop in Ransomware Attacks in 2024 and What it Means
The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, r...
2024-4-8 19:23:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
ransomware
lockbit
q1
alphv
decrease
Cybercriminals Targeting Latin America with Sophisticated Phishing Scheme
Cybersecurity / MalvertisingA new phishing campaign has set its eyes on the Latin American region...
2024-4-8 16:36:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
malicious
phishing
security
latin
Previous
62
63
64
65
66
67
68
69
Next