unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Google Sues App Developers Over Fake Crypto Investment App Scam
Investment Scam / Mobile SecurityGoogle has filed a lawsuit against two app developers for engagin...
2024-4-8 13:25:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
defendants
investment
bogus
gains
promising
Hackers Exploit Magento Bug to Steal Payment Data from E-commerce Websites
Skimmer / Threat IntelligenceThreat actors have been found exploiting a critical flaw in Magento t...
2024-4-6 17:43:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
skimmer
magento
inject
alexander
illegally
AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks
Artificial Intelligence / Supply Chain AttackNew research has found that artificial intelligence (...
2024-4-5 22:8:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
hugging
pickle
malicious
security
artificial
CISO Perspectives on Complying with Cybersecurity Regulations
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyb...
2024-4-5 19:18:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
security
cisos
ciso
costs
From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware
Malware / Endpoint SecurityBogus installers for Adobe Acrobat Reader are being used to distribute...
2024-4-5 17:40:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
byakugan
malicious
victim
c2
New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA
Cyber Espionage / CybersecurityFinancial organizations in the Asia-Pacific (APAC) and Middle East...
2024-4-5 15:48:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
malicious
resecurity
jsoutprox
security
Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws
Advanced Persistent ThreatMultiple China-nexus threat actors have been linked to the zero-day expl...
2024-4-5 15:15:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
mandiant
ivanti
21887
46805
espionage
Vietnam-Based Hackers Steal Financial Data Across Asia with Malware
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and...
2024-4-4 23:42:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
facebook
rotbot
vietnam
stealer
xclient
New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware
Phishing Attack / MalwareAn updated version of an information-stealing malware called Rhadamanthys...
2024-4-4 23:30:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
phishing
stealer
tesla
lockbit
Considerations for Operational Technology Cybersecurity
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control...
2024-4-4 19:27:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
operational
encryption
New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks
Vulnerability / Internet ProtocolNew research has found that the CONTINUATION frame in the HTTP/2...
2024-4-4 19:15:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
frames
memory
crash
nowotarski
Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure
Network Security / VulnerabilityIvanti has released security updates to address four security flaw...
2024-4-4 12:45:0 | 阅读: 25 |
收藏
|
The Hacker News - thehackernews.com
ivanti
security
thereby
crash
abbott
Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies
Mobile Security / Zero DayGoogle has disclosed that two Android security flaws impacting its Pixel...
2024-4-4 00:10:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
firmware
grapheneos
29745
security
U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers
Data Breach / Incident ResponseThe U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft...
2024-4-3 23:32:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
microsoft
0558
csrb
cloud
security
Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks
Browser Security / Session HijackingGoogle on Tuesday said it's piloting a new feature in Chrome c...
2024-4-3 21:7:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
dbsc
chrome
hijacking
lifetime
Attack Surface Management vs. Vulnerability Management
Cybersecurity / Penetration TestingAttack surface management (ASM) and vulnerability management (V...
2024-4-3 19:12:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
security
intruder
identify
cloud
Mispadu Trojan Targets Europe, Thousands of Credentials Compromised
Malware / Financial SecurityThe banking trojan known as Mispadu has expanded its focus beyond Lati...
2024-4-3 17:32:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
malicious
mispadu
download
Critical Security Flaw Found in Popular LayerSlider WordPress Plugin
Web Security / VulnerabilityA critical security flaw impacting the LayerSlider plugin for WordPres...
2024-4-3 13:11:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
layerslider
wordpress
attackers
Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution
Firmware Security / VulnerabilityThe malicious code inserted into the open-source library XZ Utils...
2024-4-2 21:18:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
xz
maintainer
tan
jia
remote
Harnessing the Power of CTEM for Cloud Security
Cloud solutions are more mainstream – and therefore more exposed – than ever before.In 2023 alone,...
2024-4-2 19:27:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
cloud
security
exposures
ctem
attackers
Previous
63
64
65
66
67
68
69
70
Next