unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
China-linked Hackers Deploy New 'UNAPIMON' Malware for Stealthy Operations
Cyber Espionage / Threat IntelligenceA threat activity cluster tracked as Earth Freybug has been o...
2024-4-2 19:0:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
library
earth
unapimon
freybug
espionage
Google to Delete Billions of Browsing Records in 'Incognito Mode' Privacy Lawsuit Settlement
Browser Security / Data SecurityGoogle has agreed to purge billions of data records reflecting use...
2024-4-2 15:8:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
chrome
incognito
lawsuit
settlement
security
Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors
Malvertising / Threat IntelligenceThe threat actor known as TA558 has been attributed to a new mas...
2024-4-2 12:54:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
ransomware
phishing
venom
darkgate
Indian Government Rescues 250 Citizens Forced into Cybercrime in Cambodia
Cryptocurrency / Financial FraudThe Indian government said it has rescued and repatriated about 25...
2024-4-1 21:51:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
indian
cambodia
forced
schemes
rescued
Detecting Windows-based Malware Through Better Visibility
Despite a plethora of available security solutions, more and more organizations fall victim to Ran...
2024-4-1 19:20:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
eventsentry
monitoring
network
security
software
Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals
Several malicious Android apps that turn mobile devices running the operating system into residenti...
2024-4-1 18:10:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
residential
proxy
lumiapps
proxies
proxyware
Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities
The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved...
2024-4-1 14:4:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
vultur
malicious
victim
remote
Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware
Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware,...
2024-3-30 15:16:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
stealer
malicious
dmg
security
software
Urgent: Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros
Linux / Supply Chain AttackRedHat on Friday released an "urgent security alert" warning that two v...
2024-3-30 13:23:0 | 阅读: 21 |
收藏
|
The Hacker News - thehackernews.com
xz
library
software
security
fedora
Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds
Reverse Engineering / RFID SecuritySecurity vulnerabilities discovered in Dormakaba's Saflok elect...
2024-3-29 22:54:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
keycards
keycard
dormakaba
locks
TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy
Network Security / IoT SecurityA botnet previously considered to be rendered inert has been observ...
2024-3-29 20:12:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
faceless
proxy
security
eol
bots
The Golden Age of Automated Penetration Testing is Here
Pen Testing / Regulatory ComplianceNetwork penetration testing plays a vital role in detecting vul...
2024-3-29 19:19:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
network
vpentest
vonahi
New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking
Details have emerged about a vulnerability impacting the "wall" command of the util-linux package t...
2024-3-29 18:49:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
wall
terminals
setgid
28085
sequences
PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers
Supply Chain Attack / Threat IntelligenceThe maintainers of the Python Package Index (PyPI) reposi...
2024-3-29 13:37:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
variations
malicious
pypi
payload
matplotlib
Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries
A Linux version of a multi-platform backdoor called DinodasRAT has been detected in the wild target...
2024-3-29 01:2:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
dinodasrat
windows
c2
espionage
tracks
Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack
Cyber Espionage / MalwareThe Police of Finland (aka Poliisi) has formally accused a Chinese nation...
2024-3-29 00:50:0 | 阅读: 23 |
收藏
|
The Hacker News - thehackernews.com
apt31
guangzong
zhao
wuhan
espionage
Darcula Phishing Network Leveraging RCS and iMessage to Evade Detection
A sophisticated phishing-as-a-service (PhaaS) platform called Darcula has set its sights on organiz...
2024-3-28 22:43:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
darcula
phishing
victim
rcs
imessage
New Webinar: Avoiding Application Security Blind Spots with OPSWAT and F5
Application Security / WebinarConsidering the ever-changing state of cybersecurity, it's never too...
2024-3-28 20:43:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
opswat
webinar
spots
Behind the Scenes: The Art of Safeguarding Non-Human Identities
Secrets Management / Zero TrustIn the whirlwind of modern software development, teams race against...
2024-3-28 19:0:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
development
software
stage
identities
New ZenHammer Attack Bypasses Rowhammer Defenses on AMD CPUs
Hardware Security / VulnerabilityCybersecurity researchers from ETH Zurich have developed a new va...
2024-3-28 18:55:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
rowhammer
flips
memory
ddr5
zen
Previous
64
65
66
67
68
69
70
71
Next