unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
Malvertising / Artificial IntelligenceThreat actors are leveraging bogus installers masquerading a...
2025-11-20 04:6:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
installers
malicious
acronis
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
Vulnerability / Threat IntelligenceA recently disclosed security flaw impacting 7-Zip has come und...
2025-11-19 16:27:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
security
symbolic
remote
england
exploited
Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices
Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of...
2025-11-19 15:35:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
c2
stealer
eternidade
brazil
brazilian
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
Vulnerability / Threat IntelligenceA newly discovered campaign has compromised tens of thousands o...
2025-11-19 13:0:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
asus
routers
taiwan
aicloud
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
read file error: read notes: is a directory...
2025-11-19 11:55:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
ringfencing
security
containment
processes
network
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
Cyber Espionage / MalwareThe threat actor known as PlushDaemon has been observed using a previously...
2025-11-19 10:0:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
software
slowstepper
edgestepper
plushdaemon
eset
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
AI Security / SaaS SecurityMalicious actors can exploit default configurations in ServiceNow's Now...
2025-11-19 09:59:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
agents
assist
injection
llm
security
Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
Vulnerability / Network SecurityFortinet has warned of a new security flaw in FortiWeb that it sai...
2025-11-19 04:20:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
fortiweb
security
defenders
attacker
58034
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have in...
2025-11-18 18:31:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
phishing
security
bitb
attacker
malicious
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
Bug Bounty / Data PrivacyMeta on Tuesday said it has made available a tool called WhatsApp Researc...
2025-11-18 15:56:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
attacker
bounties
malicious
security
gegenhuber
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
Cloud Security / ComplianceYou've probably already moved some of your business to the cloud—or you...
2025-11-18 15:25:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
cloud
spots
webinar
cyberark
security
Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion
Malware / Social EngineeringCybersecurity researchers have disclosed details of a cyber attack tar...
2025-11-18 14:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
c2
tuoni
morphisec
powershell
teaming
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
Cyber Espionage / MalwareSuspected espionage-driven threat actors from Iran have been observed dep...
2025-11-18 12:54:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
windows
unc1549
tunneler
phishing
network
Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities
Identity security fabric (ISF) is a unified architectural framework that brings together disparate...
2025-11-18 11:0:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
fabric
governance
identities
agents
Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
Cybersecurity researchers have discovered a set of seven npm packages published by a single threat...
2025-11-18 10:37:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
cloaking
adspect
security
victim
malicious
Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet
Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-o...
2025-11-18 08:17:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
aisuru
microsoft
security
botnets
netscout
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability
Browser Security / VulnerabilityGoogle on Monday released security updates for its Chrome browser...
2025-11-18 04:44:0 | 阅读: 29 |
收藏
|
The Hacker News - thehackernews.com
chrome
confusion
7444
13223
exploited
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT
Cybersecurity researchers have discovered malware campaigns using the now-prevalent ClickFix social...
2025-11-17 16:53:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
amatera
phishing
stealer
powershell
malicious
⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More
Cybersecurity / Hacking NewsThis week showed just how fast things can go wrong when no one's watc...
2025-11-17 12:34:0 | 阅读: 37 |
收藏
|
The Hacker News - thehackernews.com
security
remote
stealer
ransomware
software
5 Reasons Why Attackers Are Phishing Over LinkedIn
Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking...
2025-11-17 11:55:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
phishing
attackers
security
malicious
attacker
Previous
7
8
9
10
11
12
13
14
Next