unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT
Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing...
2024-2-26 22:54:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
loader
idat
remcos
systembc
pikabot
8,000+ Subdomains of Trusted Brands Hijacked for Massive Spam Operation
More than 8,000 subdomains belonging to legitimate brands and institutions have been hijacked as pa...
2024-2-26 22:10:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
spf
guardio
phishing
security
msn
North Korean Hackers Targeting Developers with Malicious npm Packages
Software Security / CryptocurrencyA set of fake npm packages discovered on the Node.js repository...
2024-2-26 20:27:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
repository
phylum
n2
software
python
Three Tips to Protect Your Secrets from AI Accidents
Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of t...
2024-2-26 18:29:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
llm
llms
reveal
prompts
github
Banking Trojans Target Latin America and Europe Through Google Cloud Run
Cybersecurity researchers are warning about a spike in email phishing campaigns that are weaponizin...
2024-2-26 17:51:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
phishing
cloud
ousaban
malicious
microsoft
LockBit Ransomware Group Resurfaces After Law Enforcement Takedown
The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new...
2024-2-26 12:57:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
ransomware
php
trial
decryptors
sugarlocker
Authorities Claim LockBit Admin "LockBitSupp" Has Engaged with Law Enforcement
LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cy...
2024-2-25 16:53:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
lockbit
ransomware
lockbitsupp
affiliates
cronos
Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies
Active Directory / Data ProtectionMicrosoft has expanded free logging capabilities to all U.S. fed...
2024-2-24 19:49:0 | 阅读: 20 |
收藏
|
The Hacker News - thehackernews.com
microsoft
0558
purview
security
Dormant PyPI Package Compromised to Spread Nova Sentinel Malware
Supply Chain Attack / MalwareA dormant package available on the Python Package Index (PyPI) reposi...
2024-2-24 01:8:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
pypi
malicious
stealer
phylum
nova
Microsoft Releases PyRIT - A Red Teaming Tool for Generative AI
Red Teaming / Artificial IntelligenceMicrosoft has released an open access automation framework ca...
2024-2-23 19:31:0 | 阅读: 21 |
收藏
|
The Hacker News - thehackernews.com
microsoft
pyrit
generative
teaming
scoring
How to Use Tines's SOC Automation Capability Matrix
Created by John Tuckner and the team at workflow and automation platform Tines, the SOC Automation...
2024-2-23 19:29:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
security
phishing
acm
analysis
utilizing
Researchers Detail Apple's Recent Zero-Click Shortcuts Vulnerability
Data Privacy / iOS SecurityDetails have emerged about a now-patched high-severity security flaw in...
2024-2-23 13:5:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
shortcut
security
malicious
alnazi
23204
FTC Slams Avast with $16.5 Million Fine for Selling Users' Browsing Data
Privacy / Regulatory ComplianceThe U.S. Federal Trade Commission (FTC) has hit antivirus vendor Av...
2024-2-23 11:30:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
jumpshot
sold
ftc
consumers
parties
Apple Unveils PQ3 Protocol - Post-Quantum Encryption for iMessage
Quantum Computing / EncryptionApple has announced a new post-quantum cryptographic protocol called...
2024-2-23 00:25:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
security
encryption
pq3
rcs
imessage
Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks
Network Security / Penetration TestingA recently open-sourced network mapping tool called SSH-Snak...
2024-2-22 19:7:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
ssh
snake
security
network
rogers
A New Age of Hacktivism
In the past 2 years, we have observed a significant surge in hacktivism activity due to ongoing war...
2024-2-22 18:44:0 | 阅读: 21 |
收藏
|
The Hacker News - thehackernews.com
ukraine
noname057
hacktivist
aid
hacktivism
Russian Government Software Backdoored to Deploy Konni RAT Malware
Malware / Cyber EspionageAn installer for a tool likely used by the Russian Consular Department of...
2024-2-22 18:43:0 | 阅读: 28 |
收藏
|
The Hacker News - thehackernews.com
konni
backdoored
russia
consular
software
U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders
The U.S. State Department has announced monetary rewards of up to $15 million for information that...
2024-2-22 13:26:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
lockbit
affiliates
ransomware
stealbit
wisniewski
New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers
Network Security / VulnerabilityCybersecurity researchers have identified two authentication bypas...
2024-2-22 00:16:0 | 阅读: 20 |
收藏
|
The Hacker News - thehackernews.com
network
52160
supplicant
wpa
52161
Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS
Malware / Cyber EspionageThe China-linked threat actor known as Mustang Panda has targeted various...
2024-2-21 21:3:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
plugx
doplugs
panda
mustang
customized
Previous
72
73
74
75
76
77
78
79
Next