unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Hands-on Review: Myrror Security Code-Aware and Attack-Aware SCA
IntroductionThe modern software supply chain represents an ever-evolving threat landscape, with e...
2024-2-9 18:58:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
myrror
security
analysis
New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack
Endpoint Security / CryptocurrencySixty-one banking institutions, all of them originating from Bra...
2024-2-9 18:28:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
coyote
malicious
nim
loader
squirrel
Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity
Cloud Security / Open Source XDR / SIEMCloud computing has innovated how organizations operate and...
2024-2-9 15:40:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
cloud
wazuh
security
monitoring
Stealthy Zardoor Backdoor Targets Saudi Islamic Charity Organizations
Cyber Espionage / Threat IntelligenceAn unnamed Islamic non-profit organization in Saudi Arabia ha...
2024-2-9 14:31:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
c2
zardoor
espionage
proxy
zar32
Fortinet Warns of Critical FortiOS SSL VPN Flaw Likely Under Active Exploitation
Zero Day Vulnerability / Network SecurityFortinet has disclosed a new critical security flaw in Fo...
2024-2-9 13:36:0 | 阅读: 71 |
收藏
|
The Hacker News - thehackernews.com
fortios
security
exploited
remote
Warning: New Ivanti Auth Bypass Flaw Affects Connect Secure and ZTA Gateways
Ivanti has alerted customers of yet another high-severity security flaw in its Connect Secure, Poli...
2024-2-9 11:35:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
ivanti
5r1
zta
1r17
1r18
Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade
The U.S. government on Wednesday said the Chinese state-sponsored hacking group known as Volt Typho...
2024-2-8 21:5:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
typhoon
security
volt
network
operational
Unified Identity – look for the meaning behind the hype!
Unified Identity / Cyber SecurityIf you've listened to software vendors in the identity space late...
2024-2-8 18:39:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
unified
security
pam
iga
brings
HijackLoader Evolves: Researchers Decode the Latest Evasion Methods
Endpoint Security / Cyber ThreatThe threat actors behind a loader malware called HijackLoader have...
2024-2-8 18:28:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
loader
shellcode
hollowing
stage
Google Starts Blocking Sideloading of Potentially Dangerous Android Apps in Singapore
Data Protection / Mobile SecuritGoogle has unveiled a new pilot program in Singapore that aims to...
2024-2-8 18:17:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
singapore
abused
security
passwords
threats
Kimsuky's New Golang Stealer 'Troll' and 'GoBear' Backdoor Target South Korea
Cyber Espionage / MalwareThe North Korea-linked nation-state actor known as Kimsuky is suspected o...
2024-2-8 14:53:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
stealer
troll
korean
s2w
alphaseed
Critical Patches Released for New Flaws in Cisco, Fortinet, VMware Products
Cyber Threat / Network SecurityCisco, Fortinet, and VMware have released security fixes for multip...
2024-2-8 13:10:0 | 阅读: 25 |
收藏
|
The Hacker News - thehackernews.com
fortisiem
malicious
privileges
security
After FBI Takedown, KV-Botnet Operators Shift Tactics in Attempt to Bounce Back
The threat actors behind the KV-botnet made "behavioral changes" to the malicious network as U.S. l...
2024-2-7 23:11:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
kv
volt
typhoon
network
routers
Critical Bootloader Vulnerability in Shim Impacts Nearly All Linux Distros
Device Security / VulnerabilityThe maintainers of shim have released version 15.8 to address six s...
2024-2-7 21:33:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
attacker
security
shim
loader
demirkapi
New Webinar: 5 Steps to vCISO Success for MSPs and MSSPs
Risk Management / Cybersecurity2024 will be the year of the vCISO. An incredible 45% of MSPs and M...
2024-2-7 18:38:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
vciso
goals
webinar
pitfalls
Global Coalition and Tech Giants Unite Against Commercial Spyware Abuse
A coalition of dozens of countries, including France, the U.K., and the U.S., along with tech compa...
2024-2-7 17:45:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
spyware
chrome
intellexa
cytrox
variston
Chinese Hackers Exploited FortiGate Flaw to Breach Dutch Military Network
Cyber Espionage / Network SecurityChinese state-backed hackers broke into a computer network that'...
2024-2-7 14:29:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
network
security
dutch
espionage
coathanger
Critical JetBrains TeamCity On-Premises Flaw Exposes Servers to Takeover - Patch Now
Cybersecurity / Software SecurityJetBrains is alerting customers of a critical security flaw in it...
2024-2-7 13:5:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
teamcity
security
jetbrains
software
premises
Beware: Fake Facebook Job Ads Spreading 'Ov3r_Stealer' to Steal Crypto and Credentials
Social Engineering / MalvertisingThreat actors are leveraging bogus Facebook job advertisements as...
2024-2-6 22:9:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
stealer
ov3r
phemedrone
facebook
windows
Experts Detail New Flaws in Azure HDInsight Spark, Kafka, and Hadoop Services
Vulnerability / Cloud SecurityThree new security vulnerabilities have been discovered in Azure HDI...
2024-2-6 22:2:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
hdinsight
redos
oozie
security
injection
Previous
76
77
78
79
80
81
82
83
Next