unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
What is Nudge Security and How Does it Work?
SaaS Security / Endpoint SecurityIn today's highly distributed workplace, every employee has the a...
2024-1-24 19:24:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
security
nudge
governance
cloud
sso
Kasseika Ransomware Using BYOVD Trick to Disarms Security Pre-Encryption
Ransomware / Endpoint Security The ransomware group known as Kasseika has become the latest to leve...
2024-1-24 19:20:0 | 阅读: 20 |
收藏
|
The Hacker News - thehackernews.com
ransomware
security
martini
kasseika
bianlian
The Unknown Risks of The Software Supply Chain: A Deep-Dive
Vulnerability / Software SecurityIn a world where more & more organizations are adopting open-sour...
2024-1-24 17:1:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
software
cheat
scas
analysis
U.S., U.K., Australia Sanction Russian REvil Hacker Behind Medibank Breach
Cryptocurrency / CybercrimeGovernments from Australia, the U.K., and the U.S. have imposed financi...
2024-1-24 16:55:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
ransomware
russia
ermakov
treasury
sanctions
Patch Your GoAnywhere MFT Immediately - Critical Flaw Lets Anyone Be Admin
Vulnerability / Endpoint SecurityA critical security flaw has been disclosed in Fortra's GoAnywher...
2024-1-24 13:32:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
goanywhere
fortra
security
0204
VexTrio: The Uber of Cybercrime - Brokering Malware for 60+ Affiliates
The threat actors behind ClearFake, SocGholish, and dozens of other actors have established partner...
2024-1-23 22:33:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
vextrio
tds
affiliate
network
socgholish
Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub
Software Security / Supply ChainTwo malicious packages discovered on the npm package registry have...
2024-1-23 22:19:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
malicious
kodiak2k
ssh
software
"Activator" Alert: MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets
Cracked software have been observed infecting Apple macOS users with a previously undocumented stea...
2024-1-23 20:27:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
activator
software
cracked
payload
puzan
From Megabits to Terabits: Gcore Radar Warns of a New Era of DDoS Attacks
Cybersecurity / Server SecurityAs we enter 2024, Gcore has released its latest Gcore Radar report,...
2024-1-23 19:33:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
gcore
attackers
gbps
sectors
BreachForums Founder Sentenced to 20 Years of Supervised Release, No Jail Time
Conor Brian Fitzpatrick has been sentenced to time served and 20 years of supervised release for hi...
2024-1-23 18:25:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
fitzpatrick
sentencing
mental
sentence
~40,000 Attacks in 3 Days: Critical Confluence RCE Under Active Exploitation
Vulnerability / Cyber AttackMalicious actors have begun to actively exploit a recently disclosed c...
2024-1-23 17:34:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
22527
atlassian
attackers
jaiswal
Apple Issues Patch for Critical Zero-Day in iPhones, Macs - Update Now
Vulnerability / Device Security Apple on Monday released security updates for iOS, iPadOS, macOS, t...
2024-1-23 09:30:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
inch
macs
exploited
1st
ventura
North Korean Hackers Weaponize Fake Research to Deliver RokRAT Backdoor
Media organizations and high-profile experts in North Korean affairs have been at the receiving end...
2024-1-23 00:47:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
north
korea
rokrat
scarcruft
korean
MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries
Software Security / Supply ChainSeveral public and popular libraries abandoned but still used in J...
2024-1-23 00:35:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
repository
groupid
jitpack
library
attacker
52% of Serious Vulnerabilities We Find are Related to Windows 10
We analyzed 2,5 million vulnerabilities we discovered in our customer's assets. This is what we fo...
2024-1-22 19:22:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
asset
security
unresolved
windows
NS-STEALER Uses Discord Bots to Exfiltrate Your Secrets from Popular Browsers
Browser Security / Cyber ThreatCybersecurity researchers have discovered a new Java-based "sophist...
2024-1-22 19:22:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
stealer
security
chaes
ramanathan
chae
FTC Bans InMarket for Selling Precise User Location Without Consent
The U.S. Federal Trade Commission (FTC) is continuing to clamp down on data brokers by prohibiting...
2024-1-22 15:2:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
inmarket
consumers
ftc
precise
Apache ActiveMQ Flaw Exploited in New Godzilla Web Shell Attacks
Cybersecurity researchers are warning of a "notable increase" in threat actor activity actively exp...
2024-1-22 11:40:0 | 阅读: 25 |
收藏
|
The Hacker News - thehackernews.com
activemq
security
godzilla
concealed
shells
Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years
Zero Day / Cyber EspionageAn advanced China-nexus cyber espionage group previously linked to the e...
2024-1-20 18:23:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
vcenter
mandiant
unc3886
34048
virtualpie
CISA Issues Emergency Directive to Federal Agencies on Ivanti Zero-Day Exploits
Network Security / Threat IntelligenceThe U.S. Cybersecurity and Infrastructure Security Agency (C...
2024-1-20 12:31:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
ivanti
malicious
security
mandiant
Previous
80
81
82
83
84
85
86
87
Next