unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Non-Human Access is the Path of Least Resistance: A 2023 Recap
Cybersecurity / GenAI Security2023 has seen its fair share of cyber attacks, however there's one a...
2023-12-12 19:25:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
security
github
genai
astrix
attackers
New MrAnon Stealer Malware Targeting German Users via Booking-Themed Scam
Cryptocurrency / Cyber AttackA phishing campaign has been observed delivering an information steal...
2023-12-12 17:55:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
stealer
phishing
mranon
python
lin
Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws
Apple on Monday released security patches for iOS, iPadOS, macOS, tvOS, watchOS, and Safari web bro...
2023-12-12 14:44:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
webkit
consistency
psychology
webinar
New Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch Now
Vulnerability / Software SecurityApache has released a security advisory warning of a critical sec...
2023-12-12 13:23:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
struts
security
software
exploited
incite
Researchers Unmask Sandman APT's Hidden Link to China-Based KEYPLUG Backdoor
Threat Intelligence / Cyber AttackTactical and targeting overlaps have been discovered between the...
2023-12-11 21:59:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
keyplug
luadream
0866
overlaps
c2
Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans
Vulnerability / EspionageThe notorious North Korea-linked threat actor known as the Lazarus Group...
2023-12-11 21:0:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
ninerat
security
c2
attackers
north
Playbook: Your First 100 Days as a vCISO - 5 Steps to Success
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every orga...
2023-12-11 19:45:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
vciso
security
playbook
goals
Webinar — Psychology of Social Engineering: Decoding the Mind of a Cyber Attacker
In the ever-evolving cybersecurity landscape, one method stands out for its chilling effectiveness...
2023-12-11 18:53:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
psychology
attacker
threats
SpyLoan Scandal: 18 Malicious Loan Apps Defraud Millions of Android Users
Data Security / Mobile SecurityCybersecurity researchers have discovered 18 malicious loan apps fo...
2023-12-11 15:9:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
loan
crédito
security
spyloan
malicious
New PoolParty Process Injection Techniques Outsmart Top EDR Solutions
Endpoint Security / MalwareA new collection of eight process injection techniques, collectively du...
2023-12-11 13:58:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
injection
security
leviev
windows
poolparty
SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs
Cyber Threat / Hardware SecurityResearchers from the Vrije Universiteit Amsterdam have disclosed a...
2023-12-9 19:52:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
cpus
spectre
security
lam
transient
Researchers Unveal GuLoader Malware's Latest Anti-Analysis Techniques
Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an ef...
2023-12-9 15:16:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
guloader
analysis
security
sold
attackers
New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands
Vulnerability / Mobile NetworkA collection of security flaws in the firmware implementation of 5G...
2023-12-9 01:22:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
attacker
qualcomm
network
security
N. Korean Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks
Cyber Espionage / CryptocurrencyThe North Korean threat actor known as Kimsuky has been observed t...
2023-12-8 21:33:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
korea
north
phishing
korean
malicious
Ransomware-as-a-Service: The Growing Threat You Can't Ignore
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cyb...
2023-12-8 19:8:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
ransomware
security
outpost24
affiliates
crucial
Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software
Endpoint Security / MalwareUnauthorized websites distributing trojanized versions of cracked softw...
2023-12-8 17:52:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
proxy
attackers
software
trojan
c2
WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability
Vulnerability / Website SecurityWordPress has released version 6.4.2 with a patch for a critical s...
2023-12-8 17:23:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
php
security
wordpress
patchstack
wordfence
Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme
Cryptocurrency / Cyber CrimeThe Russian founder of the now-defunct Bitzlato cryptocurrency exchang...
2023-12-8 13:41:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
exchange
legkodymov
bitzlato
justice
lax
Microsoft Warns of COLDRIVER's Evolving Evading and Credential-Stealing Tactics
Threat Intelligence / Cyber EspionageThe threat actor known as COLDRIVER has continued to engage i...
2023-12-7 22:36:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
blizzard
evilginx
microsoft
security
redirection
New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices
Mobile Security / VulnerabilityA critical Bluetooth security flaw could be exploited by threat act...
2023-12-7 19:46:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
security
keystrokes
permit
45866
affects
Previous
89
90
91
92
93
94
95
96
Next