unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Hacking the Human Mind: Exploiting Vulnerabilities in the 'First Line of Cyber Defense'
Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts....
2023-12-7 19:44:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
humans
attackers
emotions
security
traits
Building a Robust Threat Intelligence with Wazuh
Threat Intelligence / Network SecurityThreat intelligence refers to gathering, processing, and ana...
2023-12-7 18:51:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
threats
wazuh
feeds
Governments May Spy on You by Requesting Push Notifications from Apple and Google
Unspecified governments have demanded mobile push notification records from Apple and Google users...
2023-12-7 18:24:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
governments
letter
demands
wyden
apns
New Stealthy 'Krasue' Linux Trojan Targeting Telecom Firms in Thailand
Malware / Security BreachA previously unknown Linux remote access trojan called Krasue has been ob...
2023-12-7 14:15:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
krasue
webinar
psychology
attackers
trojan
Meta Launches Default End-to-End Encryption for Chats and Calls on Messenger
Encryption / Data PrivacyMeta has officially begun to roll out support for end-to-end encryption (...
2023-12-7 13:52:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
messenger
encryption
labyrinth
e2ee
security
Alert: Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts
Access Management / Cloud SecurityThreat actors can take advantage of Amazon Web Services Security...
2023-12-6 21:38:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
sts
cloud
security
akia
gardner
New Report: Unveiling the Threat of Malicious Browser Extensions
Browser Security / PrivacyCompromising the browser is a high-return target for adversaries. Browse...
2023-12-6 19:44:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
malicious
security
ratings
developer
software
Sierra:21 - Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks
Cyber Threat / VulnerabilityA collection of 21 security flaws have been discovered in Sierra Wirel...
2023-12-6 19:18:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
attackers
routers
tinyxml
opennds
Scaling Security Operations with Automation
In an increasingly complex and fast-paced digital landscape, organizations strive to protect themse...
2023-12-6 18:14:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
processes
maturity
crucial
identify
Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers
Vulnerability / Web Server SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA...
2023-12-6 18:10:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
coldfusion
passwords
exploited
webinar
attackers
Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution
Software Security / VulnerabilityAtlassian has released software fixes to address four critical fl...
2023-12-6 17:18:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
remote
atlassian
software
attacker
affects
Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks
Vulnerability / Mobile SecurityChipmaker Qualcomm has released more information about three high-s...
2023-12-6 13:23:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
memory
corruption
exploited
Warning for iPhone Users: Experts Warn of Sneaky Fake Lockdown Mode Attack
Mobile Security / SpywareA new "post-exploitation tampering technique" can be abused by malicious...
2023-12-5 22:58:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
lockdown
security
threats
malicious
abused
Russia's AI-Powered Disinformation Operation Targeting Ukraine, U.S., and Germany
Brandjacking / Artificial IntelligenceThe Russia-linked influence operation called Doppelganger ha...
2023-12-5 22:58:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
influence
ukraine
insider
warfare
election
Generative AI Security: Preventing Microsoft Copilot Data Exposure
Microsoft Copilot has been called one of the most powerful productivity tools on the planet.Copil...
2023-12-5 19:29:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
copilot
microsoft
security
humans
m365
15,000 Go Module Repositories on GitHub Vulnerable to Repojacking Attack
Software Security / Supply ChainNew research has found that over 15,000 Go module repositories on...
2023-12-5 18:14:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
github
repository
repojacking
username
software
New Threat Actor 'AeroBlade' Emerges in Espionage Attack on U.S. Aerospace
Cyber Espionage / Threat AnalysisA previously undocumented threat actor has been linked to a cyber...
2023-12-5 15:55:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
analysis
bestuzhev
reverse
insider
attackers
Microsoft Warns of Kremlin-Backed APT28 Exploiting Critical Outlook Vulnerability
Email Security / VulnerabilityMicrosoft on Monday said it detected Kremlin-backed nation-state act...
2023-12-5 14:59:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
microsoft
security
mailbox
dkwoc
forest
New BLUFFS Bluetooth Attack Expose Devices to Adversary-in-the-Middle Attacks
New research has unearthed multiple novel attacks that break Bluetooth Classic's forward secrecy an...
2023-12-4 21:16:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
secrecy
attacker
encryption
peers
guarantees
Make a Fresh Start for 2024: Clean Out Your User Inventory to Reduce SaaS Risk
As work ebbs with the typical end-of-year slowdown, now is a good time to review user roles and pri...
2023-12-4 19:38:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
sso
unused
dormant
security
idp
Previous
90
91
92
93
94
95
96
97
Next