unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Alert: 'Effluence' Backdoor Persists Despite Patching Atlassian Confluence Servers
Cyber Attack / Threat IntelligenceCybersecurity researchers have discovered a stealthy backdoor na...
2023-11-10 16:58:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
atlassian
loader
22515
security
attacker
Iran-Linked Imperial Kitten Cyber Group Targeting Middle East's Tech Sectors
Cyber Attack / Cyber ThreatA group with links to Iran targeted transportation, logistics, and tech...
2023-11-10 15:11:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
iranian
imaploader
microsoft
israel
Stealthy Kamran Spyware Targeting Urdu-speaking Users in Gilgit-Baltistan
Privacy / Cyber EspionageUrdu-speaking readers of a regional news website that caters to the Gilgi...
2023-11-10 13:9:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
urdu
kamran
c2
espionage
malicious
Zero-Day Alert: Lace Tempest Exploits SysAid IT Support Software Vulnerability
The threat actor known as Lace Tempest has been linked to the exploitation of a zero-day flaw in Sy...
2023-11-10 00:54:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
sysaid
ransomware
software
malicious
powershell
New Malvertising Campaign Uses Fake Windows News Portal to Distribute Malicious Installers
Endpoint Security / MalwareA new malvertising campaign has been found to employ fake sites that ma...
2023-11-9 21:26:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
malicious
esentire
software
wiki
When Email Security Meets SaaS Security: Uncovering Risky Auto-Forwarding Rules
Email Security / SaaS SecurityWhile intended for convenience and efficient communication, email au...
2023-11-9 18:54:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
security
forwarding
wing
shadow
malicious
MuddyC2Go: New C2 Framework Iranian Hackers Using Against Israel
Iranian nation-state actors have been observed using a previously undocumented command-and-control...
2023-11-9 18:50:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
powershell
muddywater
c2
remote
kenin
CISA Alerts: High-Severity SLP Vulnerability Now Under Active Exploitation
Cyber Attack / VulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on We...
2023-11-9 13:33:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
slp
exploited
network
bitsight
Researchers Uncover Undetectable Crypto Mining Technique on Azure Automation
Cloud Security / CryptocurrencyCybersecurity researchers have developed what's the first fully und...
2023-11-8 22:19:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
microsoft
cloud
gamrian
miner
safebreach
WhatsApp Introduces New Privacy Feature to Protect IP Address in Calls
Meta-owned WhatsApp is officially rolling out a new privacy feature in its messaging service called...
2023-11-8 21:57:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
recipient
relaying
parties
relayed
Beware, Developers: BlazeStealer Malware Discovered in Python Packages on PyPI
Supply Chain / Software SecurityA new set of malicious Python packages has slithered their way to...
2023-11-8 20:57:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
gelb
python
developers
security
Guide: How vCISOs, MSPs and MSSPs Can Keep their Customers Safe from Gen AI Risks
Artificial Intelligence / CybersecurityDownload the free guide, "It's a Generative AI World: How v...
2023-11-8 19:0:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
generative
msps
mssps
vcisos
security
Webinar: Kickstarting Your SaaS Security Strategy & Program
SaaS applications make up 70% of total company software usage, and as businesses increase their rel...
2023-11-8 17:18:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
webinar
reliance
informative
Experts Expose Farnetwork's Ransomware-as-a-Service Business Model
Cyber Threat / Endpoint SecurityCybersecurity researchers have unmasked a prolific threat actor kn...
2023-11-8 16:0:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
ransomware
farnetwork
nokoyawa
affiliates
ib
N. Korean BlueNoroff Blamed for Hacking macOS Machines with ObjCShellz Malware
Endpoint Security / MalwareThe North Korea-linked nation-state group called BlueNoroff has been at...
2023-11-7 21:58:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
security
bluenoroff
saljooki
stage
payload
New GootLoader Malware Variant Evades Detection and Spreads Rapidly
Endpoint Security / MalwareA new variant of the GootLoader malware called GootBot has been found t...
2023-11-7 20:28:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
gootbot
gootloader
powershell
c2
attackers
Confidence in File Upload Security is Alarmingly Low. Why?
Web Security / Cyber Threat Numerous industries—including technology, financial services, energy, h...
2023-11-7 19:56:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
cloud
opswat
cdr
malicious
Offensive and Defensive AI: Let’s Chat(GPT) About It
Artificial Intelligence / Data SecurityChatGPT: Productivity tool, great for writing poems, and… a...
2023-11-7 18:21:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
chatgpt
security
identify
prompted
SideCopy Exploiting WinRAR Flaw in Attacks Targeting Indian Government Entities
The Pakistan-linked threat actor known as SideCopy has been observed leveraging the recent WinRAR s...
2023-11-7 16:59:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
sidecopy
ares
indian
seqrite
apt36
Experts Warn of Ransomware Hackers Exploiting Atlassian and Apache Flaws
Multiple ransomware groups have begun to actively exploit recently disclosed flaws in Atlassian Con...
2023-11-7 15:14:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
ransomware
remote
atlassian
firm
Previous
96
97
98
99
100
101
102
103
Next