unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Apache warns of critical flaws in MINA, HugeGraph, Traffic Control
The Apache Software Foundation has released security updates to address three severe problem...
2024-12-26 18:30:21 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
hugegraph
software
mina
network
New 'OtterCookie' malware used to backdoor devs in fake job offers
North Korean threat actors are using new malware called OtterCookie in the Contagious Interv...
2024-12-26 17:0:19 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
ottercookie
contagious
ntt
japan
developers
Windows 11 installation media bug causes security update failures
Microsoft is warning of an issue when using a media support to install Windows 11, version 2...
2024-12-26 15:45:16 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
windows
security
24h2
microsoft
hardware
Five lesser known Task Manager features in Windows 11
Windows 11 is far from perfect, but it does make Task Manager significantly better.It's mo...
2024-12-25 16:0:19 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
windows
processes
crash
favourite
freeing
New botnet exploits vulnerabilities in NVRs, TP-Link routers
A new Mirai-based botnetis actively exploiting a remote code execution vulnerability that ha...
2024-12-24 20:15:17 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
akamai
digiever
routers
remote
nvrs
European Space Agency's official store hacked to steal payment cards
European Space Agency's official web shop was hacked as it started to load a piece of JavaSc...
2024-12-24 17:15:16 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
esa
stripe
sansec
malicious
shop
Clop ransomware is now extorting 66 Cleo data-theft victims
The Clop ransomware gang started to extort victims of its Cleo data theft attacks and announ...
2024-12-24 15:0:20 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
clop
cleo
ransomware
lexicom
FBI links North Korean hackers to $308 million crypto heist
The North Korean hacker group ‘TraderTraitor’ stole $308 million worth of cryptocurrency in...
2024-12-24 14:15:16 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
ginco
dmm
github
blockchain
Clop ransomware threatens 66 Cleo attack victims with data leak
The Clop ransomware gang started to extort victims of its Cleo data theft attacks and announ...
2024-12-24 13:15:19 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
clop
cleo
ransomware
exploited
Adobe warns of critical ColdFusion bug with PoC exploit code
Adobe has released out-of-band security updates to address a critical ColdFusion vulnerabili...
2024-12-23 20:0:18 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
coldfusion
security
exploited
53961
FTC orders Marriott and Starwood to implement strict data security
The Federal Trade Commission (FTC) has ordered Marriott International and Starwood Hotels to...
2024-12-23 18:45:17 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
marriott
security
starwood
ftc
ordered
Premium WPLMS WordPress plugins address seven critical flaws
Two WordPress plugins required by the premium WordPress WPLMS theme, which has over 28,000 s...
2024-12-23 17:0:20 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
wplms
patchstack
attackers
privileges
US court finds spyware maker NSO liable for WhatsApp hacks
A U.S. federal judge has ruled that Israeli spyware maker NSO Group violated U.S. hacking la...
2024-12-23 16:45:15 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
spyware
filed
lawsuit
journalists
officials
Apache fixes remote code execution bypass in Tomcat web server
Apache has released a security update that addresses an important vulnerability in Tomcat we...
2024-12-23 12:45:17 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
security
remote
56337
incomplete
New FlowerStorm Microsoft phishing service fills void left by Rockstar2FA
A new Microsoft 365 phishing-as-a-service platform called "FlowerStorm" is growing in popula...
2024-12-23 12:30:23 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
rockstar2fa
flowerstorm
sophos
phishing
microsoft
North Korean hackers stole $1.3 billion worth of crypto this year
North Korean hackers have stolen $1.34 billion worth of cryptocurrency across 47 cyberattack...
2024-12-23 12:30:22 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
north
chainalysis
korean
security
dmm
Microsoft fixes bug behind random Office 365 deactivation errors
Microsoft has rolled out a fix for a known issue that causes random "Product Deactivated" e...
2024-12-23 12:30:21 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
microsoft
deactivated
e3
prompted
Sophos discloses critical Firewall remote code execution flaw
Sophos has addressed three vulnerabilities in its Sophos Firewall product that could allow r...
2024-12-21 02:30:21 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
v19
v20
ga
mr2
mr1
Google Chrome uses AI to analyze pages in new scam detection feature
Google is using artificial intelligence to power a new Chrome scam protection feature that a...
2024-12-21 02:30:20 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
chrome
enhanced
artificial
llm
unclear
Google says new scam protection feature in Chrome uses AI
Google is planning to use "AI" in Chrome to detect scams when you browse random web pages....
2024-12-20 21:45:17 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
chrome
enhanced
llm
interacting
urgency
Previous
-1
0
1
2
3
4
5
6
Next