unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Stronger Cloud Security in Five: The Importance of Cloud Configuration Security
多云环境中配置管理不当可能导致安全漏洞、数据泄露及合规风险。文章提出了五项最佳实践:集中自动化管理、实施最小权限访问、自动合规检查、加强Kubernetes安全及分析日志数据,以提升云安全性。...
2025-4-9 13:0:0 | 阅读: 15 |
收藏
|
Tenable Blog - www.tenable.com
cloud
security
kubernetes
cnapp
Microsoft’s April 2025 Patch Tuesday Addresses 121 CVEs (CVE-2025-29824)
微软在4月修复了121个CVE漏洞,包括一个被利用的零日,涉及Windows组件、Office套件及Azure服务等,其中40.5%为权限提升,25.6%为远程代码执行,重点修复了Windows CLFS驱动、远程桌面服务及LDAP相关漏洞,Tenable建议尽快修补并定期扫描环境以确保安全。...
2025-4-8 18:36:40 | 阅读: 157 |
收藏
|
Tenable Blog - www.tenable.com
microsoft
windows
tenable
security
How To Implement Just-In-Time Access: Best Practices and Lessons Learned
Tenable通过JIT访问控制降低风险,按需临时授予权限;使用Tenable Cloud Security连接IAM提供商并配置管理员组;分阶段部署并持续沟通以确保顺利过渡;解决技术与沟通挑战,提升安全与效率。...
2025-4-8 13:0:0 | 阅读: 7 |
收藏
|
Tenable Blog - www.tenable.com
security
cloud
tenable
approvers
requestors
Five Steps to Move to Exposure Management
read file error: read notes: is a directory...
2025-4-7 13:0:0 | 阅读: 7 |
收藏
|
Tenable Blog - www.tenable.com
exposure
security
asset
privileges
Cybersecurity Snapshot: SANS Recommends Six Controls To Secure AI Systems, While NCSC Warns About Outdated API Security Methods
SANS提出六项关键AI安全控制措施;NCSC建议更新API安全实践;CISA警告“快 flux”技术被用于隐藏攻击;专家强调地方及关键基础设施网络安全的重要性。...
2025-4-4 13:0:0 | 阅读: 39 |
收藏
|
Tenable Blog - www.tenable.com
security
flux
tenable
governments
How To Harden GitLab Permissions with Tenable
文章探讨了GitLab权限配置不当可能导致的安全风险,并介绍了Tenable新开发的插件如何帮助检测和修复这些问题。GitLab作为流行的SCM和CI/CD平台,其权限模型涉及项目、组和个人命名空间。过度开放的设置可能暴露源代码和敏感数据。Tenable插件通过检测公开项目和代码片段等潜在风险,帮助企业提升GitLab环境的安全性。...
2025-4-3 14:0:0 | 阅读: 14 |
收藏
|
Tenable Blog - www.tenable.com
gitlab
security
development
tenable
fetched
ImageRunner: A Privilege Escalation Vulnerability Impacting GCP Cloud Run
Tenable Research发现Google Cloud Platform(GCP)中的ImageRunner漏洞,允许拥有特定权限的攻击者滥用Cloud Run服务权限,访问私有容器镜像并提取敏感数据。该漏洞已修复,需确保部署者具有访问镜像的权限。...
2025-4-1 14:0:0 | 阅读: 19 |
收藏
|
Tenable Blog - www.tenable.com
cloud
artifact
ncat
attacker
revision
Cybersecurity Leaders Share Three Challenges Exposure Management Helps Them Solve
Tenable的Exposure Management Academy每周一提供指导,帮助网络安全领导者从传统漏洞管理转向更全面的暴露管理。文章指出,暴露管理解决了三个关键挑战:缺乏攻击面可见性、难以优先处理修复以及停留在被动响应模式。通过整合多环境数据、基于风险的优先级划分和主动安全措施,企业能够更好地应对复杂威胁并提升整体安全性。...
2025-3-31 13:0:0 | 阅读: 7 |
收藏
|
Tenable Blog - www.tenable.com
exposure
security
reactive
Cybersecurity Snapshot: NIST Details Attacks Against AI, Recommends Defenses, While ETSI Issues Quantum-Resistant Crypto Standard
文章概述了五项关键网络安全议题:NIST发布AI系统攻击分类及缓解建议;ETSI推出Covercrypt后量子加密标准;英国NCSC敦促域名注册商加强安全;ENISA建议商业卫星提升网络安全;修复IngressNightmare漏洞以保障Kubernetes集群安全。...
2025-3-28 13:0:0 | 阅读: 24 |
收藏
|
Tenable Blog - www.tenable.com
security
satellites
ncsc
registrars
Who's Afraid of AI Risk in Cloud Environments?
Tenable 2025年云AI风险报告显示,70%的AI云工作负载存在未修复的关键漏洞,且AI服务默认权限设置不安全。敏感数据和过度授权增加了被攻击风险。建议优先修复高危漏洞、减少过度权限,并将AI组件标记为敏感资产以降低风险。...
2025-3-26 13:0:0 | 阅读: 20 |
收藏
|
Tenable Blog - www.tenable.com
cloud
security
tenable
workloads
risky
CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514: Frequently Asked Questions About IngressNightmare
IngressNightmare 是针对 Kubernetes 的 Ingress NGINX Controller 的五个漏洞集合,包括配置注入、代码执行和路径遍历等高危风险。这些漏洞可能被链式利用导致集群接管。Kubernetes 已发布修复版本 1.12.1 和 1.11.5。...
2025-3-25 01:42:28 | 阅读: 174 |
收藏
|
Tenable Blog - www.tenable.com
kubernetes
ingress
tenable
What it Takes to Start the Exposure Management Journey
Tenable从传统漏洞管理转向暴露管理,涉及政策调整、工具整合和项目规划。团队通过自动化和协调应对复杂操作挑战,提升风险可见性和安全效果。...
2025-3-24 13:0:0 | 阅读: 14 |
收藏
|
Tenable Blog - www.tenable.com
exposure
security
tenable
exposures
broader
Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption
文章探讨了云AI安全风险、抗量子密码迁移指南、AI在犯罪中的应用、物联网设备生命周期披露法案、开源软件对欧盟《网络弹性法案》的准备情况以及恶意文件转换工具的威胁。...
2025-3-21 13:0:0 | 阅读: 11 |
收藏
|
Tenable Blog - www.tenable.com
cloud
security
software
migration
cra
Choosing the Right Cloud Security Provider: Five Non-Negotiables for Protecting Your Cloud
文章强调选择与企业需求优先级一致的云安全合作伙伴的重要性,并提出了五个关键考虑因素:独立性、透明度、优先级对齐、可移植性和全面的安全覆盖。...
2025-3-20 15:55:0 | 阅读: 6 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cloud
security
nessus
enjoy
What Is Exposure Management and Why Does It Matter?
文章探讨了从传统漏洞管理向暴露管理转变的重要性。暴露管理通过整合资产、身份和风险关系,提供全面的攻击面视图,并结合业务上下文优先处理关键风险。这种方法帮助组织更高效地应对复杂威胁环境,并为不同层级的安全团队提供统一的视角和行动指南。...
2025-3-17 13:0:0 | 阅读: 8 |
收藏
|
Tenable Blog - www.tenable.com
security
exposure
leaders
exposures
Cybersecurity Snapshot: Medusa Ransomware Impacting Critical Infrastructure, CISA Warns, While NIST Selects New Quantum-Resistant Algorithm
文章概述了六个关键网络安全议题:Medusa勒索软件攻击、抗量子加密算法标准化、Tenable对DeepSeek生成恶意软件能力的研究、开源软件风险管理报告、漏洞优先级调查结果以及CIS基准更新。...
2025-3-14 13:0:0 | 阅读: 19 |
收藏
|
Tenable Blog - www.tenable.com
software
security
tenable
benchmarks
ransomware
DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware
DeepSeek R1 can be utilized to generate code for both keyloggers and ransomware with some manual adjustments. Here's a concise summary: ### Keylogger Development: - **Methodology**: Utilizes `SetWindowsHookEx` for global keystroke capture. - **Stealth Techniques**: Hides the application window using `WS_EX_TOOLWINDOW` and `ShowWindow(g_hwnd, SW_HIDE);`. - **Log File Obfuscation**: Sets file attributes to hidden and system (`FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_SYSTEM`). - **Encryption**: Employs simple XOR encryption for basic obfuscation. ### Ransomware Development: - **Persistence**: Adds registry entry for startup persistence. - **User Interaction**: Displays a ransom message via `MessageBox`. - **File Handling**: Enumerates files using `EnumFileAPI` and encrypts them with AES128-CBC. - **Key Management**: Generates random keys for encryption. ### Challenges: - **Manual Fixes**: Initial code from DeepSeek requires corrections for errors like incorrect API usage. - **Ethical Considerations**: Highlighted legal and ethical implications of developing such tools. In conclusion, while DeepSeek provides foundational code structures for malicious software development, achieving fully functional and stealthy implementations demands significant manual effort and understanding of underlying principles....
2025-3-13 13:0:0 | 阅读: 40 |
收藏
|
Tenable Blog - www.tenable.com
deepseek
ransomware
hhook
pfile
cot
Microsoft’s March 2025 Patch Tuesday Addresses 56 CVEs (CVE-2025-26633, CVE-2025-24983, CVE-2025-24993)
微软在2025年3月的补丁更新中修复了56个安全漏洞,包括7个零日漏洞(其中6个已被野外利用),涉及远程代码执行、权限提升等高风险问题,并影响多个产品组件如Windows、Office及Azure服务等。...
2025-3-11 17:33:45 | 阅读: 145 |
收藏
|
Tenable Blog - www.tenable.com
microsoft
windows
exploited
attacker
Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros
Check out best practices for shoring up data security and reducing cyber risk. Plus, get tips on how...
2025-3-7 14:0:0 | 阅读: 15 |
收藏
|
Tenable Blog - www.tenable.com
security
cloud
tenable
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited
Broadcom披露VMware多款产品存在三个零日漏洞(CVE-2025-22224/22225/22226),涉及堆溢出、任意写入和信息泄露风险。微软威胁情报中心发现这些漏洞被野外利用。VMware已发布补丁修复问题,建议用户尽快更新以防范潜在攻击。...
2025-3-4 20:15:40 | 阅读: 39 |
收藏
|
Tenable Blog - www.tenable.com
tenable
workstation
22224
broadcom
Previous
11
12
13
14
15
16
17
18
Next