unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks
Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an...
2024-11-12 14:0:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
ransomware
remote
attackers
ymir
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)
Cybersecurity / Hacking News⚠️ Imagine this: the very tools you trust to protect you online—your...
2024-11-11 19:57:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
windows
microsoft
New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia
In an unusually specific campaign, users searching about the legality of Bengal Cats in Australia a...
2024-11-11 19:55:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
gootloader
bengal
australia
download
cats
The ROI of Security Investments: How Cybersecurity Leaders Prove It
Cyber threats are intensifying, and cybersecurity has become critical to business operations. As se...
2024-11-11 19:30:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
pentera
teaming
dtcc
shawn
Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation
Machine Learning / VulnerabilityCybersecurity researchers have uncovered nearly two dozen security...
2024-11-11 18:11:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
attacker
mage
privileges
mlops
HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities
Vulnerability / Risk MitigationHewlett Packard Enterprise (HPE) has released security updates to a...
2024-11-11 17:57:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
aos
instant
remote
security
Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware
Vulnerability / Network SecurityCybersecurity researchers have discovered a new phishing campaign...
2024-11-11 14:13:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
remcos
phishing
malicious
docusign
security
Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns
Vulnerability / Network SecurityPalo Alto Networks on Friday issued an informational advisory ur...
2024-11-9 14:12:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
palo
alto
network
exploited
Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering
Cryptocurrency / CybercrimeThe 36-year-old founder of the Bitcoin Fog cryptocurrency mixer has bee...
2024-11-9 13:42:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
doj
fog
sentenced
sterlingov
proceeds
AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services
IoT Security / VulnerabilityThe threat actors behind the AndroxGh0st malware are now exploiting a...
2024-11-8 22:2:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
androxgh0st
dasan
injection
gpon
IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools
Cyber Espionage / Threat IntelligenceHigh-profile entities in India have become the target of mali...
2024-11-8 20:23:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
elizarat
indian
tribe
india
Malicious NPM Packages Target Roblox Users with Data-Stealing Malware
A new campaign has targeted the npm package repository with malicious JavaScript libraries that are...
2024-11-8 19:53:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
malicious
developers
rolimons
security
noblox
The vCISO Academy: Transforming MSPs and MSSPs into Cybersecurity Powerhouses
Cyber Resilience / ComplianceWe've all heard a million times: growing demand for robust cybersecur...
2024-11-8 19:0:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
vciso
academy
mssps
msps
Webinar: Learn How Storytelling Can Make Cybersecurity Training Fun and Effective
Cybersecurity Awareness / WebinarLet's face it—traditional security training can feel as thrilling...
2024-11-8 17:39:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
huntress
sat
New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus
Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a L...
2024-11-8 15:15:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
remote
powershell
malicious
phishing
chisel
CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability
Vulnerability / Network SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) o...
2024-11-8 13:17:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
expedition
palo
alto
cyberpanel
North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS
A threat actor with ties to the Democratic People's Republic of Korea (DPRK) has been observed targ...
2024-11-7 20:40:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
korean
north
contagious
remote
attributed
A Hacker's Guide to Password Cracking
Password Security / Network SecurityDefending your organization's security is like fortifying a ca...
2024-11-7 20:0:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
passwords
security
passphrases
enforce
letters
5 Most Common Malware Techniques in 2024
Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlik...
2024-11-7 17:48:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
malicious
windows
analysis
powershell
attackers
SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims
An ongoing phishing campaign is employing copyright infringement-related themes to trick victims in...
2024-11-7 17:42:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
stealer
steelfox
phishing
miner
Previous
11
12
13
14
15
16
17
18
Next