unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Malvertising Campaign Hijacks Facebook Accounts to Spread SYS01stealer Malware
Cybersecurity researchers have uncovered an ongoing malvertising campaign that abuses Meta's advert...
2024-10-30 21:0:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
facebook
eventbrite
phishing
malicious
stealer
Researchers Uncover Python Package Targeting Crypto Wallets with Malicious Code
Cybercrim / CryptocurrencyCybersecurity researchers have discovered a new malicious Python package...
2024-10-30 19:0:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
malicious
github
repository
checkmarx
meme
Embarking on a Compliance Journey? Here’s How Intruder Can Help
Vulnerability / ComplianceNavigating the complexities of compliance frameworks like ISO 27001, S...
2024-10-30 18:30:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
intruder
security
hipaa
27001
Researchers Uncover Vulnerabilities in Open-Source AI and ML Models
AI Security / VulnerabilityA little over three dozen security vulnerabilities have been disclosed...
2024-10-29 21:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
attacker
lunary
malicious
A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation
Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he remo...
2024-10-29 19:0:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
exposure
security
exposures
holmes
Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus
The Dutch National Police, along with international partners, have announced the disruption of the...
2024-10-29 18:59:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
redline
metastealer
stealers
stealer
magnus
U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing
Digital Security / Data PrivacyThe U.S. government (USG) has issued new guidance governing the use...
2024-10-29 15:36:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
tlp
amber
markings
New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors
Hardware Security / VulnerabilityMore than six years after the Spectre security flaw impacting mod...
2024-10-29 13:53:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
rowhammer
ibpb
barrier
processors
security
Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services
Cloud Security / Cyber AttackA government entity and a religious organization in Taiwan were the...
2024-10-29 01:26:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
cloudscout
mgbot
evasive
panda
security
Russian Espionage Group Targets Ukrainian Military with Malware via Telegram
Cyber Espionage / AndroidA suspected Russian hybrid espionage and influence operation has been obs...
2024-10-28 22:2:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
civil
ukrainian
military
sunspinner
windows
BeaverTail Malware Resurfaces in Malicious npm Packages Targeting Developers
Malware / Threat IntelligenceThree malicious packages published to the npm registry in September 2...
2024-10-28 21:51:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
malicious
contagious
etherscan
beavertail
backdoored
THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 - Oct 27)
Cyber Security / Hacking NewsCybersecurity news can sometimes feel like a never-ending horror mov...
2024-10-28 19:29:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
cloud
crowdstrike
malicious
Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials
Cybersecurity researchers have warned of a spike in phishing pages created using a website builder...
2024-10-28 19:10:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
phishing
microsoft
webflow
sway
Sailing the Seven Seas Securely from Port to Port – OT Access Security for Ships and Cranes
Operational Technology / CybersecurityOperational Technology (OT) security has affected marine ves...
2024-10-28 19:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
remote
ships
cranes
privx
Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel
Vulnerability / Windows SecurityA new attack technique could be used to bypass Microsoft's Driver...
2024-10-28 13:29:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
security
windows
downgrade
bypass
microsoft
Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining
Cloud Security / CryptocurrencyThe infamous cryptojacking group known as TeamTNT appears to be rea...
2024-10-26 17:6:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
teamtnt
morag
cloud
security
malicious
Four REvil Ransomware Members Sentenced in Rare Russian Cybercrime Convictions
Four members of the now-defunct REvil ransomware operation have been sentenced to several years in...
2024-10-26 16:34:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
puzyrevsky
khansvyarov
sentenced
russia
ransomware
CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities
Cyber Attack / Threat IntelligenceThe Computer Emergency Response Team of Ukraine (CERT-UA) has de...
2024-10-26 12:6:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
cloud
ukraine
remote
apt29
malicious
Researchers Discover Command Injection Flaw in Wi-Fi Alliance's Test Suite
Vulnerability / Wi-Fi SecurityA security flaw impacting the Wi-Fi Test Suite could enable unauthen...
2024-10-25 21:41:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
alliance
attacker
privileges
security
network
Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security
Cloud Security / Artificial IntelligenceApple has publicly made available its Private Cloud Comput...
2024-10-25 20:25:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
pcc
security
cloud
backdoors
malicious
Previous
15
16
17
18
19
20
21
22
Next