unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
5 Techniques for Collecting Cyber Threat Intelligence
To defend your organization against cyber threats, you need a clear picture of the current threat l...
2024-10-16 17:28:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
threats
ttps
indicator
suricata
Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack
Cyber Attack / Banking TrojanA new spear-phishing campaign targeting Brazil has been found deliver...
2024-10-16 15:20:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
tax
phishing
income
impersonate
security
GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access
Enterprise Security / VulnerabilityGitHub has released security updates for Enterprise Server (GHE...
2024-10-16 13:6:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
github
security
ghes
attacker
improper
CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability
Vulnerability / Data ProtectionThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on...
2024-10-16 12:54:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
desk
security
software
kev
exploited
TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns
Mobile Security / Financial FraudNew variants of an Android banking trojan called TrickMo have bee...
2024-10-15 23:47:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
security
trickmo
analysis
trojan
yaswant
New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT
Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader nam...
2024-10-15 23:20:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
darkvision
purecrypter
loader
remote
keylogging
New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists
North Korean threat actors have been observed using a Linux variant of a known malware family calle...
2024-10-15 22:43:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
fastcash
funds
withdrawn
atms
security
The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short
In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a cr...
2024-10-15 19:0:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
ndr
network
security
threats
c2
China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns
China's National Computer Virus Emergency Response Center (CVERC) has doubled down on claims that t...
2024-10-15 16:3:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
typhoon
volt
cverc
weapon
Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates
Threat Detection / MalwareCybersecurity researchers have disclosed a new malware campaign that del...
2024-10-15 14:43:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
powershell
loader
xworm
windows
malicious
WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites
The maintainers of the Jetpack WordPress plugin have released a security update to remediate a crit...
2024-10-15 12:56:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
wordpress
jetpack
security
mullenweg
wp
Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration
Network Security / VulnerabilityA suspected nation-state adversary has been observed weaponizing t...
2024-10-14 19:35:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
php
csa
security
gsb
5 Steps to Boost Detection and Response in a Multi-Layered Cloud
Cloud Security / VulnerabilityThe link between detection and response (DR) practices and cloud sec...
2024-10-14 19:9:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
security
cloud
monitoring
workloads
Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems
Cybersecurity researchers have found that entry points could be abused across multiple programming...
2024-10-14 19:8:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
malicious
jacking
developers
security
software
THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 - Oct 13)
Hey there, it's your weekly dose of "what the heck is going on in cybersecurity land" – and trust m...
2024-10-14 18:43:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
windows
malicious
microsoft
Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware
Ransomware / VulnerabilityThreat actors are actively attempting to exploit a now-patched security...
2024-10-14 16:55:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
ransomware
veeam
backup
security
40711
OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf
The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escal...
2024-10-13 17:40:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
microsoft
passwords
exchange
psgfilter
FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation
Cryptocurrency / CybercrimeThe U.S. Department of Justice (DoJ) has announced arrests and charges...
2024-10-12 13:6:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
llc
finance
charged
gotbit
zm
GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks
A new tax-themed malware campaign targeting insurance and finance sectors has been observed leverag...
2024-10-12 01:13:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
github
phishing
malicious
booking
security
How Hybrid Password Attacks Work and How to Defend Against Them
Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative met...
2024-10-11 19:0:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
passwords
security
specops
stronger
Previous
17
18
19
20
21
22
23
24
Next