unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
LockBit Ransomware and Evil Corp Leaders Arrested and Sanctioned in Joint Global Effort
A new wave of international law enforcement actions has led to four arrests and the takedown of nin...
2024-10-3 15:15:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
lockbit
ryzhenkov
ransomware
sanctions
yakubets
Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch
Vulnerability / Endpoint SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA)...
2024-10-3 14:6:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
ivanti
epm
injection
csa
Fake Trading Apps Target Victims Globally via Apple App Store and Google Play
A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Googl...
2024-10-3 00:54:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
finans
investments
funds
download
phishing
China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration
Cyber Espionage / Cloud SecurityA previously undocumented threat actor called CeranaKeeper has bee...
2024-10-2 23:21:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
toolset
dropbox
abuses
eset
Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals
Cybercrime / Threat IntelligenceA spear-phishing email campaign has been observed targeting recrui...
2024-10-2 23:8:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
eggs
phishing
malicious
fin7
spear
Alert: Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities
Vulnerability / Network SecurityA little over a dozen new security vulnerabilities have been disco...
2024-10-2 21:0:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
overflow
security
draytek
forescout
Alert: Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit
Vulnerability / Data BreachCybersecurity researchers have disclosed that 5% of all Adobe Commerce...
2024-10-2 20:13:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
cosmicsting
magento
remote
encryption
security
5 Must-Have Tools for Effective Dynamic Malware Analysis
Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample...
2024-10-2 19:0:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
analysis
malicious
network
ttps
phishing
Andariel Hacking Group Shifts Focus to Financial Attacks on U.S. Organizations
Three different organizations in the U.S. were targeted in August 2024 by a North Korean state-spon...
2024-10-2 18:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
andariel
north
korean
financially
ransomware
Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw
Email Security / VulnerabilityCybersecurity researchers are warning about active exploitation atte...
2024-10-2 13:56:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
zimbra
postjournal
proofpoint
synacor
PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data
Supply Chain Attack / CryptocurrencyA new set of malicious packages has been unearthed in the Pyth...
2024-10-2 13:31:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
malicious
pypi
wallets
gelb
ccl
AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition
The threat actors behind the Rhadamanthys information stealer have added new advanced features to t...
2024-10-2 00:34:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
stealer
stealers
stealc
lumma
5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage
Generative AI / Data ProtectionSince its emergence, Generative AI has revolutionized enterprise p...
2024-10-1 18:30:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
genai
security
generative
leakage
Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attacks Targeting User Credentials
More than 140,000 phishing websites have been found linked to a phishing-as-a-service (PhaaS) platf...
2024-10-1 14:32:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
phishing
sniper
dz
phaas
download
New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet
Cybersecurity researchers have uncovered a new cryptojacking campaign targeting the Docker Engine A...
2024-10-1 13:12:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
ssh
kubernetes
miner
c2
lateral
U.K. Hacker Charged in $3.75 Million Insider Trading Scheme Using Hacked Executive Emails
Corporate Security / Financial FraudThe U.S. Department of Justice (DoJ) has charged a 39-year-old...
2024-10-1 10:2:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
westbrook
executives
securities
doj
profits
THN Cybersecurity Recap: Last Week's Top Threats and Trends (September 23-29)
Cybersecurity / Weekly RecapHold onto your hats, folks, because the cybersecurity world is anythin...
2024-9-30 21:9:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
firmware
pkfail
Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks
Critical security vulnerabilities have been disclosed in six different Automatic Tank Gauge (ATG) s...
2024-9-30 19:55:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
security
maglink
remote
lx
Session Hijacking 2.0 — The Latest Way That Attackers are Bypassing MFA
Attackers are increasingly turning to session hijacking to get around widespread MFA adoption. The...
2024-9-30 19:20:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
hijacking
attacker
aitm
infostealer
A Hacker's Era: Why Microsoft 365 Protection Reigns Supreme
Imagine a sophisticated cyberattack cripples your organization's most critical productivity and col...
2024-9-30 18:30:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
microsoft
ransomware
backup
security
backupify
Previous
20
21
22
23
24
25
26
27
Next