unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Meta Fined €91 Million for Storing Millions of Facebook and Instagram Passwords in Plaintext
The Irish Data Protection Commission (DPC) has fined Meta €91 million ($101.56 million) as part of...
2024-9-30 14:12:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
passwords
dpc
security
notifying
promptly
Crypto Scam App Disguised as WalletConnect Steals $70K in Five-Month Campaign
Cryptocurrency / Mobile SecurityCybersecurity researchers have discovered a malicious Android app...
2024-9-28 17:54:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
malicious
victim
drainer
attackers
U.S. Charges Three Iranian Nationals for Election Interference and Cybercrimes
Election Security / CybercrimeU.S. federal prosecutors on Friday unsealed criminal charges against...
2024-9-28 14:3:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
election
iran
iranian
irgc
jalili
Progress Software Releases Patches for 6 Flaws in WhatsUp Gold – Patch Now
Software Security / VulnerabilityProgress Software has released another round of updates to addres...
2024-9-27 23:44:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
whatsup
security
gold
software
8785
Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution
A new set of security vulnerabilities has been disclosed in the OpenPrinting Common Unix Printing S...
2024-9-27 20:33:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
cups
malicious
attacker
ipp
How to Plan and Prepare for Penetration Testing
As security technology and threat awareness among organizations improves so do the adversaries who...
2024-9-27 19:26:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
identify
guidelines
network
Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks
The threat actor known as Storm-0501 has targeted government, manufacturing, transportation, and la...
2024-9-27 19:11:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
ransomware
cloud
premises
microsoft
embargo
Cybersecurity Certifications: The Gateway to Career Advancement
Cybersecurity CertificationsIn today's fast-evolving digital landscape, cybersecurity has become a...
2024-9-27 17:4:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
certified
employers
competitive
New HTML Smuggling Campaign Delivers DCRat Malware to Russian-Speaking Users
Russian-speaking users have been targeted as part of a new campaign distributing a commodity trojan...
2024-9-27 17:0:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
payload
malicious
victim
dcrat
genai
U.S. Sanctions Two Crypto Exchanges for Facilitating Cybercrime and Money Laundering
The U.S. government on Thursday sanctioned two cryptocurrency exchanges and unsealed an indictment...
2024-9-27 15:47:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
cryptex
laundering
pm2btc
illicit
uaps
Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers
Container Security / Cloud ComputingA critical security flaw has been disclosed in the NVIDIA Cont...
2024-9-27 13:54:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
nvidia
security
attacker
sockets
privileges
Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates
Automotive Industry / TechnologyCybersecurity researchers have disclosed a set of now patched vuln...
2024-9-27 00:2:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
vehicle
victim
kia
attacker
vin
Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar
Threat Detection / IT SecurityImagine trying to find a needle in a haystack, but the haystack is o...
2024-9-26 20:28:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
haystack
webinar
endless
insider
N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks
Threat actors with ties to North Korea have been observed leveraging two new malware strains dubbed...
2024-9-26 20:28:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
fpspy
klogexe
pisces
sparkling
korea
EPSS vs. CVSS: What’s the Best Approach to Vulnerability Prioritization?
Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vu...
2024-9-26 19:0:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
epss
scores
exploited
Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware
Cyber Espionage / Mobile SecurityAs many as 25 websites linked to the Kurdish minority have been c...
2024-9-26 18:43:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
kurdish
sekoia
rojnews
security
malicious
Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities
Cloud Security / Cyber EspionageAn advanced threat actor with an India nexus has been observed usi...
2024-9-26 14:18:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
ares
harvesting
pakistan
docscanner
Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign
Cyber Espionage / HackingNation-state threat actors backed by Beijing broke into a "handful" of U....
2024-9-26 12:49:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
isps
espionage
typhoon
beijing
Google's Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%
Secure Coding / Mobile SecurityGoogle has revealed that its transition to memory-safe languages su...
2024-9-26 01:0:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
memory
security
development
focusing
Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent
Data Protection / Online TrackingVienna-based privacy non-profit noyb (short for None Of Your Busi...
2024-9-25 22:12:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
ppa
mozilla
noyb
advertisers
preserving
Previous
21
22
23
24
25
26
27
28
Next