unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Hidden Security Gaps in Your SaaS Apps: Are You Doing Due Diligence?
SaaS Security / Threat DetectionSaaS applications have become indispensable for organizations aimi...
2024-8-16 19:27:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
diligence
ddq
emm
gaps
New Banshee Stealer Targets 100+ Browser Extensions on Apple macOS Systems
Malware / Browser SecurityCybersecurity researchers have uncovered new stealer malware that's desi...
2024-8-16 16:28:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
stealer
banshee
passwords
capturing
wallets
Google Pixel Devices Shipped with Vulnerable App, Leaving Millions at Risk
Mobile Security / Software SecurityA large percentage of Google's own Pixel devices shipped global...
2024-8-16 15:10:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
software
security
malicious
verizon
showcase
SolarWinds Releases Patch for Critical Flaw in Web Help Desk Software
Enterprise Security / VulnerabilitySolarWinds has released patches to address a critical security...
2024-8-15 21:19:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
xsoar
alto
desk
cortex
Russian-Linked Hackers Target Eastern European NGOs and Media
Cyber Attack / Social EngineeringRussian and Belarusian non-profit organizations, Russian independ...
2024-8-15 19:43:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
proton
coldwastrel
citizen
coldriver
harvesting
Identity Threat Detection and Response Solution Guide
Identity Security / Threat DetectionThe Emergence of Identity Threat Detection and ResponseIdenti...
2024-8-15 19:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
identities
itdr
monitoring
cloud
malicious
RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks
A cybercrime group with links to the RansomHub ransomware has been observed using a new tool design...
2024-8-15 18:45:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
ransomware
software
ransomhub
privileges
security
GitHub Vulnerability 'ArtiPACKED' Exposes Repositories to Potential Takeover
A newly discovered attack vector in GitHub Actions artifacts dubbed ArtiPACKED could be exploited t...
2024-8-15 14:47:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
artifacts
github
malicious
artifact
cloud
New Cyber Threat Targets Azerbaijan and Israel Diplomats, Stealing Sensitive Data
Cyber Espionage / Data TheftA previously unknown threat actor has been attributed to a spate of at...
2024-8-15 14:45:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
abcsync
abcloader
actor240524
phishing
processes
New Gafgyt Botnet Variant Targets Weak SSH Passwords for GPU Crypto Mining
Network Security / CybercrimeCybersecurity researchers have discovered a new variant of the Gafgyt...
2024-8-15 13:12:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
gafgyt
ssh
security
cloud
passwords
Black Basta-Linked Attackers Target Users with SystemBC Malware
Malware / Network SecurityAn ongoing social engineering campaign with alleged links to the Black B...
2024-8-15 01:13:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
loader
stealer
remote
download
ransomware
Belarusian-Ukrainian Hacker Extradited to U.S. for Ransomware and Cybercrime Charges
A coalition of law enforcement agencies coordinated by the U.K. National Crime Agency (NCA) has led...
2024-8-14 20:2:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
silnikau
wire
conspiracy
ransomware
How to Augment Your Password Security with EASM
Password Security / Cyber SecuritySimply relying on traditional password security measures is no l...
2024-8-14 19:30:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
easm
security
passwords
monitoring
DDoS Attacks Surge 46% in First Half of 2024, Gcore Report Reveals
Monitoring evolving DDoS trends is essential for anticipating threats and adapting defensive strate...
2024-8-14 14:47:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
network
tbps
industries
disruptions
sectors
Microsoft Issues Patches for 90 Flaws, Including 10 Critical Zero-Day Exploits
Windows Security / VulnerabilityMicrosoft on Tuesday shipped fixes to address a total of 90 securi...
2024-8-14 13:48:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
windows
attacker
microsoft
security
elevation
Critical Flaw in Ivanti Virtual Traffic Manager Could Allow Rogue Admin Access
Vulnerability / Network SecurityIvanti has rolled out security updates for a critical flaw in Virt...
2024-8-14 13:18:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
ivanti
itsm
vtm
exploited
China-Backed Earth Baku Expands Cyber Attacks to Europe, Middle East, and Africa
Threat Intelligence / Cyber AttackThe China-backed threat actor known as Earth Baku has diversifie...
2024-8-14 13:1:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
sneakcross
baku
earth
GhostWrite: New T-Head CPU Bugs Expose Devices to Unrestricted Attacks
Vulnerability / Hardware SecurityA team of researchers from the CISPA Helmholtz Center for Informa...
2024-8-13 22:2:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
memory
security
hardware
attacker
ghostwrite
Researchers Uncover Vulnerabilities in AI-Powered Azure Health Bot Service
Healthcare / VulnerabilityCybersecurity researchers have discovered two security flaws in Microsof...
2024-8-13 21:0:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
microsoft
tenable
security
healthcare
exploited
Why Hardsec Matters: From Protecting Critical Services to Enhancing Resilience
Cyber Defense / ComplianceTraditionally, the focus has been on defending against digital threats s...
2024-8-13 18:56:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
hardsec
security
software
defence
hardware
Previous
32
33
34
35
36
37
38
39
Next