unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Meta's 'Pay or Consent' Approach Faces E.U. Competition Rules Scrutiny
Digital Regulation / Tech NewsMeta's decision to offer an ad-free subscription in the European Uni...
2024-7-2 13:10:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
advertising
commission
european
faced
Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware
Cyber Espionage / VulnerabilityA China-nexus cyber espionage group named Velvet Ant has been obser...
2024-7-2 12:48:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
switches
nexus
appliances
velvet
ant
Australian Man Charged for Fake Wi-Fi Scam on Domestic Flights
Data Theft / Wi-Fi SecurityAn Australian man has been charged with running a fake Wi-Fi access poi...
2024-7-2 12:29:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
network
charged
domestic
afp
flight
Critical Flaws in CocoaPods Expose iOS and macOS Apps to Supply Chain Attacks
Supply Chain / Software SecurityA trio of security flaws has been uncovered in the CocoaPods depen...
2024-7-2 00:12:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
cocoapods
security
pods
attacker
unclaimed
CapraRAT Spyware Disguised as Popular Apps Threatens Android Users
Mobile Security / SpywareThe threat actor known as Transparent Tribe has continued to unleash malw...
2024-7-1 21:0:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
snowblind
spyware
caprarat
delamotte
Indian Software Firm's Products Hacked to Spread Data-Stealing Malware
Supply Chain Attack / Threat IntelligenceInstallers for three different software products develope...
2024-7-1 20:44:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
installers
download
malicious
rapid7
End-to-End Secrets Security: Making a Plan to Secure Your Machine Identities
At the heart of every application are secrets. Credentials that allow human-to-machine and machine-...
2024-7-1 18:51:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
developers
machine
identities
security
processes
New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems
OpenSSH maintainers have released security updates to contain a critical security flaw that could r...
2024-7-1 18:50:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
openssh
security
sshd
remote
privileges
Juniper Networks Releases Critical Security Update for Routers
Vulnerability / Network SecurityJuniper Networks has released out-of-band security updates to addr...
2024-7-1 14:25:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
routers
security
conductor
assurance
Google to Block Entrust Certificates in Chrome Starting November 2024
Cybersecurity / Website SecurityGoogle has announced that it's going to start blocking websites th...
2024-6-29 22:44:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
chrome
entrust
security
urged
Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data
Cyber Espionage / Cyber AttackThe North Korea-linked threat actor known as Kimsuky has been linked...
2024-6-29 00:19:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
korean
security
translatext
north
espionage
GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others
Software Security / DevOpsGitLab has released security updates to address 14 security flaws, inclu...
2024-6-28 22:18:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
gitlab
security
pipelines
malicious
8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining
Security researchers have shed more light on the cryptocurrency mining operation conducted by the 8...
2024-6-28 19:59:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
weblogic
security
loader
miner
development
Combatting the Evolving SaaS Kill Chain: How to Stay Ahead of Threat Actors
The modern kill chain is eluding enterprises because they aren't protecting the infrastructure of m...
2024-6-28 19:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
machine
appomni
identities
scattered
New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities
Network Security / Data ProtectionA group of security researchers from the Graz University of Tech...
2024-6-28 17:59:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
network
victim
security
infer
attacker
Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment
Industrial Security / Critical InfrastructureMultiple security flaws have been disclosed in Emerso...
2024-6-28 15:52:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
network
security
bypass
TeamViewer Detects Security Breach in Corporate IT Environment
Data Breach / Enterprise SecurityTeamViewer on Thursday disclosed it detected an "irregularity" in...
2024-6-28 13:22:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
teamviewer
microsoft
security
apt29
remote
Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured Redis ser...
2024-6-27 22:31:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
ransomware
miner
p2pinfect
security
network
The Secrets of Hidden AI Training on Your Data
While some SaaS threats are clear and visible, others are hidden in plain sight, both posing signif...
2024-6-27 19:40:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
ensuring
wing
regulations
How to Use Python to Build Secure Blockchain Applications
Did you know it's now possible to build blockchain applications, known also as decentralized applic...
2024-6-27 17:30:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
blockchain
python
algokit
development
algorand
Previous
43
44
45
46
47
48
49
50
Next