unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
Vulnerability / Threat IntelligenceA newly discovered campaign has compromised tens of thousands o...
2025-11-19 13:0:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
asus
routers
taiwan
aicloud
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
read file error: read notes: is a directory...
2025-11-19 11:55:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
ringfencing
security
containment
processes
network
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
Cyber Espionage / MalwareThe threat actor known as PlushDaemon has been observed using a previously...
2025-11-19 10:0:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
software
slowstepper
edgestepper
plushdaemon
eset
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
AI Security / SaaS SecurityMalicious actors can exploit default configurations in ServiceNow's Now...
2025-11-19 09:59:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
agents
assist
injection
llm
security
Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
Vulnerability / Network SecurityFortinet has warned of a new security flaw in FortiWeb that it sai...
2025-11-19 04:20:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
fortiweb
security
defenders
attacker
58034
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have in...
2025-11-18 18:31:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
phishing
security
bitb
attacker
malicious
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
Bug Bounty / Data PrivacyMeta on Tuesday said it has made available a tool called WhatsApp Researc...
2025-11-18 15:56:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
attacker
bounties
malicious
security
gegenhuber
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
Cloud Security / ComplianceYou've probably already moved some of your business to the cloud—or you...
2025-11-18 15:25:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
cloud
spots
webinar
cyberark
security
Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion
Malware / Social EngineeringCybersecurity researchers have disclosed details of a cyber attack tar...
2025-11-18 14:0:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
c2
tuoni
morphisec
powershell
teaming
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
Cyber Espionage / MalwareSuspected espionage-driven threat actors from Iran have been observed dep...
2025-11-18 12:54:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
windows
unc1549
tunneler
phishing
network
Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities
Identity security fabric (ISF) is a unified architectural framework that brings together disparate...
2025-11-18 11:0:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
fabric
governance
identities
agents
Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
Cybersecurity researchers have discovered a set of seven npm packages published by a single threat...
2025-11-18 10:37:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
cloaking
adspect
security
victim
malicious
Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet
Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-o...
2025-11-18 08:17:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
aisuru
microsoft
security
botnets
netscout
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability
Browser Security / VulnerabilityGoogle on Monday released security updates for its Chrome browser...
2025-11-18 04:44:0 | 阅读: 29 |
收藏
|
The Hacker News - thehackernews.com
chrome
confusion
7444
13223
exploited
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT
Cybersecurity researchers have discovered malware campaigns using the now-prevalent ClickFix social...
2025-11-17 16:53:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
amatera
phishing
stealer
powershell
malicious
⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More
Cybersecurity / Hacking NewsThis week showed just how fast things can go wrong when no one's watc...
2025-11-17 12:34:0 | 阅读: 34 |
收藏
|
The Hacker News - thehackernews.com
security
remote
stealer
ransomware
software
5 Reasons Why Attackers Are Phishing Over LinkedIn
Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking...
2025-11-17 11:55:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
phishing
attackers
security
malicious
attacker
Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codena...
2025-11-17 11:20:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
security
gh0st
processes
windows
nsis
Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time
Vulnerability / Mobile SecurityGoogle has disclosed that the company's continued adoption of the R...
2025-11-17 06:2:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
memory
security
overflow
resulted
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against...
2025-11-15 16:35:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
rondodox
vulncheck
24893
fresh
adopting
Previous
5
6
7
8
9
10
11
12
Next