unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
New Research Warns About Weak Offboarding Management and Insider Risks
A recent study by Wing Security found that 63% of businesses may have former employees with access...
2024-5-29 19:31:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
offboarding
security
insider
processes
Microsoft Uncovers 'Moonstone Sleet' — New North Korean Hacker Group
A never-before-seen North Korean threat actor codenamed Moonstone Sleet has been attributed as behi...
2024-5-29 18:35:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
sleet
moonstone
north
malicious
korean
BreachForums Returns Just Weeks After FBI Seizure - Honeypot or Blunder?
Cyber Crime / Data BreachThe online criminal bazaar BreachForums has been resurrected merely two w...
2024-5-29 15:11:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
baphomet
seized
dismantled
Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme
An Indian national has pleaded guilty in the U.S. over charges of stealing more than $37 million by...
2024-5-28 20:50:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
coinbase
north
remote
fraudsters
vong
4-Step Approach to Mapping and Securing Your Organization's Most Critical Assets
You're probably familiar with the term "critical assets".These are the technology assets within yo...
2024-5-28 19:12:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
processes
security
asset
matters
xm
Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique
The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in...
2024-5-28 18:15:0 | 阅读: 21 |
收藏
|
The Hacker News - thehackernews.com
catddos
dnsbomb
c2
emerged
xlab
WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites
Data Protection / SkimmingUnknown threat actors are abusing lesser-known code snippet plugins for...
2024-5-28 14:30:0 | 阅读: 23 |
收藏
|
The Hacker News - thehackernews.com
wordpress
malicious
php
billing
skimming
TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks
Vulnerability / Network SecurityA maximum-severity security flaw has been disclosed in the TP-Link...
2024-5-28 13:11:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
remote
network
onekey
security
restriction
Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud
Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that's behind...
2024-5-27 20:12:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
cloud
0539
phishing
bypass
microsoft
Report: The Dark Side of Phishing Protection
Email Security / Browser SecurityThe transition to the cloud, poor password hygiene and the evolut...
2024-5-27 19:46:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
phishing
security
malicious
inbox
gap
New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI
Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve...
2024-5-27 17:2:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
phishing
victim
attacker
malicious
microsoft
Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets
The Pakistan-nexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian...
2024-5-27 14:31:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
tribe
indian
python
blackberry
globshell
Experts Find Flaw in Replicate AI Service Exposing Customers' Models and Data
Machine Learning / Data BreachCybersecurity researchers have discovered a critical security flaw i...
2024-5-25 17:11:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
replicate
malicious
security
rogue
wiz
Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack
Endpoint Security / Threat IntelligenceThe MITRE Corporation has revealed that the cyber attack ta...
2024-5-25 00:30:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
vms
rogue
vcenter
shells
security
Fake Antivirus Websites Deliver Malware to Android and Windows Devices
Malvertising / Endpoint SecurityThreat actors have been observed making use of fake websites masqu...
2024-5-24 20:50:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
stealer
stealers
security
trellix
How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar
Don't be fooled into thinking that cyber threats are only a problem for large organizations. The tr...
2024-5-24 19:49:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
threats
webinar
ransomware
DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?
IntroductionThe infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain at...
2024-5-24 18:35:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
cisos
ciso
mdr
development
Google Detects 4th Chrome Zero-Day in May Actively Under Attack - Update ASAP
Vulnerability / Browser SecurityGoogle on Thursday rolled out fixes to address a high-severity sec...
2024-5-24 18:10:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
confusion
chrome
4947
security
Courtroom Software Backdoored to Deliver RustDoor Malware in Supply Chain Attack
Supply Chain Attack / MalwareMalicious actors have backdoored the installer associated with courtr...
2024-5-24 17:48:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
javs
software
windows
rustdoor
fffmpeg
Japanese Experts Warn of BLOODALCHEMY Malware Targeting Government Agencies
APT Malware / Cyber EspionageCybersecurity researchers have discovered that the malware known as B...
2024-5-24 17:13:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
shadowpad
deed
shellcode
espionage
Previous
51
52
53
54
55
56
57
58
Next