unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks
Ransomware / Incident ResponseThe Microsoft Threat Intelligence team said it has observed a threat...
2024-5-16 11:16:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
ransomware
assist
basta
microsoft
1811
Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability
Browser Security / VulnerabilityGoogle has rolled out fixes to address a set of nine security issu...
2024-5-16 11:1:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
chrome
pwn2own
4947
confusion
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Data Breach / Cyber CrimeLaw enforcement agencies have officially seized control of the notorious...
2024-5-16 01:52:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
baphomet
pompompurin
seizure
Google Launches AI-Powered Theft and Data Protection Features for Android Devices
Privacy / Data ProtectionGoogle has announced a slew of privacy and security features in Android,...
2024-5-16 01:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
frey
giant
miscreant
slew
Android 15 Rolls Out Advanced Features to Protect Users from Scams and Malicious Apps
Android Security / MalwareGoogle is unveiling a set of new features in Android 15 to prevent malic...
2024-5-16 01:0:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
malicious
sideloaded
developers
Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions
Cyber Espionage / Threat IntelligenceAn unnamed European Ministry of Foreign Affairs (MFA) and its...
2024-5-15 20:29:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
lunarmail
turla
lunarweb
jurčacko
espionage
(Cyber) Risk = Probability of Occurrence x Damage
Here's How to Enhance Your Cyber Resilience with CVSSIn late 2023, the Common Vulnerability Scori...
2024-5-15 19:38:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
ndr
network
security
threats
Ebury Botnet Malware Compromises 400,000 Linux Servers Over Past 14 Years
A malware botnet called Ebury is estimated to have compromised 400,000 Linux servers since 2009, ou...
2024-5-15 18:56:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
ebury
eset
redirection
senakh
It's Time to Master the Lift & Shift: Migrating from VMware vSphere to Microsoft Azure
Enterprise Security / Cloud ComputingWhile cloud adoption has been top of mind for many IT profess...
2024-5-15 18:55:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
migration
zerto
cloud
microsoft
vsphere
Dutch Court Sentences Tornado Cash Co-Founder to 5 Years in Prison for Money Laundering
Cryptocurrency / AnonymityA Dutch court on Tuesday sentenced one of the co-founders of the now-san...
2024-5-15 16:28:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
tornado
court
laundering
defendant
conspiracy
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
Patch Tuesday / VulnerabilityMicrosoft has addressed a total of 61 new security flaws in its softw...
2024-5-15 15:17:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
windows
security
exploited
microsoft
VMware Patches Severe Security Flaws in Workstation and Fusion Products
Bluetooth / VulnerabilityMultiple security flaws have been disclosed in VMware Workstation and Fus...
2024-5-14 23:49:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
machine
exploited
malicious
privileges
fusion
New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation
Google on Monday shipped emergency fixes to address a new zero-day flaw in the Chrome web browser t...
2024-5-14 21:51:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
exploited
4761
4671
6367
chrome
Critical Flaws in Cacti Framework Could Let Attackers Execute Malicious Code
Network Monitoring / VulnerabilityThe maintainers of the Cacti open-source network monitoring and...
2024-5-14 19:17:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
injection
cacti
php
remote
addressed
6 Mistakes Organizations Make When Deploying Advanced Authentication
Cyber Threat / Machine LearningDeploying advanced authentication measures is key to helping organi...
2024-5-14 18:51:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
crucial
threats
leverages
Ongoing Campaign Bombards Enterprises with Spam Emails and Phone Calls
Cybersecurity researchers have uncovered an ongoing social engineering campaign that bombards enter...
2024-5-14 18:44:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
ransomware
lockbit
remote
mallox
rapid7
Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices
Location Tracking / PrivacyApple and Google on Monday officially announced the rollout of a new fe...
2024-5-14 13:16:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
inch
airtags
trackers
ventura
23296
MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices
The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D fo...
2024-5-13 22:29:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
threats
security
emb3d
reduced
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Browser Security / Data ProtectionWith the browser becoming the most prevalent workspace in the en...
2024-5-13 20:6:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
security
threats
phishing
leaders
SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike
Threat Detection / SoC / SIEMIn the last decade, there has been a growing disconnect between front...
2024-5-13 18:19:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
securityhq
positives
shq
security
triage
Previous
54
55
56
57
58
59
60
61
Next