unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Bogus npm Packages Used to Trick Software Developers into Installing Malware
Malware / Software SecurityAn ongoing social engineering campaign is targeting software developers...
2024-4-27 13:12:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
software
security
malicious
north
developers
Severe Flaws Disclosed in Brocade SANnav SAN Management Software
Supply Chain Attack / Software SecuritySeveral security vulnerabilities disclosed in Brocade SANna...
2024-4-26 22:3:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
sannav
attacker
remote
brocade
coded
10 Critical Endpoint Security Tips You Should Know
In today's digital world, where connectivity is rules all, endpoints serve as the gateway to a busi...
2024-4-26 18:46:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
tips
byod
threats
New 'Brokewell' Android Malware Spread Through Fake Browser Updates
Mobile Security / CybercrimeFake browser updates are being used to push a previously undocumented...
2024-4-26 18:42:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
brokewell
loader
security
trojan
Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack
Network Security / Zero DayPalo Alto Networks has shared remediation guidance for a recently discl...
2024-4-26 18:18:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
hotfix
palo
alto
pan
security
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
Threat Intelligence / Cyber AttackThreat actors are attempting to actively exploit a critical secu...
2024-4-26 13:49:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
wp
attackers
wordpress
27956
security
North Korea's Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job...
2024-4-26 00:47:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
c2
security
stage
kaolin
shellcode
Network Threats: A Step-by-Step Attack Demonstration
Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfil...
2024-4-25 19:13:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
network
attacker
security
attackers
lateral
DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions
Cryptocurrency / CybercrimeThe U.S. Department of Justice (DoJ) on Wednesday announced the arrest...
2024-4-25 18:21:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
samourai
hill
rodriguez
doj
criminal
Google Postpones Third-Party Cookie Deprecation Amid U.K. Regulatory Scrutiny
Google has once again pushed its plans to deprecate third-party tracking cookies in its Chrome web...
2024-4-25 14:37:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
cma
competition
regulators
closely
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom malw...
2024-4-25 13:50:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
security
network
appliance
talos
runner
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Cyber Attack / Cyber EspionageThe U.S. Treasury Department's Office of Foreign Assets Control (OFA...
2024-4-24 21:43:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
harooni
defendants
irgc
masn
nasab
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
Malware / Endpoint SecurityCybersecurity researchers have discovered an ongoing attack campaign th...
2024-4-24 21:36:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
ssload
security
cobalt
remote
phishing
Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users
Encryption / Mobile SecuritySecurity vulnerabilities uncovered in cloud-based pinyin keyboard apps...
2024-4-24 17:36:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
sogou
security
network
keystrokes
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
Cryptocurrency / Threat IntelligenceA new malware campaign has been exploiting the updating mechan...
2024-4-24 15:2:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
guptiminer
windows
korean
escan
network
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
A new ongoing malware campaign has been observed distributing three different stealers, such as Cry...
2024-4-24 12:50:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
network
powershell
shortcut
stealer
payload
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Supply Chain Attack / Application SecurityResearchers have identified a dependency confusion vulne...
2024-4-23 22:0:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
security
cordova
confusion
harness
archived
Webinar: Learn Proactive Supply Chain Threat Hunting Techniques
Threat Hunting / Software SecurityIn the high-stakes world of cybersecurity, the battleground has...
2024-4-23 19:28:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
threats
software
exclusive
defenses
Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases
End-to-End Encryption / PrivacyEuropean Police Chiefs said that the complementary partnership betw...
2024-4-23 18:45:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
encryption
crime
nudity
e2ee
sexual
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Cybersecurity breaches can be devastating for both individuals and businesses alike. While many peo...
2024-4-23 18:22:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
threats
security
cyberattack
Previous
58
59
60
61
62
63
64
65
Next