unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Cybersecurity breaches can be devastating for both individuals and businesses alike. While many peo...
2024-4-23 18:22:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
threats
security
cyberattack
German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies
Counterintelligence / National SecurityGerman authorities said they have issued arrest warrants ag...
2024-4-23 18:16:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
german
arrest
germany
defendants
U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse
Spyware / Cyber EspionageThe U.S. Department of State on Monday said it's taking steps to impose v...
2024-4-23 14:43:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
spyware
visa
journalists
intellexa
development
Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware
National Security Agency / Threat IntelligenceThe Russia-linked nation-state threat actor tracked...
2024-4-23 12:23:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
gooseegg
powershell
blizzard
forest
microsoft
Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft
Network Security / Endpoint SecurityThe threat actor known as ToddyCat has been observed using a w...
2024-4-22 23:11:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
attackers
microsoft
reverse
toddycat
Pentera's 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have...
2024-4-22 19:30:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
cisos
cloud
importance
MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws
Network Security / CybersecurityThe MITRE Corporation revealed that it was the target of a nation-...
2024-4-22 19:5:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
network
exploited
security
nerve
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Between crossovers - Do threat actors play dirty or desperate? In our dataset of over 11,000 victi...
2024-4-22 18:22:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
victim
cy
extortion
security
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Rootkit / Software SecurityNew research has found that the DOS-to-NT path conversion process could...
2024-4-22 17:22:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
microsoft
software
windows
conversion
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
Cryptocurrency / Artificial IntelligenceMicrosoft has revealed that North Korea-linked state-spons...
2024-4-22 15:12:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
north
sleet
firm
windows
korean
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
A new information stealer has been found leveraging Lua bytecode for added stealth and sophisticati...
2024-4-21 16:42:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
stealer
redline
mcafee
microsoft
bytecode
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Vulnerability / Network SecurityPalo Alto Networks has shared more details of a critical security...
2024-4-20 13:53:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
pan
attacker
security
3400
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
Vulnerability / Endpoint SecurityUsers of the CrushFTP enterprise file transfer software are being...
2024-4-20 13:18:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
crushftp
crowdstrike
security
v11
politically
BlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Tool
Network Security / Firmware SecurityTechnology, research, and government sectors in the Asia-Pacif...
2024-4-19 21:44:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
waterbear
network
deuterbear
analysis
earth
How Attackers Can Own a Business Without Touching the Endpoint
Attackers are increasingly making use of "networkless" attack techniques targeting cloud apps and i...
2024-4-19 19:8:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
cloud
identities
phishing
security
okta
Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers
Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit...
2024-4-19 19:1:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
ransomware
akira
lockbit
agenda
victim
Hackers Target Middle East Governments with Evasive "CR4T" Backdoor
Cyber Espionage / Threat IntelligenceGovernment entities in the Middle East have been targeted as...
2024-4-19 14:16:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
c2
cr4t
payload
dunequixote
analysis
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
Incident Response / Cyber EspionageSelect Ukrainian government networks have remained infected wit...
2024-4-18 22:25:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
offlrouter
ukraine
svajcer
ctrlpanel
removable
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
The infamous cybercrime syndicate known as FIN7 has been linked to a spear-phishing campaign target...
2024-4-18 21:58:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
fin7
blackberry
phishing
anunak
malicious
Recover from Ransomware in 5 Minutes—We will Teach You How!
read file error: read notes: is a directory...
2024-4-18 19:17:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
zerto
vms
ransomware
failover
rpo
Previous
59
60
61
62
63
64
65
66
Next