unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Latest Multi-Stage Attack Scenarios with Real-World Examples
Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid d...
2024-11-27 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
malicious
phishing
stage
analysis
attackers
APT-C-60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor
Malware / Cyber EspionageThe threat actor known as APT-C-60 has been linked to a cyber attack targ...
2024-11-27 19:14:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
spyglace
bitbucket
vhdx
jpcert
statcounter
INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled
Cybercrime / Financial FraudAn INTERPOL-led operation has led to the arrest of 1,006 suspects acro...
2024-11-27 15:20:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
africa
authorities
african
interpol
ransomware
Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign
IoT Security / Network SecurityA threat actor named Matrix has been linked to a widespread distrib...
2024-11-27 13:21:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
cloud
broad
network
Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks
Vulnerability / Website SecurityTwo critical security flaws impacting the Spam protection, Anti-Sp...
2024-11-26 21:23:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
bypass
wordpress
malicious
security
10542
Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats
Pentest / Vulnerability AssessmentWhen CVEs go viral, separating critical vulnerabilities from the...
2024-11-26 19:30:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
cves
trending
intruder
hype
RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks
Vulnerability / CybercrimeThe Russia-aligned threat actor known as RomCom has been linked to the z...
2024-11-26 18:34:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
romcom
victim
microsoft
eset
shellcode
Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries
The China-linked threat actor known as Earth Estries has been observed using a previously undocumen...
2024-11-26 18:19:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
earth
estries
ghostspider
security
CISA Urges Agencies to Patch Critical "Array Networks" Flaw Amid Active Attacks
Vulnerability / Network SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) o...
2024-11-26 13:3:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
exploited
kasha
ag
earth
Google's New Restore Credentials Tool Simplifies App Login After Android Migration
Mobile Security / PrivacyGoogle has introduced a new feature called Restore Credentials to help us...
2024-11-25 22:22:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
backup
cloud
developers
PyPI Python Library "aiocpa" Found Exfiltrating Crypto Keys via Telegram Bot
Software Supply Chain / MalwareThe administrators of the Python Package Index (PyPI) repository ha...
2024-11-25 21:54:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
malicious
library
python
repository
software
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 - Nov 24)
Cybersecurity / Critical UpdatesWe hear terms like "state-sponsored attacks" and "critical vulnera...
2024-11-25 19:30:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
threats
ransomware
Flying Under the Radar - Security Evasion Techniques
Dive into the evolution of phishing and malware evasion techniques and understand how attackers ar...
2024-11-25 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
phishing
attackers
security
defenders
microsoft
Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks
Cloud Security / Supply Chain AttackCybersecurity researchers have disclosed two new attack techni...
2024-11-25 19:24:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
opa
malicious
cloud
attacker
tenable
Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections
Malware / Windows SecurityCybersecurity researchers have uncovered a new malicious campaign that l...
2024-11-25 17:16:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
processes
terminate
byovd
drops
Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites
Cloud Security / Threat IntelligenceGovernment agencies and non-governmental organizations in the...
2024-11-23 20:10:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
2077
newswire
microsoft
glassbridge
inauthentic
North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn
Artificial Intelligence / CryptocurrencyThe North Korea-linked threat actor known as Sapphire Slee...
2024-11-23 19:53:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
north
korea
sapphire
sleet
microsoft
APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware
The threat actor known as Mysterious Elephant has been observed using an advanced version of malwar...
2024-11-23 00:59:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
asyncshell
elephant
knownsec
mysterious
c2
China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign
Cyber Espionage / MalwareA China-linked nation-state group called TAG-112 compromised Tibetan medi...
2024-11-23 00:47:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
tibetan
security
cobalt
malicious
espionage
Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia
Cyber Espionage / MalwareThreat actors with ties to Russia have been linked to a cyber espionage c...
2024-11-22 20:6:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
russia
ukraine
cherryspy
hatvibe
espionage
Previous
7
8
9
10
11
12
13
14
Next