unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Urgent: Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws
Apple has released security updates to address several security flaws, including two vulnerabilitie...
2024-3-6 13:54:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
inch
memory
exploited
security
Hackers Exploit ConnectWise ScreenConnect Flaws to Deploy TODDLERSHARK Malware
North Korean threat actors have exploited the recently disclosed security flaws in ConnectWise Scre...
2024-3-6 00:18:0 | 阅读: 35 |
收藏
|
The Hacker News - thehackernews.com
north
korea
babyshark
vb
What is Exposure Management and How Does it Differ from ASM?
Attack Surface / Exposure ManagementStartups and scales-ups are often cloud-first organizations an...
2024-3-5 18:55:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
exposure
cloud
intruder
security
Cybercriminals Using Novel DNS Hijacking Technique for Investment Scams
A new DNS threat actor dubbed Savvy Seahorse is leveraging sophisticated techniques to entice targe...
2024-3-5 18:53:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
cname
savvy
seahorse
investment
infoblox
Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets
Malware / Artificial IntelligenceMore than 225,000 logs containing compromised OpenAI ChatGPT cred...
2024-3-5 18:38:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
stealer
ib
openai
sale
chatgpt
Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes
Email Security / Network SecurityThe threat actor known as TA577 has been observed using ZIP archi...
2024-3-5 18:25:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
ta577
security
proofpoint
network
phishing
Critical JetBrains TeamCity On-Premises Flaws Could Lead to Server Takeovers
Vulnerability / Network Security A new pair of security vulnerabilities have been disclosed in JetB...
2024-3-5 11:34:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
teamcity
attacker
jetbrains
bypass
How Cybercriminals are Exploiting India's UPI for Money Laundering Operations
Cybercrime / Mobile SecurityCybercriminals are using a network of hired money mules in India using...
2024-3-4 21:50:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
mules
xhelper
laundering
agents
upi
From 500 to 5000 Employees - Securing 3rd Party App-Usage in Mid-Market Companies
SaaS Security / Vulnerability AssessmentA company's lifecycle stage, size, and state have a signif...
2024-3-4 19:12:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
security
wing
operational
extent
growth
Over 100 Malicious AI/ML Models Found on Hugging Face Platform
AI Security / VulnerabilityAs many as 100 malicious artificial intelligence (AI)/machine learning...
2024-3-4 17:22:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
security
attacker
malicious
prompts
adversarial
Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure
U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting gov...
2024-3-4 13:24:0 | 阅读: 22 |
收藏
|
The Hacker News - thehackernews.com
ransomware
phobos
windows
cactus
U.S. Court Orders NSO Group to Hand Over Pegasus Spyware Code to WhatsApp
A U.S. judge has ordered NSO Group to hand over its source code for Pegasus and other products to M...
2024-3-2 14:23:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
spyware
predator
alleged
activists
journalists
U.S. Charges Iranian Hacker, Offers $10 Million Reward for Capture
Cybercrime / Social EngineeringThe U.S. Department of Justice (DoJ) on Friday unsealed an indictme...
2024-3-2 12:38:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
nasab
phishing
spear
contractor
firm
New Phishing Kit Leverages SMS, Voice Calls to Target Cryptocurrency Users
Phishing Kit / CryptocurrencyA novel phishing kit has been observed impersonating the login pages...
2024-3-1 21:32:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
phishing
victim
lookout
labhost
attacker
4 Instructive Postmortems on Data Downtime and Loss
More than a decade ago, the concept of the 'blameless' postmortem changed how tech companies recogn...
2024-3-1 19:8:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
gitlab
tarsnap
colin
attacker
consul
New BIFROSE Linux Malware Variant Using Deceptive VMware Domain for Evasion
Cybersecurity researchers have discovered a new Linux variant of a remote access trojan (RAT) calle...
2024-3-1 18:56:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
bifrost
bifrose
deceptive
remote
guloader
Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities
Rootkit / Threat IntelligenceThe Five Eyes (FVEY) intelligence alliance has issued a new cybersecu...
2024-3-1 14:26:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
ivanti
security
ict
resets
gateways
GitHub Rolls Out Default Secret Scanning Push Protection for Public Repositories
DevSecOps / CybersecurityGitHub on Thursday announced that it's enabling secret scanning push prot...
2024-3-1 13:29:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
microsoft
confusion
malicious
github
fraudulent
New Silver SAML Attack Evades Golden SAML Defenses in Identity Systems
Threat Intelligence / Cyber ThreatCybersecurity researchers have disclosed a new attack technique...
2024-2-29 23:21:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
entra
microsoft
security
silver
federation
GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks
Threat hunters have discovered a new Linux malware called GTPDOOR that's designed to be deployed in...
2024-2-29 19:33:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
network
gtpdoor
roaming
gtp
grx
Previous
70
71
72
73
74
75
76
77
Next