unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts
Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ri...
2024-11-19 22:0:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
sports
security
ffmpeg
notebooks
firm
Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority
Insider Threat / Credential SecurityPrivileged accounts are well-known gateways for potential secu...
2024-11-19 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
privileged
security
pam
monitoring
threats
New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems
Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain...
2024-11-19 17:40:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
ransomware
helldown
interlock
lockbit
analysis
Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted...
2024-11-19 15:2:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
backdoors
salt
typhoon
estries
earth
CISA Alert: Active Exploitation of VMware vCenter and Kemp LoadMaster Flaws
Vulnerability / Data SecurityNow-patched security flaws impacting Progress Kemp LoadMaster and VMw...
2024-11-19 14:31:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
loadmaster
kemp
1212
network
New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers
Threat Intelligence / RansomwareCybersecurity researchers have shed light on a new stealthy malwa...
2024-11-19 00:48:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
loader
remote
analysis
families
The Problem of Permissions and Non-Human Identities - Why Remediating Credentials Takes Longer Than You Think
According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having expe...
2024-11-18 22:0:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
developers
sprawl
gitguardian
identities
The Problem of Permissions and Non-Human Identities - Why Remediating Credentials Takes Longer Than You Think
According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having expe...
2024-11-18 21:50:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
developers
sprawl
identities
gitguardian
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 - Nov 17)
What do hijacked websites, fake job offers, and sneaky ransomware have in common? They're proof th...
2024-11-18 19:36:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
ransomware
microsoft
exploited
Gmail's New Shielded Email Feature Lets Users Create Aliases for Email Privacy
Google appears to be readying a new feature called Shielded Email that allows users to create email...
2024-11-18 19:15:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
verifier
aliases
encryption
combat
thereby
Fake Discount Sites Exploit Black Friday to Hijack Shopper Information
A new phishing campaign is targeting e-commerce shoppers in Europe and the United States with bogus...
2024-11-18 18:56:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
phishing
motivated
season
lure
Beyond Compliance: The Advantage of Year-Round Network Pen Testing
Penetration Testing / Network SecurityIT leaders know the drill—regulators and cyber insurers dema...
2024-11-18 18:30:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
network
security
frequent
vpentest
NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta's Lawsuit
Mobile Security / SpywareLegal documents released as part of an ongoing legal tussle between Meta'...
2024-11-18 13:52:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
spyware
victim
erised
tracked
Urgent: Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites
Vulnerability / Website SecurityA critical authentication bypass vulnerability has been disclosed...
2024-11-18 12:52:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
wordpress
attackers
security
wordfence
PAN-OS Firewall Vulnerability Under Active Exploitation – IoCs Released
Vulnerability / Network SecurityPalo Alto Networks has released new indicators of compromise (IoCs...
2024-11-16 16:21:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
alto
palo
remote
security
exploited
Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
Vulnerability / VPN SecurityA threat actor known as BrazenBamboo has exploited an unresolved secur...
2024-11-16 14:25:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
windows
deepdata
lightspy
Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations
Cyber Espionage / MalwareCybersecurity researchers have shed light on a new remote access trojan a...
2024-11-16 01:57:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
wezrat
chrome
remote
israeli
Researchers Warn of Privilege Escalation Risks in Google's Vertex AI ML Platform
Artificial Intelligence / VulnerabilityCybersecurity researchers have disclosed two security flaws...
2024-11-15 20:35:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
vertex
openai
exfiltrate
tuned
Master Certificate Management: Join This Webinar on Crypto Agility and Best Practices
In the fast-paced digital world, trust is everything—but what happens when that trust is disrupted?...
2024-11-15 19:48:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
revocations
revocation
agility
exclusive
webinar
Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia
Malware / Credential TheftA Vietnamese-speaking threat actor has been linked to an information-ste...
2024-11-15 19:12:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
stealer
pxa
facebook
vietnamese
vietnam
Previous
9
10
11
12
13
14
15
16
Next