unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Sierra:21 - Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks
Cyber Threat / VulnerabilityA collection of 21 security flaws have been discovered in Sierra Wirel...
2023-12-6 19:18:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
attackers
routers
tinyxml
opennds
Scaling Security Operations with Automation
In an increasingly complex and fast-paced digital landscape, organizations strive to protect themse...
2023-12-6 18:14:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
processes
maturity
crucial
identify
Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers
Vulnerability / Web Server SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA...
2023-12-6 18:10:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
coldfusion
passwords
exploited
webinar
attackers
Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution
Software Security / VulnerabilityAtlassian has released software fixes to address four critical fl...
2023-12-6 17:18:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
remote
atlassian
software
attacker
affects
Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks
Vulnerability / Mobile SecurityChipmaker Qualcomm has released more information about three high-s...
2023-12-6 13:23:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
memory
corruption
exploited
Warning for iPhone Users: Experts Warn of Sneaky Fake Lockdown Mode Attack
Mobile Security / SpywareA new "post-exploitation tampering technique" can be abused by malicious...
2023-12-5 22:58:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
lockdown
security
threats
malicious
abused
Russia's AI-Powered Disinformation Operation Targeting Ukraine, U.S., and Germany
Brandjacking / Artificial IntelligenceThe Russia-linked influence operation called Doppelganger ha...
2023-12-5 22:58:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
influence
ukraine
insider
warfare
election
Generative AI Security: Preventing Microsoft Copilot Data Exposure
Microsoft Copilot has been called one of the most powerful productivity tools on the planet.Copil...
2023-12-5 19:29:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
copilot
microsoft
security
humans
m365
15,000 Go Module Repositories on GitHub Vulnerable to Repojacking Attack
Software Security / Supply ChainNew research has found that over 15,000 Go module repositories on...
2023-12-5 18:14:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
github
repository
repojacking
username
software
New Threat Actor 'AeroBlade' Emerges in Espionage Attack on U.S. Aerospace
Cyber Espionage / Threat AnalysisA previously undocumented threat actor has been linked to a cyber...
2023-12-5 15:55:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
analysis
bestuzhev
reverse
insider
attackers
Microsoft Warns of Kremlin-Backed APT28 Exploiting Critical Outlook Vulnerability
Email Security / VulnerabilityMicrosoft on Monday said it detected Kremlin-backed nation-state act...
2023-12-5 14:59:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
microsoft
security
mailbox
dkwoc
forest
New BLUFFS Bluetooth Attack Expose Devices to Adversary-in-the-Middle Attacks
New research has unearthed multiple novel attacks that break Bluetooth Classic's forward secrecy an...
2023-12-4 21:16:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
secrecy
attacker
encryption
peers
guarantees
Make a Fresh Start for 2024: Clean Out Your User Inventory to Reduce SaaS Risk
As work ebbs with the typical end-of-year slowdown, now is a good time to review user roles and pri...
2023-12-4 19:38:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
sso
unused
dormant
security
idp
New P2PInfect Botnet MIPS Variant Targeting Routers and IoT Devices
Cybersecurity researchers have discovered a new variant of an emerging botnet called P2PInfect that...
2023-12-4 19:3:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
p2pinfect
ssh
security
notable
insider
LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks
Technology / Firmware SecurityThe Unified Extensible Firmware Interface (UEFI) code from various i...
2023-12-4 14:53:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
firmware
security
ibvs
bypass
Microsoft Warns of Malvertising Scheme Spreading CACTUS Ransomware
Ransomware / Cyber AttackMicrosoft has warned of a new wave of CACTUS ransomware attacks that leve...
2023-12-4 12:20:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
ransomware
danabot
cactus
microsoft
qakbot
Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.
Organizations in the Middle East, Africa, and the U.S. have been targeted by an unknown threat acto...
2023-12-2 16:29:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
racoon
sta
ntospy
garcia
microsoft
Russian Hacker Vladimir Dunaev Convicted for Creating TrickBot Malware
A Russian national has been found guilty in connection with his role in developing and deploying a...
2023-12-2 15:52:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
dunaev
ransomware
guilty
sentenced
arrested
New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
Mobile Security / Banking SecurityCybersecurity researchers have disclosed a new sophisticated And...
2023-12-1 20:40:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
security
malicious
bogus
Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
The U.S. Department of Justice (DOJ) and the FBI recently collaborated in a multinational operation...
2023-12-1 18:50:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
qakbot
takedown
security
passwords
infections
Previous
90
91
92
93
94
95
96
97
Next