unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
6 Steps to Accelerate Cybersecurity Incident Response
Modern security tools continue to improve in their ability to defend organizations' networks and en...
2023-11-23 18:48:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
containment
eradication
network
Mirai-based Botnet Exploiting Zero-Day Bugs in Routers and NVRs for Massive DDoS Attacks
Vulnerability / Cyber ThreatAn active malware campaign is leveraging two zero-day vulnerabilities...
2023-11-23 18:47:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
akamai
attackers
c2
shells
North Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack
Software Supply Chain AttackA North Korean state-sponsored threat actor tracked as Diamond Sleet i...
2023-11-23 13:46:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
north
microsoft
payload
software
security
New Flaws in Fingerprint Sensors Let Attackers Bypass Windows Hello Login
Authentication Security / WindowsA new research has uncovered multiple vulnerabilities that could...
2023-11-22 23:23:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
sensor
fingerprint
sdcp
windows
North Korean Hackers Pose as Job Recruiters and Seekers in Malware Campaigns
Cyber Espionage / Social EngineeringNorth Korean threat actors have been linked to two campaigns i...
2023-11-22 20:14:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
north
github
korean
software
korea
AI Solutions Are the New Shadow IT
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of...
2023-11-22 19:8:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
indie
security
cisos
appomni
ClearFake Campaign Expands to Deliver Atomic Stealer on Mac Systems
SEO poisoning / Malware AnalysisThe macOS information stealer known as Atomic is now being deliver...
2023-11-22 15:15:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
stealer
malicious
clearfake
segura
stealers
LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break In
Threat Analysis / VulnerabilityMultiple threat actors, including LockBit ransomware affiliates, ar...
2023-11-22 12:49:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
ransomware
citrix
security
families
lockbit
Play Ransomware Goes Commercial - Now Offered as a Service to Cybercriminals
The ransomware strain known as Play is now being offered to other threat actors "as a service," new...
2023-11-21 21:56:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
ransomware
adlumin
kiddies
carried
offered
New Agent Tesla Malware Variant Using ZPAQ Compression in Email Attacks
Malware Threat / Data PrivacyA new variant of the Agent Tesla malware has been observed delivered...
2023-11-21 19:57:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
zpaq
security
lvova
software
tesla
How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography
Cybercrime / Malware AnalysisPhishing attacks are steadily becoming more sophisticated, with cyber...
2023-11-21 18:40:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
phishing
qr
malicious
captcha
Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux Rootkits
The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache Act...
2023-11-21 18:0:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
kinsing
miners
activemq
security
girnus
Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users
Android Security / CryptocurrencyAndroid smartphone users in India are the target of a new malware...
2023-11-21 15:46:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
malicious
trojan
security
software
wallets
Mustang Panda Hackers Targets Philippines Government Amid South China Sea Tensions
Cyber Attack / Cyber EspionageThe China-linked Mustang Panda actor has been linked to a cyber atta...
2023-11-21 14:58:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
panda
mustang
malicious
taurus
espionage
NetSupport RAT Infections on the Rise - Targeting Government and Business Sectors
Malware / Network SecurityThreat actors are targeting the education, government and business servi...
2023-11-20 23:19:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
netsupport
remote
fraudulent
network
victim
DarkGate and PikaBot Malware Resurrect QakBot's Tactics in New Phishing Attacks
Threat Analysis / MalwarePhishing campaigns delivering malware families such as DarkGate and PikaB...
2023-11-20 22:50:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
qakbot
pikabot
darkgate
cofense
analysis
Product Walkthrough: Silverfort's Unified Identity Protection Platform
In this article, we will provide a brief overview of Silverfort's platform, the first (and currentl...
2023-11-20 22:50:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
silverfort
prem
cloud
network
Why Defenders Should Embrace a Hacker Mindset
Today's security leaders must manage a constantly evolving attack surface and a dynamic threat envi...
2023-11-20 19:2:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
security
defenders
pentera
attackers
threats
LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique
The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique...
2023-11-20 18:49:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
lummac2
positions
marín
mouse
stealer
Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking
Cryptocurrency / BlockchainBitcoin wallets created between 2011 and 2015 are susceptible to a new...
2023-11-20 17:16:0 | 阅读: 23 |
收藏
|
The Hacker News - thehackernews.com
wallets
blockchain
randstorm
bitcoinjs
software
Previous
93
94
95
96
97
98
99
100
Next