unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Security Affairs newsletter Round 507 by Pierluigi Paganini – INTERNATIONAL EDITION
SECURITY AFFAIRS MALWARE NEWSLETTE...
2025-1-19 20:45:49 | 阅读: 16 |
收藏
|
Security Affairs - securityaffairs.com
exploited
ransomware
security
affairs
A flaw in the W3 Total Cache plugin exposes hundreds of thousands of WordPress sites to attacks
A flaw in the W3 Total Cache plugin exposes hundreds of thousands of WordPress sites...
2025-1-19 19:20:19 | 阅读: 18 |
收藏
|
Security Affairs - securityaffairs.com
wordpress
cloud
attackers
limits
U.S. Treasury Sanctions Chinese cybersecurity firm and actor over federal agency breach tied to Salt Typhoon
U.S. Treasury Sanctions Chinese cybersecurity firm and actor over federal agency brea...
2025-1-18 18:33:19 | 阅读: 24 |
收藏
|
Security Affairs - securityaffairs.com
treasury
typhoon
firm
salt
ofac
EU privacy non-profit group filed complaints against TikTok, SHEIN, AliExpress, and other Chinese companies
EU privacy non-profit group filed complaints against TikTok, SHEIN, AliExpress, and o...
2025-1-17 22:24:17 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
noyb
complaints
filed
aliexpress
transfers
EU privacy non-profit group filed complaints against TikTok, SHEIN, AliExpress, and other Chinese companies
EU privacy non-profit group filed complaints against TikTok, SHEIN, AliExpress, and o...
2025-1-17 22:24:17 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
noyb
complaints
aliexpress
filed
transfers
U.S. CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog
2025-1-17 14:38:18 | 阅读: 3 |
收藏
|
Security Affairs - securityaffairs.com
U.S. CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog
U.S. CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilit...
2025-1-17 14:38:18 | 阅读: 27 |
收藏
|
Security Affairs - securityaffairs.com
aviatrix
wiz
cloud
exploited
ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems
ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems...
2025-1-17 11:15:14 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
eset
firmware
software
20241127
microsoft
ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems
ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems...
2025-1-17 11:15:14 | 阅读: 19 |
收藏
|
Security Affairs - securityaffairs.com
eset
firmware
software
microsoft
20241127
Russia-linked APT Star Blizzard targets WhatsApp accounts
Russia-linked APT Star Blizzard targets WhatsApp accountsThe Ru...
2025-1-17 06:22:23 | 阅读: 15 |
收藏
|
Security Affairs - securityaffairs.com
blizzard
phishing
microsoft
qr
spear
Russia-linked APT Star Blizzard targets WhatsApp accounts
Russia-linked APT Star Blizzard targets WhatsApp accountsThe Ru...
2025-1-17 06:22:23 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
blizzard
phishing
microsoft
spear
qr
Prominent US law firm Wolf Haldenstein disclosed a data breach
Prominent US law firm Wolf Haldenstein disclosed a data breachT...
2025-1-16 20:46:57 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
wolf
haldenstein
firm
security
network
Prominent US law firm Wolf Haldenstein disclosed a data breach
Prominent US law firm Wolf Haldenstein disclosed a data breachT...
2025-1-16 20:46:57 | 阅读: 16 |
收藏
|
Data Breach - securityaffairs.com
haldenstein
wolf
firm
network
security
Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches
Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches...
2025-1-16 15:36:43 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
cleo
clop
ransomware
claims
software
Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches
Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches...
2025-1-16 15:36:43 | 阅读: 22 |
收藏
|
Security Affairs - securityaffairs.com
cleo
clop
claims
ransomware
software
MikroTik botnet relies on DNS misconfiguration to spread malware
MikroTik botnet relies on DNS misconfiguration to spread malware...
2025-1-16 10:59:37 | 阅读: 3 |
收藏
|
Security Affairs - securityaffairs.com
mikrotik
spf
malicious
proxies
malspam
MikroTik botnet relies on DNS misconfiguration to spread malware
MikroTik botnet relies on DNS misconfiguration to spread malware...
2025-1-16 10:59:37 | 阅读: 11 |
收藏
|
Security Affairs - securityaffairs.com
mikrotik
spf
malicious
malspam
masking
Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices
Threat actor leaked config files and VPN passwords for over Fortinet Fortigate device...
2025-1-16 00:3:41 | 阅读: 138 |
收藏
|
Security Affairs - securityaffairs.com
fortigate
passwords
attackers
heise
Microsoft Patch Tuesday updates for January 2025 fixed three actively exploited flaws
Microsoft Patch Tuesday updates for January 2025 fixed three actively exploited flaws...
2025-1-15 21:42:15 | 阅读: 3 |
收藏
|
Security Affairs - securityaffairs.com
microsoft
tuesday
remote
windows
U.S. CISA adds Fortinet FortiOS to its Known Exploited Vulnerabilities catalog
U.S. CISA adds Fortinet FortiOS to its Known Exploited Vulnerabilities catalog...
2025-1-15 14:58:24 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
catalog
exploited
fortios
microsoft
Previous
13
14
15
16
17
18
19
20
Next