unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Toyota disclosed a data breach after ZeroSevenGroup leaked stolen data on a cybercrime forum
Toyota disclosed a data breach after ZeroSevenGroup leaked stolen data on a cybercrime forumTo...
2024-8-20 15:9:49 | 阅读: 17 |
收藏
|
Security Affairs - securityaffairs.com
toyota
tfs
network
medusa
Toyota disclosed a data breach after ZeroSevenGroup leaked stolen data on a cybercrime forum
Toyota disclosed a data breach after ZeroSevenGroup leaked stolen data on a cybercrime forumTo...
2024-8-20 15:9:49 | 阅读: 14 |
收藏
|
Security Affairs - securityaffairs.com
toyota
tfs
network
medusa
CISA adds Jenkins Command Line Interface (CLI) bug to its Known Exploited Vulnerabilities catalog
CISA adds Jenkins Command Line Interface (CLI) bug to its Known Exploited Vulnerabilities catalog...
2024-8-20 03:46:56 | 阅读: 16 |
收藏
|
Security Affairs - securityaffairs.com
jenkins
catalog
exploited
23897
Researchers uncovered new infrastructure linked to the cybercrime group FIN7
Researchers uncovered new infrastructure linked to the cybercrime group FIN7Team Cymru, Silent...
2024-8-20 01:52:25 | 阅读: 22 |
收藏
|
Security Affairs - securityaffairs.com
stark
fin7
industries
clusters
cymru
Experts warn of exploit attempt for Ivanti vTM bug
Experts warn of exploit attempt for Ivanti vTM bugResearchers at the Shadowserver Foundation o...
2024-8-19 17:35:42 | 阅读: 14 |
收藏
|
Security Affairs - securityaffairs.com
ivanti
vtm
bypass
7593
Microsoft Zero-Day CVE-2024-38193 was exploited by North Korea-linked Lazarus APT
Microsoft Zero-Day CVE-2024-38193 was exploited by North Korea-linked Lazarus APTMicrosoft add...
2024-8-19 16:41:54 | 阅读: 38 |
收藏
|
Security Affairs - securityaffairs.com
security
exploited
microsoft
north
byovd
The Mad Liberator ransomware group uses social-engineering techniques
The Mad Liberator ransomware group uses social-engineering techniquesNew cybercrime group Mad...
2024-8-19 08:0:59 | 阅读: 14 |
收藏
|
Security Affairs - securityaffairs.com
mad
liberator
attacker
victim
windows
From 2018: DeepMasterPrints: deceive fingerprint recognition systems with MasterPrints generated with GANs
From 2018: DeepMasterPrints: deceive fingerprint recognition systems with MasterPrints generated w...
2024-8-19 00:25:37 | 阅读: 2 |
收藏
|
Security Affairs - securityaffairs.com
fingerprint
trained
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 7
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 7 | Security Affairs newsletter Round 485 by Pierlui...
2024-8-18 16:38:18 | 阅读: 69 |
收藏
|
Security Affairs - securityaffairs.com
exploited
ransomware
security
affairs
Security Affairs newsletter Round 485 by Pierluigi Paganini – INTERNATIONAL EDITION
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 7 | Security Affairs newsletter Round 485 by Pierlui...
2024-8-18 16:23:28 | 阅读: 72 |
收藏
|
Security Affairs - securityaffairs.com
exploited
ransomware
security
affairs
Large-scale extortion campaign targets publicly accessible environment variable files (.env)
Large-scale extortion campaign targets publicly accessible environment variable files (.env)A...
2024-8-18 15:17:5 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
attackers
cloud
extortion
victim
leveraging
OpenAI dismantled an Iranian influence operation targeting the U.S. presidential election
OpenAI dismantled an Iranian influence operation targeting the U.S. presidential electionOpenA...
2024-8-18 07:3:0 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
influence
election
openai
chatgpt
National Public Data confirms a data breach
National Public Data confirms a data breachBackground check service National Public Data confi...
2024-8-17 23:19:51 | 阅读: 66 |
收藏
|
Security Affairs - securityaffairs.com
security
database
district
npd
usdod
ValleyRAT malware is targeting Chinese-speaking users
ValleyRAT malware is targeting Chinese-speaking usersFortiGuard Labs researchers uncovered an...
2024-8-17 15:15:41 | 阅读: 16 |
收藏
|
Security Affairs - securityaffairs.com
shellcode
valleyrat
memory
processes
malicious
CISA adds SolarWinds Web Help Desk bug to its Known Exploited Vulnerabilities catalog
CISA adds SolarWinds Web Help Desk bug to its Known Exploited Vulnerabilities catalogU.S. Cybe...
2024-8-17 04:13:33 | 阅读: 15 |
收藏
|
Security Affairs - securityaffairs.com
desk
catalog
exploited
security
Russian national sentenced to 40 months for selling stolen data on the dark web
Russian national sentenced to 40 months for selling stolen data on the dark webA Russian natio...
2024-8-17 01:56:33 | 阅读: 5 |
收藏
|
Security Affairs - securityaffairs.com
kavzharadze
slilpp
marketplace
sentenced
selling
Banshee Stealer, a new macOS malware with a monthly subscription price of $3,000
Banshee Stealer, a new macOS malware with a monthly subscription price of $3,000Russian cyberc...
2024-8-16 22:56:41 | 阅读: 8 |
收藏
|
Security Affairs - securityaffairs.com
banshee
stealer
wallets
monthly
security
Millions of Pixel devices can be hacked due to a pre-installed vulnerable app
Millions of Pixel devices can be hacked due to a pre-installed vulnerable appMany Google Pixel...
2024-8-16 16:19:30 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
apk
showcase
exploited
iverify
privileges
Microsoft urges customers to fix zero-click Windows RCE in the TCP/IP stack
Microsoft urges customers to fix zero-click Windows RCE in the TCP/IP stackMicrosoft addressed...
2024-8-16 15:10:42 | 阅读: 8 |
收藏
|
Security Affairs - securityaffairs.com
microsoft
windows
xiaowei
remote
A group linked to RansomHub operation employs EDR-killing tool EDRKillShifter
A group linked to RansomHub operation employs EDR-killing tool EDRKillShifterA cybercrime grou...
2024-8-16 04:12:37 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
ransomhub
ransomware
knight
sophos
Previous
19
20
21
22
23
24
25
26
Next