unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks
Phishing Attack / Network SecurityA financially motivated threat actor has been linked to an ongoi...
2025-1-28 16:34:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
victim
network
machine
tornet
salting
OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking
Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability af...
2025-1-28 14:2:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
airline
victim
salt
rental
rentals
AI SOC Analysts: Propelling SecOps into the future
Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up...
2025-1-28 11:20:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
threats
prophet
proactive
Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations
Ransomware / Threat IntelligenceCybersecurity researchers have found that ransomware attacks targe...
2025-1-28 11:1:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
rid
privileges
appliances
windows
leveraging
How Long Does It Take Hackers to Crack Modern Hashing Algorithms?
While passwords remain the first line of defense for protecting user accounts against unauthorized...
2025-1-28 10:30:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
passwords
hashing
cracking
hashed
bcrypt
E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministries
Cybersecurity / Cyber EspionageThe Council of the European Union has sanctioned three individuals...
2025-1-28 10:16:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
council
29155
ukraine
affairs
european
Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks
Artificial Intelligence / TechnologyDeepSeek, the Chinese AI startup that has captured much of th...
2025-1-28 05:49:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
deepseek
malicious
openai
artificial
h800
Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More
Vulnerability / Endpoint SecurityApple has released software updates to address several security f...
2025-1-28 03:23:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
exploited
inch
termination
3rd
GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs
Vulnerability / Software SecurityMultiple security vulnerabilities have been disclosed in GitHub D...
2025-1-27 14:17:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
github
carriage
codespaces
security
cloning
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]
Welcome to your weekly cybersecurity scoop! Ever thought about how the same AI meant to protect our...
2025-1-27 12:39:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
network
attacker
analysis
Do We Really Need The OWASP NHI Top 10?
The Open Web Application Security Project has recently introduced a new Top 10 project - the Non-Hu...
2025-1-27 11:20:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
nhi
nhis
security
developers
development
GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities
Cyber Espionage / Threat IntelligenceA previously unknown threat actor has been observed copying t...
2025-1-27 07:59:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
ultravnc
werewolf
knownsec
phishing
MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks
Threat hunters have detailed an ongoing campaign that leverages a malware loader called MintsLoader...
2025-1-27 07:16:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
loader
powershell
mintsloader
jinx
wordpress
Meta's Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks
A high-severity security flaw has been disclosed in Meta's Llama large language model (LLM) framew...
2025-1-26 10:15:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
llama
chatgpt
llms
malicious
RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations
Telecom Security / VulnerabilityA group of academics has disclosed details of over 100 security vu...
2025-1-24 12:58:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
network
lte
cellular
security
2025 State of SaaS Backup and Recovery Report
The modern workplace has undergone a seismic transformation over recent years, with hybrid work bec...
2025-1-24 11:0:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
cloud
backup
adoption
smbs
microsoft
DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations
The U.S. Department of Justice (DoJ) on Thursday indicted two North Korean nationals, a Mexican nat...
2025-1-24 09:53:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
north
jin
remote
korean
conspiracy
Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations
Biometric / Mobile SecurityGoogle has launched a new feature called Identity Check for supported...
2025-1-24 07:20:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
chrome
malicious
biometric
harvest
CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List
Vulnerability / JavaScriptThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thur...
2025-1-24 05:39:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
jquery
security
11023
exploited
bod
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits
Firmware Security / VulnerabilityAn exhaustive evaluation of three firewall models from Palo Alto...
2025-1-23 15:13:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
pa
affects
security
firmware
refers
Previous
4
5
6
7
8
9
10
11
Next