unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
Threat actors have been observed concealing malicious code in images to deliver malware such as VIP...
2025-1-16 11:15:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
malicious
loader
powershell
stealer
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
Endpoint Security / RansomwareCybersecurity researchers have detailed an attack that involved a th...
2025-1-16 06:45:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
ransomware
python
security
socgholish
network
Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager
Vulnerability / Endpoint SecurityIvanti has rolled out security updates to address several securit...
2025-1-16 06:39:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
epm
attacker
avalanche
Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes
Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals...
2025-1-15 15:48:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
stealer
segura
phishing
fraudulent
conceal
Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99
The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Oper...
2025-1-15 15:37:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
developers
web3
serves
clipboard
North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains
Blockchain / CryptocurrencyCybersecurity researchers have identified infrastructure links between...
2025-1-15 13:32:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
north
korea
korean
yanbian
Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool
Vulnerability / Software UpdateAs many as six security vulnerabilities have been disclosed in the...
2025-1-15 12:26:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
rsync
client
12084
symbolic
12085
The High-Stakes Disconnect For ICS/OT Security
Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS...
2025-1-15 11:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
threats
tactical
operational
FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation
Malware / Threat IntelligenceThe U.S. Department of Justice (DoJ) on Tuesday disclosed that a cou...
2025-1-15 06:14:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
plugx
victim
sekoia
mustang
3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update
Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities ac...
2025-1-15 05:15:0 | 阅读: 20 |
收藏
|
The Hacker News - thehackernews.com
microsoft
windows
remote
security
Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks
Vulnerability / Server SecurityCybersecurity researchers have disclosed multiple security flaws in...
2025-1-15 05:10:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
simplehelp
remote
technician
attacker
privileges
Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation
Endpoint Security / VulnerabilityMicrosoft has shed light on a now-patched security flaw impacting...
2025-1-14 16:53:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
rootless
storagekitd
microsoft
bypass
Google OAuth Vulnerability Exposes Millions via Failed Startup Domains
Vulnerability / Data PrivacyNew research has pulled back the curtain on a "deficiency" in Google's...
2025-1-14 16:38:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
ayrey
ownership
security
truffle
purchasing
4 Reasons Your SaaS Attack Surface Can No Longer be Ignored
SaaS Security / Generative AIWhat do identity risks, data security risks and third-party risks a...
2025-1-14 10:8:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
security
nudge
governance
generative
Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions
Cryptocurrency / Online ScamThe Telegram-based online marketplace known as HuiOne Guarantee and it...
2025-1-14 09:29:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
huione
guarantee
marketplace
elliptic
baiting
Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces
Vulnerability / Network SecurityThreat hunters are calling attention to a new campaign that has ta...
2025-1-14 09:13:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
arctic
wolf
jsconsole
victim
firewalls
Russian-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware
Russia-linked threat actors have been attributed to an ongoing cyber espionage campaign targeting K...
2025-1-14 09:10:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
hatvibe
0063
russia
kazakhstan
sekoia
CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks
Vulnerability / CybersecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on...
2025-1-14 03:21:0 | 阅读: 23 |
收藏
|
The Hacker News - thehackernews.com
remote
security
attacker
beyondtrust
exploited
Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners
Vulnerability / Cloud SecurityA recently disclosed critical security flaw impacting the Aviatrix C...
2025-1-13 13:33:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
cloud
aviatrix
security
wiz
lateral
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]
The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad guys. From...
2025-1-13 12:5:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
windows
mlops
security
threats
Previous
7
8
9
10
11
12
13
14
Next