unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Ransomware on ESXi: The mechanization of virtualized attacks
Threat Detection / Network SecurityIn 2024, ransomware attacks targeting VMware ESXi servers reach...
2025-1-13 11:30:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
vcenter
security
ransomware
encryption
attackers
WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables
Payment Security / Web SecurityCybersecurity researchers are warning of a new stealthy credit car...
2025-1-13 06:40:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
wordpress
malicious
simulation
victim
Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems
Malware / Domain SecurityNo less than 4,000 unique web backdoors previously deployed by various th...
2025-1-13 06:1:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
backdoors
shells
watchtowr
expired
mobi
Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation
AI Security / CybersecurityMicrosoft has revealed that it's pursuing legal action against a "fore...
2025-1-11 07:54:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
microsoft
de3u
proxy
openai
reverse
DoJ Indicts Three Russians for Operating Crypto Mixers Used in Cybercrime Laundering
Financial Crime / CryptocurrencyThe U.S. Department of Justice (DoJ) on Friday indicted three Rus...
2025-1-11 06:45:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
funds
blender
laundering
sinbad
ransomware
Taking the Pain Out of Cybersecurity Reporting: A Practical Guide for MSPs
Cybersecurity reporting is a critical yet often overlooked opportunity for service providers managi...
2025-1-10 11:59:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
client
vciso
security
miller
AI-Driven Ransomware FunkSec Targets 85 Victims Using Double Extortion Tactics
Artificial Intelligence / CybercrimeCybersecurity researchers have shed light on a nascent artific...
2025-1-10 11:58:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
ransomware
funksec
hacktivist
algeria
desertstorm
Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity
Network segmentation remains a critical security requirement, yet organizations struggle with tradi...
2025-1-10 10:22:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
elisity
network
healthcare
security
Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices
Cybersecurity researchers have detailed a now-patched security flaw impacting Monkey's Audio (APE)...
2025-1-10 09:47:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
samsung
attackers
rec
RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns
Cyber Espionage / Cyber AttackMongolia, Taiwan, Myanmar, Vietnam, and Cambodia have been targeted...
2025-1-10 09:31:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
reddelta
mongolia
plugx
espionage
microsoft
CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer
Cybersecurity company CrowdStrike is alerting of a phishing campaign that exploits its own branding...
2025-1-10 09:9:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
crowdstrike
miner
malicious
repository
Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers
Vulnerability / Endpoint SecurityPalo Alto Networks has released software patches to address seve...
2025-1-9 17:29:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
attacker
expedition
security
palo
New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption
Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-s...
2025-1-9 13:40:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
stealer
banshee
xprotect
security
development
Product Review: How Reco Discovers Shadow AI in SaaS
As SaaS providers race to integrate AI into their product offerings to stay competitive and relevan...
2025-1-9 11:55:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
reco
shadow
security
identities
Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions
Data Protection / EncryptionRansomware isn't slowing down—it's getting smarter. Encryption, design...
2025-1-9 10:44:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
ransomware
encryption
zscaler
threats
surge
MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan
Japan's National Police Agency (NPA) and National Center of Incident Readiness and Strategy for Cyb...
2025-1-9 10:44:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
noopdoor
spear
anel
mirrorface
ncsc
Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection
Vulnerability / Threat IntelligenceThreat actors are attempting to take advantage of a recently di...
2025-1-9 09:35:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
malicious
nonauth
gfi
splitting
E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws
The European General Court on Wednesday fined the European Commission, the primary executive arm of...
2025-1-9 07:13:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
commission
court
european
laws
determined
Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure
Ivanti is warning that a critical security flaw impacting Ivanti Connect Secure, Policy Secure, and...
2025-1-9 04:40:0 | 阅读: 20 |
收藏
|
The Hacker News - thehackernews.com
ivanti
7r2
0282
phasejam
7r1
Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections
Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sen...
2025-1-8 18:9:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
phishing
malicious
security
wordpress
remote
Previous
8
9
10
11
12
13
14
15
Next