unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
VMware Patches Severe Security Flaws in Workstation and Fusion Products
Bluetooth / VulnerabilityMultiple security flaws have been disclosed in VMware Workstation and Fus...
2024-5-14 23:49:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
machine
exploited
malicious
privileges
fusion
New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation
Google on Monday shipped emergency fixes to address a new zero-day flaw in the Chrome web browser t...
2024-5-14 21:51:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
exploited
4761
4671
6367
chrome
Critical Flaws in Cacti Framework Could Let Attackers Execute Malicious Code
Network Monitoring / VulnerabilityThe maintainers of the Cacti open-source network monitoring and...
2024-5-14 19:17:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
injection
cacti
php
remote
addressed
6 Mistakes Organizations Make When Deploying Advanced Authentication
Cyber Threat / Machine LearningDeploying advanced authentication measures is key to helping organi...
2024-5-14 18:51:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
crucial
threats
leverages
Ongoing Campaign Bombards Enterprises with Spam Emails and Phone Calls
Cybersecurity researchers have uncovered an ongoing social engineering campaign that bombards enter...
2024-5-14 18:44:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
ransomware
lockbit
remote
mallox
rapid7
Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices
Location Tracking / PrivacyApple and Google on Monday officially announced the rollout of a new fe...
2024-5-14 13:16:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
inch
airtags
trackers
ventura
23296
MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices
The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D fo...
2024-5-13 22:29:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
threats
security
emb3d
reduced
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Browser Security / Data ProtectionWith the browser becoming the most prevalent workspace in the en...
2024-5-13 20:6:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
threats
phishing
leaders
New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation
Encryption / Data PrivacyResearchers have detailed a Virtual Private Network (VPN) bypass techniqu...
2024-5-10 01:55:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
dhcp
network
attacker
tunnel
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mobile Security / Cyber AttackPolish government institutions have been targeted as part of a large...
2024-5-9 23:20:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
webhook
mocky
238279780
apt28
polish
New Guide: How to Scale Your vCISO Services Profitably
vCISO / Regulatory ComplianceCybersecurity and compliance guidance are in high demand among SMEs....
2024-5-9 19:5:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
vciso
scaling
client
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
Network Security / BotnetTwo recently disclosed security flaws in Ivanti Connect Secure (ICS) devi...
2024-5-9 19:4:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
46805
21887
network
pattan
Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover
Firewall / Network SecurityTwo security vulnerabilities have been discovered in F5 Next Central Ma...
2024-5-9 14:11:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
attacker
security
attackers
eclypsium
malicious
A SaaS Security Challenge: Getting Permissions All in One Place
Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. T...
2024-5-8 22:18:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
ensuring
regulatory
precise
salesforce
New Spectre-Style 'Pathfinder' Attack Targets Intel CPU, Leak Encryption Keys and Data
Data Encryption / Hardware SecurityResearchers have discovered two novel attack methods targeting...
2024-5-8 22:17:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
spectre
encryption
cpus
pathfinder
phr
The Fundamentals of Cloud Security Stress Testing
״Defenders think in lists, attackers think in graphs," said John Lambert from Microsoft, distilling...
2024-5-8 18:58:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
cloud
security
network
attackers
attacker
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Encryption / Information StealerA newer version of a malware loader called Hijack Loader has been...
2024-5-8 18:58:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
loader
stage
stealer
irfan
defender
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Web Security / VulnerabilityA high-severity flaw impacting the LiteSpeed Cache plugin for WordPres...
2024-5-8 15:3:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
wordpress
security
litespeed
malicious
wpscan
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
The U.K. National Crime Agency (NCA) has unmasked the administrator and developer of the LockBit ra...
2024-5-7 23:49:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
lockbit
ransomware
khoroshev
nca
affiliates
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
Cyber Espionage / MalwareThe Iranian state-backed hacking outfit called APT42 is making use of enh...
2024-5-7 21:25:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
apt42
cloud
charming
kitten
iran
Previous
1
2
3
4
5
6
7
8
Next