unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities
Hackers threaten to leak a copy of the World-Check database used to assess potential risks associa...
2024-4-22 21:19:39 | 阅读: 9 |
收藏
|
Security Affairs - securityaffairs.com
database
ghostr
regulatory
security
gained
Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities
Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilitiesResearcher...
2024-4-22 18:25:7 | 阅读: 13 |
收藏
|
Security Affairs - securityaffairs.com
microsoft
windows
privileges
elevation
A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites
A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sitesJapan’s CERT w...
2024-4-22 14:58:46 | 阅读: 24 |
收藏
|
Security Affairs - securityaffairs.com
wordpress
forminator
28890
attacker
Akira ransomware received $42M in ransom payments from over 250 victims
Akira ransomware received $42M in ransom payments from over 250 victimsGovernment agencies rev...
2024-4-22 04:7:55 | 阅读: 13 |
收藏
|
Security Affairs - securityaffairs.com
akira
ransomware
security
encryption
megazord
DuneQuixote campaign targets the Middle East with a complex backdoor
DuneQuixote campaign targets the Middle East with a complex backdoorThreat actors target gover...
2024-4-22 00:38:20 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
c2
dunequixote
cr4t
analysis
implants
Security Affairs newsletter Round 468 by Pierluigi Paganini – INTERNATIONAL EDITION
Security Affairs newsletter Round 468 by Pierluigi Paganini – INTERNATIONAL EDITION | Critical C...
2024-4-21 21:37:54 | 阅读: 10 |
收藏
|
Security Affairs - securityaffairs.com
ransomware
exploited
security
catalog
Critical CrushFTP zero-day exploited in attacks in the wild
Critical CrushFTP zero-day exploited in attacks in the wildThreat actors exploited a critical...
2024-4-21 05:39:46 | 阅读: 16 |
收藏
|
Security Affairs - securityaffairs.com
crushftp
exploited
download
crowdstrike
software
A French hospital was forced to reschedule procedures after cyberattack
A French hospital was forced to reschedule procedures after cyberattackA French hospital was f...
2024-4-21 01:47:54 | 阅读: 5 |
收藏
|
Security Affairs - securityaffairs.com
hospital
forced
chc
french
sv
MITRE revealed that nation-state actors breached its systems via Ivanti zero-days
MITRE revealed that nation-state actors breached its systems via Ivanti zero-daysThe MITRE Cor...
2024-4-20 05:54:15 | 阅读: 15 |
收藏
|
Security Affairs - securityaffairs.com
ivanti
nation
security
prototyping
FBI chief says China is preparing to attack US critical infrastructure
FBI chief says China is preparing to attack US critical infrastructureChina-linked threat acto...
2024-4-19 17:16:16 | 阅读: 18 |
收藏
|
Security Affairs - securityaffairs.com
typhoon
volt
wray
preparing
soho
United Nations Development Programme (UNDP) investigates data breach
United Nations Development Programme (UNDP) investigates data breachThe United Nations Develop...
2024-4-19 14:52:49 | 阅读: 4 |
收藏
|
Security Affairs - securityaffairs.com
undp
development
nations
programme
extortion
FIN7 targeted a large U.S. carmaker phishing attacks
FIN7 targeted a large U.S. carmaker phishing attacksBlackBerry reported that the financially m...
2024-4-19 03:29:29 | 阅读: 4 |
收藏
|
Security Affairs - securityaffairs.com
fin7
openssh
phishing
blackberry
carmaker
Law enforcement operation dismantled phishing-as-a-service platform LabHost
Law enforcement operation dismantled phishing-as-a-service platform LabHostAn international la...
2024-4-18 22:30:33 | 阅读: 7 |
收藏
|
Security Affairs - securityaffairs.com
phishing
labhost
police
arrested
australia
Previously unknown Kapeka backdoor linked to Russian Sandworm APT
Previously unknown Kapeka backdoor linked to Russian Sandworm APTRussia-linked APT Sandworm em...
2024-4-18 17:39:24 | 阅读: 12 |
收藏
|
Security Affairs - securityaffairs.com
kapeka
sandworm
c2
withsecure
machine
Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available
Cisco warns of a command injection escalation flaw in its IMC. PoC publicly availableCisco has...
2024-4-18 15:16:11 | 阅读: 20 |
收藏
|
Security Affairs - securityaffairs.com
imc
ucs
attacker
privileges
Linux variant of Cerber ransomware targets Atlassian servers
Linux variant of Cerber ransomware targets Atlassian serversThreat actors are exploiting the C...
2024-4-18 02:1:31 | 阅读: 19 |
收藏
|
Security Affairs - securityaffairs.com
ransomware
cerber
payload
security
22518
Ivanti fixed two critical flaws in its Avalanche MDM
Ivanti fixed two critical flaws in its Avalanche MDMIvanti addressed two critical vulnerabilit...
2024-4-17 18:49:14 | 阅读: 14 |
收藏
|
Security Affairs - securityaffairs.com
avalanche
remote
ivanti
addressed
Researchers released exploit code for actively exploited Palo Alto PAN-OS bug
Researchers released exploit code for actively exploited Palo Alto PAN-OS bugResearchers relea...
2024-4-17 13:42:25 | 阅读: 22 |
收藏
|
Security Affairs - securityaffairs.com
pan
alto
palo
3400
exploited
Cisco warns of large-scale brute-force attacks against VPN and SSH services
Cisco warns of large-scale brute-force attacks against VPN and SSH servicesCisco Talos warns o...
2024-4-17 13:2:28 | 阅读: 10 |
收藏
|
Security Affairs - securityaffairs.com
proxy
talos
ssh
network
PuTTY SSH Client flaw allows of private keys recovery
PuTTY SSH Client flaw allows of private keys recoveryThe PuTTY Secure Shell (SSH) and Telnet c...
2024-4-17 02:58:53 | 阅读: 11 |
收藏
|
Security Affairs - securityaffairs.com
putty
ssh
ecdsa
client
biased
Previous
40
41
42
43
44
45
46
47
Next