unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online
New research has uncovered more than 145,000 internet-exposed Industrial Control Systems (ICS) acro...
2024-11-21 19:0:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
modbus
hmis
censys
america
security
5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme
Cryptocurrency / Identity TheftFive alleged members of the infamous Scattered Spider cybercrime cr...
2024-11-21 17:16:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
buchanan
phishing
defendants
evans
florida
Google's AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects
Artificial Intelligence / Software SecurityGoogle has revealed that its AI-powered fuzzing tool, O...
2024-11-21 15:13:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
memory
security
software
hardened
NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data
Threat hunters are warning about an updated version of the Python-based NodeStealer that's now equi...
2024-11-21 14:34:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
facebook
nodestealer
security
clickfix
windows
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
Payment Security / CybercrimeThreat actors are increasingly banking on a new technique that levera...
2024-11-20 21:9:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
tap
atm
fraudulent
transmit
NHIs Are the Future of Cybersecurity: Meet NHIDR
Identity Security / Cyber DefenseThe frequency and sophistication of modern cyberattacks are surgi...
2024-11-20 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
nhidr
security
nhis
proactive
identities
Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package
Multiple decade-old security vulnerabilities have been disclosed in the needrestart package install...
2024-11-20 17:16:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
needrestart
attacker
interpreter
scandeps
Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity
Endpoint Security / AI ResearchMicrosoft has announced a new Windows Resiliency Initiative as a wa...
2024-11-20 15:0:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
windows
microsoft
initiative
pcs
China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks
Cyber Espionage / Telecom SecurityA new China-linked cyber espionage group has been attributed as...
2024-11-20 14:58:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
network
liminal
security
panda
Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities
Apple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to...
2024-11-20 12:37:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
inch
3rd
addressed
44308
macs
Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation
Software Security / VulnerabilityOracle is warning that a high-severity security flaw impacting th...
2024-11-20 12:24:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
exploited
security
crowdstrike
plm
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices
The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSO...
2024-11-19 22:1:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
proxy
nsocks
ngioweb
c2
residential
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts
Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ri...
2024-11-19 22:0:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
sports
security
ffmpeg
notebooks
firm
Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority
Insider Threat / Credential SecurityPrivileged accounts are well-known gateways for potential secu...
2024-11-19 19:30:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
privileged
security
pam
monitoring
threats
New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems
Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain...
2024-11-19 17:40:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
ransomware
helldown
interlock
lockbit
analysis
Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted...
2024-11-19 15:2:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
backdoors
salt
typhoon
estries
earth
CISA Alert: Active Exploitation of VMware vCenter and Kemp LoadMaster Flaws
Vulnerability / Data SecurityNow-patched security flaws impacting Progress Kemp LoadMaster and VMw...
2024-11-19 14:31:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
loadmaster
kemp
1212
network
New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers
Threat Intelligence / RansomwareCybersecurity researchers have shed light on a new stealthy malwa...
2024-11-19 00:48:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
loader
remote
analysis
families
The Problem of Permissions and Non-Human Identities - Why Remediating Credentials Takes Longer Than You Think
According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having expe...
2024-11-18 22:0:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
developers
sprawl
gitguardian
identities
The Problem of Permissions and Non-Human Identities - Why Remediating Credentials Takes Longer Than You Think
According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having expe...
2024-11-18 21:50:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
developers
sprawl
identities
gitguardian
Previous
1
2
3
4
5
6
7
8
Next