unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign
IoT Security / Network SecurityA threat actor named Matrix has been linked to a widespread distrib...
2024-11-27 13:21:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
security
cloud
broad
network
Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks
Vulnerability / Website SecurityTwo critical security flaws impacting the Spam protection, Anti-Sp...
2024-11-26 21:23:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
bypass
wordpress
malicious
security
10542
Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats
Pentest / Vulnerability AssessmentWhen CVEs go viral, separating critical vulnerabilities from the...
2024-11-26 19:30:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
cves
trending
intruder
hype
RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks
Vulnerability / CybercrimeThe Russia-aligned threat actor known as RomCom has been linked to the z...
2024-11-26 18:34:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
romcom
victim
microsoft
eset
shellcode
Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries
The China-linked threat actor known as Earth Estries has been observed using a previously undocumen...
2024-11-26 18:19:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
earth
estries
ghostspider
security
CISA Urges Agencies to Patch Critical "Array Networks" Flaw Amid Active Attacks
Vulnerability / Network SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) o...
2024-11-26 13:3:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
exploited
kasha
ag
earth
Google's New Restore Credentials Tool Simplifies App Login After Android Migration
Mobile Security / PrivacyGoogle has introduced a new feature called Restore Credentials to help us...
2024-11-25 22:22:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
backup
cloud
developers
PyPI Python Library "aiocpa" Found Exfiltrating Crypto Keys via Telegram Bot
Software Supply Chain / MalwareThe administrators of the Python Package Index (PyPI) repository ha...
2024-11-25 21:54:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
malicious
library
python
repository
software
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 - Nov 24)
Cybersecurity / Critical UpdatesWe hear terms like "state-sponsored attacks" and "critical vulnera...
2024-11-25 19:30:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
threats
ransomware
Flying Under the Radar - Security Evasion Techniques
Dive into the evolution of phishing and malware evasion techniques and understand how attackers ar...
2024-11-25 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
phishing
attackers
security
defenders
microsoft
Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks
Cloud Security / Supply Chain AttackCybersecurity researchers have disclosed two new attack techni...
2024-11-25 19:24:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
opa
malicious
cloud
attacker
tenable
Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections
Malware / Windows SecurityCybersecurity researchers have uncovered a new malicious campaign that l...
2024-11-25 17:16:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
processes
terminate
byovd
drops
Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites
Cloud Security / Threat IntelligenceGovernment agencies and non-governmental organizations in the...
2024-11-23 20:10:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
2077
newswire
microsoft
glassbridge
inauthentic
North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn
Artificial Intelligence / CryptocurrencyThe North Korea-linked threat actor known as Sapphire Slee...
2024-11-23 19:53:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
north
korea
sapphire
sleet
microsoft
APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware
The threat actor known as Mysterious Elephant has been observed using an advanced version of malwar...
2024-11-23 00:59:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
asyncshell
elephant
knownsec
mysterious
c2
China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign
Cyber Espionage / MalwareA China-linked nation-state group called TAG-112 compromised Tibetan medi...
2024-11-23 00:47:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
tibetan
security
cobalt
malicious
espionage
Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia
Cyber Espionage / MalwareThreat actors with ties to Russia have been linked to a cyber espionage c...
2024-11-22 20:6:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
russia
ukraine
cherryspy
hatvibe
espionage
Unlocking Google Workspace Security: Are You Doing Enough to Protect Your Data?
Google Workspace has quickly become the productivity backbone for businesses worldwide, offering an...
2024-11-22 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
backup
backupify
cloud
phishing
Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks
Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent acti...
2024-11-22 17:37:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
microsoft
phishing
popeyetools
onnx
doj
PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries
Artificial Intelligence / MalwareCybersecurity researchers have discovered two malicious packages...
2024-11-22 14:15:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
github
repository
malicious
claude
Previous
-26
-25
-24
-23
-22
-21
-20
-19
Next