unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Future of Serverless Security in 2025: From Logs to Runtime Protection
Cloud Security / Threat DetectionServerless environments, leveraging services such as AWS Lambda,...
2024-11-28 19:30:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
sensor
sweet
cloud
monitoring
XMLRPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner
Software Security / Data BreachCybersecurity researchers have discovered a software supply chain...
2024-11-28 18:48:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
malicious
repository
software
roblox
pypi
Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware
Windows Security / CryptominingA popular open-source game engine called Godot Engine is being mis...
2024-11-28 17:29:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
godot
windows
security
godloader
malicious
U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider
Network Security / Cyber EspionageU.S. telecom service provider T-Mobile said it recently detected...
2024-11-28 12:37:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
network
security
simon
attackers
defenses
Critical Flaw in ProjectSend Under Active Exploitation Against Public-Facing Servers
Vulnerability / Software SecurityA critical security flaw impacting the ProjectSend open-source fi...
2024-11-28 00:5:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
attacker
projectsend
vulncheck
malicious
r1605
Researchers Discover "Bootkitty" – First UEFI Bootkit Targeting Linux Kernels
Cybersecurity researchers have shed light on what has been described as the first Unified Extensibl...
2024-11-27 19:59:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
bootkit
bootkitty
blackcat
bootkits
Latest Multi-Stage Attack Scenarios with Real-World Examples
Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid d...
2024-11-27 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
malicious
phishing
stage
analysis
attackers
APT-C-60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor
Malware / Cyber EspionageThe threat actor known as APT-C-60 has been linked to a cyber attack targ...
2024-11-27 19:14:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
spyglace
bitbucket
vhdx
jpcert
statcounter
INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled
Cybercrime / Financial FraudAn INTERPOL-led operation has led to the arrest of 1,006 suspects acro...
2024-11-27 15:20:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
africa
authorities
african
interpol
ransomware
Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign
IoT Security / Network SecurityA threat actor named Matrix has been linked to a widespread distrib...
2024-11-27 13:21:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
cloud
broad
network
Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks
Vulnerability / Website SecurityTwo critical security flaws impacting the Spam protection, Anti-Sp...
2024-11-26 21:23:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
bypass
wordpress
malicious
security
10542
Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats
Pentest / Vulnerability AssessmentWhen CVEs go viral, separating critical vulnerabilities from the...
2024-11-26 19:30:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
cves
trending
intruder
hype
RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks
Vulnerability / CybercrimeThe Russia-aligned threat actor known as RomCom has been linked to the z...
2024-11-26 18:34:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
romcom
victim
microsoft
eset
shellcode
Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries
The China-linked threat actor known as Earth Estries has been observed using a previously undocumen...
2024-11-26 18:19:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
earth
estries
ghostspider
security
CISA Urges Agencies to Patch Critical "Array Networks" Flaw Amid Active Attacks
Vulnerability / Network SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) o...
2024-11-26 13:3:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
exploited
kasha
ag
earth
Google's New Restore Credentials Tool Simplifies App Login After Android Migration
Mobile Security / PrivacyGoogle has introduced a new feature called Restore Credentials to help us...
2024-11-25 22:22:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
backup
cloud
developers
PyPI Python Library "aiocpa" Found Exfiltrating Crypto Keys via Telegram Bot
Software Supply Chain / MalwareThe administrators of the Python Package Index (PyPI) repository ha...
2024-11-25 21:54:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
malicious
library
python
repository
software
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 - Nov 24)
Cybersecurity / Critical UpdatesWe hear terms like "state-sponsored attacks" and "critical vulnera...
2024-11-25 19:30:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
threats
ransomware
Flying Under the Radar - Security Evasion Techniques
Dive into the evolution of phishing and malware evasion techniques and understand how attackers ar...
2024-11-25 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
phishing
attackers
security
defenders
microsoft
Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks
Cloud Security / Supply Chain AttackCybersecurity researchers have disclosed two new attack techni...
2024-11-25 19:24:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
opa
malicious
cloud
attacker
tenable
Previous
-39
-38
-37
-36
-35
-34
-33
-32
Next