unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites
Cloud Security / Threat IntelligenceGovernment agencies and non-governmental organizations in the...
2024-11-23 20:10:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
2077
newswire
microsoft
glassbridge
inauthentic
North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn
Artificial Intelligence / CryptocurrencyThe North Korea-linked threat actor known as Sapphire Slee...
2024-11-23 19:53:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
north
korea
sapphire
sleet
microsoft
APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware
The threat actor known as Mysterious Elephant has been observed using an advanced version of malwar...
2024-11-23 00:59:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
asyncshell
elephant
knownsec
mysterious
c2
China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign
Cyber Espionage / MalwareA China-linked nation-state group called TAG-112 compromised Tibetan medi...
2024-11-23 00:47:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
tibetan
security
cobalt
malicious
espionage
Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia
Cyber Espionage / MalwareThreat actors with ties to Russia have been linked to a cyber espionage c...
2024-11-22 20:6:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
russia
ukraine
cherryspy
hatvibe
espionage
Unlocking Google Workspace Security: Are You Doing Enough to Protect Your Data?
Google Workspace has quickly become the productivity backbone for businesses worldwide, offering an...
2024-11-22 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
backup
backupify
cloud
phishing
Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks
Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent acti...
2024-11-22 17:37:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
microsoft
phishing
popeyetools
onnx
doj
PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries
Artificial Intelligence / MalwareCybersecurity researchers have discovered two malicious packages...
2024-11-22 14:15:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
github
repository
malicious
claude
Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign
Vulnerability / Cyber AttackAs many as 2,000 Palo Alto Networks devices are estimated to have been...
2024-11-22 00:22:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
palo
9474
0012
alto
Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor
Cyber Espionage / MalwareThe China-aligned advanced persistent threat (APT) actor known as Gelsemi...
2024-11-21 23:50:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
wolfsbane
firewood
gelsemium
eset
Šperka
10 Most Impactful PAM Use Cases for Enhancing Organizational Security
Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM...
2024-11-21 20:23:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
pam
privileged
security
syteca
monitoring
North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs
Threat actors with ties to the Democratic People's Republic of Korea (DPRK) are impersonating U.S.-...
2024-11-21 20:4:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
sta
0237
north
software
dprk
Cyber Story Time: The Boy Who Cried "Secure!"
As a relatively new security category, many security operators and executives I've met have asked...
2024-11-21 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
wolf
asv
security
town
shepherd
Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online
New research has uncovered more than 145,000 internet-exposed Industrial Control Systems (ICS) acro...
2024-11-21 19:0:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
modbus
hmis
censys
america
security
5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme
Cryptocurrency / Identity TheftFive alleged members of the infamous Scattered Spider cybercrime cr...
2024-11-21 17:16:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
buchanan
phishing
defendants
evans
florida
Google's AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects
Artificial Intelligence / Software SecurityGoogle has revealed that its AI-powered fuzzing tool, O...
2024-11-21 15:13:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
memory
security
software
hardened
NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data
Threat hunters are warning about an updated version of the Python-based NodeStealer that's now equi...
2024-11-21 14:34:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
facebook
nodestealer
security
clickfix
windows
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
Payment Security / CybercrimeThreat actors are increasingly banking on a new technique that levera...
2024-11-20 21:9:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
tap
atm
fraudulent
transmit
NHIs Are the Future of Cybersecurity: Meet NHIDR
Identity Security / Cyber DefenseThe frequency and sophistication of modern cyberattacks are surgi...
2024-11-20 19:30:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
nhidr
security
nhis
proactive
identities
Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package
Multiple decade-old security vulnerabilities have been disclosed in the needrestart package install...
2024-11-20 17:16:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
needrestart
attacker
interpreter
scandeps
Previous
-4
-3
-2
-1
0
1
2
3
Next