unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Wanted Russian Cybercriminal Linked to Hive and LockBit Ransomware Has Been Arrested
2024-11-30 15:14:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
ransomware
matveev
criminal
lockbit
charged
AI-Powered Fake News Campaign Targets Western Support for Ukraine and U.S. Elections
Disinformation / Artificial IntelligenceA Moscow-based company sanctioned by the U.S. earlier this...
2024-11-29 21:17:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
network
ukraine
russia
western
Protecting Tomorrow's World: Shaping the Cyber-Physical Future
The lines between digital and physical realms increasingly blur. While this opens countless opportu...
2024-11-29 19:0:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
threats
claro
cloud
Phishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacks
Cybercrime / Cloud SecurityCybersecurity researchers are warning about malicious email campaigns l...
2024-11-29 18:6:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
phishing
microsoft
aitm
rockstar
employs
Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks
AI Security / Cloud SecurityMicrosoft has addressed four security flaws impacting its artificial i...
2024-11-29 17:34:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
microsoft
attacker
network
security
privileges
U.S. Citizen Sentenced for Spying on Behalf of China's Intelligence Agency
Corporate Espionage / National SecurityA 59-year-old U.S. citizen who immigrated from the People's...
2024-11-29 13:31:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
prc
mss
espionage
security
democracy
Over Two Dozen Flaws Identified in Advantech Industrial Wi-Fi Access Points – Patch ASAP
IoT Security / VulnerabilityNearly two dozen security vulnerabilities have been disclosed in Advan...
2024-11-29 00:57:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
eki
attacker
rogue
The Future of Serverless Security in 2025: From Logs to Runtime Protection
Cloud Security / Threat DetectionServerless environments, leveraging services such as AWS Lambda,...
2024-11-28 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
sensor
sweet
cloud
monitoring
XMLRPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner
Software Security / Data BreachCybersecurity researchers have discovered a software supply chain...
2024-11-28 18:48:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
malicious
repository
software
roblox
pypi
Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware
Windows Security / CryptominingA popular open-source game engine called Godot Engine is being mis...
2024-11-28 17:29:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
godot
windows
security
godloader
malicious
U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider
Network Security / Cyber EspionageU.S. telecom service provider T-Mobile said it recently detected...
2024-11-28 12:37:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
network
security
simon
attackers
defenses
Critical Flaw in ProjectSend Under Active Exploitation Against Public-Facing Servers
Vulnerability / Software SecurityA critical security flaw impacting the ProjectSend open-source fi...
2024-11-28 00:5:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
attacker
projectsend
vulncheck
malicious
r1605
Researchers Discover "Bootkitty" – First UEFI Bootkit Targeting Linux Kernels
Cybersecurity researchers have shed light on what has been described as the first Unified Extensibl...
2024-11-27 19:59:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
bootkit
bootkitty
blackcat
bootkits
Latest Multi-Stage Attack Scenarios with Real-World Examples
Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid d...
2024-11-27 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
malicious
phishing
stage
analysis
attackers
APT-C-60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor
Malware / Cyber EspionageThe threat actor known as APT-C-60 has been linked to a cyber attack targ...
2024-11-27 19:14:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
spyglace
bitbucket
vhdx
jpcert
statcounter
INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled
Cybercrime / Financial FraudAn INTERPOL-led operation has led to the arrest of 1,006 suspects acro...
2024-11-27 15:20:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
africa
authorities
african
interpol
ransomware
Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign
IoT Security / Network SecurityA threat actor named Matrix has been linked to a widespread distrib...
2024-11-27 13:21:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
cloud
broad
network
Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks
Vulnerability / Website SecurityTwo critical security flaws impacting the Spam protection, Anti-Sp...
2024-11-26 21:23:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
bypass
wordpress
malicious
security
10542
Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats
Pentest / Vulnerability AssessmentWhen CVEs go viral, separating critical vulnerabilities from the...
2024-11-26 19:30:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
cves
trending
intruder
hype
RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks
Vulnerability / CybercrimeThe Russia-aligned threat actor known as RomCom has been linked to the z...
2024-11-26 18:34:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
romcom
victim
microsoft
eset
shellcode
Previous
-58
-57
-56
-55
-54
-53
-52
-51
Next