unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign
2024-11-22 00:22:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
palo
9474
0012
alto
Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor
2024-11-21 23:50:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
wolfsbane
firewood
gelsemium
eset
Šperka
10 Most Impactful PAM Use Cases for Enhancing Organizational Security
Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM...
2024-11-21 20:23:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
pam
privileged
security
syteca
monitoring
North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs
Threat actors with ties to the Democratic People's Republic of Korea (DPRK) are impersonating U.S.-...
2024-11-21 20:4:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
sta
0237
north
software
dprk
Cyber Story Time: The Boy Who Cried "Secure!"
As a relatively new security category, many security operators and executives I've met have asked...
2024-11-21 19:30:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
wolf
asv
security
town
shepherd
Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online
New research has uncovered more than 145,000 internet-exposed Industrial Control Systems (ICS) acro...
2024-11-21 19:0:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
modbus
hmis
censys
america
security
5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme
Cryptocurrency / Identity TheftFive alleged members of the infamous Scattered Spider cybercrime cr...
2024-11-21 17:16:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
buchanan
phishing
defendants
evans
florida
Google's AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects
Artificial Intelligence / Software SecurityGoogle has revealed that its AI-powered fuzzing tool, O...
2024-11-21 15:13:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
memory
security
software
hardened
NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data
Threat hunters are warning about an updated version of the Python-based NodeStealer that's now equi...
2024-11-21 14:34:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
facebook
nodestealer
security
clickfix
windows
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
Payment Security / CybercrimeThreat actors are increasingly banking on a new technique that levera...
2024-11-20 21:9:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
tap
atm
fraudulent
transmit
NHIs Are the Future of Cybersecurity: Meet NHIDR
Identity Security / Cyber DefenseThe frequency and sophistication of modern cyberattacks are surgi...
2024-11-20 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
nhidr
security
nhis
proactive
identities
Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package
Multiple decade-old security vulnerabilities have been disclosed in the needrestart package install...
2024-11-20 17:16:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
needrestart
attacker
interpreter
scandeps
Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity
Endpoint Security / AI ResearchMicrosoft has announced a new Windows Resiliency Initiative as a wa...
2024-11-20 15:0:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
windows
microsoft
initiative
pcs
China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks
Cyber Espionage / Telecom SecurityA new China-linked cyber espionage group has been attributed as...
2024-11-20 14:58:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
network
liminal
security
panda
Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities
Apple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to...
2024-11-20 12:37:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
inch
3rd
addressed
44308
macs
Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation
Software Security / VulnerabilityOracle is warning that a high-severity security flaw impacting th...
2024-11-20 12:24:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
exploited
security
crowdstrike
plm
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices
The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSO...
2024-11-19 22:1:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
proxy
nsocks
ngioweb
c2
residential
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts
Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ri...
2024-11-19 22:0:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
sports
security
ffmpeg
notebooks
firm
Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority
Insider Threat / Credential SecurityPrivileged accounts are well-known gateways for potential secu...
2024-11-19 19:30:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
privileged
security
pam
monitoring
threats
New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems
Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain...
2024-11-19 17:40:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
ransomware
helldown
interlock
lockbit
analysis
Previous
0
1
2
3
4
5
6
7
Next