unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Progress Software Releases Patches for 6 Flaws in WhatsUp Gold – Patch Now
Software Security / VulnerabilityProgress Software has released another round of updates to addres...
2024-9-27 23:44:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
whatsup
security
gold
software
8785
Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution
A new set of security vulnerabilities has been disclosed in the OpenPrinting Common Unix Printing S...
2024-9-27 20:33:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
cups
malicious
attacker
ipp
How to Plan and Prepare for Penetration Testing
As security technology and threat awareness among organizations improves so do the adversaries who...
2024-9-27 19:26:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
identify
guidelines
network
Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks
The threat actor known as Storm-0501 has targeted government, manufacturing, transportation, and la...
2024-9-27 19:11:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
ransomware
cloud
premises
microsoft
embargo
Cybersecurity Certifications: The Gateway to Career Advancement
Cybersecurity CertificationsIn today's fast-evolving digital landscape, cybersecurity has become a...
2024-9-27 17:4:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
certified
employers
competitive
New HTML Smuggling Campaign Delivers DCRat Malware to Russian-Speaking Users
Russian-speaking users have been targeted as part of a new campaign distributing a commodity trojan...
2024-9-27 17:0:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
payload
malicious
victim
dcrat
genai
U.S. Sanctions Two Crypto Exchanges for Facilitating Cybercrime and Money Laundering
The U.S. government on Thursday sanctioned two cryptocurrency exchanges and unsealed an indictment...
2024-9-27 15:47:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
cryptex
laundering
pm2btc
illicit
uaps
Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers
Container Security / Cloud ComputingA critical security flaw has been disclosed in the NVIDIA Cont...
2024-9-27 13:54:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
nvidia
security
attacker
sockets
privileges
Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates
Automotive Industry / TechnologyCybersecurity researchers have disclosed a set of now patched vuln...
2024-9-27 00:2:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
vehicle
victim
kia
attacker
vin
Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar
Threat Detection / IT SecurityImagine trying to find a needle in a haystack, but the haystack is o...
2024-9-26 20:28:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
haystack
webinar
endless
insider
N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks
Threat actors with ties to North Korea have been observed leveraging two new malware strains dubbed...
2024-9-26 20:28:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
fpspy
klogexe
pisces
sparkling
korea
EPSS vs. CVSS: What’s the Best Approach to Vulnerability Prioritization?
Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vu...
2024-9-26 19:0:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
epss
scores
exploited
Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware
Cyber Espionage / Mobile SecurityAs many as 25 websites linked to the Kurdish minority have been c...
2024-9-26 18:43:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
kurdish
sekoia
rojnews
security
malicious
Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities
Cloud Security / Cyber EspionageAn advanced threat actor with an India nexus has been observed usi...
2024-9-26 14:18:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
ares
harvesting
pakistan
docscanner
Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign
Cyber Espionage / HackingNation-state threat actors backed by Beijing broke into a "handful" of U....
2024-9-26 12:49:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
isps
espionage
typhoon
beijing
Google's Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%
Secure Coding / Mobile SecurityGoogle has revealed that its transition to memory-safe languages su...
2024-9-26 01:0:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
memory
security
development
focusing
Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent
Data Protection / Online TrackingVienna-based privacy non-profit noyb (short for None Of Your Busi...
2024-9-25 22:12:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
ppa
mozilla
noyb
advertisers
preserving
Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool
Penetration Testing / Cyber ThreatCybersecurity researchers have flagged the discovery of a new po...
2024-9-25 20:38:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
splinter
injection
reichel
security
c2
Expert Tips on How to Spot a Phishing Link
Phishing attacks are becoming more advanced and harder to detect, but there are still telltale sign...
2024-9-25 19:20:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
phishing
attackers
microsoft
analysis
Agentic AI in SOCs: A Solution to SOAR's Unfulfilled Promises
Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revoluti...
2024-9-25 17:50:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
agentic
soar
triage
Previous
14
15
16
17
18
19
20
21
Next