unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Meta to Train AI Models Using Public U.K. Facebook and Instagram Posts
Artificial Intelligence / Regulatory ComplianceMeta has announced that it will begin training its...
2024-9-17 19:56:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
generative
facebook
regulatory
objection
european
How to Investigate ChatGPT activity in Google Workspace
GenAI Security / SaaS SecuritySince launching ChatGPT in 2022, OpenAI has defied expectations with...
2024-9-17 19:0:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
genai
chatgpt
nudge
Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users
Cryptocurrency exchange Binance is warning of an "ongoing" global threat that's targeting cryptocur...
2024-9-17 15:18:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
clipboard
unofficial
cryware
software
attacker
SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks
Software Security / Data ProtectionSolarWinds has released fixes to address two security flaws in...
2024-9-17 12:34:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
remote
zdi
security
software
Google Fixes GCP Composer Flaw That Could've Led to Remote Code Execution
Cloud Security / VulnerabilityA now-patched critical security flaw impacting Google Cloud Platform...
2024-9-16 21:7:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
repository
cloud
confusion
security
malicious
North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware
Financial Security / MalwareCybersecurity researchers are continuing to warn about North Korean th...
2024-9-16 20:0:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
rustdoor
korean
north
malicious
From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook
Identity Protection / Incident ResponseImagine this... You arrive at work to a chaotic scene. Syst...
2024-9-16 19:33:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
playbook
identities
attackers
security
identify
Master Your PCI DSS v4 Compliance with Innovative Smart Approvals
Payment Security / Data ProtectionThe PCI DSS landscape is evolving rapidly. With the Q1 2025 dead...
2024-9-16 19:5:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
reflectiz
security
dss
monitoring
approvals
Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure
Spyware / Threat IntelligenceApple has filed a motion to "voluntarily" dismiss its lawsuit against...
2024-9-16 15:12:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
spyware
lawsuit
filed
motion
israel
Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks
Cybersecurity researchers have warned of ongoing phishing campaigns that abuse refresh entries in H...
2024-9-16 12:23:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
phishing
victim
malicious
funds
attackers
Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability
Enterprise Security / Threat IntelligenceIvanti has revealed that a newly patched security flaw in...
2024-9-14 12:12:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
ivanti
csa
remote
security
appliance
Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers
Virtual Reality / VulnerabilityDetails have emerged about a now-patched security flaw impacting Ap...
2024-9-13 21:51:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
gaze
avatar
gazeploit
persona
typing
17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London
British authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyb...
2024-9-13 21:29:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
tfl
scattered
spider
cloud
crime
Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft
Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthori...
2024-9-13 19:17:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
phishing
security
resistant
eliminate
TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud
Financial Fraud / Mobile SecurityCybersecurity researchers have uncovered a new variant of an Andr...
2024-9-13 19:17:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
trickmo
security
analysis
malicious
Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw
Software Security / Threat IntelligenceMalicious actors are likely leveraging publicly available p...
2024-9-13 19:4:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
remote
security
gold
whatsup
software
New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency
Enterprise Security / VulnerabilityCybersecurity researchers have uncovered a new malware campaign...
2024-9-13 13:39:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
hadooken
aeza
security
miner
tsunami
New Android Malware 'Ajina.Banker' Steals Financial Data and Bypasses 2FA via Telegram
Mobile Security / Financial FraudBank customers in the Central Asia region have been targeted by a...
2024-9-13 00:12:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
network
chats
ajina
banker
security
Urgent: GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Execution
DevSecOps / VulnerabilityGitLab on Wednesday released security updates to address 17 security vuln...
2024-9-12 23:55:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
gitlab
security
6678
attacker
noting
Beware: New Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwide
Nearly 1.3 million Android-based TV boxes running outdated versions of the operating system and bel...
2024-9-12 21:46:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
vo1d
debuggerd
wd
nhg47k
doctor
Previous
17
18
19
20
21
22
23
24
Next