unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data
The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored...
2024-8-23 18:24:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
ransomware
attackers
disruption
chrome
network
New macOS Malware "Cthulhu Stealer" Targets Apple Users' Data
Endpoint Security / Data PrivacyCybersecurity researchers have uncovered a new information stealer...
2024-8-23 13:1:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
stealer
cthulhu
software
security
developer
Latvian Hacker Extradited to U.S. for Role in Karakurt Cybercrime Group
A 33-year-old Latvian national living in Moscow, Russia, has been charged in the U.S. for allegedly...
2024-8-23 12:38:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
sforza
zolotarjovs
karakurt
victim
extortion
Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide
Hardware Security / Supply Chain AttackCybersecurity researchers have uncovered a hardware backdoo...
2024-8-23 00:46:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
doors
fm11rf08s
diversified
hotel
rfid
Hardcoded Credential Vulnerability Found in SolarWinds Web Help Desk
Vulnerability / Network SecuritySolarWinds has issued patches to address a new security flaw in it...
2024-8-23 00:35:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
security
software
desk
whd
28987
Chinese Hackers Exploit Zero-Day Cisco Switch Flaw to Gain System Control
Network Security / Zero-DayDetails have emerged about a China-nexus threat group's exploitation of...
2024-8-23 00:13:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
network
20399
security
appliances
ant
New 'ALBeast' Vulnerability Exposes Weakness in AWS Application Load Balancer
Cloud Security / Application SecurityAs many as 15,000 applications using Amazon Web Services' (AW...
2024-8-22 23:3:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
security
alb
balancer
signer
The Facts About Continuous Penetration Testing and Why It’s Important
What is Continuous Attack Surface Penetration Testing or CASPT?Continuous Penetration Testing or C...
2024-8-22 18:3:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
security
caspt
teaming
posture
Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild
Browser Security / VulnerabilityGoogle has rolled out security fixes to address a high-severity se...
2024-8-22 13:19:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
confusion
pwn2own
chrome
security
Critical Flaw in WordPress LiteSpeed Cache Plugin Allows Hackers Admin Access
Website Security / VulnerabilityCybersecurity researchers have disclosed a critical security flaw...
2024-8-22 13:2:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
security
wordpress
litespeed
spoof
malicious
GitHub Patches Critical Security Flaw in Enterprise Server Granting Admin Privileges
Enterprise Software / VulnerabilityGitHub has released fixes to address a set of three security fl...
2024-8-22 12:48:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
github
security
attacker
privileges
New Malware PG_MEM Targets PostgreSQL Databases for Crypto Mining
Database Security / CryptocurrencyCybersecurity researchers have unpacked a new malware strain dub...
2024-8-22 12:31:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
database
pg
security
morag
passwords
Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data
Software Security / VulnerabilityCybersecurity researchers have disclosed a critical security flaw...
2024-8-22 00:15:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
microsoft
copilot
security
ssrf
tenants
North Korean Hackers Deploy New MoonPeak Trojan in Cyber Campaign
Cyber Espionage / MalwareA new remote access trojan called MoonPeak has been discovered as being u...
2024-8-21 23:37:0 | 阅读: 30 |
收藏
|
The Hacker News - thehackernews.com
moonpeak
c2
5394
uat
talos
It's Time To Untangle the SaaS Ball of Yarn
It's no great revelation to say that SaaS applications have changed the way we operate, both in our...
2024-8-21 19:11:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
shadow
cloud
monitoring
Styx Stealer Creator's OPSEC Fail Leaks Client List and Profit Details
Cyber Espionage / Threat IntelligenceIn what's a case of an operational security (OPSEC) lapse, th...
2024-8-21 19:10:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
stealer
sty1x
styx
redline
analysis
New macOS Malware TodoSwift Linked to North Korean Hacking Groups
Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say...
2024-8-21 19:0:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
rustbucket
stage
kandykorn
dprk
security
CERT-UA Warns of New Vermin-Linked Phishing Attacks with PoW Bait
Cyber Warfare / Threat IntelligenceThe Computer Emergency Response Team of Ukraine (CERT-UA) has w...
2024-8-21 13:28:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
spectr
vermin
phishing
sicksync
GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk
WordPress / CybersecurityA maximum-severity security flaw has been disclosed in the WordPress Give...
2024-8-21 12:35:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
wordpress
security
attackers
php
donation
Detecting AWS Account Compromise: Key Indicators in CloudTrail Logs for Stolen API Keys
Cybersecurity / Cloud SecurityAs cloud infrastructure becomes the backbone of modern enterprises,...
2024-8-21 04:13:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
cloudtrail
unusual
monitoring
attacker
Previous
23
24
25
26
27
28
29
30
Next