unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How Phishing Attacks Adapt Quickly to Capitalize on Current Events
In 2023, no fewer than 94 percent of businesses were impacted by phishing attacks, a 40 percent inc...
2024-8-12 19:20:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
phishing
crowdstrike
phaas
olympics
malicious
Researchers Uncover Vulnerabilities in Solarman and Deye Solar Systems
Critical Infrastructure / VulnerabilityCybersecurity researchers have identified a number of secur...
2024-8-12 18:30:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
deye
solarman
blackouts
attackers
The AI Hangover is Here – The End of the Beginning
After a good year of sustained exuberance, the hangover is finally here. It's a gentle one (for now...
2024-8-12 18:18:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
generative
governance
llms
players
FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability
Cybersecurity / Network SecurityThe maintainers of the FreeBSD Project have released security upda...
2024-8-12 18:15:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
sshd
freebsd
openssh
remote
privileged
Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks
Operational Technology / Network SecuritySecurity vulnerabilities have been disclosed in the indus...
2024-8-12 14:57:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
cosy
talk2m
openvpn
security
attacker
EastWind Attack Deploys PlugY and GrewApacha Backdoors Using Booby-Trapped LNK Files
The Russian government and IT organizations are the target of a new campaign that delivers a number...
2024-8-12 11:43:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
worm
plugy
dropbox
grewapacha
Rogue PyPI Library Solana Users, Steals Blockchain Wallet Keys
Supply Chain / Software SecurityCybersecurity researchers have discovered a new malicious package...
2024-8-11 18:1:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
solana
pypi
python
malicious
tea
Researchers Uncover 10 Flaws in Google's File Transfer Tool Quick Share
Vulnerability / Mobile SecurityAs many as 10 security flaws have been uncovered in Google's Quick...
2024-8-11 03:0:0 | 阅读: 20 |
收藏
|
The Hacker News - thehackernews.com
windows
security
remote
safebreach
attacker
New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions
Browser Security / Online FraudAn ongoing, widespread malware campaign has been observed installin...
2024-8-10 22:30:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
trojan
microsoft
malicious
chrome
reasonlabs
Microsoft Warns of Unpatched Office Vulnerability Leading to Data Breaches
Vulnerability / Enterprise SecurityMicrosoft has disclosed an unpatched zero-day in Office that, i...
2024-8-10 13:35:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
microsoft
windows
security
exploited
editions
Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers
Cloud Security / Data ProtectionCybersecurity researchers have discovered multiple critical flaws...
2024-8-10 05:40:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
buckets
codestar
glue
attackers
Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE
Vulnerability / Network SecurityMicrosoft on Thursday disclosed four medium-severity security flaw...
2024-8-10 02:18:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
lpe
attacker
openvpn
windows
chained
New Flaws in Sonos Smart Speakers Allow Hackers to Eavesdrop on Users
IoT Security / Wireless SecurityCybersecurity researchers have uncovered weaknesses in Sonos smart...
2024-8-9 21:18:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
sonos
security
firmware
remote
pkfail
DOJ Charges Nashville Man for Helping North Koreans Get U.S. Tech Jobs
National Security / Identity TheftThe U.S. Department of Justice (DoJ) on Thursday charged a 38-ye...
2024-8-9 15:12:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
knoot
north
remote
conspiracy
farm
CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature
Vulnerability / Network SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) h...
2024-8-9 13:41:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
attacker
passwords
network
security
software
University Professors Targeted by North Korean Cyber Espionage Group
Cyber Attack / Cyber EspionageThe North Korea-linked threat actor known as Kimsuky has been linked...
2024-8-8 23:31:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
phishing
north
dinosaur
resilience
security
0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices
Vulnerability / Browser SecurityCybersecurity researchers have discovered a new "0.0.0.0 Day" impa...
2024-8-8 21:25:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
security
network
oligo
malicious
attackers
Automated Security Validation: One (Very Important) Part of a Complete CTEM Framework
The last few years have seen more than a few new categories of security solutions arise in hopes of...
2024-8-8 19:0:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
asv
security
ctem
exposures
Windows Downgrade Attack Risks Exposing Patched Systems to Old Vulnerabilities
Windows Security / VulnerabilityMicrosoft said it is developing security updates to address two lo...
2024-8-8 18:5:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
windows
downgrade
security
leviev
New Phishing Scam Uses Google Drawings and WhatsApp Shortened Links
Network Security / Cloud SecurityCybersecurity researchers have discovered a novel phishing campai...
2024-8-8 17:41:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
phishing
drawings
microsoft
vamshi
Previous
26
27
28
29
30
31
32
33
Next