unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How To Get the Most From Your Security Team’s Email Alert Budget
We'll TL;DR the FUDdy introduction: we all know that phishing attacks are on the rise in scale and...
2024-7-31 18:42:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
security
positives
detections
budget
phishing
Cybercriminals Deploy 100K+ Malware Android Apps to Steal OTP Codes
Mobile Security / Malware A new malicious campaign has been observed making use of malicious Androi...
2024-7-31 18:1:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
malicious
c2
phishing
security
otps
Cyber Espionage Group XDSpy Targets Companies in Russia and Moldova
Cyber Espionage / Threat IntelligenceCompanies in Russia and Moldova have been the target of a phi...
2024-7-31 17:37:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
phishing
xdspy
emergency
belarusian
Meta Settles for $1.4 Billion with Texas Over Illegal Biometric Data Collection
Meta, the parent company of Facebook, Instagram, and WhatsApp, agreed to a record $1.4 billion sett...
2024-7-31 12:38:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
biometric
facial
texans
settlement
texas
New Mandrake Spyware Found in Google Play Store Apps After Two Years
Mobile Security / SpywareA new iteration of a sophisticated Android spyware called Mandrake has be...
2024-7-30 21:4:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
mandrake
malicious
bypass
astro
c2
The Power and Peril of RMM Tools
As more people work remotely, IT departments must manage devices distributed over different cities...
2024-7-30 19:26:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
rmm
network
attackers
varonis
publisher
Cybercriminals Target Polish Businesses with Agent Tesla and Formbook Malware
Cybersecurity researchers have detailed widespread phishing campaigns targeting small and medium-si...
2024-7-30 19:6:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
dbatloader
attackers
eset
remcos
Cyber Threat Intelligence: Illuminating the Deep, Dark Cybercriminal Underground
Learn about critical threats that can impact your organization and the bad actors behind them from...
2024-7-30 18:50:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
underground
analysis
ransomware
malicious
New SideWinder Cyber Attacks Target Maritime Facilities in Multiple Countries
Cyber Espionage / MalwareThe nation-state threat actor known as SideWinder has been attributed to...
2024-7-30 15:32:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
spear
phishing
security
microsoft
malicious
OneDrive Phishing Scam Tricks Users into Running Malicious PowerShell Script
Cybersecurity researchers are warning about a new phishing campaign that targets Microsoft OneDrive...
2024-7-30 14:45:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
microsoft
phishing
mpeg
segs
windows
VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access
A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by "...
2024-7-30 12:20:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
ransomware
hypervisors
systembc
unc4393
software
Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild
Enterprise Security / Data ProtectionCybersecurity company Acronis is warning that a now-patched c...
2024-7-30 00:17:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
aci
security
exploited
acronis
threats
Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing...
2024-7-29 21:19:0 | 阅读: 37 |
收藏
|
The Hacker News - thehackernews.com
proofpoint
tenants
microsoft
relayed
spoofed
How Searchable Encryption Changes the Data Security Game
Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity...
2024-7-29 18:40:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
encryption
searchable
database
unencrypted
security
'Stargazer Goblin' Creates 3,000 Fake GitHub Accounts for Malware Spread
A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fue...
2024-7-29 15:5:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
repository
github
network
malicious
stealer
Gh0st RAT Trojan Targets Chinese Windows Users via Fake Chrome Site
Cybersecurity / Cyber EspionageThe remote access trojan known as Gh0st RAT has been observed being...
2024-7-29 12:56:0 | 阅读: 133 |
收藏
|
The Hacker News - thehackernews.com
gh0st
security
malicious
chrome
download
French Authorities Launch Operation to Remove PlugX Malware from Infected Systems
Malware / Cyber IntelligenceFrench judicial authorities, in collaboration with Europol, have launc...
2024-7-27 14:9:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
plugx
sekoia
paris
worm
Malicious PyPI Package Targets macOS to Steal Google Cloud Credentials
Cybersecurity / Cloud SecurityCybersecurity researchers have discovered a malicious package on the...
2024-7-27 13:47:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
malicious
cloud
predefined
python
This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps
A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with ma...
2024-7-26 21:17:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
phishing
malicious
kits
otp
Offensive AI: The Sine Qua Non of Cybersecurity
Digital Warfare / Cybersecurity Training"Peace is the virtue of civilization. War is its crime. Ye...
2024-7-26 19:0:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
development
creeper
threats
security
Previous
29
30
31
32
33
34
35
36
Next