unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes
Artificial Intelligence / CryptocurrencyGoogle has revealed that bad actors are leveraging techniq...
2024-11-14 22:0:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
cloaking
reviews
investment
landing
schemes
5 BCDR Oversights That Leave You Exposed to Ransomware
Ransomware isn't just a buzzword; it's one of the most dreaded challenges businesses face in this...
2024-11-14 20:10:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
ransomware
backup
unitrends
windows
cloud
TikTok Pixel Privacy Nightmare: A New Case Study
Data Privacy / ComplianceAdvertising on TikTok is the obvious choice for any company trying to rea...
2024-11-14 18:30:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
reflectiz
travel
facebook
claims
fines
New RustyAttr Malware Targets macOS Through Extended Attribute Abuse
Cryptojacking / Threat IntelligenceThreat actors have been found leveraging a new technique that a...
2024-11-14 17:51:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
malicious
ib
development
north
tauri
Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails
A newly patched security flaw impacting Windows NT LAN Manager (NTLM) was exploited as a zero-day b...
2024-11-14 13:43:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
malicious
remote
download
exploited
spark
Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disruptive Attacks Against Israel
Threat Intelligence / Cyber EspionageA threat actor affiliated with Hamas has expanded its malicio...
2024-11-14 00:9:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
hamas
israel
espionage
wirte
israeli
Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims
Ransomware / Data ProtectionRomanian cybersecurity company Bitdefender has released a free decrypt...
2024-11-13 21:38:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
bitlocker
windows
ransomware
bitdefender
Comprehensive Guide to Building a Strong Browser Security Program
Browser Security / SaaS SecurityThe rise of SaaS and cloud-based work environments has fundamental...
2024-11-13 19:0:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
leakage
threats
malicious
OvrC Platform Vulnerabilities Expose IoT Devices to Remote Attacks and Code Execution
Cloud Security / VulnerabilityA security analysis of the OvrC cloud platform has uncovered 10 vul...
2024-11-13 17:28:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
cloud
ovrc
attacker
security
Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks
Cyber Espionage / MalwareThe Iranian threat actor known as TA455 has been observed taking a leaf o...
2024-11-13 15:14:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
ta455
malicious
sandstorm
clearsky
yellow
Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs
Vulnerability / Patch TuesdayMicrosoft on Tuesday revealed that two security flaws impacting Windo...
2024-11-13 15:14:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
attacker
microsoft
security
remote
New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration
Virtualization / VulnerabilityCybersecurity researchers have disclosed new security flaws impactin...
2024-11-12 22:1:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
citrix
msmq
recording
hotfix
New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns
Email Security / Threat IntelligenceCybersecurity researchers are calling attention to a new sophi...
2024-11-12 22:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
github
goissue
visio
phishing
developer
North Korean Hackers Target macOS Using Flutter-Embedded Malware
Malware / Application SecurityThreat actors with ties to the Democratic People's Republic of Korea...
2024-11-12 21:0:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
flutter
suspect
north
korea
dart
5 Ways Behavioral Analytics is Revolutionizing Incident Response
Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a r...
2024-11-12 19:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
behavioral
socs
positives
analysis
New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks
Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an...
2024-11-12 14:0:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
ransomware
remote
attackers
ymir
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)
Cybersecurity / Hacking News⚠️ Imagine this: the very tools you trust to protect you online—your...
2024-11-11 19:57:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
windows
microsoft
New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia
In an unusually specific campaign, users searching about the legality of Bengal Cats in Australia a...
2024-11-11 19:55:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
gootloader
bengal
australia
download
cats
The ROI of Security Investments: How Cybersecurity Leaders Prove It
Cyber threats are intensifying, and cybersecurity has become critical to business operations. As se...
2024-11-11 19:30:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
pentera
teaming
dtcc
shawn
Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation
Machine Learning / VulnerabilityCybersecurity researchers have uncovered nearly two dozen security...
2024-11-11 18:11:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
attacker
mage
privileges
mlops
Previous
3
4
5
6
7
8
9
10
Next