unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured Redis ser...
2024-6-27 22:31:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
ransomware
miner
p2pinfect
security
network
The Secrets of Hidden AI Training on Your Data
While some SaaS threats are clear and visible, others are hidden in plain sight, both posing signif...
2024-6-27 19:40:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
ensuring
wing
regulations
How to Use Python to Build Secure Blockchain Applications
Did you know it's now possible to build blockchain applications, known also as decentralized applic...
2024-6-27 17:30:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
blockchain
python
algokit
development
algorand
Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks
Artificial Intelligence / VulnerabilityCybersecurity researchers have disclosed a high-severity se...
2024-6-27 17:4:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
jailbreak
library
vanna
injection
security
Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion
Cyber Crime / Cyber WarfareA 22-year-old Russian national has been indicted in the U.S. for his al...
2024-6-27 15:41:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
ukraine
felix
invasion
convicted
doj
Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application
Vulnerability / Enterprise SecurityA critical security flaw has been disclosed in Fortra FileCatal...
2024-6-27 14:45:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
attacker
fortra
jobid
anonymous
New MOVEit Transfer Vulnerability Under Active Exploitation - Patch ASAP!
Vulnerability / Data ProtectionA newly disclosed critical security flaw impacting Progress Softwar...
2024-6-26 22:57:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
moveit
security
sftp
bypass
Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware
Threat actors with suspected ties to China and North Korea have been linked to ransomware and data...
2024-6-26 18:13:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
ransomware
north
chamelgang
espionage
Practical Guidance For Securing Your Software Supply Chain
The heightened regulatory and legal pressure on software-producing organizations to secure their su...
2024-6-26 17:52:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
software
security
sboms
artifacts
chains
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
Firmware Security / VulnerabilityApple has released a firmware update for AirPods that could allow...
2024-6-26 17:36:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
firmware
animated
headphones
6f8
pickren
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
Web Skimming / Website SecurityMultiple content management system (CMS) platforms like WordPress,...
2024-6-26 16:37:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
php
skimmer
wordpress
malicious
caesar
New Medusa Android Trojan Targets Banking Users Across 7 Countries
Android Security / Threat IntelligenceCybersecurity researchers have discovered an updated version...
2024-6-26 15:38:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
medusa
overlay
victim
trojan
turkey
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
Supply Chain Attack / Web SecurityGoogle has taken steps to block ads for e-commerce sites that us...
2024-6-26 12:24:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
polyfill
security
library
sansec
funnull
New Attack Technique Exploits Microsoft Management Console Files
Vulnerability / Threat DetectionThreat actors are exploiting a novel attack technique in the wild...
2024-6-25 18:42:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
msc
microsoft
security
mmc
apds
How to Cut Costs with a Browser Security Platform
Browser Security / Endpoint SecurityBrowser security is becoming increasingly popular, as organiza...
2024-6-25 17:42:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
layerx
preventing
malicious
ciso
New Cyberthreat 'Boolka' Deploying BMANAGER Trojan via SQLi Attacks
Data Theft / Web SecurityA previously undocumented threat actor dubbed Boolka has been observed co...
2024-6-25 17:30:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
boolka
injection
trojan
bmanager
malicious
Wikileaks' Julian Assange Released from U.K. Prison, Heads to Australia
National Security / WikileakWikiLeaks founder Julian Assange has been freed in the U.K. and has de...
2024-6-25 13:3:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
assange
security
wikileaks
prison
sentenced
4 FIN9-linked Vietnamese Hackers Indicted in $71M U.S. Cybercrime Spree
Cyber Crime / Financial FraudFour Vietnamese nationals with ties to the FIN9 cybercrime group have...
2024-6-25 11:52:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
defendants
nguyen
tai
conspiracy
prison
Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts
Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible to...
2024-6-25 11:32:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
installs
malicious
wordpress
monday
security
Google Introduces Project Naptime for AI-Powered Vulnerability Research
Vulnerability / Artificial IntelligenceGoogle has developed a new framework called Project Naptime...
2024-6-24 23:3:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
security
naptime
llm
agnostic
codebase
Previous
37
38
39
40
41
42
43
44
Next