unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure
The persistent threat actors behind the SolarMarker information-stealing malware have established a...
2024-5-21 21:7:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
solarmarker
tier
c2
victim
regions
Five Core Tenets Of Highly Effective DevSecOps Practices
One of the enduring challenges of building modern applications is to make them more secure without...
2024-5-21 19:33:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
software
development
developers
Achieve security compliance with Wazuh File Integrity Monitoring
File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in...
2024-5-21 18:30:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
wazuh
fim
security
monitoring
Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox
Supply Chain Security / AI ModelA critical security flaw has been disclosed in the llama_cpp_pytho...
2024-5-21 18:22:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
python
llama
library
checkmarx
Streamlining IT Security Compliance Using the Wazuh FIM Capability
File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in...
2024-5-21 18:21:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
wazuh
fim
security
monitoring
Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses
Microsoft on Monday confirmed its plans to deprecate NT LAN Manager (NTLM) in Windows 11 in the se...
2024-5-21 17:2:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
security
windows
microsoft
russia
NextGen Healthcare Mirth Connect Under Attack - CISA Issues Urgent Warning
Healthcare / VulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Mond...
2024-5-21 15:13:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
mirth
security
healthcare
chrome
catalog
"Linguistic Lumberjack" Vulnerability Discovered in Popular Logging Utility Fluent Bit
Cyber Attack / API SecurityCybersecurity researchers have discovered a critical security flaw in a...
2024-5-21 14:43:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
security
traces
remote
tenable
memory
Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel
Cyber Attack / Threat IntelligenceAn Iranian threat actor affiliated with the Ministry of Intellig...
2024-5-21 00:5:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
manticore
wiper
israel
karma
0842
Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal
Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a variety of ma...
2024-5-20 20:20:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
foxit
malicious
stealer
security
terefos
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks
Software Security / VulnerabilityAll developers want to create secure and dependable software. The...
2024-5-20 18:57:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
gitguardian
software
developers
developer
Cyber Criminals Exploit GitHub and FileZilla to Deliver Cocktail Malware
Malvertising / CryptocurrencyA "multi-faceted campaign" has been observed abusing legitimate servi...
2024-5-20 17:26:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
github
malicious
software
c2
Latrodectus Malware Loader Emerges as IcedID's Successor in Phishing Campaigns
Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 20...
2024-5-20 13:47:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
latrodectus
stealer
icedid
phishing
loader
Chinese Nationals Arrested for Laundering $73 Million in Pig Butchering Crypto Scam
The U.S. Department of Justice (DoJ) has charged two arrested Chinese nationals for allegedly orche...
2024-5-19 17:46:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
funds
bueno
doj
blockchain
conspiracy
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide
Banking Troja / Email SecurityThe threat actors behind the Windows-based Grandoreiro banking troja...
2024-5-19 15:59:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
grandoreiro
security
phishing
windows
victim
Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking
The cryptojacking group known as Kinsing has demonstrated its ability to continuously evolve and ad...
2024-5-18 01:20:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
kinsing
miner
download
cloud
security
New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs
A new report from XM Cyber has found – among other insights - a dramatic gap between where most org...
2024-5-17 19:29:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
exposures
security
exposure
choke
xm
China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT
Cybersecurity researchers have shed more light on a remote access trojan (RAT) known as Deuterbear...
2024-5-17 19:20:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
deuterbear
waterbear
sugargh0st
loader
stage
Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks
The Kimsuky (aka Springtail) advanced persistent threat (APT) group, which is linked to North Korea...
2024-5-17 16:46:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
korean
gobear
security
springtail
software
CISA Warns of Actively Exploited D-Link Router Vulnerabilities - Patch Now
Vulnerability / Network SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) o...
2024-5-17 14:43:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
routers
security
epmm
exploited
impacting
Previous
46
47
48
49
50
51
52
53
Next