unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
LockBit Ransomware Group Resurfaces After Law Enforcement Takedown
The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new...
2024-2-26 12:57:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
ransomware
php
trial
decryptors
sugarlocker
Authorities Claim LockBit Admin "LockBitSupp" Has Engaged with Law Enforcement
LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cy...
2024-2-25 16:53:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
lockbit
ransomware
lockbitsupp
affiliates
cronos
Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies
Active Directory / Data ProtectionMicrosoft has expanded free logging capabilities to all U.S. fed...
2024-2-24 19:49:0 | 阅读: 20 |
收藏
|
The Hacker News - thehackernews.com
microsoft
0558
purview
security
Dormant PyPI Package Compromised to Spread Nova Sentinel Malware
Supply Chain Attack / MalwareA dormant package available on the Python Package Index (PyPI) reposi...
2024-2-24 01:8:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
pypi
malicious
stealer
phylum
nova
Microsoft Releases PyRIT - A Red Teaming Tool for Generative AI
Red Teaming / Artificial IntelligenceMicrosoft has released an open access automation framework ca...
2024-2-23 19:31:0 | 阅读: 21 |
收藏
|
The Hacker News - thehackernews.com
microsoft
pyrit
generative
teaming
scoring
How to Use Tines's SOC Automation Capability Matrix
Created by John Tuckner and the team at workflow and automation platform Tines, the SOC Automation...
2024-2-23 19:29:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
security
phishing
acm
analysis
utilizing
Researchers Detail Apple's Recent Zero-Click Shortcuts Vulnerability
Data Privacy / iOS SecurityDetails have emerged about a now-patched high-severity security flaw in...
2024-2-23 13:5:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
shortcut
security
malicious
alnazi
23204
FTC Slams Avast with $16.5 Million Fine for Selling Users' Browsing Data
Privacy / Regulatory ComplianceThe U.S. Federal Trade Commission (FTC) has hit antivirus vendor Av...
2024-2-23 11:30:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
jumpshot
sold
ftc
consumers
parties
Apple Unveils PQ3 Protocol - Post-Quantum Encryption for iMessage
Quantum Computing / EncryptionApple has announced a new post-quantum cryptographic protocol called...
2024-2-23 00:25:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
security
encryption
pq3
rcs
imessage
Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks
Network Security / Penetration TestingA recently open-sourced network mapping tool called SSH-Snak...
2024-2-22 19:7:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
ssh
snake
security
network
rogers
A New Age of Hacktivism
In the past 2 years, we have observed a significant surge in hacktivism activity due to ongoing war...
2024-2-22 18:44:0 | 阅读: 20 |
收藏
|
The Hacker News - thehackernews.com
ukraine
noname057
hacktivist
aid
hacktivism
Russian Government Software Backdoored to Deploy Konni RAT Malware
Malware / Cyber EspionageAn installer for a tool likely used by the Russian Consular Department of...
2024-2-22 18:43:0 | 阅读: 28 |
收藏
|
The Hacker News - thehackernews.com
konni
backdoored
russia
consular
software
U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders
The U.S. State Department has announced monetary rewards of up to $15 million for information that...
2024-2-22 13:26:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
lockbit
affiliates
ransomware
stealbit
wisniewski
New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers
Network Security / VulnerabilityCybersecurity researchers have identified two authentication bypas...
2024-2-22 00:16:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
network
52160
supplicant
wpa
52161
Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS
Malware / Cyber EspionageThe China-linked threat actor known as Mustang Panda has targeted various...
2024-2-21 21:3:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
plugx
doplugs
panda
mustang
customized
6 Ways to Simplify SaaS Identity Governance
With SaaS applications now making up the vast majority of technology used by employees in most orga...
2024-2-21 19:30:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
nudge
governance
approved
unused
Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery
On Thanksgiving Day 2023, while many Americans were celebrating, hospitals across the U.S. were doi...
2024-2-21 17:20:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
healthcare
threats
patients
huntress
New 'VietCredCare' Stealer Targeting Facebook Advertisers in Vietnam
Facebook advertisers in Vietnam are the target of a previously unknown information stealer dubbed V...
2024-2-21 16:0:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
facebook
stealer
vietnamese
ib
Signal Introduces Usernames, Allowing Users to Keep Their Phone Numbers Private
Secure Communication / AnonymityEnd-to-end encrypted (E2EE) messaging app Signal said it's pilotin...
2024-2-21 15:17:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
contacts
sarafa
everybody
username
axolotl
Russian Hackers Target Ukraine with Disinformation and Credential-Harvesting Attacks
Phishing Attack / Information WarfareCybersecurity researchers have unearthed a new influence oper...
2024-2-21 14:1:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
ukraine
phishing
russia
shortages
Previous
59
60
61
62
63
64
65
66
Next