unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Ande Loader Malware Targets Manufacturing Sector in North America
The threat actor known as Blind Eagle has been observed using a loader malware called Ande Loader t...
2024-3-14 15:17:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
remcos
loader
eagle
njrat
ande
DarkGate Malware Exploits Recently Patched Microsoft Flaw in Zero-Day Attack
A DarkGate malware campaign observed in mid-January 2024 leveraged a recently patched security flaw...
2024-3-14 12:57:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
stealer
microsoft
installers
software
darkgate
Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software
Vulnerability / Network SecurityFortinet has warned of a critical security flaw impacting its Fort...
2024-3-14 12:21:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
fortios
fortiproxy
security
attacker
Demystifying a Common Cybersecurity Myth
App Security / Cyber SecurityOne of the most common misconceptions in file upload cybersecurity is...
2024-3-13 23:39:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
security
threats
opswat
adaptive
proactive
PixPirate Android Banking Trojan Using New Evasion Tactic to Target Brazilian Users
Financial Fraud / Mobile SecurityThe threat actors behind the PixPirate Android banking trojan are...
2024-3-13 21:55:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
droppee
pixpirate
victim
somech
malicious
Join Our Webinar on Protecting Human and Non-Human Identities in SaaS Platforms
Identities are the latest sweet spot for cybercriminals, now heavily targeting SaaS applications th...
2024-3-13 18:33:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
identities
webinar
threats
sso
itdr
Researchers Highlight Google's Gemini AI Susceptibility to LLM Threats
Large Language Model / AI SecurityGoogle's Gemini large language model (LLM) is susceptible to sec...
2024-3-13 18:14:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
llm
security
gemini
prompts
Alert: Cybercriminals Deploying VCURMS and STRRAT Trojans via AWS and GitHub
Phishing Attack / Threat IntelligenceA new phishing campaign has been observed delivering remote a...
2024-3-13 17:43:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
vcurms
phishing
stealer
strrat
dropbox
Microsoft's March Updates Fix 61 Vulnerabilities, Including Critical Hyper-V Flaws
Patch Tuesday / Software UpdateMicrosoft on Tuesday released its monthly security update, addressi...
2024-3-13 13:38:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
microsoft
remote
tuesday
software
Watch Out: These PyPI Python Packages Can Drain Your Crypto Wallets
Cryptocurrency / CybercrimeThreat hunters have discovered a set of seven packages on the Python Pa...
2024-3-12 20:13:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
mnemonic
security
bip39
phrases
CTEM 101 - Go Beyond Vulnerability Management with Continuous Threat Exposure Management
CTEM / Vulnerability ManagementIn a world of ever-expanding jargon, adding another FLA (Four-Lette...
2024-3-12 19:7:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
ctem
security
exposures
exposure
identify
Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites
WordPress / Website SecurityA new malware campaign is leveraging a high-severity security flaw in...
2024-3-12 17:15:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
security
wordpress
exploited
attackers
malicious
South Korean Citizen Detained in Russia on Cyber Espionage Charges
Russia has detained a South Korean national for the first time on cyber espionage charges and trans...
2024-3-12 14:32:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
espionage
vladivostok
detained
unnamed
korean
Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity PAM Essentials
Privileged Access ManagementAs cyber threats loom around every corner and privileged accounts beco...
2024-3-11 22:47:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
pam
essentials
privileged
seamless
cloud
New Banking Trojan CHAVECLOAK Targets Brazilian Users via Phishing Tactics
Phishing Attack / Mobile SecurityUsers in Brazil are the target of a new banking trojan known as C...
2024-3-11 22:47:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
phishing
chavecloak
victim
trojan
c2
Data Leakage Prevention in the Age of Cloud Computing: A New Approach
Cybersecurity / Browser SecurityAs the shift of IT infrastructure to cloud-based solutions celebra...
2024-3-11 19:33:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
dlp
dlps
security
enforcing
BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks
Ransomware / VulnerabilityThe threat actors behind the BianLian ransomware have been observed expl...
2024-3-11 17:53:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
remote
security
bianlian
ransomware
powershell
Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability
Network Security / VulnerabilityTechnical specifics and a proof-of-concept (PoC) exploit have been...
2024-3-11 14:28:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
openedge
remote
adminserver
security
Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT
Zero-Day / Endpoint SecurityA financially motivated threat actor called Magnet Goblin is swiftly a...
2024-3-11 13:59:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
magnet
goblin
nerbian
financially
Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets
Cyber Attack / Threat IntelligenceMicrosoft on Friday revealed that the Kremlin-backed threat acto...
2024-3-9 12:1:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
microsoft
blizzard
midnight
apt29
giant
Previous
61
62
63
64
65
66
67
68
Next