unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Meta Details WhatsApp and Messenger Interoperability to Comply with EU's DMA Regulations
Interoperability / EncryptionMeta has offered details on how it intends to implement interoperabil...
2024-3-8 21:14:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
messenger
brouwer
proxy
encryption
Secrets Sensei: Conquering Secrets Management Challenges
Secrets Management / Access ControlIn the realm of cybersecurity, the stakes are sky-high, and at...
2024-3-8 17:49:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
security
positives
encryption
rotation
monitoring
Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client
Network Security / VulnerabilityCisco has released patches to address a high-severity security fla...
2024-3-8 16:9:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
attacker
privileges
client
security
remote
QEMU Emulator Exploited as Tunneling Tool to Breach Company Network
Endpoint Security / Network SecurityThreat actors have been observed leveraging the QEMU open-sour...
2024-3-8 15:48:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
network
security
malicious
tunneling
CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability
Vulnerability / Threat IntelligenceThe U.S. Cybersecurity and Infrastructure Security Agency (CISA...
2024-3-8 14:13:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
teamcity
bypass
jetbrains
27198
Hacked WordPress Sites Abusing Visitors' Browsers for Distributed Brute-Force Attacks
Vulnerability / Web SecurityThreat actors are conducting brute-force attacks against WordPress sit...
2024-3-7 21:45:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
wordpress
visitors
security
drainers
drainer
Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks
Cyber Espionage / Software SecurityThe China-linked threat actor known as Evasive Panda orchestrat...
2024-3-7 21:22:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
windows
tibetan
nightdoor
software
evasive
Human vs. Non-Human Identity in SaaS
In today's rapidly evolving SaaS environment, the focus is on human users. This is one of the most...
2024-3-7 19:11:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
security
scopes
itdr
sspm
calendly
Ex-Google Engineer Arrested for Stealing AI Technology Secrets for China
Artificial Intelligence / Corporate EspionageThe U.S. Department of Justice (DoJ) announced the in...
2024-3-7 18:19:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
ding
doj
himself
software
secretly
New Python-Based Snake Info Stealer Spreading Through Facebook Messages
Vulnerability / Information StealerFacebook messages are being used by threat actors to a Python-b...
2024-3-7 15:39:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
stealer
github
vietnamese
repository
facebook
Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware
Malware / Network SecurityThreat actors have been leveraging fake websites advertising popular vid...
2024-3-7 14:11:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
windows
phishing
malicious
skype
download
Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining
Server Security / CryptocurrencyThreat actors are targeting misconfigured and vulnerable servers r...
2024-3-7 00:58:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
cloud
security
attackers
miner
cado
Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout
The threat actors behind the BlackCat ransomware have shut down their darknet website and likely pu...
2024-3-6 23:3:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
blackcat
ransomware
lockbit
takedown
security
A New Way To Manage Your Web Exposure: The Reflectiz Product Explained
An in-depth look into a proactive website security solution that continuously detects, prioritizes,...
2024-3-6 19:30:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
reflectiz
security
exposure
threats
client
How to Find and Fix Risky Sharing in Google Drive
Data Security / Cloud SecurityEvery Google Workspace administrator knows how quickly Google Drive...
2024-3-6 17:48:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
security
footprint
U.S. Cracks Down on Predatory Spyware Firm for Targeting Officials and Journalists
The U.S. Department of Treasury's Office of Foreign Assets Control (OFAC) sanctioned two individual...
2024-3-6 15:35:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
intellexa
spyware
predator
cytrox
consortium
VMware Issues Security Patches for ESXi, Workstation, and Fusion Flaws
Software Security / VulnerabilityVMware has released patches to address four security flaws impact...
2024-3-6 15:20:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
machine
workstation
fusion
security
vmx
Alert: GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries
The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family ca...
2024-3-6 15:11:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
ransomware
ghostlocker
ghostsec
talos
stormous
New APT Group 'Lotus Bane' Behind Recent Attacks on Vietnam's Financial Entities
A financial entity in Vietnam was the target of a previously undocumented threat actor called Lotus...
2024-3-6 15:1:0 | 阅读: 49 |
收藏
|
The Hacker News - thehackernews.com
apac
bane
atm
ib
lotus
Urgent: Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws
Apple has released security updates to address several security flaws, including two vulnerabilitie...
2024-3-6 13:54:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
inch
memory
exploited
security
Previous
62
63
64
65
66
67
68
69
Next