unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Hackers Exploit ConnectWise ScreenConnect Flaws to Deploy TODDLERSHARK Malware
North Korean threat actors have exploited the recently disclosed security flaws in ConnectWise Scre...
2024-3-6 00:18:0 | 阅读: 34 |
收藏
|
The Hacker News - thehackernews.com
north
korea
babyshark
vb
What is Exposure Management and How Does it Differ from ASM?
Attack Surface / Exposure ManagementStartups and scales-ups are often cloud-first organizations an...
2024-3-5 18:55:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
exposure
cloud
intruder
security
Cybercriminals Using Novel DNS Hijacking Technique for Investment Scams
A new DNS threat actor dubbed Savvy Seahorse is leveraging sophisticated techniques to entice targe...
2024-3-5 18:53:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
cname
savvy
seahorse
investment
infoblox
Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets
Malware / Artificial IntelligenceMore than 225,000 logs containing compromised OpenAI ChatGPT cred...
2024-3-5 18:38:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
stealer
ib
openai
sale
chatgpt
Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes
Email Security / Network SecurityThe threat actor known as TA577 has been observed using ZIP archi...
2024-3-5 18:25:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
ta577
security
proofpoint
network
phishing
Critical JetBrains TeamCity On-Premises Flaws Could Lead to Server Takeovers
Vulnerability / Network Security A new pair of security vulnerabilities have been disclosed in JetB...
2024-3-5 11:34:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
teamcity
attacker
jetbrains
bypass
How Cybercriminals are Exploiting India's UPI for Money Laundering Operations
Cybercrime / Mobile SecurityCybercriminals are using a network of hired money mules in India using...
2024-3-4 21:50:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
mules
xhelper
laundering
agents
upi
From 500 to 5000 Employees - Securing 3rd Party App-Usage in Mid-Market Companies
SaaS Security / Vulnerability AssessmentA company's lifecycle stage, size, and state have a signif...
2024-3-4 19:12:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
security
wing
operational
extent
growth
Over 100 Malicious AI/ML Models Found on Hugging Face Platform
AI Security / VulnerabilityAs many as 100 malicious artificial intelligence (AI)/machine learning...
2024-3-4 17:22:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
security
attacker
malicious
prompts
adversarial
Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure
U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting gov...
2024-3-4 13:24:0 | 阅读: 22 |
收藏
|
The Hacker News - thehackernews.com
ransomware
phobos
windows
cactus
U.S. Court Orders NSO Group to Hand Over Pegasus Spyware Code to WhatsApp
A U.S. judge has ordered NSO Group to hand over its source code for Pegasus and other products to M...
2024-3-2 14:23:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
spyware
predator
alleged
activists
journalists
U.S. Charges Iranian Hacker, Offers $10 Million Reward for Capture
Cybercrime / Social EngineeringThe U.S. Department of Justice (DoJ) on Friday unsealed an indictme...
2024-3-2 12:38:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
nasab
phishing
spear
contractor
firm
New Phishing Kit Leverages SMS, Voice Calls to Target Cryptocurrency Users
Phishing Kit / CryptocurrencyA novel phishing kit has been observed impersonating the login pages...
2024-3-1 21:32:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
phishing
victim
lookout
labhost
attacker
4 Instructive Postmortems on Data Downtime and Loss
More than a decade ago, the concept of the 'blameless' postmortem changed how tech companies recogn...
2024-3-1 19:8:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
gitlab
tarsnap
colin
attacker
consul
New BIFROSE Linux Malware Variant Using Deceptive VMware Domain for Evasion
Cybersecurity researchers have discovered a new Linux variant of a remote access trojan (RAT) calle...
2024-3-1 18:56:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
bifrost
bifrose
deceptive
remote
guloader
Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities
Rootkit / Threat IntelligenceThe Five Eyes (FVEY) intelligence alliance has issued a new cybersecu...
2024-3-1 14:26:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
ivanti
security
ict
resets
gateways
GitHub Rolls Out Default Secret Scanning Push Protection for Public Repositories
DevSecOps / CybersecurityGitHub on Thursday announced that it's enabling secret scanning push prot...
2024-3-1 13:29:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
microsoft
confusion
malicious
github
fraudulent
New Silver SAML Attack Evades Golden SAML Defenses in Identity Systems
Threat Intelligence / Cyber ThreatCybersecurity researchers have disclosed a new attack technique...
2024-2-29 23:21:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
entra
microsoft
security
silver
federation
GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks
Threat hunters have discovered a new Linux malware called GTPDOOR that's designed to be deployed in...
2024-2-29 19:33:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
network
gtpdoor
roaming
gtp
grx
How to Prioritize Cybersecurity Spending: A Risk-Based Strategy for the Highest ROI
Attack Surface / Incident ResponseAs an IT leader, staying on top of the latest cybersecurity deve...
2024-2-29 19:19:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
spending
threats
prioritize
security
Previous
63
64
65
66
67
68
69
70
Next