unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
BreachForums Founder Sentenced to 20 Years of Supervised Release, No Jail Time
Conor Brian Fitzpatrick has been sentenced to time served and 20 years of supervised release for hi...
2024-1-23 18:25:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
fitzpatrick
sentencing
mental
sentence
~40,000 Attacks in 3 Days: Critical Confluence RCE Under Active Exploitation
Vulnerability / Cyber AttackMalicious actors have begun to actively exploit a recently disclosed c...
2024-1-23 17:34:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
22527
atlassian
attackers
jaiswal
Apple Issues Patch for Critical Zero-Day in iPhones, Macs - Update Now
Vulnerability / Device Security Apple on Monday released security updates for iOS, iPadOS, macOS, t...
2024-1-23 09:30:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
inch
macs
exploited
1st
ventura
North Korean Hackers Weaponize Fake Research to Deliver RokRAT Backdoor
Media organizations and high-profile experts in North Korean affairs have been at the receiving end...
2024-1-23 00:47:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
north
korea
rokrat
scarcruft
korean
MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries
Software Security / Supply ChainSeveral public and popular libraries abandoned but still used in J...
2024-1-23 00:35:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
repository
groupid
jitpack
library
attacker
52% of Serious Vulnerabilities We Find are Related to Windows 10
We analyzed 2,5 million vulnerabilities we discovered in our customer's assets. This is what we fo...
2024-1-22 19:22:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
asset
security
unresolved
windows
NS-STEALER Uses Discord Bots to Exfiltrate Your Secrets from Popular Browsers
Browser Security / Cyber ThreatCybersecurity researchers have discovered a new Java-based "sophist...
2024-1-22 19:22:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
stealer
security
chaes
ramanathan
chae
FTC Bans InMarket for Selling Precise User Location Without Consent
The U.S. Federal Trade Commission (FTC) is continuing to clamp down on data brokers by prohibiting...
2024-1-22 15:2:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
inmarket
consumers
ftc
precise
Apache ActiveMQ Flaw Exploited in New Godzilla Web Shell Attacks
Cybersecurity researchers are warning of a "notable increase" in threat actor activity actively exp...
2024-1-22 11:40:0 | 阅读: 25 |
收藏
|
The Hacker News - thehackernews.com
activemq
security
godzilla
concealed
shells
Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years
Zero Day / Cyber EspionageAn advanced China-nexus cyber espionage group previously linked to the e...
2024-1-20 18:23:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
vcenter
mandiant
unc3886
34048
virtualpie
CISA Issues Emergency Directive to Federal Agencies on Ivanti Zero-Day Exploits
Network Security / Threat IntelligenceThe U.S. Cybersecurity and Infrastructure Security Agency (C...
2024-1-20 12:31:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
ivanti
malicious
security
mandiant
Microsoft's Top Execs' Emails Breached in Sophisticated Russia-Linked APT Attack
Cyber Espionage / Emails SecurityMicrosoft on Friday revealed that it was the target of a nation-s...
2024-1-20 11:11:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
microsoft
security
nation
blizzard
midnight
Invoice Phishing Alert: TA866 Deploys WasabiSeed & Screenshotter Malware
The threat actor tracked as TA866 has resurfaced after a nine-month hiatus with a new large-volume...
2024-1-20 10:16:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
security
phishing
verdict
pdfs
Experts Warn of macOS Backdoor Hidden in Pirated Versions of Popular Software
Malware / Endpoint SecurityPirated applications targeting Apple macOS users have been observed con...
2024-1-19 20:48:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
remote
pirated
machine
zuru
saljooki
Preventing Data Loss: Backup and Recovery Strategies for Exchange Server Administrators
In the current digital landscape, data has emerged as a crucial asset for organizations, akin to cu...
2024-1-19 19:24:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
exchange
backup
database
security
tone
Npm Trojan Bypasses UAC, Installs AnyDesk with "Oscompatible" Package
Software Security / SpywareA malicious package uploaded to the npm registry has been found deployi...
2024-1-19 15:42:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
security
windows
software
remote
U.S. Cybersecurity Agency Warns of Actively Exploited Ivanti EPMM Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched cr...
2024-1-19 12:55:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
ivanti
security
bypass
exploited
New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic
Server Security / CryptocurrencyVulnerable Docker services are being targeted by a novel campaign...
2024-1-19 00:31:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
9hits
xmrig
security
credits
miner
Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware
The Russia-linked threat actor known as COLDRIVER has been observed evolving its tradecraft to go b...
2024-1-18 22:49:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
coldriver
phishing
spica
korinets
TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks
Supply Chain Attacks / AI SecurityContinuous integration and continuous delivery (CI/CD) misconfig...
2024-1-18 20:34:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
github
runners
runner
workflows
malicious
Previous
67
68
69
70
71
72
73
74
Next