unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents: What to Know
SaaS Security / Data BreachThe Midnight Blizzard and Cloudflare-Atlassian cybersecurity incidents...
2024-2-13 19:10:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
security
blizzard
midnight
atlassian
microsoft
Ivanti Vulnerability Exploited to Install 'DSLog' Backdoor on 670+ IT Infrastructures
Vulnerability / Cyber ThreatThreat actors are leveraging a recently disclosed security flaw impact...
2024-2-13 15:3:0 | 阅读: 26 |
收藏
|
The Hacker News - thehackernews.com
ivanti
dslog
orange
appliance
Alert: CISA Warns of Active 'Roundcube' Email Attacks - Patch Now
Vulnerability / Email SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on...
2024-2-13 12:51:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
roundcube
security
exploited
zscaler
Rhysida Ransomware Cracked, Free Decryption Tool Released
Vulnerability / Data RecoveryCybersecurity researchers have uncovered an "implementation vulnerabi...
2024-2-12 21:12:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
ransomware
encryption
rhysida
security
4 Ways Hackers use Social Engineering to Bypass MFA
Cyber Threat / Password SecurityWhen it comes to access security, one recommendation stands out ab...
2024-2-12 19:14:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
security
passwords
desk
phishing
CISA and OpenSSF Release Framework for Package Repository Security
Infrastructure Security / Software Supply ChainThe U.S. Cybersecurity and Infrastructure Security...
2024-2-12 18:41:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
security
software
maturity
ecosystems
openssf
Why Are Compromised Identities the Nightmare to IR Speed and Efficiency?
Incident response (IR) is a race against time. You engage your internal or external team because th...
2024-2-12 18:0:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
silverfort
malicious
weaknesses
machine
Microsoft Introduces Linux-Like 'sudo' Command to Windows 11
Operating System / TechnologyMicrosoft said it's introducing Sudo for Windows 11 as part of an ear...
2024-2-12 13:45:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
elevated
windows
microsoft
unelevated
privileges
U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders
The U.S. Department of State has announced monetary rewards of up to $10 million for information ab...
2024-2-12 12:31:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
ransomware
uniquely
software
cl0p
U.S. DoJ Dismantles Warzone RAT Infrastructure, Arrests Key Operators
The U.S. Justice Department (DoJ) on Friday announced the seizure of online infrastructure that was...
2024-2-11 18:54:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
warzone
meli
victim
doj
ave
Alert: New Stealthy "RustDoor" Backdoor Targeting Apple macOS Devices
macOS Malware / Cyber ThreatApple macOS users are the target of a new Rust-based backdoor that has...
2024-2-10 15:12:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
ransomware
blackcat
rustdoor
c2
firm
Raspberry Robin Malware Upgrades with Discord Spread and New Exploits
The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege...
2024-2-10 00:32:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
raspberry
robin
36802
0856
MoqHao Android Malware Evolves with Auto-Execution Capability
Mobile Security / Cyber ThreatThreat hunters have identified a new variant of Android malware call...
2024-2-9 21:34:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
moqhao
bigpanzi
mcafee
tvs
france
Hands-on Review: Myrror Security Code-Aware and Attack-Aware SCA
IntroductionThe modern software supply chain represents an ever-evolving threat landscape, with e...
2024-2-9 18:58:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
myrror
security
analysis
New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack
Endpoint Security / CryptocurrencySixty-one banking institutions, all of them originating from Bra...
2024-2-9 18:28:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
coyote
malicious
nim
loader
squirrel
Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity
Cloud Security / Open Source XDR / SIEMCloud computing has innovated how organizations operate and...
2024-2-9 15:40:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
cloud
wazuh
security
monitoring
Stealthy Zardoor Backdoor Targets Saudi Islamic Charity Organizations
Cyber Espionage / Threat IntelligenceAn unnamed Islamic non-profit organization in Saudi Arabia ha...
2024-2-9 14:31:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
c2
zardoor
espionage
proxy
zar32
Fortinet Warns of Critical FortiOS SSL VPN Flaw Likely Under Active Exploitation
Zero Day Vulnerability / Network SecurityFortinet has disclosed a new critical security flaw in Fo...
2024-2-9 13:36:0 | 阅读: 71 |
收藏
|
The Hacker News - thehackernews.com
fortios
security
exploited
remote
Warning: New Ivanti Auth Bypass Flaw Affects Connect Secure and ZTA Gateways
Ivanti has alerted customers of yet another high-severity security flaw in its Connect Secure, Poli...
2024-2-9 11:35:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
ivanti
5r1
zta
1r17
1r18
Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade
The U.S. government on Wednesday said the Chinese state-sponsored hacking group known as Volt Typho...
2024-2-8 21:5:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
typhoon
security
volt
network
operational
Previous
68
69
70
71
72
73
74
75
Next