unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
DDoS Attacks on the Environmental Services Industry Surge by 61,839% in 2023
Server Security / Cyber AttackThe environmental services industry witnessed an "unprecedented surg...
2024-1-15 13:55:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
quarter
security
q4
cop
New Findings Challenge Attribution in Denmark's Energy Sector Cyberattacks
Cyber Attack / VulnerabilityThe cyber attacks targeting the energy sector in Denmark last year may...
2024-1-14 17:7:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
wave
zyxel
firewalls
forescout
28771
Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches
Vulnerability / Network SecurityJuniper Networks has released updates to fix a critical remote cod...
2024-1-13 18:45:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
junos
4r3
s5
3r3
2r3
29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services
Cryptojacking / Cloud SecurityA 29-year-old Ukrainian national has been arrested in connection wit...
2024-1-13 18:1:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
cloud
mine
europol
Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families
Vulnerability / Threat IntelligenceAs many as five different malware families were deployed by sus...
2024-1-12 21:53:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
unc5221
mandiant
lightwire
families
analysis
Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion
The threat actors associated with the Medusa ransomware have ramped up their activities following t...
2024-1-12 21:23:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
ransomware
medusa
security
victim
development
Urgent: GitLab Releases Patch for Critical Vulnerabilities - Update ASAP
DevSecOps / Software securityGitLab has released security updates to address two critical vulnerab...
2024-1-12 21:3:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
gitlab
security
slash
Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO
Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more tha...
2024-1-12 20:5:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
bas
security
threats
defenses
Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks
Cybersecurity researchers have identified a new attack that exploits misconfigurations in Apache Ha...
2024-1-12 15:56:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
attacker
rootkits
remote
analysis
Act Now: CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability
Cyber Attack / VulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has a...
2024-1-12 14:35:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
microsoft
security
privileges
attacker
Threat Actors Increasingly Abusing GitHub for Malicious Purposes
Cybersecurity / Software SecurityThe ubiquity of GitHub in information technology (IT) environment...
2024-1-11 23:28:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
github
c2
malicious
dead
New PoC Exploit for Apache OfBiz Vulnerability Poses Risk to ERP Systems
Vulnerability / Cyber AttackCybersecurity researchers have developed a proof-of-concept (PoC) code...
2024-1-11 22:16:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
ofbiz
payload
51467
memory
vulncheck
New Python-based FBot Hacking Toolkit Aims at Cloud and SaaS Platforms
Cloud Security / Cyber AttacksA new Python-based hacking tool called FBot has been uncovered targe...
2024-1-11 22:0:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
fbot
cloud
legion
delamotte
packs
There is a Ransomware Armageddon Coming for Us All
Generative AI will enable anyone to launch sophisticated phishing attacks that only Next-generation...
2024-1-11 19:43:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
phishing
genai
ransomware
wearable
Atomic Stealer Gets an Upgrade - Targeting Mac Users with Encrypted Payload
Malvertising / Cyber AttacksCybersecurity researchers have identified an updated version of a macO...
2024-1-11 19:40:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
stealer
software
segura
encryption
Mandiant's X Account Was Hacked Using Brute-Force Attack
Online Security / CryptocurrencyThe compromise of Mandiant's X (formerly Twitter) account last wee...
2024-1-11 14:10:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
drainer
victim
clinksink
wallets
exchange
Chinese Hackers Exploit Zero-Day Flaws in Ivanti Connect Secure and Policy Secure
A pair of zero-day flaws identified in Ivanti Connect Secure (ICS) and Policy Secure have been chai...
2024-1-11 13:29:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
ivanti
appliance
volexity
attacker
remote
Cisco Fixes High-Risk Vulnerability Impacting Unity Connection Software
Vulnerability / Patch ManagementCisco has released software updates to address a critical security...
2024-1-11 12:55:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
wap371
attacker
20272
security
software
NoaBot: Latest Mirai-Based Botnet Targeting SSH Servers for Crypto Mining
Server Security / CryptocurrencyA new Mirai-based botnet called NoaBot is being used by threat act...
2024-1-10 23:15:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
ssh
noabot
kupchik
miner
p2pinfect
Getting off the Attack Surface Hamster Wheel: Identity Can Help
IT professionals have developed a sophisticated understanding of the enterprise attack surface – wh...
2024-1-10 19:30:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
identities
cloud
privileged
Previous
69
70
71
72
73
74
75
76
Next