unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands
Vulnerability / Mobile NetworkA collection of security flaws in the firmware implementation of 5G...
2023-12-9 01:22:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
attacker
qualcomm
network
security
N. Korean Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks
Cyber Espionage / CryptocurrencyThe North Korean threat actor known as Kimsuky has been observed t...
2023-12-8 21:33:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
korea
north
phishing
korean
malicious
Ransomware-as-a-Service: The Growing Threat You Can't Ignore
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cyb...
2023-12-8 19:8:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
ransomware
security
outpost24
affiliates
crucial
Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software
Endpoint Security / MalwareUnauthorized websites distributing trojanized versions of cracked softw...
2023-12-8 17:52:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
proxy
attackers
software
trojan
c2
WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability
Vulnerability / Website SecurityWordPress has released version 6.4.2 with a patch for a critical s...
2023-12-8 17:23:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
php
security
wordpress
patchstack
wordfence
Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme
Cryptocurrency / Cyber CrimeThe Russian founder of the now-defunct Bitzlato cryptocurrency exchang...
2023-12-8 13:41:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
exchange
legkodymov
bitzlato
justice
lax
Microsoft Warns of COLDRIVER's Evolving Evading and Credential-Stealing Tactics
Threat Intelligence / Cyber EspionageThe threat actor known as COLDRIVER has continued to engage i...
2023-12-7 22:36:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
blizzard
evilginx
microsoft
security
redirection
New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices
Mobile Security / VulnerabilityA critical Bluetooth security flaw could be exploited by threat act...
2023-12-7 19:46:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
security
keystrokes
permit
45866
affects
Hacking the Human Mind: Exploiting Vulnerabilities in the 'First Line of Cyber Defense'
Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts....
2023-12-7 19:44:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
humans
attackers
emotions
security
traits
Building a Robust Threat Intelligence with Wazuh
Threat Intelligence / Network SecurityThreat intelligence refers to gathering, processing, and ana...
2023-12-7 18:51:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
threats
wazuh
feeds
Governments May Spy on You by Requesting Push Notifications from Apple and Google
Unspecified governments have demanded mobile push notification records from Apple and Google users...
2023-12-7 18:24:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
governments
letter
demands
wyden
apns
New Stealthy 'Krasue' Linux Trojan Targeting Telecom Firms in Thailand
Malware / Security BreachA previously unknown Linux remote access trojan called Krasue has been ob...
2023-12-7 14:15:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
krasue
webinar
psychology
attackers
trojan
Meta Launches Default End-to-End Encryption for Chats and Calls on Messenger
Encryption / Data PrivacyMeta has officially begun to roll out support for end-to-end encryption (...
2023-12-7 13:52:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
messenger
encryption
labyrinth
e2ee
security
Alert: Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts
Access Management / Cloud SecurityThreat actors can take advantage of Amazon Web Services Security...
2023-12-6 21:38:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
sts
cloud
security
akia
gardner
New Report: Unveiling the Threat of Malicious Browser Extensions
Browser Security / PrivacyCompromising the browser is a high-return target for adversaries. Browse...
2023-12-6 19:44:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
malicious
security
ratings
developer
software
Sierra:21 - Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks
Cyber Threat / VulnerabilityA collection of 21 security flaws have been discovered in Sierra Wirel...
2023-12-6 19:18:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
attackers
routers
tinyxml
opennds
Scaling Security Operations with Automation
In an increasingly complex and fast-paced digital landscape, organizations strive to protect themse...
2023-12-6 18:14:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
processes
maturity
crucial
identify
Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers
Vulnerability / Web Server SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA...
2023-12-6 18:10:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
coldfusion
passwords
exploited
webinar
attackers
Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution
Software Security / VulnerabilityAtlassian has released software fixes to address four critical fl...
2023-12-6 17:18:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
remote
atlassian
software
attacker
affects
Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks
Vulnerability / Mobile SecurityChipmaker Qualcomm has released more information about three high-s...
2023-12-6 13:23:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
memory
corruption
exploited
Previous
76
77
78
79
80
81
82
83
Next