unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws
Spyware / Threat AnalysisApple has released software updates for iOS, iPadOS, macOS, and Safari we...
2023-12-1 12:25:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
inch
chrome
security
software
spyware
Google Unveils RETVec - Gmail's New Defense Against Spam and Malicious Emails
Machine Learning / Email SecurityGoogle has revealed a new multilingual text vectorizer called RET...
2023-11-30 21:8:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
retvec
vectorizer
resilient
trained
homoglyphs
This Free Solution Provides Essential Third-Party Risk Management for SaaS
Wing Security recently announced that basic third-party risk assessment is now available as a free...
2023-11-30 19:55:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
tprm
diligence
ensuring
North Korea's Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks
Cryptocurrency / CyberattacksThreat actors from the Democratic People's Republic of Korea (DPRK) a...
2023-11-30 19:55:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
defi
korea
dprk
north
7 Uses for Generative AI to Enhance Security Operations
Welcome to a world where Generative AI revolutionizes the field of cybersecurity.Generative AI re...
2023-11-30 19:18:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
generative
security
amounts
analysis
tabletop
CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks
Ransomware / VulnerabilityA CACTUS ransomware campaign has been observed exploiting recently discl...
2023-11-30 19:16:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
ransomware
remote
cactus
qlik
attacker
U.S. Treasury Sanctions Sinbad Cryptocurrency Mixer Used by North Korean Hackers
The U.S. Treasury Department on Wednesday imposed sanctions against Sinbad, a virtual currency mixe...
2023-11-30 14:9:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
sinbad
blender
currency
darknet
blockchain
Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed that it's responding to a...
2023-11-29 21:2:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
water
plcs
unitronics
av3ngers
plc
200+ Malicious Android Apps Targeting Iranian Banks: Experts Warn
Mobile Security / MalwareAn Android malware campaign targeting Iranian banks has expanded its capa...
2023-11-29 18:13:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
phishing
malicious
clipboard
toast
c2
Discover Why Proactive Web Security Outsmarts Traditional Antivirus Solutions
In a rapidly evolving digital landscape, it's crucial to reevaluate how we secure web environments....
2023-11-29 17:21:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
proactive
security
threats
download
Okta Discloses Broader Impact Linked to October 2023 Support System Breach
Cyber Attack / Data BreachIdentity services provider Okta has disclosed that it detected "addition...
2023-11-29 14:18:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
okta
cloud
premises
scattered
reliaquest
DJVU Ransomware's Latest Variant 'Xaro' Disguised as Cracked Software
Ransomware / Cyber ThreatA variant of a ransomware strain known as DJVU has been observed to be di...
2023-11-29 13:55:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
xaro
stealer
djvu
software
freeware
GoTitan Botnet Spotted Exploiting Recent Apache ActiveMQ Vulnerability
Malware / Threat IntelligenceThe recently disclosed critical security flaw impacting Apache Active...
2023-11-29 13:7:0 | 阅读: 19 |
收藏
|
The Hacker News - thehackernews.com
remote
gotitan
lin
prctrl
stage
Zero-Day Alert: Google Chrome Under Active Attack, Exploiting New Vulnerability
Google has rolled out security updates to fix seven security issues in its Chrome browser, includin...
2023-11-29 12:27:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
overflow
2136
6345
chrome
confusion
Transform Your Data Security Posture – Learn from SoFi's DSPM Success
Data Security / Posture ManagementAs cloud technology evolves, so does the challenge of securing s...
2023-11-28 20:50:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
dspm
cloud
sofi
sentra
Design Flaw in Google Workspace Could Let Attackers Gain Unauthorized Access
Data Security / Data BreachCybersecurity researchers have detailed a "severe design flaw" in Googl...
2023-11-28 20:34:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
delegation
dwd
gcp
hunters
scopes
How Hackers Phish for Your Users' Credentials and Sell Them
Account credentials, a popular initial access vector, have become a valuable commodity in cybercrim...
2023-11-28 19:13:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
phishing
w3ll
underground
greatness
passwords
Key Cybercriminals Behind Notorious Ransomware Families Arrested in Ukraine
A coordinated law enforcement operation has led to the arrest of key individuals in Ukraine who are...
2023-11-28 18:33:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
ransomware
europol
authorities
arrest
ringleader
Stop Identity Attacks: Discover the Key to Early Threat Detection
Threat Detection / Insider ThreatIdentity and Access Management (IAM) systems are a staple to ensu...
2023-11-28 18:24:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
webinar
reduced
mttd
spot
Hackers Can Exploit 'Forced Authentication' to Steal Windows NTLM Tokens
Cyber Attack / VulnerabilityCybersecurity researchers have discovered a case of "forced authentica...
2023-11-28 18:23:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
victim
attacker
microsoft
database
Previous
78
79
80
81
82
83
84
85
Next