unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
N. Korean Hackers 'Mixing' macOS Malware Tactics to Evade Detection
Malware / Cyber EspionageThe North Korean threat actors behind macOS malware strains such as RustB...
2023-11-28 12:54:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
kandykorn
rustbucket
swiftloader
stage
mandiant
How to Handle Retail SaaS Security on Cyber Monday
SaaS Security / Cyber MondayIf forecasters are right, over the course of today, consumers will spe...
2023-11-28 01:57:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
retailers
insider
security
threats
season
Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections
Server Security / EncryptionA new study has demonstrated that it's possible for passive network at...
2023-11-27 21:18:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
ssh
network
encrypting
security
U.S., U.K., and Global Partners Release Secure AI System Development Guidelines
Artificial Intelligence / PrivacyThe U.K. and U.S., along with international partners from 16 othe...
2023-11-27 14:55:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
development
guidelines
ncsc
aim
New 'HrServ.dll' Web Shell Detected in APT Attack Targeting Afghan Government
Cyber Attack / Threat IntelligenceAn unspecified government entity in Afghanistan was targeted by...
2023-11-25 13:8:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
memory
hrserv
malicious
degirmenci
Warning: 3 Critical Vulnerabilities Expose ownCloud Users to Data Breaches
Data Security / VulnerabilityThe maintainers of the open-source file-sharing software ownCloud hav...
2023-11-25 12:0:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
owncloud
attacker
crushftp
graphapi
Cybercriminals Using Telekopye Telegram Bot to Craft Phishing Scams on a Grand Scale
Threat Analysis / Dark WebMore details have emerged about a malicious Telegram bot called Telekopy...
2023-11-24 23:32:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
mammoths
apartment
refund
jizba
Tell Me Your Secrets Without Telling Me Your Secrets
Developer Tools / API SecurityThe title of this article probably sounds like the caption to a meme...
2023-11-24 18:53:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
gitguardian
github
security
ton
Hamas-Linked Cyberattacks Using Rust-Powered SysJoker Backdoor Against Israel
Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called Sys...
2023-11-24 18:31:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
sysjoker
c2
hamas
affiliated
Kubernetes Secrets of Fortune 500 Companies Exposed in Public Repositories
Cloud security / Data ProtectionCybersecurity researchers are warning of publicly exposed Kubernet...
2023-11-24 14:44:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
security
kubernetes
passwords
registries
github
Konni Group Using Russian-Language Malicious Word Docs in Latest Attacks
Malware / Cyber EspionageA new phishing attack has been observed leveraging a Russian-language Mic...
2023-11-23 22:46:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
konni
north
korean
espionage
microsoft
Alert: New WailingCrab Malware Loader Spreading via Shipping-Themed Emails
Malware / Threat AnalysisDelivery- and shipping-themed email messages are being used to deliver a...
2023-11-23 20:54:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
wailingcrab
c2
download
mqtt
loader
6 Steps to Accelerate Cybersecurity Incident Response
Modern security tools continue to improve in their ability to defend organizations' networks and en...
2023-11-23 18:48:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
containment
eradication
network
Mirai-based Botnet Exploiting Zero-Day Bugs in Routers and NVRs for Massive DDoS Attacks
Vulnerability / Cyber ThreatAn active malware campaign is leveraging two zero-day vulnerabilities...
2023-11-23 18:47:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
akamai
attackers
c2
shells
North Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack
Software Supply Chain AttackA North Korean state-sponsored threat actor tracked as Diamond Sleet i...
2023-11-23 13:46:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
north
microsoft
payload
software
security
New Flaws in Fingerprint Sensors Let Attackers Bypass Windows Hello Login
Authentication Security / WindowsA new research has uncovered multiple vulnerabilities that could...
2023-11-22 23:23:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
sensor
fingerprint
sdcp
windows
North Korean Hackers Pose as Job Recruiters and Seekers in Malware Campaigns
Cyber Espionage / Social EngineeringNorth Korean threat actors have been linked to two campaigns i...
2023-11-22 20:14:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
north
github
korean
software
korea
AI Solutions Are the New Shadow IT
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of...
2023-11-22 19:8:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
indie
security
cisos
appomni
ClearFake Campaign Expands to Deliver Atomic Stealer on Mac Systems
SEO poisoning / Malware AnalysisThe macOS information stealer known as Atomic is now being deliver...
2023-11-22 15:15:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
stealer
malicious
clearfake
segura
stealers
LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break In
Threat Analysis / VulnerabilityMultiple threat actors, including LockBit ransomware affiliates, ar...
2023-11-22 12:49:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
ransomware
citrix
security
families
lockbit
Previous
79
80
81
82
83
84
85
86
Next