unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
North Korean Hackers Pose as Job Recruiters and Seekers in Malware Campaigns
Cyber Espionage / Social EngineeringNorth Korean threat actors have been linked to two campaigns i...
2023-11-22 20:14:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
north
github
korean
software
korea
AI Solutions Are the New Shadow IT
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of...
2023-11-22 19:8:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
indie
security
cisos
appomni
ClearFake Campaign Expands to Deliver Atomic Stealer on Mac Systems
SEO poisoning / Malware AnalysisThe macOS information stealer known as Atomic is now being deliver...
2023-11-22 15:15:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
stealer
malicious
clearfake
segura
stealers
LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break In
Threat Analysis / VulnerabilityMultiple threat actors, including LockBit ransomware affiliates, ar...
2023-11-22 12:49:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
ransomware
citrix
security
families
lockbit
Play Ransomware Goes Commercial - Now Offered as a Service to Cybercriminals
The ransomware strain known as Play is now being offered to other threat actors "as a service," new...
2023-11-21 21:56:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
ransomware
adlumin
kiddies
carried
offered
New Agent Tesla Malware Variant Using ZPAQ Compression in Email Attacks
Malware Threat / Data PrivacyA new variant of the Agent Tesla malware has been observed delivered...
2023-11-21 19:57:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
zpaq
security
lvova
software
tesla
How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography
Cybercrime / Malware AnalysisPhishing attacks are steadily becoming more sophisticated, with cyber...
2023-11-21 18:40:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
phishing
qr
malicious
captcha
Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux Rootkits
The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache Act...
2023-11-21 18:0:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
kinsing
miners
activemq
security
girnus
Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users
Android Security / CryptocurrencyAndroid smartphone users in India are the target of a new malware...
2023-11-21 15:46:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
malicious
trojan
security
software
wallets
Mustang Panda Hackers Targets Philippines Government Amid South China Sea Tensions
Cyber Attack / Cyber EspionageThe China-linked Mustang Panda actor has been linked to a cyber atta...
2023-11-21 14:58:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
panda
mustang
malicious
taurus
espionage
NetSupport RAT Infections on the Rise - Targeting Government and Business Sectors
Malware / Network SecurityThreat actors are targeting the education, government and business servi...
2023-11-20 23:19:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
netsupport
remote
fraudulent
network
victim
DarkGate and PikaBot Malware Resurrect QakBot's Tactics in New Phishing Attacks
Threat Analysis / MalwarePhishing campaigns delivering malware families such as DarkGate and PikaB...
2023-11-20 22:50:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
qakbot
pikabot
darkgate
cofense
analysis
Product Walkthrough: Silverfort's Unified Identity Protection Platform
In this article, we will provide a brief overview of Silverfort's platform, the first (and currentl...
2023-11-20 22:50:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
silverfort
prem
cloud
network
Why Defenders Should Embrace a Hacker Mindset
Today's security leaders must manage a constantly evolving attack surface and a dynamic threat envi...
2023-11-20 19:2:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
security
defenders
pentera
attackers
threats
LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique
The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique...
2023-11-20 18:49:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
lummac2
positions
marín
mouse
stealer
Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking
Cryptocurrency / BlockchainBitcoin wallets created between 2011 and 2015 are susceptible to a new...
2023-11-20 17:16:0 | 阅读: 21 |
收藏
|
The Hacker News - thehackernews.com
wallets
blockchain
randstorm
bitcoinjs
software
Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 Years
Cyber Espionage / MalwareAn Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan...
2023-11-20 14:42:0 | 阅读: 17 |
收藏
|
The Hacker News - thehackernews.com
appin
security
azari
pakistan
hire
8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader
The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to...
2023-11-18 19:27:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
ransomware
phobos
8base
encryption
venere
Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks
Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observe...
2023-11-18 14:32:0 | 阅读: 20 |
收藏
|
The Hacker News - thehackernews.com
worm
ukraine
gamaredon
blizzard
Beware: Malicious Google Ads Trick WinSCP Users into Installing Malware
Threat actors are leveraging manipulated search results and bogus Google ads that trick users who a...
2023-11-17 21:31:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
winscp
malicious
software
leveraging
believed
Previous
86
87
88
89
90
91
92
93
Next