unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Unleashing the Power of the Internet of Things and Cyber Security
Due to the rapid evolution of technology, the Internet of Things (IoT) is changing the way business...
2023-10-20 19:38:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
security
adoption
development
percent
ExelaStealer: A New Low-Cost Cybercrime Weapon Emerges
A new information stealer named ExelaStealer has become the latest entrant to an already crowded la...
2023-10-20 17:2:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
stealer
windows
slaughter
malicious
U.S. DoJ Cracks Down on North Korean IT Scammers Defrauding Global Businesses
Online Seucrity / Cyber ThreatThe U.S. government has announced the seizure of 17 website domains...
2023-10-20 13:12:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
north
korea
fund
jinyang
ballistic
Sophisticated MATA Framework Strikes Eastern European Oil and Gas Companies
An updated version of a sophisticated backdoor framework called MATA has been used in attacks aimed...
2023-10-19 21:47:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
mata
security
korean
phishing
lambert
Vulnerability Scanning: How Often Should I Scan?
The time between a vulnerability being discovered and hackers exploiting it is narrower than ever –...
2023-10-19 19:48:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
security
intruder
cloud
quarterly
Google Play Protect Introduces Real-Time Code-Level Scanning for Android Malware
Mobile Security / TechnologyGoogle has announced an update to its Play Protect with support for re...
2023-10-19 19:38:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
security
malicious
proactive
protections
alerted
Iran-Linked OilRig Targets Middle East Governments in 8-Month Cyber Campaign
Cyber Attack / Cyber EspionageThe Iran-linked OilRig threat actor targeted an unnamed Middle East...
2023-10-19 18:15:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
powershell
attackers
exchange
iran
Microsoft Warns of North Korean Attacks Exploiting JetBrains TeamCity Flaw
North Korean threat actors are actively exploiting a critical security flaw in JetBrains TeamCity t...
2023-10-19 15:11:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
sleet
security
teamcity
korean
north
Google TAG Detects State-Backed Threat Actors Exploiting WinRAR Flaw
Cyber Threat / VulnerabilityA number of state-back threat actors from Russia and China have been o...
2023-10-19 12:2:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
winrar
38831
sandworm
apt28
phishing
Lazarus Group Targeting Defense Experts with Fake Interviews via Trojanized VNC Apps
The North Korea-linked Lazarus Group (aka Hidden Cobra or TEMP.Hermit) has been observed using troj...
2023-10-18 22:51:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
north
korean
korea
andariel
mandiant
Critical Citrix NetScaler Flaw Exploited to Target from Government, Tech Firms
Enterprise Security / VulnerabilityCitrix is warning of exploitation of a recently disclosed criti...
2023-10-18 20:27:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
netscaler
adc
mandiant
4966
citrix
Unraveling Real-Life Attack Paths – Key Lessons Learned
In the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities...
2023-10-18 19:42:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
removal
ssh
involving
disabling
Qubitstrike Targets Jupyter Notebooks with Crypto Mining and Rootkit Campaign
A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyte...
2023-10-18 19:42:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
cloud
qubitstrike
mi
codeberg
kdfs
TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments
Cyber Espionage / MalwareGovernment entities in the Asia-Pacific (APAC) region are the target of a...
2023-10-18 17:11:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
espionage
drives
malicious
machine
hardware
New Admin Takeover Vulnerability Exposed in Synology's DiskStation Manager
Vulnerability / Data SecurityA medium-severity flaw has been discovered in Synology's DiskStation...
2023-10-18 14:48:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
attacker
security
prng
brizinov
reconstruct
D-Link Confirms Data Breach: Employee Falls Victim to Phishing Attack
Data Breach / Network SecurityTaiwanese networking equipment manufacturer D-Link has confirmed a d...
2023-10-18 11:41:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
security
archaic
network
taiwanese
stating
Discord: A Playground for Nation-State Hackers Targeting Critical Infrastructure
In what's the latest evolution of threat actors abusing legitimate infrastructure for nefarious end...
2023-10-17 22:48:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
powershell
download
stage
stealers
families
Critical Vulnerabilities Uncovered in Open Source CasaOS Cloud Software
Vulnerability / Cyber ThreatTwo critical security flaws discovered in the open-source CasaOS perso...
2023-10-17 22:37:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
casaos
attackers
security
37265
Webinar: Locking Down Financial and Accounting Data — Best Data Security Strategies
Data Security / Infosec WebinarFinancial data is much more than just a collection of numbers; it i...
2023-10-17 19:43:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
webinar
security
exclusive
ranging
foster
Exploring the Realm of Malicious Generative AI: A New Digital Security Challenge
Recently, the cybersecurity landscape has been confronted with a daunting new reality – the rise of...
2023-10-17 18:17:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
generative
fraudgpt
phishing
wormgpt
security
Previous
87
88
89
90
91
92
93
94
Next