unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Okta's Support System Breach Exposes Customer Data to Unidentified Threat Actors
Data Breach / Cyber Attack Identity services provider Okta on Friday disclosed a new security inci...
2023-10-21 16:45:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
okta
security
beyondtrust
har
notified
Cisco Zero-Day Exploited to Implant Malicious Lua Backdoor on Thousands of Devices
Cisco has warned of a new zero-day flaw in IOS XE that has been actively exploited by an unknown th...
2023-10-21 11:46:0 | 阅读: 21 |
收藏
|
The Hacker News - thehackernews.com
exploited
network
security
20273
Malvertisers Using Google Ads to Target Users Searching for Popular Software
Malvertising / Cyber ThreatDetails have emerged about a malvertising campaign that leverages Googl...
2023-10-20 21:49:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
malicious
punycode
decoy
segura
Vietnamese Hackers Target U.K., U.S., and India with DarkGate Malware
Attacks leveraging the DarkGate commodity malware targeting entities in the U.K., the U.S., and Ind...
2023-10-20 21:28:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
darkgate
ducktail
lures
stealer
withsecure
Unleashing the Power of the Internet of Things and Cyber Security
Due to the rapid evolution of technology, the Internet of Things (IoT) is changing the way business...
2023-10-20 19:38:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
security
adoption
development
percent
ExelaStealer: A New Low-Cost Cybercrime Weapon Emerges
A new information stealer named ExelaStealer has become the latest entrant to an already crowded la...
2023-10-20 17:2:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
stealer
windows
slaughter
malicious
U.S. DoJ Cracks Down on North Korean IT Scammers Defrauding Global Businesses
Online Seucrity / Cyber ThreatThe U.S. government has announced the seizure of 17 website domains...
2023-10-20 13:12:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
north
korea
fund
jinyang
ballistic
Sophisticated MATA Framework Strikes Eastern European Oil and Gas Companies
An updated version of a sophisticated backdoor framework called MATA has been used in attacks aimed...
2023-10-19 21:47:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
mata
security
korean
phishing
lambert
Vulnerability Scanning: How Often Should I Scan?
The time between a vulnerability being discovered and hackers exploiting it is narrower than ever –...
2023-10-19 19:48:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
security
intruder
cloud
quarterly
Google Play Protect Introduces Real-Time Code-Level Scanning for Android Malware
Mobile Security / TechnologyGoogle has announced an update to its Play Protect with support for re...
2023-10-19 19:38:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
security
malicious
proactive
protections
alerted
Iran-Linked OilRig Targets Middle East Governments in 8-Month Cyber Campaign
Cyber Attack / Cyber EspionageThe Iran-linked OilRig threat actor targeted an unnamed Middle East...
2023-10-19 18:15:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
powershell
attackers
exchange
iran
Microsoft Warns of North Korean Attacks Exploiting JetBrains TeamCity Flaw
North Korean threat actors are actively exploiting a critical security flaw in JetBrains TeamCity t...
2023-10-19 15:11:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
sleet
security
teamcity
korean
north
Google TAG Detects State-Backed Threat Actors Exploiting WinRAR Flaw
Cyber Threat / VulnerabilityA number of state-back threat actors from Russia and China have been o...
2023-10-19 12:2:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
winrar
38831
sandworm
apt28
phishing
Lazarus Group Targeting Defense Experts with Fake Interviews via Trojanized VNC Apps
The North Korea-linked Lazarus Group (aka Hidden Cobra or TEMP.Hermit) has been observed using troj...
2023-10-18 22:51:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
north
korean
korea
andariel
mandiant
Critical Citrix NetScaler Flaw Exploited to Target from Government, Tech Firms
Enterprise Security / VulnerabilityCitrix is warning of exploitation of a recently disclosed criti...
2023-10-18 20:27:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
netscaler
adc
mandiant
4966
citrix
Unraveling Real-Life Attack Paths – Key Lessons Learned
In the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities...
2023-10-18 19:42:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
removal
ssh
involving
disabling
Qubitstrike Targets Jupyter Notebooks with Crypto Mining and Rootkit Campaign
A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyte...
2023-10-18 19:42:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
cloud
qubitstrike
mi
codeberg
kdfs
TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments
Cyber Espionage / MalwareGovernment entities in the Asia-Pacific (APAC) region are the target of a...
2023-10-18 17:11:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
espionage
drives
malicious
machine
hardware
New Admin Takeover Vulnerability Exposed in Synology's DiskStation Manager
Vulnerability / Data SecurityA medium-severity flaw has been discovered in Synology's DiskStation...
2023-10-18 14:48:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
attacker
security
prng
brizinov
reconstruct
D-Link Confirms Data Breach: Employee Falls Victim to Phishing Attack
Data Breach / Network SecurityTaiwanese networking equipment manufacturer D-Link has confirmed a d...
2023-10-18 11:41:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
security
archaic
network
taiwanese
stating
Previous
93
94
95
96
97
98
99
100
Next