unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Critical JetBrains TeamCity Flaw Could Expose Source Code and Build Pipelines to Attackers
Vulnerability / Source CodeA critical security vulnerability in the JetBrains TeamCity continuous...
2023-9-26 13:0:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
teamcity
security
sonar
jetbrains
atos
Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals
Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as l...
2023-9-25 21:5:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
ukrainian
merlin
uavs
manuals
Webinar — AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks
Artificial Intelligence / CybersecurityGenerative AI is a double-edged sword, if there ever was on...
2023-9-25 19:41:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
generative
zscaler
security
innovation
Are You Willing to Pay the High Cost of Compromised Credentials?
Password Security / CybersecurityWeak password policies leave organizations vulnerable to attacks....
2023-9-25 19:19:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
passwords
stuffing
specops
security
reusing
From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese
Spyware / Cyber EspionageTibetan, Uyghur, and Taiwanese individuals and organizations are the targ...
2023-9-25 18:34:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
evilbamboo
badsignal
badsolar
spyware
New Report Uncovers 3 Distinct Clusters of China-Nexus Attacks on Southeast Asian Government
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as pa...
2023-9-25 14:45:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
taurus
alloy
shells
gathering
cobalt
Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics
Cyber Espionage / MalwareCybersecurity researchers have discovered a previously undocumented advan...
2023-9-23 19:10:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
deadglyph
executor
shellcode
c2
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPh...
2023-9-23 14:12:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
eltantawy
spyware
predator
citizen
egypt
New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan...
2023-9-22 22:48:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
bbtok
banks
brazil
windows
mexico
How to Interpret the 2023 MITRE ATT&CK Evaluation Results
MITRE ATT&CK / CybersecurityThorough, independent tests are a vital resource for analyzing provide...
2023-9-22 18:50:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
cynet
detections
evaluation
analysis
Iranian Nation-State Actor OilRig Targets Israeli Organizations
Israeli organizations were targeted as part of two different campaigns orchestrated by the Iranian...
2023-9-22 17:25:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
oilrig
solar
israeli
windows
mango
High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
Server Security / VulnerabilityAtlassian and the Internet Systems Consortium (ISC) have disclosed...
2023-9-22 16:0:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
impacting
software
isc
terminate
security
Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
Apple has released yet another round of security patches to address three actively exploited zero-d...
2023-9-22 10:11:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
security
libwebp
inch
exploited
5th
Mysterious 'Sandman' Threat Actor Targets Telecom Providers Across Three Continents
Telecom Security / Cyber AttackA previously undocumented threat actor dubbed Sandman has been attr...
2023-9-22 03:55:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
luadream
lua
africa
tainted
Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
The peer-to-peer (P2) worm known as P2PInfect has witnessed a surge in activity since late August 2...
2023-9-21 20:51:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
p2pinfect
payload
security
muir
cado
The Rise of the Malicious App
SaaS Security / App SecuritySecurity teams are familiar with threats emanating from third-party ap...
2023-9-21 18:38:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
malicious
security
scopes
sspm
identify
China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
Cyber Espionage / SpywareChina's Ministry of State Security (MSS) has accused the U.S. of breaking...
2023-9-21 17:39:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
network
espionage
mss
spyware
security
Cyber Group 'Gold Melody' Selling Compromised Access to Ransomware Attackers
Cyber Threat / RansomwareA financially motivated threat actor has been outed as an initial access...
2023-9-21 17:11:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
melody
gold
ransomware
financially
Ukrainian Hacker Suspected to be Behind "Free Download Manager" Malware Attack
The maintainers of Free Download Manager (FDM) have acknowledged a security incident dating back to...
2023-9-21 16:48:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
fdm
download
malicious
visitors
software
Beware: Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with Venom RAT
A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR vu...
2023-9-21 13:3:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
winrar
exploited
github
python
venom
Previous
99
100
101
102
103
104
105
106
Next