unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
Firmware Security / VulnerabilityCybersecurity researchers have disclosed three security flaws in...
2025-1-17 14:8:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
attacker
remote
security
switches
malicious
Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation
Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based ap...
2025-1-17 13:6:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
gambling
gsocket
php
indonesian
imperva
How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?
Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure secu...
2025-1-17 10:21:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
security
network
cloud
captive
maintaining
New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass
Cybersecurity / Threat IntelligenceCybersecurity researchers have detailed a new adversary-in-the-...
2025-1-17 10:7:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
phishing
sneaky
microsoft
sekoia
U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs
Insider Threat / CryptocurrencyThe U.S. Treasury Department's Office of Foreign Assets Control (OF...
2025-1-17 10:7:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
korea
dprk
regime
north
treasury
European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China
Privacy / Data ProtectionAustrian privacy non-profit None of Your Business (noyb) has filed compl...
2025-1-17 04:14:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
godaddy
noyb
ftc
complaints
Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting
Spear Phishing / Threat IntelligenceThe Russian threat actor known as Star Blizzard has been linke...
2025-1-16 18:12:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
blizzard
spear
russia
phishing
microsoft
Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action
Certificate Management / ComplianceThe digital world is exploding. IoT devices are multiplying lik...
2025-1-16 12:25:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
digicert
security
workflows
paced
webinar
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
You can tell the story of the current state of stolen credential-based attacks in three numbers:S...
2025-1-16 11:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
feeds
passwords
attackers
breached
New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits
Vulnerability / CybersecurityDetails have emerged about a now-patched security vulnerability that...
2025-1-16 11:23:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
software
20241127
microsoft
malicious
efi
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
Active Directory / VulnerabilityCybersecurity researchers have found that the Microsoft Active Dir...
2025-1-16 11:20:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
ntlmv1
windows
security
segal
Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
Threat actors have been observed concealing malicious code in images to deliver malware such as VIP...
2025-1-16 11:15:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
malicious
loader
powershell
stealer
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
Endpoint Security / RansomwareCybersecurity researchers have detailed an attack that involved a th...
2025-1-16 06:45:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
ransomware
python
security
socgholish
network
Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager
Vulnerability / Endpoint SecurityIvanti has rolled out security updates to address several securit...
2025-1-16 06:39:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
epm
attacker
avalanche
Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes
Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals...
2025-1-15 15:48:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
stealer
segura
phishing
fraudulent
conceal
Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99
The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Oper...
2025-1-15 15:37:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
developers
web3
serves
clipboard
North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains
Blockchain / CryptocurrencyCybersecurity researchers have identified infrastructure links between...
2025-1-15 13:32:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
north
korea
korean
yanbian
Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool
Vulnerability / Software UpdateAs many as six security vulnerabilities have been disclosed in the...
2025-1-15 12:26:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
rsync
client
12084
symbolic
12085
The High-Stakes Disconnect For ICS/OT Security
Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS...
2025-1-15 11:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
threats
tactical
operational
FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation
Malware / Threat IntelligenceThe U.S. Department of Justice (DoJ) on Tuesday disclosed that a cou...
2025-1-15 06:14:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
plugx
victim
sekoia
mustang
Previous
0
1
2
3
4
5
6
7
Next