unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
PAN-OS Firewall Vulnerability Under Active Exploitation – IoCs Released
Vulnerability / Network SecurityPalo Alto Networks has released new indicators of compromise (IoCs...
2024-11-16 16:21:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
alto
palo
remote
security
exploited
Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
Vulnerability / VPN SecurityA threat actor known as BrazenBamboo has exploited an unresolved secur...
2024-11-16 14:25:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
windows
deepdata
lightspy
Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations
Cyber Espionage / MalwareCybersecurity researchers have shed light on a new remote access trojan a...
2024-11-16 01:57:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
wezrat
chrome
remote
israeli
Researchers Warn of Privilege Escalation Risks in Google's Vertex AI ML Platform
Artificial Intelligence / VulnerabilityCybersecurity researchers have disclosed two security flaws...
2024-11-15 20:35:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
vertex
openai
exfiltrate
tuned
Master Certificate Management: Join This Webinar on Crypto Agility and Best Practices
In the fast-paced digital world, trust is everything—but what happens when that trust is disrupted?...
2024-11-15 19:48:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
revocations
revocation
agility
exclusive
webinar
Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia
Malware / Credential TheftA Vietnamese-speaking threat actor has been linked to an information-ste...
2024-11-15 19:12:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
stealer
pxa
facebook
vietnamese
vietnam
How AI Is Transforming IAM and Identity Security
In recent years, artificial intelligence (AI) has begun revolutionizing Identity Access Management...
2024-11-15 18:30:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
threats
identities
machine
governance
High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables
Vulnerability / Database SecurityCybersecurity researchers have disclosed a high-severity security...
2024-11-15 14:40:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
database
security
varonis
limiting
Bitfinex Hacker Sentenced to 5 Years, Guilty of Laundering $10.5 Billion in Bitcoin
Financial Fraud / BlockchainIlya Lichtenstein, who pleaded guilty to the 2016 hack of cryptocurren...
2024-11-15 13:30:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
funds
morgan
bitfinex
network
CISA Flags Critical Palo Alto Network Flaws Actively Exploited in the Wild
Network Security / VulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) o...
2024-11-15 13:4:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
palo
alto
expedition
security
Experts Uncover 70,000 Hijacked Domains in Widespread 'Sitting Ducks' Attack Scheme
Multiple threat actors have been found taking advantage of an attack technique called Sitting Ducks...
2024-11-15 01:36:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
sitting
ducks
hijacked
infoblox
malicious
Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes
Artificial Intelligence / CryptocurrencyGoogle has revealed that bad actors are leveraging techniq...
2024-11-14 22:0:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
cloaking
reviews
investment
landing
schemes
5 BCDR Oversights That Leave You Exposed to Ransomware
Ransomware isn't just a buzzword; it's one of the most dreaded challenges businesses face in this...
2024-11-14 20:10:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
ransomware
backup
unitrends
windows
cloud
TikTok Pixel Privacy Nightmare: A New Case Study
Data Privacy / ComplianceAdvertising on TikTok is the obvious choice for any company trying to rea...
2024-11-14 18:30:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
reflectiz
travel
facebook
claims
fines
New RustyAttr Malware Targets macOS Through Extended Attribute Abuse
Cryptojacking / Threat IntelligenceThreat actors have been found leveraging a new technique that a...
2024-11-14 17:51:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
malicious
ib
development
north
tauri
Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails
A newly patched security flaw impacting Windows NT LAN Manager (NTLM) was exploited as a zero-day b...
2024-11-14 13:43:0 | 阅读: 34 |
收藏
|
The Hacker News - thehackernews.com
malicious
remote
download
exploited
spark
Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disruptive Attacks Against Israel
Threat Intelligence / Cyber EspionageA threat actor affiliated with Hamas has expanded its malicio...
2024-11-14 00:9:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
hamas
israel
espionage
wirte
israeli
Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims
Ransomware / Data ProtectionRomanian cybersecurity company Bitdefender has released a free decrypt...
2024-11-13 21:38:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
bitlocker
windows
ransomware
bitdefender
Comprehensive Guide to Building a Strong Browser Security Program
Browser Security / SaaS SecurityThe rise of SaaS and cloud-based work environments has fundamental...
2024-11-13 19:0:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
leakage
threats
malicious
OvrC Platform Vulnerabilities Expose IoT Devices to Remote Attacks and Code Execution
Cloud Security / VulnerabilityA security analysis of the OvrC cloud platform has uncovered 10 vul...
2024-11-13 17:28:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
cloud
ovrc
attacker
security
Previous
15
16
17
18
19
20
21
22
Next