unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How AI Is Transforming IAM and Identity Security
In recent years, artificial intelligence (AI) has begun revolutionizing Identity Access Management...
2024-11-15 18:30:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
threats
identities
machine
governance
High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables
Vulnerability / Database SecurityCybersecurity researchers have disclosed a high-severity security...
2024-11-15 14:40:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
database
security
varonis
limiting
Bitfinex Hacker Sentenced to 5 Years, Guilty of Laundering $10.5 Billion in Bitcoin
Financial Fraud / BlockchainIlya Lichtenstein, who pleaded guilty to the 2016 hack of cryptocurren...
2024-11-15 13:30:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
funds
morgan
bitfinex
network
CISA Flags Critical Palo Alto Network Flaws Actively Exploited in the Wild
Network Security / VulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) o...
2024-11-15 13:4:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
palo
alto
expedition
security
Experts Uncover 70,000 Hijacked Domains in Widespread 'Sitting Ducks' Attack Scheme
Multiple threat actors have been found taking advantage of an attack technique called Sitting Ducks...
2024-11-15 01:36:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
sitting
ducks
hijacked
infoblox
malicious
Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes
Artificial Intelligence / CryptocurrencyGoogle has revealed that bad actors are leveraging techniq...
2024-11-14 22:0:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
cloaking
reviews
investment
landing
schemes
5 BCDR Oversights That Leave You Exposed to Ransomware
Ransomware isn't just a buzzword; it's one of the most dreaded challenges businesses face in this...
2024-11-14 20:10:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
ransomware
backup
unitrends
windows
cloud
TikTok Pixel Privacy Nightmare: A New Case Study
Data Privacy / ComplianceAdvertising on TikTok is the obvious choice for any company trying to rea...
2024-11-14 18:30:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
reflectiz
travel
facebook
claims
fines
New RustyAttr Malware Targets macOS Through Extended Attribute Abuse
Cryptojacking / Threat IntelligenceThreat actors have been found leveraging a new technique that a...
2024-11-14 17:51:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
malicious
ib
development
north
tauri
Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails
A newly patched security flaw impacting Windows NT LAN Manager (NTLM) was exploited as a zero-day b...
2024-11-14 13:43:0 | 阅读: 33 |
收藏
|
The Hacker News - thehackernews.com
malicious
remote
download
exploited
spark
Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disruptive Attacks Against Israel
Threat Intelligence / Cyber EspionageA threat actor affiliated with Hamas has expanded its malicio...
2024-11-14 00:9:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
hamas
israel
espionage
wirte
israeli
Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims
Ransomware / Data ProtectionRomanian cybersecurity company Bitdefender has released a free decrypt...
2024-11-13 21:38:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
bitlocker
windows
ransomware
bitdefender
Comprehensive Guide to Building a Strong Browser Security Program
Browser Security / SaaS SecurityThe rise of SaaS and cloud-based work environments has fundamental...
2024-11-13 19:0:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
leakage
threats
malicious
OvrC Platform Vulnerabilities Expose IoT Devices to Remote Attacks and Code Execution
Cloud Security / VulnerabilityA security analysis of the OvrC cloud platform has uncovered 10 vul...
2024-11-13 17:28:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
cloud
ovrc
attacker
security
Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks
Cyber Espionage / MalwareThe Iranian threat actor known as TA455 has been observed taking a leaf o...
2024-11-13 15:14:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
ta455
malicious
sandstorm
clearsky
yellow
Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs
Vulnerability / Patch TuesdayMicrosoft on Tuesday revealed that two security flaws impacting Windo...
2024-11-13 15:14:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
attacker
microsoft
security
remote
New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration
Virtualization / VulnerabilityCybersecurity researchers have disclosed new security flaws impactin...
2024-11-12 22:1:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
citrix
msmq
recording
hotfix
New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns
Email Security / Threat IntelligenceCybersecurity researchers are calling attention to a new sophi...
2024-11-12 22:0:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
github
goissue
visio
phishing
developer
North Korean Hackers Target macOS Using Flutter-Embedded Malware
Malware / Application SecurityThreat actors with ties to the Democratic People's Republic of Korea...
2024-11-12 21:0:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
flutter
suspect
north
korea
dart
5 Ways Behavioral Analytics is Revolutionizing Incident Response
Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a r...
2024-11-12 19:0:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
behavioral
socs
positives
analysis
Previous
10
11
12
13
14
15
16
17
Next