unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Guide: The Ultimate Pentest Checklist for Full-Stack Security
Penetration Testing / API SecurityPentest Checklists Are More Important Than EverGiven the expand...
2024-10-21 19:25:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
checklist
checklists
network
THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 - Oct 20)
Cybersecurity / Weekly RecapHi there! Here's your quick update on the latest in cybersecurity.Hac...
2024-10-21 19:11:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
injection
lucr
Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers
Encryption / Data ProtectionCybersecurity researchers have discovered severe cryptographic issues...
2024-10-21 14:59:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
malicious
seafile
tampering
pcloud
icedrive
Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials
Vulnerability / Email SecurityUnknown threat actors have been observed attempting to exploit a now...
2024-10-20 15:37:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
roundcube
client
software
webmail
security
Acronym Overdose – Navigating the Complex Data Security Landscape
In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP,...
2024-10-19 17:30:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
dlp
cloud
acronyms
ddr
Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks
Network Security / Data BreachA nascent threat actor known as Crypt Ghouls has been linked to a se...
2024-10-19 15:39:0 | 阅读: 15 |
收藏
|
The Hacker News - thehackernews.com
network
contractor
russia
remote
security
North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data
Insider Threat / Cyber EspionageNorth Korean information technology (IT) workers who obtain employ...
2024-10-18 21:52:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
north
korean
laptops
contractors
secureworks
The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture
Webinar / Data ProtectionPicture your company's data as a vast, complex jigsaw puzzle—scattered ac...
2024-10-18 19:25:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
dspm
security
posture
webinar
puzzle
U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign
Cyber Intelligence / Critical InfrastructureCybersecurity and intelligence agencies from Australia...
2024-10-18 19:0:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
security
nation
bombing
australian
tactic
Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign
Threat Intelligence / Phishing AttackThreat actors are leveraging fake Google Meet web pages as pa...
2024-10-18 17:43:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
stealer
clickfix
sekoia
powershell
Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser
Threat Intelligence / Browser SecurityMicrosoft has disclosed details about a now-patched security...
2024-10-18 13:42:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
microsoft
security
hm
surf
microphone
Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant
Threat Intelligence / MalwareThe Russian threat actor known as RomCom has been linked to a new wav...
2024-10-18 00:13:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
romcom
espionage
Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program
Ransomware / Network SecurityCybersecurity researchers have gleaned additional insights into a nas...
2024-10-17 21:54:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
ransomware
cicada3301
affiliate
affiliates
faq
SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack
An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flur...
2024-10-17 18:15:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
malicious
loader
stealerbot
windows
remote
U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks
Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denia...
2024-10-17 17:3:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
anonymous
sudan
salah
hacktivist
criminal
Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk
Vulnerability / KubernetesA critical security flaw has been disclosed in the Kubernetes Image Buil...
2024-10-17 13:18:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
kubernetes
attacker
solr
network
Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
Endpoint Security / MalwareThreat actors are attempting to abuse the open-source EDRSilencer tool...
2024-10-17 00:21:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
processes
security
wfp
edrsilencer
outbound
FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms
Data Privacy / PasswordlessThe FIDO Alliance said it's working to make passkeys and other credenti...
2024-10-16 21:23:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
passkeys
alliance
fido
exchange
passwords
From Misuse to Abuse: AI Risks and Attacks
Artificial Intelligence / CybercrimeAI from the attacker's perspective: See how cybercriminals are...
2024-10-16 19:25:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
attackers
gpt
gpts
llm
malicious
North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware
Zero-Day / Windows SecurityThe North Korean threat actor known as ScarCruft has been linked to th...
2024-10-16 18:50:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
toast
security
remote
korean
rokrat
Previous
16
17
18
19
20
21
22
23
Next