unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized
The U.S. Department of Justice (DoJ) on Thursday announced the shutdown of an illicit marketplace c...
2024-12-13 14:6:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
rydox
kutleshi
kayode
spain
doj
Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms
IoT Security / Operational TechnologyIran-affiliated threat actors have been linked to a new custo...
2024-12-13 11:44:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
claroty
fuel
iocontrol
c2
gasboy
How to Generate a CrowdStrike RFM Report With AI in Tines
Automation / Endpoint SecurityRun by the team at orchestration, AI, and automation platform Tines,...
2024-12-13 11:30:0 | 阅读: 0 |
收藏
|
The Hacker News - thehackernews.com
tines
crowdstrike
rfm
falcon
security
New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection
Cybersecurity researchers have uncovered a new Linux rootkit called PUMAKIT that comes with capabil...
2024-12-13 09:11:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
memfd
pumakit
memory
resident
stage
Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online
Vulnerability / Cloud SecurityCybersecurity researchers are warning that thousands of servers host...
2024-12-12 22:24:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
exporters
security
repojacking
exporter
pprof
Gamaredon Deploys Android Spyware "BoneSpy" and "PlainGnome" in Former Soviet States
Mobile Security / Cyber EspionageThe Russia-linked state-sponsored threat actor tracked as Gamared...
2024-12-12 21:35:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
plaingnome
bonespy
gamaredon
russia
lookout
Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS
Vulnerability / Device SecurityDetails have emerged about a now-patched security vulnerability in...
2024-12-12 20:35:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
security
privileges
malicious
undermines
exploited
SaaS Budget Planning Guide for IT Professionals
SaaS services are one of the biggest drivers of OpEx (operating expenses) for modern businesses. Wi...
2024-12-12 19:30:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
budget
budgeting
costs
pricing
spending
WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins
Website Security / VulnerabilityMalicious actors are exploiting a critical vulnerability in the Hu...
2024-12-12 17:18:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
attackers
companion
security
hunk
wordpress
Europol Dismantles 27 DDoS Attack Platforms Across 15 Nations; Admins Arrested
Cyber Crime / DDoS AttackA global law enforcement operation has failed 27 stresser services that w...
2024-12-12 14:15:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
stresser
coordinated
france
security
poweroff
Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service
Malware / Cyber EspionageThe Russian nation-state actor tracked as Secret Blizzard has been observ...
2024-12-12 02:2:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
amadey
blizzard
microsoft
c2
powershell
New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools
Malware / Endpoint SecurityA newly devised technique leverages a Windows accessibility framework c...
2024-12-11 23:13:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
dcom
security
malicious
assistive
lateral
Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts
Vulnerability / AuthenticationCybersecurity researchers have flagged a "critical" security vulnera...
2024-12-11 22:32:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
microsoft
oasis
digit
ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms
Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domai...
2024-12-11 22:7:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
zloader
ransomware
c2
analysis
zscaler
Chinese EagleMsgSpy Spyware Found Exploiting Mobile Devices Since 2017
Cybersecurity researchers have discovered a novel surveillance program that's suspected to be used...
2024-12-11 19:2:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
eaglemsgspy
lookout
wuhan
victim
c2
Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia
Cyber Espionage / Cyber AttackA suspected China-based threat actor has been linked to a series of...
2024-12-11 19:0:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
espionage
symantec
southeast
sea
lasted
Microsoft Fixes 72 Flaws, Including Patch for Actively Exploited CLFS Vulnerability
Microsoft closed out its Patch Tuesday updates for 2024 with fixes for a total of 72 security flaws...
2024-12-11 15:16:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
windows
microsoft
security
clfs
exploited
U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls
Vulnerability / Data BreachThe U.S. government on Tuesday unsealed charges against a Chinese natio...
2024-12-11 14:29:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
firewalls
sophos
guan
sichuan
silence
Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities
Vulnerability / Network SecurityIvanti has released security updates to address multiple critical...
2024-12-11 10:59:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
ivanti
remote
attacker
privileges
injection
Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged
Vulnerability / Threat AnalysisUsers of Cleo-managed file transfer software are being urged to ens...
2024-12-10 23:57:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
cleo
termite
software
ransomware
lexicom
Previous
3
4
5
6
7
8
9
10
Next