unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware
National Security Agency / Threat IntelligenceThe Russia-linked nation-state threat actor tracked...
2024-4-23 12:23:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
gooseegg
powershell
blizzard
forest
microsoft
Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft
Network Security / Endpoint SecurityThe threat actor known as ToddyCat has been observed using a w...
2024-4-22 23:11:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
security
attackers
microsoft
reverse
toddycat
Pentera's 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have...
2024-4-22 19:30:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
cisos
cloud
importance
MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws
Network Security / CybersecurityThe MITRE Corporation revealed that it was the target of a nation-...
2024-4-22 19:5:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
network
exploited
security
nerve
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Between crossovers - Do threat actors play dirty or desperate? In our dataset of over 11,000 victi...
2024-4-22 18:22:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
victim
cy
extortion
security
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Rootkit / Software SecurityNew research has found that the DOS-to-NT path conversion process could...
2024-4-22 17:22:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
security
microsoft
software
windows
conversion
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
Cryptocurrency / Artificial IntelligenceMicrosoft has revealed that North Korea-linked state-spons...
2024-4-22 15:12:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
north
sleet
firm
windows
korean
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
A new information stealer has been found leveraging Lua bytecode for added stealth and sophisticati...
2024-4-21 16:42:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
stealer
redline
mcafee
microsoft
bytecode
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Vulnerability / Network SecurityPalo Alto Networks has shared more details of a critical security...
2024-4-20 13:53:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
pan
attacker
security
3400
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
Vulnerability / Endpoint SecurityUsers of the CrushFTP enterprise file transfer software are being...
2024-4-20 13:18:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
crushftp
crowdstrike
security
v11
politically
BlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Tool
Network Security / Firmware SecurityTechnology, research, and government sectors in the Asia-Pacif...
2024-4-19 21:44:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
waterbear
network
deuterbear
analysis
earth
How Attackers Can Own a Business Without Touching the Endpoint
Attackers are increasingly making use of "networkless" attack techniques targeting cloud apps and i...
2024-4-19 19:8:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
cloud
identities
phishing
security
okta
Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers
Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit...
2024-4-19 19:1:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
ransomware
akira
lockbit
agenda
victim
Hackers Target Middle East Governments with Evasive "CR4T" Backdoor
Cyber Espionage / Threat IntelligenceGovernment entities in the Middle East have been targeted as...
2024-4-19 14:16:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
c2
cr4t
payload
dunequixote
analysis
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
Incident Response / Cyber EspionageSelect Ukrainian government networks have remained infected wit...
2024-4-18 22:25:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
offlrouter
ukraine
svajcer
ctrlpanel
removable
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
The infamous cybercrime syndicate known as FIN7 has been linked to a spear-phishing campaign target...
2024-4-18 21:58:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
fin7
blackberry
phishing
anunak
malicious
Recover from Ransomware in 5 Minutes—We will Teach You How!
read file error: read notes: is a directory...
2024-4-18 19:17:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
zerto
vms
ransomware
failover
rpo
New Android Trojan 'SoumniBot' Evades Detection with Clever Tricks
Mobile Security / MalwareA new Android trojan called SoumniBot has been detected in the wild targe...
2024-4-18 18:31:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
soumnibot
analysis
kalinin
korea
How to Conduct Advanced Static Analysis in a Malware Sandbox
Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a s...
2024-4-18 18:31:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
analysis
malicious
reveal
threats
phishing
Global Police Operation Disrupts 'LabHost' Phishing Service, Over 30 Arrested Worldwide
As many as 37 individuals have been arrested as part of an international crackdown on a cybercrime...
2024-4-18 18:28:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
phishing
labhost
phaas
brands
europol
Previous
37
38
39
40
41
42
43
44
Next