unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
When is One Vulnerability Scanner Not Enough?
Like antivirus software, vulnerability scans rely on a database of known weaknesses.That's why web...
2024-5-2 18:25:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
intruder
nuclei
scanners
openvas
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
Cyber Attack / Data BreachCloud storage services provider Dropbox on Wednesday disclosed that Drop...
2024-5-2 18:19:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
dropbox
hellosign
filing
attackers
New "Goldoon" Botnet Targets D-Link Routers With Decade-Old Flaw
A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly...
2024-5-2 18:10:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
routers
security
remote
proxy
goldoon
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
Vulnerability / Data BreachThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ad...
2024-5-2 14:15:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
gitlab
malicious
security
exploited
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Cyber Espionage / Network SecurityA new malware called Cuttlefish is targeting small office and ho...
2024-5-2 13:4:0 | 阅读: 16 |
收藏
|
The Hacker News - thehackernews.com
cuttlefish
network
i386
cloud
Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds
Financial Crime / Forensic AnalysisA forensic analysis of a graph dataset containing transactions...
2024-5-1 22:25:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
laundering
subgraphs
robinson
illicit
exchange
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Cybersecurity researchers have discovered a previously undocumented malware targeting Android devic...
2024-5-1 21:41:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
c2
wpeeper
uptodown
coded
wordpress
Everyone's an Expert: How to Empower Your Employees for Cybersecurity Success
There's a natural human desire to avoid threatening scenarios. The irony, of course, is if you hop...
2024-5-1 19:3:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
sat
security
threats
episodes
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan
The authors behind the resurfaced ZLoader malware have added a feature that was originally present...
2024-5-1 18:27:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
zloader
zeus
analysis
zscaler
vicente
Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia
National Security / Insider ThreatA former employee of the U.S. National Security Agency (NSA) has...
2024-5-1 14:32:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
dalke
russia
security
ndi
christopher
Millions of Malicious 'Imageless' Containers Planted on Docker Hub Over 5 Years
Docker Hub / Supply Chain AttackCybersecurity researchers have discovered multiple campaigns targe...
2024-4-30 21:36:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
imageless
malicious
payload
developers
phishing
U.S. Government Releases New AI Security Guidelines for Critical Infrastructure
Machine Learning / National SecurityThe U.S. government has unveiled new security guidelines aimed...
2024-4-30 18:36:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
security
llm
malicious
prompts
civil
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
The U.K. National Cyber Security Centre (NCSC) is calling on manufacturers of smart devices to comp...
2024-4-30 13:57:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
passwords
ncsc
psti
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Mobile Security / HackingGoogle on Monday revealed that almost 200,000 app submissions to its Play...
2024-4-30 01:7:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
security
developer
investment
malicious
processes
China-Linked 'Muddling Meerkat' Hijacks DNS to Map Internet on Global Scale
A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophis...
2024-4-29 21:46:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
muddling
gfw
meerkat
mx
burton
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those...
2024-4-29 18:54:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
exposure
security
weaknesses
posture
New R Programming Vulnerability Exposes Projects to Supply Chain Attacks
Programming / Supply ChainA security vulnerability has been discovered in the R programming langua...
2024-4-29 18:50:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
rds
attacker
security
loaded
27322
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Multiple critical security flaws have been disclosed in the Judge0 open-source online code executio...
2024-4-29 17:58:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
judge0
attacker
database
machine
ssrf
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Credential Stuffing / Data BreachIdentity and access management (IAM) services provider Okta has w...
2024-4-28 21:52:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
stuffing
okta
proxyware
residential
proxies
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found...
2024-4-27 20:47:0 | 阅读: 21 |
收藏
|
The Hacker News - thehackernews.com
apt44
ppsx
military
petapixel
weavesilk
Previous
57
58
59
60
61
62
63
64
Next