unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How to Conduct Advanced Static Analysis in a Malware Sandbox
Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a s...
2024-4-18 18:31:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
analysis
malicious
reveal
threats
phishing
Global Police Operation Disrupts 'LabHost' Phishing Service, Over 30 Arrested Worldwide
As many as 37 individuals have been arrested as part of an international crackdown on a cybercrime...
2024-4-18 18:28:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
phishing
labhost
phaas
brands
europol
Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes
Container Security / CryptocurrencyThreat actors are actively exploiting critical vulnerabilities...
2024-4-18 13:54:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
injection
security
network
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Malvertising / Endpoint SecurityA new Google malvertising campaign is leveraging a cluster of doma...
2024-4-18 12:48:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
threshold
security
c2
download
Russian APT Deploys New 'Kapeka' Backdoor in Eastern European Attacks
Ransomware / Cyber EspionageA previously undocumented "flexible" backdoor called Kapeka has been "...
2024-4-17 21:32:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
kapeka
c2
microsoft
sandworm
ransomware
GenAI: A New Headache for SaaS Security Teams
The introduction of Open AI's ChatGPT was a defining moment for the software industry, touching off...
2024-4-17 19:7:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
genai
security
chatgpt
threats
ban
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Encryption / VulnerabilityThreat actors are exploiting unpatched Atlassian servers to deploy a Lin...
2024-4-17 18:57:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
ransomware
cerber
payload
security
bill
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Vulnerability / Web Application FirewallCybersecurity researchers have discovered a new campaign t...
2024-4-17 18:23:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
download
powerfun
remote
forticlient
Cisco Warns of Global Surge in Brute-Force Attacks Targeting VPN and SSH Services
IoT Security / Network SecurityCisco is warning about a global surge in brute-force attacks target...
2024-4-17 16:38:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
proxy
security
network
botnets
proxies
OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt
Supply Chain / Software SecuritySecurity researchers have uncovered a "credible" takeover attempt...
2024-4-16 23:16:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
openjs
security
xz
maintainer
arasaratnam
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
Threat Intelligence / Endpoint SecurityThe threat actor tracked as TA558 has been observed leverag...
2024-4-16 21:39:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
phishing
tesla
ta558
security
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Cloud Security / DevSecOpsNew cybersecurity research has found that command-line interface (CLI) t...
2024-4-16 21:26:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
cloud
security
github
gcloud
nisimi
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Encryption / Network SecurityThe maintainers of the PuTTY Secure Shell (SSH) and Telnet client are...
2024-4-16 19:14:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
putty
ecdsa
bäumer
ssh
filezilla
Identity in the Shadows: Shedding Light on Cybersecurity's Unseen Threats
Cloud Security / Threat IntelligenceIn today's rapidly evolving digital landscape, organizations f...
2024-4-16 19:10:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
security
cloud
threats
attackers
ites
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Privacy Breach / Regulatory ComplianceThe U.S. Federal Trade Commission (FTC) has ordered the ment...
2024-4-16 16:36:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
ftc
advertising
parties
cerebral
consumers
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Two individuals have been arrested in Australia and the U.S. in connection with an alleged scheme t...
2024-4-16 15:33:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
parks
doj
charges
cloud
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
Firmware Security / VulnerabilityA security flaw impacting the Lighttpd web server used in baseboa...
2024-4-16 00:51:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
lighttpd
security
firmware
lenovo
forever
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Imagine a world where the software that powers your favorite apps, secures your online transactions...
2024-4-15 21:30:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
copilot
security
software
github
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Cloud Security /SaaS SecurityThe threat actor known as Muddled Libra has been observed actively ta...
2024-4-15 21:29:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
muddled
libra
cloud
security
lateral
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Active Directory / Attack SurfaceTo minimize the risk of privilege misuse, a trend in the privileg...
2024-4-15 18:21:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
privileged
safeguard
privileges
security
Previous
60
61
62
63
64
65
66
67
Next