unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals
Several malicious Android apps that turn mobile devices running the operating system into residenti...
2024-4-1 18:10:0 | 阅读: 1 |
收藏
|
The Hacker News - thehackernews.com
residential
proxy
lumiapps
proxies
proxyware
Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities
The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved...
2024-4-1 14:4:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
vultur
malicious
victim
remote
Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware
Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware,...
2024-3-30 15:16:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
stealer
malicious
dmg
security
software
Urgent: Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros
Linux / Supply Chain AttackRedHat on Friday released an "urgent security alert" warning that two v...
2024-3-30 13:23:0 | 阅读: 21 |
收藏
|
The Hacker News - thehackernews.com
xz
library
software
security
fedora
Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds
Reverse Engineering / RFID SecuritySecurity vulnerabilities discovered in Dormakaba's Saflok elect...
2024-3-29 22:54:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
keycards
keycard
dormakaba
locks
TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy
Network Security / IoT SecurityA botnet previously considered to be rendered inert has been observ...
2024-3-29 20:12:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
faceless
proxy
security
eol
bots
The Golden Age of Automated Penetration Testing is Here
Pen Testing / Regulatory ComplianceNetwork penetration testing plays a vital role in detecting vul...
2024-3-29 19:19:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
network
vpentest
vonahi
New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking
Details have emerged about a vulnerability impacting the "wall" command of the util-linux package t...
2024-3-29 18:49:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
wall
terminals
setgid
28085
sequences
PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers
Supply Chain Attack / Threat IntelligenceThe maintainers of the Python Package Index (PyPI) reposi...
2024-3-29 13:37:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
variations
malicious
pypi
payload
matplotlib
Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries
A Linux version of a multi-platform backdoor called DinodasRAT has been detected in the wild target...
2024-3-29 01:2:0 | 阅读: 14 |
收藏
|
The Hacker News - thehackernews.com
dinodasrat
windows
c2
espionage
tracks
Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack
Cyber Espionage / MalwareThe Police of Finland (aka Poliisi) has formally accused a Chinese nation...
2024-3-29 00:50:0 | 阅读: 23 |
收藏
|
The Hacker News - thehackernews.com
apt31
guangzong
zhao
wuhan
espionage
Darcula Phishing Network Leveraging RCS and iMessage to Evade Detection
A sophisticated phishing-as-a-service (PhaaS) platform called Darcula has set its sights on organiz...
2024-3-28 22:43:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
darcula
phishing
victim
rcs
imessage
New Webinar: Avoiding Application Security Blind Spots with OPSWAT and F5
Application Security / WebinarConsidering the ever-changing state of cybersecurity, it's never too...
2024-3-28 20:43:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
opswat
webinar
spots
Behind the Scenes: The Art of Safeguarding Non-Human Identities
Secrets Management / Zero TrustIn the whirlwind of modern software development, teams race against...
2024-3-28 19:0:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
development
software
stage
identities
New ZenHammer Attack Bypasses Rowhammer Defenses on AMD CPUs
Hardware Security / VulnerabilityCybersecurity researchers from ETH Zurich have developed a new va...
2024-3-28 18:55:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
rowhammer
flips
memory
ddr5
zen
Telegram Offers Premium Subscription in Exchange for Using Your Number to Send OTPs
Technology / Data PrivacyIn June 2017, a study of more than 3,000 Massachusetts Institute of Techn...
2024-3-28 16:7:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
otp
facebook
snapchat
p2pl
recipients
Hackers Hit Indian Defense, Energy Sectors with Malware Posing as Air Force Invite
Cyber Espionage / Data BreachIndian government entities and energy companies have been targeted by...
2024-3-27 23:24:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
indian
flightnight
stealer
gostealer
phishing
CISA Warns: Hackers Actively Attacking Microsoft SharePoint Vulnerability
Threat Intelligence / Network SecurityThe U.S. Cybersecurity and Infrastructure Security Agency (C...
2024-3-27 21:15:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
microsoft
security
24955
catalog
Microsoft Edge Bug Could Have Allowed Attackers to Silently Install Malicious Extensions
Vulnerability / API Security A now-patched security flaw in the Microsoft Edge web browser could h...
2024-3-27 20:54:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
microsoft
security
attacker
bing
zaytsev
SASE Solutions Fall Short Without Enterprise Browser Extensions, New Report Reveals
Data Protection / Browser SecurityAs SaaS applications dominate the business landscape, organizati...
2024-3-27 18:56:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
security
malicious
network
phishing
limitations
Previous
64
65
66
67
68
69
70
71
Next