unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Reimagining Network Pentesting With Automation
Network penetration testing plays a crucial role in protecting businesses in the ever-evolving worl...
2023-12-14 19:17:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
network
security
testers
Reimagining Network Pentesting With Automation
Network penetration testing plays a crucial role in protecting businesses in the ever-evolving worl...
2023-12-14 19:17:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
network
security
vonahi
Russian SVR-Linked APT29 Targets JetBrains TeamCity Servers in Ongoing Attacks
Threat actors affiliated with the Russian Foreign Intelligence Service (SVR) have targeted unpatche...
2023-12-14 18:32:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
blizzard
microsoft
security
ukraine
teamcity
New Hacker Group 'GambleForce' Tageting APAC Firms Using SQL Injection Attacks
Vulnerability / Data BreachA previously unknown hacker outfit called GambleForce has been attribut...
2023-12-14 14:30:0 | 阅读: 13 |
收藏
|
The Hacker News - thehackernews.com
security
gambleforce
injections
exclusive
webinar
Microsoft Takes Legal Action to Crack Down on Storm-1152's Cybercrime Network
Cybercrime / Threat intelligenceMicrosoft on Wednesday said it obtained a court order to seize inf...
2023-12-14 13:46:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
fraudulent
microsoft
security
van
1152
BazaCall Phishing Scammers Now Leveraging Google Forms for Deception
Cyber Threat / Phishing AttackThe threat actors behind the BazaCall call back phishing attacks hav...
2023-12-13 23:22:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
security
phishing
attacker
eggs
ultimately
Google Using Clang Sanitizers to Protect Android Against Cellular Baseband Vulnerabilities
Mobile Communication / Firmware securityGoogle is highlighting the role played by Clang sanitizers...
2023-12-13 21:15:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
baseband
2g
sanitizers
boundsan
How to Analyze Malware’s Network Traffic in A Sandbox
Malware analysis encompasses a broad range of activities, including examining the malware's network...
2023-12-13 20:2:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
proxy
malicious
fakenet
smoke
loader
Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing
Cryptocurrency / Threat AnalysisMicrosoft has warned that adversaries are using OAuth applications...
2023-12-13 18:55:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
microsoft
phishing
security
webinar
Major Cyber Attack Paralyzes Kyivstar - Ukraine's Largest Telecom Operator
Cyber Attack / GeopoliticsUkraine's biggest telecom operator Kyivstar has become the victim of a c...
2023-12-13 18:18:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
kyivstar
russia
ukraine
fns
network
Microsoft's Final 2023 Patch Tuesday: 33 Flaws Fixed, Including 4 Critical
Patch Tuesday / Windows SecurityMicrosoft released its final set of Patch Tuesday updates for 2023...
2023-12-13 13:50:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
microsoft
dhcp
security
tuesday
remote
Unveiling the Cyber Threats to Healthcare: Beyond the Myths
Let's begin with a thought-provoking question: among a credit card number, a social security number...
2023-12-13 02:9:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
healthcare
security
github
ransomware
attackers
Russian APT28 Hackers Targeting 13 Nations in Ongoing Cyber Espionage Campaign
Cyber Espionage / MalwareThe Russian nation-state threat actor known as APT28 has been observed ma...
2023-12-12 22:52:0 | 阅读: 11 |
收藏
|
The Hacker News - thehackernews.com
itg05
ukraine
security
nations
Non-Human Access is the Path of Least Resistance: A 2023 Recap
Cybersecurity / GenAI Security2023 has seen its fair share of cyber attacks, however there's one a...
2023-12-12 19:25:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
security
github
genai
astrix
attackers
New MrAnon Stealer Malware Targeting German Users via Booking-Themed Scam
Cryptocurrency / Cyber AttackA phishing campaign has been observed delivering an information steal...
2023-12-12 17:55:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
stealer
phishing
mranon
python
lin
Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws
Apple on Monday released security patches for iOS, iPadOS, macOS, tvOS, watchOS, and Safari web bro...
2023-12-12 14:44:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
security
webkit
consistency
psychology
webinar
New Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch Now
Vulnerability / Software SecurityApache has released a security advisory warning of a critical sec...
2023-12-12 13:23:0 | 阅读: 12 |
收藏
|
The Hacker News - thehackernews.com
struts
security
software
exploited
incite
Researchers Unmask Sandman APT's Hidden Link to China-Based KEYPLUG Backdoor
Threat Intelligence / Cyber AttackTactical and targeting overlaps have been discovered between the...
2023-12-11 21:59:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
keyplug
luadream
0866
overlaps
c2
Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans
Vulnerability / EspionageThe notorious North Korea-linked threat actor known as the Lazarus Group...
2023-12-11 21:0:0 | 阅读: 10 |
收藏
|
The Hacker News - thehackernews.com
ninerat
security
c2
attackers
north
Playbook: Your First 100 Days as a vCISO - 5 Steps to Success
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every orga...
2023-12-11 19:45:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
vciso
security
playbook
goals
Previous
88
89
90
91
92
93
94
95
Next