unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks
Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect...
2024-4-9 13:46:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
attackers
security
botnets
network
Google Chrome Adds V8 Sandbox - A New Defense Against Browser Attacks
Software Security / CybersecurityGoogle has announced support for what's called a V8 Sandbox in th...
2024-4-8 21:51:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
memory
corruption
security
attacker
Watch Out for 'Latrodectus' - This Malware Could Be In Your Inbox
Cybercrime / Network SecurityThreat hunters have discovered a new malware called Latrodectus that...
2024-4-8 19:29:0 | 阅读: 4 |
收藏
|
The Hacker News - thehackernews.com
icedid
latrodectus
c2
ta578
processes
The Drop in Ransomware Attacks in 2024 and What it Means
The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, r...
2024-4-8 19:23:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
ransomware
lockbit
q1
alphv
decrease
Cybercriminals Targeting Latin America with Sophisticated Phishing Scheme
Cybersecurity / MalvertisingA new phishing campaign has set its eyes on the Latin American region...
2024-4-8 16:36:0 | 阅读: 18 |
收藏
|
The Hacker News - thehackernews.com
malicious
phishing
security
latin
Google Sues App Developers Over Fake Crypto Investment App Scam
Investment Scam / Mobile SecurityGoogle has filed a lawsuit against two app developers for engagin...
2024-4-8 13:25:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
defendants
investment
bogus
gains
promising
Hackers Exploit Magento Bug to Steal Payment Data from E-commerce Websites
Skimmer / Threat IntelligenceThreat actors have been found exploiting a critical flaw in Magento t...
2024-4-6 17:43:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
skimmer
magento
inject
alexander
illegally
AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks
Artificial Intelligence / Supply Chain AttackNew research has found that artificial intelligence (...
2024-4-5 22:8:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
hugging
pickle
malicious
security
artificial
CISO Perspectives on Complying with Cybersecurity Regulations
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyb...
2024-4-5 19:18:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
security
cisos
ciso
costs
From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware
Malware / Endpoint SecurityBogus installers for Adobe Acrobat Reader are being used to distribute...
2024-4-5 17:40:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
security
byakugan
malicious
victim
c2
New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA
Cyber Espionage / CybersecurityFinancial organizations in the Asia-Pacific (APAC) and Middle East...
2024-4-5 15:48:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
malicious
resecurity
jsoutprox
security
Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws
Advanced Persistent ThreatMultiple China-nexus threat actors have been linked to the zero-day expl...
2024-4-5 15:15:0 | 阅读: 9 |
收藏
|
The Hacker News - thehackernews.com
mandiant
ivanti
21887
46805
espionage
Vietnam-Based Hackers Steal Financial Data Across Asia with Malware
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and...
2024-4-4 23:42:0 | 阅读: 5 |
收藏
|
The Hacker News - thehackernews.com
facebook
rotbot
vietnam
stealer
xclient
New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware
Phishing Attack / MalwareAn updated version of an information-stealing malware called Rhadamanthys...
2024-4-4 23:30:0 | 阅读: 2 |
收藏
|
The Hacker News - thehackernews.com
phishing
stealer
tesla
lockbit
Considerations for Operational Technology Cybersecurity
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control...
2024-4-4 19:27:0 | 阅读: 3 |
收藏
|
The Hacker News - thehackernews.com
security
operational
encryption
New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks
Vulnerability / Internet ProtocolNew research has found that the CONTINUATION frame in the HTTP/2...
2024-4-4 19:15:0 | 阅读: 8 |
收藏
|
The Hacker News - thehackernews.com
frames
memory
crash
nowotarski
Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure
Network Security / VulnerabilityIvanti has released security updates to address four security flaw...
2024-4-4 12:45:0 | 阅读: 25 |
收藏
|
The Hacker News - thehackernews.com
ivanti
security
thereby
crash
abbott
Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies
Mobile Security / Zero DayGoogle has disclosed that two Android security flaws impacting its Pixel...
2024-4-4 00:10:0 | 阅读: 7 |
收藏
|
The Hacker News - thehackernews.com
firmware
grapheneos
29745
security
U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers
Data Breach / Incident ResponseThe U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft...
2024-4-3 23:32:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
microsoft
0558
csrb
cloud
security
Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks
Browser Security / Session HijackingGoogle on Tuesday said it's piloting a new feature in Chrome c...
2024-4-3 21:7:0 | 阅读: 6 |
收藏
|
The Hacker News - thehackernews.com
dbsc
chrome
hijacking
lifetime
Previous
10
11
12
13
14
15
16
17
Next