unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
“Look what I found here” phish targets Facebook users
Facebook-themed messages are a frequent source of bogus links from both spam and compromised accou...
2022-5-17 18:54:33 | 阅读: 22 |
收藏
|
blog.malwarebytes.com
facebook
died
phishers
phish
phishing
Why MRG-Effitas matters to SMBs
When selecting the right cybersecurity vendor to protect their operations, small- and medium-sized...
2022-5-16 21:7:26 | 阅读: 15 |
收藏
|
blog.malwarebytes.com
ransomware
mrg
effitas
smbs
How COVID-19 fuelled a surge in malware
2021 saw a massive surge in detections of malware, adware, and Potentially Unwanted Programs (PUPs...
2022-5-16 20:28:53 | 阅读: 10 |
收藏
|
blog.malwarebytes.com
detections
bounce
windows
adapted
coronavirus
Fake reCAPTCHA forms dupe users via compromised WordPress sites
Researchers at Sucuri investigated a number of WordPress websites complaining about unwanted redir...
2022-5-16 19:54:12 | 阅读: 22 |
收藏
|
blog.malwarebytes.com
recaptcha
captcha
wordpress
sucuri
malicious
A week in security (May 9 – 15)
Partner Success Story...
2022-5-16 18:1:4 | 阅读: 14 |
收藏
|
blog.malwarebytes.com
msp
marek
drummond
optimus
Custom PowerShell RAT targets Germans seeking information about the Ukraine crisis
This blog post was authored by Hossein Jazi and Jérôme SeguraPopulations around the world—and...
2022-5-16 18:0:0 | 阅读: 35 |
收藏
|
blog.malwarebytes.com
ukraine
powershell
baden
download
q2
How to spot the signs of a virtual kidnap scam
Threats and bluster play a key role in most online attacks: Ransomware has its ransom note; trolls...
2022-5-16 04:6:48 | 阅读: 17 |
收藏
|
blog.malwarebytes.com
kidnap
victim
wire
loved
kidnapping
Virtual credit cards coming to Chrome: What you need to know
When you’re buying things online, reducing the exposure of payment details during transactions is...
2022-5-12 23:38:26 | 阅读: 19 |
收藏
|
blog.malwarebytes.com
chrome
proposing
security
wine
worry
Clearview AI banned from selling facial recognition data in the US
Clearview AI, a facial recognition software and surveillance company, is permanently banned from s...
2022-5-12 23:22:23 | 阅读: 21 |
收藏
|
blog.malwarebytes.com
clearview
illinois
biometric
settlement
aclu
Cyberattacks on SATCOM networks attributed to Russian threat actors
The Cybersecurity & Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation...
2022-5-12 21:22:0 | 阅读: 22 |
收藏
|
blog.malwarebytes.com
satcom
russia
ukraine
invasion
F5 BIG-IP vulnerability is now being used to disable servers
As we reported a few days ago, a F5 BIG-IP vulnerability listed as CVE-2022-1388 is actively being...
2022-5-12 20:51:25 | 阅读: 27 |
收藏
|
blog.malwarebytes.com
attackers
malicious
unavailable
attacker
destroying
College closes down after ransomware attack
Posted: May 12, 2022 by Lincoln College, one of the few rural s...
2022-5-12 18:21:16 | 阅读: 14 |
收藏
|
blog.malwarebytes.com
ransomware
college
lincoln
crisis
software
Update now! Microsoft releases patches, including one for actively exploited zero-day
Microsoft has released patches for 74 security problems, including fixes for seven “critical” vuln...
2022-5-11 22:36:23 | 阅读: 38 |
收藏
|
blog.malwarebytes.com
windows
remote
microsoft
attacker
security
Canon printer owners: Be careful of bogus driver download sites
Think of all the really common, very mundane things you search for of a tech nature. Drivers. Scan...
2022-5-11 16:43:17 | 阅读: 10 |
收藏
|
blog.malwarebytes.com
canon
download
printer
gizmodo
remote
APT34 targets Jordan Government using new Saitama backdoor
On April 26th, we identified a suspicious email that targeted a government official from Jordan’s...
2022-5-11 04:49:30 | 阅读: 38 |
收藏
|
blog.malwarebytes.com
ttl
saitama
machine
malicious
attackers
Client side scanning may cost more than it delivers
On May 11, 2022, the EU will publicize a proposal for a law on mandatory chat control. The Europea...
2022-5-10 21:4:4 | 阅读: 37 |
收藏
|
blog.malwarebytes.com
client
european
advocates
messenger
legislation
“Chemical attack” email warnings deliver Jester Stealer malware
Jester Stealer, a malicious file capable of large amounts of data theft, is on the prowl again. Th...
2022-5-10 20:4:27 | 阅读: 20 |
收藏
|
blog.malwarebytes.com
macros
chemical
attackers
microsoft
genuine
Costa Rica continues defence against sustained Conti ransomware attacks
It’s not been plain sailing recently for Conti ransomware, the Ransomware as a Service (RaaS) grou...
2022-5-9 23:54:15 | 阅读: 21 |
收藏
|
blog.malwarebytes.com
ransomware
costa
rica
ministry
affiliates
Update now! F5 BIG-IP vulnerability being actively exploited
The Australian Cyber Security Centre (ACSC) has announced it is aware of the existence of Proof of...
2022-5-9 23:39:17 | 阅读: 72 |
收藏
|
blog.malwarebytes.com
icontrol
security
existence
plane
attacker
Recovering from romance scams with Cindy Liebes: Lock and Code S03E10
Earlier this year, many members of the public were introduced to the facets of a long-ignored crim...
2022-5-9 23:26:54 | 阅读: 12 |
收藏
|
blog.malwarebytes.com
documentary
liebes
romance
evangelist
chief
Previous
12
13
14
15
16
17
18
19
Next