安全研究 SECURITY SERVICE

涉及百万台主机,谷歌宣布摧毁Glupteba僵尸网络

发布时间: 2021-12-10
来源:
浏览数: 17

涉及百万台主机,谷歌宣布摧毁Glupteba僵尸网络


严重危险级别!Apache存在Log4j远程代码执行漏洞,影响所有Minecraft服务器

https://netsecurity.51cto.com/art/202112/694638.htm

 

“Cuba”勒索软件团伙获得了4400万美元的赎金

https://netsecurity.51cto.com/art/202112/694416.htm

 

今年美国有大约4000万人的个人健康信息在泄露事件中被曝光

https://netsecurity.51cto.com/art/202112/694409.htm

 

涉及百万台主机,谷歌宣布摧毁Glupteba僵尸网络

https://netsecurity.51cto.com/art/202112/694329.htm

 

国际连锁超市SPAR遭攻击系统中断

https://zhuanlan.51cto.com/art/202112/694275.htm


分享到:
  • 相关推荐 RELATED TO RECOMMEND
  • 点击次数: 11
    2025 - 06 - 09
    1、APT组织利用PathWiper恶意软件针对乌克兰关键基础设施  https://blog.talosintelligence.com/pathwiper-targets-ukraine/ 2、Chaos RAT新变种针对Linux和Windows用户  https://gbhackers.com/new-chaos-rat-targets-linux-and-windows-users/  3、APT组织利用VELETRIX和VShell恶意软件攻击中国电信行业 https://www.seqrite.com/blog/operation-dragonclone-chinese-telecom-veletrix-vshell-malware/
  • 点击次数: 21
    2025 - 06 - 03
    新型信息窃取恶意软件EDDIESTEALER通过假验证码传播  https://www.elastic.co/security-labs/eddiestealer Siemens SiPass Integrated漏洞预警  https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-02 Instantel Micromate漏洞预警  https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-04 Silent Werewolf针对俄摩两国利用伪装邮件投递恶意加载器 https://bi.zone/eng/expertise/blog/silent-werewolf-ispolzuet-novye-zagruzchiki-v-atakakh-na-rossiyskie-i-moldavskie-organizatsii/
  • 点击次数: 13
    2025 - 05 - 19
    Siemens SIMATIC PCS neo漏洞预警https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-12 新型.NET多阶段加载器持续传播多款恶意软件 https://gbhackers.com/new-net-multi-stage-loader-targets-windows-systems/ APT28利用XSS漏洞向高价值邮件服务器注入恶意代码 https://gbhackers.com/russian-hackers-exploit-xss-vulnerabilities/ ECOVACS DEEBOT Vacuum and Base Station漏洞预警 https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-19
  • 点击次数: 12
    2025 - 05 - 07
    Mimic勒索软件变体通过Clipper窃取凭证重返医疗系统 https://nationalcybersecurity.com/mimic-ransomware-variant-targets-healthcare-ransomware-cybercrime/?utm_source=rss&utm_medium=rss&utm_campaign=mimic-ransomware-variant-targets-healthcare-ransomware-cybercrime CLFS零日漏洞利用导致勒索软件活动 https://nationalcybersecurity.com/exploitation-of-clfs-zero-day-leads-to-ransomware-activity-ransomware-cybercrime/?utm_source=rss&utm_medium=rss&utm_campaign=exploitation-of-clfs-zero-day-leads-to-ransomware-activity-ransomware-cybercrime DragonForce勒索团伙近期针对英国零售业发动大规模攻击https://nationalcybersecurity.com/dragonforce-ransomware-gang-from-hacktivists-to-high-street-extortionists-ransomware-cybercrime/?utm_source=rss&utm_medium=rss&utm_campaign=dragonforce-ransomware-gang-from-hacktivists-to-hig...
  • 点击次数: 14
    2025 - 04 - 14
    微软补丁日通告:2025年4月版https://msrc.microsoft.com/update-guide/releaseNote/2025-Apr Neptune RAT:针对Windows系统的高级远控木马  https://www.cyfirma.com/research/neptune-rat-an-advanced-windows-rat-with-system-destruction-capabilities-and-password-exfiltration-from-270-applications/ 伪装成政府官方应用的Android恶意软件变种分析 https://www.seqrite.com/blog/beware-fake-nextgen-mparivahan-malware-returns-with-enhanced-stealth-and-data-theft/ Scattered Spider借助多种钓鱼套件与RAT技术持续发起网络攻击 https://www.silentpush.com/blog/scattered-spider-2025/?utm_source=rss&utm_medium=rss&utm_campaign=scattered-spider-2025 APT32利用GitHub对安全团队和企业网络发动攻击 https://gbhackers.com/apt32-turns-github-into-a-weapon-against-security-teams/
友情连接:
免费服务热线 ree service hotline 400-613-1868 手机端
法律声明 Copyright  西安交大捷普网络科技有限公司  陕ICP备18022218号-1

陕公网安备 61019002000857号

犀牛云提供云计算服务