162 lines
5.9 KiB
JSON
162 lines
5.9 KiB
JSON
[
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302345",
|
||
"title": "全国首个海洋可信数据空间启动!360筑牢海洋数据安全新防线",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "微信",
|
||
"pubDate": "2024-12-02 15:32:30"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302342",
|
||
"title": "MediaTek 修补了智能手机芯片组中的高严重性漏洞 (CVE-2024-20125)",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-12-02 15:20:44"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302339",
|
||
"title": "ShadowHound:使用隐蔽高效的摄取器增强 Active Directory 侦察",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-12-02 15:00:17"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302336",
|
||
"title": "以加密货币钱包为目标的恶意 PyPI 软件包:aiocpa 活动曝光",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-12-02 14:46:21"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302333",
|
||
"title": "CVE-2024-52338: Apache Arrow R软件包存在严重安全漏洞,允许任意执行代码",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-12-02 14:40:00"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302330",
|
||
"title": "CVE-2024-8672 (CVSS 9.9):Widget Options 插件中的严重缺陷威胁 100,000+ 个网站",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-12-02 14:34:37"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302327",
|
||
"title": "CVE-2024-11980 (CVSS 10):十亿电动路由器中的严重缺陷",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-12-02 14:25:47"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302321",
|
||
"title": "被武器化的 Windows 工具 Wevtutil.exe 在新型攻击中被利用",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-12-02 11:19:00"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302318",
|
||
"title": "Trellix 企业安全管理器修补关键漏洞,包括 CVE-2024-11482 (CVSS 9.8)",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-12-02 10:45:29"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302315",
|
||
"title": "“Toast代码”行动: 深度剖析 TA-RedAnt 对零日漏洞(CVE-2024-38178)的利用",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-12-02 10:39:57"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302311",
|
||
"title": "唯一入选两大创新典型案例,360安全大模型闪耀乌镇",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "微信",
|
||
"pubDate": "2024-11-29 14:16:14"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302308",
|
||
"title": "利用 CleverSoar 安装程序和 Nidhogg Rootkit 的恶性恶意软件活动",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-11-29 11:31:18"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302305",
|
||
"title": "发布 PoC:Windows 驱动程序中的整数溢出漏洞可导致权限升级",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-11-29 11:22:55"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302302",
|
||
"title": "NHS 重大“网络事件”迫使医院使用笔和纸",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "theregister",
|
||
"pubDate": "2024-11-29 11:14:57"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302299",
|
||
"title": "美国电信巨头 T-Mobile 检测到有线运营商的网络入侵企图",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "TheHackersNews",
|
||
"pubDate": "2024-11-29 11:03:29"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302296",
|
||
"title": "VPN 漏洞、弱凭据助长勒索软件攻击",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "helpnetsecurity",
|
||
"pubDate": "2024-11-29 10:55:05"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302293",
|
||
"title": "CVE-2024-42330 (CVSS 9.1): Zabbix 修补了严重远程代码执行漏洞",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-11-29 10:49:22"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302290",
|
||
"title": "TikTok 在最新安全举措中瞄准改变外观的滤镜和未成年人用户",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-11-29 10:44:26"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302287",
|
||
"title": "信用卡盗刷恶意软件曝光: 针对 Magento 结账页面",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-11-29 10:35:03"
|
||
},
|
||
{
|
||
"guid": "https://www.anquanke.com/post/id/302284",
|
||
"title": "Contiki-NG 物联网操作系统修补关键漏洞",
|
||
"author": " 安全客",
|
||
"description": null,
|
||
"source": "securityonline",
|
||
"pubDate": "2024-11-29 10:26:47"
|
||
}
|
||
] |