security.1h.cx Open in urlscan Pro
185.225.236.6  Public Scan

URL: https://security.1h.cx/
Submission: On April 02 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * 30-03-2024 20:48:07 backdoor in upstream xz/liblzma leading to ssh server
   compromise
 * 30-03-2024 20:39:30 RE: backdoor in upstream xz/liblzma leading to ssh server
   compromise
 * 30-03-2024 08:16:00 Hackers Target macOS Users with Malicious Ads Spreading
   Stealer Malware
 * 30-03-2024 06:23:00 Urgent: Secret Backdoor Found in XZ Utils Library,
   Impacts Major Linux Distros
 * 29-03-2024 15:54:00 Dormakaba Locks Used in Millions of Hotel Rooms Could Be
   Cracked in Seconds
 * 29-03-2024 13:12:00 TheMoon Botnet Resurfaces, Exploiting EoL Devices to
   Power Criminal Proxy
 * 29-03-2024 12:19:00 The Golden Age of Automated Penetration Testing is Here
 * 29-03-2024 11:49:00 New Linux Bug Could Lead to User Password Leaks and
   Clipboard Hijacking
 * 29-03-2024 11:24:50 RDP remains a security concern – Week in security with
   Tony Anscombe
 * 29-03-2024 07:31:27 Quick Forensics Analysis of Apache logs, (Fri, Mar 29th)
 * 29-03-2024 06:37:00 PyPI Halts Sign-Ups Amid Surge of Malicious Package
   Uploads Targeting Developers
 * 29-03-2024 03:00:02 ISC Stormcast For Friday, March 29th, 2024
   https://isc.sans.edu/podcastdetail/8916, (Fri, Mar 29th)
 * 28-03-2024 18:02:00 Linux Version of DinodasRAT Spotted in Cyber Attacks
   Across Several Countries
 * 28-03-2024 17:50:00 Finland Blames Chinese Hacking Group APT31 for Parliament
   Cyber Attack
 * 28-03-2024 15:44:00 New ZenHammer Attack Bypasses RowHammer Defenses on AMD
   CPUs
 * 28-03-2024 13:43:00 New Webinar: Avoiding Application Security Blind Spots
   with OPSWAT and F5
 * 28-03-2024 12:45:00 Behind the Scenes: The Art of Safeguarding Non-Human
   Identities
 * 28-03-2024 12:43:00 Darcula Phishing Network Leveraging RCS and iMessage to
   Evade Detection
 * 28-03-2024 11:30:00 Cybercriminals play dirty: A look back at 10 cyber hits
   on the sporting world
 * 28-03-2024 11:22:40 From JavaScript to AsyncRAT, (Thu, Mar 28th)
 * 28-03-2024 09:07:00 Telegram Offers Premium Subscription in Exchange for
   Using Your Number to Send OTPs
 * 28-03-2024 03:00:02 ISC Stormcast For Thursday, March 28th, 2024
   https://isc.sans.edu/podcastdetail/8914, (Thu, Mar 28th)
 * 27-03-2024 16:24:00 Hackers Hit Indian Defense, Energy Sectors with Malware
   Posing as Air Force Invite
 * 27-03-2024 14:15:00 CISA Warns: Hackers Actively Attacking Microsoft
   SharePoint Vulnerability
 * 27-03-2024 13:54:00 Microsoft Edge Bug Could Have Allowed Attackers to
   Silently Install Malicious Extensions
 * 27-03-2024 13:08:56 Scans for Apache OfBiz, (Wed, Mar 27th)
 * 27-03-2024 11:56:00 SASE Solutions Fall Short Without Enterprise Browser
   Extensions, New Report Reveals
 * 27-03-2024 11:39:00 Critical Unpatched Ray AI Platform Vulnerability
   Exploited for Cryptocurrency Mining
 * 27-03-2024 08:56:00 Alert: New Phishing Attack Delivers Keylogger Disguised
   as Bank Payment Notice
 * 27-03-2024 05:20:00 Two Chinese APT Groups Ramp Up Cyber Espionage Against
   ASEAN Countries
 * 27-03-2024 03:00:02 ISC Stormcast For Wednesday, March 27th, 2024
   https://isc.sans.edu/podcastdetail/8912, (Wed, Mar 27th)
 * 26-03-2024 17:54:00 Sketchy NuGet Package Likely Linked to Industrial
   Espionage Targets Developers
 * 26-03-2024 13:48:15 New tool: linux-pkgs.sh, (Sun, Mar 24th)
 * 26-03-2024 13:06:00 U.S. Charges 7 Chinese Nationals in Major 14-Year Cyber
   Espionage Operation
 * 26-03-2024 12:29:00 Crafting Shields: Defending Minecraft Servers Against
   DDoS Attacks
 * 26-03-2024 11:30:00 Borrower beware: Common loan scams and how to avoid them
 * 26-03-2024 09:31:00 U.S. Sanctions 3 Cryptocurrency Exchanges for Helping
   Russia Evade Sanctions
 * 26-03-2024 05:54:00 CISA Alerts on Active Exploitation of Flaws in Fortinet,
   Ivanti, and Nice Products
 * 26-03-2024 03:00:01 ISC Stormcast For Tuesday, March 26th, 2024
   https://isc.sans.edu/podcastdetail/8910, (Tue, Mar 26th)
 * 26-03-2024 01:15:45 Apple Updates for MacOS, iOS/iPadOS and visionOS, (Mon,
   Mar 25th)
 * 25-03-2024 12:58:00 Hackers Hijack GitHub Accounts in Supply Chain Attack
   Affecting Top-gg and Others
 * 25-03-2024 12:37:00 Key Lesson from Microsoft’s Password Spray Hack: Secure
   Every Account
 * 25-03-2024 11:30:00 Cybersecurity starts at home: Help your children stay
   safe online with open conversations
 * 25-03-2024 10:02:00 New "GoFetch" Vulnerability in Apple M-Series Chips Leaks
   Secret Encryption Keys
 * 25-03-2024 08:37:00 Iran-Linked MuddyWater Deploys Atera for Surveillance in
   Phishing Attacks
 * 25-03-2024 04:24:49 Tool updates: le-hex-to-ip.py and sigs.py, (Sun, Mar
   24th)
 * 24-03-2024 06:38:00 N. Korea-linked Kimsuky Shifts to Compiled HTML Help
   Files in Ongoing Cyberattacks
 * 24-03-2024 06:24:00 German Police Seize 'Nemesis Market' in Major
   International Darknet Raid
 * 23-03-2024 07:03:00 Russian Hackers Use 'WINELOADER' Malware to Target German
   Political Parties
 * 22-03-2024 15:08:00 New StrelaStealer Phishing Attacks Hit Over 100
   Organizations in E.U. and U.S.
 * 22-03-2024 14:45:00 AWS Patches Critical 'FlowFixation' Bug in Airflow
   Service to Prevent Session Hijacking
 * 22-03-2024 13:21:34 AceCryptor attacks surge in Europe – Week in security
   with Tony Anscombe
 * 22-03-2024 12:28:00 China-Linked Group Breaches Networks via Connectwise, F5
   Software Flaws
 * 22-03-2024 12:28:00 Implementing Zero Trust Controls for Compliance
 * 22-03-2024 12:27:00 Massive Sign1 Campaign Infects 39,000+ WordPress Sites
   with Scam Redirects
 * 22-03-2024 07:14:00 U.S. Justice Department Sues Apple Over Monopoly and
   Messaging Security
 * 22-03-2024 04:06:00 Russian Hackers May Have Targeted Ukrainian Telecoms with
   Upgraded 'AcidPour' Malware
 * 21-03-2024 17:03:00 Russia Hackers Using TinyTurla-NG to Breach European
   NGO's Systems
 * 21-03-2024 15:26:00 Over 800 npm Packages Found with Discrepancies, 18
   Exploit 'Manifest Confusion'
 * 21-03-2024 13:48:00 AndroxGh0st Malware Targets Laravel Apps to Steal Cloud
   Credentials
 * 21-03-2024 12:30:00 How to Accelerate Vendor Risk Assessments in the Age of
   SaaS Sprawl
 * 21-03-2024 11:30:00 GitHub Launches AI-Powered Autofix Tool to Assist Devs in
   Patching Security Flaws
 * 21-03-2024 10:23:00 Making Sense of Operational Technology Attacks: The Past,
   Present, and Future
 * 21-03-2024 09:07:00 U.S. Sanctions Russians Behind 'Doppelganger' Cyber
   Influence Campaign
 * 21-03-2024 04:55:00 Ivanti Releases Urgent Fix for Critical Sentry RCE
   Vulnerability
 * 21-03-2024 04:34:00 Atlassian Releases Fixes for Over 2 Dozen Flaws,
   Including Critical Bamboo Bug
 * 20-03-2024 15:51:00 New 'Loop DoS' Attack Impacts Hundreds of Thousands of
   Systems
 * 20-03-2024 11:30:00 Rescoms rides waves of AceCryptor spam
 * 19-03-2024 11:30:00 A prescription for privacy protection: Exercise caution
   when using a mobile health app
 * 15-03-2024 12:20:38 Healthcare still a prime target for cybercrime gangs –
   Week in security with Tony Anscombe
 * 14-03-2024 14:30:00 Threat intelligence explained | Unlocked 403: A
   cybersecurity podcast
 * 14-03-2024 11:00:00 Real-time, privacy-preserving URL protection
 * 13-03-2024 11:30:00 How to share sensitive files securely online
 * 12-03-2024 12:59:00 Vulnerability Reward Program: 2023 Year in Review
 * 12-03-2024 11:30:00 Election cybersecurity: Protecting the ballot box and
   building trust in election integrity
 * 08-03-2024 13:35:22 APT attacks taking aim at Tibetans – Week in security
   with Tony Anscombe
 * 07-03-2024 11:30:00 Evasive Panda leverages Monlam Festival to target
   Tibetans
 * 06-03-2024 11:30:00 Top 10 scams targeting seniors – and how to keep your
   money safe
 * 05-03-2024 11:30:00 Irresistible: Hooks, habits and why you can’t put down
   your phone
 * 04-03-2024 15:00:00 Secure by Design: Google’s Perspective on Memory Safety
 * 01-03-2024 12:18:36 Deceptive AI content and 2024 elections – Week in
   security with Tony Anscombe
 * 29-02-2024 11:30:00 Blue Team toolkit: 6 open-source tools to assess and
   enhance corporate defenses
 * 28-02-2024 11:30:00 Vulnerabilities in business VPNs under the spotlight
 * 26-02-2024 11:30:00 10 things to avoid posting on social media – and why
 * 23-02-2024 13:32:29 PSYOP campaigns targeting Ukraine – Week in security
   with Tony Anscombe
 * 22-02-2024 11:30:00 Everything you need to know about IP grabbers
 * 21-02-2024 06:00:00 Operation Texonto: Information operation targeting
   Ukrainian speakers in the context of the war
 * 20-02-2024 11:30:00 Watching out for the fakes: How to spot online
   disinformation
 * 16-02-2024 15:05:01 Cyber-insurance and vulnerability scanning – Week in
   security with Tony Anscombe
 * 15-02-2024 16:32:31 What is AI, really? | Unlocked 403: A cybersecurity
   podcast
 * 14-02-2024 11:30:00 The art of digital sleuthing: How digital forensics
   unlocks the truth
 * 13-02-2024 11:30:00 Deepfakes in the global election year of 2024: A weapon
   of mass deception?
 * 09-02-2024 14:46:14 Ransomware payments hit a record high in 2023 – Week in
   security with Tony Anscombe
 * 08-02-2024 11:30:00 The buck stops here: Why the stakes are high for CISOs
 * 06-02-2024 21:44:00 Piloting new ways of protecting Android users from
   financial fraud
 * 06-02-2024 11:30:00 Left to their own devices: Security for employees using
   personal devices for work
 * 05-02-2024 12:59:00 Improving Interoperability Between Rust and C++
 * 05-02-2024 11:30:00 Could your Valentine be a scammer? How to avoid getting
   caught in a bad romance
 * 02-02-2024 14:47:24 Grandoreiro banking malware disrupted – Week in
   security with Tony Anscombe
 * 01-02-2024 14:39:00 UN Cybercrime Treaty Could Endanger Web Security
 * 01-02-2024 11:30:00 VajraSpy: A Patchwork of espionage apps
 * 31-01-2024 14:06:00 Scaling security with AI: from detection to solution
 * 31-01-2024 11:30:00 ESET Research Podcast: ChatGPT, the MOVEit hack, and
   Pandora
 * 30-01-2024 13:00:00 Effortlessly upgrade to Passkeys on Pixel phones with
   Google Password Manager
 * 30-01-2024 12:30:00 ESET takes part in global operation to disrupt the
   Grandoreiro banking trojan
 * 29-01-2024 11:30:00 Cyber: The Swiss army knife of tradecraft
 * 26-01-2024 14:39:32 Blackwood hijacks software updates to deploy NSPX30 –
   Week in security with Tony Anscombe
 * 25-01-2024 11:30:00 Assessing and mitigating supply chain cybersecurity risks
 * 24-01-2024 16:00:00 NSPX30: A sophisticated AitM-enabled implant evolving
   since 2005
 * 23-01-2024 11:30:00 Break the fake: The race is on to stop AI voice cloning
   scams
 * 19-01-2024 16:11:49 Why many CISOs consider quitting – Week in security
   with Tony Anscombe
 * 18-01-2024 11:30:00 Virtual kidnapping: How to see through this terrifying
   scam
 * 17-01-2024 11:30:00 Is Temu safe? What to know before you ‘shop like a
   billionaire’
 * 16-01-2024 11:30:00 The 7 deadly cloud security sins – and how SMBs can do
   things better
 * 12-01-2024 15:17:04 Lessons from SEC's X account hack – Week in security
   with Tony Anscombe
 * 11-01-2024 13:00:00 MiraclePtr: protecting users from use-after-free
   vulnerabilities on more platforms
 * 11-01-2024 11:30:00 A peek behind the curtain: How are sock puppet accounts
   used in OSINT?
 * 10-01-2024 11:30:00 Attack of the copycats: How fake messaging apps and app
   mods could bite you
 * 09-01-2024 11:30:00 Love is in the AI: Finding love online takes on a whole
   new meaning
 * 06-01-2024 11:30:00 Cracking the 2023 SANS Holiday Hack Challenge
 * 05-01-2024 14:20:57 Cybersecurity trends and challenges to watch out for in
   2024 – Week in security with Tony Anscombe
 * 04-01-2024 11:30:00 Lost and found: How to locate your missing devices and
   more
 * 03-01-2024 11:30:00 Say what you will? Your favorite speech-to-text app may
   be a privacy risk
 * 28-12-2023 11:30:00 A year in review: 10 of the biggest security incidents of
   2023
 * 27-12-2023 11:30:00 Got a new device? 7 things to do before disposing of your
   old tech
 * 22-12-2023 11:50:20 Key findings from ESET Threat Report H2 2023 – Week in
   security with Tony Anscombe
 * 21-12-2023 11:30:00 Safeguard the joy: 10 tips for securing your shiny new
   device
 * 20-12-2023 11:30:00 These aren’t the Androids you should be looking for
 * 19-12-2023 11:27:56 ESET Threat Report H2 2023
 * 18-12-2023 11:30:00 ESET Research Podcast: Neanderthals, Mammoths and
   Telekopye
 * 15-12-2023 15:27:39 New iOS feature to thwart eavesdropping – Week in
   security with Tony Anscombe
 * 14-12-2023 11:30:00 OilRig’s persistent attacks using cloud service-powered
   downloaders
 * 13-12-2023 11:30:00 Delivering trust with DNS security
 * 12-12-2023 13:00:00 Hardening cellular basebands in Android
 * 12-12-2023 11:30:00 A pernicious potpourri of Python packages in PyPI
 * 11-12-2023 14:00:00 Black Hat Europe 2023: Should we regulate AI?
 * 11-12-2023 11:30:00 Silent but deadly: The rise of zero-click attacks
 * 08-12-2023 13:00:00 Surge in deceptive loan apps – Week in security with
   Tony Anscombe
 * 08-12-2023 11:30:00 Black Hat Europe 2023: The past could return to haunt you
 * 07-12-2023 11:30:00 To tap or not to tap: Are NFC payments safer?
 * 06-12-2023 11:30:00 Navigating privacy: Should we put the brakes on car
   tracking?
 * 05-12-2023 11:30:00 Beware of predatory fin(tech): Loan sharks use Android
   apps to reach new depths
 * 01-12-2023 13:31:27 Teaching appropriate use of AI tech – Week in security
   with Tony Anscombe
 * 30-11-2023 11:30:00 Executives behaving badly: 5 ways to manage the executive
   cyberthreat
 * 29-11-2023 13:00:00 Improving Text Classification Resilience and Efficiency
   with RETVec
 * 29-11-2023 11:30:00 Very precisely lost – GPS jamming
 * 28-11-2023 11:30:00 Retail at risk: Top threats facing retailers this holiday
   season
 * 27-11-2023 11:30:00 ‘Tis the season to be wary: 12 steps to ruin a
   cybercriminal's day
 * 24-11-2023 16:33:08 Telekopye's tricks of the trade – Week in security with
   Tony Anscombe
 * 23-11-2023 11:30:00 Telekopye: Chamber of Neanderthals’ secrets
 * 22-11-2023 11:30:00 Your voice is my password
 * 21-11-2023 11:30:00 Fuel for thought: Can a driverless car get arrested?
 * 20-11-2023 12:49:00 Two years later: a baseline that drives up security for
   the industry
 * 17-11-2023 12:08:30 Safeguarding ports from the rising tide of cyberthreats
   – Week in security with Tony Anscombe
 * 16-11-2023 11:30:00 Is your LinkedIn profile revealing too much?
 * 14-11-2023 11:30:00 Level up! These games will make learning about
   cybersecurity fun
 * 13-11-2023 11:30:00 Capture the flag: 5 websites to sharpen your hacking
   skills
 * 10-11-2023 16:42:48 Spyware disguised as a news app – Week in security with
   Tony Anscombe
 * 10-11-2023 11:30:00 Cyber threat intelligence: Getting on the front foot
   against adversaries
 * 09-11-2023 11:30:00 Unlucky Kamran: Android malware spying on Urdu-speaking
   residents of Gilgit-Baltistan
 * 08-11-2023 10:00:00 Evolving the App Defense Alliance
 * 07-11-2023 14:56:00 MTE - The promising path forward for memory safety
 * 06-11-2023 11:30:00 Navigating the security and privacy challenges of large
   language models
 * 03-11-2023 15:38:00 Qualified certificates with qualified risks
 * 03-11-2023 14:26:29 The mysterious demise of the Mozi botnet – Week in
   security with Tony Anscombe
 * 02-11-2023 13:00:00 More ways for users to identify independently security
   tested apps on Google Play
 * 01-11-2023 11:30:00 Who killed Mozi? Finally putting the IoT zombie botnet in
   its grave
 * 31-10-2023 11:30:52 Closing the gender gap: 7 ways to attract more women into
   cybersecurity
 * 30-10-2023 11:30:00 20 scary cybersecurity facts and figures for a haunting
   Halloween
 * 27-10-2023 15:47:16 Roundcube Webmail servers under attack – Week in
   security with Tony Anscombe
 * 26-10-2023 11:30:00 ESET APT Activity Report Q2–Q3 2023
 * 26-10-2023 10:01:00 Increasing transparency in AI security
 * 26-10-2023 10:00:00 Google’s reward criteria for reporting bugs in AI
   products
 * 25-10-2023 11:30:00 Winter Vivern exploits zero-day vulnerability in
   Roundcube Webmail servers
 * 25-10-2023 10:00:00 Joint Industry statement of support for Consumer IoT
   Security Principles
 * 23-10-2023 11:30:00 One login to rule them all: Should you sign in with
   Google or Facebook on other websites?
 * 20-10-2023 14:45:00 Spearphishing targets in Latin America – Week in
   security with Tony Anscombe
 * 19-10-2023 11:30:00 Strengthening the weakest link: top 3 security awareness
   topics for your employees
 * 18-10-2023 14:42:19 Better safe than sorry: 10 tips to build an effective
   business backup strategy
 * 18-10-2023 14:00:00 Enhanced Google Play Protect real-time scanning for app
   installs
 * 17-10-2023 11:30:00 Operation King TUT: The universe of threats in LATAM
 * 13-10-2023 17:09:22 Staying on top of security updates – Week in security
   with Tony Anscombe
 * 10-10-2023 17:39:00 Scaling BeyondCorp with AI-Assisted Access Control
   Policies
 * 09-10-2023 14:30:00 Bare-metal Rust in Android
 * 06-10-2023 12:21:00 Expanding our exploit reward program to Chrome and Cloud
 * 27-09-2023 14:50:00 SMS Security & Privacy Gaps Make It Clear Users Need a
   Messaging Upgrade
 * 21-09-2023 14:00:00 Scaling Rust Adoption Through Training

×