关于「 23pds」的内容列表

SlowMist CISO: Bybit attackers may break into the computers of several official personnel, and can monitor internal chat, transfer time and other information

Slow Mist Technology Chief Information Security Officer 23pds said on the X platform that Bybit attackers took away safe owner privileges in a forged signature attack. It is speculated that more than one macOS or Windows computer must have been charged, and the attacker may have stayed on the intranet for a while, able to monitor internal chat, transfer time and other information.

clock
2025-02-22 03:24:22
慢雾CISO:Bybit攻击者或攻破数名官方人员电脑,且能监控内部聊天、转账时间等信息

慢雾科技首席信息安全官 23pds 在 X 平台表示,Bybit 攻击者一次伪造签名攻击就拿走了 safe owner 权限,推测一定有不止一位的 macOS 或 Windows 电脑被控了,而且攻击者可能在内网呆了有段时间,能监控内部聊天、转账时间等信息。

clock
2025-02-22 03:24:22
The latest version of Phantom wallet may have security bugs, users need to be alert to risks

Slow Mist Technology Chief Information Security Officer 23pds issued a warning that the latest version of Phantom wallet may have security bugs, and the victim has explained the risk of Phantom Profile: when a user imports a mnemonic from an unknown source, if the mnemonic has been associated with Phantom Profile, the wallet will automatically log in to the account system, putting the user's assets at risk of theft. According to the victim's description, when a user who does not open the Phantom...

clock
2025-02-12 02:26:47
Phantom 钱包最新版本或存在安全漏洞,用户需警惕风险

慢雾科技首席信息安全官 23pds 发文警示,Phantom 钱包最新版本或存在安全漏洞,受害者已经解释了 Phantom Profile 风险:当用户导入未知来源的助记词时,若该助记词已关联 Phantom Profile,钱包会自动登录该账户系统,使用户资产面临被盗风险。 根据受害者描述,当未开启 Phantom Profile 的用户导入这...

clock
2025-02-12 02:26:47
2024 macOS威胁报告:恶意软件激增,目标是钥匙串和加密货币钱包

慢雾科技首席信息安全官23pds在X平台表示,2024 macOS威胁报告要点如下: 人工智能恶意软件使任何人都可以发起高级攻击; 恶意软件即服务售卖价每月 1,500 美元; 恶意软件激增,目标是钥匙串和加密货币钱包。

clock
2025-02-01 10:22:51
DeBot: The security issue reminded by the Slow Mist team has been upgraded as soon as possible

In response to 23pds, the chief information security officer of Slow Mist Technology, reminding the trading tool DeBot to upgrade the security level, the DeBot team responded that the emergency upgrade has been completed as soon as possible. Previously reported, the SlowMist CISO said it recommended that the trading tool Debot upgrade its security level.

clock
2025-01-26 23:09:53
DeBot:针对慢雾团队提醒的安全问题已在第一时间完成升级

针对慢雾科技首席信息安全官23pds提醒交易工具DeBot升级安全级别问题,DeBot团队回应,已在第一时间完成了紧急升级。 此前报道,慢雾CISO表示,建议交易工具Debot升级安全级别。

clock
2025-01-26 23:09:53
SlowMist CISO: It is recommended that the trading tool Debot upgrade the security level

Slow Mist Technology's chief information security officer 23pds said on the X platform that the private key of the trading tool Debot was directly "streaking" in the data package, and it was recommended to upgrade the security level.

clock
2025-01-26 14:50:18
慢雾CISO:建议交易工具Debot升级安全级别

慢雾科技首席信息安全官23pds在X平台表示,交易工具Debot私钥直接明文在数据包里“裸奔”,建议其升级下安全级别。

clock
2025-01-26 14:50:18
SlowMist: A data breach occurred in a third-party service used by a leading trading platform. Please pay attention to the safety of funds

On January 17, 23pds, the chief information security officer of Slow Mist Technology, said on the X platform that it had recently detected a data breach of a third-party service used by a leading trading platform, involving a large amount of employee information, including email, password and other sensitive data. The relevant situation has been synchronized to the relevant parties for processing. The end of the year is approaching, reminding everyone to be vigilant and pay attention to the safe...

clock
2025-01-17 12:26:17
慢雾:某头部交易平台使用的第三方服务发生数据泄露,请注意资金安全

1月17日消息,慢雾科技首席信息安全官23pds在X平台表示,近期监测到某头部交易平台使用的第三方服务发生数据泄露,涉及大量员工信息,包括邮箱、密码等敏感数据。相关情况已同步至相关方处理。年底将至,提醒大家提高警惕,注意资金安全: 谨防钓鱼邮件和社工攻击,避免点击不明链接或提供账户信息。 及时更换高风险账户密码,避免...

clock
2025-01-17 12:26:17
Slow Mist CISO: North Korean hackers launch specific attacks on Web3 developers

SlowMist CISO 23pds revealed in a post on X: "North Korean hackers launched a cyber attack on Web3 and cryptocurrency software developers called'Operation 99 '. The operation started with fake recruiters and was conducted on platforms such as LinkedIn, using project testing and code reviews to lure developers." Once the victim takes the bait, they are directed to clone a malicious GitLab repository, seemingly harmless but full of disaster. The clone code connects to a command and control (C2) se...

clock
2025-01-15 23:58:26
慢雾CISO:朝鲜黑客对Web3开发人员发起特定攻击行动

慢雾 CISO 23pds 于 X 发文披露:"朝鲜黑客对 Web3 和加密货币软件开发人员发起名为「99 号行动」的网络攻击。该行动以假招聘人员开始,在 LinkedIn 等平台进行,用项目测试和代码审查来引诱开发人员。 一旦受害者上钩,他们就会被引导去克隆一个恶意的 GitLab 存储库,看似无害,但充满了灾难。克隆代码连接到命令和控制(C2)服务器,将恶意软件嵌入到受害者的环境中...

clock
2025-01-15 23:58:26
Slow Mist CISO: "JustJoin" landing page for suspected North Korean hackers reappears

"The'JustJoin 'landing page for suspected North Korean hackers has reappeared," SlowMist CISO 23pds said in a post on X.

clock
2025-01-15 03:59:17
慢雾 CISO:涉嫌朝鲜黑客的“JustJoin”登陆页面重新出现

慢雾 CISO 23pds 于 X 发文表示:“涉嫌朝鲜黑客的‘JustJoin’登陆页面重新出现。”

clock
2025-01-15 03:59:17

7x24 快讯