unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
How Transport Company Gets Real-Time IOC and IOB Updates on Active Cyber Attacks
How can security teams...
2025-3-5 11:17:33 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
threats
security
attackers
domainname
Release Notes: Threat Intelligence Reports, New Website Design, & Enhanced Detection
Hey, cybersecurity ent...
2025-3-4 11:17:38 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
threats
security
mutex
detections
Enriching ANY.RUN’s TI Feeds with Unique IOCs: How It Works
ANY.RUN的威胁情报 feeds 提供最新的妥协指标(IOCs),包括恶意IP、域名、URL和文件哈希等,帮助安全团队快速检测和应对攻击。这些数据来自全球50多万研究人员上传的真实恶意软件样本,并通过提取恶意软件配置和使用Suricata规则分析网络流量获取独特指标。feeds还提供威胁评分(如高度可靠100分),帮助组织提升威胁狩猎、警报分类和事件响应能力。...
2025-2-27 14:1:32 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
feeds
threats
suricata
malicious
c2
Learn to Analyze Real-World Cyber Threats with Security Training Lab
ANY.RUN推出Security Training Lab课程,提供30小时学术内容和实践任务,教授恶意软件分析技能。学生通过学习静态分析、动态分析、加密技术及行为识别等方法,掌握应对现实威胁的能力。课程适合学生和教育机构,助力职业发展。...
2025-2-26 11:1:43 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
analysis
security
threats
malicious
Malware Traffic Analysis in Linux: Hands-on Guide with Examples
文章介绍了网络流量分析在检测恶意软件中的作用,包括DDoS攻击、C2通信、数据外泄等常见威胁类型,并列举了常用工具如Wireshark和ANY.RUN沙盒。ANY.RUN通过实时监控和自动化威胁检测帮助提升网络安全能力。...
2025-2-25 11:31:41 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
network
analysis
malicious
suricata
threats
How to Identify and Investigate Phishing Kit Attacks
文章探讨了钓鱼工具包(Phishing kits)的流行及其对网络安全的影响。这些工具包降低了网络犯罪分子的门槛,使其能够轻松发起攻击。它们包含模板、数据收集脚本和自动化工具,并被用于针对企业和个人的大规模攻击。此外,现代钓鱼工具包还集成了绕过多因素认证的技术,并滥用知名品牌进行诈骗。为应对这一威胁,企业需借助威胁情报解决方案和员工培训来提升防御能力。...
2025-2-19 11:1:35 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
phishing
phishkits
phishkit
threats
security
Zhong Stealer Analysis: New Malware Targeting Fintech and Cryptocurrency
Quetzal团队发现针对加密货币和金融科技行业的钓鱼活动,传播名为Zhong Stealer的新恶意软件。该软件通过伪装成支持请求的ZIP附件传播,在系统中建立持久性并窃取浏览器凭证,连接香港C2服务器。ANY.RUN分析显示其行为包括禁用日志、修改注册表及使用非标准端口传输数据。建议加强员工培训、限制文件执行及监控网络流量。...
2025-2-18 11:46:32 | 阅读: 23 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
zhong
stealer
stage
analysis
c2
Threat Intelligence Reports: Get Fresh Research on the Latest Cyber Attacks and APTs
本文介绍了ANY.RUN的威胁情报报告(TI Reports),旨在为安全专业人士和决策者提供可操作的见解。报告涵盖恶意软件、勒索软件、钓鱼活动等网络威胁,并特别关注APT和网络犯罪集团。通过实时数据和分析师研究生成,包含TTPs、IOC等信息,并提供YARA规则用于检测系统调优。该报告有助于提升威胁检测能力、优化响应策略,并支持企业风险评估与战略规划。...
2025-2-13 11:47:38 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
threats
security
ttps
strategic
How to Track Advanced Persistent Threats
本文介绍了高级持续性威胁(APTs)对企业网络安全的严重威胁。APTs由高度组织化的攻击者发起,目标为大型企业、政府及关键基础设施。中小企业因供应链或数据价值也可能成为目标。文章强调威胁情报(TI)在检测和防御APTs中的关键作用,并介绍ANY.RUN的TI Lookup工具如何帮助识别和追踪APT活动。...
2025-2-12 10:2:58 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
threats
apts
mutexes
muddywater
I Used a Sandbox to Strengthen Bank’s Security—Here’s How It Worked
本文介绍了一家投资银行的网络安全团队如何通过引入ANY.RUN交互式沙盒提升效率和威胁响应能力。该工具帮助团队快速分析恶意软件、识别攻击链,并成功阻止了多起勒索软件和钓鱼攻击。其数据隐私保护和成本效益使其成为金融行业的理想选择。...
2025-2-11 12:32:48 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
security
threats
analysis
ransomware
Instant URL Analysis: Use Safebrowsing via ANY.RUN’s Extension
ANY.RUN升级浏览器扩展,新增免费的Safebrowsing功能,帮助用户检测恶意链接、钓鱼攻击和隐藏的恶意软件,并支持分析多阶段钓鱼攻击和绕过CAPTCHA的欺诈行为。...
2025-2-6 12:2:57 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
analysis
phishing
security
network
Cyber Attacks on DeepSeek AI: What Really Happened? Full Timeline and Analysis
DeepSeek是一家中国AI公司,在2025年1月推出其首个模型后迅速引发全球关注。然而,在不到一个月内,该公司遭遇大规模网络攻击,包括DDoS和SSH暴力破解攻击,并涉及HailBot和RapperBot两个僵尸网络。这些攻击导致服务中断,并暴露了数据安全风险。事件凸显AI企业面临的网络安全威胁及加强防护的重要性。...
2025-2-5 12:17:38 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
deepseek
hailbot
rapperbot
c2
botnets
Release Notes: System Updates, New YARA and Suricata Rules, Signatures, and More
Hello, cybersecurity e...
2025-2-4 09:48:14 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
threats
suricata
analysis
phishing
3 Major Cyber Attacks in January 2025
Our cyber threat analy...
2025-1-29 10:2:41 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
phishing
youtube
redirected
fox
threats
How ANY.RUN Helps Healthcare Organizations Against Ransomware: Interlock Case Study
Ransomware attacks hav...
2025-1-28 11:16:38 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
ransomware
interlock
healthcare
attackers
malicious
How to Prevent a Ransomware Attack on a Business: A Lynx Malware Use Case
Lost documents, stolen...
2025-1-23 10:1:43 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
ransomware
lynx
analysis
malicious
security
How Threat Intelligence Lookup Helps Enterprises
The growing dependence...
2025-1-22 11:31:39 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
security
threats
downtime
InvisibleFerret Malware: Technical Analysis
Editor’s note: The cur...
2025-1-21 10:31:40 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
ferret
python
windows
c2
Malware Trends Overview Report: 2024
2024 has been an event...
2025-1-16 11:1:42 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
detections
t1059
attackers
defenses
lumma
YARA Rules: Cyber Threat Detection Tool for Modern Cybersecurity
Every ticking second i...
2025-1-15 12:31:42 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
threats
sakula
malicious
analysis
Previous
-36
-35
-34
-33
-32
-31
-30
-29
Next