unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-1-30 12:46:9 | 阅读: 12 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
phishing
security
malicious
ransomware
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-1-29 14:4:10 | 阅读: 22 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
deepseek
security
healthcare
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
read file error: read notes: is a directory...
2025-1-28 17:59:48 | 阅读: 20 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ransomware
chatbot
security
threats
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-1-27 13:3:37 | 阅读: 20 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
healthcare
phishing
deepseek
threats
security
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-1-24 15:13:10 | 阅读: 18 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
phishing
healthcare
cyberattack
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-1-23 13:21:50 | 阅读: 25 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
phishing
ransomware
bypass
Krypt3ia’s Survival Guide for Safe Communications in Today’s Internet and Social Media Landscape
The Moscow Rules are a set of guidelines developed during the Cold War for clandestine operation...
2025-1-22 15:0:25 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
tips
actionable
principle
threats
moscow
Krypt3ia Daily Threat Intel Digest 1.22.25
Trump axes TSA chief who led pipeline, airline, rail cybersecurity rulesTransportation Secur...
2025-1-22 14:43:33 | 阅读: 19 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
trump
security
ulbricht
valleyrat
Krypt3ia CTI Daily Digest 1.21.25
Businesses prepare to update their cybersecurity playbooks for the Trump era amid increasing thr...
2025-1-21 15:48:37 | 阅读: 12 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
microsoft
ransomware
threats
tanzeem
Threat Brief: Security Issues Surrounding TikTok and Its Potential for Espionage and Misinformation Campaigns
Date: January 20, 2025Compiled by: Krypt3iaExecutive SummaryTikTok, a social media p...
2025-1-20 13:34:8 | 阅读: 11 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
influence
espionage
bytedance
beijing
Expanded Damage Assessment: Unauthorized Access to FBI Informant Communications via AT&T Breach
OverviewIn a catastrophic breach of AT&T’s network infrastructure, the Chinese state-sponsor...
2025-1-17 20:28:38 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
informants
typhoon
salt
espionage
security
Daily Krypt3ia Cyber Threat Intelligence Digest:
Date: January 16, 2025Time: 0800 ETThis report provides key insights into the most critical...
2025-1-16 13:6:43 | 阅读: 14 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ransomware
phishing
malicious
security
attackers
Can a Threat Intelligence Program Succeed Without Logging and Monitoring?
A threat intelligence program (TIP) is often marketed as the holy grail of modern cybersecurity—...
2025-1-15 10:41:48 | 阅读: 9 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
monitoring
threats
attackers
security
spots
Threat Brief: Y2Q and the Convergence of AI Compute and Quantum Computing Power
OverviewY2Q, shorthand for “Year to Quantum” – marks the critical point when quantum compute...
2025-1-14 12:20:29 | 阅读: 9 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
threats
convergence
defenses
y2q
The Evolution of Cybercrime Cartels: From Lone Wolves to Sophisticated Syndicates
read file error: read notes: is a directory...
2025-1-13 16:45:32 | 阅读: 14 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
organized
ransomware
syndicates
Top 5 Non-State Actor Groups Targeting Critical Infrastructure
Critical infrastructure, spanning sectors such as healthcare, energy, and transportation, has be...
2025-1-13 12:52:6 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ransomware
sectors
lockbit
clop
motivations
Improving ATT&CK’s Relevance for Living Off the Land (LOTL) Detection
Living Off the Land (LOTL) tactics have become a cornerstone of modern cyberattacks, where adver...
2025-1-9 16:3:31 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
lotl
studies
defenders
contextual
actionable
APT vs. Cybercriminal Groups: Understanding Their Differences and Overlaps
The cyber threat landscape is dominated by two key adversaries: Advanced Persistent Threats (APT...
2025-1-9 15:22:56 | 阅读: 21 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
nation
criminal
apts
ransomware
Geopolitical Implications of Greenland Annexation & Potential Russian Influence
Context and Overview:The suggestion that former U.S. President Donald Trump aimed to annex G...
2025-1-9 14:35:41 | 阅读: 8 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
greenland
trump
russia
arctic
strategic
Tabletop: Recent statements by President-elect Donald Trump have indicated a willingness to use military force to assert U.S. control over Greenland and the Panama Canal, citing national security and economic interests.
Here are three potential scenarios that could unfold if the United States, under President-elect...
2025-1-7 19:7:19 | 阅读: 9 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
military
panama
nations
greenland
arctic
Previous
2
3
4
5
6
7
8
9
Next