unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
How scammers employ IPFS for email phishing
The idea of creating Web 3.0 has been around since the end of 2000s. The new version o...
2023-3-27 16:0:48 | 阅读: 28 |
收藏
|
Securelist - securelist.com
ipfs
phishing
letters
cid
employ
Understanding metrics to measure SOC effectiveness
The security operations center (SOC) plays a critical role in protecting an organizati...
2023-3-24 16:0:56 | 阅读: 24 |
收藏
|
Securelist - securelist.com
metric
security
monitoring
measuring
goals
Developing an incident response playbook
An incident response playbook is a predefined set of actions to address a specific sec...
2023-3-23 16:0:0 | 阅读: 26 |
收藏
|
Securelist - securelist.com
playbook
containment
phases
security
analysis
Bad magic: new APT found in the area of Russo-Ukrainian conflict
Since the start of the Russo-Ukrainian conflict, Kaspersky researchers and the interna...
2023-3-21 16:0:37 | 阅读: 33 |
收藏
|
Securelist - securelist.com
powermagic
malicious
commonmagic
decoy
binst
Business on the dark web: deals and regulatory mechanisms
Research...
2023-3-15 18:0:35 | 阅读: 25 |
收藏
|
Securelist - securelist.com
escrow
deals
parties
arbiter
download
Malvertising through search engines
In recent months, we observed an increase in the number of malicious campaigns that us...
2023-3-9 18:0:18 | 阅读: 58 |
收藏
|
Securelist - securelist.com
software
download
blender
malicious
powershell
The state of stalkerware in 2022
The state of stalkerware in 2022 (PDF)Main findings of 2022The State of Stalkerware...
2023-3-8 18:0:44 | 阅读: 22 |
收藏
|
Securelist - securelist.com
stalkerware
america
security
victim
brazil
Threat landscape for industrial automation systems for H2 2022
Year 2022 in numbersParameterH1 2022H2 20222022Percentage of attacked ICS co...
2023-3-6 18:0:45 | 阅读: 23 |
收藏
|
Securelist - securelist.com
malicious
regions
ranked
removable
ranking
The mobile malware threat landscape in 2022
These statistics are based on detection verdicts of Kaspersky products received from u...
2023-2-27 18:5:35 | 阅读: 28 |
收藏
|
Securelist - securelist.com
trojan
trojans
banker
ransomware
installers
Spam and phishing in 2022
Figures of the yearIn 2022:48.63% of all emails around the world and 52.78% of all...
2023-2-16 16:0:7 | 阅读: 33 |
收藏
|
Securelist - securelist.com
phishing
victim
offered
malicious
attackers
IoC detection experiments with ChatGPT
ChatGPT is a groundbreaking chatbot powered by the neural network-based language model...
2023-2-15 18:0:53 | 阅读: 48 |
收藏
|
Securelist - securelist.com
chatgpt
powershell
malicious
security
positives
Good, Perfect, Best: how the analyst can enhance penetration testing results
Penetration testing is something that many (of those who know what a pentest is) see a...
2023-2-10 18:0:33 | 阅读: 20 |
收藏
|
Securelist - securelist.com
client
security
network
pentesters
Web beacons on websites and in e-mail
There is a vast number of trackers, which gather information about users’ activities o...
2023-2-7 16:0:9 | 阅读: 32 |
收藏
|
Securelist - securelist.com
beacons
beacon
trackers
twenty
advertising
Prilex modification now targeting contactless credit card transactions
Prilex is a singular threat actor that has evolved from ATM-focused malware into uniqu...
2023-1-31 16:0:41 | 阅读: 19 |
收藏
|
Securelist - securelist.com
prilex
contactless
chip
tap
rfid
Come to the dark side: hunting IT professionals on the dark web
The dark web is a collective name for a variety of websites and marketplaces that brin...
2023-1-30 18:0:30 | 阅读: 37 |
收藏
|
Securelist - securelist.com
employment
salary
posting
employers
What your SOC will be facing in 2023
As the role of cybersecurity in large businesses increases remarkably year over year,...
2023-1-23 18:0:8 | 阅读: 22 |
收藏
|
Securelist - securelist.com
socs
telecom
threats
10k
growth
Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
Roaming Mantis (a.k.a Shaoye) is well-known as a long-term cyberattack campaign that u...
2023-1-19 18:0:6 | 阅读: 32 |
收藏
|
Securelist - securelist.com
apk
chrome
iptime
landing
efm
What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks
Kaspersky detects an average of 400,000 malicious files every day. These add up to 144...
2023-1-18 16:0:45 | 阅读: 23 |
收藏
|
Securelist - securelist.com
security
ransomware
victim
cloud
footprint
How much security is enough?
According to a prominent Soviet science fiction writer, beauty is a fine line, a razor...
2023-1-9 18:38:33 | 阅读: 24 |
收藏
|
Securelist - securelist.com
security
operational
threats
efficiency
attackers
BlueNoroff introduces new methods bypassing MoTW
BlueNoroff group is a financially motivated threat actor eager to profit from its cybe...
2022-12-27 16:0:26 | 阅读: 39 |
收藏
|
Securelist - securelist.com
payload
windows
capital
bluenoroff
cloud
Previous
15
16
17
18
19
20
21
22
Next