unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples
Executive SummaryIn this article, we explore various lateral movement techniques f...
2024-11-22 19:0:26 | 阅读: 4 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
remote
ssh
machine
ard
attackers
Threat Assessment: Ignoble Scorpius, Distributors of BlackSuit Ransomware
Executive SummaryUnit 42 researchers have observed an increase in BlackSuit ransom...
2024-11-20 19:0:53 | 阅读: 2 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
ransomware
blacksuit
ignoble
scorpius
windows
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
Executive SummaryIn July 2024, the operational technology (OT)-centric malware Fro...
2024-11-19 19:0:15 | 阅读: 4 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
frostygoop
modbus
windows
enco
analysis
Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012
Executive SummaryPalo Alto Networks and Unit 42 are engaged in tracking a limited...
2024-11-18 22:42:18 | 阅读: 10 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
alto
palo
pan
0012
security
Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack
Executive SummaryUnit 42 researchers identified a North Korean IT worker activity...
2024-11-15 07:0:12 | 阅读: 12 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
north
sta
0237
korean
cloud
Global Companies Are Unknowingly Paying North Koreans: Here’s How to Catch Them
Executive SummaryWorkers with allegiances to the...
2024-11-13 19:0:36 | 阅读: 6 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
dprk
remote
subcategory
security
lowercase
ModeLeak: Privilege Escalation to LLM Model Exfiltration in Vertex AI
Executive SummaryIn the race to gain a competitive edge, organizations are increas...
2024-11-12 19:0:11 | 阅读: 9 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
gcp
vertex
malicious
llm
tuning
Silent Skimmer Gets Loud (Again)
Executive SummaryIn late May 2024, Unit 42 researchers observed an adversary compr...
2024-11-7 19:0:13 | 阅读: 10 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
reverse
c2
loader
ringq
powershell
Automatically Detecting DNS Hijacking in Passive DNS
Executive SummaryIn this article, we explain our process of detecting domain name...
2024-11-5 07:0:48 | 阅读: 18 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
hijacking
uts
hu
hijacked
pdns
TA Phone Home: EDR Evasion Testing Reveals Extortion Actor's Toolkit
Executive SummaryThis article reviews an incident where a threat actor unsuccessfu...
2024-11-2 06:0:12 | 阅读: 13 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
bypass
rogue
cobalt
kernelmode
machine
Jumpy Pisces Engages in Play Ransomware
Executive SummaryUnit 42 has identified Jumpy Pisces, a North Korean state-sponsor...
2024-10-30 18:0:29 | 阅读: 44 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
ransomware
jumpy
pisces
attackers
north
Deceptive Delight: Jailbreak LLMs Through Camouflage and Distraction
Executive SummaryThis article introduces a simple and straightforward technique fo...
2024-10-23 18:0:55 | 阅读: 5 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
jailbreak
harmful
asr
delight
deceptive
Gatekeeper Bypass: Uncovering Weaknesses in a macOS Security Mechanism
Executive SummaryUnit 42 researchers have found that certain third-party utilities...
2024-10-17 18:0:5 | 阅读: 0 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
security
software
bypass
developers
7z
Unit 42 Looks Toward the Threat Frontier: Preparing for Emerging AI Risks
Executive SummaryThe Unit 42 Threat Frontier report is our look forward to the fut...
2024-10-16 18:30:21 | 阅读: 5 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
security
attackers
genai
palo
defenders
Lynx Ransomware: A Rebranding of INC Ransomware
Executive SummaryIn July 2024, researchers from Palo Alto Networks discovered a su...
2024-10-11 05:0:46 | 阅读: 125 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
ransomware
lynx
alto
palo
drives
Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware
Executive SummaryUnit 42 has tracked activity from threat actors associated with t...
2024-10-9 18:0:54 | 阅读: 3 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
beavertail
windows
python
cortex
No Way to Hide: Uncovering New Campaigns from Daily Tunneling Detection
Executive SummaryThis article reviews four previously undisclosed domain name syst...
2024-10-5 05:0:3 | 阅读: 11 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
tunneling
rootdom
nameserver
c2
ns500505
Detecting Vulnerability Scanning Traffic From Underground Tools Using Machine Learning
Executive SummaryResearchers at Palo Alto Networks discovered an automated scannin...
2024-10-1 18:0:5 | 阅读: 28 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
injection
cloud
machine
malicious
security
Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy
Executive SummaryUnit 42 researchers discovered two malware samples used by the Sp...
2024-9-26 18:0:51 | 阅读: 16 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
klogexe
fpspy
sparkling
pisces
powershell
Investigating Infrastructure and Tactics of Phishing-as-a-Service Platform Sniper Dz
Executive SummaryWe have been monitoring a widely popular phishing-as-a-service (P...
2024-9-25 05:0:32 | 阅读: 78 |
收藏
|
Unit 42 - unit42.paloaltonetworks.com
phishing
dz
sniper
proxy
phaas
Previous
-12
-11
-10
-9
-8
-7
-6
-5
Next