unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Good, the Bad and the Ugly in Cybersecurity – Week 22
Breached | Data of 478,000 RaidForum Users Exposed OnlineThe tables turned on cybercriminals this...
2023-6-2 21:0:59 | 阅读: 8 |
收藏
|
SentinelOne - www.sentinelone.com
python
raidforums
moveit
security
malicious
Securing the Cloud in Modern Times | How Businesses Can Build Cohesive Cloud-Native Security Strategies
Cloud security remains front of mind for global enterprise leaders as more businesses migrate to pu...
2023-6-1 20:1:9 | 阅读: 4 |
收藏
|
SentinelOne - www.sentinelone.com
security
cloud
development
containers
Radare2 Power Ups | Delivering Faster macOS Malware Analysis With r2 Customization
In previous posts, we’ve explored how analysts can use radare2 (aka r2) for macOS malware triage, w...
2023-5-31 21:55:31 | 阅读: 9 |
收藏
|
SentinelLabs - www.sentinelone.com
macros
radare2
aliases
radiff2
analysis
Navigating the Cybersecurity Twitterverse | 23 Influential Accounts to Follow in 2023
Since our last post showcasing prominent cybersecurity accounts worth your follow, Twitter has occu...
2023-5-30 02:47:24 | 阅读: 1 |
收藏
|
SentinelOne - www.sentinelone.com
security
analysis
reverse
conferences
The Good, the Bad and the Ugly in Cybersecurity – Week 21
Private Sector Offensive Actor | FinFisher Execs Charged for Selling Spyware to TurkeyProsecutors...
2023-5-26 21:0:16 | 阅读: 8 |
收藏
|
SentinelOne - www.sentinelone.com
finfisher
liles
spyware
ransomware
warned
Operation Magalenha | Long-Running Campaign Pursues Portuguese Credentials and PII
By Aleksandar Milenkoski and Tom HegelExecutive SummaryOver the first quarter of 2023, SentinelL...
2023-5-25 18:55:11 | 阅读: 10 |
收藏
|
SentinelLabs - www.sentinelone.com
cdr
ams3
fra1
Evolution of Cloud Security | Looking At Cloud Posture Management Throughout the Decades
When cloud computing saw its earliest waves of adoption, businesses only had to decide whether or n...
2023-5-24 22:29:16 | 阅读: 10 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
security
threats
network
posture
Kimsuky | Ongoing Campaign Using Tailored Reconnaissance Toolkit
By Aleksandar Milenkoski and Tom HegelExecutive SummarySentinelLabs has observed an ongoing camp...
2023-5-23 19:23:42 | 阅读: 24 |
收藏
|
SentinelLabs - www.sentinelone.com
randomquery
korean
north
microsoft
malicious
SOC Team Power Up | 7 Practical Tips To Find and Stop Threats Faster with SentinelOne
In our recent series on Mastering the Art of SOC Analysis, we explored how aspiring SOC Analysts ca...
2023-5-22 21:4:12 | 阅读: 8 |
收藏
|
SentinelOne - www.sentinelone.com
identify
windows
lateral
network
malicious
The Good, the Bad and the Ugly in Cybersecurity – Week 20
Cyber Sanctions | Russian National Faces Multiple Charges for Ransomware OperationsThe US governme...
2023-5-19 21:0:21 | 阅读: 10 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
geacon
matveev
security
lockbit
LABScon Replay | Does This Look Infected 2 (APT41)
Does This Look Infected 2: this mp4 audio file was automatically transcribed by Sonix with the bes...
2023-5-18 21:25:1 | 阅读: 18 |
收藏
|
SentinelLabs - www.sentinelone.com
apt41
van
rufus
brown
log4j
Inside the Mind of a Cyber Attacker | Tactics, Techniques, and Procedures (TTPs) Every Security Practitioner Should Know
Tactics, techniques, and procedures (TTPs) are the blueprint of threat actors’ attacks – understand...
2023-5-17 20:41:55 | 阅读: 19 |
收藏
|
SentinelOne - www.sentinelone.com
security
ttps
attackers
network
LABScon Replay | Malshare: 10 Years of Running a Public Malware Repository
Malshare | 10 years of running a public malware repository: this mp4 audio file was automatically...
2023-5-16 21:43:15 | 阅读: 12 |
收藏
|
SentinelLabs - www.sentinelone.com
silas
cutler
malshare
repository
yeah
Geacon Brings Cobalt Strike Capabilities to macOS Threat Actors
The red-teaming and attack simulation tool Cobalt Strike has a long and widely observed history of...
2023-5-15 21:0:59 | 阅读: 13 |
收藏
|
SentinelOne - www.sentinelone.com
geacon
payload
securelink
cobalt
security
Celebrating Mothers of SentinelOne
As I prepare to celebrate my third Mother’s Day with two kids under three, I wonder how the time mo...
2023-5-14 23:32:20 | 阅读: 15 |
收藏
|
SentinelOne - www.sentinelone.com
drea
anastasija
mother
elena
alamelu
The Good, the Bad and the Ugly in Cybersecurity – Week 19
Data Protection | Google Takes on Apple in Privacy WarsWhen tech companies are battling it out to...
2023-5-12 21:0:4 | 阅读: 18 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
schooldude
lockers
educational
passwords
Hypervisor Ransomware | Multiple Threat Actor Groups Hop on Leaked Babuk Code to Build ESXi Lockers
Executive SummarySentinelLabs identified 10 ransomware families using VMware ESXi lockers based o...
2023-5-11 17:55:6 | 阅读: 21 |
收藏
|
SentinelLabs - www.sentinelone.com
ransomware
rhkrc
locker
xvgv
revix
Securing the Supply Chain | Managing the Risk of Open Source Software
Popular for being cost-effective and ready-made, open source software (OSS) has earned a spot in en...
2023-5-10 22:19:36 | 阅读: 11 |
收藏
|
SentinelOne - www.sentinelone.com
security
software
developers
secops
Understanding Cloud Incident Response | Developing Best Practices to Protect Your Enterprise
Enterprise leaders responsible for managing incidents in the cloud are widely encouraged to craft t...
2023-5-9 20:54:57 | 阅读: 9 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
security
threats
leaders
identify
Mastering the Art of SoC Analysis Part 3 | Secrets of Communication and Growth for Aspiring SOC Analysts
As cybersecurity threats increase in sophistication and frequency, the demand for skilled Security...
2023-5-8 20:55:29 | 阅读: 12 |
收藏
|
SentinelOne - www.sentinelone.com
security
threats
analysis
questioning
Previous
1
2
3
4
5
6
7
8
Next