unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Good, the Bad and the Ugly in Cybersecurity – Week 51
The GoodThe latest dose of justice in the cyber threat landscape: U.S. authorities this week seize...
2022-12-16 22:0:12 | 阅读: 26 |
收藏
|
SentinelOne - www.sentinelone.com
lockbit
ransomware
doj
california
python
LABScon Replay | Is CNVD ≥ CVE? A Look at Chinese Vulnerability Discovery and Disclosure
Is CNVD ≥ CVE? A Look at Chinese Vulnerability Discovery and Disclosure.mp4: this mp4 audio file w...
2022-12-15 23:22:23 | 阅读: 25 |
收藏
|
SentinelLabs - www.sentinelone.com
cnvd
kristin
rosso
cnnvd
Feature Spotlight | Announcing General Availability (GA) of Linux and K8s Agents v22.3 for Cloud Workload Security
SentinelOne is pleased to announce general availability of version 22.3 of our Linux and Kubernetes...
2022-12-15 23:4:41 | 阅读: 18 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
workload
kubernetes
security
workloads
SentinelOne’s Cybersecurity Predictions 2023 | What’s Next?
2022 was a sobering year for us all. Riding on the back of the COVID pandemic of the previous two y...
2022-12-14 23:37:19 | 阅读: 21 |
收藏
|
SentinelOne - www.sentinelone.com
security
threats
ransomware
aggressive
Driving Through Defenses | Targeted Attacks Leverage Signed Malicious Microsoft Drivers
Executive SummarySentinelOne has observed prominent threat actors abusing legitimately signed Mic...
2022-12-14 02:12:18 | 阅读: 29 |
收藏
|
SentinelLabs - www.sentinelone.com
poortry
microsoft
stonestop
malicious
processes
Building Blocks For Your XDR Journey, Part 4 | The Value of Security Data
Welcome to Part 4 of our multi-part XDR (eXtended Detection and Response) blog series. If you haven...
2022-12-14 00:48:47 | 阅读: 18 |
收藏
|
SentinelOne - www.sentinelone.com
security
telemetry
threats
cloud
singularity
SentinelOne Recognized Across CRN’s 2022 Products Of The Year
It’s an exciting time for SentinelOne as we celebrate being named a WINNER in CRN’s 2022 Products o...
2022-12-13 23:45:40 | 阅读: 14 |
收藏
|
SentinelOne - www.sentinelone.com
singularity
security
winner
award
machine
The Dangers of Social Engineering | How to Protect Your Organization
It’s no secret that social engineering is a powerful tool in a cybercriminal’s arsenal. Threat acto...
2022-12-12 22:28:2 | 阅读: 17 |
收藏
|
SentinelOne - www.sentinelone.com
phishing
security
bec
simulation
The Good, the Bad and the Ugly in Cybersecurity – Week 50
The GoodWhen programmers make mistakes that turn into news, it’s almost invariably because some th...
2022-12-9 22:0:27 | 阅读: 41 |
收藏
|
SentinelOne - www.sentinelone.com
wiper
ransomware
fantasy
wipers
Ten Questions a CEO Should Ask About XDR (with Answers)
As a CEO, staying informed about the latest security technologies and approaches to protect your or...
2022-12-8 23:26:48 | 阅读: 19 |
收藏
|
SentinelOne - www.sentinelone.com
security
threats
processes
posture
accuracy
Top 10 macOS Malware Discoveries in 2022
2022 saw a number of significant malware campaigns targeting the macOS platform and the emergence o...
2022-12-7 23:35:37 | 阅读: 70 |
收藏
|
SentinelOne - www.sentinelone.com
orat
library
c2
payload
client
S Ventures Invests in Drata to Take Security Compliance to the Next Level
As the age of modern software and cloud-native applications enters its third decade, user experienc...
2022-12-7 22:5:53 | 阅读: 27 |
收藏
|
SentinelOne - www.sentinelone.com
security
drata
ventures
software
hypergrowth
S Ventures Invests in Vaultree to Revolutionize Data Encryption
In today’s modern economy, data can unlock the full potential of businesses in just about any indus...
2022-12-7 22:0:20 | 阅读: 28 |
收藏
|
SentinelOne - www.sentinelone.com
encryption
vaultree
database
security
ventures
5 Cyber Scams to Watch Out for This Holiday Season
With the holiday season now in sight, businesses and consumers alike have begun to prepare for the...
2022-12-5 22:0:29 | 阅读: 19 |
收藏
|
SentinelOne - www.sentinelone.com
holiday
shoppers
season
security
consumers
The Good, the Bad and the Ugly in Cybersecurity – Week 49
The GoodScammers who have stolen in excess of $12.8 million were arrested this week in Madrid and...
2022-12-2 22:0:55 | 阅读: 44 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
lastpass
security
heliconia
affiliate
The Mystery of Metador | Unpicking Mafalda’s Anti-Analysis Techniques
OverviewAt the inaugural LabsCon, we unveiled Metador, a previously unreported threat actor that...
2022-12-1 22:19:42 | 阅读: 27 |
收藏
|
SentinelLabs - www.sentinelone.com
mafalda
addr1
segments
addr2
analysis
LABScon Replay | The Mystery of Metador
The Mystery of Metador.mp4: this mp4 audio file was automatically transcribed by Sonix with the be...
2022-12-1 22:18:59 | 阅读: 18 |
收藏
|
SentinelLabs - www.sentinelone.com
mafalda
metamain
amitai
juan
saade
SentinelOne Integrates With Amazon Security Lake to Power Cloud Investigations
SentinelOne is pleased to announce an integration with Amazon Security Lake, a new Amazon Web Servi...
2022-11-30 22:8:58 | 阅读: 27 |
收藏
|
www.sentinelone.com
security
singularity
ocsf
lake
cloud
Defending Cloud-Based Workloads: A Guide to Kubernetes Security
As more businesses move their applications to the cloud, in many cases they turn to Kubernetes (k8s...
2022-11-28 22:15:35 | 阅读: 28 |
收藏
|
www.sentinelone.com
kubernetes
security
cloud
containers
workloads
The Good, the Bad and the Ugly in Cybersecurity – Week 48
The GoodWe give thanks this week to the good people at Interpol along with fraud investigators fro...
2022-11-25 22:0:39 | 阅读: 19 |
收藏
|
www.sentinelone.com
facebook
software
stealers
haechi
victim
Previous
24
25
26
27
28
29
30
31
Next