unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities
By Juan Andres Guerrero-Saade, Amitai Ben Shushan Ehrlich, and Aleksandar MilenkoskiExecutive Summ...
2022-9-23 02:24:42 | 阅读: 53 |
收藏
|
www.sentinelone.com
mafalda
metador
metamain
c2
threats
Investing in Tomorrow | Why We Started S Ventures
Today, we are excited to launch S Ventures, a $100M fund investing in the next generation of catego...
2022-9-21 20:57:59 | 阅读: 37 |
收藏
|
www.sentinelone.com
security
ventures
cloud
singularity
CISO Wins | A 5-Phase Ramp up Strategy for Success on a New Job
At the helm of a business’s overarching security strategy is their Chief Information Security Offic...
2022-9-19 23:8:54 | 阅读: 24 |
收藏
|
www.sentinelone.com
security
cisos
ciso
goals
The Good, the Bad and the Ugly in Cybersecurity – Week 38
The GoodThis week, ten individuals and two entities were sanctioned by the Department of the Treas...
2022-9-16 22:47:17 | 阅读: 33 |
收藏
|
www.sentinelone.com
microsoft
malicious
leveldb
sanctioned
From the Front Lines | Slam! Anatomy of a Publicly-Available Ransomware Builder
The barrier to entry for enterprising cybercriminals has been dropping considerably over recent yea...
2022-9-15 22:48:23 | 阅读: 59 |
收藏
|
www.sentinelone.com
ransomware
slam
mbr
consoleapp2
github
Endpoint, Identity and Cloud | Top Cyber Attacks of 2022 (So Far)
Businesses have thrived in the era of more – more tools, more access, and more connections. When it...
2022-9-14 22:7:40 | 阅读: 33 |
收藏
|
www.sentinelone.com
ransomware
cloud
network
kubernetes
singularity
Fortune Names SentinelOne a Top Workplace in Tech
SentinelOne has been named a Best Workplace in Technology on Fortune’s US Ranking for 2022. Over 15...
2022-9-12 22:49:19 | 阅读: 23 |
收藏
|
www.sentinelone.com
noa
elena
comparably
workplaces
security
The Good, the Bad and the Ugly in Cybersecurity – Week 37
The GoodThis week, the DoJ, FBI, and Portuguese authorities dismantled WT1SHOP, a prolific cybercr...
2022-9-9 21:0:0 | 阅读: 24 |
收藏
|
www.sentinelone.com
ransomware
wt1shop
angeles
marketplace
continuing
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection
By Aleksandar Milenkoski & Jim WalterWe observe a new trend on the ransomware scene – intermittent...
2022-9-8 21:29:52 | 阅读: 39 |
收藏
|
www.sentinelone.com
ransomware
encryption
blackcat
basta
Cyber Risks in the Education Sector | Why Cybersecurity Needs to Be Top of the Class
With summer on its last legs, the phrase “back to school” can be heard everywhere. For opportunisti...
2022-9-7 23:31:33 | 阅读: 24 |
收藏
|
www.sentinelone.com
schools
security
ransomware
pii
Accelerating Your Cloud Security with Workload Protection
As more organizations make the shift towards hybrid and cloud environments, security teams need a n...
2022-9-6 22:29:8 | 阅读: 22 |
收藏
|
www.sentinelone.com
cloud
security
singularity
threats
workloads
The Good, the Bad and the Ugly in Cybersecurity – Week 36
The GoodThis week, the United Kingdom announced plans to roll out a new security framework to pro...
2022-9-2 23:0:45 | 阅读: 24 |
收藏
|
www.sentinelone.com
security
twilio
okta
nitrokod
translate
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
Executive SummaryJuiceLedger is a relativey new threat actor focused on infostealing through a .N...
2022-9-2 00:0:13 | 阅读: 35 |
收藏
|
www.sentinelone.com
pypi
juiceledger
python
phishing
Advancing Security | The Age of AI & Machine Learning in Cybersecurity
Modern cyber attackers’ tactics, techniques, and procedures (TTPs) have become both rapid and abund...
2022-8-31 22:57:8 | 阅读: 28 |
收藏
|
www.sentinelone.com
threats
security
machine
cisos
Autonomous Detection & Response | How MDR Disrupts the Cyber Kill Chain
The only predictable thing about the cyber threat landscape is that you can always expect it to shi...
2022-8-29 22:26:20 | 阅读: 21 |
收藏
|
www.sentinelone.com
vigilance
network
lateral
threats
machine
The Good, the Bad and the Ugly in Cybersecurity – Week 35
The GoodThis week, Stanford Internet Observatory reported on their collaborative effort with socia...
2022-8-26 22:25:44 | 阅读: 25 |
收藏
|
www.sentinelone.com
plex
security
passwords
desfa
BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar
BlueSky ransomware is an emerging threat that researchers have been paying increasing attention to...
2022-8-26 00:2:6 | 阅读: 58 |
收藏
|
www.sentinelone.com
bluesky
ransomware
kmsauto
alguien
windows
Microsoft Active Directory as a Prime Target for Ransomware Operators
The Active Directory (AD) infrastructure continues to be a key element in ransomware campaigns and...
2022-8-24 21:50:35 | 阅读: 25 |
收藏
|
www.sentinelone.com
ransomware
security
singularity
attackers
network
XCSSET Malware Update | macOS Threat Actors Prepare for Life Without Python
Threat actors behind the XCSSET malware have been relatively quiet since last year, but new activit...
2022-8-23 00:58:32 | 阅读: 37 |
收藏
|
www.sentinelone.com
applescript
xcsset
remote
python
library
The Good, the Bad and the Ugly in Cybersecurity – Week 34
The GoodThis week, the U.S. Department of Justice has extradited a Russian citizen from the Nether...
2022-8-19 23:0:15 | 阅读: 28 |
收藏
|
www.sentinelone.com
ransomware
water
blackbyte
ryuk
dubnikov
Previous
27
28
29
30
31
32
33
34
Next