unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
A cryptor, a stealer and a banking trojan
IntroductionAs long as cybercriminals want to make money, they’ll keep making malware...
2023-9-28 16:0:35 | 阅读: 7 |
收藏
|
Securelist - securelist.com
c2
zanubis
lumma
asmcrypt
malicious
QR codes in email phishing
QR codes are everywhere: you can see them on posters and leaflets, ATM screens, price...
2023-9-27 18:0:41 | 阅读: 9 |
收藏
|
Securelist - securelist.com
qr
phishing
microsoft
letter
letters
Overview of IoT threats in 2023
IoT devices (routers, cameras, NAS boxes, and smart home components) multiply every ye...
2023-9-21 18:0:49 | 阅读: 4 |
收藏
|
Securelist - securelist.com
security
malicious
routers
passwords
Threat landscape for industrial automation systems. Statistics for H1 2023
Industrial threats...
2023-9-13 17:0:18 | 阅读: 4 |
收藏
|
Securelist - securelist.com
malicious
threats
regions
africa
percentages
Free Download Manager backdoored – a possible supply chain attack on Linux machines
Over the last few years, Linux machines have become a more and more prominent target f...
2023-9-12 16:0:18 | 阅读: 33 |
收藏
|
Securelist - securelist.com
download
malicious
crond
fdmpkg
software
From Caribbean shores to your devices: analyzing Cuba ransomware
IntroductionKnowledge is our best weapon in the fight against cybercrime. An understa...
2023-9-11 18:0:26 | 阅读: 13 |
收藏
|
Securelist - securelist.com
cuba
bughatch
security
ransomware
burntcigar
Evil Telegram doppelganger attacks Chinese users
A while ago we discovered a bunch of Telegram mods on Google Play with descriptions in...
2023-9-8 18:0:40 | 阅读: 12 |
收藏
|
Securelist - securelist.com
contacts
wsys
mods
messenger
IT threat evolution in Q2 2023. Non-mobile statistics
IT threat evolution in Q2 2023IT threat evolution in Q2 2023. Non-mobile statistics...
2023-8-30 18:0:41 | 阅读: 5 |
收藏
|
Securelist - securelist.com
q2
trojan
territory
ransomware
territories
IT threat evolution in Q2 2023. Mobile statistics
IT threat evolution in Q2 2023IT threat evolution in Q2 2023. Non-mobile statistics...
2023-8-30 18:0:33 | 阅读: 6 |
收藏
|
Securelist - securelist.com
trojan
q2
banker
trojans
ransomware
IT threat evolution in Q2 2023
IT threat evolution in Q2 2023IT threat evolution in Q2 2023. Non-mobile statistics...
2023-8-30 18:0:5 | 阅读: 4 |
收藏
|
Securelist - securelist.com
malicious
tomiris
turla
attackers
gopuram
Lockbit leak, research opportunities on tools leaked from TAs
Lockbit is one of the most prevalent ransomware strains. It comes with an affiliate ra...
2023-8-25 18:0:49 | 阅读: 9 |
收藏
|
Securelist - securelist.com
lockbit
ransomware
analysis
payload
builders
Phishing with hacked sites
Phishers want their fake pages to cost minimum effort but generate as much income as p...
2023-8-14 18:0:32 | 阅读: 10 |
收藏
|
Securelist - securelist.com
phishing
wordpress
security
wp
malicious
Focus on DroxiDat/SystemBC
Recently we pushed a report to our customers about an interesting and common component...
2023-8-10 18:0:22 | 阅读: 7 |
收藏
|
Securelist - securelist.com
systembc
droxidat
perflogs
ransomware
beacons
Common TTPs of attacks against industrial organizations
In 2022 we investigated a series of attacks against industrial organizations in Easter...
2023-8-10 16:0:7 | 阅读: 9 |
收藏
|
Securelist - securelist.com
implants
removable
c2
stage
yandex
What’s happening in the world of crimeware: Emotet, DarkGate and LokiBot
IntroductionThe malware landscape keeps evolving. New families are born, while others...
2023-8-3 18:0:32 | 阅读: 23 |
收藏
|
Securelist - securelist.com
darkgate
shellcode
memory
lokibot
payload
Anomaly detection in certificate-based TGT requests
One of the most complex yet effective methods of gaining unauthorized access to corpor...
2023-7-28 18:0:16 | 阅读: 17 |
收藏
|
Securelist - securelist.com
whisker
f0
forged
msds
APT trends report Q2 2023
For more than six years, the Global Research and Analysis Team (GReAT) at Kaspersky ha...
2023-7-27 18:0:22 | 阅读: 11 |
收藏
|
Securelist - securelist.com
c2
victim
mata
payload
malicious
Comprehensive analysis of initial attack samples exploiting CVE-2023-23397 vulnerability
On March 14, 2023, Microsoft published a blogpost describing an Outlook Client Elevati...
2023-7-19 20:0:41 | 阅读: 7 |
收藏
|
Securelist - securelist.com
vt
unc
submission
reminder
webdav
Email crypto phishing scams: stealing from hot and cold crypto wallets
The higher the global popularity of cryptocurrencies and the more new ways of storing...
2023-7-5 18:0:9 | 阅读: 17 |
收藏
|
Securelist - securelist.com
wallets
phishing
hot
ripple
hardware
Andariel’s silly mistakes and a new malware family
IntroductionAndariel, a part of the notorious Lazarus group, is known for its use of...
2023-6-28 18:0:24 | 阅读: 26 |
收藏
|
Securelist - securelist.com
earlyrat
andariel
log4j
ttps
dtrack
Previous
1
2
3
4
5
6
7
8
Next