unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Exotic SambaSpy is now dancing with Italian users
IntroductionIn May 2024, we detected a campaign exclusively targeting victims in Ital...
2024-9-18 18:15:15 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
italian
malicious
sambaspy
attacker
Loki: a new private agent for the popular Mythic framework
In July 2024, we discovered the previously unknown Loki backdoor, which was used in a...
2024-9-9 15:15:14 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
loader
loki
mythic
c2
havoc
Tropic Trooper spies on government entities in the Middle East
Executive summaryTropic Trooper (also known as KeyBoy and Pirate Panda) is an APT gro...
2024-9-5 16:15:13 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
loader
trooper
tropic
1f
Mallox ransomware: in-depth analysis and evolution
Mallox is a sophisticated and dangerous family of malicious software that has been cau...
2024-9-4 18:15:17 | 阅读: 65 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
mallox
ransomware
victim
encryption
trojan
A deep dive into the most interesting incident response cases of last year
In 2023, Kaspersky’s Global Emergency Response Team (GERT) participated in services ar...
2024-9-3 19:15:14 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
gert
attackers
analysis
windows
payload
IT threat evolution Q2 2024
Targeted attacksXZ backdoor: a supply chain attack in the makingOn March 29, a messa...
2024-9-3 16:15:15 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
attackers
xz
windows
malicious
stealer
IT threat evolution in Q2 2024. Mobile statistics
Quarterly figuresAccording to Kaspersky Security Network, in Q2 2024:7 million atta...
2024-9-3 16:15:14 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
trojan
banker
q2
turkey
trojans
IT threat evolution in Q2 2024. Non-mobile statistics
The statistics presented here are based on detection verdicts by Kaspersky products an...
2024-9-3 16:15:13 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
ransomware
q2
trojan
territories
territory
Head Mare: adventures of a unicorn in Russia and Belarus
Head Mare is a hacktivist group that first made itself known in 2023 on the social net...
2024-9-2 18:15:14 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
windows
mare
attackers
phantomcore
microsoft
HZ Rat backdoor for macOS attacks users of China’s DingTalk and WeChat
In June 2024, we discovered a macOS version of the HZ Rat backdoor targeting users of...
2024-8-27 18:15:13 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
c2
victim
network
dingtalk
malicious
Memory corruption vulnerabilities in Suricata and FreeRDP
As a cybersecurity company, before we release our products, we perform penetration tes...
2024-8-22 18:15:13 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
freerdp
suricata
codec
Exploits and vulnerabilities in Q2 2024
Q2 2024 was eventful in terms of new interesting vulnerabilities and exploitation tech...
2024-8-21 19:0:17 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
q2
q1
windows
download
Approach to mainframe penetration testing on z/OS
Information technology is developing at a rapid pace, with completely new areas emergi...
2024-8-20 20:15:13 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
mainframe
apf
tso
privileges
racf
BlindEagle flying high in Latin America
BlindEagle, also known as “APT-C-36”, is an APT actor recognized for employing straigh...
2024-8-19 18:30:15 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
blindeagle
phishing
espionage
colombia
Tusk: unraveling a complex infostealer campaign
SummaryKaspersky Global Emergency Response Team (GERT) has identified a complex campa...
2024-8-16 00:15:13 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
inactive
trojan
shop
tidyme
EastWind campaign: new CloudSorcerer attacks on government organizations in Russia
In late July 2024, we detected a series of ongoing targeted cyberattacks on dozens of...
2024-8-14 20:15:12 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
attackers
library
malicious
c2
APT trends report Q2 2024
For over six years now, Kaspersky’s Global Research and Analysis Team (GReAT) has been...
2024-8-13 20:15:12 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
c2
qsc
albanian
windows
malicious
Indirect prompt injection in the real world: how people manipulate neural networks
What is prompt injection?Large language models (LLMs) – the neural network algorithms...
2024-8-12 19:15:12 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
llm
injection
injections
chatbots
bots
LianSpy: new Android spyware targeting Russian users
Malware descriptions...
2024-8-5 17:45:13 | 阅读: 25 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
pastebin
hxxps
lianspy
spyware
yandex
How “professional” ransomware variants boost cybercrime groups
IntroductionCybercriminals who specialize in ransomware do not always create it thems...
2024-8-1 19:30:15 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
ransomware
mallox
sexi
windows
affiliate
Previous
1
2
3
4
5
6
7
8
Next