unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Threat landscape for industrial automation systems for H2 2022
Year 2022 in numbersParameterH1 2022H2 20222022Percentage of attacked ICS co...
2023-3-6 18:0:45 | 阅读: 18 |
收藏
|
Securelist - securelist.com
malicious
regions
ranked
removable
ranking
The mobile malware threat landscape in 2022
These statistics are based on detection verdicts of Kaspersky products received from u...
2023-2-27 18:5:35 | 阅读: 22 |
收藏
|
Securelist - securelist.com
trojan
trojans
banker
ransomware
installers
Spam and phishing in 2022
Figures of the yearIn 2022:48.63% of all emails around the world and 52.78% of all...
2023-2-16 16:0:7 | 阅读: 28 |
收藏
|
Securelist - securelist.com
phishing
victim
offered
malicious
attackers
IoC detection experiments with ChatGPT
ChatGPT is a groundbreaking chatbot powered by the neural network-based language model...
2023-2-15 18:0:53 | 阅读: 43 |
收藏
|
Securelist - securelist.com
chatgpt
powershell
malicious
security
positives
Good, Perfect, Best: how the analyst can enhance penetration testing results
Penetration testing is something that many (of those who know what a pentest is) see a...
2023-2-10 18:0:33 | 阅读: 16 |
收藏
|
Securelist - securelist.com
client
security
network
pentesters
Web beacons on websites and in e-mail
There is a vast number of trackers, which gather information about users’ activities o...
2023-2-7 16:0:9 | 阅读: 27 |
收藏
|
Securelist - securelist.com
beacons
beacon
trackers
twenty
advertising
Prilex modification now targeting contactless credit card transactions
Prilex is a singular threat actor that has evolved from ATM-focused malware into uniqu...
2023-1-31 16:0:41 | 阅读: 15 |
收藏
|
Securelist - securelist.com
prilex
contactless
chip
tap
rfid
Come to the dark side: hunting IT professionals on the dark web
The dark web is a collective name for a variety of websites and marketplaces that brin...
2023-1-30 18:0:30 | 阅读: 32 |
收藏
|
Securelist - securelist.com
employment
salary
posting
employers
What your SOC will be facing in 2023
As the role of cybersecurity in large businesses increases remarkably year over year,...
2023-1-23 18:0:8 | 阅读: 17 |
收藏
|
Securelist - securelist.com
socs
telecom
threats
10k
growth
Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
Roaming Mantis (a.k.a Shaoye) is well-known as a long-term cyberattack campaign that u...
2023-1-19 18:0:6 | 阅读: 26 |
收藏
|
Securelist - securelist.com
apk
chrome
iptime
landing
efm
What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks
Kaspersky detects an average of 400,000 malicious files every day. These add up to 144...
2023-1-18 16:0:45 | 阅读: 18 |
收藏
|
Securelist - securelist.com
security
ransomware
victim
cloud
footprint
How much security is enough?
According to a prominent Soviet science fiction writer, beauty is a fine line, a razor...
2023-1-9 18:38:33 | 阅读: 19 |
收藏
|
Securelist - securelist.com
security
operational
threats
efficiency
attackers
BlueNoroff introduces new methods bypassing MoTW
BlueNoroff group is a financially motivated threat actor eager to profit from its cybe...
2022-12-27 16:0:26 | 阅读: 34 |
收藏
|
Securelist - securelist.com
payload
windows
capital
bluenoroff
cloud
Ransomware and wiper signed with stolen certificates
IntroductionOn July 17, 2022, Albanian news outlets reported a massive cyberattack th...
2022-12-22 16:0:32 | 阅读: 24 |
收藏
|
Securelist - securelist.com
wave
ransomware
wiper
wiping
albanian
CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange
SummaryAt the end of September, GTSC reported an attack on critical infrastructure th...
2022-12-20 00:15:49 | 阅读: 72 |
收藏
|
Securelist - securelist.com
exchange
attacker
powershell
Reassessing cyberwarfare. Lessons learned in 2022
At this point, it has become cliché to say that nothing in 2022 turned out the way we...
2022-12-14 18:0:18 | 阅读: 20 |
收藏
|
Securelist - securelist.com
conflict
ukraine
military
ransomware
How to train your Ghidra
Getting started with GhidraFor about two decades, being a reverse engineer meant that...
2022-12-9 21:0:23 | 阅读: 26 |
收藏
|
Securelist - securelist.com
ghidra
gradle
download
analysis
codebrowser
DeathStalker targets legal entities with new Janicab variant
Just to clarify, the subheading isn’t a normal quote, but a message that Janicab malwa...
2022-12-8 18:0:49 | 阅读: 22 |
收藏
|
Securelist - securelist.com
janicab
c2
python
php
intrusions
Main phishing and scamming trends and techniques
There are two main types of online fraud aimed at stealing user data and money: phishi...
2022-12-6 18:0:1 | 阅读: 23 |
收藏
|
Securelist - securelist.com
phishing
victim
attackers
spoofing
malicious
If one sheep leaps over the ditch…
IntroductionIf one sheep leaps over the ditch, the rest will follow. This is an old s...
2022-12-5 18:0:58 | 阅读: 18 |
收藏
|
Securelist - securelist.com
ransomware
lockbit
spreading
machine
developers
Previous
10
11
12
13
14
15
16
17
Next