unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
APT10: Tracking down LODEINFO 2022, part I
Kaspersky has been tracking activities involving the LODEINFO malware family since 201...
2022-10-31 16:0:52 | 阅读: 56 |
收藏
|
securelist.com
lodeinfo
shellcode
downiissa
malicious
japanese
DiceyF deploys GamePlayerFramework in online casino development studio
The Hacktivity 2022 security festival was held at the MOM Cultural Center in Budapest,...
2022-10-18 02:37:5 | 阅读: 42 |
收藏
|
securelist.com
yuna
c2
downloaders
Ongoing exploitation of CVE-2022-41352 (Zimbra 0-day)
Incidents...
2022-10-13 16:0:21 | 阅读: 95 |
收藏
|
securelist.com
zimbra
webapps
jetty
41352
cpio
Malicious WhatsApp mod distributed through legitimate apps
Last year, we wrote about the Triada Trojan inside FMWhatsApp, a modified WhatsApp bui...
2022-10-12 16:0:16 | 阅读: 36 |
收藏
|
securelist.com
malicious
yowhatsapp
snaptube
triada
trojan
TOP 10 unattributed APT mysteries
Targeted attack attribution is always a tricky thing, and in general, we believe that...
2022-10-7 18:0:47 | 阅读: 38 |
收藏
|
securelist.com
malicious
security
tensho
windows
A look at the 2020–2022 ATM/PoS malware landscape
During the pandemic, lockdowns forced people to stay at home and do their shopping onl...
2022-10-6 16:0:38 | 阅读: 29 |
收藏
|
securelist.com
atm
families
hydrapos
security
ploutus
Uncommon infection and malware propagation methods
Malware reports...
2022-10-5 17:0:14 | 阅读: 20 |
收藏
|
securelist.com
malicious
network
machine
ransomware
backdoored
OnionPoison: infected Tor Browser installer distributed through popular YouTube channel
While performing regular threat hunting activities, we identified multiple downloads o...
2022-10-4 18:0:29 | 阅读: 31 |
收藏
|
securelist.com
malicious
c2
freebl3
library
victim
DeftTorero: tactics, techniques and procedures of intrusions revealed
Earlier this year, we started hunting for possible new DeftTorero (aka Lebanese Cedar,...
2022-10-3 15:0:15 | 阅读: 50 |
收藏
|
securelist.com
exе
explosive
intrusions
mimikatz
defttorero
The secrets of Schneider Electric’s UMAS protocol
UMAS (Unified Messaging Application Services) is a proprietary Schneider Electric (SE)...
2022-9-29 16:0:53 | 阅读: 19 |
收藏
|
securelist.com
umas
plc
client
electric
schneider
Prilex: the pricey prickle credit card complex
Prilex is a Brazilian threat actor that has evolved out of ATM-focused malware into mo...
2022-9-28 16:0:41 | 阅读: 40 |
收藏
|
securelist.com
prilex
software
atm
fraudulent
emv
NullMixer: oodles of Trojans in a single dropper
Executive SummaryNullMixer is a dropper leading to an infection chain of a wide varie...
2022-9-26 16:0:10 | 阅读: 37 |
收藏
|
securelist.com
download
nullmixer
malicious
hxxps
hxxp
Mass email campaign with a pinch of targeted spam
Spam and phishing mail...
2022-9-23 16:0:13 | 阅读: 23 |
收藏
|
securelist.com
tesla
malicious
keeprojects
spammers
bulgarian
External attack surface and ongoing cybercriminal activity in APAC region
Publications...
2022-9-19 22:0:21 | 阅读: 19 |
收藏
|
securelist.com
footprint
threats
australia
Self-spreading stealer attacks gamers via YouTube
An unusual malicious bundle (a collection of malicious programs distributed in the for...
2022-9-15 16:0:14 | 阅读: 33 |
收藏
|
securelist.com
hxxps
ph
stealer
malicious
telegra
Threat landscape for industrial automation systems for H1 2022
Industrial threats...
2022-9-8 15:59:54 | 阅读: 17 |
收藏
|
securelist.com
malicious
ransomware
regions
industries
threats
Good game, well played: an overview of gaming-related cyberthreats in 2022
The gaming industry went into full gear during the pandemic, as many people took up on...
2022-9-6 16:18:10 | 阅读: 25 |
收藏
|
securelist.com
software
trojan
malicious
unwanted
threats
The nature of cyber incidents
Publications...
2022-9-5 18:0:38 | 阅读: 21 |
收藏
|
securelist.com
ransomware
korea
gert
maui
Kimsuky’s GoldDragon cluster and its C2 operations
APT reports...
2022-8-25 09:0:31 | 阅读: 47 |
收藏
|
securelist.com
hxxp
php
victim
korean
Ransomware updates & 1-day exploits
IntroductionIn our crimeware reporting service, we analyze the latest crime-related t...
2022-8-24 18:0:13 | 阅读: 28 |
收藏
|
securelist.com
ransomware
monster
redalert
blogpost
vms
Previous
14
15
16
17
18
19
20
21
Next