unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Crypto Game of Lazarus APT: Investors vs. Zero-days
IntroductionLazarus APT and its BlueNoroff subgroup are a highly sophisticated and mu...
2024-10-23 19:0:48 | 阅读: 6 |
收藏
|
Securelist - securelist.com
attackers
chrome
emptyarray
memory
Grandoreiro, the global trojan with grandiose ambitions
Grandoreiro is a well-known Brazilian banking trojan — part of the Tetrade umbrella —...
2024-10-23 02:0:17 | 阅读: 5 |
收藏
|
Securelist - securelist.com
grandoreiro
encryption
victim
trojan
security
Stealer here, stealer there, stealers everywhere!
IntroductionInformation stealers, which are used to collect credentials to then sell...
2024-10-21 18:0:47 | 阅读: 2 |
收藏
|
Securelist - securelist.com
stealer
kral
stealers
vidar
payload
Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia
Last December, we discovered a new group targeting Russian businesses and government a...
2024-10-18 18:0:47 | 阅读: 4 |
收藏
|
Securelist - securelist.com
attackers
windows
ghouls
SAS CTF and the many ways to persist a kernel shellcode on Windows 7
SAS...
2024-10-17 18:0:17 | 阅读: 2 |
收藏
|
Securelist - securelist.com
windows
corrupted
shellcode
xbb
payload
Beyond the Surface: the evolution and expansion of the SideWinder APT group
SideWinder, aka T-APT-04 or RattleSnake, is one of the most prolific APT groups that b...
2024-10-15 18:0:54 | 阅读: 6 |
收藏
|
Securelist - securelist.com
library
windows
payload
c2
malicious
Whispers from the Dark Web Cave. Cyberthreats in the Middle East
SOC, TI and IR posts...
2024-10-14 15:0:56 | 阅读: 1 |
收藏
|
Securelist - securelist.com
threats
gangs
ransomware
Awaken Likho is awake: new techniques of an APT group
IntroductionIn July 2021, a campaign was launched primarily targeting Russian governm...
2024-10-7 18:0:14 | 阅读: 7 |
收藏
|
Securelist - securelist.com
meshcentral
attackers
meshagent
autoit
Scam Information and Event Management
While trying to deliver malware on victims’ devices and stay on them as long as they c...
2024-10-4 16:0:48 | 阅读: 4 |
收藏
|
Securelist - securelist.com
malicious
attackers
software
dllc
a3x
Finding a needle in a haystack: Machine learning at the forefront of threat hunting research
IntroductionIn the ever-evolving landscape of cybersecurity, logs, that is informatio...
2024-10-2 18:0:37 | 阅读: 12 |
收藏
|
Securelist - securelist.com
threats
forest
machine
accuracy
Key Group: another ransomware group using leaked builders
Key Group, or keygroup777, is a financially motivated ransomware group primarily targe...
2024-10-1 18:0:24 | 阅读: 28 |
收藏
|
Securelist - securelist.com
ransomware
windows
hakuna
matata
software
Threat landscape for industrial automation systems, Q2 2024
Industrial threats...
2024-9-26 16:0:48 | 阅读: 7 |
收藏
|
Securelist - securelist.com
pp
malicious
quarter
threats
stage
From 12 to 21: how we discovered connections between the Twelve and BlackJack groups
While analyzing attacks on Russian organizations, our team regularly encounters overla...
2024-9-25 18:0:19 | 阅读: 9 |
收藏
|
Securelist - securelist.com
blackjack
twelve
wiper
windows
ngrok
Web tracking report: who monitored users’ online activities in 2023–2024 the most
Web tracking has become a pervasive aspect of our online experience. Whether we’re bro...
2024-9-24 18:15:14 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
trackers
regions
download
advertising
dnt
How the Necro Trojan infiltrated Google Play, again
IntroductionWe sometimes come across modified applications when analyzing suspicious...
2024-9-23 18:15:14 | 阅读: 48 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
necro
trojan
loader
payload
c2
-=TWELVE=- is back
In the spring of 2024, posts with real people’s personal data began appearing on the -...
2024-9-20 20:31:34 | 阅读: 0 |
收藏
|
Securelist - securelist.com
windows
ransomware
netlogon
powershell
attackers
Exotic SambaSpy is now dancing with Italian users
IntroductionIn May 2024, we detected a campaign exclusively targeting victims in Ital...
2024-9-18 18:15:15 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
italian
malicious
sambaspy
attacker
Loki: a new private agent for the popular Mythic framework
In July 2024, we discovered the previously unknown Loki backdoor, which was used in a...
2024-9-9 15:15:14 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
loader
loki
mythic
c2
havoc
Tropic Trooper spies on government entities in the Middle East
Executive summaryTropic Trooper (also known as KeyBoy and Pirate Panda) is an APT gro...
2024-9-5 16:15:13 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
loader
trooper
tropic
1f
Mallox ransomware: in-depth analysis and evolution
Mallox is a sophisticated and dangerous family of malicious software that has been cau...
2024-9-4 18:15:17 | 阅读: 70 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
mallox
ransomware
victim
encryption
trojan
Previous
2
3
4
5
6
7
8
9
Next