unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Good, the Bad and the Ugly in Cybersecurity – Week 27
The GoodAn alleged ransomware affiliate has reached a plea deal in the United States for collabora...
2022-7-1 23:0:17 | 阅读: 22 |
收藏
|
www.sentinelone.com
ransomware
avaya
defendant
software
security
Rise in Identity-Based Attacks Drives Demand for a New Security Approach
The frequency of ransomware attacks has doubled over the last couple of years, accounting for 10% o...
2022-6-29 23:38:12 | 阅读: 19 |
收藏
|
www.sentinelone.com
security
itdr
cloud
attackers
identities
Securing the Nation’s Critical Infrastructure | Action Plans to Defend Against Cyber Attacks
Industries around the globe increasingly rely on operational technology (OT) and industrial control...
2022-6-28 00:21:15 | 阅读: 30 |
收藏
|
www.sentinelone.com
network
ransomware
security
attackers
deception
The Good, the Bad and the Ugly in Cybersecurity – Week 26
The GoodThis week saw good news as cops in Europe busted a gang said to be behind several million...
2022-6-24 23:0:28 | 阅读: 20 |
收藏
|
www.sentinelone.com
mega
follina
euros
cloud
crime
On the Board of Directors? Beware of These Six Common Cyber Security Myths
The days when cyber security was merely a technical or niche issue to be dealt with by some small d...
2022-6-23 23:34:19 | 阅读: 17 |
收藏
|
www.sentinelone.com
security
software
myth
From the Front Lines | 3 New and Emerging Ransomware Threats Striking Businesses in 2022
In the first half of 2022, there has been no let up in the number of attacks on businesses by ranso...
2022-6-23 00:28:56 | 阅读: 40 |
收藏
|
www.sentinelone.com
helloxd
ransomware
zeon
angels
encryption
Detecting Unconstrained Delegation Exposures in AD Environment
Active Directory misconfigurations can lead to total domain compromise of an organization. Once an...
2022-6-21 23:38:50 | 阅读: 27 |
收藏
|
www.sentinelone.com
delegation
attackers
security
exposures
The Good, the Bad and the Ugly in Cybersecurity – Week 25
The GoodAccording to a report from the U.S. Department of Justice, a United States District Judge...
2022-6-17 23:0:45 | 阅读: 34 |
收藏
|
www.sentinelone.com
roblox
ransomware
attacker
hertzbleed
remote
Research Paper | Emulating Phineas Phisher Attacks in Modern EDR Environments
A Guest Post by Giorgos Karantzas and Professor Constantinos PatsakisIntroductionA few years ago,...
2022-6-15 23:31:25 | 阅读: 39 |
收藏
|
www.sentinelone.com
network
attacker
security
cobalt
nighthawk
Gartner Summit 2022 Recap: Reframing Risk & Simplifying Security
Thousands of people in the cybersecurity community converged upon National Harbor, Maryland last we...
2022-6-15 00:8:48 | 阅读: 28 |
收藏
|
www.sentinelone.com
security
cloud
singularity
itdr
Apple’s macOS Ventura | 7 New Security Changes to Be Aware Of
Apple’s Worldwide Developer Conference for 2022 has just closed out and with it we have had our fir...
2022-6-13 23:11:50 | 阅读: 47 |
收藏
|
www.sentinelone.com
security
ventura
passkeys
eslogger
captchas
The Good, the Bad and the Ugly in Cybersecurity – Week 24
The GoodThe United States, Cyprus and Latvia have successfully seized and dismantled a major dark...
2022-6-10 23:0:20 | 阅读: 23 |
收藏
|
www.sentinelone.com
district
criminal
marketplace
basta
qbot
RSA 2022 Conference Recap: Securing the Cloud, Experiencing FOMO, and Evolving XDR
It’s the last day of RSAC 2022, and the SentinelOne team has been taking San Francisco by storm wit...
2022-6-10 07:24:50 | 阅读: 23 |
收藏
|
www.sentinelone.com
security
rsac
cloud
singularity
Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years
Executive SummaryAoqin Dragon, a threat actor SentinelLabs has been extensively tracking, has ope...
2022-6-9 18:58:31 | 阅读: 39 |
收藏
|
www.sentinelone.com
mongall
heyoka
loader
dragon
removable
Top 10 Ways to Protect Your Active Directory
Active Directory (AD) is a high-value target for attackers, who frequently attempt to compromise it...
2022-6-8 22:56:31 | 阅读: 24 |
收藏
|
www.sentinelone.com
privileged
attackers
delegation
identify
security
From the Front Lines | Another Rebrand? Mindware and SFile Ransomware Technical Breakdown
Researchers have recently noted the emergence of a new ransomware operator calling itself ‘Mindware...
2022-6-7 00:0:49 | 阅读: 56 |
收藏
|
www.sentinelone.com
mindware
sfile
ransomware
microsoft
windows
The Good, the Bad and the Ugly in Cybersecurity – Week 23
The GoodThe European Union Agency for Law Enforcement Cooperation (Europol) has successfully shut...
2022-6-3 23:0:54 | 阅读: 19 |
收藏
|
www.sentinelone.com
flubot
europol
security
follina
microsoft
Protecting Your Active Directory from AdminSDHolder Attacks
Cybercriminals often look at different methods to gain an organization’s sensitive data. One common...
2022-6-2 23:28:11 | 阅读: 33 |
收藏
|
www.sentinelone.com
security
privileged
attackers
ranger
4 Steps Toward Successfully Measuring the Effectiveness of Your Security Controls
In the past, organizations might have been able to get away with firewalls and antivirus software a...
2022-6-1 23:59:59 | 阅读: 16 |
收藏
|
www.sentinelone.com
security
network
threats
attackers
Staying Ahead of CVE-2022-30190 (Follina)
Executive SummaryOn May 27th 2022, @nao_sec identified a malicious Microsoft Word document using...
2022-6-1 06:30:9 | 阅读: 209 |
收藏
|
www.sentinelone.com
msdt
microsoft
30190
windows
Previous
24
25
26
27
28
29
30
31
Next