unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Pwning Microsoft Azure Defender for IoT | Multiple Flaws Allow Remote Code Execution for All
By Kasif Dekel and Ronen Shustin (independent researcher)Executive SummarySentinelLabs has disco...
2022-3-29 01:59:46 | 阅读: 25 |
收藏
|
www.sentinelone.com
cyberx
sensor
security
defender
The Good, the Bad and the Ugly in Cybersecurity – Week 12
The GoodAs part of its ongoing efforts to disrupt and disable the cybercrime infrastructure that e...
2022-3-25 23:0:35 | 阅读: 25 |
收藏
|
www.sentinelone.com
marketplace
ransomware
lapsus
microsoft
Chinese Threat Actor Scarab Targeting Ukraine
Executive SummaryUkraine CERT (CERT-UA) has released new details on UAC-0026, which SentinelLabs...
2022-3-25 00:5:43 | 阅读: 60 |
收藏
|
www.sentinelone.com
headertip
scarab
lure
ukraine
c2
Decoding the Fourth Round of MITRE Engenuity ATT&CK® Enterprise (Wizard Spider and Sandworm) Evaluations
The next round of MITRE Engenuity ATT&CK evaluation results is around the corner, and the participa...
2022-3-23 01:50:36 | 阅读: 39 |
收藏
|
www.sentinelone.com
evaluations
engenuity
security
evaluation
The Art and Science of macOS Malware Hunting with radare2 | Leveraging Xrefs, YARA and Zignatures
Welcome back to our series on macOS reversing. Last time out, we took a look at challenges around s...
2022-3-22 00:24:26 | 阅读: 34 |
收藏
|
www.sentinelone.com
zignatures
zignature
hunt
hits
The Good, the Bad and the Ugly in Cybersecurity – Week 11
The GoodThis week was full of cybersecurity news related to the war in Ukraine and Russian threat...
2022-3-18 23:0:13 | 阅读: 31 |
收藏
|
www.sentinelone.com
ukraine
blink
cyclops
sbu
network
Bringing Identity to the Era of XDR
Today, protecting “the who” is just as important as “the what”. Cybersecurity is getting personal....
2022-3-18 00:15:39 | 阅读: 25 |
收藏
|
www.sentinelone.com
security
attivo
career
era
Threat Actor UAC-0056 Targeting Ukraine with Fake Translation Software
OverviewSentinelOne has identified new malicious activity we assess to be closely associated with...
2022-3-16 01:50:46 | 阅读: 134 |
收藏
|
www.sentinelone.com
translator
graphsteel
grimplant
0056
windows
Podcast: “Behind the Scenes of BlackShadow APT” with Amitai Ben Shushan Ehrlich
Commentary: Yes. You're listening to Hands on Security Hunter's hands on security podcast Cybersecu...
2022-3-15 01:0:28 | 阅读: 42 |
收藏
|
www.sentinelone.com
amitai
sayag
dvir
ben
shushan
The Good, the Bad and the Ugly in Cybersecurity – Week 10
The GoodEight months ago, Kaseya’s remote network management product (VSA) was abused in order to...
2022-3-12 00:25:46 | 阅读: 26 |
收藏
|
www.sentinelone.com
firmware
satellite
software
ransomware
Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware
By Assaf Carlsbad & Itai LibaHello and welcome back to yet another post in our blog post series co...
2022-3-10 21:0:46 | 阅读: 52 |
收藏
|
www.sentinelone.com
brick
smm
smram
firmware
efi
Podcast: Cyber War Elements In The Ukrainian Conflict | Hosted by the Alperovitch Institute for Cybersecurity Studies
The War in Ukraine and Cyber Operations by Alperovitch Institute for Cybersecurity Studies: this m...
2022-3-8 03:8:44 | 阅读: 34 |
收藏
|
www.sentinelone.com
conflict
thomas
russia
ukraine
yeah
The Good, the Bad and the Ugly in Cybersecurity – Week 9
The GoodThis week, it was announced that a joint effort between the French Border Police and the S...
2022-3-5 00:0:41 | 阅读: 54 |
收藏
|
www.sentinelone.com
russia
ukraine
njalla
counterfeit
Zen and the Art of SMM Bug Hunting | Finding, Mitigating and Detecting UEFI Vulnerabilities
It’s been almost a full year since we published the last part of our UEFI blog posts series. During...
2022-3-4 00:51:20 | 阅读: 37 |
收藏
|
www.sentinelone.com
smm
smram
smi
A CISO’s Guide to the Security Impact of the Attacks on Ukraine
The situation in Ukraine presents many humanitarian and security challenges. We are obtaining a cle...
2022-3-1 02:42:14 | 阅读: 24 |
收藏
|
www.sentinelone.com
ukraine
ransomware
wiper
threats
The Good, the Bad and the Ugly in Cybersecurity – Week 8
The GoodFinding your hard earned dollars haven’t made their way into your bank account because som...
2022-2-26 00:0:14 | 阅读: 24 |
收藏
|
www.sentinelone.com
watchguard
onus
firmware
payroll
ukrainian
HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine
Executive SummaryOn February 23rd, the threat intelligence community began observing a new wiper...
2022-2-24 13:40:3 | 阅读: 524 |
收藏
|
www.sentinelone.com
wiper
drv
windows
analysis
Sanctions Be Damned | From Dridex to Macaw, The Evolution of Evil Corp
By Antonio Pirozzi, Antonis Terefos and Idan WeizmanExecutive SummarySince OFAC sanctions in 202...
2022-2-24 01:46:30 | 阅读: 58 |
收藏
|
www.sentinelone.com
cryptone
hades
analysis
ransomware
The Good, the Bad and the Ugly in Cybersecurity – Week 7
The GoodGood news this week comes by way of Spanish law enforcement, which publicly announced the...
2022-2-19 00:0:23 | 阅读: 19 |
收藏
|
www.sentinelone.com
ukrainian
ukraine
ministry
Log4j2 In The Wild | Iranian-Aligned Threat Actor “TunnelVision” Actively Exploiting VMware Horizon
By Amitai Ben Shushan Ehrlich and Yair RigevskyExecutive SummarySentinelLabs has been tracking t...
2022-2-18 01:11:52 | 阅读: 58 |
收藏
|
www.sentinelone.com
c2
microsoft
reverse
powershell
Previous
27
28
29
30
31
32
33
34
Next