unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The mobile malware threat landscape in 2022
These statistics are based on detection verdicts of Kaspersky products received from u...
2023-2-27 18:5:35 | 阅读: 18 |
收藏
|
Securelist - securelist.com
trojan
trojans
banker
ransomware
installers
Spam and phishing in 2022
Figures of the yearIn 2022:48.63% of all emails around the world and 52.78% of all...
2023-2-16 16:0:7 | 阅读: 24 |
收藏
|
Securelist - securelist.com
phishing
victim
offered
malicious
attackers
IoC detection experiments with ChatGPT
ChatGPT is a groundbreaking chatbot powered by the neural network-based language model...
2023-2-15 18:0:53 | 阅读: 38 |
收藏
|
Securelist - securelist.com
chatgpt
powershell
malicious
security
positives
Good, Perfect, Best: how the analyst can enhance penetration testing results
Penetration testing is something that many (of those who know what a pentest is) see a...
2023-2-10 18:0:33 | 阅读: 13 |
收藏
|
Securelist - securelist.com
client
security
network
pentesters
Web beacons on websites and in e-mail
There is a vast number of trackers, which gather information about users’ activities o...
2023-2-7 16:0:9 | 阅读: 25 |
收藏
|
Securelist - securelist.com
beacons
beacon
trackers
twenty
advertising
Prilex modification now targeting contactless credit card transactions
Prilex is a singular threat actor that has evolved from ATM-focused malware into uniqu...
2023-1-31 16:0:41 | 阅读: 12 |
收藏
|
Securelist - securelist.com
prilex
contactless
chip
tap
rfid
Come to the dark side: hunting IT professionals on the dark web
The dark web is a collective name for a variety of websites and marketplaces that brin...
2023-1-30 18:0:30 | 阅读: 27 |
收藏
|
Securelist - securelist.com
employment
salary
posting
employers
What your SOC will be facing in 2023
As the role of cybersecurity in large businesses increases remarkably year over year,...
2023-1-23 18:0:8 | 阅读: 15 |
收藏
|
Securelist - securelist.com
socs
telecom
threats
10k
growth
Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
Roaming Mantis (a.k.a Shaoye) is well-known as a long-term cyberattack campaign that u...
2023-1-19 18:0:6 | 阅读: 14 |
收藏
|
Securelist - securelist.com
apk
chrome
iptime
landing
efm
What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks
Kaspersky detects an average of 400,000 malicious files every day. These add up to 144...
2023-1-18 16:0:45 | 阅读: 14 |
收藏
|
Securelist - securelist.com
security
ransomware
victim
cloud
footprint
How much security is enough?
According to a prominent Soviet science fiction writer, beauty is a fine line, a razor...
2023-1-9 18:38:33 | 阅读: 17 |
收藏
|
Securelist - securelist.com
security
operational
threats
efficiency
attackers
BlueNoroff introduces new methods bypassing MoTW
BlueNoroff group is a financially motivated threat actor eager to profit from its cybe...
2022-12-27 16:0:26 | 阅读: 18 |
收藏
|
Securelist - securelist.com
payload
windows
capital
bluenoroff
cloud
Ransomware and wiper signed with stolen certificates
IntroductionOn July 17, 2022, Albanian news outlets reported a massive cyberattack th...
2022-12-22 16:0:32 | 阅读: 22 |
收藏
|
Securelist - securelist.com
wave
ransomware
wiper
wiping
albanian
CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange
SummaryAt the end of September, GTSC reported an attack on critical infrastructure th...
2022-12-20 00:15:49 | 阅读: 67 |
收藏
|
Securelist - securelist.com
exchange
attacker
powershell
Reassessing cyberwarfare. Lessons learned in 2022
At this point, it has become cliché to say that nothing in 2022 turned out the way we...
2022-12-14 18:0:18 | 阅读: 17 |
收藏
|
Securelist - securelist.com
conflict
ukraine
military
ransomware
How to train your Ghidra
Getting started with GhidraFor about two decades, being a reverse engineer meant that...
2022-12-9 21:0:23 | 阅读: 18 |
收藏
|
Securelist - securelist.com
ghidra
gradle
download
analysis
codebrowser
DeathStalker targets legal entities with new Janicab variant
Just to clarify, the subheading isn’t a normal quote, but a message that Janicab malwa...
2022-12-8 18:0:49 | 阅读: 15 |
收藏
|
Securelist - securelist.com
janicab
c2
python
php
intrusions
Main phishing and scamming trends and techniques
There are two main types of online fraud aimed at stealing user data and money: phishi...
2022-12-6 18:0:1 | 阅读: 20 |
收藏
|
Securelist - securelist.com
phishing
victim
attackers
spoofing
malicious
If one sheep leaps over the ditch…
IntroductionIf one sheep leaps over the ditch, the rest will follow. This is an old s...
2022-12-5 18:0:58 | 阅读: 15 |
收藏
|
Securelist - securelist.com
ransomware
lockbit
spreading
machine
developers
Indicators of compromise (IOCs): how we collect and use them
Publications...
2022-12-2 16:0:7 | 阅读: 10 |
收藏
|
Securelist - securelist.com
malicious
identify
network
security
analysis
Previous
4
5
6
7
8
9
10
11
Next