unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
An educational robot security research
In the modern world, we are surrounded by a multitude of smart devices that simplify o...
2024-2-27 23:0:33 | 阅读: 5 |
收藏
|
Securelist - securelist.com
robot
toy
agora
network
security
The mobile malware threat landscape in 2023
The figures above are based on detection statistics received from Kaspersky users who...
2024-2-26 16:0:20 | 阅读: 11 |
收藏
|
Securelist - securelist.com
trojan
banker
turkey
spy
malicious
Coyote: A multi-stage banking Trojan abusing the Squirrel installer
The developers of banking Trojan malware are constantly looking for inventive ways to...
2024-2-8 18:0:36 | 阅读: 25 |
收藏
|
Securelist - securelist.com
trojan
coyote
loader
machine
attacker
ICS and OT threat predictions for 2024
Kaspersky Security Bulletin...
2024-1-31 18:0:45 | 阅读: 12 |
收藏
|
Securelist - securelist.com
security
vehicles
ransomware
hacktivist
Privacy predictions for 2024
Kaspersky Security Bulletin...
2024-1-25 18:0:38 | 阅读: 6 |
收藏
|
Securelist - securelist.com
passwords
bots
debate
decline
Cracked software beats gold: new macOS backdoor stealing cryptowallets
A month ago, we discovered some cracked apps circulating on pirating websites and infe...
2024-1-22 16:0:49 | 阅读: 17 |
收藏
|
Securelist - securelist.com
dmg
fat
python
stage
exodus
Dark web threats and dark market predictions for 2024
Kaspersky Security Bulletin...
2024-1-17 18:0:24 | 阅读: 25 |
收藏
|
Securelist - securelist.com
verdict
underground
cryptors
fulfilled
ransomware
A lightweight method to detect potential iOS malware
IntroductionIn the ever-evolving landscape of mobile security, hunting for malware in...
2024-1-16 18:0:53 | 阅读: 19 |
收藏
|
Securelist - securelist.com
analysis
infections
sysdiag
artifact
artifacts
Operation Triangulation: The last (hardware) mystery
Research...
2023-12-27 22:0:43 | 阅读: 13 |
收藏
|
Securelist - securelist.com
mmio
hardware
memory
dma
attackers
Windows CLFS and five exploits used by ransomware operators (Exploit #5 – CVE-2023-28252)
This is part six of our study about the Common Log File System (CLFS) and five vulnera...
2023-12-21 18:15:16 | 阅读: 21 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
clfs
ransomware
windows
shadow
Windows CLFS and five exploits used by ransomware operators (Exploit #1 – CVE-2022-24521)
This is the second part of our study about the Common Log File System (CLFS) and five...
2023-12-21 18:15:15 | 阅读: 34 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
clfs
windows
ransomware
0x40000000
Windows CLFS and five exploits used by ransomware operators
In April 2023, we published a blog post about a zero-day exploit we discovered in rans...
2023-12-21 18:15:14 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
clfs
blf
windows
ransomware
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022)
Research...
2023-12-21 18:15:13 | 阅读: 20 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
clfs
ransomware
windows
client
fattributes
Windows CLFS and five exploits used by ransomware operators (Exploit #3 – October 2022)
ReportsIn this report Kaspers...
2023-12-21 18:15:12 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
examine
stages
ipads
triangledb
Windows CLFS and five exploits used by ransomware operators (Exploit #4 – CVE-2023-23376)
Research...
2023-12-21 18:15:11 | 阅读: 35 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
clfs
windows
ransomware
dumpcount
Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol
During an incident response performed by Kaspersky’s Global Emergency Response Team (G...
2023-12-14 21:15:12 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
nkabuse
nkn
flood
network
FakeSG campaign, Akira ransomware and AMOS macOS stealer
IntroductionThe crimeware landscape is diverse. Cybercriminals try to capitalize on t...
2023-12-13 18:0:25 | 阅读: 17 |
收藏
|
Securelist - securelist.com
akira
amos
c2
ransomware
stealers
What to do if your company was mentioned on Darknet?
Every year is abundant with major data leaks, biggest data breaches and hacks drawing...
2023-12-12 18:0:18 | 阅读: 14 |
收藏
|
Securelist - securelist.com
sale
darknet
accesses
leakages
Story of the year: the impact of AI on cybersecurity
In the whirlwind of technological advancements and societal transformations, the term...
2023-12-11 18:0:51 | 阅读: 15 |
收藏
|
Securelist - securelist.com
generative
llms
llm
malicious
New macOS Trojan-Proxy piggybacking on cracked software
read file error: open notes: too many open files...
2023-12-6 18:0:14 | 阅读: 9 |
收藏
|
Securelist - securelist.com
trojan
cracked
Previous
6
7
8
9
10
11
12
13
Next