unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Two more malicious Python packages in the PyPI
Incidents...
2022-8-16 20:0:59 | 阅读: 38 |
收藏
|
securelist.com
python
malicious
stealer
payload
Threat in your browser: what dangers innocent-looking extensions hold for users
Whether you want to block ads, keep a to-do list or check your spelling, browser exten...
2022-8-16 16:0:36 | 阅读: 17 |
收藏
|
securelist.com
malicious
dealply
unwanted
chrome
affiliate
IT threat evolution in Q2 2022. Mobile statistics
IT threat evolution in Q2 2022IT threat evolution in Q2 2022. Non-mobile statistics...
2022-8-15 20:0:45 | 阅读: 24 |
收藏
|
securelist.com
trojan
q2
banker
trojans
ransomware
IT threat evolution in Q2 2022. Non-mobile statistics
IT threat evolution in Q2 2022IT threat evolution in Q2 2022. Non-mobile statistics...
2022-8-15 20:0:43 | 阅读: 25 |
收藏
|
securelist.com
q2
trojan
ransomware
malicious
territories
IT threat evolution Q2 2022
IT threat evolution in Q2 2022IT threat evolution in Q2 2022. Non-mobile statistics...
2022-8-15 20:0:34 | 阅读: 16 |
收藏
|
securelist.com
ransomware
malicious
stalkerware
attackers
software
OpenTIP, command line edition
Software...
2022-8-11 16:30:1 | 阅读: 40 |
收藏
|
securelist.com
opentip
yellow
apikey
grey
python
VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges
In late August 2020, we published an overview of DeathStalker’s profile and malicious...
2022-8-10 18:0:43 | 阅读: 27 |
收藏
|
securelist.com
vilerat
c2
vileloader
viledropper
stage
Andariel deploys DTrack and Maui ransomware
On July 7, 2022, the CISA published an alert, entitled, “North Korean State-Sponsored...
2022-8-9 18:0:46 | 阅读: 41 |
收藏
|
securelist.com
dtrack
windows
maui
ransomware
victim
Targeted attack on industrial enterprises and public institutions
In January 2022, Kaspersky ICS CERT experts detected a wave of targeted attacks on mil...
2022-8-8 16:0:10 | 阅读: 16 |
收藏
|
securelist.com
attackers
portdoor
ta428
network
stage
DDoS attacks in Q2 2022
News overviewPolitically-motivated cyberattacks dominated the DDoS landscape in the s...
2022-8-3 16:0:22 | 阅读: 23 |
收藏
|
securelist.com
q2
quarter
q1
download
russia
LofyLife: malicious npm packages steal Discord tokens and bank card data
Incidents...
2022-7-28 20:0:41 | 阅读: 62 |
收藏
|
securelist.com
sm
lofy
polarlabs
trojan
python
APT trends report Q2 2022
For five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been pu...
2022-7-28 18:0:37 | 阅读: 25 |
收藏
|
securelist.com
malicious
stage
windows
victim
speaking
CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit
IntroductionRootkits are malware implants which burrow themselves in the deepest corn...
2022-7-25 18:0:32 | 阅读: 30 |
收藏
|
securelist.com
attackers
windows
malicious
firmware
Luna and Black Basta — new ransomware for Windows, Linux and ESXi
IntroductionIn our crimeware reporting service, we analyze the latest crime-related t...
2022-7-20 16:0:31 | 阅读: 19 |
收藏
|
securelist.com
ransomware
basta
luna
encryption
windows
Text-based fraud: from 419 scams to vishing
E-mail scammers typically combine social engineering with technical skills to bypass s...
2022-7-11 16:0:53 | 阅读: 19 |
收藏
|
securelist.com
mails
victim
419
attackers
vishing
Dynamic analysis of firmware components in IoT devices
Among the various offensive security techniques, vulnerability assessment takes priori...
2022-7-6 18:0:32 | 阅读: 19 |
收藏
|
securelist.com
qiling
firmware
renode
memory
emulation
The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact
Following on from our earlier Owowa discovery, we continued to hunt for more backdoors...
2022-6-30 16:0:35 | 阅读: 36 |
收藏
|
securelist.com
malicious
windows
godlike
The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs
Research...
2022-6-23 18:0:21 | 阅读: 39 |
收藏
|
securelist.com
ransomware
ttps
stages
analysis
ta505
APT ToddyCat
ToddyCat is a relatively new APT actor that we have not been able to relate to other k...
2022-6-21 18:0:37 | 阅读: 36 |
收藏
|
securelist.com
proxy
microsoft
payload
loader
stage
‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace
IntroductionWhen reports of a cyberattack appear in the headlines, questions abound r...
2022-6-20 18:0:7 | 阅读: 22 |
收藏
|
securelist.com
attribution
security
piracy
cooperation
nuclear
Previous
7
8
9
10
11
12
13
14
Next