unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Mallox ransomware: in-depth analysis and evolution
Mallox is a sophisticated and dangerous family of malicious software that has been cau...
2024-9-4 18:15:17 | 阅读: 90 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
mallox
ransomware
victim
encryption
trojan
A deep dive into the most interesting incident response cases of last year
In 2023, Kaspersky’s Global Emergency Response Team (GERT) participated in services ar...
2024-9-3 19:15:14 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
gert
attackers
analysis
windows
payload
IT threat evolution Q2 2024
Targeted attacksXZ backdoor: a supply chain attack in the makingOn March 29, a messa...
2024-9-3 16:15:15 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
attackers
xz
windows
malicious
stealer
IT threat evolution in Q2 2024. Mobile statistics
Quarterly figuresAccording to Kaspersky Security Network, in Q2 2024:7 million atta...
2024-9-3 16:15:14 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
trojan
banker
q2
turkey
trojans
IT threat evolution in Q2 2024. Non-mobile statistics
The statistics presented here are based on detection verdicts by Kaspersky products an...
2024-9-3 16:15:13 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
ransomware
q2
trojan
territories
territory
Head Mare: adventures of a unicorn in Russia and Belarus
Head Mare is a hacktivist group that first made itself known in 2023 on the social net...
2024-9-2 18:15:14 | 阅读: 21 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
windows
mare
attackers
phantomcore
microsoft
HZ Rat backdoor for macOS attacks users of China’s DingTalk and WeChat
In June 2024, we discovered a macOS version of the HZ Rat backdoor targeting users of...
2024-8-27 18:15:13 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
c2
victim
network
dingtalk
malicious
Memory corruption vulnerabilities in Suricata and FreeRDP
As a cybersecurity company, before we release our products, we perform penetration tes...
2024-8-22 18:15:13 | 阅读: 34 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
freerdp
suricata
codec
Exploits and vulnerabilities in Q2 2024
Q2 2024 was eventful in terms of new interesting vulnerabilities and exploitation tech...
2024-8-21 19:0:17 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
q2
q1
windows
download
Approach to mainframe penetration testing on z/OS
Information technology is developing at a rapid pace, with completely new areas emergi...
2024-8-20 20:15:13 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
mainframe
apf
tso
privileges
racf
BlindEagle flying high in Latin America
BlindEagle, also known as “APT-C-36”, is an APT actor recognized for employing straigh...
2024-8-19 18:30:15 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
blindeagle
phishing
espionage
colombia
Tusk: unraveling a complex infostealer campaign
SummaryKaspersky Global Emergency Response Team (GERT) has identified a complex campa...
2024-8-16 00:15:13 | 阅读: 25 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
inactive
trojan
shop
tidyme
EastWind campaign: new CloudSorcerer attacks on government organizations in Russia
In late July 2024, we detected a series of ongoing targeted cyberattacks on dozens of...
2024-8-14 20:15:12 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
attackers
library
malicious
c2
APT trends report Q2 2024
For over six years now, Kaspersky’s Global Research and Analysis Team (GReAT) has been...
2024-8-13 20:15:12 | 阅读: 20 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
c2
qsc
albanian
windows
malicious
Indirect prompt injection in the real world: how people manipulate neural networks
What is prompt injection?Large language models (LLMs) – the neural network algorithms...
2024-8-12 19:15:12 | 阅读: 20 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
llm
injection
injections
chatbots
bots
LianSpy: new Android spyware targeting Russian users
Malware descriptions...
2024-8-5 17:45:13 | 阅读: 51 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
pastebin
hxxps
lianspy
spyware
yandex
How “professional” ransomware variants boost cybercrime groups
IntroductionCybercriminals who specialize in ransomware do not always create it thems...
2024-8-1 19:30:15 | 阅读: 20 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
ransomware
mallox
sexi
windows
affiliate
Mandrake spyware sneaks onto Google Play again, flying under the radar for two years
IntroductionIn May 2020, Bitdefender released a white paper containing a detailed ana...
2024-7-29 18:0:21 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
mandrake
stage
c2
library
ricinus
When spear phishing met mass phishing
Spam and phishing...
2024-7-11 18:0:26 | 阅读: 11 |
收藏
|
Securelist - securelist.com
phishing
spear
mass
attackers
Developing and prioritizing a detection engineering backlog based on MITRE ATT&CK
Detection is a traditional type of cybersecurity control, along with blocking, adjustm...
2024-7-9 21:15:12 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
dett
ct
scoring
windows
Previous
8
9
10
11
12
13
14
15
Next