unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Unweaving A Complex Web of Threats | Understanding Today’s Cyber Attacker Interdependency
The dynamics of cyber threats have taken on a new level of complexity, driven by the escalating int...
2023-8-24 21:25:3 | 阅读: 15 |
收藏
|
SentinelOne - www.sentinelone.com
malicious
criminal
affiliates
attackers
expertise
From Conti to Akira | Decoding the Latest Linux & ESXi Ransomware Families
The evolution of the ransomware landscape has seen a shift from the more traditional approach invol...
2023-8-23 20:59:44 | 阅读: 25 |
收藏
|
SentinelOne - www.sentinelone.com
locker
ransomware
encryption
abyss
akira
Cyber Attacks on Financial Institutions | Why Banks Are Caught in the Crosshairs
In recent years, there has been a significant uptick in the frequency and sophistication of attacks...
2023-8-22 21:32:2 | 阅读: 15 |
收藏
|
SentinelOne - www.sentinelone.com
network
regulatory
XLoader’s Latest Trick | New macOS Variant Disguised as Signed OfficeNote App
XLoader is a long-running malware-as-a-service infostealer and botnet that has been around in some...
2023-8-21 23:16:2 | 阅读: 26 |
收藏
|
SentinelOne - www.sentinelone.com
xloader
payload
officenote
hardcoded
developer
The Good, the Bad and the Ugly in Cybersecurity – Week 33
The Good | DigiHeals Aims to Boost Resilience of Healthcare Sector to Fight Off Cyber AttacksThe h...
2023-8-18 21:0:27 | 阅读: 15 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
security
phishing
citrix
exploited
Chinese Entanglement | DLL Hijacking in the Asian Gambling Sector
By Aleksandar Milenkoski and Tom HegelExecutive SummarySentinelLabs has identified suspected-Chi...
2023-8-17 17:55:8 | 阅读: 39 |
收藏
|
SentinelLabs - www.sentinelone.com
cobalt
c2
bronze
starlight
agentupdate
The New Frontline of Geopolitics | Understanding the Rise of State-Sponsored Cyber Attacks
The rise of nation-state cyber attacks has become a defining feature of modern geopolitics. With bl...
2023-8-16 22:23:6 | 阅读: 23 |
收藏
|
SentinelOne - www.sentinelone.com
espionage
sponsored
north
nation
security
Announcing Threat Detection for Amazon S3 | AI-Powered Data Protection
SentinelOne recently announced the launch of the new Singularity™ Cloud Data Security product line...
2023-8-15 20:58:21 | 阅读: 15 |
收藏
|
SentinelOne - www.sentinelone.com
buckets
cloud
security
singularity
scanned
Understanding XDR | A Guided Approach for Enterprise Leaders
Cyber adversaries operate with a level of finesse and precision that can catch organizations off gu...
2023-8-14 21:30:33 | 阅读: 16 |
收藏
|
SentinelOne - www.sentinelone.com
security
threats
network
cloud
The Good, the Bad and the Ugly in Cybersecurity – Week 32
The Good | White House Launches AI-Centric Cybersecurity Contest to Protect US EntitiesThe Biden-H...
2023-8-11 23:39:42 | 阅读: 24 |
收藏
|
SentinelOne - www.sentinelone.com
software
windows
aixcc
north
Day 2 of Black Hat USA 2023 | Exploring The Power of a Threat Intel & AI-Driven Future
What a few days it was at this year’s BlackHat cyber event in sunny Las Vegas! The stunning Sentine...
2023-8-11 17:0:28 | 阅读: 30 |
收藏
|
SentinelOne - www.sentinelone.com
purpleai
security
noetic
mandiant
ventures
Day 1 of Black Hat USA 2023 | Generative AI, Automation & The Security Landscape of Tomorrow
SentinelOne has landed in Vegas for this year’s Black Hat security conference! Each year, Black Hat...
2023-8-10 20:1:51 | 阅读: 15 |
收藏
|
SentinelOne - www.sentinelone.com
security
chatgpt
ranger
llms
guerrero
LOLKEK Unmasked | An In-Depth Analysis of New Samples and Evolving Tactics
Awareness of the newest shifts and patterns is vital in the fast-changing world of cyber threats. T...
2023-8-9 23:29:27 | 阅读: 16 |
收藏
|
SentinelOne - www.sentinelone.com
lolkek
ransomware
victim
Enterprise Security Essentials | Top 12 Most Routinely Exploited Vulnerabilities
Leveraging known bugs and unpatched exploits continue to be an unyielding strategy for threat actor...
2023-8-8 21:43:1 | 阅读: 14 |
收藏
|
SentinelOne - www.sentinelone.com
exploited
microsoft
security
attackers
Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company
By Tom Hegel and Aleksandar Milenkoski Executive SummarySentinelLabs identified an intrusion int...
2023-8-7 17:58:32 | 阅读: 20 |
收藏
|
SentinelLabs - www.sentinelone.com
north
opencarrot
npo
c2
The Good, the Bad and the Ugly in Cybersecurity – Week 31
The Good | High-Severity Flaws Patched in Firefox and Chrome UpdatesBrowsers are our windows to th...
2023-8-4 21:0:41 | 阅读: 13 |
收藏
|
SentinelOne - www.sentinelone.com
microsoft
security
chrome
epmm
AD Security Assessments and Attack Paths | How to Achieve Greater Visibility
Active Directory (AD) has become a primary target for attackers launching identity-centric attacks....
2023-8-3 21:1:18 | 阅读: 39 |
收藏
|
SentinelOne - www.sentinelone.com
attacker
security
privileged
graphs
Mac Admins | Why Apple’s Silent Approach to Endpoint Security Should be a Wake-Up Call
If there’s one thing that everyone should be able to agree on about Apple, it is that the company r...
2023-8-2 23:23:53 | 阅读: 20 |
收藏
|
SentinelOne - www.sentinelone.com
security
xprotect
silently
nor
Illicit Brand Impersonation | A Threat Hunting Approach
Since the start of 2023, brand impersonation has become the center of many questions we receive fro...
2023-8-1 20:59:53 | 阅读: 18 |
收藏
|
SentinelOne - www.sentinelone.com
php
vt
phishing
favicon
au
The Nightmare Of Destructive Malware | From Wiper To SwiftSlicer
In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge,...
2023-7-31 21:19:58 | 阅读: 16 |
收藏
|
SentinelOne - www.sentinelone.com
wiper
wipers
swiftslicer
ukraine
Previous
9
10
11
12
13
14
15
16
Next