unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Free. Powerful. Actionable. Make Smarter Security Decisions with Live Attack Data
ANY.RUN推出免费威胁情报工具TI Lookup,帮助SOC团队简化工作流程。该工具提供实时攻击数据和行为分析,支持快速威胁调查和响应。通过免费版本,用户可访问最新IOCs、IOBs和IOAs,并结合MITRE ATT&CK矩阵提升团队能力。Premium版本提供更多高级功能和数据集成选项。...
2025-7-16 11:33:46 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
threats
premium
analysis
proactive
Enterprise Plan: Boost SOC Performance, Reduce Business Risks with ANY.RUN
ANY.RUN的Enterprise计划是一款企业级恶意软件分析解决方案,提供互动沙盒分析、隐私控制和自动化功能,帮助安全团队快速检测威胁并缩短响应时间,提升整体防御能力。...
2025-7-15 10:32:54 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
analysis
security
threats
How to Maintain Fast and Fatigue-Free Alert Triage with Threat Intelligence
文章探讨了安全运营中心(SOC)和托管安全服务提供商(MSSP)中的警报分诊流程及其重要性。通过ANY.RUN的威胁情报查找工具,组织能够快速获取实时威胁信息并做出决策,从而提高效率、减少误报并降低风险。该工具支持多种搜索参数,帮助分析师在复杂环境中快速识别真实威胁并采取行动。...
2025-7-9 12:2:50 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
triage
threats
security
fatigue
analysis
Technical Analysis of Ducex: Packer of Triada Android Malware
这篇文章分析了Triada恶意软件中的高级Android打包工具Ducex,其通过加密函数、XOR加密字符串、反调试机制及检测分析工具(如Frida)来混淆分析和隐藏payload。...
2025-7-8 12:47:33 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
analysis
ducex
packer
apk
decrypted
Release Notes: Detonation Actions, Enhanced QR Extraction, and 1,400+ New Detection Rules
ANY.RUN在六月更新中推出实时 detonation actions、增强QR码提取和扩展威胁覆盖功能,提升恶意软件分析速度与准确性,并支持跨平台检测与自动化流程。...
2025-7-2 13:47:29 | 阅读: 19 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
threats
detonation
phishing
qr
analysis
A Guide to Developing Security-First Culture Powered by Threat Intelligence
安全至上的文化(SFC)是一种组织级承诺,强调在决策中融入安全考量。其核心原则包括主动风险管理、持续学习与适应、透明沟通、设计安全及数据驱动决策。通过减少数据泄露、提升运营效率、合规性及创新能力等多重优势,SFC助力组织在威胁环境中蓬勃发展。成功实施需结合威胁情报与持续改进策略。...
2025-7-2 12:2:39 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
security
threats
cti
sfc
malicious
Top 3 Cyber Attacks in June 2025: GitHub Abuse, Control Flow Flattening, and More
2025年6月出现多起复杂网络攻击事件,利用混淆脚本、合法服务滥用及多阶段技术传播恶意软件。Braodo Stealer通过GitHub托管载荷;控制流平坦化混淆的JavaScript传播Remcos;混淆BAT脚本分发NetSupport RAT。ANY.RUN工具助力分析此类威胁行为。...
2025-6-25 11:47:35 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
powershell
analysis
netsupport
threats
security
How to Spot Registry Abuse by Malware: Examples in ANY.RUN Sandbox
恶意软件通过滥用Windows注册表实现持久性、隐藏和控制行为;ANY.RUN沙盒工具实时检测注册表变化,结合行为分析和MITRE技术标记,帮助识别威胁并提升防御能力。...
2025-6-24 12:52:58 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
windows
analysis
software
security
threats
Simplify Threat Analysis and Boost Detection Rate with Detonation Actions
ANY.RUN的Interactive Sandbox通过Detonation Actions功能提供逐步指导,帮助用户快速检测恶意行为。该功能支持手动和自动模式,提升分析效率和准确性,适用于安全团队和企业。...
2025-6-19 11:33:14 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
analysis
detonation
guided
threats
Threat Hunting: Hands-on Tips for SOC Analysts and MSSPs
本文介绍ANY.RUN的威胁情报查找工具,支持 IOC、行为和MITRE技术查询等高级功能,并通过国家威胁检测、恶意软件行为分析等案例展示其在威胁狩猎中的应用。...
2025-6-18 13:18:10 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
security
malicious
powershell
analysis
identifies
Why Businesses Are at Risk of Android Malware Attacks and How to Detect Them Early
文章探讨了Android恶意软件对企业安全的威胁,包括员工设备感染、MFA绕过及云数据泄露,并分析了Salvador Stealer和SpyNote等恶意软件的攻击手法,强调使用ANY.RUN等工具的重要性。...
2025-6-17 13:3:15 | 阅读: 19 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
attackers
spynote
attacker
security
phishing
Integrate Threat Intelligence Feeds via TAXII Protocol
ANY.RUN的威胁情报 feeds 提供全球15,000家公司的独家威胁情报,通过TAXII协议实现安全高效的数据交换和集成,支持SIEM、EDR/XDR等多种安全系统。其功能包括早期威胁检测、减少误报、自动化响应和增强攻击可见性,助力企业提升主动安全能力。...
2025-6-11 12:48:11 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
feeds
taxii
threats
security
worldwide
5 Key Ways Threat Intelligence Feeds Drive SOC Performance
文章探讨了现代安全运营中心(SOC)在应对不断变化的威胁环境时面临的挑战,并介绍了ANY.RUN的威胁情报 feeds 如何通过提供实时指示器、自动化响应和丰富元数据,帮助 SOC 提高检测速度、降低响应时间、减少误报率,并实现从被动防御到主动防御的转变。...
2025-6-11 09:48:30 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
feeds
threats
security
analysis
proactive
How SOC Teams Save Time and Effort with ANY.RUN: Action Plan
文章探讨了SOC团队面临的日常挑战,并介绍了ANY.RUN如何通过互动沙盒环境、实时威胁情报等解决方案帮助提高检测率、加速响应和优化资源。...
2025-6-10 12:48:20 | 阅读: 19 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
threats
analysis
feeds
security
phishing
Release Notes: TAXII Support for TI Feeds, New Sandbox Onboarding, and 900+ Detection Rules
ANY.RUN五月更新包括全新沙盒教程、TAXII协议支持、扩展威胁覆盖及新增900+行为签名和YARA规则,提升威胁检测效率与准确性。...
2025-6-4 13:33:35 | 阅读: 24 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
feeds
taxii
threats
stealer
analysis
Cyber Attacks on Government Agencies: Detect and Investigate with ANY.RUN for Fast Response
本文探讨了政府机构面临的复杂网络攻击,并通过三个案例展示了ANY.RUN如何利用其工具检测和分析威胁。案例包括钓鱼邮件、仿冒政府网站的恶意域名以及伪装成法院通知的恶意PDF。ANY.RUN通过威胁情报查找、交互式沙盒和YARA搜索帮助识别攻击模式并提供实时分析,助力提升政府网络安全能力。...
2025-6-4 11:32:30 | 阅读: 27 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
malicious
phishing
analysis
threats
analyses
OtterCookie Malware Analysis and Distribution
OtterCookie是一种新型恶意软件,由朝鲜支持的Lazarus组织开发,伪装成工作机会传播。通过钓鱼邮件和Node.js代码隐藏恶意负载,在错误触发时执行窃取浏览器凭证、加密钱包数据等操作,并最终部署后续恶意软件InvisibleFerret。...
2025-6-3 08:32:14 | 阅读: 20 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
ottercookie
beavertail
stage
mauro
How MSSPs Can Analyze and Investigate Phishing Attacks with ANY.RUN
文章探讨了网络钓鱼攻击对各行业的威胁,并展示了ANY.RUN的威胁情报查找和互动沙盒如何帮助MSSP有效检测、分析和应对此类攻击。...
2025-5-28 12:32:15 | 阅读: 21 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
phishing
payload
malicious
analysis
tycoon
How to Analyze Node.js, Python, Android, and Linux Malware with ANY.RUN
文章介绍了恶意软件如何跨平台运作,并展示了ANY.RUN工具如何分析不同系统(Windows、Linux、Android)中的威胁,包括Node.js和Python恶意软件的行为及防御机制。...
2025-5-27 11:32:19 | 阅读: 24 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
analysis
stealer
python
stage
pentagon
DBatLoader Delivers Remcos via UAC Bypass in New Phishing Campaign
新的网络钓鱼活动利用DBatLoader传播Remcos远程访问木马(RAT),通过UAC绕过、.pif文件伪装、脚本混淆和持久化机制实施攻击。恶意软件通过伪装合法文件执行恶意代码,并滥用系统工具如PING命令进行时间延迟和隐藏行为。ANY.RUN的交互式沙盒分析揭示了攻击链中的关键技术和检测方法。...
2025-5-22 12:47:15 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - any.run
analysis
windows
pif
malicious
remcos
Previous
2
3
4
5
6
7
8
9
Next