unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Predators for Hire: A Global Overview of Commercial Surveillance Vendors
这篇文章探讨了商业 surveillance vendors(CSVs)的发展历程及其对隐私和人权的影响。从2010年至今,CSVs通过提供间谍软件帮助政府监控目标,逐渐工业化并扩展市场。然而,其滥用行为引发人权争议和监管压力。尽管面临制裁和法律诉讼,CSVs通过改名、重组等方式继续活跃于高利润市场。...
2025-9-2 07:46:17 | 阅读: 20 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
spyware
csvs
intellexa
predator
security
Global analysis of Adversary-in-the-Middle phishing threats
文章探讨了Adversary-in-the-Middle (AitM)网络钓鱼攻击的现状与趋势,分析了其利用Phishing-as-a-Service (PhaaS)生态系统进行大规模攻击的技术手段与目标。文章指出,AitM攻击主要针对Microsoft 365和Google账户,并通过会话劫持绕过多因素认证(MFA),导致财务欺诈和数据泄露。此外,文章还总结了AitM攻击的常见TTPs、PhaaS服务的运作模式以及检测与防御机会。...
2025-6-11 09:2:47 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
phishing
aitm
phaas
kits
sekoia
Navigating DORA: How Sekoia.io can support your compliance journey
欧盟《数字运营韧性法案》(DORA)自2025年1月起生效,要求金融机构加强网络安全措施,包括保护信息通信技术(ICT)系统、管理网络事件及进行威胁驱动的渗透测试(TLPT)。Sekoia.io通过提供威胁情报、安全运营中心(SOC)平台及自动化响应工具,助力机构实现合规并提升应对真实攻击的能力。...
2025-6-3 07:32:4 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
dora
threats
security
The Sharp Taste of Mimo’lette: Analyzing Mimo’s Latest Campaign targeting Craft CMS
这篇文章分析了针对Craft CMS的远程代码执行漏洞CVE-2025-32432的攻击活动。攻击者利用该漏洞部署恶意软件,包括挖矿软件XMRig和代理软件IPRoyal,并通过动态链接器劫持隐藏恶意进程。文章还探讨了攻击者的基础设施和行为模式,并提供了检测机会。...
2025-5-27 07:16:56 | 阅读: 32 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
mimo
alamdar
attacker
4l4md4r
iproyal
ViciousTrap – Infiltrate, Control, Lure: Turning edge devices into honeypots en masse.
Sekoia.io发现威胁行为者ViciousTrap利用CVE-2023-20118漏洞攻击超5500个边缘设备,将其变为honeypots。该行为者可能来自中文地区,目标包括SOHO路由器、SSL VPN等设备,并通过NetGhost脚本重定向流量至自身服务器以监控网络活动和潜在漏洞。...
2025-5-22 11:31:58 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
attacker
routers
redirection
netghost
vicioustrap
Detecting Multi-Stage Infection Chains Madness
文章描述了一起利用Cloudflare隧道基础设施分发远程访问木马(RAT)的网络攻击活动。攻击链复杂,涉及钓鱼邮件、LNK文件、HTA文件及PowerShell脚本等多个阶段,并通过隐藏文件和动态DNS等技术规避检测。Sekoia TDR团队通过多种Sigma规则和CTI情报成功识别并追踪该活动。...
2025-4-22 07:2:19 | 阅读: 22 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
windows
chains
python
powershell
attacker
Interlock ransomware evolving under the radar
Interlock 是一个自 2024 年 9 月活跃的勒索软件团伙,主要针对大型企业实施双重勒索攻击。他们通过入侵合法网站分发虚假浏览器更新以部署恶意软件,并利用 ClickFix 技术诱骗用户手动执行恶意命令。尽管受害者数量相对较少,但该团伙不断改进工具和技术以增强攻击能力。...
2025-4-16 08:31:33 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
interlock
ransomware
powershell
c2
The evolution of the AI SOC: From Hype to Hyper
文章探讨了人工智能(AI)的不同阶段及其对安全运营中心(SOC)的影响。感知AI通过理解文本、语音和图像增强威胁检测;生成式AI通过创建内容优化检测规则;能动AI引入自主决策的智能体;物理AI实现与物理世界的交互。这些技术共同提升了SOC团队的工作效率,并展望了未来人机协作的安全环境。...
2025-4-14 13:17:7 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
generative
agents
security
perception
triage
From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic
Lazarus组织通过虚假面试网站ClickFake Interview攻击加密货币行业,利用ClickFix技术在Windows和macOS系统中部署恶意软件GolangGhost和FrostyFerret。该活动针对中心化金融平台员工,窃取敏感数据并远程控制设备。...
2025-3-31 07:1:20 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
clickfake
golangghost
windows
cloudapi
sekoia
ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery
ClearFake是一种恶意JavaScript框架,通过注入受攻击网站传播恶意软件。它利用区块链技术隐藏代码,并采用ClickFix诱饵欺骗用户执行PowerShell命令下载勒索软件。最新变种结合Binance Smart Chain与社会工程学技术,通过伪造验证页面诱导用户感染系统。...
2025-3-18 08:17:28 | 阅读: 28 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
hxxps
clearfake
powershell
stage
clickfix
Detection engineering at scale: one step closer (part three)
Table of contentsDo not leave out all the restMonitoring detection rulesDetection...
2025-3-5 09:47:16 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
dashboards
kpis
monitoring
rejection
malicious
PolarEdge: Unveiling an uncovered IOT Botnet
报告分析了PolarEdge僵尸网络利用CVE-2023-20118漏洞攻击多种设备的情况,包括 Cisco 路由器、Asus、QNAP 和 Synology 等,并详细描述了恶意软件的结构、基础设施及潜在威胁。...
2025-2-25 08:31:21 | 阅读: 95 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
payload
attacker
polaredge
analysis
asus
Cyber threats impacting the financial sector in 2024 – focus on the main actors
本文分析了2024年针对金融行业的网络威胁与国家支持的入侵活动。初始访问经纪人(IABs)、勒索软件、恶意软件及钓鱼攻击对金融机构构成严重威胁。同时,朝鲜、伊朗及中国等国家支持的APT组织通过网络间谍、经济收益及破坏活动进一步加剧风险。这些行为不仅导致财务损失与声誉损害,还凸显出金融生态系统的脆弱性及供应链安全的重要性。...
2025-2-20 09:1:18 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
ransomware
phishing
sponsored
lucrative
apts
Sekoia.io achieves ISO 27001 compliance
tag:blogger.com,1999:blog-6921014549873020749Wed, 06 Nov 2024 02:55:58 +0000toolsweb securityconfere...
2025-2-13 07:2:13 | 阅读: 28 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
justify
spacing
webkit
helvetica
2px
RATatouille: Cooking Up Chaos in the I2P Kitchen
本文分析了多阶段远程访问木马I2PRAT,其通过特权提升、进程迁移和动态API解析等技术逃避检测,并利用I2P匿名网络隐藏C2通信。此外,该恶意软件禁用Windows Defender功能并创建持久化服务以确保长期存在。...
2025-2-11 13:47:15 | 阅读: 25 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
c2
i2prat
cnccli
loader
privileges
Detection engineering at scale: one step closer (part two)
Table of contentsThe catalyst: an approach to detection engineering at scaleDetect...
2025-2-4 09:47:42 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
crucial
catalyst
parsers
sekoia
development
Targeted supply chain attack against Chrome browser extensions
Table of contentsContextSupply chain attack overviewTargeted phishing attacks agai...
2025-1-22 11:46:25 | 阅读: 36 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
chrome
malicious
phishing
chatgpt
c2
Transition from IBM QRadar to Sekoia for a modern & rewarding experience
Table of contentsBenefit from a cloud-native SOC platformLeverage cutting-edge det...
2025-1-20 12:1:30 | 阅读: 21 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
qradar
security
sigma
cti
Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service
Table of contentsIntroductionCharacteristics of Sneaky 2FAURL patternsAnti-bot and...
2025-1-16 09:46:34 | 阅读: 26 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
phishing
sneaky
microsoft
analysis
Double-Tap Campaign : Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations
This report was originally published for our customers on 12 December 2024.Tab...
2025-1-13 09:17:25 | 阅读: 37 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
hatvibe
kazakhstan
0063
malicious
sekoia
Previous
0
1
2
3
4
5
6
7
Next