unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Understanding and Defending Against Microsoft 365 Attacks
As the use of Microsoft 365 continues to grow, cyber attackers are increasingly targeting i...
2023-9-29 15:53:6 | 阅读: 9 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
microsoft
security
cloud
attackers
threats
Understanding and Defending Against Microsoft 365 Attacks
As the use of Microsoft 365 continues to grow, cyber attackers are increasingly targeting its cloud...
2023-9-29 13:53:6 | 阅读: 0 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
microsoft
security
cloud
attackers
threats
Malware Persistence Locations: Windows and Linux
Malware persistence is a crucial aspect of cyber threats that often goes unnoticed by unsus...
2023-9-23 12:25:54 | 阅读: 19 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
malicious
windows
shortcut
bashrc
software
Malware Persistence Locations: Windows and Linux
Malware persistence is a crucial aspect of cyber threats that often goes unnoticed by unsuspecting...
2023-9-23 10:25:54 | 阅读: 0 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
malicious
windows
bashrc
shortcut
appinit
Leading the uncertainty: the decision-driven approach
Subscribe to continue readingSubscribe to get access to the rest of this post and other...
2023-9-14 21:13:44 | 阅读: 9 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
ethical
Leading the uncertainty: the decision-driven approach
Many of my readers know me as a cybersecurity expert. More than 12 years of blogging on "security s...
2023-9-14 19:13:44 | 阅读: 0 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
leadership
leaders
informed
2023 Breaches and Incidents: Personal Notes
IntroductionIn today’s digital landscape, the prevalence of cyber threats and incidents...
2023-6-22 21:34:44 | 阅读: 19 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
ransomware
fraudulent
attackers
losses
2023 Breaches and Incidents: Personal Notes
IntroductionIn today's digital landscape, the prevalence of cyber threats and incidents has bec...
2023-6-22 19:34:44 | 阅读: 0 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
ransomware
losses
fraudulent
attackers
Polymorphic Malware Using #AI
In the ever-evolving landscape of cybersecurity, malicious actors constantly seek new ways...
2023-5-25 20:41:14 | 阅读: 34 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
openai
generative
polymorphic
malicious
security
The Relevance of Prompts in AI and Cybersecurity
Introduction to PromptingArtificial Intelligence (AI) has become an increasingly popula...
2023-4-30 15:8:18 | 阅读: 19 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
prompts
sentence
involve
keras
Many Generative Pre-Trained Transformer (GPT): a pragmatic evaluation.
Artificial intelligence (AI) is a rapidly evolving field that involves the development of i...
2023-4-12 22:22:27 | 阅读: 18 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
gpt
tuning
llm
llama
gpt4
Reversing Emotet Dropping Javascript
Recently (On March 18 2023 at 23:44), a new malspam campaign has been observed in the wild...
2023-3-23 00:3:52 | 阅读: 30 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
analysis
stage
dropping
unused
Malware Families CheatSheet
During talks and presentations people often ask me how do I remember so m...
2023-3-2 22:55:30 | 阅读: 25 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
families
cheatsheet
hemmm
clusters
loader
Amazing Books: The Podcast
Skip to contentI believe books can change a live. I do also beli...
2023-2-20 16:8:26 | 阅读: 17 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
amazing
discussions
guests
aim
Threat Actors Sheets: OpenAI Generated !
InroductionChatGPT or more generally speaking OpenAI is an incredible tool. It is a spe...
2023-2-16 18:41:18 | 阅读: 23 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
apt28
trojans
phishing
sectors
military
Onenote Malware: Classification and Personal Notes
During the past 4 months Microsoft Onenote file format has been (ab)used as Malware carrier...
2023-2-4 16:17:56 | 阅读: 48 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
hash256
onenote
redline
microsoft
remcos
Most Exploited Vulnerabilities in 2022
Initial Access Brokers (IAB) are still the main way cyber criminals use to get access to th...
2022-12-27 16:1:35 | 阅读: 28 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
exploited
remote
microsoft
attacker
Is Hagga Threat Actor (ab)using FSociety framework ?
IntroductionToday I’d like to share a quick analysis initiated during a threat hunting...
2022-11-21 23:36:56 | 阅读: 33 |
收藏
|
marcoramilli.com
rump
xls
decoded
ppam
fsociety
Phishing Kits: Threat Actors Analysis Research
IntroductionPhishing kits are tools that dark side experts provide to the community of...
2022-11-9 18:11:11 | 阅读: 30 |
收藏
|
marcoramilli.com
kits
phishing
novel
machine
Windows System Calls For Hunters
IntroductionSystem calls are the ultimate high-level atomic actions that Malware writer...
2022-8-23 15:12:22 | 阅读: 30 |
收藏
|
marcoramilli.com
malicious
wow64
abused
windows
network
Previous
24
25
26
27
28
29
30
31
Next