unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Exploring the VirusTotal Dataset | An Analyst’s Guide to Effective Threat Research
VirusTotal stores a vast collection of files, URLs, domains, and IPs submitted by users worldwide....
2024-8-29 17:57:15 | 阅读: 14 |
收藏
|
SentinelLabs - www.sentinelone.com
analysis
modifiers
modifier
PinnacleOne ExecBrief | Post-Quantum Cryptography and Enterprise Risks
Last week, we drew attention to political volatility and strategic competition in South Asia and hi...
2024-8-26 21:0:35 | 阅读: 10 |
收藏
|
SentinelOne - www.sentinelone.com
pqc
encryption
transition
security
migration
The Good, the Bad and the Ugly in Cybersecurity – Week 34
The Good | Global Authorities Arrest Multi-Million Dollar Crypto Thieves & Charge An Extortion Gang...
2024-8-23 21:0:50 | 阅读: 10 |
收藏
|
SentinelOne - www.sentinelone.com
xeon
windows
cloud
zolotarjovs
The Strategic CISO | How Risk Management Fundamentals Lead to Success
Emerging technologies have given rise to CISOs becoming strategic in their company’s growth. CISOs...
2024-8-22 21:0:56 | 阅读: 10 |
收藏
|
SentinelOne - www.sentinelone.com
security
cisos
lifecycle
LABScon23 Replay | Black Magic – Influence Operations in the Open and At-Scale in Hungary
Influence operations are often thought of as clandestine meddling in other countries’ affairs, but...
2024-8-22 00:10:2 | 阅读: 8 |
收藏
|
SentinelLabs - www.sentinelone.com
narratives
influence
martin
hungary
labscon
Building Resilient Security | Why Fundamentals Matter More Than Ever
read file error: read notes: is a directory...
2024-8-20 21:0:33 | 阅读: 16 |
收藏
|
SentinelOne - www.sentinelone.com
security
operational
stability
processes
rigorous
PinnacleOne ExecBrief | Bangladesh’s New Government Spells Uncertainty for Competing Global Powers
Last week, we noted the recent spate of terrorist attacks and increasing alarm from governments aro...
2024-8-19 21:0:20 | 阅读: 15 |
收藏
|
SentinelOne - www.sentinelone.com
india
bangladesh
hasina
influence
political
Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials
Executive SummaryXeon Sender is a Python script that sends spam through nine different SaaS provi...
2024-8-19 17:55:19 | 阅读: 61 |
收藏
|
SentinelLabs - www.sentinelone.com
xeon
cloud
twilio
python
sns
The Good, the Bad and the Ugly in Cybersecurity – Week 33
The Good | Two Major Ransomware Ops Disrupted & Criminal Linked to Largest Credential Theft Market...
2024-8-16 21:0:55 | 阅读: 11 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
github
systembc
security
nca
Mastering Endpoint Security | A CISO’s Blueprint for Resilience
Chief Information Security Officers (CISOs) face an ever-evolving landscape of cyber threats. Our m...
2024-8-14 23:0:0 | 阅读: 11 |
收藏
|
SentinelOne - www.sentinelone.com
security
cisos
windows
threats
mature
Proactive Security | Enhancing Risk Visibility with Extended Security Posture Management (xSPM)
As part of ongoing growth and digital transformation, many enterprises encounter the challenge of m...
2024-8-13 21:0:38 | 阅读: 14 |
收藏
|
SentinelOne - www.sentinelone.com
security
xspm
posture
threats
PinnacleOne ExecBrief | Terrorism on the Horizon
Last week, we highlighted how nation-state sabotage risked critical infrastructure and operations f...
2024-8-12 23:0:23 | 阅读: 13 |
收藏
|
SentinelOne - www.sentinelone.com
isis
syria
centcom
iraq
forces
Singularity MDR | A Scalable Solution for Broader Detection & Response Coverage
The world has changed – and by a lot. Over the last several years, global companies have rapidly ac...
2024-8-12 21:0:16 | 阅读: 8 |
收藏
|
SentinelOne - www.sentinelone.com
mdr
security
singularity
dfir
objectives
The Good, the Bad and the Ugly in Cybersecurity – Week 32
The Good | $39M From Mass-Scale BEC Scam Recovered & Crypto Wallet Used by Cybercriminals SeizedTh...
2024-8-9 21:0:46 | 阅读: 11 |
收藏
|
SentinelOne - www.sentinelone.com
cryptonator
bec
olympics
software
palais
DeathGrip RaaS | Small-Time Threat Actors Aim High With LockBit & Yashma Builders
The infosec community continues to eye a worrying trend: how the barrier to entry for extortion-foc...
2024-8-8 21:0:47 | 阅读: 14 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
deathgrip
lockbit
yashma
builders
Defusing AD-Based Risks | Best Practices for Securing Modern Directory Services
If you are on a corporate network, it likely runs and authenticates on Microsoft Active Directory (...
2024-8-7 21:0:39 | 阅读: 16 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
attackers
security
network
entra
PinnacleOne ExecBrief | The Escalation of Nation-State Sabotage and Its Implications for the Private Sector
Last week, we highlighted how the recent CrowdStrike disruption underscored the complexity of today...
2024-8-5 21:0:47 | 阅读: 15 |
收藏
|
SentinelOne - www.sentinelone.com
sabotage
security
france
cables
The Good, the Bad and the Ugly in Cybersecurity – Week 31
The Good | Criminals Jailed for $88 Million Software Pirating Scheme & Major Caller ID Scammer Plat...
2024-8-2 21:0:20 | 阅读: 13 |
收藏
|
SentinelOne - www.sentinelone.com
software
ransomware
victim
avaya
angels
Singularity Cloud Native Security | Eliminate False Positives and Focus On What Matters
Over the past few years, cloud computing has emerged as the de facto infrastructure of choice for t...
2024-7-31 21:0:11 | 阅读: 11 |
收藏
|
SentinelOne - www.sentinelone.com
security
cloud
ose
cns
singularity
The Future of CIO and CISO Roles in the Era of AI
As more organizations adopt artificial intelligence (AI) in their businesses, the roles of Chief In...
2024-7-30 21:0:33 | 阅读: 10 |
收藏
|
SentinelOne - www.sentinelone.com
security
cios
cisos
ciso
objectives
Previous
10
11
12
13
14
15
16
17
Next