unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Building a Bulletproof External Financial Fraud Intelligence Program
The fight against financial fraud is an endless battle that requires organization...
2024-8-22 23:17:56 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
threats
identify
improvement
crucial
processes
Building a Bulletproof External Financial Fraud Intelligence Program
read file error: read notes: is a directory...
2024-8-22 22:17:13 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
threats
identify
improvement
crucial
Chameleon is now targeting employees: Masquerading as a CRM app
Chameleon is back in Canada and EuropeIn July 2024 Mobile Threat Intelligence analysts observ...
2024-8-5 21:31:44 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
chameleon
bypassing
canada
canadian
Achieving New Heights: ISO 27701 and ISO 22301 Certifications
ThreatFabric’s SDK solution safeguards tens of millions of payment app-enabled devices through...
2024-7-23 18:46:41 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
security
continuity
22301
Fusion Fireside #1: Navigating the Payment Pathways with Daniel van Delft
This is just the first episode of our ‘Fusion Fireside’ series!We have several other distingu...
2024-6-27 17:1:39 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
currence
daniel
ideal
delft
van
Pig Butchering vs Cyber-Fraud Kill Chain
This blog is part of a series where we provide tools to assess your fraud detection capabiliti...
2024-6-12 15:1:40 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
investment
romance
behavioral
butchering
pig
LightSpy: Implant for macOS
In October 2023 we posted our research about the notorious surveillance framework LightSpy2. I...
2024-5-29 16:16:31 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
lightspy
network
c2
victim
implants
Brokewell: do not go broke from new banking malware!
IntroductionConstant monitoring of the threat landscape allows us to spot new threats and act...
2024-4-25 18:16:30 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
brokewell
swipe
simulates
remote
Investment Scams vs Fraud Kill Chain
This fourth episode covers one of the most diverse scams: those offering an online investment...
2024-4-24 21:47:4 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
investment
behavioral
signals
gaps
Vishing – RAT Fraud vs Fraud Kill Chain
This third episode covers what happens when scammers call you up on your phone. They pretend t...
2024-3-26 17:31:50 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
scammer
victim
behavioral
vishing
readiness
Authentication in the Age of Spoofed Biometrics
Digital vaultsToday, we store almost everything that we value in digital vaults. We store our...
2024-3-21 21:46:39 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
behaviour
behavioural
biometrics
analysis
Romance Scams vs Fraud Kill Chain
This blog is part of a series, where we will offer the tools to check your fraud detection cap...
2024-3-6 18:1:28 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
victim
scammer
behavioral
gap
ttps
Mobile Banking Malware vs Fraud Kill Chain
This blog is the first of a series, where we will offer the tools to check your fraud detectio...
2024-2-27 19:1:32 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
gap
gaps
readiness
tale
signs
Mobile Banking Malware vs Cyber-Fraud Kill Chain
Skip to content...
2024-2-27 18:16:23 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
pgp
Anatsa Trojan Returns: Targeting Europe and Expanding Its Reach
IntroductionIn the dynamic world of mobile banking, the security landscape is constantly shif...
2024-2-19 19:2:14 | 阅读: 56 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
malicious
anatsa
droppers
startswith
ThreatFabric Appoints Rohan Mer as Regional Account Director
AnnouncementAmsterdam, The Netherlands, Friday 9th February, ThreatFabric, a renowned provide...
2024-2-9 18:1:25 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
rohan
crime
him
ThreatFabric Recognised by Gartner as a Sample Vendor for: Emerging Tech Impact Radar: Security
AnnouncementThreatFabric Recognised by Gartner as a Sample Vendor for Emerging Tech Impact Ra...
2024-1-15 20:1:33 | 阅读: 19 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
security
emerging
fusion
cyberfraud
Android Banking Trojan Chameleon is Back in Action
IntroductionIn January 2023, the Chameleon Banking Trojan emerged as a significant threat, e...
2023-12-21 18:2:47 | 阅读: 31 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
chameleon
trojan
biometric
getinstance
ThreatFabric Appoints Jacqueline Nijzink as Chief Operating Officer
AnnouncementAmsterdam, The Netherlands, Thursday 9th November, ThreatFabric, a renowned provi...
2023-11-9 22:1:36 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
jacqueline
amro
abn
chief
Bypassing Android 13 Restrictions with SecuriDropper
IntroductionIn this blog we will look at how threat actors are bypassing the "Restricted Set...
2023-11-6 21:31:30 | 阅读: 28 |
收藏
|
Over Security - Cybersecurity news aggregator - www.threatfabric.com
payload
zombinder
sideloaded
security
Previous
3
4
5
6
7
8
9
10
Next