unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Guarding Democracy: Assessing Cyber Threats to 2024 Worldwide Elections
Executive SummaryIn 2024 multiple worldwide elections will be held with 5...
2024-4-30 20:16:58 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
elections
influence
electoral
Unplugging PlugX: Sinkholing the PlugX USB worm botnet
Table of contentsPlugX, an old cyber weapon in the Chinese arsenalWhen things go w...
2024-4-25 15:47:0 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
plugx
worm
payload
Securing cloud perimeters
The global shift towards cloud computing is undeniable. According to Statista, the...
2024-4-22 15:46:53 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
cloud
sekoia
security
attackers
threats
AWS Detection Engineering
Table of contentsIntroductionThree main logs sources from AWSBuilding detection fo...
2024-4-18 20:32:1 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
cloudtrail
sekoia
guardduty
ec2
attacker
From EDR to XDR: Detailed Walkthrough
Table of contentsUnderstanding EDR and XDRComplementary CapabilitiesEmerging trend...
2024-4-5 17:48:30 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
threats
network
mdr
cloud
Sekoia.io and GLIMPS: a new example of interoperability within the Open XDR platform
This blogpost was written by Glimps and Sekoia.io teamsTable of contentsFirst...
2024-3-25 23:2:50 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
glimps
sekoia
analysis
connector
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit
Table of contentsIntroductionContextUncovering of Tycoon 2FABackground of Tycoon 2...
2024-3-25 17:46:51 | 阅读: 80 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
phishing
tycoon
turnstile
stage
microsoft
Unveiling the depths of Residential Proxies providers
Written by World Watch team from CERT Orange Cyberdefense (Marine PICHON, Vincent...
2024-3-14 16:46:54 | 阅读: 88 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
resip
proxies
proxyware
proxy
comdomain
Enhancing security with IOC detection
Indicators of Compromise (IOCs) serve as signals, hinting at potential security br...
2024-3-13 19:17:16 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
database
security
indicator
The Architects of Evasion: a Crypters Threat Landscape
As of today, a large majority of intrusion sets and threat actors leverage crypter...
2024-3-8 19:46:57 | 阅读: 19 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
crypters
crypter
software
malicious
fud
Guidelines for selecting and disseminating Sekoia.io IOCs from CTI sources
In the ever-evolving landscape of cybersecurity, the battle against threats demand...
2024-3-8 19:46:55 | 阅读: 20 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
cti
security
consume
NoName057(16)’s DDoSia project: 2024 updates and behavioural shifts
2024-3-1 23:31:55 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
The Predator spyware ecosystem is not dead
2024-2-28 19:32:25 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
Playbooks on-prem
2024-2-23 04:46:59 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
Scattered Spider laying new eggs
2024-2-22 16:32:28 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
How Sekoia Endpoint Agent works
2024-2-14 16:32:39 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
Adversary infrastructures tracked in 2023
2024-2-6 16:2:5 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
Unveiling the intricacies of DiceLoader
2024-2-1 17:32:9 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
SentinelOne and Sekoia.io Integration
2024-1-31 22:32:2 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
Detecting Berylian attacks: Sekoia SOC Platform used in NATO CCDOE Crossed Swords 2023
2024-1-30 15:1:58 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
Previous
1
2
3
4
5
6
7
8
Next