unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
read file error: read notes: is a directory...
2025-2-4 17:50:53 | 阅读: 13 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
ransomware
texas
network
Corporate Panopticon: How Big Tech Became the New Surveillance State
read file error: read notes: is a directory...
2025-2-3 16:2:52 | 阅读: 13 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
capitalism
spies
facebook
disrupt
Modern Moscow Rules: Counter-Surveillance in the Digital & Physical World
read file error: read notes: is a directory...
2025-2-3 15:58:51 | 阅读: 12 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
cameras
facial
burner
disrupt
security
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-2-3 15:48:38 | 阅读: 18 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
phishing
security
coyote
deepseek
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-1-31 12:20:5 | 阅读: 21 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ransomware
malicious
security
ukraine
Threat Report: Risks and Considerations of Storing Corporate Security Telemetry in EDR Vendor Cloud Instances
Executive SummaryAs cybersecurity vendors like CrowdStrike, Microsoft Defender, and Sentinel...
2025-1-30 16:56:6 | 阅读: 14 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
cloud
telemetry
regulatory
threats
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-1-30 12:46:9 | 阅读: 12 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
phishing
security
malicious
ransomware
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-1-29 14:4:10 | 阅读: 22 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
deepseek
security
healthcare
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
read file error: read notes: is a directory...
2025-1-28 17:59:48 | 阅读: 20 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ransomware
chatbot
security
threats
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-1-27 13:3:37 | 阅读: 20 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
healthcare
phishing
deepseek
threats
security
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-1-24 15:13:10 | 阅读: 19 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
phishing
healthcare
cyberattack
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
2025-1-23 13:21:50 | 阅读: 26 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
phishing
ransomware
bypass
Krypt3ia’s Survival Guide for Safe Communications in Today’s Internet and Social Media Landscape
The Moscow Rules are a set of guidelines developed during the Cold War for clandestine operation...
2025-1-22 15:0:25 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
tips
actionable
principle
threats
moscow
Krypt3ia Daily Threat Intel Digest 1.22.25
Trump axes TSA chief who led pipeline, airline, rail cybersecurity rulesTransportation Secur...
2025-1-22 14:43:33 | 阅读: 20 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
trump
security
ulbricht
valleyrat
Krypt3ia CTI Daily Digest 1.21.25
Businesses prepare to update their cybersecurity playbooks for the Trump era amid increasing thr...
2025-1-21 15:48:37 | 阅读: 13 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
microsoft
ransomware
threats
tanzeem
Threat Brief: Security Issues Surrounding TikTok and Its Potential for Espionage and Misinformation Campaigns
Date: January 20, 2025Compiled by: Krypt3iaExecutive SummaryTikTok, a social media p...
2025-1-20 13:34:8 | 阅读: 11 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
influence
espionage
bytedance
beijing
Expanded Damage Assessment: Unauthorized Access to FBI Informant Communications via AT&T Breach
OverviewIn a catastrophic breach of AT&T’s network infrastructure, the Chinese state-sponsor...
2025-1-17 20:28:38 | 阅读: 11 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
informants
typhoon
salt
espionage
security
Daily Krypt3ia Cyber Threat Intelligence Digest:
Date: January 16, 2025Time: 0800 ETThis report provides key insights into the most critical...
2025-1-16 13:6:43 | 阅读: 14 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ransomware
phishing
malicious
security
attackers
Can a Threat Intelligence Program Succeed Without Logging and Monitoring?
A threat intelligence program (TIP) is often marketed as the holy grail of modern cybersecurity—...
2025-1-15 10:41:48 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
monitoring
threats
attackers
security
spots
Threat Brief: Y2Q and the Convergence of AI Compute and Quantum Computing Power
OverviewY2Q, shorthand for “Year to Quantum” – marks the critical point when quantum compute...
2025-1-14 12:20:29 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
threats
convergence
defenses
y2q
Previous
2
3
4
5
6
7
8
9
Next