unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Krypt3ia Daily Threat Intel Digest 1.22.25
Trump axes TSA chief who led pipeline, airline, rail cybersecurity rulesTransportation Secur...
2025-1-22 14:43:33 | 阅读: 16 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
trump
security
ulbricht
valleyrat
Krypt3ia CTI Daily Digest 1.21.25
Businesses prepare to update their cybersecurity playbooks for the Trump era amid increasing thr...
2025-1-21 15:48:37 | 阅读: 9 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
microsoft
ransomware
threats
tanzeem
Threat Brief: Security Issues Surrounding TikTok and Its Potential for Espionage and Misinformation Campaigns
Date: January 20, 2025Compiled by: Krypt3iaExecutive SummaryTikTok, a social media p...
2025-1-20 13:34:8 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
influence
espionage
bytedance
beijing
Expanded Damage Assessment: Unauthorized Access to FBI Informant Communications via AT&T Breach
OverviewIn a catastrophic breach of AT&T’s network infrastructure, the Chinese state-sponsor...
2025-1-17 20:28:38 | 阅读: 7 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
informants
typhoon
salt
espionage
security
Daily Krypt3ia Cyber Threat Intelligence Digest:
Date: January 16, 2025Time: 0800 ETThis report provides key insights into the most critical...
2025-1-16 13:6:43 | 阅读: 11 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ransomware
phishing
malicious
security
attackers
Can a Threat Intelligence Program Succeed Without Logging and Monitoring?
A threat intelligence program (TIP) is often marketed as the holy grail of modern cybersecurity—...
2025-1-15 10:41:48 | 阅读: 5 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
monitoring
threats
attackers
security
spots
Threat Brief: Y2Q and the Convergence of AI Compute and Quantum Computing Power
OverviewY2Q, shorthand for “Year to Quantum” – marks the critical point when quantum compute...
2025-1-14 12:20:29 | 阅读: 4 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
threats
convergence
defenses
y2q
The Evolution of Cybercrime Cartels: From Lone Wolves to Sophisticated Syndicates
In the early days of the internet, cybercriminals often operated as isolated “lone wolves,” exec...
2025-1-13 16:45:32 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
organized
ransomware
syndicates
Top 5 Non-State Actor Groups Targeting Critical Infrastructure
Critical infrastructure, spanning sectors such as healthcare, energy, and transportation, has be...
2025-1-13 12:52:6 | 阅读: 7 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ransomware
sectors
lockbit
clop
motivations
Improving ATT&CK’s Relevance for Living Off the Land (LOTL) Detection
Living Off the Land (LOTL) tactics have become a cornerstone of modern cyberattacks, where adver...
2025-1-9 16:3:31 | 阅读: 7 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
lotl
studies
defenders
contextual
actionable
APT vs. Cybercriminal Groups: Understanding Their Differences and Overlaps
The cyber threat landscape is dominated by two key adversaries: Advanced Persistent Threats (APT...
2025-1-9 15:22:56 | 阅读: 18 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
nation
criminal
apts
ransomware
Geopolitical Implications of Greenland Annexation & Potential Russian Influence
Context and Overview:The suggestion that former U.S. President Donald Trump aimed to annex G...
2025-1-9 14:35:41 | 阅读: 6 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
greenland
trump
russia
arctic
strategic
Tabletop: Recent statements by President-elect Donald Trump have indicated a willingness to use military force to assert U.S. control over Greenland and the Panama Canal, citing national security and economic interests.
Here are three potential scenarios that could unfold if the United States, under President-elect...
2025-1-7 19:7:19 | 阅读: 5 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
military
panama
nations
greenland
arctic
Emerging Threat Trends for 2025 Threat Brief: What CTI Teams Need to Know
Executive Summary:The year 2025 is poised to redefine the cybersecurity landscape, marke...
2025-1-3 15:42:2 | 阅读: 34 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
threats
cti
ransomware
nation
Threat Brief: Global Disinformation Campaigns and Emerging Trends (2024)
Threat Brief: Global Disinformation Campaigns and Emerging Trends (2024)Executive Summ...
2024-12-31 13:43:40 | 阅读: 20 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
criminal
election
narratives
iran
Cyber Threat Intelligence Brief
Generated by Krypt3ia using the ICEBREAKER Intel Analyst Bot created on ChatGPTDate: Decembe...
2024-12-30 14:43:2 | 阅读: 24 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ransomware
phishing
criminal
nation
2024 Retrospective: The Digital Underground and the Great Cyber Chessboard
The year 2024 felt like one long, unending breach—a year where the digital underground boile...
2024-12-27 16:0:20 | 阅读: 14 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
phishing
microsoft
nation
cyberspace
Reflections for the Cybersecurity Professional
Inspired by Marcus Aurelius’ MeditationsWritten by Scot Terban (aka Krypt3ia) and Cha...
2024-10-18 02:27:52 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
threats
ethical
Comprehensive Threat Intelligence Report: The Rise of Nation-State Cyber Attacks and Their Convergence with Cybercrime
TLP: WHITEThis threat intelligence report was written in tandem between Krypt3ia and the ICE...
2024-10-17 20:15:0 | 阅读: 7 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
nation
warfare
military
north
korea
Threat Actor Profile: TA-RedAnt
Overview:Aliases: No known aliasesCountry of Origin: Likely from East Asia (speculated)...
2024-10-16 21:20:50 | 阅读: 6 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
phishing
rokrat
ransomware
malicious
Previous
2
3
4
5
6
7
8
9
Next