unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
The Evolution of Cybercrime Cartels: From Lone Wolves to Sophisticated Syndicates
read file error: read notes: is a directory...
2025-1-13 16:45:32 | 阅读: 15 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
organized
ransomware
syndicates
Top 5 Non-State Actor Groups Targeting Critical Infrastructure
Critical infrastructure, spanning sectors such as healthcare, energy, and transportation, has be...
2025-1-13 12:52:6 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ransomware
sectors
lockbit
clop
motivations
Improving ATT&CK’s Relevance for Living Off the Land (LOTL) Detection
Living Off the Land (LOTL) tactics have become a cornerstone of modern cyberattacks, where adver...
2025-1-9 16:3:31 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
lotl
studies
defenders
contextual
actionable
APT vs. Cybercriminal Groups: Understanding Their Differences and Overlaps
The cyber threat landscape is dominated by two key adversaries: Advanced Persistent Threats (APT...
2025-1-9 15:22:56 | 阅读: 21 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
nation
criminal
apts
ransomware
Geopolitical Implications of Greenland Annexation & Potential Russian Influence
Context and Overview:The suggestion that former U.S. President Donald Trump aimed to annex G...
2025-1-9 14:35:41 | 阅读: 8 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
greenland
trump
russia
arctic
strategic
Tabletop: Recent statements by President-elect Donald Trump have indicated a willingness to use military force to assert U.S. control over Greenland and the Panama Canal, citing national security and economic interests.
Here are three potential scenarios that could unfold if the United States, under President-elect...
2025-1-7 19:7:19 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
military
panama
nations
greenland
arctic
Emerging Threat Trends for 2025 Threat Brief: What CTI Teams Need to Know
Executive Summary:The year 2025 is poised to redefine the cybersecurity landscape, marke...
2025-1-3 15:42:2 | 阅读: 38 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
threats
cti
ransomware
nation
Threat Brief: Global Disinformation Campaigns and Emerging Trends (2024)
Threat Brief: Global Disinformation Campaigns and Emerging Trends (2024)Executive Summ...
2024-12-31 13:43:40 | 阅读: 24 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
criminal
election
narratives
iran
Cyber Threat Intelligence Brief
Generated by Krypt3ia using the ICEBREAKER Intel Analyst Bot created on ChatGPTDate: Decembe...
2024-12-30 14:43:2 | 阅读: 26 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ransomware
phishing
criminal
nation
2024 Retrospective: The Digital Underground and the Great Cyber Chessboard
The year 2024 felt like one long, unending breach—a year where the digital underground boile...
2024-12-27 16:0:20 | 阅读: 18 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
phishing
microsoft
nation
cyberspace
Reflections for the Cybersecurity Professional
Inspired by Marcus Aurelius’ MeditationsWritten by Scot Terban (aka Krypt3ia) and Cha...
2024-10-18 02:27:52 | 阅读: 14 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
threats
ethical
Comprehensive Threat Intelligence Report: The Rise of Nation-State Cyber Attacks and Their Convergence with Cybercrime
TLP: WHITEThis threat intelligence report was written in tandem between Krypt3ia and the ICE...
2024-10-17 20:15:0 | 阅读: 9 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
nation
warfare
military
north
korea
Threat Actor Profile: TA-RedAnt
Overview:Aliases: No known aliasesCountry of Origin: Likely from East Asia (speculated)...
2024-10-16 21:20:50 | 阅读: 10 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
phishing
rokrat
ransomware
malicious
Threat Report: Potential Activities of SALT TYPHOON and the MSS Using Compromised Wiretap Systems
Date: October 10, 2024Prepared for: Krypt3iaTLP: WHITEThis report was generated by K...
2024-10-10 18:40:56 | 阅读: 12 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
typhoon
salt
espionage
mss
security
Recruiting Scams On LinkedIn
Be aware, there are a plethora of scammers coming out of the Asian subcontinent. I got one yeste...
2024-7-11 22:21:11 | 阅读: 13 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
cigna
tied
legit
w2
pyramid
Threat Analysis: Potential Successors to the Iranian Presidency
This post was created in tandem between Scot A Terban and the Middle Eastern Intelligence Analys...
2024-5-21 01:31:48 | 阅读: 14 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
iran
president
hardline
khamenei
raisi
White Paper: Navigating the Future of AI in Recruitment
Executive SummaryThe landscape of recruitment is undergoing a seismic shift with...
2024-4-2 21:54:57 | 阅读: 15 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
ethical
recruitment
applicants
employers
ensuring
A Critical Look at “Cyber security is a dark art”: The CISO as soothsayer
The recent study by Joseph Da Silva and Rikke Bjerg Jensen, titled “Cyber security is a dark art...
2024-3-19 04:27:17 | 阅读: 23 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
cisos
ciso
security
religious
TLP WHITE:
OverviewEarth Kapre, also known as RedCurl, is a sophisticated cyberespionage group that...
2024-3-17 22:35:58 | 阅读: 26 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
malicious
kapre
earth
redcurl
network
Complexity in Networks and Systems: Analyzing the Intersection of Human Influence and Vulnerability Exploitation
Summary:“Complexity in Networks and Systems: Analyzing the Intersection of Human Influence a...
2024-3-17 22:0:12 | 阅读: 19 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
threats
Previous
3
4
5
6
7
8
9
10
Next