unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
The Threats of Forced Obsolescence On Cyber Security
read file error: read notes: is a directory...
2024-2-12 08:0:0 | 阅读: 25 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
forced
security
debt
TLP WHITE: Threat Intelligence Report for The Week of February 5th – February 9th 2024
Executive Summary:This threat intelligence report covers the geopolitical issues bein...
2024-2-9 22:14:41 | 阅读: 26 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
citibank
deepfake
Welcome To The New MAD: Understanding The Complex Web of Global Cyber Infrastructure Intrusion
In the realm of international relations and cybersecurity, a silent war wages beneath...
2024-2-9 00:39:32 | 阅读: 18 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
espionage
mad
nations
russia
nuclear
The Most Effective Countermeasures To LOLBAS (LoLBins) Pro’s and Cons
read file error: read notes: is a directory...
2024-2-9 00:24:1 | 阅读: 20 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
costs
cloud
expenses
operational
TLP WHITE: CVE Threat Intelligence Report February 7th 2024
This threat intelligence report provides an overview of several notable vulnerabilities identifi...
2024-2-8 01:15:7 | 阅读: 71 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
attackers
security
importance
injection
TLP WHITE: Threat Intelligence Report on The Current Threat Landscape February 6th 2024
This report was generated by Scot Terban using the ICEBREAKER A.I. Intel Analyst created...
2024-2-6 21:27:32 | 阅读: 34 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
threats
security
jcdc
Threat Intelligence Report on VOLT TYPHOON
VOLT TYPHOONThe activity by the Chinese cyber espionage campaign known as Volt Typhoon has b...
2024-2-6 01:41:40 | 阅读: 24 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
volt
typhoon
espionage
security
network
Cyber Military Attack Scenarios Exercise For Infrastructure Attacks
This report was generated by Scot Terban and the Existential Forecaster A.I. Analyst...
2024-2-6 01:31:5 | 阅读: 27 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
military
grid
political
threats
TLP WHITE: Threat Intelligence Report Weekly Summary and Look Ahead February 2nd 2024
This week’s cybersecurity landscape has seen significant developments, with governmen...
2024-2-2 22:24:13 | 阅读: 21 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
threats
ransomware
security
uber
TLP WHITE: February 1st 2024 Emerging Threats And Trends Threat Intelligence Report
Emerging threats and trends in the cyber landscape for 2024 indicate an environment w...
2024-2-1 23:2:13 | 阅读: 19 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
threats
remote
attackers
TLP WHITE: Threat Mitigation Strategies: Cybersecurity Landscape For The Week of January 29th 2024
This report was generated by Scot Terban using the ICEBREAKER A.I. Analyst cr...
2024-2-1 00:27:47 | 阅读: 18 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
threats
ransomware
carrying
TLP WHITE: January 30th Threat Intelligence Report: Citrix NetScaler ADC and NetScaler Gateway Zero-Day Vulnerabilities
This report was created by Scot Terban using the ICEBREAKER AI Intel Analyst, created...
2024-1-30 20:19:52 | 阅读: 33 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
citrix
netscaler
network
security
TLP WHITE: Threat Landscape Overview For The Week of January 29th, 2024
This report was generated in tandem between the ICEBREAKER A.I. Intel Analyst and Sco...
2024-1-30 02:39:14 | 阅读: 24 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
security
threats
sectors
New Schedule, New Reports, More Content.
Since I have time on my hands, I have decided to give this blog more of a framework a...
2024-1-30 01:42:30 | 阅读: 19 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
threats
monday
utilize
analysis
tuesday
Unpacking Microsoft’s Cybersecurity Challenges – Lessons from the Midnight Blizzard Attack
This post was created by Scot Terban in tandem with the ICEBREAKER A.I. Analyst creat...
2024-1-27 01:39:33 | 阅读: 22 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
microsoft
lesson
midnight
blizzard
Threat Intelligence Brief MOAB 1/25/24 FLASH TLP WHITE
This threat intelligence report was created in tandem between Scot Terban and the ICE...
2024-1-26 05:46:31 | 阅读: 19 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
moab
security
threats
phishing
Cyber Threat Intelligence Report: January 2024
This report was generated in tandem between Scot Terban and the ICEBREAKER A.I. Threa...
2024-1-25 00:53:43 | 阅读: 65 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
espionage
ivanti
ransomware
The Impact of AI Integration on Cybersecurity Professionals: Balancing Benefits and Risks
This post was created in tandem between Scot Terban and ChatGPT using the ICEBREAKER...
2024-1-23 03:20:36 | 阅读: 18 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
threats
impacts
efficiency
incoherence
Understanding Active vs Passive Threat Intelligence in Cybersecurity
IntroductionIn the dynamic realm of cybersecurity, threat intelligence emerges as a c...
2024-1-23 02:34:34 | 阅读: 17 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
threats
security
approaches
attackers
CTI Best Practices: Program Outline For Starting Up A Program
This post was created in tandem between Scot Terban and ChatGPT4 using the ICEBREAKER...
2024-1-19 22:14:27 | 阅读: 23 |
收藏
|
Krypt3ia - krypt3ia.wordpress.com
cti
threats
security
analysis
involves
Previous
5
6
7
8
9
10
11
12
Next