unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Investors, Trump and the Illuminati: What the “Nigerian prince” scams became in 2024
本文介绍了“尼日利亚”垃圾邮件的常见类型和特征,包括伪装成富人捐赠、政府补偿、彩票中奖、网络交友及商业投资等骗局。这些邮件通常包含错误和低质量翻译,并通过社会工程学手段诱导受害者回复或提供个人信息。防范建议包括避免回应未知发件人及注意邮件中的不一致和错误。...
2025-2-5 12:0:5 | 阅读: 10 |
收藏
|
Securelist - securelist.com
nigerian
recipient
victim
trump
fund
Take my money: OCR crypto stealers in Google Play and App Store
这篇文章介绍了名为“SparkCat”的恶意软件,该软件通过嵌入到Google Play和App Store中的合法应用传播,下载量超过24万次。它利用OCR技术扫描用户相册中的图片,寻找加密钱包恢复短语并发送至攻击者服务器。该恶意软件还使用了Rust语言编写的自定义协议进行通信,并首次出现在苹果应用商店中。...
2025-2-5 08:0:16 | 阅读: 2 |
收藏
|
Securelist - securelist.com
malicious
c2
trojan
library
gallery
Take my money: OCR crypto stealers in Google Play and App Store
这篇文章总结了苹果公司从App Store中移除了嵌入恶意SDK的应用程序。这些应用程序通过OCR技术窃取用户的加密钱包恢复短语,并利用Rust语言进行通信。该恶意软件影响了Android和iOS用户,并最终于2025年6月被苹果移除。...
2025-2-5 08:0:16 | 阅读: 1 |
收藏
|
Securelist - securelist.com
malicious
c2
trojan
library
gallery
One policy to rule them all
Windows group policies are a powerful management tool that allows administrators to de...
2025-1-31 10:0:2 | 阅读: 1 |
收藏
|
Securelist - securelist.com
gpo
sysvol
windows
attackers
No need to RSVP: a closer look at the Tria stealer campaign
IntroductionSince mid-2024, we’ve observed a malicious Android campaign leveraging we...
2025-1-30 08:0:12 | 阅读: 7 |
收藏
|
Securelist - securelist.com
apk
tria
malicious
stealer
malaysia
Threat predictions for industrial enterprises 2025
Kaspersky Security Bulletin...
2025-1-29 10:0:37 | 阅读: 6 |
收藏
|
Securelist - securelist.com
security
network
developers
attackers
Mercedes-Benz Head Unit security research report
IntroductionThis report covers the research of the Mercedes-Benz Head Unit, which was...
2025-1-17 10:0:33 | 阅读: 13 |
收藏
|
Securelist - securelist.com
ud2
diagnostic
thrift
thriftme
database
EAGERBEE, with updated and novel components, targets the Middle East
IntroductionIn our recent investigation into the EAGERBEE backdoor, we found that it...
2025-1-6 08:0:7 | 阅读: 6 |
收藏
|
Securelist - securelist.com
eagerbee
memory
windows
c2
Threat landscape for industrial automation systems in Q3 2024
Statistics across all threatsIn the third quarter of 2024, the percentage of ICS comp...
2024-12-27 10:0:46 | 阅读: 4 |
收藏
|
Securelist - securelist.com
malicious
quarter
decreased
pp
lowest
Cloud Atlas seen using a new tool in its attacks
IntroductionKnown since 2014, Cloud Atlas targets Eastern Europe and Central Asia. We...
2024-12-23 10:0:46 | 阅读: 14 |
收藏
|
Securelist - securelist.com
vbshower
powershower
vbcloud
payload
c2
BellaCPP: Discovering a new BellaCiao variant written in C++
APT reports...
2024-12-20 10:0:27 | 阅读: 7 |
收藏
|
Securelist - securelist.com
bellaciao
microsoft
bellacpp
Attackers exploiting a patched FortiClient EMS vulnerability in the wild
IntroductionDuring a recent incident response, Kaspersky’s GERT team identified a set...
2024-12-19 12:0:20 | 阅读: 11 |
收藏
|
Securelist - securelist.com
hxxps
hxxp
clientsetup
attackers
Lazarus group evolves its infection chain with old and new malware
Over the past few years, the Lazarus group has been distributing its malicious softwar...
2024-12-19 10:0:55 | 阅读: 11 |
收藏
|
Securelist - securelist.com
cookieplus
c2
malicious
payload
loader
Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations
About C.A.SC.A.S (Cyber Anarchy Squad) is a hacktivist group that has been attacking...
2024-12-18 10:0:3 | 阅读: 7 |
收藏
|
Securelist - securelist.com
windows
attackers
registrykey
hacktivist
revenge
Download a banker to track your parcel
In late October 2024, a new scheme for distributing a certain Android banking Trojan c...
2024-12-17 08:21:36 | 阅读: 12 |
收藏
|
Securelist - securelist.com
mamont
victim
trojan
attackers
c2
Dark web threats and dark market predictions for 2025
Review of last year’s predictionsThe number of services providing AV evasion for malw...
2024-12-16 10:0:27 | 阅读: 7 |
收藏
|
Securelist - securelist.com
drainers
ransomware
markets
forums
stealers
Careto is back: what’s new after 10 years of silence?
During the first week of October, Kaspersky took part in the 34th Virus Bulletin Inter...
2024-12-12 18:0:16 | 阅读: 5 |
收藏
|
Securelist - securelist.com
attackers
worldclient
malicious
mdaemon
Story of the Year: global IT outages and supply chain attacks
A faulty update by cybersecurity firm CrowdStrike triggered one of the largest IT outa...
2024-12-9 18:0:52 | 阅读: 4 |
收藏
|
Securelist - securelist.com
security
disruptions
software
satellite
Exploits and vulnerabilities in Q3 2024
Q3 2024 saw multiple vulnerabilities discovered in Windows and Linux subsystems that a...
2024-12-6 18:0:20 | 阅读: 11 |
收藏
|
Securelist - securelist.com
attacker
windows
download
microsoft
Our secret ingredient for reverse engineering
Nowadays, a lot of cybersecurity professionals use IDA Pro as their primary tool for r...
2024-12-5 18:0:52 | 阅读: 6 |
收藏
|
Securelist - securelist.com
shellcode
hrtng
mp4
wp
Previous
1
2
3
4
5
6
7
8
Next