unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
IT threat evolution Q3 2024
IT threat evolution in Q3 2024IT threat evolution in Q3 2024. Non-mobile statisticsI...
2024-11-29 19:0:18 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
attackers
ransomware
loki
mare
hacktivist
IT threat evolution in Q3 2024. Mobile statistics
IT threat evolution in Q3 2024IT threat evolution in Q3 2024. Non-mobile statisticsI...
2024-11-29 19:0:17 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
trojan
banker
turkey
india
spy
IT threat evolution in Q3 2024. Non-mobile statistics
IT threat evolution in Q3 2024IT threat evolution in Q3 2024. Non-mobile statisticsI...
2024-11-29 19:0:16 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
ransomware
trojan
territory
territories
download
APT trends report Q3 2024
Kaspersky’s Global Research and Analysis Team (GReAT) has been releasing quarterly sum...
2024-11-28 18:15:14 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
ttps
malicious
attackers
p8
software
Consumer and privacy predictions for 2025
Overview of 2024 consumer cyberthreats and trends predictionsPart of the Kaspersky Se...
2024-11-27 18:15:16 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
anticipated
phishing
security
malicious
Analysis of Elpaco: a Mimic variant
IntroductionIn a recent incident response case, we dealt with a variant of the Mimic...
2024-11-26 18:0:57 | 阅读: 6 |
收藏
|
Securelist - securelist.com
elpaco
mimic
svhostss
analysis
ransomware
Advanced threat predictions for 2025
We at Kaspersky’s Global Research and Analysis Team monitor over 900 APT (advanced per...
2024-11-25 18:15:12 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
attackers
security
malicious
verdict
Scammer Black Friday offers: Online shopping threats and dark web sales
IntroThe e-commerce market continues to grow every year. According to FTI consulting,...
2024-11-19 18:0:0 | 阅读: 3 |
收藏
|
Securelist - securelist.com
phishing
friday
consumers
trojans
threats
Сrimeware and financial cyberthreats in 2025
Kaspersky Security Bulletin...
2024-11-14 17:0:26 | 阅读: 3 |
收藏
|
Securelist - securelist.com
ransomware
families
trojans
threats
upi
Threats in space (or rather, on Earth): internet-exposed GNSS receivers
What is GNSS?Global Navigation Satellite Systems (GNSS) are collections, or constella...
2024-11-13 18:0:14 | 阅读: 18 |
收藏
|
Securelist - securelist.com
gnss
receivers
satellite
receiver
usa
Ymir: new stealthy ransomware in the wild
IntroductionIn a recent incident response case, we discovered a new and notable ranso...
2024-11-11 18:0:57 | 阅读: 16 |
收藏
|
Securelist - securelist.com
powershell
analysis
ransomware
ymir
attackers
QSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaigns
IntroductionIn 2021, we began to investigate an attack on the telecom industry in Sou...
2024-11-8 18:0:15 | 阅读: 2 |
收藏
|
Securelist - securelist.com
qsc
windows
machine
l2schemas
network
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency
IntroductionIn August 2024, our team identified a new crimeware bundle, which we name...
2024-11-6 18:0:40 | 阅读: 9 |
收藏
|
Securelist - securelist.com
steelfox
hxxps
malicious
stage
foxit
Loose-lipped neural networks and lazy scammers
One topic being actively researched in connection with the breakout of LLMs is capabil...
2024-10-31 18:0:27 | 阅读: 6 |
收藏
|
Securelist - securelist.com
llm
llms
gitbook
delve
kucoin
Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses
IntroductionOrganizations often rely on a layered defense strategy, yet breaches stil...
2024-10-29 22:0:40 | 阅读: 5 |
收藏
|
Securelist - securelist.com
security
attacker
network
webs
software
Lumma/Amadey: fake CAPTCHAs want to know if you’re human
Attackers are increasingly distributing malware through a rather unusual method: a fak...
2024-10-29 18:0:31 | 阅读: 6 |
收藏
|
Securelist - securelist.com
captcha
attackers
malicious
trojan
amadey
The Crypto Game of Lazarus APT: Investors vs. Zero-days
IntroductionLazarus APT and its BlueNoroff subgroup are a highly sophisticated and mu...
2024-10-23 19:0:48 | 阅读: 5 |
收藏
|
Securelist - securelist.com
attackers
chrome
emptyarray
memory
Grandoreiro, the global trojan with grandiose ambitions
Grandoreiro is a well-known Brazilian banking trojan — part of the Tetrade umbrella —...
2024-10-23 02:0:17 | 阅读: 5 |
收藏
|
Securelist - securelist.com
grandoreiro
encryption
victim
trojan
security
Stealer here, stealer there, stealers everywhere!
IntroductionInformation stealers, which are used to collect credentials to then sell...
2024-10-21 18:0:47 | 阅读: 2 |
收藏
|
Securelist - securelist.com
stealer
kral
stealers
vidar
payload
Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia
Last December, we discovered a new group targeting Russian businesses and government a...
2024-10-18 18:0:47 | 阅读: 4 |
收藏
|
Securelist - securelist.com
attackers
windows
ghouls
Previous
-69
-68
-67
-66
-65
-64
-63
-62
Next