unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Careto is back: what’s new after 10 years of silence?
During the first week of October, Kaspersky took part in the 34th Virus Bulletin Inter...
2024-12-12 18:0:16 | 阅读: 9 |
收藏
|
Securelist - securelist.com
attackers
worldclient
malicious
mdaemon
Story of the Year: global IT outages and supply chain attacks
A faulty update by cybersecurity firm CrowdStrike triggered one of the largest IT outa...
2024-12-9 18:0:52 | 阅读: 8 |
收藏
|
Securelist - securelist.com
security
disruptions
software
satellite
Exploits and vulnerabilities in Q3 2024
Q3 2024 saw multiple vulnerabilities discovered in Windows and Linux subsystems that a...
2024-12-6 18:0:20 | 阅读: 15 |
收藏
|
Securelist - securelist.com
attacker
windows
download
microsoft
Our secret ingredient for reverse engineering
Nowadays, a lot of cybersecurity professionals use IDA Pro as their primary tool for r...
2024-12-5 18:0:52 | 阅读: 10 |
收藏
|
Securelist - securelist.com
shellcode
hrtng
mp4
wp
Kaspersky Security Bulletin 2024. Statistics
Kaspersky Security Bulletin...
2024-12-4 18:0:37 | 阅读: 11 |
收藏
|
Securelist - securelist.com
security
malicious
bulletin
globe
prevented
Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT
Recent months have seen a surge in mailings with lookalike email attachments in the fo...
2024-12-2 18:0:25 | 阅读: 4 |
收藏
|
Securelist - securelist.com
netsupport
hxxp
attackers
malicious
decoy
IT threat evolution Q3 2024
IT threat evolution in Q3 2024IT threat evolution in Q3 2024. Non-mobile statisticsI...
2024-11-29 19:0:18 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
attackers
ransomware
loki
mare
hacktivist
IT threat evolution in Q3 2024. Mobile statistics
IT threat evolution in Q3 2024IT threat evolution in Q3 2024. Non-mobile statisticsI...
2024-11-29 19:0:17 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
trojan
banker
turkey
india
spy
IT threat evolution in Q3 2024. Non-mobile statistics
IT threat evolution in Q3 2024IT threat evolution in Q3 2024. Non-mobile statisticsI...
2024-11-29 19:0:16 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
ransomware
trojan
territory
territories
download
APT trends report Q3 2024
Kaspersky’s Global Research and Analysis Team (GReAT) has been releasing quarterly sum...
2024-11-28 18:15:14 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
ttps
malicious
attackers
p8
software
Consumer and privacy predictions for 2025
Overview of 2024 consumer cyberthreats and trends predictionsPart of the Kaspersky Se...
2024-11-27 18:15:16 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
anticipated
phishing
security
malicious
Analysis of Elpaco: a Mimic variant
IntroductionIn a recent incident response case, we dealt with a variant of the Mimic...
2024-11-26 18:0:57 | 阅读: 15 |
收藏
|
Securelist - securelist.com
elpaco
mimic
svhostss
analysis
ransomware
Advanced threat predictions for 2025
We at Kaspersky’s Global Research and Analysis Team monitor over 900 APT (advanced per...
2024-11-25 18:15:12 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
attackers
security
malicious
verdict
Scammer Black Friday offers: Online shopping threats and dark web sales
IntroThe e-commerce market continues to grow every year. According to FTI consulting,...
2024-11-19 18:0:0 | 阅读: 8 |
收藏
|
Securelist - securelist.com
phishing
friday
consumers
trojans
threats
Сrimeware and financial cyberthreats in 2025
Kaspersky Security Bulletin...
2024-11-14 17:0:26 | 阅读: 7 |
收藏
|
Securelist - securelist.com
ransomware
families
trojans
threats
upi
Threats in space (or rather, on Earth): internet-exposed GNSS receivers
What is GNSS?Global Navigation Satellite Systems (GNSS) are collections, or constella...
2024-11-13 18:0:14 | 阅读: 26 |
收藏
|
Securelist - securelist.com
gnss
receivers
satellite
receiver
usa
Ymir: new stealthy ransomware in the wild
IntroductionIn a recent incident response case, we discovered a new and notable ranso...
2024-11-11 18:0:57 | 阅读: 23 |
收藏
|
Securelist - securelist.com
powershell
analysis
ransomware
ymir
attackers
QSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaigns
IntroductionIn 2021, we began to investigate an attack on the telecom industry in Sou...
2024-11-8 18:0:15 | 阅读: 7 |
收藏
|
Securelist - securelist.com
qsc
windows
machine
l2schemas
network
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency
IntroductionIn August 2024, our team identified a new crimeware bundle, which we name...
2024-11-6 18:0:40 | 阅读: 13 |
收藏
|
Securelist - securelist.com
steelfox
hxxps
malicious
stage
foxit
Loose-lipped neural networks and lazy scammers
One topic being actively researched in connection with the breakout of LLMs is capabil...
2024-10-31 18:0:27 | 阅读: 11 |
收藏
|
Securelist - securelist.com
llm
llms
gitbook
delve
kucoin
Previous
5
6
7
8
9
10
11
12
Next