unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Good, the Bad and the Ugly in Cybersecurity – Week 35
The Good | International Operation Takes Down Multi-Layered Qakbot InfrastructureQakbot, a long-es...
2023-9-1 21:0:23 | 阅读: 17 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
qakbot
netscaler
barracuda
citrix
Endpoint, Identity and Cloud | Top Cyber Attacks of 2023 (So Far)
2023 has been no stranger to cyber threats and both the rates and sophistication of attacks launche...
2023-8-31 22:1:40 | 阅读: 16 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
cloud
threats
lockbit
cl0p
Threat Actor Interplay | Good Day’s Victim Portals and Their Ties to Cloak
Good Day ransomware, a variant within the ARCrypter family, was first observed in-the-wild in May o...
2023-8-30 22:10:27 | 阅读: 26 |
收藏
|
SentinelOne - www.sentinelone.com
victim
cloak
ransomware
arcrypter
portals
Bloated Binaries | How to Detect and Analyze Large macOS Malware Files
It wasn’t so long ago that malware authors, much like software developers, were concerned about the...
2023-8-29 21:48:37 | 阅读: 13 |
收藏
|
SentinelLabs - www.sentinelone.com
malicious
behavioral
ttp
analysis
ttps
Public Sector Cybersecurity | Why State & Local Governments Are at Risk
State and local governments have increasingly fallen prey to cybercriminals seeking to exploit ofte...
2023-8-28 20:49:34 | 阅读: 22 |
收藏
|
SentinelOne - www.sentinelone.com
security
governments
ransomware
The Good, the Bad and the Ugly in Cybersecurity – Week 34
The Good | Lapsus$ Teen Members Found Responsible for High-Profile Cyber Crime SpreeThis week, a L...
2023-8-25 21:0:26 | 阅读: 10 |
收藏
|
SentinelOne - www.sentinelone.com
xloader
kurtaj
analysis
quiterat
continued
Unweaving A Complex Web of Threats | Understanding Today’s Cyber Attacker Interdependency
The dynamics of cyber threats have taken on a new level of complexity, driven by the escalating int...
2023-8-24 21:25:3 | 阅读: 15 |
收藏
|
SentinelOne - www.sentinelone.com
malicious
criminal
affiliates
attackers
expertise
From Conti to Akira | Decoding the Latest Linux & ESXi Ransomware Families
The evolution of the ransomware landscape has seen a shift from the more traditional approach invol...
2023-8-23 20:59:44 | 阅读: 28 |
收藏
|
SentinelOne - www.sentinelone.com
locker
ransomware
encryption
abyss
akira
Cyber Attacks on Financial Institutions | Why Banks Are Caught in the Crosshairs
In recent years, there has been a significant uptick in the frequency and sophistication of attacks...
2023-8-22 21:32:2 | 阅读: 16 |
收藏
|
SentinelOne - www.sentinelone.com
network
regulatory
XLoader’s Latest Trick | New macOS Variant Disguised as Signed OfficeNote App
XLoader is a long-running malware-as-a-service infostealer and botnet that has been around in some...
2023-8-21 23:16:2 | 阅读: 27 |
收藏
|
SentinelOne - www.sentinelone.com
xloader
payload
officenote
hardcoded
developer
The Good, the Bad and the Ugly in Cybersecurity – Week 33
The Good | DigiHeals Aims to Boost Resilience of Healthcare Sector to Fight Off Cyber AttacksThe h...
2023-8-18 21:0:27 | 阅读: 15 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
security
phishing
citrix
exploited
Chinese Entanglement | DLL Hijacking in the Asian Gambling Sector
By Aleksandar Milenkoski and Tom HegelExecutive SummarySentinelLabs has identified suspected-Chi...
2023-8-17 17:55:8 | 阅读: 42 |
收藏
|
SentinelLabs - www.sentinelone.com
cobalt
c2
bronze
starlight
agentupdate
The New Frontline of Geopolitics | Understanding the Rise of State-Sponsored Cyber Attacks
The rise of nation-state cyber attacks has become a defining feature of modern geopolitics. With bl...
2023-8-16 22:23:6 | 阅读: 24 |
收藏
|
SentinelOne - www.sentinelone.com
espionage
sponsored
north
nation
security
Announcing Threat Detection for Amazon S3 | AI-Powered Data Protection
SentinelOne recently announced the launch of the new Singularity™ Cloud Data Security product line...
2023-8-15 20:58:21 | 阅读: 17 |
收藏
|
SentinelOne - www.sentinelone.com
buckets
cloud
security
singularity
scanned
Understanding XDR | A Guided Approach for Enterprise Leaders
Cyber adversaries operate with a level of finesse and precision that can catch organizations off gu...
2023-8-14 21:30:33 | 阅读: 16 |
收藏
|
SentinelOne - www.sentinelone.com
security
threats
network
cloud
The Good, the Bad and the Ugly in Cybersecurity – Week 32
The Good | White House Launches AI-Centric Cybersecurity Contest to Protect US EntitiesThe Biden-H...
2023-8-11 23:39:42 | 阅读: 26 |
收藏
|
SentinelOne - www.sentinelone.com
software
windows
aixcc
north
Day 2 of Black Hat USA 2023 | Exploring The Power of a Threat Intel & AI-Driven Future
What a few days it was at this year’s BlackHat cyber event in sunny Las Vegas! The stunning Sentine...
2023-8-11 17:0:28 | 阅读: 30 |
收藏
|
SentinelOne - www.sentinelone.com
purpleai
security
noetic
mandiant
ventures
Day 1 of Black Hat USA 2023 | Generative AI, Automation & The Security Landscape of Tomorrow
SentinelOne has landed in Vegas for this year’s Black Hat security conference! Each year, Black Hat...
2023-8-10 20:1:51 | 阅读: 15 |
收藏
|
SentinelOne - www.sentinelone.com
security
chatgpt
ranger
llms
guerrero
LOLKEK Unmasked | An In-Depth Analysis of New Samples and Evolving Tactics
Awareness of the newest shifts and patterns is vital in the fast-changing world of cyber threats. T...
2023-8-9 23:29:27 | 阅读: 19 |
收藏
|
SentinelOne - www.sentinelone.com
lolkek
ransomware
victim
Enterprise Security Essentials | Top 12 Most Routinely Exploited Vulnerabilities
Leveraging known bugs and unpatched exploits continue to be an unyielding strategy for threat actor...
2023-8-8 21:43:1 | 阅读: 14 |
收藏
|
SentinelOne - www.sentinelone.com
exploited
microsoft
security
attackers
Previous
15
16
17
18
19
20
21
22
Next