unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Gartner Summit 2023 Recap | Maximizing Value In Defense of the Enterprise
Gartner’s annual Security & Risk Management Summit hosted this week drew in more than 4300 attendee...
2023-6-9 20:44:0 | 阅读: 17 |
收藏
|
SentinelOne - www.sentinelone.com
security
cloud
leaders
threats
macOS 14 Sonoma | Toughening up macOS for the Enterprise?
At WWDC23 this week, Apple made some big announcements across its product lines and maintained its...
2023-6-8 21:56:47 | 阅读: 22 |
收藏
|
SentinelOne - www.sentinelone.com
sonoma
passkeys
macs
workplace
MOVEit Transfer Exploited to Drop File-Stealing SQL Shell
By Alex Delamotte and James HaughomSentinelOne has observed in-the-wild (ITW) exploitation of CVE-...
2023-6-7 21:55:2 | 阅读: 33 |
收藏
|
SentinelOne - www.sentinelone.com
moveit
royq2cir
windows
w3wp
ransomware
Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence
Executive SummarySentinelLabs has been tracking a social engineering campaign by the North Korean...
2023-6-6 18:55:44 | 阅读: 36 |
收藏
|
SentinelLabs - www.sentinelone.com
nk
north
nknews
reconshark
korea
Compliance in the Cloud | Navigating the Complexities of Cloud Security Regulations
Enterprise businesses continue to undergo digital transformations, finding new ways to connect with...
2023-6-5 20:6:18 | 阅读: 19 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
security
regulations
network
guidelines
The Good, the Bad and the Ugly in Cybersecurity – Week 22
Breached | Data of 478,000 RaidForum Users Exposed OnlineThe tables turned on cybercriminals this...
2023-6-2 21:0:59 | 阅读: 31 |
收藏
|
SentinelOne - www.sentinelone.com
python
raidforums
moveit
security
malicious
Securing the Cloud in Modern Times | How Businesses Can Build Cohesive Cloud-Native Security Strategies
Cloud security remains front of mind for global enterprise leaders as more businesses migrate to pu...
2023-6-1 20:1:9 | 阅读: 18 |
收藏
|
SentinelOne - www.sentinelone.com
security
cloud
development
containers
Radare2 Power Ups | Delivering Faster macOS Malware Analysis With r2 Customization
In previous posts, we’ve explored how analysts can use radare2 (aka r2) for macOS malware triage, w...
2023-5-31 21:55:31 | 阅读: 26 |
收藏
|
SentinelLabs - www.sentinelone.com
macros
radare2
aliases
radiff2
analysis
Navigating the Cybersecurity Twitterverse | 23 Influential Accounts to Follow in 2023
Since our last post showcasing prominent cybersecurity accounts worth your follow, Twitter has occu...
2023-5-30 02:47:24 | 阅读: 22 |
收藏
|
SentinelOne - www.sentinelone.com
security
analysis
reverse
conferences
The Good, the Bad and the Ugly in Cybersecurity – Week 21
Private Sector Offensive Actor | FinFisher Execs Charged for Selling Spyware to TurkeyProsecutors...
2023-5-26 21:0:16 | 阅读: 24 |
收藏
|
SentinelOne - www.sentinelone.com
finfisher
liles
spyware
ransomware
warned
Operation Magalenha | Long-Running Campaign Pursues Portuguese Credentials and PII
By Aleksandar Milenkoski and Tom HegelExecutive SummaryOver the first quarter of 2023, SentinelL...
2023-5-25 18:55:11 | 阅读: 23 |
收藏
|
SentinelLabs - www.sentinelone.com
cdr
ams3
fra1
Evolution of Cloud Security | Looking At Cloud Posture Management Throughout the Decades
When cloud computing saw its earliest waves of adoption, businesses only had to decide whether or n...
2023-5-24 22:29:16 | 阅读: 27 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
security
threats
network
posture
Kimsuky | Ongoing Campaign Using Tailored Reconnaissance Toolkit
By Aleksandar Milenkoski and Tom HegelExecutive SummarySentinelLabs has observed an ongoing camp...
2023-5-23 19:23:42 | 阅读: 47 |
收藏
|
SentinelLabs - www.sentinelone.com
randomquery
korean
north
microsoft
malicious
SOC Team Power Up | 7 Practical Tips To Find and Stop Threats Faster with SentinelOne
In our recent series on Mastering the Art of SOC Analysis, we explored how aspiring SOC Analysts ca...
2023-5-22 21:4:12 | 阅读: 25 |
收藏
|
SentinelOne - www.sentinelone.com
identify
windows
lateral
network
malicious
The Good, the Bad and the Ugly in Cybersecurity – Week 20
Cyber Sanctions | Russian National Faces Multiple Charges for Ransomware OperationsThe US governme...
2023-5-19 21:0:21 | 阅读: 25 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
geacon
matveev
security
lockbit
LABScon Replay | Does This Look Infected 2 (APT41)
Does This Look Infected 2: this mp4 audio file was automatically transcribed by Sonix with the bes...
2023-5-18 21:25:1 | 阅读: 33 |
收藏
|
SentinelLabs - www.sentinelone.com
apt41
van
rufus
brown
log4j
Inside the Mind of a Cyber Attacker | Tactics, Techniques, and Procedures (TTPs) Every Security Practitioner Should Know
Tactics, techniques, and procedures (TTPs) are the blueprint of threat actors’ attacks – understand...
2023-5-17 20:41:55 | 阅读: 30 |
收藏
|
SentinelOne - www.sentinelone.com
security
ttps
attackers
network
LABScon Replay | Malshare: 10 Years of Running a Public Malware Repository
Malshare | 10 years of running a public malware repository: this mp4 audio file was automatically...
2023-5-16 21:43:15 | 阅读: 24 |
收藏
|
SentinelLabs - www.sentinelone.com
silas
cutler
malshare
repository
yeah
Geacon Brings Cobalt Strike Capabilities to macOS Threat Actors
The red-teaming and attack simulation tool Cobalt Strike has a long and widely observed history of...
2023-5-15 21:0:59 | 阅读: 35 |
收藏
|
SentinelOne - www.sentinelone.com
geacon
payload
securelink
cobalt
security
Celebrating Mothers of SentinelOne
As I prepare to celebrate my third Mother’s Day with two kids under three, I wonder how the time mo...
2023-5-14 23:32:20 | 阅读: 25 |
收藏
|
SentinelOne - www.sentinelone.com
drea
anastasija
mother
elena
alamelu
Previous
18
19
20
21
22
23
24
25
Next