unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
What Is Exposure Management and Why Does It Matter?
文章探讨了从传统漏洞管理向暴露管理转变的重要性。暴露管理通过整合资产、身份和风险关系,提供全面的攻击面视图,并结合业务上下文优先处理关键风险。这种方法帮助组织更高效地应对复杂威胁环境,并为不同层级的安全团队提供统一的视角和行动指南。...
2025-3-17 13:0:0 | 阅读: 3 |
收藏
|
Tenable Blog - www.tenable.com
security
exposure
leaders
exposures
Cybersecurity Snapshot: Medusa Ransomware Impacting Critical Infrastructure, CISA Warns, While NIST Selects New Quantum-Resistant Algorithm
文章概述了六个关键网络安全议题:Medusa勒索软件攻击、抗量子加密算法标准化、Tenable对DeepSeek生成恶意软件能力的研究、开源软件风险管理报告、漏洞优先级调查结果以及CIS基准更新。...
2025-3-14 13:0:0 | 阅读: 15 |
收藏
|
Tenable Blog - www.tenable.com
software
security
tenable
benchmarks
ransomware
DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware
DeepSeek R1 can be utilized to generate code for both keyloggers and ransomware with some manual adjustments. Here's a concise summary: ### Keylogger Development: - **Methodology**: Utilizes `SetWindowsHookEx` for global keystroke capture. - **Stealth Techniques**: Hides the application window using `WS_EX_TOOLWINDOW` and `ShowWindow(g_hwnd, SW_HIDE);`. - **Log File Obfuscation**: Sets file attributes to hidden and system (`FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_SYSTEM`). - **Encryption**: Employs simple XOR encryption for basic obfuscation. ### Ransomware Development: - **Persistence**: Adds registry entry for startup persistence. - **User Interaction**: Displays a ransom message via `MessageBox`. - **File Handling**: Enumerates files using `EnumFileAPI` and encrypts them with AES128-CBC. - **Key Management**: Generates random keys for encryption. ### Challenges: - **Manual Fixes**: Initial code from DeepSeek requires corrections for errors like incorrect API usage. - **Ethical Considerations**: Highlighted legal and ethical implications of developing such tools. In conclusion, while DeepSeek provides foundational code structures for malicious software development, achieving fully functional and stealthy implementations demands significant manual effort and understanding of underlying principles....
2025-3-13 13:0:0 | 阅读: 36 |
收藏
|
Tenable Blog - www.tenable.com
deepseek
ransomware
hhook
pfile
cot
Microsoft’s March 2025 Patch Tuesday Addresses 56 CVEs (CVE-2025-26633, CVE-2025-24983, CVE-2025-24993)
微软在2025年3月的补丁更新中修复了56个安全漏洞,包括7个零日漏洞(其中6个已被野外利用),涉及远程代码执行、权限提升等高风险问题,并影响多个产品组件如Windows、Office及Azure服务等。...
2025-3-11 17:33:45 | 阅读: 140 |
收藏
|
Tenable Blog - www.tenable.com
microsoft
windows
exploited
attacker
Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros
Check out best practices for shoring up data security and reducing cyber risk. Plus, get tips on how...
2025-3-7 14:0:0 | 阅读: 11 |
收藏
|
Tenable Blog - www.tenable.com
security
cloud
tenable
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited
Broadcom披露VMware多款产品存在三个零日漏洞(CVE-2025-22224/22225/22226),涉及堆溢出、任意写入和信息泄露风险。微软威胁情报中心发现这些漏洞被野外利用。VMware已发布补丁修复问题,建议用户尽快更新以防范潜在攻击。...
2025-3-4 20:15:40 | 阅读: 34 |
收藏
|
Tenable Blog - www.tenable.com
tenable
workstation
22224
broadcom
Creating Elegant Azure Custom Roles: Putting NotActions into Action!
文章探讨了在 Azure 中创建自定义角色的复杂性,并介绍了如何通过 `NotActions` 和 `NotDataActions` 属性简化流程。Tenable Cloud Security 利用这些属性生成高效、易管理的最小权限角色,显著减少配置文件大小并提高安全性。...
2025-3-4 14:0:0 | 阅读: 18 |
收藏
|
Tenable Blog - www.tenable.com
notactions
security
cloud
microsoft
tenable
Cybersecurity Snapshot: OpenSSF Unveils Framework for Securing Open Source Projects, While IT-ISAC Says AI Makes Ransomware Stealthier
文章介绍了新的开源项目安全框架、AI在勒索软件中的应用、负责任AI的挑战、安全工具泛滥、勒索软件攻击激增及朝鲜政府参与加密货币盗窃等网络安全议题。...
2025-2-28 14:0:0 | 阅读: 19 |
收藏
|
Tenable Blog - www.tenable.com
ransomware
security
software
tenable
Identity Security Is the Missing Link To Combatting Advanced OT Threats
日益复杂的网络威胁尤其是"living-off-the-land"(LotL)攻击正利用身份漏洞入侵关键基础设施。这些攻击利用现有工具而非恶意软件以规避检测,在OT环境中尤其危险因 legacy系统缺乏监控且常与IT共享资源。强化身份安全与统一暴露管理可帮助检测、优先处理及缓解跨IT与OT环境的风险。...
2025-2-26 14:0:0 | 阅读: 17 |
收藏
|
Tenable Blog - www.tenable.com
security
attackers
exposure
tenable
identify
Identity Is the New Battleground: Why Proactive Security Is the Way Forward
文章指出身份安全面临多重挑战:身份蔓延导致盲点增加攻击面;传统安全措施难以应对AI驱动的复杂攻击;需采取主动策略并借助工具如Tenable Identity 360进行风险评估和管理以加强防护。...
2025-2-24 14:0:0 | 阅读: 11 |
收藏
|
Tenable Blog - www.tenable.com
security
attackers
identities
exposure
proactive
Cybersecurity Snapshot: Ghost Ransomware Group Targets Known Vulns, CISA Warns, While Report Finds Many Cyber Pros Want To Switch Jobs
文章讨论了Ghost勒索软件团伙利用已知漏洞攻击组织的问题,并提供了缓解建议。同时,探讨了如何吸引和留住网络安全人才的方法,并介绍了CIS关于恶意软件的最新报告、AI安全黑客马拉松、更新后的CIS基准以及国际执法行动打击勒索软件团伙的情况。...
2025-2-21 14:0:0 | 阅读: 26 |
收藏
|
Tenable Blog - www.tenable.com
security
ransomware
benchmarks
software
How To Reduce DNS Infrastructure Risk To Secure Your Cloud Attack Surface
文章探讨了DNS基础设施管理不当带来的安全风险,特别是随着云服务的扩展。DNS漏洞可能导致子域名被接管,进而引发钓鱼、邮件劫持、跨站脚本攻击等威胁。文章还介绍了如何通过最佳实践和Tenable插件检测、预防和缓解这些风险。...
2025-2-19 14:0:0 | 阅读: 18 |
收藏
|
Tenable Blog - www.tenable.com
cloud
subdomain
security
cname
attacker
Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat
本文总结了六项网络安全关键议题:美国政府呼吁采用安全编码实践以防止缓冲区溢出攻击;欧洲刑警组织建议金融机构为量子计算威胁做好准备;Tenable调查显示云安全仍是主要挑战;Google报告强调国际合作对打击网络犯罪的重要性;美国两党提出法案以加重网络犯罪惩罚;NCC Group报告指出2024年勒索软件攻击激增15%。...
2025-2-14 14:0:0 | 阅读: 22 |
收藏
|
Tenable Blog - www.tenable.com
security
ransomware
overflow
tenable
cloud
Frequently Asked Questions About DeepSeek Large Language Model (LLM)
文章介绍了DeepSeek开源大语言模型及其V3和R1版本的技术特点与性能优势,并探讨了运行要求、与其他模型的差异及安全隐私问题。部分国家和地区已禁止或考虑禁止使用DeepSeek。...
2025-2-13 14:30:0 | 阅读: 18 |
收藏
|
Tenable Blog - www.tenable.com
deepseek
llms
tenable
security
reasoning
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)
微软在2025年2月修复了55个CVE漏洞,其中包括3个关键漏洞和4个零日漏洞(其中两个已被利用)。受影响的组件包括Active Directory、Azure、Office和Windows等。远程代码执行(RCE)占38.2%,权限提升(EoP)占34.5%。...
2025-2-11 18:44:43 | 阅读: 212 |
收藏
|
Tenable Blog - www.tenable.com
tenable
microsoft
security
nessus
cloud
Cybersecurity Snapshot: Cyber Agencies Offer Best Practices for Network Edge Security, While OWASP Ranks Top Risks of Non-Human Identities
Check out recommendations from CISA and others on how to protect network edge devices and applicatio...
2025-2-7 15:0:0 | 阅读: 25 |
收藏
|
Tenable Blog - www.tenable.com
security
ransomware
nhis
refers
cmc
Tenable Supercharges Exposure Management with Acquisition of Vulcan Cyber
2025-2-7 14:19:0 | 阅读: 20 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
cloud
nessus
exposure
CISA Releases FOCAL Plan to Help Federal Agencies Reduce Cyber Risk
2025-2-4 14:0:0 | 阅读: 26 |
收藏
|
Tenable Blog - www.tenable.com
focal
security
tenable
operational
Cybersecurity Snapshot: CSA Offers Tips for Deploying AI Securely, While Deloitte Says Cyber Teams’ GenAI Use Yields Top ROI
Check out the Cloud Security Alliance’s recommendations for rolling out AI apps securely. Meanwhile,...
2025-1-31 14:0:0 | 阅读: 21 |
收藏
|
Tenable Blog - www.tenable.com
security
generative
ciso
cxos
What Makes This “Data Privacy Day” Different?
As we celebrate Data Privacy Day, Bernard Montel, Tenable’s EMEA Technical Director and Security Str...
2025-1-28 05:1:0 | 阅读: 26 |
收藏
|
Tenable Blog - www.tenable.com
cloud
security
tenable
posture
dspm
Previous
8
9
10
11
12
13
14
15
Next