unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Managed Detection and Response in 2023
SOC, TI and IR posts...
2024-4-30 17:0:40 | 阅读: 3 |
收藏
|
Securelist - securelist.com
security
mdr
analysis
criticality
monitoring
Assessing the Y, and How, of the XZ Utils incident
High-end APT groups perform highly interesting social engineering campaigns in order t...
2024-4-24 18:10:31 | 阅读: 4 |
收藏
|
Securelist - securelist.com
xz
maintainer
jia
tan
jiat75
ToddyCat is making holes in your infrastructure
We continue covering the activities of the APT group ToddyCat. In our previous article...
2024-4-22 18:0:0 | 阅读: 3 |
收藏
|
Securelist - securelist.com
windows
attackers
remote
ssh
username
DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware
IntroductionIn February 2024, we discovered a new malware campaign targeting governme...
2024-4-18 18:0:7 | 阅读: 14 |
收藏
|
Securelist - securelist.com
c2
cr4t
payload
download
commonline
SoumniBot: the new Android banker’s unique techniques
The creators of widespread malware programs often employ various tools that hinder cod...
2024-4-17 18:0:28 | 阅读: 12 |
收藏
|
Securelist - securelist.com
soumnibot
trojan
victim
mqtt
Using the LockBit builder to generate targeted ransomware
The previous Kaspersky research focused on a detailed analysis of the LockBit 3.0 buil...
2024-4-15 18:0:28 | 阅读: 12 |
收藏
|
Securelist - securelist.com
lockbit
network
ransomware
attacker
remote
XZ backdoor story – Initial analysis
On March 29, 2024, a single message on the Openwall OSS-security mailing list marked a...
2024-4-12 16:0:34 | 阅读: 19 |
收藏
|
Securelist - securelist.com
xz
malicious
lzma
liblzma
cpuid
DinodasRAT Linux implant targeting entities worldwide
DinodasRAT, also known as XDealer, is a multi-platform backdoor written in C++ that of...
2024-3-28 21:0:51 | 阅读: 6 |
收藏
|
Securelist - securelist.com
c2
dinodasrat
windows
encryption
network
Android malware, Android malware and more Android malware
IntroductionMalware for mobile devices is something we come across very often. In 202...
2024-3-20 19:0:34 | 阅读: 9 |
收藏
|
Securelist - securelist.com
c2
tambir
gigabud
dwphon
collects
Threat landscape for industrial automation systems. H2 2023
Industrial threats...
2024-3-19 18:15:11 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
regions
malicious
ranked
threats
phishing
A patched Windows attack surface is still exploitable
On August 8, 2023, Microsoft finally released a kernel patch for a class of vulnerabil...
2024-3-14 18:0:24 | 阅读: 20 |
收藏
|
Securelist - securelist.com
windows
winsxs
wer
What’s in your notepad? Infected text editors target Chinese users
“Malvertising” is a popular way of attracting victims to malicious sites: an advertise...
2024-3-13 19:29:43 | 阅读: 22 |
收藏
|
Securelist - securelist.com
malicious
vnote
dpysmac64
download
geacon
The State of Stalkerware in 2023–2024
The State of Stalkerware in 2023 (PDF)The annual Kaspersky State of Stalkerware repor...
2024-3-13 16:0:40 | 阅读: 6 |
收藏
|
Securelist - securelist.com
stalkerware
percent
stalking
monitoring
respondents
Top 10 web application vulnerabilities in 2021–2023
To help companies with navigating the world of web application vulnerabilities and sec...
2024-3-12 18:0:58 | 阅读: 12 |
收藏
|
Securelist - securelist.com
download
security
gray
Spam and phishing in 2023
The year in figures45.60% of all email sent worldwide and 46.59% of all email sent i...
2024-3-7 18:0:53 | 阅读: 10 |
收藏
|
Securelist - securelist.com
phishing
victim
attackers
download
malicious
Network tunneling with… QEMU?
Research...
2024-3-5 16:0:14 | 阅读: 13 |
收藏
|
Securelist - securelist.com
network
netdev
attackers
machine
An educational robot security research
In the modern world, we are surrounded by a multitude of smart devices that simplify o...
2024-2-27 23:0:33 | 阅读: 2 |
收藏
|
Securelist - securelist.com
robot
toy
agora
network
security
The mobile malware threat landscape in 2023
The figures above are based on detection statistics received from Kaspersky users who...
2024-2-26 16:0:20 | 阅读: 8 |
收藏
|
Securelist - securelist.com
trojan
banker
turkey
spy
malicious
Coyote: A multi-stage banking Trojan abusing the Squirrel installer
The developers of banking Trojan malware are constantly looking for inventive ways to...
2024-2-8 18:0:36 | 阅读: 22 |
收藏
|
Securelist - securelist.com
trojan
coyote
loader
machine
attacker
ICS and OT threat predictions for 2024
Kaspersky Security Bulletin...
2024-1-31 18:0:45 | 阅读: 11 |
收藏
|
Securelist - securelist.com
security
vehicles
ransomware
hacktivist
Previous
1
2
3
4
5
6
7
8
Next