unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Luna and Black Basta — new ransomware for Windows, Linux and ESXi
IntroductionIn our crimeware reporting service, we analyze the latest crime-related t...
2022-7-20 16:0:31 | 阅读: 28 |
收藏
|
securelist.com
ransomware
basta
luna
encryption
windows
Text-based fraud: from 419 scams to vishing
E-mail scammers typically combine social engineering with technical skills to bypass s...
2022-7-11 16:0:53 | 阅读: 24 |
收藏
|
securelist.com
mails
victim
419
attackers
vishing
Dynamic analysis of firmware components in IoT devices
Among the various offensive security techniques, vulnerability assessment takes priori...
2022-7-6 18:0:32 | 阅读: 21 |
收藏
|
securelist.com
qiling
firmware
renode
memory
emulation
The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact
Following on from our earlier Owowa discovery, we continued to hunt for more backdoors...
2022-6-30 16:0:35 | 阅读: 39 |
收藏
|
securelist.com
malicious
windows
godlike
The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs
Research...
2022-6-23 18:0:21 | 阅读: 41 |
收藏
|
securelist.com
ransomware
ttps
stages
analysis
ta505
APT ToddyCat
ToddyCat is a relatively new APT actor that we have not been able to relate to other k...
2022-6-21 18:0:37 | 阅读: 38 |
收藏
|
securelist.com
proxy
microsoft
payload
loader
stage
‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace
IntroductionWhen reports of a cyberattack appear in the headlines, questions abound r...
2022-6-20 18:0:7 | 阅读: 26 |
收藏
|
securelist.com
attribution
security
piracy
cooperation
nuclear
How much does access to corporate infrastructure cost?
Division of laborMoney has been and remains the main motivator for cybercriminals. Th...
2022-6-15 18:0:29 | 阅读: 24 |
收藏
|
securelist.com
network
translation
blackmailer
ransomware
usa
Router security in 2021
A router is a gateway from the internet to a home or office — despite being conceived...
2022-6-8 18:0:27 | 阅读: 15 |
收藏
|
securelist.com
routers
network
remote
security
CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction
Incidents...
2022-6-6 16:0:2 | 阅读: 16 |
收藏
|
securelist.com
msoffice
microsoft
30190
heur
msdt
WinDealer dealing on the side
IntroductionLuoYu is a lesser-known threat actor that has been active since 2008. It...
2022-6-2 18:0:30 | 阅读: 21 |
收藏
|
securelist.com
windealer
network
luoyu
hardcoded
attacker
IT threat evolution in Q1 2022. Mobile statistics
IT threat evolution in Q1 2022IT threat evolution in Q1 2022. Non-mobile statistics...
2022-5-27 16:0:46 | 阅读: 15 |
收藏
|
securelist.com
trojan
q1
trojans
banker
rkor
IT threat evolution Q1 2022
IT threat evolution in Q1 2022IT threat evolution in Q1 2022. Non-mobile statistics...
2022-5-27 16:0:43 | 阅读: 12 |
收藏
|
securelist.com
phishing
attackers
ukraine
kits
wiper
IT threat evolution in Q1 2022. Non-mobile statistics
IT threat evolution in Q1 2022IT threat evolution in Q1 2022. Non-mobile statistics...
2022-5-27 16:0:5 | 阅读: 15 |
收藏
|
securelist.com
q1
trojan
ransomware
download
threats
Managed detection and response in 2021
Publications...
2022-5-26 19:0:55 | 阅读: 18 |
收藏
|
securelist.com
mdr
moonbounce
defi
teaming
The Verizon 2022 DBIR
Publications...
2022-5-25 23:57:59 | 阅读: 16 |
收藏
|
securelist.com
espionage
hacktivism
ransomware
defi
What’s wrong with automotive mobile apps?
IntroductionThe recent story about the 19-year-old hacker who took control of several...
2022-5-25 18:0:41 | 阅读: 16 |
收藏
|
securelist.com
vehicle
security
developers
b2b
automaker
ISaPWN – research on the security of ISaGRAF Runtime
Research...
2022-5-23 18:0:52 | 阅读: 19 |
收藏
|
securelist.com
isagraf
attacker
malicious
remote
Evaluation of cyber activities and the threat landscape in Ukraine
IntroductionWhen the war in Ukraine broke out, many analysts were surprised to discov...
2022-5-17 22:0:3 | 阅读: 27 |
收藏
|
securelist.com
ukraine
conflict
disruptive
cyberspace
discussions
HTML attachments in phishing e-mails
The use of embedded HTML documents in phishing e-mails is a standard technique employe...
2022-5-16 16:0:8 | 阅读: 32 |
收藏
|
securelist.com
phishing
attachment
fig
malicious
attackers
Previous
11
12
13
14
15
16
17
18
Next