unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Helldown Ransomware: an overview of this emerging threat
This report on Helldown was originally published for our customers on 14 November...
2024-11-19 16:1:25 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
ransomware
helldown
zyxel
analysis
darkrace
A three beats waltz: The ecosystem behind Chinese state-sponsored cyber threats
What's next...
2024-11-13 23:16:23 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
clickfix
tactic
mssp
outsourced
revenge
ClickFix tactic: Revenge of detection
This report on ClickFix was originally published for our customers on 22 October 2...
2024-11-5 16:16:22 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
clickfix
powershell
network
mshta
payload
ClickFix tactic: The Phantom Meet
Table of contentsContextClickFix in the wildChronological overview of ClickFix cam...
2024-10-17 16:46:26 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
clickfix
traffers
payload
sekoia
c2
Mastering SOC complexity: Optimizing access management with Sekoia Defend
Table of contentsManaging access across teams: The challenge in SOC modelsHow Seko...
2024-10-10 17:46:58 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
sekoia
defend
segregation
intakes
Mamba 2FA: A new contender in the AiTM phishing ecosystem
Table of contentsIntroductionCharacteristics of Mamba 2FA phishing pagesURL struct...
2024-10-7 21:17:1 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
phishing
mamba
sv
o365
2607
Getting started with Detection-as-Code and Sekoia Platform
Table of contentsIntroductionWhat is Detection-as-Code?Key benefits for MSSPs and...
2024-10-4 16:17:4 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
sigma
detections
github
repository
Hunting for IoCs: from singles searches to an automated and repeatable process
Table of contentsHow Sekoia can help you scale in IoC hunting and retro huntingKey...
2024-10-3 18:47:2 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
defend
threats
security
retro
Bulbature, beneath the waves of GobRAT
Key TakeawaysSince mid 2023, Sekoia Threat Detection & Research team (TDR)...
2024-10-2 16:17:1 | 阅读: 49 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
bulbature
gobrat
c238
staging
txt2023
Why it’s time to replace your legacy SIEM with a SOC platform
Table of contentsThe Evolution from Legacy SIEM to Modern SOC Platforms: Why Now I...
2024-9-30 17:31:59 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
migration
threats
processes
workflows
Hadooken and K4Spreader: The 8220 Gang’s Latest Arsenal
This report was originally published for our customers on 24 September 2024....
2024-9-30 16:17:15 | 阅读: 28 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
hadooken
8220
k4spreader
tsunami
windows
Navigating the NIS2 Directive: Key insights for cybersecurity compliance and how Sekoia.io can help
To read the French version the article, click here.The European Union (EU) ado...
2024-9-26 16:32:9 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
nis2
directive
security
sekoia
SilentSelfie: Uncovering a major watering hole campaign against Kurdish websites
Key TakeawaysIn early 2024, Sekoia Threat Detection & Research team (TDR) was...
2024-9-25 15:32:0 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
kurdish
rojnews
rojava
php
malicious
WebDAV-as-a-Service: Uncovering the infrastructure behind Emmenhtal loader distribution
This report was originally published for our customers on 30 August 2024.Table...
2024-9-19 16:2:5 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
webdav
malicious
emmenhtal
loader
mshta
A glimpse into the Quad7 operators’ next moves and associated botnets
Key TakeawaysThe Sekoia TDR team has recently identified new staging servers,...
2024-9-9 21:16:56 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
quad7
netd
alogin
updtae
fsynet
Enabling new service models with SSDP
Platform enabled servicesIn previous posts (see links below), I’ve outlined al...
2024-7-31 16:46:59 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
socs
Emulating and Detecting Scattered Spider-like Attacks
Written by Mitigant (Kennedy Torkura) and Sekoia.io Threat Detection and Research...
2024-7-24 17:17:6 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
cloud
security
attacker
mitigant
Solving the 7777 Botnet enigma: A cybersecurity quest
Table of contentsIntroductionAre all of these compromised TP-Links?First attempts...
2024-7-23 16:1:59 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
quad7
network
7777
routers
Technological Evolution and the Rise of Advanced Security Solutions for SMEs
The Modern Cybersecurity Landscape for SMEsIn today’s digital age, small and m...
2024-7-18 16:17:2 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
smes
security
sekoia
cloud
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign
This report was originally published for our customers on 20 June 2024.Tod...
2024-7-16 03:46:59 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
muddywater
muddyrot
reverse
sekoia
c2
Previous
-16
-15
-14
-13
-12
-11
-10
-9
Next