unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Overlapping Cyber Strategies of Transparent Tribe and SideCopy Against India
Key Takeaways Cyble Research and Intelligence Labs (CRIL) recently uncovered a malicious w...
2024-5-15 00:46:20 | 阅读: 25 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
malicious
sidecopy
windows
lure
Threat Actor profile: SideCopy
Since early 2019, Operation SideCopy has remained active, exclusively targeting Indian defense forc...
2024-4-29 20:31:26 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
sidecopy
malicious
network
remote
india
Brokewell: A New Android Banking Trojan Targeting Users In Germany
Key TakeawaysA new Android Banking Trojan, “Brokewell”, was identified as distributing via...
2024-4-26 00:31:46 | 阅读: 44 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
brokewell
trojan
developer
loader
apk
LOCKBIT Black’s Legacy: Unraveling the DragonForce Ransomware Connection
ProductsSolutionsWhy Cyble?ResourcesBlogDisc...
2024-4-24 19:46:21 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
cyble
threats
studies
cril
Threat Actor Profile: TransparentTribe
TransparentTribe primarily targets Indian government organizations, military personnel, and def...
2024-4-19 12:46:14 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
malicious
tribe
phishing
network
Critical D-Link NAS vulnerability under active exploitation
Cyble Global Sensor Intelligence observed active exploitation of critical D-Link Vulnerability Rec...
2024-4-11 19:46:24 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
3273
security
eos
eol
network
FatalRAT’s New Prey: Cryptocurrency Users in the Crosshairs
Key Takeaways Cyble Research and Intelligence Labs (CRIL) has uncovered a novel phishing campaign...
2024-4-11 17:46:12 | 阅读: 30 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
clipper
fatalrat
clipboard
memory
malicious
Elevating the Stakes: The Enhanced Arsenal of the Fake E-Shop Campaign
Key Takeaways Once again, a fake e-shop campaign has been detected, this time targeting 18 Malaysi...
2024-4-3 15:16:11 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
hxxps
phishing
shop
banks
Solana Drainer’s Source Code Saga: Tracing Its Lineage to the Developers of MS Drainer
Key TakeawaysThreat actors (TAs) are actively exploiting platforms like Google Ads and soc...
2024-3-28 19:31:43 | 阅读: 67 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
drainer
solana
tas
phishing
malicious
WarzoneRAT Returns with Multi-Stage Attack Post FBI Seizure
Key Takeaways In February, the FBI took down the WarzoneRAT malware operation, seizing its infrast...
2024-3-28 01:16:9 | 阅读: 30 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
powershell
warzonerat
payload
avemaria
memory
CGSI Probes: ShadowSyndicate Group’s Possible Exploitation of Aiohttp Vulnerability (CVE-2024-23334)
Executive Summary In the last week of January 2024, a patch was released to address a vulnerability...
2024-3-15 13:46:13 | 阅读: 27 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
aiohttp
23334
ransomware
cgsi
Xehook Stealer: Evolution of Cinoshi’s Project Targeting Over 100 Cryptocurrencies and 2FA Extensions
Key Takeaways Xehook Stealer, discovered by CRIL in January 2024, is a .NET-based malware targetin...
2024-3-13 00:16:12 | 阅读: 29 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
stealer
xehook
agniane
payload
cinoshi
The Spreading Wave of Pig-Butchering Scams in India
Key Takeaways In India, there has been a noticeable surge in pig-butchering scam, specifically aim...
2024-3-7 22:46:9 | 阅读: 27 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
butchering
victim
pig
provex
fraudulent
JetBrains TeamCity Authentication Bypass vulnerability under Active Exploitation
Publicly available exploits incite unwarranted chaos Executive Summary On March 4, 2024, JetBrains...
2024-3-7 18:31:34 | 阅读: 23 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
teamcity
27198
jetbrains
SapphireStealer Sneaks In: Deceptive Legal Documents Prey on Russians
Key Takeaways Cyble Research and Intelligence Labs (CRIL) encountered an executable file obtained...
2024-3-7 00:1:18 | 阅读: 21 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
stealer
lure
tas
network
Cyble Chronicles – March 1st, 2024: Latest Findings & Recommendations for the Cybersecurity Community
Ongoing Phishing Campaign Targets Healthcare and Cryptocurrency Users via ScreenConnect...
2024-3-1 23:16:18 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
odin
cyble
ransomware
phishing
Ongoing Phishing Campaign Targets Healthcare and Cryptocurrency Users via ScreenConnect
read file error: read notes: is a directory...
2024-2-26 19:16:14 | 阅读: 25 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
phishing
tas
healthcare
client
Cyble Chronicles – February 23: Latest Findings & Recommendations for the Cybersecurity Community
The Fate of the CriminalMW Group: Endgame or a New Rebranding Journey?Recently, an...
2024-2-22 23:46:11 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
scoring
tangerine
security
posture
AsukaStealer, a Revamped Version of the ObserverStealer, Advertised as Malware-as-a-Service
On February 2, 2024, Cyble Research & Intelligence Labs (CRIL) identified a Malware-as-a-servic...
2024-2-20 15:31:36 | 阅读: 24 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
maas
The Fate of the CriminalMW Group: Endgame or a New Rebranding Journey?
Key Takeaways A recent discovery revealed a new version of the CriminalMW Android Banking...
2024-2-19 18:46:43 | 阅读: 45 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
criminalmw
sickodevz
goatrat
ats
pix
Previous
9
10
11
12
13
14
15
16
Next