unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack
Incidents...
2023-4-3 20:10:52 | 阅读: 25 |
收藏
|
Securelist - securelist.com
gopuram
payload
3cx
shellcode
txr
Selecting the right MSSP: Guidelines for making an objective decision
SOC, TI and IR posts...
2023-3-30 18:0:6 | 阅读: 23 |
收藏
|
Securelist - securelist.com
mssp
security
expertise
analysis
monitoring
Financial cyberthreats in 2022
Financial gain remains the key driver of cybercriminal activity. In the past year, we’...
2023-3-29 18:0:2 | 阅读: 20 |
收藏
|
Securelist - securelist.com
phishing
trojan
banker
security
families
Copy-paste heist or clipboard-injector attacks on cryptousers
It is often the case that something new is just a reincarnation of something old. We h...
2023-3-28 18:0:8 | 阅读: 25 |
收藏
|
Securelist - securelist.com
clipboard
np
hj
payload
trojanized
How scammers employ IPFS for email phishing
The idea of creating Web 3.0 has been around since the end of 2000s. The new version o...
2023-3-27 16:0:48 | 阅读: 22 |
收藏
|
Securelist - securelist.com
ipfs
phishing
letters
cid
employ
Understanding metrics to measure SOC effectiveness
The security operations center (SOC) plays a critical role in protecting an organizati...
2023-3-24 16:0:56 | 阅读: 20 |
收藏
|
Securelist - securelist.com
metric
security
monitoring
measuring
goals
Developing an incident response playbook
An incident response playbook is a predefined set of actions to address a specific sec...
2023-3-23 16:0:0 | 阅读: 22 |
收藏
|
Securelist - securelist.com
playbook
containment
phases
security
analysis
Bad magic: new APT found in the area of Russo-Ukrainian conflict
Since the start of the Russo-Ukrainian conflict, Kaspersky researchers and the interna...
2023-3-21 16:0:37 | 阅读: 29 |
收藏
|
Securelist - securelist.com
powermagic
malicious
commonmagic
decoy
binst
Business on the dark web: deals and regulatory mechanisms
Research...
2023-3-15 18:0:35 | 阅读: 21 |
收藏
|
Securelist - securelist.com
escrow
deals
parties
arbiter
download
Malvertising through search engines
In recent months, we observed an increase in the number of malicious campaigns that us...
2023-3-9 18:0:18 | 阅读: 30 |
收藏
|
Securelist - securelist.com
software
download
blender
malicious
powershell
The state of stalkerware in 2022
The state of stalkerware in 2022 (PDF)Main findings of 2022The State of Stalkerware...
2023-3-8 18:0:44 | 阅读: 18 |
收藏
|
Securelist - securelist.com
stalkerware
america
security
victim
brazil
Threat landscape for industrial automation systems for H2 2022
Year 2022 in numbersParameterH1 2022H2 20222022Percentage of attacked ICS co...
2023-3-6 18:0:45 | 阅读: 18 |
收藏
|
Securelist - securelist.com
malicious
regions
ranked
removable
ranking
The mobile malware threat landscape in 2022
These statistics are based on detection verdicts of Kaspersky products received from u...
2023-2-27 18:5:35 | 阅读: 22 |
收藏
|
Securelist - securelist.com
trojan
trojans
banker
ransomware
installers
Spam and phishing in 2022
Figures of the yearIn 2022:48.63% of all emails around the world and 52.78% of all...
2023-2-16 16:0:7 | 阅读: 28 |
收藏
|
Securelist - securelist.com
phishing
victim
offered
malicious
attackers
IoC detection experiments with ChatGPT
ChatGPT is a groundbreaking chatbot powered by the neural network-based language model...
2023-2-15 18:0:53 | 阅读: 43 |
收藏
|
Securelist - securelist.com
chatgpt
powershell
malicious
security
positives
Good, Perfect, Best: how the analyst can enhance penetration testing results
Penetration testing is something that many (of those who know what a pentest is) see a...
2023-2-10 18:0:33 | 阅读: 16 |
收藏
|
Securelist - securelist.com
client
security
network
pentesters
Web beacons on websites and in e-mail
There is a vast number of trackers, which gather information about users’ activities o...
2023-2-7 16:0:9 | 阅读: 27 |
收藏
|
Securelist - securelist.com
beacons
beacon
trackers
twenty
advertising
Prilex modification now targeting contactless credit card transactions
Prilex is a singular threat actor that has evolved from ATM-focused malware into uniqu...
2023-1-31 16:0:41 | 阅读: 15 |
收藏
|
Securelist - securelist.com
prilex
contactless
chip
tap
rfid
Come to the dark side: hunting IT professionals on the dark web
The dark web is a collective name for a variety of websites and marketplaces that brin...
2023-1-30 18:0:30 | 阅读: 32 |
收藏
|
Securelist - securelist.com
employment
salary
posting
employers
What your SOC will be facing in 2023
As the role of cybersecurity in large businesses increases remarkably year over year,...
2023-1-23 18:0:8 | 阅读: 17 |
收藏
|
Securelist - securelist.com
socs
telecom
threats
10k
growth
Previous
10
11
12
13
14
15
16
17
Next