unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Verizon 2022 DBIR
Publications...
2022-5-25 23:57:59 | 阅读: 20 |
收藏
|
securelist.com
espionage
hacktivism
ransomware
defi
What’s wrong with automotive mobile apps?
IntroductionThe recent story about the 19-year-old hacker who took control of several...
2022-5-25 18:0:41 | 阅读: 18 |
收藏
|
securelist.com
vehicle
security
developers
b2b
automaker
ISaPWN – research on the security of ISaGRAF Runtime
Research...
2022-5-23 18:0:52 | 阅读: 21 |
收藏
|
securelist.com
isagraf
attacker
malicious
remote
Evaluation of cyber activities and the threat landscape in Ukraine
IntroductionWhen the war in Ukraine broke out, many analysts were surprised to discov...
2022-5-17 22:0:3 | 阅读: 30 |
收藏
|
securelist.com
ukraine
conflict
disruptive
cyberspace
discussions
HTML attachments in phishing e-mails
The use of embedded HTML documents in phishing e-mails is a standard technique employe...
2022-5-16 16:0:8 | 阅读: 34 |
收藏
|
securelist.com
phishing
attachment
fig
malicious
attackers
New ransomware trends in 2022
Ahead of the Anti-Ransomware Day, we summarized the tendencies that characterize ranso...
2022-5-11 20:0:23 | 阅读: 25 |
收藏
|
securelist.com
ransomware
ukraine
fendr
conflict
lockbit
Mobile subscription Trojans and their little tricks
Billing fraud is one of the most common sources of income for cybercriminals. There ar...
2022-5-6 18:0:47 | 阅读: 40 |
收藏
|
securelist.com
trojan
grifthorse
jocker
trojans
mobok
A new secret stash for “fileless” malware
In February 2022 we observed the technique of putting the shellcode into Windows event...
2022-5-4 18:0:59 | 阅读: 40 |
收藏
|
securelist.com
trojan
windows
c2
shellcode
stage
APT trends report Q1 2022
For five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been pu...
2022-4-27 18:0:34 | 阅读: 26 |
收藏
|
securelist.com
malicious
ukraine
attackers
wiper
windows
DDoS attacks in Q1 2022
News overviewThe DDoS landscape in Q1 2022 was shaped by the ongoing conflict between...
2022-4-25 18:0:41 | 阅读: 25 |
收藏
|
securelist.com
q1
download
quarter
q4
ukrainian
How to recover files encrypted by Yanlouwang
Yanluowang is a type of targeted ransomware discovered by the Symantec Threat Hunter t...
2022-4-18 18:0:19 | 阅读: 22 |
收藏
|
securelist.com
ransomware
yanluowang
security
encryption
sosemanuk
How to recover files encrypted by Yanluowang
Yanluowang is a type of targeted ransomware discovered by the Symantec Threat Hunter t...
2022-4-18 18:0:19 | 阅读: 11 |
收藏
|
securelist.com
ransomware
yanluowang
security
encryption
sosemanuk
Emotet modules and recent attacks
Emotet was first found in the wild in 2014. Back then its main functionality was steal...
2022-4-13 18:0:57 | 阅读: 25 |
收藏
|
securelist.com
c2
thunderbird
mails
payload
extracts
The State of Stalkerware in 2021
The state of stalkerware in 2021 (PDF)Main findings of 2021Every year Kaspersky ana...
2022-4-12 17:0:52 | 阅读: 24 |
收藏
|
securelist.com
stalkerware
violence
security
america
A Bad Luck BlackCat
In early December 2021, a new ransomware actor started advertising its services on a R...
2022-4-7 18:0:19 | 阅读: 30 |
收藏
|
securelist.com
ransomware
blackcat
encryption
windows
fendr
Spring4Shell (CVE-2022-22965): details and mitigations
Incidents...
2022-4-4 23:30:36 | 阅读: 46 |
收藏
|
securelist.com
22965
cloud
remote
22963
Lazarus Trojanized DeFi app for delivering malware
For the Lazarus threat actor, financial gain is one of the prime motivations, with a p...
2022-3-31 20:0:23 | 阅读: 46 |
收藏
|
securelist.com
c2
trojanized
stage
defi
victim
Phishing-kit market: what’s inside “off-the-shelf” phishing packages
What are phishing kits?One of the most common tricks scammers use in phishing attacks...
2022-3-24 18:0:40 | 阅读: 36 |
收藏
|
securelist.com
phishing
kits
attackers
loaded
caesar
CVE-2022-0847 aka Dirty Pipe vulnerability in Linux kernel
Software...
2022-3-14 22:11:7 | 阅读: 51 |
收藏
|
securelist.com
0847
dirty
security
heur
attackers
Webinar on cyberattacks in Ukraine – summary and Q&A
About the webinarOn March 10, 2022 Kaspersky’s Global Research and Analysis Team (GRe...
2022-3-14 18:0:34 | 阅读: 53 |
收藏
|
securelist.com
ukraine
whispergate
attackers
honeypot
Previous
15
16
17
18
19
20
21
22
Next