unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Threat landscape for industrial automation systems, H2 2021
2021 is the second year we have spent living and working in the pandemic. By 2021 ever...
2022-3-3 18:0:51 | 阅读: 24 |
收藏
|
securelist.com
malicious
download
network
ransomware
increases
Elections GoRansom – a smoke screen for the HermeticWiper attack
Executive summaryOn February 24, 2022, Avast Threat Research published a tweet announ...
2022-3-1 21:30:6 | 阅读: 16 |
收藏
|
securelist.com
elections
ransomware
analysis
Financial cyberthreats in 2021
The year 2021 was eventful in terms of digital threats for organizations and individua...
2022-2-23 18:0:42 | 阅读: 16 |
收藏
|
securelist.com
phishing
download
threats
security
schemes
Mobile malware evolution 2021
These statistics are based on detection verdicts of Kaspersky products received from u...
2022-2-21 22:0:42 | 阅读: 49 |
收藏
|
securelist.com
trojan
trojans
banker
ransomware
threats
DDoS attacks in Q4 2021
News roundupQ4 2021 saw the appearance of several new DDoS botnets. A zombie network,...
2022-2-10 18:0:4 | 阅读: 31 |
收藏
|
securelist.com
q4
quarter
botnets
download
c2
Spam and phishing in 2021
Figures of the yearIn 2021:56% of e-mails were spam77% of spam was sent from Russi...
2022-2-9 18:0:28 | 阅读: 21 |
收藏
|
securelist.com
phishing
malicious
mails
attackers
download
Roaming Mantis reaches Europe
Roaming Mantis is a malicious campaign that targets Android devices and spreads mobile...
2022-2-7 18:0:6 | 阅读: 18 |
收藏
|
securelist.com
wroba
mantis
roaming
payload
landing
Telehealth: A New Frontier in Medicine—and Security
Telehealth today doesn’t just involve chatting with a doctor via a video-conferencing...
2022-2-1 18:0:37 | 阅读: 16 |
收藏
|
securelist.com
telehealth
security
mqtt
wearable
MoonBounce: the dark side of UEFI firmware
What happened?At the end of 2021, we were made aware of a UEFI firmware-level comprom...
2022-1-20 18:0:11 | 阅读: 80 |
收藏
|
securelist.com
moonbounce
firmware
windows
network
Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks
Main factsKaspersky ICS CERT has uncovered a number of spyware campaigns targeting i...
2022-1-19 18:0:13 | 阅读: 19 |
收藏
|
securelist.com
spyware
c2
sold
abused
The BlueNoroff cryptocurrency hunt is still on
BlueNoroff is the name of an APT group coined by Kaspersky researchers while investiga...
2022-1-13 17:0:23 | 阅读: 34 |
收藏
|
securelist.com
bluenoroff
windows
powershell
remote
vc
Choosing Christmas gifts for kids: Squid Game and Huggy Wuggy are trending
As the holidays approach, many of us are trying to figure out what to buy our family a...
2021-12-22 18:0:15 | 阅读: 105 |
收藏
|
securelist.com
youtube
movies
cartoons
squid
korean
Answering Log4Shell-related questions
Publications...
2021-12-20 23:45:30 | 阅读: 26 |
收藏
|
securelist.com
log4j
log4shell
library
jndi
software
How and why do we attack our own Anti-Spam?
We often use machine-learning (ML) technologies to improve the quality of cybersecurit...
2021-12-20 18:0:57 | 阅读: 22 |
收藏
|
securelist.com
mails
poisoned
poisoning
victim
machine
PseudoManuscrypt: a mass-scale spyware attack campaign
Industrial threats...
2021-12-16 19:00:19 | 阅读: 29 |
收藏
|
securelist.com
software
pirated
loader
manuscrypt
Kaspersky Security Bulletin 2021. Statistics
Kaspersky Security Bulletin...
2021-12-15 19:26:23 | 阅读: 39 |
收藏
|
securelist.com
security
malicious
bulletin
globe
ksn
Kaspersky Managed Detection and Response: interesting cases
Kaspersky Managed Detection and Response (MDR) provides advanced protection against th...
2021-12-15 19:26:19 | 阅读: 23 |
收藏
|
securelist.com
windows
mdr
attacker
memory
spoolsv
Owowa: the add-on that turns your OWA into a credential stealer and remote access panel
While looking for potentially malicious implants that targeted Microsoft Exchange serv...
2021-12-14 21:17:04 | 阅读: 28 |
收藏
|
securelist.com
owowa
malicious
owa
s3crt
username
CVE-2021-44228 vulnerability in Apache Log4j library
Incidents...
2021-12-13 23:04:06 | 阅读: 82 |
收藏
|
securelist.com
library
log4j
jndi
remote
security
The life cycle of phishing pages
IntroductionIn this study, we analyzed how long phishing pages survive as well as the...
2021-12-09 19:00:08 | 阅读: 34 |
收藏
|
securelist.com
gtlds
phishing
cheap
cctlds
inactive
Previous
16
17
18
19
20
21
22
23
Next