unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Threat landscape for industrial automation systems, Q2 2024
Industrial threats...
2024-9-26 16:0:48 | 阅读: 7 |
收藏
|
Securelist - securelist.com
pp
malicious
quarter
threats
stage
From 12 to 21: how we discovered connections between the Twelve and BlackJack groups
While analyzing attacks on Russian organizations, our team regularly encounters overla...
2024-9-25 18:0:19 | 阅读: 9 |
收藏
|
Securelist - securelist.com
blackjack
twelve
wiper
windows
ngrok
Web tracking report: who monitored users’ online activities in 2023–2024 the most
Web tracking has become a pervasive aspect of our online experience. Whether we’re bro...
2024-9-24 18:15:14 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
trackers
regions
download
advertising
dnt
How the Necro Trojan infiltrated Google Play, again
IntroductionWe sometimes come across modified applications when analyzing suspicious...
2024-9-23 18:15:14 | 阅读: 48 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
necro
trojan
loader
payload
c2
-=TWELVE=- is back
In the spring of 2024, posts with real people’s personal data began appearing on the -...
2024-9-20 20:31:34 | 阅读: 0 |
收藏
|
Securelist - securelist.com
windows
ransomware
netlogon
powershell
attackers
Exotic SambaSpy is now dancing with Italian users
IntroductionIn May 2024, we detected a campaign exclusively targeting victims in Ital...
2024-9-18 18:15:15 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
italian
malicious
sambaspy
attacker
Loki: a new private agent for the popular Mythic framework
In July 2024, we discovered the previously unknown Loki backdoor, which was used in a...
2024-9-9 15:15:14 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
loader
loki
mythic
c2
havoc
Tropic Trooper spies on government entities in the Middle East
Executive summaryTropic Trooper (also known as KeyBoy and Pirate Panda) is an APT gro...
2024-9-5 16:15:13 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
loader
trooper
tropic
1f
Mallox ransomware: in-depth analysis and evolution
Mallox is a sophisticated and dangerous family of malicious software that has been cau...
2024-9-4 18:15:17 | 阅读: 70 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
mallox
ransomware
victim
encryption
trojan
A deep dive into the most interesting incident response cases of last year
In 2023, Kaspersky’s Global Emergency Response Team (GERT) participated in services ar...
2024-9-3 19:15:14 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
gert
attackers
analysis
windows
payload
IT threat evolution Q2 2024
Targeted attacksXZ backdoor: a supply chain attack in the makingOn March 29, a messa...
2024-9-3 16:15:15 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
attackers
xz
windows
malicious
stealer
IT threat evolution in Q2 2024. Mobile statistics
Quarterly figuresAccording to Kaspersky Security Network, in Q2 2024:7 million atta...
2024-9-3 16:15:14 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
trojan
banker
q2
turkey
trojans
IT threat evolution in Q2 2024. Non-mobile statistics
The statistics presented here are based on detection verdicts by Kaspersky products an...
2024-9-3 16:15:13 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
ransomware
q2
trojan
territories
territory
Head Mare: adventures of a unicorn in Russia and Belarus
Head Mare is a hacktivist group that first made itself known in 2023 on the social net...
2024-9-2 18:15:14 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
windows
mare
attackers
phantomcore
microsoft
HZ Rat backdoor for macOS attacks users of China’s DingTalk and WeChat
In June 2024, we discovered a macOS version of the HZ Rat backdoor targeting users of...
2024-8-27 18:15:13 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
c2
victim
network
dingtalk
malicious
Memory corruption vulnerabilities in Suricata and FreeRDP
As a cybersecurity company, before we release our products, we perform penetration tes...
2024-8-22 18:15:13 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
freerdp
suricata
codec
Exploits and vulnerabilities in Q2 2024
Q2 2024 was eventful in terms of new interesting vulnerabilities and exploitation tech...
2024-8-21 19:0:17 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
q2
q1
windows
download
Approach to mainframe penetration testing on z/OS
Information technology is developing at a rapid pace, with completely new areas emergi...
2024-8-20 20:15:13 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
mainframe
apf
tso
privileges
racf
BlindEagle flying high in Latin America
BlindEagle, also known as “APT-C-36”, is an APT actor recognized for employing straigh...
2024-8-19 18:30:15 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
blindeagle
phishing
espionage
colombia
Tusk: unraveling a complex infostealer campaign
SummaryKaspersky Global Emergency Response Team (GERT) has identified a complex campa...
2024-8-16 00:15:13 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
inactive
trojan
shop
tidyme
Previous
2
3
4
5
6
7
8
9
Next