unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
IT threat evolution Q3 2020 Mobile statistics
The statistics presented here draw on detection verdicts returned by Kaspersky products and rec...
2020-11-20 19:05:31 | 阅读: 354 |
收藏
|
securelist.com
trojan
banker
trojans
threats
security
IT threat evolution Q3 2020
Targeted attacksMATA: Lazarus’s multi-platform targeted malware frameworkThe more sophisticat...
2020-11-20 19:00:58 | 阅读: 352 |
收藏
|
securelist.com
ransomware
victim
threats
security
malicious
Advanced Threat predictions for 2021
Trying to make predictions about the future is a tricky business. However, while we don’t have...
2020-11-19 19:00:48 | 阅读: 408 |
收藏
|
securelist.com
ransomware
attackers
gangs
brokers
Spam and phishing in Q3 2020
Quarterly highlightsWorming their way in: cybercriminal tricks of the tradeThese days, many c...
2020-11-12 19:00:54 | 阅读: 271 |
收藏
|
securelist.com
phishing
malicious
download
quarter
trojan
Targeted ransomware: it’s not just about encrypting your data!
When we talk about ransomware, we need to draw a line between what it used to be and what it cu...
2020-11-11 19:00:27 | 阅读: 298 |
收藏
|
securelist.com
ransomware
locker
ragnar
egregor
victim
Ghimob: a Tétrade threat actor moves to infect mobile devices
Guildma, a threat actor that is part of the Tétrade family of banking trojans, has been working...
2020-11-09 19:00:40 | 阅读: 311 |
收藏
|
securelist.com
ghimob
texto
descricao
trojan
widget
RansomEXX Trojan attacks Linux systems
We recently discovered a new file-encrypting...
2020-11-07 00:23:44 | 阅读: 354 |
收藏
|
securelist.com
trojan
ransomexx
victim
windows
Attacks on industrial enterprises using RMS and TeamViewer: new data
Download full report (PDF)Executive SummaryIn summer 2019, Kaspersky ICS CERT identified a n...
2020-11-05 19:00:48 | 阅读: 284 |
收藏
|
securelist.com
attackers
teamviewer
rms
software
remote
APT trends report Q3 2020
For more than three years, the Global Research and Analysis Team (GReAT) at Kaspersky has been...
2020-11-03 19:00:37 | 阅读: 309 |
收藏
|
securelist.com
malicious
c2
speaking
attackers
DDoS attacks in Q3 2020
News overviewQ3 was relatively calm from a DDoS perspective. There were no headline innovation...
2020-10-28 19:00:21 | 阅读: 409 |
收藏
|
securelist.com
quarter
q2
botnets
download
fewer
On the trail of the XMRig miner
As protection methods improve, the developers...
2020-10-22 19:00:59 | 阅读: 321 |
收藏
|
securelist.com
trojan
miner
prometei
ransomware
machine
Life of Maze ransomware
In the past year, Maze ransomware has become one of the most notorious malware families threate...
2020-10-21 19:00:11 | 阅读: 277 |
收藏
|
securelist.com
ransomware
maze
trojan
victim
network
GravityRAT: The spy returns
In 2018, researchers at Cisco Talos published a post on the spyware GravityRAT, used to target...
2020-10-19 19:00:01 | 阅读: 296 |
收藏
|
securelist.com
windows
gravityrat
trojan
IAmTheKing and the SlothfulMedia malware family
On October 1, 2020, the DHS CISA agency released information about a malware family called Slot...
2020-10-15 19:00:09 | 阅读: 299 |
收藏
|
securelist.com
iamtheking
powershell
families
MontysThree: Industrial espionage with steganography and a Russian accent on both sides
In summer 2020 we uncovered a previously unknown multi-module C++ toolset used in highly target...
2020-10-08 19:00:40 | 阅读: 238 |
收藏
|
securelist.com
windows
loader
encryption
montysthree
MosaicRegressor: Lurking in the Shadows of UEFI
Part II. Technical details (PDF)UEFI (or Unified Extensible Firmware Interface) has become a...
2020-10-05 19:00:45 | 阅读: 247 |
收藏
|
securelist.com
firmware
microsoft
windows
malicious
SAS@Home is back this fall
The second SAS conference in 2020...
2020-10-01 00:15:02 | 阅读: 256 |
收藏
|
securelist.com
sas
security
workshop
workshops
surprises
Why master YARA: from routine to extreme threat hunting cases. Follow-up
ContentsQuestions about usage of YAR...
2020-09-29 23:00:47 | 阅读: 324 |
收藏
|
securelist.com
network
morphy
snort
c2
download
Threat landscape for industrial automation systems. H1 2020 highlights
Overall downward trend for percentages of att...
2020-09-24 17:00:21 | 阅读: 247 |
收藏
|
securelist.com
malicious
threats
percentages
rankings
removable
Looking for sophisticated malware in IoT devices
One of the motivations for this post is to encourage other researchers who are interested in th...
2020-09-23 19:00:28 | 阅读: 217 |
收藏
|
securelist.com
firmware
binwalk
bootloader
entropy
malicious
Previous
23
24
25
26
27
28
29
30
Next