unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
EastWind campaign: new CloudSorcerer attacks on government organizations in Russia
In late July 2024, we detected a series of ongoing targeted cyberattacks on dozens of...
2024-8-14 20:15:12 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
attackers
library
malicious
c2
APT trends report Q2 2024
For over six years now, Kaspersky’s Global Research and Analysis Team (GReAT) has been...
2024-8-13 20:15:12 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
c2
qsc
albanian
windows
malicious
Indirect prompt injection in the real world: how people manipulate neural networks
What is prompt injection?Large language models (LLMs) – the neural network algorithms...
2024-8-12 19:15:12 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
llm
injection
injections
chatbots
bots
LianSpy: new Android spyware targeting Russian users
Malware descriptions...
2024-8-5 17:45:13 | 阅读: 26 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
pastebin
hxxps
lianspy
spyware
yandex
How “professional” ransomware variants boost cybercrime groups
IntroductionCybercriminals who specialize in ransomware do not always create it thems...
2024-8-1 19:30:15 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
ransomware
mallox
sexi
windows
affiliate
Mandrake spyware sneaks onto Google Play again, flying under the radar for two years
IntroductionIn May 2020, Bitdefender released a white paper containing a detailed ana...
2024-7-29 18:0:21 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
mandrake
stage
c2
library
ricinus
When spear phishing met mass phishing
Spam and phishing...
2024-7-11 18:0:26 | 阅读: 3 |
收藏
|
Securelist - securelist.com
phishing
spear
mass
attackers
Developing and prioritizing a detection engineering backlog based on MITRE ATT&CK
Detection is a traditional type of cybersecurity control, along with blocking, adjustm...
2024-7-9 21:15:12 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
dett
ct
scoring
windows
CloudSorcerer – A new APT targeting Russian government entities
In May 2024, we discovered a new advanced persistent threat (APT) targeting Russian go...
2024-7-8 15:15:12 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
windows
cloud
c2
github
Cybersecurity in the SMB space — a growing threat
Small and medium-sized businesses (SMBs) are increasingly targeted by cybercriminals....
2024-6-25 18:0:39 | 阅读: 13 |
收藏
|
Securelist - securelist.com
security
smbs
software
microsoft
XZ backdoor: Hook analysis
Part 1: XZ backdoor story – Initial analysisPart 2: Assessing the Y, and How, of the...
2024-6-24 18:0:2 | 阅读: 7 |
收藏
|
Securelist - securelist.com
payload
ssh
attacker
xz
Analysis of user password strength
Research...
2024-6-18 19:30:32 | 阅读: 2 |
收藏
|
Securelist - securelist.com
passwords
digits
corr
letters
database
Analysis of user password strength
Research...
2024-6-18 19:30:32 | 阅读: 7 |
收藏
|
Securelist - securelist.com
passwords
digits
corr
letters
aa0
Cinterion EHS5 3G UMTS/HSPA Module Research
Modems play an important role in enabling connectivity for a wide range of devices. Th...
2024-6-13 18:0:22 | 阅读: 9 |
收藏
|
Securelist - securelist.com
modem
midlet
midlets
otap
security
QR code SQL injection and other vulnerabilities in a popular biometric terminal
Biometric scanners offer a unique way to resolve the conflict between security and usa...
2024-6-11 16:0:1 | 阅读: 15 |
收藏
|
Securelist - securelist.com
analysis
biometric
firmware
security
Bypassing 2FA with phishing and OTP bots
Spam and phishing...
2024-6-10 18:0:4 | 阅读: 15 |
收藏
|
Securelist - securelist.com
victim
otp
phishing
scammer
bots
IT threat evolution in Q1 2024. Mobile statistics
IT threat evolution Q1 2024IT threat evolution Q1 2024. Mobile statisticsIT threat e...
2024-6-3 18:0:46 | 阅读: 8 |
收藏
|
Securelist - securelist.com
trojan
banker
q1
turkey
trojans
IT threat evolution Q1 2024
IT threat evolution Q1 2024IT threat evolution Q1 2024. Mobile statisticsIT threat e...
2024-6-3 18:0:27 | 阅读: 9 |
收藏
|
Securelist - securelist.com
network
attackers
hardware
coyote
trojan
IT threat evolution in Q1 2024. Non-mobile statistics
IT threat evolution Q1 2024IT threat evolution Q1 2024. Mobile statisticsIT threat e...
2024-6-3 18:0:8 | 阅读: 9 |
收藏
|
Securelist - securelist.com
q1
trojan
ransomware
territory
territories
Trusted relationship attacks: trust, but verify
SOC, TI and IR posts...
2024-5-28 18:0:6 | 阅读: 13 |
收藏
|
Securelist - securelist.com
attackers
network
remote
ngrok
windows
Previous
3
4
5
6
7
8
9
10
Next