unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Inside Malicious Windows Apps for Malware Deployment
This article discusses Windows Apps – Windows applications packaged into APPX or MSIX packages – a...
2022-7-14 21:41:53 | 阅读: 22 |
收藏
|
www.sentinelone.com
appx
windows
malicious
appxsvc
p7x
How Attackers Exploit Security Support Provider (SSP) for Credential Dumping
Obtaining account login names and passwords in the form of hashes or clear text is a primary objec...
2022-7-13 21:0:10 | 阅读: 27 |
收藏
|
www.sentinelone.com
windows
security
attackers
ssps
ssp
Introducing the New Singularity XDR Process Graph
Data is at the heart of XDR. The ability to ingest petabytes of data real-time from any technology...
2022-7-11 23:0:34 | 阅读: 23 |
收藏
|
www.sentinelone.com
security
singularity
processes
triage
behaviors
The Good, the Bad and the Ugly in Cybersecurity – Week 28
The GoodAccording to a recent announcement, AstraLocker ransomware is ceasing development and shut...
2022-7-8 23:0:57 | 阅读: 32 |
收藏
|
www.sentinelone.com
microsoft
hackerone
astralocker
ransomware
security
Targets of Interest | Russian Organizations Increasingly Under Attack By Chinese APTs
Executive SummarySentinelLabs has identified a new cluster of threat activity targeting Russian o...
2022-7-7 18:58:37 | 阅读: 31 |
收藏
|
www.sentinelone.com
royal
road
malicious
c2
russia
From the Front Lines | New macOS ‘covid’ Malware Masquerades as Apple, Wears Face of APT
Earlier this year, we reported on ESET’s discovery of OSX.DazzleSpy, an information stealer and bac...
2022-7-6 23:38:22 | 阅读: 44 |
收藏
|
www.sentinelone.com
dazzlespy
payload
sliver
platypus
Surviving the Storm | Defending Against Cloud Misconfigurations, Vulnerabilities, and Insider Threats
Over the last decade, Microsoft has expanded its product portfolio from an operating system provide...
2022-7-6 00:25:53 | 阅读: 21 |
收藏
|
www.sentinelone.com
microsoft
cloud
security
defender
threats
The Good, the Bad and the Ugly in Cybersecurity – Week 27
The GoodAn alleged ransomware affiliate has reached a plea deal in the United States for collabora...
2022-7-1 23:0:17 | 阅读: 22 |
收藏
|
www.sentinelone.com
ransomware
avaya
defendant
software
security
Rise in Identity-Based Attacks Drives Demand for a New Security Approach
The frequency of ransomware attacks has doubled over the last couple of years, accounting for 10% o...
2022-6-29 23:38:12 | 阅读: 19 |
收藏
|
www.sentinelone.com
security
itdr
cloud
attackers
identities
Securing the Nation’s Critical Infrastructure | Action Plans to Defend Against Cyber Attacks
Industries around the globe increasingly rely on operational technology (OT) and industrial control...
2022-6-28 00:21:15 | 阅读: 30 |
收藏
|
www.sentinelone.com
network
ransomware
security
attackers
deception
The Good, the Bad and the Ugly in Cybersecurity – Week 26
The GoodThis week saw good news as cops in Europe busted a gang said to be behind several million...
2022-6-24 23:0:28 | 阅读: 20 |
收藏
|
www.sentinelone.com
mega
follina
euros
cloud
crime
On the Board of Directors? Beware of These Six Common Cyber Security Myths
The days when cyber security was merely a technical or niche issue to be dealt with by some small d...
2022-6-23 23:34:19 | 阅读: 17 |
收藏
|
www.sentinelone.com
security
software
myth
From the Front Lines | 3 New and Emerging Ransomware Threats Striking Businesses in 2022
In the first half of 2022, there has been no let up in the number of attacks on businesses by ranso...
2022-6-23 00:28:56 | 阅读: 47 |
收藏
|
www.sentinelone.com
helloxd
ransomware
zeon
angels
encryption
Detecting Unconstrained Delegation Exposures in AD Environment
Active Directory misconfigurations can lead to total domain compromise of an organization. Once an...
2022-6-21 23:38:50 | 阅读: 27 |
收藏
|
www.sentinelone.com
delegation
attackers
security
exposures
The Good, the Bad and the Ugly in Cybersecurity – Week 25
The GoodAccording to a report from the U.S. Department of Justice, a United States District Judge...
2022-6-17 23:0:45 | 阅读: 34 |
收藏
|
www.sentinelone.com
roblox
ransomware
attacker
hertzbleed
remote
Research Paper | Emulating Phineas Phisher Attacks in Modern EDR Environments
A Guest Post by Giorgos Karantzas and Professor Constantinos PatsakisIntroductionA few years ago,...
2022-6-15 23:31:25 | 阅读: 39 |
收藏
|
www.sentinelone.com
network
attacker
security
cobalt
nighthawk
Gartner Summit 2022 Recap: Reframing Risk & Simplifying Security
Thousands of people in the cybersecurity community converged upon National Harbor, Maryland last we...
2022-6-15 00:8:48 | 阅读: 28 |
收藏
|
www.sentinelone.com
security
cloud
singularity
itdr
Apple’s macOS Ventura | 7 New Security Changes to Be Aware Of
Apple’s Worldwide Developer Conference for 2022 has just closed out and with it we have had our fir...
2022-6-13 23:11:50 | 阅读: 47 |
收藏
|
www.sentinelone.com
security
ventura
passkeys
eslogger
captchas
The Good, the Bad and the Ugly in Cybersecurity – Week 24
The GoodThe United States, Cyprus and Latvia have successfully seized and dismantled a major dark...
2022-6-10 23:0:20 | 阅读: 23 |
收藏
|
www.sentinelone.com
district
criminal
marketplace
basta
qbot
RSA 2022 Conference Recap: Securing the Cloud, Experiencing FOMO, and Evolving XDR
It’s the last day of RSAC 2022, and the SentinelOne team has been taking San Francisco by storm wit...
2022-6-10 07:24:50 | 阅读: 23 |
收藏
|
www.sentinelone.com
security
rsac
cloud
singularity
Previous
29
30
31
32
33
34
35
36
Next