unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years
Executive SummaryAoqin Dragon, a threat actor SentinelLabs has been extensively tracking, has ope...
2022-6-9 18:58:31 | 阅读: 40 |
收藏
|
www.sentinelone.com
mongall
heyoka
loader
dragon
removable
Top 10 Ways to Protect Your Active Directory
Active Directory (AD) is a high-value target for attackers, who frequently attempt to compromise it...
2022-6-8 22:56:31 | 阅读: 24 |
收藏
|
www.sentinelone.com
privileged
attackers
delegation
identify
security
From the Front Lines | Another Rebrand? Mindware and SFile Ransomware Technical Breakdown
Researchers have recently noted the emergence of a new ransomware operator calling itself ‘Mindware...
2022-6-7 00:0:49 | 阅读: 58 |
收藏
|
www.sentinelone.com
mindware
sfile
ransomware
microsoft
windows
The Good, the Bad and the Ugly in Cybersecurity – Week 23
The GoodThe European Union Agency for Law Enforcement Cooperation (Europol) has successfully shut...
2022-6-3 23:0:54 | 阅读: 20 |
收藏
|
www.sentinelone.com
flubot
europol
security
follina
microsoft
Protecting Your Active Directory from AdminSDHolder Attacks
Cybercriminals often look at different methods to gain an organization’s sensitive data. One common...
2022-6-2 23:28:11 | 阅读: 35 |
收藏
|
www.sentinelone.com
security
privileged
attackers
ranger
4 Steps Toward Successfully Measuring the Effectiveness of Your Security Controls
In the past, organizations might have been able to get away with firewalls and antivirus software a...
2022-6-1 23:59:59 | 阅读: 16 |
收藏
|
www.sentinelone.com
security
network
threats
attackers
Staying Ahead of CVE-2022-30190 (Follina)
Executive SummaryOn May 27th 2022, @nao_sec identified a malicious Microsoft Word document using...
2022-6-1 06:30:9 | 阅读: 211 |
收藏
|
www.sentinelone.com
msdt
microsoft
30190
windows
Email Security and XDR | Simple Integration, Powerful Results
The State of Email SecurityAs tactics change, the sophistication of threat actors increases, and n...
2022-5-31 23:48:15 | 阅读: 17 |
收藏
|
www.sentinelone.com
security
threats
mimecast
lapsus
The Good, The Bad and the Ugly in Cybersecurity – Week 22
The GoodNigerian authorities have arrested a 37-year-old man alleged to be the leader of the Silve...
2022-5-27 23:0:36 | 阅读: 25 |
收藏
|
www.sentinelone.com
malicious
interpol
client
nigerian
attacker
SentinelOne Debuts at the Top of MITRE Engenuity ATT&CK® Deception Evaluation. See Why.
Released May 25, 2022, MITRE Engenuity ATT&CK® Evaluation Trials – Deception is an inaugural evalua...
2022-5-26 21:2:5 | 阅读: 22 |
收藏
|
www.sentinelone.com
deception
evaluation
engage
attackers
evaluations
Use of Obfuscated Beacons in ‘pymafka’ Supply Chain Attack Signals a New Trend in macOS Attack TTPs
OverviewResearchers from Sonatype last week reported on a supply chain attack via a malicious Pyth...
2022-5-26 00:54:12 | 阅读: 32 |
收藏
|
www.sentinelone.com
pymafka
payload
zuru
cobalt
22 Cybersecurity Twitter Accounts You Should Follow in 2022
As we navigate towards the midway-point of 2022, and despite current uncertainty over the company’s...
2022-5-23 21:55:35 | 阅读: 36 |
收藏
|
www.sentinelone.com
security
reverse
ransomware
florian
The Good, The Bad and the Ugly in Cybersecurity – Week 21
The GoodIn the face of a cyber attack launched by the Hive ransomware group, the Bank of Zambia of...
2022-5-20 23:0:43 | 阅读: 26 |
收藏
|
www.sentinelone.com
security
crate
zambia
pirates
pipelines
CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware
By Juan Andres Guerrero-Saade & Phil StokesExecutive SummarySentinelLabs has investigated a supp...
2022-5-19 22:57:46 | 阅读: 59 |
收藏
|
www.sentinelone.com
decimal
crate
rustdecimal
malicious
payload
How to Stay Ahead of the Adversary in 2022 | A Cybersecurity Checklist
Rarely a week passes by without news of another company being breached, a ransomware attack crippli...
2022-5-19 00:0:17 | 阅读: 21 |
收藏
|
www.sentinelone.com
security
cloud
attackers
Denonia Malware Targets AWS Lambda Environments
The increased adoption of cloud computing across industries has a significant impact on how busines...
2022-5-16 23:19:10 | 阅读: 30 |
收藏
|
www.sentinelone.com
cloud
denonia
gw
doh
attacker
The Good, The Bad and the Ugly in Cybersecurity – Week 20
The GoodThis week, the United States and the European Union confirmed Russian involvement in a ser...
2022-5-13 23:0:25 | 阅读: 34 |
收藏
|
www.sentinelone.com
ukraine
attackers
security
firm
confusion
Threat Landscape | The Most Dangerous Cloud Attack Methods In The Wild Today
The cybersecurity threat landscape is vast, and we are often faced with the challenge of keeping in...
2022-5-12 23:50:46 | 阅读: 27 |
收藏
|
www.sentinelone.com
cloud
attackers
attacker
software
Putting Things in Context | Timelining Threat Campaigns
Like many in our field, I often have a desire to timeline a threat or mind map threat activity to b...
2022-5-12 00:5:43 | 阅读: 21 |
收藏
|
www.sentinelone.com
aeon
dates
ukraine
security
download
From the Front Lines | Unsigned macOS oRAT Malware Gambles For The Win
By Dinesh Devadoss and Phil StokesResearchers looking into a new APT group targeting gambling site...
2022-5-9 22:27:16 | 阅读: 53 |
收藏
|
www.sentinelone.com
orat
payload
packed
bitget
security
Previous
30
31
32
33
34
35
36
37
Next