unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Why “good enough” could kill your business
There are scenarios in which opting for the best possible solution is non-negotiable. Think of medi...
2024-7-19 18:29:35 | 阅读: 8 |
收藏
|
VMRay - www.vmray.com
security
threats
analysis
efficacy
incomplete
Malicious batch file reveals its full behavior ONLY WHEN IT WAS STARTED BY A DOUBLE-CLICK
0/64 detections on VirusTotalas of 04.07.2024The VMRay Labs team has uncov...
2024-7-5 18:44:39 | 阅读: 7 |
收藏
|
VMRay - www.vmray.com
malicious
download
artifacts
indicating
Detection Highlights – June 2024: Detecting Windows Defender Tampering and YARA rule for EDR Silencer
The VMRay Labs team is always on the ball, scouring publicly available data to pinpoint any critica...
2024-7-5 17:59:23 | 阅读: 11 |
收藏
|
VMRay - www.vmray.com
malicious
security
windows
powershell
upx
Obfuscated batch file downloads open-source stealer straight from GitHub
Heavy obfuscation: Uses SomalifuscatorV2Text editor confusion: Abuses UTF-16 Byte Order Mark...
2024-7-4 22:13:24 | 阅读: 7 |
收藏
|
VMRay - www.vmray.com
heavy
tampering
fetches
Detection Highlights – May 2024: Identifying Multi-Step Attacks and Evasive Malware
The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malwa...
2024-6-11 21:18:52 | 阅读: 15 |
收藏
|
VMRay - www.vmray.com
malicious
pdfs
docusign
powershell
phishing
VMRay at Locked Shields 2024: Enhancing Cyber Resilience through Collaboration
Introduction: The Significance of Locked ShieldsParticipating in Locked Shields 2024, the large...
2024-6-10 19:37:52 | 阅读: 9 |
收藏
|
VMRay - www.vmray.com
shields
vmray
resilience
Release Highlights: VMRay Platform 2024.3.0
Two releases of 2024 are already behind us, but we’re not slowing down! We hope you’ve enjoyed...
2024-6-6 16:0:48 | 阅读: 11 |
收藏
|
VMRay - www.vmray.com
vmray
connector
security
threats
v14
Malware executes its payload ONLY WHEN THE SCREEN IS LOCKED.
3/48 detections on VirusTotalas of 04.06.2024The VMRay Labs team has uncov...
2024-6-4 21:50:46 | 阅读: 0 |
收藏
|
VMRay - www.vmray.com
malicious
download
modifies
artifacts
payload
“Good Enough” Sandbox Technology is Not Enough: The Risks of Evasive Malware & Choosing the Right Solution
Typically, large product suites sold as a bundle – in most industries – win over customers from...
2024-5-21 22:36:2 | 阅读: 2 |
收藏
|
VMRay - www.vmray.com
vmray
security
inferior
flagship
phishing
AgentTesla delivered via exploiting Microsoft Office
5/61 detections on VirusTotalas of 14.05.2024Malicious Microsoft Excel docume...
2024-5-15 00:47:0 | 阅读: 0 |
收藏
|
VMRay - www.vmray.com
malicious
download
microsoft
equation
Implications of Pareto’s Principle: Why relying on a single platform security approach fails
The Power of Pareto in CybersecurityEconomist Vilfredo Pareto’s famous “80/20” principle, stati...
2024-5-8 21:43:28 | 阅读: 3 |
收藏
|
VMRay - www.vmray.com
security
threats
breed
specialized
Unveiling AI Menaces & Ransomware Tactics: Detection Highlights – April 2024
The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malwa...
2024-5-8 15:40:12 | 阅读: 6 |
收藏
|
VMRay - www.vmray.com
phishing
ransomware
llms
rabbit
backup
Sandbox Evasion Techniques
Malware authors are continuously evolving their tactics to evade detection by security tools, an...
2024-4-27 04:25:3 | 阅读: 5 |
收藏
|
VMRay - www.vmray.com
analysis
sandboxes
malicious
vmray
artifacts
Sandbox Evasion Techniques – Part 1
This post is the first part in a series on sandbox evasion techniques used by malware today. Aft...
2024-4-27 04:25:3 | 阅读: 15 |
收藏
|
VMRay - www.vmray.com
analysis
malicious
sandboxes
vmray
gaps
Guarding the Gates: The Growing Abundance of Linux Malware
As the popularity of Linux and UNIX-like operating systems has grown, so too has the attention...
2024-4-26 14:43:0 | 阅读: 8 |
收藏
|
VMRay - www.vmray.com
xz
security
threats
vmray
How VMRay’s User Reported Phishing Works
The first step in defending your business against phishing is making sure that your employees kn...
2024-4-23 22:49:44 | 阅读: 13 |
收藏
|
VMRay - www.vmray.com
analysis
phishing
vmray
mailbox
malicious
What Organizations Can Do to Mitigate Phishing Email Bypass
As mentioned in the previous post, phishing emails that bypass perimeter and endpoint security c...
2024-4-23 22:42:41 | 阅读: 6 |
收藏
|
VMRay - www.vmray.com
phishing
stage
ransomware
hospital
identify
Making the Case for User Reported Phishing
As technology advances, phishing campaigns continue to improve in sophistication, emphasizing th...
2024-4-23 22:36:39 | 阅读: 12 |
收藏
|
VMRay - www.vmray.com
phishing
malicious
accuracy
threats
security
Signature and Detection Highlights – March 2024
The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malwa...
2024-4-9 14:58:13 | 阅读: 15 |
收藏
|
VMRay - www.vmray.com
malicious
risepro
reverse
phishing
machine
Feature Highlight 2024.2: Exchanging intelligence with STIX 2.1
We’re excited to announce that our new release now supports the advanced data-exchange format, S...
2024-4-9 00:39:25 | 阅读: 12 |
收藏
|
VMRay - www.vmray.com
stix
analysis
vmray
vti
security
Previous
1
2
3
4
5
6
7
8
Next