unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Minas – on the way to complexity
Sometimes when investigating an infection and focusing on a targeted attack, we come a...
2023-5-17 18:0:29 | 阅读: 20 |
收藏
|
Securelist - securelist.com
machinename
ilasm
sdbmhash
dllhost
aphash
The nature of cyberincidents in 2022
SOC, TI and IR posts...
2023-5-16 16:0:57 | 阅读: 16 |
收藏
|
Securelist - securelist.com
security
ransomware
analysis
download
involving
New ransomware trends in 2023
Ransomware keeps making headlines. In a quest for profits, attackers target all types...
2023-5-11 16:0:13 | 阅读: 25 |
收藏
|
Securelist - securelist.com
ransomware
lockbit
spreading
security
blackbasta
Not quite an Easter egg: a new family of Trojan subscribers on Google Play
Every once in a while, someone will come across malicious apps on Google Play that see...
2023-5-4 18:0:32 | 阅读: 29 |
收藏
|
Securelist - securelist.com
hxxp
malicious
trojan
fleckpe
trojans
Managed Detection and Response in 2022
SOC, TI and IR posts...
2023-5-2 16:0:15 | 阅读: 19 |
收藏
|
Securelist - securelist.com
security
mdr
analysis
dubbed
teaming
What does ChatGPT know about phishing?
Can ChatGPT detect phishing links?Hearing all the buzz about the amazing applications...
2023-5-1 18:0:20 | 阅读: 37 |
收藏
|
Securelist - securelist.com
phishing
chatgpt
llm
APT trends report Q1 2023
For more than five years, the Global Research and Analysis Team (GReAT) at Kaspersky h...
2023-4-27 18:0:47 | 阅读: 26 |
收藏
|
Securelist - securelist.com
c2
analysis
turla
scarcruft
payload
Tomiris called, they want their Turla malware back
IntroductionWe introduced Tomiris to the world in September 2021, following our inves...
2023-4-24 16:0:22 | 阅读: 43 |
收藏
|
Securelist - securelist.com
tomiris
tunnussched
turla
kopiluwak
c2
QBot banker delivered through business correspondence
In early April, we detected a significant increase in attacks that use banking Trojans...
2023-4-17 18:0:46 | 阅读: 27 |
收藏
|
Securelist - securelist.com
qbot
letters
powershell
download
wsf
Uncommon infection methods—part 2
IntroductionAlthough ransomware is still a hot topic on which we will keep on publish...
2023-4-13 16:0:32 | 阅读: 31 |
收藏
|
Securelist - securelist.com
miner
rapperbot
software
bee
Following the Lazarus group by tracking DeathNote campaign
The Lazarus group is a high-profile Korean-speaking threat actor with multiple sub-cam...
2023-4-12 16:0:0 | 阅读: 43 |
收藏
|
Securelist - securelist.com
windows
payload
malicious
victim
deathnote
Nokoyawa ransomware attacks with Windows zero-day
In February 2023, Kaspersky technologies detected a number of attempts to execute simi...
2023-4-12 01:36:20 | 阅读: 87 |
收藏
|
Securelist - securelist.com
clfs
28252
microsoft
nokoyawa
elevation
Overview of Google Play threats sold on the dark web
In 2022, Kaspersky security solutions detected 1,661,743 malware or unwanted software...
2023-4-10 16:0:2 | 阅读: 22 |
收藏
|
Securelist - securelist.com
loader
malicious
unwanted
prices
apk
The Telegram phishing market
Telegram has been gaining popularity with users around the world year by year. Common...
2023-4-5 18:0:17 | 阅读: 40 |
收藏
|
Securelist - securelist.com
phishing
kits
phishers
bots
offered
Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack
Incidents...
2023-4-3 20:10:52 | 阅读: 25 |
收藏
|
Securelist - securelist.com
gopuram
payload
3cx
shellcode
txr
Selecting the right MSSP: Guidelines for making an objective decision
SOC, TI and IR posts...
2023-3-30 18:0:6 | 阅读: 23 |
收藏
|
Securelist - securelist.com
mssp
security
expertise
analysis
monitoring
Financial cyberthreats in 2022
Financial gain remains the key driver of cybercriminal activity. In the past year, we’...
2023-3-29 18:0:2 | 阅读: 20 |
收藏
|
Securelist - securelist.com
phishing
trojan
banker
security
families
Copy-paste heist or clipboard-injector attacks on cryptousers
It is often the case that something new is just a reincarnation of something old. We h...
2023-3-28 18:0:8 | 阅读: 25 |
收藏
|
Securelist - securelist.com
clipboard
np
hj
payload
trojanized
How scammers employ IPFS for email phishing
The idea of creating Web 3.0 has been around since the end of 2000s. The new version o...
2023-3-27 16:0:48 | 阅读: 22 |
收藏
|
Securelist - securelist.com
ipfs
phishing
letters
cid
employ
Understanding metrics to measure SOC effectiveness
The security operations center (SOC) plays a critical role in protecting an organizati...
2023-3-24 16:0:56 | 阅读: 20 |
收藏
|
Securelist - securelist.com
metric
security
monitoring
measuring
goals
Previous
8
9
10
11
12
13
14
15
Next