unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Understanding metrics to measure SOC effectiveness
The security operations center (SOC) plays a critical role in protecting an organizati...
2023-3-24 16:0:56 | 阅读: 17 |
收藏
|
Securelist - securelist.com
metric
security
monitoring
measuring
goals
Developing an incident response playbook
An incident response playbook is a predefined set of actions to address a specific sec...
2023-3-23 16:0:0 | 阅读: 19 |
收藏
|
Securelist - securelist.com
playbook
containment
phases
security
analysis
Bad magic: new APT found in the area of Russo-Ukrainian conflict
Since the start of the Russo-Ukrainian conflict, Kaspersky researchers and the interna...
2023-3-21 16:0:37 | 阅读: 26 |
收藏
|
Securelist - securelist.com
powermagic
malicious
commonmagic
decoy
binst
Business on the dark web: deals and regulatory mechanisms
Research...
2023-3-15 18:0:35 | 阅读: 16 |
收藏
|
Securelist - securelist.com
escrow
deals
parties
arbiter
download
Malvertising through search engines
In recent months, we observed an increase in the number of malicious campaigns that us...
2023-3-9 18:0:18 | 阅读: 27 |
收藏
|
Securelist - securelist.com
software
download
blender
malicious
powershell
The state of stalkerware in 2022
The state of stalkerware in 2022 (PDF)Main findings of 2022The State of Stalkerware...
2023-3-8 18:0:44 | 阅读: 16 |
收藏
|
Securelist - securelist.com
stalkerware
america
security
victim
brazil
Threat landscape for industrial automation systems for H2 2022
Year 2022 in numbersParameterH1 2022H2 20222022Percentage of attacked ICS co...
2023-3-6 18:0:45 | 阅读: 18 |
收藏
|
Securelist - securelist.com
malicious
regions
ranked
removable
ranking
The mobile malware threat landscape in 2022
These statistics are based on detection verdicts of Kaspersky products received from u...
2023-2-27 18:5:35 | 阅读: 22 |
收藏
|
Securelist - securelist.com
trojan
trojans
banker
ransomware
installers
Spam and phishing in 2022
Figures of the yearIn 2022:48.63% of all emails around the world and 52.78% of all...
2023-2-16 16:0:7 | 阅读: 28 |
收藏
|
Securelist - securelist.com
phishing
victim
offered
malicious
attackers
IoC detection experiments with ChatGPT
ChatGPT is a groundbreaking chatbot powered by the neural network-based language model...
2023-2-15 18:0:53 | 阅读: 40 |
收藏
|
Securelist - securelist.com
chatgpt
powershell
malicious
security
positives
Good, Perfect, Best: how the analyst can enhance penetration testing results
Penetration testing is something that many (of those who know what a pentest is) see a...
2023-2-10 18:0:33 | 阅读: 16 |
收藏
|
Securelist - securelist.com
client
security
network
pentesters
Web beacons on websites and in e-mail
There is a vast number of trackers, which gather information about users’ activities o...
2023-2-7 16:0:9 | 阅读: 27 |
收藏
|
Securelist - securelist.com
beacons
beacon
trackers
twenty
advertising
Prilex modification now targeting contactless credit card transactions
Prilex is a singular threat actor that has evolved from ATM-focused malware into uniqu...
2023-1-31 16:0:41 | 阅读: 15 |
收藏
|
Securelist - securelist.com
prilex
contactless
chip
tap
rfid
Come to the dark side: hunting IT professionals on the dark web
The dark web is a collective name for a variety of websites and marketplaces that brin...
2023-1-30 18:0:30 | 阅读: 31 |
收藏
|
Securelist - securelist.com
employment
salary
posting
employers
What your SOC will be facing in 2023
As the role of cybersecurity in large businesses increases remarkably year over year,...
2023-1-23 18:0:8 | 阅读: 16 |
收藏
|
Securelist - securelist.com
socs
telecom
threats
10k
growth
Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
Roaming Mantis (a.k.a Shaoye) is well-known as a long-term cyberattack campaign that u...
2023-1-19 18:0:6 | 阅读: 26 |
收藏
|
Securelist - securelist.com
apk
chrome
iptime
landing
efm
What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks
Kaspersky detects an average of 400,000 malicious files every day. These add up to 144...
2023-1-18 16:0:45 | 阅读: 18 |
收藏
|
Securelist - securelist.com
security
ransomware
victim
cloud
footprint
How much security is enough?
According to a prominent Soviet science fiction writer, beauty is a fine line, a razor...
2023-1-9 18:38:33 | 阅读: 19 |
收藏
|
Securelist - securelist.com
security
operational
threats
efficiency
attackers
BlueNoroff introduces new methods bypassing MoTW
BlueNoroff group is a financially motivated threat actor eager to profit from its cybe...
2022-12-27 16:0:26 | 阅读: 33 |
收藏
|
Securelist - securelist.com
payload
windows
capital
bluenoroff
cloud
Ransomware and wiper signed with stolen certificates
IntroductionOn July 17, 2022, Albanian news outlets reported a massive cyberattack th...
2022-12-22 16:0:32 | 阅读: 24 |
收藏
|
Securelist - securelist.com
wave
ransomware
wiper
wiping
albanian
Previous
7
8
9
10
11
12
13
14
Next