[公告]不安全上线【我的收藏】功能
2019-09-26 17:32:30  •  阅读 ♾  
[公告]不安全更换新域名为: buaq.net 短域名:https://f5.pm
2019-09-26 17:32:30  •  阅读 ♾  
Shining a Light on DARKSIDE Ransomware Operations
2021-05-12 06:30:00  •  阅读 56 •  点我收藏   
The UNC2529 Triple Double: A Trifecta Phishing Campaign
2021-05-04 23:00:00  •  阅读 65 •  点我收藏   
UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
2021-04-30 06:00:00  •  阅读 107 •  点我收藏   
Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity
2021-04-28 19:00:00  •  阅读 73 •  点我收藏   
Abusing Replication: Stealing AD FS Secrets Over the Network
2021-04-28 02:00:00  •  阅读 103 •  点我收藏   
Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
2021-04-21 06:00:00  •  阅读 124 •  点我收藏   
Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day
2021-04-20 23:00:00  •  阅读 78 •  点我收藏   
Hacking Operational Technology for Defense: Lessons Learned From OT Red Teaming Smart Meter Control Infrastructure
2021-04-14 00:00:00  •  阅读 108 •  点我收藏   
M-Trends 2021: A View From the Front Lines
2021-04-13 22:45:00  •  阅读 105 •  点我收藏   
Back in a Bit: Attacker Use of the Windows Background Intelligent Transfer Service
2021-04-01 00:00:00  •  阅读 103 •  点我收藏   
Detection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities
2021-03-05 07:30:00  •  阅读 97 •  点我收藏   
New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452
2021-03-05 02:00:00  •  阅读 148 •  点我收藏   
Fuzzing Image Parsing in Windows, Part Two: Uninitialized Memory
2021-03-04 04:30:00  •  阅读 132 •  点我收藏   
So Unchill: Melting UNC2198 ICEDID to Ransomware Operations
2021-02-26 01:00:00  •  阅读 125 •  点我收藏   
Cyber Criminals Exploit Accellion FTA for Data Theft and Extortion
2021-02-22 23:00:00  •  阅读 167 •  点我收藏   
Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part Two)
2021-02-17 22:00:00  •  阅读 82 •  点我收藏   
Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part One)
2021-02-17 22:00:00  •  阅读 104 •  点我收藏   
Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication
2021-01-27 05:45:00  •  阅读 131 •  点我收藏   
Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction
2021-01-22 02:30:00  •  阅读 213 •  点我收藏   
Emulation of Kernel Mode Rootkits With Speakeasy
2021-01-21 01:45:00  •  阅读 172 •  点我收藏   
Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452
2021-01-19 23:00:00  •  阅读 214 •  点我收藏   
SUNBURST Additional Technical Details
2020-12-25 05:15:00  •  阅读 216 •  点我收藏   
Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
2020-12-14 07:00:00  •  阅读 152 •  点我收藏   
Unauthorized Access of FireEye Red Team Tools
2020-12-09 06:00:00  •  阅读 212 •  点我收藏   
Using Speakeasy Emulation Framework Programmatically to Unpack Malware
2020-12-02 05:30:00  •  阅读 201 •  点我收藏   
Election Cyber Threats in the Asia-Pacific Region
2020-11-23 08:00:00  •  阅读 215 •  点我收藏   
Purgalicious VBA: Macro Obfuscation With VBA Purging
2020-11-20 04:23:54  •  阅读 262 •  点我收藏   
WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques
2020-11-10 04:00:00  •  阅读 203 •  点我收藏   
In Wild Critical Buffer Overflow Vulnerability in Solaris Can Allow Remote Takeover — CVE-2020-14871
2020-11-05 04:00:00  •  阅读 186 •  点我收藏   
Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945
2020-11-03 04:15:00  •  阅读 222 •  点我收藏