unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Beyond the Surface: the evolution and expansion of the SideWinder APT group
SideWinder, aka T-APT-04 or RattleSnake, is one of the most prolific APT groups that b...
2024-10-15 18:0:54 | 阅读: 2 |
收藏
|
Securelist - securelist.com
library
windows
payload
c2
malicious
Whispers from the Dark Web Cave. Cyberthreats in the Middle East
SOC, TI and IR posts...
2024-10-14 15:0:56 | 阅读: 1 |
收藏
|
Securelist - securelist.com
threats
gangs
ransomware
Awaken Likho is awake: new techniques of an APT group
IntroductionIn July 2021, a campaign was launched primarily targeting Russian governm...
2024-10-7 18:0:14 | 阅读: 5 |
收藏
|
Securelist - securelist.com
meshcentral
attackers
meshagent
autoit
Scam Information and Event Management
While trying to deliver malware on victims’ devices and stay on them as long as they c...
2024-10-4 16:0:48 | 阅读: 4 |
收藏
|
Securelist - securelist.com
malicious
attackers
software
dllc
a3x
Finding a needle in a haystack: Machine learning at the forefront of threat hunting research
IntroductionIn the ever-evolving landscape of cybersecurity, logs, that is informatio...
2024-10-2 18:0:37 | 阅读: 12 |
收藏
|
Securelist - securelist.com
threats
forest
machine
accuracy
Key Group: another ransomware group using leaked builders
Key Group, or keygroup777, is a financially motivated ransomware group primarily targe...
2024-10-1 18:0:24 | 阅读: 22 |
收藏
|
Securelist - securelist.com
ransomware
windows
hakuna
matata
software
Threat landscape for industrial automation systems, Q2 2024
Industrial threats...
2024-9-26 16:0:48 | 阅读: 7 |
收藏
|
Securelist - securelist.com
pp
malicious
quarter
threats
stage
From 12 to 21: how we discovered connections between the Twelve and BlackJack groups
While analyzing attacks on Russian organizations, our team regularly encounters overla...
2024-9-25 18:0:19 | 阅读: 9 |
收藏
|
Securelist - securelist.com
blackjack
twelve
wiper
windows
ngrok
Web tracking report: who monitored users’ online activities in 2023–2024 the most
Web tracking has become a pervasive aspect of our online experience. Whether we’re bro...
2024-9-24 18:15:14 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
trackers
regions
download
advertising
dnt
How the Necro Trojan infiltrated Google Play, again
IntroductionWe sometimes come across modified applications when analyzing suspicious...
2024-9-23 18:15:14 | 阅读: 47 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
necro
trojan
loader
payload
c2
-=TWELVE=- is back
In the spring of 2024, posts with real people’s personal data began appearing on the -...
2024-9-20 20:31:34 | 阅读: 0 |
收藏
|
Securelist - securelist.com
windows
ransomware
netlogon
powershell
attackers
Exotic SambaSpy is now dancing with Italian users
IntroductionIn May 2024, we detected a campaign exclusively targeting victims in Ital...
2024-9-18 18:15:15 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
italian
malicious
sambaspy
attacker
Loki: a new private agent for the popular Mythic framework
In July 2024, we discovered the previously unknown Loki backdoor, which was used in a...
2024-9-9 15:15:14 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
loader
loki
mythic
c2
havoc
Tropic Trooper spies on government entities in the Middle East
Executive summaryTropic Trooper (also known as KeyBoy and Pirate Panda) is an APT gro...
2024-9-5 16:15:13 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
malicious
loader
trooper
tropic
1f
Mallox ransomware: in-depth analysis and evolution
Mallox is a sophisticated and dangerous family of malicious software that has been cau...
2024-9-4 18:15:17 | 阅读: 68 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
mallox
ransomware
victim
encryption
trojan
A deep dive into the most interesting incident response cases of last year
In 2023, Kaspersky’s Global Emergency Response Team (GERT) participated in services ar...
2024-9-3 19:15:14 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
gert
attackers
analysis
windows
payload
IT threat evolution Q2 2024
Targeted attacksXZ backdoor: a supply chain attack in the makingOn March 29, a messa...
2024-9-3 16:15:15 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
attackers
xz
windows
malicious
stealer
IT threat evolution in Q2 2024. Mobile statistics
Quarterly figuresAccording to Kaspersky Security Network, in Q2 2024:7 million atta...
2024-9-3 16:15:14 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
trojan
banker
q2
turkey
trojans
IT threat evolution in Q2 2024. Non-mobile statistics
The statistics presented here are based on detection verdicts by Kaspersky products an...
2024-9-3 16:15:13 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
ransomware
q2
trojan
territories
territory
Head Mare: adventures of a unicorn in Russia and Belarus
Head Mare is a hacktivist group that first made itself known in 2023 on the social net...
2024-9-2 18:15:14 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - securelist.com
windows
mare
attackers
phantomcore
microsoft
Previous
1
2
3
4
5
6
7
8
Next