unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Good, the Bad and the Ugly in Cybersecurity – Week 37
The Good | Cybercrime Syndicate Members Arrested In Singapore & Dark Market Admins Indicted for Fra...
2024-9-13 21:0:14 | 阅读: 7 |
收藏
|
SentinelOne - www.sentinelone.com
oilrig
iraqi
c2
wwh
club
From Amos to Poseidon | A SOC Team’s Guide to Detecting macOS Atomic Stealers 2024
It started out (apparently) as a ChatGPT project in April 2023 but has gone on to become arguably t...
2024-9-13 01:59:15 | 阅读: 6 |
收藏
|
SentinelOne - www.sentinelone.com
stealer
amos
banshee
poseidon
cthulu
PinnacleOne ExecBrief | Volt Typhoon’s Winds Pick Up Speed
Last week, we highlighted the DPRK’s efforts to scam companies hiring IT workers.This week, we pro...
2024-9-9 21:0:24 | 阅读: 4 |
收藏
|
SentinelOne - www.sentinelone.com
volt
typhoon
security
military
regulations
The Good, the Bad and the Ugly in Cybersecurity – Week 36
The Good | U.S. Officials Crackdown on Russian State-Backed Disinformation Campaigns Ahead of Presi...
2024-9-6 21:0:47 | 阅读: 5 |
收藏
|
SentinelOne - www.sentinelone.com
veeam
vbr
security
LABScon23 Replay | They Spilled Oil in My Health-Boosting Smoothie
OilRig is a well-known Iran-aligned cyberespionage group, allegedly under the MOIS (Ministry of Int...
2024-9-5 23:25:14 | 阅读: 2 |
收藏
|
SentinelLabs - www.sentinelone.com
oilrig
zuzana
labscon
eset
discusses
PinnacleOne ExecBrief | North Korean IT Worker Threat
Last week, we highlighted NIST’s recently released standards for post-quantum cryptography and prov...
2024-9-3 21:0:30 | 阅读: 7 |
收藏
|
SentinelOne - www.sentinelone.com
north
korean
security
hiring
identities
The Good, the Bad and the Ugly in Cybersecurity – Week 35
The Good | Big Reward Offered for Angler Exploit Kit HackerThe U.S. Department of State is offerin...
2024-8-30 21:0:16 | 阅读: 4 |
收藏
|
SentinelOne - www.sentinelone.com
ransomhub
ransomware
angler
chrome
kadariya
Exploring the VirusTotal Dataset | An Analyst’s Guide to Effective Threat Research
VirusTotal stores a vast collection of files, URLs, domains, and IPs submitted by users worldwide....
2024-8-29 17:57:15 | 阅读: 8 |
收藏
|
SentinelLabs - www.sentinelone.com
analysis
modifiers
modifier
PinnacleOne ExecBrief | Post-Quantum Cryptography and Enterprise Risks
Last week, we drew attention to political volatility and strategic competition in South Asia and hi...
2024-8-26 21:0:35 | 阅读: 4 |
收藏
|
SentinelOne - www.sentinelone.com
pqc
encryption
transition
security
migration
The Good, the Bad and the Ugly in Cybersecurity – Week 34
The Good | Global Authorities Arrest Multi-Million Dollar Crypto Thieves & Charge An Extortion Gang...
2024-8-23 21:0:50 | 阅读: 5 |
收藏
|
SentinelOne - www.sentinelone.com
xeon
windows
cloud
zolotarjovs
The Strategic CISO | How Risk Management Fundamentals Lead to Success
Emerging technologies have given rise to CISOs becoming strategic in their company’s growth. CISOs...
2024-8-22 21:0:56 | 阅读: 5 |
收藏
|
SentinelOne - www.sentinelone.com
security
cisos
lifecycle
LABScon23 Replay | Black Magic – Influence Operations in the Open and At-Scale in Hungary
Influence operations are often thought of as clandestine meddling in other countries’ affairs, but...
2024-8-22 00:10:2 | 阅读: 3 |
收藏
|
SentinelLabs - www.sentinelone.com
narratives
influence
martin
hungary
labscon
Building Resilient Security | Why Fundamentals Matter More Than Ever
As a security leader, safeguarding your organization against evolving threats means not only suppor...
2024-8-20 21:0:33 | 阅读: 9 |
收藏
|
SentinelOne - www.sentinelone.com
security
operational
stability
processes
rigorous
PinnacleOne ExecBrief | Bangladesh’s New Government Spells Uncertainty for Competing Global Powers
Last week, we noted the recent spate of terrorist attacks and increasing alarm from governments aro...
2024-8-19 21:0:20 | 阅读: 7 |
收藏
|
SentinelOne - www.sentinelone.com
india
bangladesh
hasina
influence
political
Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials
Executive SummaryXeon Sender is a Python script that sends spam through nine different SaaS provi...
2024-8-19 17:55:19 | 阅读: 40 |
收藏
|
SentinelLabs - www.sentinelone.com
xeon
cloud
twilio
python
sns
The Good, the Bad and the Ugly in Cybersecurity – Week 33
The Good | Two Major Ransomware Ops Disrupted & Criminal Linked to Largest Credential Theft Market...
2024-8-16 21:0:55 | 阅读: 7 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
github
systembc
security
nca
Mastering Endpoint Security | A CISO’s Blueprint for Resilience
Chief Information Security Officers (CISOs) face an ever-evolving landscape of cyber threats. Our m...
2024-8-14 23:0:0 | 阅读: 5 |
收藏
|
SentinelOne - www.sentinelone.com
security
cisos
windows
threats
mature
Proactive Security | Enhancing Risk Visibility with Extended Security Posture Management (xSPM)
As part of ongoing growth and digital transformation, many enterprises encounter the challenge of m...
2024-8-13 21:0:38 | 阅读: 9 |
收藏
|
SentinelOne - www.sentinelone.com
security
xspm
posture
threats
PinnacleOne ExecBrief | Terrorism on the Horizon
Last week, we highlighted how nation-state sabotage risked critical infrastructure and operations f...
2024-8-12 23:0:23 | 阅读: 7 |
收藏
|
SentinelOne - www.sentinelone.com
isis
syria
centcom
iraq
forces
Singularity MDR | A Scalable Solution for Broader Detection & Response Coverage
The world has changed – and by a lot. Over the last several years, global companies have rapidly ac...
2024-8-12 21:0:16 | 阅读: 2 |
收藏
|
SentinelOne - www.sentinelone.com
mdr
security
singularity
dfir
objectives
Previous
1
2
3
4
5
6
7
8
Next