unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
CyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attacks
Executive SummaryCyberVolk/GLORIAMIST is a hacktivist collective originating in India w...
2024-11-25 18:55:10 | 阅读: 5 |
收藏
|
SentinelLabs - www.sentinelone.com
cybervolk
ransomware
hexalocker
azzasec
doubleface
The Good, the Bad and the Ugly in Cybersecurity – Week 47
The Good | DoJ Charges Phobos RaaS Admin & 5 Defendants Running Data Extortion AttacksRus...
2024-11-22 22:0:44 | 阅读: 7 |
收藏
|
SentinelOne - www.sentinelone.com
facebook
dprk
nodestealer
phobos
software
Protecting AI Infrastructures | Introducing SentinelOne’s AI Security Posture Management (AI-SPM)
The widespread adoption of AI introduces unique security considerations. Misconfigurations...
2024-11-21 22:0:6 | 阅读: 1 |
收藏
|
SentinelOne - www.sentinelone.com
security
spm
sagemaker
workloads
bedrock
DPRK IT Workers | A Network of Active Front Companies and Their Links to China
Executive SummarySentinelLabs has identified unique characteristics of multiple website...
2024-11-21 18:55:47 | 阅读: 6 |
收藏
|
SentinelLabs - www.sentinelone.com
dprk
hopanatech
yuze
tong
shenyang
The Good, the Bad and the Ugly in Cybersecurity – Week 46
The Good | Extortionist Sentenced to 10 Years For Cybercrimes Against U.S. Medical Clinics...
2024-11-15 22:0:27 | 阅读: 8 |
收藏
|
SentinelOne - www.sentinelone.com
volt
typhoon
purbeck
ta455
routers
Securing AWS Lambda | How Misconfigurations Can Lead to Lateral Movement
As serverless computing continues to revolutionize the cloud landscape, AWS Lambda has eme...
2024-11-15 21:0:36 | 阅读: 5 |
收藏
|
SentinelOne - www.sentinelone.com
security
cloud
attacker
lateral
The State of Cloud Ransomware in 2024
OverviewRansom attacks in the cloud are a perennially popular topic of discussion in the...
2024-11-14 19:0:26 | 阅读: 10 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
ransomware
php
security
pandora
The Good, the Bad and the Ugly in Cybersecurity – Week 45
The Good | Cloud Credential Thief Arrested & Cyber Operation Seizes 22,000 Malicious IP Ad...
2024-11-8 22:0:3 | 阅读: 0 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
fabrice
malicious
python
BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence
Executive SummarySentinelLabs has observed a suspected DPRK threat actor targeting Cryp...
2024-11-7 18:55:47 | 阅读: 6 |
收藏
|
SentinelLabs - www.sentinelone.com
stage
zshenv
c2
bluenoroff
The Good, the Bad and the Ugly in Cybersecurity – Week 44
The Good | Police Seize Infostealer Malware Operations & Charge Suspected AdministratorEx...
2024-11-1 21:0:6 | 阅读: 2 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
andariel
political
network
redline
Driving Advancement in Cybersecurity | Top 5 Takeaways from OneCon24
Since its founding, SentinelOne has been a global leader in how AI and machine learning ca...
2024-11-1 02:9:10 | 阅读: 4 |
收藏
|
SentinelOne - www.sentinelone.com
security
purple
singularity
triage
Climbing The Ladder | Kubernetes Privilege Escalation (Part 2)
In this blog post, we take the concepts from Climbing The Ladder | Kubernetes Privilege Es...
2024-10-31 21:0:45 | 阅读: 6 |
收藏
|
SentinelOne - www.sentinelone.com
attacker
kubernetes
daemonset
privileges
security
Safely Expanding the Frontiers of AI & LLMs | S Ventures’ Investment in Galileo
We’ve long recognized the transformative potential of AI in security and beyond. Since our...
2024-10-25 22:0:21 | 阅读: 2 |
收藏
|
SentinelOne - www.sentinelone.com
galileo
security
ventures
evaluation
investment
The Good, the Bad and the Ugly in Cybersecurity – Week 43
The Good | CISA Safety Proposal Set to Protect U.S. Data & Recovery Tool for Mallox Ransom...
2024-10-25 21:0:13 | 阅读: 1 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
mallox
lockbit
encryption
Cloud Malware | A Threat Hunter’s Guide to Analysis, Techniques and Delivery
As many researchers have noticed, malware in the cloud is different. Perhaps more strikingly differ...
2024-10-24 23:17:35 | 阅读: 2 |
收藏
|
SentinelLabs - www.sentinelone.com
cloud
analysis
identify
teamtnt
threats
Climbing The Ladder | Kubernetes Privilege Escalation (Part 1)
Kubernetes (K8s) has become an integral part of cloud-native environments, offering powerful contai...
2024-10-23 21:0:14 | 阅读: 6 |
收藏
|
SentinelOne - www.sentinelone.com
kubernetes
pods
privileges
attacker
attackers
macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools
Last week, researchers at Trend Micro published a report on a macOS malware sample that had credibl...
2024-10-22 23:1:7 | 阅读: 6 |
收藏
|
SentinelOne - www.sentinelone.com
mkgo
filemanager
notlockbit
ransomware
The Good, the Bad and the Ugly in Cybersecurity – Week 42
The Good | DoJ Unseals Indictment Against Notorious ‘Anonymous Sudan’ DDoS OperatorsAn unsealed in...
2024-10-18 21:0:40 | 阅读: 2 |
收藏
|
SentinelOne - www.sentinelone.com
oilrig
romcom
sudan
anonymous
security
China’s Influence Ops | Twisting Tales of Volt Typhoon at Home and Abroad
Executive SummaryThe latest CVERC report reflects China’s ongoing efforts to undermine support fo...
2024-10-16 22:23:52 | 阅读: 3 |
收藏
|
SentinelLabs - www.sentinelone.com
cverc
702
prc
claims
Quantifying Vulnerability Risk | Identify & Remediate CVEs with Exploit-Driven Prioritization
Organizations are grappling with an unprecedented influx of vulnerabilities in today’s rapidly evol...
2024-10-15 21:0:0 | 阅读: 2 |
收藏
|
SentinelOne - www.sentinelone.com
epss
security
kev
scoring
Previous
-24
-23
-22
-21
-20
-19
-18
-17
Next