unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
SOC Team Essentials | How to Investigate and Track the 8220 Gang Cloud Threat
8220 Gang is a low-skill crimeware actor known for infecting cloud hosts through n-day vulnerabilit...
2023-2-22 21:0:10 | 阅读: 34 |
收藏
|
SentinelOne - www.sentinelone.com
8220
malicious
download
miner
payload
Staying Secure In the Cloud | An Angelneers Interview with Ely Kahn
Cloud computing has allowed modern organizations to scale at incredible rates, transforming how org...
2023-2-21 21:1:55 | 阅读: 28 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
security
prem
kahn
machine
The Good, the Bad and the Ugly in Cybersecurity – Week 7
The GoodVladislav Klyushin, the owner of Russian cybersecurity firm M-13, was this week convicted...
2023-2-17 22:0:45 | 阅读: 35 |
收藏
|
SentinelOne - www.sentinelone.com
microsoft
klyushin
malicious
exploited
WIP26 Espionage | Threat Actors Abuse Cloud Infrastructure in Targeted Telco Attacks
By Aleksandar Milenkoski, Collin Farr, and Joey Chen, in collaboration with QGroupExecutive Summar...
2023-2-16 18:55:24 | 阅读: 38 |
收藏
|
SentinelLabs - www.sentinelone.com
c2
cmd365
microsoft
cmdember
wip26
Recent TZW Campaigns Revealed As Part of GlobeImposter Malware Family
In recent years, efforts to apprehend threat groups and shrink their operating landscape have gone...
2023-2-15 21:45:1 | 阅读: 36 |
收藏
|
SentinelOne - www.sentinelone.com
tzw
ransomware
victim
ahnlab
ITDR For the Win | Moving Beyond IAM and PAM to Protect Digital Identities
In today’s modern work landscape, digital identities have become a record of trust, access, and rel...
2023-2-13 21:38:32 | 阅读: 23 |
收藏
|
SentinelOne - www.sentinelone.com
identities
security
cloud
itdr
passwords
The Good, the Bad and the Ugly in Cybersecurity – Week 6
The GoodSeven individuals were sanctioned this week for their involvement with the notorious Trick...
2023-2-10 22:0:6 | 阅读: 29 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
esxiargs
encryption
cl0p
slp
Cloud Credentials Phishing | Malicious Google Ads Target AWS Logins
Advertising is an integral part of the modern digital economy, providing businesses with the opport...
2023-2-9 19:53:39 | 阅读: 39 |
收藏
|
SentinelOne - www.sentinelone.com
phishing
malicious
aws1
attacker
Cl0p Ransomware Targets Linux Systems with Flawed Encryption | Decryptor Available
Executive SummarySentinelLabs has observed the first Linux variant of Cl0p ransomware.The ELF ex...
2023-2-7 18:55:22 | 阅读: 35 |
收藏
|
SentinelLabs - www.sentinelone.com
cl0p
windows
encryption
ransomware
prng
CFO Insights | Exploring the Financial Benefits of Adopting Endpoint Security
Over the past two-and-a-half years while I’ve served as Chief Financial Officer at SentinelOne, one...
2023-2-6 21:54:31 | 阅读: 19 |
收藏
|
SentinelOne - www.sentinelone.com
security
cfos
threats
costs
The Good, the Bad and the Ugly in Cybersecurity – Week 5
The GoodThe FTC this week has handed out a $1.5 million penalty to a U.S. healthcare company that...
2023-2-3 22:0:46 | 阅读: 30 |
收藏
|
SentinelOne - www.sentinelone.com
ftc
cloud
phishing
microsoft
swapping
MalVirt | .NET Virtualization Thrives in Malvertising Attacks
By Aleksandar Milenkoski and Tom HegelExecutive SummarySentinelLabs observed a cluster of virtua...
2023-2-2 18:55:59 | 阅读: 67 |
收藏
|
SentinelLabs - www.sentinelone.com
malvirt
c2
loaders
disguise
contacted
The Advantages of eBPF for CWPP Applications
Extended Berkeley Packet Filter (eBPF) is a framework for loading and running user-defined programs...
2023-2-1 21:58:59 | 阅读: 29 |
收藏
|
SentinelOne - www.sentinelone.com
ebpf
cwpp
cloud
security
workload
macOS Payloads | 7 Prevalent and Emerging Obfuscation Techniques
In our recent post, 7 Ways Threat Actors Deliver macOS Malware in the Enterprise, we discussed some...
2023-1-30 22:24:27 | 阅读: 33 |
收藏
|
SentinelOne - www.sentinelone.com
python
poseidon
sliver
shc
malicious
The Good, the Bad and the Ugly in Cybersecurity – Week 4
The GoodThe tables have turned for Hive ransomware group. This week, FBI and international partner...
2023-1-27 22:0:0 | 阅读: 20 |
收藏
|
SentinelOne - www.sentinelone.com
software
remote
ransomware
attackers
sparkrat
WatchTower | Trends and Top Cybersecurity Takeaways from 2022
read file error: read notes: is a directory...
2023-1-26 22:0:15 | 阅读: 19 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
software
worm
raspberry
threats
DragonSpark | Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation
By Aleksandar Milenkoski, Joey Chen, and Amitai Ben Shushan EhrlichExecutive SummarySentinelLab...
2023-1-24 18:55:22 | 阅读: 55 |
收藏
|
SentinelLabs - www.sentinelone.com
shellcode
sparkrat
dragonspark
loader
m6699
Dollar Signs in Attackers’ Eyes | How to Mitigate CVE-2022-26923
Microsoft released a Windows security update in May 2022, disclosing CVE-2022-26923 Active Director...
2023-1-23 22:37:29 | 阅读: 28 |
收藏
|
SentinelOne - www.sentinelone.com
26923
windows
security
exposure
singularity
The Good, the Bad and the Ugly in Cybersecurity – Week 3
The GoodThe U.S. Department of Justice this week arrested and charged Anatoly Legkodymov, a 40-yea...
2023-1-20 22:0:42 | 阅读: 24 |
收藏
|
SentinelOne - www.sentinelone.com
norton
bitzlato
passwords
github
Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results
In recent weeks there has been a noticeable increase in malicious search engine advertisements foun...
2023-1-19 23:4:56 | 阅读: 69 |
收藏
|
SentinelOne - www.sentinelone.com
blender
malicious
dropbox
download
poisoning
Previous
22
23
24
25
26
27
28
29
Next