unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Good, the Bad and the Ugly in Cybersecurity – Week 36
The Good | U.S. Officials Crackdown on Russian State-Backed Disinformation Campaigns Ahead of Presi...
2024-9-6 21:0:47 | 阅读: 8 |
收藏
|
SentinelOne - www.sentinelone.com
veeam
vbr
security
LABScon23 Replay | They Spilled Oil in My Health-Boosting Smoothie
OilRig is a well-known Iran-aligned cyberespionage group, allegedly under the MOIS (Ministry of Int...
2024-9-5 23:25:14 | 阅读: 2 |
收藏
|
SentinelLabs - www.sentinelone.com
oilrig
zuzana
labscon
eset
discusses
PinnacleOne ExecBrief | North Korean IT Worker Threat
Last week, we highlighted NIST’s recently released standards for post-quantum cryptography and prov...
2024-9-3 21:0:30 | 阅读: 8 |
收藏
|
SentinelOne - www.sentinelone.com
north
korean
security
hiring
identities
The Good, the Bad and the Ugly in Cybersecurity – Week 35
The Good | Big Reward Offered for Angler Exploit Kit HackerThe U.S. Department of State is offerin...
2024-8-30 21:0:16 | 阅读: 4 |
收藏
|
SentinelOne - www.sentinelone.com
ransomhub
ransomware
angler
chrome
kadariya
Exploring the VirusTotal Dataset | An Analyst’s Guide to Effective Threat Research
VirusTotal stores a vast collection of files, URLs, domains, and IPs submitted by users worldwide....
2024-8-29 17:57:15 | 阅读: 8 |
收藏
|
SentinelLabs - www.sentinelone.com
analysis
modifiers
modifier
PinnacleOne ExecBrief | Post-Quantum Cryptography and Enterprise Risks
Last week, we drew attention to political volatility and strategic competition in South Asia and hi...
2024-8-26 21:0:35 | 阅读: 5 |
收藏
|
SentinelOne - www.sentinelone.com
pqc
encryption
transition
security
migration
The Good, the Bad and the Ugly in Cybersecurity – Week 34
The Good | Global Authorities Arrest Multi-Million Dollar Crypto Thieves & Charge An Extortion Gang...
2024-8-23 21:0:50 | 阅读: 6 |
收藏
|
SentinelOne - www.sentinelone.com
xeon
windows
cloud
zolotarjovs
The Strategic CISO | How Risk Management Fundamentals Lead to Success
Emerging technologies have given rise to CISOs becoming strategic in their company’s growth. CISOs...
2024-8-22 21:0:56 | 阅读: 5 |
收藏
|
SentinelOne - www.sentinelone.com
security
cisos
lifecycle
LABScon23 Replay | Black Magic – Influence Operations in the Open and At-Scale in Hungary
Influence operations are often thought of as clandestine meddling in other countries’ affairs, but...
2024-8-22 00:10:2 | 阅读: 4 |
收藏
|
SentinelLabs - www.sentinelone.com
narratives
influence
martin
hungary
labscon
Building Resilient Security | Why Fundamentals Matter More Than Ever
As a security leader, safeguarding your organization against evolving threats means not only suppor...
2024-8-20 21:0:33 | 阅读: 11 |
收藏
|
SentinelOne - www.sentinelone.com
security
operational
stability
processes
rigorous
PinnacleOne ExecBrief | Bangladesh’s New Government Spells Uncertainty for Competing Global Powers
Last week, we noted the recent spate of terrorist attacks and increasing alarm from governments aro...
2024-8-19 21:0:20 | 阅读: 10 |
收藏
|
SentinelOne - www.sentinelone.com
india
bangladesh
hasina
influence
political
Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials
Executive SummaryXeon Sender is a Python script that sends spam through nine different SaaS provi...
2024-8-19 17:55:19 | 阅读: 50 |
收藏
|
SentinelLabs - www.sentinelone.com
xeon
cloud
twilio
python
sns
The Good, the Bad and the Ugly in Cybersecurity – Week 33
The Good | Two Major Ransomware Ops Disrupted & Criminal Linked to Largest Credential Theft Market...
2024-8-16 21:0:55 | 阅读: 7 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
github
systembc
security
nca
Mastering Endpoint Security | A CISO’s Blueprint for Resilience
Chief Information Security Officers (CISOs) face an ever-evolving landscape of cyber threats. Our m...
2024-8-14 23:0:0 | 阅读: 5 |
收藏
|
SentinelOne - www.sentinelone.com
security
cisos
windows
threats
mature
Proactive Security | Enhancing Risk Visibility with Extended Security Posture Management (xSPM)
As part of ongoing growth and digital transformation, many enterprises encounter the challenge of m...
2024-8-13 21:0:38 | 阅读: 9 |
收藏
|
SentinelOne - www.sentinelone.com
security
xspm
posture
threats
PinnacleOne ExecBrief | Terrorism on the Horizon
Last week, we highlighted how nation-state sabotage risked critical infrastructure and operations f...
2024-8-12 23:0:23 | 阅读: 7 |
收藏
|
SentinelOne - www.sentinelone.com
isis
syria
centcom
iraq
forces
Singularity MDR | A Scalable Solution for Broader Detection & Response Coverage
The world has changed – and by a lot. Over the last several years, global companies have rapidly ac...
2024-8-12 21:0:16 | 阅读: 2 |
收藏
|
SentinelOne - www.sentinelone.com
mdr
security
singularity
dfir
objectives
The Good, the Bad and the Ugly in Cybersecurity – Week 32
The Good | $39M From Mass-Scale BEC Scam Recovered & Crypto Wallet Used by Cybercriminals SeizedTh...
2024-8-9 21:0:46 | 阅读: 5 |
收藏
|
SentinelOne - www.sentinelone.com
cryptonator
bec
olympics
software
palais
DeathGrip RaaS | Small-Time Threat Actors Aim High With LockBit & Yashma Builders
The infosec community continues to eye a worrying trend: how the barrier to entry for extortion-foc...
2024-8-8 21:0:47 | 阅读: 6 |
收藏
|
SentinelOne - www.sentinelone.com
ransomware
deathgrip
lockbit
yashma
builders
Defusing AD-Based Risks | Best Practices for Securing Modern Directory Services
If you are on a corporate network, it likely runs and authenticates on Microsoft Active Directory (...
2024-8-7 21:0:39 | 阅读: 9 |
收藏
|
SentinelOne - www.sentinelone.com
cloud
attackers
security
network
entra
Previous
3
4
5
6
7
8
9
10
Next