unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Release Highlights: VMRay Platform 2024.3.0
Two releases of 2024 are already behind us, but we’re not slowing down! We hope you’ve enjoyed...
2024-6-6 16:0:48 | 阅读: 13 |
收藏
|
VMRay - www.vmray.com
vmray
connector
security
threats
v14
Malware executes its payload ONLY WHEN THE SCREEN IS LOCKED.
3/48 detections on VirusTotalas of 04.06.2024The VMRay Labs team has uncov...
2024-6-4 21:50:46 | 阅读: 3 |
收藏
|
VMRay - www.vmray.com
malicious
download
modifies
artifacts
payload
“Good Enough” Sandbox Technology is Not Enough: The Risks of Evasive Malware & Choosing the Right Solution
Typically, large product suites sold as a bundle – in most industries – win over customers from...
2024-5-21 22:36:2 | 阅读: 4 |
收藏
|
VMRay - www.vmray.com
vmray
security
inferior
flagship
phishing
AgentTesla delivered via exploiting Microsoft Office
5/61 detections on VirusTotalas of 14.05.2024Malicious Microsoft Excel docume...
2024-5-15 00:47:0 | 阅读: 1 |
收藏
|
VMRay - www.vmray.com
malicious
download
microsoft
equation
Implications of Pareto’s Principle: Why relying on a single platform security approach fails
The Power of Pareto in CybersecurityEconomist Vilfredo Pareto’s famous “80/20” principle, stati...
2024-5-8 21:43:28 | 阅读: 6 |
收藏
|
VMRay - www.vmray.com
security
threats
breed
specialized
Unveiling AI Menaces & Ransomware Tactics: Detection Highlights – April 2024
The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malwa...
2024-5-8 15:40:12 | 阅读: 9 |
收藏
|
VMRay - www.vmray.com
phishing
ransomware
llms
rabbit
backup
Sandbox Evasion Techniques
Malware authors are continuously evolving their tactics to evade detection by security tools, an...
2024-4-27 04:25:3 | 阅读: 9 |
收藏
|
VMRay - www.vmray.com
analysis
sandboxes
malicious
vmray
artifacts
Sandbox Evasion Techniques – Part 1
This post is the first part in a series on sandbox evasion techniques used by malware today. Aft...
2024-4-27 04:25:3 | 阅读: 26 |
收藏
|
VMRay - www.vmray.com
analysis
malicious
sandboxes
vmray
gaps
Guarding the Gates: The Growing Abundance of Linux Malware
As the popularity of Linux and UNIX-like operating systems has grown, so too has the attention...
2024-4-26 14:43:0 | 阅读: 10 |
收藏
|
VMRay - www.vmray.com
xz
security
threats
vmray
How VMRay’s User Reported Phishing Works
The first step in defending your business against phishing is making sure that your employees kn...
2024-4-23 22:49:44 | 阅读: 15 |
收藏
|
VMRay - www.vmray.com
analysis
phishing
vmray
mailbox
malicious
What Organizations Can Do to Mitigate Phishing Email Bypass
As mentioned in the previous post, phishing emails that bypass perimeter and endpoint security c...
2024-4-23 22:42:41 | 阅读: 10 |
收藏
|
VMRay - www.vmray.com
phishing
stage
ransomware
hospital
identify
Making the Case for User Reported Phishing
As technology advances, phishing campaigns continue to improve in sophistication, emphasizing th...
2024-4-23 22:36:39 | 阅读: 15 |
收藏
|
VMRay - www.vmray.com
phishing
malicious
accuracy
threats
security
Signature and Detection Highlights – March 2024
The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malwa...
2024-4-9 14:58:13 | 阅读: 17 |
收藏
|
VMRay - www.vmray.com
malicious
risepro
reverse
phishing
machine
Feature Highlight 2024.2: Exchanging intelligence with STIX 2.1
We’re excited to announce that our new release now supports the advanced data-exchange format, S...
2024-4-9 00:39:25 | 阅读: 14 |
收藏
|
VMRay - www.vmray.com
stix
analysis
vmray
vti
security
Signature and Detection Highlights – February 2024
IntroductionThe Labs team at VMRay actively gathers publicly available data to identify any not...
2024-3-28 16:43:36 | 阅读: 11 |
收藏
|
VMRay - www.vmray.com
pikabot
lumma
security
vti
vmray
Healthcare Under Ransomware Attacks – Part 3: Rhysida
Three Ransomware attacks and data breaches in the healthcare industry over the last few weeks ha...
2024-3-26 16:40:42 | 阅读: 11 |
收藏
|
VMRay - www.vmray.com
rhysida
ransomware
affiliates
hospital
extortion
Healthcare Under Ransomware Attacks – Part 2: LockBit
Three Ransomware attacks and data breaches in the healthcare industry over the last few weeks ha...
2024-3-26 16:36:41 | 阅读: 8 |
收藏
|
VMRay - www.vmray.com
lockbit
ransomware
affiliates
healthcare
php
Healthcare Under Ransomware Attacks – Part 1: BlackCat/AlphV
Ransomware. One word that keeps many IT Administrators and SOC Analysts awake at night. And when...
2024-3-26 16:30:22 | 阅读: 8 |
收藏
|
VMRay - www.vmray.com
ransomware
blackcat
extortion
healthcare
alphv
VMRay Platform 2024.2.0 Release Highlights
IntroductionThe first release of 2024 is already behind us, but we’re not slowing down! We hope...
2024-3-22 16:9:41 | 阅读: 11 |
收藏
|
VMRay - www.vmray.com
windows
stix
analysis
qr
onenote
i-Soon or Later: Exposing the sandbox secrets of cyber espionage
Ertugrul KaraErtugrul Kara is the Senior Product Marketing Manager for VMRay. With a career spanning...
2024-3-21 23:1:44 | 阅读: 8 |
收藏
|
VMRay - www.vmray.com
security
vmray
senior
held
stage
Previous
2
3
4
5
6
7
8
9
Next