unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Cloud Computing Is Not New | Why Secure It Now?
Cloud computing has seen multiple iterations since its inception in the 1960s and has empowered mod...
2022-10-27 19:45:30 | 阅读: 18 |
收藏
|
www.sentinelone.com
cloud
security
giants
threats
microsoft
V for Ventura | How Will Upgrading to macOS 13 Impact Organizations?
This Monday saw Apple release its next OS upgrade, macOS 13 Ventura. Apple took the unusual step of...
2022-10-26 23:40:31 | 阅读: 22 |
收藏
|
www.sentinelone.com
security
ventura
lockdown
stage
mdm
How Kerberos Golden Ticket Attacks Are Signaling a Greater Need for Identity-Based Security
Modern technology has transformed the workplace, changing how people access data and operate in tan...
2022-10-24 22:50:44 | 阅读: 35 |
收藏
|
www.sentinelone.com
security
mimikatz
identities
granting
The Good, the Bad and the Ugly in Cybersecurity – Week 43
The GoodOfficials have busted two SIM hijackers for a six-month cyber crime spree which stripped a...
2022-10-21 21:0:45 | 阅读: 24 |
收藏
|
www.sentinelone.com
ransomware
prestige
swapping
ursnif
ukraine
Ransoms Without Ransomware, Data Corruption and Other New Tactics in Cyber Extortion
Much like legitimate businesses, ransomware operators adjust their operational strategies to achiev...
2022-10-20 21:9:47 | 阅读: 24 |
收藏
|
www.sentinelone.com
ransomware
encryption
extortion
spectrum
karakurt
Building Blocks for Your XDR Journey, Part 2 | Why EDR Is the Cornerstone for Great XDR
XDR, or eXtended Detection and Response, has been gaining a lot of buzz and traction in recent year...
2022-10-19 22:26:17 | 阅读: 19 |
收藏
|
www.sentinelone.com
security
threats
singularity
network
All Eyes on Cloud | Why the Cloud Surface Attracts Attacks
Cloud environments have seen a meteoric rise in the past decade. What began as means of data storag...
2022-10-17 21:0:59 | 阅读: 26 |
收藏
|
www.sentinelone.com
cloud
security
clouds
network
threats
The Good, the Bad and the Ugly in Cybersecurity – Week 42
The GoodAsk most security professionals about the weakest link in any organization and the answer...
2022-10-14 21:0:53 | 阅读: 26 |
收藏
|
www.sentinelone.com
security
caffeine
phishing
microsoft
phaas
8220 Gang Cloud Botnet Targets Misconfigured Cloud Workloads
In July of 2022 we reported on 8220 Gang, one of the many low-skill crimeware gangs we observe infe...
2022-10-13 22:7:17 | 阅读: 20 |
收藏
|
www.sentinelone.com
8220
cloud
miner
proxy
purecrypter
WIP19 Espionage | New Chinese APT Targets IT Service Providers and Telcos With Signed Malware
By Joey Chen and Amitai Ben Shushan Ehrlich, with additional insights from QGROUPExecutive Summary...
2022-10-12 22:27:47 | 阅读: 38 |
收藏
|
www.sentinelone.com
wip19
sqlmaggie
loader
S Ventures Invests in Laminar, a Cloud Data Security Pioneer
S Ventures is excited to showcase our investment in Laminar, a pioneer in the cloud data loss preve...
2022-10-11 21:0:51 | 阅读: 17 |
收藏
|
www.sentinelone.com
cloud
security
laminar
ventures
posture
CISO Wins | Reducing Risk Across Endpoint, Identity and Cloud Surfaces
2022 has, so far, shown us that data breaches, cyber threats, and privacy incidents are here to kee...
2022-10-10 21:28:31 | 阅读: 17 |
收藏
|
www.sentinelone.com
security
threats
network
cloud
surfaces
The Good, the Bad and the Ugly in Cybersecurity – Week 41
The GoodFormer Canadian government employee, Sebastian Vachon-Desjardins, pleaded guilty this week...
2022-10-7 21:0:43 | 阅读: 24 |
收藏
|
www.sentinelone.com
vachon
desjardins
draft
netwalker
investors
Building Blocks For Your XDR Journey, Part 1 | Extending Beyond the Endpoint
A Guest Post by Mark Harris, former Senior Director Analyst at GartnerIn the cyber security indust...
2022-10-6 21:1:2 | 阅读: 16 |
收藏
|
www.sentinelone.com
security
threats
singularity
machine
soar
Top 8 Defenses MSPs Can Take Against Cyberattacks
From small to medium businesses to critical infrastructure entities, more organizations are relying...
2022-10-5 22:4:8 | 阅读: 20 |
收藏
|
www.sentinelone.com
msps
msp
security
network
S Ventures Invests in Noetic Cyber for Complete Visibility and Control of Your Security Posture
The complexity of enterprise infrastructure continues to evolve as digital transformation and hybri...
2022-10-3 21:20:28 | 阅读: 16 |
收藏
|
www.sentinelone.com
noetic
security
asset
ventures
posture
The Good, the Bad and the Ugly in Cybersecurity – Week 40
The GoodGood news this week from Meta (aka Facebook). The social media giant has taken down some 1...
2022-9-30 21:0:51 | 阅读: 25 |
收藏
|
www.sentinelone.com
exchange
facebook
windows
Feature Spotlight | Combating Email Threats Through AI-Driven Defenses with Armorblox Integration
SentinelOne endeavors to protect enterprises from email-based attacks through a data-driven approac...
2022-9-29 21:19:14 | 阅读: 26 |
收藏
|
www.sentinelone.com
security
armorblox
threats
malicious
behavioral
S Ventures Invests in Armorblox to Combat Email Threats Using Natural Language Understanding and AI
Email remains one of the most targeted attack vectors in cybersecurity, and attackers are becoming...
2022-9-29 21:19:2 | 阅读: 16 |
收藏
|
www.sentinelone.com
armorblox
security
partnership
threats
LABScon 2022 Event Highlights | Advancing Cybersecurity Research for Collective Digital Defense
Last week, SentinelLabs launched the very first LABScon with the purpose of challenging the boundar...
2022-9-28 21:10:46 | 阅读: 20 |
收藏
|
www.sentinelone.com
labscon
award
security
Previous
15
16
17
18
19
20
21
22
Next