unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Lazarus ‘Operation In(ter)ception’ Targets macOS Users Dreaming of Jobs in Crypto
Back in August, researchers at ESET spotted an instance of Operation In(ter)ception using lures for...
2022-9-27 00:35:28 | 阅读: 29 |
收藏
|
www.sentinelone.com
stage
coinbase
library
decoy
The Good, the Bad and the Ugly in Cybersecurity – Week 39
The GoodThis week saw the inaugural LABScon – a security conference intent on fostering the advanc...
2022-9-23 22:0:58 | 阅读: 28 |
收藏
|
www.sentinelone.com
ransomware
lockbit
labscon
healthcare
empress
Void Balaur | The Sprawling Infrastructure of a Careless Mercenary
Executive SummaryThe cyber mercenary group known as Void Balaur continues to expand their hack-fo...
2022-9-23 07:55:34 | 阅读: 24 |
收藏
|
www.sentinelone.com
smartlink
preference
balaur
passport
yandex
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities
By Juan Andres Guerrero-Saade, Amitai Ben Shushan Ehrlich, and Aleksandar MilenkoskiExecutive Summ...
2022-9-23 02:24:42 | 阅读: 46 |
收藏
|
www.sentinelone.com
mafalda
metador
metamain
c2
threats
Investing in Tomorrow | Why We Started S Ventures
Today, we are excited to launch S Ventures, a $100M fund investing in the next generation of catego...
2022-9-21 20:57:59 | 阅读: 33 |
收藏
|
www.sentinelone.com
security
ventures
cloud
singularity
CISO Wins | A 5-Phase Ramp up Strategy for Success on a New Job
At the helm of a business’s overarching security strategy is their Chief Information Security Offic...
2022-9-19 23:8:54 | 阅读: 20 |
收藏
|
www.sentinelone.com
security
cisos
ciso
goals
The Good, the Bad and the Ugly in Cybersecurity – Week 38
The GoodThis week, ten individuals and two entities were sanctioned by the Department of the Treas...
2022-9-16 22:47:17 | 阅读: 27 |
收藏
|
www.sentinelone.com
microsoft
malicious
leveldb
sanctioned
From the Front Lines | Slam! Anatomy of a Publicly-Available Ransomware Builder
The barrier to entry for enterprising cybercriminals has been dropping considerably over recent yea...
2022-9-15 22:48:23 | 阅读: 45 |
收藏
|
www.sentinelone.com
ransomware
slam
mbr
consoleapp2
github
Endpoint, Identity and Cloud | Top Cyber Attacks of 2022 (So Far)
Businesses have thrived in the era of more – more tools, more access, and more connections. When it...
2022-9-14 22:7:40 | 阅读: 28 |
收藏
|
www.sentinelone.com
ransomware
cloud
network
kubernetes
singularity
Fortune Names SentinelOne a Top Workplace in Tech
SentinelOne has been named a Best Workplace in Technology on Fortune’s US Ranking for 2022. Over 15...
2022-9-12 22:49:19 | 阅读: 23 |
收藏
|
www.sentinelone.com
noa
elena
comparably
workplaces
security
The Good, the Bad and the Ugly in Cybersecurity – Week 37
The GoodThis week, the DoJ, FBI, and Portuguese authorities dismantled WT1SHOP, a prolific cybercr...
2022-9-9 21:0:0 | 阅读: 23 |
收藏
|
www.sentinelone.com
ransomware
wt1shop
angeles
marketplace
continuing
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection
By Aleksandar Milenkoski & Jim WalterWe observe a new trend on the ransomware scene – intermittent...
2022-9-8 21:29:52 | 阅读: 35 |
收藏
|
www.sentinelone.com
ransomware
encryption
blackcat
basta
Cyber Risks in the Education Sector | Why Cybersecurity Needs to Be Top of the Class
With summer on its last legs, the phrase “back to school” can be heard everywhere. For opportunisti...
2022-9-7 23:31:33 | 阅读: 22 |
收藏
|
www.sentinelone.com
schools
security
ransomware
pii
Accelerating Your Cloud Security with Workload Protection
As more organizations make the shift towards hybrid and cloud environments, security teams need a n...
2022-9-6 22:29:8 | 阅读: 21 |
收藏
|
www.sentinelone.com
cloud
security
singularity
threats
workloads
The Good, the Bad and the Ugly in Cybersecurity – Week 36
The GoodThis week, the United Kingdom announced plans to roll out a new security framework to pro...
2022-9-2 23:0:45 | 阅读: 23 |
收藏
|
www.sentinelone.com
security
twilio
okta
nitrokod
translate
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
Executive SummaryJuiceLedger is a relativey new threat actor focused on infostealing through a .N...
2022-9-2 00:0:13 | 阅读: 32 |
收藏
|
www.sentinelone.com
pypi
juiceledger
python
phishing
Advancing Security | The Age of AI & Machine Learning in Cybersecurity
Modern cyber attackers’ tactics, techniques, and procedures (TTPs) have become both rapid and abund...
2022-8-31 22:57:8 | 阅读: 25 |
收藏
|
www.sentinelone.com
threats
security
machine
cisos
Autonomous Detection & Response | How MDR Disrupts the Cyber Kill Chain
The only predictable thing about the cyber threat landscape is that you can always expect it to shi...
2022-8-29 22:26:20 | 阅读: 19 |
收藏
|
www.sentinelone.com
vigilance
network
lateral
threats
machine
The Good, the Bad and the Ugly in Cybersecurity – Week 35
The GoodThis week, Stanford Internet Observatory reported on their collaborative effort with socia...
2022-8-26 22:25:44 | 阅读: 23 |
收藏
|
www.sentinelone.com
plex
security
passwords
desfa
BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar
BlueSky ransomware is an emerging threat that researchers have been paying increasing attention to...
2022-8-26 00:2:6 | 阅读: 54 |
收藏
|
www.sentinelone.com
bluesky
ransomware
kmsauto
alguien
windows
Previous
16
17
18
19
20
21
22
23
Next