unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Ghimob: a Tétrade threat actor moves to infect mobile devices
Guildma, a threat actor that is part of the Tétrade family of banking trojans, has been working...
2020-11-09 19:00:40 | 阅读: 311 |
收藏
|
securelist.com
ghimob
texto
descricao
trojan
widget
RansomEXX Trojan attacks Linux systems
We recently discovered a new file-encrypting...
2020-11-07 00:23:44 | 阅读: 353 |
收藏
|
securelist.com
trojan
ransomexx
victim
windows
Attacks on industrial enterprises using RMS and TeamViewer: new data
Download full report (PDF)Executive SummaryIn summer 2019, Kaspersky ICS CERT identified a n...
2020-11-05 19:00:48 | 阅读: 283 |
收藏
|
securelist.com
attackers
teamviewer
rms
software
remote
APT trends report Q3 2020
For more than three years, the Global Research and Analysis Team (GReAT) at Kaspersky has been...
2020-11-03 19:00:37 | 阅读: 309 |
收藏
|
securelist.com
malicious
c2
speaking
attackers
DDoS attacks in Q3 2020
News overviewQ3 was relatively calm from a DDoS perspective. There were no headline innovation...
2020-10-28 19:00:21 | 阅读: 409 |
收藏
|
securelist.com
quarter
q2
botnets
download
fewer
On the trail of the XMRig miner
As protection methods improve, the developers...
2020-10-22 19:00:59 | 阅读: 320 |
收藏
|
securelist.com
trojan
miner
prometei
ransomware
machine
Life of Maze ransomware
In the past year, Maze ransomware has become one of the most notorious malware families threate...
2020-10-21 19:00:11 | 阅读: 277 |
收藏
|
securelist.com
ransomware
maze
trojan
victim
network
GravityRAT: The spy returns
In 2018, researchers at Cisco Talos published a post on the spyware GravityRAT, used to target...
2020-10-19 19:00:01 | 阅读: 294 |
收藏
|
securelist.com
windows
gravityrat
trojan
IAmTheKing and the SlothfulMedia malware family
On October 1, 2020, the DHS CISA agency released information about a malware family called Slot...
2020-10-15 19:00:09 | 阅读: 299 |
收藏
|
securelist.com
iamtheking
powershell
families
MontysThree: Industrial espionage with steganography and a Russian accent on both sides
In summer 2020 we uncovered a previously unknown multi-module C++ toolset used in highly target...
2020-10-08 19:00:40 | 阅读: 236 |
收藏
|
securelist.com
windows
loader
encryption
montysthree
MosaicRegressor: Lurking in the Shadows of UEFI
Part II. Technical details (PDF)UEFI (or Unified Extensible Firmware Interface) has become a...
2020-10-05 19:00:45 | 阅读: 247 |
收藏
|
securelist.com
firmware
microsoft
windows
malicious
SAS@Home is back this fall
The second SAS conference in 2020...
2020-10-01 00:15:02 | 阅读: 256 |
收藏
|
securelist.com
sas
security
workshop
workshops
surprises
Why master YARA: from routine to extreme threat hunting cases. Follow-up
ContentsQuestions about usage of YAR...
2020-09-29 23:00:47 | 阅读: 324 |
收藏
|
securelist.com
network
morphy
snort
c2
download
Threat landscape for industrial automation systems. H1 2020 highlights
Overall downward trend for percentages of att...
2020-09-24 17:00:21 | 阅读: 247 |
收藏
|
securelist.com
malicious
threats
percentages
rankings
removable
Looking for sophisticated malware in IoT devices
One of the motivations for this post is to encourage other researchers who are interested in th...
2020-09-23 19:00:28 | 阅读: 217 |
收藏
|
securelist.com
firmware
binwalk
bootloader
entropy
malicious
An overview of targeted attacks and APTs on Linux
Perhaps unsurprisingly, a lot has been written about targeted attacks on Windows systems. Windo...
2020-09-10 19:00:39 | 阅读: 238 |
收藏
|
securelist.com
network
windows
security
turla
malicious
Digital Education: The cyberrisks of the online classroom
This past spring, as the COVID-19 pandemic took hold, online learning became the new norm as un...
2020-09-04 19:00:24 | 阅读: 218 |
收藏
|
securelist.com
threats
educational
encountered
phishing
IT threat evolution Q2 2020. Mobile statistics
IT threat evolution Q2 2020. ReviewIT threat evolution Q2 2020. PC statisticsThese statistics...
2020-09-03 20:00:55 | 阅读: 220 |
收藏
|
securelist.com
trojan
q2
banker
trojans
threats
IT threat evolution Q2 2020. PC statistics
IT threat evolution Q2 2020. ReviewIT threat evolution Q2 2020. Mobile statisticsThese statis...
2020-09-03 19:30:23 | 阅读: 221 |
收藏
|
securelist.com
q2
trojan
download
ransomware
geography
Your new friend, KLara - Securelist
While doing threat research, teams need a lot of tools and systems to aid their hunting efforts...
2018-03-30 22:24:30 | 阅读: 273 |
收藏
|
securelist.com
klara
dispatcher
microsoft
python
matched
Previous
20
21
22
23
24
25
26
27
Next