unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Good, the Bad and the Ugly in Cybersecurity – Week 37
The GoodThis week, the DoJ, FBI, and Portuguese authorities dismantled WT1SHOP, a prolific cybercr...
2022-9-9 21:0:0 | 阅读: 24 |
收藏
|
www.sentinelone.com
ransomware
wt1shop
angeles
marketplace
continuing
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection
By Aleksandar Milenkoski & Jim WalterWe observe a new trend on the ransomware scene – intermittent...
2022-9-8 21:29:52 | 阅读: 39 |
收藏
|
www.sentinelone.com
ransomware
encryption
blackcat
basta
Cyber Risks in the Education Sector | Why Cybersecurity Needs to Be Top of the Class
With summer on its last legs, the phrase “back to school” can be heard everywhere. For opportunisti...
2022-9-7 23:31:33 | 阅读: 24 |
收藏
|
www.sentinelone.com
schools
security
ransomware
pii
Accelerating Your Cloud Security with Workload Protection
As more organizations make the shift towards hybrid and cloud environments, security teams need a n...
2022-9-6 22:29:8 | 阅读: 22 |
收藏
|
www.sentinelone.com
cloud
security
singularity
threats
workloads
The Good, the Bad and the Ugly in Cybersecurity – Week 36
The GoodThis week, the United Kingdom announced plans to roll out a new security framework to pro...
2022-9-2 23:0:45 | 阅读: 24 |
收藏
|
www.sentinelone.com
security
twilio
okta
nitrokod
translate
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
Executive SummaryJuiceLedger is a relativey new threat actor focused on infostealing through a .N...
2022-9-2 00:0:13 | 阅读: 33 |
收藏
|
www.sentinelone.com
pypi
juiceledger
python
phishing
Advancing Security | The Age of AI & Machine Learning in Cybersecurity
Modern cyber attackers’ tactics, techniques, and procedures (TTPs) have become both rapid and abund...
2022-8-31 22:57:8 | 阅读: 27 |
收藏
|
www.sentinelone.com
threats
security
machine
cisos
Autonomous Detection & Response | How MDR Disrupts the Cyber Kill Chain
The only predictable thing about the cyber threat landscape is that you can always expect it to shi...
2022-8-29 22:26:20 | 阅读: 20 |
收藏
|
www.sentinelone.com
vigilance
network
lateral
threats
machine
The Good, the Bad and the Ugly in Cybersecurity – Week 35
The GoodThis week, Stanford Internet Observatory reported on their collaborative effort with socia...
2022-8-26 22:25:44 | 阅读: 25 |
收藏
|
www.sentinelone.com
plex
security
passwords
desfa
BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar
BlueSky ransomware is an emerging threat that researchers have been paying increasing attention to...
2022-8-26 00:2:6 | 阅读: 56 |
收藏
|
www.sentinelone.com
bluesky
ransomware
kmsauto
alguien
windows
Microsoft Active Directory as a Prime Target for Ransomware Operators
The Active Directory (AD) infrastructure continues to be a key element in ransomware campaigns and...
2022-8-24 21:50:35 | 阅读: 25 |
收藏
|
www.sentinelone.com
ransomware
security
singularity
attackers
network
XCSSET Malware Update | macOS Threat Actors Prepare for Life Without Python
Threat actors behind the XCSSET malware have been relatively quiet since last year, but new activit...
2022-8-23 00:58:32 | 阅读: 34 |
收藏
|
www.sentinelone.com
applescript
xcsset
remote
python
library
The Good, the Bad and the Ugly in Cybersecurity – Week 34
The GoodThis week, the U.S. Department of Justice has extradited a Russian citizen from the Nether...
2022-8-19 23:0:15 | 阅读: 24 |
收藏
|
www.sentinelone.com
ransomware
water
blackbyte
ryuk
dubnikov
Chronicle of an Identity-Based Attack | Singularity™ Identity vs. Cisco Breach
While data breaches, ransomware, and supply chain attacks saturate news articles, the risk of ident...
2022-8-19 01:13:3 | 阅读: 39 |
收藏
|
www.sentinelone.com
singularity
remote
cloud
security
More Evil Markets | How It’s Never Been Easier To Buy Initial Access To Compromised Networks
From ransomware operators like LockBit and BlackBasta to APTs striking for or against Russian or Ch...
2022-8-18 00:12:13 | 阅读: 28 |
收藏
|
www.sentinelone.com
prices
selling
markets
Detecting a Rogue Domain Controller – DCShadow Attack
In our earlier Protecting Against Active Directory DCSync Attacks blog post, we have seen how attac...
2022-8-15 23:5:52 | 阅读: 45 |
收藏
|
www.sentinelone.com
dcshadow
replication
lsadump
rogue
attacker
The Good, the Bad and the Ugly in Cybersecurity – Week 33
The GoodThis week, the Department of Justice extradited a Russian national alleged to be an operat...
2022-8-12 23:0:58 | 阅读: 36 |
收藏
|
www.sentinelone.com
eleven
security
criminal
denmark
Day 2 of Black Hat USA | People vs. Cybersecurity – Exploring Enhanced Email Protection and Surveillance Abuse
Las Vegas, have you been enjoying this year’s Black Hat USA event so far? The SentinelOne team is p...
2022-8-11 23:48:2 | 阅读: 27 |
收藏
|
www.sentinelone.com
proofpoint
threats
security
tom
Day 1 of Black Hat USA 2022 | Asset Intel, Data-Focused Security & the Realities of Cyber War
Hello, Las Vegas! We’re so excited to be in town again for the 25th annual Black Hat USA event! The...
2022-8-10 23:14:33 | 阅读: 31 |
收藏
|
www.sentinelone.com
ingest
00pm
armis
wednesday
booth
LABScon | Security Research in Real Time – Talks Not To Miss, Part Two
This is a continuation of our deep-dive into the inaugural LABScon 2022 agenda to shine a spotlight...
2022-8-9 01:11:49 | 阅读: 20 |
收藏
|
www.sentinelone.com
civilians
analysis
unc788
workshop
labscon
Previous
21
22
23
24
25
26
27
28
Next