Securelist
订阅

最新

1. -=TWELVE=- is back Crimeware reports ‧ Kaspersky
2. Exotic SambaSpy is now dancing with Italian users Crimeware reports ‧ GReAT
3. Loki: a new private agent for the popular Mythic framework Malware descriptions ‧ Artem Ushkov
4. Tropic Trooper spies on government entities in the Middle East Malware descriptions ‧ Sherif Magdy
5. Mallox ransomware: in-depth analysis and evolution Crimeware reports ‧ Fedor Sinitsyn, Yanis Zinchenko
6. A deep dive into the most interesting incident response cases of last year SOC, TI and IR posts ‧ Eduardo Ovalle, Ahmad Zaidi Said, AbdulRhman Alfaifi
7. IT threat evolution in Q2 2024. Non-mobile statistics Malware reports ‧ AMR
8. IT threat evolution in Q2 2024. Mobile statistics Malware reports ‧ Anton Kivva
9. IT threat evolution Q2 2024 Malware reports ‧ David Emm
10. Head Mare: adventures of a unicorn in Russia and Belarus Crimeware reports ‧ Kaspersky
更新于 41 分钟前

近期历史最近 100 条记录

2024-09-20 -=TWELVE=- is back Crimeware reports ‧ Kaspersky
2024-09-18 Exotic SambaSpy is now dancing with Italian users Crimeware reports ‧ GReAT
2024-09-09 Loki: a new private agent for the popular Mythic framework Malware descriptions ‧ Artem Ushkov
2024-09-05 Tropic Trooper spies on government entities in the Middle East Malware descriptions ‧ Sherif Magdy
2024-09-04 Mallox ransomware: in-depth analysis and evolution Crimeware reports ‧ Fedor Sinitsyn, Yanis Zinchenko
2024-09-03 A deep dive into the most interesting incident response cases of last year SOC, TI and IR posts ‧ Eduardo Ovalle, Ahmad Zaidi Said, AbdulRhman Alfaifi
2024-09-03 IT threat evolution in Q2 2024. Non-mobile statistics Malware reports ‧ AMR
2024-09-03 IT threat evolution in Q2 2024. Mobile statistics Malware reports ‧ Anton Kivva
2024-09-03 IT threat evolution Q2 2024 Malware reports ‧ David Emm
2024-09-02 Head Mare: adventures of a unicorn in Russia and Belarus Crimeware reports ‧ Kaspersky
2024-08-27 HZ Rat backdoor for macOS attacks users of China’s DingTalk and WeChat Malware descriptions ‧ Sergey Puzan
2024-08-22 Memory corruption vulnerabilities in Suricata and FreeRDP Vulnerability reports ‧ Dmitry Shmoylov, Evgeny Legerov, Denis Skvortsov
2024-08-21 Exploits and vulnerabilities in Q2 2024 Vulnerability reports ‧ Vitaly Morgunov, Alexander Kolesnikov
2024-08-20 Approach to mainframe penetration testing on z/OS SOC, TI and IR posts ‧ Denis Stepanov, Alexander Korotin
2024-08-19 BlindEagle flying high in Latin America APT reports ‧ GReAT
2024-08-16 Tusk: unraveling a complex infostealer campaign SOC, TI and IR posts ‧ Elsayed Elrefaei, AbdulRhman Alfaifi
2024-08-14 EastWind campaign: new CloudSorcerer attacks on government organizations in Russia APT reports ‧ GReAT
2024-08-13 APT trends report Q2 2024 APT reports ‧ GReAT
2024-08-12 Indirect prompt injection in the real world: how people manipulate neural networks Research ‧ Vladislav Tushkanov
2024-08-05 LianSpy: new Android spyware targeting Russian users Malware descriptions ‧ Dmitry Kalinin
2024-08-01 How “professional” ransomware variants boost cybercrime groups Crimeware reports ‧ GReAT
2024-07-29 Mandrake spyware sneaks onto Google Play again, flying under the radar for two years Malware descriptions ‧ Tatyana Shishkova, Igor Golovin
2024-07-11 When spear phishing met mass phishing Spam and phishing ‧ Roman Dedenok
2024-07-09 Developing and prioritizing a detection engineering backlog based on MITRE ATT&CK SOC, TI and IR posts ‧ Roman Nazarov, Andrey Tamoykin, Kaspersky Security Services
2024-07-08 CloudSorcerer – A new APT targeting Russian government entities APT reports ‧ GReAT
2024-07-02 Analysis of user password strength Research ‧ Alexey Antonov
2024-06-25 Cybersecurity in the SMB space — a growing threat Research ‧ Kaspersky
2024-06-24 XZ backdoor: Hook analysis Incidents ‧ Anderson Leite, Sergey Belov
2024-06-18 Analysis of user password strength Research ‧ Alexey Antonov
2024-06-13 Cinterion EHS5 3G UMTS/HSPA Module Research Research ‧ Kaspersky ICS CERT
2024-06-11 QR code SQL injection and other vulnerabilities in a popular biometric terminal Research ‧ Georgy Kiguradze
2024-06-10 Bypassing 2FA with phishing and OTP bots Spam and phishing ‧ Olga Svistunova
2024-06-03 IT threat evolution in Q1 2024. Mobile statistics Malware reports ‧ Anton Kivva
2024-06-03 IT threat evolution Q1 2024 Malware reports ‧ David Emm
2024-06-03 IT threat evolution in Q1 2024. Non-mobile statistics Malware reports ‧ AMR
2024-05-28 Trusted relationship attacks: trust, but verify SOC, TI and IR posts ‧ Dmitry Kachan, Alina Sukhanova
2024-05-27 Message board scams Spam and phishing ‧ CFR team
2024-05-27 Threat landscape for industrial automation systems, Q1 2024 Industrial threats ‧ Kaspersky ICS CERT
2024-05-23 ShrinkLocker: Turning BitLocker into ransomware SOC, TI and IR posts ‧ Cristian Souza, Eduardo Ovalle, Ashley Muñoz, Christopher Zachor
2024-05-23 A journey into forgotten Null Session and MS-RPC interfaces Research ‧ Haidar Kabibo
2024-05-22 Stealers, stealers and more stealers Malware reports ‧ GReAT
2024-05-15 QakBot attacks with Windows zero-day (CVE-2024-30051) Software ‧ Boris Larin, Mert Degirmenci
2024-05-14 Incident response analyst report 2023 SOC, TI and IR posts ‧ Kaspersky GERT, Kaspersky Security Services
2024-05-09 APT trends report Q1 2024 APT reports ‧ GReAT
2024-05-08 State of ransomware in 2024 Publications ‧ Kaspersky
2024-05-07 Exploits and vulnerabilities in Q1 2024 Publications ‧ Alexander Kolesnikov, Vitaly Morgunov
2024-05-06 Financial cyberthreats in 2023 Publications ‧ Kaspersky
2024-04-30 Managed Detection and Response in 2023 SOC, TI and IR posts ‧ Kaspersky Security Services
2024-04-24 Assessing the Y, and How, of the XZ Utils incident Incidents ‧ GReAT
2024-04-22 ToddyCat is making holes in your infrastructure APT reports ‧ Andrey Gunkin, Alexander Fedotov, Natalya Shornikova
2024-04-18 DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware APT reports ‧ GReAT
2024-04-17 SoumniBot: the new Android banker’s unique techniques Malware descriptions ‧ Dmitry Kalinin
2024-04-15 Using the LockBit builder to generate targeted ransomware Malware descriptions ‧ Eduardo Ovalle, Francesco Figurelli, Cristian Souza, Ashley Muñoz
2024-04-12 XZ backdoor story – Initial analysis Incidents ‧ GReAT
2024-03-28 DinodasRAT Linux implant targeting entities worldwide Malware descriptions ‧ Anderson Leite, Lisandro Ubiedo
2023-08-30 IT threat evolution in Q2 2023. Non-mobile statistics Malware reports ‧ AMR
2023-08-30 IT threat evolution in Q2 2023. Mobile statistics Malware reports ‧ Anton Kivva
2023-08-30 IT threat evolution in Q2 2023 Malware reports ‧ David Emm
2023-08-25 Lockbit leak, research opportunities on tools leaked from TAs Research ‧ Eduardo Ovalle, Francesco Figurelli
2023-08-14 Phishing with hacked sites Spam and phishing ‧ Tatyana Machneva, Olga Svistunova
2023-08-10 Focus on DroxiDat/SystemBC APT reports ‧ Kurt Baumgartner
2023-08-10 Common TTPs of attacks against industrial organizations Industrial threats ‧ Kirill Kruglov, Vyacheslav Kopeytsev, Artem Snegirev
2023-08-03 What’s happening in the world of crimeware: Emotet, DarkGate and LokiBot Malware reports ‧ GReAT
2023-07-28 Anomaly detection in certificate-based TGT requests Research ‧ Alexander Rodchenko
2023-07-27 APT trends report Q2 2023 APT reports ‧ GReAT
2023-07-19 Comprehensive analysis of initial attack samples exploiting CVE-2023-23397 vulnerability Research ‧ Francesco Figurelli, Eduardo Ovalle
2023-07-05 Email crypto phishing scams: stealing from hot and cold crypto wallets Spam and phishing ‧ Roman Dedenok, Konstantin Zykov
2023-06-28 Andariel’s silly mistakes and a new malware family Malware reports ‧ GReAT, Kaspersky ICS CERT
2023-06-27 How cybercrime is impacting SMBs in 2023 Publications ‧ Kaspersky
2023-06-22 LockBit Green and phishing that targets organizations Malware reports ‧ GReAT
2023-06-21 Dissecting TriangleDB, a Triangulation spyware implant Malware descriptions ‧ Georgy Kucherin, Leonid Bezvershenko, Igor Kuznetsov
2023-06-20 A bowl full of security problems: Examining the vulnerabilities of smart pet feeders Research ‧ Roland Sako
2023-06-15 Understanding Malware-as-a-Service SOC, TI and IR posts ‧ Kaspersky Security Services, Alexander Zabrovsky
2023-06-12 Sneaky DoubleFinger loads GreetingGhoul targeting your cryptocurrency Malware reports ‧ GReAT, Sergey Lozhkin
2023-06-07 IT threat evolution Q1 2023 Malware reports ‧ David Emm
2023-06-07 IT threat evolution Q1 2023. Mobile statistics Malware reports ‧ Anton Kivva
2023-06-07 IT threat evolution in Q1 2023. Non-mobile statistics Malware reports ‧ AMR
2023-06-05 Satacom delivers browser extension that steals cryptocurrency Malware descriptions ‧ Haim Zigel, Oleg Kupreev
2023-06-02 In search of the Triangulation: triangle_check utility Software ‧ Igor Kuznetsov, Valentin Pashkov, Leonid Bezvershenko, Georgy Kucherin
2023-06-01 Operation Triangulation: iOS devices targeted with previously unknown malware APT reports ‧ Igor Kuznetsov, Valentin Pashkov, Leonid Bezvershenko, Georgy Kucherin
2023-05-23 Meet the GoldenJackal APT group. Don’t expect any howls APT reports ‧ Giampaolo Dedola
2023-05-19 CloudWizard APT: the bad magic story goes on APT reports ‧ Leonid Bezvershenko, Georgy Kucherin, Igor Kuznetsov
2023-05-17 Minas – on the way to complexity Malware descriptions ‧ Ilya Borisov, Vasily Berdnikov
2023-05-16 The nature of cyberincidents in 2022 SOC, TI and IR posts ‧ Kaspersky GERT, Kaspersky Security Services
2023-05-11 New ransomware trends in 2023 Publications ‧ GReAT
2023-05-04 Not quite an Easter egg: a new family of Trojan subscribers on Google Play Malware descriptions ‧ Dmitry Kalinin
2023-05-02 Managed Detection and Response in 2022 SOC, TI and IR posts ‧ Kaspersky Security Services
2023-05-01 What does ChatGPT know about phishing? Research ‧ Vladislav Tushkanov
2023-04-27 APT trends report Q1 2023 APT reports ‧ GReAT
2023-04-24 Tomiris called, they want their Turla malware back APT reports ‧ Pierre Delcher, Ivan Kwiatkowski
2023-04-17 QBot banker delivered through business correspondence Incidents ‧ Victoria Vlasova, Andrey Kovtun, Darya Ivanova
2023-04-13 Uncommon infection methods—part 2 Malware reports ‧ GReAT
2023-04-12 Following the Lazarus group by tracking DeathNote campaign APT reports ‧ Seongsu Park
2023-04-12 Nokoyawa ransomware attacks with Windows zero-day Research ‧ Boris Larin
2023-04-10 Overview of Google Play threats sold on the dark web Research ‧ Kaspersky Security Services, GReAT
2023-04-05 The Telegram phishing market Research ‧ Olga Svistunova
2023-04-03 Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack APT reports ‧ Georgy Kucherin, Vasily Berdnikov, Vilen Kamalov
2023-03-30 Selecting the right MSSP: Guidelines for making an objective decision SOC, TI and IR posts ‧ Roman Nazarov
2023-03-29 Financial cyberthreats in 2022 Malware reports ‧ Kaspersky
2023-03-28 Copy-paste heist or clipboard-injector attacks on cryptousers Malware descriptions ‧ Vitaly Kamluk

匿名用户只展示最新 100 条榜单历史,更多历史数据请登录后查看,支持时光机按天筛选

Sponsors

今日解忧 - 赛博修行,舒缓静心,21世纪解压神器!
今日历 - 全球最全的日历,日历届的航空母舰!
百晓生AI - 全能创作助手

猜你喜欢