Frequent verification codes may appear for non-Mainland China IP visits. If visitors are severely affected, please send [IP|ASN](44.197.111.121|AS14618) to the bottom mailbox to add to the whitelist
文章列表
2023-02-13 08:00 In Before The Lock: ESXi #recordedfuture #威胁情报 Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, click here to download the report as a PDF.Executive SummaryAs organizations continue virtualizing their critical infrastructure and business systems, threat actors deploying ransomware have responded in ki
2023-02-09 08:00 Themes and Failures of Russia’s War Against Ukraine #recordedfuture #威胁情报 Insikt Group examines Russia’s hybrid warfare themes over the past year, illuminating its strategic miscalculations and strategies to overcome its shortfalls.
2023-02-07 08:00 ESXiArgs Ransomware Targets Publicly-Exposed ESXi OpenSLP Servers #recordedfuture #威胁情报 Explore the impact of ESXiArgs, the latest ransomware campaign hitting exposed VMware ESXi OpenSLP servers, as well as the current mitigation techniques and recovery strategies
2023-02-07 08:00 Supply Chain Threats: It’s Time For A New Approach #recordedfuture #威胁情报 Vendors in the supply chain play a critical role in helping organizations operate and compete in our global economy. When your vendors are hit by ransomware, infected with malware, or are vulnerable to attack, you need to know quickly so you can take immediate action to mitigate damage.
2023-02-06 08:00 Setting The Scene: Company Core Values, Our Guiding Principles #recordedfuture #威胁情报 In this blog, we dive into how our company core values act as guiding principles to help us navigate challenges but also growth.
2023-02-03 08:00 Analyze Recent Atlassian Vulnerabilities and Keep Your Infrastructure Protected #recordedfuture #威胁情报 Atlassian tools, like JIRA, Confluence, Bamboo, and BitBucket, contain important data in many organizations. Find out how to protect these and other hosts.
2023-02-02 08:00 New “Crypto Drainer” Phishing Pages Siphon Cryptocurrency in Seconds #recordedfuture #威胁情报 Insikt Group examines how ready-to-go “crypto drainers” are deployed with legitimate services on phishing pages to siphon crypto assets from crypto wallets.
2023-01-31 08:00 Dark Covenant 2.0: Cybercrime, the Russian State, and the War in Ukraine #recordedfuture #威胁情报 This report examines the unspoken connections between the Russian Federation, cybercriminals, and self-described hacktivists in Russia and Eastern Europe in the context of the Russian war in Ukraine.
2023-01-27 08:00 BlueBravo Uses Ambassador Lure to Deploy GraphicalNeutrino Malware #recordedfuture #威胁情报 Recorded Future's Insikt Group examines new activity from the Russian threat actor group, BlueBravo, targeting countries with a nexus to the Ukraine crisis.
2023-01-26 08:00 I, Chatbot #recordedfuture #威胁情报 New Recorded Future®, Insikt Group® research examines the ways in which threat actors can utilize ChatGPT for malicious use.
2023-01-17 08:00 Attack Surface Threats to Financial Services in 2023: Mitigate Security Risks with Intelligence #recordedfuture #威胁情报 Discover the current state of financial services organizations, the biggest cyber threats, and how attack surface intelligence can empower them to protect their critical data.
2023-01-17 08:00 Annual Payment Fraud Intelligence Report: 2022 #recordedfuture #威胁情报 Recorded Future's Insikt Group details the top trends and metrics of the payment card fraud landscape in 2022 and provides insights into what to expect in 2023.
2023-01-12 08:00 Current Trends in the Turkish-Language Dark Web #recordedfuture #威胁情报 Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, click here to download the report as a PDF.We analyzed advertisements, posts, and interactions within Turkish-language hacking and cybercrime forums to explore the capabilities, culture, and organization of
2023-01-12 08:00 Asset Discovery in the ICS/OT domains: Challenges and Opportunities #recordedfuture #威胁情报 Let’s explore the challenges associated with proper asset identification and visibility in the ICS/OT domains.
2023-01-09 08:00 Anatomy of a Threat Hunt with Splunk Enterprise Security and Splunk SOAR #recordedfuture #威胁情报 Recorded Future’s threat intelligence combined with Splunk Enterprise Security and Splunk SOAR demonstrates how to best operationalize intelligence.