Aggregator
“微软蓝屏”事件引发对我国关键信息基础设施安全保护的思考
Thread Name-Calling – using Thread Name for offense
Research by: hasherezade Highlights: Introduction Process injection is one of the important techniques used by attackers. We can find its variants implemented in almost every malware. It serves purposes such as: Due to the fact that interference in the memory of a process by malicious modules can cause a lot of damage, all sorts of AV […]
The post Thread Name-Calling – using Thread Name for offense appeared first on Check Point Research.
Malware Attacks Surge 30% in First Half of 2024
金融欺诈手段持续升级,威胁猎人信贷反欺诈产品助力识别金融欺诈风险
多个俄罗斯网络攻击组织针对法国巴黎展开攻击,可能跟随后的奥运会有关——每周威胁情报动态第185期(07.19-07.25)
Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform
谷歌放弃淘汰第三方Cookie计划,将选择权交给用户
多无人系统协同中的人工智能安全探索
城市供暖系统遭网络攻击被关闭,大量居民在寒冬下停暖近2天
软件安全研发成熟度模型研究与实践
报告发布 | 数世咨询:信创安全市场指南(附下载)
杀疯了!谁说“微软蓝屏”对你没影响?(下)
从Google收购Wiz风波,聊聊云安全态势管理(CSPM)的发展
See Malicious Process Relationships on a Visual Graph
At ANY.RUN, we’re all about making in-depth technical information accessible. One of the ways we do this is by providing you with various detailed, yet easy-to-understand reports on malware behavior. One such report is Process graph. What is Process graph? Process graph is a report that visually shows how system processes, especially malicious ones, relate […]
The post See Malicious Process Relationships <br> on a Visual Graph appeared first on ANY.RUN's Cybersecurity Blog.