5.12.20 |
The rise of the OGUsers hacking group |
Hacking blog |
Avast blog |
|
21.11.20 |
WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques |
Hacking blog | FireEye |
|
14.11.20 |
A Closer Look at the Web Skimmer |
Hacking blog | Palo Alto Unity42 |
|
14.11.20 |
WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques |
Hacking blog | FireEye |
|
7.11.20 |
When Threat Actors Fly Under the Radar: Vatet, PyXie and Defray777 |
Hacking blog | Palo Alto Unity42 |
|
7.11.20 |
INJ3CTOR3 Operation – Leveraging Asterisk Servers for Monetization |
Hacking blog |
Checkpoint |
|
24.10.20 |
Securing medical devices: Can a hacker break your heart? |
Hacking blog |
Eset |
|
17.10.20 |
50,000 home cameras reportedly hacked, footage posted online |
Hacking blog |
Eset |
|
10.10.20 |
Firmware can be hacked like software |
Hacking blog |
Avast blog |
|
10.10.20 |
Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads |
Hacking blog | Palo Alto Unity42 |
|
10.10.20 |
Unit 42 Cloud Threat Report: CSP Findings on Logging, Encryption and Exposed Services |
Hacking blog | Palo Alto Unity42 |
|
3.10.20 |
Firmware can be hacked like software |
Hacking blog |
Avast blog |
|
26.9.20 |
New Snort, ClamAV coverage strikes back against Cobalt Strike |
Hacking blog |
Cisco Talos |
|
26.9.20 |
Mozilla fixes flaw that let attackers hijack Firefox for Android via Wi‑Fi |
Hacking blog |
Eset |
|
22.8.20 |
“Mailto” attacks could steal files |
Hacking blog |
Avast blog |
|
15.8.20 |
COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module |
Hacking blog | FireEye |
|
15.8.20 |
Don’t be silly – it’s only a lightbulb |
Hacking blog |
Checkpoint |
8.8.20 |
COVID-19 tracking apps are easy targets for hackers |
Hacking blog |
Avast blog |
19 .7.20 |
My Adventures Hacking the iParcelBox |
Hacking blog |
Mcafee blog |
19 .7.20 |
What’s in the Box? Part II: Hacking the iParcelBox |
Hacking blog |
Mcafee blog |
17 .7.20 |
Warning issued over hackable security cameras |
Hacking blog |
Eset |
17 .7.20 |
Vast hack‑for‑hire scheme targeted thousands of people, organizations |
Hacking blog |
Eset |
13 .7.20 |
WHY NOT DETECT EVERY TTP IN THE MITRE ATT&CK FRAMEWORK? |
Hacking blog |
Cybereason |
|
30.5.20 |
LOVE YOUR ENEMIES BEFORE YOU DESTROY THEM — HACKING FOR GOOD |
Hacking blog |
Cybereason |
|
30.5.20 |
Bringing VandaTheGod down to Earth: Exposing the person behind a 7-year hacktivism campaign |
Hacking blog |
Checkpoint |
|
23.5.20 |
Attacking the Organism: Telecom Service Providers |
Hacking blog |
F5 Labs |
18.4.20 |
What is Cross-Site Scripting (XSS)? |
Hacking blog |
F5 Labs |
|
4.4.20 |
Work from home: Securing RDP and remote access |
Hacking blog |
Eset |
|
14.3.20 |
Microsoft: 99.9 percent of hacked accounts didn’t use MFA |
Hacking blog |
Eset |
7.3.20 |
Voice assistants can be hacked with ultrasonic waves |
Hacking blog |
Eset |
|
23.2.20 |
Hackers infect VPNs to plant hidden backdoors |
Hacking blog |
Avast blog |
|
2.2.20 |
Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed |
Hacking blog |
Palo Alto Unity42 |
|
2.2.20 |
xHunt Campaign: New Watering Hole Identified for Credential Harvesting |
Hacking blog |
Palo Alto Unity42 |
|
1.2.20 |
Abusing DLL Misconfigurations — Using Threat Intelligence to Weaponize R&D |
Hacking blog |
FireEye |
|
25.1.20 |
Attacking the Organism: Retail |
Attack blog
Hacking blog |
F5 Labs |
18.1.20 |
Millions of modems at risk of remote hijacking |
Hacking blog |
Eset |