Blog News 2021 February - 


2021 - January February March April May June July August September October November December


Datum

Název

Blog

Companies

20.2.21AI can make you do what?!Cyber blog

Avast blog

20.2.21The FDA appoints its first medical device cybersecurity directorBigBrother blog

Avast blog

20.2.21Clubhouse: Security and privacy in the new social media appSocial blog

Avast blog

20.2.21Safe Connections Act aims to end digital stalkingCyber blog

Avast blog

20.2.21Helsinki becomes the first city to employ new open-source data trust networkIncident blog

Avast blog

20.2.21IronNetInjector: Turla’s New Malware Loading ToolMalware blogPalo Alto Unity42
20.2.21WatchDog: Exposing a Cryptojacking Campaign That’s Operated for Two YearsCryptocurrency blogPalo Alto Unity42
20.2.21Kia Motors America: Ransomware Not Behind Extended Systems OutageRansomware blogCybereason
20.2.21Global Law Firm Attributes Data Breach to Compromise at File Sharing ProviderIncident blogCybereason
20.2.21Cybereason vs. NetWalker RansomwareRansomware blogCybereason
20.2.21Malicious Life Podcast: Should Law Enforcement Use Facial Recognition? Pt. 1Malware blogCybereason
20.2.21The Cybereason Malop: Achieving Operation-Centric SecurityCyber blogCybereason
20.2.21Attacker Tries to Poison Florida City’s Water SupplyAttack blogCybereason
20.2.21Extortionists Publish Data Stolen from Two Healthcare Service ProvidersIncident blogCybereason
20.2.21Nearly One-Third of Attack Targets Weren’t Running SolarWindsHacking blogCybereason
20.2.21Beyond Clubhouse: Vulnerable Agora SDKs Still in Widespread UseVulnerebility blogMcafee blog
20.2.21Don’t Call Us We’ll Call You: McAfee ATR Finds Vulnerability in Agora Video SDKVulnerebility blogMcafee blog
20.2.21Solving DevSecOps and Microservice Challenges with Zero TrustCyber blogF5 Labs
20.2.21Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part Two)IoT blog

FireEye

20.2.21Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for CommunicationSocial blog

FireEye

20.2.21Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part One)IoT blogFireEye
20.2.21ApoMacroSploit : Apocalyptical FUD raceCyber blogCheckpoint
20.2.21Masslogger campaigns exfiltrates user credentialsCyber blogCisco Talos
20.2.21Vulnerability Spotlight: Two vulnerabilities in Advantech WebAccess/SCADAICS blogCisco Talos
20.2.21TDoS attacks could cost lives, warns FBIAttack blogEset
20.2.21Malware authors already taking aim at Apple M1 MacsMalware blog

Eset

20.2.21Attacks targeting IT firms stir concern, controversyAttack blog

Eset

20.2.21Romance scams in 2020: Breaking hearts, wallets – and recordsSpam blogEset
20.2.21Beware of COVID‑19 vaccine scams and misinformationSpam blog

Eset

20.2.21Record‑high number of vulnerabilities reported in 2020Vulnerebility blog

Eset

13.2.21

The risks of following deplatformed apps into the wilderness

Security blog

Avast blog

13.2.21

Instagram releases wellbeing toolkit for teens

Social blog

Avast blog

13.2.21

Safe Connections Act aims to end digital stalking

Security blog

Avast blog

13.2.21

Threat Brief: Windows IPv4 and IPv6 Stack Vulnerabilities (CVE-2021-24074, CVE-2021-24086 and CVE-2021-24094)

OS Blog

Palo Alto Unity42
13.2.21

BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech

APT blog

Palo Alto Unity42
13.2.21

Researchers Follow the Breadcrumbs: The Latest Vulnerabilities in Windows’ Network Stack

Vulnerebility blog

Mcafee blog
13.2.21

Cyberthreats Targeting India, October through December 2020

Cyber blog

F5 Labs
13.2.21

Cybersecurity Threats to the COVID-19 Vaccine

Cyber blog

F5 Labs
13.2.21

2021 Credential Stuffing Report

Cyber blog

F5 Labs
13.2.21

Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication

Phishing blog

F5 Labs
13.2.21

After Lightning Comes Thunder

Security blog

Checkpoint
13.2.21

Domestic Kitten – An Inside Look at the Iranian Surveillance Operations

APT blog

Checkpoint
13.2.21

Kasablanka Group's LodaRAT improves espionage capabilities on Android and Windows

Malware blog

Cisco Talos
13.2.21

Microsoft Patch Tuesday for Feb. 2021 — Snort rules and prominent vulnerabilities

Vulnerebility blog

Cisco Talos
13.2.21

Vulnerability Spotlight: Accusoft ImageGear vulnerabilities could lead to code execution

Vulnerebility blog

Cisco Talos
13.2.21

Fifty shades of vulnerable: How to play it safe with your smart sex toy

Vulnerebility blog

Eset
13.2.21

Protecting the water supply – hacker edition

Hacking blog

Eset

13.2.21

Microsoft patches actively exploited Windows kernel flaw

OS Blog

Eset

13.2.21

Hacker attempts to poison Florida city’s water supply

Hacking blog

Eset

13.2.21

ESET Threat Report Q4 2020

Cyber blog

Eset

6.2.21

Understanding the circle of digital certificate trust

Security blog

Avast blog

6.2.21

Birdwatch by Twitter helps fight community misinformation

Social blog

Avast blog

6.2.21

Instagram releases wellbeing toolkit for teens

Social blog

Avast blog

6.2.21

Hildegard: New TeamTNT Malware Targeting Kubernetes

Malware blog

Palo Alto Unity42

6.2.21

Nearly One-Third of Attack Targets Weren’t Running SolarWinds

Attack blog

Cybereason
6.2.21

NHS Warns of New COVID-19 Vaccine-Related Phishing Campaigns

Phishing blog

Cybereason
6.2.21

Emotet Botnet Infrastructure Disrupted in International Takedown

BotNet blog

Cybereason
6.2.21

Privacy by Design for Ethical Applications

Security blog

F5 Labs
6.2.21

Cybersecurity Threats to the COVID-19 Vaccine

Cyber blog

F5 Labs
6.2.21

Deep into the SunBurst Attack

Attack blog

Checkpoint
6.2.21

Déjà vu-lnerability

Vulnerebility blog

Project Zero
6.2.21

A ransomware primer

Ransomware blog

Cisco Talos
6.2.21

Vulnerability Spotlight: Multiple vulnerabilities in SoftMaker Office PlanMaker

Vulnerebility blog

Cisco Talos
6.2.21

Vulnerability Spotlight: Allen-Bradley Flex I/O vulnerable to denial of service

Vulnerebility blog

Cisco Talos
6.2.21

Interview with a LockBit ransomware operator

Ransomware blog

Cisco Talos
6.2.21

Google: Better patching could have prevented 1 in 4 zero‑days last year

Vulnerebility blog

Eset
6.2.21

Facebook etiquette: Behaviors you should avoid

Social blog

Eset

6.2.21

Identity theft spikes amid pandemic

Cyber blog

Eset

6.2.21

Kobalos – A complex Linux threat to high performance computing infrastructure

Malware blog

Eset

6.2.21

Operation NightScout: Supply‑chain attack targets online gaming in Asia

Attack blog

Eset