Blog News 2021 February -
2021 - January February March April May June July August September October November December
Datum
Název
Blog
Companies
Avast blog
FireEye
Eset
The risks of following deplatformed apps into the wilderness
Security blog
Instagram releases wellbeing toolkit for teens
Social blog
Safe Connections Act aims to end digital stalking
Threat Brief: Windows IPv4 and IPv6 Stack Vulnerabilities (CVE-2021-24074, CVE-2021-24086 and CVE-2021-24094)
OS Blog
BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech
APT blog
Researchers Follow the Breadcrumbs: The Latest Vulnerabilities in Windows’ Network Stack
Vulnerebility blog
Cyberthreats Targeting India, October through December 2020
Cyber blog
Cybersecurity Threats to the COVID-19 Vaccine
2021 Credential Stuffing Report
Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication
Phishing blog
After Lightning Comes Thunder
Domestic Kitten – An Inside Look at the Iranian Surveillance Operations
Kasablanka Group's LodaRAT improves espionage capabilities on Android and Windows
Malware blog
Microsoft Patch Tuesday for Feb. 2021 — Snort rules and prominent vulnerabilities
Vulnerability Spotlight: Accusoft ImageGear vulnerabilities could lead to code execution
Fifty shades of vulnerable: How to play it safe with your smart sex toy
Protecting the water supply – hacker edition
Hacking blog
Microsoft patches actively exploited Windows kernel flaw
Hacker attempts to poison Florida city’s water supply
ESET Threat Report Q4 2020
Understanding the circle of digital certificate trust
Birdwatch by Twitter helps fight community misinformation
Hildegard: New TeamTNT Malware Targeting Kubernetes
Palo Alto Unity42
Nearly One-Third of Attack Targets Weren’t Running SolarWinds
Attack blog
NHS Warns of New COVID-19 Vaccine-Related Phishing Campaigns
Emotet Botnet Infrastructure Disrupted in International Takedown
BotNet blog
Privacy by Design for Ethical Applications
Deep into the SunBurst Attack
Déjà vu-lnerability
A ransomware primer
Ransomware blog
Vulnerability Spotlight: Multiple vulnerabilities in SoftMaker Office PlanMaker
Vulnerability Spotlight: Allen-Bradley Flex I/O vulnerable to denial of service
Interview with a LockBit ransomware operator
Google: Better patching could have prevented 1 in 4 zero‑days last year
Facebook etiquette: Behaviors you should avoid
Identity theft spikes amid pandemic
Kobalos – A complex Linux threat to high performance computing infrastructure
Operation NightScout: Supply‑chain attack targets online gaming in Asia