Blog News 2021 January - 


2021 - January February March April May June July August September October November December


Datum

Název

Blog

Companies

30.1.21

Police take down Emotet and help possible victims with new tactics

BigBrother blog

Avast blog

30.1.21

Smartphone security: How law enforcement accesses encrypted data

Hardware blog

Avast blog

30.1.21

Birdwatch by Twitter helps fight community misinformation

Social blog

Avast blog

30.1.21

Pro-Ocean: Rocke Group’s New Cryptojacking Malware

Cryptocurrency blog

Palo Alto Unity42

30.1.21

SolarWinds Attacks Highlight Advantage of Indicators of Behavior for Early Detection

Attack blog

Cybereason

30.1.21

Cybereason vs. RansomEXX Ransomware

Ransomware blog

Cybereason

30.1.21

Last Hurrah: Executive Order to Protect IaaS Platforms from Malicious Actors

Malware blog

Cybereason

30.1.21

Emotet Botnet Infrastructure Disrupted in International Takedown

BotNet blog

Cybereason

30.1.21

McAfee ATR Launches Education-Inspired Capture the Flag Contest!

Cyber blog

Mcafee blog

30.1.21

Red Team Tools Reveal Gaps in Vulnerability Management Practice

Safety blog

F5 Labs

30.1.21

Privacy by Design for Ethical Applications

Cyber blog

F5 Labs

30.1.21

Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction

Malware blog

FireEye

30.1.21

Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication

Phishing blog

FireEye

30.1.21

TikTok fixes privacy issue discovered by Check Point Research

Social blog

Checkpoint

30.1.21

Deep into the SunBurst Attack

Attack blog

Checkpoint

30.1.21

A Look at iMessage in iOS 14

OS Blog

Project Zero

30.1.21

Vulnerability Spotlight: Multiple vulnerabilities in phpGACL class

Vulnerebility blog

Cisco Talos

30.1.21

Nation-state campaign targets Talos researchers

BigBrother blog

Cisco Talos

30.1.21

Vulnerability Spotlight: Denial-of-service vulnerabilities in Micrium uc-HTTP’s HTTP server

Vulnerebility blog

Cisco Talos

30.1.21

Emotet botnet disrupted in global operation

BotNet blog

Eset

30.1.21

Data Privacy Day: Top tips for safe remote learning

Cyber blog

Eset

30.1.21

Apple patches three iOS zero‑days under attack

OS Blog

Eset

30.1.21

Wormable Android malware spreads via WhatsApp messages

Social blog

Eset

23.1.21

The story of a video chat flaw uncovered by a teenager

Vulnerebility blog

Avast blog

23.1.21

What’s up with WhatsApp

Social blog

Avast blog

23.1.21

Microsoft source code allegedly for sale on SolarLeaks site

Hacking blog

Avast blog

23.1.21

Smartphone security: How law enforcement accesses encrypted data

Hardware blog

Avast blog

23.1.21

Network Attack Trends: Internet of Threats

Attack blog

Palo Alto Unity42

23.1.21

Wireshark Tutorial: Examining Emotet Infection Traffic

Malware blog

Palo Alto Unity42

23.1.21

SolarWinds Attacks Highlight Importance of Operation-Centric Approach

Attack blog

Cybereason

23.1.21

Two Pink Lines

Cyber blog

Mcafee blog

23.1.21

Can Bots Manipulate Data and Change Facts to Fiction?

BotNet blog

F5 Labs

23.1.21

Emulation of Kernel Mode Rootkits With Speakeasy

Malware blog

FireEye

23.1.21

Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452

Cyber blog

FireEye

23.1.21

Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction

Malware blog

FireEye

23.1.21

FreakOut – Leveraging Newest Vulnerabilities for creating a Botnet

BotNet blog

Checkpoint

23.1.21

Windows Exploitation Tricks: Trapping Virtual Memory Access

Exploit blog

Project Zero

23.1.21

The State of State Machines

Exploit blog

Project Zero

23.1.21

Hunting for Bugs in Windows Mini-Filter Drivers

Exploit blog

Project Zero

23.1.21

Vulnerability Spotlight: Multiple vulnerabilities in PrusaSlicer

Vulnerebility blog

Cisco Talos

23.1.21

Why do we fall for SMS phishing scams so easily?

Phishing blog

Eset

23.1.21

Vadokrist: A wolf in sheep’s clothing

Malware blog

Eset

23.1.21

DNSpooq bugs expose millions of devices to DNS cache poisoning

Attack blog

Eset

23.1.21

FBI warns of voice phishing attacks stealing corporate credentials

Phishing blog

Eset

23.1.21

WhatsApp delays privacy policy update after confusion, backlash

Social blog

Eset

23.1.21

What’s your attitude to parental controls?

Security blog

Eset

16.1.21Here's what 5G Ultra Wideband has to offer us in 2021Hardware blog

Avast blog

16.1.21Open Source Tool Release: Gaining Novel AWS Access With EBS Direct APIsSecurity blogPalo Alto Unity42
16.1.21xHunt Campaign: New BumbleBee Webshell and SSH Tunnels Used for Lateral MovementMalware blogPalo Alto Unity42
16.1.21Cybereason vs. Conti RansomwareRansomware blogCybereason
16.1.21A Year in Review: Threat Landscape for 2020Cyber blogMcafee blog
16.1.212021 Threat Predictions ReportCyber blogMcafee blog
16.1.21F5 Labs’ Cybersecurity Predictions for 2021Cyber blogF5 Labs
16.1.21Can Bots Manipulate Data and Change Facts to Fiction?BotNet blogF5 Labs
16.1.21Going Rogue- a Mastermind behind Android Malware Returns with a New RATMalware blogCheckpoint
16.1.21Hunting for Bugs in Windows Mini-Filter DriversVulnerebility blogCheckpoint
16.1.21In-the-Wild Series: Android Exploits Exploit blogCheckpoint
16.1.21In-the-Wild Series: Windows ExploitsExploit blogCheckpoint
16.1.21In-the-Wild Series: Android Post-ExploitationExploit blogCheckpoint
16.1.21In-the-Wild Series: Chrome ExploitsExploit blogCheckpoint
16.1.21In-the-Wild Series: Chrome Infinity BugVulnerebility blogCheckpoint
16.1.21Introducing the In-the-Wild SeriesVulnerebility blogCheckpoint
16.1.21Microsoft Patch Tuesday for Jan. 2021 — Snort rules and prominent vulnerabilitiesVulnerebility blog

Cisco Talos

16.1.21Changes to Cisco Talos’ Content and Threat Category listsSecurity blog

Cisco Talos

16.1.21CES 2021: Car spying – your insurance company is watching youCyber blog

Eset

16.1.21Hackers leak stolen COVID‑19 vaccine documentsBigBrother blog

Eset

16.1.21CES 2021: Router swarms invade your home (and know where you are)Cyber blog

Eset

16.1.21Operation Spalax: Targeted malware attacks in ColombiaCyber blogEset
16.1.215 common scams and how to avoid themSpam blogEset
9.1.21Where do things stand with Covid-19 tracking apps?Cyber blog

Avast blog

9.1.21It's time to consider getting a Covid-19 vaccine passport for travelCyber blog

Avast blog

9.1.21FTC orders Big Tech to explain their data collectionBigBrother blog

Avast blog

9.1.21Telegram app can reveal your exact locationSocial blog

Avast blog

9.1.21TA551: Email Attack Campaign Switches from Valak to IcedIDMalware blogPalo Alto Unity42
9.1.21Contextualizing Microsoft’s Source Code Exposure in the SolarWinds AttacksAttack blogCybereason
9.1.21AI-powered Cyber AttacksCyber blogF5 Labs
9.1.21What Is the Principle of Least Privilege and Why is it Important?Cyber blogF5 Labs
9.1.21F5 Labs’ Cybersecurity Predictions for 2021Cyber blogF5 Labs
9.1.21Stopping Serial Killer: Catching the Next StrikeMalware blogCheckpoint
9.1.21Vulnerability Spotlight: Denial-of-service vulnerability in Rockwell Automation RSLinxVulnerebility blog

Cisco Talos

9.1.21A Deep Dive into Lokibot Infection ChainMalware blog

Cisco Talos

9.1.21Vulnerability Spotlight: Multiple vulnerabilities in SoftMaker Office TextMakerVulnerebility blog

Cisco Talos

9.1.21Vulnerability Spotlight: Multiple vulnerabilities in Genivia gSOAPVulnerebility blog

Cisco Talos

9.1.21Chrome, Firefox updates fix severe security bugsVulnerebility blog

Eset

9.1.21WhatsApp updates privacy policy to enable sharing more data with FacebookSocial blog

Eset

9.1.21Stolen employee credentials put leading gaming firms at riskIncident blog

Eset

9.1.21PayPal users targeted in new SMS phishing campaignPhishing blogEset
2.1.21The History of DNS Vulnerabilities and the CloudVulnerebility blogPalo Alto Unity42
2.1.21Would you take the bait? Take our phishing quiz to find out!Security blog

Eset

2.1.21New warning issued over COVID‑19 vaccine fraud, cyberattacksCyber blog

Eset

2.1.2121 arrested after allegedly using stolen logins to commit fraudCyber blog

Eset