Datum | Název | Blog | Companies |
27.3.21 | Facebook developing Instagram app for kids under 13 | Social blog | Avast blog |
27.3.21 | The rise of ransomware as a service | Ransomware blog | Avast blog |
27.3.21 | Cybercrime complaints are up, according to the FBI's latest report | Cyber blog | Avast blog |
27.3.21 | Netflix tests password-sharing warning | Security blog | Avast blog |
27.3.21 | Fake Websites Used in COVID-19 Themed Phishing Attacks, Impersonating Brands Like Pfizer and BioNTech | Phishing blog | Palo Alto Unity42 |
27.3.21 | Unit 42 Discovers 15 New Vulnerabilities Across Microsoft, Adobe and Apple Products | Vulnerebility blog | Palo Alto Unity42 |
27.3.21 | New Mirai Variant Targeting Network Security Devices | BotNet blog | Palo Alto Unity42 |
27.3.21 | Malicious Life Podcast: Inside the HAFNIUM Microsoft Exchange Attacks | Attack blog | Cybereason |
27.3.21 | Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand | Ransomware blog | Cybereason |
27.3.21 | Malicious Life Podcast: Inside NotPetya, Part 2 | Ransomware blog | Cybereason |
27.3.21 | Netop Vision Pro – Distance Learning Software is 20/20 in Hindsight | Security blog | Mcafee blog |
27.3.21 | Denial-Of-Service and Password Login Attacks Top Reported Security Incidents, 2018-202 | Incident blog | F5 Labs |
27.3.21 | Quarterly Report: Incident Response trends from Winter 2020-21 | Incident blog | Cisco Talos |
27.3.21 | Defending Microsoft Exchange from encrypted attacks with Cisco Secure IPS | Attack blog | Cisco Talos |
27.3.21 | Warning issued over scams touting fake COVID‑19 vaccines, asking for Bitcoin | Cryptocurrency blog | Eset |
27.3.21 | Vengeful IT worker gets jail time for deleting company’s Microsoft user accounts | Security blog | Eset |
27.3.21 | Almost $2 billion lost to BEC scams in 2020 | Spam blog | Eset |
27.3.21 | When repairing things you own may make you an outlaw | Cyber blog | Eset |
27.3.21 | 5 reasons why (not only) financial companies struggle with cybersecurity | Cyber blog | Eset |
20.3.21 | Hackers breach 150,000 security cameras | Incident blog | Avast blog |
20.3.21 | Netflix tests password-sharing warning | Security blog | Avast blog |
20.3.21 | Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE Vulnerability | BotNet blog | Palo Alto Unity42 |
20.3.21 | New Mirai Variant Targeting Network Security Devices | BotNet blog | Palo Alto Unity42 |
20.3.21 | HAFNIUM Response: Cybereason is Dedicated to Defending Our Customers | Hacking blog | Cybereason |
20.3.21 | Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos Malware | Malware blog | Cybereason |
20.3.21 | Webinar: Protecting Against IT Infrastructure Attacks from HAFNIUM to SolarWinds | Hacking blog | Cybereason |
20.3.21 | SolarWinds Attacks Recovery Effort Could Take U.S. Government 18 Months | BigBrother blog | Cybereason |
20.3.21 | McAfee Defender’s Blog: Operation Dianxun | BigBrother blog | Mcafee blog |
20.3.21 | Operation Diànxùn: Cyberespionage Campaign Targeting Telecommunication Companies | BigBrother blog | Mcafee blog |
20.3.21 | Check Point Research Evasions Encyclopedia gets important updates | Hacking blog | Checkpoint |
20.3.21 | In-the-Wild Series: October 2020 0-day discovery | Vulnerebility blog | Project Zero |
20.3.21 | Registration now open for Talos webinar on Android malware | Malware blog | Cisco Talos |
20.3.21 | 7 steps to staying safe and secure on Twitter | Social blog | Eset |
20.3.21 | Trust your surveillance? Why hacked cameras are very bad | Hacking blog | Eset |
20.3.21 | FBI: Cybercrime losses topped US$4.2 billion in 2020 | Cyber blog | Eset |
20.3.21 | Beware Android trojan posing as Clubhouse app | Malware blog | Eset |
20.3.21 | Google fixes Chrome zero‑day bug exploited in the wild | Exploit blog | Eset |
20.3.21 | PayPal fraud: What merchants should know | Incident blog | Eset |
20.3.21 | Hackers breach 150,000 security cameras | Incident blog | Avast blog |
20.3.21 | Netflix tests password-sharing warning | Security blog | Avast blog |
20.3.21 | Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE Vulnerability | BotNet blog | Palo Alto Unity42 |
20.3.21 | New Mirai Variant Targeting Network Security Devices | BotNet blog | Palo Alto Unity42 |
20.3.21 | HAFNIUM Response: Cybereason is Dedicated to Defending Our Customers | Hacking blog | Cybereason |
20.3.21 | Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos Malware | Malware blog | Cybereason |
20.3.21 | Webinar: Protecting Against IT Infrastructure Attacks from HAFNIUM to SolarWinds | Hacking blog | Cybereason |
20.3.21 | SolarWinds Attacks Recovery Effort Could Take U.S. Government 18 Months | BigBrother blog | Cybereason |
20.3.21 | McAfee Defender’s Blog: Operation Dianxun | BigBrother blog | Mcafee blog |
20.3.21 | Operation Diànxùn: Cyberespionage Campaign Targeting Telecommunication Companies | BigBrother blog | Mcafee blog |
20.3.21 | When Will We Get Rid Of Passwords? | Security blog | F5 Labs |
20.3.21 | Check Point Research Evasions Encyclopedia gets important updates | Hacking blog | Checkpoint |
20.3.21 | In-the-Wild Series: October 2020 0-day discovery | Vulnerebility blog | Project Zero |
20.3.21 | Registration now open for Talos webinar on Android malware | Malware blog | Cisco Talos |
20.3.21 | 7 steps to staying safe and secure on Twitter | Social blog | Eset |
20.3.21 | Trust your surveillance? Why hacked cameras are very bad | Hacking blog | Eset |
20.3.21 | FBI: Cybercrime losses topped US$4.2 billion in 2020 | Cyber blog | Eset |
20.3.21 | Beware Android trojan posing as Clubhouse app | Malware blog | Eset |
20.3.21 | Google fixes Chrome zero‑day bug exploited in the wild | Exploit blog | Eset |
20.3.21 | PayPal fraud: What merchants should know | Incident blog | Eset |
13.3.21 | Beware of your browser extensions | Security blog | Avast blog |
13.3.21 | Hackers breach 150,000 security cameras | Incident blog | Avast blog |
13.3.21 | Microsoft Exchange Server Attack Timeline | OS Blog | Palo Alto Unity42 |
13.3.21 | Remediation Steps for the Microsoft Exchange Server Vulnerabilities | OS Blog | Palo Alto Unity42 |
13.3.21 | Analyzing Attacks Against Microsoft Exchange Server With China Chopper Webshells | OS Blog | Palo Alto Unity42 |
13.3.21 | Overview of dnsmasq Vulnerabilities: The Dangers of DNS Cache Poisoning | Vulnerebility blog | Palo Alto Unity42 |
13.3.21 | Attack Chain Overview: Emotet in December 2020 and January 2021 | Malware blog | Palo Alto Unity42 |
13.3.21 | Live Feeds of 150K Surveillance Cameras Compromised in Verkada Breach | Incident blog | Cybereason |
13.3.21 | HAFNIUM and SolarWinds Attacks Highlight Lack of Accountability | Attack blog | Cybereason |
13.3.21 | Seven Windows Wonders – Critical Vulnerabilities in DNS Dynamic Updates | Vulnerebility blog | Mcafee blog |
13.3.21 | McAfee ATR Thinks in Graphs | Security blog | Mcafee blog |
13.3.21 | IcedID Banking Trojan Uses COVID-19 Pandemic to Lure New Victims | Malware blog | FireEye |
13.3.21 | Detection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities | OS Blog | FireEye |
13.3.21 | Clast82 – A new Dropper on Google Play Dropping the AlienBot Banker and MRAT | OS Blog | Checkpoint |
13.3.21 | Playing in the (Windows) Sandbox | OS Blog | Checkpoint |
13.3.21 | Vulnerability Spotlight: Use-after-free vulnerability in 3MF Consortium lib3mf | Vulnerebility blog | Cisco Talos |
13.3.21 | Hafnium Update: Continued Microsoft Exchange Server Exploitation | OS Blog | Cisco Talos |
13.3.21 | Microsoft Patch Tuesday for March 2021 — Snort rules and prominent vulnerabilities | OS Blog | Cisco Talos |
13.3.21 | Domain dumpster diving | Security blog | Cisco Talos |
13.3.21 | Sex in the digital era: How secure are smart sex toys? | Security blog | Eset |
13.3.21 | Exchange servers under siege from at least 10 APT groups | APT blog | Eset |
13.3.21 | Online health security – when ‘opt out’ isn’t an option | Security blog | Eset |
13.3.21 | WhatsApp may soon roll out encrypted chat backups | Social blog | Eset |
13.3.21 | Women in cybersecurity: Gender gap narrows but not enough | Cyber blog | Eset |
13.3.21 | Going dark: Service disruptions at stock exchanges and brokerages | Hacking blog | Eset |
6.3.21 | Avast reaches out to Ursnif malware victims | Malware blog | Avast blog |
6.3.21 | Threat Assessment: Active Exploitation of Four Zero-Day Vulnerabilities in Microsoft Exchange Server | OS Blog | Palo Alto Unity42 |
6.3.21 | Threat Brief: Kerberos KDC Security Feature Bypass Vulnerability (CVE-2020-17049 AKA Bronze Bit) | OS Blog | Palo Alto Unity42 |
6.3.21 | Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns | Cyber blog | Palo Alto Unity42 |
6.3.21 | Malicious Life Podcast: Inside NotPetya, Part 1 | Malware blog | Cybereason |
6.3.21 | IcedID Banking Trojan Uses COVID-19 Pandemic to Lure New Victims | Malware blog | Cybereason |
6.3.21 | New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452 | Malware blog | FireEye |
6.3.21 | Fuzzing Image Parsing in Windows, Part Two: Uninitialized Memory | OS Blog | FireEye |
6.3.21 | So Unchill: Melting UNC2198 ICEDID to Ransomware Operations | Ransomware blog | FireEye |
6.3.21 | Detection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities | OS Blog | FireEye |
6.3.21 | Threat Advisory: HAFNIUM and Microsoft Exchange zero-day | OS Blog | Cisco Talos |
6.3.21 | Vulnerability Spotlight: Remote code execution vulnerability in WebKit WebAudio API | Vulnerebility blog | Cisco Talos |
6.3.21 | Vulnerability Spotlight: Password reset vulnerability in Epignosis eFront | Vulnerebility blog | Cisco Talos |
6.3.21 | ObliqueRAT returns with new campaign using hijacked websites | Malware blog | Cisco Talos |
6.3.21 | Vulnerability Spotlight: Memory corruption vulnerability in Accusoft ImageGear | Vulnerebility blog | Cisco Talos |
6.3.21 | How ESET’s work on SafetyNet® helps protect children online | Safety blog | Eset |
6.3.21 | Microsoft rushes out fixes for four zero‑day flaws in Exchange Server | OS Blog | Eset |
6.3.21 | Cybersecurity risks and challenges facing the financial industry | Cyber blog | Eset |
6.3.21 | Not all cybercriminals are sophisticated | Cyber blog | Eset |
6.3.21 | Popular password manager in the spotlight over web trackers | Cyber blog | Eset |
6.3.21 | Oxford University COVID‑19 lab hacked | Hacking blog | Eset |
6.3.21 | Safeguarding children against cyberbullying in the age of COVID‑19 | Cyber blog | Eset |
| | | |