Blog News 2021 March - 


2021 - January February March April May June July August September October November December


Datum

Název

Blog

Companies

27.3.21

Facebook developing Instagram app for kids under 13

Social blog

Avast blog

27.3.21

The rise of ransomware as a service

Ransomware blog

Avast blog

27.3.21

Cybercrime complaints are up, according to the FBI's latest report

Cyber blog

Avast blog

27.3.21

Netflix tests password-sharing warning

Security blog

Avast blog

27.3.21

Fake Websites Used in COVID-19 Themed Phishing Attacks, Impersonating Brands Like Pfizer and BioNTech

Phishing blog

Palo Alto Unity42

27.3.21

Unit 42 Discovers 15 New Vulnerabilities Across Microsoft, Adobe and Apple Products

Vulnerebility blog

Palo Alto Unity42

27.3.21

New Mirai Variant Targeting Network Security Devices

BotNet blog

Palo Alto Unity42

27.3.21

Malicious Life Podcast: Inside the HAFNIUM Microsoft Exchange Attacks

Attack blog

Cybereason

27.3.21

Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand

Ransomware blog

Cybereason

27.3.21

Malicious Life Podcast: Inside NotPetya, Part 2

Ransomware blog

Cybereason

27.3.21

Netop Vision Pro – Distance Learning Software is 20/20 in Hindsight

Security blog

Mcafee blog

27.3.21

Denial-Of-Service and Password Login Attacks Top Reported Security Incidents, 2018-202

Incident blog

F5 Labs

27.3.21

Quarterly Report: Incident Response trends from Winter 2020-21

Incident blog

Cisco Talos

27.3.21

Defending Microsoft Exchange from encrypted attacks with Cisco Secure IPS

Attack blog

Cisco Talos

27.3.21

Warning issued over scams touting fake COVID‑19 vaccines, asking for Bitcoin

Cryptocurrency blog

Eset

27.3.21

Vengeful IT worker gets jail time for deleting company’s Microsoft user accounts

Security blog

Eset

27.3.21

Almost $2 billion lost to BEC scams in 2020

Spam blog

Eset

27.3.21

When repairing things you own may make you an outlaw

Cyber blog

Eset

27.3.21

5 reasons why (not only) financial companies struggle with cybersecurity

Cyber blog

Eset
20.3.21Hackers breach 150,000 security camerasIncident blogAvast blog
20.3.21Netflix tests password-sharing warningSecurity blogAvast blog
20.3.21Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE VulnerabilityBotNet blogPalo Alto Unity42
20.3.21New Mirai Variant Targeting Network Security DevicesBotNet blogPalo Alto Unity42
20.3.21HAFNIUM Response: Cybereason is Dedicated to Defending Our CustomersHacking blogCybereason
20.3.21Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos MalwareMalware blogCybereason
20.3.21Webinar: Protecting Against IT Infrastructure Attacks from HAFNIUM to SolarWindsHacking blogCybereason
20.3.21SolarWinds Attacks Recovery Effort Could Take U.S. Government 18 MonthsBigBrother blogCybereason
20.3.21McAfee Defender’s Blog: Operation DianxunBigBrother blogMcafee blog
20.3.21Operation Diànxùn: Cyberespionage Campaign Targeting Telecommunication CompaniesBigBrother blogMcafee blog
20.3.21Check Point Research Evasions Encyclopedia gets important updatesHacking blogCheckpoint
20.3.21In-the-Wild Series: October 2020 0-day discoveryVulnerebility blogProject Zero
20.3.21Registration now open for Talos webinar on Android malwareMalware blogCisco Talos
20.3.217 steps to staying safe and secure on TwitterSocial blogEset
20.3.21Trust your surveillance? Why hacked cameras are very badHacking blog

Eset

20.3.21FBI: Cybercrime losses topped US$4.2 billion in 2020Cyber blogEset
20.3.21Beware Android trojan posing as Clubhouse appMalware blogEset
20.3.21Google fixes Chrome zero‑day bug exploited in the wildExploit blog

Eset

20.3.21PayPal fraud: What merchants should knowIncident blogEset
20.3.21Hackers breach 150,000 security camerasIncident blogAvast blog
20.3.21Netflix tests password-sharing warningSecurity blogAvast blog
20.3.21Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE VulnerabilityBotNet blogPalo Alto Unity42
20.3.21New Mirai Variant Targeting Network Security DevicesBotNet blogPalo Alto Unity42
20.3.21HAFNIUM Response: Cybereason is Dedicated to Defending Our CustomersHacking blogCybereason
20.3.21Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos MalwareMalware blogCybereason
20.3.21Webinar: Protecting Against IT Infrastructure Attacks from HAFNIUM to SolarWindsHacking blogCybereason
20.3.21SolarWinds Attacks Recovery Effort Could Take U.S. Government 18 MonthsBigBrother blogCybereason
20.3.21McAfee Defender’s Blog: Operation DianxunBigBrother blogMcafee blog
20.3.21Operation Diànxùn: Cyberespionage Campaign Targeting Telecommunication CompaniesBigBrother blogMcafee blog
20.3.21When Will We Get Rid Of Passwords?Security blogF5 Labs
20.3.21Check Point Research Evasions Encyclopedia gets important updatesHacking blogCheckpoint
20.3.21In-the-Wild Series: October 2020 0-day discoveryVulnerebility blogProject Zero
20.3.21Registration now open for Talos webinar on Android malwareMalware blogCisco Talos
20.3.217 steps to staying safe and secure on TwitterSocial blogEset
20.3.21Trust your surveillance? Why hacked cameras are very badHacking blog

Eset

20.3.21FBI: Cybercrime losses topped US$4.2 billion in 2020Cyber blogEset
20.3.21Beware Android trojan posing as Clubhouse appMalware blogEset
20.3.21Google fixes Chrome zero‑day bug exploited in the wildExploit blog

Eset

20.3.21PayPal fraud: What merchants should knowIncident blogEset
13.3.21

Beware of your browser extensions

Security blog

Avast blog
13.3.21

Hackers breach 150,000 security cameras

Incident blog

Avast blog
13.3.21

Microsoft Exchange Server Attack Timeline

OS Blog

Palo Alto Unity42
13.3.21

Remediation Steps for the Microsoft Exchange Server Vulnerabilities

OS Blog

Palo Alto Unity42
13.3.21

Analyzing Attacks Against Microsoft Exchange Server With China Chopper Webshells

OS Blog

Palo Alto Unity42
13.3.21

Overview of dnsmasq Vulnerabilities: The Dangers of DNS Cache Poisoning

Vulnerebility blog

Palo Alto Unity42
13.3.21

Attack Chain Overview: Emotet in December 2020 and January 2021

Malware blog

Palo Alto Unity42
13.3.21

Live Feeds of 150K Surveillance Cameras Compromised in Verkada Breach

Incident blog

Cybereason
13.3.21

HAFNIUM and SolarWinds Attacks Highlight Lack of Accountability

Attack blog

Cybereason
13.3.21

Seven Windows Wonders – Critical Vulnerabilities in DNS Dynamic Updates

Vulnerebility blog

Mcafee blog
13.3.21

McAfee ATR Thinks in Graphs

Security blog

Mcafee blog
13.3.21

IcedID Banking Trojan Uses COVID-19 Pandemic to Lure New Victims

Malware blog

FireEye
13.3.21

Detection and Response to Exploitation of Microsoft Exchange Zero-Day Vulnerabilities

OS Blog

FireEye

13.3.21

Clast82 – A new Dropper on Google Play Dropping the AlienBot Banker and MRAT

OS Blog

Checkpoint
13.3.21

Playing in the (Windows) Sandbox

OS Blog

Checkpoint
13.3.21

Vulnerability Spotlight: Use-after-free vulnerability in 3MF Consortium lib3mf

Vulnerebility blog

Cisco Talos
13.3.21

Hafnium Update: Continued Microsoft Exchange Server Exploitation

OS Blog

Cisco Talos
13.3.21

Microsoft Patch Tuesday for March 2021 — Snort rules and prominent vulnerabilities

OS Blog

Cisco Talos
13.3.21

Domain dumpster diving

Security blog

Cisco Talos
13.3.21

Sex in the digital era: How secure are smart sex toys?

Security blog

Eset
13.3.21

Exchange servers under siege from at least 10 APT groups

APT blog

Eset

13.3.21

Online health security – when ‘opt out’ isn’t an option

Security blog

Eset
13.3.21

WhatsApp may soon roll out encrypted chat backups

Social blog

Eset

13.3.21

Women in cybersecurity: Gender gap narrows but not enough

Cyber blog

Eset
13.3.21

Going dark: Service disruptions at stock exchanges and brokerages

Hacking blog

Eset

6.3.21Avast reaches out to Ursnif malware victimsMalware blogAvast blog
6.3.21Threat Assessment: Active Exploitation of Four Zero-Day Vulnerabilities in Microsoft Exchange ServerOS BlogPalo Alto Unity42
6.3.21Threat Brief: Kerberos KDC Security Feature Bypass Vulnerability (CVE-2020-17049 AKA Bronze Bit)OS BlogPalo Alto Unity42
6.3.21Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement TakedownsCyber blogPalo Alto Unity42
6.3.21Malicious Life Podcast: Inside NotPetya, Part 1Malware blogCybereason
6.3.21IcedID Banking Trojan Uses COVID-19 Pandemic to Lure New VictimsMalware blogCybereason
6.3.21New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452Malware blogFireEye
6.3.21Fuzzing Image Parsing in Windows, Part Two: Uninitialized MemoryOS Blog

FireEye

6.3.21So Unchill: Melting UNC2198 ICEDID to Ransomware OperationsRansomware blogFireEye
6.3.21Detection and Response to Exploitation of Microsoft Exchange Zero-Day VulnerabilitiesOS Blog

FireEye

6.3.21Threat Advisory: HAFNIUM and Microsoft Exchange zero-dayOS BlogCisco Talos
6.3.21Vulnerability Spotlight: Remote code execution vulnerability in WebKit WebAudio APIVulnerebility blogCisco Talos
6.3.21Vulnerability Spotlight: Password reset vulnerability in Epignosis eFrontVulnerebility blogCisco Talos
6.3.21ObliqueRAT returns with new campaign using hijacked websitesMalware blogCisco Talos
6.3.21Vulnerability Spotlight: Memory corruption vulnerability in Accusoft ImageGearVulnerebility blogCisco Talos
6.3.21How ESET’s work on SafetyNet® helps protect children onlineSafety blogEset
6.3.21Microsoft rushes out fixes for four zero‑day flaws in Exchange ServerOS Blog

Eset

6.3.21Cybersecurity risks and challenges facing the financial industryCyber blogEset
6.3.21Not all cybercriminals are sophisticatedCyber blog

Eset

6.3.21Popular password manager in the spotlight over web trackersCyber blogEset
6.3.21Oxford University COVID‑19 lab hackedHacking blog

Eset

6.3.21Safeguarding children against cyberbullying in the age of COVID‑19Cyber blogEset