Datum | Název | Blog | Companies |
May | Docker Honeypot Reveals Cryptojacking as Most Common Cloud Threat | | Palo Alto Unity42 |
May | What Can You Learn From a “Wiped” Computer With Digital Forensics? | | Palo Alto Unity42 |
May | Using AI to Detect Malicious C2 Traffic | | Palo Alto Unity42 |
May | Breaking Down Ransomware Attacks | | Palo Alto Unity42 |
May | Scammers Impersonating Windows Defender to Push Malicious Windows Apps | | Mcafee blog |
May | Cyberattacks at Banks and Financial Services Organizations | | F5 Labs |
May | REPORT 2021 Application Protection Report: Of Ransom and Redemption | | F5 Labs |
May | Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises | | FireEye |
May | Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices | | FireEye |
May | Uyghurs, a Turkic ethnic minority in China, targeted via fake foundations | | Checkpoint |
May | Melting Ice – Tracking IcedID Servers with a few simple steps | | Checkpoint |
May | Fuzzing iOS code on macOS at native speed | | Project Zero |
May | Elizabethan England has nothing on modern-day Russia | | Cisco Talos |
May | Vulnerability Spotlight: Multiple vulnerabilities in Trend Micro Home Network Security Station | | Cisco Talos |
May | Vulnerability Spotlight: Heap-based buffer overflow in Google Chrome could lead to code execution | | Cisco Talos |
May | Vulnerability Spotlight: Information disclosure vulnerability in macOS SMB server | | Cisco Talos |
May | Talos is hiring for several positions — Join our world-class security organization | | Cisco Talos |
May | Case Study: Incident Response is a relationship-driven business | | Cisco Talos |
May | I hacked my friend’s website after a SIM swap attack | | Eset |
May | Bluetooth bugs could allow attackers to impersonate devices | | Eset |
May | Apple fixes macOS zero‑day bug that let malware take secret screenshots | | Eset |
May | Rom‑con: How romance fraud targets older people and how to avoid it | | Eset |
May | Android 12 will give you more control over how much data you share with apps | | Eset |
May | Colonial Pipeline attack: Hacking the physical world | | Eset |
May | Scams target families of missing persons, FBI warns | | Eset |
May | Take action now – FluBot malware may be on its way | | Eset |
May | Android stalkerware threatens victims further and exposes snoopers themselves | | Eset |
May | DarkSide Ransomware Gang: An Overview | | Palo Alto Unity42 |
May | File Transfer Threats: Risk Factors and How Network Traffic Visibility Can Help | | Palo Alto Unity42 |
May | Detecting and Preventing Malicious Domains Proactively with DNS Security | | Palo Alto Unity42 |
May | New Shameless Commodity Cryptocurrency Stealer (WeSteal) and Commodity RAT (WeControl) | | Palo Alto Unity42 |
May | Unsecured Kubernetes Instances Could Be Vulnerable to Exploitation | | Palo Alto Unity42 |
May | Threat Brief: Codecov Bash Uploader | | Palo Alto Unity42 |
May | Are Your Nagios XI Servers Turning Into Cryptocurrency Miners for Attackers? | | Palo Alto Unity42 |
May | Actor Exploits Microsoft Exchange Server Vulnerabilities, Cortex XDR Blocks Harvesting of Credentials | | Palo Alto Unity42 |
May | New Vulnerability Affecting Container Engines CRI-O and Podman (CVE-2021-20291) | | Palo Alto Unity42 |
May | Threat Assessment: Clop Ransomware | | Palo Alto Unity42 |
May | Network Attack Trends: Internet of Threats (November 2020-January 2021) | | Palo Alto Unity42 |
May | Emotet Command and Control Case Study | | Palo Alto Unity42 |
May | Attackers Conducting Cryptojacking Operation Against U.S. Education Organizations | | Palo Alto Unity42 |
May | Wireshark Tutorial: Examining Traffic from Hancitor Infections | | Palo Alto Unity42 |
May | 2020 Phishing Trends With PDF Files | | Palo Alto Unity42 |
May | Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool | | Palo Alto Unity42 |
May | Wireshark Tutorial: Decrypting RDP Traffic | | Palo Alto Unity42 |
May | Threat Assessment: Matrix Ransomware | | Palo Alto Unity42 |
May | 20 Million Miners: Finding Malicious Cryptojacking Images in Docker Hub | | Palo Alto Unity42 |
May | Inside the DarkSide Ransomware Attack on Colonial Pipeline | | Cybereason |
May | PortDoor: New Chinese APT Backdoor Attack Targets Russian Defense Sector | | Cybereason |
May | Cybereason vs. Avaddon Ransomware | | Cybereason |
May | MITRE ATT&CK: Cybereason Dominates the Competition | | Cybereason |
May | Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities | | Cybereason |
May | Cybereason vs. DarkSide Ransomware | | Cybereason |
May | Whistleblower Accuses Ubiquiti of Downplaying Major Data Breach | | Cybereason |
May | FBI Pegs 2020 Cybercrime Costs at $4 Billion - Actual Losses Likely Higher | | Cybereason |
May | DearCry Ransomware and the HAFNIUM Attacks – What You Need to Know | | Cybereason |
May | DarkSide Ransomware Victims Sold Short | | Mcafee blog |
May | Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit | | Mcafee blog |
May | “Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards | | Mcafee blog |
May | Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware | | Mcafee blog |
May | How to Stop the Popups | | Mcafee blog |
May | Steps to Discover Hidden Threat from Phishing Email | | Mcafee blog |
May | Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation | | Mcafee blog |
May | Clever Billing Fraud Applications on Google Play: Etinu | | Mcafee blog |
May | McAfee Labs Report Reveals Latest COVID-19 Threats and Malware Surges | | Mcafee blog |
May | BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain | | Mcafee blog |
May | McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware | | Mcafee blog |
May | McAfee Defender’s Blog: Cuba Ransomware Campaign | | Mcafee blog |
May | McAfee Defenders Blog: Reality Check for your Defenses | | Mcafee blog |
May | Netop Vision Pro – Distance Learning Software is 20/20 in Hindsight | | Mcafee blog |
May | I Was a Human CAPTCHA Solver | | F5 Labs |
May | 2021 Credential Stuffing Report | | F5 Labs |
May | DDoS Attack Trends for 2020 | | F5 Labs |
May | Cyberattacks Targeting Latin America, January through March 2021 | | F5 Labs |
May | Email Compromise with Credential Stuffing Attack Tools | | F5 Labs |
May | Collusion Fraud: The Art of Gaming the System with Complicity | | F5 Labs |
May | Credential Stuffing Tools and Techniques, Part 1 | | F5 Labs |
May | Combatting Digital Fraud with Security Convergence | | F5 Labs |
May | Shining a Light on DARKSIDE Ransomware Operations | | FireEye |
May | The UNC2529 Triple Double: A Trifecta Phishing Campaign | | FireEye |
May | UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat | | FireEye |
May | Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity | | FireEye |
May | Abusing Replication: Stealing AD FS Secrets Over the Network | | FireEye |
May | Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise | | FireEye |
May | Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day | | FireEye |
May | Hacking Operational Technology for Defense: Lessons Learned From OT Red Teaming Smart Meter Control Infrastructure | | FireEye |
May | M-Trends 2021: A View From the Front Lines | | FireEye |
May | Back in a Bit: Attacker Use of the Windows Background Intelligent Transfer Service | | FireEye |
May | The Need to Protect Public AWS SSM Documents – What the Research Shows | | Checkpoint |
May | Security probe of Qualcomm MSM data services | | Checkpoint |
May | Pwn2Own Qualcomm DSP | | Checkpoint |
May | Iran’s APT34 Returns with an Updated Arsenal | | Checkpoint |
May | Designing sockfuzzer, a network syscall fuzzer for XNU | | Project Zero |
May | Policy and Disclosure: 2021 Edition | | Project Zero |
May | Who Contains the Containers? | | Project Zero |
May | Transparent Tribe APT expands its Windows malware arsenal | | Cisco Talos |
May | Microsoft Patch Tuesday for May 2021 — Snort rules and prominent vulnerabilities | | Cisco Talos |
May | Vulnerability Spotlight: Code execution vulnerability in Adobe Acrobat Reader | | Cisco Talos |
May | Lemon Duck spreads its wings: Actors target Microsoft Exchange servers, incorporate new TTPs | | Cisco Talos |
May | Vulnerability Spotlight: Use-after-free vulnerability in Foxit PDF Reader | | Cisco Talos |
May | Vulnerability Spotlight: Information disclosure vulnerability in the Linux Kernel | | Cisco Talos |
May | Threat Advisory: Pulse Secure Connect Coverage | | Cisco Talos |
May | Vulnerability Spotlight: Code execution vulnerabilities in PrusaSlicer | | Cisco Talos |
May | A year of Fajan evolution and Bloomberg themed campaigns | | Cisco Talos |
May | Vulnerability Spotlight: Multiple vulnerabilities in Synology DiskStation Manager | | Cisco Talos |
May | Vulnerability Spotlight: Remote code execution vulnerabilities in Cosori smart air fryer | | Cisco Talos |
May | Threat Advisory: NSA SVR Advisory Coverage | | Cisco Talos |
May | Vulnerability Spotlight: Multiple remote code execution vulnerabilities in Microsoft Azure Sphere | | Cisco Talos |
May | Microsoft Patch Tuesday for April 2021 — Snort rules and prominent vulnerabilities | | Cisco Talos |
May | Vulnerability Spotlight: Multiple vulnerabilities in OpenClinic’s GA web portal | | Cisco Talos |
May | Recording: Analyzing Android Malware — From triage to reverse-engineering | | Cisco Talos |
May | Sowing Discord: Reaping the benefits of collaboration app abuse | | Cisco Talos |
May | Vulnerability Spotlight: Out-of-bounds write vulnerabilities in Accusoft ImageGear | | Cisco Talos |
May | Cheating the cheater: How adversaries are using backdoored video game cheat engines and modding tools | | Cisco Talos |
May | Verizon’s 2021 DBIR: Phishing and ransomware threats looming ever larger | | Eset |
May | European police bust major online investment fraud ring | | Eset |
May | 1 million risky apps rejected or removed from Apple’s App Store in 2020 | | Eset |
May | ESET Research goes to RSA Conference 2021 with two presentations | | Eset |
May | WhatsApp will limit features for users who don’t accept new data‑sharing rules | | Eset |
May | Popular routers found vulnerable to hacker attacks | | Eset |
May | Fantastic passwords and where your children can find them | | Eset |
May | DDoS attack knocks Belgian government websites offline | | Eset |
May | Ousaban: Private photo collection hidden in a CABinet | | Eset |
May | Microsoft will soon remove Flash Player from Windows 10 devices | | Eset |
May | INTERPOL aims to deal a blow to digital piracy | | Eset |
May | FBI teams up with ‘Have I Been Pwned’ to alert Emotet victims | | Eset |
May | Prime targets: Governments shouldn’t go it alone on cybersecurity | | Eset |
May | Apple patches severe macOS security flaw | | Eset |
May | 4 common ways scammers use celebrity names to lure victims | | Eset |
May | Instagram rolls out new features to help prevent cyberbullying | | Eset |
May | AirDrop flaws could leak phone numbers, email addresses | | Eset |
May | Google rushes out fix for zero‑day vulnerability in Chrome | | Eset |
May | WhatsApp Pink: Watch out for this fake update | | Eset |
May | Google’s Project Zero to wait longer before disclosing bug details | | Eset |
May | Spring cleaning? Don’t forget about your digital footprint | | Eset |
May | One in six people use pet’s name as password | | Eset |
May | FBI removes web shells from compromised Exchange servers | | Eset |
May | WhatsApp flaw lets anyone lock you out of your account | | Eset |
May | Clubhouse in the spotlight after user records posted online | | Eset |
May | Data from 500 million LinkedIn accounts put up for sale | | Eset |
May | Does data stolen in a data breach expire? | | Eset |
May | (Are you) afreight of the dark? Watch out for Vyveva, new Lazarus backdoor | | Eset |
May | $38 million worth of gift cards stolen and sold on dark web | | Eset |
May | Supply‑chain attacks: When trust goes wrong, try hope? | | Eset |
May | Janeleiro, the time traveler: A new old banking trojan in Brazil | | Eset |
May | Is your dishwasher trying to kill you? | | Eset |
May | Are you prepared to prevent data loss? | | Eset |
May | Backdoor added to PHP source code in Git server breach | | Eset |
May | Apple rushes to patch zero‑day flaw in iOS, iPadOS | | Eset |
| | | |