Blog News 2021 May - 


2021 - January February March April May June July August September October November December


Datum

Název

Blog

Companies

May

Docker Honeypot Reveals Cryptojacking as Most Common Cloud Threat

 

Palo Alto Unity42

May

What Can You Learn From a “Wiped” Computer With Digital Forensics?

 

Palo Alto Unity42

May

Using AI to Detect Malicious C2 Traffic

 

Palo Alto Unity42

May

Breaking Down Ransomware Attacks

 

Palo Alto Unity42

May

Scammers Impersonating Windows Defender to Push Malicious Windows Apps

 

Mcafee blog

May

Cyberattacks at Banks and Financial Services Organizations

 

F5 Labs

May

REPORT 2021 Application Protection Report: Of Ransom and Redemption

 

F5 Labs

May

Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises

 

FireEye

May

Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices

 

FireEye

May

Uyghurs, a Turkic ethnic minority in China, targeted via fake foundations

 

Checkpoint

May

Melting Ice – Tracking IcedID Servers with a few simple steps

 

Checkpoint

May

Fuzzing iOS code on macOS at native speed

 

Project Zero

May

Elizabethan England has nothing on modern-day Russia

 

Cisco Talos

May

Vulnerability Spotlight: Multiple vulnerabilities in Trend Micro Home Network Security Station

 

Cisco Talos

May

Vulnerability Spotlight: Heap-based buffer overflow in Google Chrome could lead to code execution

 

Cisco Talos

May

Vulnerability Spotlight: Information disclosure vulnerability in macOS SMB server

 

Cisco Talos

May

Talos is hiring for several positions — Join our world-class security organization

 

Cisco Talos

May

Case Study: Incident Response is a relationship-driven business

 

Cisco Talos

May

I hacked my friend’s website after a SIM swap attack

 

Eset

May

Bluetooth bugs could allow attackers to impersonate devices

 

Eset

May

Apple fixes macOS zero‑day bug that let malware take secret screenshots

 

Eset

May

Rom‑con: How romance fraud targets older people and how to avoid it

 

Eset

May

Android 12 will give you more control over how much data you share with apps

 

Eset

May

Colonial Pipeline attack: Hacking the physical world

 

Eset

May

Scams target families of missing persons, FBI warns

 

Eset

May

Take action now – FluBot malware may be on its way

 

Eset

May

Android stalkerware threatens victims further and exposes snoopers themselves

 

Eset

May

DarkSide Ransomware Gang: An Overview

 

Palo Alto Unity42

May

File Transfer Threats: Risk Factors and How Network Traffic Visibility Can Help

 

Palo Alto Unity42

May

Detecting and Preventing Malicious Domains Proactively with DNS Security

 

Palo Alto Unity42

May

New Shameless Commodity Cryptocurrency Stealer (WeSteal) and Commodity RAT (WeControl)

 

Palo Alto Unity42

May

Unsecured Kubernetes Instances Could Be Vulnerable to Exploitation

 

Palo Alto Unity42

May

Threat Brief: Codecov Bash Uploader

 

Palo Alto Unity42

May

Are Your Nagios XI Servers Turning Into Cryptocurrency Miners for Attackers?

 

Palo Alto Unity42

May

Actor Exploits Microsoft Exchange Server Vulnerabilities, Cortex XDR Blocks Harvesting of Credentials

 

Palo Alto Unity42

May

New Vulnerability Affecting Container Engines CRI-O and Podman (CVE-2021-20291)

 

Palo Alto Unity42

May

Threat Assessment: Clop Ransomware

 

Palo Alto Unity42

May

Network Attack Trends: Internet of Threats (November 2020-January 2021)

 

Palo Alto Unity42

May

Emotet Command and Control Case Study

 

Palo Alto Unity42

May

Attackers Conducting Cryptojacking Operation Against U.S. Education Organizations

 

Palo Alto Unity42

May

Wireshark Tutorial: Examining Traffic from Hancitor Infections

 

Palo Alto Unity42

May

2020 Phishing Trends With PDF Files

 

Palo Alto Unity42

May

Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool

 

Palo Alto Unity42

May

Wireshark Tutorial: Decrypting RDP Traffic

 

Palo Alto Unity42

May

Threat Assessment: Matrix Ransomware

 

Palo Alto Unity42

May

20 Million Miners: Finding Malicious Cryptojacking Images in Docker Hub

 

Palo Alto Unity42

May

Inside the DarkSide Ransomware Attack on Colonial Pipeline

 

Cybereason

May

PortDoor: New Chinese APT Backdoor Attack Targets Russian Defense Sector

 

Cybereason

May

Cybereason vs. Avaddon Ransomware

 

Cybereason

May

MITRE ATT&CK: Cybereason Dominates the Competition

 

Cybereason

May

Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities

 

Cybereason

May

Cybereason vs. DarkSide Ransomware

 

Cybereason

May

Whistleblower Accuses Ubiquiti of Downplaying Major Data Breach

 

Cybereason

May

FBI Pegs 2020 Cybercrime Costs at $4 Billion - Actual Losses Likely Higher

 

Cybereason

May

DearCry Ransomware and the HAFNIUM Attacks – What You Need to Know

 

Cybereason

May

DarkSide Ransomware Victims Sold Short

 

Mcafee blog

May

Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit

 

Mcafee blog

May

“Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards

 

Mcafee blog

May

Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware

 

Mcafee blog

May

How to Stop the Popups

 

Mcafee blog

May

Steps to Discover Hidden Threat from Phishing Email

 

Mcafee blog

May

Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation

 

Mcafee blog

May

Clever Billing Fraud Applications on Google Play: Etinu

 

Mcafee blog

May

McAfee Labs Report Reveals Latest COVID-19 Threats and Malware Surges

 

Mcafee blog

May

BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain

 

Mcafee blog

May

McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware

 

Mcafee blog

May

McAfee Defender’s Blog: Cuba Ransomware Campaign

 

Mcafee blog

May

McAfee Defenders Blog: Reality Check for your Defenses

 

Mcafee blog

May

Netop Vision Pro – Distance Learning Software is 20/20 in Hindsight

 

Mcafee blog

May

I Was a Human CAPTCHA Solver

 

F5 Labs

May

2021 Credential Stuffing Report

 

F5 Labs

May

DDoS Attack Trends for 2020

 

F5 Labs

May

Cyberattacks Targeting Latin America, January through March 2021

 

F5 Labs

May

Email Compromise with Credential Stuffing Attack Tools

 

F5 Labs

May

Collusion Fraud: The Art of Gaming the System with Complicity

 

F5 Labs

May

Credential Stuffing Tools and Techniques, Part 1

 

F5 Labs

May

Combatting Digital Fraud with Security Convergence

 

F5 Labs

May

Shining a Light on DARKSIDE Ransomware Operations

 

FireEye

May

The UNC2529 Triple Double: A Trifecta Phishing Campaign

 

FireEye

May

UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat

 

FireEye

May

Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity

 

FireEye

May

Abusing Replication: Stealing AD FS Secrets Over the Network

 

FireEye

May

Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise

 

FireEye

May

Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day

 

FireEye

May

Hacking Operational Technology for Defense: Lessons Learned From OT Red Teaming Smart Meter Control Infrastructure

 

FireEye

May

M-Trends 2021: A View From the Front Lines

 

FireEye

May

Back in a Bit: Attacker Use of the Windows Background Intelligent Transfer Service

 

FireEye

May

The Need to Protect Public AWS SSM Documents – What the Research Shows

 

Checkpoint

May

Security probe of Qualcomm MSM data services

 

Checkpoint

May

Pwn2Own Qualcomm DSP

 

Checkpoint

May

Iran’s APT34 Returns with an Updated Arsenal

 

Checkpoint

May

Designing sockfuzzer, a network syscall fuzzer for XNU

 

Project Zero

May

Policy and Disclosure: 2021 Edition

 

Project Zero

May

Who Contains the Containers?

 

Project Zero

May

Transparent Tribe APT expands its Windows malware arsenal

 

Cisco Talos

May

Microsoft Patch Tuesday for May 2021 — Snort rules and prominent vulnerabilities

 

Cisco Talos

May

Vulnerability Spotlight: Code execution vulnerability in Adobe Acrobat Reader

 

Cisco Talos

May

Lemon Duck spreads its wings: Actors target Microsoft Exchange servers, incorporate new TTPs

 

Cisco Talos

May

Vulnerability Spotlight: Use-after-free vulnerability in Foxit PDF Reader

 

Cisco Talos

May

Vulnerability Spotlight: Information disclosure vulnerability in the Linux Kernel

 

Cisco Talos

May

Threat Advisory: Pulse Secure Connect Coverage

 

Cisco Talos

May

Vulnerability Spotlight: Code execution vulnerabilities in PrusaSlicer

 

Cisco Talos

May

A year of Fajan evolution and Bloomberg themed campaigns

 

Cisco Talos

May

Vulnerability Spotlight: Multiple vulnerabilities in Synology DiskStation Manager

 

Cisco Talos

May

Vulnerability Spotlight: Remote code execution vulnerabilities in Cosori smart air fryer

 

Cisco Talos

May

Threat Advisory: NSA SVR Advisory Coverage

 

Cisco Talos

May

Vulnerability Spotlight: Multiple remote code execution vulnerabilities in Microsoft Azure Sphere

 

Cisco Talos

May

Microsoft Patch Tuesday for April 2021 — Snort rules and prominent vulnerabilities

 

Cisco Talos

May

Vulnerability Spotlight: Multiple vulnerabilities in OpenClinic’s GA web portal

 

Cisco Talos

May

Recording: Analyzing Android Malware — From triage to reverse-engineering

 

Cisco Talos

May

Sowing Discord: Reaping the benefits of collaboration app abuse

 

Cisco Talos

May

Vulnerability Spotlight: Out-of-bounds write vulnerabilities in Accusoft ImageGear

 

Cisco Talos

May

Cheating the cheater: How adversaries are using backdoored video game cheat engines and modding tools

 

Cisco Talos

May

Verizon’s 2021 DBIR: Phishing and ransomware threats looming ever larger

 

Eset

May

European police bust major online investment fraud ring

 

Eset

May

1 million risky apps rejected or removed from Apple’s App Store in 2020

 

Eset

May

ESET Research goes to RSA Conference 2021 with two presentations

 

Eset

May

WhatsApp will limit features for users who don’t accept new data‑sharing rules

 

Eset

May

Popular routers found vulnerable to hacker attacks

 

Eset

May

Fantastic passwords and where your children can find them

 

Eset

May

DDoS attack knocks Belgian government websites offline

 

Eset

May

Ousaban: Private photo collection hidden in a CABinet

 

Eset

May

Microsoft will soon remove Flash Player from Windows 10 devices

 

Eset

May

INTERPOL aims to deal a blow to digital piracy

 

Eset

May

FBI teams up with ‘Have I Been Pwned’ to alert Emotet victims

 

Eset

May

Prime targets: Governments shouldn’t go it alone on cybersecurity

 

Eset

May

Apple patches severe macOS security flaw

 

Eset

May

4 common ways scammers use celebrity names to lure victims

 

Eset

May

Instagram rolls out new features to help prevent cyberbullying

 

Eset

May

AirDrop flaws could leak phone numbers, email addresses

 

Eset

May

Google rushes out fix for zero‑day vulnerability in Chrome

 

Eset

May

WhatsApp Pink: Watch out for this fake update

 

Eset

May

Google’s Project Zero to wait longer before disclosing bug details

 

Eset

May

Spring cleaning? Don’t forget about your digital footprint

 

Eset

May

One in six people use pet’s name as password

 

Eset

May

FBI removes web shells from compromised Exchange servers

 

Eset

May

WhatsApp flaw lets anyone lock you out of your account

 

Eset

May

Clubhouse in the spotlight after user records posted online

 

Eset

May

Data from 500 million LinkedIn accounts put up for sale

 

Eset

May

Does data stolen in a data breach expire?

 

Eset

May

(Are you) afreight of the dark? Watch out for Vyveva, new Lazarus backdoor

 

Eset

May

$38 million worth of gift cards stolen and sold on dark web

 

Eset

May

Supply‑chain attacks: When trust goes wrong, try hope?

 

Eset

May

Janeleiro, the time traveler: A new old banking trojan in Brazil

 

Eset

May

Is your dishwasher trying to kill you?

 

Eset

May

Are you prepared to prevent data loss?

 

Eset

May

Backdoor added to PHP source code in Git server breach

 

Eset

May

Apple rushes to patch zero‑day flaw in iOS, iPadOS

 

Eset