BLOG 2024  AI blog  APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog  2024  2023

H  January(21) February(46) March(44) April(33) May(35) June(67) July(12) August(0) September(0) October(0) November(0) December(0) 

DATE

NAME

Info

CATEG.

WEB

20.1.24

Parrot TDS: A Persistent and Evolving Malware Campaign This campaign is unique in its methodology, employing a source spoofing technique to target a broad spectrum of token holders. Malware blog Palo Alto

20.1.24

CHECK POINT RESEARCH ALERTS ON A NEW NFT AIRDROP CAMPAIGN A traffic direction system (TDS) nicknamed Parrot TDS has been publicly reported as active since October 2021. OS Blog Checkpoint

20.1.24

Why many CISOs consider quitting – Week in security with Tony Anscombe The job of a CISO is becoming increasingly stressful as cybersecurity chiefs face overwhelming workloads and growing concerns over personal liability for security failings Security blog Eset

20.1.24

Virtual kidnapping: How to see through this terrifying scam Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims Spam blog Eset

20.1.24

Is Temu safe? What to know before you ‘shop like a billionaire’ Here are some scams you may encounter on the shopping juggernaut, plus a few simple steps you can take to help safeguard your data while bagging that irresistible deal Spam blog Eset

20.1.24

The 7 deadly cloud security sins and how SMBs can do things better By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk Security blog Eset

14.1.24

Financial Fraud APK Campaign During our research discovering threats in legitimate network traffic, activity generated by a certain type of Android Package Kit (APK) files kept hitting our radar. Hacking blog Palo Alto

14.1.24

Medusa Ransomware Turning Your Files into Stone Unit 42 Threat Intelligence analysts have noticed an escalation in Medusa ransomware activities and a shift in tactics toward extortion, characterized by the introduction in early 2023 of their dedicated leak site called the Medusa Blog. Ransom blog Palo Alto

14.1.24

Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer Malware, like many complex software systems, relies on the concept of software configuration. Malware blog Palo Alto

14.1.24

.NET HOOKING – HARMONIZING MANAGED TERRITORY For a malware researcher, analyst, or reverse engineer, the ability to alter the functionality of certain parts of code is a crucial step, often necessary to reach a meaningful result during the analysis process. Malware blog Checkpoint

14.1.24

New decryptor for Babuk Tortilla ransomware variant released Cisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor. Ransom blog Cisco Blog

14.1.24

Lessons from SEC's X account hack – Week in security with Tony Anscombe The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC's X account right ahead of the much-anticipated decision about Bitcoin ETFs Cryptocurrency blog Eset

14.1.24

A peek behind the curtain: How are sock puppet accounts used in OSINT? How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks Security blog Eset

14.1.24

Attack of the copycats: How fake messaging apps and app mods could bite you WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride. Social blog Eset

14.1.24

Love is in the AI: Finding love online takes on a whole new meaning Is AI companionship the future of not-so-human connection – and even the cure for loneliness? AI blog Eset

14.1.24

Cracking the 2023 SANS Holiday Hack Challenge From ChatNPT to Game Boys and space apps, this year’s challenge took us to the Geese Islands for another rollicking romp of fun Hacking blog Eset

14.1.24

Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe What are some of the key cybersecurity trends that people and organizations should have on their radars this year? Security blog Eset

14.1.24

Lost and found: How to locate your missing devices and more Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy Security blog Eset

14.1.24

Say what you will? Your favorite speech-to-text app may be a privacy risk Typing with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets. Security blog Eset