Datum | Název | Blog | Companies |
18.12.2020 | Japan invests in AI matchmaking | BigBrother blog | Avast blog |
18.12.2020 | FTC orders Big Tech to explain their data collection | BigBrother blog | Avast blog |
18.12.2020 | Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor | BigBrother blog | FireEye |
18.12.2020 | Threat Advisory: SolarWinds supply chain attack | BigBrother blog | Cisco Talos |
18.12.2020 | Operation SignSight: Supply‑chain attack against a certification authority in Southeast Asia | BigBrother blog | Eset |
28.11.2020 | Election Cyber Threats in the Asia-Pacific Region | BigBrother blog | FireEye |
28.11.2020 | Europol and partners thwart massive credit card fraud scheme | BigBrother blog | Eset |
28.11.2020 | FBI warns of threat actors spoofing Bureau domains, email accounts | BigBrother blog | Eset |
14.11.2020 | The election is over, but the lies continue | BigBrother blog | Avast blog |
07.11.2020 | OCC and HIPAA Cybersecurity Regulator Fines Now in Hundreds of Millions | BigBrother blog | F5 Labs |
07.11.2020 | Cisco Talos Advisory on Adversaries Targeting the Healthcare and Public Health Sector | BigBrother blog | Cisco Talos |
07.11.2020 | Election (in)security: What you may have missed | BigBrother blog | Eset |
30.10.2020 | A final 2020 U.S. election security update | BigBrother blog | Avast blog |
24.10.2020 | Microsoft and U.S. Cyber Command try to take down TrickBot | BigBrother blog | Avast blog |
24.10.2020 | Child abductors may use social media to lure victims, FBI warns | BigBrother blog | Eset |
17.10.2020 | What to expect when you're electing: How election officials can counter disinformation | BigBrother blog | Cisco Talos |
17.10.2020 | Attackers chain Windows, VPN flaws to target US government agencies | BigBrother blog | Eset |
10.10.2020 | What to expect when you’re electing: Voter recommendations | BigBrother blog | Cisco Talos |
03.10.2020 | FBI, CISA warn of disinformation campaigns about hacked voting systems | BigBrother blog | Eset |
26.09.2020 | Election hacking: A September update | BigBrother blog | Avast blog |
19.09.2020 | Rampant Kitten – An Iranian Espionage Campaign | BigBrother blog | Checkpoint |
12.09.2020 | Hackers possibly “testing” pro-Trump websites | BigBrother blog | Avast blog |
12.09.2020 | UK University suffers cyberattack, ransomware gang claims responsibility | BigBrother blog | Eset |
05.09.2020 | Hackers possibly “testing” pro-Trump websites | BigBrother blog | Avast blog |
05.09.2020 | Norway’s parliament struck by hackers | BigBrother blog | Eset |
30.08.2020 | OPERATION BLACKOUT VIRTUAL EDITION: ELECTION SECURITY TABLETOPS | BigBrother blog | Cybereason |
30.08.2020 | FBI, CISA warn of spike in vishing attacks | BigBrother blog | Eset |
30.08.2020 | Cyber attacks: Several Canadian government services disrupted | BigBrother blog | Eset |
08.08.2020 | NSA warns against Wi-Fi, Bluetooth, and apps that expose location | BigBrother blog | Avast blog |
08.08.2020 | DoJ charges Chinese hackers with targeting COVID-19 research centers | BigBrother blog | Avast blog |
08.08.2020 | NSA shares advice on how to limit location tracking | BigBrother blog | Eset |
05.08.2020 | Operation (노스 스타) North Star A Job Offer That’s Too Good to be True? | BigBrother blog | Mcafee blog |
05.08.2020 | McAfee Defender’s Blog: Operation North Star Campaign | BigBrother blog | Mcafee blog |
05.08.2020 | FBI warns of surge in online shopping scams | BigBrother blog | Eset |
19.07.2020 | What to expect when you’re electing: Talos’ 2020 election security primer | BigBrother blog | Cisco Talos |
17.07.2020 | Fed shares insight on how to combat synthetic identity fraud | BigBrother blog | Eset |
17.07.2020 | Facial recognition technology banned in another US city | BigBrother blog | Eset |
17.07.2020 | Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies | BigBrother blog | Eset |
17.07.2020 | FBI warns about fraudsters targeting banking app users | BigBrother blog | Eset |
17.07.2020 | Alarm sounded over security risks in online voting system | BigBrother blog | Eset |
12.07.2020 | IndigoDrop spreads via military-themed lures to deliver Cobalt Strike | BigBrother blog | Cisco Talos |
24.05.2020 | Updated BackConfig Malware Targeting Government and Military Organizations in South Asia | BigBrother blog | Palo Alto Unity42 |
26.04.2020 | What you need to know about government contact tracing apps | BigBrother blog | Avast blog |
29.03.2020 | Hackers leak Russian cyberweapon plans | BigBrother blog | Avast blog |
22.03.2020 | EU Doc claims Russia spread COVID-19 disinfo to cause panic | BigBrother blog | Avast blog |
21.03.2020 | FBI warns of human traffickers luring victims on dating apps | BigBrother blog | Eset |
08.03.2020 | FBI lists cybercrime trends of 2019 | BigBrother blog | Avast blog |
08.03.2020 | Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations | BigBrother blog | Palo Alto Unity42 |
01.03.2020 | Cyberattacks target government agencies | BigBrother blog | Avast blog |
22.02.2020 | "Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests | BigBrother blog | FireEye |
15.02.2020 | NEW CYBER ESPIONAGE CAMPAIGNS TARGETING PALESTINIANS - PART 2: THE DISCOVERY OF THE NEW, MYSTERIOUS PIEROGI BACKDOOR | BigBrother blog | Cybereason |
15.02.2020 | NEW CYBER ESPIONAGE CAMPAIGNS TARGETING PALESTINIANS - PART 1: THE SPARK CAMPAIGN | BigBrother blog | Cybereason |
15.02.2020 | How Chinese Cybercriminals Use Business Playbook to Revamp Underground | BigBrother blog | Mcafee blog |
15.02.2020 | "Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests | BigBrother blog | F5 Labs |
08.02.2020 | U.S. Battleground County Website Security Survey | BigBrother blog | Mcafee blog |
26.01.2020 | Did the Saudi crown prince hack Jeff Bezos? | BigBrother blog | Avast blog |
26.01.2020 | The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks | BigBrother blog | Palo Alto Unity42 |
19.01.2020 | Answers to 5 key questions about highly publicized NSA-Microsoft story | BigBrother blog | Avast blog |
18.01.2020 | IS CYBER RETALIATION FROM IRAN IMMINENT? | BigBrother blog | Cybereason |
18.01.2020 | Security Lessons from Across the Pond: Local Government Ransomware Attacks | BigBrother blog | F5 Labs |
18.01.2020 | What the continued escalation of tensions in the Middle East means for security | BigBrother blog | Cisco Talos |
18.01.2020 | FBI shuts down website selling billions of stolen records | BigBrother blog | Eset |
18.01.2020 | Cyberawareness in Australia: The good and the bad | BigBrother blog | Eset |
18.01.2020 | Microsoft patches severe Windows flaw after tip‑off from NSA | BigBrother blog | Eset |
12.01.2020 | Homeland Security warns of Iranian cyberattacks | BigBrother blog | Avast blog |
11.01.2020 | Iran Cyber Threat Update | BigBrother blog | Mcafee blog |
11.01.2020 | Tik or Tok? Is TikTok secure enough? | BigBrother blog | Checkpoint |
04.01.2020 | IS CYBER RETALIATION FROM IRAN IMMINENT? | BigBrother blog | Cybereason |