5.12.20 | The rise of the OGUsers hacking group | Hacking blog | Avast blog |
21.11.20 | WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques | Hacking blog | FireEye |
14.11.20 | A Closer Look at the Web Skimmer | Hacking blog | Palo Alto Unity42 |
14.11.20 | WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques | Hacking blog | FireEye |
7.11.20 | When Threat Actors Fly Under the Radar: Vatet, PyXie and Defray777 | Hacking blog | Palo Alto Unity42 |
7.11.20 | INJ3CTOR3 Operation – Leveraging Asterisk Servers for Monetization | Hacking blog | Checkpoint |
24.10.20 | Securing medical devices: Can a hacker break your heart? | Hacking blog | Eset |
17.10.20 | 50,000 home cameras reportedly hacked, footage posted online | Hacking blog | Eset |
10.10.20 | Firmware can be hacked like software | Hacking blog | Avast blog |
10.10.20 | Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads | Hacking blog | Palo Alto Unity42 |
10.10.20 | Unit 42 Cloud Threat Report: CSP Findings on Logging, Encryption and Exposed Services | Hacking blog | Palo Alto Unity42 |
3.10.20 | Firmware can be hacked like software | Hacking blog | Avast blog |
26.9.20 | New Snort, ClamAV coverage strikes back against Cobalt Strike | Hacking blog | Cisco Talos |
26.9.20 | Mozilla fixes flaw that let attackers hijack Firefox for Android via Wi‑Fi | Hacking blog | Eset |
22.8.20 | “Mailto” attacks could steal files | Hacking blog | Avast blog |
15.8.20 | COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module | Hacking blog | FireEye |
15.8.20 | Don’t be silly – it’s only a lightbulb | Hacking blog | Checkpoint |
8.8.20 | COVID-19 tracking apps are easy targets for hackers | Hacking blog | Avast blog |
19 .7.20 | My Adventures Hacking the iParcelBox | Hacking blog | Mcafee blog |
19 .7.20 | What’s in the Box? Part II: Hacking the iParcelBox | Hacking blog | Mcafee blog |
17 .7.20 | Warning issued over hackable security cameras | Hacking blog | Eset |
17 .7.20 | Vast hack‑for‑hire scheme targeted thousands of people, organizations | Hacking blog | Eset |
13 .7.20 | WHY NOT DETECT EVERY TTP IN THE MITRE ATT&CK FRAMEWORK? | Hacking blog | Cybereason |
30.5.20 | LOVE YOUR ENEMIES BEFORE YOU DESTROY THEM — HACKING FOR GOOD | Hacking blog | Cybereason |
30.5.20 | Bringing VandaTheGod down to Earth: Exposing the person behind a 7-year hacktivism campaign | Hacking blog | Checkpoint |
23.5.20 | Attacking the Organism: Telecom Service Providers | Hacking blog | F5 Labs |
18.4.20 | What is Cross-Site Scripting (XSS)? | Hacking blog | F5 Labs |
4.4.20 | Work from home: Securing RDP and remote access | Hacking blog | Eset |
14.3.20 | Microsoft: 99.9 percent of hacked accounts didn’t use MFA | Hacking blog | Eset |
7.3.20 | Voice assistants can be hacked with ultrasonic waves | Hacking blog | Eset |
23.2.20 | Hackers infect VPNs to plant hidden backdoors | Hacking blog | Avast blog |
2.2.20 | Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed | Hacking blog | Palo Alto Unity42 |
2.2.20 | xHunt Campaign: New Watering Hole Identified for Credential Harvesting | Hacking blog | Palo Alto Unity42 |
1.2.20 | Abusing DLL Misconfigurations — Using Threat Intelligence to Weaponize R&D | Hacking blog | FireEye |
25.1.20 | Attacking the Organism: Retail | Attack blog Hacking blog | F5 Labs |
18.1.20 | Millions of modems at risk of remote hijacking | Hacking blog | Eset |