Datum | Název | Blog | Companies |
August | Worldwide Phishing Attacks Ramped Up At the Peak of Working From Home | | Cisco Talos |
August | Ransomware Groups to Watch: Emerging Threats | | Cisco Talos |
August | Discovering CAPTCHA Protected Phishing Campaigns | | Cisco Talos |
August | Beyond the pandemic: Why are data breach costs at an all‑time high? | | Eset |
August | Man impersonates Apple support, steals 620,000 photos from iCloud accounts | | Eset |
August | Microsoft Power Apps misconfiguration exposes millions of records | | Eset |
August | The SideWalk may be as dangerous as the CROSSWALK | | Eset |
August | The Rise of Deep Learning for Detection and Classification of Malware | | Mcafee blog |
August | Personal VPN and Its Evasions: Risk Factors and How to Maintain Network Visibility | | Palo Alto Unity42 |
August | Discovering CAPTCHA Protected Phishing Campaigns | | Palo Alto Unity42 |
August | Unit 42 Cloud Threat Report Update: Cloud Security Weakens as More Organizations Fail to Secure IAM | | Palo Alto Unity42 |
August | Indra — Hackers Behind Recent Attacks on Iran | | Checkpoint |
August | Understanding Network Access in Windows AppContainers | | Project Zero |
August | Malicious Campaign Targets Latin America: The seller, The operator and a curious link | | Cisco Talos |
August | Neurevt trojan takes aim at Mexican users | | Cisco Talos |
August | Vulnerability Spotlight: Memory corruption vulnerability in Daemon Tools Pro | | Cisco Talos |
August | Vulnerability Spotlight: Multiple integer overflow vulnerabilities in GPAC Project on Advanced Content | | Cisco Talos |
August | Vice Society Leverages PrintNightmare In Ransomware Attacks | | Cisco Talos |
August | Hackers swipe almost $100 million from major cryptocurrency exchange | | Eset |
August | Are you, the customer, the one paying the ransomware demand? | | Eset |
August | Health authorities in 40 countries targeted by COVID‑19 vaccine scammers | | Eset |
August | Nearly 2 million records from terrorist watchlist exposed online | | Eset |
August | Dumpster diving is a filthy business | | Eset |
August | XLSM Malware with MacroSheets | | Mcafee blog |
August | Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems? | | Mcafee blog |
August | New eCh0raix Ransomware Variant Targets QNAP and Synology Network-Attached Storage Devices | | Palo Alto Unity42 |
August | Unit 42 Cloud Threat Report Update: Cloud Security Weakens as More Organizations Fail to Secure IAM | | Palo Alto Unity42 |
August | Microsoft Patched the Issue With Windows Containers That Enabled Siloscape | | Palo Alto Unity42 |
August | Palo Alto Networks Discloses New Attack Surface Targeting Microsoft IIS and SQL Server at Black Hat Asia 2021 | | Palo Alto Unity42 |
August | Ransomware Families: 2021 Data to Supplement the Unit 42 Ransomware Threat Report | | Palo Alto Unity42 |
August | THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Group | | Palo Alto Unity42 |
August | Do you like to read? I can take over your Kindle with an e-book | | Checkpoint |
August | Stealth is never enough, or Revealing Formbook successor’s C&C infrastructure | | Checkpoint |
August | Mid-Year Attack Trends Report Reveals A 29% Increase In Cyberattacks Against Organizations Globally | | Checkpoint |
August | Time-proven tricks in a new environment: the macOS evolution of Formbook | | Checkpoint |
August | Top prevalent malware with a thousand campaigns migrates to macOS | | Checkpoint |
August | Signed MSI files, Raccoon and Amadey are used for installing ServHelper RAT | | Cisco Talos |
August | Talos Incident Response quarterly threat report — The top malware families and TTPs used in Q2 2021 | | Cisco Talos |
August | Microsoft Patch Tuesday for August 2021 — Snort rules and prominent vulnerabilities | | Cisco Talos |
August | Vulnerability Spotlight: Multiple vulnerabilities in AT&T Labs’ Xmill utility | | Cisco Talos |
August | Vulnerability Spotlight: Code execution vulnerability in Mozilla Firefox | | Cisco Talos |
August | Vulnerability Spotlight: Use-after-free vulnerability in tinyobjloader | | Cisco Talos |
August | Threat Spotlight: Solarmarker | | Cisco Talos |
August | Vulnerability Spotlight: Use-after-free vulnerabilities in Foxit PDF Reader | | Cisco Talos |
August | Vulnerability Spotlight: Unsafe deserialization vulnerabilities in CODESYS Development System | | Cisco Talos |
August | Examining threats to device security in the hybrid workplace | | Eset |
August | IISerpent: Malware‑driven SEO fraud as a service | | Eset |
August | Deepfakes – the bot made me do it | | Eset |
August | Ransomware runs rampant, so how can you combat this threat? | | Eset |
August | DEF CON 29: Satellite hacking 101 | | Eset |
August | IISpy: A complex server‑side backdoor with anti‑forensic features | | Eset |
August | Black Hat 2021: Lessons from a lawyer | | Eset |
August | Black Hat 2021: Wanted posters for ransomware slingers | | Eset |
August | IIStealer: A server‑side threat to e‑commerce transactions | | Eset |
August | Anatomy of native IIS malware | | Eset |
August | Is your personal information being abused? | | Eset |
August | Why cloud security is the key to unlocking value from hybrid working | | Eset |
August | Black Hat 2021 – non‑virtual edition | | Eset |
August | On course for a good hacking | | Eset |
August | Watch out for these scams targeting Amazon customers | | Eset |
August | Cybersecurity agencies reveal list of the most exploited vulnerabilities in the past 2 years | | Eset |
August | Tackling the insider threat to the new hybrid workplace | | Eset |
August | Most Twitter users haven’t enabled 2FA yet, report reveals | | Eset |
August | Booking your next holiday? Beware these Airbnb scams | | Eset |
August | Apple releases patch for zero‑day flaw in iOS, iPadOS and macOS | | Eset |
| | | |