Blog News 2021 August - 


2021 - January February March April May June July August September October November December


Datum

Název

Blog

Companies

August

Worldwide Phishing Attacks Ramped Up At the Peak of Working From Home 

Cisco Talos

August

Ransomware Groups to Watch: Emerging Threats 

Cisco Talos

August

Discovering CAPTCHA Protected Phishing Campaigns 

Cisco Talos

August

Beyond the pandemic: Why are data breach costs at an all‑time high? 

Eset

August

Man impersonates Apple support, steals 620,000 photos from iCloud accounts 

Eset

August

Microsoft Power Apps misconfiguration exposes millions of records 

Eset

August

The SideWalk may be as dangerous as the CROSSWALK 

Eset

August

The Rise of Deep Learning for Detection and Classification of Malware Mcafee blog

August

Personal VPN and Its Evasions: Risk Factors and How to Maintain Network Visibility 

Palo Alto Unity42

August

Discovering CAPTCHA Protected Phishing Campaigns 

Palo Alto Unity42

August

Unit 42 Cloud Threat Report Update: Cloud Security Weakens as More Organizations Fail to Secure IAMPalo Alto Unity42

August

Indra — Hackers Behind Recent Attacks on Iran Checkpoint

August

Understanding Network Access in Windows AppContainers Project Zero

August

Malicious Campaign Targets Latin America: The seller, The operator and a curious link 

Cisco Talos

August

Neurevt trojan takes aim at Mexican users 

Cisco Talos

August

Vulnerability Spotlight: Memory corruption vulnerability in Daemon Tools Pro 

Cisco Talos

August

Vulnerability Spotlight: Multiple integer overflow vulnerabilities in GPAC Project on Advanced Content 

Cisco Talos

August

Vice Society Leverages PrintNightmare In Ransomware Attacks 

Cisco Talos

August

Hackers swipe almost $100 million from major cryptocurrency exchange 

Eset

August

Are you, the customer, the one paying the ransomware demand? 

Eset

August

Health authorities in 40 countries targeted by COVID‑19 vaccine scammers 

Eset

August

Nearly 2 million records from terrorist watchlist exposed online 

Eset

August

Dumpster diving is a filthy business Eset

August

XLSM Malware with MacroSheets

 

Mcafee blog

August

Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?

 

Mcafee blog

August

New eCh0raix Ransomware Variant Targets QNAP and Synology Network-Attached Storage Devices

 

Palo Alto Unity42

August

Unit 42 Cloud Threat Report Update: Cloud Security Weakens as More Organizations Fail to Secure IAM

 

Palo Alto Unity42

August

Microsoft Patched the Issue With Windows Containers That Enabled Siloscape

 

Palo Alto Unity42

August

Palo Alto Networks Discloses New Attack Surface Targeting Microsoft IIS and SQL Server at Black Hat Asia 2021

 

Palo Alto Unity42

August

Ransomware Families: 2021 Data to Supplement the Unit 42 Ransomware Threat Report

 

Palo Alto Unity42

August

THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Group

 

Palo Alto Unity42

August

Do you like to read? I can take over your Kindle with an e-book

 

Checkpoint

August

Stealth is never enough, or Revealing Formbook successor’s C&C infrastructure

 

Checkpoint

August

Mid-Year Attack Trends Report Reveals A 29% Increase In Cyberattacks Against Organizations Globally

 

Checkpoint

August

Time-proven tricks in a new environment: the macOS evolution of Formbook

 

Checkpoint

August

Top prevalent malware with a thousand campaigns migrates to macOS

 

Checkpoint

August

Signed MSI files, Raccoon and Amadey are used for installing ServHelper RAT

 

Cisco Talos

August

Talos Incident Response quarterly threat report — The top malware families and TTPs used in Q2 2021

 

Cisco Talos

August

Microsoft Patch Tuesday for August 2021 — Snort rules and prominent vulnerabilities

 

Cisco Talos

August

Vulnerability Spotlight: Multiple vulnerabilities in AT&T Labs’ Xmill utility

 

Cisco Talos

August

Vulnerability Spotlight: Code execution vulnerability in Mozilla Firefox

 

Cisco Talos

August

Vulnerability Spotlight: Use-after-free vulnerability in tinyobjloader

 

Cisco Talos

August

Threat Spotlight: Solarmarker

 

Cisco Talos

August

Vulnerability Spotlight: Use-after-free vulnerabilities in Foxit PDF Reader

 

Cisco Talos

August

Vulnerability Spotlight: Unsafe deserialization vulnerabilities in CODESYS Development System

 

Cisco Talos

August

Examining threats to device security in the hybrid workplace

 

Eset

August

IISerpent: Malware‑driven SEO fraud as a service

 

Eset

August

Deepfakes – the bot made me do it

 

Eset

August

Ransomware runs rampant, so how can you combat this threat?

 

Eset

August

DEF CON 29: Satellite hacking 101

 

Eset

August

IISpy: A complex server‑side backdoor with anti‑forensic features

 

Eset

August

Black Hat 2021: Lessons from a lawyer

 

Eset

August

Black Hat 2021: Wanted posters for ransomware slingers

 

Eset

August

IIStealer: A server‑side threat to e‑commerce transactions

 

Eset

August

Anatomy of native IIS malware

 

Eset

August

Is your personal information being abused?

 

Eset

August

Why cloud security is the key to unlocking value from hybrid working

 

Eset

August

Black Hat 2021 – non‑virtual edition

 

Eset

August

On course for a good hacking

 

Eset

August

Watch out for these scams targeting Amazon customers

 

Eset

August

Cybersecurity agencies reveal list of the most exploited vulnerabilities in the past 2 years

 

Eset

August

Tackling the insider threat to the new hybrid workplace

 

Eset

August

Most Twitter users haven’t enabled 2FA yet, report reveals

 

Eset

August

Booking your next holiday? Beware these Airbnb scams

 

Eset

August

Apple releases patch for zero‑day flaw in iOS, iPadOS and macOS

 

Eset