Blog News 2021 June - 


2021 - January February March April May June July August September October November December


Datum

Název

Blog

Companies

June

McAfee Labs Report Highlights Ransomware Threats

 

Mcafee blog

June

A supply-chain breach: Taking over an Atlassian account

 

Checkpoint

June

Attackers in Executive Clothing - BEC continues to separate orgs from their money

 

Cisco Talos

June

Gaming industry under siege from cyberattacks during pandemic

 

Eset

June

Brave launches its own, privacy‑focused search engine

 

Eset

June

How to tell if a website is safe

 

Eset

June

State‑sponsored or financially motivated: Is there any difference anymore?

 

Eset

June

Conti Ransomware Gang: An Overview

 

Palo Alto Unity42

June

Matanbuchus: Malware-as-a-Service with Demonic Intentions

 

Palo Alto Unity42

June

Prometheus Ransomware Gang: A Group of REvil?

 

Palo Alto Unity42

June

TeamTNT Using WatchDog TTPs to Expand Its Cryptojacking Footprint

 

Palo Alto Unity42

June

TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations

 

Palo Alto Unity42

June

A New Program for Your Peloton – Whether You Like It or Not

 

Mcafee blog

June

Are Virtual Machines the New Gold for Cyber Criminals?

 

Mcafee blog

June

MITRE ATT&CK: What It Is, How it Works, Who Uses It and Why

 

F5 Labs

June

Attacker Tricks for Taking Over Risk-Based Multifactor Authentication

 

F5 Labs

June

Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices

 

FireEye

June

Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise

 

FireEye

June

Fuzzing the Office Ecosystem

 

Checkpoint

June

SharpPanda: Chinese APT Group Targets Southeast Asian Government With Previously Unknown Backdoor

 

Checkpoint

June

Vulnerability Spotlight: EIP Stack Group OpENer information disclosure vulnerability

 

Cisco Talos

June

What’s past is prologue – A new world of critical infrastructure security

 

Cisco Talos

June

Quarterly Report: Incident Response trends from Spring 2021

 

Cisco Talos

June

Vulnerability Spotlight: Code execution vulnerability in Google Web Audio API

 

Cisco Talos

June

Microsoft Patch Tuesday for June 2021 — Snort rules and prominent vulnerabilities

 

Cisco Talos

June

Intelligence-driven disruption of ransomware campaigns

 

Cisco Talos

June

Necro Python bot adds new exploits and Tezos mining to its bag of tricks

 

Cisco Talos

June

Vulnerability Spotlight: Use-after-free vulnerability in WebKit

 

Cisco Talos

June

Vulnerability Spotlight: A deep dive into macOS SMB server

 

Cisco Talos

June

Vulnerability Spotlight: Multiple vulnerabilities in Accusoft ImageGear

 

Cisco Talos

June

5 essential things to do before ransomware strikes

 

Eset

June

Most health apps engage in unhealthy data‑harvesting habits

 

Eset

June

OSINT 101: What is open source intelligence and how is it used?

 

Eset

June

Microsoft takes down large‑scale BEC operation

 

Eset

June

Vishing: What is it and how do I avoid getting scammed?

 

Eset

June

Tracking ransomware cryptocurrency payments: What now for Bitcoin?

 

Eset

June

Google fixes actively exploited Chrome zero‑day

 

Eset

June

BackdoorDiplomacy: Upgrading from Quarian to Turian

 

Eset

June

Gelsemium: When threat actors go gardening

 

Eset

June

Hundreds of suspected criminals arrested after being tricked into using FBI‑run chat app

 

Eset

June

Hacking space: How to pwn a satellite

 

Eset

June

Zero‑day in popular WordPress plugin exploited to take over websites

 

Eset

June

ESET Threat Report T 1 2021

 

Eset

June

5 common scams targeting teens – and how to stay safe

 

Eset

June

Don’t feed the trolls and other tips for avoiding online drama

 

Eset