Blog News 2021 June -
2021 - January February March April May June July August September October November December
Datum
Název
Blog
Companies
June
McAfee Labs Report Highlights Ransomware Threats
Mcafee blog
A supply-chain breach: Taking over an Atlassian account
Checkpoint
Attackers in Executive Clothing - BEC continues to separate orgs from their money
Cisco Talos
Gaming industry under siege from cyberattacks during pandemic
Eset
Brave launches its own, privacy‑focused search engine
How to tell if a website is safe
State‑sponsored or financially motivated: Is there any difference anymore?
Conti Ransomware Gang: An Overview
Palo Alto Unity42
Matanbuchus: Malware-as-a-Service with Demonic Intentions
Prometheus Ransomware Gang: A Group of REvil?
TeamTNT Using WatchDog TTPs to Expand Its Cryptojacking Footprint
TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations
A New Program for Your Peloton – Whether You Like It or Not
Are Virtual Machines the New Gold for Cyber Criminals?
MITRE ATT&CK: What It Is, How it Works, Who Uses It and Why
F5 Labs
Attacker Tricks for Taking Over Risk-Based Multifactor Authentication
Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices
FireEye
Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
Fuzzing the Office Ecosystem
SharpPanda: Chinese APT Group Targets Southeast Asian Government With Previously Unknown Backdoor
Vulnerability Spotlight: EIP Stack Group OpENer information disclosure vulnerability
What’s past is prologue – A new world of critical infrastructure security
Quarterly Report: Incident Response trends from Spring 2021
Vulnerability Spotlight: Code execution vulnerability in Google Web Audio API
Microsoft Patch Tuesday for June 2021 — Snort rules and prominent vulnerabilities
Intelligence-driven disruption of ransomware campaigns
Necro Python bot adds new exploits and Tezos mining to its bag of tricks
Vulnerability Spotlight: Use-after-free vulnerability in WebKit
Vulnerability Spotlight: A deep dive into macOS SMB server
Vulnerability Spotlight: Multiple vulnerabilities in Accusoft ImageGear
5 essential things to do before ransomware strikes
Most health apps engage in unhealthy data‑harvesting habits
OSINT 101: What is open source intelligence and how is it used?
Microsoft takes down large‑scale BEC operation
Vishing: What is it and how do I avoid getting scammed?
Tracking ransomware cryptocurrency payments: What now for Bitcoin?
Google fixes actively exploited Chrome zero‑day
BackdoorDiplomacy: Upgrading from Quarian to Turian
Gelsemium: When threat actors go gardening
Hundreds of suspected criminals arrested after being tricked into using FBI‑run chat app
Hacking space: How to pwn a satellite
Zero‑day in popular WordPress plugin exploited to take over websites
ESET Threat Report T 1 2021
5 common scams targeting teens – and how to stay safe
Don’t feed the trolls and other tips for avoiding online drama