Blog News BigBrother -  

Úvod  APT blog  Attack blog  BigBrother blog  BotNet blog  Bug blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  Hardware blog  ICS blog  Incident blog  IoT blog  Malware blog  Phishing blog  Ransomware blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog


 


Datum

Název

Info

Blog

Companies

9.1.19EU offers bug bounties on popular open source softwareThe program with a prize pool of almost US$1 million aims to leverage the ‘power of the crowd’ in order to prevent another HeartbleedBigBrother blogEset
9.1.19Personal data of German political elite dumped onlineThe vast trove of data was released online and disseminated via Twitter over the span of four weeks – without anybody really noticingBigBrother blogEset
14.12.18Malaysian government targeted with mash-up espionage toolkitAn interview with ESET researchers Tomáš Gardoò and Filip Kafka on their research of a malware toolkit used in espionage against the Malaysian governmentBigBrother blogEset
11.12.18Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT FirmsSymantec researchers have uncovered extensive insights into a cyber espionage group behind a recent series of cyber-attacks designed to gather intelligence on targets spread primarily across the Middle East as well as in Europe and North America.BigBrother blogSymantec
21.11.18OceanLotus: New watering hole attack in Southeast AsiaESET researchers identified 21 distinct websites that had been compromised including some particularly notable government and media sitesBigBrother blogEset
9.11.18US Air Force invites white hats to find hackable flaws, againThis is the third time that the air force wants ethical hackers to uncover chinks in its digital armor.BigBrother blogEset
30.10.18

Zooming In On “Domestic Kitten”

In recent years, Iran has been channeling significant resources into cyber warfare, devoting designated entities within multiple government agencies to conduct extensive espionage campaigns against foreign countries such as the United States, Israel.BigBrother blogCheckpoint
25.10.18TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON AttackersFireEye Intelligence assesses with high confidence that intrusion activity that led to deployment of TRITON was supported by a Russian government-owned technical research institution located in Moscow.BigBrother blogFireEye

14.9.18

Domestic Kitten: An Iranian Surveillance Operation

Chinese strategist Sun Tzu, Italian political philosopher Machiavelli and English philosopher Thomas Hobbes all justified deceit in war as a legitimate form of warfare. Preceding them all, however, were some in the Middle East who had already internalized and implemented this strategy to great effect, and continue to do so today.

BigBrother blog

Checkpoint

30.7.18

EternalBlue – Everything There Is To Know

Introduction Since the revelation of the EternalBlue exploit, allegedly developed by the NSA, and the malicious uses that followed with WannaCry, it went under thorough scrutiny by the security community. While many details.

BigBrother blog

Checkpoint

30.7.18

BROKERS IN THE SHADOWS: Analyzing vulnerabilities and attacks spawned by the leaked NSA hacking tools

Background Rarely does the release of an exploit have such a large impact across the world. With the recent leak of the NSA exploit methods, we saw the effects of powerful tools in..

BigBrother blog

Checkpoint

18

Suspected Iranian Influence Operation Leverages Network of Inauthentic News Sites & Social Media Targeting Audiences in U.S., UK, Latin America, Middle East

FireEye has identified a suspected influence operation that appears to originate from Iran aimed at audiences in the U.S., U.K., Latin America, and the Middle East.

BigBrother blog

FireEye