Blog News BigBrother -  

Úvod  APT blog  Attack blog  BigBrother blog  BotNet blog  Bug blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  Hardware blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransomware blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog


Datum

Název

Blog

Companies

15.2.20

NEW CYBER ESPIONAGE CAMPAIGNS TARGETING PALESTINIANS - PART 2: THE DISCOVERY OF THE NEW, MYSTERIOUS PIEROGI BACKDOOR BigBrother blog Cybereason
15.2.20 NEW CYBER ESPIONAGE CAMPAIGNS TARGETING PALESTINIANS - PART 1: THE SPARK CAMPAIGN BigBrother blog Cybereason
15.2.20 How Chinese Cybercriminals Use Business Playbook to Revamp Underground BigBrother blog Mcafee blog
15.2.20 "Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests BigBrother blog F5 Labs
8.2.20 U.S. Battleground County Website Security Survey BigBrother blog Mcafee blog

26.1.20

Did the Saudi crown prince hack Jeff Bezos?

BigBrother blog

Avast blog

26.1.20

The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks

BigBrother blog

Palo Alto Unity42

19.1.20 Answers to 5 key questions about highly publicized NSA-Microsoft story BigBrother blog Avast blog

18.1.20

IS CYBER RETALIATION FROM IRAN IMMINENT? BigBrother blog

Cybereason

18.1.20

Security Lessons from Across the Pond: Local Government Ransomware Attacks BigBrother blog  Ransomware blog F5 Labs

18.1.20

What the continued escalation of tensions in the Middle East means for security BigBrother blog

Cisco Talos

18.1.20

FBI shuts down website selling billions of stolen records BigBrother blog

Eset

18.1.20

Cyberawareness in Australia: The good and the bad BigBrother blog

Eset

18.1.20

Microsoft patches severe Windows flaw after tip‑off from NSA BigBrother blog  Vulnerebility blog

Eset

12.1.20

Homeland Security warns of Iranian cyberattacks

BigBrother blog

Avast blog

11.1.20 Iran Cyber Threat Update BigBrother blog

Mcafee blog

11.1.20

Tik or Tok? Is TikTok secure enough? BigBrother blog Checkpoint
4.1.20 IS CYBER RETALIATION FROM IRAN IMMINENT? BigBrother blog

Cybereason

28.12.19

Regional Threat Perspectives, Fall 2019: Russia BigBrother blog

F5 Labs

21.12.19

ELECTION HACKING

BigBrother blog

Cybereason

21.12.19

HOW GEOPOLITICAL EVENTS WILL CHANGE CYBERSECURITY IN 2020

BigBrother blog

Cybereason

15.12.19

U.S. offers $5 million reward for info about Russian malware masterminds BigBrother blog  Malware blog Avast blog
14.12.19

DOTGOV Online Trust in Government Legislation is Critical to Improving Election Security

BigBrother blog  ICS blog

Mcafee blog

8.12.19 U.S. offers $5 million reward for info about Russian malware masterminds BigBrother blog Sonicwall

24.11.19

Amazon tells senator there are few restrictions on how police may use Ring doorbell footage BigBrother blog Avast blog

10.11.19

Facebook removes Russian propaganda networks BigBrother blog  Social blog Avast blog

10.11.19

A look inside the hack of a nuclear reactor’s computer network BigBrother blog Avast blog

9.11.19

How adversaries use politics for compromise

BigBrother blog

Cisco Talos

2.11.19 Three Ways to Hack the U.S. Election BigBrother blog F5 Labs
2.11.19 The commoditization of mobile espionage software BigBrother blog

Cisco Talos

20.10.19

PKPLUG: Chinese Cyber Espionage Group Attacking Asia

BigBrother blog

Palo Alto Unity42

20.10.19

Iranian hackers host malicious ‘Hire Military Heroes’ site

BigBrother blog

Avast blog

12.10.19 EU warns of cyber‑risks as 5G looms BigBrother blog  Hardware blog

Eset

7.9.19

UPSynergy: Chinese-American Spy vs. Spy Story BigBrother blog Checkpoint

10.8.19

FBI warns of romance scams using online daters as money mules

BigBrother blog

Eset

6.7.19 NHS warned to act now to keep hackers at bay BigBrother blog

Eset

29.6.19 Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments BigBrother blog Symantec
29.6.19 Hackers breach NASA, steal Mars mission data BigBrother blog Eset

12.6.19

Cyberattack exposes travelers’ photos, says US border agency BigBrother blog

Eset

12.6.19

NSA joins chorus urging Windows users to patch ‘BlueKeep’ BigBrother blog

Eset

28.3.19

Karta – Matching Open Sources in Binaries

BigBrother blog Checkpoint

14.3.19

Whitefly: Espionage Group has Singapore in Its Sights BigBrother blog Symantec

21.2.19

Switzerland offers cash for finding security holes in its e-voting system BigBrother blog

Eset

7.2.19

European Commission orders recall of children’s smartwatch over privacy concerns

BigBrother blog

Eset

2.2.19

Fake Cisco Job Posting Targets Korean Candidates

BigBrother blog

Cisco Talos

2.2.19

Japan to probe citizens’ IoT devices in the name of security

BigBrother blog

Eset

30.1.19

Suspected GDPR violations prompt over 95,000 complaints BigBrother blog Eset
28.1.19 Improved Fallout EK comes back after short hiatus BigBrother blog Malwarebytes
28.1.19 Google fined €50 million for violating EU data privacy rules BigBrother blog Eset
9.1.19 EU offers bug bounties on popular open source software BigBrother blog Eset
9.1.19 Personal data of German political elite dumped online BigBrother blog Eset
14.12.18 Malaysian government targeted with mash-up espionage toolkit BigBrother blog Eset
11.12.18 Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms BigBrother blog Symantec
21.11.18 OceanLotus: New watering hole attack in Southeast Asia BigBrother blog Eset
9.11.18 US Air Force invites white hats to find hackable flaws, again BigBrother blog Eset
30.10.18

Zooming In On “Domestic Kitten”

BigBrother blog Checkpoint
25.10.18 TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers BigBrother blog FireEye

14.9.18

Domestic Kitten: An Iranian Surveillance Operation

BigBrother blog

Checkpoint

30.7.18

EternalBlue – Everything There Is To Know

BigBrother blog

Checkpoint

30.7.18

BROKERS IN THE SHADOWS: Analyzing vulnerabilities and attacks spawned by the leaked NSA hacking tools

BigBrother blog

Checkpoint

18

Suspected Iranian Influence Operation Leverages Network of Inauthentic News Sites & Social Media Targeting Audiences in U.S., UK, Latin America, Middle East

BigBrother blog

FireEye