Blog News BigBrother -
Úvod APT blog Attack blog BigBrother blog BotNet blog Bug blog Cyber blog Cryptocurrency blog Exploit blog Hacking blog Hardware blog ICS blog Incident blog IoT blog Malware blog Phishing blog Ransomware blog Safety blog Security blog Social blog Spam blog Vulnerebility blog
|9.1.19||EU offers bug bounties on popular open source software||The program with a prize pool of almost US$1 million aims to leverage the ‘power of the crowd’ in order to prevent another Heartbleed||BigBrother blog||Eset|
|9.1.19||Personal data of German political elite dumped online||The vast trove of data was released online and disseminated via Twitter over the span of four weeks – without anybody really noticing||BigBrother blog||Eset|
|14.12.18||Malaysian government targeted with mash-up espionage toolkit||An interview with ESET researchers Tomáš Gardoò and Filip Kafka on their research of a malware toolkit used in espionage against the Malaysian government||BigBrother blog||Eset|
|11.12.18||Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms||Symantec researchers have uncovered extensive insights into a cyber espionage group behind a recent series of cyber-attacks designed to gather intelligence on targets spread primarily across the Middle East as well as in Europe and North America.||BigBrother blog||Symantec|
|21.11.18||OceanLotus: New watering hole attack in Southeast Asia||ESET researchers identified 21 distinct websites that had been compromised including some particularly notable government and media sites||BigBrother blog||Eset|
|9.11.18||US Air Force invites white hats to find hackable flaws, again||This is the third time that the air force wants ethical hackers to uncover chinks in its digital armor.||BigBrother blog||Eset|
Zooming In On “Domestic Kitten”
|In recent years, Iran has been channeling significant resources into cyber warfare, devoting designated entities within multiple government agencies to conduct extensive espionage campaigns against foreign countries such as the United States, Israel.||BigBrother blog||Checkpoint|
|25.10.18||TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers||FireEye Intelligence assesses with high confidence that intrusion activity that led to deployment of TRITON was supported by a Russian government-owned technical research institution located in Moscow.||BigBrother blog||FireEye|
Chinese strategist Sun Tzu, Italian political philosopher Machiavelli and English philosopher Thomas Hobbes all justified deceit in war as a legitimate form of warfare. Preceding them all, however, were some in the Middle East who had already internalized and implemented this strategy to great effect, and continue to do so today.
Introduction Since the revelation of the EternalBlue exploit, allegedly developed by the NSA, and the malicious uses that followed with WannaCry, it went under thorough scrutiny by the security community. While many details.
Background Rarely does the release of an exploit have such a large impact across the world. With the recent leak of the NSA exploit methods, we saw the effects of powerful tools in..
FireEye has identified a suspected influence operation that appears to originate from Iran aimed at audiences in the U.S., U.K., Latin America, and the Middle East.