Blog News BigBrother -  

Úvod  APT blog  Attack blog  BigBrother blog  BotNet blog  Bug blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  Hardware blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransomware blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog


 


Datum

Název

Info

Blog

Companies

14.3.19

Whitefly: Espionage Group has Singapore in Its Sights In July 2018, an attack on Singapore’s largest public health organization, SingHealth, resulted in a reported 1.5 million patient records being stolen. Until now, nothing was known about who was responsible for this attack. Symantec researchers have discovered that this attack group, which we call Whitefly, has been operating since at least 2017, has targeted organizations based mostly in Singapore across a wide variety of sectors, and is primarily interested in stealing large amounts of sensitive information. BigBrother blog Symantec

21.2.19

Switzerland offers cash for finding security holes in its e-voting system Anybody with hacking prowess can take a crack at reading votes or even rigging the vote count itself BigBrother blog

Eset

7.2.19

European Commission orders recall of children’s smartwatch over privacy concerns

The watch has been found to expose its wearers to a high level of risk of being contacted and monitored by attackers

BigBrother blog

Eset

2.2.19

Fake Cisco Job Posting Targets Korean Candidates

Cisco Talos recently observed a targeted malware campaign being leveraged in an attempt to compromise specific organizations. The infection vector associated with this campaign was a Microsoft Word document that was disguised as a job posting for Cisco Korea, and leveraged legitimate content available as part of job postings on various websites. EST Security also described this campaign in a blog post this week. This malicious Office document appears to have been the initial portion of what was designed to be a multi-stage infection process. 

BigBrother blog

Cisco Talos

2.2.19

Japan to probe citizens’ IoT devices in the name of security

Smart devices were targeted by more than one-half of cyberattacks detected in the country in 2017

BigBrother blog

Eset

30.1.19

Suspected GDPR violations prompt over 95,000 complaints Eight months after the landmark rules came into effect, data released by the European Commission provides a glimpse into the law’s applicationBigBrother blog Eset
28.1.19 Improved Fallout EK comes back after short hiatus The Fallout exploit kit is back with some noteworthy improvements.BigBrother blog Malwarebytes
28.1.19 Google fined €50 million for violating EU data privacy rules France’s data protection watchdog issues the first major penalty under the EU’s new privacy regimeBigBrother blog Eset
9.1.19 EU offers bug bounties on popular open source software The program with a prize pool of almost US$1 million aims to leverage the ‘power of the crowd’ in order to prevent another HeartbleedBigBrother blog Eset
9.1.19 Personal data of German political elite dumped online The vast trove of data was released online and disseminated via Twitter over the span of four weeks – without anybody really noticingBigBrother blog Eset
14.12.18 Malaysian government targeted with mash-up espionage toolkit An interview with ESET researchers Tomáš Gardoò and Filip Kafka on their research of a malware toolkit used in espionage against the Malaysian governmentBigBrother blog Eset
11.12.18 Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms Symantec researchers have uncovered extensive insights into a cyber espionage group behind a recent series of cyber-attacks designed to gather intelligence on targets spread primarily across the Middle East as well as in Europe and North America.BigBrother blog Symantec
21.11.18 OceanLotus: New watering hole attack in Southeast Asia ESET researchers identified 21 distinct websites that had been compromised including some particularly notable government and media sitesBigBrother blog Eset
9.11.18 US Air Force invites white hats to find hackable flaws, again This is the third time that the air force wants ethical hackers to uncover chinks in its digital armor.BigBrother blog Eset
30.10.18

Zooming In On “Domestic Kitten”

In recent years, Iran has been channeling significant resources into cyber warfare, devoting designated entities within multiple government agencies to conduct extensive espionage campaigns against foreign countries such as the United States, Israel.BigBrother blog Checkpoint
25.10.18 TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers FireEye Intelligence assesses with high confidence that intrusion activity that led to deployment of TRITON was supported by a Russian government-owned technical research institution located in Moscow.BigBrother blog FireEye

14.9.18

Domestic Kitten: An Iranian Surveillance Operation

Chinese strategist Sun Tzu, Italian political philosopher Machiavelli and English philosopher Thomas Hobbes all justified deceit in war as a legitimate form of warfare. Preceding them all, however, were some in the Middle East who had already internalized and implemented this strategy to great effect, and continue to do so today.

BigBrother blog

Checkpoint

30.7.18

EternalBlue – Everything There Is To Know

Introduction Since the revelation of the EternalBlue exploit, allegedly developed by the NSA, and the malicious uses that followed with WannaCry, it went under thorough scrutiny by the security community. While many details.

BigBrother blog

Checkpoint

30.7.18

BROKERS IN THE SHADOWS: Analyzing vulnerabilities and attacks spawned by the leaked NSA hacking tools

Background Rarely does the release of an exploit have such a large impact across the world. With the recent leak of the NSA exploit methods, we saw the effects of powerful tools in..

BigBrother blog

Checkpoint

18

Suspected Iranian Influence Operation Leverages Network of Inauthentic News Sites & Social Media Targeting Audiences in U.S., UK, Latin America, Middle East

FireEye has identified a suspected influence operation that appears to originate from Iran aimed at audiences in the U.S., U.K., Latin America, and the Middle East.

BigBrother blog

FireEye