Blog News Computer Attack -  

Úvod  APT blog  Attack blog  BigBrother blog  BotNet blog  Bug blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  Hardware blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransomware blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog


 


Datum

Název

Info

Blog

Companies

13.4.19

WPA3 flaws may let attackers steal Wi-Fi passwords The new wireless security protocol contains multiple design flaws that hackers could exploit for attacks on Wi-Fi passwords Attack blog

Eset

28.3.19 ASUS Software Updates Used for Supply Chain Attacks ASUS update system hijacked to send out malicious updates to as many as half a million computers. Attack blog Symantec

14.3.19

Cisco Talos Honeypot Analysis Reveals Rise in Attacks on Elasticsearch Clusters Cisco Talos warns users that they need to keep a close eye on unsecured Elasticsearch clusters. We have recently observed a spike in attacks from multiple threat actors targeting these clusters. These attackers are targeting clusters using versions 1.4.2 and lower, and are leveraging old vulnerabilities to pass scripts to search queries and drop the attacker's payloads. Attack blog Cisco Talos
3.3.19 Escalating DNS attacks have domain name steward worried The keeper of the internet’s ‘phone book’ is urging a speedy adoption of security-enhancing DNS specifications Attack blog

Eset

17.2.19 Malta’s leading bank resumes operations after cyberheist-induced shutdown Bank of Valetta, which went dark for a day after the fraudulent transfers of €13 million, is now looking to get the money back Attack blog

Eset

7.2.19

Reverse RDP Attack: Code Execution on RDP Clients

Used by thousands of IT professionals and security researchers worldwide, the Remote Desktop Protocol (RDP) is usually considered a safe and trustworthy application to connect to remote computers. Whether it is used to help those working remotely or to work in a safe VM environment, RDP clients are an invaluable tool.

Attack blog

Checkpoint

2.2.19

‘We’re coming for you’, global police warn DDoS attack buyers

First closing in on operators, now on users, as the hunt continues and law enforcement in many countries is about to swoop down on people who bought DDoS attacks on WebStresser

Attack blog

Eset

5.12.18 The DNS Attacks We’re Still Seeings In early 2017, even decades after its adoption, the Domain Name System (DNS) is still the Achilles’ heel of the internet. This is because nearly everything on the Internet requires DNS, but the DNS service relies on a protocol that is both unreliable and easy to impersonate. It is for these two reasons that attackers target DNS for direct attack or subversion to support other attacks. Attack blog F5 Labs
1.12.18 Cyberattacks on financial sector worries Americans most A recent survey carried out by ESET has revealed that Americans are worried most about cyberattacks on the financial sector, listing it above attacks against hospitals, voting systems, or energy supply companies Attack blog Eset

12.8.18

Man-in-the-Disk: Android Apps Exposed via External Storage

Research By: Slava Makkaveev Recently, our researchers came across a shortcoming in the design of Android’s use of storage resources. Careless use of External Storage by applications may open the door to an...

Attack blog

Checkpoint

30.7.18

Cyber Attack Trends: 18 Mid-Year Report When it comes to the global cyber threat landscape, threats are ever evolving, keeping organizations, as well as the security research community, constantly challenged. In our Cyber Attack Trends: 18 Mid-Year Report we... Attack blog

Checkpoint

30.7.18

Hacked in Translation – “Director’s Cut” – Full Technical Details

Background Recently, Check Point researchers revealed a brand new attack vector – attack by subtitles. As discussed in the previous post and in our demo, we showed how attackers can use subtitles files

Attack blog

Checkpoint