Blog News Cyber -  

Úvod  APT blog  Attack blog  BigBrother blog  BotNet blog  Bug blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  Hardware blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransomware blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog



Datum

Název

Info

Blog

Companies

8.3.19

International Women’s Day 2019: How can we be better allies? Every year on March 8, we celebrate International Women's Day to honor the social, economic, cultural and political achievements of women. But we also acknowledge that there is still a long way to go before we’ve truly reached gender parity. This day gives us the opportunity to reflect on how we can achieve that balance. So it’s particularly fitting that the theme of this year’s International Women’s Day is “Balance for Better” Cyber blog

Eset

3.3.19 Cyber-extortionists take aim at lucrative targets A new report shines some light on multiple aspects of the growing threat of cyber-extortion Cyber blog

Eset

3.3.19 ML-era in cybersecurity: A step toward a safer world or the brink of chaos? As the use of this technology grows so does the risk that attackers may hijack it Cyber blog

Eset

21.2.19

Vol.3 – 2019 Security Report n the first installment of this 2019 Security Report we reviewed the latest trends and threats facing the IT security industry today. In the second we took a deeper look at the cyber crime underworld to get a grasp on the democratization of cybercrime, and understood how malware has shifted gears to take a more stealth-like approach to infect organizations. In this installment we focus on how threat actors are able to keep one step ahead by targeting the weakest points in an organization’s IT infrastructure – the cloud, mobile and IoT. Indeed, these platforms offer a threat actor a much higher chance of success and fewer obstacles to overcome due to them being traditionally less protected. Cyber blog Checkpoint

21.2.19

Siegeware: When criminals take over your smart building Siegeware is what you get when cybercriminals mix the concept of ransomware with building automation systems: abuse of equipment control software to threaten access to physical facilities Cyber blog

Eset

7.2.19

Report: Under the Hood of Cyber Crime

Since the dawn of the internet, a cyber crime ecosystem has been developing right beneath our fingertips. And much like the maturing of the Internet, this ecosystem has come a long way since its inception.

Cyber blog

Checkpoint

2.2.19

Cyber Security Week in Review (Feb. 1)

Welcome to this week's Cyber Security Week in Review, where Cisco Talos runs down all of the news we think you need to know in the security world. For more news delivered to your inbox every week, sign up for our Threat Source newsletter here.

Cyber blog

Cisco Talos

2.2.19

Cybercrime black markets: Dark web services and their prices

A closer look at cybercrime as a service on the dark web

Cyber blog

Eset

28.1.19 Cybersecurity Barometer: Cybercrime’s impact on privacy and security Study shows the majority of Americans fear the misuse of their personal data supplied to websites, and view cybercrime as a threat to their countryCyber blog Eset

22.1.19

Threat Trends Analysis Report

2018 introduced a challenging threat landscape. Threat actors consistently improved their cyber weapons, adopted new methods and adapted their attacks to emerging technologies. And although it may have seemed the past year was quieter, this is far from the case.

Cyber blog

Checkpoint

21.1.19 What makes a cybercriminal? Forget balaclavas or hoodies; these cybercriminals are hiding in plain sightCyber blog Eset
9.1.19 New Year’s resolutions: Get your passwords shipshape In case there are some blank entries in your laundry list of New Year’s resolutions, we have a few tips for a bit of cybersecurity ‘soul searching’. Here’s the first batch, looking at how you can fix your good ol’ passwords.Cyber blog Eset
9.1.19 SPARE: Five tips for a safer online shopping experience There is still some time left to pick up some last-minute shopping before it’s too late but in the rush to do so don’t forget to do it safelyCyber blog Eset
21.12.18 Submissions for talks at the 2019 Talos Threat Research Summit are now open When Cisco Talos launched the first ever Talos Threat Research Summit last year, we never could have anticipated how popular it would be.Cyber blog Cisco Talos
20.12.18 All the reasons why cybercriminals want to hack your phone  Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn't they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.Cyber blog Malwarebytes
18.12.18

Cybersecurity Trends 2019: Privacy and intrusion in the global village

With just days left in 2018, ESET experts offer their reflections in ‘Cybersecurity Trends 2019’ on themes that are set to figure prominently in the upcoming year

Cyber blog Eset
15.12.18 Compromising vital infrastructure: the power grid How are we doing at protecting the vital infrastructure of our power grid and its components against physical and cyberattacks?Cyber blog Malwarebytes
11.12.18 Next Generation Dark Markets? Think Amazon or eBay for criminals The “evolution” of these markets is making cybercrime easier than ever beforeCyber blog Eset
4.12.18 CyberwarCon – focusing on the impact of cyber-badness A welcome return to the hacker conferences of yesteryearCyber blog

Eset

30.11.18 You Better Watch Out: Online and Offline Threats Endanger Payment Card Data Cyber attackers are using old tricks and new to steal customers’ payment card details from retailers this shopping season.Cyber blog Symantec
29.11.18 3ve – Major online ad fraud operation disrupted International law enforcement swoops on fake ad viewing outfitCyber blog Eset
29.11.18 DNSpionage Campaign Targets Middle East Cisco Talos recently discovered a new campaign targeting Lebanon and the United Arab Emirates (UAE) affecting .gov domains, as well as a private Lebanese airline company. Based on our research, it's clear that this adversary spent time understanding the victims' network infrastructure in order to remain under the radar and act as inconspicuous as possible during their attacks.Cyber blog Cisco Talos
27.11.18 German chat site faces fine under GDPR after data breach The country’s first fine under GDPR is lower than might have been expected, however, as the company earns praise for its post-incident cooperation and enhanced security measuresCyber blog Eset
23.11.18 New Yorker accused of stealing $1m from Silicon Valley executive via SIM swap The suspect is believed to have carried out the scam on no fewer than six executives in the Bay Area, albeit ultimately with varying successCyber blog Eset
23.11.18 Good deal hunting: Staying safe on Black Friday As the unofficial beginning of the holiday shopping season catches us up in the frenetic hunt for all those fantastic bargains, the shopping bonanza presents a host of risks to your online safety. Here are a few tips for going on a shopping spree and staying safeCyber blog Eset
21.11.18 Sednit: What’s going on with Zebrocy? In August 18, Sednit’s operators deployed two new Zebrocy components, and since then we have seen an uptick in Zebrocy deployments, with targets in Central Asia, as well as countries in Central and Eastern Europe, notably embassies, ministries of foreign affairs, and diplomats.Cyber blog Eset
21.11.18 Two Brits jailed for TalkTalk hack The breach exposed the personal data of 160,000 people and cost the telecom company £77 millionCyber blog Eset

20.11.18

Cybersecurity a big concern in Canada as cybercrime’s impact grows 90% of Canadians surveyed agreed that cybercrime was an important "challenge to the internal security of Canada"Cyber blog Eset
20.11.18 What scams shoppers should look out for on Black Friday and Cyber Monday Last year, consumers spent a record $6.59 billion during the annual online shopping day, an all-time record, according to Adobe Insights. Still, that doesn’t mean no one is rushing out the night of Thanksgiving to do their shopping. Shoppers still went out in droves on Black Friday last year — Adobe estimated that Americans spent $2.43 billion on Nov. 25, 2017.Cyber blog Cisco Talos

15.11.18

Security researchers bypass encryption on self-encrypting drives Industry standard specification does not guarantee the safety of the self-encrypting drives despite verificationCyber blog Eset

20.9.18

The Occasional Orator

) Part 1

Speaking at conferences can be daunting for presenters but often it is about striking the right balance between content and delivery

Cyber blog

Eset

30.7.18

November Cyber Roundup November was another busy month as people geared up for Black Friday shopping and the pitfalls that brings to both online retailers and consumers alike. Take a look at our quick roundup of..Cyber blog Checkpoint

30.7.18

Christmas is Coming: The Criminals Await By Dikla Barda, Roman Zaikin and Oded Vanunu Black Friday symbolizes the start of the end of year shopping season. During this period, online shopping is expected to increase rapidly as consumers search.Cyber blog

Checkpoint

30.7.18

Cyber Attack Trends: Mid-Year Report

Looking back at the first half of 2017, the word ransomware is probably one of the first that come to mind, courtesy of WannaCry and the more recent Petya attacks that dominated the.

Cyber blog

Checkpoint

30.7.18

JavaScript Lost in the Dictionary

Check Point threat Intelligence sensors have picked up a stealth campaign that traditional anti-virus solutions are having a hard time detecting. On July 17th SandBlast Zero-Day Protection started showing a massive email campaign which was..

Cyber blog

Checkpoint

30.7.18

2016 H2 Global and Regional Threat Intelligence Trends

Introduction New, sophisticated threats continue to emerge on a daily basis across multiple platforms: social media, mobile platforms, email, and web pages. At the same time, prominent malware and attack methods continue to.

Cyber blog

Checkpoint

18

On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation

On Aug. 1, 18, indictments were unsealed announcing the arrests of three individuals within the leadership ranks of a criminal organization that aligns with activity we have tracked since 2015 as FIN7.

Cyber blog

FireEye