Blog News Cyber -
Úvod APT blog Attack blog BigBrother blog BotNet blog Bug blog Cyber blog Cryptocurrency blog Exploit blog Hacking blog Hardware blog ICS blog Incident blog IoT blog Malware blog Phishing blog Ransomware blog Safety blog Security blog Social blog Spam blog Vulnerebility blog
|9.1.19||New Year’s resolutions: Get your passwords shipshape||In case there are some blank entries in your laundry list of New Year’s resolutions, we have a few tips for a bit of cybersecurity ‘soul searching’. Here’s the first batch, looking at how you can fix your good ol’ passwords.||Cyber blog||Eset|
|9.1.19||SPARE: Five tips for a safer online shopping experience||There is still some time left to pick up some last-minute shopping before it’s too late but in the rush to do so don’t forget to do it safely||Cyber blog||Eset|
|21.12.18||Submissions for talks at the 2019 Talos Threat Research Summit are now open||When Cisco Talos launched the first ever Talos Threat Research Summit last year, we never could have anticipated how popular it would be.||Cyber blog||Cisco Talos|
|20.12.18||All the reasons why cybercriminals want to hack your phone||Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn't they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.||Cyber blog||Malwarebytes|
With just days left in 2018, ESET experts offer their reflections in ‘Cybersecurity Trends 2019’ on themes that are set to figure prominently in the upcoming year
|15.12.18||Compromising vital infrastructure: the power grid||How are we doing at protecting the vital infrastructure of our power grid and its components against physical and cyberattacks?||Cyber blog||Malwarebytes|
|11.12.18||Next Generation Dark Markets? Think Amazon or eBay for criminals||The “evolution” of these markets is making cybercrime easier than ever before||Cyber blog||Eset|
|4.12.18||CyberwarCon – focusing on the impact of cyber-badness||A welcome return to the hacker conferences of yesteryear||Cyber blog|
|30.11.18||You Better Watch Out: Online and Offline Threats Endanger Payment Card Data||Cyber attackers are using old tricks and new to steal customers’ payment card details from retailers this shopping season.||Cyber blog||Symantec|
|29.11.18||3ve – Major online ad fraud operation disrupted||International law enforcement swoops on fake ad viewing outfit||Cyber blog||Eset|
|29.11.18||DNSpionage Campaign Targets Middle East||Cisco Talos recently discovered a new campaign targeting Lebanon and the United Arab Emirates (UAE) affecting .gov domains, as well as a private Lebanese airline company. Based on our research, it's clear that this adversary spent time understanding the victims' network infrastructure in order to remain under the radar and act as inconspicuous as possible during their attacks.||Cyber blog||Cisco Talos|
|27.11.18||German chat site faces fine under GDPR after data breach||The country’s first fine under GDPR is lower than might have been expected, however, as the company earns praise for its post-incident cooperation and enhanced security measures||Cyber blog||Eset|
|23.11.18||New Yorker accused of stealing $1m from Silicon Valley executive via SIM swap||The suspect is believed to have carried out the scam on no fewer than six executives in the Bay Area, albeit ultimately with varying success||Cyber blog||Eset|
|23.11.18||Good deal hunting: Staying safe on Black Friday||As the unofficial beginning of the holiday shopping season catches us up in the frenetic hunt for all those fantastic bargains, the shopping bonanza presents a host of risks to your online safety. Here are a few tips for going on a shopping spree and staying safe||Cyber blog||Eset|
|21.11.18||Sednit: What’s going on with Zebrocy?||In August 18, Sednit’s operators deployed two new Zebrocy components, and since then we have seen an uptick in Zebrocy deployments, with targets in Central Asia, as well as countries in Central and Eastern Europe, notably embassies, ministries of foreign affairs, and diplomats.||Cyber blog||Eset|
|21.11.18||Two Brits jailed for TalkTalk hack||The breach exposed the personal data of 160,000 people and cost the telecom company £77 million||Cyber blog||Eset|
|Cybersecurity a big concern in Canada as cybercrime’s impact grows||90% of Canadians surveyed agreed that cybercrime was an important "challenge to the internal security of Canada"||Cyber blog||Eset|
|20.11.18||What scams shoppers should look out for on Black Friday and Cyber Monday||Last year, consumers spent a record $6.59 billion during the annual online shopping day, an all-time record, according to Adobe Insights. Still, that doesn’t mean no one is rushing out the night of Thanksgiving to do their shopping. Shoppers still went out in droves on Black Friday last year — Adobe estimated that Americans spent $2.43 billion on Nov. 25, 2017.||Cyber blog||Cisco Talos|
|Security researchers bypass encryption on self-encrypting drives||Industry standard specification does not guarantee the safety of the self-encrypting drives despite verification||Cyber blog||Eset|
) Part 1
Speaking at conferences can be daunting for presenters but often it is about striking the right balance between content and delivery
|November Cyber Roundup||November was another busy month as people geared up for Black Friday shopping and the pitfalls that brings to both online retailers and consumers alike. Take a look at our quick roundup of..||Cyber blog||Checkpoint|
|Christmas is Coming: The Criminals Await||By Dikla Barda, Roman Zaikin and Oded Vanunu Black Friday symbolizes the start of the end of year shopping season. During this period, online shopping is expected to increase rapidly as consumers search.||Cyber blog|
Looking back at the first half of 2017, the word ransomware is probably one of the first that come to mind, courtesy of WannaCry and the more recent Petya attacks that dominated the.
Check Point threat Intelligence sensors have picked up a stealth campaign that traditional anti-virus solutions are having a hard time detecting. On July 17th SandBlast Zero-Day Protection started showing a massive email campaign which was..
Introduction New, sophisticated threats continue to emerge on a daily basis across multiple platforms: social media, mobile platforms, email, and web pages. At the same time, prominent malware and attack methods continue to.
On Aug. 1, 18, indictments were unsealed announcing the arrests of three individuals within the leadership ranks of a criminal organization that aligns with activity we have tracked since 2015 as FIN7.