Blog News Cyber -  

Úvod  APT blog  Attack blog  BigBrother blog  BotNet blog  Bug blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  Hardware blog  ICS blog  Incident blog  IoT blog  Malware blog  Phishing blog  Ransomware blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog



Datum

Název

Info

Blog

Companies

9.1.19New Year’s resolutions: Get your passwords shipshapeIn case there are some blank entries in your laundry list of New Year’s resolutions, we have a few tips for a bit of cybersecurity ‘soul searching’. Here’s the first batch, looking at how you can fix your good ol’ passwords.Cyber blogEset
9.1.19SPARE: Five tips for a safer online shopping experienceThere is still some time left to pick up some last-minute shopping before it’s too late but in the rush to do so don’t forget to do it safelyCyber blogEset
21.12.18Submissions for talks at the 2019 Talos Threat Research Summit are now openWhen Cisco Talos launched the first ever Talos Threat Research Summit last year, we never could have anticipated how popular it would be.Cyber blogCisco Talos
20.12.18All the reasons why cybercriminals want to hack your phone Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn't they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.Cyber blogMalwarebytes
18.12.18

Cybersecurity Trends 2019: Privacy and intrusion in the global village

With just days left in 2018, ESET experts offer their reflections in ‘Cybersecurity Trends 2019’ on themes that are set to figure prominently in the upcoming year

Cyber blogEset
15.12.18Compromising vital infrastructure: the power gridHow are we doing at protecting the vital infrastructure of our power grid and its components against physical and cyberattacks?Cyber blogMalwarebytes
11.12.18Next Generation Dark Markets? Think Amazon or eBay for criminalsThe “evolution” of these markets is making cybercrime easier than ever beforeCyber blogEset
4.12.18CyberwarCon – focusing on the impact of cyber-badnessA welcome return to the hacker conferences of yesteryearCyber blog

Eset

30.11.18You Better Watch Out: Online and Offline Threats Endanger Payment Card DataCyber attackers are using old tricks and new to steal customers’ payment card details from retailers this shopping season.Cyber blogSymantec
29.11.183ve – Major online ad fraud operation disruptedInternational law enforcement swoops on fake ad viewing outfitCyber blogEset
29.11.18DNSpionage Campaign Targets Middle EastCisco Talos recently discovered a new campaign targeting Lebanon and the United Arab Emirates (UAE) affecting .gov domains, as well as a private Lebanese airline company. Based on our research, it's clear that this adversary spent time understanding the victims' network infrastructure in order to remain under the radar and act as inconspicuous as possible during their attacks.Cyber blogCisco Talos
27.11.18German chat site faces fine under GDPR after data breachThe country’s first fine under GDPR is lower than might have been expected, however, as the company earns praise for its post-incident cooperation and enhanced security measuresCyber blogEset
23.11.18New Yorker accused of stealing $1m from Silicon Valley executive via SIM swapThe suspect is believed to have carried out the scam on no fewer than six executives in the Bay Area, albeit ultimately with varying successCyber blogEset
23.11.18Good deal hunting: Staying safe on Black FridayAs the unofficial beginning of the holiday shopping season catches us up in the frenetic hunt for all those fantastic bargains, the shopping bonanza presents a host of risks to your online safety. Here are a few tips for going on a shopping spree and staying safeCyber blogEset
21.11.18Sednit: What’s going on with Zebrocy?In August 18, Sednit’s operators deployed two new Zebrocy components, and since then we have seen an uptick in Zebrocy deployments, with targets in Central Asia, as well as countries in Central and Eastern Europe, notably embassies, ministries of foreign affairs, and diplomats.Cyber blogEset
21.11.18Two Brits jailed for TalkTalk hackThe breach exposed the personal data of 160,000 people and cost the telecom company £77 millionCyber blogEset

20.11.18

Cybersecurity a big concern in Canada as cybercrime’s impact grows90% of Canadians surveyed agreed that cybercrime was an important "challenge to the internal security of Canada"Cyber blogEset
20.11.18What scams shoppers should look out for on Black Friday and Cyber MondayLast year, consumers spent a record $6.59 billion during the annual online shopping day, an all-time record, according to Adobe Insights. Still, that doesn’t mean no one is rushing out the night of Thanksgiving to do their shopping. Shoppers still went out in droves on Black Friday last year — Adobe estimated that Americans spent $2.43 billion on Nov. 25, 2017.Cyber blogCisco Talos

15.11.18

Security researchers bypass encryption on self-encrypting drivesIndustry standard specification does not guarantee the safety of the self-encrypting drives despite verificationCyber blogEset

20.9.18

The Occasional Orator

) Part 1

Speaking at conferences can be daunting for presenters but often it is about striking the right balance between content and delivery

Cyber blog

Eset

30.7.18

November Cyber RoundupNovember was another busy month as people geared up for Black Friday shopping and the pitfalls that brings to both online retailers and consumers alike. Take a look at our quick roundup of..Cyber blogCheckpoint

30.7.18

Christmas is Coming: The Criminals AwaitBy Dikla Barda, Roman Zaikin and Oded Vanunu Black Friday symbolizes the start of the end of year shopping season. During this period, online shopping is expected to increase rapidly as consumers search.Cyber blog

Checkpoint

30.7.18

Cyber Attack Trends: Mid-Year Report

Looking back at the first half of 2017, the word ransomware is probably one of the first that come to mind, courtesy of WannaCry and the more recent Petya attacks that dominated the.

Cyber blog

Checkpoint

30.7.18

JavaScript Lost in the Dictionary

Check Point threat Intelligence sensors have picked up a stealth campaign that traditional anti-virus solutions are having a hard time detecting. On July 17th SandBlast Zero-Day Protection started showing a massive email campaign which was..

Cyber blog

Checkpoint

30.7.18

2016 H2 Global and Regional Threat Intelligence Trends

Introduction New, sophisticated threats continue to emerge on a daily basis across multiple platforms: social media, mobile platforms, email, and web pages. At the same time, prominent malware and attack methods continue to.

Cyber blog

Checkpoint

18

On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation

On Aug. 1, 18, indictments were unsealed announcing the arrests of three individuals within the leadership ranks of a criminal organization that aligns with activity we have tracked since 2015 as FIN7.

Cyber blog

FireEye