Blog News Safety Blog -
Úvod APT blog Attack blog BigBrother blog BotNet blog Bug blog Cyber blog Cryptocurrency blog Exploit blog Hacking blog Hardware blog ICS blog Incident blog IoT blog Malware blog Phishing blog Ransomware blog Safety blog Security blog Social blog Spam blog Vulnerebility blog
The cybersecurity field shifted quite a bit in 2018. With the boom of cryptocurrency, we saw a transition from ransomware to cryptocurrency miners. Talos researchers identified APT campaigns including VPNFilter, predominantly affecting small business and home office networking equipment, as well as Olympic Destroyer, apparently designed to disrupt the Winter Olympics.
The new tool aims to help in an age when billions of login credentials are floating around the internet
|28.1.19||Has two-factor authentication been defeated? A spotlight on 2FA’s latest challenge||While many tech-savvy folks are familiar with two-factor authentication (2FA), more are unaware that there are several ways around it. A tool called Modlishka, the English pronunciation for the Polish word for "mantis," is the latest in this list||Safety blog||Malwarebytes|
|23.11.18||Who needs passwords? Microsoft now lets you in with your face or security key||The software giant takes passwords one step closer to obsolescence as it now enables users to log into their Microsoft accounts with more modern forms of authentication||Safety blog||Eset|