Skip to content

F1TYM1

InfoSec News

  • Fity Feeds
  • Fity Blog
  • About
  • Other

Malware / Ransomware

Universal Health Services reports $67 million in losses after apparent ransomware attack
Suspected China-linked hackers targeted India's energy sector, research suggests
Robocalls keep spamming Americans, in part because of their cyber tools
Ransomware hackers turn to virtual machine software to boost extortion schemes
Gootkit malware crew using SEO to get pwned websites in front of unwitting marks
Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites
Frequently Asked Questions about Acunetix
Anti-Virus
Ryuk Ransomware With Worm-Like Capabilities Spotted in the Wild
Trojan-Spy.Win32.Stealer.osh Insecure Permissions
Backdoor.Win32.RemoteManipulator.fdo Insecure Permissions
First Fully Weaponized Spectre Exploit Discovered Online
Malware attack that crippled Mumbai's power system came from China, claims infosec intel outfit Recorded Future
What to do if someone tries to hack your Facebook or Instagram account | Kaspersky official blog
North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware
Sophos details delivery method of financial malware Gootkit
Two ransomware strains target VMware’s ESXI hypervisor through stolen vCenter creds
Application Security This Week for February 28
The Business of Fraud: An Overview of How Cybercrime Gets Monetized
Silver Sparrow Malware Targets Apple’s New M1 Macs – Intego Mac Podcast Episode 176
Silver Sparrow: 40,000 Macs Infected by Mysterious M1-native Malware
Alexa, swap out this code that Amazon approved for malware... Installed Skills can double-cross their users
Successful Phishers Make Slim Gains in 2020
Silver Sparrow Malware Hatched on 30,000 Macs
The perils of non-disclosure? China 'cloned and used' NSA zero-day exploit for years before it was made public
Malware Gangs Partner Up in Double-Punch Security Threat
Lazarus Targets Defense Companies with ThreatNeedle Malware
Mobile malware evolution 2020
Defending online anonymity and speech with Eva Galperin: Lock and Code S02E03
Hackers use black hat SEO to push ransomware, trojans via Google
Malware Loader Abuses Google SEO to Expand Payload Delivery
First Fully Weaponized Spectre Exploit Discovered Online
Strengthen Android privacy and security via Telsy free secure DNS over TLS
APT34 (aka OilRig, aka Helix Kitten) attacks Lebanon government entities with MailDropper implants
Diving into YarGen
Strengthen Android privacy and security via Telsy free secure DNS over TLS
APT34 (aka OilRig, aka Helix Kitten) attacks Lebanon government entities with MailDropper implants
China is reportedly scanning tourists' phones with malware - CNET
Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update
Facebook Removes Accounts Used to Infect Thousands With Malware

Bright X-Rays, AI, and Robotic Labs—A Roadmap for Better Batteries



  • Join IEEE
  • |
  • IEEE.org
  • |
  • IEEE Xplore Digital Library
  • |
  • IEEE Standards
  • |
  • IEEE Spectrum
  • |
  • More Sites
  • Create Account
  • |
  • Sign In

Related

Posted on 2021-01-19Author BlogCategories Fity Feeds

Post navigation

Previous Previous post: Kaizen Gaming Makes Winning Bet on Application Security
Next Next post: New Year, new password protections in Chrome