Skip to content

F1TYM1

InfoSec News

  • Fity Feeds
  • Fity Blog
  • About
  • Other

Malware / Ransomware

Russian Hackers Targeted Ukraine Authorities With Supply-Chain Malware Attack
CD Projekt Ransomware Hack Severely Disrupts Work on Cyberpunk Updates
Alexa, swap out this code that Amazon approved for malware... Installed Skills can double-cross their users
Cybersecurity Agencies Warn of Accellion Vulnerability Exploits
Updated Minebridge RAT Targets Security Researchers
BSides Calgary 2020 – AJ Leece’s ‘Malware Analysis For Incident Response’
Successful Phishers Make Slim Gains in 2020
How to Quickly Diagnose Silver Sparrow Infections
Report sheds light on how cybercriminals target healthcare
Experts Warns of Notable Increase in QuickBooks Data Files Theft Attacks
5 minutes with Mike Hamilton – The biggest threats to the critical infrastructure
Everything You Need to Know About Evolving Threat of Ransomware
Senate hearing on SolarWinds hack lays bare US shortcomings, remaining mysteries
Biden signs executive order demanding supply chain security review
Universities Face Double Threat of Ransomware, Data Breaches
61% of Malware Delivered via Cloud Apps: Report
Organizations are at growing risk from Initial Access Brokers
Silver Sparrow Malware Hatched on 30,000 Macs
The perils of non-disclosure? China 'cloned and used' NSA zero-day exploit for years before it was made public
Exponential increase in malware and exploit activities
Brave browser leaks visited Tor .onion addresses in DNS traffic, fix released after bug hunter raises alarm
Backdoor.Win32.Delf.adag Hardcoded Credentials / Traversal
Backdoor.Win32.Agent.xw Denial Of Service / Null Pointer
Backdoor.Win32.Agent.xs Insecure Permissions
Malware monsters target Apple’s M1 silicon with ‘Silver Sparrow’
Twelve-Year-Old Vulnerability Found in Windows Defender
Dependency Confusion: Another Supply-Chain Vulnerability
What to do if your company gets attacked by ransomware | Kaspersky official blog
A New Amazon Phishing Scam, Malvertizing, and Apple Activation Lock Removal – Intego Mac Podcast Episode 175
Transatlantic Cable podcast, episode 189 | Kaspersky official blog
Clop targets execs, ransomware tactics get another new twist
Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective
LazyScripter: From Empire to double RAT
Tax Season Ushers in Quickbooks Data-Theft Spike
Lazarus targets defense industry with ThreatNeedle
CD Projekt Ransomware Hack Severely Disrupts Work on Cyberpunk Updates
Strengthen Android privacy and security via Telsy free secure DNS over TLS
APT34 (aka OilRig, aka Helix Kitten) attacks Lebanon government entities with MailDropper implants
Diving into YarGen
Strengthen Android privacy and security via Telsy free secure DNS over TLS

FAA Files Reveal a Surprising Threat to Airline Safety: the U.S. Military’s GPS Tests



  • Join IEEE
  • |
  • IEEE.org
  • |
  • IEEE Xplore Digital Library
  • |
  • IEEE Standards
  • |
  • IEEE Spectrum
  • |
  • More Sites
  • Create Account
  • |
  • Sign In

Related

Posted on 2021-01-21Author BlogCategories Fity Feeds

Post navigation

Previous Previous post: The dynamic duo: How to build a red and blue team to strengthen your cybersecurity, Part 2
Next Next post: Trump Hates Cloud, Because China Cyber?