Skip to content

F1TYM1

InfoSec News

  • Fity Feeds
  • Fity Blog
  • About
  • Other

Malware / Ransomware

Review: Perlroth’s book on the cyberarms market
Sete práticas de segurança cibernética que toda organização deveria implementar
Evolução da cibersegurança: Uma breve linha do tempo
DHS to Provide $25 Million More for Cybersecurity Grants
Vietnamese hackers spent years harassing human rights activists with spyware
Ransomware hackers turn to virtual machine software to boost extortion schemes
Ransomware: Beware of 13 Tactics, Tools and Procedures
North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware
Chinese Hackers Had Access to a U.S. Hacking Tool Years Before It Was Leaked Online
Majority of malware now delivered via cloud apps
Russian Hackers Targeted Ukraine Authorities With Supply-Chain Malware Attack
The Business of Fraud: An Overview of How Cybercrime Gets Monetized
Silver Sparrow Malware Targets Apple’s New M1 Macs – Intego Mac Podcast Episode 176
Silver Sparrow: 40,000 Macs Infected by Mysterious M1-native Malware
Alexa, swap out this code that Amazon approved for malware... Installed Skills can double-cross their users
Successful Phishers Make Slim Gains in 2020
Report sheds light on how cybercriminals target healthcare
5 minutes with Mike Hamilton – The biggest threats to the critical infrastructure
Ransomware, Phishing Will Remain Primary Risks in 2021
Microsoft Releases Free Tool for Hunting SolarWinds Malware
UK National Cyber Security Centre Issues Distance Learning Guide For Families
Silver Sparrow Malware Hatched on 30,000 Macs
The perils of non-disclosure? China 'cloned and used' NSA zero-day exploit for years before it was made public
Brave browser leaks visited Tor .onion addresses in DNS traffic, fix released after bug hunter raises alarm
Trojan-Proxy.Win32.Delf.ai Buffer Overflow
Trojan-Dropper.Win32.Daws.etlm Unauthenticated Reboot
Trojan.Win32.Hotkeychick.am Insecure Permissions
Backdoor.Win32.Azbreg.amw Insecure Permissions
Trojan-Spy.Win32.SpyEyes.elr Insecure Permissions
Malware monsters target Apple’s M1 silicon with ‘Silver Sparrow’
Twelve-Year-Old Vulnerability Found in Windows Defender
Dependency Confusion: Another Supply-Chain Vulnerability
Lazarus targets defense industry with ThreatNeedle
Detecting and Responding to SolarWinds Infrastructure Attack with Cisco Secure Analytics
The state of stalkerware in 2020
Podcast: Ransomware Attacks Exploded in Q4 2020
Malware Gangs Partner Up in Double-Punch Security Threat
Lazarus Targets Defense Companies with ThreatNeedle Malware
This Week in Security: Mysterious Mac Malware, An Elegant VMware RCE, and a JSON Mess
The Week in Ransomware - February 26th 2021 - Back from the Holidays

Boston Dynamics’ Spot Robot Is Now Armed



  • Join IEEE
  • |
  • IEEE.org
  • |
  • IEEE Xplore Digital Library
  • |
  • IEEE Standards
  • |
  • IEEE Spectrum
  • |
  • More Sites
  • Create Account
  • |
  • Sign In

Related

Posted on 2021-02-02Author BlogCategories Fity Feeds

Post navigation

Previous Previous post: If you’ve had a security breach…10 steps you need to take
Next Next post: OT Network Segmentation – Bridging the NAC Gap