Skip to content

F1TYM1

InfoSec News

  • Fity Feeds
  • Fity Blog
  • About
  • Other

Malware / Ransomware

120 Compromised Ad Servers Target Millions of Internet Users
Monero Cryptominer Attack Exploits Exchange Server Flaw
Lazarus APT Hackers are now using BMP images to hide RAT malware
What Are the Reasons Behind Health Data Breach Surge?
Sysadmin for FIN7 criminal cracking group gets 10 years in US prison for managing card slurping malware scam
Malware That Spreads Via Xcode Projects Now Targeting Apple's M1-based Macs
Brit authorities could legally do an FBI and scrub malware from compromised boxen without your knowledge
Attackers Test Weak Passwords in Purple Fox Malware Attacks
DarkSide Leaks shows how ransomware is becoming an industry
Transatlantic Cable podcast, episode 197 | Kaspersky official blog
Simplify and Accelerate Threat Hunting with High-Speed, High-Confidence Threat Intelligence
500 Million More Reasons to Talk About Facebook – Intego Mac Podcast Episode 183
Is it still possible to run malware in a browser using JavaScript and Rowhammer? Yes, yes it is (slowly)
EDR functionality in a small business solution
Trojan.Win32.Agent.hsm Insecure Permissions
Trojan.Win32.Bayrob.dtrg Insecure Permissions
Trojan-Dropper.Win32.Agent.bjtzcp Insecure Permissions
Trojan.Win32.NanoBot.onh Insecure Permissions
Trojan.Win32.Agentb.iofv Insecure Permissions
Constructor.Win32.Bifrose.ag Buffer Overflow
Desktop Window Manager vulnerability CVE-2021-28310 exploited ITW
How Contextualized Intelligence Maximizes Security Outcomes in SecOps Tools
Five reasons you should install protection on all devices, and how to do it
Sysadmin of fake cybersecurity company sentenced to jail after billion-dollar crime spree
Google’s Project Zero Changes the 90-Day Disclosure Policy to a More Flexible Solution
Google Alerts continues to be a hotbed of scams and malware
A week in security (April 12 – 18)
Surface expands its Secured-core portfolio with the new Surface Laptop 4 powered by AMD Ryzen™ Mobile Processors
Targeted Malware Reverse Engineering Workshop follow-up. Part 1
Ransomware: A Deep Dive into 2021 Emerging Cyber-Risks
NitroRansomware Asks for $9.99 Discord Gift Codes, Steals Access Tokens
Strengthen Android privacy and security via Telsy free secure DNS over TLS
APT34 (aka OilRig, aka Helix Kitten) attacks Lebanon government entities with MailDropper implants
Diving into YarGen
Strengthen Android privacy and security via Telsy free secure DNS over TLS
APT34 (aka OilRig, aka Helix Kitten) attacks Lebanon government entities with MailDropper implants
Malware makes an exhibition of itself
Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers
Chronicle, Alphabet's push into security, will join Google Cloud
China is reportedly scanning tourists' phones with malware - CNET

Four Microsoft Exchange Zero-Days Exploited by China

Four Microsoft Exchange Zero-Days Exploited by China

Microsoft has issued an emergency Microsoft Exchange patch to fix four zero-day vulnerabilities currently being exploited by China.

Tags: China, Microsoft, patching, vulnerabilities, zero-day

Posted on March 4, 2021 at 1:03 PM • 0 Comments

Sidebar photo of Bruce Schneier by Joe MacInnis.

Related

Posted on 2021-03-04Author BlogCategories Fity Feeds

Post navigation

Previous Previous post: BEC scammer infects own device, giving researchers a front-row seat to operations
Next Next post: How to replicate secrets in AWS Secrets Manager to multiple Regions