Skip to content

F1TYM1

InfoSec News

  • Fity Feeds
  • Fity Blog
  • About
  • Other

Malware / Ransomware

120 Compromised Ad Servers Target Millions of Internet Users
Monero Cryptominer Attack Exploits Exchange Server Flaw
Lazarus APT Hackers are now using BMP images to hide RAT malware
What Are the Reasons Behind Health Data Breach Surge?
Sysadmin for FIN7 criminal cracking group gets 10 years in US prison for managing card slurping malware scam
Malware That Spreads Via Xcode Projects Now Targeting Apple's M1-based Macs
Brit authorities could legally do an FBI and scrub malware from compromised boxen without your knowledge
Attackers Test Weak Passwords in Purple Fox Malware Attacks
DarkSide Leaks shows how ransomware is becoming an industry
Transatlantic Cable podcast, episode 197 | Kaspersky official blog
Simplify and Accelerate Threat Hunting with High-Speed, High-Confidence Threat Intelligence
500 Million More Reasons to Talk About Facebook – Intego Mac Podcast Episode 183
Is it still possible to run malware in a browser using JavaScript and Rowhammer? Yes, yes it is (slowly)
EDR functionality in a small business solution
Trojan.Win32.Agent.hsm Insecure Permissions
Trojan.Win32.Bayrob.dtrg Insecure Permissions
Trojan-Dropper.Win32.Agent.bjtzcp Insecure Permissions
Trojan.Win32.NanoBot.onh Insecure Permissions
Trojan.Win32.Agentb.iofv Insecure Permissions
Constructor.Win32.Bifrose.ag Buffer Overflow
Desktop Window Manager vulnerability CVE-2021-28310 exploited ITW
How Contextualized Intelligence Maximizes Security Outcomes in SecOps Tools
Five reasons you should install protection on all devices, and how to do it
Sysadmin of fake cybersecurity company sentenced to jail after billion-dollar crime spree
Google’s Project Zero Changes the 90-Day Disclosure Policy to a More Flexible Solution
Google Alerts continues to be a hotbed of scams and malware
A week in security (April 12 – 18)
Surface expands its Secured-core portfolio with the new Surface Laptop 4 powered by AMD Ryzen™ Mobile Processors
Targeted Malware Reverse Engineering Workshop follow-up. Part 1
Ransomware: A Deep Dive into 2021 Emerging Cyber-Risks
NitroRansomware Asks for $9.99 Discord Gift Codes, Steals Access Tokens
Strengthen Android privacy and security via Telsy free secure DNS over TLS
APT34 (aka OilRig, aka Helix Kitten) attacks Lebanon government entities with MailDropper implants
Diving into YarGen
Strengthen Android privacy and security via Telsy free secure DNS over TLS
APT34 (aka OilRig, aka Helix Kitten) attacks Lebanon government entities with MailDropper implants
Malware makes an exhibition of itself
Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers
Chronicle, Alphabet's push into security, will join Google Cloud
China is reportedly scanning tourists' phones with malware - CNET

With Drones and Other Autonomous Vehicles, Safety Must Come First



  • Join IEEE
  • |
  • IEEE.org
  • |
  • IEEE Xplore Digital Library
  • |
  • IEEE Standards
  • |
  • IEEE Spectrum
  • |
  • More Sites
  • Create Account
  • |
  • Sign In

Related

Posted on 2021-03-23Author BlogCategories Fity Feeds

Post navigation

Previous Previous post: How to enable Facebook’s hardware key authentication for iOS and Android
Next Next post: The human impact of a Royal Mail phishing scam