Skip to content

F1TYM1

InfoSec News

  • Fity Feeds
  • Fity Blog
  • About
  • Other

Malware / Ransomware

How Hash-Based Safe Browsing Works in Google Chrome
US treasury whips up sanctions for crypto mixer Tornado Cash
Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook
New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack
A Growing Number of Malware Attacks Leveraging Dark Utilities 'C2-as-a-Service'
New Woody RAT Malware Being Used to Target Russian Organizations
7-Eleven Stores In Denmark Closed Due To a Cyberattack
Great, Now the Apple App Store Has Malware Too
Meta Disrupted Two Cyberespionage Operations in South Asia
US, Australian Cybersecurity Agencies Publish List of 2021's Top Malware
Evolution of security: the story of the ILOVEYOU worm | Kaspersky official blog
Hackers Using SHARPEXT Browser Malware to Spy on Gmail and Aol Users
A Ransomware Explosion Fosters Thriving Dark Web Ecosystem
Fresh RapperBot Malware Variant Brute-Forces Its Way Into SSH Servers
Deepfakes Grow in Sophistication, Cyberattacks Rise Following Ukraine War
10 Malicious Code Packages Slither into PyPI Registry
US aims to step up security for federal datacenters: Both physical and cyber
The evolution of security: the story of Code Red | Kaspersky official blog
Sonatype shines light on typosquatting ransomware threat in PyPI
How cybercrims embrace messaging apps to spread malware, communicate
Defence against the dark arts of ransomware
One-third of organizations experience weekly ransomware attacks
Top malware strains observed in 2021
Chinese hackers use new Windows malware to backdoor govt, defense orgs
GitHub Zero-Day: From 35K Repos Compromised to False Alarm
SafeBreach Coverage for US-CERT Alert (AA22-216A)- Top Malware Strains in 2021
Why is device protection for kids valuable?
Phishing attack adds pressure with countdown clock
Targeted attack on industrial enterprises and public institutions
Andariel deploys DTrack and Maui ransomware
Researchers uncover sophisticated global Chinese hacking operation
7-Eleven Stores In Denmark Closed Due To a Cyberattack
APT34 (aka OilRig, aka Helix Kitten) attacks Lebanon government entities with MailDropper implants
Strengthen Android privacy and security via Telsy free secure DNS over TLS
Diving into YarGen
Strengthen Android privacy and security via Telsy free secure DNS over TLS
APT34 (aka OilRig, aka Helix Kitten) attacks Lebanon government entities with MailDropper implants
Facebook Removes Accounts Used to Infect Thousands With Malware
New Warning on Ryuk Ransomware
Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update

DEFCON 29 IoT Village – Victor Hanna’s ‘LED Light Lunacy’

Our thanks to DEFCON for publishing their outstanding DEF CON 29 IoT Village videos on the Conferences’ YouTube channel.

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/NGkRPpwWDLM

Related

Posted on 2021-11-20Author BlogCategories Fity Feeds

Post navigation

Previous Previous post: DEFCON 29 IoT Village – Tim Jensen’s ‘EapolSniper – IoT Testing Crash Course’
Next Next post: A ‘techlash’ with Chinese characteristics
Proudly powered by WordPress