- [kreb]Three Charged in July 15 Twitter Compromise
- [Trend]Mirai Botnet Exploit Weaponized to Attack IoT Devices via CVE-2020-5902
- [XMCO]Résumé de la semaine 31 (du 25 au 31 juillet)
- [SecList]WastedLocker: technical analysis
- [AVAST]Introducing the New Avast Business Remote Control | Avast
- [FireEye]Obscured by Clouds: Insights into Office 365 Attacks and How Mandiant
Managed Defense Investigates
- [Sophos]Servers at risk from “BootHole” bug – what you need to know
- [Sophos]Servers at risk from “BootHole” bug – what you need to know
- [kreb]Is Your Chip Card Secure? Much Depends on Where You Bank
- [AVAST]EULAs, Gamers and Safety | Avast
- [Eset]ESET Threat Report Q2 2020
- [AVAST]EULAs, Gamers and Safety | Avast
- [kreb]Here’s Why Credit Card Fraud is Still a Thing
- [chantal11]Windows 10 Insider Preview Build 20180 – 21H1 – canal Dev (Dev Channel) (ex canal Rapide)
- [AVAST]How to Keep Your Business Accounts Secure | Avast
- [Sophos]US tax service says, “2FA is a must!”
- [AVAST]Why Emotet Remains An Active Threat | Avast
- [SecList]APT trends report Q2 2020
- [Eset]FBI warns of disruptive DDoS amplification attacks
- [FireEye]'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website
Compromises and Fabricated Content to Push Narratives Aligned With
Russian Security Interests
- [Sophos]Firefox 79 is out – it’s a double-update month so patch now!
- [SecList]Lazarus on the hunt for big game
- [AVAST]Meeting Consumer Needs Through Product Evolution | Avast
- [Eset]Almost 4,000 databases now wiped in ‘Meow’ attacks
- [kreb]Business ID Theft Soars Amid COVID Closures
- [Sophos]Monday review – our recent stories revisited
- [AVAST]Powerful, Complete Protection For Small Businesses | Avast
- [Sophos]7 VPNs that leaked their logs – logs that weren’t even supposed to exist
- [Trend]Ensiko: A Webshell With Ransomware Capabilities
- [Sophos]ProLock ransomware – new report reveals the evolution of a threat
- [FireEye]SCANdalous! (External Detection Using Network Scan Data and Automation)
- [FireEye]It’s Your Money and They Want It Now — The Cycle of Adversary Pursuit
- [FireEye]This Is Not a Test: APT41 Initiates Global Intrusion Campaign Using
Multiple Exploits
- [FireEye]Ransomware Against the Machine: How Adversaries are Learning to Disrupt
Industrial Production by Targeting IT and OT
- [FireEye]Navigating the MAZE: Tactics, Techniques and Procedures Associated With
MAZE Ransomware Incidents
- [FireEye]Analyzing Dark Crystal RAT, a C# backdoor
- [FireEye]Zero-Day Exploitation Increasingly Demonstrates Access to Money, Rather
than Skill — Intelligence for Vulnerability Management, Part One
- [FireEye]Think Fast: Time Between Disclosure, Patch Release and Vulnerability
Exploitation — Intelligence for Vulnerability Management, Part Two
- [FireEye]Excelerating Analysis, Part 2 — X[LOOKUP] Gon’ Pivot To Ya
- [FireEye]Monitoring ICS Cyber Operation Tools and Software Exploit Modules To
Anticipate Future Threats
- [FireEye]Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and
Energy Sectors and has Ties to Destructive Malware
- [FireEye]Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely
Leveraged by Russia’s APT28 in Highly-Targeted Attack
- [FireEye]A Not-So Civic Duty: Asprox Botnet Campaign Spreads Court Dates and
Malware
- [FireEye]The 2013 FireEye Advanced Threat Report!
- [FireEye]Using Real-Time Events in Investigations
- [FireEye]Cerber: Analyzing a Ransomware Attack Methodology To Enable Protection
- [FireEye]Another Darkleech Campaign
- [FireEye]Credit Card Data and Other Information Targeted in Netflix Phishing Campaign
- [FireEye]‘One-Stop Shop’ – Phishing Domain Targets Information from Customers of
Several Indian Banks
- [FireEye]Rotten Apples: Resurgence