- [AVAST]Why Emotet Remains An Active Threat | Avast
- [SecList]APT trends report Q2 2020
- [Eset]FBI warns of disruptive DDoS amplification attacks
- [FireEye]'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website
Compromises and Fabricated Content to Push Narratives Aligned With
Russian Security Interests
- [Sophos]Firefox 79 is out – it’s a double-update month so patch now!
- [SecList]Lazarus on the hunt for big game
- [AVAST]Meeting Consumer Needs Through Product Evolution | Avast
- [Eset]Almost 4,000 databases now wiped in ‘Meow’ attacks
- [kreb]Business ID Theft Soars Amid COVID Closures
- [Sophos]Monday review – our recent stories revisited
- [AVAST]Powerful, Complete Protection For Small Businesses | Avast
- [Sophos]7 VPNs that leaked their logs – logs that weren’t even supposed to exist
- [Trend]Ensiko: A Webshell With Ransomware Capabilities
- [Sophos]ProLock ransomware – new report reveals the evolution of a threat
- [FireEye]SCANdalous! (External Detection Using Network Scan Data and Automation)
- [FireEye]It’s Your Money and They Want It Now — The Cycle of Adversary Pursuit
- [FireEye]This Is Not a Test: APT41 Initiates Global Intrusion Campaign Using
Multiple Exploits
- [FireEye]Ransomware Against the Machine: How Adversaries are Learning to Disrupt
Industrial Production by Targeting IT and OT
- [FireEye]Navigating the MAZE: Tactics, Techniques and Procedures Associated With
MAZE Ransomware Incidents
- [FireEye]Analyzing Dark Crystal RAT, a C# backdoor
- [FireEye]Zero-Day Exploitation Increasingly Demonstrates Access to Money, Rather
than Skill — Intelligence for Vulnerability Management, Part One
- [FireEye]Think Fast: Time Between Disclosure, Patch Release and Vulnerability
Exploitation — Intelligence for Vulnerability Management, Part Two
- [FireEye]Excelerating Analysis, Part 2 — X[LOOKUP] Gon’ Pivot To Ya
- [FireEye]Monitoring ICS Cyber Operation Tools and Software Exploit Modules To
Anticipate Future Threats
- [FireEye]Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and
Energy Sectors and has Ties to Destructive Malware
- [FireEye]Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely
Leveraged by Russia’s APT28 in Highly-Targeted Attack
- [FireEye]A Not-So Civic Duty: Asprox Botnet Campaign Spreads Court Dates and
Malware
- [FireEye]The 2013 FireEye Advanced Threat Report!
- [FireEye]Using Real-Time Events in Investigations
- [FireEye]Cerber: Analyzing a Ransomware Attack Methodology To Enable Protection
- [FireEye]Another Darkleech Campaign
- [FireEye]Credit Card Data and Other Information Targeted in Netflix Phishing Campaign
- [FireEye]‘One-Stop Shop’ – Phishing Domain Targets Information from Customers of
Several Indian Banks
- [FireEye]Rotten Apples: Resurgence
- [FireEye]Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational
Disruption to Critical Infrastructure
- [FireEye]What About the Plant Floor? Six Subversive Concerns for ICS Environments
- [FireEye]Overload: Critical Lessons from 15 Years of ICS Vulnerabilities
- [FireEye]IRONGATE ICS Malware: Nothing to See Here...Masking Malicious Activity
on SCADA Systems
- [FireEye]Havex, It’s Down With OPC
- [FireEye]Critical Infrastructure Beyond the Power Grid
- [FireEye]Connected Cars: The Open Road for Hackers
- [FireEye]The Five W’s of Penetration Testing
- [FireEye]Kerberos Tickets on Linux Red Teams
- [Eset]Week in security with Tony Anscombe
- [FireEye]Citrix XenApp and XenDesktop Hardening Guidance
- [FireEye]Leveraging the Power of Solutions and Intelligence
- [Eset]Premier League team narrowly avoids losing £1 million to scammers
- [FireEye]The History of OpenIOC
- [FireEye]Utilities Industry in the Cyber Targeting Scope
- [FireEye]Incident Response with NTFS INDX Buffers – Part 1: Extracting an INDX Attribute