The attention to personal tracing technologies has suddenly boomed as a result of the current CORONA-crisis. Both existing and new technologies are being …
Data Privacy
30.04.2020 | News | Cybereason
Eventbot, a new mobile banking Trojan
Cybereason Nocturnus team has identified a new type of Android mobile that targets users of over 200 different financial applications, …
android application security
Malware detection
Mobile malware
Mobile forensics
EventBot malware
Infostealer
22.04.2020 | News | RACK911 Labs
Rack911: Easy to manipulate antivirus software into self-destructive tools
RACK911 Labs has come up with a unique but simple method of using directory junctions (Windows) and symlinks (macOS & …
Vulnerability Management
21.04.2020 | News | Microsoft
TrickBot Malware doubtful winner in COVID-19 Phishing Campaigns
Based on Office 365 ATP data, Trickbot is the most prolific malware operation using COVID-19 themed lures. This week’s campaign …
267 Million Facebook User Records for Sale on Dark Net
Millions of Facebook user IDs and other user information is being offered for sale on the darkweb, according to cybersecurity intelligence …
API Security
Dark web monitoring
19.04.2020 | News | Aspen Institute Cyber Security Group
Nation state hackers running espionage against Coronavirus medical research organizations
Nation-state hackers have been running cyber-espionage operations against medical research organizations in the U.S. that are studying the novel coronavirus, …
Industrial Espionage
COVID-19, Corona
18.04.2020 | News |
Cognizant confirms Maze ransomware attack
To this day, details provided by the Tech Giant are limited to a very short statement on its site, confirming …
Ransomware protection
Maze ransomware
17.04.2020 | News |
Czech Cyber Security Center warns for targeted attacks on hospitals
The Czech National Cyber and Information Security Agency (NUKIB) has issued a warning against a cybersecurity threat in the form …
Ransomware protection
COVID-19, Corona
15.04.2020 | News | Kaspersky
Free workshop Threat Hunting with Yara from Kaspersky
March 31, Costin Raiu, director of Kaspersky’s Global Research and Analysis Team (GReAT), shared his best practices on the use of …
14.04.2020 | News |
Dutch police shuts down 15 DDoS service providers in a week
Dutch authorities took down 15 DDoS-for-hire services (also known as DDoS booters, or DDoS stressors) as part of the operation …
DDoS attack protection / Botnet Protection
11.04.2020 | News | Chaos Computer Club
Chaos Computer Club lists 10 requirements for Corona Tracking App
Europe's largest association of hackers, the Chaos Computer Club (CCC) has published a set of minimum requirements for "Contact Tracing" …
Data Privacy
COVID-19, Corona
10.04.2020 | News | Bitdefender
New IoT Botnet Dark Nexus puts other botnets to shame
Bitdefender researchers have found a new IoT botnet with new features and capabilities that put to shame most IoT botnets …
DDoS attack protection / Botnet Protection
IoT Botnets - Internet of Things
Mirai, Qbot, Dark Nexus Botnets
09.04.2020 | News | ForgeRock
ForgeRock Appoints New Chief Technology Officer
SAN FRANCISCO – April 9, 2020 - ForgeRock®, the leading provider in digital identity, today announced the appointment of Eve Maler as …
08.04.2020 | Blog | FireEye
Mandiant: Zero days exploitations largely facilitated by private companies
FireEye Mandiant Threat Intelligence documented more zero-days exploited in 2019 than any of the previous three years. While not every …
07.04.2020 | News | INTERPOL
INTERPOL warns for Ransomware attacks on hospitals
INTERPOL has issued a warning to organizations at the forefront of the global response to the COVID-19 outbreak that have …
Ransomware protection
COVID-19, Corona
07.04.2020 | News | Accenture
Accenture Acquires Revolutionary Security
NEW YORK; April 7, 2020 – Accenture (NYSE: ACN) has acquired Revolutionary Security, a privately held company specializing in enterprise …
SCADA/ICS Security
Industrial Automation Security
ICS Penetration Testing / Industrial Control Systems Penetration Testing
06.04.2020 | News | Rapid7
80 % of Exchange servers vulnerable to attack
The Rapid7 research team has found that more than 350,000 Exchange Servers lack a critical patch that could allow a …
06.04.2020 | News | Trend Micro
Trend Micro 2019 Google Cloud Technology Partner of the Year for Security
DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced that it has been awarded as …
05.04.2020 | News | Fortinet
Spearphishing with the WHO trademark
FortiGuard Labs recently discovered a new COVID-19/Coronavirus-themed spearphishing email sent from [159.69.16[.]177] that uses the World Health Organization (WHO) trademark …
Spear Phishing
TrickBot malware
COVID-19, Corona
04.04.2020 | Blog | nviso
To Zoom or Not to Zoom
During these COVID-19 times, personal interaction with colleagues and customers is no longer straightforward. Lots of companies are therefore looking …
Eavesdropping and phone tapping
Insider Threat
Security Awareness Training
COVID-19, Corona
03.04.2020 | News | OWASP
OWASP launches IoTGoat to educate IoT devices security
Today, OWASP announced the official release of IoTGoat; a deliberately insecure firmware created to educate software developers and security professionals …
IoT Devices security / Internet of Things
02.04.2020 | News | ENISA
ENISA publishes Roadmap cooperation CSIRTS and Law Enforcement
ENISA today published its roadmap CSIRTS and Law Enforcement. The purpose of this roadmap is to further explore the cooperation …
Incident Response as a Service (CSIRT)
Threat Intelligence Sharing
02.04.2020 | News |
Dutch tax agency FIOD and TU Delft join forces in investigating digital and financial crime
TU Delft (University of Delft) researchers and students are helping the FIOD (Fiscal Information and Investigation Service) in its efforts …
Financial Economic Crime (FEC)
Dark web monitoring
01.04.2020 | News | Global Cyber Alliance (GCA)
13 Non Profits join forces to protect remote working
The Global Cyber Alliance is one of 13 nonprofit organizations that have banded together to help businesses secure their newly …
Guardicore Labs uncovered a long-running attack campaign which aims to infect Windows machines running MS-SQL servers. Dating back to May …
Brute force attacks
Cryptomining attacks
30.03.2020 | Blog | Excellium Services
Deception technology explained
The term Deception technology might be unknown or obscure to you, and that is perfectly normal considering it refers to one of …
Honeypots
29.03.2020 | News | EclecticIQ
EclecticIQ’s new browser extension helps analysts capture threat indicators automatically
EclecticIQ, global provider of cyber threat intelligence (CTI) technology solutions, has released a new browser extension, specifically made for its …
Cyber Threat Intelligence - CTI
27.03.2020 | News | ProtonMail
Vulnerability in iOS 13.3.1 prevents VPNs from encrypting all traffic
A member of the Proton community discovered that in iOS version 13.3.1, the operating system does not close existing connections …
Apple iOS application security
26.03.2020 | News | Kentik
How Zoom, Netflix, and Dropbox are Staying Online During the Pandemic
To fight the COVID-19 pandemic, huge swaths of humanity have transformed their daily routines. Offices and schools are closed, city …
26.03.2020 | News | ENISA
ENISA launches platform European Cybersecurity studies
As part of its effort “Cybersecurity Skills Development in the EU”, ENISA has today launched its Cybersecurity Higher Education Database. The database lists …
25.03.2020 | Blog | Bitdefender
New Brute-Force Attack Aims at Home Routers as More People Work Remotely
Bitdefender researchers have recently found a new attack that targets home routers and changes their DNS settings to redirect victims …
Brute force attacks
20.03.2020 | Blog | Tor Project
Tor Project shares tools it uses for remote working
The world's strongest tool and non -profit initiative for internet privacy and freedom online has revealed some of the tools …
Data Privacy
17.03.2020 | News | The Shadowserver Foundation
Shadowserver urgent request for financial support to sustain US operations
The Shadowserver Foundation, the volunteer watchdog group engaged in combatting malware, botnet activity and electronic fraud has lost founding from …
DDoS attack protection / Botnet Protection
16.03.2020 | News | DomainTools
Mobile Coronavirus Tracking App Coughs Up Ransomware
Cybercriminals like to exploit people when they are at their most vulnerable. They use dramatic events that cause people to …
Mobile malware
13.03.2020 | News | Cyber Butler
First meeting of cyber triangle in the Netherlands
Since yesterday, the Netherlands has its first "cyber triangle". Katwijk’s Mayor, Cornelis Visser (also regional cybercrime portfolio holder), police chief …
Cybercrime
12.03.2020 | News | Siemens
Siemens publishes Incident Response Playbook for Energy Infrastructure
Leo Simonovich, the Global Head of Industrial Cybersecurity at Siemens Energy introduced a Playbook for Incident Response for Energy infrastructures. …
SCADA/ICS Security
Industrial Automation Security
12.03.2020 | News | Europol Cybercrime Centre (EC3)
Dark Web Child Abuse: Administrator of Darkscandals arrested in the Netherlands
In an international case, the Dutch Police (Politie), the Dutch Fiscal Intelligence and Investigation Service (FIOD), Dutch National Prosecutor’s office …
Dark web monitoring
11.03.2020 | News | Cyber Butler
Avast disables part of its antivirus product to prevent remote code execution
Avast this week disabled a JavaScript interpreter that is part of its antivirus product, after security researcher Tavis Ormandy from …
10.03.2020 | News | Trend Micro
Trend Micro Cloud App Security Report 2019
Trend Micro today published its Cloud App Security Report 2019. Cloud App Security detected and blocked 12.7 million high-risk threats that …
MONTPELIER, Vt. (AP) — The state of Vermont is suing a data broker that it says uses facial recognition technology …
Data Privacy
09.03.2020 | News | WatchGuard Technologies
WatchGuard acquires Panda Security
WatchGuard Technologies today announced that it has entered into a definitive agreement to acquire Panda Security. The combined entity will provide centralized …
Dutch DPA warns for algorithms that lead to exclusion and discrimination
On his privacyblog, Aleid Wolfsen, the Ducth Data Protection Authority warns for algorithms that lead to exclusion and discrimination.
Data Privacy
GDPR
09.03.2020 | News | Cyber Butler
Malware Campaign exploits Corona Virus using AZORult
Reason Labs’ cybersecurity researcher, Shai Alfasi, found and investigated malware that disguised as a “Coronavirus map". These weaponized coronavirus map …
Spear Phishing
05.03.2020 | Blog | Microsoft
Ransomware attacks are a preventable disaster
In its blog, the Microsoft Threat Protection Intelligence Team elaborates on its research on well-known human-operated ransomware campaigns [like REvil, …
Ransomware protection
04.03.2020 | News | Core Security a HelpSystems Company
HelpSystems Acquires Cobalt Strike
MINNEAPOLIS, March 04, 2020 (GLOBE NEWSWIRE) -- HelpSystems announced today the acquisition of Cobalt Strike, a leading penetration testing (pen-testing) …
Bug Bounty Penetration Testing
25.02.2020 | News | Fortinet
Fortinet Introduces AI Appliance for Threat Detection
Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, today announced FortiAI, an on-premises appliance that leverages …
Artificial Intelligence
Cyber Threat Intelligence - CTI
Intrusion detection and prevention systems - IDS, IPS
Deep learning neural networks
20.02.2020 | News | Cyber Butler
Manufacturers lax with smart device safety
Smart device manufacturers do not pay enough attention to the safety of their products. That’s the conclusion from the Dutch …
IoT Devices security / Internet of Things
04.02.2020 | Blog | EclecticIQ
2019 Threat Intelligence Trends and 2020 Predictions
In this blog post we are looking at the top trends and patterns that EclecticIQ Fusion Center analysts identified throughout 2019. The …
Cyber Threat Intelligence - CTI
28.01.2020 | News | Atos Cyber Security
ATOS and Palo Alto introduce Cloud Security Posture Management service
Atos, a global leader in digital transformation, launches a new Cloud Security Posture Management (CSPM) service powered by Palo Alto Networks Prisma™ Cloud technology. …
Data Protection in the Cloud
Data Compliance in the Cloud
21.01.2020 | News | FireEye
FireEye Acquires Cloudvisory
FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today announced the acquisition of Cloudvisory. The acquisition, which closed on January 17, 2020, will …
Cloud Data Protection
Data Protection in the Cloud
16.01.2020 | Blog | SentinelOne
What is the true cost of a ransomware attack? 6 factors to consider
The end of year summary season is gone, and among all the scary and shocking statistics, there is one number that looms …
Ransomware protection
14.01.2020 | Blog | SentinelOne
History of cyber attacks from Iran and Mitigation Actions against future attacks
The recently heightened tensions between the United States and Iran have resulted in an increased focus on Iran’s cyber-capabilities. With …
Cybercrime
State sponsored attacks
13.01.2020 | Blog | SentinelOne
Top-Tier Russian Organized Cybercrime Group Unveils Fileless Stealthy “PowerTrick” Backdoor for High-Value Targets
The TrickBot cybercrime enterprise actively develops many of its offensive tools such as “PowerTrick” that are leveraged for stealthiness, persistence, …
APT and zero day threats
Cybercrime
Indicators of Exposure (IOE)
TrickBot malware
01.01.2020 | Blog | Deloitte Enterprise Risk Services
Report: Managing cyber risk in the electric power sector
The power sector is one of the most frequently targeted and first to respond to cyber threats with mandatory controls. …
For many networking teams, making the move to SD-WAN is an easy decision, especially considering the support it offers for new critical …
SD-WAN Security
19.12.2019 | Blog | G DATA
G DATA IT Security Trends 2020: Early detection and repulsion of dangerous attacks
Medium-sized companies are being targeted even more heavily by cyber criminals than before. They are often the weakest link in …
Ransomware protection
Mobile malware
11.12.2019 | News | SentinelOne
SentinelOne launches new Research Division
SentinelOne, the autonomous endpoint protection company, today announced the launch of SentinelLabs, a research division designed to identify new attack vectors and mitigate …
Cyber Threat Intelligence - CTI
10.12.2019 | News | BAE Systems
BAE Systems to develop new cyber tools for US Defense
BAE Systems has been awarded a contract by the U.S. Defense Advanced Research Projects Agency (DARPA) to develop new cyber …
Vulnerability Management
04.12.2019 | Blog | Atos Cyber Security
Security by design: the new cyber security paradigm
We are living in remarkable times as ongoing digitalization transforms the world in which we live. It is estimated that …
Security by design
01.12.2019 | Blog | Excellium Services
OSINT: Open Source Intelligence
The world of intelligence assessment is divided into multiple parts. For example, the SIGINT, or signal intelligence is the fact …
Cyber Threat Intelligence - CTI
OSINT- open source intelligence
28.11.2019 | Blog | Mailfence
Open Letter regarding Commission’s “e-evidence” proposal
The Commission is considering to put a new legislation in effect that strips off the competitive advantage of European tech …
e-evidence
07.11.2019 | Blog | Fortinet
Disrupting Cybercriminal Strategy With AI and Automation
In the cybersecurity space, there has always been an unfair advantage for cybercriminals. Adversaries only need to find one vulnerability …
Artificial Intelligence
Deep learning neural networks
31.10.2019 | Blog | Excellium Services
Office 365, Azure Active Directory and the Incident Response
Microsoft is the de facto leader when it comes to the enterprise infrastructure. Recently, we have seen an increasing number …
Cloud Data Protection
Incident Response Management
Office 365 Security
Microsoft Azure Security
23.09.2019 | Blog | InWebo
When to merge IAM and MFA
Identity & Access Management (IAM) is employed by organizations to manage user identities and permissions related to resources, processes, and …
22.02.2018 | Blog | SecurityMatters, A Forescout Company
4 Malware lessons learned from 2017
While 2018 is still fresh, let's take some time to reflect on a few critical pieces of malware that impacted …
SCADA/ICS Security
Industrial Automation Security
anomaly detection
APT and zero day threats
Red Teaming
Deep File Inspection, Deep Packet Inspection
21.02.2018 | Blog | Redsocks [ now Bitdefender ]
17 Threat Landscape Predictions for 2018
Every day we work towards a better and safer future, but to do so, we need to understand what we …
behavioral threat detection
APT and zero day threats
DDoS attack protection / Botnet Protection
Ransomware protection
Spear Phishing
Malware detection
Mobile malware
IoT Botnets - Internet of Things
19.02.2018 | Blog | Secudea
Remote Management for ICS Environments
Having a centralized, time based, source IP controlled, strong authenticated, monitored and logged solution is good and secure – but …