RSS FEEDS

RSS FEEDS

RSS FEEDS

Feeds from around the web…

We have curated a number of RSS feeds so that you can keep informed about latest developments such malware outbreaks.

Please note that these feeds are not produced by MetrixCloud, so use your judgement when reading them. Also, MetrixCloud does not endorse any of the companies providing the information.

SecurityWeek RSS Feed Latest IT Security News and Expert Insights Via RSS Feed

  • DDoS attacks in Q3 2020
    by Oleg Kupreev on 28th October 2020 at 10:00 am

    If Q2 2020 surprised us with an unusually high number of DDoS attacks for this period, the Q3 figures point to a normalization. Judging by the number of unique targets, in comparison with last quarter, cybercriminals were more attracted by European, […]

  • On the trail of the XMRig miner
    by Anton Kuzmenko on 22nd October 2020 at 10:00 am

    As protection methods improve, the developers of miners have had to enhance their own creations, often turning to non-trivial solutions. Several such solutions (previously unseen by us) were detected during our analysis of the open source miner […]

  • Life of Maze ransomware
    by Fedor Sinitsyn on 21st October 2020 at 10:00 am

    In the past year, Maze ransomware has become one of the most notorious malware families threatening businesses and large organizations.

  • GravityRAT: The spy returns
    by Tatyana Shishkova on 19th October 2020 at 10:00 am

    In 2019, on VirusTotal, we encountered a curious piece of Android spyware which, when analyzed, seemed connected to GravityRAT. The cybercriminals had added a spy module to Travel Mate, an Android app for travelers to India, the source code of which […]

  • IAmTheKing and the SlothfulMedia malware family
    by Ivan Kwiatkowski on 15th October 2020 at 10:00 am

    The DHS CISA agency released information about a malware family called SlothfulMedia, which they attribute to a sophisticated threat actor. We have been tracking this set of activity through our private reporting service, and we would like to […]

  • MontysThree: Industrial espionage with steganography and a Russian accent on both sides
    by Denis Legezo on 8th October 2020 at 10:00 am

    In summer 2020 we uncovered a previously unknown multi-module C++ toolset used in highly targeted industrial espionage attacks dating back to 2018. The malware authors named the toolset “MT3”; following this abbreviation we have named the […]

  • MosaicRegressor: Lurking in the Shadows of UEFI
    by Mark Lechtik on 5th October 2020 at 10:00 am

    We found a compromised UEFI firmware image that contained a malicious implant. To the best of our knowledge, this is the second known public case where malicious UEFI firmware in use by a threat actor was found in the wild.

  • SAS@Home is back this fall
    by Kaspersky on 30th September 2020 at 3:15 pm

    Now, this unique year presents us with a new surprise: the second SAS in one calendar year! Once again, everyone can visit this online event.


Warning: preg_match() expects parameter 2 to be string, array given in /home/behavi67/public_html/metrixcloud.co.uk/wp-includes/class-simplepie.php on line 2620

Threatpost The First Stop For Security News

SecuriTeam Blogs We pay more for vulnerabilities

  • beVX Conference Challenge – HiTB
    by SSD / Noam Rathaus on 22nd June 2018 at 11:30 am

    During the event of Hack In the Box, we launched an ARM reverse engineering and exploitation challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: […]

  • I run this SOC!
    by dmitryc on 5th September 2017 at 7:35 pm

    I don’t actually run this SOC (or any other) 🙂 But…but, as a certified “blue team” member, I’m pretty excited with the crop of new companies and ideas that are springing up in the area of SOC analysis, Deception technology, […]

  • Hack2Win – Code Blue 3rd Edition
    by SSD / Research Team on 21st August 2017 at 6:26 am

    Hi everyone, We are excited to announce our 3rd Hack2Win Code Blue competition! This year we have changed the format, raised the difficulty level and increased the prizes. The goal of the event is to find who can gain the highest privileges on any […]

  • Know your community – Celil ÜNÜVER
    by SSD / Research Team on 24th July 2017 at 9:57 am

    Bug Bounty hunter – found and reported vulnerabilities in Microsoft, Apple, Adobe, IBM, Novell and more, Co-Founder of TRAPMINE and SignalSEC, Founder of NOPCon, speaker at PoC / Code Blue / Swiss Cyber Storm / CONFidence and more – please meet […]

  • SSD Advisory – HTC Sync Remote Code Execution
    by SSD / Research Team on 27th February 2017 at 10:19 am

    Vulnerabilities Summary The following advisory describes a remote code execution (RCE) found in HTC Sync version v3.3.63. Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure […]

  • HITCON Taiwan 2016
    by SSD / Research Team on 7th December 2016 at 12:14 pm

    On the 1-2 December 2016 we had the honor for the first time to sponsor HITCON and visit Taiwan. Our adventure started in November 30th when Noam and I landed in Taipei and we had half a day to sightseeing and set up our booth at the conference […]

  • SSD Advisory – Teco SG2 and TP3 Vulnerabililites
    by SSD / Noam Rathaus on 4th July 2016 at 12:58 pm

    Vulnerabilities Description Multiple vulnerabilities have been found in Teco’s SG2 and TP3 product, these vulnerabilities allows attackers that are able to supply the products with a specially crafted file to cause it to execute arbitrary code. […]

  • Using Machine Learning To Detect Anomalies
    by dmitryc on 21st December 2015 at 10:07 pm

    I’m going to start blogging more about detection of protocol/app anomalies, detection of lateral movement and/or data exfiltration, and more. For many years I have been watching users and applications furrow their way across networks and I’m […]

    Feed has no items.
+ Security Week

SecurityWeek RSS Feed Latest IT Security News and Expert Insights Via RSS Feed

+ SecureList (Kaspersky)
  • DDoS attacks in Q3 2020
    by Oleg Kupreev on 28th October 2020 at 10:00 am

    If Q2 2020 surprised us with an unusually high number of DDoS attacks for this period, the Q3 figures point to a normalization. Judging by the number of unique targets, in comparison with last quarter, cybercriminals were more attracted by European, […]

  • On the trail of the XMRig miner
    by Anton Kuzmenko on 22nd October 2020 at 10:00 am

    As protection methods improve, the developers of miners have had to enhance their own creations, often turning to non-trivial solutions. Several such solutions (previously unseen by us) were detected during our analysis of the open source miner […]

  • Life of Maze ransomware
    by Fedor Sinitsyn on 21st October 2020 at 10:00 am

    In the past year, Maze ransomware has become one of the most notorious malware families threatening businesses and large organizations.

  • GravityRAT: The spy returns
    by Tatyana Shishkova on 19th October 2020 at 10:00 am

    In 2019, on VirusTotal, we encountered a curious piece of Android spyware which, when analyzed, seemed connected to GravityRAT. The cybercriminals had added a spy module to Travel Mate, an Android app for travelers to India, the source code of which […]

  • IAmTheKing and the SlothfulMedia malware family
    by Ivan Kwiatkowski on 15th October 2020 at 10:00 am

    The DHS CISA agency released information about a malware family called SlothfulMedia, which they attribute to a sophisticated threat actor. We have been tracking this set of activity through our private reporting service, and we would like to […]

  • MontysThree: Industrial espionage with steganography and a Russian accent on both sides
    by Denis Legezo on 8th October 2020 at 10:00 am

    In summer 2020 we uncovered a previously unknown multi-module C++ toolset used in highly targeted industrial espionage attacks dating back to 2018. The malware authors named the toolset “MT3”; following this abbreviation we have named the […]

  • MosaicRegressor: Lurking in the Shadows of UEFI
    by Mark Lechtik on 5th October 2020 at 10:00 am

    We found a compromised UEFI firmware image that contained a malicious implant. To the best of our knowledge, this is the second known public case where malicious UEFI firmware in use by a threat actor was found in the wild.

  • SAS@Home is back this fall
    by Kaspersky on 30th September 2020 at 3:15 pm

    Now, this unique year presents us with a new surprise: the second SAS in one calendar year! Once again, everyone can visit this online event.

+ Threat Post (Kaspersky)

Warning: preg_match() expects parameter 2 to be string, array given in /home/behavi67/public_html/metrixcloud.co.uk/wp-includes/class-simplepie.php on line 2620

Threatpost The First Stop For Security News

+ SecuriTeam

SecuriTeam Blogs We pay more for vulnerabilities

  • beVX Conference Challenge – HiTB
    by SSD / Noam Rathaus on 22nd June 2018 at 11:30 am

    During the event of Hack In the Box, we launched an ARM reverse engineering and exploitation challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: […]

  • I run this SOC!
    by dmitryc on 5th September 2017 at 7:35 pm

    I don’t actually run this SOC (or any other) 🙂 But…but, as a certified “blue team” member, I’m pretty excited with the crop of new companies and ideas that are springing up in the area of SOC analysis, Deception technology, […]

  • Hack2Win – Code Blue 3rd Edition
    by SSD / Research Team on 21st August 2017 at 6:26 am

    Hi everyone, We are excited to announce our 3rd Hack2Win Code Blue competition! This year we have changed the format, raised the difficulty level and increased the prizes. The goal of the event is to find who can gain the highest privileges on any […]

  • Know your community – Celil ÜNÜVER
    by SSD / Research Team on 24th July 2017 at 9:57 am

    Bug Bounty hunter – found and reported vulnerabilities in Microsoft, Apple, Adobe, IBM, Novell and more, Co-Founder of TRAPMINE and SignalSEC, Founder of NOPCon, speaker at PoC / Code Blue / Swiss Cyber Storm / CONFidence and more – please meet […]

  • SSD Advisory – HTC Sync Remote Code Execution
    by SSD / Research Team on 27th February 2017 at 10:19 am

    Vulnerabilities Summary The following advisory describes a remote code execution (RCE) found in HTC Sync version v3.3.63. Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure […]

  • HITCON Taiwan 2016
    by SSD / Research Team on 7th December 2016 at 12:14 pm

    On the 1-2 December 2016 we had the honor for the first time to sponsor HITCON and visit Taiwan. Our adventure started in November 30th when Noam and I landed in Taipei and we had half a day to sightseeing and set up our booth at the conference […]

  • SSD Advisory – Teco SG2 and TP3 Vulnerabililites
    by SSD / Noam Rathaus on 4th July 2016 at 12:58 pm

    Vulnerabilities Description Multiple vulnerabilities have been found in Teco’s SG2 and TP3 product, these vulnerabilities allows attackers that are able to supply the products with a specially crafted file to cause it to execute arbitrary code. […]

  • Using Machine Learning To Detect Anomalies
    by dmitryc on 21st December 2015 at 10:07 pm

    I’m going to start blogging more about detection of protocol/app anomalies, detection of lateral movement and/or data exfiltration, and more. For many years I have been watching users and applications furrow their way across networks and I’m […]

+ Malware Protection Center (Microsoft)

    Feed has no items.