RSS FEEDS

RSS FEEDS

RSS FEEDS

Feeds from around the web…

We have curated a number of RSS feeds so that you can keep informed about latest developments such malware outbreaks.

Please note that these feeds are not produced by MetrixCloud, so use your judgement when reading them. Also, MetrixCloud does not endorse any of the companies providing the information.

SecurityWeek RSS Feed Latest IT Security News and Expert Insights Via RSS Feed

  • The zero-day exploits of Operation WizardOpium
    by Boris Larin on 28th May 2020 at 10:00 am

    Back in October 2019 we detected a classic watering-hole attack that exploited a chain of Google Chrome and Microsoft Windows zero-days. In this blog post we’d like to take a deep technical dive into the attack.

  • Spam and phishing in Q1 2020
    by Tatyana Shcherbakova on 26th May 2020 at 10:00 am

    Glancing at the results of Q1 2020, we anticipate that the COVID-19 topic will continue to be actively used by cybercriminals for the foreseeable future. To attract potential victims, the pandemic will be mentioned even on "standard" fake pages and […]

  • Aggressive in-app advertising in Android
    by Igor Golovin on 25th May 2020 at 10:00 am

    We will look into a few examples of suspicious-looking ad modules that we discovered in popular apps earlier this year.

  • IT threat evolution Q1 2020. Statistics
    by Victor Chebyshev on 20th May 2020 at 10:00 am

    Kaspersky solutions blocked 726,536,269 attacks launched from online resources across the globe, a total of 442,039,230 unique URLs were recognized as malicious.

  • IT threat evolution Q1 2020
    by David Emm on 20th May 2020 at 10:00 am

    Operation AppleJeus, news about Roaming Mantis, watering-hole websites in Asia, virus blast from the past and other targeted attacks and malware campaigns.

  • Verizon’s 2020 DBIR
    by Kurt Baumgartner on 19th May 2020 at 4:50 pm

    Verizon’s 2020 DBIR is out, you can download a copy or peruse their publication online. Kaspersky was a contributor once again, and we are happy to provide generalized incident data from our unique and objective research.

  • Cyberthreats on lockdown
    by AMR on 14th May 2020 at 12:00 pm

    The pandemic has affected us all in some way, so it would be surprising if cybercriminals were an exception. Spammers and phishers were naturally the trailblazers in this but the entire cybercrime landscape has changed in the last few months.

  • COMpfun authors spoof visa application with HTTP status-based Trojan
    by GReAT on 14th May 2020 at 10:00 am

    In autumn 2019 we published a story about how a COMpfun successor known as Reductor infected files on the fly to compromise TLS traffic. Later in November 2019 we revealed a new Trojan using the same code base as COMPFun.

Threatpost The First Stop For Security News

SecuriTeam Blogs We pay more for vulnerabilities

  • beVX Conference Challenge – HiTB
    by SSD / Noam Rathaus on 22nd June 2018 at 11:30 am

    During the event of Hack In the Box, we launched an ARM reverse engineering and exploitation challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: […]

  • I run this SOC!
    by dmitryc on 5th September 2017 at 7:35 pm

    I don’t actually run this SOC (or any other) 🙂 But…but, as a certified “blue team” member, I’m pretty excited with the crop of new companies and ideas that are springing up in the area of SOC analysis, […]

  • Hack2Win – Code Blue 3rd Edition
    by SSD / Research Team on 21st August 2017 at 6:26 am

    Hi everyone, We are excited to announce our 3rd Hack2Win Code Blue competition! This year we have changed the format, raised the difficulty level and increased the prizes. The goal of the event is to find who can gain the highest privileges on any […]

  • Know your community – Celil ÜNÜVER
    by SSD / Research Team on 24th July 2017 at 9:57 am

    Bug Bounty hunter – found and reported vulnerabilities in Microsoft, Apple, Adobe, IBM, Novell and more, Co-Founder of TRAPMINE and SignalSEC, Founder of NOPCon, speaker at PoC / Code Blue / Swiss Cyber Storm / CONFidence and more – […]

  • SSD Advisory – HTC Sync Remote Code Execution
    by SSD / Research Team on 27th February 2017 at 10:19 am

    Vulnerabilities Summary The following advisory describes a remote code execution (RCE) found in HTC Sync version v3.3.63. Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure […]

  • HITCON Taiwan 2016
    by SSD / Research Team on 7th December 2016 at 12:14 pm

    On the 1-2 December 2016 we had the honor for the first time to sponsor HITCON and visit Taiwan. Our adventure started in November 30th when Noam and I landed in Taipei and we had half a day to sightseeing and set up our booth at the conference […]

  • SSD Advisory – Teco SG2 and TP3 Vulnerabililites
    by SSD / Noam Rathaus on 4th July 2016 at 12:58 pm

    Vulnerabilities Description Multiple vulnerabilities have been found in Teco’s SG2 and TP3 product, these vulnerabilities allows attackers that are able to supply the products with a specially crafted file to cause it to execute arbitrary […]

  • Using Machine Learning To Detect Anomalies
    by dmitryc on 21st December 2015 at 10:07 pm

    I’m going to start blogging more about detection of protocol/app anomalies, detection of lateral movement and/or data exfiltration, and more. For many years I have been watching users and applications furrow their way across networks and […]

    Feed has no items.
+ Security Week

SecurityWeek RSS Feed Latest IT Security News and Expert Insights Via RSS Feed

+ SecureList (Kaspersky)
  • The zero-day exploits of Operation WizardOpium
    by Boris Larin on 28th May 2020 at 10:00 am

    Back in October 2019 we detected a classic watering-hole attack that exploited a chain of Google Chrome and Microsoft Windows zero-days. In this blog post we’d like to take a deep technical dive into the attack.

  • Spam and phishing in Q1 2020
    by Tatyana Shcherbakova on 26th May 2020 at 10:00 am

    Glancing at the results of Q1 2020, we anticipate that the COVID-19 topic will continue to be actively used by cybercriminals for the foreseeable future. To attract potential victims, the pandemic will be mentioned even on "standard" fake pages and […]

  • Aggressive in-app advertising in Android
    by Igor Golovin on 25th May 2020 at 10:00 am

    We will look into a few examples of suspicious-looking ad modules that we discovered in popular apps earlier this year.

  • IT threat evolution Q1 2020. Statistics
    by Victor Chebyshev on 20th May 2020 at 10:00 am

    Kaspersky solutions blocked 726,536,269 attacks launched from online resources across the globe, a total of 442,039,230 unique URLs were recognized as malicious.

  • IT threat evolution Q1 2020
    by David Emm on 20th May 2020 at 10:00 am

    Operation AppleJeus, news about Roaming Mantis, watering-hole websites in Asia, virus blast from the past and other targeted attacks and malware campaigns.

  • Verizon’s 2020 DBIR
    by Kurt Baumgartner on 19th May 2020 at 4:50 pm

    Verizon’s 2020 DBIR is out, you can download a copy or peruse their publication online. Kaspersky was a contributor once again, and we are happy to provide generalized incident data from our unique and objective research.

  • Cyberthreats on lockdown
    by AMR on 14th May 2020 at 12:00 pm

    The pandemic has affected us all in some way, so it would be surprising if cybercriminals were an exception. Spammers and phishers were naturally the trailblazers in this but the entire cybercrime landscape has changed in the last few months.

  • COMpfun authors spoof visa application with HTTP status-based Trojan
    by GReAT on 14th May 2020 at 10:00 am

    In autumn 2019 we published a story about how a COMpfun successor known as Reductor infected files on the fly to compromise TLS traffic. Later in November 2019 we revealed a new Trojan using the same code base as COMPFun.

+ Threat Post (Kaspersky)

Threatpost The First Stop For Security News

+ SecuriTeam

SecuriTeam Blogs We pay more for vulnerabilities

  • beVX Conference Challenge – HiTB
    by SSD / Noam Rathaus on 22nd June 2018 at 11:30 am

    During the event of Hack In the Box, we launched an ARM reverse engineering and exploitation challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: […]

  • I run this SOC!
    by dmitryc on 5th September 2017 at 7:35 pm

    I don’t actually run this SOC (or any other) 🙂 But…but, as a certified “blue team” member, I’m pretty excited with the crop of new companies and ideas that are springing up in the area of SOC analysis, […]

  • Hack2Win – Code Blue 3rd Edition
    by SSD / Research Team on 21st August 2017 at 6:26 am

    Hi everyone, We are excited to announce our 3rd Hack2Win Code Blue competition! This year we have changed the format, raised the difficulty level and increased the prizes. The goal of the event is to find who can gain the highest privileges on any […]

  • Know your community – Celil ÜNÜVER
    by SSD / Research Team on 24th July 2017 at 9:57 am

    Bug Bounty hunter – found and reported vulnerabilities in Microsoft, Apple, Adobe, IBM, Novell and more, Co-Founder of TRAPMINE and SignalSEC, Founder of NOPCon, speaker at PoC / Code Blue / Swiss Cyber Storm / CONFidence and more – […]

  • SSD Advisory – HTC Sync Remote Code Execution
    by SSD / Research Team on 27th February 2017 at 10:19 am

    Vulnerabilities Summary The following advisory describes a remote code execution (RCE) found in HTC Sync version v3.3.63. Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure […]

  • HITCON Taiwan 2016
    by SSD / Research Team on 7th December 2016 at 12:14 pm

    On the 1-2 December 2016 we had the honor for the first time to sponsor HITCON and visit Taiwan. Our adventure started in November 30th when Noam and I landed in Taipei and we had half a day to sightseeing and set up our booth at the conference […]

  • SSD Advisory – Teco SG2 and TP3 Vulnerabililites
    by SSD / Noam Rathaus on 4th July 2016 at 12:58 pm

    Vulnerabilities Description Multiple vulnerabilities have been found in Teco’s SG2 and TP3 product, these vulnerabilities allows attackers that are able to supply the products with a specially crafted file to cause it to execute arbitrary […]

  • Using Machine Learning To Detect Anomalies
    by dmitryc on 21st December 2015 at 10:07 pm

    I’m going to start blogging more about detection of protocol/app anomalies, detection of lateral movement and/or data exfiltration, and more. For many years I have been watching users and applications furrow their way across networks and […]

+ Malware Protection Center (Microsoft)

    Feed has no items.