RSS FEEDS

RSS FEEDS

RSS FEEDS

Feeds from around the web…

We have curated a number of RSS feeds so that you can keep informed about latest developments such malware outbreaks.

Please note that these feeds are not produced by MetrixCloud, so use your judgement when reading them. Also, MetrixCloud does not endorse any of the companies providing the information.

SecurityWeek RSS Feed Latest IT Security News and Expert Insights Via RSS Feed

  • Recent Cloud Atlas activity
    by GReAT on 12th August 2019 at 10:00 am

    From the beginning of 2019 until July, we have been able to identify different spear-phishing campaigns related to Cloud Atlas mostly focused on Russia, Central Asia and regions of Ukraine with ongoing military conflicts. […]

  • DDoS attacks in Q2 2019
    by Oleg Kupreev on 5th August 2019 at 10:00 am

    According to Kaspersky DDoS Protection data, the second quarter of 2019 turned out to be rather less eventful than the previous one. As such, the number of attacks foiled by our protection systems fell by 44%. But at the same time, the quarter […]

  • APT trends report Q2 2019
    by GReAT on 1st August 2019 at 10:00 am

    The quarterly summaries of APT activity are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private reports. This is our latest installment, focusing on […]

  • Financial threats in H1 2019
    by Oleg Kupreev on 31st July 2019 at 3:00 pm

    In the first half of 2019, more than 430,000 unique users were attacked by financial threats - seven percent more than during the same period in 2018. The number of financial attacks was 10,493,792 – 93% more than in the first half of 2018. […]

  • How to steal a million (of your data)
    by Alexander Eremin on 23rd July 2019 at 10:00 am

    This cybercriminal's thirst for stolen data is confirmed by the statistics: in the first half of 2019, more than 940,000 users were attacked by malware designed to harvest a variety of data on the computers. The threat’s called “Stealer […]

  • On the IoT road: perks, benefits and security of moving smartly
    by Kaspersky on 22nd July 2019 at 10:00 am

    This year, we decided to continue our tradition of small-scale experiments with security of connected devices but focused on the automotive-related topic. We randomly took several different automotive connected devices (a couple of auto scanners, a […]

  • Turla renews its arsenal with Topinambour
    by GReAT on 15th July 2019 at 10:00 am

    2019 has seen the Turla actor actively renew its arsenal. Its developers are still using a familiar coding style, but they’re creating new tools. Here we’ll tell you about several of them, namely “Topinambour” and its related […]

  • New FinSpy iOS and Android implants revealed ITW
    by GReAT on 10th July 2019 at 10:00 am

    FinSpy is used to collect a variety of private user information on various platforms. Since 2011 Kaspersky has continuously monitored the development of this malware and the emergence of new versions in the wild. According to our telemetry, several […]

Threatpost The First Stop For Security News

SecuriTeam Blogs We pay more for vulnerabilities

  • beVX Conference Challenge – HiTB
    by SSD / Noam Rathaus on 22nd June 2018 at 11:30 am

    During the event of Hack In the Box, we launched an ARM reverse engineering and exploitation challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: […]

  • I run this SOC!
    by dmitryc on 5th September 2017 at 7:35 pm

    I don’t actually run this SOC (or any other) 🙂 But…but, as a certified “blue team” member, I’m pretty excited with the crop of new companies and ideas that are springing up in the area of SOC analysis, […]

  • Hack2Win – Code Blue 3rd Edition
    by SSD / Research Team on 21st August 2017 at 6:26 am

    Hi everyone, We are excited to announce our 3rd Hack2Win Code Blue competition! This year we have changed the format, raised the difficulty level and increased the prizes. The goal of the event is to find who can gain the highest privileges on any […]

  • Know your community – Celil ÜNÜVER
    by SSD / Research Team on 24th July 2017 at 9:57 am

    Bug Bounty hunter – found and reported vulnerabilities in Microsoft, Apple, Adobe, IBM, Novell and more, Co-Founder of TRAPMINE and SignalSEC, Founder of NOPCon, speaker at PoC / Code Blue / Swiss Cyber Storm / CONFidence and more – […]

  • SSD Advisory – HTC Sync Remote Code Execution
    by SSD / Research Team on 27th February 2017 at 10:19 am

    Vulnerabilities Summary The following advisory describes a remote code execution (RCE) found in HTC Sync version v3.3.63. Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure […]

  • HITCON Taiwan 2016
    by SSD / Research Team on 7th December 2016 at 12:14 pm

    On the 1-2 December 2016 we had the honor for the first time to sponsor HITCON and visit Taiwan. Our adventure started in November 30th when Noam and I landed in Taipei and we had half a day to sightseeing and set up our booth at the conference […]

  • SSD Advisory – Teco SG2 and TP3 Vulnerabililites
    by SSD / Noam Rathaus on 4th July 2016 at 12:58 pm

    Vulnerabilities Description Multiple vulnerabilities have been found in Teco’s SG2 and TP3 product, these vulnerabilities allows attackers that are able to supply the products with a specially crafted file to cause it to execute arbitrary […]

  • Using Machine Learning To Detect Anomalies
    by dmitryc on 21st December 2015 at 10:07 pm

    I’m going to start blogging more about detection of protocol/app anomalies, detection of lateral movement and/or data exfiltration, and more. For many years I have been watching users and applications furrow their way across networks and […]

    Feed has no items.
+ Security Week

SecurityWeek RSS Feed Latest IT Security News and Expert Insights Via RSS Feed

+ SecureList (Kaspersky)
  • Recent Cloud Atlas activity
    by GReAT on 12th August 2019 at 10:00 am

    From the beginning of 2019 until July, we have been able to identify different spear-phishing campaigns related to Cloud Atlas mostly focused on Russia, Central Asia and regions of Ukraine with ongoing military conflicts. […]

  • DDoS attacks in Q2 2019
    by Oleg Kupreev on 5th August 2019 at 10:00 am

    According to Kaspersky DDoS Protection data, the second quarter of 2019 turned out to be rather less eventful than the previous one. As such, the number of attacks foiled by our protection systems fell by 44%. But at the same time, the quarter […]

  • APT trends report Q2 2019
    by GReAT on 1st August 2019 at 10:00 am

    The quarterly summaries of APT activity are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private reports. This is our latest installment, focusing on […]

  • Financial threats in H1 2019
    by Oleg Kupreev on 31st July 2019 at 3:00 pm

    In the first half of 2019, more than 430,000 unique users were attacked by financial threats - seven percent more than during the same period in 2018. The number of financial attacks was 10,493,792 – 93% more than in the first half of 2018. […]

  • How to steal a million (of your data)
    by Alexander Eremin on 23rd July 2019 at 10:00 am

    This cybercriminal's thirst for stolen data is confirmed by the statistics: in the first half of 2019, more than 940,000 users were attacked by malware designed to harvest a variety of data on the computers. The threat’s called “Stealer […]

  • On the IoT road: perks, benefits and security of moving smartly
    by Kaspersky on 22nd July 2019 at 10:00 am

    This year, we decided to continue our tradition of small-scale experiments with security of connected devices but focused on the automotive-related topic. We randomly took several different automotive connected devices (a couple of auto scanners, a […]

  • Turla renews its arsenal with Topinambour
    by GReAT on 15th July 2019 at 10:00 am

    2019 has seen the Turla actor actively renew its arsenal. Its developers are still using a familiar coding style, but they’re creating new tools. Here we’ll tell you about several of them, namely “Topinambour” and its related […]

  • New FinSpy iOS and Android implants revealed ITW
    by GReAT on 10th July 2019 at 10:00 am

    FinSpy is used to collect a variety of private user information on various platforms. Since 2011 Kaspersky has continuously monitored the development of this malware and the emergence of new versions in the wild. According to our telemetry, several […]

+ Threat Post (Kaspersky)

Threatpost The First Stop For Security News

+ SecuriTeam

SecuriTeam Blogs We pay more for vulnerabilities

  • beVX Conference Challenge – HiTB
    by SSD / Noam Rathaus on 22nd June 2018 at 11:30 am

    During the event of Hack In the Box, we launched an ARM reverse engineering and exploitation challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: […]

  • I run this SOC!
    by dmitryc on 5th September 2017 at 7:35 pm

    I don’t actually run this SOC (or any other) 🙂 But…but, as a certified “blue team” member, I’m pretty excited with the crop of new companies and ideas that are springing up in the area of SOC analysis, […]

  • Hack2Win – Code Blue 3rd Edition
    by SSD / Research Team on 21st August 2017 at 6:26 am

    Hi everyone, We are excited to announce our 3rd Hack2Win Code Blue competition! This year we have changed the format, raised the difficulty level and increased the prizes. The goal of the event is to find who can gain the highest privileges on any […]

  • Know your community – Celil ÜNÜVER
    by SSD / Research Team on 24th July 2017 at 9:57 am

    Bug Bounty hunter – found and reported vulnerabilities in Microsoft, Apple, Adobe, IBM, Novell and more, Co-Founder of TRAPMINE and SignalSEC, Founder of NOPCon, speaker at PoC / Code Blue / Swiss Cyber Storm / CONFidence and more – […]

  • SSD Advisory – HTC Sync Remote Code Execution
    by SSD / Research Team on 27th February 2017 at 10:19 am

    Vulnerabilities Summary The following advisory describes a remote code execution (RCE) found in HTC Sync version v3.3.63. Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure […]

  • HITCON Taiwan 2016
    by SSD / Research Team on 7th December 2016 at 12:14 pm

    On the 1-2 December 2016 we had the honor for the first time to sponsor HITCON and visit Taiwan. Our adventure started in November 30th when Noam and I landed in Taipei and we had half a day to sightseeing and set up our booth at the conference […]

  • SSD Advisory – Teco SG2 and TP3 Vulnerabililites
    by SSD / Noam Rathaus on 4th July 2016 at 12:58 pm

    Vulnerabilities Description Multiple vulnerabilities have been found in Teco’s SG2 and TP3 product, these vulnerabilities allows attackers that are able to supply the products with a specially crafted file to cause it to execute arbitrary […]

  • Using Machine Learning To Detect Anomalies
    by dmitryc on 21st December 2015 at 10:07 pm

    I’m going to start blogging more about detection of protocol/app anomalies, detection of lateral movement and/or data exfiltration, and more. For many years I have been watching users and applications furrow their way across networks and […]

+ Malware Protection Center (Microsoft)

    Feed has no items.