RSS FEEDS

RSS FEEDS

RSS FEEDS

Feeds from around the web…

We have curated a number of RSS feeds so that you can keep informed about latest developments such malware outbreaks.

Please note that these feeds are not produced by MetrixCloud, so use your judgement when reading them. Also, MetrixCloud does not endorse any of the companies providing the information.

SecurityWeek RSS Feed Latest IT Security News and Expert Insights Via RSS Feed

  • Redirect auction
    by Dmitry Kondratyev on 8th July 2020 at 12:00 pm

    We've already looked at links under old YouTube videos or in Wikipedia articles which at some point turned bad and began pointing to partner program pages, phishing sites, or even malware. It was as if the attackers were purposely buying up domains, […]

  • Pig in a poke: smartphone adware
    by Igor Golovin on 6th July 2020 at 10:00 am

    Our support team continues to receive more and more requests from users complaining about intrusive ads on their smartphones from unknown sources.

  • Magnitude exploit kit – evolution
    by Boris Larin on 24th June 2020 at 10:00 am

    Exploit kits still play a role in today’s threat landscape and continue to evolve. For this blogpost I studied and analyzed the evolution of one of the most sophisticated exploit kits out there – Magnitude EK – for a whole year.

  • Oh, what a boot-iful mornin’
    by Alexander Eremin on 23rd June 2020 at 10:00 am

    In mid-April, our threat monitoring systems detected malicious files being distributed under the name "on the new initiative of the World Bank in connection with the coronavirus pandemic" (in Russian) with the extension EXE or RAR. Inside the files […]

  • Web skimming with Google Analytics
    by Victoria Vlasova on 22nd June 2020 at 10:00 am

    Recently, we identified several cases where Google Analytics was misused: attackers injected malicious code into sites, which collected all the data entered by users, and then sent it via Analytics.

  • Microcin is here
    by Denis Legezo on 19th June 2020 at 10:00 am

    In February 2020, we observed a Trojan injected into the system process memory on a particular host. The target turned out to be a diplomatic entity. We attribute this campaign with high confidence to the SixLittleMonkeys (aka Microcin) threat actor.

  • Do cybercriminals play cyber games during quarantine?
    by Maria Namestnikova on 17th June 2020 at 10:00 am

    Thanks to the coronavirus pandemic, the role of the Internet in our lives has undergone changes, including irreversible ones. We decided to take a closer look at the changes around us through the prism of information security, starting with the […]

  • Explicit content and cyberthreats: 2019 report
    by Kaspersky on 15th June 2020 at 10:00 am

    Over the past two years we have reviewed how adult content has been used to spread malware and abuse users' privacy. This is a trend that's unlikely to go away, especially under current circumstances. While many pornography platforms are enjoying an […]

Threatpost The First Stop For Security News

SecuriTeam Blogs We pay more for vulnerabilities

  • beVX Conference Challenge – HiTB
    by SSD / Noam Rathaus on 22nd June 2018 at 11:30 am

    During the event of Hack In the Box, we launched an ARM reverse engineering and exploitation challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: […]

  • I run this SOC!
    by dmitryc on 5th September 2017 at 7:35 pm

    I don’t actually run this SOC (or any other) 🙂 But…but, as a certified “blue team” member, I’m pretty excited with the crop of new companies and ideas that are springing up in the area of SOC analysis, […]

  • Hack2Win – Code Blue 3rd Edition
    by SSD / Research Team on 21st August 2017 at 6:26 am

    Hi everyone, We are excited to announce our 3rd Hack2Win Code Blue competition! This year we have changed the format, raised the difficulty level and increased the prizes. The goal of the event is to find who can gain the highest privileges on any […]

  • Know your community – Celil ÜNÜVER
    by SSD / Research Team on 24th July 2017 at 9:57 am

    Bug Bounty hunter – found and reported vulnerabilities in Microsoft, Apple, Adobe, IBM, Novell and more, Co-Founder of TRAPMINE and SignalSEC, Founder of NOPCon, speaker at PoC / Code Blue / Swiss Cyber Storm / CONFidence and more – […]

  • SSD Advisory – HTC Sync Remote Code Execution
    by SSD / Research Team on 27th February 2017 at 10:19 am

    Vulnerabilities Summary The following advisory describes a remote code execution (RCE) found in HTC Sync version v3.3.63. Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure […]

  • HITCON Taiwan 2016
    by SSD / Research Team on 7th December 2016 at 12:14 pm

    On the 1-2 December 2016 we had the honor for the first time to sponsor HITCON and visit Taiwan. Our adventure started in November 30th when Noam and I landed in Taipei and we had half a day to sightseeing and set up our booth at the conference […]

  • SSD Advisory – Teco SG2 and TP3 Vulnerabililites
    by SSD / Noam Rathaus on 4th July 2016 at 12:58 pm

    Vulnerabilities Description Multiple vulnerabilities have been found in Teco’s SG2 and TP3 product, these vulnerabilities allows attackers that are able to supply the products with a specially crafted file to cause it to execute arbitrary […]

  • Using Machine Learning To Detect Anomalies
    by dmitryc on 21st December 2015 at 10:07 pm

    I’m going to start blogging more about detection of protocol/app anomalies, detection of lateral movement and/or data exfiltration, and more. For many years I have been watching users and applications furrow their way across networks and […]

    Feed has no items.
+ Security Week

SecurityWeek RSS Feed Latest IT Security News and Expert Insights Via RSS Feed

+ SecureList (Kaspersky)
  • Redirect auction
    by Dmitry Kondratyev on 8th July 2020 at 12:00 pm

    We've already looked at links under old YouTube videos or in Wikipedia articles which at some point turned bad and began pointing to partner program pages, phishing sites, or even malware. It was as if the attackers were purposely buying up domains, […]

  • Pig in a poke: smartphone adware
    by Igor Golovin on 6th July 2020 at 10:00 am

    Our support team continues to receive more and more requests from users complaining about intrusive ads on their smartphones from unknown sources.

  • Magnitude exploit kit – evolution
    by Boris Larin on 24th June 2020 at 10:00 am

    Exploit kits still play a role in today’s threat landscape and continue to evolve. For this blogpost I studied and analyzed the evolution of one of the most sophisticated exploit kits out there – Magnitude EK – for a whole year.

  • Oh, what a boot-iful mornin’
    by Alexander Eremin on 23rd June 2020 at 10:00 am

    In mid-April, our threat monitoring systems detected malicious files being distributed under the name "on the new initiative of the World Bank in connection with the coronavirus pandemic" (in Russian) with the extension EXE or RAR. Inside the files […]

  • Web skimming with Google Analytics
    by Victoria Vlasova on 22nd June 2020 at 10:00 am

    Recently, we identified several cases where Google Analytics was misused: attackers injected malicious code into sites, which collected all the data entered by users, and then sent it via Analytics.

  • Microcin is here
    by Denis Legezo on 19th June 2020 at 10:00 am

    In February 2020, we observed a Trojan injected into the system process memory on a particular host. The target turned out to be a diplomatic entity. We attribute this campaign with high confidence to the SixLittleMonkeys (aka Microcin) threat actor.

  • Do cybercriminals play cyber games during quarantine?
    by Maria Namestnikova on 17th June 2020 at 10:00 am

    Thanks to the coronavirus pandemic, the role of the Internet in our lives has undergone changes, including irreversible ones. We decided to take a closer look at the changes around us through the prism of information security, starting with the […]

  • Explicit content and cyberthreats: 2019 report
    by Kaspersky on 15th June 2020 at 10:00 am

    Over the past two years we have reviewed how adult content has been used to spread malware and abuse users' privacy. This is a trend that's unlikely to go away, especially under current circumstances. While many pornography platforms are enjoying an […]

+ Threat Post (Kaspersky)

Threatpost The First Stop For Security News

+ SecuriTeam

SecuriTeam Blogs We pay more for vulnerabilities

  • beVX Conference Challenge – HiTB
    by SSD / Noam Rathaus on 22nd June 2018 at 11:30 am

    During the event of Hack In the Box, we launched an ARM reverse engineering and exploitation challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: […]

  • I run this SOC!
    by dmitryc on 5th September 2017 at 7:35 pm

    I don’t actually run this SOC (or any other) 🙂 But…but, as a certified “blue team” member, I’m pretty excited with the crop of new companies and ideas that are springing up in the area of SOC analysis, […]

  • Hack2Win – Code Blue 3rd Edition
    by SSD / Research Team on 21st August 2017 at 6:26 am

    Hi everyone, We are excited to announce our 3rd Hack2Win Code Blue competition! This year we have changed the format, raised the difficulty level and increased the prizes. The goal of the event is to find who can gain the highest privileges on any […]

  • Know your community – Celil ÜNÜVER
    by SSD / Research Team on 24th July 2017 at 9:57 am

    Bug Bounty hunter – found and reported vulnerabilities in Microsoft, Apple, Adobe, IBM, Novell and more, Co-Founder of TRAPMINE and SignalSEC, Founder of NOPCon, speaker at PoC / Code Blue / Swiss Cyber Storm / CONFidence and more – […]

  • SSD Advisory – HTC Sync Remote Code Execution
    by SSD / Research Team on 27th February 2017 at 10:19 am

    Vulnerabilities Summary The following advisory describes a remote code execution (RCE) found in HTC Sync version v3.3.63. Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure […]

  • HITCON Taiwan 2016
    by SSD / Research Team on 7th December 2016 at 12:14 pm

    On the 1-2 December 2016 we had the honor for the first time to sponsor HITCON and visit Taiwan. Our adventure started in November 30th when Noam and I landed in Taipei and we had half a day to sightseeing and set up our booth at the conference […]

  • SSD Advisory – Teco SG2 and TP3 Vulnerabililites
    by SSD / Noam Rathaus on 4th July 2016 at 12:58 pm

    Vulnerabilities Description Multiple vulnerabilities have been found in Teco’s SG2 and TP3 product, these vulnerabilities allows attackers that are able to supply the products with a specially crafted file to cause it to execute arbitrary […]

  • Using Machine Learning To Detect Anomalies
    by dmitryc on 21st December 2015 at 10:07 pm

    I’m going to start blogging more about detection of protocol/app anomalies, detection of lateral movement and/or data exfiltration, and more. For many years I have been watching users and applications furrow their way across networks and […]

+ Malware Protection Center (Microsoft)

    Feed has no items.