Infodemic is happening now to our world. The leverage of the current physical threat, the CoronaVirus, is being used as a social engineering trick to infect the cyber world. Be informed and read on these interesting and useful articles we have gathered.
For more articles, check out our #onpatrol4malware blog.
NEW STUDY: Which Domains Get Kept and Which Get Dropped? [Data on .COM vs Everything Else]
Source: Who Is Hosting This
We set out to find how often people let domains lapse each year (churn rate) and which of the most popular TLDs suffer the most from this. Read more.
M-Trends 2020 FireEye Mandiant Services Special Report
Source: FireEye
The release of M-Trends 2020 marks 11 years of providing the cyber security community with insights gained from the frontlines of those attacks. Read more.
New ‘Haken’ Malware Found On Eight Apps In Google Play Store
Source: Threat Post
Eight apps – mostly camera utilities and children’s games – were discovered spreading a new malware strain that steals data and signs victims up for expensive premium services. Read more.
Raccoon: The Story of a Typical Infostealer
Source: Cyber Ark
An infostealer is a type of malware that is focused on gathering sensitive and conditional information (such as user’s credentials, financial and personal information) from the compromised system. Read more.
New Cyber Attack Campaign Leverages the COVID-19 Infodemic
Source: Yoroi
It is common to say that the physical world and the cyber world are strictly connected. The proof is the leverage of the current physical threat, the CoronaVirus, as a social engineering trick to spread infodemic. Read more.
Chrome 80 update cripples top cybercrime marketplace
Source: ZDNet
A small change in the Google Chrome 80 browser has had a devastating effect on one of today’s top cybercrime marketplaces. Read more.
GAMAREDON: AN INSIGHT INTO VICTIMOLOGY USING AUGURY
Source: Team Cymru
Community research into the Gamaredon Group reveals a series of sophisticated attacks targeted predominantly against Ukrainian military interests, dating back to at least 2013. Read more.
Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources
Source: Departmet of Justice
The Cybersecurity Unit (CsU) prepared this document in response to questions posed by private organizations about the legality of specific cybersecurity measures. Read more.