Datum | Název | Blog | Companies |
16.12.23 | Silent but deadly: The rise of zero-click attacks | Attack blog | Eset |
10.12.23 | THE OBVIOUS, THE NORMAL, AND THE ADVANCED: A COMPREHENSIVE ANALYSIS OF OUTLOOK ATTACK VECTORS | Attack blog | Checkpoint |
15.11.23 | ABUSING MICROSOFT ACCESS “LINKED TABLE” FEATURE TO PERFORM NTLM FORCED AUTHENTICATION ATTACKS | Attack blog | Checkpoint |
4.11.23 | Roundcube Webmail servers under attack – Week in security with Tony Anscombe | Attack blog | Eset |
15.10.23 | What to know about the HTTP/2 Rapid Reset DDoS attacks | Attack | Cisco Blog |
16.9.23 | How Cisco Talos IR helped a healthcare company quickly resolve a Qakbot attack | Attack blog | Cisco Blog |
16.9.23 | Reflecting on supply chain attacks halfway through 2023 | Attack blog | Cisco Blog |
28.8.23 | Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack? | Attack blog | Eset |
6.8.23 | What might authentication attacks look like in a phishing-resistant future? | Attack blog | Cisco Blog |
3.8.23 | GUARDING THE BRIDGE: NEW ATTACK VECTORS IN AZURE AD CONNECT | Attack blog | Sygnia |