Threat Hunter TeamSymantecPosted: 29 Mar, 20215 Min ReadThreat IntelligenceNewly-Discovered Vulnerabilities Could Allow for Bypass of Spectre Mitigations in LinuxBugs could allow a malicious user to access data belonging to other users.Newly-Discovered Vulnerabilities Could Allow for Bypass of Spectre Mitigations in Linux
Threat Hunter TeamSymantecPosted: 29 Mar, 20215 Min ReadNewly-Discovered Vulnerabilities Could Allow for Bypass of Spectre Mitigations in LinuxBugs could allow a malicious user to access data belonging to other users.Newly-Discovered Vulnerabilities Could Allow for Bypass of Spectre Mitigations in Linux
Kevin WatkinsSecurity ResearcherPosted: 12 Mar, 20217 Min ReadSecurity and Privacy of COVID-19 Contact-Tracing AppsSymantec analyzed the top 25 COVID-19 national contact-tracing apps to see which follow security and privacy best practices.Security and Privacy of COVID-19 Contact-Tracing Apps
Threat Hunter TeamSymantecPosted: 8 Mar, 20219 Min ReadHow Symantec Stops Microsoft Exchange Server AttacksSymantec's Intrusion Protection technology will block all attempted exploits of critical vulnerabilities. How Symantec Stops Microsoft Exchange Server Attacks
Threat Hunter TeamSymantecPosted: 18 Feb, 20214 Min ReadLazarus: Three North Koreans Charged for Financially Motivated AttacksMore than $1.3 billion stolen in string of attacks against financial institutions and cryptocurrency exchanges. Lazarus: Three North Koreans Charged for Financially Motivated Attacks
Threat Hunter TeamSymantecPosted: 22 Jan, 20213 Min ReadSolarWinds: How Sunburst Sends Data Back to the AttackersIn the fourth of a series of follow-up analysis on the SolarWinds attacks, we detail how data is sent to the attackers.SolarWinds: How Sunburst Sends Data Back to the Attackers