Please do not block your ad, it is an important part of the site's revenue.  PyLocky Ransomware Decryption Tool

Date

Name

Categorie

Web

19.2.19

Detecting Trojan attacks against deep neural networks

Net-security

19.2.19

Webinar: Defending account takeovers at Remitly

Net-security

19.2.19

IT security incidents affecting German critical infrastructure are on the rise

Net-security

19.2.19

How RSA Conference 2019 brings diverse security professionals together

Net-security

19.2.19

Offensive Security announced the release of Kali Linux 2019.1

Securityaffairs

19.2.19

Group-IB: More than 70% of Russian banks are not ready for cyberattacks

Securityaffairs

19.2.19

Learn How XDR Can Take Breach Protection Beyond Endpoint Security

Thehackernews

19.2.19

LPG Gas Company Leaked Details, Aadhaar Numbers of 6.7 Million Indian Customers

Thehackernews

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers

Thehackernews

19.2.19

When Cyberattacks Pack a Physical Punch

Threatpost

19.2.19

Gnosticplayers round 3 – 92 Million fresh accounts from 8 unreported security breaches available for sale

Securityaffairs

19.2.19

Expert found privilege escalation issue in LG Device Manager

Securityaffairs

19.2.19

PoC Exploit Code for recent container escape flaw in runc published online

Securityaffairs

19.2.19

ATT&CKized Splunk – Threat Hunting with MITRE’s ATT&CK using Splunk

Securityaffairs

19.2.19

Australia Says 'State Actor' Hacked Parties, Parliament

Securityweek

19.2.19

Offensive Security Releases Kali Linux 2019.1

Securityweek

19.2.19

'Digital Gangsters': UK Wants Tougher Rules for Facebook

Securityweek

19.2.19

Privilege Escalation Vulnerability Found in LG Device Manager

Securityweek

19.2.19

British Intelligence Says Huawei Risk Manageable: FT Securityweek

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers Thehackernews

19.2.19

Building security into cloud native apps with NGINX

Net-security

19.2.19

Indicators of poor password hygiene exposed

Net-security

19.2.19

74% of organizations face outages due to expired certificates

Net-security

18.2.19

New Trickbot module implements Remote App Credential-Grabbing features

Virus

Securityaffairs

18.2.19

Free Tool: Honey Feed

IT

Securityaffairs

18.2.19

Wendy's Reaches $50 Million Settlement With Banks Over Data Breach

Incindent

Securityweek

18.2.19

Exploit Code Published for Recent Container Escape Vulnerability

Vulnerebility

Securityweek

18.2.19

Storage Maker QNAP Warns of Malware Targeting Its NAS Devices

Virus

Securityweek

18.2.19

Legislation Would Stiffen Penalties for Ransomware Attacks

Ransomware

Securityweek

18.2.19

Popular Torrent Uploader 'CracksNow' Caught Spreading Ransomware

Ransomware

Thehackernews

18.2.19

How to Hack Facebook Accounts? Just Ask Your Targets to Open a Link

Social

Thehackernews

18.2.19

Mozilla Adding a Picture-in-Picture Mode to Firefox

IT

Bleepingcomputer

18.2.19

Google to Let you Link Directly to a Word or Phrase in Chrome

IT

Bleepingcomputer

18.2.19

Toyota PASTA Car-Hacking Tool will be soon on GitHub

Hacking

Securityaffairs

18.2.19

Windows App runs on Mac to download MacOS malware

Apple

Securityaffairs

18.2.19

Facebook login phishing campaign can deceive tech-savvy users

Social

Securityaffairs

18.2.19

Facebook paid $25,000 for CSRF exploit that leads to Account Takeover

Social

Securityaffairs

18.2.19

US Facebook Fine Over Privacy Could Be in Billions: Reports

BigBrothers

Securityweek

18.2.19

Australia Says 'State Actor' Hacked Parties, Parliament

BigBrothers

Securityweek

18.2.19

Over 92 Million New Accounts Up for Sale from More Unreported Breaches

Incindent

Thehackernews

18.2.19

Know What You Are Logging

Security

SANS

18.2.19

The importance of consumer trust in the second-hand mobile market

Security

Net-security

18.2.19

2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

Incindent

Net-security

17.2.19

Several Cryptojacking Apps Found on Microsoft Store

Malware blog

Symantec

17.2.19

Microsoft Patch Tuesday – February 2019

Vulnerebility blog

Symantec

17.2.19

Microsoft Patch Tuesday — February 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

17.2.19

Vulnerability Spotlight: Adobe Acrobat Reader DC text field remote code execution vulnerability

Vulnerebility blog

Cisco Talos

17.2.19

What you can learn from Cisco Talos’ new oil pumpjack workshop

ICS blog

Cisco Talos

17.2.19 Malta’s leading bank resumes operations after cyberheist-induced shutdown Attack blog

Eset

17.2.19 Navigating the murky waters of Android banking malware Malware blog

Eset

17.2.19 Attack at email provider wipes out almost two decades’ worth of data Spam blog

Eset

17.2.19 When love becomes a nightmare: Online dating scams Spam blog

Eset

17.2.19 Why you should choose a pseudonym at Starbucks Social blog

Eset

17.2.19 Apple to pay teenager who uncovered FaceTime bug OS Blog

Eset

17.2.19 First clipper malware discovered on Google Play Cryptocurrency blog Eset

17.2.19

Russia is going to disconnect from the internet as part of a planned test

BigBrothers

Securityaffairs

17.2.19

A new batch of 127 million records appears in the dark web

Incindent

Securityaffairs

17.2.19

Astaroth Trojan relies on legitimate os and antivirus processes to steal data

Virus

Securityaffairs

17.2.19

Finding Property Values in Office Documents

Virus

SANS

16.2.19

Apple Requiring 2-Factor Authentication on Developer Account Holders

Apple

Bleepingcomputer

16.2.19

Google Fixing Chrome API to Prevent Incognito Mode Detection

Vulnerebility

Bleepingcomputer

16.2.19

Brokerage Firms Warned by FINRA Regulator of New Phishing Attack

Phishing

Bleepingcomputer

16.2.19

Ai-Powered Website Generates Realistic Human Faces On the Spot

IT

Bleepingcomputer

16.2.19

18,000 Android Apps Track Users by Violating Advertising ID Policies

Android

Bleepingcomputer

16.2.19

Cryptojacking Coinhive Miners Land on the Microsoft Store For the First Time

Cryptocurrency

Bleepingcomputer

16.2.19

Collection of 127 Million Stolen Accounts Up for Sale on the Dark Web

Incindent

Bleepingcomputer

16.2.19

Google Rejected Roughly 55% More Android Apps in 2018, Still Not Enough

Android

Bleepingcomputer

16.2.19

Coffee Meets Bagel Dating App Discloses Data Breach on Valentine's Day

Incindent

Bleepingcomputer

16.2.19

Emotet Uses Camouflaged Malicious Macros to Avoid Antivirus Detection

Virus

Bleepingcomputer

16.2.19

Microsoft Releases First Windows 10 20H1 Build 18836 To Skip Ahead Users

IT

Bleepingcomputer

16.2.19

Ransomware Attacks Target MSPs to Mass-Infect Customers

Ransomware

Bleepingcomputer

16.2.19

Mozilla Adds Persistent Private Browsing to Firefox for iOS

Privacy

Bleepingcomputer

16.2.19

South Korea is Censoring the Internet by Snooping on SNI Traffic

BigBrothers

Bleepingcomputer

16.2.19

Shlayer Malware Disables macOS Gatekeeper to Run Unsigned Payloads

Apple

Bleepingcomputer

16.2.19

OpenOffice Zero-Day Code Execution Flaw Gets Free Micropatch

Vulnerebility

Bleepingcomputer

16.2.19

Ransom News

Ransom

Ransom News

16.2.19

Data Breach Bonanza: Dating Apps, Equifax, Mass Credential Dumps

Incindent

Threatpost

16.2.19

Trickbot Malware Goes After Remote Desktop Credentials

Virus

Threatpost

16.2.19

Eight Cryptojacking Apps Booted From Microsoft Store

Cryptocurrency

Threatpost

16.2.19

Ultra-Sneaky Phishing Scam Swipes Facebook Credentials

Social

Threatpost

16.2.19

Where’s the Equifax Data? Does It Matter?

Incindent

Threatpost

16.2.19

Tips on How to Fight Back Against DNS Spoofing Attacks

Attack

Threatpost

16.2.19

Ever-Changing Emotet Evolves Again with Fresh Evasion Tactic

Virus

Threatpost

16.2.19

Threatpost Poll: Over Half of Firms Asked Struggle with Mobile Security

Mobil

Threatpost

16.2.19

Coffee Meets Bagel Dating App Warns Users of Breach

Incindent

Threatpost

16.2.19

Google Play Cracks Down on Malicious Apps

Android

Threatpost

16.2.19

Critical OkCupid Flaw Exposes Daters to App Takeovers

Vulnerebility

Threatpost

16.2.19

Lenovo Watch X Riddled with Security Vulnerabilities

Vulnerebility

Threatpost

16.2.19

Cryptojacking Applications Land in Microsoft Store

Cryptocurrency

Securityweek

15.2.19

US Says Ex-intel Official Defected to Iran, Revealed Secrets

BigBrothers

Securityweek

15.2.19

DHS Cyber Leader Says 2020 Security Preparations Underway

BigBrothers

Securityweek

15.2.19

CSRF Vulnerability in Facebook Earns Researcher $25,000

Vulnerebility

Securityweek

15.2.19

Mozilla, Others Want Big Retailers to Pledge Minimum IoT Security

IoT

Securityweek

15.2.19

Facebook Taps User Data to Defend Workers From Threats

Social

Securityweek

15.2.19

Hackers Target WordPress Sites via WP Cost Estimation Plugin

Hacking

Securityweek

15.2.19

New Variant of Shlayer macOS Malware Discovered

Apple

Securityweek

15.2.19

Germany to Let NATO Use its Cyber Skills

BigBrothers

Securityweek

15.2.19

Google Paid Out $3.4 Million for Vulnerabilities Reported in 2018

Vulnerebility

Securityweek

15.2.19

6,500 Publicly Disclosed Data Breaches in 2018: Report

Incindent

Securityweek

15.2.19

IT Asset Management Firm Axonius Raises $13 Million

IT

Securityweek

15.2.19

Former U.S. Air Force Officer Indicted for Aiding Iranian Cyber Attacks

BigBrothers

Securityweek

15.2.19

Increasing Involvement of Nation-states in Ransomware Attacks

Ransomware

Securityweek

15.2.19

Many ICS Vulnerability Advisories Contain Errors: Report

ICS

Securityweek

15.2.19

Cryptojacking Coinhive Miners for the first time found on the Microsoft Store

Cryptocurrency

Securityaffairs

15.2.19

Group-IB helped to arrest phone scammers profiting off the backs of the Russian elderly

Spam

Securityaffairs

15.2.19

Coffee Meets Bagel dating app confirms data breach

Incindent

Securityaffairs

15.2.19

Germany makes its cyber capabilities available for NATO alliance

BigBrothers

Securityaffairs

15.2.19

Experts spotted a new strain of Shlayer macOS Malware

Apple

Securityaffairs

15.2.19

SAP security fixes address Critical flaw in SAP HANA XSA

Vulnerebility

Securityaffairs

15.2.19

Bank of Valletta shut down its operations after a cyber attack

Attack

Securityaffairs

15.2.19

0patch released micropatch for code execution flaw in OpenOffice

Vulnerebility

Securityaffairs

15.2.19

Ubuntu snapd flaw allows getting root access to the system.

Vulnerebility

Securityaffairs

15.2.19

WARNING – New Phishing Attack That Even Most Vigilant Users Could Fall For

Phishing

Thehackernews

15.2.19

Hacker Breaches Dozens of Sites, Puts 127 Million New Records Up for Sale

Hacking

Thehackernews

15.2.19

Ex-US Intelligence Agent Charged With Spying and Helping Iranian Hackers

BigBrothers

Thehackernews

15.2.19

Bank of Valletta suspended all operations in wake of cyber attack

Attack

Net-security

15.2.19

How organizations handle disruptive data sources

Security

Net-security

15.2.19

SaaS spending increasing by 78 percent year-over-year

Security

Net-security

15.2.19

Increased appetite for biometrics fueled by speed, security and convenience

Security

Net-security

15.2.19

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

Security

Net-security

15.2.19

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Security

Net-security

15.2.19

Machine learning fundamentals: What cybersecurity professionals need to know

IT

Net-security

15.2.19

Three reasons employee monitoring software is making a comeback

Privacy

Net-security

15.2.19

Old H-Worm Delivered Through GitHub

Virus

SANS

14.2.19

Cyber Attack on Malta's Bank of Valletta

Cyber

Securityweek

14.2.19

Third-Party Patch Released for Code Execution Flaw in OpenOffice

Vulnerebility

Securityweek

14.2.19

Windows App Caught Running on Mac, Installing Malware

Virus

Securityweek

14.2.19

China Calls US Concerns Over Huawei 'Groundless'

BigBrothers

Securityweek

14.2.19

U.S. Senators Announce Federal Cybersecurity Workforce Bills

BigBrothers

Securityweek

14.2.19

South Korea is Censoring the Internet by Snooping on SNI Traffic

BigBrothers

Bleepingcomputer

14.2.19

Shlayer Malware Disables macOS Gatekeeper to Run Unsigned Payloads

Apple

Bleepingcomputer

14.2.19

OpenOffice Zero-Day Code Execution Flaw Gets Free Micropatch

Vulnerebility

Bleepingcomputer

14.2.19

DNS Manipulation in Venezuela in regards to the Humanitarian Aid Campaign

Safety

Securelist

14.2.19

0patch released micropatch for code execution flaw in OpenOffice

Vulnerebility

Securityaffairs

14.2.19

Ubuntu snapd flaw allows getting root access to the system.

Vulnerebility

Securityaffairs

14.2.19

Snapd Flaw Lets Attackers Gain Root Access On Linux Systems

Vulnerebility

Thehackernews

14.2.19

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure

Hacking

Threatpost

14.2.19

Lenovo Watch X Riddled with Security Vulnerabilities

Vulnerebility

Threatpost

14.2.19

ThreatList: Banking Trojans Are Still The Top Big Bad for Email

Virus

Threatpost

14.2.19

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

Virus

Net-security

14.2.19

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Security

Net-security

14.2.19

Most wanted malware in January 2019: A new threat speaks up

Virus

Net-security

14.2.19

NIST Cybersecurity Framework: Five years later

Cyber

Net-security

13.2.19

Cisco Network Assurance Engine Bug Allows Login with Old Passwords

Vulnerebility

Bleepingcomputer

13.2.19

New Astaroth Trojan Variant Exploits Anti-Malware Software to Steal Info

Virus

Bleepingcomputer

13.2.19

Canonical Snapd Vulnerability Gives Root Access in Linux

Vulnerebility

Bleepingcomputer

13.2.19

The Scarlet Widow Gang Entraps Victims Using Romance Scams

Spam

Bleepingcomputer

13.2.19

Microsoft Releases the February 2019 Updates for Office

Vulnerebility

Bleepingcomputer

13.2.19

Weird Phishing Campaign Uses Links With Almost 1,000 Characters

Phishing

Bleepingcomputer

13.2.19

Windows 7 KB4486563 and Windows 8.1 KB4487000 Released

Vulnerebility

Bleepingcomputer

13.2.19

Microsoft February 2019 Patch Tuesday Includes Fixes for 70 Vulnerabilities

Vulnerebility

Bleepingcomputer

13.2.19

Microsoft Patches PrivExchange Vulnerability in February Quarterly Updates

Vulnerebility

Bleepingcomputer

13.2.19

Windows 10 February 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

13.2.19

Experts found a way to create a super-malware implanted in SGX-enclaves

Virus

Securityaffairs

13.2.19

Malicious PDF Analysis

Virus

Securityaffairs

13.2.19

Hacker deleted all data from VFEmail Servers, including backups

Hacking

Securityaffairs

13.2.19

SAP Patches Critical Vulnerability in HANA XSA

Vulnerebility

Securityweek

13.2.19

Extensive 'Living Off the Land' Hides Stealthy Malware Campaign

Virus

Securityweek

13.2.19

Indictment: Hackers Charged With Making Threats to Schools

Hacking

Securityweek

13.2.19

UK Data Intelligence Firm to Acquire IDology for $300 Million

BigBrothers

Securityweek

13.2.19

Intel SGX Can Be Abused to Hide Advanced Malware: Researchers

Virus

Securityweek

13.2.19

Hackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups

Hacking

Thehackernews

13.2.19

Researchers Implant "Protected" Malware On Intel SGX Enclaves

Virus

Thehackernews

13.2.19

Snapd flaw gives attackers root access on Linux systems

Vulnerebility

Net-security

13.2.19

February 2019 Patch Tuesday: PrivExchange hole plugged

Vulnerebility

Net-security

13.2.19

Critical WordPress Plugin Flaw Allows Complete Website Takeover

Vulnerebility

Threatpost

13.2.19

‘Dirty Sock’ Flaw in snapd Allows Root Access to Linux Servers

Vulnerebility

Threatpost

13.2.19

Unpatched Apple macOS Hole Exposes Safari Browsing History

Apple

Threatpost

13.2.19

Microsoft Patch Tuesday updates for February 2019 fixes IE Zero-Day

Vulnerebility

Securityaffairs

13.2.19

Microsoft Patches Internet Explorer Zero-Day Reported by Google

Vulnerebility

Securityweek

13.2.19

Hacker Erases Email Provider's Servers, Backups

Hacking

Securityweek

13.2.19

Microsoft Patch Tuesday — February 2019 Update Fixes 77 Flaws

Vulnerebility

Thehackernews

13.2.19

New Unpatched macOS Flaw Lets Apps Spy On Your Safari Browsing History

Apple

Thehackernews

13.2.19

Fake Updates campaign still active in 2019

Cyber

SANS

13.2.19

Microsoft Patches Zero-Day Browser Bug Under Active Attack

Vulnerebility

Threatpost

13.2.19

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure

Attack

Threatpost

13.2.19

Siemens Warns of Critical Remote-Code Execution ICS Flaw

ICS

Threatpost

13.2.19

SMBs spending a day each week dealing with cybersecurity issues

Cyber

Net-security

13.2.19

Healthcare email fraud: Attack attempts jump 473% over two years

Attack

Net-security

13.2.19

Nearly two-thirds of organizations say tech skills gap is impacting IT audits

IT

Net-security

13.2.19

Impersonation, sender forgery and corporate email spoofing top the charts

Spam

Net-security

12.2.19

TrickBot Banking Trojan Now Steals RDP, VNC, and PuTTY Credentials

BotNet

Bleepingcomputer

12.2.19

Dunkin' Donuts Issues Alert for Credential Stuffing Attack, Passwords Reset

Attack  Incindent

Bleepingcomputer

12.2.19

Windows Malware Runs on Macs, Bypasses Gatekeeper to Target Software Pirates

Apple

Bleepingcomputer

12.2.19

Adobe Releases Security Fixes for Flash Player, ColdFusion, and More

Vulnerebility

Bleepingcomputer

12.2.19

Hackers Wipe VFEmail Servers, May Shut Down After Catastrophic Data Loss

Incindent

Bleepingcomputer

12.2.19

Coalition of State Attorney Generals Urge FTC to Update Identity Theft Rules

Safety

Bleepingcomputer

12.2.19

Adobe Releases February 2019 Patch Updates For 75 Vulnerabilities

Vulnerebility

Thehackernews

12.2.19

Gootkit: Unveiling the Hidden Link with AZORult

Virus

Securityaffairs

12.2.19

Symantec Acquires Zero Trust Cloud Security Startup Luminate Security

IT

Securityweek

12.2.19

Application Security Firm ShiftLeft Raises $20 Million

IT

Securityweek

12.2.19

Adobe Patches Disclosed Data Leakage Flaw in Reader

Vulnerebility

Securityweek

12.2.19

Unofficial Patch Released for Adobe Reader Zero-Day

Vulnerebility

Securityweek

12.2.19

Lawmakers Back Bill to Isolate Russian Internet

BigBrothers

Securityweek

12.2.19

macOS Vulnerability Leaks Safari Data

Apple

Securityweek

12.2.19

Container Escape Flaw Hits AWS, Google Cloud, Linux Distros

Vulnerebility

Securityweek

12.2.19

Bot Protection Firm PerimeterX Raises $43 Million

IT

Securityweek

12.2.19

Hackers hit VFEmail, wipe US servers and backups

Hacking

Net-security

12.2.19

Adobe Fixes 43 Critical Acrobat and Reader Flaws

Vulnerebility

Threatpost

12.2.19

Major Container Security Flaw Threatens Cascading Attacks

Vulnerebility

Threatpost

12.2.19

Xiaomi M365 Electric Scooter Hacked and Remotely Controlled

Mobil

Threatpost

12.2.19

Micropatch prevents malicious PDFs from Calling Home

Virus

Securityaffairs

12.2.19

620 million accounts stolen from 16 hacked websites available for sale on the dark web

Incindent

Securityaffairs

12.2.19

Docker runc flaw opens the door to a ‘Doomsday scenario’

Vulnerebility

Securityaffairs

12.2.19

Xiaomi Electric Scooters Vulnerable to Life-Threatening Remote Hacks

Vulnerebility

Thehackernews

12.2.19

RunC Flaw Lets Attackers Escape Linux Containers to Gain Root on Hosts

Vulnerebility

Thehackernews

12.2.19

Beware!! New Windows .exe Malware Found Targeting macOS Computers

Virus

Thehackernews

12.2.19

RunC container escape flaw enables root access to host system

Vulnerebility

Net-security

12.2.19

OkCupid account hijackings highlight website account management issues

Hacking

Net-security

12.2.19

Temporary Patch Released For Adobe Reader Zero-Day

Vulnerebility

Threatpost

12.2.19

Privacy Protection Bypass Flaw in macOS Gives Access to Browsing History

Vulnerebility

Bleepingcomputer

12.2.19

Microsoft States Windows Update DNS Issues are Finally Fixed

Vulnerebility

Bleepingcomputer

12.2.19

RunC Vulnerability Gives Attackers Root Access on Docker, Kubernetes Hosts

Vulnerebility

Bleepingcomputer

12.2.19

Adobe Reader Zero-Day Micropatch Stops Malicious PDFs from Calling Home

Vulnerebility

Bleepingcomputer

12.2.19

New Offensive USB Cable Allows Remote Attacks over WiFi

Attack

Bleepingcomputer

12.2.19

First CryptoCurrency Clipboard Hijacker Found on Google Play Store

Cryptocurrency

Bleepingcomputer

12.2.19

MetaMask app on Google Play was a Clipboard Hijacker

Android

Securityaffairs

12.2.19

Chrome OS Network Manager Sandboxed, Stripped of Root Privileges

OS

Securityweek

12.2.19

U.S. Senators Urge VPN Ban for Federal Workers Over Spying

BigBrothers

Threatpost

12.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

12.2.19

Security wellness takes more than a fad diet

Security

Net-security

12.2.19

Is 2019 the year national privacy law is established in the US?

Privacy

Net-security

12.2.19

88% of UK businesses breached during the last 12 months

Incindent

Net-security

12.2.19

People still shocked by how easy it is to track someone online

Security

Net-security

11.2.19

Have You Seen an Email Virus Recently?

Virus

SANS

11.2.19

Exposed: Instagram, OKCupid, Mumsnet All Face Data Concerns

Social

Threatpost

11.2.19

First ‘Clipper’ Malware Discovered on Google Play

Android

Threatpost

11.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

11.2.19

First CryptoCurrency Clipboard Hijacker Found on Google Play Store

Cryptocurrency

Bleepingcomputer

11.2.19

A mysterious code prevents QNAP NAS devices to be updated

Vulnerebility

Securityaffairs

11.2.19

Clipper Malware Slips Into Google Play

Android

Securityweek

11.2.19

China Police Get Power to Remotely 'Inspect' Company Networks in China

BigBrothers

Securityweek

11.2.19

Password Checkup Chrome extension warns users about compromised logins

Safety

Securityaffairs

11.2.19

Tenable Adds 'Predictive Prioritization' to Vulnerability Management Offering

Vulnerebility

Securityweek

11.2.19

Senators Concerned Over DHS Employees Using Foreign VPNs

BigBrothers

Securityweek

11.2.19

Linux Miner Removes Competing Malware From Infected Systems

Cryptocurrency

Securityweek

11.2.19

Switzerland Launches Bug Bounty Program for E-Voting Systems

BigBrothers

Securityweek

11.2.19

First Android Clipboard Hijacking Crypto Malware Found On Google Play Store

Android

Thehackernews

11.2.19

BEC-style attacks exploded in Q4 2018

Spam

Net-security

11.2.19

Facebook, Twitter Trackers Whitelisted by Brave Browser

Social

Bleepingcomputer

11.2.19

Windows95 v2.0 Let's You Play DOOM, Wolfenstein 3D, and More

IT

Bleepingcomputer

11.2.19

Thousands of RDM refrigeration systems exposed online are at risk

Incindent

Securityaffairs

11.2.19

Adiantum will bring encryption on Android devices without cryptographic acceleration

Android

Securityaffairs

11.2.19

Google open sourced the ClusterFuzz fuzzing platform

IT

Securityaffairs

11.2.19

Undercover Spy Exposed in NYC Was 1 of Many

CyberSpy

Securityweek

11.2.19

Bezos Case Exposes Billionaires' Vulnerability to Hackers

Security

Securityweek

11.2.19

Product showcase: Veriato Cerebral user & entity behavior analytics software

Privacy

Net-security

11.2.19

Zero trust browsing: Protect your organization from its own users

Privacy

Net-security

11.2.19

There’s a growing disconnect between data privacy expectations and reality

Privacy

Net-security

11.2.19

Average DDoS attack volumes grew by 194% in 12 months

Attack

Net-security

10.2.19

Decompiled Undertale RPG Source Code Released on GitHub

IT

Bleepingcomputer

10.2.19

New Linux coin miner kills competing malware to maximize profits

Cryptocurrency

Securityaffairs

10.2.19

Maldoc Analysis of the Weekend

Virus

SANS

9.2.19

Windows 10 Insider Preview Build 18334 Released With Gaming Improvements

IT

Bleepingcomputer

9.2.19

Mail Attachment Builds Ransomware Downloader from Super Mario Image

Ransomware

Bleepingcomputer

9.2.19

Coinminer Targets Linux, Kills Competition to Maximize Profits

Cryptocurrency

Bleepingcomputer

9.2.19

Apple Patched Two Actively Exploited Zero-Days in iOS 12.1.4

Apple

Bleepingcomputer

9.2.19

Like Microsoft Edge, Chrome is Getting Tab Hover Card Images

IT

Bleepingcomputer

9.2.19

GandCrab ransomware campaign targets Italy using steganography

Ransomware

Securityaffairs

9.2.19

Exclusive – MalwareMustDie Team analyzed the Cayosin Botnet and its criminal ecosystem

BotNet

Securityaffairs

9.2.19

Ransom News

Ransom

Ransom

9.2.19

Refrigeration Systems Used by Supermarkets, Hospitals Left Exposed Online

Incindent

Securityweek

9.2.19

Merkel Opens Spy Agency's Massive New Berlin HQ

BigBrothers

Securityweek

9.2.19

Google Improves Android Encryption with Adiantum

Android

Securityweek

9.2.19

Study Analyzes Challenges, Concerns for IT/OT Convergence

Analysis

Securityweek

9.2.19

Site Isolation is Coming to Firefox

Safety

Securityweek

9.2.19

Carbonite to Acquire Webroot for $618 Million in Cash

IT

Securityweek

9.2.19

Google Open Sources Fuzzing Platform

IT

Securityweek

9.2.19

NATO Opens Defense Innovation Challenge Seeking C4ISR Solutions

BigBrothers

Securityweek

9.2.19

FireOS Flaw Allowed Limited Content Injection in Amazon Tablets

OS

Threatpost

9.2.19

Google Boosts Encryption For Low-End Android Devices

Android

Threatpost

8.2.19

Adiantum: A new encryption scheme for low-end Android devices

Android

Net-security

8.2.19

Apple fixes FaceTime eavesdropping bug, two iOS zero-days

Apple

Net-security

8.2.19

TWOSENSE.AI Awarded $2.42M Behavioral Biometrics Security Contract by DoD

Security

Bleepingcomputer

8.2.19

New Phishing Attack Uses Google Translate as Camouflage

Phishing

Bleepingcomputer

8.2.19

Wells Fargo Hit By Nationwide Outage, ATMs and Online Banking Down

Security

Bleepingcomputer

8.2.19

Microsoft Provides Mitigations, Workarounds for PrivExchange Vulnerability

Vulnerebility

Bleepingcomputer

8.2.19

Microsoft Now Allows Skype Users to Blur the Background on Video Calls

IT

Bleepingcomputer

8.2.19

Google Introduces Adiantum Storage Encryption to Low-End Android Devices

Crypto

Bleepingcomputer

8.2.19

Apple Releases Fix for Group FaceTime Snooping Bug in iOS and macOS

Apple

Bleepingcomputer

8.2.19

Business Email Compromise Attacks See Almost 500% Increase

Spam

Bleepingcomputer

8.2.19

Netography to Make Network Security Autonomous, Funded by Andreessen Horowitz

Security

Bleepingcomputer

8.2.19

Three out of the four flaws fixed with iOS 12.1.4 were exploited in the wild

Apple

Securityaffairs

8.2.19

Hackers broke into Australia’s Parliament Computer Network

BigBrothers

Securityaffairs

8.2.19

Huawei 'Shocked, Amused' by Espionage Accusations

BigBrothers

Securityweek

8.2.19

Google Spots Attacks Exploiting iOS Zero-Day Flaws

Apple

Securityweek

8.2.19

Google Created Faster Storage Encryption for All Low-End Devices

Crypto

Thehackernews

8.2.19

Latest iOS 12.1.4 Update Patches 2 Zero-Day and FaceTime Bugs

Apple

Thehackernews

8.2.19

Apple Patches FaceTime Spying Vulnerability

Apple

Securityweek

8.2.19

Australia Wields Vast Decryption Powers Before Planned Review

BigBrothers

Securityweek

8.2.19

20 Indicted in Multimillion-Dollar Online Fraud Scheme

CyberCrime

Securityweek

8.2.19

Australian Parliament Computer Network Breached

BigBrothers

Securityweek

8.2.19

Phishers Serve Fake Login Pages via Google Translate

Phishing

Securityweek

8.2.19

Vulnerabilities in Kunbus Industrial Gateway allows to control the devices

ICS

Securityaffairs

8.2.19

ThreatList: Latest DDoS Trends by the Numbers

Attack

Threatpost

8.2.19

Apple Fixes Pesky FaceTime Bug in iOS 12.1.4 Update

Apple

Threatpost

8.2.19

Flaw in Multiple Airline Systems Exposes Passenger Data

Vulnerebility

Threatpost

8.2.19

Phishing Kit with JavaScript Keylogger

Phishing

SANS

8.2.19

Mild to medium volume expected for February 2019 Patch Tuesday

Vulnerebility

Net-security

8.2.19

DevOps and DevSecOps developments to watch in 2019

Security

Net-security

8.2.19

Infosec pros believe data isn’t secure in the cloud, despite desire for mass adoption

Security

Net-security

8.2.19

ETSI releases TS 103 457 to secure functions in a virtualized environment

Security

Net-security

8.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

Expert publicly disclosed the existence of 0day flaw in macOS Mojave

Apple

Securityaffairs

7.2.19

Zero-day Vulnerability Highlights the Responsible Disclosure Dilemma

Vulnerebility

Securityweek

7.2.19

Micro-segmentation Security Firm Illumio Raises $65 Million

IT

Securityweek

7.2.19

Critical Flaws Allow Hackers to Take Control of Kunbus Industrial Gateway

Vulnerebility

Securityweek

7.2.19

Fortinet Introduces New Next-Generation Firewalls

Safety

Securityweek

7.2.19

German Competition Watchdog Demands More Control for Facebook Users

Social

Securityweek

7.2.19

Network Security Firm Netography Emerges From Stealth

Security

Securityweek

7.2.19

France to Tighten 5G Security: Minister

BigBrothers

Securityweek

7.2.19

2018 in Snort Rules

Safety blog

Cisco Talos

7.2.19

Reverse RDP Attack: Code Execution on RDP Clients

Attack blog

Checkpoint

7.2.19

Report: Under the Hood of Cyber Crime

Cyber blog

Checkpoint

7.2.19

The Curious Case of Convexity Confusion

Security blog

Project Zero

7.2.19

Tech Support Scams Now Get Users to Install Potentially Unwanted Apps

Spam blog

Symantec

7.2.19

DanaBot updated with new C&C communication

BotNet blog

Eset

7.2.19

Google rolls out Chrome extension to warn you about compromised logins

Safety blog

Eset

7.2.19

European Commission orders recall of children’s smartwatch over privacy concerns

BigBrother blog

Eset

7.2.19

59,000 Breaches Disclosed in First Eight Months of GDPR

Privacy

Securityweek

7.2.19

Ursnif: Long Live the Steganography and AtomBombing!

Virus

Securityaffairs

7.2.19

DDoS Attacks in Q4 2018

Analysis  Attack

Securelist

7.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

New Docs Show Pricing for Windows 7 Extended Security Updates

Security

Bleepingcomputer

7.2.19

"Lucky Draw" Smishing Campaign Asks Money to Deliver Car Prize

Android

Bleepingcomputer

7.2.19

59K Data Breaches Reported, 91 Fines Imposed Since GDPR Enactment

Incindent

Bleepingcomputer

7.2.19

Researcher Declines to Share Zero-Day macOS Keychain Exploit with Apple

Apple

Bleepingcomputer

7.2.19

Mozilla's Site Isolation Coming to Firefox, First Milestone in February

Security

Bleepingcomputer

7.2.19

What do successful pentesting attacks have in common?

Attack

Net-security

7.2.19

8 months of GDPR: 59,000+ reported breaches, 91 fines

Privacy

Net-security

7.2.19

Android devices could be hacked by viewing a malicious PNG Image

Android

Securityaffairs

7.2.19

Lawmakers Concerned About Apple's Handling of FaceTime Spying Bug

Apple

Securityweek

7.2.19

Chinese Hackers Spy on U.S. Law Firm, Major Norwegian MSP

BigBrothers

Securityweek

7.2.19

macOS Mojave Zero-Day Allows Theft of Keychain Passwords

Apple

Securityweek

7.2.19

Webinar Today: Merging OT/ICS Threat Detection Into Your SOC

ICS

Securityweek

7.2.19

Scammers Abuse Gmail Address Feature in Fraud Attacks

Spam

Securityweek

7.2.19

MacOS Zero-Day Exposes Apple Keychain Passwords

Apple

Threatpost

7.2.19

Clever Phishing Attack Enlists Google Translate to Spoof Login Page

Phishing

Threatpost

7.2.19

Lookalike domains: Artificial intelligence may come to the rescue

Security

Net-security

7.2.19

Malicious macros can trigger RCE in LibreOffice, OpenOffice

Virus

Net-security

7.2.19

The problem with vulnerable IoT companion apps

IoT

Net-security

6.2.19

30% of Automotive Companies Lacking a Dedicated Cybersecurity Team

Cyber

Bleepingcomputer

6.2.19

Power Company Has Security Breach Due to Downloaded Game

Incindent

Bleepingcomputer

6.2.19

Cryptojacking Overtakes Ransomware, Malware-as-a-Service on the Rise

Ransomware

Bleepingcomputer

6.2.19

GandCrab Ransomware Helps Shady Data Recovery Firms Hide Ransom Costs

Ransomware

Bleepingcomputer

6.2.19

Microsoft Released the February 2019 Non-Security Office Updates

Security

Bleepingcomputer

6.2.19

Microsoft Confirms Windows Update Problems Were Caused by DNS Issues

Security

Bleepingcomputer

6.2.19

Google Launches Password Checkup Extension to Alert Users of Data Breaches

Safety

Bleepingcomputer

6.2.19

OpenOffice Vulnerable to Remote Code Execution, LibreOffice Patched

Vulnerebility

Bleepingcomputer

6.2.19

Microsoft Confirms Serious ‘PrivExchange’ Vulnerability

Vulnerebility

Threatpost

6.2.19

Modern Cybercrime: It Takes a Village

CyberCrime

Threatpost

6.2.19

What are Data Manipulation Attacks, and How to Mitigate Against Them

Attack

Threatpost

6.2.19

Security expert Marco Ramilli released for free the Malware Hunter tool

Security

Securityaffairs

6.2.19

A critical couterfeiting vulnerability addressed in Zcash

Cryptocurrency

Securityaffairs

6.2.19

With No Unifying U.S. Federal Privacy Law, States Are Implementing Their Own

BigBrothers

Securityweek

6.2.19

Check-in Links Sent by Several Airlines Expose Passenger Data

Incindent

Securityweek

6.2.19

Android Phones Can Get Hacked Just by Looking at a PNG Image

Android

Thehackernews

6.2.19

Marvell Avastar wireless SoCs have multiple vulnerabilities

Alert News

Alert

6.2.19

New ExileRAT backdoor used in attacks aimed at users in Tibet

Virus

Securityaffairs

6.2.19

Reverse RDP Attack – Rogue RDP Server can be used to hack RDP clients

Attack

Securityaffairs

6.2.19

SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM.

Virus

Securityaffairs

6.2.19

Critical Zcash Bug Could Have Allowed 'Infinite Counterfeit' Cryptocurrency

Cryptocurrency

Thehackernews

6.2.19

How to Delete Accidentally Sent Messages, Photos on Facebook Messenger

Social

Thehackernews

6.2.19

Web App Security Firm Signal Sciences Raises $35 Million

IT

Securityweek

6.2.19

New LuckyCat-Linked RAT Targets Users in Tibet

Virus

Securityweek

6.2.19

Don't Let Huawei Help Set Up 5G, US Warns EU Nations

BigBrothers

Securityweek

6.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

6.2.19

'No Material Impact' From Foreign Meddling in 2018 US Vote: Report

BigBrothers

Securityweek

6.2.19

Smart Watch Recalled in Europe Over Privacy Risks

BigBrothers

Securityweek

6.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

6.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

6.2.19

Hancitor malspam and infection traffic from Tuesday 2019-02-05

Spam

SANS

6.2.19

IoT Scale Flaws Enable Denial of Service, Privacy Issues

IoT

Threatpost

6.2.19

The impact of cyber-enabled economic warfare escalation

Cyber

Net-security

6.2.19

5 reasons why asset management is a hot topic in 2019

Cyber

Net-security

6.2.19

70 real-life hackers and cybersecurity practitioners share their personal insights

Hacking

Net-security

5.2.19

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Hacking

Thehackernews

5.2.19

Google's New Tool Alerts When You Use Compromised Credentials On Any Site

Security

Thehackernews

5.2.19

Code Execution Flaw Found in LibreOffice, OpenOffice

Vulnerebility

Securityweek

5.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

5.2.19

Smart Watch Recalled in Europe Over Privacy Risks

Privacy

Securityweek

5.2.19

'No Material Impact' From Foreign Meddling in 2018 US Vote: Report

BigBrothers

Securityweek

5.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

5.2.19

Mitigations against Mimikatz Style Attacks

Attack

SANS

5.2.19

Remote Desktop Protocol Clients Rife with Remote Code-Execution Flaws

Vulnerebility

Threatpost

5.2.19

EU Recalls Children’s Smartwatch That Leaks Location Data

BigBrothers

Threatpost

5.2.19

Google Patches Critical .PNG Image Bug

Vulnerebility

Threatpost

5.2.19

Severe RCE Flaw Disclosed in Popular LibreOffice and OpenOffice Software

Vulnerebility

Thehackernews

5.2.19

Huddle House Suffers Payment Card Breach

Incindent

Securityweek

5.2.19

Code Execution Flaw Found in LibreOffice, OpenOffice

Vulnerebility

Securityweek

5.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

5.2.19

Mozilla Resumes Firefox 65 Rollout After AVs Disable HTTPS Scanning

Safety

Bleepingcomputer

5.2.19

RDP Clients Exposed to Reverse RDP Attacks by Major Protocol Issues

Attack

Bleepingcomputer

5.2.19

Severe bug in LibreOffice and OpenOffice suites allows remote code execution

Vulnerebility

Securityaffairs

5.2.19

Huddle House Fast Food Chain Suffers Data Breach in POS System

Incindent

Bleepingcomputer

5.2.19

Mozilla Adding CryptoMining and Fingerprint Blocking to Firefox

Cryptocurrency

Bleepingcomputer

5.2.19

Windows 10 Update Continues Having Issues After DNS Fixes

Safety

Bleepingcomputer

5.2.19

ExileRat Targeting Tibetan Supporters via Malicious PowerPoint Docs

Virus

Bleepingcomputer

5.2.19

Mozilla to Automatically Block Auto-Playing Audio in Firefox 66

Security

Bleepingcomputer

5.2.19

Microsoft Authenticator App Now Delivers Security Notifications

Security

Bleepingcomputer

5.2.19

Windows 3.0 File Manager Reborn in All Its Nostalgic Glory

IT

Bleepingcomputer

5.2.19

Google Working on Chrome Never-Slow Mode for Faster Browsing

Security

Bleepingcomputer

5.2.19

The APT Name Game: How Grim Threat Actors Get Goofy Monikers

APT

Threatpost

5.2.19

‘Collection #1’ Data Dump Hacker Identified

Incindent

Threatpost

5.2.19

ExileRAT shares C2 with LuckyCat, targets Tibet

Malware blog

Cisco Talos

5.2.19

SpeakUp: A New Undetected Backdoor Linux Trojan

Malware blog

Checkpoint

5.2.19

Houzz discloses data breach, asks some users to reset passwords

Incident blog

Eset

5.2.19

Roughly 500,000 Ubiquity devices may be affected by flaw already exploited in the wild

Exploit

Securityaffairs

5.2.19

Experts found popular beauty apps in the Play Store including malicious code

Virus

Securityaffairs

5.2.19

New Backdoor Targets Linux Servers

Virus

Securityweek

5.2.19

Researchers Identify Hacker Behind Massive Data Breach Collection

Incindent

Securityweek

5.2.19

New Canon Printers Bring SIEM Integration, Other Security Features

Safety

Securityweek

5.2.19

Wikipedia Articles as part of Tech Support Scamming Campaigns?

Spam

SANS

5.2.19

Spy Campaign Spams Pro-Tibet Group With ExileRAT

Virus

Net-security

5.2.19

Why vaporworms might be the scourge of 2019

Cyber

Net-security

5.2.19

AI won’t solve all of our cybersecurity problems

Cyber

Net-security

4.2.19

New SpeakUp Backdoor Infects Linux and macOS with Miners

Apple

Bleepingcomputer

4.2.19

QuadrigaCX exchange lost access to $145 Million funds after founder dies

CyberCrime

Bleepingcomputer

4.2.19

Young hacker gets 10 years jail sentence for SIM Swapping attacks

Crime

Bleepingcomputer

4.2.19

Flaw Possibly Affecting 500,000 Ubiquity Devices Exploited in the Wild

Exploit

Securityweek

4.2.19

Extreme Networks Launches IoT Defense Solution For Enterprises

IoT

Securityweek

4.2.19

Attackers Use CoAP for DDoS Amplification

Attack

Securityweek

4.2.19

Senators Reintroduce DHS Cyber Hunt and Incident Response Teams Act

BigBrothers

Securityweek

4.2.19

Cryptocurrency Firm Losses $145 Million After CEO Dies With Only Password

Cryptocurrency

Thehackernews

4.2.19

Struts Vulnerability CVE-2017-5638 on VMware vCenter - the Gift that Keeps on Giving

Vulnerebility

SANS

4.2.19

SpeakUp Linux Backdoor Sets Up for Major Attack

Virus

Threatpost

4.2.19

Metro Bank is the first bank that disclosed SS7 attacks against its customers

Attack

Securityaffairs

4.2.19

U.S. Energy Firm Fined $10 Million for Security Failures

ICS

Securityweek

4.2.19

Several Popular Beauty Camera Apps Caught Stealing Users' Photos

Android

Thehackernews

4.2.19

First Hacker Convicted of 'SIM Swapping' Attack Gets 10 Years in Prison

Mobil

Thehackernews

4.2.19

Houzz Break-In: Data Breach Announced

Incindent

Bleepingcomputer

4.2.19

New Malware Siphons Cryptocurrency Wallets and Credentials, Credit Cards

Cryptocurrency

Bleepingcomputer

4.2.19

Security firm Recorded Future discovered the hacker behind Collection #1

Incindent

Securityaffairs

4.2.19

Chrome to Display Warnings About Similar or Lookalike URLs

Security

Bleepingcomputer

4.2.19

Can Enterprises execute a GRC Movement?

Security

Securityaffairs

4.2.19

Four differences between the GDPR and the CCPA

Privacy

Net-security

4.2.19

CISOs: Change your mindset or lose your job

Security

Net-security

4.2.19

Evaluating the biggest cyber threats to the electric power sector

ICS

Net-security

4.2.19

Email authentication use growing steadily in every industry sector

Cyber

Net-security

4.2.19

RSA Conference 2019 USA: What you can expect at this year’s event

Congress

Net-security

4.2.19

Video: Analyzing a Simple HTML Phishing Attachment

Phishing

SANS

3.2.19

Sextortion Scam Stating Xvideos Was Hacked to Record You Through Webcam

Spam

Bleepingcomputer

3.2.19

New Scam Holds YouTube Channels for Ransom

Spam

Bleepingcomputer

3.2.19

Experts observed a new sextortion scam Xvideos-themed

Spam

Securityaffairs

3.2.19

Hacker who reported a flaw in Hungarian Magyar Telekom faces up to 8-years in jail

Crime

Securityaffairs

3.2.19

Operators of the TheMoon botnet offer it as a service

BotNet

Securityaffairs

3.2.19

IBM experts warn of malicious abuses of Apple Siri Shortcuts

Apple

Securityaffairs

3.2.19

Scanning for WebDAV PROPFIND Exploiting CVE-2017-7269

Exploit

SANS

2.2.19

Cyber Security Week in Review (Feb. 1)

Cyber blog

Cisco Talos

2.2.19

Fake Cisco Job Posting Targets Korean Candidates

BigBrother blog

Cisco Talos

2.2.19

Vulnerability Spotlight: Multiple vulnerabilities in ACD Systems Canvas Draw 5

Vulnerebility blog

Cisco Talos

2.2.19

Examining Pointer Authentication on the iPhone XS

Exploit blog

Project Zero

2.2.19

Four new caches of stolen logins put Collection #1 in the shade

Incident blog

Eset

2.2.19

Japan to probe citizens’ IoT devices in the name of security

BigBrother blog

Eset

2.2.19

Cybercrime black markets: Dark web services and their prices

Cyber blog

Eset

2.2.19

‘We’re coming for you’, global police warn DDoS attack buyers

Attack blog

Eset

2.2.19

“Love you” malspam gets a makeover for massive Japan-targeted campaign

Spam blog

Eset

2.2.19

DHS Cyber Hunt Teams to Be Authorized by Reintroduced Bipartisan Bill

BigBrothers

Bleepingcomputer

2.2.19

Windows 10 Insider Preview Build 18329 Released with Mixed Reality Win32 Apps

Vulnerebility

Bleepingcomputer

2.2.19

New Site Monitors Censorship on Apple's Chinese App Store

BigBrothers

Bleepingcomputer

2.2.19

DHS Security Tech Innovation Program Means Big Money for SMBs

BigBrothers

Bleepingcomputer

2.2.19

Mozilla Halts Firefox 65 Rollout Due to Insecure Certificate Errors

Safety

Bleepingcomputer

2.2.19

Google Outage Causing Google Charts and Other APIs to Not Work

IT

Bleepingcomputer

2.2.19

Basecamp Successfully Defends Against Credential Stuffing Attack

Attack

Bleepingcomputer

2.2.19

Microsoft Forcing Skype Classic Users to Upgrade to Version 8

IT

Bleepingcomputer

2.2.19

Ethical Hacker Exposes Magyar Telekom Vulnerabilities, Faces 8 Years in Jail

Crime

Bleepingcomputer

2.2.19

Linux Kernel Spectre Protection Changes to Boost App Performance

Attack

Bleepingcomputer

2.2.19

Many Windows 10 Users Unable to Connect to Windows Update Service

Security

Bleepingcomputer

2.2.19

Dell Introduces Dell SafeGuard and Response Solutions To Fight Evolving Threats

Safety

Bleepingcomputer

2.2.19

Microsoft Announces Earnings for Second Fiscal Quarter of 2019

IT

Bleepingcomputer

2.2.19

Android Apps With Millions of Installs Collect Selfies, Push Porn Ads

Android

Bleepingcomputer

2.2.19

Airbus Data Breach Exposes Employee Credentials, Professional Contact Details

Incindent

Bleepingcomputer

2.2.19

Home Design website Houzz suffered a data breach

Incindent

Securityaffairs

2.2.19

Apple issued a partial fix for recent FaceTime spying bug

Apple

Securityaffairs

2.2.19

Ransom News

Ransom News

Ransom

2.2.19

US authorities aim to dismantle North Korea’s Joanap Botnet

BotNet

Securityaffairs

2.2.19

The return of the AdvisorsBot malware

Virus

Securityaffairs

2.2.19

State Bank of India left archive with millions of Customer messages exposed

Incindent

Securityaffairs

2.2.19

Malicious Hackers Can Abuse Siri Shortcuts: IBM

Virus

Securityweek

2.2.19

Industrial Internet Consortium and OpenFog Consortium Merge

ICS

Securityweek

2.2.19

UK Data Watchdog Fines Leave.EU, Eldon Insurance

BigBrothers

Securityweek

2.2.19

Apple Partially Fixes FaceTime Spying Bug

Apple

Securityweek

2.2.19

Israel Seeks to Beat Election Cyber Bots

BigBrothers

Securityweek

2.2.19

Home Design Website Houzz Alerts Users of Data Breach

Incindent

Securityweek

2.2.19

Hacker who reported flaw in Hungarian Telekom faces up to 8-years in prison

Vulnerebility

Thehackernews

2.2.19

New Mac Malware Targets Cookies to Steal From Cryptocurrency Wallets

Apple

Thehackernews

2.2.19

Most Magento shops get compromised via vulnerable extensions

Vulnerebility

Net-security

2.2.19

Chafer APT Takes Aim at Diplomats in Iran with Improved Custom Malware

APT

Threatpost

2.2.19

Houzz Urges Password Resets After Data Breach

Incindent

Threatpost

2.2.19

Cybercriminals Aim for the Super Bowl Goal Posts

CyberCrime

Threatpost

1.2.19

Microsoft Opens Up Skip Ahead Ring As It Prepares First Windows 10 19H2 Build

IT

Bleepingcomputer

1.2.19

Mozilla Finally Nixing Extensions In Firefox Private Windows

Privacy

Bleepingcomputer

1.2.19

Love Letter Malspam Serves Cocktail of Malware, Heavily Targets Japan

Spam

Bleepingcomputer

1.2.19

Chrome 72 Released with 58 Security Fixes, Deprecates TLS 1.0 and 1.1

Vulnerebility

Bleepingcomputer

1.2.19

Fake Survey Scammers on YouTube Have Terrible OpSec Skills

Spam

Bleepingcomputer

1.2.19

Police Forces Team Up To Hunt Down Users of DDoS Services

BigBrothers

Bleepingcomputer

1.2.19

New LockerGoga Ransomware Allegedly Used in Altran Attack

Ransomware

Bleepingcomputer

1.2.19

Theoretical Ransomware Attack Could Lead to Global Damages Says Report

Ransomware

Bleepingcomputer

1.2.19

Apple Disabled Group FaceTime While Working on Bug Fix

Apple

Bleepingcomputer

1.2.19

Microsoft Adds New Privacy and Compliance Features to Microsoft 365

Privacy

Bleepingcomputer

1.2.19

Firefox 65 Released with Updated Content Blocking, MSI Installers, and More

Security

Bleepingcomputer

1.2.19

Microsoft 365 Experiencing Issues, Users Unable to Access URLs From Emails

Security

Bleepingcomputer

1.2.19

Hackers Stole $1.7 Billion in Cryptocurrency Last Year

Cryptocurrency

Bleepingcomputer

1.2.19

Brave Browser Taunts Chrome, Edge, and Firefox in New Privacy Ad

Privacy

Bleepingcomputer

1.2.19

Disable FaceTime Now! Bug Lets Callers Snoop On You Without Permission

Apple

Bleepingcomputer

1.2.19

Discover Card Users Affected by Data Breach, New Credit Cards Issued

Incindent

Bleepingcomputer

1.2.19

DNS DDoS Attack Protections to be Forcefully Enabled for Non-Compliant Sites

Attack

Bleepingcomputer

1.2.19

Windows System Guard Launch Causing Blank Boot Screens in UEFI PCs

Safety

Bleepingcomputer

1.2.19

TamperMonkey May Be the Next Victim of Google's Chrome Manifest V3 Changes

IT

Bleepingcomputer

1.2.19

Spam Campaign Follows the White Rabbit to NSFW Phishing Scams

Spam

Bleepingcomputer

1.2.19

Azorult Trojan Steals Passwords While Hiding as Google Update

Virus

Bleepingcomputer

1.2.19

Researchers reveal new privacy attack against 3G, 4G, and 5G mobile users

Mobil

Net-security

1.2.19

Facebook dismantled a vast manipulation campaign tied to Iran

Social

Securityaffairs

1.2.19

CookieMiner Mac Malware steals browser cookies and sensitive Data

Apple

Securityaffairs

1.2.19

New York Investigating Apple's Response to FaceTime Spying Bug

Apple

Securityweek

1.2.19

Minnesota Department of Human Services Reports Data Breach

Incindent

Securityweek

1.2.19

Facebook Takes Down Vast Iran-led Manipulation Campaign

Social

Securityweek

1.2.19

GitHub Helps Developers Keep Dependencies Secure via Dependabot

Security

Securityweek

1.2.19

Firms That Sold Fake Social Media Activity Settle With New York State

Social

Securityweek

1.2.19

Dell Teams With CrowdStrike, Secureworks for New Endpoint Security Offering

Security

Securityweek

1.2.19

Airbus Data Takes Flight; and Billions of Credentials Dumped on Dark Web

Incindent

Threatpost

1.2.19

Facebook Boots Hundreds of Iran-Linked Accounts For Spreading Misinformation

Social

Threatpost

1.2.19

TheMoon Rises Again, With a Botnet-as-a-Service Threat

BotNet

Threatpost

1.2.19

Prepare to Defend Your Network Against Swarm-as-a-Service

Security

Threatpost

1.2.19

2019 Already Marred By Slew of Data Breach Incidents

Incindent

Threatpost

1.2.19

Safeguarding your data from human error and phishing attacks with the cloud

Phishing

Net-security

1.2.19

Is your organization ready for the data explosion?

Incindent

Net-security

1.2.19

Employees report 23,000 phishing incidents annually, costing $4.3 million to investigate

Phishing

Net-security

1.2.19

Companies getting serious about AI and analytics, 58% are evaluating data science platforms

IT

Net-security

1.2.19

Sextortion: Follow the Money Part 3 - The cashout begins!

Security

SANS

31.1.19

Airbus data breach exposes some employees’data

Incindent

Securityaffairs

31.1.19

Researchers published the PoC exploit code for Linux SystemD bugs

Exploit

Securityaffairs

31.1.19

Exclusive: spreading CSV Malware via Google Sheets

Virus

Securityaffairs

31.1.19

Imperva mitigated DDoS attack generated 500 Million Packets per Second, the largest ever

Attack

Securityaffairs

31.1.19

Skyscanner launches a public bug bounty program

Security

Securityaffairs

31.1.19

Mac Malware Steals Browser Cookies, Sensitive Data

Apple

Securityweek

31.1.19

Cloud Security Firm Aporeto Raises $20 Million

IT

Securityweek

31.1.19

The Tricky Balance in Declining or Accepting Online Payments

Security

Securityweek

31.1.19

U.S. Takes Aim at North Korea's Joanap Botnet

BigBrothers

Securityweek

31.1.19

Employee Data Compromised in Airbus Breach

Incindent

Securityweek

31.1.19

Huawei: How the Telecoms Giant is Seen Around the World

BigBrothers

Securityweek

31.1.19

Firefox 65 Brings Improved Privacy Protections

Privacy

Securityweek

31.1.19

Airbus Suffers Data Breach, Some Employees' Data Exposed

Incindent

Securityweek

31.1.19

FBI Mapping 'Joanap Malware' Victims to Disrupt the North Korean Botnet

BigBrothers

Thehackernews

31.1.19

Stealthy Malware Disguises Itself as a WordPress License Key

Virus

Threatpost

31.1.19

Google Pulls Data-Chugging App From iOS Devices

Apple

Threatpost

31.1.19

Mac “CookieMiner” Malware Aims to Gobble Crypto Funds

Apple

Threatpost

31.1.19

Attackers Can Track Kids’ Locations via Connected Watches

Attack

Threatpost

31.1.19

Apple Blasts Facebook Over Data-Sucking ‘Research’ App

Apple

Threatpost

31.1.19

New Mac malware steals cookies, cryptocurrency and computing power

Apple

Net-security

31.1.19

Google also abused its Apple developer certificate to collect iOS user data

Apple

Net-security

31.1.19

Taking ethical action in identity: 5 steps for better biometrics

Security

Net-security

31.1.19

Microsoft rolls out new tools for enterprise security and compliance teams

Security

Net-security

31.1.19

eCommerce credit card fraud is nearly an inevitability

Incindent

Net-security

31.1.19

Free training course material on network forensics for cybersecurity specialists

Cyber

Net-security

31.1.19

Facebook to shut down iOS app that allowed for near total data access

Social

Net-security

31.1.19

Tracking Unexpected DNS Changes

Security

Net-security

30.1.19

Facebook paid teens $20 to install a Research App that spies on them

Social

Securityaffairs

30.1.19

Yahoo Breach Settlement Rejected by Judge

Incindent

Securityweek

30.1.19

Facebook Paid Users to Track Smartphone Use: Report

Social

Securityweek

30.1.19

Travel Search Website Skyscanner Launches Bug Bounty Program

Security

Securityweek

30.1.19

Bangladesh to Sue Philippine Bank Over $81M Cyber Heist

CyberCrime

Securityweek

30.1.19

Internet Society Publishes Privacy Code of Conduct

Privacy

Securityweek

30.1.19

Encryption Firm Fortanix Raises $23 Million

IT

Securityweek

30.1.19

Mimecast Acquires Cloud Migration Firm Simply Migrate

IT

Securityweek

30.1.19

Suspected GDPR violations prompt over 95,000 complaints

BigBrother blog

Eset

30.1.19

Russia hit by new wave of ransomware spam

Ransomware blog

Eset

30.1.19

Hear me out! Thousands tell UK taxman to wipe their voice IDs

Security blog

Eset

30.1.19

Apple takes Group FaceTime offline after discovery of spying bug

Vulnerebility blog

Eset

30.1.19

voucher_swap: Exploiting MIG reference counting in iOS 12

Exploit blog

Project Zero

30.1.19

Vulnerability Spotlight: Multiple vulnerabilities in coTURN

Vulnerebility blog

Cisco Talos

30.1.19

Vulnerability Spotlight: Python.org certificate parsing denial-of-service

Vulnerebility blog

Cisco Talos

30.1.19

Vulnerability Spotlight: Multiple WIBU SYSTEMS WubiKey vulnerabilities

Vulnerebility blog

Cisco Talos

30.1.19

APT39: An Iranian Cyber Espionage Group Focused on Personal Information

APT blog

FireEye

30.1.19

Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities

BigBrothers

Securelist

30.1.19

Reading the ENISA Threat Landscape Report 2018

Analysis

Securityaffairs

30.1.19

Iran-Linked APT39 group use off-the-shelf tools to steal data

APT

Securityaffairs

30.1.19

Mimecast Acquires Cloud Migration Firm Simply Migrate

IT

Securityweek

30.1.19

Facebook Paid Teens $20 to Install 'Research' App That Collects Private Data

Social

Thehackernews

30.1.19

iCloud Possibly Suffered A Privacy Breach Last Year That Apple Kept a Secret

Apple

Thehackernews

30.1.19

Sofacy’s Zepakab Downloader Spotted In-The-Wild

APT

Securityaffairs

30.1.19

Netanyahu accuses Iran of cyber attacks carried out daily

BigBrothers

Securityaffairs

30.1.19

U.S. Intel Community: Russia, China Can Disrupt Critical Infrastructure

BigBrothers

Securityweek

30.1.19

DNS Providers to Cease Implementing DNS Resolver Workarounds

Security

Securityweek

30.1.19

Iran-Linked Hackers Use Array of Tools to Steal Data: FireEye

BigBrothers

Securityweek

30.1.19

CR19-010: The United States vs. Huawei

BigBrothers

SANS

30.1.19

Mozilla Firefox 65 Ups the Ante on Privacy with Anti-Tracking Efforts

Security

Threatpost

30.1.19

Feds Dismantle Dark Web Credentials Market

Security

Threatpost

30.1.19

Japan to Hunt Down Citizens’ Insecure IoT Devices

IoT

Threatpost

30.1.19

Mozilla releases anti tracking policy, enhances tracking protection in Firefox 65

Security

Net-security

30.1.19

Enterprises are struggling with cloud complexity and security

Security

Net-security

30.1.19

The biggest cybersecurity challenge? Communicating threats internally

Cyber

Net-security

30.1.19

$1.7 billion in cryptocurrency was stolen and scammed in 2018

Cryptocurrency

Net-security

29.1.19

Law enforcement worldwide hunting users of DDoS-for-Hire services

Attack

Securityaffairs

29.1.19

US DoJ charges Huawei sanctions violations and in technology espionage

BigBrothers

Securityaffairs

29.1.19

Symantec Adds New Features, Services to Endpoint Security Offering

Safety

Securityweek

29.1.19

Israel Blocks Iran Cyber-attacks 'Daily': Netanyahu

BigBrothers

Securityweek

29.1.19

Researcher Escalates Privileges on Exchange 2013 via NTLM Relay Attack

Attack

Securityweek

29.1.19

Crypto Hardware Maker nCipher Re-Emerges From Thales After 20 Years

Cryptocurrency

Securityweek

29.1.19

2019 Singapore ICS Cyber Security Conference Call for Presentations Closes Jan. 31

ICS

Securityweek

29.1.19

Salt Security Emerges From Stealth With API Protection Solution

Security

Securityweek

29.1.19

Japan to Survey 200 Million Gadgets for Cyber Security

BigBrothers

Securityweek

29.1.19

How to Recover Lost or Deleted Files?

Security

Thehackernews

29.1.19

Critical FaceTime bug turns iPhones, Macs into eavesdropping tools

Apple

Net-security

29.1.19

Researchers Allege ‘Systemic’ Privacy, Security Flaws in Popular IoT Devices

IoT

Threatpost

29.1.19

Apple Disables Group FaceTime Following Major Privacy Glitch

Apple

Threatpost

29.1.19

Medical Device Security Firm Medigate Raises $15 Million

IT

Securityweek

29.1.19

Apple Working on Patch to Prevent FaceTime Spying

Apple

Securityweek

29.1.19

U.S. Charges Huawei in Technology Theft, Sanctions Violations

BigBrothers

Securityweek

29.1.19

Appeals Court to Hear Case of Reporter Alleging Surveillance

Cyber

Securityweek

29.1.19

Authorities Seize Hacked Server Marketplace

Hacking

Securityweek

29.1.19

Authorities Track Down Users of DDoS Services

CyberCrime

Securityweek

29.1.19

Zero-Days in WordPress Plugin Actively Exploited

Vulnerebility

Securityweek

29.1.19

Privacy Fears Raised Over Facebook Messaging Apps Integration

Social

Securityweek

29.1.19

Netcraft Launches Anti-Phishing Mobile App

Phishing

Securityweek

29.1.19

Boardrooms Are Still Not Singing the Security Song

Security

Securityweek

29.1.19

Facebook Launches Privacy and Data Use Business Hub

Social

Securityweek

29.1.19

Industry Reactions to Data Privacy Day

Privacy

Securityweek

29.1.19

Disable FaceTime, a bug lets you hear a person’s audio before he answers

Apple

Securityaffairs

29.1.19

Authorities shut down XDEDIC marketplace in an international operation

CyberCrime

Securityaffairs

29.1.19

Hackers compromise WordPress sites via Zero-Day flaws in Total Donations plugin

Vulnerebility

Securityaffairs

29.1.19

Aztarna – the open-source scanning tool for vulnerable robots

Security

Securityaffairs

29.1.19

Dailymotion forces password reset in response to credential stuffing Attack

Attack

Securityaffairs

29.1.19

Europol Now Going After People Who Bought DDoS-for-Hire Services

BigBrothers

Thehackernews

29.1.19

Police Shut Down xDedic – An Online Market for Cyber Criminals

BigBrothers

Thehackernews

29.1.19

New FaceTime Bug Lets Callers Hear and See You Without You Picking Up

Vulnerebility

Thehackernews

29.1.19

WordPress Users Urged to Delete Zero-Day-Ridden Plugin

Vulnerebility

Threatpost

29.1.19

Active Scans Target Vulnerable Cisco Routers for Remote Code-Execution

Vulnerebility

Threatpost

29.1.19

Dailymotion Fights Ongoing Credential-Stuffing Attack

Attack

Threatpost

29.1.19

Microsoft Exchange 2013 and newer are vulnerable to NTLM relay attacks

Alert

Alert

29.1.19

How privacy and security concerns affect password practices

Security

Net-security

29.1.19

Emotet: A veritable Swiss Army knife of malicious capabilities

Virus

Net-security

29.1.19

Global IT spending to reach $3.8 trillion in 2019, up 3.2% from 2018

IT

Net-security

29.1.19

What steps consumers need to take to protect themselves online

Security

Net-security

29.1.19

Facebook plans to integrate WhatsApp, Messenger and Instagram

Social

Net-security

29.1.19

Relaying Exchange?s NTLM authentication to domain admin (and more)

Security

SANS

28.1.19

Hackers are targeting Cisco RV320/RV325, over 9K routers exposed online

Exploit

Securityaffairs

28.1.19

Cobalt cybercrime gang abused Google App Engine in recent attacks

CyberCrime

Securityaffairs

28.1.19

Hackers Target Cisco Routers via Recently Patched Flaws

Vulnerebility

Securityweek

28.1.19

Misinformation Woes Could Multiply With 'Deepfake' Videos

Security

Securityweek

28.1.19

New Exploit Threatens Over 9,000 Hackable Cisco RV320/RV325 Routers Worldwide

Exploit

Thehackernews

28.1.19

Researchers Release Tool That Finds Vulnerable Robots on the Internet

Vulnerebility

Thehackernews

28.1.19

Cryptocurrency and Blockchain Networks: Facing New Security Paradigms

Cryptocurrency blog

FireEye

28.1.19

Bypassing Network Restrictions Through RDP Tunneling

Malware blog

FireEye

28.1.19

Cisco AMP tracks new campaign that delivers Ursnif

Malware blog

Cisco Talos

28.1.19

What we learned by unpacking a recent wave of Imminent RAT infections using AMP

Malware blog

Cisco Talos

28.1.19

Dynamic Data Resolver (DDR) - IDA Plugin

Security blog

Cisco Talos

28.1.19

Emotet re-emerges after the holidays

Malware blog

Cisco Talos

28.1.19

Vulnerability Deep Dive: TP-Link TL-R600VPN remote code execution vulnerabilities

Vulnerebility blog

Cisco Talos

28.1.19

Pylocky Unlocked: Cisco Talos releases PyLocky ransomware decryptor

Ransomware blog

Cisco Talos

28.1.19

Why we want users' feedback on Snort rule documentation

Security blog

Cisco Talos

28.1.19

Microsoft Patch Tuesday — January 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

28.1.19

Vulnerability Spotlight: Multiple Apple IntelHD5000 privilege escalation vulnerabilities

Vulnerebility blog

Cisco Talos

28.1.19

Vulnerability Spotlight: Multiple privilege escalation vulnerabilities in CleanMyMac X

Vulnerebility blog

Cisco Talos

28.1.19

2019 State of Malware report: Trojans and cryptominers dominate threat landscape

Malware blog

Malwarebytes

28.1.19

Sly criminals package ransomware with malicious ransom note

Ransomware blog

Malwarebytes

28.1.19

A user’s right to choose: Why Malwarebytes detects Potentially Unwanted Programs (PUPs)

Malware blog

Malwarebytes

28.1.19

Browser push notifications: a feature asking to be abused

Security blog

Malwarebytes

28.1.19

Has two-factor authentication been defeated? A spotlight on 2FA’s latest challenge

Safety blog

Malwarebytes

28.1.19

Collection 1 data breach: what you need to know

Incident blog

Malwarebytes

28.1.19

Hosting malicious sites on legitimate servers: How do threat actors get away with it?

Malware blog

Malwarebytes

28.1.19

Improved Fallout EK comes back after short hiatus

BigBrother blog

Malwarebytes

28.1.19

The Advanced Persistent Threat files: APT10

APT blog

Malwarebytes

28.1.19

Cybersecurity Barometer: Cybercrime’s impact on privacy and security

Cyber blog

Eset

28.1.19

Can you spot the phish? Take Google’s test

Phishing blog

Eset

28.1.19

Former employee blamed for hack of WordPress plugin maker

Hacking blog

Eset

28.1.19

Google fined €50 million for violating EU data privacy rules

BigBrother blog

Eset

28.1.19

Email security does not end with your password

Security blog

Eset

28.1.19

ENISA outlines top cyber threats and trends in 2018

Cyber

Net-security

28.1.19

Dailymotion Resets Passwords After Credential Stuffing Attack

Attack

Bleepingcomputer

28.1.19

Hackers Targeting Cisco RV320/RV325 Routers Using New Exploits

Exploit

Bleepingcomputer

28.1.19

Microsoft 365 Suffers Massive Two Day Outage, Outlook and Exchange Down

Security

Bleepingcomputer

28.1.19

Google Chrome Adding Support for Signed HTTP Exchanges

Security

Bleepingcomputer

28.1.19

Microsoft To-Do Beta Finally Lets You Attach Files to Tasks

Security

Bleepingcomputer

28.1.19

Facebook Details the "Defense-in-Depth” Approach Used to Secure its Platform

Social

Bleepingcomputer

28.1.19

Resolve to Be More Involved In Your Local Community - REVISITED

Security

SANS

28.1.19

How to know when you’re ready for a fractional CISO

Security

Net-security

28.1.19

How accepting that your network will get hacked will help you develop a plan to recover faster

Security

Net-security

27.1.19

Ransom News

Ransom

Ransom

27.1.19

Video: Analyzing Encrypted Malicious Office Documents

Virus

SANS

27.1.19

Flood of Complaints to EU Countries Since Data Law Adopted

BigBrothers

Securityweek

27.1.19

Undercover Agents Target Cybersecurity Watchdog

Cyber

Securityweek

27.1.19

Ursnif Trojan Uses Fileless Persistence and CAB for Stealthily Data Exfiltration

Virus

Securityweek

27.1.19

Trump Ally Stone Charged With Lying About Hacked Emails

BigBrothers

Securityweek

27.1.19

Local privilege escalation bug fixed in CheckPoint ZoneAlarm

Vulnerebility

Securityaffairs

27.1.19

Upcoming Ukraine elections in the crosshairs of hackers

BigBrothers

Securityaffairs

27.1.19

Anatova ransomware – Expert believe it will be a dangerous threat

Ransomware

Securityaffairs

27.1.19

Using steganography to obfuscate PDF exploits

Exploit

Securityaffairs

26.1.19

Check Point ZoneAlarm Flaw Allows Privilege Escalation

Vulnerebility

Securityweek

26.1.19

Flood of Complaints to EU Countries Since Data Law Adopted

BigBrothers

Securityweek

26.1.19

The Story of Manuel’s Java RAT.

Virus

Securityaffairs

26.1.19

“Collection #1” Data Breach Analysis – Part 2

Incindent

Securityaffairs

26.1.19

Are you Ready for DNS Flag Day?

Security

SANS

26.1.19

Phishing Campaign Delivers Nasty Ransomware, Credential-Theft Two-Punch

Ransomware

Threatpost

26.1.19

Razy Malware Attacks Browser Extensions to Steal Cryptocurrency

Cryptocurrency

Threatpost

26.1.19

LabKey Vulnerabilities Threaten Medical Research Data

Vulnerebility

Threatpost

25.1.19

YouTube to Stop Recommending Conspiracy Theory Videos

IT

Bleepingcomputer

25.1.19

PowerShell Command Leaks "April 2019 Update" as Next Windows 10 Update

IT

Bleepingcomputer

25.1.19

GDPR Behind 42K Data Breach Notifications, 255 Investigations

Privacy

Bleepingcomputer

25.1.19

U.S. Government Systems Will Be 'At Risk for Years to Come'

BigBrothers

Bleepingcomputer

25.1.19

VeryMal Malvertiser Delivers Image-Based Malware

Virus

Bleepingcomputer

25.1.19

How Reserved Storage Works in the Next Version of Windows 10

IT

Bleepingcomputer

25.1.19

Two distinct campaigns are spread GandCrab ransomware and Ursnif Trojan via weaponized docs

Ransomware

Securityaffairs

25.1.19

Microsoft Exchange zero-day and exploit could allow anyone to be an admin

Vulnerebility

Securityaffairs

25.1.19

"Cobalt" Hackers Use Google App Engine in Recent Attacks

APT

Securityweek

25.1.19

Hackers Using RDP Are Increasingly Using Network Tunneling to Bypass Protections

Hacking

Securityweek

25.1.19

Flaws Expose Phoenix Contact Industrial Switches to Attacks

ICS

Securityweek

25.1.19

Data Leak in Ghostscript Could Allow Command Execution

Incindent

Securityweek

25.1.19

CISSP Price Hike Dismays Certified Security Professionals

Security

Securityweek

25.1.19

Microsoft Chief Calls for 'Global Standard' on Privacy

Privacy

Securityweek

25.1.19

GDPR Compliance Brings Other Benefits: Cisco Study

Privacy

Securityweek

25.1.19

GandCrab ransomware and Ursnif virus spreading via MS Word macros

Ransomware

Thehackernews

25.1.19

Razy Malware Attacks Browser Extensions to Steal Cryptocurrency

Cryptocurrency

Threatpost

25.1.19

Vulnerable cloud infrastructure experiencing increasing attacks

Vulnerebility

Net-security

25.1.19

Researcher warns of privilege escalation flaw in Check Point ZoneAlarm

Vulnerebility

Net-security

25.1.19

Windows 10 Insider Build 18323 Released With Light Theme Improvements

IT

Bleepingcomputer

25.1.19

Microsoft Office 365 Now Available in the Mac App Store

IT

Bleepingcomputer

25.1.19

Google Chrome Adding Malicious Drive-By-Downloads Protection

Virus

Bleepingcomputer

25.1.19

New Ursnif Malware Campaign Uses Fileless Infection to Avoid Detection

Virus

Bleepingcomputer

25.1.19

Google Now Publicly Lists Sites Using Chrome Platform Features

IT

Bleepingcomputer

25.1.19

Microsoft Adds OneDrive Cloud File Sharing to Skype

IT

Bleepingcomputer

25.1.19

AA19-024A : DNS Infrastructure Hijacking Campaign

CERT

US CERT

25.1.19

Kaspersky links GreyEnergy and Zebrocy activities

APT

Securityaffairs

25.1.19

New Russian Language Malspam is delivering Redaman Banking Malware

Virus

Securityaffairs

25.1.19

Google to Appeal 50-Million-Euro French Data Consent Fine

Privacy

Securityweek

25.1.19

AWS Provides Secure Access to Internal Assets With Amazon WorkLink

Security

Securityweek

25.1.19

Ongoing Campaign Delivers Redaman Banking Trojan

Virus

Securityweek

25.1.19

Fighting Fire with Fire: API Automation Risks

Security

Threatpost

25.1.19

GDPR-ready organizations see lowest incidence of data breaches

Privacy

Net-security

25.1.19

83% of global respondents experienced phishing attacks in 2018

Phishing

Net-security

25.1.19

The most effective security strategies to guard sensitive information

Security

Net-security

25.1.19

Enterprises turn to MSPs to mitigate huge skills gap concerns

Security

Net-security

24.1.19

Check Point Fixes Privilege Escalation Bug in ZoneAlarm Free

Vulnerebility

Bleepingcomputer

24.1.19

NumPy Is Awaiting Fix for Critical Remote Code Execution Bug

Vulnerebility

Bleepingcomputer

24.1.19

GDPR Compliance Lowers Data Breach Frequency and Impact Says Report

Privacy

Bleepingcomputer

24.1.19

Beware of Exit Map Spam Pushing GandCrab v5.1 Ransomware

Ransomware

Bleepingcomputer

24.1.19

Running Sysmon 8.0.0? Update to 8.0.4 to Avoid a Memory Leak

IT

Bleepingcomputer

24.1.19

Facebook Will Preemptively Close Pages of Owners Who Previously Broke Rules

Social

Bleepingcomputer

24.1.19

Researchers Create Algorithm to Protect Kids from Disturbing YouTube Videos

Security

Bleepingcomputer

24.1.19

Voicemail Phishing Campaign Tricks You Into Verifying Password

Phishing

Bleepingcomputer

24.1.19

Wine 4.0 Available with Vulkan, Direct3D 12, Game Controller Support

IT

Bleepingcomputer

24.1.19

Georgia Official Seeks to Replace Criticized Voting Machines

BigBrothers

Securityweek

24.1.19

State of Malware: Attacks on Business Grow as Threats Become More Sophisticated

Virus

Securityweek

24.1.19

Identity Management Firm Keyfactor Raises $77 Million

IT

Securityweek

24.1.19

U.S. Senators Voice Cyber Concerns Over China-Made Metro Rail Cars

BigBrothers

Securityweek

24.1.19

Link Found Between GreyEnergy and Zebrocy Attacks

Attack

Securityweek

24.1.19

Bit-and-Piece DDoS Method Emerges to Torment ISPs

Attack

Threatpost

24.1.19

ThreatList: Credential-Sniffing Phishing Attacks Erupted in 2018

Phishing

Threatpost

24.1.19

Razy in search of cryptocurrency

Cryptocurrency

Securelist

24.1.19

GreyEnergy’s overlap with Zebrocy

APT

Securelist

24.1.19

Cisco addresses flaws in its products, including Small Business routers and Webex

Vulnerebility

Securityaffairs

24.1.19

Cisco Patches Flaws in Webex, SD-WAN, Other Products

Vulnerebility

Securityweek

24.1.19

Attackers Use Steganography to Obfuscate PDF Exploits

Exploit

Securityweek

24.1.19

Millions of PCs Found Running Outdated Versions of Popular Software

Security

Thehackernews

24.1.19

China Blocks Microsoft's Bing Search Engine, Despite Offering Censored Results

BigBrothers

Thehackernews

24.1.19

PHP PEAR supply chain attack: Backdoor added to installer

Attack

Net-security

24.1.19

Cisco fixes security holes in SD-WAN, Webex, Small Business routers

Vulnerebility

Net-security

24.1.19

Organizations waste money storing useless IT hardware

IT

Net-security

24.1.19

DHS issues emergency Directive to prevent DNS hijacking attacks

Attack

Securityaffairs

24.1.19

Expert shares PoC exploit code for remote iOS 12 jailbreak On iPhone X

Apple

Securityaffairs

24.1.19

PHP PEAR official site hacked, tainted package manager distributed for 6 months

Hacking

Securityaffairs

24.1.19

EU-Japan Deal to Protect Data Exchanges Takes Effect

BigBrothers

Securityweek

24.1.19

Apple Patches Dozens of Vulnerabilities in iOS, macOS

Apple

Securityweek

24.1.19

Code Execution Vulnerability Impacts Linux Package Manager

Vulnerebility

Securityweek

24.1.19

WhiteHat Security Launches New Software Testing Products

Security

Securityweek

24.1.19

Malspam with Word docs uses macro to run Powershell script and steal system data

Spam

SANS

24.1.19

Malware in Ad-Based Images Targets Mac Users

Apple

Threatpost

24.1.19

Redaman Spams Russian Banking Customers with Rotating Tactics

Spam

Threatpost

24.1.19

Branching out more efficiently and securely with SD-WAN

Security

Net-security

24.1.19

Reimagining risk management to mitigate looming economic dangers

Security

Net-security

24.1.19

Microsoft remains the most impersonated brand, Netflix phishing spikes

Phishing

Net-security

24.1.19

Cyberattacks fueled by geopolitical tension are increasing

Attack

Net-security

23.1.19

New Anatova Ransomware Supports Modules for Extra Functionality

Ransomware

Bleepingcomputer

23.1.19

Online Casino Database Leaks Details of Over 100 Million Bets

Incindent

Bleepingcomputer

23.1.19

265 Researchers Take Down 100,000 Malware Distribution Websites

Virus

Bleepingcomputer

23.1.19

DHS Issues Emergency Directive to Prevent DNS Hijacking Attacks

BigBrothers

Bleepingcomputer

23.1.19

Apple Fixes Numerous Security Vulnerabilities in iOS, macOS, and More

Apple

Bleepingcomputer

23.1.19

Chroe Extension Manifest V3 May Break uBlock Origin Content Blocker

Cyber

Bleepingcomputer

23.1.19

Microsoft Releases KB4476976 Cumulative Update With Quality Improvements

Vulnerebility

Bleepingcomputer

23.1.19

Arizona Lawmaker Wants to Tax Porn to Fund Border Security

Security

Bleepingcomputer

23.1.19

Outdated Software Exposes PC Users to Security Risks Says Report

Security

Bleepingcomputer

23.1.19

Monero: Cybercrime’s Top Choice for Mining Malware

Cryptocurrency

Threatpost

23.1.19

6 Signs of Successful Threat Hunting

Cyber

Threatpost

23.1.19

‘Chaos’ iPhone X Attack Alleges Remote Jailbreak

Apple

Threatpost

23.1.19

U.S. Gov Issues Urgent Warning of DNS Hijacking Attacks

Attack

Threatpost

23.1.19

Hacker threatened a family using a Nest Camera to broadcast a fake missile attack alert

Hacking

Securityaffairs

23.1.19

Recorded Future Adds Third-Party Risk to Threat Intelligence Platform

Safety

Securityweek

23.1.19

Flaws in Moxa IIoT Product Expose ICS to Remote Attacks

IoT

Securityweek

23.1.19

Webinar Today With VirusTotal: Intelligence Powered Malware Hunting

Virus

Securityweek

23.1.19

Alphabet's Jigsaw Helps Users Identify Phishing Attacks

Phishing

Securityweek

23.1.19

Analyzing 2018 Attacks to Prepare for Those in 2019

Attack

Securityweek

23.1.19

DHS Warns Federal Agencies of DNS Hijacking Attacks

Attack

Securityweek

23.1.19

Hacker Uses Nest Camera to Broadcast Hoax Nuke Alert

Hacking

Securityweek

23.1.19

Chinese Hacker Publishes PoC for Remote iOS 12 Jailbreak On iPhone X

Apple

Thehackernews

23.1.19

Someone Hacked PHP PEAR Site and Replaced the Official Package Manager

Hacking

Thehackernews

23.1.19

RogueRobin Malware Uses Google Drive as C2 Channel

Virus

Threatpost

23.1.19

Microsoft Windows RCE Flaw Gets Temporary Micropatch

Vulnerebility

Threatpost

23.1.19

Apple delivers security patches, plugs an RCE achievable via FaceTime

Apple

Net-security

23.1.19

DHS Orders U.S. Federal Agencies to Audit DNS Security for Their Domains

BigBrothers

Thehackernews

23.1.19

Community Project Crushes 100,000 Malware Sites in 10 Months

Virus

Securityweek

23.1.19

Hacker Uses Nest Camera to Broadcast Hoax Nuke Alert

Hacking

Securityweek

23.1.19

URLhaus identified and shut down 100,000 malware sites in 10 Months

Virus

Securityaffairs

23.1.19

Critical flaw in Linux APT package manager could allow remote hack

Vulnerebility

Securityaffairs

23.1.19

0patch releases unofficial security patches for 3 Windows flaws yet to be fixed

Vulnerebility

Securityaffairs

23.1.19

Google Fined $57M in Largest GDPR Slap Yet

Privacy

Threatpost

23.1.19

Adobe Issues Unscheduled Updates for Experience Manager Platform

Vulnerebility

Threatpost

23.1.19

How Web Apps Can Turn Browser Extensions Into Backdoors

Virus

Threatpost

23.1.19

Cybercriminals increasingly taking aim at businesses

CyberCrime

Net-security

23.1.19

Debunkng conventional wisdom to get out of the security and privacy rut

Privacy

Net-security

23.1.19

Should enterprises delay efforts to remediate most vulnerabilities?

Vulnerebility

Net-security

23.1.19

Most out of date applications exposed: Shockwave, VLC and Skype top the list

Hacking

Net-security

22.1.19

Microsoft Announces New Windows 10 Devices, Personalized Learning Tools

IT

Bleepingcomputer

22.1.19

Remote Code Exeution Bug Patched in APT Linux Package Manager

APT

Bleepingcomputer

22.1.19

Windows Contacts Remote Code Execution Zero-Day Gets Micropatch

Vulnerebility

Bleepingcomputer

22.1.19

Apple Pay Rolls Out to Target, Taco Bell and Other Top US Retailers

Apple

Bleepingcomputer

22.1.19

Malwarebytes Fixes Windows 7 Freeze Problem in New Update

Vulnerebility

Bleepingcomputer

22.1.19

New Rumba STOP Ransomware Being Installed by Software Cracks

Ransomware

Bleepingcomputer

22.1.19

Ransomware Attacks May Soon Require Disclosure in North Carolina

Ransomware

Bleepingcomputer

22.1.19

Malware, User Privacy Failures Found in Top Free VPN Android Apps

Virus

Bleepingcomputer

22.1.19

Windows Zero-Day Bug That Lets Attackers Read Any File Gets Micropatch

Vulnerebility

Bleepingcomputer

22.1.19

Data Collected from Old Breaches Is Not a New Data Breach

Incindent

Bleepingcomputer

22.1.19

Google Fined €50 Million by French Watchdog for Lack of Transparency

Privacy

Bleepingcomputer

22.1.19

MySQL Design Flaw Allows Malicious Servers to Steal Files from Clients

Vulnerebility

Bleepingcomputer

22.1.19

Ex-Employee Hacks WPML WordPress Plugin Site and Spams Users

Hacking

Bleepingcomputer

22.1.19

Adobe fixed XSS flaws in Experience Manager that can result in information Disclosure

Vulnerebility

Securityaffairs

22.1.19

Did you win at online casinos? Watch out, your data might have had exposed online

Incindent

Securityaffairs

22.1.19

Unofficial Patches Released for Three Unfixed Windows Flaws

Vulnerebility

Securityweek

22.1.19

GDPR Complaints Filed Against Eight International Streaming Companies

Privacy

Securityweek

22.1.19

Let's Encrypt Begins Retirement of TLS-SNI-01 Validation

Crypto

Securityweek

22.1.19

Proposed Law Classifies Ransomware Infection as a Data Breach

Ransomware

Securityweek

22.1.19

WhatsApp Fights Fake News With Message Forwarding Limit

Social

Securityweek

22.1.19

Adobe Patches Information Disclosure Flaws in Experience Manager

Vulnerebility

Securityweek

22.1.19

Russian Watchdog Launches 'Administrative Proceedings' Against Facebook, Twitter

BigBrothers

Securityweek

22.1.19

The Geopolitical Influence on Business Risk Management

BigBrothers

Securityweek

22.1.19

Mitsubishi Develops Cybersecurity Technology for Cars

Cyber

Securityweek

22.1.19

Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems

APT

Thehackernews

22.1.19

Threat Trends Analysis Report

Cyber blog

Checkpoint

22.1.19

A Nasty Trick: From Credential Theft Malware to Business Disruption

Malware blog

FireEye

22.1.19

Global DNS Hijacking Campaign: DNS Record Manipulation at Scale

Hacking blog

FireEye

22.1.19

Digging Up the Past: Windows Registry Forensics Revisited

Security blog

FireEye

22.1.19

OVERRULED: Containing a Potentially Destructive Adversary

APT blog

FireEye

22.1.19

Alleged Russian Hacker Pleads Not Guilty After Extradition to United States

BigBrothers

Thehackernews

22.1.19

New malware found using Google Drive as its command-and-control server

Virus

Thehackernews

22.1.19

Google fined $57 million by France for lack of transparency and consent

Privacy

Thehackernews

22.1.19

VLC Responds to Criticism Over Lack of HTTPS for Updates

Security

Securityweek

22.1.19

Mitsubishi Develops Cybersecurity Technology for Cars

Cyber

Securityweek

22.1.19

A flaw in MySQL could allow rogue servers to steal files from clients

Vulnerebility

Securityaffairs

22.1.19

France watchdog fines Google with $57 million under the EU GDPR

Privacy

Securityaffairs

22.1.19

0patch releases micropatch for Windows Contacts RCE zero-day

Vulnerebility

Net-security

22.1.19

Industry reactions to Google’s €50 million GDPR violation fine

Privacy

Net-security

22.1.19

Business resilience should be a core company strategy, so why are businesses struggling to take action?

Security

Net-security

22.1.19

Agents of disruption: Four testing topics argue the case for agentless security

Security

Net-security

22.1.19

SSDP amplification attacks rose 639%

Attack

Net-security

22.1.19

DNS Firewalling with MISP

Safety

SANS

21.1.19

Taking a page from the kernel's book: A TLB issue in mremap()

Bug blog

Project Zero

21.1.19

NRSMiner updates to newer version

Cryptocurrency blog

F-Secure Blog

21.1.19

Twitter bug may have exposed private tweets of Android users for years

Social blog

Eset

21.1.19

Two men charged with hacking into SEC in stock-trading scheme

Hacking blog

Eset

21.1.19

773 million email IDs, 21 million passwords for anyone to see in massive data dump

Incident blog

Eset

21.1.19

New Year’s resolutions: Routing done right

Hardware blog

Eset

21.1.19

Car and almost $1m on offer for Tesla Model 3 hacks

Hacking blog

Eset

21.1.19

What makes a cybercriminal?

Cyber blog

Eset

21.1.19

Face unlock on many Android smartphones falls for a photo

Hardware blog

Eset

21.1.19

Omron addressed multiple flaws in its CX-Supervisor product

Vulnerebility

Securityaffairs

21.1.19

France Hits Google With 50 Million Euro Data Consent Fine

Privacy

Securityweek

21.1.19

DarkHydrus Hackers Use Google Drive in Recent Attacks

APT

Securityweek

21.1.19

Websites Can Exploit Browser Extensions to Steal User Data

Exploit

Securityweek

21.1.19

Report: Facebook's Privacy Lapses May Result in Record Fine

Social

Securityweek

21.1.19

Former Employee Hacks Popular WordPress Plugin’s Website

Hacking

Securityweek

21.1.19

Flaws in Omron HMI Product Exploitable via Malicious Project Files

Vulnerebility

Securityweek

21.1.19

DNC: Russian Hackers Attacked Us Again After Midterm Elections

BigBrothers

Securityweek

21.1.19

Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution

Vulnerebility

Net-security

21.1.19

Iranian developer advertised BlackRouter RaaS

BigBrothers

Securityaffairs

21.1.19

Unpatched Cisco critical flaw CVE-2018-15439 exposes small Business Networks to hack

Vulnerebility

Securityaffairs

21.1.19

Russian hacker Alexander Zhukov extradited by Bulgaria to US

BigBrothers

Securityaffairs

21.1.19

Microsoft launches Azure DevOps bug bounty program

Security

Net-security

21.1.19

Beware the man in the cloud: How to protect against a new breed of cyberattack

Security

Net-security

21.1.19

Machine learning trumps AI for security analysts

Security

Net-security

21.1.19

Cybercrime could cost companies trillions over the next five years

CyberCrime

Net-security

21.1.19

Researchers analyze DDoS attacks as coordinated gang activities

Attack

Net-security

20.1.19

DarkHydrus APT Uses Google Drive to Send Commands to RogueRobin Trojan

APT

Bleepingcomputer

20.1.19

Mozilla is Adding an Ad Blocker to Firefox Focus 9.0

Security

Bleepingcomputer

20.1.19

Phishing Attack Allegedly Targeted US DNC After 2018 Midterms

Phishing

Bleepingcomputer

20.1.19

Fallout Exploit Kit is Back with New Vulnerabilities and Payloads

Exploit

Bleepingcomputer

20.1.19

Amazon, Apple, Others Hit with GDPR Complaints, €18.8B Maximum Penalties

Privacy

Bleepingcomputer

20.1.19

Vulnerabilities Found in Highly Popular Firmware for WiFi Chips

Vulnerebility

Bleepingcomputer

20.1.19

Facebook Caught Red Handed While Swiping Money From Children

Social

Bleepingcomputer

20.1.19

DarkHydrus adds Google Drive support to its RogueRobin Trojan

Virus

Securityaffairs

20.1.19

“Collection #1” Data Breach Analysis – Part 1

Incindent

Securityaffairs

20.1.19

6 Reasons We Need to Boost Cybersecurity Focus in 2019

Cyber

Securityaffairs

20.1.19

A bug in Microsoft partner portal ‘exposes ‘ support requests to all partners

Vulnerebility

Securityaffairs

20.1.19

ES File Explorer vulnerabilities potentially impact 100 Million Users

Vulnerebility

Securityaffairs

20.1.19

Bulgaria Extradites Russian Hacker to US: Embassy

BigBrothers

Securityweek

19.1.19

Ransom News

Ransom News

Ransom

19.1.19

Fallout Exploit Kit now includes exploit for CVE-2018-15982 Flash zero-day

Exploit

Securityaffairs

19.1.19

Android apps use the motion sensor to evade detection and deliver Anubis malware

Android

Securityaffairs

19.1.19

Oracle critical patch advisory addresses 284 flaws, 33 critical

Vulnerebility

Securityaffairs

19.1.19

Exploit for Recent Flash Zero-Day Added to Fallout Exploit Kit

Exploit

Securityweek

19.1.19

Hackers Actively Scanning for ThinkPHP Vulnerability, Akamai Says

Vulnerebility

Securityweek

19.1.19

Xbash Malware Uninstalls Cloud Security Products

Virus

Securityweek

19.1.19

Marco Rubio Proposes New Federal Data Privacy Bill

BigBrothers

Securityweek

19.1.19

Barracuda Adds Incident Response to Email Security Offering

Safety

Securityweek

19.1.19

PCI SSC Releases New Security Standards for Payment Software

Security

Securityweek

19.1.19

Microsoft Launches Azure DevOps Bug Bounty Program

Security

Securityweek

19.1.19

Rate of Cybersecurity Venture Funding Not Sustainable, Investors Say

Cyber

Securityweek

19.1.19

Impact of U.S. Government Shutdown on Cybersecurity: Feedback Friday

BigBrothers

Securityweek

19.1.19

Threatpost News Wrap Podcast For Jan. 18

Security

Threatpost

19.1.19

Twitter Android Glitch Exposed Private Tweets for Years

Social

Threatpost

19.1.19

Critical, Unpatched Cisco Flaw Leaves Small Business Networks Wide Open

Vulnerebility

Threatpost

19.1.19

Google Play Removes Malicious Malware-Ridden Apps

Android

Threatpost

19.1.19

Fallout EK Retools for a Fresh New 2019 Look

Exploit

Threatpost

19.1.19

Sextortion Bitcoin on the Move

Cryptocurrency

SANS

18.1.19

Windows Zero-Day Bug that Overwrites Files Gets Interim Fix

Vulnerebility

Bleepingcomputer

18.1.19

BlackRouter Ransomware Promoted as a RaaS by Iranian Developer

Ransomware

Bleepingcomputer

18.1.19

Twitter Fixes Four Year Old Bug in Android App Exposing Private Tweets

Social

Bleepingcomputer

18.1.19

Data Breach Collection with 773 Million Email Entries Leaked Online

Incindent

Bleepingcomputer

18.1.19

ES File Explorer Flaws Put 100 Million Users' Data at Risk, Fix Promised

Vulnerebility

Bleepingcomputer

18.1.19

Microsoft Launches Azure DevOps Bounty Program

Security

Bleepingcomputer

18.1.19

Android Apps Steal Banking Info, Use Motion Sensor to Evade Detection

Android

Bleepingcomputer

18.1.19

Fake GPS Apps with 50M Installs Just Show Ads and Run Google Maps

Android

Bleepingcomputer

18.1.19

Rocke's Cryptominers Kills Competition, Uninstall Cloud Security Products

Cryptocurrency

Bleepingcomputer

18.1.19

Flaw in Telegram Reveals Awful OpSec from Malware Author

Vulnerebility

Bleepingcomputer

18.1.19

Banks in West Africa Hit with Off-The-Shelf Malware, Free Tools

Safety

Bleepingcomputer

18.1.19

Emsisoft Browser Security Protects You from Malicious Sites

Safety

Bleepingcomputer

18.1.19

Bipartisan Bill Introduced to Ban Sale of US Tech to Chinese Companies

BigBrothers

Bleepingcomputer

18.1.19

Windows 10 19H1 Update Splits Up Windows Search and Cortana

IT

Bleepingcomputer

18.1.19

Windows 10 Insider Build 18317 Released and Breaks WSL Again

IT

Bleepingcomputer

18.1.19

EU Copyright Directive to Turn Google into Ghost Town

Privacy

Bleepingcomputer

18.1.19

Over 140 International Airlines Affected by Major Security Breach

Incindent

Bleepingcomputer

18.1.19

LoJax Command and Control Domains Still Active

Virus

Bleepingcomputer

18.1.19

MageCart Skimmer Hits Hundreds of Sites In Ad Supply Chain Attack

Attack

Bleepingcomputer

18.1.19

Facebook Closes Hundreds of 'Inauthentic' Russia-Linked Pages

Social

Securityweek

18.1.19

Bug in Twitter Android App Exposed Protected Tweets

Social

Securityweek

18.1.19

Portuguese Hacker Linked to 'Football Leaks' Held in Hungary

Hacking

Securityweek

18.1.19

New Android Malware Apps Use Motion Sensor to Evade Detection

Android

Thehackernews

18.1.19

A Twitter Bug Left Android Users' Private Tweets Exposed For 4 Years

Social

Thehackernews

18.1.19

Twitter fixed a bug in its Android App that exposed Protected Tweets

Social

Securityaffairs

18.1.19

Attacks in the wild leverage flaw in ThinkPHP Framework

Vulnerebility

Securityaffairs

18.1.19

Cyber-Jackpot: 773M Credentials Dumped on the Dark Web

Cyber

Threatpost

18.1.19

Microsoft Launches Azure DevOps Bug Bounty Program

Security

Threatpost

18.1.19

Apple CEO Demands Federal Data Privacy Legislation

Apple

Threatpost

18.1.19

Most Facebook users aren’t aware that Facebook tracks their interests

Social

Net-security

18.1.19

Mining malware evades agent-based cloud security solutions

Cryptocurrency

Net-security

18.1.19

New requirements for the secure design and development of modern payment software

Security

Net-security

18.1.19

Protecting privileged access in DevOps and cloud environments

Safety

Net-security

18.1.19

Risk managers see cybersecurity as the biggest threat to business

Cyber

Net-security

17.1.19

Collection #1 dump, 773 million emails, 21 million passwords

Security