Home  2019  2018  2017  2016  0  1  2  3  4  5

Date

Name

Category

Web

13.8.19

AT&T, T-Mobile, Sprint, Verizon Blasted For Data Privacy Policies

Privacy

Threatpost
13.8.19

4 Dating Apps Pinpoint Users’ Precise Locations – and Leak the Data

Incindent

Threatpost
13.8.19

Recently Cloud Atlas used a new piece of polymorphic malware

CyberSpy  Virus

Securityaffairs

13.8.19

FBI is searching for contractors to monitor social media

BigBrothers

Securityaffairs
13.8.19

'Cloud Atlas' Cyberspies Use Polymorphic Malware in Government Attacks

CyberSpy  Virus

Securityweek
13.8.19

Android Users Can Now Log in to Google Services Using Fingerprint

Android

Thehackernews
13.8.19

Malicious .DAA Attachments

Virus

SANS
13.8.19

SOC-as-a-Service promises threat protection in a world of scarce resources

Safety

Net-security
13.8.19

Anomali discovers phishing campaign targeting Chinese government agencies

Phishing

Net-security
13.8.19

Nmap 7.80 released: A mature Npcap Windows packet capturing driver, 11 new NSE scripts

Safety

Net-security
12.8.19

Gamers Beware: Zero-Day in Steam Client Affects All Windows Users

Vulnerebility

Threatpost

12.8.19

DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR

Congress

Threatpost

12.8.19

Recent Cloud Atlas activity

APT

Securelist
12.8.19

Watch out, your StockX account details may be available in crime forums

Crime

Securityaffairs

12.8.19

Infecting Canon EOS DSLR camera with ransomware over the air

Ransomware

Securityaffairs
12.8.19

FBI, Facebook Could Clash Over Privacy vs. Monitoring

BigBrothers

Securityweek
12.8.19

Researchers Demonstrate Ransomware Attack on DSLR Camera

Ransomware

Securityweek
12.8.19

McAfee Strengthens Container Security Capabilities With NanoSec Acquisition

Security

Securityweek
12.8.19

Apple Offers Up to $1 Million in Public Bug Bounty Program

Apple

Securityweek
12.8.19

'Saefko' Multi-Layered RAT Can Spread via USB Drives

Virus

Securityweek
12.8.19

Canon DSLR Cameras Can Be Hacked With Ransomware Remotely

Ransomware

Thehackernews

12.8.19 Beware of Fake Microsoft Account Unusual Sign-in Activity Emails Security

Bleepingcomputer

12.8.19 Database from StockX Hack Sold Online, Check If You're Included Hacking

Bleepingcomputer

12.8.19 Canon DSLR Camera Infected with Ransomware Over the Air Ransomware

Bleepingcomputer

12.8.19 Windows 10 Security Alert: Vulnerabilties Found in Over 40 Drivers Vulnerebility

Bleepingcomputer

12.8.19 Google Chrome Incognito Mode Can Still Be Detected by These Methods Security

Bleepingcomputer

12.8.19 Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoor Vulnerebility

Securityaffairs

12.8.19 Gaining remote code execution using a tainted SQLite database Exploit Securityaffairs
12.8.19 Vulnerabilities in Device Drivers From 20 Vendors Expose PCs to Persistent Malware Vulnerebility  Virus Securityweek
12.8.19 Over 40 Drivers Could Let Hackers Install Persistent Backdoor On Windows PCs Virus Thehackernews
12.8.19 Recon Montreal 2019 Conference Press Conference Press
12.8.19 DefCon27 Conference Press Conference Press
12.8.19 BlackHat 2019 USA Conference Press Conference Press
12.8.19

Nmap Defcon Release: 7.80

Security Net-security
12.8.19

Moving away from spreadsheets: How to automate your third-party risk management process

Security Net-security
12.8.19

Pitfalls to avoid when improving your software development skills

Security Net-security
12.8.19

Kubernetes security matures: Inside the project’s first audit

Security Net-security

11.8.19

DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo

Congress

Threatpost

11.8.19

DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack

Congress

Threatpost

11.8.19

Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster

Security

Threatpost

11.8.19

Ransom News Ransom News Ransom News

11.8.19

Boffins hacked Siemens Simatic S7, most secure controllers in the industry ICS

Securityaffairs

11.8.19 10-year-old vulnerability in Avaya VoIP Phones finally fixed Vulnerebility

Securityaffairs

11.8.19 City of Naples, Florida, lost $700K after a cyberattack Attack

Securityaffairs

11.8.19 Varenyky Spambot Trojan targets French users in alleged sextortion campaign Spam  Virus

Securityaffairs

11.8.19 Android Apps containing Clicker Trojan installed on over 100M devices Android Securityaffairs

10.8.19

Facebook hits two app developers with lawsuit

Social blog

Eset

10.8.19

Varenyky: Spambot à la Française

Spam blog

Eset

10.8.19

FBI warns of romance scams using online daters as money mules

BigBrother blog

Eset

10.8.19

Sharpening the Machete

Cyber blog

Eset

10.8.19

Vulnerability Spotlight: Multiple vulnerabilities in NVIDIA Windows GPU Display Driver, VMware ESXi, Workstation and Fusion

Vulnerebility blog

Cisco Talos

10.8.19

Malvertising: Online advertising's darker side

Malware blog

Cisco Talos

10.8.19

The Fully Remote Attack Surface of the iPhone

Hardware blog  OS Blog

Project Zero

10.8.19

Reverse RDP Attack: The Hyper-V Connection

Hacking blog

Checkpoint

10.8.19

Black Hat 2019 – WhatsApp Protocol Decryption for Chat Manipulation and More

Hacking blog

Checkpoint

10.8.19

Finding Evil in Windows 10 Compressed Memory, Part Three: Automating Undocumented Structure Extraction

Hacking blog

FireEye

10.8.19

APT41: A Dual Espionage and Cyber Crime Operation

APT blog

FireEye

10.8.19

Commando VM 2.0: Customization, Containers, and Kali, Oh My!

Safety blog

FireEye

10.8.19

Finding Evil in Windows 10 Compressed Memory, Part Two: Virtual Store Deep Dive

Hacking blog

FireEye

10.8.19

From Building Control to Damage Control: A Case Study in Industrial Security Featuring Delta’s enteliBUS Manager

ICS blog

Mcafee blog

10.8.19

HVACking: Understanding the Delta Between Security and Reality

Hacking blog

Mcafee blog

10.8.19

Avaya Deskphone: Decade-Old Vulnerability Found in Phone’s Firmware

Hardware blog

Mcafee blog

10.8.19

MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play

Malware blog

Mcafee blog

10.8.19

The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land

Hacking blog

Mcafee blog

10.8.19

SODINOKIBI: THE CROWN PRINCE OF RANSOMWARE

Ransomware blog

Cybereason

10.8.19

KDE Vulnerability Fixed By Removing Shell Command Support Vulnerebility

Bleepingcomputer

10.8.19

Microsoft Office Phishers Move to Enterprise AWS Landing Pages Phishing

Bleepingcomputer

10.8.19

Android Apps With Over 100M Installs Contain a Clicker Trojan Android

Bleepingcomputer

10.8.19

Customer Information Exposed In Air New Zealand Phishing Attack Phishing

Bleepingcomputer

10.8.19

Apple Opens Its Invite-Only Bug Bounty Program to All Researchers Apple

Bleepingcomputer

10.8.19

Microsoft 365 to Get Enhanced Suspicious Content Submission Security

Bleepingcomputer

10.8.19

3Fun Dating App Exposes Exact Location of Users and Personal Info Privacy

Bleepingcomputer

10.8.19

DEF CON 2019: Researchers Demo Hacking Google Home for RCE

Congress

Threatpost

10.8.19

Hack of High-End Hotel Smart Locks Shows IoT Security Fail

IoT

Threatpost

10.8.19

DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover

Congress

Threatpost

10.8.19

Election Security Threats: From Misinformation to Voting Machine Flaws

Vulnerebility

Threatpost

10.8.19

Decryptor JSWorm 4.0

Anti-Ransom Tool

Anti-Ransom Tool

10.8.19

Emsisoft released a free decryptor for JSWorm 4.0

Ransomware

Securityaffairs

10.8.19

3Fun Dating App leaked members’ location and personal details

Incindent

Securityaffairs

9.8.19

Steam Zero-Day Vulnerability Affects Over 100 Million Users

Vulnerebility

Bleepingcomputer

9.8.19

Avaya VoIP Phones Harbored 10-year Old Vulnerability

Vulnerebility

Bleepingcomputer

9.8.19

Two New Windows 10 19H2 Builds Released to Test CFR

OS

Bleepingcomputer

9.8.19

US Accounts for More than Half of World's Ransomware Attacks

Ransomware

Bleepingcomputer

9.8.19

New Trojan Records Your Screen When on Sex Related Sites

Virus

Bleepingcomputer

9.8.19

Google News Bug Preventing New Stories from Being Indexed

Vulnerebility

Bleepingcomputer

9.8.19

Microsoft Edge Dev Updated Released With Improvements

IT

Bleepingcomputer

9.8.19

State Farm Accounts Compromised in Credential Stuffing Attack

Attack  Incindent

Bleepingcomputer

9.8.19

National Baseball Hall of Fame Hit By Payment Card Stealing Attack

Attack  Incindent

Bleepingcomputer

9.8.19

Microsoft Ignored RDP Vulnerability Until it Affected Hyper-V

Vulnerebility

Bleepingcomputer

9.8.19

Microsoft Releases August 2019 Office Updates With Fixes, Improvements

Vulnerebility

Bleepingcomputer

9.8.19

Windows 10 Insider Build 18956 Brings the Always on Top Calculator

OS

Bleepingcomputer

9.8.19

Apple announces major changes to its bug bounty program, including higher rewards

Apple

Securityaffairs

9.8.19

Vulnerability Has Been Lurking in Avaya Phones for 10 Years

Vulnerebility

Securityweek

9.8.19

Hidden Injection Flaws Found in BIG-IP Load Balancers

Hacking

Securityweek

9.8.19

Repurposing Mac Malware Not Difficult, Researcher Shows

Apple

Securityweek

9.8.19

Google Chrome Tests Feature That Gives Any Site a Dark Mode

Security

Bleepingcomputer

9.8.19

Google's Cloud IAP Now Generally Available for Cloud VM Clients

Security

Bleepingcomputer

9.8.19

New ISOs of Windows 10 20H1 Update Released

OS

Bleepingcomputer

9.8.19

Leapfrog Children’s Tablet Owners Should Remove Pet Chat Now

Security

Bleepingcomputer

9.8.19

Lokibot Uses Image Files to Hide Code for Unpacking Routine

BotNet

Bleepingcomputer

9.8.19

Fraudster Unlocks Over 2 Million AT&T Phones, Pays $1 Million

Incindent  Mobil

Bleepingcomputer

9.8.19

SWAPGS Vulnerability in Modern CPUs Fixed in Windows, Linux, ChromeOS

Vulnerebility

Bleepingcomputer

9.8.19

New Echobot Botnet Variant Uses Over 50 Exploits to Propagate

BotNet

Bleepingcomputer

9.8.19

Zero-Day Bug in KDE 4/5 Executes Commands by Opening a Folder

Vulnerebility

Bleepingcomputer

9.8.19

AT&T Launches Public Bug Bounty Program on HackerOne

Security

Bleepingcomputer

9.8.19

Clever Amazon Phishing Scam Creates Login Prompts in PDF Docs

Phishing

Bleepingcomputer

9.8.19

FBI Warns of Romance Scams Turning Victims into Money Mules

BigBrothers  Spam

Bleepingcomputer

9.8.19

New Windows 10 Cloud Reset Feature Spotted in Insider Builds

OS

Bleepingcomputer

9.8.19

Microsoft To Disable VBScript by Default on August 13th

Security

Bleepingcomputer

9.8.19

New Lord Exploit Kit Pushes njRAT and ERIS Ransomware

Exploit  Ransomware

Bleepingcomputer

9.8.19

CafePress Data Breach Exposes Personal Info of 23 Million Users

Incindent

Bleepingcomputer

9.8.19

Apple expands bug bounty program, opens it to all researchers, raises rewards

Apple

Net-security

9.8.19

Apple will now pay hackers up to $1 million for reporting vulnerabilities

Apple

Thehackernews

9.8.19

Critical RCE Bug Found Lurking in Avaya VoIP Phones

Vulnerebility

Threatpost

9.8.19

Researchers Bypass Apple FaceID Using Biometrics ‘Achilles Heel’

Apple

Threatpost

9.8.19

Black Hat 2019: Addressing Supply-Chain Risk Starts with People, Microsoft Says

Congress

Threatpost

9.8.19

Apple Upgrades Bug Bounty Program: Adds Macs, $1M Reward

Apple

Threatpost

9.8.19

State Farm Falls Victim to Credential-Stuffing Attack

Attack  Incindent

Threatpost

9.8.19

Phishing Attacks Enlist Amazon AWS, Microsoft Azure in Ploys

Phishing

Threatpost

9.8.19

Vulnerabilities in Siemens’ most secure industrial PLCs can lead to industrial havoc

ICS

Net-security

9.8.19

A Zero-Day in Steam client for Windows affects over 100 Million users

Vulnerebility

Securityaffairs

9.8.19

WhatsApp flaws allow the attackers to manipulate conversations

Social

Securityaffairs

9.8.19

New strain of Clipsa malware launches brute-force attacks on WordPress sites

Virus

Securityaffairs

9.8.19

Broadcom to Buy Symantec Enterprise Unit for $10.7 Billion

IT

Securityweek

9.8.19

Hackers Can Use Rogue Engineering Stations to Target Siemens PLCs

ICS

Securityweek

9.8.19

New Windows Process Injection Can Be Useful for Stealthy Malware

Virus

Securityweek

9.8.19

Privacy Platform Provider Securiti.ai Emerges From Stealth With $31 Million Funding

IT

Securityweek

9.8.19

GM Cruise Releases Automated Firmware Security Analyzer to Open Source

Security

Securityweek

9.8.19

Researchers Find Vulnerabilities in Boeing 787 Firmware

Vulnerebility

Securityweek

9.8.19

100% JavaScript Phishing Page

Phishing

SANS

9.8.19

Security flaw could turn load balancers into beachheads for cyber attacks

Vulnerebility

Net-security

9.8.19

August 2019 Patch Tuesday forecast: Expect updates from Adobe, stay current on other updates

Vulnerebility

Net-security

9.8.19

Six critical areas to focus on when integrating DevSecOps into an organization

Security

Net-security

8.8.19

[Guest Diary] The good, the bad and the non-functional, or "how not to do an attack campaign"

CyberCrime

SANS

8.8.19

Photo gallery: Black Hat USA 2019, part two

Congress

Net-security

8.8.19

AttackSurfaceMapper automates the reconnaissance process

Security

Net-security

8.8.19

Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack

Congress

Threatpost

8.8.19

DEF CON 2019: 35 Bugs in Office Printers Offer Hackers an Open Door

Congress

Threatpost

8.8.19

New SWAPGS Side-Channel Attack Bypasses Spectre and Meltdown Defenses

Attack

Threatpost

8.8.19

Black Hat 2019: WhatsApp Users Still Open to Message Manipulation

Congress

Threatpost

8.8.19

Researchers Bypass Apple FaceID Using Biometrics ‘Achilles Heel’

Apple

Threatpost

8.8.19

Ransomware Sees Triple-Digit Spike in Corporate Detections

Ransomware

Threatpost

8.8.19

Phishing Attacks Enlist Amazon AWS, Microsoft Azure in Ploys

Phishing

Threatpost

8.8.19

Black Hat 2019: 5G Security Flaw Allows MiTM, Targeted Attacks

Congress

Threatpost

8.8.19

Black Hat 2019: Ethical Hackers Must Protect Digital Human Rights

Congress

Threatpost

8.8.19

Black Hat 2019: Security’s Powerful Cultural Transformation

Congress

Threatpost

8.8.19

Smominru Cryptominer Scrapes Credentials for Half-Million Machines

Cryptocurrency

Threatpost

8.8.19

Security Vulnerabilities Are Increasingly Putting Kids at Risk

Vulnerebility

Threatpost

8.8.19

Black Hat: LeapFrog Tablet Flaws Let Attackers Track, Message Kids

Congress

Threatpost

8.8.19

Vulnerability in Kubernetes Allows Access to Custom Resources

Vulnerebility

Securityweek

8.8.19

Facebook Sues Two Android App Developers for Click Injection Fraud

Android  Social

Thehackernews

8.8.19

Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises

Security

Net-security

8.8.19

Researchers uncover over 35 vulnerabilities in six leading enterprise printers

Vulnerebility

Net-security

8.8.19

American Insurance firm State Farm victim of credential stuffing attacks

Incindent

Securityaffairs

8.8.19

Cisco addressed critical flaws in Cisco Small Business 220 Series Smart Switches

Vulnerebility

Securityaffairs

8.8.19

Microsoft Says It 'Listens' to Conversations Only With Permission

Security

Securityweek

8.8.19

US Formalizes Ban on Government Contracts to China's Huawei, Others

BigBrothers

Securityweek

8.8.19

Network Shares Are a Primary Target for Ransomware

Ransomware

Securityweek

8.8.19

Cisco Patches Critical Flaws in Network Switches

Vulnerebility

Securityweek

8.8.19

Twitter Again Admits Sharing User Data Without Permission

Social

Securityweek

8.8.19

The Fundamentals of Developing Effective DevSecOps

Security

Securityweek

8.8.19

Reverse RDP Attack Also Enables Guest-to-Host Escape in Microsoft Hyper-V

Attack

Thehackernews

8.8.19

Which are the most capable breach prevention systems?

Incindent

Net-security

8.8.19

Automation, visibility remain biggest issues for cybersecurity teams

Cyber

Net-security

8.8.19

What’s cybercriminals’ most effective weapon in a ransomware attack?

Ransomware

Net-security

7.8.19

OilRig APT group: the evolution of attack techniques over time

APT

Securityaffairs

7.8.19

The number of exploits in the Echobot botnet reached 59

BotNet  Exploit

Securityaffairs

7.8.19

SQL Injection Vulnerability Exposed Starbucks Financial Records

Hacking  Vulnerebility

Securityweek

7.8.19

Millions of Devices With Intel CPUs Exposed to SWAPGS Attack

Attack

Securityweek

7.8.19

Binance KYC Data Leak — Crypto Exchange Sets $290,000 Bounty On Blackmailer

Cryptocurrency

Thehackernews

7.8.19

Warshipping: Attackers can access corporate networks through the mailroom

Attack

Net-security

7.8.19

Verifying SSL/TLS configuration (part 2)

Crypto

SANS

7.8.19

49% of all risky online transactions come from mobile devices

Mobil

Net-security

7.8.19

Critical holes plugged in Cisco 220 Series smart switches

Vulnerebility

Net-security

7.8.19

SWAPGS Attack – A new Spectre-V1 attack affects modern chips

Attack

Securityaffairs

7.8.19

New Lord Exploit Kit appears in the threat landscape

Exploit

Securityaffairs

7.8.19

Expert publicly disclosed a zero-day vulnerability in KDE

Vulnerebility

Securityaffairs

7.8.19

Crooks turn victims into money mules via confidence/romance scams

Spam

Securityaffairs

7.8.19

Developer Bypasses Chrome's Anti-Incognito Detection

Security

Securityweek

7.8.19

Baldr Malware: A Short-Lived Star or Info Stealer That Will Return?

Virus

Securityweek

7.8.19

New 'Lord' Exploit Kit Emerges

Exploit

Securityweek

7.8.19

Slack Unveils New Enterprise Security Tools

Security

Securityweek

7.8.19

Pakistani Man Bribed AT&T Employees to Unlock Phones, Plant Malware

Virus

Securityweek

7.8.19

Cloud Providers Improving Security, But Users Need to Up Their Game

Security

Securityweek

7.8.19

Russian Hackers Leverage IoT Devices to Access Corporate Networks

Hacking  IoT

Securityweek

7.8.19

KDE Linux Desktops Could Get Hacked Without Even Opening Malicious Files

Virus

Thehackernews

7.8.19

SWAPGS Attack — New Speculative Execution Flaw Affects All Modern Intel CPUs

Attack

Thehackernews

7.8.19

Pakistani Man Bribed AT&T Insiders to Plant Malware and Unlock 2 Million Phones

Virus

Thehackernews

7.8.19

Organizations are employing cyber-resilient strategies in new ways

Cyber

Net-security

7.8.19

Qualys bringing new prescription for security to Black Hat and DEF CON 2019

Congress

Net-security

7.8.19

SWAPGS Attack: A new Spectre haunts machines with Intel CPUs

Attack

Net-security

6.8.19

ECH0RAIX DECODER

Anti-Ramson Tool

Anti-Ramson Tool

6.8.19

QualPwn Bugs In Snapdragon SoC Can Attack Android Over the Air

Android

Bleepingcomputer

6.8.19

ECh0raix Ransomware Decryptor Restores QNAP Files For Free

Ransomware

Bleepingcomputer

6.8.19

Microsoft Releases Windows Terminal v0.3 With Major Improvements

OS

Bleepingcomputer

6.8.19

Monzo Asks Clients to Reset PINs After Exposure to Employees

Incindent

Bleepingcomputer

6.8.19

StockX Hack Exposes Personal Information of Customers

Hacking  Incindent

Bleepingcomputer

6.8.19

Russian APT Abuses IoT Devices to Infiltrate Corporate Targets

APT

Bleepingcomputer

6.8.19

Microsoft Invites Researchers to Hack Their Azure Security Lab

Security

Bleepingcomputer

6.8.19

How to Uninstall Windows 10 Updates Manually

OS

Bleepingcomputer

6.8.19

Is Your Email One of 200 Million Targeted by Extortion Scams?

Spam

Bleepingcomputer

6.8.19

GermanWiper Ransomware Erases Data, Still Asks for Ransom

Ransomware

Bleepingcomputer

6.8.19

Beware of Emails Asking You to "Confirm Your Unsubscribe" Request

Spam

Bleepingcomputer

6.8.19

Extortion Emails on the Rise: A Look at The Different Types

Spam

Bleepingcomputer

6.8.19

CafePress Data Breach exposes technical details of 23 Million users

Incindent

Securityaffairs

6.8.19

The Evolution of Aggah: From Roma225 to the RG Campaign

APT

Securityaffairs

6.8.19

Microsoft Offers Up to $300,000 in New Azure Security Lab

Security

Securityweek

6.8.19

Cybereason Raises an Additional $200 Million in Funding

IT

Securityweek

6.8.19

Digital bank Monzo urges customers to change PINs following security breach

CyberCrime

Net-security

6.8.19

Microsoft sets up isolated environment for bug hunters to test attacks against Azure

Vulnerebility

Net-security

6.8.19

UN Report: North Korea Cyber Experts Raised Up to $2 Billion

BigBrothers

Securityweek

6.8.19

Privacy Watchdogs Warn Facebook Over Libra Currency

Privacy  Social

Securityweek

6.8.19

Recovering Wi-Fi Password via Dragonblood Attack Costs $1 of Computing Power

Attack

Securityweek

6.8.19

QualPwn Bugs in Qualcomm chips could allow hacking Android Over the Air

Android

Securityaffairs

6.8.19

New Flaws in Qualcomm Chips Expose Millions of Android Devices to Hacking

Android

Thehackernews

6.8.19

Microsoft Lab Offers $300K For Working Azure Exploits

Exploit

Threatpost

6.8.19

Puzzling Gwmndy Botnet Focuses on Low-Volume Proxy Connections

BotNet

Threatpost

6.8.19

E3 Website Leaks Private Addresses for Thousands of Journalists

Incindent

Threatpost

6.8.19

Russia-linked STRONTIUM APT targets IoT devices to hack corporate networks

Incindent

Securityaffairs

6.8.19

StockX hacked, customers’ data offered for sale on the dark web

APT

Securityaffairs

6.8.19

Embracing the cloud and meeting its security demands

Security

Net-security

6.8.19

Prevent lateral attacks inside the data center with a defense-in-depth hardware layer

Security

Net-security

6.8.19

Online skimming: An emerging threat that requires urgent awareness and attention

Security

Net-security

6.8.19

Only 32% of government organizations consider a cloud-first strategy

Security

Net-security

5.8.19

GermanWiper, a data-wiping malware that is targeting Germany

Virus

Securityaffairs

5.8.19

ID Theft Stings, But it's Hard to Pin on Specific Data Hacks

Hacking

Securityweek

5.8.19

Industrial Giants Respond to 'Urgent/11' Vulnerabilities

Vulnerebility

Securityweek

5.8.19

JIRA Misconfiguration Leaks Data of Fortune 500 Companies

Security

Securityweek

5.8.19

Connected Cars Could be a Threat to National Security, Group Claims

Security

Securityweek

5.8.19

MegaCortex Ransomware Revamps for Mass Distribution

Ransomware

Threatpost

5.8.19

Google and ARM Tackle Android Bugs with Memory-Tagging

Android

Threatpost

5.8.19

Organizations Lack Confidence in Securing IoT, Survey Shows

IoT

Securityweek

5.8.19

Google, ARM Boost Android Security With Memory Tagging Extension

Android

Securityweek

5.8.19

DDoS attacks in Q2 2019

Attack

Securelist

5.8.19

Machete cyber-espionage group targets Latin America military

CyberSpy

Securityaffairs

5.8.19

'Machete' Cyberspies Target Military in Venezuela, Ecuador

CyberSpy

Securityweek

5.8.19

Hacking Radio Blasting Systems for Fun & Explosions

Hacking

Securityaffairs

5.8.19

Fraudster stole $870,000 from 2 US universities with spear-phishing mails

Phishing

Securityaffairs

5.8.19

VMware Patches Potentially Serious Pixel Shader Vulnerabilities

Vulnerebility

Securityweek

5.8.19

There is widespread business confusion and ignorance about the upcoming CCPA regulation

Security

Net-security

5.8.19

The US Gov is testing high-altitude balloons for surveillance

BigBrothers

Securityaffairs

5.8.19

Poshmark, the social commerce marketplace, discloses a data breach

Incindent

Securityaffairs

5.8.19

Houston County Schools in Alabama delayed the school year’s opening due to a malware attack

Virus

Securityaffairs

5.8.19

DealPly adware abuses reputation services to remain under the radar

Virus

Securityaffairs

5.8.19

Sextortion: Follow the Money - The Final Chapter

Security

SANS

5.8.19

Security orchestration and automation checklist: How to choose the right vendor

Security

Net-security

5.8.19

DNS security is no longer optional

Security

Net-security

5.8.19

FSI organizations are failing to assess their software for security vulnerabilities before release

Security

Net-security

5.8.19

The persistent struggle to improve SOC productivity reveals the need for newer SIEM technologies

Security

Net-security

5.8.19

As attackers get more creative, mobile threats and attacks increase in both quantity and impact

Security

Net-security

5.8.19

Public cloud data continues to grow, headed toward $500 billion by 2023

Security

Net-security

5.8.19

Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial

Security

Net-security

4.8.19

Ransom News

Ransom

Ransom

4.8.19

Misconfigured JIRA Servers Leak Info on Users and Projects

Incindent

Bleepingcomputer

4.8.19

Windows 10 WSL2 Now Allows You to Configure Global Options

OS

Bleepingcomputer

4.8.19

NVIDIA Patches High Severity Flaws in Windows GPU Display Driver

Vulnerebility

Bleepingcomputer

4.8.19

Windows 10 1903 Blocked for Kerberos Domain Connected Devices

OS

Bleepingcomputer

4.8.19

Ransom Note Replaces 2.1M Customer Records on Open MongoDB

Ransomware

Bleepingcomputer

4.8.19

Scammer Arrested After Defrauding US Universities of Over $870K

Spam

Bleepingcomputer

4.8.19

Phishing Attacks Target US Utilities with Remote Access Trojan

Phishing  Virus

Bleepingcomputer

4.8.19

Malware Attack Delays Alabama District's School Year Twice

Attack  Virus

Bleepingcomputer

4.8.19

1M+ Payment Card Details from South Korea Sold on the Dark Web

CyberCrime

Bleepingcomputer

4.8.19

Gerry - A Font of Gerrymandered Districts to Troll Congress

IT

Bleepingcomputer

4.8.19

DRAGONBLOOD flaws allow hacking WPA3 protected WiFi passwords

Vulnerebility

Securityaffairs

4.8.19

SystemBC, a new proxy malware is being distributed via Fallout and RIG EK

Exploit

Securityaffairs

3.8.19

DHCP Client Remote Code Execution Vulnerability Demystified

Vulnerebility blog

Mcafee blog

3.8.19

Clop Ransomware

Ransomware blog

Mcafee blog

3.8.19

The Twin Journey, Part 1

Hacking blog

Mcafee blog

3.8.19

Cobalt Group Returns To Kazakhstan

Cyber blog

Checkpoint

3.8.19

BEC Scams Remain a Billion-Dollar Enterprise, Targeting 6K Businesses Monthly

Spam blog

Symantec

3.8.19

The Revival and Rise of Email Extortion Scams

Spam blog

Symantec

3.8.19

Smart TVs: Yet another way for attackers to break into your home?

Attack blog

Eset

3.8.19

From Carnaval to Cinco de Mayo – The journey of Amavaldo

Exploit blog  Vulnerebility blog

Eset

3.8.19

Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords

Hacking

Thehackernews

3.8.19

90% of Enterprise iPhone Users Open to iMessage Spy Attack

Apple

Threatpost

3.8.19

Apple Suspends Siri Program After Privacy Backlash

Apple  Privacy

Threatpost

3.8.19

Nation-State APTs Target U.S. Utilities With Dangerous Malware

APT  BigBrothers

Threatpost

3.8.19

Critical Bug in Android Antivirus Exposes Address Books

Android

Threatpost

3.8.19

Nation-state actor uses new LookBack RAT to target US utilities

Virus

Securityaffairs

3.8.19

How to Reverse Engineer, Sniff & Bruteforce Vulnerable RF Adult Toys with WHID Elite

Vulnerebility

Securityaffairs

3.8.19

New Mirai Variant Hides C&C Server on Tor Network

BotNet

Securityweek

3.8.19

Nine Distinct Threat Groups Targeting Industrial Systems: Dragos

ICS

Securityweek

3.8.19

New "LookBack" Malware Used in Attacks Against U.S. Utilities Sector

Virus

Securityweek

2.8.19

Microsoft Boosts Compromised Account Detection in Azure AD by 100%

Security

Bleepingcomputer

2.8.19

StockX Password Reset Emails Are Legit, Not a Phishing Attack

Phishing

Bleepingcomputer

2.8.19

DealPly Adware Abuses Microsoft Smartscreen to Boost AV Evasion

Virus

Bleepingcomputer

2.8.19

New SystemBC Malware Uses Your PC to Hide Malicious Traffic

Virus

Bleepingcomputer

2.8.19

PowerShell Empire Framework Is No Longer Maintained

Security

Bleepingcomputer

2.8.19

New Hexane Group Targets Oil and Gas, Telco Providers

CyberCrime

Bleepingcomputer

2.8.19

Google Chrome Hides WWW and HTTPS:// in the Address Bar Again

Security

Bleepingcomputer

2.8.19

FTC Tells Equifax Victims to Opt for Credit Monitoring Over $125

CyberCrime

Bleepingcomputer

2.8.19

Combining Low Tech Scams: SMS + SET + Credit Card Harvesting

Spam

SANS

2.8.19

US utilities targeted with spear-phishing emails impersonating engineering licensing board

Phishing

Net-security

2.8.19

Over 1 Million payment cards from South Korea sold on the Dark Web

CyberCrime

Securityaffairs

2.8.19

Lotsy group targets Italian and Spanish-speaking users

CyberCrime

Securityaffairs

2.8.19

Facebook dismantled influence campaigns focused on Middle East and Northern Africa

Social

Securityaffairs

2.8.19

Recently discovered Hexane group targets the oil and gas industry

ICS

Securityaffairs

2.8.19

New Mirai botnet hides C2 server in the Tor network to prevent takedowns

BotNet

Securityaffairs

2.8.19

Unprotected Database Exposes Details of Honda's Internal Network

Incindent

Securityweek

2.8.19

Congress Wants Capital One, Amazon to Explain Data Breach

BigBrothers  Incindent

Securityweek

2.8.19

Faked Facebook Accounts Linked to Saudi Arabia, Mideast Region

Social

Securityweek

2.8.19

Scammers Grab $2.5 Million From North Carolina County in BEC Scam

Spam

Securityweek

2.8.19

Google Releases Beta of Anomaly Detection for G Suite Customers

Security

Securityweek

2.8.19

For $8.6M, Cisco Settles Suit Over Bug-Riddled Video Surveillance Software

Vulnerebility

Threatpost

2.8.19

Brand-New SystemBC Proxy Malware Spotted Using SOCKS5 for Stealth

Virus

Threatpost

2.8.19

Unpatched Flaws in IoT Smart Deadbolt Open Homes to Danger

IoT  Vulnerebility

Threatpost

2.8.19

Cylance Antivirus Products Susceptible to Concatenation Bypass

Alert

Alert

2.8.19

Five examples of user-centered bank fraud

CyberCrime

Net-security

2.8.19

Research shows that devices banned by US government lack basic security practices

BigBrothers

Net-security

2.8.19

Most interesting trends on cloud service and web usage

Security

Net-security

2.8.19

Many companies don’t know the depth of their IoT-related risk exposure

IoT

Net-security

1.8.19

What is Listening On Port 9527/TCP?

Security

SANS

1.8.19

MICROCHIPS Act aims at improving tech supply chain

Attack

Securityaffairs

1.8.19

FTC Warns Cash Option May be Small for Equifax Settlement

BigBrothers

Securityweek

1.8.19

Former NSA Contractor Edward Snowden Publishing Memoir

BigBrothers

Securityweek

1.8.19

'Hexane' Threat Actor Targeting Industrial Organizations

ICS

Securityweek

1.8.19

Alleged Capital One Hacker Barely Bothered to Hide

Hacking

Securityweek

1.8.19

Cisco ‘Knowingly’ Sold Hackable Video Surveillance System to U.S. Government

BigBrothers

Thehackernews

1.8.19

94% of attacks hitting financial services use one of four methods

Attack

Net-security

1.8.19

G Suite news: Anomalous alert activity for Google Drive, Advanced Protection for enterprise users

Safety

Net-security

1.8.19

Chrome to Add HTTP Cache Partitioning to Block Attacks, Tracking

Attack

Bleepingcomputer

1.8.19

Windows 10 Insider Build 18950 Released With Snip & Sketch Improvements

OS

Bleepingcomputer

1.8.19

Windows 10 Calculator Getting Always on Top Mode, Compact Version

OS

Bleepingcomputer

1.8.19

Unsecured Database Exposes Security Risks in Honda's Network

Incindent

Bleepingcomputer

1.8.19

Logins Stolen From Admin-Backdoored Club Penguin Rewritten Site

Virus

Bleepingcomputer

1.8.19

Enterprise Software May Transmit Data Without Your Knowledge

Security

Bleepingcomputer

1.8.19

Trivial Bugs in Western Digital SSD Utility Puts Owners at Risk

Vulnerebility

Bleepingcomputer

1.8.19

North Carolina County Lost $1.7 Million in BEC Scam

Spam

Bleepingcomputer

1.8.19

Outlook Is Down, Users Are Experiencing Sign-in Failures

Security

Bleepingcomputer

1.8.19

Chrome 76 Released With Blocked Flash, Incognito Detection Fix

Security

Bleepingcomputer

1.8.19

Russia Bans Connection to OneWeb Global Internet Satellites

BigBrothers

Bleepingcomputer

1.8.19

WSL2 Now Supports Localhost Connections From Windows 10 Apps

OS

Bleepingcomputer

1.8.19

US Govt, NGOs Ask Cyber Community to Boost Ransomware Defenses

BigBrothers  Ransomware

Bleepingcomputer

1.8.19

OXID eShop Used by Mercedes Fixes Remote Takeover Security Bug

Vulnerebility

Bleepingcomputer

1.8.19

APT trends report Q2 2019

Analysis  APT

Securelist

1.8.19

Researchers Replace IP Camera Feed With Fake Footage

Security

Securityweek

1.8.19

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US Gov

BigBrothers

Securityaffairs

1.8.19

CISA warns of critical flaws in Prima FlexAir access control system

Vulnerebility

Securityaffairs

1.8.19

Cyber attacks hit Louisiana schools ahead of year’s beginning

BigBrothers

Securityaffairs

1.8.19

DHS warns of cyber attacks against small airplanes

BigBrothers

Securityaffairs

1.8.19

DefCon CHINA

Conference

Conference

1.8.19

Trivial Bug Turns Home Security Cameras Into Listening Posts

Vulnerebility

Threatpost

1.8.19

Black Hat USA 2019 Preview

Congress

Threatpost

1.8.19

Chrome 76 Dumps Default Adobe Flash Player Support

Security

Threatpost

1.8.19

Malvertising Campaigns Skirt Ad Blockers, Serve Up Mac Malware

Apple  Virus

Threatpost

1.8.19

Honda’s Security ‘Soft Spots’ Exposed in Unsecured Database

Incindent

Threatpost

1.8.19

Passion, ingenuity and hard work: The cybersecurity startup story of Israel

Cyber

Net-security

1.8.19

Microsoft is right, mandatory password changes are obsolete

Crypto

Net-security

1.8.19

The probability that an EV SSL certificate is associated with a bad domain is 0.013%

Crypto

Net-security

1.8.19

Companies struggle with the slow, unpredictable nature of AI projects

Security

Net-security