List  Articles  Page  2019  2018  2017  2016  1  2  3  4  5  6  7  8

Date

Name

Category

Web

30.11.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in October 2019

Cyber blog

F5 Labs

30.11.19

Regional Threat Perspectives, Fall 2019: United States

Cyber blog

F5 Labs

30.11.19

FIDL: FLARE’s IDA Decompiler Library

Security blog

FireEye

30.11.19

Best practices for staying safe online during the holiday shopping season

Cyber blog

Cisco Talos

30.11.19

Smartwatch exposes locations and other data on thousands of children

Cyber blog

Eset

30.11.19

5 scams to watch out for this shopping season

Security blog

Eset

30.11.19

Cryptocurrency exchange loses US$50 million in apparent hack

Cryptocurrency blog

Eset

30.11.19

Stantinko botnet adds cryptomining to its pool of criminal activities

BotNet blog  Cryptocurrency blog

Eset

30.11.19

CyberwarCon – the future of nation‑state nastiness

Cyber blog

Eset

30.11.19

New Chrome Password Stealer Sends Stolen Data to a MongoDB Database

Hacking

Bleepingcomputer

30.11.19

Kali Linux Adds 'Undercover' Mode to Impersonate Windows 10

OS

Bleepingcomputer

30.11.19

Law Enforcement Shuts Down Imminent Monitor Malware, Makes Arrests

Virus

Bleepingcomputer

30.11.19

Amazon Plans Ring Facial Recognition-Based ‘Watch List’, Report

Security

Threatpost

30.11.19

International law enforcement operation shuts down Imminent Monitor RAT operations

Virus

Securityaffairs

30.11.19

Great Plains center hit by ransomware attack

Ransomware

Securityaffairs

29.11.19

Europol Shuts Down 'Imminent Monitor' RAT Operations With 13 Arrests

Virus

Thehackernews

29.11.19

Adobe Notifies Magento Marketplace Users of Security Breach

Incindent

Bleepingcomputer

29.11.19

Advanced Hacking Groups Keep Showing Up, Old Ones Evolve

Hacking

Bleepingcomputer

29.11.19

Beware of Thanksgiving eCard Emails Distributing Malware

Virus

Bleepingcomputer

29.11.19

Dutch Govt Warns of 3 Ransomware Infecting 1,800 Businesses

Ransomware

Bleepingcomputer

29.11.19

Group-IB presents its annual report on global threats to stability in cyberspace

CyberCrime

Securityaffairs

29.11.19

IT threat evolution Q3 2019

Analysis

Securelist

29.11.19

IT threat evolution Q3 2019. Statistics

Analysis

Securelist

29.11.19

Dutch National Cyber Security Centre warns ransomware infected thousands of businesses

BigBrothers

Securityaffairs

29.11.19

RevengeHotels campaign – crooks target the hospitality industry

Virus

Securityaffairs

29.11.19

Bytedance: The Chinese Company Behind Global TikTok Craze

BigBrothers

Securityweek

29.11.19

ISC Snapshot: Search with SauronEye

Security

SANS

29.11.19

Pain points for CTOs: A primer of the most stressful aspects of the job

Security

Net-security

28.11.19

Twitter Rolls Back Decision to Delete Inactive Accounts

Social

Bleepingcomputer

28.11.19

Ryuk Ransomware Forces Prosegur Security Firm to Shut Down Network

Ransomware

Bleepingcomputer

28.11.19

Microsoft Warns of Uncommon Windows 10 Thunderbolt Issue

OS

Bleepingcomputer

28.11.19

A Ransomware infected the network of the cybersecurity firm Prosegur

Ransomware

Securityaffairs

28.11.19

RevengeHotels: cybercrime targeting hotel front desks worldwide

APT

Securelist

28.11.19

Dexphot Malware Hijacked 80K+ Devices to Mine Cryptocurrency

Cryptocurrency  Hacking

Threatpost

28.11.19

IoT Smartwatch Exposes Kids’ Personal, GPS Data

IoT  Privacy

Threatpost

28.11.19

NSO Group President Defends Controversial Tactics

CyberCrime

Threatpost

28.11.19

SDKs Misused to Scrape Twitter, Facebook Account Info

Social  Virus

Threatpost

28.11.19

Adobe revealed that the Magento Marketplace was hacked

Hacking

Securityaffairs

28.11.19

Law enforcement agencies arrested 79 people involved in fraudulent online purchases of flight tickets

CyberCrime

Securityaffairs

28.11.19

Dexphot Malware Uses Randomization, Encryption, and Polymorphism to Evade Detection

Virus

Securityweek

28.11.19

German Court Backs Murderer's 'Right to be Forgotten'

Crime

Securityweek

28.11.19

Magento Marketplace Suffers Data Breach Exposing Users' Account Info

Incindent

Thehackernews

28.11.19

Five cybersecurity certifications that provide value to employers

Cyber

Net-security

28.11.19

How can financial institutions prevent shopping season fraud?

Security

Net-security

28.11.19

There’s no way to fill the data skills gap, what now?

Security

Net-security

27.11.19

Ransomware Locks Medical Records at Great Plains Health

Ransomware

Bleepingcomputer

27.11.19

Microsoft Adds Split Panes Feature to Windows Terminal v0.7

OS

Bleepingcomputer

27.11.19

Windows 10 2004 is the Next Feature Update, Preps for Tests

OS

Bleepingcomputer

27.11.19

Top 25 Most Dangerous Vulnerabilities Refreshed After 8 Years

Vulnerebility

Bleepingcomputer

27.11.19

Windows 10 1909 KB4517245 Update Causes File Explorer Issues

OS

Bleepingcomputer

27.11.19

HP Warns That Some SSD Drives Will Fail at 32,768 Hours of Use

Security

Bleepingcomputer

27.11.19

Almost 60% Of Malicious Ads Come from Three Ad Providers

Virus

Bleepingcomputer

27.11.19

Dexphot Polymorphic Malware Shows Complexity of Everyday Threats

Virus

Bleepingcomputer

27.11.19

New DeathRansom Ransomware Begins to Make a Name for Itself

Ransomware

Bleepingcomputer

27.11.19

Holiday Scam Season Is Here for All Shoppers

Spam

Bleepingcomputer

27.11.19

Upbit cryptocurrency exchange hacked, crooks stole $48.5 million worth of ETH

Cryptocurrency

Securityaffairs

27.11.19

Meet Kilos, a New Search Engine for the Dark Web

Security

Securityweek

27.11.19

Google Shares Data on State-Sponsored Hacking Attempts

Hacking

Securityweek

27.11.19

Hackers Steal $49 Million in Ethereum From Cryptocurrency Exchange Upbit

Cryptocurrency

Securityweek

27.11.19

Malware Found on Payment System Used by On The Border Restaurants

Virus

Securityweek

27.11.19

Over 12,000 Google Users Hit by Government Hackers in 3rd Quarter of 2019

BigBrothers

Thehackernews

27.11.19

Microsoft warns of Dexphot miner, an interesting polymorphic threat

Cryptocurrency

Securityaffairs

27.11.19

Full(z) House Magecart group mix phishing and MiTM in its attacks

Attack  CyberCrime  Phishing

Securityaffairs

27.11.19

Twitter, Facebook User Data Improperly Accessed via Malicious SDKs

Social   Virus

Securityweek

27.11.19

Latest Kali Linux OS Added Windows-Style Undercover Theme for Hackers

OS

Thehackernews

27.11.19

Magecart Group Switches Up Tactics with MiTM, Phishing

CyberCrime  Phishing

Threatpost

27.11.19

Black Friday Shoppers Targeted By Scams and Fake Domains

Spam

Threatpost

27.11.19

Austin Man Indicted for Stealing Unreleased Music from Artists

Virus

Threatpost

27.11.19

Managing the Human Security Factor in the Age of Ransomware

Ransomware

Threatpost

27.11.19

Kaspersky addressed multiple issues in online protection solutions

Vulnerebility

Securityaffairs

27.11.19

Finding an Agent Tesla malware sample

Virus

SANS

27.11.19

Most businesses have yet to allocate a CCPA compliance budget

Security

Net-security

27.11.19

Port cybersecurity: Safeguarding operations against cyber attacks

Cyber

Net-security

27.11.19

SoniTalk: A new method for near-field communication

Security

Net-security

27.11.19

As the online shopping season begins, consumers worry about cybercrime

CyberCrime

Net-security

26.11.19

Czech intelligence report warns of Russian and Chinese activity in the country

BigBrothers

Securityaffairs

26.11.19

Experts discovered control systems for aircraft warning lights open online

BigBrothers

Securityaffairs

26.11.19

Kaspersky Patches Several Vulnerabilities in Web Protection Features

Vulnerebility

Securityweek

26.11.19

The Hidden Danger in Berners-Lee's Contract for the Web

Security

Securityweek

26.11.19

Detectify Raises $23.7 Million in Series B Funding Round

IT

Securityweek

26.11.19

Attack Simulation Firm Cymulate Raises $15 Million

IT

Securityweek

26.11.19

Malicious Android SDKs Caught Accessing Facebook and Twitter Users Data

Android

Thehackernews

26.11.19

RIPlace Evasion Technique

Papers

Papers

26.11.19

Phishers Create Fake Sites as Bait for Holiday Shopping Deals

Phishing

Bleepingcomputer

26.11.19

Over 38 Million Healthcare Records Exposed in Breaches Over 2019

Incindent

Bleepingcomputer

26.11.19

Splunk Faces Y2K Bug-Like Problem Unless Patched

Vulnerebility

Bleepingcomputer

26.11.19

Mozilla to Block Fingerprinters by Default in Firefox 72

Safety

Bleepingcomputer

26.11.19

FortiGuard Used Hardcoded Key, XOR to Encrypt Communications

Safety

Bleepingcomputer

26.11.19

Scam Browser Notification Prompts Increased by 69% in 2019

Spam

Bleepingcomputer

26.11.19

Ginp Android Banker Sets as Default SMS App, Steals All Text

Android

Bleepingcomputer

26.11.19

Microsoft Fixes Windows 10 Qualcomm Wi-Fi Driver Update Block

OS

Bleepingcomputer

26.11.19

Livingston School District in New Jersey Hit With Ransomware

Ransomware

Bleepingcomputer

26.11.19

Silly Phishing Spotlight: Login to Unblock Microsoft Excel

Phishing

Bleepingcomputer

26.11.19

Spam and phishing in Q3 2019

Analysis  Spam  Phishing

Securelist

26.11.19

Facebook and Twitter warn of malicious SDK harvesting personal data from its accounts

Social  Virus

Securityaffairs

26.11.19

Some Fortinet products used hardcoded keys and weak encryption for communications

Crypto

Securityaffairs

26.11.19

Czech Intel Report Highlights Russian, Chinese Spying

BigBrothers

Securityweek

26.11.19

New 'Ginp' Android Trojan Targets Credentials, Payment Card Data

Virus

Securityweek

26.11.19

Palo Alto Networks to Acquire Aporeto for $150 Million

IT

Securityweek

26.11.19

Many Apps Impacted by GIF Processing Flaw Patched Recently in WhatsApp

Social  Vulnerebility

Securityweek

26.11.19

NYPD Fingerprint Database Taken Offline to Thwart Ransomware

Ransomware

Threatpost

26.11.19

PoS Malware Exposes Customer Data of Catch Restaurants

Virus

Threatpost

26.11.19

TrickBot Evolves to Go After SSH Keys

Virus

Threatpost

26.11.19

Lessons learned from playing a willing phish

Phishing

SANS

26.11.19

PoC exploit code for Apache Solr RCE flaw is available online

Exploit  Vulnerebility

Securityaffairs

26.11.19

Chinese Woman Sentenced to 8 Months for Trespass at Trump Resort: Report

Crime

Securityweek

26.11.19

New Technique Allows Ransomware to Operate Undetected

Ransomware

Securityweek

26.11.19

Catch Restaurants Hit by Point-of-Sale Malware

Virus

Securityweek

26.11.19

The overlooked part of an infosec strategy: Cyber insurance underwriting

Cyber

Net-security

26.11.19

CVE gap widens: 16,738 vulnerabilities disclosed during the first nine months of 2019

Vulnerebility

Net-security

26.11.19

Free download: Botnet and IoT Security Guide 2020

Safety

Net-security

26.11.19

Merchants must find ways to balance security with a seamless customer experience

Security

Net-security

26.11.19

Smart car security: Good practices to improve car safety

Safety

Net-security

25.11.19

Hitbsecconf2019 Abu Dhabi

Conference Press

Conference Press

25.11.19

Hitbsecconf2018DXB

Conference Press

Conference Press

25.11.19

Hitbsecconf2018sg

Conference Press

Conference Press

25.11.19

Federal Cyber Experts Christen Satellite Office in Georgia

BigBrothers

Securityweek

25.11.19

Church's Chicken Restaurants Hit by Payment Card Breach

Incindent

Securityweek

25.11.19

Data on 1.2 Billion Users Found in Exposed Elasticsearch Server

Incindent

Securityweek

25.11.19

Unwanted notifications in browser

CyberCrime

Securelist

25.11.19

After 1 Million of malware samples analyzed

Virus

Securityaffairs

25.11.19

Federal Communications Commission has cut off government funding for equipment from Chinese firms

BigBrothers

Securityaffairs

25.11.19

Cyberattack Hit 10% of Louisiana's State Government Servers

BigBrothers

Securityweek

25.11.19

Order Information of OnePlus Customers Exposed in Data Breach

Incindent

Securityweek

25.11.19

Apache Solr RCEs with public PoCs could soon be exploited

Exploit

Net-security

25.11.19

My Little DoH Setup

Security

SANS

25.11.19

Raccoon Stealer campaign circumvents Microsoft and Symantec anti-spam messaging gateways

CyberCrime

Securityaffairs

25.11.19

Twitter allows users to use 2FA without a phone number

Social

Securityaffairs

25.11.19

Iran – Government blocks Internet access in response to the protests

BigBrothers

Securityaffairs

25.11.19

US Regulators Bar Govt Telecom Funds for Huawei, ZTE

BigBrothers  Mobil

Securityweek

25.11.19

Preventing insider threats, data loss and damage through zero trust

Security

Net-security

25.11.19

Growing complexity is driving operational changes to privacy programs

Privacy

Net-security

25.11.19

Developers worry about security, still half of teams lack an expert

Security

Net-security

25.11.19

Cybercriminals targeting e-commerce website vulnerabilities this holiday season

Cyber

Net-security

25.11.19

Data security and automation top IT projects for 2020, AI not a priority

Security

Net-security

24.11.19

SONICWALL LEADS SERIES A ROUND FUNDING IN ZERO TRUST SECURITY PROVIDER PERIMETER 81

Security blog

Sonicwall

24.11.19

Protect your webcam from hackers with these 5 tips

Safety blog

Avast blog

24.11.19

Amazon tells senator there are few restrictions on how police may use Ring doorbell footage

BigBrother blog

Avast blog

24.11.19

Trickbot Updates Password Grabber Module

Malware blog

Palo Alto Unity42

24.11.19

Docker Patched the Most Severe Copy Vulnerability to Date With CVE-2019-14271

Vulnerebility blog

Palo Alto Unity42

24.11.19

Better Together: Security + SD-WAN by Palo Alto Networks

Cyber blog

Palo Alto

24.11.19

3 Tips for Women Aspiring to Succeed in Technology

Cyber blog

Palo Alto

24.11.19

Securing Google Cloud Run with Prisma Cloud

Cyber blog

Palo Alto

24.11.19

Elasticity of Scale: Can Your Cloud Security Keep Up?

Cyber blog

Palo Alto

24.11.19

Cybersecurity Canon Candidate Book Review: Blackout: Tomorrow Will Be Too L...

Cyber blog

Palo Alto

24.11.19

Ransom News

Ransom

Ransom

24.11.19

GalactiCrypter  Decryptor

Anti-ransom Tool

Anti-ransom Tool

24.11.19

Hakbit  Decryptor

Anti-ransom Tool

Anti-ransom Tool

24.11.19

TurkStatik Decryptor

Anti-ransom Tool

Anti-ransom Tool

24.11.19

Windows 10 Upgrades Blocked if Using Old Versions of AVG, Avast

Safety

Bleepingcomputer

24.11.19

Catch Restaurants Disclose Credit Card Stealing Malware Incident

Virus

Bleepingcomputer

24.11.19

TrickBot Trojan Getting Ready to Steal OpenSSH and OpenVPN Keys

Virus

Bleepingcomputer

24.11.19

OnePlus Exposed Customer Order Information in Data Breach

Incindent

Bleepingcomputer

24.11.19

Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions

Vulnerebility

Bleepingcomputer

24.11.19

Clop Ransomware Tries to Disable Windows Defender, Malwarebytes

Ransomware

Bleepingcomputer

24.11.19

FBI Warns of Cyber Attacks Targeting US Automotive Industry

BigBrothers

Bleepingcomputer

24.11.19

Allied Universal Breached by Maze Ransomware, Stolen Data Leaked

Ransomware

Bleepingcomputer

24.11.19

Edenred Payment Solutions Giant Announces Malware Incident

Incindent

Bleepingcomputer

24.11.19

T-Mobile Discloses Data Breach Impacting Prepaid Customers

Incindent

Bleepingcomputer

24.11.19

Local Malware Analysis with Malice

Virus

SANS

24.11.19

Catch Hospitality Group discloses PoS malware infection at its restaurants

Virus

Securityaffairs

23.11.19

Kaspersky found dozens of flaws in 4 open-source VNC software

Vulnerebility

Securityaffairs

23.11.19

Chinese smartphone vendor OnePlus discloses a new data breach

BigBrothers

Securityaffairs

23.11.19

Dozens of Severe Flaws Found in 4 Popular Open Source VNC Software

Vulnerebility

Thehackernews

23.11.19

Windows 10 1909 Drops Exploit Protection From Security Baseline

OS

Bleepingcomputer

23.11.19

Microsoft 365 Experiencing OneDrive and SharePoint Outages

Security

Bleepingcomputer

23.11.19

Card Skimmer Group Replaces Checkout Page to Steal Payment Info

CyberCrime

Bleepingcomputer

23.11.19

Microsoft Outlook for Android Gets Spoofing Vulnerability Fix

Android

Bleepingcomputer

23.11.19

Google Adds $1.5 Million Top Reward to Android Bug Bounty Program

Android

Bleepingcomputer

23.11.19

DePriMon Malware Registers Itself as a Windows Print Monitor

Virus

Bleepingcomputer

23.11.19

New RIPlace Bypass Evades Windows 10, AV Ransomware Protection

Ransomware

Bleepingcomputer

23.11.19

Microsoft Warns Customers of DoppelPaymer Ransomware Threat

Ransomware

Bleepingcomputer

23.11.19

Linux Webmin Servers Being Attacked by New P2P Roboto Botnet

BotNet

Bleepingcomputer

23.11.19

Intel Posts Letter Apologizing for Continued CPU Shortages

Security

Bleepingcomputer

23.11.19

THE HIGHER-ED SECURITY CHALLENGE: HOW TO KEEP AN OPEN NETWORK AND REMAIN FULLY PROTECTED

Hacking blog

Cybereason

23.11.19

PHOENIX: THE TALE OF THE RESURRECTED KEYLOGGER

Malware blog

Cybereason

23.11.19

Regional Threat Perspectives, Fall 2019: Middle East

Cyber blog

F5 Labs

23.11.19

Long-known Vulnerabilities in High-Profile Android Applications

OS Blog

Checkpoint

23.11.19

Phorpiex Breakdown

Spam blog

Checkpoint

23.11.19

Bad Binder: Android In-The-Wild Exploit

OS Blog  Exploit blog

Project Zero

23.11.19

Vulnerability Spotlight: Tenda AC9 /goform/WanParameterSetting command injection vulnerability

Vulnerebility blog

Cisco Talos

23.11.19

Vulnerability Spotlight: Two remote code execution vulnerabilities in Xcftools

Vulnerebility blog

Cisco Talos

23.11.19

Cryptominers, ransomware among top malware in IR engagements in Q4

Security blog

Cisco Talos

23.11.19

How the new Talos IR Cyber Range can prepare your employees for a cyber attack

Cyber blog

Cisco Talos

23.11.19

Should cybersecurity be taught in schools?

Cyber blog

Eset

23.11.19

Registers as “Default Print Monitor”, but is a malicious downloader. Meet DePriMon

Malware blog

Eset

23.11.19

What does it take to attract top cybersecurity talent?

Cyber blog

Eset

23.11.19

Mispadu: Advertisement for a discounted Unhappy Meal

Malware blog

Eset

23.11.19

Disney+ accounts hacked – How to protect yourself

Hacking blog

Eset

23.11.19

Raccoon Stealer Malware Scurries Past Microsoft Messaging Gateways

Virus

Threatpost

23.11.19

Data-Enriched Profiles on 1.2B People Exposed in Gigantic Leak

Incindent

Threatpost

23.11.19

Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip

Security

Threatpost

23.11.19

News Wrap: Amazon Ring Risks, Stalkerware, and D-Link Router Flaws

Security

Threatpost

23.11.19

ID Thieves Turn to Snail Mail as Juicy Target for Financial Crimes

CyberCrime

Threatpost

23.11.19

Three Areas to Consider, to Focus Your Cyber-Plan

Cyber

Threatpost

23.11.19

Critical Flaws in VNC Threaten Industrial Environments

Vulnerebility

Threatpost

23.11.19

Personal and social information of 1.2B people exposed on an open Elasticsearch install

Incindent

Securityaffairs

23.11.19

Twitter Users Can Now Use 2FA Without a Phone Number

Social

Securityweek

23.11.19

OnePlus Suffers New Data Breach Impacting Its Online Store Customers

Incindent

Thehackernews

22.11.19

French Rouen hospital hit by a ransomware attack

Ransomware

Securityaffairs

22.11.19

Dozens of Vulnerabilities Found in Open Source VNC Systems

Vulnerebility

Securityweek

22.11.19

Cloudflare Open-Sources Network Vulnerability Scanner

Safety

Securityweek

22.11.19

Geopolitical Tensions Fuel Worsening Cyberattack Scenario

Cyber

Securityweek

22.11.19

Lithuanian Extradited to U.S. Over Hacking, Fraud Charges

Crime

Securityweek

22.11.19

Payment solutions giant Edenred announces malware infection

Virus

Securityaffairs

22.11.19

CISA Announces Open Source Post-Election Auditing Tool

Safety

Securityweek

22.11.19

Russian Man Sentenced to Prison for Using Neverquest Trojan to Steal Money

Crime

Securityweek

22.11.19

Google offers up to $1.5 million bounty for remotely hacking Titan M chip

Security

Thehackernews

22.11.19

Arlo: An open source post-election auditing tool

Security

Net-security

22.11.19

Google ups bug bounties for Android flaws, exploits

Android

Net-security

22.11.19

Twitter finally allows users to delete their phone number without disabling 2FA

Social

Net-security

22.11.19

Cyber threats continue to evolve, but security teams remain confident

Cyber

Net-security

22.11.19

Black Friday Alert 2019: Net Shopping Bag of Threats

Security

Securelist

22.11.19

5G security and privacy for smart cities

Mobil  Privacy

Securelist

22.11.19

Russian author of NeverQuest banking malware gets 4 Years in U.S. Prison

Crime

Securityaffairs

22.11.19

T-Mobile discloses data breach affecting prepaid wireless customers

Incindent

Securityaffairs

22.11.19

AccorHotels subsidiary Gekko Group exposes hotels and travelers data in massive data leak

Incindent

Securityaffairs

22.11.19

Hackers Accessed Information of T-Mobile Prepaid Customers

Incindent

Securityweek

22.11.19

Russian Hacker Behind NeverQuest Banking Malware Gets 4 Years in U.S. Prison

Crime

Thehackernews

22.11.19

Linux Webmin Servers Under Attack by Roboto P2P Botnet

BotNet

Threatpost

22.11.19

Popular Apps on Google Play Store Remain Unpatched

Android

Threatpost

22.11.19

Gnip Banking Trojan Shows Ongoing, Aggressive Development

Virus

Threatpost

22.11.19

Senators Demand Amazon Disclose Ring Privacy Policies

BigBrothers

Threatpost

22.11.19

Microsoft Outlook for Android Bug Opens Door to XSS

Android

Threatpost

22.11.19

Download: 2019 Security Team Assessment Template

Security

Threatpost

22.11.19

ENISA publishes a Threat Landscape for 5G Networks

Mobil

Securityaffairs

22.11.19

Google will pay up to $1.5m for full chain RCE for Android on Titan M chips

Android

Securityaffairs

22.11.19

DePriMon downloader uses a never seen installation technique

Virus

Securityaffairs

22.11.19

Threat Intelligence Firm IntSights Raises $30 Million

IT

Securityweek

22.11.19

Google Offering Up to $1.5 Million for Pixel Titan M Exploits

IT

Securityweek

22.11.19

Critical Bug Patched in Popular Jetpack WordPress Plugin

Vulnerebility

Securityweek

22.11.19

'DePriMon' Malware First to Use Port Monitor for Persistence

Virus

Securityweek

22.11.19

Ongoing Research Project Examines Application of AI to Cybersecurity

Cyber

Securityweek

22.11.19

Long-Patched Vulnerabilities Still Present in Many Popular Android Apps

Android

Securityweek

22.11.19

T-Mobile Suffers Data Breach Affecting Prepaid Wireless Customers

Incindent

Thehackernews

22.11.19

Abusing Web Filters Misconfiguration for Reconnaissance

Safety

SANS

22.11.19

Risky behavior exposes consumers to seasonal security scares

Security

Net-security

22.11.19

Create secure IoT products: Enable security by design

IoT

Net-security

21.11.19

Millions of Sites Exposed by Flaw in Jetpack WordPress Plugin

Vulnerebility

Bleepingcomputer

21.11.19

uBlock Origin Now Blocks Sneaky First-Party Trackers in Firefox

Security

Bleepingcomputer

21.11.19

New Banking Trojan Infects Victims via McDonald’s Malvertising

Virus

Bleepingcomputer

21.11.19

Ransomware Gangs Adopt APT Tactics in Targeted Attacks

APT  Ransomware

Bleepingcomputer

21.11.19

Thousands of Enterprises At Risk Due to Oracle EBS Critical Flaws

Vulnerebility

Bleepingcomputer

21.11.19

NSA Publishes Advisory Addressing Encrypted Traffic Inspection Risks

BigBrothers

Bleepingcomputer

21.11.19

Microsoft Fixes Office 2016 Access Query Error, More Fixes Coming

Vulnerebility

Bleepingcomputer

21.11.19

Critical Windows Update Spam Fails at Delivering Ransomware

Ransomware

Bleepingcomputer

21.11.19

Coin Stealer Found in Monero Linux Binaries From Official Site

Cryptocurrency

Bleepingcomputer

21.11.19

Android Camera App Bug Lets Apps Record Video Without Permission

Android

Bleepingcomputer

21.11.19

The cybercrime ecosystem: attacking blogs

CyberCrime

Securelist

21.11.19

A critical flaw in Jetpack exposes millions of WordPress sites

Vulnerebility

Securityaffairs

21.11.19

Microsoft warns of growing DoppelPaymer Ransomware threat

Ransomware

Securityaffairs

21.11.19

Roboto, a new P2P botnet targets Linux Webmin servers

BotNet

Securityaffairs

21.11.19

Clumio Completes $135 Million Series C Funding Round

IT

Securityweek

21.11.19

DopplePaymer Ransomware Spreads via Compromised Credentials: Microsoft

Ransomware

Securityweek

21.11.19

New IBM Cloud Security Solution Combines Data From Existing Tools

Security

Securityweek

21.11.19

High-Severity Windows UAC Flaw Enables Privilege Escalation

Vulnerebility

Threatpost

21.11.19

Hackers Dump 2.2M Gaming, Cryptocurrency Passwords Online

Security

Threatpost

21.11.19

ThreatList: Admin Rights for Third Parties is the Norm

Security

Threatpost

21.11.19

Security Firms, Nonprofits Team to Fight Stalkerware

Security

Threatpost

21.11.19

Mozilla Bug Bounty Program Doubles Payouts, Adds Firefox Monitor

Vulnerebility

Threatpost

21.11.19

Apache Solr Bug Gets Bumped Up to High Severity

Vulnerebility

Threatpost

21.11.19

Chicago student charged with writing code to spread ISIS propaganda

Cyber

Securityaffairs

21.11.19

Amnesty International Calls Facebook, Google Rights Abusers

BigBrothers

Securityweek

21.11.19

Senators Press Amazon Over Doorbell Camera Security Concerns

BigBrothers

Securityweek

21.11.19

Security Automation Firm ZecOps Raises $10 Million in Seed Funding

IT

Securityweek

21.11.19

New Legislation Would Block US Firms From Storing Personal Data in China, Russia

BigBrothers

Securityweek

21.11.19

Do third-party users follow security best practices and policies?

Security

Net-security

21.11.19

Driving collaboration between security and IT ops teams is a major challenge

Security

Net-security

21.11.19

Inadequate data sanitization puts enterprises at risk of breaches and compliance failures

Incindent

Net-security

21.11.19

Cyber risk increases at all layers of the corporate network

Security

Net-security

21.11.19

Podcast – Malcolm, a new tool for network visibility

Security

Net-security

21.11.19

Google introduces new G Suite security options

Security

Net-security

20.11.19

U.S. Senators Seek Answers on Facebook’s Handling of User Information

BigBrothers

Securityweek

20.11.19

Disney Plus Blames Past Hacks for User Accounts Sold Online

Hacking

Securityweek

20.11.19

Meet Phoenix Keylogger, a New Malware-as-a-Service Product Gaining Traction

Virus

Securityweek

20.11.19

Email Security Firm Abnormal Security Exits Stealth Mode With $24M in Funding

IT

Securityweek

20.11.19

NSA Issues Advisory on Mitigation of Risks Associated With TLSI

BigBrothers

Securityweek

20.11.19

Army's Use of TikTok App Raises Concerns on Capitol Hill

BigBrothers

Securityweek

20.11.19

XSS Flaw in Gmail's Dynamic Email Feature Earns Researcher $5,000

Vulnerebility

Securityweek

20.11.19

Shade Ransomware Is the Most Actively Distributed Malware via Email

Ransomware

Bleepingcomputer

20.11.19

Louisiana Government Suffers Outage Due to Ransomware Attack

Ransomware

Bleepingcomputer

20.11.19

Macy's Customer Payment Info Stolen in Magecart Data Breach

Incindent

Bleepingcomputer

20.11.19

Microsoft Is Adding DNS-Over-HTTPS (DoH) to Windows 10

OS

Bleepingcomputer

20.11.19

Google Chrome's 'Close Other Tabs' Option Is Back!

Security

Bleepingcomputer

20.11.19

IRS Publishes Guidance to Help Taxpayers Fight Identity Theft

Cyber

Bleepingcomputer

20.11.19

Buran Ransomware Infects PCs via Microsoft Excel Web Queries

Ransomware

Bleepingcomputer

20.11.19

Linux, Windows Users Targeted With New ACBackdoor Malware

Virus

Bleepingcomputer

20.11.19

Intel is Removing End of Life Drivers and BIOS Downloads

Security

Bleepingcomputer

20.11.19

Microsoft to Stop Supporting Cortana on Android and iOS

Android

Bleepingcomputer

20.11.19

Monero Project site compromised, served malware-infected binaries

Cryptocurrency

Net-security

20.11.19

The cake is a lie! Uncovering the secret world of malware-like cheats in video games

Virus

Securelist

20.11.19

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020

Security

Securelist

20.11.19

Monero Project website has been compromised to deliver a coin stealer

Cryptocurrency

Securityaffairs

20.11.19

Hackers leak 2TB of Data From Cayman National Bank stolen by Phineas Fisher

Incindent

Securityaffairs

20.11.19

Cryptocurrency Stealer Delivered From Official Monero Website

Cryptocurrency

Securityweek

20.11.19

Official Monero Site Hacked to Distribute Cryptocurrency Stealing Malware

Cryptocurrency

Thehackernews

20.11.19

McDonalds-Themed Facebook Ads Serve Up Banking Trojans

Virus

Threatpost

20.11.19

Google Discloses Android Camera Hijack Hack

Android

Threatpost

20.11.19

Macy’s Suffers Data Breach by Magecart Cybercriminals

CyberCrime

Threatpost

20.11.19

‘Windows Update’ Installs Cyborg Ransomware

Ransomware

Threatpost

20.11.19

400 Vet Locations Nipped by Ryuk Ransomware

Ransomware

Threatpost

20.11.19

D-Link Adds More Buggy Router Models to ‘Won’t Fix’ List

Vulnerebility

Threatpost

20.11.19

Ransomware Revival: Troldesh becomes a leader by the number of attacks

Ransomware

Securityaffairs

20.11.19

CTHoW v2.0 – Cyber Threat Hunting on Windows

Cyber

Securityaffairs

20.11.19

CVE-2019-2234 flaws in Android Camera Apps exposed millions of users surveillance

Vulnerebility

Securityaffairs

20.11.19

Bigger Rewards, New Targets Announced for Mozilla Bug Bounty Program

Security

Securityweek

20.11.19

Trend Micro Unveils New Cloud Security Platform

Safety

Securityweek

20.11.19

New Flaw Lets Rogue Android Apps Access Camera Without Permission

Android

Thehackernews

20.11.19

Hancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike

Virus

SANS

20.11.19

Women in cybersecurity can benefit from taking inventory of their personal apps

Cyber

Net-security

20.11.19

California IoT security law: What it means and why it matters

IoT

Net-security

20.11.19

1.19 billion confidential medical images available on the internet

Incindent

Net-security

20.11.19

Only 11% of organizations can detect intruders in under one minute

Security

Net-security

20.11.19

Attackers increasingly embrace small-scale DDoS attacks to evade detection

Attack

Net-security

20.11.19

Template: Assess the performance of your security team

Security

Net-security

19.11.19

Alleged Magecart hackers planted a software skimmer into Macy’s Website

CyberCrime

Securityaffairs

19.11.19

Adobe announces end of support for Acrobat 2015 and Adobe Reader 2015

Security

Securityaffairs

19.11.19

Ransomware infected systems at state government of Louisiana

Ransomware

Securityaffairs

19.11.19

Belorussian authorities blocked ProtonMail following a wave of bomb threats

BigBrothers

Securityaffairs

19.11.19

Fake Windows Update Delivers Cyborg Ransomware

Ransomware

Securityweek

19.11.19

Cyber Risk Analytics Firm CyberCube Raises $35 Million

IT

Securityweek

19.11.19

US, Montenegro Plot Cyber Warfare Ahead of 2020 Elections

BigBrothers

Securityweek

19.11.19

Microsoft Will Bring DNS Over HTTPS (DoH) to Windows

Safety

Securityweek

19.11.19

Technology Firms and Victim Advocacy Groups Launch Coalition Against Stalkerware

Security

Securityweek

19.11.19

Vulnerabilities in Android Camera Apps Exposed Millions of Users to Spying

Android

Securityweek

19.11.19

Support for Adobe Acrobat, Reader 2015 Will End on April 7, 2020

Security

Securityweek

19.11.19

Ransomware Attack Hits Louisiana State Servers

Ransomware

Securityweek

19.11.19

Payment Card Skimmer Found on Macy's Website

CyberCrime

Securityweek

19.11.19

Louisiana State Government Hit by Ransomware Attack Forcing Server Shutdowns

Ransomware

Thehackernews

19.11.19

Cheap Chinese JAWS of DVR Exploitability on Port 60001

Exploit

SANS

19.11.19

Android camera apps could be hijacked to spy on users

Android

Net-security

19.11.19

Macy’s online store compromised in Magecart-style attack

CyberCrime

Net-security

19.11.19

WhatsApp Remote Code Execution Triggered by Videos

Social

Threatpost

19.11.19

The Unhappiest Subscribers on Earth? Disney+ Accounts Hacked & Hijacked

Hacking

Threatpost

19.11.19

‘Wildly Different’ Privacy Regulations Causing Compliancy Chaos

Privacy

Threatpost

19.11.19

Office 365 Admins Targeted in Ongoing Phishing Scam

Phishing

Threatpost

19.11.19

Americans Concerned, Confused Over Privacy, Survey Reveals

Privacy

Threatpost

19.11.19

Pipka Card Skimmer Removes Itself After Infecting eCommerce Sites

CyberCrime

Threatpost

19.11.19

Tianfu Cup Round-Up: Safari, Chrome, D-Link Routers and Office 365 Successfully Hacked

Congress

Threatpost

19.11.19

Tianfu Cup 2019 – 11 teams earned a total of 545,000 for their Zero-Day Exploits

Congress

Securityaffairs

19.11.19

Google addressed an XSS flaw in Gmail

Vulnerebility

Securityaffairs

19.11.19

Google Healthcare Project Targeted by Congress Committee

BigBrothers

Securityweek

19.11.19

Vulnerability in ABB Plant Historian Disclosed 5 Years After Discovery

Vulnerebility

Securityweek

19.11.19

1Password Raises $200 Million in Series A Funding

IT

Securityweek

19.11.19

First Cypriot to Be Extradited to US, on Hacking Charges

BigBrothers

Securityweek

19.11.19

DDoS-for-Hire Service Admin Gets 13 Months in Prison

Crime

Securityweek

19.11.19

Security of North American Energy Grid Tested in GridEx Exercise

Security

Securityweek

19.11.19

Want to build a successful SOC? Here’s what you need to know

Security

Net-security

19.11.19

Redefining security KPIs for 5G service providers

Mobil

Net-security

19.11.19

Review: Foundations of Information Security

Security

Net-security

19.11.19

The way Bluetooth devices ‘talk’ to apps leaves them vulnerable

Mobil  Vulnerebility

Net-security

19.11.19

Managed detection and response: Separating the players from the pretenders

Security

Net-security

19.11.19

WhatsApp RCE flaw can be exploited by sending malicious MP4 files

Social

Net-security

18.11.19

Experts report a rampant growth in the number of malicious, lookalike domains

Virus

Securityaffairs

18.11.19

WhatsApp Vulnerability Allows Code Execution Via Malicious MP4 File

Social   Virus

Securityweek

18.11.19

Zero-Day Exploits Earn Hackers Over $500K at Chinese Competition

Congress

Securityweek

18.11.19

Most Americans feel powerless to prevent data collection, online tracking

Cyber

Net-security

18.11.19

New NextCry Ransomware targets Nextcloud instances on Linux servers

Ransomware

Securityaffairs

18.11.19

Crooks use carding bots to check stolen card data ahead of the holiday season

Incindent

Securityaffairs

18.11.19

SMS and 2FA: Another Reason to Move away from It.

Spam

SANS

18.11.19

Hackers helping communities: Leveraging OSINT to find missing persons

Security

Net-security

18.11.19

Study on public cloud performance: AWS, GCP, Azure, Alibaba and IBM Cloud

Security

Net-security

18.11.19

Trusted certificates make phishing websites appear valid

Phishing

Net-security

18.11.19

Healthcare spikes data breach fever, endpoint threat detections grow 60%

Incindent

Net-security

18.11.19

Do your infosec habits make you vulnerable to fraud?

Vulnerebility

Net-security

17.11.19

How to Download the Windows 10 1909 ISO From Microsoft

OS

Bleepingcomputer

17.11.19

Microsoft Removes Windows 10 1909 Realtek Driver Update Block

OS

Bleepingcomputer

17.11.19

Microsoft Office 365 Admins Targeted by Ongoing Phishing Campaign

Phishing

Bleepingcomputer

17.11.19

Windows 10 Build 19025 With Throttled Search Indexer Out for Insiders

OS

Bleepingcomputer

17.11.19

US Govt Recommends Vendor System Configs To Block Malware Attacks

BigBrothers  Virus

Bleepingcomputer

17.11.19

New NextCry Ransomware Encrypts Data on NextCloud Linux Servers

Ransomware

Bleepingcomputer

17.11.19

Tianfu Cup 2019 Day 1 – Chinese experts hacked Chrome, Edge, Safari, Office365

Congress

Securityaffairs

17.11.19

Experts found undocumented access feature in Siemens SIMATIC PLCs

ICS

Securityaffairs

17.11.19

Ransom News

Ransom

Ransom

17.11.19

Meeting a Russian Ransomware Cell

Ransomware blog

Sonicwall

17.11.19

DDoS attack targets UK Labour Party website

Attack blog

Avast blog

17.11.19

Palo Alto Networks Delivers the Industry’s Most Comprehensive Secure Access Service Edge

Security blog

Palo Alto

17.11.19

Cyber Canon Candidate Book Review: The Internet of Risky Things: Trusting t...

Security blog

Palo Alto

17.11.19

When Will Threat Intelligence Deliver on Its Promise?

Security blog

Palo Alto

17.11.19

Introducing Cortex XDR 2.0

Security blog

Palo Alto

17.11.19

Google Cloud at Ignite Europe ‘19

Security blog

Palo Alto

17.11.19

New and Enhanced Palo Alto Networks Support Offerings Elevate the Customer ...

Security blog

Palo Alto

17.11.19

Container Security: Vulnerability Management from Build to Run

Vulnerebility blog

Palo Alto

17.11.19

Is CASB Alone Enough? Long Live SASE

Security blog

Palo Alto

17.11.19

Second Watch: An Initiative to Help Veterans Find a New Mission in Cybersec...

Security blog

Palo Alto

17.11.19

Cyber Canon Candidate Book Review: A Sustainable Digital Economy: Not Fear,...

Security blog

Palo Alto

17.11.19

Protecting Data Center Interconnect Links

Security blog

Palo Alto

17.11.19

DDoS-for-Hire Services Owner Sentenced to 13 Months in Prison

Crime

Bleepingcomputer

17.11.19

Google Fixes White Screen Problem in Chrome, Admins Furious

Vulnerebility

Bleepingcomputer

17.11.19

Silly Phishing Scam Warns That Your Password Will be Changed

Phishing

Bleepingcomputer

17.11.19

Two Charged Over Crypto Theft via SIM Swapping, Death Threats

Cryptocurrency  Mobil

Bleepingcomputer

17.11.19

Intel Patched 77 Vulnerabilities in November 2019 Platform Update

Vulnerebility

Bleepingcomputer

17.11.19

ProtonMail Thanks Paid Accounts by Giving 5GB Extra Storage

IT

Bleepingcomputer

17.11.19

US Health Network, Supplier Expose PII, PHI Data in Breaches

BigBrothers

Bleepingcomputer

17.11.19

Brave Urges Congress to Require Ad Blocking Browsers for Govt Employees

Security

Bleepingcomputer

17.11.19

Qualcomm Bug Exposes Critical Data on Samsung, LG Phones

Vulnerebility

Bleepingcomputer

17.11.19

Symantec Fixes Privilege Escalation Flaw in Endpoint Protection

Vulnerebility

Bleepingcomputer

17.11.19

WhatsApp flaw CVE-2019-11931 could be exploited to install spyware

Vulnerebility

Securityaffairs

16.11.19

New Threat Actor Impersonates Govt Agencies to Deliver Malware

Virus

Bleepingcomputer

16.11.19

Carding Bots Testing Payment Info Ahead of Big Shopping Events

BotNet

Bleepingcomputer

16.11.19

Microsoft Issues Guidance for Intel CPU Driver Security Flaws

Vulnerebility

Bleepingcomputer

16.11.19

Strange AnteFrigus Ransomware Only Targets Specific Drives

Ransomware

Bleepingcomputer

16.11.19

Microsoft Auto-Updating Windows 10 1803 Devices to May 2019 Update

OS

Bleepingcomputer

16.11.19

Microsoft Fixes Windows 10 1809 Issue That Broke Defender ATP

OS

Bleepingcomputer

16.11.19

TPM-FAIL Security Flaws Impact Modern Devices With Intel CPUs

Vulnerebility

Bleepingcomputer

16.11.19

Microsoft Releases the November 2019 Security Updates for Office

Vulnerebility

Bleepingcomputer

16.11.19

PureLocker Ransomware Can Lock Files on Windows, Linux, and macOS

Ransomware

Bleepingcomputer

16.11.19

Latest Intel CPUs Affected by New TSX Speculative Attack

Attack

Bleepingcomputer

16.11.19

Checkra1n, a working iPhone Jailbreak, was released

Apple

Securityaffairs

16.11.19

New WhatsApp Bug Could Have Let Hackers Secretly Install Spyware On Your Devices

Social

Thehackernews

16.11.19

Attention is All They Need: Combatting Social Media Information Operations With Neural Language Models

Social blog

FireEye

16.11.19

The One Thing You Can't Outsource: Risk

Security blog

F5 Labs

16.11.19

The Road to Qualcomm TrustZone Apps Fuzzing

Cyber blog

Checkpoint

16.11.19

Custom dropper hide and seek

Cyber blog

Cisco Talos

16.11.19

Hunting for LoLBins

Security blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Command injection bug in Exhibitor UI

Vulnerebility blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Denial-of-service vulnerability in Intel IGC64 graphics driver

Vulnerebility blog

Cisco Talos

16.11.19

Microsoft Patch Tuesday — Nov. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Remote code execution vulnerability in Microsoft Media Foundation

Vulnerebility blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Remote code execution vulnerability in Microsoft Excel

Vulnerebility blog

Cisco Talos

16.11.19

New partnership brings together Talos’ visibility with IR’s unmatched response capabilities

Security blog

Cisco Talos

16.11.19

Microsoft issues patch for Internet Explorer zero‑day

Vulnerebility blog

Eset

16.11.19

Getting into cybersecurity: Self‑taught vs. university‑educated?

Cyber blog

Eset

16.11.19

Facebook bug turns on iPhone camera in the background

Social blog

Eset

16.11.19

Can regulations improve cybersecurity? In APAC, opinions vary

Cyber blog

Eset

16.11.19

First BlueKeep attacks prompt fresh warnings

Attack blog

Eset

16.11.19

Stealthy Malware Flies Under AV Radar with Advanced Obfuscation

Virus

Threatpost

16.11.19

Lizard Squad Threatens UK’s Labour Leader with Cyberattacks Against His Family

BigBrothers  CyberCrime

Threatpost

16.11.19

Holiday Shoppers Beware: 100K Malicious Sites Found Posing as Well-Known Retailers

Virus

Threatpost

16.11.19

James Clapper: Lessons Learned in a Post-Snowden World

Security

Threatpost

16.11.19

Podcast: Managing an Out-Of-Control Security Tech Stack

Security

Threatpost

16.11.19

DDoS-for-Hire Services operator sentenced to 13 months in prison

Attack  Crime

Securityaffairs

16.11.19

Two men arrested for stealing $550,000 in cryptocurrency with Sim Swapping

Cryptocurrency

Securityaffairs

16.11.19

Fears Grow on Digital Surveillance: US Survey

Privacy

Securityweek

16.11.19

New GitHub Security Lab Aims to Secure Open Source Software

Security

Securityweek

16.11.19

Two Massachusetts Men Arrested and Charged in SIM Swapping Scheme

Mobil

Securityweek

16.11.19

Undocumented Access Feature Exposes Siemens PLCs to Attacks

ICS

Securityweek

15.11.19

The Australian Parliament was hacked earlier this year

BigBrothers

Securityaffairs

15.11.19

New TA2101 threat actor poses as government agencies to distribute malware

CyberCrime  Virus

Securityaffairs

15.11.19

A new sophisticated JavaScript Skimmer dubbed Pipka used in the wild

CyberCrime

Securityaffairs

15.11.19

InfoTrax Settles With FTC Over Data Breach

Incindent

Securityweek

15.11.19

Over 100,000 Fake Domains With Valid TLS Certificates Target Major Retailers

Crypto

Securityweek

15.11.19

Two Arrested for Stealing $550,000 in Cryptocurrency Using Sim Swapping

Cryptocurrency

Thehackernews

15.11.19

GitHub Security Lab aims to make open source software more secure

Security

Net-security

15.11.19

Attack tools and techniques used by major ransomware families

Ransomware

Net-security

15.11.19

Threat Actor Impersonates USPS to Deliver Backdoor Malware

Virus

Threatpost

15.11.19

Just-Released Checkra1n iPhone Jailbreak Stirs Security Concerns

Apple

Threatpost

15.11.19

ENFUSE 2019: Security Regulations, Insider Threats, and IoT Privacy Risks

Congress

Threatpost

15.11.19

Innovative PureLocker Ransomware Emerges in Targeted Attacks

Ransomware

Threatpost

15.11.19

Double Vision: Stealthy Malware Dropper Delivers Dual RATs

Virus

Threatpost

15.11.19

California’s Domino Effect on U.S. Privacy Regulation

BigBrothers  Privacy

Threatpost

15.11.19

Website, Know Thyself: What Code Are You Serving?

Security

Threatpost

15.11.19

APT33 Mounts Focused, Highly Targeted Botnet Attacks Against U.S. Victims

APT

Threatpost

15.11.19

Download: The Comprehensive Compliance Guide

Security

Threatpost

15.11.19

Experts found privilege escalation issue in Symantec Endpoint Protection

Vulnerebility

Securityaffairs

15.11.19

Flaws in Qualcomm chips allows stealing private from devices

Vulnerebility

Securityaffairs

15.11.19

LINE Launches Public Bug Bounty Program on HackerOne

Security

Securityweek

15.11.19

Corellium: Apple Sued Us After Failed Acquisition Attempt

Apple

Securityweek

15.11.19

DLL Hijacking Flaw Impacts Symantec Endpoint Protection

Vulnerebility

Securityweek

15.11.19

Online Retailers Ill-Prepared for Holiday Season

Security

Securityweek

15.11.19

Visa Warns of New JavaScript Skimmer 'Pipka'

CyberCrime

Securityweek

15.11.19

Iranian APT33 Hackers Use Special Botnets for High-Value Targets in U.S.

APT

Securityweek

15.11.19

New MITRE Foundation Aims to Boost Critical Infrastructure

Safety

Securityweek

15.11.19

New Group of Hackers Targeting Businesses with Financially Motivated Cyber Attacks

CyberCrime

Thehackernews

15.11.19

Some packet-fu with Zeek (previously known as bro)

Security

SANS

15.11.19

To improve incident response, you need to consider 3rd party solutions

Security

Net-security

15.11.19

IT professionals deem hybrid cloud as most secure

Security

Net-security

15.11.19

Evaluating cyber risk during the holiday season

Cyber

Net-security

15.11.19

Disruptive technology predictions: 2020 will see the creation of completely connected environments

Security

Net-security

14.11.19

Tracking Iran-linked APT33 group via its own VPN networks

APT

Securityaffairs

14.11.19

Canadian intelligence agencies CSE and CSIS are divided on Huawei 5G ban

BigBrothers  Mobil

Securityaffairs

14.11.19

CVE-2019-3648 flaw in all McAfee AV allows DLL Hijacking

Vulnerebility

Securityaffairs

14.11.19

Australian Universities Adopt Foreign Interference Guidelines

BigBrothers

Securityweek

14.11.19

Qualcomm Chip Flaws Let Hackers Steal Private Data From Android Devices

Android  Vulnerebility

Thehackernews

14.11.19

Company Detected Years-Long Breach Only After Hacker Maxed Out Servers' Storage

Incindent

Thehackernews

14.11.19

Google’s Plan to Crunch Health Data on Millions of Patients Draws Fire

Privacy

Threatpost

14.11.19

IoT Security Woes Plague Healthcare Industry

IoT

Threatpost

14.11.19

Federal Court: Suspicionless Search of Traveler Devices by Border Agents Is Unconstitutional

BigBrothers

Threatpost

14.11.19

Consumer Data Privacy Rights: Emerging Tech Blurs Lines

Privacy

Threatpost

14.11.19

A flaw in PMx Driver can give hackers full access to a device

Vulnerebility

Securityaffairs

14.11.19

Facebook Nixes Billions of Fake Accounts

Social

Securityweek

14.11.19

Vulnerability in McAfee Antivirus Products Allows DLL Hijacking

Vulnerebility

Securityweek

14.11.19

Automated Penetration Testing Startup Pcysys Raises $10 Million

IT

Securityweek

14.11.19

Canada Spy Agencies Split Over Proposed Huawei 5G Ban: Media

BigBrothers

Securityweek

14.11.19

Automated systems: Flag smarter, not everything

ICS

Net-security

14.11.19

5,183 breaches from the first nine months of 2019 exposed 7.9 billion records

Incindent

Net-security

14.11.19

Network complexity and lack of visibility contribute to misconfigurations and increased risk

Security

Net-security

14.11.19

Fraud rates increasing as criminals become more sophisticated

CyberCrime

Net-security

14.11.19

Should free internet access be considered as a human right?

Security

Net-security

14.11.19

Download: Internal compliance assessment templates

Security

Net-security

13.11.19

Windows 10 Insider Build 19023 Released With Optional Updates Test

OS

Bleepingcomputer

13.11.19

Microsoft Fixes Windows 10 Update and Intel Driver Battery Drain

OS

Bleepingcomputer

13.11.19

Windows 10 Cumulative Update KB4524570 & KB4523205 Released

OS

Bleepingcomputer

13.11.19

Microsoft's November 2019 Patch Tuesday Fixes IE Zero-day, 74 Flaws

OS

Bleepingcomputer

13.11.19

Windows 10 November 2019 Update Is Now Available

OS

Bleepingcomputer

13.11.19

Telegram MTProxy Servers Used to DDoS Iranian Cloud Provider

Attack  BigBrothers

Bleepingcomputer

13.11.19

Mexico's Pemex Oil Suffers Ransomware Attack, $4.9 Million Demanded

Ransomware

Bleepingcomputer

13.11.19

Adobe Patches Critical Remote Code Execution Bugs in Illustrator

Vulnerebility

Bleepingcomputer

13.11.19

McAfee Patches Privilege Escalation Flaw in Antivirus Software

Vulnerebility

Bleepingcomputer

13.11.19

YouTube BitCoin Videos Pushing Predator Info-Stealing Trojan

Virus

Bleepingcomputer

13.11.19

New TSX Speculative Attack allows stealing sensitive data from latest Intel CPUs

Attack  Vulnerebility

Securityaffairs

13.11.19

Value and Limitations of Vendor Telemetry and Reported Incidents

Incindent

Securityweek

13.11.19

Intel Driver Vulnerability Can Give Attackers Deep Access to a Device

Vulnerebility

Securityweek

13.11.19

Trend Micro Launches New ICS Security Solutions

ICS

Securityweek

13.11.19

New ZombieLoad v2 Attack Affects Intel's Latest Cascade Lake CPUs

Attack  Vulnerebility

Thehackernews

13.11.19

Microsoft to honor California’s digital privacy law all through the U.S.

BigBrothers  Privacy

Net-security

13.11.19

Intel releases updates to plug TPM-FAIL flaws, foil ZombieLoad v2 attacks

Vulnerebility

Net-security

13.11.19

Adobe patch Tuesday updates addressed critical flaws in Media Encoder and Illustrator products

Vulnerebility

Securityaffairs

13.11.19

'State of the Firewall' Report: Automation Key to Preventing Costly Misconfigurations

Security

Securityweek

13.11.19

SAP Updates Four Hot News Notes on November 2019 Patch Day

Vulnerebility

Securityweek

13.11.19

Newer Intel CPUs Vulnerable to Variant 2 of ZombieLoad Attack

Vulnerebility

Securityweek

13.11.19

Russian man Aleksei Burkov extradited for running online criminal marketplace

Crime

Securityaffairs

13.11.19

Microsoft Patch Tuesday updates fix CVE-2019-1429 flaw exploited in the wild

Vulnerebility

Securityaffairs

13.11.19

Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices

Vulnerebility

Thehackernews

13.11.19

Tuesday: Actively exploited IE zero-day fixed

Vulnerebility

Net-security

13.11.19

TPM—Fail

Attack

Attack

13.11.19

TSX Speculative Attack

Attack

Attack

13.11.19

MDS Attack

Attack

Attack

13.11.19

Adobe Patches Critical Bugs in Illustrator, Media Encoder

Vulnerebility

Threatpost

13.11.19

Microsoft Patches RCE Bug Actively Under Attack

Attack  Vulnerebility

Threatpost

13.11.19

Intel Warns of Critical Info-Disclosure Bug in Security Engine

Vulnerebility

Threatpost

13.11.19

Magento Warns E-Commerce Sites to Upgrade ASAP to Prevent Attacks

Attack

Threatpost

13.11.19

Insider Threats, a Cybercriminal Favorite, Not Easy to Mitigate

Security

Threatpost

13.11.19

Plugging the Data Leak in Manufacturing

Incindent

Threatpost

13.11.19

Microsoft to Apply California’s Privacy Law to All U.S. Users

Privacy

Threatpost

13.11.19

Mexican state-owned oil company Pemex hit by ransomware

Ransomware

Securityaffairs

13.11.19

Google Healthcare Data Move Makes Some Queasy

Privacy

Securityweek

13.11.19

Russian Accused of $20M Credit Card Fraud Extradited to US

CyberCrime

Securityweek

13.11.19

New PureLocker Ransomware Linked to MaaS Provider for Cobalt Gang, FIN6

Ransomware

Securityweek

13.11.19

Call for Papers: SecurityWeek's 2020 Singapore ICS Cyber Security Conference

ICS

Securityweek

13.11.19

U.S. Customs Officers Need 'Reasonable Suspicion' for Searches: Judge

Security

Securityweek

13.11.19

Microsoft Patches Another Internet Explorer Flaw Exploited in Attacks

Attack  Exploit

Securityweek

13.11.19

Mexican Oil Company Pemex Hit by Ransomware

Ransomware

Securityweek

13.11.19

An example of malspam pushing Lokibot malware, November 2019

BotNet  Virus

SANS

13.11.19

Lateral phishing makes for dangerous waters, here’s how you can avoid getting caught in the net

Phishing

Net-security

13.11.19

Product showcase: SpyCloud Active Directory Guardian

Safety

Net-security

13.11.19

Researchers discover massive increase in Emotet activity

Virus

Net-security

13.11.19

Enterprise cybersecurity in the Asia-Pacific region

Cyber

Net-security

13.11.19

The leading challenge facing cloud migration projects is security

Social

Net-security

12.11.19

Facebook is secretly using iPhone’s camera as users scroll their feed

Social

Securityaffairs

12.11.19

PCI DSS Compliance Between Audits is Declining: Verizon

Safety

Securityweek

12.11.19

Magento Users Warned of Remote Code Execution Vulnerability

Vulnerebility

Securityweek

12.11.19

Is Facebook Secretly Accessing Your iPhone's Camera? Some Users Claimed

Social

Thehackernews

12.11.19

TA505 Cybercrime targets system integrator companies

CyberCrime

Securityaffairs

12.11.19

Buran ransomware-as-a-service continues to improve

Ransomware

Securityaffairs

12.11.19

Adobe Patches Vulnerabilities in Design, Web Products

Vulnerebility

Securityweek

12.11.19

OpenText to Acquire Data Protection Firm Carbonite

Safety

Securityweek

12.11.19

Tech Support Scammers Exploiting Unpatched Firefox Bug

Exploit  Vulnerebility

Securityweek

12.11.19

Hosting Provider SmarterASP.NET Recovering From Ransomware Attack

Ransomware

Securityweek

12.11.19

New Update Lets Windows Users Test Extended Security Updates

OS

Bleepingcomputer

12.11.19

Magento Urges Users to Apply Security Update for RCE Bug

Vulnerebility

Bleepingcomputer

12.11.19

No, YouTube Won't Cancel Accounts That Don't Generate Revenue

IT

Bleepingcomputer

12.11.19

Free Cybersecurity Training Now Available for U.S. Veterans

Cyber

Bleepingcomputer

12.11.19

Microsoft Fixes Windows 10 Missing Deferred Update Settings Bug

OS

Bleepingcomputer

12.11.19

TrickBot Malware Uses Fake Sexual Harassment Complaints as Bait

Virus

Bleepingcomputer

12.11.19

Windows 10 Bug Causes USB Drives to Show the Wrong Icon

OS

Bleepingcomputer

12.11.19

Sodinokibi Ransomware Targeting Asia via the RIG Exploit Kit

Ransomware

Bleepingcomputer

12.11.19

checkra1n iOS Jailbreak Gets Public Beta Update With Fixes

Apple

Bleepingcomputer

12.11.19

Windows 10 Insider Program: What You Need to Get Started

OS

Bleepingcomputer

12.11.19

Ransomware Attack Downs Hosting Service SmarterASP.NET

Ransomware

Threatpost

12.11.19

Encrypted Emails on macOS Found Stored in Unprotected Way

Apple

Threatpost

12.11.19

DDoS Attacks Target Amazon, SoftLayer and Telecom Infrastructur

Attack

Threatpost

12.11.19

ThreatList: Data Breaches Batter Stock Prices at Public Companies, For Months

Security

Threatpost

12.11.19

Experts warn of spike in TCP DDoS reflection attacks targeting Amazon, SoftLayer and telco infrastructure

Attack

Securityaffairs

12.11.19

Bugcrowd paid over $500,000 in bug bounty rewards in one week

Security

Securityaffairs

12.11.19

ZoneAlarm forum site hack exposed data of thousands of users

Incindent

Securityaffairs

12.11.19

Data of ZoneAlarm Forum Users Leaked Following Breach

Incindent

Securityweek

12.11.19

Are We Going Back to TheMoon (and How is Liquor Involved)?

Vulnerebility

SANS

12.11.19

Your supplier’s BEC problem is your BEC problem

Spam

Net-security

12.11.19

The FBI multi-factor authentication notification that should have never been

BigBrothers

Net-security

12.11.19

The password reuse problem is a ticking time bomb

Crypto

Net-security

12.11.19

Top concerns for audit executives? Cyber risks and data governance

Cyber

Net-security

12.11.19

Enterprise expectations of managed service providers and public cloud providers are shifting

Security

Net-security

12.11.19

Whitepaper: Cybersecurity is improving, but is it enough?

Security

Net-security

11.11.19

CERTrating a new Tool to evaluate CERT/CSIRT maturity level

Safety

Securityaffairs

11.11.19

Hackers Receive $500,000 in One Week via Bugcrowd

Security

Securityweek

11.11.19

Zurich Announces New Cyber Insurance for Manufacturing Industry

ICS

Securityweek

11.11.19

Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame

Incindent

Thehackernews

11.11.19

Platinum Cyberspies Use Sophisticated Backdoor in Attacks

APT

Securityweek

11.11.19

BlueKeep Attacks Crash Systems Due to Meltdown Patch

Vulnerebility

Securityweek

11.11.19

DDoS attacks in Q3 2019

Attack

Securelist

11.11.19

Australian Govt agency ACSC warns of Emotet and BlueKeep attacks

BigBrothers

Securityaffairs

11.11.19

Apple Mail stores parts of encrypted emails in plaintext DB

Apple

Securityaffairs

11.11.19

Major ASP.NET hosting provider SmarterASP hit by ransomware attack

Ransomware

Securityaffairs

11.11.19

Twitter Spy Case Highlights Risks for Big Tech Platforms

Social

Securityweek

11.11.19

Did the recent malicious BlueKeep campaign have any positive impact when it comes to patching?

Vulnerebility  Virus

SANS

11.11.19

When is the right time to red team?

Security

Net-security

11.11.19

Believe the hype, but control the threat: Reducing the risk of ransomware

Ransomware

Net-security

11.11.19

Speeding MTTR when a third-party cloud service is attacked

Attack

Net-security

11.11.19

PayPal becomes phisher’s favorite brand, Office 365 phishing techniques evolve

Phishing

Net-security

11.11.19

Attackers continue to leverage greater levels of social engineering and sophistication

Security

Net-security

11.11.19

Do you think you can recognize fake news on Facebook?

Social

Net-security

10.11.19

Malware Meets Politics With Trump and Clinton Themed Infections

Virus

Bleepingcomputer

10.11.19

US Govt Asks Users to Be Wary of Holiday Scams and Malware

BigBrothers  Virus

Bleepingcomputer

10.11.19

QuikSilver and Billabong Affected by Ransomware Attack

Ransomware

Bleepingcomputer

10.11.19

New Stealthy Backdoor Used by Platinum APT in Recent Attacks

APT

Bleepingcomputer

10.11.19

Clever WebEx Spam Use Cisco Redirect to Deliver RAT Malware

Spam  Virus

Bleepingcomputer

10.11.19

Bugcrowd Paid Over $500K in Bug Bounties in One Week

Security

Bleepingcomputer

10.11.19

Ransom News

Ransom

Ransom

10.11.19

Bad News: AI and 5G Are Expected to Worsen Cybersecurity Risks

Cyber

Securityaffairs

10.11.19

Boardriders and its subsidiarities QuikSilver and Billabong infected with ransomware

Ransomware

Securityaffairs

10.11.19

Phishing scam issues fake court summons

Phishing blog

Avast blog

10.11.19

Facebook removes Russian propaganda networks

BigBrother blog  Social blog

Avast blog

10.11.19

A look inside the hack of a nuclear reactor’s computer network

BigBrother blog

Avast blog

10.11.19

Wireshark Tutorial: Examining Trickbot Infections

Malware blog

Palo Alto Unity42

10.11.19

Web-Based Threats: First Half 2019

Cyber blog

Palo Alto Unity42

10.11.19

Home & Small Office Wireless Routers Exploited to Attack Gaming Servers

Exploit blog

Palo Alto Unity42

10.11.19

The Next Generation of Network Security Is Cloud-Delivered

Safety blog

Palo Alto

10.11.19

New and Enhanced Palo Alto Networks Support Offerings Elevate the Customer ...

Safety blog

Palo Alto

10.11.19

Container Security: Vulnerability Management from Build to Run

Safety blog

Palo Alto

10.11.19

A Firewall Admin’s Introduction to Serverless Security

Safety blog

Palo Alto

10.11.19

Cyber Canon Candidate Book Review: A Sustainable Digital Economy: Not Fear,...

Safety blog

Palo Alto

10.11.19

Protecting Data Center Interconnect Links

Safety blog

Palo Alto

10.11.19

Palo Alto Networks Named a Leader in The Forrester ZTX Wave™

Safety blog

Palo Alto

10.11.19

Fake Netflix Update Request by Text

Mobil  Spam

SANS

10.11.19

The Platinum APT group adds the Titanium backdoor to its arsenal

APT

Securityaffairs

10.11.19

DHS CISA warns of Critical issues in Medtronic Medical equipment

BigBrothers

Securityaffairs

9.11.19

Spanish MSSP Targeted by BitPaymer Ransomware

Ransomware blog

Mcafee blog

9.11.19

Buran Ransomware; the Evolution of VegaLocker

Ransomware blog

Mcafee blog

9.11.19

Application Protection Research Series—Executive Summary

Security blog

F5 Labs

9.11.19

Make Sure You Keep an Eye on Your APIs

Security blog

F5 Labs

9.11.19

Adopt Insertion Point Security for a Microservices World

Security blog

F5 Labs

9.11.19

Xhelper: Persistent Android Dropper App Infects 45K Devices in Past 6 Months

OS Blog

Symantec

9.11.19

Nemty Ransomware Expands Its Reach, Also Delivered by Trik Botnet

Ransomware blog

Symantec

9.11.19

Vulnerability Spotlight: Code execution vulnerabilities in LEADTOOLS

Vulnerebility blog

Cisco Talos

9.11.19

Talos, Cisco Incident Response team up to offer more protection than ever

Safety blog

Cisco Talos

9.11.19

How adversaries use politics for compromise

BigBrother blog

Cisco Talos

9.11.19

C2 With It All: From Ransomware To Carding

Ransomware blog

Cisco Talos

9.11.19

The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to defend against encrypted DejaBlue

Vulnerebility blog

Cisco Talos

9.11.19

Vulnerability Spotlight: Two remote code execution vulnerabilities in Investintech Able2Extract

Vulnerebility blog

Cisco Talos

9.11.19

CISO Advisory: Security Architecture

Security blog

Cisco Talos

9.11.19

How much do data breaches affect stock prices?

Incident blog

Eset

9.11.19

Android keyboard app caught red‑handed trying to make sneaky purchases

OS Blog

Eset

9.11.19

Five ways to strengthen employee cybersecurity awareness

Cyber blog

Eset

9.11.19

Antimalware Day 2019: Building a culture of cybersecurity awareness

Malware blog

Eset

9.11.19

Microsoft Warns of More Harmful Windows BlueKeep Attacks, Patch Now

OS  Vulnerebility

Bleepingcomputer

9.11.19

Australian Govt Warns of Active Emotet and BlueKeep Threats

BigBrothers  Virus

Bleepingcomputer

9.11.19

QNAP Warns Users to Secure Devices Against QSnatch Malware

Virus

Bleepingcomputer

9.11.19

Microsoft to Remove Downloads Folder from Disk Cleanup

OS

Bleepingcomputer

9.11.19

Legitimate TDS Platform Abused to Push Malware via Exploit Kits

Exploit

Bleepingcomputer

9.11.19

Specially Crafted ZIP Files Used to Bypass Secure Email Gateways

Vulnerebility

Bleepingcomputer

9.11.19

NVIDIA Fixes Security Flaws in GPU Driver, GeForce Experience

Vulnerebility

Bleepingcomputer

9.11.19

Google Allies With Security Companies to Boost Play Store Safety

Android

Bleepingcomputer

9.11.19

Facebook Discloses Privacy Breach Caused by Groups API Bug

Social

Bleepingcomputer

9.11.19

Subpoena Phishing Emails Serve Nasty Predator Thief Infection

Phishing

Bleepingcomputer

9.11.19

News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine Fails

Security

Threatpost

9.11.19

Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone

Incindent

Threatpost

9.11.19

Pwn2Own Tokyo Roundup: Amazon Echo, Routers, Smart TVs Fall to Hackers

Congress

Threatpost

9.11.19

Amazon Fixes Ring Video Doorbell Flaw That Leaked Wi-Fi Credentials

Vulnerebility

Threatpost

9.11.19

Platinum APT Shines Up New Titanium Backdoor

APT

Threatpost

9.11.19

Art Imitates Life: Lessons from the Final Season of Mr. Robot

IT

Threatpost

9.11.19

Cisco Talos discovered multiple flaws in the LEADTOOLS toolkits

Vulnerebility

Securityaffairs

9.11.19

DHS Warns of Critical Flaws in Medtronic Medical Devices

BigBrothers

Securityweek

9.11.19

Cybersecurity Workforce Gap: 145% Growth Needed to Meet Global Demand

Cyber

Securityweek

8.11.19

Italian police shut down darkweb Berlusconi market and arrested admins

BigBrothers

Securityaffairs

8.11.19

Microsoft warns of more disruptive BlueKeep attacks and urges patch installation

Attack

Securityaffairs

8.11.19

Microsoft: BlueKeep Exploit Will Likely Deliver More Damaging Payloads

Exploit

Securityweek

8.11.19

Hackers Can Target LEADTOOLS Users With Malicious Image Files

Virus

Securityweek

8.11.19

Accenture Launches Cyber Ranges for Industrial Companies

IT

Securityweek

8.11.19

Sepio Systems Raises $6.5 Million to Defend Against Rogue Hardware

IT

Securityweek

8.11.19

Tech Firms React to Netizens' Digital Privacy Concerns

Privacy

Securityweek

8.11.19

Cisco fixes small business routers, kills eavesdropping vulnerability in conferencing devices

Vulnerebility

Net-security

8.11.19

Titanium: the Platinum group strikes again

APT

Securelist

8.11.19

Capesand is a new Exploit Kit that appeared in the threat landscape

Exploit

Securityaffairs

8.11.19

Amazon Kindle, Embedded Devices Open to Code-Execution

Vulnerebility

Threatpost

8.11.19

Why Big Breach Fines Don’t Equal Fewer Breaches

Incindent

Threatpost

8.11.19

Gamers Hit with Nvidia GPU Driver, GeForce Flaws

Vulnerebility

Threatpost

8.11.19

Google Enlists Help to Fight Bad Android Apps

Android

Threatpost

8.11.19

Ex-Twitter Employees Spied on Saudi Dissidents: DoJ

Social

Threatpost

8.11.19

How to Secure Critical Infrastructure When Patching Isn’t Possible

Vulnerebility

Threatpost

8.11.19

Pwn2Own Tokyo 2019 -Day2: experts hacked Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers

Congress

Securityaffairs

8.11.19

DNA-testing startup Veritas Genetics disclosed a security breach

Incindent

Securityaffairs

8.11.19

Amazon’s Ring Video Doorbell could open the door of your home to hackers

Hacking

Securityaffairs

8.11.19

Actively Developed Capesand Exploit Kit Emerges in Attacks

Exploit

Securityweek

8.11.19

Charges: Chinese Surveillance Goods Illegally Sold to US

BigBrothers

Securityweek

8.11.19

Bug Hunters Hack Samsung Galaxy S10, Xiaomi Mi9 at Pwn2Own

Congress

Securityweek

8.11.19

Cisco Patches Vulnerabilities in Small Business Routers, RoomOS Software

Vulnerebility

Securityweek

8.11.19

Microsoft Apps Diverted from Their Main Use

Security

SANS

8.11.19

Cybersecurity workforce skills gap rises to over 4 million

Cyber

Net-security

8.11.19

November 2019 Patch Tuesday Forecast: Out with the old, in with the new

Vulnerebility

Net-security

8.11.19

SIEM complexity and cloud visibility put companies at risk

Security

Net-security

8.11.19

Global internet freedom declines for the ninth consecutive year

Security

Net-security

8.11.19

Only 47% of cybersecurity pros are prepared to deal with attacks on their IoT devices

Security

Net-security

8.11.19

What financial records do companies need to keep, and for how long?

Security

Net-security

8.11.19

Mobile security firms will help protect Google Play

Safety

Net-security

7.11.19

TrendMicro Employee Sold Customer Info to Tech Support Scammers

Spam

Bleepingcomputer

7.11.19

DarkUniverse APT Stayed Hidden for 8 Years, Updated Regularly

APT

Bleepingcomputer

7.11.19

Microsoft Defender ATP Gets Advanced Hunting Capabilities, More

Safety

Bleepingcomputer

7.11.19

Windows 10 Insider Build 19018 Released With New Quick Web Searches

OS

Bleepingcomputer

7.11.19

Microsoft Issues November 2019 Office Updates With Memory Leak Fix

OS

Bleepingcomputer

7.11.19

New Megacortex Ransomware Changes Windows Passwords, Threatens to Publish Data

Ransomware

Bleepingcomputer

7.11.19

Tech Support Scammers Are Abusing a New Firefox Browser Lock Bug

Vulnerebility

Bleepingcomputer

7.11.19

WordPress Admins Infect Their Sites With WP-VCD via Pirated Plugins

Virus

Bleepingcomputer

7.11.19

Brooklyn Hospital Loses Patient Data In Ransomware Attack

Ransomware

Bleepingcomputer

7.11.19

Using Light Beams to Control Google, Apple, Amazon Assistants

Security

Bleepingcomputer

7.11.19

Chrome, Firefox to Hide Those Annoying Site Notification Prompts

Security

Bleepingcomputer

7.11.19

Malwarebytes 4.0 Released With New UI and Scanning Engine

Safety

Bleepingcomputer

7.11.19

Nemty Ransomware Now Spreads via Trik Botnet

Ransomware

Bleepingcomputer

7.11.19

Ransomware Attacks Hit Everis and Spain's Largest Radio Network

Ransomware

Bleepingcomputer

7.11.19

Specially Crafted ZIP archives allow bypassing secure email gateways

Vulnerebility

Securityaffairs

7.11.19

Two former Twitter employees charged of spying on Users for Saudi Arabian Government

Social

Securityaffairs

7.11.19

Saudi King Hosts CIA Chief for Talks

BigBrothers

Securityweek

7.11.19

eCommerce Fraud Prevention Firm Riskified Raises $165 Million

IT

Securityweek

7.11.19

Google Teams Up With Security Firms to Fight Bad Android Apps

Android

Securityweek

7.11.19

California Says Facebook Impeding Privacy Probe

Privacy  Social

Securityweek

7.11.19

NVIDIA Patches Flaws in GPU Display Driver, GeForce Experience

Vulnerebility

Securityweek

7.11.19

Amazon's Ring Video Doorbell Lets Attackers Steal Your Wi-Fi Password

Attack

Thehackernews

7.11.19

Gartner Says the Future of Network Security Lies with SASE

Security

Thehackernews

7.11.19

Rogue TrendMicro Employee Sold Customer Data to Tech Support Scammers

Spam

Thehackernews

7.11.19

Trend Micro rogue employee sold customer data to tech support scammers

Spam

Securityaffairs

7.11.19

Bug Hunters Earn $195,000 for Hacking TVs, Routers, Phones at Pwn2Own Tokyo 2019

Congress

Securityaffairs

7.11.19

GUI Now Available for Kamerka ICS/IoT Reconnaissance Tool

ICS  IoT

Securityweek

7.11.19

Two Former Twitter Employees Caught Spying On Users For Saudi Arabia

CyberSpy  Social

Thehackernews

7.11.19

Apple details new Safari, Location Services, Sign in with Apple privacy features

Apple

Net-security

7.11.19

Facebook Privacy Breach: 100 Developers Improperly Accessed Data

Social

Threatpost

7.11.19

Google Analytics Emerges as a Phishing Tool

Phishing

Threatpost

7.11.19

Emotet Resurgence Continues With New Tactics, Techniques and Procedures

Virus

Threatpost

7.11.19

DarkUniverse APT Emerges to Deliver Sophisticated, Targeted Spy Attacks

APT

Threatpost

7.11.19

Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security

Security

Threatpost

7.11.19

You’ve Been Served…with Subpoena-Themed Phishing Emails

Phishing

Threatpost

7.11.19

Rogue Trend Micro Employee Sold Customer Data for 68K Accounts

Incindent  Virus

Threatpost

7.11.19

Getting the best value out of security assessments

Security

SANS

7.11.19

A flaw in the Libarchive library impacts major Linux distros

Vulnerebility

Securityaffairs

7.11.19

‘Camgirl’ sites expose millions of members and users

Incindent

Securityaffairs

7.11.19

Facebook discloses a new leak that exposes group members’ data

Social

Securityaffairs

7.11.19

Documents Show Facebook Controlling Competitors With User Data: Report

Social

Securityweek

7.11.19

Three Charged in US With Spying on Twitter Users for Saudi Arabia

BigBrothers

Securityweek

7.11.19

More malspam pushing Formbook

Spam

SANS

7.11.19

5 factors to consider when choosing an encryption key management system

Crypto

Net-security

7.11.19

The promise and peril of post quantum computing

Security

Net-security

7.11.19

Cybercriminals are testing exposed credentials for future account takeover attacks

CyberCrime

Net-security

7.11.19

Phishing attacks at highest level in three years

Phishing

Net-security

7.11.19

Security and risk compliance: Still the most important part of IT strategy

Security

Net-security

6.11.19

Brooklyn Hospital lost patient records after a ransomware infection

Ransomware

Securityaffairs

6.11.19

Libarchive Vulnerability Impacts Multiple Linux Distributions

Vulnerebility

Securityweek

6.11.19

Bug Hunters Earn $195,000 for Hacking TVs, Routers, Phones at Pwn2Own

Congress

Securityweek

6.11.19

Immersive Labs Raises $40 Million for Cyber Skills Platform

IT

Securityweek

6.11.19

Google Announces Open Source Silicon Root-of-Trust Project

IT

Securityweek

6.11.19

The Future of Cyber Through the Eyes of an Intelligence Firm

IT

Securityweek

6.11.19

Trend Micro Employee Sold Customer Data to Scammers

Spam

Securityweek

6.11.19

Facebook: Third-Party App Developers Improperly Accessed User Information

Social

Securityweek

6.11.19

Google Patches Critical Flaws in Android's System Component

Android

Securityweek

6.11.19

Facebook Reveals New Data Leak Incident Affecting Groups' Members

Social

Thehackernews

6.11.19

Explained: How New 'Delegated Credentials' Boosts TLS Protocol Security

Crypto  Hacking

Thehackernews

6.11.19

Detecting and tracking phishing campaigns through web analytics identifiers

Phishing

Net-security

6.11.19

New, improved Microsoft 365 security and compliance features

Security

Net-security

6.11.19

Anonymous and LulzSecITA hacked professional orders and telephone operator Lyca Mobile

APT

Securityaffairs

6.11.19

Mysterious DarkUniverse APT remained undetected for 8 years

APT

Securityaffairs

6.11.19

Ransomware attack impacted government services in the territory of Nunavut, Canada

Ransomware

Securityaffairs

6.11.19

VMware Unveils New Security Features, Enhancements for NSX, SD-WAN, Secure State

Safety

Securityweek

6.11.19

DarkUniverse APT Uses Just-in-Time Malware Creation

APT

Securityweek

6.11.19

Microsoft Announces New Security Capabilities Across Platforms

Security

Securityweek

6.11.19

Hackers Can Use Lasers to Send Voice Commands to Phones, Smart Speakers

Hacking  Mobil

Securityweek

6.11.19

IBM: Face Recognition Tech Should be Regulated, Not Banned

Security

Securityweek

6.11.19

Sumo Logic Acquires JASK to Expand Cloud-Native Platform

IT

Securityweek

6.11.19

Snowden Warns of Web Giants' 'Irresistible Power'

BigBrothers

Securityweek

6.11.19

Broadcom Completes Acquisition of Symantec Enterprise Unit for $10.7 Billion

IT

Securityweek

6.11.19

More malspam pushing Formbook

Spam

SANS

6.11.19

Defining risk controls that actually work

Security

Net-security

6.11.19

Who is responsible for Active Directory security within your organization?

Security

Net-security

6.11.19

Most organizations plan to increase their cybersecurity budgets in 2020

Cyber

Net-security

6.11.19

As more companies deploy cloud apps, they must also implement security tools

Security

Net-security

6.11.19

Key predictions that will impact CIOs and IT pros over the next five years

Security

Net-security

6.11.19

Nikkei hit by BEC scammers, loses $29 million

Spam

Net-security

5.11.19

DarkUniverse – the mysterious APT framework #27

APT

Securelist

5.11.19

‘Light commands’ attack: hacking Alexa, Siri, and other voice assistants via Laser Beam

Hacking

Securityaffairs

5.11.19

PoC Exploits Published for Unpatched RCE Bugs in rConfig

Exploit

Securityweek

5.11.19

Hackers Can Silently Control Your Google Home, Alexa, Siri With Laser Light

Hacking

Thehackernews

5.11.19

Critical Remote Code Execution Flaw Found in Open Source rConfig Utility

Vulnerebility

Threatpost

5.11.19

Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam

Hacking

Threatpost

5.11.19

BlueKeep Attacks Have Arrived, Are Initially Underwhelming

Attack

Threatpost

5.11.19

Magecart Groups Attack Simultaneous Sites in Card-Theft Frenzy

CyberCrime

Threatpost

5.11.19

Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANs

Ransomware

Threatpost

5.11.19

BEC Scam Costs Media Giant Nikkei $29 Million

Spam

Threatpost

5.11.19

Flaws in Able2Extract Professional tool allow hacking targeted machine with malicious image files

Virus

Securityaffairs

5.11.19

Everis and Spain’s radio network Cadena SER hit by ransomware

Ransomware

Securityaffairs

5.11.19

Microsoft Unveils New Security Tools for Azure

Security

Securityweek

5.11.19

Vendor Email Compromise is Latest Identity Deception Attack

Attack

Securityweek

5.11.19

Europol on Methodology Behind Successful Spear Phishing Attacks

Phishing

Securityweek

5.11.19

Proofpoint Acquires Insider Threat Management Firm ObserveIT for $225 Million

IT

Securityweek

5.11.19

Hackers Can Target Able2Extract Users With Malicious Image Files

Virus

Securityweek

5.11.19

Targeted Ransomware Attacks Hit Several Spanish Companies

Ransomware

Thehackernews

5.11.19

Bluekeep exploitation causing Bluekeep vulnerability scan to fail

Exploit

SANS

5.11.19

IoT is an ecosystem, as secure as its weakest link

IoT

Net-security

5.11.19

How can security teams effectively monitor OT and ICS networks?

ICS

Net-security

5.11.19

A continuous problem: Tackling the cybersecurity skills shortage

Cyber

Net-security

5.11.19

Researchers develop machine learning-based detector that stops lateral phishing attacks

Phishing

Net-security

5.11.19

50% of apps will not be migrated to the cloud

Security

Net-security

5.11.19

Employees know vulnerabilities exist, but they can’t resolve them quickly enough

Security

Net-security

5.11.19

The digital economy is approaching a critical tipping point

Security

Net-security

5.11.19

Europol: Spear phishing the most prevalent cyber threat affecting orgs across the EU

Phishing

Net-security

4.11.19

Office 365 to Prevent Malicious Docs From Infecting Windows

Security

Bleepingcomputer

4.11.19

Microsoft 365 Helps Improve Orgs’ Security and Compliance Posture

Security

Bleepingcomputer

4.11.19

Microsoft 365 Now Helps Find and Review Insider Security Threats

Security

Bleepingcomputer

4.11.19

Office 365 Breach Detection Capabilities Now in Public Preview

Security

Bleepingcomputer

4.11.19

First Microsoft Edge Stable Release Candidate Now Available

Security

Bleepingcomputer

4.11.19

BEC Fraudsters Divert $742,000 from Ocala City in Florida

Spam

Bleepingcomputer

4.11.19

GitLab plans to ban hires in China and Russia due to espionage concerns

BigBrothers  CyberSpy

Securityaffairs

4.11.19

Ocala City in Florida lost $742,000 following BEC attack

Spam

Securityaffairs

4.11.19

Cybersecurity Executives Say Cost of Security Reasonable: Survey

Cyber

Securityweek

4.11.19

Microsoft Office for Mac Users Exposed to Macro-Based Attacks

Apple

Securityweek

4.11.19

Two unpatched RCE flaws in rConfig software expose servers to hack

Vulnerebility

Securityaffairs

4.11.19

QSnatch malware already infected thousands of QNAP NAS devices

Virus

Securityaffairs

4.11.19

Mueller Documents: Manafort Pushed Ukraine Hack Theory

BigBrothers  Hacking

Securityweek

4.11.19

Midwest's 1st Cyber Battalion to Be Based in Indiana

BigBrothers

Securityweek

4.11.19

BlueKeep Vulnerability Exploited to Deliver Cryptocurrency Miner

Cryptocurrency

Securityweek

4.11.19

Exclusive – Analysis of the sample that hit the Kudankulam Nuclear Power Plant

BigBrothers

Securityaffairs

4.11.19

New Gafgyt botnet targets Gaming Servers

BotNet

Securityaffairs

4.11.19

rConfig Install Directory Remote Code Execution Vulnerability Exploited

Exploit  Vulnerebility

SANS

4.11.19

People are the very first element in a pragmatic cybersecurity strategy

Cyber

Net-security

4.11.19

Organizations fail to maximize use of Microsoft 365 security features

Security

Net-security

4.11.19

Companies should disclose cybersecurity risk management efforts

Cyber

Net-security

4.11.19

Risky transactions on mobile devices increase 138% since 2017

Mobil

Net-security

4.11.19

Together, AI and the IoT are having a bigger-than-expected impact

Security

Net-security

4.11.19

Whitepaper: SIEM + Threat Intelligence

Security

Net-security

3.11.19

First Cyber Attack ‘Mass Exploiting’ BlueKeep RDP Flaw Spotted in the Wild

Attack  Exploit

Securityaffairs

3.11.19

Controversial law entered into effect in Russia this week

BigBrothers

Securityaffairs

3.11.19

Watch Out IT Admins! Two Unpatched Critical RCE Flaws Disclosed in rConfig

Vulnerebility

Thehackernews

3.11.19

First Cyber Attack 'Mass Exploiting' BlueKeep RDP Flaw Spotted in the Wild

Exploit

Thehackernews

3.11.19

BlueKeep Remote Code Execution Bug in RDP Exploited En Masse

Exploit

Bleepingcomputer

3.11.19

Windows 10 1903 Affected by New Setup Bug, Workaround Ready

OS

Bleepingcomputer

3.11.19

Google Begins Testing Extension Manifest V3 in Chrome Canary

IT

Bleepingcomputer

3.11.19

Office 365 Phishing Campaign Baits Employees with Pay Raises

Phishing

Bleepingcomputer

3.11.19

US MS-ISAC Releases the October List of End of Support Software

BigBrothers

Bleepingcomputer

3.11.19

Media Giant Nikkei Loses $29 Million to BEC Scammers

Spam

Bleepingcomputer

3.11.19

Google Chrome is Getting the 'Close other tabs' Option Back

IT

Bleepingcomputer

3.11.19

GandCrab RaaS Was a Training Ground for Malware Distributors

Ransomware

Bleepingcomputer

3.11.19

Chrome Zero-Day Bug with Exploit in the Wild Gets A Patch

Exploit  Vulnerebility

Bleepingcomputer

3.11.19

20 Companies Pledge Support for the Hack_Right Program

Hacking

Bleepingcomputer

3.11.19

Ransom News

Ransom

Ransom

3.11.19

Ouroboros Decryptor

Anti-Ransomware Tool 

Anti-Ransomware Tool 

3.11.19

CVE-2019-2114 flaw allows hackers to plant malware on Android devices via NFC beaming

Vulnerebility  Virus

Securityaffairs

3.11.19

Proton Technologies makes the code of ProtonMail iOS App open source

Apple

Securityaffairs

3.11.19

Desjardins credit union data breach bigger than initially thought

Incindent

Securityaffairs

3.11.19

Remark on EML Attachments

Security

SANS

2.11.19

Marriott Reports Exposure of Associates' Social Security Numbers

Incindent

Bleepingcomputer

2.11.19

Emotet Trojan Brings a Malware Scare with Halloween Emails

Spam  Virus

Bleepingcomputer

2.11.19

Active Duty U.S. Military Now Gets Free Credit Monitoring

BigBrothers

Bleepingcomputer

2.11.19

Microsoft Shares Solutions for Windows TLS Failures, Timeouts

OS

Bleepingcomputer

2.11.19

Discord Abused to Spread Malware and Harvest Stolen Data

Virus

Bleepingcomputer

2.11.19

Chinese Hackers Steal SMS Messages from Linux Routing Servers

BigBrothers  Mobil

Bleepingcomputer

2.11.19

Microsoft Warns of Windows Slow Startup Due to Persistent Memory

OS

Bleepingcomputer

2.11.19

QSnatch Malware Infects Thousands of NAS Devices, Steals Credentials

Virus

Bleepingcomputer

2.11.19

New Gafgyt Variant Recruits Routers to DDoS Servers for Valve Games

Attack

Bleepingcomputer

2.11.19

Phishing Campaign Targets Precision Engineering Company

Phishing

Bleepingcomputer

2.11.19

Office 365 Users Targeted by Voicemail Scam Pages

Spam blog

Mcafee blog

2.11.19

Did You Check Your Quarantine?!

Malware blog

Mcafee blog

2.11.19

Using Expert Rules in ENS to Prevent Malicious Exploits

Exploit blog  Malware blog

Mcafee blog

2.11.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in September 2019

Security blog

F5 Labs

2.11.19

Three Ways to Hack the U.S. Election

BigBrother blog

F5 Labs

2.11.19

2019 Application Protection Report Podcast Series

Security blog

F5 Labs

2.11.19

MESSAGETAP: Who’s Reading Your Text Messages?

Social blog

FireEye

2.11.19

CertUtil Qualms: They Came to Drop FOMBs

Security blog

FireEye

2.11.19

The commoditization of mobile espionage software

BigBrother blog

Cisco Talos

2.11.19

Vulnerability Spotlight: Denial-of-service in VMWare Fusion 11

Vulnerebility blog

Cisco Talos

2.11.19

Cisco Talos helps CISOs get back to basics with advisory series

Security blog

Cisco Talos

2.11.19

Safe downloading habits: What to teach your kids

Security blog

Eset

2.11.19

Deepfakes: When seeing isn’t believing

Security blog

Eset

2.11.19

Facebook builds tool to confound facial recognition

Social blog

Eset

2.11.19

What you may be getting wrong about cybersecurity

Cyber blog

Eset

2.11.19

Microsoft Office for Mac cannot properly disable XLM macros

Alert

Alert

2.11.19

News Wrap: APTs, Office 365 Voicemail Phish and Bed Bath & Beyond Breach

Security

Threatpost

2.11.19

Android Keyboard App Could Swindle 40M Users Out of Millions

Android

Threatpost

2.11.19

Stubborn Malware Targets QNAP NAS Hardware Specifically

Virus

Threatpost

2.11.19

Google Discloses Chrome Flaw Exploited in the Wild

Vulnerebility

Threatpost

2.11.19

Office for Mac Users Warned of Malicious SYLK Files

Apple

Threatpost

2.11.19

Solar, Wind Power Utility Disrupted in Rare Cyberattack

Attack

Threatpost

2.11.19

Global Crime Ring Bilks U.S. Military Members, Vets Out of Millions

BigBrothers

Threatpost

2.11.19

CVE-2019-13720 flaw in Chrome exploited in Operation WizardOpium attacks

Exploit

Securityaffairs

2.11.19

Canada Credit Union Data Breach Bigger Than First Thought: Desjardins

Incindent

Securityweek

2.11.19

Tip: Password Managers and 2FA

Safety

SANS

1.11.19

Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium

Exploit  Vulnerebility

Securelist

1.11.19

Chrome Zero-Day Vulnerability Exploited in Korea-Linked Attacks

Exploit  Vulnerebility

Securityweek

1.11.19

Source Code of ProtonMail iOS App Made Public

Apple

Securityweek

1.11.19

sPower it the first renewable energy provider hit by a cyber attack that caused communications outages

BigBrothers

Securityaffairs

1.11.19

Facebook agrees to pay a fine of $643,000 in Cambridge Analytica scandal

Social

Securityaffairs

1.11.19

Cyberbalkanization and the Future of the Internet

Cyber

Securityweek

1.11.19

Cisco Firewall Vulnerability Exploited in Attack on U.S. Renewable Energy Provider

ICS  Vulnerebility

Securityweek

1.11.19

Controversial Russian Law to Control Internet Enters Force

BigBrothers

Securityweek

1.11.19

New Office 365 Phishing Scams Using Audio Voicemail Recordings

Phishing

Bleepingcomputer

1.11.19

Fraudster Admits Role In Theft of Millions From Thousands of Army Members

Incindent

Bleepingcomputer

1.11.19

Bed Bath & Beyond Discloses Customer Login Credentials Breach

Incindent

Bleepingcomputer

1.11.19

Microsoft Issues Workaround for Windows 10 User Creation IME Bug

Vulnerebility

Bleepingcomputer

1.11.19

Paradise Ransomware Decryptor Gets Your Files Back for Free

Ransomware

Bleepingcomputer

1.11.19

Microsoft Users Hit with Phishing Kits Hosted on Thousands of Domains

Phishing

Bleepingcomputer

1.11.19

21 Million Logins for Top 500 Firms Offered on the Dark Web

Incindent

Bleepingcomputer

1.11.19

World's First Domain Registrar Network Solutions Discloses Breach

Incindent

Bleepingcomputer

1.11.19

Chrome 78 Disables Code Integrity Check to Mitigate "Aw Snap!" Crashes

Vulnerebility

Bleepingcomputer

1.11.19

Ransomware Attack Causes School 'District-Wide Shutdown'

Ransomware

Bleepingcomputer

1.11.19

The cake is a lie! Uncovering the secret world of malware-like cheats in video games

Virus

Securelist

1.11.19

Kaspersky researchers found a Chrome 0-day exploited in attacks in the wild

Exploit  Vulnerebility

Securityaffairs

1.11.19

New Chrome 0-day Bug Under Active Attacks – Update Your Browser Now!

Exploit  Vulnerebility

Thehackernews

1.11.19

ICS Attackers Set To Inflict More Damage With Evolving Tactics

ICS

Threatpost

1.11.19

China-Linked Hackers Spy on Texts With MessageTap Malware

CyberCrime  Virus

Threatpost

1.11.19

Fake Voicemail/Office 365 Attack Targets Enterprise Execs

Attack

Threatpost

1.11.19

Valve Source Engine, Fortnite Servers Crippled By Gafgyt Variant

Security

Threatpost

1.11.19

Calypso APT Emerges from the Shadows to Target Governments

APT

Threatpost

1.11.19

Watchdog Sues FBI Over Facial Recognition Secrecy

BigBrothers

Securityweek

1.11.19

Bed Bath & Beyond Blames Password Reuse for Hacked Accounts

Hacking

Securityweek

1.11.19

India Seeks Answers From WhatsApp After Cyberespionage

CyberSpy  Social

Securityweek

1.11.19

Keeping up with the evolving ransomware security landscape

Ransomware

Net-security

1.11.19

Security services and network security still top spending priorities for CISOs in MENA

Security

Net-security

1.11.19

How has your organization’s risk level changed in the past 12 months?

Security

Net-security

1.11.19

IT teams are embracing intent-based networking, investing in AI technologies

Security

Net-security

31.10.19

China-linked APT41 group targets telecommunications companies with new backdoor

APT

Securityaffairs

31.10.19

21 Million stolen credentials from Fortune 500 companies available on the dark web

Incindent

Securityaffairs

31.10.19

Chinese Cyberspies Use New Malware to Intercept SMS Traffic at Mobile Operators

BigBrothers  CyberSpy

Securityweek

31.10.19

Facebook Agrees to Pay Fine in Cambridge Analytica Scandal

Social

Securityweek

31.10.19

Norsk Hydro Receives First Insurance Payout Following Cyberattack

Attack

Securityweek

31.10.19

Chinese Hackers Compromise Telecom Servers to Spy on SMS Messages

BigBrothers

Thehackernews

31.10.19

EML attachments in O365 - a recipe for phishing

Phishing

SANS

31.10.19

Leading domain name registrars suffered data breach

Incindent

Net-security

31.10.19

Apple releases fresh security updates for macOS, iOS

Apple

Net-security

31.10.19

Windows 10 Build 19013 Out With New DirectX 12 Features for Insiders

OS

Bleepingcomputer

31.10.19

Maze Ransomware Attacks Italy in New Email Campaign

Ransomware

Bleepingcomputer

31.10.19

Microsoft Updates Windows 10 PowerToys with Batch Renamer Tool

OS

Bleepingcomputer

31.10.19

xHelper Trojan Variant Reinstalls Itself After Removal, Infects 45K

Virus

Bleepingcomputer

31.10.19

Europe's Electronic ID System Fixed Against Impersonation Risk

Vulnerebility

Bleepingcomputer

31.10.19

NordVPN Plans Security and Privacy Upgrades After Hack

Privacy  Security

Bleepingcomputer

31.10.19

Google Adds New Ways For IT Admins to Keep Enterprises Secure

Security

Bleepingcomputer

31.10.19

Mozilla Provides Workaround for Firefox 70 Not Loading Sites

Security

Bleepingcomputer

31.10.19

Ransomware Actor Starting Young Makes Big Money, Gets Arrested

Ransomware

Bleepingcomputer

31.10.19

Blogger and WordPress Sites Hacked to Show Sextortion Scams

Social

Bleepingcomputer

31.10.19

Israel is going to extradite to US the Russian hacker Alexei Bourkov

BigBrothers

Securityaffairs

31.10.19

Hackers behind Uber and Lynda hacks plead guilty in data breaches

Incindent

Securityaffairs

31.10.19

eIDAS flaws allowed attackers to impersonate any EU citizen or business

BigBrothers

Securityaffairs

31.10.19

Israel Approves Extradition to US of Russian 'Hacker'

BigBrothers

Securityweek

31.10.19

Corellium Responds to Apple's Copyright Infringement Lawsuit

Apple

Securityweek

31.10.19

Leading Web Domain Name Registrars Disclose Data Breach

Incindent

Thehackernews

31.10.19

Two Hackers Who Extorted Money From Uber and LinkedIn Plead Guilty

Social

Thehackernews

31.10.19

City of Johannesburg, on Second Hit, Refuses to Pay Ransom

Ransomware

Threatpost

31.10.19

WhatsApp Spyware Attack: Uncovering NSO Group Activity

CyberSpy

Threatpost

31.10.19

U.S. Universities Get Failing Grades for DMARC Adoption

BigBrothers  Spam

Threatpost

31.10.19

Android Malware Plaguing 45K Devices Remains a Mystery

Android

Threatpost

31.10.19

Insurance Pays Out a Sliver of Norsk Hydro’s Cyberattack Damages

Attack

Threatpost

31.10.19

Murky Details Surround Bed, Bath and Beyond Breach

Incindent

Threatpost

31.10.19

KTRW: The journey to build a debuggable iPhone

Vulnerebility blog

Project Zero

31.10.19

Network Solutions data breach – hacker accessed data of more 22 Million accounts

Incindent

Securityaffairs

31.10.19

Emsisoft released a free decryption tool for Paradise ransomware

Ransomware

Securityaffairs

31.10.19

It’s official, administrative network at Kudankulam Nuclear Power Plant was infected with DTrack

BigBrothers

Securityaffairs

31.10.19

Hackers Plead Guilty in Data Breach that Uber Covered Up

Incindent

Securityweek

31.10.19

Data Breach Hits 22 Million Web.com, Register.com, Network Solutions Accounts

Incindent

Securityweek

31.10.19

Florida Elections Chief: State Systems Prepared for Hackers

BigBrothers

Securityweek

31.10.19

21 Million Stolen Fortune 500 Credentials For Sale on Dark Web

Incindent

Securityweek

31.10.19

Apple Patches Tens of Vulnerabilities in macOS Catalina, iOS 13

Apple

Securityweek

31.10.19

Hackers Target Indian Nuclear Power Plant – Everything We Know So Far

BigBrothers  Hacking

Thehackernews

31.10.19

Office 365 users targeted with fake voicemail alerts in suspected whaling campaign

Phishing

Net-security

31.10.19

Container usage has grown in complexity, specific security controls are needed

Security

Net-security

31.10.19

Cybercriminals using custom phishing tools to target the world’s largest tech brands

CyberCrime  Phishing

Net-security

31.10.19

Most IT pros still haven’t migrated all their users to Windows 10

OS

Net-security

31.10.19

As the eSports industry grows, it becomes attractive for financially motivated cybercriminals

CyberCrime

Net-security

31.10.19

Whitepaper: Busting the myth that more threat intel feeds lead to better security

Security

Net-security

31.10.19

G Suite admins get context-aware access controls, rule-based automated actions and alerts

Security

Net-security

30.10.19

Paradise Decryptor

Anti-ransom Tool

Anti-ransom Tool

30.10.19

Xhelper, a new piece of Android malware that is infecting 2K+ devices each month

Android

Securityaffairs

30.10.19

WhatsApp sued Israeli surveillance firm NSO Group and its parent Q Cyber Technologies

BigBrothers  Social

Securityaffairs

30.10.19

Thousands of Xiaomi FURRYTAIL pet feeders exposed to hack

Mobil

Securityaffairs

30.10.19

Can You Trust Security Vendor Surveys?

Security

Securityweek

30.10.19

Nuclear Power Plant in India Hit by North Korean Malware: Report

BigBrothers

Securityweek

30.10.19

Threat to US Elections Not Limited to Russia in 2020

BigBrothers

Securityweek

30.10.19

Austrian Post Fined Over Customer Data Misuse

BigBrothers

Securityweek

30.10.19

NSO Group: Israeli Firm Accused of Cyberespionage

BigBrothers  CyberSpy

Securityweek

30.10.19

New Adwind Variant Targets Windows, Chromium Credentials

Virus

Threatpost

30.10.19

Facebook Sues NSO Group Over Alleged WhatsApp Hack

Social

Threatpost

30.10.19

Fancy Bear Targets Sporting, Anti-Doping Orgs As 2020 Olympics Loom

APT

Threatpost

30.10.19

Joker’s Stash Drops Largest-Ever Credit Card Cache on Dark Web

CyberCrime

Threatpost

30.10.19

Australia Proposes Facial Recognition for Adult Sites

BigBrothers

Threatpost

30.10.19

Country of Georgia Suffers Widespread Cyberattack

Attack

Threatpost

30.10.19

ThreatList: Most Retail Hardware Bug Bounty Flaws Are Critical

Vulnerebility

Threatpost

30.10.19

WhatsApp Sues Israeli Firm NSO Over Cyberespionage

CyberSpy  Social

Securityweek

30.10.19

Critical Vulnerabilities Found in Rittal Cooling System

Vulnerebility

Securityweek

30.10.19

Facebook Sues Israeli NSO Spyware Firm For Hacking WhatsApp Users

Social

Thehackernews

30.10.19

Mysterious malware that re-installs itself infected over 45,000 Android Phones

Android

Thehackernews

30.10.19

The Pirate Bay was recently down for over a week due to a DDoS attack

Attack

Thehackernews

30.10.19

The nastiest ransomware, phishing and botnets of 2019

Analysis

Net-security

30.10.19

Majority of 2019 breaches were the result of unapplied security patches

Incindent

Net-security

30.10.19

Examining security process maturity in 400 organizations

Security

Net-security

30.10.19

Global DX tech investments to total $7.4 trillion over the next four years

IT

Net-security

29.10.19

Users online claim Kudankulam nuclear power plant was hit by a cyber attack

BigBrothers

Securityaffairs

29.10.19

Details for 1.3 million Indian payment cards available on the dark web, its the biggest single card database ever

Incindent

Securityaffairs

29.10.19

MikroTik Router Vulnerabilities Can Lead to Backdoor Creation

Vulnerebility

Securityweek

29.10.19

Slack Offers Bigger Rewards for Serious Vulnerabilities

Vulnerebility

Securityweek

29.10.19

Aussie Consumer Watchdog Sues Google Over Location Data Use

Privacy

Securityweek

29.10.19

China Slams US for 'Economic Bullying' of Huawei, ZTE

BigBrothers

Securityweek

29.10.19

Russian Cyberspies Again Target Sporting, Anti-Doping Organizations

BigBrothers  CyberSpy

Securityweek

29.10.19

U.S. Fast-Food Chain Krystal Investigating Payment Card Breach

Incindent

Securityweek

29.10.19

Windows 10X Leak Reveals New Launcher, Taskbar, and Lock Screen

OS

Bleepingcomputer

29.10.19

Sixth June Fashion Site Hacked to Steal Credit Cards

CyberCrime

Bleepingcomputer

29.10.19

U.S. Food Chain Alerts Customers of Payment Card Incident

CyberCrime

Bleepingcomputer

29.10.19

Microsoft Removes Windows 10 1903 Update Block After Bluetooth Fix

OS

Bleepingcomputer

29.10.19

Pwn2Own Hacking Event Expands to Industrial Control Systems

Congress

Bleepingcomputer

29.10.19

US Govt Grants Adobe a License to Continue Venezuela Business

BigBrothers

Bleepingcomputer

29.10.19

How to Perform Windows Defender Offline Scan in Windows 10

OS

Bleepingcomputer

29.10.19

Windows 10 Start Menu, Search Issues Continue After KB4522355 Update

OS

Bleepingcomputer

29.10.19

TrialWorks Ransomware Attack Disrupts Court Cases and Deadlines

Ransomware

Bleepingcomputer

29.10.19

How to Get the Windows 10 November 2019 Update Now

OS

Bleepingcomputer

29.10.19

Magecart Gang Targets Skin Care Site Visitors For 5+ Months

CyberCrime

Threatpost

29.10.19

Cybercriminals Impersonate Russian APT ‘Fancy Bear’ to Launch DDoS Attacks

APT

Threatpost

29.10.19

PHP Bug Allows Remote Code-Execution on NGINX Servers

Vulnerebility

Threatpost

29.10.19

Pwn2Own Expands Into Industrial Control Systems Hacking

Congress

Threatpost

29.10.19

UniCredit Suffers Third Breach Despite Investing Billions in Cybersecurity

Incindent

Threatpost

29.10.19

US Federal Communications Commission proposes cutting off funds for Chinese telecom equipment

BigBrothers

Securityaffairs

29.10.19

Fancy Bear continues to target sporting and anti-doping organizations

APT

Securityaffairs

29.10.19

U.S. fast-food restaurant chain Krystal suffered a payment card incident

Incindent

Securityaffairs

29.10.19

Up to 2,000 Georgia websites have been hit by cyber attacks

BigBrothers

Securityaffairs

29.10.19

U.S. Proposes Cutting Off Funds for Chinese Telecom Equipment

BigBrothers

Securityweek

29.10.19

Fortinet Acquires Endpoint Security Firm enSilo

IT

Securityweek

29.10.19

Cloud Networking and Security Firm Aviatrix Raises $40 Million

IT

Securityweek

29.10.19

City of Johannesburg Refuses to Pay Ransom to Hackers

Ransomware

Securityweek

29.10.19

Russian Hackers Targeting Anti-Doping Agencies Ahead of 2020 Tokyo Olympics

CyberCrime

Thehackernews

29.10.19

UniCredit Bank Suffers 'Data Incident' Exposing 3 Million Italian Customer Records

Incindent

Thehackernews

29.10.19

Generating PCAP Files from YAML

Security

SANS

29.10.19

Is the enterprise on the brink of a global web supply chain attack?

Attack

Net-security

29.10.19

Exploring the benefits of cybersecurity certification

Cyber

Net-security

29.10.19

Companies unprepared to deal with mobile attacks, synthetic identity fraud, CCPA compliance

Security

Net-security

29.10.19

Investigations are an unfortunate fact of life for most corporations

Security

Net-security

29.10.19

Most decision makers expect AI and 5G to impact their cybersecurity strategy

Cyber

Net-security

28.10.19

UniCredit says personal data of 3 million customers was compromised

Incindent

Net-security

28.10.19

Steam-powered scammers

Spam

Securelist

28.10.19

New FuxSocy Ransomware borrows code from defunct Cerber

Ransomware

Securityaffairs

28.10.19

UniCredit bank discloses a data breach that impacted 3 million of Italian clients

Incindent

Securityaffairs

28.10.19

SWEED targets precision engineering companies in Italy

BigBrothers

Securityaffairs

28.10.19

Raccoon info stealer already infected 100,000+ worldwide

Virus

Securityaffairs

28.10.19

2,000 Georgia Websites Hit by Cyber Attacks

Attack

Securityweek

28.10.19

Millions Download Adware-Carrying Apps From Google Play

Android

Securityweek

28.10.19

Data Breach at St. Louis Health Center Impacts up to 152,000

Incindent

Securityweek

28.10.19

New Jersey Man Pleads Guilty to Hacker Attack Involving Hardware Keyloggers

Hacking

Securityweek

28.10.19

US Senators Call for Security Probe of TikTok

BigBrothers

Securityweek

28.10.19

Adobe Exposed Creative Cloud Customer Information

Incindent

Securityweek

28.10.19

PHP RCE flaw actively exploited to pop NGINX servers

Exploit

Net-security

28.10.19

Using scdbg to Find Shellcode

Exploit

SANS

28.10.19

Ransomware hit TrialWorks, law firms and lawyers were not able to access court documents

Ransomware

Securityaffairs

28.10.19

Experts found 17 apps in the Apple App Store infected with clicker Trojan

Android

Securityaffairs

28.10.19

NCSC Report: U.K. neutralized over 600 cyber attacks this year

BigBrothers

Securityaffairs

28.10.19

Unusual Activity with Double Base64 Encoding

Security

SANS

28.10.19

DevOps firewall: How pre-configuring your cloud deployment can ensure compliance

Security

Net-security

28.10.19

New protocol extends Wi-Fi range, can be used with existing hardware

Security

Net-security

28.10.19

IaaS cloud vulnerabilities expected to increase 50% over 2018 figures

Vulnerebility

Net-security

28.10.19

Integrating security into IoT projects is not easy, but it’s increasingly urgent

IoT

Net-security

28.10.19

Despite enthusiasm for AI adoption, governments are experiencing challenges

Security

Net-security

28.10.19

Whitepaper: Building a Threat Intelligence Programme

Security

Net-security

27.10.19

Ransom News

Ransom

Ransom

27.10.19

SonicWall: Encrypted Attacks, IoT Malware Surge as Global Malware Volume Dips

Security blog

Sonicwall

27.10.19

MedusaLocker ransomware freezes files around the world

Ransomware blog

Avast blog

27.10.19

Practical Behavioral Profiling of PowerShell Scripts through Static Analysis (Part 3)

Malware blog

Palo Alto Unity42

27.10.19

Practical Behavioral Profiling of PowerShell Scripts through Static Analysis (Part 2)

Malware blog

Palo Alto Unity42

27.10.19

Practical Behavioral Profiling of PowerShell Scripts through Static Analysis (Part 1)

Malware blog

Palo Alto Unity42

27.10.19

A Year of Wins for the Palo Alto Networks LGBTQIA+ Employee Network

Security blog

Palo Alto

27.10.19

Cyber Canon Candidate Book Review: A Data-Driven Computer Security Defense:...

Security blog

Palo Alto

27.10.19

Palo Alto Networks Statement Regarding Tariffs

Security blog

Palo Alto

27.10.19

Introducing Cloud Managed Prisma Access!

Security blog

Palo Alto

27.10.19

New FuxSocy Ransomware Impersonates the Notorious Cerber

Ransomware

Bleepingcomputer

27.10.19

7.5 Million Records of Adobe Creative Cloud User Data Exposed

Incindent

Bleepingcomputer

27.10.19

Office 365 Enables ARC for Enhanced Anti-Spoofing Detection

Security

Bleepingcomputer

27.10.19

P&G Online Beauty Store Hacked to Steal Payment Info

Incindent

Bleepingcomputer

27.10.19

Microsoft Fixes Windows 10 1903 Network Issue, Update Block Stays

OS

Bleepingcomputer

27.10.19

Ransomware Attack Shuts Down City of Johannesburg's Systems

Ransomware

Bleepingcomputer

27.10.19

How To Fix "Aw Snap!" Crash in Google Chrome 78

Security

Bleepingcomputer

27.10.19

GitLab Backtracks on Forced Tracking After Negative Feedback

Security

Bleepingcomputer

27.10.19

CVE-2019-11043 exposes Web servers using nginx and PHP-FPM to hack

Vulnerebility

Securityaffairs

27.10.19

Unsecured ElasticSearch DB exposed data for 7.5M Adobe Creative Cloud Users

Incindent

Securityaffairs

27.10.19

New PHP Flaw Could Let Attackers Hack Sites Running On Nginx Servers

Vulnerebility

Thehackernews

26.10.19

P&G online beauty store First Aid Beauty hit by Magecart attack

CyberCrime

Securityaffairs

26.10.19

Encryption – A Feasible Savior against Prevalent Privacy Issues in Business Communication

Crypto  Privacy

Securityaffairs

26.10.19

HUNTING RACCOON: THE NEW MASKED BANDIT ON THE BLOCK

Malware blog

Cybereason

26.10.19

Using Expert Rules in ENS 10.5.3 to Prevent Malicious Exploits

Malware blog

Mcafee blog

26.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Crescendo

Malware blog

Mcafee blog

26.10.19

Shikata Ga Nai Encoder Still Going Strong

Cyber blog

FireEye

26.10.19

Inside the Hacking Community Market – Reselling RIG EK Services

Exploit blog

Checkpoint

26.10.19

TCP SACK Security Issue in OpenBSD – CVE-2019-8460

OS Blog

Checkpoint

26.10.19

Pony’s C&C servers hidden inside the Bitcoin blockchain

Cryptocurrency blog

Checkpoint

26.10.19

CISO Advisory: Governance & Risk Management

Security blog

Cisco Talos

26.10.19

Cisco Talos helps CISOs get back to basics with advisory series

Security blog

Cisco Talos

26.10.19

Gustuff return, new features for victims

Cyber blog

Cisco Talos

26.10.19

Your smart doorbell may be collecting more data than you think, study finds

Cyber blog

Eset

26.10.19

Facebook lays out plan to protect elections

Social blog

Eset

26.10.19

Tracking down the developer of Android adware affecting millions of users

OS Blog

Eset

26.10.19

Smart cities must be cyber‑smart cities

Cyber blog

Eset

26.10.19

NordVPN reveals breach at datacenter provider

Incident blog

Eset

26.10.19

Winnti Group’s skip‑2.0: A Microsoft SQL Server backdoor

Malware blog

Eset

26.10.19

News Wrap: Hotel Robot Hacks, FTC Stalkerware Crackdown

Security

Threatpost

26.10.19

Is AWS Liable in Capital One Breach?

Incindent

Threatpost

26.10.19

U.N., UNICEF, Red Cross Under Ongoing Mobile Attack

BigBrothers

Threatpost

26.10.19

Ransomware, Mobile Malware Attacks to Surge in 2020

Security

Threatpost

26.10.19

7M Adobe Creative Cloud Users Exposed to Hackers

Incindent

Threatpost

26.10.19

DDoS Attack on Amazon Web Services caused intermittently outage

Attack

Securityaffairs

25.10.19

VMware Patch Alert!

Vulnerebility

SANS

25.10.19

More on DNS Archeology (with PowerShell)

Security

SANS

25.10.19

Tortuga Crisis: Moonwalk, one of the biggest pirate CDNs eliminated dragging other big CDN-providers down

Virus

Securityaffairs

25.10.19

Palo Alto Networks Blames Tariffs for Firewall Price Hikes

Security

Securityweek

25.10.19

Major Florida Health System Fined $2M for HIPPA Breach

Incindent

Securityweek

25.10.19

The Threat to SoHo IoT Devices is Growing Rapidly

IoT

Securityweek

25.10.19

Raccoon Malware-as-a-Service Gains Momentum

Virus

Securityweek

25.10.19

Ransomware attack hit the City of Johannesburg municipality

Ransomware

Securityaffairs

25.10.19

Spear-phishing attacks target United Nations and NGOs

Phishing

Securityaffairs

25.10.19

Google addresses High-Severity sandbox escape issues in Chrome

Vulnerebility

Securityaffairs

25.10.19

Experts attribute NukeSped RAT to North Korea-Linked hackers

APT  Virus

Securityaffairs

25.10.19

United Nations Organizations Targeted in Ongoing Phishing Campaign

BigBrothers  Phishing

Securityweek

25.10.19

Verizon, AT&T, Sprint and T-Mobile to replace SMS with RCS Messaging in 2020

Mobil

Thehackernews

25.10.19

Phishers have been targeting UN, UNICEF, Red Cross officials for months – and still do

Phishing

Net-security

25.10.19

Windows 10 1903 KB4522355 Update Released with Start Menu Fixes

OS

Bleepingcomputer

25.10.19

Microsoft Phishing Attacks Target United Nations and Charities

Phishing

Bleepingcomputer

25.10.19

Cash App Scammers Deal Their Cons on Twitter, Instagram, YouTube

Social

Bleepingcomputer

25.10.19

iOS Clicker Trojan Malware Found in 17 Apps in Apple's App Store

Apple

Bleepingcomputer

25.10.19

Malicious Android Apps Hide Ads From Google Employees

Android

Bleepingcomputer

25.10.19

Hacker Plants Keylogger Devices on Company Systems Faces 12yr in Jail

Crime

Bleepingcomputer

25.10.19

FTC Issues Guidance On Protecting Against SIM Swap Attacks

Attack  BigBrothers

Bleepingcomputer

25.10.19

Discord Turned Into an Info-Stealing Backdoor by New Malware

Virus

Bleepingcomputer

25.10.19

FBI Updates Initiative to Protect U.S. Elections from Cyberattacks

BigBrothers

Bleepingcomputer

25.10.19

FBI Warns Govt Agencies, SMBs to Defend Against E-Skimming Threats

BigBrothers

Bleepingcomputer

25.10.19

ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones

Mobil

Threatpost

25.10.19

Samsung Rolls Out Fix For Galaxy S10 Fingerprint Sensor Glitch

Mobil

Threatpost

25.10.19

Apple Removes 17 Malicious iOS Apps From App Store

Apple

Threatpost

25.10.19

Religious Website Data Exposed for Months

Incindent

Threatpost

25.10.19

Raccoon Malware Scavenges 100,000+ Devices to Steal Data

Virus

Threatpost

25.10.19

Cash App Twitter Giveaway a Haven for Stealing Money

Social

Threatpost

25.10.19

Researchers Warn of New Cache-Poisoned DoS Attack Method

Attack

Securityweek

25.10.19

Micron Launches Silicon-Based Security-as-a-Service Platform

IT

Securityweek

25.10.19

Google Patches More High-Value Chrome Sandbox Escape Vulnerabilities

Vulnerebility

Securityweek

25.10.19

Security pros like their job, yet many struggle with burnout and work-life balance

Security

Net-security

25.10.19

Could lighting your home open up your personal information to hackers?

Security

Net-security

25.10.19

Blacklisted apps increase 20%, attackers focus on tax-branded key terms

Mobil

Net-security

25.10.19

CIO role remains critical in leading enterprises through crises and transformations

Security

Net-security

24.10.19

Office 365 Adds Malware ZAP Toggle to Security & Compliance CenterSecurity

Bleepingcomputer