List  Articles  Page  2019  2018  2017  2016  1  2  3  4  5  6  7  8

Date

Name

Category

Web

24.10.19

Office 365 Adds Malware ZAP Toggle to Security & Compliance Center

Security

Bleepingcomputer

24.10.19

New CPDoS Web Cache Poisoning Attacks Impact Sites Using Popular CDNs

Attack

Bleepingcomputer

24.10.19

Windows 10 Insider Build 19008 Released With Fixes

OS

Bleepingcomputer

24.10.19

Chrome 78 Released With DoH Trial, Tab Hover Cards, and More

Security

Bleepingcomputer

24.10.19

U.S. Superior Court Systems Hacked to Spread Phishing Emails

Phishing

Bleepingcomputer

24.10.19

MedusaLocker Ransomware Wants Its Share of Your Money

Ransomware

Bleepingcomputer

24.10.19

Scammers Behind €10 Million BEC Fraud Arrested in Spain

Spam

Bleepingcomputer

24.10.19

Billing Provider Billtrust Suffers Outage After Malware Attack

Virus

Bleepingcomputer

24.10.19

Firefox 70 Released with In-Browser Data Breach Notifications

Security

Bleepingcomputer

24.10.19

Retina-X Banned by FTC From Selling Their ‘Stalking’ Apps

Mobil

Bleepingcomputer

24.10.19

Researchers Analyze North Korea-Linked NukeSped RAT

Virus

Securityweek

24.10.19

Click-Fraud Trojan Found in Apple App Store

Apple

Securityweek

24.10.19

18 iOS apps with stealthy ad clicking code removed from App Store

Apple

Net-security

24.10.19

Swedish Government grants police the use of spyware against violent crime suspects

BigBrothers

Securityaffairs

24.10.19

Some ICS Security Incidents Resulted in Injury, Loss of Life: Survey

ICS

Securityweek

24.10.19

Data Security Firm Very Good Security (VGS) Raises $35 Million

IT

Securityweek

24.10.19

DDoS Attack Hits Amazon Web Services

Attack

Securityweek

24.10.19

42 Adware Apps with 8 Million Downloads Traced Back to Vietnamese Student

Android

Thehackernews

24.10.19

Samsung Galaxy S10 Banned by Banks Due to Buggy Fingerprint Reader

Mobil

Bleepingcomputer

24.10.19

Malicious Apps on Alexa or Google Home Can Spy or Steal Passwords

Android

Bleepingcomputer

24.10.19

Russian Hackers Use Iranian Threat Group's Tools, Servers as Cover

CyberCrime

Bleepingcomputer

24.10.19

Hacker Breached Servers Belonging to Multiple VPN Providers

Incindent

Bleepingcomputer

24.10.19

Office 365 Now Warns About Suspicious Emails with Unverified Senders

Spam

Bleepingcomputer

24.10.19

New Windows 10 Secured-Core PCs Block Firmware-Level Attacks

OS

Bleepingcomputer

24.10.19

Chinese Hackers Use New Malware to Backdoor Microsoft SQL Servers

BigBrothers  Virus

Bleepingcomputer

24.10.19

Hackers Breach Avast Antivirus Network Through Insecure VPN Profile

Incindent

Bleepingcomputer

24.10.19

Tools and Tactics of the Sodinokibi Ransomware Distributors

Ransomware

Bleepingcomputer

24.10.19

How to Update Windows 10 Drivers Manually

OS

Bleepingcomputer

24.10.19

Firefox, Chrome Bugs Allow Arbitrary Code-Execution

Vulnerebility

Threatpost

24.10.19

No ‘Silver Bullet’ Fix for Alexa, Google Smart Speaker Hacks

Hacking

Threatpost

24.10.19

Fujitsu Wireless Keyboard Plagued By Unpatched Flaws

Vulnerebility

Threatpost

24.10.19

Survey Finds People are Privacy Hypocrites

Privacy

Threatpost

24.10.19

Bedside Hotel Robot Hacked to Stream In-Room Video

Hacking

Threatpost

24.10.19

ThreatList: Google’s Advertising Network Dominates Global Data Collection

IT

Threatpost

24.10.19

15 Years Later, Metasploit Still Manages to be a Menace

Hacking

Threatpost

24.10.19

FTC Cracks Down on Stalkerware With Retina-X App Bans

BigBrothers

Threatpost

24.10.19

Open Redirect Bug in Bridge Theme Plugin Opens Admins to Spearphishing

Phishing

Threatpost

24.10.19

Magecart 5 Linked to Carbanak Gang

CyberCrime

Threatpost

24.10.19

FBI and DHS CISA issue alerts on e-skimming attacks

BigBrothers

Securityaffairs

24.10.19

Phishing attacks are a complex problem that requires layered solutions

Phishing

Net-security

24.10.19

Data collectors

Security

Securelist

24.10.19

Texas man sentenced to 145 months in federal prison for hacking Los Angeles Superior Court

Crime

Securityaffairs

24.10.19

Trend Micro Patches Code Execution Vulnerability in Anti-Threat Toolkit

Vulnerebility

Securityweek

24.10.19

Cyberattack Causes Serious Disruptions at German Automation Firm Pilz

CyberCrime

Securityweek

24.10.19

Multiple D-Link routers vulnerable to remote command execution

Alert

Alert

24.10.19

Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?

Security

SANS

24.10.19

VisibleV8: Stealthy open source tool for monitoring JavaScript in the wild

Security

Net-security

24.10.19

Top five tips for building smarter enterprise security

Security

Net-security

24.10.19

Rapid SaaS adoption compounds visibility concerns

Security

Net-security

24.10.19

5G adoption is expected to rapidly gather pace in North America

Mobil

Net-security

23.10.19

Experts found DLL Hijacking issues in Avast, AVG, and Avira solutions

Hacking

Securityaffairs

23.10.19

Robots at HIS Group are vulnerable to hack

Vulnerebility

Securityaffairs

23.10.19

Exploring the CPDoS attack on CDNs: Cache Poisoned Denial of Service

Attack  Exploit

Securityaffairs

23.10.19

Texas Man Gets 145 Months in Prison for Hacking LA Superior Court

Crime

Securityweek

23.10.19

Chrome 78 Released With DoH, 37 Security Patches

Security

Securityweek

23.10.19

Maxthon Browser Vulnerability Can Help Attackers in Post-Exploitation Phase

Exploit  Vulnerebility

Securityweek

23.10.19

Avast, Avira Products Vulnerable to DLL Hijacking

Hacking

Securityweek

23.10.19

Tech, Security Firms Launch Operational Technology Cyber Security Alliance

Security

Securityweek

23.10.19

New Cache Poisoning Attack Lets Attackers Target CDN Protected Sites

Attack

Thehackernews

23.10.19

Experts believe the Magecart Group 5 could be linked to the Carbanak APT

APT

Securityaffairs

23.10.19

Autoclerk travel reservations platform data leak also impacts US Government and military

BigBrothers  Incindent

Securityaffairs

23.10.19

pilz-ransomware-attack

Ransomware

Securityaffairs

23.10.19

Trend Micro Anti-Threat Toolkit could be used to run malware on Win PCs

Safety

Securityaffairs

23.10.19

New Variant of Gustuff Android Banking Trojan Emerges

Virus

Securityweek

23.10.19

Microsoft Invests in Securing Device Firmware

Security

Securityweek

23.10.19

New Winnti Backdoor Targets Microsoft SQL

Virus

Securityweek

23.10.19

Historical Breadcrumbs Link Magecart 5 to Carbanak Group

CyberCrime

Securityweek

23.10.19

Microsoft Launches ElectionGuard Bug Bounty Program

Security

Securityweek

23.10.19

New Azure AD Feature Detects Unauthorized Access Attempts

Security

Securityweek

23.10.19

Testing TLSv1.3 and supported ciphers

Crypto

SANS

23.10.19

How to remove human error from the cyber risk equation

Security

Net-security

23.10.19

Firefox 70 lets users track online trackers

Security

Net-security

23.10.19

How to reduce the risk posed by vulnerabilities in IoT/ICS networks?

ICS  IoT  Vulnerebility

Net-security

23.10.19

A data breach could be game over for a brand

Incindent

Net-security

23.10.19

Chance that flaws will ever be dealt with diminishes the longer they stick around

Security

Net-security

23.10.19

Analysts explore the top strategic technology trends for 2020

Security

Net-security

22.10.19

Microsoft debuts hardware-rooted security for foiling firmware attacks

Attack

Net-security

22.10.19

NordVPN, TorGuard, and VikingVPN VPN providers disclose security breaches

Incindent

Securityaffairs

22.10.19

Outdated OSs Still Present in Many Industrial Organizations: Report

ICS

Securityweek

22.10.19

Stealthy Microsoft SQL Server Backdoor Malware Spotted in the Wild

Virus

Thehackernews

22.10.19

NordVPN Breach FAQ – What Happened and What's At Stake?

Incindent

Thehackernews

22.10.19

Turla Compromises, Infiltrates Iranian APT Infrastructure

APT

Threatpost

22.10.19

New Way Found to Use Alexa, Google to ‘Voice Phish’ and Eavesdrop on Users

Phishing

Threatpost

22.10.19

Avast Network Breached As Hackers Target CCleaner Again

Incindent

Threatpost

22.10.19

Gustuff Android Banker Switches Up Technical Approach

Android

Threatpost

22.10.19

U.S. Government, Military Personnel Data Leaked By Autoclerk

BigBrothers

Threatpost

22.10.19

Czech Police and Intelligence agency dismantled Russian Spy ring on its soil

BigBrothers

Securityaffairs

22.10.19

Winnti APT group uses skip-2.0 malware to control Microsoft SQL Servers

APT

Securityaffairs

22.10.19

Facebook Steps Up Security Amid Fresh Signs of Russia Meddling

Social

Securityweek

22.10.19

TorGuard, NordVPN Respond to Breach Reports

Incindent

Securityweek

22.10.19

Google Boosts Site Isolation in Chrome

Security

Securityweek

22.10.19

New Cybersecurity Bills Promote CISOs and Privacy

Cyber

Securityweek

22.10.19

Trend Micro Acquires Cloud Security Firm Cloud Conformity

IT

Securityweek

22.10.19

What's up with TCP 853 (DNS over TLS)?

Security

SANS

22.10.19

Why organizations must arm their SOCs for the future

Security

Net-security

22.10.19

Perceptions on the impact of data breaches and identity protection

Incindent

Net-security

22.10.19

How the under 30s expect new approaches to cybersecurity

Cyber

Net-security

22.10.19

How much organizations are investing in analytics and why

Security

Net-security

22.10.19

Targeted online messaging dissuading young gamers from getting involved in cybercrime

Security

Net-security

22.10.19

Whitepaper: Make smarter decisions by using orchestration with intelligence

Security

Net-security

21.10.19

Avast breached by hackers who wanted to compromise CCleaner again

Incindent

Net-security

21.10.19

Avast internal network breached for the second time by sophisticated hackers

Incindent

Securityaffairs

21.10.19

UK/US investigation revealed that Russian Turla APT masqueraded as Iranian hackers

APT  BigBrothers

Securityaffairs

21.10.19

Georgia County's Experience Shows Perils of Ransomware

Ransomware

Securityweek

21.10.19

Czech Police, Intelligence Bust Russian Spy Network

Incindent

Securityweek

21.10.19

Avast Discloses New Supply-Chain Attack Attempt

Incindent

Securityweek

21.10.19

US, UK: Russian Hackers Hijacked Iranian Malware, Infrastructure

BigBrothers

Securityweek

21.10.19

Public, Election Officials May Be Kept in the Dark on Hacks

Cyber

Securityweek

21.10.19

Hackers stole card details from BriansClub carding site

Hacking

Securityaffairs

21.10.19

TA505 cybercrime group use SDBbot RAT in recent campaigns

CyberCrime

Securityaffairs

21.10.19

US Army stopped using floppy disks as storage for SACCS system that manages nuclear weapons arsenal

BigBrothers

Securityaffairs

21.10.19

Scanning Activity for NVMS-9000 Digital Video Recorder

Hacking

SANS

21.10.19

How cybersecurity accelerates business growth

Cyber

Net-security

21.10.19

Deepfakes and voice as the next data breach

Incindent

Net-security

21.10.19

AI and ML will become important for how organizations run their digital systems

Security

Net-security

21.10.19

Spending on security hardware, software, and services continues to increase

Security

Net-security

21.10.19

Webinar: Application Protection and Performance Monitoring Using Datadog + Signal Sciences

Security

Net-security

20.10.19

Hackers Backdoor Sites by Hiding Fake WordPress Plugins

Hacking

Bleepingcomputer

20.10.19

Maze Ransomware Now Delivered by Spelevo Exploit Kit

Ransomware

Bleepingcomputer

20.10.19

Microsoft 365 Authentication Outage, Users Unable to Login

Security

Bleepingcomputer

20.10.19

STOP Ransomware Decryptor Released for 148 Variants

Ransomware

Bleepingcomputer

20.10.19

REvil Ransomware Affiliates Partner with Corporate Intruders

Ransomware

Bleepingcomputer

20.10.19

Graboid: First-Ever Cryptojacking Worm Found in Images on Docker Hub

Cryptocurrency blog

Palo Alto Unity42

20.10.19

Blackremote: Money Money Money – A Swedish Actor Peddles an Expensive New RAT

Malware blog

Palo Alto Unity42

20.10.19

More xHunt – New PowerShell Backdoor Blocked Through DNS Tunnel Detection

Malware blog

Palo Alto Unity42

20.10.19

Exploits in the Wild for vBulletin Pre-Auth RCE Vulnerability CVE-2019-16759

Exploit blog

Palo Alto Unity42

20.10.19

PKPLUG: Chinese Cyber Espionage Group Attacking Asia

BigBrother blog

Palo Alto Unity42

20.10.19

Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)

Vulnerebility blog

Palo Alto Unity42

20.10.19

The Legend of Adwind: A Commodity RAT Saga in Eight Parts

Malware blog

Palo Alto Unity42

20.10.19

CCPA: What You Need to Know for Public Cloud

Security blog

Palo Alto

20.10.19

Analysis of Two Newly Patched Kubernetes Vulnerabilities

Vulnerebility blog

Palo Alto

20.10.19

Zingbox IoT Guardian: The Only IoT Cyber Insurance Winner Recognized in the...

IoT blog

Palo Alto

20.10.19

How to Protect Organizations, Customers and National Security: Federal Igni...

Security blog

Palo Alto

20.10.19

Cyber Canon Book Review: Avogadro Corp: The Singularity Is Closer than It A...

Security blog

Palo Alto

20.10.19

Introducing Demisto v5.0: SOAR Just Got Better

Security blog

Palo Alto

20.10.19

The Top 5 Mobile Security Threats and How to Mitigate Them

Hardware blog

Palo Alto

20.10.19

SSL/TLS Decryption Can Help with GDPR Compliance

Security blog

Palo Alto

20.10.19

Upgrade Notice for Customers Using PAN-OS 9.0 and VM-Series on Azure

Safety blog

Palo Alto

20.10.19

Fake iPhone jailbreaking scam sends users to click-fraud site

OS Blog

Avast blog

20.10.19

Iranian hackers host malicious ‘Hire Military Heroes’ site

BigBrother blog

Avast blog

20.10.19

Russian hacker pleads guilty in ‘massive’ stock market cyberattack

Cyber blog

Avast blog

20.10.19

Some medical devices could be hacked, FDA warns

Hacking blog

Avast blog

20.10.19

German ransomware victim hacks back

Ransomware blog

Avast blog

20.10.19

The good, the bad, and the ugly of Cybersecurity Awareness Month

Security blog

Avast blog

20.10.19

How to Protect Multi-Cloud Environments with a Virtual Firewall

Security blog

Sonicwall

20.10.19

What Assumptions Are You Making?

Cyber

SANS

20.10.19

Fake updraftplus wordpress plugins

Vulnerebility

Securityaffairs

20.10.19

A critical Linux Wi-Fi bug could be exploited to fully compromise systems

Vulnerebility

Securityaffairs

20.10.19

Hundreds of millions of UC Browser Android Users Exposed to MiTM Attacks. Again.

Android

Securityaffairs

20.10.19

Emsisoft released a free decryption tool for the STOP (Djvu) ransomware

Ransomware

Securityaffairs

19.10.19

STOP Djvu Decryptor

Anti-Ransom Tool

Anti-Ransom Tool

19.10.19

Windows 10 KB4520062 Update May Break Microsoft Defender ATP

OS

Bleepingcomputer

19.10.19

Malicious Tor Browser Steals Cryptocurrency from Darknet Market Users

Cryptocurrency

Bleepingcomputer

19.10.19

Fake WordPress Plugin Comes with Cryptocurrency Mining Function

Cryptocurrency

Bleepingcomputer

19.10.19

500+ Million UC Browser Android Users Exposed to MiTM Attacks. Again.

Android

Bleepingcomputer

19.10.19

Microsoft Adds Azure AD Sign-In History to Detect Unusual Activity

Security

Bleepingcomputer

19.10.19

Samsung to Patch Fingerprint Scanner Against Silicone Case Unlock Bug

Mobil

Bleepingcomputer

19.10.19

Google Chrome 77 Added New Site Isolation Security Features

Safety

Bleepingcomputer

19.10.19

European Airport Systems Infected With Monero-Mining Malware

Cryptocurrency

Bleepingcomputer

19.10.19

Cozy Bear Russian Hackers Spotted After Staying Undetected for Years

APT

Bleepingcomputer

19.10.19

Stripe Users Targeted in Phishing Attack That Steals Banking Info

Phishing

Bleepingcomputer

19.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Follow The Money

Ransomware blog

Mcafee blog

19.10.19

Definitive Dossier of Devilish Debug Details – Part Deux: A Didactic Deep Dive into Data Driven Deductions

Security blog

FireEye

19.10.19

LOWKEY: Hunting for the Missing Volume Serial ID

Security blog

FireEye

19.10.19

In the Footsteps of a Sextortion Campaign

Cyber blog

Checkpoint

19.10.19

Pony’s C&C servers hidden inside the Bitcoin blockchain

Cryptocurrency blog

Checkpoint

19.10.19

Vulnerability Spotlight: Multiple vulnerabilities in YouPHPTube

Vulnerebility blog

Cisco Talos

19.10.19

Vulnerability Spotlight: Another fix for Adobe Acrobat Reader DC text field value remote code execution

Vulnerebility blog

Cisco Talos

19.10.19

Checkrain fake iOS jailbreak leads to click fraud

OS Blog

Cisco Talos

19.10.19

Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser

Malware blog

Eset

19.10.19

What was wrong with Alexa? How Amazon Echo and Kindle got KRACKed

Hacking blog

Eset

19.10.19

Operation Ghost: The Dukes aren’t back – they never left

Hacking blog

Eset

19.10.19

Streaming devices track viewing habits, study finds

Security blog

Eset

19.10.19

Connecting the dots: Exposing the arsenal and methods of the Winnti Group

Hacking blog

Eset

19.10.19

Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise

Vulnerebility

Threatpost

19.10.19

Zappos Offers Users 10% Discount in 2012 Breach Settlement

Incindent

Threatpost

19.10.19

Major Airport Malware Attack Shines a Light on OT Security

Virus

Threatpost

19.10.19

Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent

Attack

Threatpost

19.10.19

Microsoft Tackles Election Security with Bug Bounties

Vulnerebility

Threatpost

19.10.19

Execs Could Face Jail Time For Privacy Violations

Privacy

Threatpost

19.10.19

Systems at Ingredients provider Ingredion infected with a Malware

Virus

Securityaffairs

19.10.19

Trojanized Tor Browser targets shoppers of Darknet black marketplaces

Virus

Securityaffairs

19.10.19

Microsoft to Reward Hackers for Finding Bugs in Open Source Election Software

Vulnerebility

Thehackernews

18.10.19

China-linked cyberspies Turbine PANDA targeted aerospace firms for years

BigBrothers

Securityaffairs

18.10.19

Pitney Bowes revealed that its systems were infected with Ryuk Ransomware

Ransomware

Securityaffairs

18.10.19

Ingredients Giant Ingredion Hit by Malware

Virus

Securityweek

18.10.19

Hackers Could Have Hijacked Trump Campaign Email Server

BigBrothers

Securityweek

18.10.19

Threat Intelligence Firm Flashpoint Raises $34 Million

IT

Securityweek

18.10.19

Cryptojacking worm compromised over 2,000 Docker hosts

Cryptocurrency

Net-security

18.10.19

Millions of Amazon Echo and Kindle Devices Affected by WiFi Bug

Vulnerebility

Bleepingcomputer

18.10.19

Firefox 70 Address Bar Gets New Security Indicators, Shames Insecure Sites

Security

Bleepingcomputer

18.10.19

Windows 10 1909 Is Almost Ready, What Developers Need to Know

OS

Bleepingcomputer

18.10.19

Google News Is Experiencing Indexing Issues With New Content

Security

Bleepingcomputer

18.10.19

Attackers Hide Backdoors and Cryptominers in WAV Audio Files

Cryptocurrency

Bleepingcomputer

18.10.19

Security Health Analytics Helps Secure Google Cloud, Hits Beta

Security

Bleepingcomputer

18.10.19

Unsecured Docker Hosts Attacked by New Graboid Cryptojacking Worm

Cryptocurrency

Bleepingcomputer

18.10.19

Malware Uses Your PC to Send 30K Sextortion Emails Per Hour

Spam  Virus

Bleepingcomputer

18.10.19

New SDBot Remote Access Trojan Used in TA505 Malspam Campaigns

Spam  Virus

Bleepingcomputer

18.10.19

Domain Typosquatters Target the 2020 Presidential Election

BigBrothers

Bleepingcomputer

18.10.19

Researcher released PoC exploit code for CVE-2019-2215 Android zero-day flaw

Android

Securityaffairs

18.10.19

Chinese Hackers Targeted International Aerospace Firms for Years

BigBrothers

Securityweek

18.10.19

Massachusetts Governor Announces New Cybersecurity Program

BigBrothers

Securityweek

18.10.19

Researcher Publishes PoC Exploit for Recent Android Zero-Day

Android  Exploit

Securityweek

18.10.19

Quick Malicious VBS Analysis

Virus

SANS

18.10.19

Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS

Attack  Vulnerebility

Threatpost

18.10.19

Trump Campaign Website Left Open to Email Server Hijack

BigBrothers  Hacking

Threatpost

18.10.19

Cisco Aironet Access Points Plagued By Critical, High-Severity Flaws

Vulnerebility

Threatpost

18.10.19

Phorpiex Botnet Shifts Gears From Ransomware to Sextortion

BotNet

Threatpost

18.10.19

Hacking Back? BriansClub Dark Web Attack a Boon for Banks

Hacking

Threatpost

18.10.19

Microsoft Ending Support for Windows 7 and Windows Server 2008 R2

CERT

CERT

18.10.19

Cryptocurrency miners infected more than 50% of the European airport workstations

Cryptocurrency

Securityaffairs

18.10.19

Critical and high-severity flaws addressed in Cisco Aironet APs

Vulnerebility

Securityaffairs

18.10.19

Under New Ownership, DigiCert Expands into Verified Mark Certificates

Security

Securityweek

18.10.19

Pitney Bowes Says Disruptions Caused by Ryuk Ransomware

Ransomware

Securityweek

18.10.19

Indiana Hospital System Notifying Patients After Data Breach

Incindent

Securityweek

18.10.19

Russia's Security Service Says Rebuilding Ties With U.S.

BigBrothers

Securityweek

18.10.19

Chrome for Android Enables Site Isolation Security Feature for All Sites with Login

BigBrothers

Thehackernews

18.10.19

Six steps for implementing zero trust access

Security

Net-security

18.10.19

Security still top priority as more enterprises scale IoT solutions company-wide

IoT

Net-security

18.10.19

As car manufacturers focus on connectivity, hackers begin to exploit flaws

Exploit  Vulnerebility

Net-security

18.10.19

Review: The Great Hack

Security

Net-security

18.10.19

Companies are shifting spending to support their critical IT initiatives

Security

Net-security

17.10.19

Facebook Encourages Bug Hunting in Third-Party Services

Social

Bleepingcomputer

17.10.19

OnionShare Lets Anyone Host Anonymous Sites on the Dark Web

Cyber

Bleepingcomputer

17.10.19

Symantec Fixes Bad IPS Definitions That Cause a Windows BSOD

Vulnerebility

Bleepingcomputer

17.10.19

Windows 10 1809 Update KB4520062 Fixes a Startup Black Screen Issue

OS

Bleepingcomputer

17.10.19

cammers Use Fake Checkra1n iOS Jailbreak in Click Fraud Campaign

Apple

Bleepingcomputer

17.10.19

Adobe Fixes 45 Critical Vulnerabilities in Acrobat and Reader

Vulnerebility

Bleepingcomputer

17.10.19

What Your Personal Information is Worth to Cybercriminals

CyberCrime

Bleepingcomputer

17.10.19

Chinese Hackers Use New Cryptojacking Tactics to Evade Detection

Cryptocurrency

Bleepingcomputer

17.10.19

Samsung Galaxy S10 Fingerprint Reader Defeated by Silicone Case

Mobil  Privacy

Bleepingcomputer

17.10.19

Linux SUDO Bug Lets You Run Commands as Root, Most Installs Unaffected

Hacking

Bleepingcomputer

17.10.19

Researcher releases PoC rooting app that exploits recent Android zero-da

Android

Net-security

17.10.19

International operation dismantled largest Dark Web Child abuse site

Cyber

Securityaffairs

17.10.19

Instagram Unveils New Security Controls for Third-Party Apps

Social

Securityweek

17.10.19

Dridex Operators Use SDBbot RAT in Recent Attacks

Virus

Securityweek

17.10.19

Baltimore to Buy $20M in Cyber Insurance Months After Attack

Attack

Securityweek

17.10.19

Russian Hackers Silently Hit Government Targets for Years

BigBrothers

Securityweek

17.10.19

Phishing e-mail spoofing SPF-enabled domain

Phishing

SANS

17.10.19

Cisco fixes serious flaws in enterprise-grade Catalyst and Aironet access points

Vulnerebility

Net-security

17.10.19

Graboid the first-ever Cryptojacking worm that targets Docker Hub

Cryptocurrency

Securityaffairs

17.10.19

M6 Group, largest France private multimedia group, hit by ransomware attack

CyberCrime Ransomware

Securityaffairs

17.10.19

Critical Flaw Allows Unauthorized Access to Cisco Aironet APs

Vulnerebility

Securityweek

17.10.19

Feds Shut Down Largest Dark Web Child Abuse Site; South Korean Admin Arrested

BigBrothers

Thehackernews

17.10.19

When MacOS Catalina Comes to Life: The First Few Minutes of Network Traffic From MacOS 10.15.

Apple

SANS

17.10.19

Multiple vulnerabilities in Pulse Secure VPN

Alert

Alert

17.10.19

.WAVs Hide Malware in Their Depths in Innovative Campaign

Virus

Threatpost

17.10.19

Podcast: Departing Employees Could Mean Departing Data

Security

Threatpost

17.10.19

Cybercrime Tool Prices Bump Up in Dark Web Markets

CyberCrime

Threatpost

17.10.19

10 Steps for Ransomware Protection

Ransomware

Threatpost

17.10.19

Silent Librarian Retools Phishing Emails to Hook Student Credentials

Phishing

Threatpost

17.10.19

Docker Containers Riddled with Graboid Crypto-Worm

Cryptocurrency

Threatpost

17.10.19

Huawei Lashes Out at Estonia for 'Unfounded' Security Claims

BigBrothers

Securityweek

17.10.19

German 5G Rules Avoid Huawei Ban; US Warns on Intel Sharing

BigBrothers

Securityweek

17.10.19

'Graboid' Crypto-Jacking Worm Targets Docker Hosts

Cryptocurrency

Securityweek

17.10.19

Oracle's October 2019 Critical Patch Update Includes 219 Fixes

Vulnerebility

Securityweek

17.10.19

Huawei Says Nine-Month Revenue Up Despite US Pressure

BigBrothers

Securityweek

17.10.19

Key challenges impacting IT audit pros navigating an evolving risk landscape

Security

Net-security

17.10.19

MSPs face increased risks and opportunities to rethink cybersecurity

Cyber

Net-security

17.10.19

1 in 5 SMBs have fallen victim to a ransomware attack

Ransomware

Net-security

17.10.19

Executives are not actively engaged in ensuring the effectiveness of cybersecurity strategy

Security

Net-security

17.10.19

Do digital architects have the tools to make the most of transformative technologies?

Security

Net-security

17.10.19

WAV files spotted delivering malicious code

Virus

Net-security

16.10.19

Signature update for Symantec Endpoint protection crashed many device

Vulnerebility

Securityaffairs

16.10.19

Approaching the Reverse Engineering of a RFID/NFC Vending Machine

Security

Securityaffairs

16.10.19

WordPress 5.2.4 Patches Six Vulnerabilities

Vulnerebility

Securityweek

16.10.19

Facebook Expands, Enhances Bug Bounty Programs

Social

Securityweek

16.10.19

Symantec Endpoint Protection Update Causes Many Devices to Crash

Safety

Securityweek

16.10.19

Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers

BotNet

Thehackernews

16.10.19

Security Monitoring: At Network or Host Level?

Security

SANS

16.10.19

Adobe splats bucketful of bugs in Acrobat and Reader

Vulnerebility

Net-security

16.10.19

APT trends report Q3 2019

APT

Securelist

16.10.19

Hundreds of Fake Election Domains Target Democrats, Republicans

BigBrothers

Securityweek

16.10.19

Apple: Safari Does Not Send User Browsing History to China's Tencent

Apple

Securityweek

16.10.19

Facebook Now Pays Hackers for Reporting Security Bugs in 3rd-Party Apps

Social

Thehackernews

16.10.19

Fake iOS Jailbreak Site Lures in Apple Users

Apple

Threatpost

16.10.19

A Deepfake Deep Dive into the Murky World of Digital Imitation

Security

Threatpost

16.10.19

Sudo Bug Opens Root Access on Linux Systems

Vulnerebility

Threatpost

16.10.19

Pitney Bowes Hit with Ransomware Attack

Ransomware

Threatpost

16.10.19

Unencrypted Mobile Traffic on Tor Network Leaks PII

Crypto  Safety

Threatpost

16.10.19

On-Board ‘Mystery Boxes’ Threaten Global Shipping Vessels

Security

Threatpost

16.10.19

Chinese-speaking cybercrime gang Rocke changes tactics

BigBrothers  CyberSpy

Securityaffairs

16.10.19

Adobe out-of-band security updates address 82 flaws in 3 products

Vulnerebility

Securityaffairs

16.10.19

Click2Mail suffered a data breach that potentially impacts 200,000 registrants

Incindent

Securityaffairs

16.10.19

YARA's XOR Modifier

Security

SANS

16.10.19

Code dependency mapping’s role in securing enterprise software

Security

Net-security

16.10.19

Microsegmentation for refining safety systems

Safety

Net-security

16.10.19

Fake mobile app fraud tripled in first half of 2019

Mobil

Net-security

16.10.19

When properly managed, shadow IT can benefit your organization

Security

Net-security

16.10.19

How seriously are businesses taking their PKI security?

Security

Net-security

16.10.19

Consumer spending on technology forecast to reach $1.69 trillion in 2019

IT

Net-security

16.10.19

Download: IR Reporting for Management PPT template

Security

Net-security

16.10.19

Tamper Protection prevents malware from disabling Microsoft Defender AV

Safety  Virus

Net-security

16.10.19

“Smart city” governments should also be smart about security

BigBrothers

Net-security

15.10.19

Global Shipping and mailing services firm Pitney Bowes hit by ransomware attack

Ransomware

Securityaffairs

15.10.19

Adobe Patches Over 80 Vulnerabilities in Three Products

Vulnerebility

Securityweek

15.10.19

Fake 'checkra1n' iOS Jailbreak Offered in Click Fraud Scheme

Apple

Securityweek

15.10.19

Researchers Find New Backdoor Used by Winnti Hackers

Virus

Securityweek

15.10.19

Shadow IT Has Benefits Not Yet Fully Utilized by Business

Security

Securityweek

15.10.19

Microsoft Makes Tamper Protection in Defender ATP Generally Available

Security

Securityweek

15.10.19

Google's USB-C Titan Security Key Arrives in the U.S.

Security

Securityweek

15.10.19

Adobe Releases Out-of-Band Security Patches for 82 Flaws in Various Products

Vulnerebility

Thehackernews

15.10.19

Mozilla Rolls Out Code Injection Attack Protection in Firefox

Hacking

Bleepingcomputer

15.10.19

Global Shipping Firm Pitney Bowes Affected by Ransomware Attack

Ransomware

Bleepingcomputer

15.10.19

Facebook Users Being Locked Out After Reporting Fake Accounts

Social

Bleepingcomputer

15.10.19

Microsoft Office 2010 to Reach End of Support in One Year

Security

Bleepingcomputer

15.10.19

Winnti Group Uses New PortReuse Malware Against Asian Manufacturer

CyberCrime  Virus

Bleepingcomputer

15.10.19

Microsoft Now Enables Windows 10 Tamper Protection By Default

OS

Bleepingcomputer

15.10.19

Iranian Hackers Create Credible Phishing to Steal Library Access

BigBrothers

Bleepingcomputer

15.10.19

Sodinokibi Ransomware: Following the Affiliate Money Trail

Ransomware

Bleepingcomputer

15.10.19

How to Make Windows 10 Pause Updates for a Period of Time

OS

Bleepingcomputer

15.10.19

Creating Custom Windows Sandbox Configurations in Windows 10

OS

Bleepingcomputer

15.10.19

IoT: a malware story

IoT  Virus

Securelist

15.10.19

sudo flaw allows any users to run commands as Root on Linux

Vulnerebility

Securityaffairs

15.10.19

Winnti Group was planning a devastating supply-chain attack against Asian manufacturer

CyberCrime

Securityaffairs

15.10.19

Pitney Bowes Operations Disrupted by Ransomware Attack

Ransomware

Securityweek

15.10.19

Firefox Blocks Inline and Eval JavaScript on Internal Pages to Prevent Injection Attacks

Hacking

Thehackernews

15.10.19

Apple Shares Some Browsing History with Chinese Company

Apple

Threatpost

15.10.19

Is Emotet gang targeting companies with external SOC?

Virus

Securityaffairs

15.10.19

Privacy advocates criticize Apple for sharing some users browsing data with Tencent

Apple

Securityaffairs

15.10.19

Click2Mail Informs Users of Data Breach

Incindent

Securityweek

15.10.19

Mozilla Hardens Firefox Against Injection Attacks

Attack  Hacking

Securityweek

15.10.19

California Attorney General Outlines How State Will Enforce Upcoming Privacy Law

Privacy

Securityweek

15.10.19

Critical Flaw in Sophos Cyberoam Appliances Allows Remote Code Execution

Vulnerebility

Securityweek

15.10.19

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

Hacking

Thehackernews

15.10.19

Viewing cybersecurity incidents as normal accidents

Cyber  Incindent

Net-security

15.10.19

Product showcase: Alsid for AD

Security

Net-security

15.10.19

AI development has major security, privacy and ethical blind spots

Security

Net-security

15.10.19

Most expect the risk of privileged user abuse to increase

Security

Net-security

15.10.19

Free SOAR Platforms eBook

IT

Net-security

14.10.19

Iranian Hackers Create Credible Phishing to Steal Library Access

BigBrothers  Phishing

Bleepingcomputer

14.10.19

Sodinokibi Ransomware: Following the Affiliate Money Trail

Ransomware

Bleepingcomputer

14.10.19

How to Make Windows 10 Pause Updates for a Period of Time

OS

Bleepingcomputer

14.10.19

Creating Custom Windows Sandbox Configurations in Windows 10

OS

Bleepingcomputer

14.10.19

Alleged Hacker Arraigned on $1.4 Million Cryptocurrency Fraud Charges

Cryptocurrency

Securityweek

14.10.19

Majority of Simjacker Attacks Aimed at Mobile Phones in Mexico

Attack  Mobil

Securityweek

14.10.19

Thoma Bravo to Acquire Sophos for $3.9 Billion

IT

Securityweek

14.10.19

Analysis reveals the most common causes behind mis-issued SSL/TLS certificates

Crypto

Net-security

14.10.19

A glimpse into the present state of security in robotics

Security

Securelist

14.10.19

Imperva explains how hackers stole AWS API Key and accessed to customer data

Incindent

Securityaffairs

14.10.19

Talos experts found 11 flaws in Schneider Electric Modicon Controllers

ICS

Securityaffairs

14.10.19

Compromised AWS API Key Allowed Access to Imperva Customer Data

Incindent

Securityweek

14.10.19

Apple Under Fire Over Sending Some Users Browsing Data to China's Tencent

Apple

Thehackernews

14.10.19

Charming Kitten Campaign involved new impersonation methods

CyberCrime

Securityaffairs

14.10.19

Alabama Hospital chain paid ransom to resume operations after ransomware attack

Ransomware

Securityaffairs

14.10.19

A new Mac malware dubbed Tarmac has been distributed via malvertising campaigns

Apple

Securityaffairs

14.10.19

Amazon Calls for Government Regulation of Facial Recognition Tech

Security

Securityweek

14.10.19

5 things security executives need to know about insider threat

Security

Net-security

14.10.19

New data analysis approach could strengthen the security of IoT devices

IoT

Net-security

14.10.19

Researchers may have found a way to trace serial IP hijackers

Security

Net-security

14.10.19

70% of presidential campaigns fail to provide adequate online privacy and security protections

Security

Net-security

14.10.19

Consumers concerned about connected home privacy, still few implement safety practices

Privacy

Net-security

14.10.19

Webinar: Securing Web Layer Assets with Cloud WAF

Security

Net-security

13.10.19

Nitro PDF Pro to Get Micropatches for 7 Potential RCE Bugs

Vulnerebility

Bleepingcomputer

13.10.19

Attackers Create Elaborate Crypto Trading Scheme to Install Malware

Cryptocurrency

Bleepingcomputer

13.10.19

Windows 10 1903: Known Problems in the KB4517389 Update

OS

Bleepingcomputer

13.10.19

FIN7 Hackers Load New RAT Malware Into ATM Maker's Software

CyberCrime  Virus

Bleepingcomputer

13.10.19

Nemty 1.6 Ransomware Released and Pushed via RIG Exploit Kit

Ransomware

Bleepingcomputer

13.10.19

Windows 10 1909 is Getting "Ready for Release", Named November 2019 Update

OS

Bleepingcomputer

13.10.19

Ransom News

Ransom

Ransom

13.10.19

Leafly Cannabis information platform suffered a data leak

Incindent

Securityaffairs

13.10.19

FIN7 Hackers group is back with a new loader and a new RAT

CyberCrime  Virus

Securityaffairs

13.10.19

SIM cards used in 29 countries are vulnerable to Simjacker attack

Attack  Mobil

Securityaffairs

13.10.19

SIM Cards in 29 Countries Vulnerable to Remote Simjacker Attacks

Attack  Mobil

Thehackernews

13.10.19

YARA v3.11.0 released

Security

SANS

12.10.19

Attackers Use New, Sophisticated Ways to Install Cryptominers

Cryptocurrency blog

F5 Labs

12.10.19

Staying Hidden on the Endpoint: Evading Detection with Shellcode

Malware blog

FireEye

12.10.19

IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software

Security blog

FireEye

12.10.19

Living off the Orchard: Leveraging Apple Remote Desktop for Good and Evil

OS Blog

FireEye

12.10.19

Mahalo FIN7: Responding to the Criminal Operators’ New Tools and Techniques

Hacking blog

FireEye

12.10.19

7th October – Threat Intelligence Bulletin

Cyber blog

Checkpoint

12.10.19

The story of Adobe Reader symbols

Vulnerebility blog

Project Zero

12.10.19

New IDA Pro plugin provides TileGX support

Security blog

Cisco Talos

12.10.19

Talos takes home top research honors at Virus Bulletin conference

Security blog

Cisco Talos

12.10.19

Vulnerability Spotlight: Multiple remote code execution bugs in NitroPDF

Vulnerebility blog

Cisco Talos

12.10.19

Vulnerability spotlight: Multiple vulnerabilities in Schneider Electric Modicon M580

Vulnerebility blog

Cisco Talos

12.10.19

Microsoft Patch Tuesday — Oct. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

12.10.19

EU warns of cyber‑risks as 5G looms

BigBrother blog

Eset

12.10.19

ESET discovers Attor, a spy platform with curious GSM fingerprinting

Cyber blog  Malware blog

Eset

12.10.19

How concerned are you about the privacy challenges of your IoT devices?

IoT blog

Eset

12.10.19

Internet pioneer Dr. Paul Vixie on global internet security

Security blog

Eset

12.10.19

Inside consumer perceptions of security and privacy in the connected home

Security blog

Eset

12.10.19

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

Attack blog

Eset

12.10.19

Windows 10 Update Assistant Vulnerability Needs Manual Fix, Here's How

OS

Bleepingcomputer

12.10.19

Leafly Cannabis Website Leaked User Info via Exposed Database

Incindent

Bleepingcomputer

12.10.19

Windows 10 1703 is Now End of Service, No More Security Updates

OS

Bleepingcomputer

12.10.19

Microsoft Improves Azure Active Directory Security with New Roles

Security

Bleepingcomputer

12.10.19

Almost 50% of Company Network Traffic Comes From Bots, Report Says

BotNet

Bleepingcomputer

12.10.19

Oracle Cancels Venezuela Partner Contracts Citing US Sanctions

BigBrothers

Bleepingcomputer

12.10.19

Nemty Ransomware Decryptor Released, Recover Files for Free

Ransomware

Bleepingcomputer

12.10.19

New Malware Spies on Diplomats, High-Profile Government Targets

CyberSpy  Virus

Bleepingcomputer

12.10.19

Hacker Selling User Info Stolen From Prostitution Forums

Hacking

Bleepingcomputer

12.10.19

Apple Software Update Zero-Day Used by BitPaymer Ransomware

Apple  Ransomware

Bleepingcomputer

12.10.19

Iran-Linked ‘Charming Kitten’ Touts New Spearphishing Tactics

BigBrothers

Threatpost

12.10.19

China’s Sway Over Tech Companies Tested with Apple, Blizzard

BigBrothers

Threatpost

12.10.19

Software, Supply-Chain Dangers Top List of 5G Cyber Risks

Mobil

Threatpost

12.10.19

Imperva: Data Breach Caused by Cloud Misconfiguration

Incindent

Threatpost

12.10.19

Fin7 Cybergang Retools With New Malicious Code

CyberCrime

Threatpost

12.10.19

Tens of million PCs potentially impacted by a flaw in HP Touchpoint Analytics

Vulnerebility

Securityaffairs

12.10.19

'Attor' Cyber-Espionage Platform Used in Attacks Aimed at Russia

BigBrothers  CyberSpy

Securityweek

12.10.19

Google Patches 8 Vulnerabilities in Chrome 77

Vulnerebility

Securityweek

11.10.19

Researchers released a free decryptor for the Nemty Ransomware

Ransomware

Securityaffairs

11.10.19

Top cybersecurity certifications to consider for your IT career

Cyber

Securityaffairs

11.10.19

Hospitals Resume Accepting Patients After Malware Attack

Virus

Securityweek

11.10.19

NIST and Microsoft Partner to Improve Enterprise Patching Strategies

Safety

Securityweek

11.10.19

New Blockchain Solution for IIoT Aims to Solve Scaling Problem

Cryptocurrency

Securityweek

11.10.19

UNIX Co-Founder Ken Thompson's BSD Password Has Finally Been Cracked

Hacking

Thehackernews

11.10.19

HP Touchpoint Analytics LPE Vulnerability Affects Most HP PCs

Vulnerebility

Bleepingcomputer

11.10.19

iTerm2 Patches Critical Vulnerability Active for 7 Years

Apple

Bleepingcomputer

11.10.19

Singapore Man Faces 34 Years for Amazon AWS Cryptomining Fraud

Crime  Cryptocurrency

Bleepingcomputer

11.10.19

Phishing Incident Exposes Medical, Personal Info of 60K Patients

Phishing

Bleepingcomputer

11.10.19

EU Member States Publish Joint Report on 5G Networks Security

BigBrothers  Mobil

Bleepingcomputer

11.10.19

Games and Utility Apps in Play Store Hide Bankers and Spyware

Android

Bleepingcomputer

11.10.19

New Microsoft NTLM Flaws May Allow Full Domain Compromise

Vulnerebility

Bleepingcomputer

11.10.19

Beware of Fake Amazon AWS Suspension Emails for Unpaid Bills

Spam

Bleepingcomputer

11.10.19

C is for Credit Card: MageCart Hits Volusion E-Commerce Sites

CyberCrime

Bleepingcomputer

11.10.19

Windows 10 Insider Build 18999 Gives all Insiders a Resizable Cortana

OS

Bleepingcomputer

11.10.19

Imperva explains how their recent security incident happened

Security

Net-security

11.10.19

Hacker breached escort forums in Italy and the Netherlands and is selling user data

Hacking  Incindent

Securityaffairs

11.10.19

Sophos fixed a critical vulnerability in Cyberoam firewalls

Vulnerebility

Securityaffairs

11.10.19

Magecart Attack on eCommerce Platform Hits Thousands of Online Shops

CyberCrime

Securityweek

11.10.19

vBulletin Flaw Exploited in Dutch Sex-Work Forum Breach

Vulnerebility

Threatpost

11.10.19

Cryptomining Crook Steals Game Developer’s Identity to Carry Out Dirty Work

Cryptocurrency

Threatpost

11.10.19

Sophisticated Spy Kit Targets Russians with Rare GSM Plugin

BigBrothers  CyberSpy  Mobil

Threatpost

11.10.19

DevSecOps role expansion has changed how companies address their security posture

Security

Net-security

11.10.19

11 steps organizations should take to improve their incident response strategy

Incindent

Net-security

11.10.19

iTunes Zero-Day flaw exploited by the gang behind BitPaymer ransomware

Apple  Ransomware

Securityaffairs

11.10.19

Attor malware was developed by one of the most sophisticated espionage groups

CyberSpy  Virus

Securityaffairs

11.10.19

Flaw in HP Touchpoint Analytics Could Impact Many PCs

Vulnerebility

Securityweek

11.10.19

Apple iTunes and iCloud for Windows 0-Day Exploited in Ransomware Attacks

Apple  Exploit  Ransomware

Thehackernews

11.10.19

ICS cybersecurity investment should be a priority in protecting operations from disruption

ICS

Net-security

11.10.19

New method validates the integrity of computer chips using x-rays

IT

Net-security

11.10.19

5G is here, now what?

Mobil

Net-security

11.10.19

Microsoft NTLM vulnerabilities could lead to full domain compromise

Vulnerebility

Net-security

10.10.19

iTerm2 with tmux integration is vulnerable to remote command execution

Alert

Alert

10.10.19

SAP October 2019 Security Patch Day fixes 2 critical flaws

Vulnerebility

Securityaffairs

10.10.19

Tor Project is going to remove End-Of-Life relays from the network

Security

Securityaffairs

10.10.19

Amnesty claims that 2 Morocco rights advocates were targeted by NSO Group spyware

BigBrothers

Securityaffairs

10.10.19

Ops, popular iTerm2 macOS Terminal App is affected by a critical RCE since 2012

Apple  Vulnerebility

Securityaffairs

10.10.19

iTunes Zero-Day Vulnerability Exploited by BitPaymer Ransomware

Ransomware  Vulnerebility

Securityweek

10.10.19

Singaporean Indicted in U.S. for Illegal Crypto-Mining

BigBrothers  Cryptocurrency

Securityweek

10.10.19

Tor to Reject End-of-Life Relays by Default

Security

Securityweek

10.10.19

Spanish Court Probes Alleged Spying of Assange at Ecuadorian Embassy

BigBrothers

Securityweek

10.10.19

Cisco Finds 11 Vulnerabilities in Schneider Electric Modicon Controllers

Vulnerebility

Securityweek

10.10.19

Morocco Rights Advocates Targeted by Spyware: Amnesty

BigBrothers

Securityweek

10.10.19

China’s Sway Over Tech Companies Tested with Apple, Blizzard

Apple  BigBrothers

Threatpost

10.10.19

Apple iTunes Bug Actively Exploited in BitPaymer/iEncrypt Campaign

Apple

Threatpost

10.10.19

HP Touchpoint Analytics Opens PCs to Code Execution Attack

Attack  Exploit

Threatpost

10.10.19

Most Americans Fail Cybersecurity Quiz

Cyber

Threatpost

10.10.19

Gamers Warned of High-Severity Intel, Nvidia Flaws

Vulnerebility

Threatpost

10.10.19

Privacy Groups: Ring’s Police Partnerships Can Lead to Sinister Ends

BigBrothers  Privacy

Threatpost

10.10.19

Twitter Uses Phone Numbers, Emails to Sell Ads

Social

Threatpost

10.10.19

Mining Live Networks for OUI Data Oddness

Cryptocurrency

SANS

10.10.19

Microsoft NTLM vulnerabilities could lead to full domain compromise

Vulnerebility

Net-security

10.10.19

2FA, HTTPS and private browsing still a mystery to most Americans

Security

Net-security

10.10.19

Critical command execution vulnerability in iTerm2 patched, upgrade ASAP!

Vulnerebility

Net-security

10.10.19

Multiple APT groups are exploiting VPN vulnerabilities, NSA warns

APT

Securityaffairs

10.10.19

vBulletin addresses three new high-severity vulnerabilities

Vulnerebility

Securityaffairs

10.10.19

Hackers compromised Volusion infrastructure to siphon card details from thousands of sites

CyberCrime  Hacking

Securityaffairs

10.10.19

Twitter inadvertently used Phone Numbers collected for security for Ads

Social

Securityaffairs

10.10.19

Researchers discovered a code execution flaw in NSA GHIDRA

Vulnerebility

Securityaffairs

10.10.19

SAP Patches Critical Vulnerabilities With October 2019 Security Updates

Vulnerebility

Securityweek

10.10.19

Ransomware Attacks 'Getting Bolder': Europol

Ransomware

Securityweek

10.10.19

EU Hints at Huawei Risk in 5G Security Assessment

BigBrothers  Mobil

Securityweek

10.10.19

Iranian Hackers Update Spear-Phishing Techniques in Recent Campaign

BigBrothers  Phishing

Securityweek

10.10.19

Audit Finds Critical Vulnerability in iTerm2 macOS Terminal Emulator

Apple

Securityweek

10.10.19

Many in Utilities Sector Expect Attacks on Critical Infrastructure: Survey

ICS

Securityweek

10.10.19

Pass the Hash Remains a Poorly Defended Threat Vector

Security

Securityweek

10.10.19

Cybersecurity Firms Partner on Open Source Security Technology Development

Security

Securityweek

10.10.19

NSA: Multiple State-Sponsored APTs Exploiting Enterprise VPN Flaws

BigBrothers

Securityweek

10.10.19

Apple Patches 16 Vulnerabilities With macOS Catalina 10.15

Apple

Securityweek

10.10.19

No Patch for Critical Code Execution Flaw Affecting D-Link Routers

Vulnerebility

Securityweek

10.10.19

7-Year-Old Critical RCE Flaw Found in Popular iTerm2 macOS Terminal App

Apple

Thehackernews

10.10.19

Breaches are now commonplace, but Reason Cybersecurity lets users guard their privacy

Safety

Thehackernews

10.10.19

Build or buy: What to consider when deploying on-premise or cloud-based PKI

Crypto

Net-security

10.10.19

Cybercrime is maturing, shifting its focus to larger and more profitable targets

CyberCrime

Net-security

10.10.19

Only 32% of organizations employ a security-first approach to cloud data storage

Security

Net-security

10.10.19

Does poor password hygiene still hamper your ability to achieve high security standards?

Cyber

Net-security

10.10.19

Impact and prevalence of cyberattacks that use stolen hashed administrator credentials

Cyber

Net-security

9.10.19

Twitter Apologizes for Using Your Phone Number for Advertising

Social

Bleepingcomputer

9.10.19

Windows 10 Servicing Stack Updates Fix Secure Boot Issues

OS

Bleepingcomputer

9.10.19

Windows 10 Cumulative Update KB4517389 & KB4519338 Released

OS

Bleepingcomputer

9.10.19

Microsoft Releases the October 2019 Security Updates for Office

OS

Bleepingcomputer

9.10.19

Microsoft's October 2019 Patch Tuesday Fixes 59 Vulnerabilities

OS

Bleepingcomputer

9.10.19

Microsoft Blocks Credential Theft Attack Targeting Dozens of Orgs

CyberCrime

Bleepingcomputer

9.10.19

Researcher Adds $100,000 Worth of Credit to Voi E-Scooter App

Security

Bleepingcomputer

9.10.19

57% of Businesses Use Multi-Factor Auth (MFA), Says LastPass

Crypto  Safety

Bleepingcomputer

9.10.19

Windows 10 1803 Users Warned to Update Before End of Support

OS

Bleepingcomputer

9.10.19

Hackers Patch Web Browsers to Track Encrypted Traffic

Hacking  Crypto  Vulnerebility

Bleepingcomputer

9.10.19

Multiple vulnerabilities found in the Cobham EXPLORER 710 satcom terminal

Alert

Bleepingcomputer

9.10.19

Twitter 2FA phone numbers “inadvertently” used for advertising purposes

Social

Bleepingcomputer

9.10.19

Twitter inadvertently used Phone Numbers collected for security for Ads

Social

Bleepingcomputer

9.10.19

Researchers discovered a code execution flaw in NSA GHIDRA

Vulnerebility

Bleepingcomputer

9.10.19

Apple Patches 16 Vulnerabilities With macOS Catalina 10.15

Apple

Bleepingcomputer

9.10.19

No Patch for Critical Code Execution Flaw Affecting D-Link Routers

Vulnerebility

Bleepingcomputer

9.10.19

You Gave Your Phone Number to Twitter for Security and Twitter Used it for Ads

Mobil  Social

Thehackernews

9.10.19

October 2019 Patch Tuesday: A small batch of updates from Microsoft, none from Adobe

Vulnerebility

Net-security

9.10.19

Winning the security fight: Tips for organizations and CISOs

Security

Net-security

9.10.19

APT Groups Exploiting Flaws in Unpatched VPNs, Officials Warn

APT

Threatpost

9.10.19

Intimate Details on Healthcare Workers Exposed as Cloud Security Lags

Security

Threatpost

9.10.19

Critical Microsoft Remote Desktop Flaw Fixed in Security Update

Vulnerebility

Threatpost

9.10.19

Apple Tackles Over a Dozen Bugs in its Catalina 10.15 Update

Apple

Threatpost

9.10.19

Sextortionists Get Past Defenses with Cryptocurrency Shift

Cryptocurrency

Threatpost

9.10.19

Google October Android Security Update Fixes Critical RCE Flaws

Android  Vulnerebility

Threatpost

9.10.19

MS October 2019 Patch Tuesday updates address 59 flaws

Vulnerebility

Securityaffairs

9.10.19

New US-UK Agreement Speeds Law Enforcement's Access to User Data

BigBrothers

Securityweek

9.10.19

Twitter Admits Phone Numbers Meant for Security Used for Ads

Mobil  Social

Securityweek

9.10.19

VMware Completes $2.1 Billion Acquisition of Carbon Black

IT

Securityweek

9.10.19

Vulnerabilities Expose TwinCAT Industrial Systems to DoS Attacks

Attack  Vulnerebility

Securityweek

9.10.19

Email Attacks Using Cloud Services are Increasing

Spam

Securityweek

9.10.19

Microsoft Patches 60 Flaws With October 2019 Security Updates

Vulnerebility

Securityweek

9.10.19

Microsoft Releases October 2019 Patch Tuesday Updates

Vulnerebility

Thehackernews

9.10.19

What data does Vidar malware steal from an infected host?

Virus

SANS

9.10.19

Digital transformation requires an aggressive approach to security

Security

Net-security

9.10.19

Phishing attempts increase 400%, many malicious URLs found on trusted domains

Phishing  Virus

Net-security

9.10.19

Majority of IT departments leave major holes in their USB drive security

Security

Net-security

9.10.19

BEC explodes as attackers exploit email’s identity crisis

Spam

Net-security

8.10.19

Experts found a link between a Magecart group and Cobalt Group

CyberCrime

Securityaffairs

8.10.19

2020 Presidential Candidate Campaign Websites Fail On User Privacy

BigBrothers  Privacy

Securityweek

8.10.19

Google Patches Remote Code Execution Bugs in Android 10

Android

Securityweek

8.10.19

Code Execution Vulnerability Impacts NSA Reverse Engineering Tool

Vulnerebility

Securityweek

8.10.19

Managed Detection and Response analytics report, H1 2019

Analysis

Securelist

8.10.19

Developer hacked back Muhstik ransomware crew and released keys

Ransomware

Securityaffairs

8.10.19

Preview: SecurityWeek's 2019 ICS Cyber Security Conference (Oct. 21-24 | Atlanta)

Congress

Securityweek

8.10.19

vBulletin Releases Patch Update for New RCE and SQLi Vulnerabilities

Vulnerebility

Thehackernews

8.10.19

Adobe Suspends Accounts for All Venezuela Users Citing U.S. Sanctions

Vulnerebility

Thehackernews

8.10.19

macOS Catalina: Security and privacy improvements

Apple

Net-security

8.10.19

Muhstik Decryptor

Anti-Ramson Tool

Anti-Ramson Tool

8.10.19

Credit Info Exposed in TransUnion Credential Stuffing Attack

Attack  Incindent

Bleepingcomputer

8.10.19

Adobe To Ban Users From Venezuela Due to U.S. Executive Order

BigBrothers

Bleepingcomputer

8.10.19

1 Million People Had Their Medical Data Exposed in Tū Ora Breach

Incindent

Bleepingcomputer

8.10.19

RobbinHood Ransomware Using Street Cred to Make Victims Pay

Ransomware

Bleepingcomputer

8.10.19

Muhstik Ransomware Victim Hacks Back, Releases Decryption Keys

Ransomware

Bleepingcomputer

8.10.19

Some Windows 10 Users Can't Use Firefox for Downloads

OS

Bleepingcomputer

8.10.19

DCH Hospital Pays Ryuk Ransomware for Decryption Key

Ransomware

Bleepingcomputer

8.10.19

Check If You Are in the Sephora and StreetEasy Data Breaches

Incindent

Bleepingcomputer

8.10.19

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Apple  Vulnerebility

Threatpost

8.10.19

Alabama Hospitals Pay Up in Ransomware Attack

Ransomware

Threatpost

8.10.19

D-Link Home Routers Open to Remote Takeover Will Remain Unpatched

Vulnerebility

Threatpost

8.10.19

Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says

APT  BigBrothers

Threatpost

8.10.19

Users reported problems with patches for CVE-2019-1367 IE zero-day

Vulnerebility

Securityaffairs

8.10.19

Hackers continue to exploit the Drupalgeddon2 flaw in attacks in the wild

Exploit  Hacking

Securityaffairs

8.10.19

Magecart Group Tied to Cobalt Hackers

CyberCrime

Securityweek

8.10.19

Unmask cybercriminals through identity attribution

CyberCrime

Net-security

8.10.19

Product showcase: Awake Security Network Traffic Analysis Platform

Security

Net-security

8.10.19

Organizations need tools that support DevOps security

Security

Net-security

8.10.19

Internal user mistakes create large percentage of cybersecurity incidents

Incindent

Net-security

8.10.19

Report: 2019 eSentire Threat Intelligence Spotlight

Security

Net-security

7.10.19

D-Link router models affected by remote code execution issue that will not be fixed

Vulnerebility

Securityaffairs

7.10.19

Patches for Internet Explorer Zero-Day Causing Problems for Many Users

Vulnerebility

Securityweek

7.10.19

NIST's Zero Trust Taxonomy Introduces Components, Threats and Migration Routes

BigBrothers  Safety

Securityweek

7.10.19

US will help Baltic states to secure baltic energy grid

BigBrothers

Securityaffairs

7.10.19

New Campaign Targets Drupalgeddon2 Flaw to Install Malware

Virus

Securityweek

7.10.19

Signal Rushes to Patch Serious Eavesdropping Vulnerability

Vulnerebility

Securityweek

7.10.19

Cisco closes high-impact vulnerabilities in its security offerings

Vulnerebility

Net-security

7.10.19

Data from Sephora and StreetEasy data breaches added to HIBP

Incindent

Securityaffairs

7.10.19

Hitbsecconf2019 Conference

Conference Press

Conference Press

7.10.19

Virus Bulletin 2019 Conference

Conference Press

Conference Press

7.10.19

PoS malware infections impacted four restaurant chains in the U.S.

Virus

Securityaffairs

7.10.19

U.S. to Help Secure Baltic Energy Grid Against Cyber Attacks

BigBrothers

Securityweek

7.10.19

Iranian Hackers Said to Target Presidential Campaign

APT  BigBrothers

Securityweek

7.10.19

Cloud-native applications need a unified continuous security approach

Security

Net-security

7.10.19

Insider threats are security’s new reality: Prevention solutions aren’t working

Security

Net-security

7.10.19

Consumers have concerns about cybersecurity, value education on best practices

Cyber

Net-security

7.10.19

The top 10 strategic government technology trends CIOs should plan for

Security

Net-security

7.10.19

64% of IT decision makers have reported a breach in their ERP systems in the past 24 months

Incindent

Net-security

7.10.19

Whitepaper: Identifying Web Attack Indicators

Attack

Net-security

6.10.19

HildaCrypt Decryptor

Anti-Ramson Tool

Anti-Ramson Tool

6.10.19

Ransom News

Ransom

Ransom

6.10.19

HildaCrypt Ransomware Developer Releases Decryption Keys

Ransomware

Bleepingcomputer

6.10.19

Windows 10 KB4524147 Update May Cause Boot and Printing Issues

OS

Bleepingcomputer

6.10.19

Iran-linked Phosphorus group hit a 2020 presidential campaign

APT

Securityaffairs

6.10.19

UK NCSC agency warns of APTs exploiting Enterprise VPN vulnerabilities

APT  BigBrothers

Securityaffairs

6.10.19

Hacker is auctioning a database containing details of 92 million Brazilians

Incindent

Securityaffairs

6.10.19

visNetwork for Network Data

Security

SANS

6.10.19

A bug in Signal for Android could be exploited to spy on users

Android  Exploit

Securityaffairs

6.10.19

Magecart hackers are expanding their operations

CyberCrime

Securityaffairs

6.10.19

NSA Launches New Cybersecurity Directorate

BigBrothers

Securityaffairs

6.10.19

Signal Messenger Bug Lets Callers Auto-Connect Calls Without Receivers' Interaction

Social

Thehackernews

5.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – The All-Stars

Ransomware blog

Mcafee blog

5.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us

Ransomware blog

Mcafee blog

5.10.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in August 2019

Security blog

F5 Labs

5.10.19

Tricky Trickbot Runs Campaigns Without Redirection 

Malware blog

F5 Labs

5.10.19

Head Fake: Tackling Disruptive Ransomware Attacks

Ransomware blog

FireEye

5.10.19

IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software

Security blog

FireEye

5.10.19

The Eye on the Nile

Phishing blog

Checkpoint

5.10.19

More Hidden App Malware Found on Google Play with over 2.1 Million Downloads

OS Blog  Malware blog

Symantec

5.10.19

Open Document format creates twist in maldoc landscape

Malware blog

Cisco Talos

5.10.19

Vulnerability Spotlight: Foxit PDF Reader JavaScript Array.includes remote code execution vulnerability

Vulnerebility blog

Cisco Talos

5.10.19

Hospitals in US, Australia hobbled by ransomware

Ransomware blog

Eset

5.10.19

Casbaneiro: Dangerous cooking with a secret ingredient

Cyber blog

Eset

5.10.19

Do apps need all the permissions?

Security blog

Eset

5.10.19

Cyber Security Awareness Month starts today!

Cyber blog

Eset

5.10.19

Dutch Govt Explains the Risks Behind DNS-Over-HTTPS Move

BigBrothers

Bleepingcomputer

5.10.19

UAB Medicine Data Breach Exposes Patient Info in Phishing Attack

Incindent  Phishing

Bleepingcomputer

5.10.19

Microsoft Discovers Iranian Hacking Campaign Targeting U.S. Politics

BigBrothers

Bleepingcomputer

5.10.19

Windows 10 KB4524147 Cumulative Update Breaks the Start Menu

OS

Bleepingcomputer

5.10.19

Actively Exploited Android Zero-Day Impacts Google, Samsung Devices

Android  Vulnerebility

Bleepingcomputer

5.10.19

Magecart Impacts Hundreds of Thousands of Websites, Still Growing

CyberCrime

Bleepingcomputer

5.10.19

Novter Trojan Sets its Sights on Microsoft Windows Defender

Virus

Bleepingcomputer

5.10.19

Details of 92 Million Brazilians Auctioned on Underground Forums

Incindent

Bleepingcomputer

5.10.19

Australian Govt Issues Android and iOS Security Hardening Guides

Android  BigBrothers

Bleepingcomputer

5.10.19

Four U.S. Food Chains Disclose Payment Card Theft via PoS Malware

Virus

Bleepingcomputer

5.10.19

Virus Bulletin 2019: VoIP Espionage Campaign Hits U.S. Utilities Supplier

Congress

Threatpost

5.10.19

AG Barr, Officials to Facebook: Don’t Encrypt Messaging

Crypto  Social

Threatpost

5.10.19

Google Warns of Android Zero-Day Bug Under Active Attack

Android  Attack

Threatpost

5.10.19

Virus Bulletin 2019: Magecart Infestations Saturate the Web

Congress

Threatpost

5.10.19

APTs Exploiting Enterprise VPN Vulnerabilities, UK Govt Warns

APT  BigBrothers  Vulnerebility

Securityweek

4.10.19

Microsoft: Any form of MFA takes users out of reach of most attacks

Attack

Net-security

4.10.19

The sLoad Threat: Ten Months Later

Virus

Securityaffairs

4.10.19

Project Zero researcher found unpatched Android zero-day likely exploited by NSO group

Android  Vulnerebility

Securityaffairs

4.10.19

Egypt regularly spies on opponents and activists with mobile apps

BigBrothers  CyberSpy  Mobil

Securityaffairs

4.10.19

Zero-Day Used in the Wild Impacts Pixel 2, Other Android Phones

Android

Securityweek

4.10.19

Moe's, McAlister's, Schlotzsky's Restaurants Hit by Payment Card Breach

Incindent

Securityweek

4.10.19

WhatsApp Flaw Allows Remote Code Execution via Malicious GIF File

Social  Virus

Securityweek

4.10.19

New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild

Android  Exploit

Thehackernews

4.10.19

Unpatched Android flaw exploited by attackers, impacts Pixel, Samsung, Xiaomi devices

Vulnerebility

Net-security

4.10.19

'Lost Files' Data Wiper Poses as a Windows Security ScannerSecurity

Bleepingcomputer

4.10.19

Google Chrome to Gradually Start Blocking Mixed Content by DefaultSecurity

Bleepingcomputer

4.10.19

Windows 10 Insider Build 18995 Adds PIN Sign-ins to Safe ModeOS

Bleepingcomputer

4.10.19

Microsoft Releases Windows Security Updates to Fix Printing IssueOS

Bleepingcomputer

4.10.19

Office 365 Admins Can Now Block Malicious Microsoft Query IQY FilesOS

Bleepingcomputer

4.10.19

Cyber-Spy Group Active Since 2013 Now Tied to Chinese State ActorAPT  CyberSpy

Bleepingcomputer

4.10.19

Windows Activator Bundles Banker with C2 in YouTube DescriptionSecurity

Bleepingcomputer

4.10.19

Police Seize Bot Farm Behind Potentially Fatal Scam MessagesBigBrothers  BotNet

Bleepingcomputer

4.10.19

FTCode PowerShell Ransomware Resurfaces in Spam CampaignRansomware

Bleepingcomputer

4.10.19

FBI Warns U.S. Organizations About High Impact RansomwareBigBrothers  Ransomware

Bleepingcomputer

4.10.19

6 cyber-espionage campaigns since 2013 attributed to PKPLUG China-linked group

APT  CyberSpy

Securityaffairs

4.10.19

FBI warns about high-impact Ransomware attacks on U.S. Organizations

BigBrothers  Ransomware

Securityaffairs

4.10.19

Ukrainian police dismantled a bot farm involved in multiple spam campaigns

BigBrothers  Spam

Securityaffairs

4.10.19

Turkey Fines Facebook for Breach of Data Protection Laws

Incindent  Social

Securityweek

4.10.19

Officials Push Facebook for Way to Peek at Encrypted Messages

Crypto  Social

Securityweek

4.10.19

Researcher Shows How Adversaries Can Gather Intel on U.S. Critical Infrastructure

ICS

Securityweek

4.10.19

Adwind Malware Used in Attacks Against U.S. Petroleum Firms

Virus

Securityweek

4.10.19

Alabama Hospital System Halts Admissions Amid Malware Attack

Virus

Securityweek

4.10.19

WhatsApp Flaw Opens Android Devices to Remote Code Execution

Vulnerebility

Threatpost

4.10.19

New Reductor Malware Hijacks HTTPS Traffic

Virus

Threatpost

4.10.19

Foxit PDF Reader Vulnerable to 8 High-Severity Flaws

Vulnerebility

Threatpost

4.10.19

Buffer overflows found in libpcap and tcpdump

Vulnerebility

SANS

4.10.19

Enterprises leaving themselves vulnerable to cyberattacks by failing to prioritize PKI security

Crypto  Safety  Vulnerebility

Net-security

4.10.19

Educational organizations massively vulnerable to cyber attacks

Cyber  Vulnerebility

Net-security

4.10.19

Being compliant with laws and regulations is not a guarantee against data breaches

Incindent

Net-security

3.10.19

Microsoft 365 To Get Tenant-Wide Feature Preventing Info ExposureOS

Bleepingcomputer

3.10.19

Microsoft Launches New Dual-Screen Surface DevicesOS

Bleepingcomputer

3.10.19

Windows 10X: Microsoft's New Windows OS for Dual-Screen PCsOS

Bleepingcomputer

3.10.19

Zendesk Security Breach May Impact Orgs Like Uber, Slack, and FCCIncindent

Bleepingcomputer

3.10.19

Sodinokibi Ransomware Builds An All-Star Team of AffiliatesRansomware

Bleepingcomputer

3.10.19

Threat Group Uses Bit.ly, BlogSpot, Pastebin to Deliver Trojans, RATsVirus

Bleepingcomputer

3.10.19

American Express Customer Info Accessed by Employee for Possible FraudIncindent

Bleepingcomputer

3.10.19

New Silent Starling Gang Targets 500+ Vendors in BEC Scam TwistSocial

Bleepingcomputer

3.10.19

Google Expands Privacy Controls Across Youtube, Maps, and AssistantPrivacy

Bleepingcomputer

3.10.19

Google's Password Manager Now Warns About Compromised AccountsSafety

Bleepingcomputer

3.10.19

Of All State-Backed Hackers, the Chinese Hit Most IndustriesBigBrothers

Bleepingcomputer

3.10.19

Fake Browser Updates Infect Enterprises with Ransomware, BankersRansomware

Bleepingcomputer

3.10.19

COMpfun successor Reductor infects files on the fly to compromise TLS trafficCryptoSecurelist

3.10.19

Dutch police shut down bulletproof service hosting tens of DDoS botnetsAttack  BigBrothersSecurityaffairs

3.10.19

Zendesk Discloses Old Data Breach Affecting 10,000 AccountsIncindentSecurityweek

3.10.19

Just a GIF Image Could Have Hacked Your Android Phone Using WhatsAppAndroid  SocialThehackernews

3.10.19

Microsoft will continue providing Windows 7 security updates for SMBs

OS

Net-security

3.10.19

Virus Bulletin 2019: Japanese Attacks Highlight Savvy APT Strategy

Congress

Threatpost

3.10.19

Virus Bulletin 2019: Geost Android Botnet Goes After Millions of Euros

Congress

Threatpost

3.10.19

Hack Breaks PDF Encryption, Opens Content to Attackers

Crypto

Threatpost

3.10.19

Zendesk Exposes 10,000 Accounts to Unknown Third Party

Incindent

Threatpost

3.10.19

Why This New Cybergang is Heralding a New Age For BEC

CyberCrime  Spam

Threatpost

3.10.19

Google Adds Password Checkup Feature to Chrome Browser

Safety

Threatpost

3.10.19

HQWar: the higher it flies, the harder it drops

Virus

Securelist

3.10.19

US Secretary of State Mike Pompeo warns Italy over 5G Chinese equipment supply

BigBrothers

Securityaffairs

3.10.19

Zendesk 2016 security breach may impact Uber, Slack, and other organizations

Incindent

Securityaffairs

3.10.19

Expert disclosed details of remote code execution flaw in Whatsapp for Android

Android  Social

Securityaffairs

3.10.19

Former American Express employee under investigation for customers’ data abuse

Incindent

Securityaffairs

3.10.19

U.S. to Collect DNA of All Undocumented Migrants

BigBrothers

Securityweek

3.10.19

MasterMana Campaign Combines Stealth, Free Services and Old Malware

Virus

Securityweek

3.10.19

Google Expands Use of Password Checkup Tool, Unveils New Privacy Features

Safety

Securityweek

3.10.19

US Warns Italy Over China and 5G

Mobil

Securityweek

3.10.19

"Lost_Files" Ransomware

Ransomware

SANS

3.10.19

Good cybersecurity comes from focusing on the right things, but what are they?

Security

Net-security

3.10.19

How security programs and breach history influence company valuations

Security

Net-security

3.10.19

Executives have to make cybersecurity a priority in order to secure their business

Security

Net-security

3.10.19

Security and compliance gaps of ineffective employee onboarding and offboarding

Security

Net-security

3.10.19

PDFex attacks can exfiltrate content from encrypted PDF documents

Crypto

Net-security

2.10.19

Microsoft Edge Dev Channel Updated With Media Autoplay BlockingOS

Bleepingcomputer

2.10.19

WhatsApp to Soon Let you Send Self-Destructing MessagesSocial

Bleepingcomputer

2.10.19

Microsoft Releases October 2019 Office Updates With Fixes, ImprovementsOS

Bleepingcomputer

2.10.19

Microsoft To Offer Windows 7 Extended Security Updates to SMBsOS

Bleepingcomputer

2.10.19

Singapore's GovTech Launches Vulnerability Disclosure ProgramBigBrothers  Vulnerebility

Bleepingcomputer

2.10.19

Fake Office Activation Wizard Docs Used to Spread Emotet TrojanVirus

Bleepingcomputer

2.10.19

U.S. and Australian Hospitals Targeted by New Ransomware AttacksBigBrothers  Ransomware

Bleepingcomputer

2.10.19

Highway Advertisement Billboard Hacked to Play Porn VideoHacking

Bleepingcomputer

2.10.19

Windows 10 1903 KB4522016 Cumulative Update Breaks PrintingOS

Bleepingcomputer

2.10.19

New Adwind RAT Variant Used Against the US Petroleum SectorVirus

Bleepingcomputer

2.10.19

The State of Stalkerware in 2019CyberCrimeSecurelist

2.10.19

Asics apologizes after pornography ran on screens at central store in Auckland for hoursCrimeSecurityaffairs

2.10.19

Ten hospitals in Alabama and Australia have been hit with ransomware attacksRansomwareSecurityaffairs

2.10.19

Urgent/11 Flaws Impact More RTOS Used by Medical, Industrial DevicesICSSecurityweek

2.10.19

Advanced ICS/SCADA Hacking Training Offered at SecurityWeek's 2019 ICS Cyber Security ConferenceICSSecurityweek

2.10.19

Ransomware Hits Hundreds of US Schools, Local Governments: StudyRansomwareSecurityweek

2.10.19

Singapore Lays Out Plans for Operational Technology CybersecurityBigBrothersSecurityweek

2.10.19

A Look Into Continuous Efforts By Chinese Hackers to Target Foreign GovernmentsBigBrothersThehackernews

2.10.19

How SMBs Can Mitigate the Growing Risk of File-based AttacksAttackThehackernews

2.10.19

Former Yahoo Employee Admits Hacking into 6000 Accounts for Sexual ContentIncindentThehackernews

2.10.19

Google adds Password Checkup feature to Google Accounts, Chrome

Safety

Net-security

2.10.19

Urgent11 flaws affect more medical, industrial devices than previously thought

Vulnerebility

Net-security

2.10.19

Malvertising Attack Hijacks 1B+ Sessions With Webkit Exploit

Exploit  Virus

Threatpost

2.10.19

Ransomware Attacks Leave U.S. Hospitals Turning Away Patients

Ransomware

Threatpost

2.10.19

Hackers Turn to OpenDocument Format to Avoid AV Detection

Hacking  Virus

Threatpost

2.10.19

Google Play Malicious Apps Racked Up 335M+ Installs in September

Android

Threatpost

2.10.19

Experts found 20 Million tax records for Russian citizens exposed online

BigBrothers  Incindent

Securityaffairs

2.10.19

Teheran: U.S. has started ‘Cyber War’ against Iran

BigBrothers

Securityaffairs

2.10.19

Singapore presented the Operational Technology (OT) Cybersecurity Masterplan

BigBrothers

Securityaffairs

2.10.19

Iranian Official Denies Plans to Interfere With US Election

BigBrothers

Securityweek

2.10.19

NZ Sports Store Apologises Over Porn Played on Big Screens

Hacking

Securityweek

2.10.19

Researchers Find New Hack to Read Content Of Password Protected PDF Files

Hacking

Thehackernews

2.10.19

A recent example of Emotet malspam

Spam  Virus

SANS

2.10.19

The 5 biggest examples of executive threats and how to prevent them

Cyber

Net-security

2.10.19

49% of infosec pros are awake at night worrying about their organization’s cybersecurity

Cyber

Net-security

2.10.19

Massive uptick in eCrime campaigns, retail among top targeted industries

CyberCrime

Net-security

2.10.19

Cyber risks are the top concern among businesses of all sizes

Cyber

Net-security

2.10.19

What’s next for 5G?

Mobil

Net-security

2.10.19

Sophos Managed Threat Response: An evolved approach to proactive security protection

Safety

Net-security

1.10.19

A new Adwind variant involved in attacks on US petroleum industryVirusSecurityaffairs

1.10.19

Hackers breached one of Comodo Forums, 245,000 users impactedIncindentSecurityaffairs

1.10.19

Organizations Prefer Quick Technological Fix Over Deep-Rooted Cyber Resiliency: ReportVulnerebilitySecurityweek

1.10.19

Medical Practice Closing Permanently After Ransomware AttackRansomwareSecurityweek

1.10.19

WebEx, Zoom Meetings Exposed to Snooping via Enumeration AttacksAttackSecurityweek

1.10.19

Former Yahoo Programmer Pleads Guilty to Hacking User AccountsHackingSecurityweek

1.10.19

Danish company Demant expects to incur losses of up to $95 after cyber attackAttackSecurityaffairs

1.10.19

Frequent VBA Macros used in Office MalwareVirusSecurityaffairs

1.10.19

Comodo Forums Hacked via Recently Disclosed vBulletin VulnerabilityIncindent  VulnerebilitySecurityweek

1.10.19

Users Need to Consent to Online Tracking Cookies: EU CourtPrivacySecurityweek

1.10.19

BlackBerry Launches New Cybersecurity R&D UnitSecuritySecurityweek

1.10.19

Singapore Ministry of Defence Launches New Bug Bounty ProgramBigBrothersSecurityweek

1.10.19

Senate Passes DHS Cyber Hunt and Incident Response Teams ActBigBrothersSecurityweek

1.10.19

Comodo Forums Hack Exposes 245,000 Users' Data — Recent vBulletin 0-day UsedIncindentThehackernews

1.10.19

Over A Billion Malicious Ad Impressions Exploit WebKit Flaw to Target Apple UsersExploit  VirusThehackernews

1.10.19

Danish company Demant expects to suffer huge losses due to cyber attack

Attack

Net-security

1.10.19

Vulnerability in Cisco Webex and Zoom may expose online meetings to snooping

Vulnerebility

Net-security

1.10.19

Guess what? You should patch Exim again!

Vulnerebility

Net-security

1.10.19

Zprava-o-stavu-kyberneticke-bezpecnosti-cr-2018-czReportReport

1.10.19

Comodo Forums Breached, Data of Over 170,000 Users Up for GrabsIncindent

Bleepingcomputer

1.10.19

Under-Detected ODT Files Deliver Common Remote Access TrojansVirus

Bleepingcomputer

1.10.19

Free Ouroboros Ransomware (Zeropadypt NextGen) Decryption AvailableRansomware

Bleepingcomputer

1.10.19

Microsoft Adds 'Disable Legacy TLS' Feature to Windows Server 2019OS

Bleepingcomputer

1.10.19

New Exim Vulnerability Exposes Servers to DoS Attacks, RCE RisksVulnerebility

Bleepingcomputer

1.10.19

eGobbler Malvertiser Uses WebKit Exploit to Infect Over 1 Billion AdsExploit  Virus

Bleepingcomputer

1.10.19

Bulletproof Hosting Service in Former NATO Bunker Goes DownCyberCrime

Bleepingcomputer

1.10.19

Windows 10 1903 on ARM Gets a Virtualization-based Security FeatureOS

Bleepingcomputer

1.10.19

Critical Exim Flaw Opens Servers to Remote Code Execution

Vulnerebility

Threatpost

1.10.19

Senate Passes Bill Aimed At Combating Ransomware Attacks

Ransomware

Threatpost

1.10.19

New Bug Found in NSA’s Ghidra Tool

Vulnerebility

Threatpost

1.10.19

Gucci IOT Bot Discovered Targeting European RegionBotNet  IoTSecurityaffairs

1.10.19

Tridium Niagara framework affected by 2 flaws in BlackBerry QNX OS Mobil  VulnerebilitySecurityaffairs

1.10.19

eGobbler ‘s malvertising campaign hijacked over 1 billion ad impressionsVirusSecurityaffairs

1.10.19

A new critical flaw in Exim exposes email servers to remote attacksAttack  VulnerebilitySecurityaffairs

1.10.19

American Man Jailed in US Over Singapore HIV Data LeakCrime  IncindentSecurityweek

1.10.19

Critical Remote Code Execution Vulnerability Patched in Exim Email ServerVulnerebilitySecurityweek

1.10.19

'Masad Stealer' Uses Telegram to Exfiltrate DataIncindent  Social  VirusSecurityweek

1.10.19

Vulnerability Management Firm Kenna Security Raises $48 MillionITSecurityweek

1.10.19

Tridium Niagara Affected by BlackBerry QNX Vulnerabilities Mobil  VulnerebilitySecurityweek

1.10.19

'WhiteShadow' Downloader Employs Microsoft SQL for Malware DeliveryVirusSecurityweek

1.10.19

New Anomali Tool Finds Threat Data in News, Blogs, Social NetworksSocialSecurityweek

1.10.19

Spain Security Firm Probed 'for Spying on Assange for CIA'BigBrothersSecurityweek

1.10.19

Maldoc, PowerShell & BITS

Spam  Virus

SANS

1.10.19

Assessing risk: Measuring the health of your infosec environment

Security

Net-security

1.10.19

Managing and monitoring privileged access to cloud ecosystems

Security

Net-security

1.10.19

38% of the Fortune 500 do not have a CISO

Security

Net-security

1.10.19

Email is an open door for malicious actors looking to exploit businesses

Virus

Net-security

1.10.19

Employee negligence can be a leading contributor to data breaches

Incindent

Net-security

1.10.19

Tolly report: Evaluating the evolution of network traffic analysis technology

Security

Net-security

30.9.19

Ransomware attacks against small towns require collective defense

Ransomware

Net-security

30.9.19

Microsoft to block 40+ additional file extensions in Outlook on the web

Security

Net-security

30.9.19

Exclusive: MalwareMustDie analyzes a new IoT malware dubbed Linux/ AirDropBotVirus

Securityaffairs

30.9.19Iran’s oil minister orders ‘Full Alert’ for oil sector on against attacksBigBrothers

Securityaffairs

30.9.19

New 'Gucci' IoT Botnet Targets EuropeBotNet   IoTSecurityweek
30.9.19New Critical Exim Flaw Exposes Email Servers to Remote Attacks — Patch ReleasedVulnerebilityThehackernews

30.9.19

Arcane Stealer V, a threat for lower-skilled adversaries that scares experts

Security

Securityaffairs

30.9.19

Microsoft will add new file types to the list of blocked ones in Outlook on the Web

Security

Securityaffairs

30.9.19

Phishers continue to abuse Adobe and Google Open RedirectsPhishing

Securityaffairs

30.9.19Hacker claims to have stolen over 218M Zynga ‘Words with Friends’ Gamers recordsHacking

Securityaffairs

30.9.19Iran's Oil Sector on 'Full Alert' Against AttacksAttackSecurityweek

30.9.19

Encrypted Maldoc, Wrong Password

Crypto

SANS

30.9.19

How long before quantum computers break encryption?

Crypto

Net-security

30.9.19

A proactive approach to cybersecurity requires the right tools, not more tools

Cyber

Net-security

30.9.19

Companies vastly overestimating their GDPR readiness, only 28% achieving compliance

Privacy

Net-security

30.9.19

DevSecOps is emerging as the main methodology for securing cloud-native applications

Security

Net-security

30.9.19

ThreatConnect Platform: Security insight for sound decision-making

Security

Net-security

30.9.19

eBook: The DevOps Roadmap for Security

Security

Net-security

29.9.19

Cloudflare Now Blocks the vBulletin RCE CVE-2019-16759 ExploitExploit

Bleepingcomputer

29.9.19

Windows 10 1909 Coming Soon, Here Are the New FeaturesOS

Bleepingcomputer

29.9.19

Cyber-Attacks Hit Defense Contractors in Europe and North AmericaBigBrothers

Bleepingcomputer

29.9.19

US Senate Passes Bill in Response to Rampant Ransomware, CyberAttacksBigBrothers  Ransomware

Bleepingcomputer

29.9.19

New Masad Stealer Malware Exfiltrates Crypto Wallets via TelegramCryptocurrency  Virus

Bleepingcomputer

29.9.19

Microsoft Wants Your Feedback on the Edge Browser for LinuxOS

Bleepingcomputer

29.9.19

Office 365 to Get Automated Incident Response for Hacked AccountsHacking

Bleepingcomputer

29.9.19

Windows 10 Version 1903 Now in Broad Deployment, Available to EveryoneOS

Bleepingcomputer

29.9.19

Fake Apps Sneak Gambling Into iOS and Android App StoresAndroid  Apple

Bleepingcomputer

29.9.19

Adobe and Google Open Redirects Abused by Phishing CampaignsPhishing

Bleepingcomputer

29.9.19

Microsoft Removes CCleaner Ban From Their Community ForumsSecurity

Bleepingcomputer

29.9.19

New WhiteShadow Downloader Uses MSSQL Servers for Malware DeliveryVirus

Bleepingcomputer

29.9.19

WhiteShadow downloader leverages Microsoft SQL to retrieve multiple malware

Virus

Securityaffairs

29.9.19

Masad Stealer Malware exfiltrates data via Telegram

Social  Virus

Securityaffairs

29.9.19

Exclusive — Hacker Steals Over 218 Million Zynga 'Words with Friends' Gamers Data

Incindent

Thehackernews

29.9.19

Ransom News

Ransom

Ransom

29.9.19

Nodersok malware delivery campaign relies on advanced techniquesCyberCrime

Securityaffairs

29.9.19

German police arrest suspects in raid network hosting Darknet marketplacesBigBrothers

Securityaffairs

29.9.19

Malware-based attacks disrupted operations of Rheinmetall AG and Defence Construction CanadaVirus

Securityaffairs

29.9.19

After SIMJacker, WIBattack hacking technique disclosed. Billions of users at riskHacking  Mobil

Securityaffairs

29.9.19

Driver's License Thefts Spur ADOT to Boost Online SafeguardsSecurity

Securityweek

29.9.19

Germany Cracks 'Cyber Bunker' Hosting Darknet SitesBigBrothers

Securityweek

29.9.19

Microsoft Expands List of Blocked File Types in Outlook on the WebSecurity

Securityweek

29.9.19

Apple Patches iOS 13 Bug Allowing Third-Party Keyboards "Full Access"AppleSecurityweek

28.9.19

Windows 10 1903 Cumulative Update KB4517211 Fixes Game Audio Issues

OS

Bleepingcomputer

28.9.19

DoorDash Data Breach Exposes Info of Roughly 5 Million Users

Incindent

Bleepingcomputer

28.9.19

Microsoft Explains Why Signed PowerShell Cmdlets May Run Slow

Virus

Bleepingcomputer

28.9.19

Microsoft Spots Nodersok Malware Campaign That Zombifies PCs

Virus

Bleepingcomputer

28.9.19

REvil (Sodinokibi) Ransomware Targets Chinese Users with DHL Spam

Ransomware

Bleepingcomputer

28.9.19

Cisco Fixes Critical IOx Flaw Allowing Root Access to Guest OS

Vulnerebility

Bleepingcomputer

28.9.19

Microsoft Enables Tracking Prevention by Default in New Edge Beta

Privacy

Bleepingcomputer

28.9.19

Outlook on the Web to Block File Extensions for PowerShell, Python, and More

Virus

Bleepingcomputer

28.9.19

Vodafone's Mobile App Briefly Exposed Customer Information

Incindent  Privacy

Bleepingcomputer

28.9.19

Botnet Uses Recent vBulletin Exploit to Block Other Hackers

BotNet  Exploit

Bleepingcomputer

28.9.19

Arcane Stealer V Takes Aim at the Low End of the Dark Web

Security

Threatpost

28.9.19

Masad Spyware Uses Telegram Bots for Command-and-Control

BotNet

Threatpost

28.9.19

Microsoft Blacklists Dozens of New File Extensions in Outlook

Safety

Threatpost

28.9.19

Dunkin’ Donuts Gets Hit with Lawsuit Over 2015 Attack

Attack

Threatpost

28.9.19

iOS Exploit ‘Checkm8’ Could Allow Permanent iPhone Jailbreaks

Apple

Threatpost

28.9.19

News Wrap: GandCrab Operators Resurface, Utilities Firms Hit By LookBack Malware

Security

Threatpost

28.9.19

Thousands of PCs Affected by Nodersok/Divergent Malware

Virus

Threatpost

28.9.19

Malware Delivery Campaign Employs Advanced Fileless TechniquesVirus

Securityweek

28.9.19

Dunkin' Donuts Sued by New York's State Attorney General Over Data BreachesIncindent

Securityweek

28.9.19

'Unpatchable' iOS Bootrom Exploit Allows Jailbreaking of Many iPhonesApple

Securityweek

28.9.19

More SIM Cards Vulnerable to Simjacker Attack Than Previously DisclosedHacking  Mobil

Thehackernews

27.9.19

Checkm8: unpatchable iOS exploit could lead to permanent jailbreak for iOS devices running A5 to A11 chipsAppleSecurityaffairs

27.9.19

China Rejects 'Smear' After Airbus Hacking ReportBigBrothers

Securityweek

27.9.19

Airbus Says Taking 'Appropriate Measures' Against HackersHacking

Securityweek

27.9.19

GAO Says Electric Grid Cybersecurity Risks Only Partially AssessedCyber

Securityweek

27.9.19

German Auto and Defense Firm Rheinmetall Says Malware Hit Several PlantsVirus

Securityweek

27.9.19

Researchers Disclose Another SIM Card Attack Possibly Impacting MillionsAttack  Mobil

Securityweek

27.9.19

Hacker Releases 'Unpatchable' Jailbreak For All iOS Devices, iPhone 4s to iPhone XApple

Thehackernews

27.9.19

Microsoft Warns of a New Rare Fileless Malware Hijacking Windows ComputersVirusThehackernews

27.9.19

Emsisoft released a new free decryption tool for the Avest ransomwareRansomwareSecurityaffairs

27.9.19

DoorDash Data Breach exposes data of approximately 5 million usersIncindentSecurityaffairs

27.9.19

FBI Reviewed Cybersecurity Firm's Evidence in 2016 DNC Election HackBigBrothers

Securityweek

27.9.19

Magecart Hackers Target L7 RoutersHacking

Securityweek

27.9.19

DoorDash Breach Exposes Data of Nearly 5 Mn UsersIncindent

Securityweek

27.9.19

DoorDash Breach Exposes 4.9 Million Users' Personal DataIncindentThehackernews

27.9.19

Microsoft to Extend Office 365 ATP Safe Links to Office OnlineSafety

Bleepingcomputer

27.9.19

Buggy Google Chrome Update Behind Recent Unbootable MacsApple Vulnerebility

Bleepingcomputer

27.9.19

Ransomware Decryptors Released for Yatron, WannaCryFake, & FortuneCryptRansomware

Bleepingcomputer

27.9.19

Microsoft Phishing Attack Uses Google Redirects to Evade DetectionPhishing

Bleepingcomputer

27.9.19

Hackers Replace Windows Narrator to Get SYSTEM Level AccessHacking

Bleepingcomputer

27.9.19

Cloudflare's WARP Secures iOS and Android Web Traffic for FreeApple

Bleepingcomputer

27.9.19

vBulletin Zero-Day Exploited for Years, Gets Unofficial PatchVulnerebility

Bleepingcomputer

27.9.19

Adobe Fixes Critical Security Vulnerabilities in ColdfusionVulnerebility

Bleepingcomputer

27.9.19

Hackers Exploit Unpatched Bug in Rich Reviews WordPress PluginVulnerebility

Bleepingcomputer

27.9.19

Hackers Exploit Unpatched Bug in Rich Reviews WordPress PluginVulnerebilityBleepingcomputer

27.9.19

New Scans for Polycom Autoconfiguration Files

Security

SANS

27.9.19

How to start achieving visibility in the cloud

Security

Net-security

27.9.19

Should the National Security Council restore the cybersecurity coordinator role?

Cyber

Net-security

27.9.19

Windows‌ ‌Exploitation‌ ‌Tricks:‌ ‌Spoofing‌ ‌Named‌ ‌Pipe‌ ‌Client‌ ‌PID‌

Exploit blog

Project Zero

27.9.19

Chrome Bug, Not Avid Software, Causes Damage to MacOS File Systems

Apple  Vulnerebility

Threatpost

27.9.19

Vimeo Slapped With Lawsuit Over Biometrics Privacy Policy

Privacy  Security

Threatpost

27.9.19

Phish Uses Google’s URL Decoding to Swim Past Defenses

Phishing

Threatpost

27.9.19

DoorDash Data Breach Impacts Personal Data of Almost 5M Users

Incindent

Threatpost

27.9.19

Rash of Exploits Targets Critical vBulletin RCE Bug

Exploit

Threatpost

27.9.19

5G and IoT: How to Approach the Security Implications

IoT  Mobil

Threatpost

27.9.19

Cisco Patches 13 High-Severity Router and Switch Bugs

Vulnerebility

Threatpost

27.9.19

Botnet exploits recent vBulletin flaw to protect its botsBotNetSecurityaffairs

27.9.19

iOS 13 Bug Gives Third-Party Keyboards “Full Access” PermissionsAppleSecurityaffairs

27.9.19

Chinese Hackers Hit Technology Firms in Southeast Asia With PcShare BackdoorHacking  CyberSpy

Securityweek

27.9.19

'Chameleon' Spam Campaign Employs Randomized Email HeadersSpam

Securityweek

27.9.19

There Is Life for the CISO After a BreachIncindent

Securityweek

27.9.19

Hackers Target Airbus Suppliers in Quest for Commercial SecretsHacking

Securityweek

27.9.19

Outlook for Web Bans 38 More File Extensions in Email AttachmentsSpamThehackernews

27.9.19

Vulnerability on specific Cisco Industrial / Grid router models

Vulnerebility

SANS

27.9.19

Mining MAC Address and OUI Information

Cryptocurrency

SANS

27.9.19

Year-over-year malware volume increased by 64%

Virus

Net-security

27.9.19

As consumers engage with insurance companies online, new types of digital fraud emerge

Security

Net-security

27.9.19

The Standoff: Attackers and defenders to face off in digital metropolis security challenge

Security

Net-security

27.9.19

Podcast: Potential problems with the software supply chain for industrial sites

Security

Net-security

26.9.19

Airbus suppliers were hit by four major attack in the last 12 months

Attack

Securityaffairs

26.9.19

Study shows connections between 2000 malware samples used by Russian APT groups

APT

Securityaffairs

26.9.19

Cylance Founder Stuart McClure Leaves BlackBerry

IT

Securityweek

26.9.19

VMware Patches Critical Harbor Vulnerability

Vulnerebility

Securityweek

26.9.19

Airbus Hit by Series of Cyber Attacks on Suppliers: Security Sources

Cyber

Securityweek

26.9.19

iOS 13 Bug Lets 3rd-Party Keyboards Gain 'Full Access' — Even When You Deny

Apple

Thehackernews

26.9.19

Decryptor for WannaCryFake

Anti-Ransom Tool

Anti-Ransom Tool

26.9.19

USBsamurai for Dummies: How To Make a Malicious USB Implant & Bypass Air-Gapped Environments for 10$. The Dumb-Proof Guide.

Virus

Securityaffairs

26.9.19

Emsisoft releases a free decryptor for the WannaCryFake ransomware

Ransomware

Securityaffairs
26.9.19

iOS 13 Bug Gives Third-Party Keyboards "Full Access" Permissions

Apple

Securityweek

26.9.19

vBulletin Patches Vulnerability Exploited in the Wild

Vulnerebility

Securityweek

26.9.19

Magecart Group Targets Routers Behind Public Wi-Fi Networks

CyberCrime

Threatpost

26.9.19

‘Narrator’ Windows Utility Trojanized to Gain Full System Control

Virus

Threatpost

26.9.19

Unpatched Bug Under Active Attack Threatens WordPress Sites with XSS

Vulnerebility

Threatpost

26.9.19

Cybercriminals plan to make L7 routers serve card stealing code

CyberCrime

Net-security

26.9.19

Windows 10 Insider Build 18990 Released With UWP App AutostartOS

Bleepingcomputer

26.9.19Apple to Fix iOS Bug Granting Full Access to 3rd Party KeyboardsApple

Bleepingcomputer

26.9.19

Windows 10 to Boost Performance via Favored CPU Core OptimizationOS

Bleepingcomputer

26.9.19

Microsoft Rolls Out Windows Terminal 1909 With Long List of Fixes  OS

Bleepingcomputer

26.9.19Shared Code Links Sodinokibi to GandCrab, Minus the Fun & GamesRansomware

Bleepingcomputer

26.9.19

Windows 10 1809 Cumulative Update KB4516077 Released With FixesVulnerebility  OS

Bleepingcomputer

26.9.19Instagram Phishing Attack Baits With Copyright Infringement NotePhishing  Social

Bleepingcomputer

26.9.19

Fake Employment Site Created to Target Veterans With MalwareVirus

Bleepingcomputer

26.9.19State-Backed Attackers Target US Entities with LookBack MalwareVirus

Bleepingcomputer

26.9.19

Gmail for Android and iOS Gets a Dark ThemeAndroid  AppleBleepingcomputer
26.9.19Czech Intelligence ‘s report attributes major cyber attack to ChinaBigBrothers

Securityaffairs

26.9.19Czech Intelligence Blames China for Major Cyber AttackBigBrothers

Securityweek

26.9.19

POISON CARP Threat Actor Targets Tibetan GroupsCyberCrime

Securityweek

26.9.19

How can we thwart email-based social engineering attacks?

Attack

Net-security
26.9.19

Tackling biometric breaches, the decentralized dilemma

Incindent

Net-security

26.9.19

Cybersecurity breach experience strengthens CVs

Cyber

Net-security
26.9.19

Employees are mistakenly confident that they can spot phishing emails

Phishing

Net-security

26.9.19

Adopting DevOps practices leads to improved security posture

Security

Net-security
26.9.19

Enterprises report IT teams’ cloud skill gaps have nearly doubled

Security

Net-security

25.9.19

Ransomware: two pieces of good news

Ransomware

Securelist

25.9.19

What You Need to Know About Next Gen EDR

Security

Threatpost

25.9.19

GandCrab Operators Resurface with REvil Malware

Ransomware

Threatpost

25.9.19

Apple to Patch Bug Granting Full Access to 3rd-Party Keyboards

Apple

Threatpost

25.9.19

Dtrack RAT is Behind Virulent ATM-Espionage Campaign

Virus

Threatpost

25.9.19

Adobe Unscheduled Update Fixes Critical ColdFusion Flaws

Vulnerebility

Threatpost

25.9.19

Cybercrooks Target U.S. Veterans with Fake Hiring Website

BigBrothers

Threatpost

25.9.19

Zebrocy Retools for New Political Attacks

Virus

Threatpost

25.9.19

Heyyo dating app left its users’ data exposed online

Incindent

Securityaffairs

25.9.19

US Utilities Targeted with LookBack RAT in a new phishing campaign

Phishing  Virus

Securityaffairs

25.9.19

Honeywell Launches 'Forge' Industrial Cybersecurity Platform

Cyber

Securityweek

25.9.19

Organizations Warned of Dual Threat Posed by RDP and Disruptive Ransomware

Ransomware

Securityweek

25.9.19

60% of Major US Firms Have Been Hacked in Cloud: Study

Security

Securityweek

25.9.19

Tortoiseshell Targets U.S. Military Veterans in New Campaign

BigBrothers

Securityweek

25.9.19

Microsoft Makes Azure Sentinel Generally Available

Security

Securityweek

25.9.19

Dell Unveils New Data Protection Appliances

Safety

Securityweek

25.9.19

Hacker Releases Exploit for vBulletin Zero-Day Vulnerability

Vulnerebility

Securityweek

25.9.19

'xHunt' Campaign Targets Kuwait Transportation and Shipping Sector

CyberCrime

Securityweek

25.9.19

vBulletin zero-day exploited in the wild in wake of exploit release

Vulnerebility

Net-security

25.9.19

Cybersecurity automation? Yes, wherever possible

Cyber

Net-security

25.9.19

How can small companies with limited budgets win at security?

Security

Net-security

25.9.19

Adobe Patches two critical vulnerabilities in ColdFusion

Vulnerebility

Securityaffairs

25.9.19

Hacker discloses details and PoC exploit code for unpatched 0Day in vBulletin

Exploit  Vulnerebility

Securityaffairs

25.9.19

A new Fancy Bear backdoor used to target political targets

Virus

Securityaffairs

25.9.19

North Korean-Linked Dtrack RAT Discovered

BigBrothers  Virus

Securityweek

25.9.19

Adobe Patches Critical Command Injection, Path Traversal Flaws in ColdFusion

Vulnerebility

Securityweek

25.9.19

[Unpatched] Critical 0-Day RCE Exploit for vBulletin Forum Disclosed Publicly

Vulnerebility

Thehackernews

25.9.19

Malspam pushing Quasar RAT

Spam  Virus

SANS

25.9.19

Rise of RDP as a target vector

Security

Net-security

25.9.19

99% of misconfiguration incidents in the cloud go unnoticed

Security

Net-security

25.9.19

Older vulnerabilities and those with lower severity scores still being exploited by ransomware

Exploit Ransomware Vulnerebility

Net-security

25.9.19

Security capabilities are lagging behind cloud adoption

Security

Net-security

25.9.19

Whitepaper: The self-fulfilling prophecy of the cybersecurity skills shortage

Cyber

Net-security

24.9.19

APT or not APT? What’s Behind the Aggah Campaign

APT

Securityaffairs

24.9.19

Microsoft released an out-of-band patch to fix Zero-day flaw exploited in the wild

Vulnerebility

Securityaffairs

24.9.19

Russian Pleads Guilty to Hacking U.S. Financial Firms

BigBrothers

Securityweek

24.9.19

Additional U.S. Utilities Targeted With LookBack Malware

Virus

Securityweek

24.9.19

Source Code Security Firm Cycode Launches With $4.6 Million in Funding

IT

Securityweek

24.9.19

Cyber Insurance Firm Cowbell Emerges From Stealth With $3.3 Million Seed Funding

IT

Securityweek

24.9.19

1-Click iPhone and Android Exploits Target Tibetan Users via WhatsApp

Apple  Exploit

Thehackernews

24.9.19

Russian APT Map Reveals 22,000 Connections Between 2000 Malware Samples

APT

Thehackernews

24.9.19

Avid Users Are Suddenly Finding That Their Macs Won’t Boot

Apple

Bleepingcomputer

24.9.19

Zebrocy Infects Targets with New Golang-Based Backdoor via Dropbox

Virus

Bleepingcomputer

24.9.19

Emotet Tries to Infect You By Claiming It's Snowden's Book

Virus

Bleepingcomputer

24.9.19

Beware of Google Alert Links Leading to Malware and Scams

Virus

Bleepingcomputer

24.9.19

Finnish Govt. Releases Guide on Securing Microsoft Office 365

BigBrothers

Bleepingcomputer

24.9.19

Microsoft Issues Windows Security Update for 0Day Vulnerability

OS

Bleepingcomputer

24.9.19

Windows 10 Task Manager Lets You Copy Performance Data as Text

OS

Bleepingcomputer

24.9.19

Microsoft to Force Modern Auth in Exchange Online to Enhance Security

OS

Bleepingcomputer

24.9.19

Malicious Android Apps Evade Google Play Protect via Remote Commands

Android

Bleepingcomputer

24.9.19

Microsoft Edge's Collection Feature Helps You Stay Organized

OS

Bleepingcomputer

24.9.19

Lion Air Data Leak Came From Contractor's Ex-Staff, Airline Says

Incindent

Securityweek

24.9.19

Google Wins EU Fight Against Worldwide 'Right to be Forgotten'

BigBrothers

Securityweek

24.9.19

Microsoft Patches Internet Explorer Vulnerability Exploited in Attacks

Exploit  Vulnerebility

Securityweek

24.9.19

Microsoft Releases Emergency Patches for IE 0-Day and Windows Defender Flaw

Vulnerebility

Thehackernews

24.9.19

Huge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs

Security

SANS

24.9.19

Microsoft drops emergency Internet Explorer fix for actively exploited zero-day

Vulnerebility

Net-security

24.9.19

Google Assistant Audio Privacy Controls Updated After Outcry

Privacy

Threatpost

24.9.19

200K Sign Petition Against Equifax Data Breach Settlement

Incindent

Threatpost

24.9.19

More U.S. Utility Firms Targeted in Evolving LookBack Spearphishing Campaign

Attack  CyberCrime

Threatpost

24.9.19

Microsoft Internet Explorer Zero-Day Flaw Addressed in Out-of-Band Security Update

Vulnerebility

Threatpost

24.9.19

North Korea-linked malware ATMDtrack infected ATMs in India

BigBrothers

Securityaffairs

24.9.19

Campbell County Memorial Hospital in Wyoming hit by ransomware attack

Ransomware

Securityaffairs

24.9.19

Portuguese hacker faces hundreds of Charges in Football Leaks case

Hacking

Securityaffairs

24.9.19

Critical Vulnerability Addressed in Jira Service Desk

Vulnerebility

Securityweek

24.9.19

Microsoft to Provide Free Security Updates for Voting Systems Running Windows 7

Vulnerebility

Securityweek

24.9.19

0patch Promises Support for Windows 7 Beyond January 2020

Vulnerebility

Securityweek

24.9.19

Being CISO Is No Longer a Dead-End Job

Security

Securityweek

24.9.19

Could audio warnings augment your ability to fight off cyber attacks?

Cyber

Net-security

24.9.19

CISO role grows in stature, but challenges remain

Security

Net-security

24.9.19

Passwordless authentication is here ​now​, and it is vastly superior to using a password

Security

Net-security

24.9.19

$5 trillion threat of cyber attacks spurs investments in solutions, talent and tech

Cyber

Net-security

24.9.19

From science to business: High-end quantum computer market will almost double by 2025

IT

Net-security

24.9.19

What security and privacy enhancements has iOS 13 brought?

Apple  Privacy

Net-security

23.9.19

Hello! My name is Dtrack

Virus

Securelist

23.9.19

Wyoming Hospital's Services Disrupted by Ransomware

Ransomware

Securityweek

23.9.19

Flaw Gives Hackers Remote Access to Files Stored on D-Link DNS-320 Devices

Hacking

Securityweek

23.9.19

Digital Threats Multiply Ahead of 2020 US Elections

Security

Securityweek

23.9.19

Google Awards $40,000 for Chrome Sandbox Escape Vulnerabilities

Vulnerebility

Securityweek

23.9.19

IT vs OT: Challenges and opportunities – podcast

Security

Net-security

23.9.19

Postøehy z bezpeènosti: nepøítel státu - Root.cz 

Bezpeènost

Root.cz

23.9.19

V Èesku ubylo virù a útokù, na Slovensku naopak pøibylo - Novinky.cz 

Viry

Novinky.cz

23.9.19

Thinkful forces a password reset for all users after a data breach

Incindent

Securityaffairs

23.9.19

Privilege Escalation flaw found in Forcepoint VPN Client for Windows

Vulnerebility

Securityaffairs

23.9.19

TortoiseShell Group targets IT Providers in supply chain attacks

Attack

Securityaffairs

23.9.19

Mac Malware Poses as Trading App

Apple

Securityweek

23.9.19

Alleged Hacker Faces 154 Charges in Football Leaks Case

Hacking

Securityweek

23.9.19

YARA XOR Strings: an Update

Security

SANS

23.9.19

How data breaches forced Amazon to update S3 bucket security

Incindent

Net-security

23.9.19

Microsoft Edge to Let You Block Potentially Unwanted Programs

OS

Bleepingcomputer

23.9.19

Jira Server and Service Desk Fix Critical Security Bugs

Vulnerebility

Bleepingcomputer

23.9.19

Microsoft Marks Two Windows 10 1903 Issues as Resolved

OS

Bleepingcomputer

23.9.19

Video: Encrypted Sextortion PDFs

Crypto

SANS

23.9.19

Disclosing vulnerabilities to improve software security is good for everyone

Vulnerebility

Net-security

23.9.19

How SMBs can bring their security testing on par with larger enterprises

Security

Net-security

23.9.19

How important is packet capture for cyber defense?

Cyber

Net-security

23.9.19

Product showcase: NetLib Security Encryptionizer

Security

Net-security

23.9.19

Top challenges for CIOs in a multi-cloud world

Security

Net-security

22.9.19

Critical flaws affect Jira Service Desk and Jira Service Desk Data Center

Vulnerebility

Securityaffairs

22.9.19

0patch will provide micropatches for Windows 7 and Server 2008 after EoS

Vulnerebility

Securityaffairs

22.9.19

Facebook suspends tens of thousands of apps from hundreds of developers

Social

Securityaffairs

22.9.19

Iran denies successful cyber attacks hit infrastructures of its oil sector

BigBrothers

Securityaffairs

22.9.19

MMD-0063-2019 – Summarize report of three years MalwareMustDie research (Sept 2016-Sept 2019)

Virus

Securityaffairs

22.9.19

One of the hackers behind EtherDelta hack also involved in TalkTalk hack

Hacking

Securityaffairs

22.9.19

5 Cybersecurity Trends in the Professional Services Sector

Cyber

Securityaffairs

22.9.19

Payouts From Insurance Policies May Fuel Ransomware Attacks

Ransomware

Securityweek

22.9.19

Iran Denies Successful Cyber Attacks on Oil Sector

BigBrothers

Securityweek

22.9.19

Wireshark 3.0.5 Release: Potential Windows Crash when Updating

Security

SANS

21.9.19

Ransom News

Ransom

Ransom

21.9.19

EXPLAINING FILELESS MALWARE SUCCINCTLY WITH EXAMPLES FROM OUR RESEARCH

Malware blog

Cybereason

21.9.19

FILELESS MALWARE 101: UNDERSTANDING NON-MALWARE ATTACKS

Malware blog

Cybereason

21.9.19

Tortoiseshell Group Targets IT Providers

Cyber blog

Symantec

21.9.19

Emotet is back after a summer break

Malware blog

Cisco Talos

21.9.19

Cryptocurrency miners aren’t dead yet: Documenting the voracious but simple “Panda”

Cryptocurrency blog

Cisco Talos

21.9.19

Vulnerability Spotlight: Multiple vulnerabilities in Aspose PDF API

Vulnerebility blog

Cisco Talos

21.9.19

Vulnerability Spotlight: AMD ATI Radeon ATIDXX64.DLL shader functionality remote code execution vulnerability

Vulnerebility blog

Cisco Talos

21.9.19

Vulnerability Spotlight: Multiple vulnerabilities in Atlassian Jira

Vulnerebility blog

Cisco Talos

21.9.19

Universities warned to brace for cyberattacks

Attack blog

Eset

21.9.19

Remote access flaws found in popular routers, NAS devices

Vulnerebility blog

Eset

21.9.19

Nearly all of Ecuador’s citizens caught up in data leak

Incident blog

Eset

21.9.19

Meet Stop Ransomware: The Most Active Ransomware Nobody Talks About

Ransomware

Bleepingcomputer

21.9.19

Windows 7 Voting Systems to Get Free Security Updates Through 2020 Elections

OS

Bleepingcomputer

21.9.19

Windows 7 and Server 2008 Get 0patch Security Fixes After EoS

OS

Bleepingcomputer

21.9.19

Twitter Removes State-backed Actors Conducting Information Campaigns

Social

Bleepingcomputer

21.9.19

Forcepoint Fixes Privilege Escalation Bug in Windows VPN Client

Vulnerebility

Bleepingcomputer

21.9.19

Windows 10 is Getting a New Optional Update Experience

OS

Bleepingcomputer

21.9.19

Selfie Android Apps with 1.5M+ Installs Push Ads, Can Record Audio

Android

Bleepingcomputer

21.9.19

Windows 10 Insider Build 18985 Released With Improved Bluetooth Pairing

OS

Bleepingcomputer

21.9.19

Thinkful Resets All User Passwords After Security Breach

Incindent

Bleepingcomputer

21.9.19

Emotet Trojan Evolves Since Being Reawakend, Here is What We Know

Virus

Bleepingcomputer

21.9.19

News Wrap: Emotet’s Return, U.S. Vs. Snowden, Physical Pen Testers Arrested

Security

Threatpost

21.9.19

Facebook Removed Tens of Thousands of Apps Post-Cambridge Analytica

Privacy  Social

Threatpost

21.9.19

Mattress Company Leaks Data Records of 387K Customers

Incindent

Threatpost

21.9.19

Forcepoint VPN Client is Vulnerable to Privilege Escalation Attacks

Attack  Vulnerebility

Threatpost

21.9.19

Facebook Suspends 'Tens of Thousands' of Apps in Privacy Review

Privacy  Social

Securityweek

21.9.19

Eight U.S. Cities Impacted in New Series of Click2Gov Breaches

Incindent

Securityweek

21.9.19

200,000 Sign Petition Against Equifax Data Breach Settlement

Incindent

Securityweek

21.9.19

Indonesia, Malaysia Probe Lion Air Customer Data Leak

Incindent

Securityweek

21.9.19

Twitter Closes Thousands of Fake News Accounts Worldwide

Social

Securityweek

21.9.19

Vulnerability Patched in Forcepoint VPN Client for Windows

Vulnerebility

Securityweek

21.9.19

France Has 'Not Changed Mind' on Rejecting Snowden Asylum

BigBrothers

Securityweek

21.9.19

Two Indicted in $10 Million Tech Support Fraud Scheme

CyberCrime

Securityweek

21.9.19

Two selfie Android adware apps with 1.5M+ downloads removed from Play Store

Android

Securityaffairs

21.9.19

U.S. taxpayers hit by a phishing campaign delivering the Amadey bot

BotNet  Phishing

Securityaffairs

20.9.19

Celebrity Instagram Accounts Being Hacked to Push Scams

Social

Bleepingcomputer

20.9.19

Critical Bug In Harbor Container Registry Gives Admin Access

Vulnerebility

Bleepingcomputer

20.9.19

Microsoft Acquires Semmle, GitHub Now a CVE Numbering Authority

Security

Bleepingcomputer

20.9.19

Windows Defender Antivirus Scans Broken After New Update

Vulnerebility

Bleepingcomputer

20.9.19

Microsoft Phishing Page Sends Stolen Logins Using JavaScript

Phishing

Bleepingcomputer

20.9.19

Amadey Botnet Targets U.S. Taxpayers with Tax Refund Notice

BotNet

Bleepingcomputer

20.9.19

Smominru Mining Botnet In Cyber Turf War With Rival Malware

BotNet  Virus

Bleepingcomputer

20.9.19

New TortoiseShell Group Hacks 11 IT Providers to Reach Their Customers

Hacking

Bleepingcomputer

20.9.19

400 Million Medical Radiological Images Exposed on the Internet

Incindent

Bleepingcomputer

20.9.19

Windows 10 With Chinese IME Installed Causing High CPU Usage

OS

Bleepingcomputer

20.9.19

Commodity Malware Reborn: The AgentTesla “Total Oil” themed Campaign

Virus

Securityaffairs

20.9.19

Crooks hacked other celebrity Instagram accounts to push scams

Social

Securityaffairs

20.9.19

Magecart attackers target mobile users of hotel chain booking websites

CyberCrime  Mobil

Securityaffairs

20.9.19

VMware Patches Six Vulnerabilities in Various Products

Vulnerebility

Securityweek

20.9.19

HP Acquires Endpoint Security Company Bromium

Security

Securityweek

20.9.19

Two Widely Used Ad Blocker Extensions for Chrome Caught in Ad Fraud Scheme

Hacking

Thehackernews

20.9.19

Should you trust your smart TV or streaming device?

Security

Net-security

20.9.19

Blacklisting or Whitelisting in the Right Way

Security

SANS

20.9.19

Microsoft Silent Update Torpedoes Windows Defender

Vulnerebility

Threatpost

20.9.19

These Hacks Require Literally Sneaking in the Backdoor

Virus

Threatpost

20.9.19

Smart TVs, Subscription Services Leak Data to Facebook, Google

Security

Threatpost

20.9.19

Payment Card Breach Hits 8 Cities Using Vulnerable Bill Portal

Vulnerebility

Threatpost

20.9.19

At least 1,300 Harbor cloud registry installs open to attack

Attack  Hacking

Securityaffairs

20.9.19

Emotet is back, it spreads reusing stolen email content

Virus

Securityaffairs

20.9.19

Key Senate Panel Approves $250 Million for Election Security

BigBrothers

Securityweek

20.9.19

Don't Take the Bait: A Look at the Latest Phishing Trends

Phishing

Securityweek

20.9.19

Phishing Emails Deliver Amadey Malware to U.S. Taxpayers

Phishing  Virus

Securityweek

20.9.19

MITRE Publishes New List of Most Dangerous Software Weaknesses

Safety  Vulnerebility

Securityweek

20.9.19

Dataswift Raises $2 Million in Seed Funding to Revolutionize Personal Data Sharing

IT

Securityweek

20.9.19

Kaspersky Unveils ICS Vulnerabilities Database

ICS  Vulnerebility

Securityweek

20.9.19

Critical Vulnerability Exposes Harbor Registries to Attacks

Vulnerebility

Securityweek

20.9.19

Magecart Hackers Target Mobile Users of Hotel Websites

CyberCrime  Mobil

Securityweek

20.9.19

Microsoft Rushes to Fix Bug That Broke Windows Defender Scans

Vulnerebility

Securityweek

20.9.19

Update Google Chrome Browser to Patch New Critical Security Flaws

Vulnerebility

Thehackernews

20.9.19

Organizations continue to struggle with privacy regulations

Security

Net-security

20.9.19

Key threats and trends SMB IT teams deal with

Security

Net-security

20.9.19

Old Magecart domains are finding new life in fresh threat campaigns

CyberCrime

Net-security

20.9.19

Researchers analyzed 16.4 billion requests to see how bots affect e-commerce

Security

Net-security

20.9.19

Some IT teams move to the cloud without business oversight or direction

Security

Net-security

19.9.19

How organizations view and manage cyber risk

Cyber

Net-security

19.9.19

Threat landscape for smart buildings

IoT

Securelist

19.9.19

Smominru Botnet continues to rapidly spread worldwide

BotNet

Securityaffairs

19.9.19

Ping Identity IPO Shares Priced at $15

IT

Securityweek

19.9.19

Smominru Botnet Infects Thousands of Hosts Daily

BotNet

Securityweek

19.9.19

A bug made some Windows Defender antivirus scans fail

Vulnerebility

Net-security

19.9.19

Agent Tesla Trojan Abusing Corporate Email Accounts

Virus

SANS

19.9.19

More than 737 million medical radiological images found on open PACS servers

Privacy  Vulnerebility

Securityaffairs

19.9.19

Edward Snowden Sued by U.S. Over New Memoir

BigBrothers

Threatpost

19.9.19

Massive Gaming DDoS Exploits Widespread Technology

Attack  Exploit

Threatpost

19.9.19

Emotet Returns from Summer Vacation, Ramps Up Stolen Email Tactic

Virus

Threatpost

19.9.19

Malware Moves: The Rise of LookBack – And Return of Emotet

Virus

Threatpost

19.9.19

Marc Rogers: Success of Anonymous Bug Submission Program ‘Takes A Village’

Vulnerebility

Threatpost

19.9.19

IRS Emails Promise a Refund But Deliver Botnet Recruitment

BotNet  Spam

Threatpost

19.9.19

Rethinking Responsibilities and Remedies in Social-Engineering Attacks

Attack

Threatpost

19.9.19

Zuckerberg Sets Talks in Washington on 'Future Regulation'

Social

Securityweek

19.9.19

Acronis Worth Over $1 Billion After Raising $147 Million

IT

Securityweek

19.9.19

GitHub Becomes CVE Numbering Authority, Acquires Semmle

Security

Securityweek

19.9.19

300 More Chinese Arrested in Philippines Crackdown

Crime

Securityweek

19.9.19

Emotet Returns, Spreads via Hijacked Email Conversations

Virus

Securityweek

19.9.19

IT Firm Manager Arrested in the Biggest Data Breach Case of Ecuador’s History

Crime

Thehackernews

19.9.19

SLAs: What your cybersecurity vendor isn’t telling you

Cyber

Net-security

19.9.19

Businesses need to treat cybersecurity as something that crosses organizational boundaries

Cyber

Net-security

19.9.19

The use of open source software in DevOps has become strategic for organizations of all sizes

Security

Net-security

19.9.19

Improving the security, privacy and safety of future connected vehicles

Security

Net-security

19.9.19

World’s top 25 CTF teams to battle for $100,000 at HITB PRO CTF

Congress

Net-security

18.9.19

Beware of Venmo Scams Targeting Users via Text Messages

Spam

Bleepingcomputer

18.9.19

TFlower Ransomware - The Latest Attack Targeting Businesses

Ransomware

Bleepingcomputer

18.9.19

Misconfigured Google Calendars Share Events With the World

Incindent

Bleepingcomputer

18.9.19

Millions of Lion Air Passenger Records Exposed and Exchanged on Forums

Incindent

Bleepingcomputer

18.9.19

Most Cyber Attacks Focus on Just Three TCP Ports

Attack

Bleepingcomputer

18.9.19

Emotet Revived with Large Spam Campaigns Around the World

Spam  Virus

Bleepingcomputer

18.9.19

Windows 10 1903 is Now Having Problems with Network Adapters

OS

Bleepingcomputer

18.9.19

Microsoft Exchange Server 2010 Support Gets a Life Extension

Safety

Bleepingcomputer

18.9.19

Phishing Attack Targets The Guardian's Whistleblowing Site

Phishing

Bleepingcomputer

18.9.19

Password-Revealing Bug Quickly Fixed in LastPass Extensions

Vulnerebility

Bleepingcomputer

18.9.19

Memory corruption flaw in AMD Radeon driver allows VM escape

Vulnerebility

Securityaffairs

18.9.19

Skidmap Linux miner leverages kernel-mode rootkits to evade detection

Virus

Securityaffairs

18.9.19

U.S. Could Launch Cyberattack on Iran in Response to Saudi Oil Attack

BigBrothers

Securityweek

18.9.19

Facebook Takes Down Misleading Campaigns From Iraq, Ukraine

Social

Securityweek

18.9.19

Code Execution Vulnerabilities Found in Aspose PDF Processing Product

Vulnerebility

Securityweek

18.9.19

Supply Chain Likely Target in Attacks by Tortoiseshell Group on Saudi IT Firms

CyberCrime

Securityweek

18.9.19

'Panda' Group Makes Thousands of Dollars Using RATs, Crypto-Miners

Cryptocurrency  CyberCrime

Securityweek

18.9.19

Smominru Botnet Indiscriminately Hacked Over 90,000 Computers Just Last Month

BotNet

Thehackernews

18.9.19

Warning: Researcher Drops phpMyAdmin Zero-Day Affecting All Versions

Vulnerebility

Thehackernews

18.9.19

LastPass Fixes Bug That Leaks Credentials

Vulnerebility

Threatpost

18.9.19

Google Calendar Settings Gaffes Exposes Users’ Meetings, Company Details

Incindent

Threatpost

18.9.19

AMD Radeon Graphics Cards Open VMware Workstations to Attack

Attack

Threatpost

18.9.19

Panda Threat Group Mines for Monero With Updated Payload, Targets

CyberCrime

Threatpost

18.9.19

Cisco Extends Patch for IPv6 DoS Vulnerability

Vulnerebility

Threatpost

18.9.19

United States government files civil lawsuit against Edward Snowden

BigBrothers

Securityaffairs

18.9.19

Australia is confident that China was behind attack on parliament, political parties

BigBrothers

Securityaffairs

18.9.19

US Justice Department Sues Snowden Over New Book

BigBrothers

Securityweek

18.9.19

Industry Reactions to Massive Ecuador Data Leak

Incindent

Securityweek

18.9.19

Malware Sandboxing Firm VMRay Raises $10 Million

IT

Securityweek

18.9.19

United States Sues Edward Snowden and You'd be Surprised to Know Why

BigBrothers

Thehackernews

18.9.19

Emotet malspam is back

Spam

SANS

18.9.19

Security is slowly becoming essential to doing business

Security

Net-security

18.9.19

DNSSEC fueling new wave of DNS amplification attacks

Attack

Net-security

18.9.19

Confidential data of 24.3 million patients discovered online

Incindent

Net-security

18.9.19

Businesses facing post breach financial fallout by losing customer trust

Incindent

Net-security

18.9.19

What are the most connected countries around the world?

Security

Net-security

18.9.19

Download: RFP templates for EDR/EPP and APT protection

Safety

Net-security

17.9.19

Experts warn of the exposure of thousands of Google Calendars online

Incindent

Securityaffairs

17.9.19

Backup files for Lion Air and parent airlines exposed and exchanged on forums

Incindent

Securityaffairs

17.9.19

Linux Crypto-Miner Uses Kernel-Mode Rootkits for Evasion

Cryptocurrency

Securityweek

17.9.19

AMD Radeon Driver Flaw Leads to VM Escape

Vulnerebility

Securityweek

17.9.19

Exclusive: Thousands of Google Calendars Leaking Private Information Online

Incindent

Thehackernews

17.9.19

U.S. Sanctions North Korean Group Behind WannaCry, Sony Hacks

BigBrothers

Threatpost

17.9.19

New Threat Actor Fraudulently Buys Digital Certificates to Spread Malware

Virus

Threatpost

17.9.19

Marketing Analytics Company Leaks Deep Profiles of Entire Ecuador Population

Privacy

Threatpost

17.9.19

Asus, Lenovo and Other Routers Riddled with Remotely Exploitable Bugs

Vulnerebility

Threatpost

17.9.19

Assessing the impact of protection from web miners

Cryptocurrency

Securelist

17.9.19

Experts found 125 new flaws in SOHO routers and NAS devices from multiple vendors

Vulnerebility

Securityaffairs

17.9.19

Oracle Launches New Services to Secure the Cloud

Safety

Securityweek

17.9.19

Australia Knows China Hacked Its Parliament: Report

BigBrothers

Securityweek

17.9.19

Fraudulent purchases of digitals certificates through executive impersonation

CyberCrime  Safety

Securityaffairs

17.9.19

MobiHok RAT, a new Android malware based on old SpyNote RAT

Virus

Securityaffairs

17.9.19

SOHOpelessly Broken 2.0: 125 Vulnerabilities Found in Routers, NAS Devices

Vulnerebility

Securityweek

17.9.19

Security Firm: Data Breach Exposes Millions of Ecuadorians

Incindent

Securityweek

17.9.19

InnfiRAT Targets Personal Data, Cryptocurrency Wallets

Virus

Securityweek

17.9.19

Snowden Says He Would Return to US If He Can Get a Fair Trial

BigBrothers

Securityweek

17.9.19

125 New Flaws Found in Routers and NAS Devices from Popular Brands

Vulnerebility

Thehackernews

17.9.19

Encrypted Sextortion PDFs

Crypto

SANS

17.9.19

Five ways to manage authorization in the cloud

Security

Net-security

17.9.19

Targeted threat intelligence and what your organization might be missing

Security

Net-security

17.9.19

Researchers uncover 125 vulnerabilities across 13 routers and NAS devices

Vulnerebility

Net-security

17.9.19

BotSlayer tool can detect coordinated disinformation campaigns in real time

BotNet

Net-security

17.9.19

Phishing attacks up, especially against SaaS and webmail services

Phishing

Net-security

17.9.19

Only 15% of organizations can recover from a severe data loss within an hour

Security

Net-security

16.9.19

Data leak exposes sensitive data of all Ecuador ‘citizens

Incindent

Securityaffairs

16.9.19

Saudi Attacks Expose Threat to Critical Infrastructure

BigBrothers

Securityweek

16.9.19

LastPass Patches Bug Leaking Last-Used Credentials

Vulnerebility

Securityweek

16.9.19

Serious Flaws in CODESYS Products Expose Industrial Systems to Remote Attacks

Vulnerebility

Securityweek

16.9.19

Securing the 2020 Elections From Multifarious Threats

Security

Securityweek

16.9.19

A flaw in LastPass password manager leaks credentials from previous site

Vulnerebility

Securityaffairs

16.9.19

Recycled Source Code Used to Create New MobiHok Android RAT

Android  Virus

Securityweek

16.9.19

Tor Raises $86K to Smash Bugs

Security

Securityweek

16.9.19

WhatsApp 'Delete for Everyone' Doesn't Delete Media Files Sent to iPhone Users

Apple  Social

Thehackernews

16.9.19

How to Enable Ransomware Protection in Windows 10

Ransomware

Bleepingcomputer

16.9.19

Microsoft Edge Gets a new Extensions Menu, Here's How to Enable It

OS

Bleepingcomputer

16.9.19

Tor's Bug Bash Fund Raises $86K to Fix Critical Issues

Security

Bleepingcomputer

16.9.19

France and Germany will block Facebook’s Libra cryptocurrency

Cryptocurrency

Securityaffairs

16.9.19

Hundreds Laid Off by Symantec as Part of Restructuring Plan

IT

Securityweek

16.9.19

Snowden Says Would Like French Asylum

BigBrothers

Securityweek

16.9.19

Tor Project’s Bug Smash Fund raises $86K in August

Security

Securityaffairs

16.9.19

Astaroth Trojan leverages Facebook and YouTube to avoid detection

Virus

Securityaffairs

16.9.19

UK Teen Arrested in US-Led Music Hacking Probe

Crime

Securityweek

16.9.19

CISO do’s and don’ts: Lessons learned

Security

Net-security

16.9.19

Threat visibility is imperative, but it’s even more essential to act

Security

Net-security

16.9.19

Four in five businesses need ways to better secure data without slowing innovation

Security

Net-security

16.9.19

Exploitation of IoT devices and Windows SMB attacks continue to escalate

Exploit  IoT

Net-security

16.9.19

Only one quarter of retail banks have adopted an integrated approach to financial crime systems

CyberCrime

Net-security

16.9.19

Cyber Battle of the Emirates: Training the next generation of cyber security pros

BigBrothers

Net-security

15.9.19

Drone attacks hit two Saudi Arabia Aramco oil plants

BigBrothers

Securityaffairs

15.9.19

Delaler Leads, a car dealer marketing firm exposed 198 Million records online

Incindent

Securityaffairs

15.9.19

A bug in Instagram exposed user accounts and phone numbers

Social

Securityaffairs

15.9.19

Ransom News

Ransom

Ransom

15.9.19

Window 10 1903 OOB Update Released to to Fix USB Microphones

OS

Bleepingcomputer

15.9.19

Nemty Ransomware Update Lets It Kill Processes and Services

Ransomware

Bleepingcomputer

15.9.19

Microsoft Releases Workaround for Windows 10 Audio Issues in Games

OS

Bleepingcomputer

15.9.19

iOS 13 Passcode Bypass Lets You View Contacts on Locked Devices

Apple

Bleepingcomputer

15.9.19

InnfiRAT Malware Steals Litecoin And Bitcoin Wallet Information

Virus

Bleepingcomputer

15.9.19

Destructive Ordinypt Malware Hitting Germany in New Spam Campaign

Spam  Virus

Bleepingcomputer

15.9.19

North Korean Hackers Behind WannaCry and Sony Hack Sanctioned by USA

BigBrothers

Bleepingcomputer

15.9.19

Suspected Hacker Arrested for Stealing and Selling Unreleased Music

Hacking

Bleepingcomputer

15.9.19

'N1ghTm4r3' Scam Threatens to Expose Victims Watching Illegal Porn

Spam

Bleepingcomputer

15.9.19

Windows 10 1903 KB4515384 Update Affects Audio Quality in Games

OS

Bleepingcomputer

15.9.19

Giant Entercom Radio Network Deals with Ransomware-Like Incident

Ransomware

Bleepingcomputer

15.9.19

Garmin SA Shopping Portal Breach Leads to Theft of Payment Data

Incindent

Bleepingcomputer

15.9.19

Expert disclosed passcode bypass bug in iOS 13 a week before its release

Apple

Securityaffairs

15.9.19

InnfiRAT Trojan steals funds from Bitcoin and Litecoin wallets

Virus

Securityaffairs

14.9.19

Hackers stole payment data from Garmin South Africa shopping portal

Hacking

Securityaffairs

14.9.19

Ohio Gamer Sentenced to 15 Months Prison in 'Swatting' Case

Crime

Securityweek

14.9.19

US Sanctions 3 North Korean Hacking Groups Accused for Global Cyber Attacks

BigBrothers

Thehackernews

14.9.19

GLUPTEBA EXPANDS OPERATION AND TOOLKIT WITH LOLBINS AND CRYPTOMINER

Cryptocurrency blog

Cybereason

14.9.19

How Visiting a Trusted Site Could Infect Your Employees

Hacking blog

Mcafee blog

14.9.19

Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study

Malware blog

Mcafee blog

14.9.19

How To Survive the Rash of Ransomware

Ransomware blog

F5 Labs

14.9.19

Cryptocurrency Hacks 2019

Cryptocurrency blog

F5 Labs

14.9.19

Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and Containment

Ransomware blog

FireEye

14.9.19

Open Sourcing StringSifter

Security blog

FireEye

14.9.19

New Stealthy Ad Clicking Tactics Found in Popular Apps on Google Play

OS Blog

Symantec

14.9.19

Thrip: Ambitious Attacks Against High Level Targets Continue

Attack blog

Symantec

14.9.19

Watchbog and the Importance of Patching

Vulnerebility blog

Cisco Talos

14.9.19

Microsoft Patch Tuesday — Sept. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

14.9.19

Vulnerability Spotlight: Denial-of-service vulnerabilities in some NETGEAR routers

Vulnerebility blog

Cisco Talos

14.9.19

A vulnerability in Instagram exposes personal information of users

Vulnerebility blog

Eset

14.9.19

Selfies for kids – A guide for parents

Safety blog

Eset

14.9.19

ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group

Malware blog

Eset

14.9.19

Car Dealer Marketing Firm Exposed 198 Million Data Records

Incindent

Securityweek

14.9.19

US Puts Sanctions on N.Korea Hacking Groups Behind Major Thefts

BigBrothers  CyberCrime

Securityweek

14.9.19

Arizona Schools Provide Model for Managing Ransomware

Ransomware

Securityweek

14.9.19

Shape Security Raises $51 Million at $1 Billion Valuation

IT

Securityweek

14.9.19

WiryJMPer Dropper Employs Heavy Obfuscation to Deliver Netwire

Virus

Securityweek

14.9.19

Sophos Makes Sandboxie Free in Transition to Open Source

Safety

Securityweek

14.9.19

IBM Launches z15 Mainframe With New Data Protection Capabilities

Safety

Securityweek

14.9.19

Netanyahu, Trump Deny Report of Israeli Spying Near White House

BigBrothers

Securityweek

14.9.19

Astaroth Spy Trojan Uses Facebook, YouTube Profiles to Cover Tracks

Social  Virus

Threatpost

14.9.19

iPhone iOS 13 Lockscreen Bypass Flaw Exposes Contacts

Apple

Threatpost

14.9.19

North Korean Spear-Phishing Attack Targets U.S. Firms

APT  Phishing

Threatpost

14.9.19

WordPress XSS Bug Allows Drive-By Code Execution

Vulnerebility

Threatpost

14.9.19

Cybercriminals Adding Sophistication to BEC Threats

CyberCrime  Spam

Threatpost

14.9.19

The US Treasury placed sanctions on North Korea linked APT Groups

APT

Securityaffairs

14.9.19

WatchBog cryptomining botnet now uses Pastebin for C2

Cryptocurrency

Securityaffairs

14.9.19

Yikes! iOS 13 Coming Next Week With iPhone LockScreen Bypass Bug

Apple

Thehackernews

13.9.19

Ukrainian Man Pleads Guilty to Hacking, Wire Fraud Charges

BigBrothers

Securityweek

13.9.19

Israeli Spyware Firm Adopts 'Human Rights Policy'

BigBrothers

Securityweek

13.9.19

Android Flashlight Apps Request up to 77 Permissions

Android

Securityweek

13.9.19

DoS Vulnerabilities Patched in NETGEAR N300 Routers

Vulnerebility

Securityweek

13.9.19

Russian Hackers Behind Ukraine Power Outage May Have Sought More Damage

BigBrothers

Securityweek

13.9.19

Sandboxie becomes freeware, soon-to-be open source

Security

Net-security

13.9.19

Windows 10 1903 Orange Tint Screenshot Issue Addressed by Lenovo

OS

Bleepingcomputer

13.9.19

New WiryJMPer Dropper Hides Netwire RAT Payloads in Plain Sight

Virus

Bleepingcomputer

13.9.19

Microsoft Publishes Solutions for Windows 10 Search Issues

OS

Bleepingcomputer

13.9.19

Iranian Hackers Hit Over 60 Universities to Get Library Access

BigBrothers

Bleepingcomputer

13.9.19

Windows 10 Build 18980 Released for All Insiders With New Cortana App

OS

Bleepingcomputer

13.9.19

Ryuk Related Malware Steals Confidential Military, Financial Files

Virus

Bleepingcomputer

13.9.19

Google Chrome May Let Sites Block Your Screen from Powering Down

Security

Bleepingcomputer

13.9.19

Virtual Disk Attachments Can Bypass Gmail and Chrome Security

Security

Bleepingcomputer

13.9.19

Microsoft to Improve Office 365 Phishing Email Notifications

Phishing

Bleepingcomputer

13.9.19

Intel Patches Privilege Escalation Flaw in Easy Streaming Wizard

Vulnerebility

Bleepingcomputer

13.9.19

California Passes Bill to Ban Police Use of Facial Recognition

BigBrothers

Threatpost

13.9.19

1B Mobile Users Vulnerable to Ongoing ‘SimJacker’ Surveillance Attack

Attack  Mobil

Threatpost

13.9.19

Strangest Phishing Lures of 2019: From Divorce Papers to Real Estate Decoys

Phishing

Threatpost

13.9.19

UNICEF Leaks Personal Data of 8,000 Users via Email Blunder

Incindent

Threatpost

13.9.19

Library-Themed University Phishing Attack Expands to Massive Scale

Phishing

Threatpost

13.9.19

SimJacker attack allows hacking any phone with just an SMS

Mobil

Securityaffairs

13.9.19

Attack Traffic Caught by Honeypots Triples Over Six Months

Security

Securityweek

13.9.19

Wikimedia Gets $2.5 Million in Funding to Secure Wikipedia

Safety

Securityweek

13.9.19

Poland to Launch Cyberspace Defense Force

BigBrothers

Securityweek

13.9.19

WatchBog Crypto-Mining Botnet Relies on Pastebin for C&C

Cryptocurrency

Securityweek

13.9.19

Simjacker: SIM Card Attack Used to Spy on Mobile Phone Users

Mobil

Securityweek

13.9.19

Rig Exploit Kit Delivering VBScript

Exploit

SANS

13.9.19

The rise of modern applications, DevSecOps and the intelligence economy

Security

Net-security

13.9.19

Security leaders lack confidence in the supply chain, fear third-party attacks

Security

Net-security

13.9.19

Interacting with governments in the digital age: What do citizens think?

Security

Net-security

13.9.19

Cyber risk assessment of U.S. election commissions finds critical areas for improvement

BigBrothers

Net-security

12.9.19

SAP September 2019 Security Patch Day addresses four Security Notes rated as Hot News

Vulnerebility

Securityaffairs

12.9.19

Iran-linked group Cobalt Dickens hit over 60 universities worldwide

BigBrothers

Securityaffairs

12.9.19

Iran-Linked Hackers Again Target Universities

BigBrothers

Securityweek

12.9.19

Cloud Security Firm Lacework Raises $42 Million

IT

Securityweek

12.9.19

North Korean Hackers Use New Tricks in Attacks on U.S.

BigBrothers

Securityweek

12.9.19

Microsoft Makes Automated Incident Response in Office 365 ATP Generally Available

Safety

Securityweek

12.9.19

New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS

Hacking  Mobil

Thehackernews

12.9.19

Chrome 77 Released With Removed EV Certificate Indicator

Security

Bleepingcomputer

12.9.19

New NetCAT Attack Can Leak Sensitive Data From Intel CPUs

Attack

Bleepingcomputer

12.9.19

Microsoft Releases Servicing Stack Updates for All Windows 10 Versions

OS

Bleepingcomputer

12.9.19

Google Unveils DNS-over-HTTPS (DoH) Plan, Mozilla's Faces Criticism

Security

Bleepingcomputer

12.9.19

281 Arrested in Worldwide Business Email Compromise Crackdown

Spam

Bleepingcomputer

12.9.19

Microsoft Fixes Windows 10 High CPU Usage in Cortana

Vulnerebility

Bleepingcomputer

12.9.19

LokiBot Info-Stealer Used in Spear Phishing Attack on US Company

BotNet  Phishing

Bleepingcomputer

12.9.19

Windows 10 KB4515384 and KB4512578 Released With Fixes

OS  Vulnerebility

Bleepingcomputer

12.9.19

Microsoft's September 2019 Patch Tuesday Fixes 79 Vulnerabilities

OS  Vulnerebility

Bleepingcomputer

12.9.19

Microsoft Releases the September 2019 Security Updates for Office

Vulnerebility

Bleepingcomputer

12.9.19

Blocking Firefox DoH with Bind

Security

SANS

12.9.19

Simjacker vulnerability actively exploited to track, spy on mobile phone owners

Mobil

Net-security

12.9.19

Credential Leaking Vulnerabilities Impact Comba, D-Link Routers

Vulnerebility

Securityweek

12.9.19

Chinese Woman Guilty of Trespassing at Trump's Mar-a-Lago

BigBrothers

Securityweek

12.9.19

Popular Period Tracking Apps Share Your Sexual Health Data With Facebook

Social

Thehackernews

12.9.19

LokiBot info stealer involved in a targeted attack on a US Company

BotNet

Securityaffairs

12.9.19

NetCAT attack allows hackers to steal sensitive data from Intel CPUs

Attack

Securityaffairs

12.9.19

How to navigate critical data security and privacy policy challenges

Privacy

Net-security

12.9.19

IIoT security challenges: Dealing with cutting edge technologies

IoT

Net-security

12.9.19

More than a year after GDPR implementation, half of UK businesses are not fully compliant

Privacy

Net-security

12.9.19

Security holding back employers from meeting employees’ remote working expectations

Security

Net-security

11.9.19

NetCAT: New Attack Lets Hackers Remotely Steal Data From Intel CPUs

Attack

Thehackernews

11.9.19

CISO Kit — Breach Protection in the Palm of Your Hand

Safety

Thehackernews

11.9.19

Google to Experiment 'DNS over HTTPS' (DoH) Feature in Chrome 78

Security

Thehackernews

11.9.19

Mozilla Launches 'Firefox Private Network' VPN Service as a Browser Extension

Security

Thehackernews

11.9.19

Hundreds of BEC Scammers Arrested in Nigeria and U.S. — $3.7 Million Recovered

Spam

Thehackernews

11.9.19

Threats to macOS users

Apple

Securelist

11.9.19

Intel CPUs Vulnerable to Sensitive Data Leakage in NetCAT Attack

Attack

Threatpost

11.9.19

Feds Indict 281 People for Involvement in Massive Email Fraud Scheme

CyberCrime

Threatpost

11.9.19

198 Million Car-Buyer Records Exposed Online for All to See

Incindent

Threatpost

11.9.19

Microsoft Addresses Two Zero-Days Under Active Attack

Vulnerebility

Threatpost

11.9.19

CISO/CIO: Get an iPad and Apple Watch with an App Monitoring your Security 24/7

Apple

Threatpost

11.9.19

Strangest Phishing Lures of 2019: From Divorce Papers to Real Estate Decoys

Phishing

Threatpost

11.9.19

The Wolcott school district suffered a second ransomware attack in 4 months

Ransomware

Securityaffairs

11.9.19

Dissecting the 10k Lines of the new TrickBot Dropper

BotNet

Securityaffairs

11.9.19

Some models of Comba and D-Link WiFi routers leak admin credentials

Hacking

Securityaffairs

11.9.19

DNS-over-HTTPS Coming to Chrome 78

Security

Securityweek

11.9.19

Loss to BEC Fraud Now Claimed to be $26 Billion

Spam

Securityweek

11.9.19

Telegram Failed to Delete Removed Images From Local Storage

Social

Securityweek

11.9.19

SAP Patches Critical Vulnerability in NetWeaver

Vulnerebility

Securityweek

11.9.19

Chrome 77 Released with 52 Security Fixes

Vulnerebility

Securityweek

11.9.19

18 Years later, America Vows to 'Never Forget' 9/11

Security

Securityweek

11.9.19

Siemens Issues Advisories for DejaBlue, SACK Panic Vulnerabilities

ICS

Securityweek

11.9.19

NetCAT Attack: Hackers Can Remotely Steal Data From Servers With Intel CPUs

Attack

Securityweek

11.9.19

281 BEC scammers arrested in worldwide law enforcement action

Spam

Net-security

11.9.19

September 2019 Patch Tuesday: Microsoft plugs two actively exploited zero-days

Vulnerebility

Net-security

11.9.19

Adobe September 2019 Patch Tuesday updates fix 2 code execution flaws in Flash Player

Vulnerebility

Securityaffairs

11.9.19

Microsoft Patch Tuesday updates for September 2019 fix 2 privilege escalation flaws exploited in attacks

Vulnerebility

Securityaffairs

11.9.19

Million of Telestar Digital GmbH IoT radio devices can be remotely hacked

IoT

Securityaffairs

11.9.19

Hundreds Arrested in Joint US-Nigeria Crackdown on Cyber Scams

BigBrothers

Securityweek

11.9.19

Ransomware Attack Hits School District Twice in 4 Months

Ransomware

Securityweek

11.9.19

SD-WAN: Disruptive Technology That Requires Careful Security Consideration

Security

Securityweek

11.9.19

Microsoft Patches Two Privilege Escalation Flaws Exploited in Attacks

Vulnerebility

Securityweek

11.9.19

Latest Microsoft Updates Patch 4 Critical Flaws In Windows RDP Client

Vulnerebility

Securityweek

11.9.19

Microsoft September 2019 Patch Tuesday

Vulnerebility

SANS

11.9.19

Regulations are driving innovation toward an identity layer on the Internet

Security

Net-security

11.9.19

Fraudsters no longer operate in silos, they are attacking across industries and organizations

Security

Net-security

11.9.19

IoT attacks increasing in the cyber underground

IoT

Net-security

11.9.19

Download PPT template: Security for Management

Security

Net-security

10.9.19

Million of Telestar Digital GmbH IoT radio devices can be remotely hacked

Hacking  IoT

Securityaffairs

10.9.19

New Stealth Falcon Backdoor Discovered

Virus

Securityweek

10.9.19

Adobe Patches Two Code Execution Vulnerabilities in Flash Player

Vulnerebility

Securityweek

10.9.19

Some D-Link and Comba WiFi Routers Leak Their Passwords in Plaintext

Crypto

Thehackernews

10.9.19

Adobe Releases Security Patches For Critical Flash Player Vulnerabilities

Vulnerebility

Thehackernews

10.9.19

Adobe Releases Security Updates for Flash Player and Application Manager

Vulnerebility

Bleepingcomputer

10.9.19

Business Email Compromise Is a $26 Billion Scam Says the FBI

Spam

Bleepingcomputer

10.9.19

Bugs in D-Link and Comba Networking Gear Disclose Passwords

Vulnerebility

Bleepingcomputer

10.9.19

Microsoft Teams Can Be Used To Execute Arbitrary Payloads

Security

Bleepingcomputer

10.9.19

Microsoft Phishing Page Uses Captcha to Bypass Automated Detection

Phishing

Bleepingcomputer

10.9.19

Office 365 ATP Automated Incident Response Now Generally Available

Security

Bleepingcomputer

10.9.19

Exploit Kits Target Windows Users with Ransomware and Trojans

Exploit  Ransomware

Bleepingcomputer

10.9.19

PsiXBot Modular Malware Gets New Sextortion, Google DoH Upgrades

BotNet  Virus

Bleepingcomputer

10.9.19

Telegram Fixes Privacy Bug Caused by Improperly Deleted Messages

Social

Bleepingcomputer

10.9.19

Wikipedia DDoS Attacks Prompt NCSC to Remind of DoS Mitigation

Attack

Bleepingcomputer

10.9.19

Microsoft Removes Two Windows 10 1903 Upgrade Blocks

OS

Bleepingcomputer

10.9.19

Hacked Instagram Account of Robert Downey Jr. Pushes iPhone Giveway

Apple  Social

Bleepingcomputer

10.9.19

Police dismantled Europe’s second-largest counterfeit currency network on the dark web

BigBrothers

Securityaffairs

10.9.19

Vulnerabilities Exposed 2 Million Verizon Customer Contracts

Vulnerebility

Securityweek

10.9.19

Cyber Fusion Center-in-a-Box Firm Cyware Raises $3 Million in Seed Funding

IT

Securityweek

10.9.19

Office 365 security: Automated incident response based on playbooks

Security

Net-security

10.9.19

ML, AI enthusiasts to showcase cyber solutions at HITB+ CyberWeek’s AI Challenge

Congress

Net-security

10.9.19

Robert Downey Jr’s Instagram account has been hacked

Hacking

Securityaffairs

10.9.19

HackerOne Raises $36.4 Million in Series D Funding Round

IT

Securityweek

10.9.19

Telnet Backdoor Opens More Than 1M IoT Radios to Hijack

IoT  Virus

Threatpost

10.9.19

Apple Claims Google is Spreading FUD Over Patched iPhone Bugs

Apple

Threatpost

10.9.19

Stealth Falcon Targets Middle East with Windows BITS Feature

Virus

Threatpost

10.9.19

Critical Exim Flaw Opens Millions of Servers to Takeover

Vulnerebility

Threatpost

10.9.19

PsiXBot Adds PornModule, Google DNS Service to Its Arsenal

BotNet

Threatpost

10.9.19

Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks

Attack

Threatpost

10.9.19

DoS attack the caused disruption at US power utility exploited a known flaw

Attack

Securityaffairs

10.9.19

Stealth Falcon’s undocumented backdoor uses Windows BITS to exfiltrate data

Virus

Securityaffairs

10.9.19

DNS-over-HTTPS Coming to Firefox

Safety

Securityweek

10.9.19

More than 99% of cyberattacks rely on human interaction

Security

Net-security

10.9.19

Shine a light on shadow IT to improve organizational resilience

Security

Net-security

10.9.19

70% of educational orgs don’t have an appropriate cloud security budget

Security

Net-security

10.9.19

The use of SOX-specific solutions has more than doubled since last year

Security

Net-security

10.9.19

eBook: A new gold standard for OT security monitoring

Security

Net-security

9.9.19

Telegram Privacy Fails Again

Social

Securityaffairs

9.9.19

Symantec uncovered the link between China-Linked Thrip and Billbug groups

APT

Securityaffairs

9.9.19

Swedish GDPR Fine Highlights Legal Challenges in Use of Biometrics

Privacy

Securityweek

9.9.19

Cyberattack Disrupted Firewalls at U.S. Power Utility

Attack

Securityweek

9.9.19

U.S. Cyber Command Adds North Korean Malware Samples to VirusTotal

BigBrothers

Securityweek

9.9.19

BlueKeep Exploit Added to Metasploit

Exploit

Securityweek

9.9.19

Man Pleads Guilty for Trying to Access Trump's Tax Returns

BigBrothers

Securityweek

9.9.19

Private Equity Firms Interested in Buying Symantec for $16 Billion: Report

IT

Securityweek

9.9.19

Several Vulnerabilities Found in Red Lion HMI Software

Vulnerebility

Securityweek

9.9.19

New Malware Uses Windows BITS Service to Stealthy Exfiltrate Data

Virus

Thehackernews

9.9.19

Is your smartphone secretly listening to you?

Mobil

Net-security

9.9.19

This is what our summer’s like

Security

Securelist

9.9.19

Wikipedia suffered intermittent outages as a result of a malicious attack

Virus

Securityaffairs

9.9.19

China-Linked 'Thrip' Cyberspies Continue Attacks on Southeast Asia

APT

Securityweek

9.9.19

Cisco Releases GhIDA and Ghidraaas Tools for IDA Pro

Security

Securityweek

9.9.19

Facebook Patches "Memory Disclosure Using JPEG Images" Flaws in HHVM Servers

Social

Thehackernews

9.9.19

China-linked APT3 was able to modify stolen NSA cyberweapons

APT

Securityaffairs

9.9.19

Belarusian authorities seized XakFor, one of the largest Russian-speaking hacker sites

CyberCrime

Securityaffairs

9.9.19

Parts of Wikipedia Offline After 'Malicious' Attack

Virus

Securityweek

9.9.19

Cybersecurity issues can’t be solved by simply buying a product

Cyber

Net-security

9.9.19

SMBs show no improvement in IT maturity levels, security remains top concern

Security

Net-security

9.9.19

Should social media organizations be subject to strict privacy regulation?

Privacy

Net-security

9.9.19

Bots evolving to better mimic humans during elections

BotNet

Net-security

9.9.19

The global impact of 5G technologies

Mobil

Net-security

9.9.19

Mini eBook: CISSP Practice Tests

Security

Net-security

8.9.19

Ransom News

Ransom

Ransom

8.9.19

Fake PayPal Site Spreads Nemty Ransomware

Ransomware

Bleepingcomputer

8.9.19

Windows 10 to Let You Rename Virtual Desktops, Here's How

OS

Bleepingcomputer

8.9.19

Google Calendar Spam Got You Down? A Fix Is on The Way

Spam

Bleepingcomputer

8.9.19

Windows 10 Insider Build 18975 Released With Movable Cortana and Bug Fixes

OS

Bleepingcomputer

8.9.19

Public BlueKeep Exploit Module Released by MetaSploit

Exploit

Bleepingcomputer

8.9.19

Over $37 Million Lost by Toyota Boshoku Subsidiary in BEC Scam

Spam

Bleepingcomputer

8.9.19

WordPress 5.2.3 fixes multiple issues, including some severe XSS flaws

Vulnerebility

Securityaffairs

8.9.19

Toyota Boshoku Corporation lost over $37 Million following BEC attack

Spam

Securityaffairs

8.9.19

University, Professional Certification or Direct Experience?

Security

Securityaffairs

8.9.19

Experts found Joker Spyware in 24 apps in the Google Play store

Android

Securityaffairs

8.9.19

Google report on iPhone hack created ‘False Impression,’ states Apple

Apple

Securityaffairs

8.9.19

Experts add a BlueKeep exploit module to MetaSploit

Exploit

Securityaffairs

8.9.19

Thousands of servers infected with the Lilocked Ransomware

Ransomware

Securityaffairs

8.9.19

Apple: Security Report on iPhone Hack Created 'False Impression'

Apple

Securityweek

8.9.19

Unidentified Scanning Activity

Security

SANS