List  Articles  Page  2019  2018  2017  2016  1  2  3  4  5  6  7  8

Date

Name

Category

Web

7.9.19

Lilocked Ransomware Actively Targeting Servers and Web Sites

Ransomware

Bleepingcomputer

7.9.19

GootKit Malware Bypasses Windows Defender by Setting Path Exclusions

Virus

Bleepingcomputer

7.9.19

Critical Exim TLS Flaw Lets Attackers Remotely Execute Commands as Root

Crypto  Vulnerebility

Bleepingcomputer

7.9.19

Windows and AV Software Ignore Malware in Virtual Disk Files

Virus

Bleepingcomputer

7.9.19

FBI Warns Students to Think Before They Post Online Threats

BigBrothers

Bleepingcomputer

7.9.19

Microsoft Announces First PowerToys Preview Release for Windows 10

OS

Bleepingcomputer

7.9.19

Students Rejoice: School District Closed by Ransomware Attack

Ransomware

Bleepingcomputer

7.9.19

Amazon AWS Outage Shows Data in the Cloud is Not Always Safe

Safety

Bleepingcomputer

7.9.19

Buggy GPS Trackers Expose Childrens’ Real-Time Location

Privacy

Bleepingcomputer

7.9.19

WordPress 5.2.3 Released with Security and Bug Fixes

Vulnerebility

Bleepingcomputer

7.9.19

Twitter Suspends SMS-Based Tweeting After High-Profile Account Hacks

Social

Bleepingcomputer

7.9.19

Ransomware Adopts DoppelPaymer Name Given by Researchers

Ransomware

Bleepingcomputer

7.9.19

Hackers Ask for $5.3 Million Ransom, Turn Down $400k, Get Nothing

Ransomware

Bleepingcomputer

7.9.19

Android Zero-Day Bug Does Not Make It on Google’s 'Fix' List

Android

Bleepingcomputer

7.9.19

Facebook and Instagram Start Fighting Vaccine Misinformation

Social

Bleepingcomputer

7.9.19

Stealthy Android Trojan Spy Signs You Up For Premium Subscriptions

Virus

Bleepingcomputer

7.9.19

Year-Old Samba Bug Allows Access to Forbidden Root Share Paths

Vulnerebility

Bleepingcomputer

7.9.19

Glupteba Malware Uses Bitcoin Blockchain to Update C2 Domains

Cryptocurrency

Bleepingcomputer

7.9.19

Google Chrome Starts Testing Third-Party Cookie Blocking

Privacy

Bleepingcomputer

7.9.19

Android SMS Phishing Can Stealthily Enable Malicious Settings

Android  Phishing

Bleepingcomputer

7.9.19

Apple iOS Attack Underscores Importance of Threat Research

OS Blog

Mcafee blog

7.9.19

De-icing IcedID: Decompression and Decryption Methods Explained in an IcedID Attack

Attack blog

F5 Labs

7.9.19

5 Questions to Ask to See If Your Security Team is Cloud Incident Ready

Incident blog

F5 Labs

7.9.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in July 2019

Security blog

F5 Labs

7.9.19

SharPersist: Windows Persistence Toolkit in C#

Security blog

FireEye

7.9.19

Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and Containment

Ransomware blog

FireEye

7.9.19

UPSynergy: Chinese-American Spy vs. Spy Story

BigBrother blog

Checkpoint

7.9.19

GhIDA: Ghidra decompiler for IDA Pro

Security blog

Cisco Talos

7.9.19

Vulnerability Spotlight: Information disclosure vulnerability in Blynk-Library

Vulnerebility blog

Cisco Talos

7.9.19

The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to defend against encrypted DejaBlue

Vulnerebility blog

Cisco Talos

7.9.19

Vulnerability Spotlight: Two vulnerabilities in Epignosis eFront

Vulnerebility blog

Cisco Talos

7.9.19

Firefox 69: Third‑Party Tracking Cookies and Cryptomining Now Blocked by Default

Cryptocurrency blog

Eset

7.9.19

Semi‑annual balance of mobile security 2019

Hardware blog

Eset

7.9.19

What is MITRE ATT&CK and how is it useful?

Security blog

Eset

7.9.19

Exim fails to properly handle peer DN and SNI in TLS handshakes

Alert

Alert

7.9.19

"Splintering" Makes Hacking Passwords 14 Million Percent Harder

Hacking

Securityweek

7.9.19

Industrial Manufacturing Firm DK-LOK Exposes Emails, Customer Data

ICS

Securityweek

7.9.19

Oklahoma Pension Fund Reports $4.2 Million Cyber Theft

CyberCrime

Securityweek

7.9.19

Industry Reactions to Iranian Mole Planting Stuxnet: Feedback Friday

BigBrothers

Securityweek

7.9.19

Exim Vulnerability Allows Remote Code Execution as Root

Vulnerebility

Securityweek

7.9.19

CVE-2019-15846 Exim mail server flaw allows Remote Code Execution

Vulnerebility

Securityaffairs

6.9.19

Facebook, Microsoft Challenge Industry to Detect, Prevent ‘Deepfakes’

Social

Threatpost

6.9.19

China’s APT3 Pilfers Cyberweapons from the NSA

APT

Threatpost

6.9.19

Back-to-School Scams Target Students with Library-Themed Emails

Spam

Threatpost

6.9.19

Joker Spyware Found in 24 Google Play Apps

Android  Virus

Threatpost

6.9.19

FunkyBot Malware Intercepts Android Texts, 2FA Codes

Android  Virus

Threatpost

6.9.19

PHP new versions fix multiple code execution issues

Vulnerebility

Securityaffairs

6.9.19

Over 600k GPS trackers left exposed online with a default password of ‘123456’

Mobil

Securityaffairs

6.9.19

Zero-day vulnerability in Android OS yet to be patched

Android

Securityaffairs

6.9.19

Hundreds of millions of Facebook users’ phone numbers exposed online

Social

Securityaffairs

6.9.19

Cisco Patches Remote Command Execution in Webex Teams Client

Vulnerebility

Securityweek

6.9.19

Unpatched Privilege Escalation Vulnerability Impacts Android

Android

Securityweek

6.9.19

PerimeterX Raises Another $14 Million in Series C Round

IT

Securityweek

6.9.19

Firefox 69 Patches Critical Code Execution Flaw

Vulnerebility

Securityweek

6.9.19

No Ransom Paid in Recent Attack, Texas Says

Ransomware

Securityweek

6.9.19

Data Protection Firm BigID Raises $50 Million

IT

Securityweek

6.9.19

Ransomware Attack Locks Out New Bedford City Data

Ransomware

Securityweek

6.9.19

A Summer of Discontent: The Hottest Malware Hits

Virus

Thehackernews

6.9.19

Exim TLS Flaw Opens Email Servers to Remote 'Root' Code Execution Attacks

Crypto  Vulnerebility

Thehackernews

6.9.19

Multiple Code Execution Flaws Found In PHP Programming Language

Vulnerebility

Thehackernews

6.9.19

Flaws in Over Half a Million GPS Trackers Expose Children Location Data

Mobil

Thehackernews

6.9.19

Google Fined $170 Million For Violating Kids' Privacy On YouTube

Privacy

Thehackernews

6.9.19

PowerShell Script with a builtin DLL

Virus

SANS

6.9.19

Google’s differential privacy library can now be used by anyone

Privacy

Net-security

6.9.19

September 2019 Patch Tuesday forecast: Microsoft security update will be complete

Vulnerebility

Net-security

6.9.19

Most citizens are against local governments paying ransomware attackers

Ransomware

Net-security

6.9.19

Business demands have outpaced the ability of IT to deliver services

Security

Net-security

6.9.19

Global security screening systems market to reach $12.2 billion by 2024

IT

Net-security

6.9.19

Google to pay $170 million for violating children’s privacy on YouTube

Privacy

Net-security

5.9.19

Year-Old Samba flaw allows escaping from the share path definition

Vulnerebility

Securityaffairs

5.9.19

New Bedford city infected with Ryuk ransomware, but did not pay $5.3M ransom

Ransomware

Securityaffairs

5.9.19

Twitter temporarily disables feature to tweet via SMS after CEO hack

Social

Securityaffairs

5.9.19

Palo Alto Networks Acquires IoT Security Firm Zingbox for $75 Million

IT

Securityweek

5.9.19

CircleCI Customer Data Exposed Through Third-Party Vendor

Incindent

Securityweek

5.9.19

WordPress 5.2.3 Patches Several XSS Vulnerabilities

Vulnerebility

Securityweek

5.9.19

400 Mn Facebook Users' Phone Numbers Exposed in Privacy Lapse: Reports

Social

Securityweek

5.9.19

Crimeware Risk Underestimated, Chronicle Finds

CyberCrime

Securityweek

5.9.19

$5.3M Ransomware Demand: Massachusetts City Says No Thanks

Ransomware

Threatpost

5.9.19

Leaky Server Exposes 419M Phone Numbers of Facebook Users

Social

Threatpost

5.9.19

Mozilla Will Support Existing Ad Blockers in Extensions Manifest v3

Security

Bleepingcomputer

5.9.19

Hackers Get $1.9M in Bug Bounties at Live Hacking Sessions

Hacking

Bleepingcomputer

5.9.19

Microsoft Investigating Windows 10 Cortana High CPU Issues

OS

Bleepingcomputer

5.9.19

Microsoft Releases September 2019 Office Updates With Fixes, Improvements

OS

Bleepingcomputer

5.9.19

Hacked SharePoint Sites Used to Bypass Secure Email Gateways

Hacking

Bleepingcomputer

5.9.19

Firefox 69 Released with Enhanced Tracking Protection and Flash Disabled

Privacy

Bleepingcomputer

5.9.19

Microsoft Uses Deep Learning For Malicious PowerShell Detection

Virus

Bleepingcomputer

5.9.19

XKCD Forum Breach Exposes Emails, Passwords of 562,000 Users

Incindent

Bleepingcomputer

5.9.19

Zerodium Makes Android Zero Days More Expensive Than iOS

Android

Bleepingcomputer

5.9.19

New Toolkit Pushes Malware via Fake Program Update Alerts in 30 Languages

Virus

Bleepingcomputer

5.9.19

Tech Firms, US Officials Talk Election Protection at Facebook

Social

Securityweek

5.9.19

Twitter Temporarily Disables Tweeting via SMS After CEO Hack

Social

Securityweek

5.9.19

Twitter temporarily disables 'Tweeting via SMS' after CEO gets hacked

Social

Thehackernews

5.9.19

Supply chain security: Five IT strategies for choosing vendors wisely

Security

Net-security

5.9.19

Private IP Addresses in Malware Samples?

Virus

SANS

5.9.19

Creator of multiple IoT botnets, including Satori, pleaded guilty

BotNet  IoT

Securityaffairs

5.9.19

Google to Pay $170 mn Fine for Collecting YouTube Data From Kids

Privacy

Securityweek

5.9.19

TrickBot Makes Heavy Use of Evasion in Recent Attacks

BotNet

Securityweek

5.9.19

Android's September 2019 Patches Fix Nearly 50 Vulnerabilities

Android

Securityweek

5.9.19

Vulnerability in Network Provisioning Affects Majority of All Android Phones

Android

Securityweek

5.9.19

Supply chain security: Five IT strategies for choosing vendors wisely

Security

Net-security

5.9.19

Digital transformation success at risk as CIOs struggle to deliver digital projects

Security

Net-security

5.9.19

Critical vulnerabilities uncovered in Danfoss SCADA product, patch now!

ICS

Net-security

5.9.19

Organizations focus on fine-tuning systems to ensure compliance while reducing risk

Security

Net-security

4.9.19

CEO ‘Deep Fake’ Swindles Company Out of $243K

Social

Threatpost

4.9.19

How to Get a Handle on Patch Management

Vulnerebility

Threatpost

4.9.19

Android Zero-Days Now Worth More Than iPhone Exploits

Android

Threatpost

4.9.19

Half of Android Handsets Susceptible to Clever SMS Phishing Attack

Android

Threatpost

4.9.19

BRATA Android RAT Steals Banking Info in Real Time

Android

Threatpost

4.9.19

Facebook Drops Default Facial Recognition Tag Suggestions

Social

Threatpost

4.9.19

IoT Security Challenges in a 5G Era: Expert Advice

IoT

Threatpost

4.9.19

Firefox 69 Release Kills Default Tracking Cookies, Flash Support

Privacy

Threatpost

4.9.19

WordPress Plugins Anchor Widespread Malvertising, Rogue Backdoor Campaign

Virus

Threatpost

4.9.19

Data Leak Impacts Millions of Yves Rocher Cosmetics Company Customers

Incindent

Threatpost

4.9.19

‘USBAnywhere’ Bugs Open Supermicro Servers to Remote Attackers

Attack

Threatpost

4.9.19

Experts devised advanced SMS phishing attacks against modern Android-based phones

Android  Mobil  Phishing

Securityaffairs

4.9.19

JSWorm: The 4th Version of the Infamous Ransomware

Ransomware

Securityaffairs

4.9.19

Some Zyxel devices can be hacked via DNS requests

Hacking

Securityaffairs

4.9.19

Android Zero-Day exploits are the most expensive in the new Zerodium price list

Android

Securityaffairs

4.9.19

FireEye Releases Open Source Persistence Toolkit 'SharPersist'

Security

Securityweek

4.9.19

Twitter CEO Hack Highlights Dangers of 'SIM Swap' Fraud

Mobil  Social

Securityweek

4.9.19

MITRE ATT&CK Used for Cybersecurity Skills Development

Cyber

Securityweek

4.9.19

Code Execution Flaws Found in EZAutomation PLC, HMI Software

ICS

Securityweek

4.9.19

Huawei Accuses US of Cyberattacks, Coercing Employees

BigBrothers

Securityweek

4.9.19

Just An SMS Could Let Remote Attackers Access All Your Emails, Experts Warn

Mobil

Thehackernews

4.9.19

Firefox 69 Now Blocks 3rd-Party Tracking Cookies and Cryptominers By Default

Cryptocurrency

Thehackernews

4.9.19

Exploit Reseller Offering Up To $2.5 Million For Android Zero-Days

Exploit

Thehackernews

4.9.19

Security hole opens a billion Android users to advanced SMS phishing attacks

Android  Phishing

Net-security

4.9.19

USBAnywhere BMC flaws expose Supermicro servers to hack

Vulnerebility

Securityaffairs

4.9.19

XKCD forum data breach impacted 562,000 subscribers

Incindent

Securityaffairs

4.9.19

Over 328,000 Users Hit by Foxit Data Breach

Incindent

Securityweek

4.9.19

Zerodium Offers Up to $2.5 Million for Android Exploits

Exploit  Security

Securityweek

4.9.19

Facial Recognition Becomes Opt-in Feature at Facebook

Social

Securityweek

4.9.19

XKCD Forum Hacked – Over 562,000 Users’ Account Details Leaked

Incindent

Thehackernews

4.9.19

Malspam using password-protected Word docs to push Remcos RAT

Spam

SANS

4.9.19

Security pros need more and better visibility into their cloud networks

Security

Net-security

4.9.19

What prevents companies from achieving effective security performance management?

Security

Net-security

4.9.19

Firefox now blocks third-party tracking cookies, cryptomining scripts by default

Cryptocurrency

Net-security

4.9.19

A look into the frequency and success of phishing attacks on SMEs

Phishing

Net-security

4.9.19

How fraud prevention tech can save banks €10M a year

Security

Net-security

4.9.19

Free offering enables any MSP and security integrator to add incident response to their services portfolio

Security

Net-security

4.9.19

BMC vulnerabilities in Supermicro servers allow remote takeover, data exfiltration attacks

Vulnerebility

Net-security

3.9.19

Writing Your First Bootloader for Better Analyses

Security

Securityaffairs

3.9.19

Crooks stole €1.5 million from German bank OLB cloning EMV cards

CyberCrime

Securityaffairs

3.9.19

Zyxel Devices Can Be Hacked via DNS Requests, Hardcoded Credentials

Hacking

Securityweek

3.9.19

Meet Domen, a New and Sophisticated Social Engineering Toolkit

Hacking

Securityweek

3.9.19

562,000 Impacted in XKCD Forum Data Breach

Incindent

Securityweek

3.9.19

Cisco Releases Guides for Analyzing Compromised Devices

Security

Securityweek

3.9.19

'Heatstroke' Phishing Campaign Takes Multi-Stage Approach

Phishing

Securityweek

3.9.19

USBAnywhere Bugs in Supermicro Servers Allow Remote USB Access

Vulnerebility

Bleepingcomputer

3.9.19

Nemty Ransomware Gets Distribution from RIG Exploit Kit

Ransomware

Bleepingcomputer

3.9.19

Fake BleachBit Website Built to Distribute AZORult Info Stealer

Virus

Bleepingcomputer

3.9.19

Windows 10 1903 May Cause Microsoft Visio to Stall or Hang

OS

Bleepingcomputer

3.9.19

Windows 10 Gets a Cloud Reset Feature, Here’s How it Works

OS

Bleepingcomputer

3.9.19

Data of 90K Mastercard Priceless Specials Members Shared Online

Incindent

Bleepingcomputer

3.9.19

Astaroth Trojan Uses Cloudflare Workers to Bypass AV Software

Virus

Bleepingcomputer

3.9.19

Back to School? Be Careful of Malware Hiding As Textbooks

Virus

Bleepingcomputer

3.9.19

Cracked Passwords for Poshmark Accounts Being Sold Online

Hacking

Bleepingcomputer

3.9.19

Sodinokibi Ransomware Spreads via Fake Forums on Hacked Sites

Ransomware

Bleepingcomputer

3.9.19

Zao app went viral but raised serious privacy concerns

Privacy

Securityaffairs

3.9.19

USBAnywhere: BMC Flaws Expose Supermicro Servers to Remote Attacks

Vulnerebility

Securityweek

3.9.19

SIM Swapping Blamed for Hacking of Twitter CEO's Account

Mobil  Social

Securityweek

3.9.19

BMC Vulnerabilities Expose Supermicro Servers to Remote USB-Attacks

Vulnerebility

Thehackernews

3.9.19

Chinese Face-Swapping App ZAO Sparks Privacy Concerns After Going Crazily Viral

BigBrothers

Thehackernews

3.9.19

Attackers are exploiting vulnerable WP plugins to backdoor sites

Vulnerebility  Virus

Net-security

3.9.19

[Guest Diary] Tricky LNK points to TrickBot

BotNet

SANS

3.9.19

One million cracked Poshmark accounts being sold online

Hacking

Securityaffairs

3.9.19

The role of a secret Dutch mole in the US-Israeli Stuxnet attack on Iran

BigBrothers

Securityaffairs

3.9.19

Flight booking platform Option Way exposes customer and internal data

Incindent

Securityaffairs

3.9.19

TrickBot Tricks U.S. Users into Sharing their PIN Codes

BotNet

Securityweek

3.9.19

How to reduce the attack surface associated with medical devices

Security

Net-security

3.9.19

Cardholders still dropping the ball when it comes to basic ID theft prevention

Security

Net-security

3.9.19

Researchers develop cheaper, more efficient Internet connectivity for IoT devices

IoT

Net-security

3.9.19

Quantum computing market revenue to reach $9.1 billion annually by 2030

Security

Net-security

3.9.19

Whitepaper: Security Orchestration with Threat Intelligence

Security

Net-security

2.9.19

US cyerattack temporarily paralyzed the ability of Iran to target oil tankers in the Gulf

BigBrothers

Securityaffairs

2.9.19

Viral Chinese App Loses Face, But Not Fans, Over Privacy Concerns

BigBrothers  Privacy

Securityweek

2.9.19

Operation Indiscriminately Infects iPhones With Spyware

Apple

Securityweek

2.9.19

v02.16

News

News

2.9.19

The Different Types of Windows 10 Updates

OS  Vulnerebility

Bleepingcomputer

2.9.19

Windows 10 KB4512941 Update Causing High CPU Usage in Cortana

OS  Vulnerebility

Bleepingcomputer

2.9.19

New Microsoft Edge to Retire Flash Using Chrome's Roadmap

OS

Bleepingcomputer

2.9.19

XMR crypto miner switches from arm IoT devices to X86/I686 Intel servers

Cryptocurrency

Securityaffairs

1.9.19

Cisco addresses CVE-2019-12643 critical flaw in virtual Service Container for IOS XE

Vulnerebility

Securityaffairs

1.9.19

Malspam campaign bypasses secure email gateway using Google Docs

Spam

Securityaffairs

1.9.19

New Google bug bounty allows reporting the abuses of Google API, Chrome, and Android user data

Android

Securityaffairs

1.9.19

Latest Sextortion Email Scheme Sent by ChaosCC Hacker Group

Spam

Bleepingcomputer

1.9.19

Reddit Experiencing Outage Due to Amazon AWS Issue

Security

Bleepingcomputer

1.9.19

Microsoft Resolves Six Windows 10 1903 Issues, Update Blocks Stay On

Vulnerebility

Bleepingcomputer

1.9.19

Microsoft Says Windows 10 1809 Users Can Dismiss 1903 Update Alerts

Vulnerebility

Bleepingcomputer

1.9.19

TrickBot Bypasses Secure Email Gateway Using Google Docs Phishing

Phishing  Virus

Bleepingcomputer

1.9.19

Windows 10 v1903 Update KB4512941 Released With Sandbox Fix & More

OS

Bleepingcomputer

1.9.19

Google Warns iPhone Users of Data-Stealing Malware Attacks

Apple

Bleepingcomputer

1.9.19

Foxit Software Discloses Data Breach Exposing User Passwords

Incindent

Bleepingcomputer

1.9.19

New IoT botnet named Ares that is targeting Android-based devices

IoT

Securityaffairs

31.8.19

FIN6 recently expanded operations to target eCommerce sites

CyberCrime

Securityaffairs

31.8.19

Twitter account of Jack Dorsey, Twitter CEO and co-founder, has been hacked

Social

Securityaffairs

31.8.19

Twitter CEO Account Hacked, Offensive Tweets Posted

Social

Securityweek

31.8.19

Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423

Vulnerebility blog

Mcafee blog

31.8.19

Definitive Dossier of Devilish Debug Details – Part One: PDB Paths and Malware

Malware blog

FireEye

31.8.19

RAT Ratatouille: Backdooring PCs with leaked RATs

Malware blog

Cisco Talos

31.8.19

China Chopper still active 9 years later

Security blog

Cisco Talos

31.9.19

A Look Inside the Highly Profitable Sodinokibi Ransomware Business

Ransomware

Bleepingcomputer

31.9.19

Windows 10 Insider Build 18970 Comes With New 2-in-1 Tablet PC Experience

OS

Bleepingcomputer

31.9.19

Windows 7 Still Used in Almost 50% of Surveyed Businesses

OS

Bleepingcomputer

31.9.19

Microsoft Edge Dev Update Released With New Features

Security

Bleepingcomputer

31.9.19

Sodinokibi Ransomware Encrypts Records of Hundreds of Dental Practices

Ransomware

Bleepingcomputer

31.9.19

BRATA Android RAT Used to Infect and Spy on Brazilian Users

Android

Bleepingcomputer

31.9.19

Google Rewards Bugs Found in All Android Apps with 100M+ Installs

Android

Bleepingcomputer

31.9.19

Fake Windows Game Booster Spreads Password Stealing Malware

Virus

Bleepingcomputer

31.9.19

Five More Hackers Become Millionaires on HackerOne

Hacking

Bleepingcomputer

31.9.19

Android Apps with 1.5M+ Installs Boost Ad Revenue with Ghost Clicks

Android

Bleepingcomputer

31.9.19

Starbucks Abandons Azure Site, Exposed Subdomain to Hijacking

Hacking

Bleepingcomputer

31.9.19

Cisco Fixes Critical Bug in Virtual Service Container for IOS XE

Vulnerebility

Bleepingcomputer

31.9.19

Foxit PDF Software Company Suffers Data Breach—Asks Users to Reset Password

Incindent

Thehackernews

31.9.19

iOS Vulnerabilities Allowed Attackers to Remotely Hack iPhones for Years

Apple

Securityweek

31.9.19

Expert found Russia’s SORM surveillance equipment leaking user data

BigBrothers

Securityaffairs

31.9.19

Foxit Software discloses a data breach that exposed user passwords

Incindent

Securityaffairs

31.9.19

Ransomware attack hits DDS Safe backup service used by hundreds of dental offices

Ransomware

Securityaffairs

31.9.19

iPhone Zero-Days Anchored Watering-Hole Attacks

Apple

Threatpost

31.9.19

Six Hackers Have Now Pocketed $1M From Bug Bounty Programs

Security

Threatpost

30.8.19

Google revealed how watering hole attacks compromised iPhone devices earlier this year

Apple

Securityaffairs

30.8.19

BRATA, the Android RAT that infected only Brazilian users

Android

Securityaffairs

30.8.19

Ransomware Hits Dental Data Backup Service Offering Ransomware Protection

Ransomware

Thehackernews

30.8.19

Google discovers websites exploiting iPhones, pushing spying implants en masse

Apple

Net-security

30.8.19

Malware Dropping a Local Node.js Instance

Virus

SANS

30.8.19

Google will pay for data abuse reports related to popular Android apps, Chrome extensions

Security

Net-security

30.8.19

CISO priorities: Implementing security from the get-go

Security

Net-security

30.8.19

Capital One Hacker indicted on federal charges for Wire Fraud and Computer Data Theft

Hacking

Securityaffairs

30.8.19

Google Offers Big Bounties for Data Abuse Reports

Security

Securityweek

30.8.19

Google Uncovers How Just Visiting Some Sites Were Secretly Hacking iPhones For Years

Apple

Thehackernews

30.8.19

Google Will Now Pay Anyone Who Reports Apps Abusing Users' Data

Privacy

Thehackernews

30.8.19

A very deep dive into iOS Exploit chains found in the wild

Exploit blog

Project Zero

30.8.19

In-the-wild iOS Exploit Chain 1

Exploit blog

Project Zero

30.8.19

In-the-wild iOS Exploit Chain 2

Exploit blog

Project Zero

30.8.19

In-the-wild iOS Exploit Chain 3

Exploit blog

Project Zero

30.8.19

In-the-wild iOS Exploit Chain 4

Exploit blog

Project Zero

30.8.19

In-the-wild iOS Exploit Chain 5

Exploit blog

Project Zero

30.8.19

Implant Teardown

Vulnerebility blog

Project Zero

30.8.19

JSC Exploits

Exploit blog

Project Zero

30.8.19

The Fully Remote Attack Surface of the iPhone

Vulnerebility blog

Project Zero

30.8.19

Trashing the Flow of Data

Vulnerebility blog

Project Zero

30.8.19

Windows Exploitation Tricks: Abusing the User-Mode Debugger

Exploit blog

Project Zero

30.8.19

Windows Kernel Logic Bug Class: Access Mode Mismatch in IO Manager

Vulnerebility blog

Project Zero

30.8.19

Android Messaging: A Few Bugs Short of a Chain

Vulnerebility blog

Project Zero

30.8.19

The Curious Case of Convexity Confusion

Vulnerebility blog

Project Zero

30.8.19

Examining Pointer Authentication on the iPhone XS

Vulnerebility blog

Project Zero

30.8.19

voucher_swap: Exploiting MIG reference counting in iOS 12

Exploit blog

Project Zero

30.8.19

Taking a page from the kernel's book: A TLB issue in mremap()

Vulnerebility blog

Project Zero

30.8.19

TGI Fridays Delivers Customer Indigestion Over Data Exposure

Incindent  Privacy

Threatpost

30.8.19

FIN6 Switches Up PoS Tactics to Target E-Commerce

CyberCrime

Threatpost

30.8.19

Google Targets Data-Abusing Apps with Bug Bounty Launch

Security

Threatpost

30.8.19

Venmo’s Public Transactions Policy Stirs Privacy Concerns

Privacy

Threatpost

30.8.19

Critical Cisco VM Bug Allows Remote Takeover of Routers

Vulnerebility

Threatpost

30.8.19

CISO priorities: Implementing security from the get-go

Security

Net-security

30.8.19

Cybersecurity in the age of the remote workforce

Cyber

Net-security

30.8.19

Fileless attacks designed to disguise malicious activity up 265%

Virus

Net-security

29.8.19

Fully equipped Spying Android RAT from Brazil: BRATA

Android

Securelist

29.8.19

A total of six hackers already become millionaires on HackerOne

Incindent

Securityaffairs

29.8.19

US Waged Cyberattack on Database Used by Iran to Target Tankers: NY Times

BigBrothers

Securityweek

29.8.19

Alleged Capital One Hacker Indicted on Wire Fraud, Computer Data Theft Charges

Incindent

Securityweek

29.8.19

Capital One Hacker Also Accused of Hacking 30 More Companies and CryptoJacking

Cryptocurrency

Securityweek

29.8.19

Incident Response report 2018

Analysis  Incindent

Securelist

29.8.19

Lumber Liquidators hit by malware attack that took down its network

Virus

Securityaffairs

29.8.19

A new variant of Trickbot banking Trojan targets Verizon, T-Mobile, and Sprint users

Virus

Securityaffairs

29.8.19

Expert releases Metasploit modules for Cisco UCS flaws

Vulnerebility

Securityaffairs

29.8.19

Pulse Secure Says Majority of Customers Patched Exploited Vulnerability

Vulnerebility

Securityweek

29.8.19

Bug Hunters Invited to Hack Facebook Devices at Pwn2Own Tokyo 2019

Congress

Securityweek

29.8.19

Apple Changes the Way It Listens to Your Siri Recordings Following Privacy Concerns

Apple

Thehackernews

29.8.19

Microsoft Wants exFAT in Linux Kernel, Opens File System Specs

OS

Bleepingcomputer

29.8.19

Microsoft Lifts Update Block On Windows 7 With Symantec AV

Security  Vulnerebility

Bleepingcomputer

29.8.19

Attackers Target Govt and Financial Orgs With Orcus, Revenge RATs

Virus

Bleepingcomputer

29.8.19

Malware Operation Making Millions Defeated by Design Flaw

Virus

Bleepingcomputer

29.8.19

New TrickBot Variant Targets Verizon, T-Mobile, and Sprint Users

Virus

Bleepingcomputer

29.8.19

Android Trojan Infects Tens of Thousands of Devices in 4 Months

Android

Bleepingcomputer

29.8.19

Check Point Patches Privilege Escalation Flaw in Endpoint Client

Vulnerebility

Bleepingcomputer

29.8.19

Cybersecurity Firm Suffers Security Breach, Client Info Exposed

Incindent

Bleepingcomputer

29.8.19

Malware Samples Compiling Their Next Stage on Premise

Virus

SANS

29.8.19

Knowing what’s on your hybrid-IT environment is fundamental to security

Security

Net-security

29.8.19

What can be done about the rising click interception threat?

Security

Net-security

29.8.19

Magecart hackers compromise another 80 eCommerce sites

CyberCrime

Securityaffairs

29.8.19

Apple Apologizes for Listening to Siri Talk, Sets New Rules

Apple

Securityweek

29.8.19

Malware Found in Google Play App With 100 Million Downloads

Virus

Securityweek

29.8.19

Malware Takes Down Lumber Liquidators’ Network

Virus

Securityweek

29.8.19

Dangerous Cryptomining Worm Racks Up 850K Infections, Self-Destructs

Cryptocurrency

Threatpost

29.8.19

Magecart Hits 80 Major eCommerce Sites in Card-Skimming Bonanza

CyberCrime

Threatpost

29.8.19

Google Squashes High-Severity Blink Browser Engine Flaw

Vulnerebility

Threatpost

29.8.19

Elderly China Chopper Tool Still Going Strong in Multiple Campaigns

CyberCrime

Threatpost

29.8.19

TrickBot Targets Verizon, T-Mobile, Sprint Users to Siphon PINs

BotNet

Threatpost

29.8.19

New ransomware grows 118% as cybercriminals adopt fresh tactics and code innovations

Ransomware

Net-security

29.8.19

SOCs still overwhelmed by alert overload, struggle with false-positives

Security

Net-security

28.8.19

French Police remotely disinfected 850,000 PCs from RETADUP bot

Virus

Securityaffairs

28.8.19

Cisco UCS Vulnerabilities Allow Complete Takeover of Affected Systems

Vulnerebility

Securityweek

28.8.19

Researchers Analyze Tools Used by 'Hexane' Attackers Against Industrial Firms

Attack

Securityweek

28.8.19

DLL Hijacking Flaw Patched in Check Point Endpoint Security

Vulnerebility

Securityweek

28.8.19

Avast, French Police Remove Retadup Malware From 850,000 PCs

Virus

Securityweek

28.8.19

Magecart Hackers Compromise 80 More eCommerce Sites to Steal Credit Card

CyberCrime

Thehackernews

28.8.19

French Police Remotely Removed RETADUP Malware from 850,000 Infected PCs

Virus

Thehackernews

28.8.19

Imperva discloses security incident affecting Cloud WAF customers

Incindent

Net-security

28.8.19

[Guest Diary] Open Redirect: A Small But Very Common Vulnerability

Vulnerebility

SANS

28.8.19

Trojan Dropper Malware Found in Android App With 100M Downloads

Android 

Bleepingcomputer

28.8.19

Lyceum/Hexane Threat Group Uses Common Hacking Tactics

CyberCrime

Bleepingcomputer

28.8.19

Microsoft Starts Testing Throttled Rollout of Windows 10 19H2

OS

Bleepingcomputer

28.8.19

Google Chrome is Losing the 'Close Other Tabs' Option

Security

Bleepingcomputer

28.8.19

Microsoft's Your Phone Is Down, Users Getting Connection Errors

Security

Bleepingcomputer

28.8.19

Apple Releases iOS 12.4.1 to Patch Security Flaw Behind Jailbreak

Apple

Bleepingcomputer

28.8.19

Phishing Campaign Delivers Quasar RAT Payloads via Fake Resumes

Phishing  Virus

Bleepingcomputer

28.8.19

Microsoft Warns of Windows 10 1703 End of Life for Enterprise

OS

Bleepingcomputer

28.8.19

New Nemty Ransomware May Spread via Compromised RDP Connections

Ransomware

Bleepingcomputer

28.8.19

Hostinger Data Breach Affects Almost 14 Million Customers

Incindent

Bleepingcomputer

28.8.19

Spam and phishing in Q2 2019

Analysis  Phishing  Spam

Securelist

28.8.19

TA505 group updates tactics and expands the list of targets

CyberCrime

Securityaffairs

28.8.19

Australia Tries to Curb Foreign Interference at Universities

Cyber

Securityweek

28.8.19

French Police Remotely Removed RETADUP Malware from 850,000 Infected PCs

Virus

Thehackernews

28.8.19

Imperva Firewall Breach Exposes Customer API Keys, SSL Certificates

Incindent

Threatpost

28.8.19

Oil and Gas Firms Targeted By New LYCEUM Threat Group

CyberCrime

Threatpost

28.8.19

Malicious App on Google Play Tallies 100 Million Downloads

Android

Threatpost

28.8.19

Employers Beware: Microsoft Word ‘Resume’ Phish Delivers Quasar RAT

Virus

Threatpost

28.8.19

Imperva data Breach: WAF customers’ data exposed

Incindent

Securityaffairs

28.8.19

Kaspersky found malware in popular CamScanner app. Remove it now from your phone!

Android

Securityaffairs

28.8.19

Lyceum APT made the headlines with attacks in Middle East

APT

Securityaffairs

28.8.19

Low Budgets, Limited Expertise Plague SMB Cybersecurity

Cyber

Securityweek

28.8.19

Imperva Notifies Cloud WAF Customers of Security Incident

Incindent

Securityweek

28.8.19

Imperva Breach Exposes WAF Customers' Data, Including SSL Certs, API Keys

Incindent

Thehackernews

28.8.19

What the education industry must do to protect itself from cyber attacks

Cyber

Net-security

28.8.19

How passwords paved the way for new technology

Safety

Net-security

28.8.19

Cost of data breaches to surpass $5 trillion in 2024

Incindent

Net-security

28.8.19

1 in 4 employees would steal company information to secure their next job

Security

Net-security

27.8.19

Code Execution and DoS flaw addressed in QEMU

Vulnerebility

Securityaffairs

27.8.19

Dridex Operator Updates Tactics and Targets

Virus

Securityweek

27.8.19

Bug Bounty Program Launched for Facebook's Libra Cryptocurrency

Cryptocurrency  Social

Securityweek

27.8.19

VMware Unveils Security Enhancements in Virtual Cloud Network Offering

Security

Securityweek

27.8.19

WARNING — Malware Found in CamScanner Android App With 100+ Million Users

Android

Thehackernews

27.8.19

An advertising dropper in Google Play

Android

Securelist

27.8.19

Experts uncovered an advanced phishing campaign delivering the Quasar RAT

Virus

Securityaffairs

27.8.19

Nearly Half of SMBs, Enterprises Still Using Windows 7: Kaspersky

Security

Securityweek

27.8.19

Apple Patches Re-Introduced Jailbreak Vulnerability

Apple

Securityweek

27.8.19

Free Windows 7 Extended Security Updates for Some Microsoft Customers

Vulnerebility

Securityweek

27.8.19

ThreatList: Half of All Social Media Logins Are Fraud

Security

Threatpost

27.8.19

Hostinger Data Breach: 14M Customer Passwords, Personal Data at Risk

Incindent

Threatpost

27.8.19

Apple Fixes iOS Flaw That Opened iPhones to Jailbreaks

Apple

Threatpost

27.8.19

IRS Impersonation Attacks Spread Malware Nationwide

Virus

Threatpost

27.8.19

White hat hacker demonstrated how to hack a million Instagram accounts

Social

Securityaffairs

27.8.19

Apple released an emergency patch to address CVE-2019-8605 iOS flaw

Apple

Securityaffairs

27.8.19

Nemty Ransomware, a new malware appears in the threat landscape

Ransomware

Securityaffairs

27.8.19

Code Execution Flaw in QEMU Mostly Impacts Development, Test VMs

Vulnerebility

Securityweek

27.8.19

Senators Question NHTSA on Risks of Connected Vehicles

BigBrothers

Securityweek

27.8.19

Hacker Finds Instagram Account Takeover Flaw Worth $10,000

Social

Securityweek

27.8.19

Apple Releases iOS 12.4.1 Emergency Update to Patch 'Jailbreak' Flaw

Apple

Thehackernews

27.8.19

Is it Safe to Require TLS 1.2 for E-Mail

Crypto

SANS

27.8.19

Worried about cyber pirates hijacking autonomous ships? Focus on port cybersecurity first

Hacking

Net-security

27.8.19

Growing cloud adoption introduces visibility gaps and security complications

Security

Net-security

27.8.19

Attackers use large-scale bots to launch attacks on social media platforms

Social

Net-security

27.8.19

A look at the global network access control market

Security

Net-security

26.8.19

Hostinger Resets User Passwords Following System Breach

Incindent

Securityweek

26.8.19

Company Sues Black Hat Conference Over Mocked Presentation

Congress

Securityweek

26.8.19

The Growing Threat of Deepfake Videos

Security

Securityweek

26.8.19

Judge ordered Capital One hacker Paige Thompson to remain in prison

Crime

Securityaffairs

26.8.19

Airlines That Manage Booking Systems Themselves Expose Customer Data

Incindent

Securityweek

26.8.19

Hostinger Suffers Data Breach – Resets Password For 14 Million Users

Incindent

Thehackernews

26.8.19

Binance Confirms Hacker Obtained Its Users' KYC Data from 3rd-Party Vendor

Hacking

Thehackernews

26.8.19

GitHub announces wider array of 2FA options, including security keys and biometrics

Safety

Net-security

26.8.19

Attackers are targeting vulnerable Fortigate and Pulse Secure SSL VPNs

Vulnerebility

Net-security

26.8.19

UK National Cyber Security Centre urge to drop Python 2

Cyber

Securityaffairs

26.8.19

Hostinger disclosed a data breach that affects 14 Million customers

Incindent

Securityaffairs

26.8.19

Bad Packets warns of over 14,500 Pulse secure VPN endpoints vulnerable to CVE-2019-11510

Vulnerebility

Securityaffairs

26.8.19

Judge Orders Woman in Capital One Case to Remain in Custody

Incindent

Securityweek

26.8.19

Are there any Advantages of Buying Cyber Security Insurance?

Cyber

SANS

26.8.19

How to evaluate a password management solution for business

Security

Net-security

26.8.19

Thinking network-first to protect against security threats

Security

Net-security

26.8.19

Using deep learning and natural language understanding to protect enterprise communication

Security

Net-security

26.8.19

Five vendors accounted for 24.1% of vulnerabilities in 2019 so far

Vulnerebility

Net-security

26.8.19

Enterprises are unable to effectively use data to drive decision-making

Security

Net-security

25.8.19

80 defendants charged with participating in massive BEC and romance scams

Spam

Securityaffairs

25.8.19

Internal Revenue Service warns taxpayers of a malware campaign

Virus

Securityaffairs

25.8.19

Experts uncovered a hacking campaign targeting several WordPress Plugins

Hacking

Securityaffairs

25.8.19

Microsoft Blocks Windows 10 1903 Update on Zebra Rugged Tablets

Vulnerebility

Bleepingcomputer

25.8.19

IRS Warns Taxpayers of New Scam Campaign Distributing Malware

Spam

Bleepingcomputer

25.8.19

Windows 10 KB4505903 Update Breaks Bluetooth Speakers Connectivity

Vulnerebility

Bleepingcomputer

25.8.19

Mastercard Reports Data Breach to German and Belgian DPAs

Incindent

Bleepingcomputer

25.8.19

Instagram Phishing Emails Use Fake Login Warning Baits

Phishing  Social

Bleepingcomputer

25.8.19

Emotet Botnet Is Back, Servers Active Across the World

BotNet  Virus

Bleepingcomputer

25.8.19

Google Chrome to Warn If Logins Are Found in a Data Breach

Incindent  Safety

Bleepingcomputer

25.8.19

Microsoft Forms to Add Enterprise Automatic Phishing Detection

Phishing  Safety

Bleepingcomputer

25.8.19

Steam Patches LPE Vulnerabilities in Beta Version Update

Vulnerebility

Bleepingcomputer

25.8.19

Cisco Warns of Public Exploit Code for Critical Switch Flaws

Vulnerebility

Bleepingcomputer

25.8.19

Unpatched Squid Servers Exposed to DoS, Code Execution Attacks

Attack  Vulnerebility

Bleepingcomputer

25.8.19

Google Twice Misses Android App with Open-Source Spyware Code

Virus

Bleepingcomputer

25.8.19

GitHub Experienced Widespread Major Services Outage

Security

Bleepingcomputer

25.8.19

Portland Public Schools Recovers $2.9 Million Lost in BEC Scam

Spam

Bleepingcomputer

25.8.19

Bitdefender Fixes Privilege Escalation Bug in Free Antivirus 2020

Vulnerebility

Bleepingcomputer

25.8.19

npm Pulls Malicious Package that Stole Login Passwords

Virus

Bleepingcomputer

25.8.19

Cisco released 4CAN hardware tool to find flaws in automotive computers

Vulnerebility

Securityaffairs

25.8.19

Hacker will compensate victims with $1.1 million Bitcoin illegally earned

Cryptocurrency  Hacking

Securityaffairs

25.8.19

Buffer overflow exposes unpatched Squid servers to RCE and DoS attacks

Attack  Exploit

Securityaffairs

25.8.19

Vulnerability Found in SimpleMDM Apple Device Management Solution

Apple  Vulnerebility

Securityweek

24.8.19

Collision Course: Keeping Up With Digital Complexity in an App-Enabled World

Security blog

F5 Labs

24.8.19

What Are Security Controls?

Security blog

F5 Labs

24.8.19

Cloud Security: Citadel or Straw House, It's Your Call

Security blog

F5 Labs

24.8.19

ChatOps is Your Bridge to a True DevSecOps Environment

Security blog

F5 Labs

24.8.19

Banking Trojans: A Reference Guide to the Malware Family Tree

Malware blog

F5 Labs

24.8.19

The Hunt for IoT: So Easy To Compromise, Children Are Doing It

IoT blog

F5 Labs

24.8.19

GAME OVER: Detecting and Stopping an APT41 Operation

APT blog

FireEye

24.8.19

Healthcare: Research Data and PII Continuously Targeted by Multiple Threat Actors

Cyber blog

FireEye

24.8.19

Targeted Ransomware: Proliferating Menace Threatens Organizations

Ransomware blog

Symantec

24.8.19

Microsoft Patch Tuesday – August 2019

Vulnerebility blog

Symantec

24.8.19

The Many Possibilities of CVE-2019-8646

Vulnerebility blog

Project Zero

24.8.19

New 4CAN tool helps identify vulnerabilities in on-board car computers

Cyber blog

Cisco Talos

24.8.19

Talos DEFCON badge build instructions and use

Cyber blog

Cisco Talos

24.8.19

What you — and your company — should know about cyber insurance

Cyber blog

Cisco Talos

24.8.19

Vulnerability Spotlight: Multiple vulnerabilities in Aspose APIs

Vulnerebility blog

Cisco Talos

24.8.19

Vulnerability Spotlight: Multiple bugs in OpenWeave and Nest Labs Nest Cam IQ indoor camera

Vulnerebility blog

Cisco Talos

24.8.19

Cyberbullying: What schools and teachers can do

Cyber blog

Eset

24.8.19

First‑of‑its‑kind spyware sneaks into Google Play

OS Blog  Malware blog

Eset

24.8.19

Education and privacy legislation at ChannelCon

Cyber blog

Eset

24.8.19

Ransomware wave hits 23 towns in Texas

Ransomware blog

Eset

24.8.19

Lenovo High-Severity Bug Found in Pre-Installed Software

Vulnerebility

Threatpost

24.8.19

WordPress Plugins Exploited in Ongoing Attack, Researchers Warn

Exploit

Threatpost

24.8.19

Mastercard data breach affected Priceless Specials loyalty program

Incindent

Securityaffairs

24.8.19

Lenovo Solution Centre flaw allows hacking Windows laptop in 10 minutes

Vulnerebility

Securityaffairs

24.8.19

Cyberattacks on Texas Cities Put Other Governments on Guard

Attack

Securityweek

24.8.19

Hacker Ordered to Pay Back Nearly £1 Million to Phishing Victims

Crime

Thehackernews

23.8.19

A new variant of Asruex Trojan exploits very old Office, Adobe flaws

Exploit  Virus

Securityaffairs

23.8.19

Hackers are scanning the web for vulnerable Fortinet, Pulse Secure Products installs

Vulnerebility

Securityaffairs

23.8.19

Kubernetes Patches Recent HTTP/2 Vulnerabilities

Vulnerebility

Securityweek

23.8.19

US Wants Woman Accused in Capital One Hack to Stay Locked Up

BigBrothers

Securityweek

23.8.19

Asruex Malware Exploits Old vulnerabilities to Infect PDF, Word Docs

Exploit  Virus

Securityweek

23.8.19

New Tool From Cisco Hunts Flaws in Automotive Computers

Vulnerebility

Securityweek

23.8.19

U.S. Charges 80 in Massive Online Fraud Scheme

Incindent

Securityweek

23.8.19

Classification Concerns Over FISMA Report on Improving Agency Cybersecurity

Cyber

Securityweek

23.8.19

VMWare to Acquire Endpoint Security Firm Carbon Black

Safety

Securityweek

23.8.19

Second Steam Zero-Day Impacts Over 96 Million Windows Users

Vulnerebility

Bleepingcomputer

23.8.19

Windows 10 Insider Build 18965 Adds Restart Apps Sign-In Option

OS

Bleepingcomputer

23.8.19

Phishing Attacks Scrape Branded Microsoft 365 Login Pages

Phishing

Bleepingcomputer

23.8.19

Hackers Want $2.5 Million Ransom for Texas Ransomware Attacks

Ransomware

Bleepingcomputer

23.8.19

PokerTracker.com Hacked to Inject Payment Card Stealing Script

Hacking

Bleepingcomputer

23.8.19

Silence Advanced Hackers Attack Banks All Over the World

Hacking

Bleepingcomputer

23.8.19

Visa Adds New Threat Detection to Prevent Payment Fraud

Safety

Bleepingcomputer

23.8.19

Microsoft Fixes Corrupted Windows Defender Files When Using SFC

Vulnerebility

Bleepingcomputer

23.8.19

Microsoft Releases First Chromium-Based Microsoft Edge Beta

IT

Bleepingcomputer

23.8.19

Microsoft Patches Vulnerable Android Remote Desktop App

Vulnerebility

Bleepingcomputer

23.8.19

Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency

Cryptocurrency

Securityaffairs

23.8.19

Illegal Cryptocurrency Mining at Ukraine Nuclear Plant Exposed Sensitive Data

Cryptocurrency

Securityweek

23.8.19

Microsoft Offers Up to $30,000 for Flaws in Chromium-Based Edge

IT

Securityweek

23.8.19

Claroty Releases Free Diagnostic Tool for Urgent/11 Vulnerabilities

Vulnerebility

Securityweek

23.8.19

Google Proposes 'Privacy Sandbox' to Develop Privacy-Focused Ads

Privacy

Thehackernews

23.8.19

Spyware App on Google Play Gets Boot, Returns Days Later

Virus

Threatpost

23.8.19

Google Launches Open-Source Browser Extension for Ad Transparency

Security

Threatpost

23.8.19

Cisco warns of the availability of public exploit code for critical flaws in Cisco Small Business switches

Vulnerebility

Securityaffairs

23.8.19

Cisco addressed several vulnerabilities in UCS products

Vulnerebility

Securityaffairs

23.8.19

Hackers Target Vulnerabilities in Fortinet, Pulse Secure Products

Vulnerebility

Securityweek

23.8.19

Majority of Malicious Job Attacks on Microsoft SQL Server Target Asia

Virus

Securityweek

23.8.19

Remote Code Execution Flaws Impact Aspose APIs

Exploit

Securityweek

23.8.19

Simple Mimikatz & RDPWrapper Dropper

Virus

SANS

23.8.19

Quantum computing: The new moonshot in the cyber space race

Cyber

Net-security

23.8.19

Facebook phishing surges, Microsoft still most impersonated brand

Phishing  Social

Net-security

23.8.19

Should you block newly registered domains? Researchers say yes

Security

Net-security

23.8.19

New cross-industry consortium aims to accelerate confidential computing adoption

Security

Net-security

22.8.19

Exposed Sphinx Servers Are No Challenge for Hackers

Hacking

Bleepingcomputer

22.8.19

Severe Flaws in Kubernetes Expose All Servers to DoS Attacks

Attack  Vulnerebility

Bleepingcomputer

22.8.19

Scammer Tricks City Into $1 Million Wire Transfer

Spam

Bleepingcomputer

22.8.19

Adwind Remote Access Trojan Hits Utilities Sector

Virus

Bleepingcomputer

22.8.19

Gmail Is Down, Displays "Something Went Wrong" Errors

Vulnerebility

Bleepingcomputer

22.8.19

iOS 12.4 Jailbreak Released After Apple Unpatches Older Bug

iOS

Bleepingcomputer

22.8.19

Windows 10 Notepad Added to Microsoft Store, Only for Insiders

OS

Bleepingcomputer

22.8.19

VLC Media Player 3.0.8 Released with 13 Security Fixes

Vulnerebility

Bleepingcomputer

22.8.19

$11M Email Scam at Caterpillar Pinned to Nigerian Businessman

Spam

Bleepingcomputer

22.8.19

Hackers Use Fake NordVPN Website to Deliver Banking Trojan

Virus

Bleepingcomputer

22.8.19

App tainted with Ahmyst Open-source spyware appeared on Google Play Store twice

Android

Securityaffairs

22.8.19

The Dangers of Using Unsecured Wi-Fi Networks

Hacking

Securityaffairs

22.8.19

DLL Hijacking Flaw Found in Bitdefender Antivirus Free 2020

Vulnerebility

Securityweek

22.8.19

Texas attackers demand $2.5 million to allow towns to access encrypted data

Ransomware

Securityaffairs

22.8.19

Privileged Access Management Provider Remediant Raises $15 Million

IT

Securityweek

22.8.19

Attackers Demand Millions in Texas Ransomware Incident

Ransomware

Securityweek

22.8.19

Tech Giants Join Forces on Confidential Computing

Security

Securityweek

22.8.19

Agent 1433: remote attack on Microsoft SQL Server

Virus

Securelist

22.8.19

A new Zero-Day in Steam client impacts over 96 million Windows users

Vulnerebility

Securityaffairs

22.8.19

Cisco Patches Many Serious Vulnerabilities in Unified Computing Products

Vulnerebility

Securityweek

22.8.19

Cybersecurity salary, skills, and stress survey

Cyber

Net-security

22.8.19

Cisco warns about public exploit code for critical flaws in its 220 Series smart switches

Exploit

Net-security

22.8.19

Backdoor Found in Utility for Linux, Unix Servers

Virus

Threatpost

22.8.19

Adult Content Site Exposed Personal Data of 1M Users

Incindent

Threatpost

22.8.19

Researcher Discloses Second Steam Zero-Day After Valve Bug Bounty Ban

Vulnerebility

Threatpost

22.8.19

The Texas Ransomware Attacks: A Gamechanger for Cybercriminals

Ransomware

Threatpost

22.8.19

DoS attacks against most used default Tor bridges could be very cheap

Attack

Securityaffairs

22.8.19

Romania is going to exclude Huawei from its 5G Network

BigBrothers  Mobil

Securityaffairs

22.8.19

China-linked APT41 group targets US-Based Research University

APT

Securityaffairs

22.8.19

Amazon, Microsoft, May be Putting World at Risk of Killer AI, Says Report

Security

Securityweek

22.8.19

Russian APT 'Silence' Steals $3.5 Million in One Year

APT

Securityweek

22.8.19

Visa Tackles Payment Fraud with New Security Services

Incindent

Securityweek

22.8.19

Unlocking the future of blockchain innovation with privacy-preserving technologies

Cryptocurrency

Net-security

22.8.19

From SmarterChild to Siri: Why AI is the competitive advantage securing businesses

Security

Net-security

22.8.19

Identifying vulnerable IoT devices by the companion app they use

IoT

Net-security

22.8.19

Identifying evasive threats hiding inside the network

Security

Net-security

21.8.19

The Cost of Dealing With a Cybersecurity Attack in These 4 Industries

Attack

Securityaffairs

21.8.19

Chinese Cyberspies Continue Targeting Medical Research Organizations

BigBrothers  CyberSpy

Securityweek

21.8.19

Suspect in Huge Capital One Breach Seeks Release From Jail

Crime

Securityweek

21.8.19

Backdoor Found in 'rest-client' Ruby Gem

Virus

Securityweek

21.8.19

Apple, Google, Mozilla Respond to Kazakhstan Surveillance Efforts

BigBrothers  CyberSpy

Securityweek

21.8.19

Internet-Exposed Sphinx Servers at Risk of Attacks

Attack

Securityweek

21.8.19

Attacking Tor: What it Takes to Disrupt the Popular Onion Routing Network

Attack

Securityweek

21.8.19

Romania Mulls Excluding Huawei From its 5G Network

BigBrothers  Mobil

Securityweek

21.8.19

Google, Mozilla, Apple Block Kazakhstan's Root CA Certificate to Prevent Spying

BigBrothers  CyberSpy

Thehackernews

21.8.19

Apple iOS Patch Blunder Opens Updated iPhones to Jailbreaks

Apple  iOS

Threatpost

21.8.19

Microsoft Offers $30K Rewards For Chromium Edge Beta Flaws

Vulnerebility

Threatpost

21.8.19

Adwind Spyware-as-a-Service Attacks Utility Grid Operators

Virus

Threatpost

21.8.19

Fortnite Ransomware Masquerades as an Aimbot Game Hack

Ransomware

Threatpost

21.8.19

Adult Content Site Exposed Personal Data of 1M Users

Incindent

Threatpost

21.8.19

How to Prepare for Misconfigurations Clouding the Corporate Skies

Security

Threatpost

21.8.19

Backdoored Ruby gems stole credentials, injected cryptomining code

Cryptocurrency

Net-security

21.8.19

Thousands credit card numbers of MoviePass customers were exposed online

CyberCrime

Securityaffairs

21.8.19

Damage from Silence APT operations increases fivefold. The gang deploys new tools on its “worldwide tour”

APT

Securityaffairs

21.8.19

A backdoor mechanism found in tens of Ruby libraries

Virus

Securityaffairs

21.8.19

Flaw in New Facebook Design Allowed Removal of Profile Photos

Social

Securityaffairs

21.8.19

5 Ways to Protect Yourself from IP Address Hacking

Safety

Securityaffairs

21.8.19

Russian Hacking Group Targeting Banks Worldwide With Evolving Tactics

CyberCrime

Thehackernews

21.8.19

Use This Privacy Tool to View and Clear Your 'Off-Facebook Activity' Data

Social

Thehackernews

21.8.19

KAPE: Kroll Artifact Parser and Extractor

Social

SANS

21.8.19

New tool enables users to disconnect their off-Facebook activity from their account

Social

Net-security

21.8.19

Facebook Announces 2019 Internet Defense Prize Winners

Social

Securityweek

21.8.19

Chinese Cyber-Spies Target US-Based Research University

BigBrothers  CyberSpy

Securityweek

21.8.19

Facebook Launches Tool to Let Users Control Data Flow

Social

Securityweek

21.8.19

New YubiKey 5Ci Has Both USB-C and Lightning Connectors

Security

Securityweek

21.8.19

Three essential elements of a successful Zero Trust cybersecurity program

Security

Net-security

21.8.19

When will the GDPR pot boil over? It’s sooner (and different) than you think

Privacy

Net-security

21.8.19

Securing the cloud: Visibility, compliance and vulnerability management

Security

Net-security

21.8.19

Cybersecurity challenges for smart cities: Key issues and top threats

Security

Net-security

20.8.19

iOS 12.4 jailbreak released after Apple ‘accidentally un-patches’ an old flaw

iOS

Thehackernews

20.8.19

How Activity Logs Help WordPress Admins Better Manage Website Security

Hacking

Thehackernews

20.8.19

Hackers Planted Backdoor in Webmin, Popular Utility for Linux/Unix Servers

Hacking

Thehackernews

20.8.19

Twitter Shuts Chinese Accounts Targeting Hong Kong Protests

BigBrothers  Social

Securityweek

20.8.19

Twitter Flexing its Muscles Against State Misinformation

Social

Securityweek

20.8.19

VideoLAN Patches Dozen Vulnerabilities in VLC

Vulnerebility

Securityweek

20.8.19

Open Source-Based Ransomware Targets Fortnite Players

Ransomware

Securityweek

20.8.19

Flaw in New Facebook Design Allowed Removal of Profile Photos

Social  Virus

Securityweek

20.8.19

GitHub Now Scans Commits for Atlassian, Dropbox, Discord Tokens

Spam

Securityweek

20.8.19

Guildma malware is now accessing Facebook and�YouTube to keep up-to-date

Social  Virus

SANS

20.8.19

VLC users urged to implement latest security update

Vulnerebility

Net-security

20.8.19

Twitter bans 936 accounts that attempted to sow political discord in Hong Kong

Social

Securityaffairs

20.8.19

Backdoored Webmin versions were available for download for over a year

Virus

Securityaffairs

20.8.19

Hacker publicly releases Jailbreak for iOS version 12.4

iOS

Securityaffairs

20.8.19

Watch out! Malware Analysis Sandboxes could expose sensitive data of your organization

Virus

Securityaffairs

20.8.19

Facebook Offers Rewards for Instagram Data Abuse Reports

Social

Securityweek

20.8.19

Webmin Backdoored for Over a Year

Virus

Securityweek

20.8.19

Google Nest Security Cam Bugs Allow Device Takeover

Vulnerebility

Threatpost

20.8.19

Coordinated Ransomware Attack Hits 23 Texas Government Agencies

Ransomware

Threatpost

20.8.19

VLC Media Player Allows Desktop Takeover Via Malicious Video Files

Virus

Threatpost

20.8.19

Apple Sues Corellium Over iOS ‘Replica’ Security Testing Software

Apple  iOS

Threatpost

20.8.19

Post GandCrab, Cybercriminals Scouring the Dark Web for the Next Top Ransomware

Ransomware

Threatpost

20.8.19

Compressed ISO Files (ISZ)

Virus

SANS

20.8.19

With shadow IT running rampant, how can IT keep pace?

Security

Net-security

20.8.19

Automating CCPA compliance: Organize your data and manage requests

Security

Net-security

20.8.19

Protecting iOS and Android applications in a fully automated way

Android  iOS

Net-security

20.8.19

A point-in-time approach to risk management is no longer effective

Security

Net-security

20.8.19

Most IT pros find red team exercises more effective than blue team testing

Security

Net-security

20.8.19

Adoption of NAS solutions projected to rise steadily in the near future

Security

Net-security

19.8.19

AWS: No Significant Issues at Other Alleged Targets of Capital One Hacker

Security

Securityweek

19.8.19

Data Protection and Privacy: Think 360, Demand 360

Safety

Securityweek

19.8.19

UK Hacker Sentenced to 20 Months in Prison

Crime

Securityweek

19.8.19

Organizations Expose Sensitive Data via Malware Analysis Sandboxes

Virus

Securityweek

19.8.19

Ransomware Hits Texas Local Governments

Ransomware

Securityweek

19.8.19

Router Network Isolation Broken By Covert Data Exfiltration

Hacking

Bleepingcomputer

19.8.19

Steam Accounts Being Stolen Through Elaborate Free Game Scam

Spam

Bleepingcomputer

19.8.19

Windows 10 v1809 KB4512534 Update Released With VB Fix and More

Vulnerebility

Bleepingcomputer

19.8.19

'Coordinated Ransomware Attack' in Texas Hits 23 Local Governments

Ransomware

Bleepingcomputer

19.8.19

Microsoft Confirms Windows 10 1903 Update Error 0x80073701, Working on Fix

Vulnerebility

Bleepingcomputer

19.8.19

IT threat evolution Q2 2019

Analysis

Securelist

19.8.19

European Central Bank shuts down website following hack, data theft

BigBrothers

Net-security

19.8.19

5 Common Phishing Attacks and How to Avoid Them?

Phishing

Securityaffairs

19.8.19

Galaxy S10 is the first 5G phone that can be used by US DoD

Mobil

Securityaffairs

19.8.19

At least 23 Texas local governments targeted by coordinated ransomware attacks

Ransomware

Securityaffairs

19.8.19

Bluetana App allows detecting Bluetooth card skimmers in just 3 seconds

CyberCrime

Securityaffairs

19.8.19

Intel addresses High-Severity flaws in NUC Firmware and other tools

Vulnerebility

Securityaffairs

19.8.19

Uganda, Zambia Deny Huawei Helped Spy on Political Opponents

BigBrothers

Securityweek

19.8.19

Red teaming: Why a forward offense is the best defense

Security

Net-security

19.8.19

Ransomware attacks hit 1 in 5 Americans

Ransomware

Net-security

19.8.19

Researchers were able to detect what is typed using just a smartphone

Mobil

Net-security

19.8.19

Deception technology shifts power back to the defender

Security

Net-security

19.8.19

Routers from well-known manufacturers vulnerable to cross-router data leaks

Hacking  Vulnerebility

Net-security

19.8.19

Total global shipments of secure embedded hardware to double by 2023

IT

Net-security

19.8.19

Critical Bluetooth flaw opens millions of devices to eavesdropping attacks

Vulnerebility

Net-security

18.8.19

Windows Updates Start Rolling Out to Fix Visual Basic Issues

Vulnerebility

Bleepingcomputer

18.8.19

Windows 10 Notepad To Get Faster Updates via the Microsoft Store

OS

Bleepingcomputer

18.8.19

Steam Security Saga Continues with Vulnerability Fix Bypass

Vulnerebility

Bleepingcomputer

18.8.19

Windows 10 Insider Build 18963 Adds GPU Temperature Monitoring

OS

Bleepingcomputer

18.8.19

Mozilla Firefox Bug Let Third-Parties Access Saved Passwords

Vulnerebility

Bleepingcomputer

18.8.19

Decade-Long Bank Account Hacking Scheme Gets Fraudster 57 Months

Hacking

Bleepingcomputer

18.8.19

Phone Numbers Exposed By Inconsistent Password Reset Processes

Mobil

Bleepingcomputer

18.8.19

Microsoft Warns of Phishing Attacks Using Custom 404 Pages

Phishing

Bleepingcomputer

18.8.19

Google Has Started Removing FTP Support From Chrome

Security

Bleepingcomputer

18.8.19

Windows 10 1903 Users Report Errors Installing KB4512508 Update

Vulnerebility

Bleepingcomputer

18.8.19

Windows 10 Updates Cause Visual Basic Apps to Stop Responding

Vulnerebility

Bleepingcomputer

18.8.19

Google Estimates 1.5% of Web Logins Exposed in Data Breaches

Incindent

Bleepingcomputer

18.8.19

Capital One hacker suspected to have breached other 30 companies

Cyber

Securityaffairs

18.8.19

New DanaBot banking Trojan campaign targets Germany

Virus

Securityaffairs

18.8.19

Trend Micro addressed two DLL Hijacking flaws in Trend Micro Password Manager

Vulnerebility

Securityaffairs

18.8.19

Expert shows how to bypass a fix for a recently discovered Steam flaw

Vulnerebility

Securityaffairs

17.8.19

The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?

Hacking blog

Mcafee blog

17.8.19

McAfee AMSI Integration Protects Against Malicious Scripts

Malware blog

Mcafee blog

17.8.19

Showing Vulnerability to a Machine: Automated Prioritization of Software Vulnerabilities

Vulnerebility blog

FireEye

17.8.19

Say Cheese: Ransomware-ing a DSLR Camera

Ransomware blog

Checkpoint

17.8.19

SELECT code_execution FROM * USING SQLite;

Hacking blog

Checkpoint

17.8.19

Black Hat 2019 – WhatsApp Protocol Decryption for Chat Manipulation and More

Cyber blog

Checkpoint

17.8.19

Down the Rabbit-Hole...

Vulnerebility blog

Project Zero

17.8.19

Talos Black Hat 2019 flash talk roundup

Security blog

Cisco Talos

17.8.19

Microsoft Patch Tuesday — Aug. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

17.8.19

AI: Artificial Ignorance

Cyber blog

Eset

17.8.19

Microsoft warns of new BlueKeep‑like flaws

Vulnerebility blog

Eset

17.8.19

In the Balkans, businesses are under fire from a double‑barreled weapon

Security blog

Eset

17.8.19

Hacking my airplane – BlackHat edition

Hacking blog

Eset

17.8.19

Ransom News

Ransom News

Ransom News

17.8.19

USBSamurai — A Remotely Controlled Malicious USB HID Injecting Cable for less than 10$

Virus

Securityaffairs

17.8.19

700,000 records belonging to Choice Hotels customer leaked online. Crooks demanded ransom

Ransomware

Securityaffairs

17.8.19

Hurry Up! Update your LibreOffice because 2 patches have been bypassed

Vulnerebility

Securityaffairs

17.8.19

Iowa Grocery Chain Investigating Possible Hack of Payment Processing Systems

Hacking

Securityweek

17.8.19

Apple Sues Corellium Over Security Research Tool

Apple

Securityweek

17.8.19

Breached Passwords Still in Use By Hundreds of Thousands

Incindent

Threatpost

17.8.19

ThreatList: 4.1B Records Exposed in Breaches in First Half of 2019

Incindent

Threatpost

17.8.19

News Wrap: DejaBlue Bugs and Biometrics Data Breaches

Privacy  Security

Threatpost

17.8.19

Fake News and Influence: Information Warfare in the Digital Age

Security

Threatpost

17.8.19

The DAA File Format

Virus

SANS

17.8.19

Critical Bluetooth flaw opens millions of devices to eavesdropping attacks

Attack  Vulnerebility

Net-security

16.8.19

Apple Plans to Block All Covert, Cross-Site Tracking in Safari

Apple

Bleepingcomputer

16.8.19

Unique Kaspersky AV User ID Allowed 3rd-Party Web Tracking

Security

Bleepingcomputer

16.8.19

Microsoft Edge Now Reads Web Pages in 24 Different Voices

OS

Bleepingcomputer

16.8.19

Microsoft Voicemail Notifications Used As Bait in Phishing Campaign

Phishing

Bleepingcomputer

16.8.19

Trend Micro Fixes Privilege Escalation Bug in Password Manager

Vulnerebility

Bleepingcomputer

16.8.19

Lateral Phishing Attacks: A Growing Threat to the Enterprise

Phishing

Bleepingcomputer

16.8.19

Chrome and Firefox Changes Spark the End of EV Certificates

Safety

Bleepingcomputer

16.8.19

Microsoft Releases the August 2019 Security Updates for Office

Vulnerebility

Bleepingcomputer

16.8.19

Windows CTF Flaws Enable Attackers to Fully Compromise Systems

Vulnerebility

Bleepingcomputer

16.8.19

Attackers Use Backdoor and RAT Cocktail to Target the Balkans

Virus

Bleepingcomputer

16.8.19

Windows 7 SHA-2 Updates Blocked If Symantec, Norton AVs Installed

Safety

Bleepingcomputer

16.8.19

Phishing Campaign Uses Google Drive to Bypass Email Gateways

Phishing

Bleepingcomputer

16.8.19

New Norman Cryptominer Uses Dynamic DNS for C2 Communication

Cryptocurrency

Bleepingcomputer

16.8.19

Intel Updates NUC Firmware to Patch High Severity Bug

Vulnerebility

Bleepingcomputer

16.8.19

European Central Bank (ECB) discloses data breach in BIRD Newsletter

BigBrothers

Securityaffairs

16.8.19

Uganda Slams Report Huawei Helped Spy on Opposition Leader

BigBrothers

Securityweek

16.8.19

Many Users Don't Change Unsafe Passwords After Being Warned: Google

Security

Securityweek

16.8.19

Cybersecurity Has Become a Political Issue for Americans, Survey Shows

Cyber

Securityweek

16.8.19

European Central Bank Shuts Down 'BIRD Portal' After Getting Hacked

BigBrothers  Hacking

Thehackernews

16.8.19

Patches for 2 Severe LibreOffice Flaws Bypassed — Update to Patch Again

Vulnerebility

Thehackernews

16.8.19

Bluetana App Quickly Detects Hidden Bluetooth Card Skimmers at Gas Pumps

CyberCrime

Thehackernews

16.8.19

Apache Security Advisories Red Flag Wrong Versions in Patching Gaffe

Vulnerebility

Threatpost

16.8.19

HTTP Bugs Open Websites to DoS Attacks

Attack  Vulnerebility

Threatpost

16.8.19

Choice Hotels Breach Showcases Need for Shared Responsibility Model

Incindent

Threatpost

16.8.19

Energy Sector Phish Swims Past Microsoft Email Security via Google Drive

Phishing

Threatpost

16.8.19

Clickjacking Evolves to Hook Millions of Top-Site Visitors

Hacking

Threatpost

16.8.19

Mozilla addresses “master password” security bypass flaw in Firefox

Vulnerebility

Securityaffairs

16.8.19

Biometric data of 1M leaked via an unsecured Suprema owned database

Privacy  Security

Securityaffairs

16.8.19

A flaw in Kaspersky Antivirus allowed tracking its users online

Vulnerebility

Securityaffairs

16.8.19

Many Apache Struts Security Advisories Updated Following Review

Vulnerebility

Securityweek

16.8.19

ECB Uncovers Data Breach in Bank Newsletter

Incindent

Securityweek

16.8.19

Vulnerability Patched in Firefox Password Manager

Vulnerebility

Securityweek

16.8.19

Intel Patches High-Severity Flaws in Tools, NUC Firmware

Vulnerebility

Securityweek

16.8.19

Millions of Unencrypted Fingerprint and Facial Biometrics Found on Unsecured Database

Privacy  Security

Securityweek

16.8.19

Kaspersky Makes Changes After Products Raise Privacy Concerns

Vulnerebility

Securityweek

16.8.19

Analysis of a Spearphishing Maldoc

Spam  Virus

SANS

16.8.19

Closing the cyber skills gap: What to do next

Cyber

Net-security

16.8.19

Researchers reveal the latest lateral phishing tactics

Phishing

Net-security

16.8.19

3,813 breaches were reported through June 30, exposing over 4.1 billion records

Incindent

Net-security

16.8.19

Threat actors are adapting and switching their operations strategically and technically

Security

Net-security

16.8.19

Digital transformation helps companies work smarter yet makes them vulnerable to breaches

Vulnerebility

Net-security

15.8.19

Threat actors use a Backdoor and RAT combo to target the Balkans

Virus

Securityaffairs

15.8.19

DLL Hijacking Flaws Patched in Trend Micro Password Manager

Vulnerebility

Securityweek

15.8.19

Owners of Fake Tech Company Plead Guilty to Fraud Charges

Security

Securityweek

15.8.19

Kaspersky Antivirus Flaw Exposed Users to Cross-Site Tracking Online

Vulnerebility

Thehackernews

15.8.19

New HTTP/2 Flaws Expose Unpatched Web Servers to DoS Attacks

Vulnerebility

Bleepingcomputer

15.8.19

New Bluetooth KNOB Flaw Lets Attackers Manipulate Traffic

Vulnerebility

Bleepingcomputer

15.8.19

New Cerberus Android Banker Uses Pedometer to Avoid Analysis

Android  Virus

Bleepingcomputer

15.8.19

Microsoft's August 2019 Patch Tuesday Fixes 95 Vulnerabilities

Vulnerebility

Bleepingcomputer

15.8.19

Windows 10 Cumulative Update KB4512508 & KB4511553 Released

Vulnerebility

Bleepingcomputer

15.8.19

Microsoft Fixes Critical Windows 10 Wormable Remote Desktop Flaws

Vulnerebility

Bleepingcomputer

15.8.19

Hackers Target the North American Hotel Industry With a RAT

Virus

Bleepingcomputer

15.8.19

Adobe Releases Security Updates for Reader, Photoshop, and More

Vulnerebility

Bleepingcomputer

15.8.19

Curious Orca BEC Scammers Use Email Probes to Validate Targets

Spam

Bleepingcomputer

15.8.19

HVACking: Remotely Exploiting Bugs in Building Control Systems

Hacking

Bleepingcomputer

15.8.19

Android Security: A Peek Behind the Scenes

Android

Bleepingcomputer

15.8.19

Steam Security Vulnerability Fixed, Researchers Don't Agree

Vulnerebility

Bleepingcomputer

15.8.19

4G Router Vulnerabilities Let Attackers Take Full Control

Mobil  Vulnerebility

Bleepingcomputer

15.8.19

Nmap 7.80 DEF CON Release: First Stable Version in Over a Year

Safety

Bleepingcomputer

15.8.19

Cloud Atlas Hackers Add Polymorphic Malware to Their Toolkit

CyberSpy  Virus

Bleepingcomputer

15.8.19

Apple Issues Solutions for Macs Unable to Access Windows Shares

Apple

Bleepingcomputer

15.8.19

DEF CON and Feds Partner on Anonymous Bug Submission Program

Congress

Threatpost

15.8.19

20-Year-Old Bug in Legacy Microsoft Code Plagues All Windows Users

Vulnerebility

Threatpost

15.8.19

Fingerprints of 1M Exposed in Public Biometrics Database

Incindent  Privacy

Threatpost

15.8.19

Windows Users at Risk From High-Severity Intel Software Flaw

Vulnerebility

Threatpost

15.8.19

Lenovo Warns of ThinkPad Bugs, One Unpatched

Vulnerebility

Threatpost

15.8.19

Facebook Records User Audio, Sparking Privacy Questions

Social

Threatpost

15.8.19

Norman Cryptominer Employs Sophisticated Obfuscation Tactics

Cryptocurrency

Threatpost

15.8.19

TikTok Scammers Cash In On Adult Dating, Impersonation Tricks

Spam

Threatpost

15.8.19

KNOB attack threatens over a billion Bluetooth-enabled devices

Attack

Securityaffairs

15.8.19

Security Patch Day for August includes the most critical Note released by SAP in 2019

Vulnerebility

Securityaffairs

15.8.19

Flaws in HTTP/2 implementations expose servers to DoS attacks

Attack  Vulnerebility

Securityaffairs

15.8.19

Feds: Capital One Suspect May Have Hacked 30-Plus Companies

BigBrothers

Securityweek

15.8.19

New Bluetooth Vulnerability Allows Attackers to Intercept Traffic

Vulnerebility

Securityweek

15.8.19

SAP Patches Highest Number of Critical Flaws Since 2014

Vulnerebility

Securityweek

15.8.19

British Airways Criticized for Exposing Passenger Flight Details

Incindent  Privacy

Securityweek

15.8.19

Myers-Briggs Study Examines Employee Personality Traits and Cyber Behaviors

Cyber

Securityweek

15.8.19

Microsoft Warns of New BlueKeep-Like, Wormable RDS Vulnerabilities

Vulnerebility

Securityweek

15.8.19

New Bluetooth Vulnerability Lets Attackers Spy On Encrypted Connections

Attack  Vulnerebility

Thehackernews

15.8.19

Extending security to fourth parties your business needs, but doesn’t control

Security

Net-security

15.8.19

AI vs. AI: Cybersecurity battle royale

Cyber

Net-security

15.8.19

A compendium of container escapes

Security

Net-security

15.8.19

Organizations that scan applications in production have a reduced risk of being breached

Security

Net-security

15.8.19

Thefts from cryptocurrency exchanges continue despite increased security

Cryptocurrency

Net-security

15.8.19

Huge database found leaking biometric, personal info of millions

Privacy

Net-security

14.8.19

Czech Republic ‘s committee blames foreign state for Foreign Ministry Cyberattack

BigBrothers

Securityaffairs

14.8.19

HTTP/2 Implementation Vulnerabilities Expose Servers to DoS Attacks

Attack  Vulnerebility

Securityweek

14.8.19

Facebook Listened to Users' Conversations: Report

Social

Securityweek

14.8.19

Siemens SCALANCE X Switches Vulnerable to DoS Attacks

Attack

Securityweek

14.8.19

8 New HTTP/2 Implementation Flaws Expose Websites to DoS Attacks

Attack

Thehackernews

14.8.19

August 2019 Patch Tuesday: Microsoft plugs critical wormable RDP holes

Vulnerebility

Net-security

14.8.19

The changing face of DDoS attacks: Degraded performance instead of total takedown

Attack

Net-security

14.8.19

Cerberus Enters the Android Malware Rental Scene

Android  Virus

Threatpost

14.8.19

British Airways E-Ticketing Flaw Exposes Passenger Flight, Personal Data

Incindent

Threatpost

14.8.19

Shades of BlueKeep: Wormable Remote Desktop Bugs Top August Patch Tuesday List

Vulnerebility

Threatpost

14.8.19

22 Critical Flaws Patched in Adobe Photoshop

Vulnerebility

Threatpost

14.8.19

HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion

Alert

Alert

14.8.19

Microsoft Patch Tuesday for August 2019 patch 93 bugs, including 2 dangerous wormable issues

Vulnerebility

Securityaffairs

14.8.19

Google hacker discloses 20-year-old Windows flaw still unpatched

Vulnerebility

Securityaffairs

14.8.19

Adobe Patch Tuesday for August 2019 fixed 119 flaws in 8 products

Vulnerebility

Securityaffairs

14.8.19

Cerberus, a new banking Trojan available as malware-as-a-service in the underground

Virus

Securityaffairs

14.8.19

Czechs Blame Foreign State for Foreign Ministry Cyberattack

BigBrothers

Securityweek

14.8.19

Microsoft Patches Over 90 Vulnerabilities With August 2019 Updates

Vulnerebility

Securityweek

14.8.19

Adobe Patches 118 Vulnerabilities Across Eight Products

Vulnerebility

Securityweek

14.8.19

Free MANRS Tool Helps Improve Routing Security

Security

Securityweek

14.8.19

4 New BlueKeep-like 'Wormable' Windows Remote Desktop Flaws Discovered

Vulnerebility

Thehackernews

14.8.19

Google Discloses 20-Year-Old Unpatched Flaw Affecting All Versions of Windows

Vulnerebility

Thehackernews

14.8.19

Cerberus: A New Android 'Banking Malware For Rent' Emerges

Virus

Thehackernews

14.8.19

Recent example of MedusaHTTP malware

Virus

SANS

14.8.19

Optimizing the patch management process

Vulnerebility

Net-security

14.8.19

Link between personality type and vulnerabilities to cybercrime

CyberCrime  Vulnerebility

Net-security

14.8.19

Help Net Security report: SecBI’s automated threat detection, response and hunting

Security

Net-security

13.8.19

Flaws in 4G Routers of various vendors put millions of users at risk

Mobil  Vulnerebility

Securityaffairs

13.8.19

SQLite Vulnerabilities Demoed With Hacking of iPhone, Malware C&C

Vulnerebility  Virus

Securityweek

13.8.19

UN Probing 35 North Korean Cyberattacks in 17 Countries

Attack  BigBrothers

Securityweek

13.8.19

Epic Games Hit With Class Action Lawsuit Over Hacked 'Fortnite' Accounts

Hacking

Thehackernews

13.8.19

Researchers discover 40+ insecure drivers for Windows

Vulnerebility

Net-security

13.8.19

AT&T, T-Mobile, Sprint, Verizon Blasted For Data Privacy Policies

Privacy

Threatpost

13.8.19

4 Dating Apps Pinpoint Users’ Precise Locations – and Leak the Data

Incindent

Threatpost

13.8.19

Recently Cloud Atlas used a new piece of polymorphic malware

CyberSpy  Virus

Securityaffairs

13.8.19

FBI is searching for contractors to monitor social media

BigBrothers

Securityaffairs

13.8.19

'Cloud Atlas' Cyberspies Use Polymorphic Malware in Government Attacks

CyberSpy  Virus

Securityweek

13.8.19

Android Users Can Now Log in to Google Services Using Fingerprint

Android

Thehackernews

13.8.19

Malicious .DAA Attachments

Virus

SANS

13.8.19

SOC-as-a-Service promises threat protection in a world of scarce resources

Safety

Net-security

13.8.19

Anomali discovers phishing campaign targeting Chinese government agencies

Phishing

Net-security

13.8.19

Nmap 7.80 released: A mature Npcap Windows packet capturing driver, 11 new NSE scripts

Safety

Net-security

12.8.19

Gamers Beware: Zero-Day in Steam Client Affects All Windows Users

Vulnerebility

Threatpost

12.8.19

DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR

Congress

Threatpost

12.8.19

Recent Cloud Atlas activity

APT

Securelist

12.8.19

Watch out, your StockX account details may be available in crime forums

Crime

Securityaffairs

12.8.19

Infecting Canon EOS DSLR camera with ransomware over the air

Ransomware

Securityaffairs

12.8.19

FBI, Facebook Could Clash Over Privacy vs. Monitoring

BigBrothers

Securityweek

12.8.19

Researchers Demonstrate Ransomware Attack on DSLR Camera

Ransomware

Securityweek

12.8.19

McAfee Strengthens Container Security Capabilities With NanoSec Acquisition

Security

Securityweek

12.8.19

Apple Offers Up to $1 Million in Public Bug Bounty Program

Apple

Securityweek

12.8.19

'Saefko' Multi-Layered RAT Can Spread via USB Drives

Virus

Securityweek

12.8.19

Canon DSLR Cameras Can Be Hacked With Ransomware Remotely

Ransomware

Thehackernews

12.8.19

Beware of Fake Microsoft Account Unusual Sign-in Activity Emails

Security

Bleepingcomputer

12.8.19

Database from StockX Hack Sold Online, Check If You're Included

Hacking

Bleepingcomputer

12.8.19

Canon DSLR Camera Infected with Ransomware Over the Air

Ransomware

Bleepingcomputer

12.8.19

Windows 10 Security Alert: Vulnerabilties Found in Over 40 Drivers

Vulnerebility

Bleepingcomputer

12.8.19

Google Chrome Incognito Mode Can Still Be Detected by These Methods

Security

Bleepingcomputer

12.8.19

Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoor

Vulnerebility

Securityaffairs

12.8.19

Gaining remote code execution using a tainted SQLite database

Exploit

Securityaffairs

12.8.19

Vulnerabilities in Device Drivers From 20 Vendors Expose PCs to Persistent Malware

Vulnerebility  Virus

Securityweek

12.8.19

Over 40 Drivers Could Let Hackers Install Persistent Backdoor On Windows PCs

Virus

Thehackernews

12.8.19

Recon Montreal 2019

Conference Press

Conference Press

12.8.19

DefCon27

Conference Press

Conference Press

12.8.19

BlackHat 2019 USA

Conference Press

Conference Press

12.8.19

Nmap Defcon Release: 7.80

Security

Net-security

12.8.19

Moving away from spreadsheets: How to automate your third-party risk management process

Security

Net-security

12.8.19

Pitfalls to avoid when improving your software development skills

Security

Net-security

12.8.19

Kubernetes security matures: Inside the project’s first audit

Security

Net-security

11.8.19

DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo

Congress

Threatpost

11.8.19

DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack

Congress

Threatpost

11.8.19

Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster

Security

Threatpost

11.8.19

Ransom News

Ransom News

Ransom News

11.8.19

Boffins hacked Siemens Simatic S7, most secure controllers in the industry

ICS

Securityaffairs

11.8.19

10-year-old vulnerability in Avaya VoIP Phones finally fixed

Vulnerebility

Securityaffairs

11.8.19

City of Naples, Florida, lost $700K after a cyberattack

Attack

Securityaffairs

11.8.19

Varenyky Spambot Trojan targets French users in alleged sextortion campaign

Spam  Virus

Securityaffairs

11.8.19

Android Apps containing Clicker Trojan installed on over 100M devices

Android

Securityaffairs

10.8.19

Facebook hits two app developers with lawsuit

Social blog

Eset

10.8.19

Varenyky: Spambot à la Française

Spam blog

Eset

10.8.19

FBI warns of romance scams using online daters as money mules

BigBrother blog

Eset

10.8.19

Sharpening the Machete

Cyber blog

Eset

10.8.19

Vulnerability Spotlight: Multiple vulnerabilities in NVIDIA Windows GPU Display Driver, VMware ESXi, Workstation and Fusion

Vulnerebility blog

Cisco Talos

10.8.19

Malvertising: Online advertising's darker side

Malware blog

Cisco Talos

10.8.19

The Fully Remote Attack Surface of the iPhone

Hardware blog  OS Blog

Project Zero

10.8.19

Reverse RDP Attack: The Hyper-V Connection

Hacking blog

Checkpoint

10.8.19

Black Hat 2019 – WhatsApp Protocol Decryption for Chat Manipulation and More

Hacking blog

Checkpoint

10.8.19

Finding Evil in Windows 10 Compressed Memory, Part Three: Automating Undocumented Structure Extraction

Hacking blog

FireEye

10.8.19

APT41: A Dual Espionage and Cyber Crime Operation

APT blog

FireEye

10.8.19

Commando VM 2.0: Customization, Containers, and Kali, Oh My!

Safety blog

FireEye

10.8.19

Finding Evil in Windows 10 Compressed Memory, Part Two: Virtual Store Deep Dive

Hacking blog

FireEye

10.8.19

From Building Control to Damage Control: A Case Study in Industrial Security Featuring Delta’s enteliBUS Manager

ICS blog

Mcafee blog

10.8.19

HVACking: Understanding the Delta Between Security and Reality

Hacking blog

Mcafee blog

10.8.19

Avaya Deskphone: Decade-Old Vulnerability Found in Phone’s Firmware

Hardware blog

Mcafee blog

10.8.19

MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play

Malware blog

Mcafee blog

10.8.19

The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land

Hacking blog

Mcafee blog

10.8.19

SODINOKIBI: THE CROWN PRINCE OF RANSOMWARE

Ransomware blog

Cybereason

10.8.19

KDE Vulnerability Fixed By Removing Shell Command Support

Vulnerebility

Bleepingcomputer

10.8.19

Microsoft Office Phishers Move to Enterprise AWS Landing Pages

Phishing

Bleepingcomputer

10.8.19

Android Apps With Over 100M Installs Contain a Clicker Trojan

Android

Bleepingcomputer

10.8.19

Customer Information Exposed In Air New Zealand Phishing Attack

Phishing

Bleepingcomputer

10.8.19

Apple Opens Its Invite-Only Bug Bounty Program to All Researchers

Apple

Bleepingcomputer

10.8.19

Microsoft 365 to Get Enhanced Suspicious Content Submission

Security

Bleepingcomputer

10.8.19

3Fun Dating App Exposes Exact Location of Users and Personal Info

Privacy

Bleepingcomputer

10.8.19

DEF CON 2019: Researchers Demo Hacking Google Home for RCE

Congress

Threatpost

10.8.19

Hack of High-End Hotel Smart Locks Shows IoT Security Fail

IoT

Threatpost

10.8.19

DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover

Congress

Threatpost

10.8.19

Election Security Threats: From Misinformation to Voting Machine Flaws

Vulnerebility

Threatpost

10.8.19

Decryptor JSWorm 4.0

Anti-Ransom Tool

Anti-Ransom Tool

10.8.19

Emsisoft released a free decryptor for JSWorm 4.0

Ransomware

Securityaffairs

10.8.19

3Fun Dating App leaked members’ location and personal details

Incindent

Securityaffairs

9.8.19

Steam Zero-Day Vulnerability Affects Over 100 Million Users

Vulnerebility

Bleepingcomputer

9.8.19

Avaya VoIP Phones Harbored 10-year Old Vulnerability

Vulnerebility

Bleepingcomputer

9.8.19

Two New Windows 10 19H2 Builds Released to Test CFR

OS

Bleepingcomputer

9.8.19

US Accounts for More than Half of World's Ransomware Attacks

Ransomware

Bleepingcomputer

9.8.19

New Trojan Records Your Screen When on Sex Related Sites

Virus

Bleepingcomputer

9.8.19

Google News Bug Preventing New Stories from Being Indexed

Vulnerebility

Bleepingcomputer

9.8.19

Microsoft Edge Dev Updated Released With Improvements

IT

Bleepingcomputer

9.8.19

State Farm Accounts Compromised in Credential Stuffing Attack

Attack  Incindent

Bleepingcomputer

9.8.19

National Baseball Hall of Fame Hit By Payment Card Stealing Attack

Attack  Incindent

Bleepingcomputer

9.8.19

Microsoft Ignored RDP Vulnerability Until it Affected Hyper-V

Vulnerebility

Bleepingcomputer

9.8.19

Microsoft Releases August 2019 Office Updates With Fixes, Improvements

Vulnerebility

Bleepingcomputer

9.8.19

Windows 10 Insider Build 18956 Brings the Always on Top Calculator

OS

Bleepingcomputer

9.8.19

Apple announces major changes to its bug bounty program, including higher rewards

Apple

Securityaffairs

9.8.19

Vulnerability Has Been Lurking in Avaya Phones for 10 Years

Vulnerebility

Securityweek

9.8.19

Hidden Injection Flaws Found in BIG-IP Load Balancers

Hacking

Securityweek

9.8.19

Repurposing Mac Malware Not Difficult, Researcher Shows

Apple

Securityweek

9.8.19

Google Chrome Tests Feature That Gives Any Site a Dark Mode

Security

Bleepingcomputer

9.8.19

Google's Cloud IAP Now Generally Available for Cloud VM Clients

Security

Bleepingcomputer

9.8.19

New ISOs of Windows 10 20H1 Update Released

OS

Bleepingcomputer

9.8.19

Leapfrog Children’s Tablet Owners Should Remove Pet Chat Now

Security

Bleepingcomputer

9.8.19

Lokibot Uses Image Files to Hide Code for Unpacking Routine

BotNet

Bleepingcomputer

9.8.19

Fraudster Unlocks Over 2 Million AT&T Phones, Pays $1 Million

Incindent  Mobil

Bleepingcomputer

9.8.19

SWAPGS Vulnerability in Modern CPUs Fixed in Windows, Linux, ChromeOS

Vulnerebility

Bleepingcomputer

9.8.19

New Echobot Botnet Variant Uses Over 50 Exploits to Propagate

BotNet

Bleepingcomputer

9.8.19

Zero-Day Bug in KDE 4/5 Executes Commands by Opening a Folder

Vulnerebility

Bleepingcomputer

9.8.19

AT&T Launches Public Bug Bounty Program on HackerOne

Security

Bleepingcomputer

9.8.19

Clever Amazon Phishing Scam Creates Login Prompts in PDF Docs

Phishing

Bleepingcomputer

9.8.19

FBI Warns of Romance Scams Turning Victims into Money Mules

BigBrothers  Spam

Bleepingcomputer

9.8.19

New Windows 10 Cloud Reset Feature Spotted in Insider Builds

OS

Bleepingcomputer

9.8.19

Microsoft To Disable VBScript by Default on August 13th

Security

Bleepingcomputer

9.8.19

New Lord Exploit Kit Pushes njRAT and ERIS Ransomware

Exploit  Ransomware

Bleepingcomputer

9.8.19

CafePress Data Breach Exposes Personal Info of 23 Million Users

Incindent

Bleepingcomputer

9.8.19

Apple expands bug bounty program, opens it to all researchers, raises rewards

Apple

Net-security

9.8.19

Apple will now pay hackers up to $1 million for reporting vulnerabilities

Apple

Thehackernews

9.8.19

Critical RCE Bug Found Lurking in Avaya VoIP Phones

Vulnerebility

Threatpost

9.8.19

Researchers Bypass Apple FaceID Using Biometrics ‘Achilles Heel’

Apple

Threatpost

9.8.19

Black Hat 2019: Addressing Supply-Chain Risk Starts with People, Microsoft Says

Congress

Threatpost

9.8.19

Apple Upgrades Bug Bounty Program: Adds Macs, $1M Reward

Apple

Threatpost

9.8.19

State Farm Falls Victim to Credential-Stuffing Attack

Attack  Incindent

Threatpost

9.8.19

Phishing Attacks Enlist Amazon AWS, Microsoft Azure in Ploys

Phishing

Threatpost

9.8.19

Vulnerabilities in Siemens’ most secure industrial PLCs can lead to industrial havoc

ICS

Net-security

9.8.19

A Zero-Day in Steam client for Windows affects over 100 Million users

Vulnerebility

Securityaffairs

9.8.19

WhatsApp flaws allow the attackers to manipulate conversations

Social

Securityaffairs

9.8.19

New strain of Clipsa malware launches brute-force attacks on WordPress sites

Virus

Securityaffairs

9.8.19

Broadcom to Buy Symantec Enterprise Unit for $10.7 Billion

IT

Securityweek

9.8.19

Hackers Can Use Rogue Engineering Stations to Target Siemens PLCs

ICS

Securityweek

9.8.19

New Windows Process Injection Can Be Useful for Stealthy Malware

Virus

Securityweek

9.8.19

Privacy Platform Provider Securiti.ai Emerges From Stealth With $31 Million Funding

IT

Securityweek

9.8.19

GM Cruise Releases Automated Firmware Security Analyzer to Open Source

Security

Securityweek

9.8.19

Researchers Find Vulnerabilities in Boeing 787 Firmware

Vulnerebility

Securityweek

9.8.19

100% JavaScript Phishing Page

Phishing

SANS

9.8.19

Security flaw could turn load balancers into beachheads for cyber attacks

Vulnerebility

Net-security

9.8.19

August 2019 Patch Tuesday forecast: Expect updates from Adobe, stay current on other updates

Vulnerebility

Net-security

9.8.19

Six critical areas to focus on when integrating DevSecOps into an organization

Security

Net-security

8.8.19

[Guest Diary] The good, the bad and the non-functional, or "how not to do an attack campaign"

CyberCrime

SANS

8.8.19

Photo gallery: Black Hat USA 2019, part two

Congress

Net-security

8.8.19

AttackSurfaceMapper automates the reconnaissance process

Security

Net-security

8.8.19

Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack

Congress

Threatpost

8.8.19

DEF CON 2019: 35 Bugs in Office Printers Offer Hackers an Open Door

Congress

Threatpost

8.8.19

New SWAPGS Side-Channel Attack Bypasses Spectre and Meltdown Defenses

Attack

Threatpost

8.8.19

Black Hat 2019: WhatsApp Users Still Open to Message Manipulation

Congress

Threatpost

8.8.19

Researchers Bypass Apple FaceID Using Biometrics ‘Achilles Heel’

Apple

Threatpost

8.8.19

Ransomware Sees Triple-Digit Spike in Corporate Detections

Ransomware

Threatpost

8.8.19

Phishing Attacks Enlist Amazon AWS, Microsoft Azure in Ploys

Phishing

Threatpost

8.8.19

Black Hat 2019: 5G Security Flaw Allows MiTM, Targeted Attacks

Congress

Threatpost

8.8.19

Black Hat 2019: Ethical Hackers Must Protect Digital Human Rights

Congress

Threatpost

8.8.19

Black Hat 2019: Security’s Powerful Cultural Transformation

Congress

Threatpost

8.8.19

Smominru Cryptominer Scrapes Credentials for Half-Million Machines

Cryptocurrency

Threatpost

8.8.19

Security Vulnerabilities Are Increasingly Putting Kids at Risk

Vulnerebility

Threatpost

8.8.19

Black Hat: LeapFrog Tablet Flaws Let Attackers Track, Message Kids

Congress

Threatpost

8.8.19

Vulnerability in Kubernetes Allows Access to Custom Resources

Vulnerebility

Securityweek

8.8.19

Facebook Sues Two Android App Developers for Click Injection Fraud

Android  Social

Thehackernews

8.8.19

Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises

Security

Net-security

8.8.19

Researchers uncover over 35 vulnerabilities in six leading enterprise printers

Vulnerebility

Net-security

8.8.19

American Insurance firm State Farm victim of credential stuffing attacks

Incindent

Securityaffairs

8.8.19

Cisco addressed critical flaws in Cisco Small Business 220 Series Smart Switches

Vulnerebility

Securityaffairs

8.8.19

Microsoft Says It 'Listens' to Conversations Only With Permission

Security

Securityweek

8.8.19

US Formalizes Ban on Government Contracts to China's Huawei, Others

BigBrothers

Securityweek

8.8.19

Network Shares Are a Primary Target for Ransomware

Ransomware

Securityweek

8.8.19

Cisco Patches Critical Flaws in Network Switches

Vulnerebility

Securityweek

8.8.19

Twitter Again Admits Sharing User Data Without Permission

Social

Securityweek

8.8.19

The Fundamentals of Developing Effective DevSecOps

Security

Securityweek

8.8.19

Reverse RDP Attack Also Enables Guest-to-Host Escape in Microsoft Hyper-V

Attack

Thehackernews

8.8.19

Which are the most capable breach prevention systems?

Incindent

Net-security

8.8.19

Automation, visibility remain biggest issues for cybersecurity teams

Cyber

Net-security

8.8.19

What’s cybercriminals’ most effective weapon in a ransomware attack?

Ransomware

Net-security

7.8.19

OilRig APT group: the evolution of attack techniques over time

APT

Securityaffairs

7.8.19

The number of exploits in the Echobot botnet reached 59

BotNet  Exploit

Securityaffairs

7.8.19

SQL Injection Vulnerability Exposed Starbucks Financial Records

Hacking  Vulnerebility

Securityweek

7.8.19

Millions of Devices With Intel CPUs Exposed to SWAPGS Attack

Attack

Securityweek

7.8.19

Binance KYC Data Leak — Crypto Exchange Sets $290,000 Bounty On Blackmailer

Cryptocurrency

Thehackernews

7.8.19

Warshipping: Attackers can access corporate networks through the mailroom

Attack

Net-security

7.8.19

Verifying SSL/TLS configuration (part 2)

Crypto

SANS

7.8.19

49% of all risky online transactions come from mobile devices

Mobil

Net-security

7.8.19

Critical holes plugged in Cisco 220 Series smart switches

Vulnerebility

Net-security

7.8.19

SWAPGS Attack – A new Spectre-V1 attack affects modern chips

Attack

Securityaffairs

7.8.19

New Lord Exploit Kit appears in the threat landscape

Exploit

Securityaffairs

7.8.19

Expert publicly disclosed a zero-day vulnerability in KDE

Vulnerebility

Securityaffairs

7.8.19

Crooks turn victims into money mules via confidence/romance scams

Spam

Securityaffairs

7.8.19

Developer Bypasses Chrome's Anti-Incognito Detection

Security

Securityweek

7.8.19

Baldr Malware: A Short-Lived Star or Info Stealer That Will Return?

Virus

Securityweek

7.8.19

New 'Lord' Exploit Kit Emerges

Exploit

Securityweek

7.8.19

Slack Unveils New Enterprise Security Tools

Security

Securityweek

7.8.19

Pakistani Man Bribed AT&T Employees to Unlock Phones, Plant Malware

Virus

Securityweek

7.8.19

Cloud Providers Improving Security, But Users Need to Up Their Game

Security

Securityweek

7.8.19

Russian Hackers Leverage IoT Devices to Access Corporate Networks

Hacking  IoT

Securityweek

7.8.19

KDE Linux Desktops Could Get Hacked Without Even Opening Malicious Files

Virus

Thehackernews

7.8.19

SWAPGS Attack — New Speculative Execution Flaw Affects All Modern Intel CPUs

Attack

Thehackernews

7.8.19

Pakistani Man Bribed AT&T Insiders to Plant Malware and Unlock 2 Million Phones

Virus

Thehackernews

7.8.19

Organizations are employing cyber-resilient strategies in new ways

Cyber

Net-security

7.8.19

Qualys bringing new prescription for security to Black Hat and DEF CON 2019

Congress

Net-security

7.8.19

SWAPGS Attack: A new Spectre haunts machines with Intel CPUs

Attack

Net-security

6.8.19

ECH0RAIX DECODER

Anti-Ramson Tool

Anti-Ramson Tool

6.8.19

QualPwn Bugs In Snapdragon SoC Can Attack Android Over the Air

Android

Bleepingcomputer

6.8.19

ECh0raix Ransomware Decryptor Restores QNAP Files For Free

Ransomware

Bleepingcomputer

6.8.19

Microsoft Releases Windows Terminal v0.3 With Major Improvements

OS

Bleepingcomputer

6.8.19

Monzo Asks Clients to Reset PINs After Exposure to Employees

Incindent

Bleepingcomputer

6.8.19

StockX Hack Exposes Personal Information of Customers

Hacking  Incindent

Bleepingcomputer

6.8.19

Russian APT Abuses IoT Devices to Infiltrate Corporate Targets

APT

Bleepingcomputer

6.8.19

Microsoft Invites Researchers to Hack Their Azure Security Lab

Security

Bleepingcomputer

6.8.19

How to Uninstall Windows 10 Updates Manually

OS

Bleepingcomputer

6.8.19

Is Your Email One of 200 Million Targeted by Extortion Scams?

Spam

Bleepingcomputer

6.8.19

GermanWiper Ransomware Erases Data, Still Asks for Ransom

Ransomware

Bleepingcomputer

6.8.19

Beware of Emails Asking You to "Confirm Your Unsubscribe" Request

Spam

Bleepingcomputer

6.8.19

Extortion Emails on the Rise: A Look at The Different Types

Spam

Bleepingcomputer

6.8.19

CafePress Data Breach exposes technical details of 23 Million users

Incindent

Securityaffairs

6.8.19

The Evolution of Aggah: From Roma225 to the RG Campaign

APT

Securityaffairs

6.8.19

Microsoft Offers Up to $300,000 in New Azure Security Lab

Security

Securityweek

6.8.19

Cybereason Raises an Additional $200 Million in Funding

IT

Securityweek

6.8.19

Digital bank Monzo urges customers to change PINs following security breach

CyberCrime

Net-security

6.8.19

Microsoft sets up isolated environment for bug hunters to test attacks against Azure

Vulnerebility

Net-security

6.8.19

UN Report: North Korea Cyber Experts Raised Up to $2 Billion

BigBrothers

Securityweek

6.8.19

Privacy Watchdogs Warn Facebook Over Libra Currency

Privacy  Social

Securityweek

6.8.19

Recovering Wi-Fi Password via Dragonblood Attack Costs $1 of Computing Power

Attack

Securityweek

6.8.19

QualPwn Bugs in Qualcomm chips could allow hacking Android Over the Air

Android

Securityaffairs

6.8.19

New Flaws in Qualcomm Chips Expose Millions of Android Devices to Hacking

Android

Thehackernews

6.8.19

Microsoft Lab Offers $300K For Working Azure Exploits

Exploit

Threatpost

6.8.19

Puzzling Gwmndy Botnet Focuses on Low-Volume Proxy Connections

BotNet

Threatpost

6.8.19

E3 Website Leaks Private Addresses for Thousands of Journalists

Incindent

Threatpost

6.8.19

Russia-linked STRONTIUM APT targets IoT devices to hack corporate networks

Incindent

Securityaffairs

6.8.19

StockX hacked, customers’ data offered for sale on the dark web

APT

Securityaffairs

6.8.19

Embracing the cloud and meeting its security demands

Security

Net-security

6.8.19

Prevent lateral attacks inside the data center with a defense-in-depth hardware layer

Security

Net-security

6.8.19

Online skimming: An emerging threat that requires urgent awareness and attention

Security

Net-security

6.8.19

Only 32% of government organizations consider a cloud-first strategy

Security

Net-security

5.8.19

GermanWiper, a data-wiping malware that is targeting Germany

Virus

Securityaffairs

5.8.19

ID Theft Stings, But it's Hard to Pin on Specific Data Hacks

Hacking

Securityweek

5.8.19

Industrial Giants Respond to 'Urgent/11' Vulnerabilities

Vulnerebility

Securityweek

5.8.19

JIRA Misconfiguration Leaks Data of Fortune 500 Companies

Security

Securityweek

5.8.19

Connected Cars Could be a Threat to National Security, Group Claims

Security

Securityweek

5.8.19

MegaCortex Ransomware Revamps for Mass Distribution

Ransomware

Threatpost

5.8.19

Google and ARM Tackle Android Bugs with Memory-Tagging

Android

Threatpost

5.8.19

Organizations Lack Confidence in Securing IoT, Survey Shows

IoT

Securityweek

5.8.19

Google, ARM Boost Android Security With Memory Tagging Extension

Android

Securityweek

5.8.19

DDoS attacks in Q2 2019

Attack

Securelist

5.8.19

Machete cyber-espionage group targets Latin America military

CyberSpy

Securityaffairs

5.8.19

'Machete' Cyberspies Target Military in Venezuela, Ecuador

CyberSpy

Securityweek

5.8.19

Hacking Radio Blasting Systems for Fun & Explosions

Hacking

Securityaffairs

5.8.19

Fraudster stole $870,000 from 2 US universities with spear-phishing mails

Phishing

Securityaffairs

5.8.19

VMware Patches Potentially Serious Pixel Shader Vulnerabilities

Vulnerebility

Securityweek

5.8.19

There is widespread business confusion and ignorance about the upcoming CCPA regulation

Security

Net-security

5.8.19

The US Gov is testing high-altitude balloons for surveillance

BigBrothers

Securityaffairs

5.8.19

Poshmark, the social commerce marketplace, discloses a data breach

Incindent

Securityaffairs

5.8.19

Houston County Schools in Alabama delayed the school year’s opening due to a malware attack

Virus

Securityaffairs

5.8.19

DealPly adware abuses reputation services to remain under the radar

Virus

Securityaffairs

5.8.19

Sextortion: Follow the Money - The Final Chapter

Security

SANS

5.8.19

Security orchestration and automation checklist: How to choose the right vendor

Security

Net-security

5.8.19

DNS security is no longer optional

Security

Net-security

5.8.19

FSI organizations are failing to assess their software for security vulnerabilities before release

Security

Net-security

5.8.19

The persistent struggle to improve SOC productivity reveals the need for newer SIEM technologies

Security

Net-security

5.8.19

As attackers get more creative, mobile threats and attacks increase in both quantity and impact

Security

Net-security

5.8.19

Public cloud data continues to grow, headed toward $500 billion by 2023

Security

Net-security

5.8.19

Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial

Security

Net-security

4.8.19

Ransom News

Ransom

Ransom

4.8.19

Misconfigured JIRA Servers Leak Info on Users and Projects

Incindent

Bleepingcomputer

4.8.19

Windows 10 WSL2 Now Allows You to Configure Global Options

OS

Bleepingcomputer

4.8.19

NVIDIA Patches High Severity Flaws in Windows GPU Display Driver

Vulnerebility

Bleepingcomputer

4.8.19

Windows 10 1903 Blocked for Kerberos Domain Connected Devices

OS

Bleepingcomputer

4.8.19

Ransom Note Replaces 2.1M Customer Records on Open MongoDB

Ransomware

Bleepingcomputer

4.8.19

Scammer Arrested After Defrauding US Universities of Over $870K

Spam

Bleepingcomputer

4.8.19

Phishing Attacks Target US Utilities with Remote Access Trojan

Phishing  Virus

Bleepingcomputer

4.8.19

Malware Attack Delays Alabama District's School Year Twice

Attack  Virus

Bleepingcomputer

4.8.19

1M+ Payment Card Details from South Korea Sold on the Dark Web

CyberCrime

Bleepingcomputer

4.8.19

Gerry - A Font of Gerrymandered Districts to Troll Congress

IT

Bleepingcomputer

4.8.19

DRAGONBLOOD flaws allow hacking WPA3 protected WiFi passwords

Vulnerebility

Securityaffairs

4.8.19

SystemBC, a new proxy malware is being distributed via Fallout and RIG EK

Exploit

Securityaffairs

3.8.19

DHCP Client Remote Code Execution Vulnerability Demystified

Vulnerebility blog

Mcafee blog

3.8.19

Clop Ransomware

Ransomware blog

Mcafee blog

3.8.19

The Twin Journey, Part 1

Hacking blog

Mcafee blog

3.8.19

Cobalt Group Returns To Kazakhstan

Cyber blog

Checkpoint

3.8.19

BEC Scams Remain a Billion-Dollar Enterprise, Targeting 6K Businesses Monthly

Spam blog

Symantec

3.8.19

The Revival and Rise of Email Extortion Scams

Spam blog

Symantec

3.8.19

Smart TVs: Yet another way for attackers to break into your home?

Attack blog

Eset

3.8.19

From Carnaval to Cinco de Mayo – The journey of Amavaldo

Exploit blog  Vulnerebility blog

Eset

3.8.19

Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords

Hacking

Thehackernews

3.8.19

90% of Enterprise iPhone Users Open to iMessage Spy Attack

Apple

Threatpost

3.8.19

Apple Suspends Siri Program After Privacy Backlash

Apple  Privacy

Threatpost

3.8.19

Nation-State APTs Target U.S. Utilities With Dangerous Malware

APT  BigBrothers

Threatpost

3.8.19

Critical Bug in Android Antivirus Exposes Address Books

Android

Threatpost

3.8.19

Nation-state actor uses new LookBack RAT to target US utilities

Virus

Securityaffairs

3.8.19

How to Reverse Engineer, Sniff & Bruteforce Vulnerable RF Adult Toys with WHID Elite

Vulnerebility

Securityaffairs

3.8.19

New Mirai Variant Hides C&C Server on Tor Network

BotNet

Securityweek

3.8.19

Nine Distinct Threat Groups Targeting Industrial Systems: Dragos

ICS

Securityweek

3.8.19

New "LookBack" Malware Used in Attacks Against U.S. Utilities Sector

Virus

Securityweek

2.8.19

Microsoft Boosts Compromised Account Detection in Azure AD by 100%

Security

Bleepingcomputer

2.8.19

StockX Password Reset Emails Are Legit, Not a Phishing Attack

Phishing

Bleepingcomputer

2.8.19

DealPly Adware Abuses Microsoft Smartscreen to Boost AV Evasion

Virus

Bleepingcomputer

2.8.19

New SystemBC Malware Uses Your PC to Hide Malicious Traffic

Virus

Bleepingcomputer

2.8.19

PowerShell Empire Framework Is No Longer Maintained

Security

Bleepingcomputer

2.8.19

New Hexane Group Targets Oil and Gas, Telco Providers

CyberCrime

Bleepingcomputer

2.8.19

Google Chrome Hides WWW and HTTPS:// in the Address Bar Again

Security

Bleepingcomputer

2.8.19

FTC Tells Equifax Victims to Opt for Credit Monitoring Over $125

CyberCrime

Bleepingcomputer

2.8.19

Combining Low Tech Scams: SMS + SET + Credit Card Harvesting

Spam

SANS

2.8.19

US utilities targeted with spear-phishing emails impersonating engineering licensing board

Phishing

Net-security

2.8.19

Over 1 Million payment cards from South Korea sold on the Dark Web

CyberCrime

Securityaffairs

2.8.19

Lotsy group targets Italian and Spanish-speaking users

CyberCrime

Securityaffairs

2.8.19

Facebook dismantled influence campaigns focused on Middle East and Northern Africa

Social

Securityaffairs

2.8.19

Recently discovered Hexane group targets the oil and gas industry

ICS

Securityaffairs

2.8.19

New Mirai botnet hides C2 server in the Tor network to prevent takedowns

BotNet

Securityaffairs

2.8.19

Unprotected Database Exposes Details of Honda's Internal Network

Incindent

Securityweek

2.8.19

Congress Wants Capital One, Amazon to Explain Data Breach

BigBrothers  Incindent

Securityweek

2.8.19

Faked Facebook Accounts Linked to Saudi Arabia, Mideast Region

Social

Securityweek

2.8.19

Scammers Grab $2.5 Million From North Carolina County in BEC Scam

Spam

Securityweek

2.8.19

Google Releases Beta of Anomaly Detection for G Suite Customers

Security

Securityweek

2.8.19

For $8.6M, Cisco Settles Suit Over Bug-Riddled Video Surveillance Software

Vulnerebility

Threatpost

2.8.19

Brand-New SystemBC Proxy Malware Spotted Using SOCKS5 for Stealth

Virus

Threatpost

2.8.19

Unpatched Flaws in IoT Smart Deadbolt Open Homes to Danger

IoT  Vulnerebility

Threatpost

2.8.19

Cylance Antivirus Products Susceptible to Concatenation Bypass

Alert

Alert

2.8.19

Five examples of user-centered bank fraud

CyberCrime

Net-security

2.8.19

Research shows that devices banned by US government lack basic security practices

BigBrothers

Net-security

2.8.19

Most interesting trends on cloud service and web usage

Security

Net-security

2.8.19

Many companies don’t know the depth of their IoT-related risk exposure

IoT

Net-security

1.8.19

What is Listening On Port 9527/TCP?

Security

SANS

1.8.19

MICROCHIPS Act aims at improving tech supply chain

Attack

Securityaffairs

1.8.19

FTC Warns Cash Option May be Small for Equifax Settlement

BigBrothers

Securityweek

1.8.19

Former NSA Contractor Edward Snowden Publishing Memoir

BigBrothers

Securityweek

1.8.19

'Hexane' Threat Actor Targeting Industrial Organizations

ICS

Securityweek

1.8.19

Alleged Capital One Hacker Barely Bothered to Hide

Hacking

Securityweek

1.8.19

Cisco ‘Knowingly’ Sold Hackable Video Surveillance System to U.S. Government

BigBrothers

Thehackernews

1.8.19

94% of attacks hitting financial services use one of four methods

Attack

Net-security

1.8.19

G Suite news: Anomalous alert activity for Google Drive, Advanced Protection for enterprise users

Safety

Net-security

1.8.19

Chrome to Add HTTP Cache Partitioning to Block Attacks, Tracking

Attack

Bleepingcomputer

1.8.19

Windows 10 Insider Build 18950 Released With Snip & Sketch Improvements

OS

Bleepingcomputer

1.8.19

Windows 10 Calculator Getting Always on Top Mode, Compact Version

OS

Bleepingcomputer

1.8.19

Unsecured Database Exposes Security Risks in Honda's Network

Incindent

Bleepingcomputer

1.8.19

Logins Stolen From Admin-Backdoored Club Penguin Rewritten Site

Virus

Bleepingcomputer

1.8.19

Enterprise Software May Transmit Data Without Your Knowledge

Security

Bleepingcomputer

1.8.19

Trivial Bugs in Western Digital SSD Utility Puts Owners at Risk

Vulnerebility

Bleepingcomputer

1.8.19

North Carolina County Lost $1.7 Million in BEC Scam

Spam

Bleepingcomputer

1.8.19

Outlook Is Down, Users Are Experiencing Sign-in Failures

Security

Bleepingcomputer

1.8.19

Chrome 76 Released With Blocked Flash, Incognito Detection Fix

Security

Bleepingcomputer

1.8.19

Russia Bans Connection to OneWeb Global Internet Satellites

BigBrothers

Bleepingcomputer

1.8.19

WSL2 Now Supports Localhost Connections From Windows 10 Apps

OS

Bleepingcomputer

1.8.19

US Govt, NGOs Ask Cyber Community to Boost Ransomware Defenses

BigBrothers  Ransomware

Bleepingcomputer

1.8.19

OXID eShop Used by Mercedes Fixes Remote Takeover Security Bug

Vulnerebility

Bleepingcomputer

1.8.19

APT trends report Q2 2019

Analysis  APT

Securelist

1.8.19

Researchers Replace IP Camera Feed With Fake Footage

Security

Securityweek

1.8.19

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US Gov

BigBrothers

Securityaffairs

1.8.19

CISA warns of critical flaws in Prima FlexAir access control system

Vulnerebility

Securityaffairs

1.8.19

Cyber attacks hit Louisiana schools ahead of year’s beginning

BigBrothers

Securityaffairs

1.8.19

DHS warns of cyber attacks against small airplanes

BigBrothers

Securityaffairs

1.8.19

DefCon CHINA

Conference

Conference

1.8.19

Trivial Bug Turns Home Security Cameras Into Listening Posts

Vulnerebility

Threatpost

1.8.19

Black Hat USA 2019 Preview

Congress

Threatpost

1.8.19

Chrome 76 Dumps Default Adobe Flash Player Support

Security

Threatpost

1.8.19

Malvertising Campaigns Skirt Ad Blockers, Serve Up Mac Malware

Apple  Virus

Threatpost

1.8.19

Honda’s Security ‘Soft Spots’ Exposed in Unsecured Database

Incindent

Threatpost

1.8.19

Passion, ingenuity and hard work: The cybersecurity startup story of Israel

Cyber

Net-security

1.8.19

Microsoft is right, mandatory password changes are obsolete

Crypto

Net-security

1.8.19

The probability that an EV SSL certificate is associated with a bad domain is 0.013%

Crypto

Net-security

1.8.19

Companies struggle with the slow, unpredictable nature of AI projects

Security

Net-security