List  Articles  Page  2019  2018  2017  2016  1  2  3  4  5  6  7  8

Date

Name

Categorie

Web

31.5.19

Researcher Exploits Microsoft’s Notepad to ‘Pop a Shell’

Exploit

Threatpost

31.5.19

Gen Z Interns and Social Media: A Perfect Security Storm

Security

Threatpost

31.5.19

Microsoft warns for the second time of applying BlueKeep patch

Vulnerebility

Securityaffairs

31.5.19

Security expert shows how to bypass macOS Gatekeeper

Apple

Securityaffairs

31.5.19

HiddenWasp, a sophisticated Linux malware borroes from Mirai and Azazel

Virus

Securityaffairs

31.5.19

The Pyramid Hotel Group data leak exposes 85GB of security logs of major hotel chains

Incindent

Securityaffairs

31.5.19

Nvidia Fixes High-Severity Flaws in GeForce Experience for Gamer

Vulnerebility

Threatpost

31.5.19

Retrieving Second Stage Payload with Ncat

Security

SANS

31.5.19

Amazon Digital Assistant Alexa Gets New Skill: Amnesia

Security

Securityweek

31.5.19

macOS Gatekeeper Bypass Exploits Trust on Network Shares

Apple

Securityweek

31.5.19

Sophisticated HiddenWasp Malware Targets Linux

Virus

Securityweek

31.5.19

High-Risk Flaws Found in Process Control Systems From B&R Automation

ICS

Securityweek

31.5.19

Malware Found on PoS Systems at Checkers and Rally's Restaurants

Virus

Securityweek

31.5.19

Industry is Not Prepared for the IIoT Attacks that Have Already Begun

IoT

Securityweek

31.5.19

Analysis Shows Poor GDPR Compliance in European Websites

Privacy

Securityweek

31.5.19

Apple Patches SQLite, WebKit Bugs in iTunes and iCloud for Windows

Apple

Securityweek

31.5.19

ProtonMail Accused of Voluntarily Helping Police Spy on Users

CyberSpy

Securityweek

31.5.19

Threat Intelligence Firm Recorded Future Acquired for $780 Million

IT

Securityweek

31.5.19

New Zealand Says Budget Leak Was Bungled, Not Hacked

Hacking

Securityweek

31.5.19

Siemens LOGO!, a PLC for small automation projects, open to attack

ICS

Net-security

31.5.19

Researchers fight ransomware attacks by leveraging properties of flash-based storage

Ransomware

Net-security

31.5.19

Checkers double drive-thru restaurants chain discloses card breach

Incindent

Securityaffairs

31.5.19

Convert Plus WordPress plugin flaw allows hackers to create Admin accounts

Vulnerebility

Securityaffairs

31.5.19

VPNpro research: this Chinese-linked company secretly owns 10 VPNs with 86 million installs

BigBrothers

Securityaffairs

31.5.19

Emissary Panda APT group hit Government Organizations in the Middle East

APT

Securityaffairs

31.5.19

AI, the Mandatory Element of 5G Mobile Security

Mobil

Threatpost

31.5.19

POS Malware Found at 102 Checkers Restaurant Locations

Virus

Threatpost

31.5.19

New Linux Malware ‘HiddenWasp’ Borrows from Mirai, Azazel

Virus

Threatpost

31.5.19

Analyzing First Stage Shellcode

Virus

SANS

31.5.19

What mechanisms can help address today’s biggest cybersecurity challenges?

Cyber

Net-security

31.5.19

Researchers spot manipulated photos and video using AI-driven imaging system

IT

Net-security

30.5.19

2.3B Files Exposed in a Year: A New Record for Misconfigs

Incindent

Threatpost

30.5.19

200k Personal Records Exposed by Events Planning Firm

Incindent

Threatpost

30.5.19

Palo Alto Networks Acquires Cloud Security Startups Twistlock and PureSec

IT

Securityweek

30.5.19

Cyberattack Hits New Zealand Budget

Cyber

Securityweek

30.5.19

Docker Vulnerability Gives Arbitrary File Access to Host

Vulnerebility

Securityweek

30.5.19

Chinese Cyber-Spies Target Government Organizations in Middle East

BigBrothers

Securityweek

30.5.19

Google Researcher Finds Code Execution Vulnerability in Notepad

Vulnerebility

Securityweek

30.5.19

AttackIQ Raises $17.6 Million in Series B Funding Round

IT

Securityweek

30.5.19

Iran-based Social Media Scheme Impersonated Press

BigBrothers

Securityweek

30.5.19

Huawei Asks US Court to Throw Out Federal Ban

BigBrothers

Securityweek

30.5.19

Attackers are exploiting WordPress plugin flaw to inject malicious scripts

Virus

Net-security

30.5.19

G Suite to get Gmail confidential mode, on by default

Security

Net-security

30.5.19

Nansh0u campaign already infected 50,000 MS-SQL and PHPMyAdmin Servers

Virus

Securityaffairs

30.5.19

Google white hat hacker found code execution flaw in Notepad

Vulnerebility

Securityaffairs

30.5.19

Using Public Wi-Fi? Your data can be hacked easily! Here’s How…

Security

Securityaffairs

30.5.19

All Docker versions affected by an unpatched race condition issue

Vulnerebility

Securityaffairs

30.5.19

TA505 is expanding its operations

CyberCrime

Securityaffairs

30.5.19

News aggregator Flipboard disclosed a data breach

Incindent

Securityaffairs

30.5.19

HawkEye Keylogger is involved in attacks against business users

Virus

Securityaffairs

30.5.19

50k Servers Infected with Cryptomining Malware in Nansh0u Campaign

Cryptocurrency

Threatpost

30.5.19

‘5G is Coming,’ But Can the Security Industry Keep Up?

Mobil

Threatpost

30.5.19

5G IoT: Literally a Matter of Life or Death

IoT

Threatpost

30.5.19

WordPress Plugin Has Unpatched Privilege Escalation Flaw, Warn Researchers

Vulnerebility

Threatpost

30.5.19

Top UK Official Derides Huawei Claiming it has ‘Bad Security’

BigBrothers

Threatpost

30.5.19

A veteran’s look at the cybersecurity industry and the problems that need solving

Cyber

Net-security

30.5.19

Majority of CISOs plan to ask for an increase in cybersecurity investment

Security

Net-security

30.5.19

Security overconfidence and immaturity continue to endanger organizations

Security

Net-security

30.5.19

Hackes Infect 50,000 MS-SQL and PHPMyAdmin Servers with Rootkit Malware

Virus

Thehackernews

30.5.19

Flipboard Database Hacked — Users' Account Information Exposed

Incindent

Thehackernews

30.5.19

New initiative aims to strengthen IoT security, interoperability and reliability

IoT

Net-security

30.5.19

Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Security

Net-security

30.5.19

Many are seeing the damage of cybercrime and identity theft firsthand

CyberCrime

Net-security

30.5.19

When it comes to email-based threats, Emotet dominates

BotNet

Net-security

29.5.19

Emotet Botnet Behind Most Email-Based Threats in Q1 2019

BotNet

Bleepingcomputer

29.5.19

Unpatched Flaw Affects All Docker Versions, Exploits Ready

Exploit

Bleepingcomputer

29.5.19

Flipboard Databases Hacked and User Information Exposed

Incindent

Bleepingcomputer

29.5.19

Google Says They Are Committed To Supporting YouTube on Edge

IT

Bleepingcomputer

29.5.19

Phishing Emails Pretend to be Office 365 'File Deletion' Alerts

Phishing

Bleepingcomputer

29.5.19

DuckDuckGo Android Browser Vulnerable to URL Spoofing Attacks

Android

Bleepingcomputer

29.5.19

Windows 10 May 2019 Update Blocked by Old Bluetooth Drivers

Vulnerebility

Bleepingcomputer

29.5.19

Ireland Gets About Double the Average Breach Reports Under GDPR

Privacy

Bleepingcomputer

29.5.19

Tech-Support Scammers Cheat Elder of $136,000, Risk Decades in Jail

Spam

Bleepingcomputer

29.5.19

Windows 10 Losing Connectivity From Outdated Wi-Fi Drivers

IT

Bleepingcomputer

29.5.19

U.S. Navy Creating a 350 Billion Record Social Media Archive

BigBrothers

Bleepingcomputer

29.5.19

Malspam Campaigns Use HawkEye Keylogger to Target Businesses

Spam

Bleepingcomputer

29.5.19

Windows Update KB4497936 for Insiders Breaks Windows Sandbox

Vulnerebility

Bleepingcomputer

29.5.19

All The Latest Features of the Windows 10 May 2019 Update

Vulnerebility

Bleepingcomputer

29.5.19

New Bitcoin Scam Leads to Ransomware and Info-Stealing Trojans

Cryptocurrency

Bleepingcomputer

29.5.19

Microsoft Says Windows 10 Your Phone App Can't Be Uninstalled

IT

Bleepingcomputer

29.5.19

BlueKeep RDP flaw: Nearly a million Internet-facing systems are vulnerable

Vulnerebility

Net-security

29.5.19

IoT cyberattacks are the new normal, the security mindset isn’t

IoT

Net-security

29.5.19

Equifax stripped of ‘stable’ outlook over 2017 breach

Incident blog

Eset

29.5.19

Fake cryptocurrency apps crop up on Google Play as bitcoin price rises

Cryptocurrency blog

Eset

29.5.19

Patch now! Why the BlueKeep vulnerability is a big deal

Ransomware blog

Eset

29.5.19

A journey to Zebrocy land

Cyber blog

Eset

29.5.19

Cybersecurity training and awareness: Helpful resources for educators

Cyber blog

Eset

29.5.19

What the ban on facial recognition tech will – and will not – do

Cyber blog

Eset

29.5.19

One year later: The VPNFilter catastrophe that wasn't

Malware blog

Cisco Talos

29.5.19

Sorpresa! JasperLoader targets Italy with a new bag of tricks

Malware blog

Cisco Talos

29.5.19

Talos releases coverage for 'wormable' Microsoft vulnerability

Vulnerebility blog

Cisco Talos

29.5.19

Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques

Hacking blog

Cisco Talos

29.5.19

Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak

Exploit blog

Symantec

29.5.19

Beapy: Cryptojacking Worm Hits Enterprises in China

Cryptocurrency blog

Symantec

29.5.19

Dispelling Myths Around SGX Malware

Malware blog

Symantec

29.5.19

Microsoft Patch Tuesday – May 2019

Vulnerebility blog

Symantec

29.5.19

Malware Against the C Monoculture

Malware blog

Checkpoint

29.5.19

Behavioural Malware Analysis with Microsoft ASA

Safety

SANS

29.5.19

DuckDuckGo Address Bar Spoofing

Hacking

Securityaffairs

29.5.19

Internet scans found nearly one million systems vulnerable to BlueKeep

Vulnerebility

Securityaffairs

29.5.19

Flipboard Resets User Passwords in Response to Data Breach

Incindent

Securityweek

29.5.19

FireEye Acquires Security Effectiveness Testing Firm Verodin for $250 Million

IT

Securityweek

29.5.19

Baltimore Says It Will Not Pay Ransom After Cyberattack

Ransomware

Securityweek

29.5.19

Business Users Targeted by HawkEye Keylogger Malware

Virus

Securityweek

29.5.19

New APT10 Activity Detected in Southeast Asia

APT

Securityweek

29.5.19

Research Shows Twitter Manipulation in Weeks Before EU Elections

BigBrothers

Securityweek

29.5.19

HP Adds New Malware Protection Solution to Latest Laptops

Virus

Securityweek

29.5.19

One Million Devices Open to Wormable Microsoft BlueKeep Flaw

Vulnerebility

Threatpost

29.5.19

200k Personal Records Exposed by Events Planning Firm

Incindent

Threatpost

29.5.19

Gatekeeper Bug in MacOS Mojave Allows Malware to Execute

Apple

Threatpost

29.5.19

Office Document & BASE64? PowerShell!

Virus

SANS

29.5.19

Structural integrity: Quantifying risk with security measurement

Security

Net-security

29.5.19

SD-WAN alone cannot address the networking challenges of digital business

Security

Net-security

29.5.19

Network automation market expected to grow to $16.9 billion by 2022

IT

Net-security

28.5.19

Shade Ransomware is very active outside of Russia and targets more English-speaking victims

Ransomware

Securityaffairs

28.5.19

Siemens Healthineers medical products vulnerable to Windows BlueKeep flaw

Vulnerebility

Securityaffairs

28.5.19

One Million Devices Vulnerable to BlueKeep as Hackers Scan for Targets

Vulnerebility

Securityweek

28.5.19

Sectigo Revokes Certificates Used to Sign Malware Following Recent Report

Virus

Securityweek

28.5.19

Siemens Medical Products Affected by Wormable Windows Flaw

Vulnerebility

Securityweek

28.5.19

Nearly 1 Million Computers Still Vulnerable to "Wormable" BlueKeep RDP Flaw

Vulnerebility

Thehackernews

28.5.19

GitHub introduces Dependabot-powered automated security fixes

Security

Net-security

28.5.19

APT10 is back with two new loaders and new versions of known payloads

APT

Securityaffairs

28.5.19

BlueKeep scans observed from exclusively Tor exit nodes

Hacking

Securityaffairs

28.5.19

Crooks leverages .htaccess injector on Joomla and WordPress sites for malicious redirects

Hacking

Securityaffairs

28.5.19

First American Financial exposed 16 years’ worth of personal and financial documents

Incindent

Securityaffairs

28.5.19

nmap Service Fingerprint

Security

SANS

28.5.19

Handle personal data: What we forget is as important as what we remember

Security

Net-security

28.5.19

How to diminish the great threat of legacy apps

Security

Net-security

28.5.19

Most global workers noticed stricter policies at work as a result of GDPR

Privacy

Net-security

28.5.19

Volume and quality of training data are the largest barriers to applying machine learning

Security

Net-security

28.5.19

How many adults trust companies with their personal data?

Privacy

Net-security

27.5.19

Chinese Spy Group Mixes Up Its Malware Arsenal with Brand-New Loaders

BigBrothers

Threatpost

27.5.19

ThreatList: Top 8 Threat Actors Targeting Canada in 2019

Cyber

Threatpost

27.5.19

Hacker breached Perceptics, a US maker of license plate readers

BigBrothers

Securityaffairs

27.5.19

Sectigo says that most of certificates reported by Chronicle analysis were already revoked

Security

Securityaffairs

27.5.19

Remarks on NATO and its approach to the cyber offensive

BigBrothers

Securityaffairs

27.5.19

Police seized Bestmixer, the mixing service washed at least $200 million in a year

CyberCrime

Securityaffairs

27.5.19

First American Financial Exposed Millions of Sensitive Documents

Incindent

Securityweek

27.5.19

Video: nmap Service Detection Customization

Security

SANS

26.5.19

A Closer Look at the New Windows 10 Light Theme

IT

Bleepingcomputer

26.5.19

Sectigo Responds to Chronicle's Report About Malware Signed by Their Certs

Virus

Bleepingcomputer

26.5.19

Windows 10 1903 Being Blocked If Using Older BattlEye Software

Security

Bleepingcomputer

26.5.19

New unpatched macOS Gatekeeper Bypass Published Online

Apple

Bleepingcomputer

26.5.19

Firefox 67 Switching to Empty Profiles Causing Data Loss Fears

Security

Bleepingcomputer

26.5.19

Windows 10 1903 Insiders Test Fix For USB Drives Blocking Upgrades

Vulnerebility

Bleepingcomputer

26.5.19

BlueKeep RCE Flaw Gets Micropatch for Always-On Servers

Vulnerebility

Bleepingcomputer

26.5.19

German Minister Wants Secure Messengers To Decrypt Chats

BigBrothers

Bleepingcomputer

26.5.19

Windows 10 May 2019 Update Not Installing on Some AMD Systems

Security

Bleepingcomputer

26.5.19

Microsoft Pulls Edge Dev Update After Browser Launch Issues

Security

Bleepingcomputer

26.5.19

Using the Windows Sandbox to Stay Safe Online

Safety

Bleepingcomputer

26.5.19

Android Users Being Spammed Using Fake Missed Call Alerts

Android

Bleepingcomputer

26.5.19

Upgraded JasperLoader Malware Adds Anti-Analysis Mechanisms

Virus

Bleepingcomputer

26.5.19

Two More Windows 10 Zero-Day PoC Exploits Released, Brings Total to 4

Exploit

Bleepingcomputer

26.5.19

Microsoft Releases Windows 10 Version 1903 Security Baseline

Vulnerebility

Bleepingcomputer

26.5.19

Carders Prefer Audio Skimmers over Less Efficient Flash Skimmers

CyberCrime

Bleepingcomputer

26.5.19

Microsoft Defender ATP is Now Publicly Available for Macs

Apple

Bleepingcomputer

26.5.19

Google Under GDPR Probe After Ad Exchange Privacy Complaint

Privacy

Bleepingcomputer

26.5.19

PoC Exploits Released for Two More Windows Vulnerabilities

Exploit

Bleepingcomputer

26.5.19

Google Tracks Purchases For Paying G Suite Users, Doesn’t Show It

Security

Bleepingcomputer

26.5.19

GetCrypt Ransomware Brute Forces Credentials, Decryptor Released

Ransomware

Bleepingcomputer

26.5.19

You're Not At Fault, Google Search Tripped and Broke Its Index

Security

Bleepingcomputer

26.5.19

BestMixer.io Service Shut Down For Laundering $200 Million+

Hacking

Bleepingcomputer

26.5.19

Volume of Signed Malware Increases, CAs Need Better Vetting

Virus

Bleepingcomputer

26.5.19

Researchers Demo PoC For Remote Desktop BlueKeep RCE Exploit

Exploit

Bleepingcomputer

26.5.19

Zebrocy Operators Also Look for Browser and Email Databases

Hacking

Bleepingcomputer

26.5.19

Hackers target MySQL databases to deliver the GandCrab ransomware

Ransomware

Securityaffairs

26.5.19

Do You Remember the SUBST Command?

Hacking

SANS

25.5.19

0patch issued a micropatch to address the BlueKeep flaw in always-on servers

Vulnerebility

Securityaffairs

25.5.19

GitHub introduces new tools and security features to secure code

Security

Securityaffairs

25.5.19

Snapchat staff used internal tools to spy on users

Social

Securityaffairs

25.5.19

How Hackers Access Direct Deposit Paycheck — And What to Do About It

Hacking

Securityaffairs

25.5.19

US DoJ’s superseding indictment charges Assange with violating Espionage Act

BigBrothers

Securityaffairs

25.5.19

Georgia Supreme Court Rules that State Has No Obligation to Protect Personal Information

Privacy

Securityweek

25.5.19

GitHub Adds New Tools to Help Developers Secure Code

Security

Securityweek

25.5.19

Microsoft Defender ATP for Mac Now in Public Preview

Safety

Securityweek

25.5.19

One Year on, EU's GDPR Sets Global Standard for Data Protection

Privacy

Securityweek

25.5.19

New York Department of Financial Services Launches Cybersecurity Unit

BigBrothers

Securityweek

25.5.19

Microsoft Brings Hardware-Based Isolation to Chrome, Firefox

Safety

Securityweek

25.5.19

IT threat evolution Q1 2019. Statistics

Analysis

Securelist

25.5.19

IT threat evolution Q1 2019

Analysis

Securelist

25.5.19

News Wrap: Which Companies Are Doing Privacy Right and Which Aren’t?

Privacy

Threatpost

25.5.19

Microsoft Beefs Up Wi-Fi Protection

Safety

Threatpost

25.5.19

Goodbye Passwords: Hello Identity Management

Security

Threatpost

25.5.19

Joomla and WordPress Found Harboring Malicious Redirect Code

Virus

Threatpost

25.5.19

Snapchat Privacy Blunder Piques Concerns About Insider Threats

Social

Threatpost

25.5.19

Shade Ransomware Expands to U.S. Targets

Ransomware

Threatpost

25.5.19

Calibration Attack Drills Down on iPhone, Pixel Users

Apple

Threatpost

25.5.19

SandboxEscaper Drops Three More Windows Exploits, IE Zero-Day

Exploit

Threatpost

25.5.19

Soaring Cryptocurrency Prices Draw Malicious New Onslaught of Apps, Malware

Cryptocurrency

Threatpost

25.5.19

WannaCry-Infested Laptop Starts at $1.13M in Art Auction

Ransomware

Threatpost

24.5.19

Assange Charged With 17 New Counts Under Espionage Act

BigBrothers

Securityweek

24.5.19

Facebook Figures Five Percent of Accounts Are Fake

Social

Securityweek

24.5.19

US Officials Say Foreign Election Hacking Is Inevitable

BigBrothers

Securityweek

24.5.19

Researcher Drops 3 Separate 0-Day Windows Exploits in 24 Hours

Exploit

Securityweek

24.5.19

Instagram Says Not Source of Contact Info for Influential Users

Social

Securityweek

24.5.19

Siemens Teams With Chronicle on Cybersecurity Solutions for Energy Industry

ICS

Securityweek

24.5.19

NATO Warns Russia of 'Full Range' of Responses to Cyberattack

BigBrothers

Securityweek

24.5.19

Comodo Issued Most Certificates for Signed Malware on VirusTotal

Virus

Securityweek

24.5.19

Authorities Take Down Cryptocurrency Mixing Service Bestmixer.io

Cryptocurrency

Securityweek

24.5.19

PoC Exploits Created for Wormable Windows RDS Flaw

Exploit

Securityweek

24.5.19

Moody's Downgrades Equifax Outlook to Negative Over 2017 Data Breach

Incindent

Securityweek

24.5.19

UK Has Warned 16 NATO Allies of Russia Hacking Attempts: Foreign Minister

BigBrothers

Securityweek

24.5.19

Amazon Shareholders Support Selling Face Recognition Tech to Police

Security

Securityweek

24.5.19

Attackers Could Use Mobile Device Sensors to Generate Unique Device Fingerprint: Research

Mobil

Securityweek

24.5.19

Critical Vulnerabilities Plague South Korean ActiveX Controls

Attack

Securityweek

24.5.19

LinkedIn Allowed TLS Certificate to Expire—Again

Social

Securityweek

24.5.19

Magecart Skimmer Poses as Payment Service Provider

CyberCrime

Securityweek

24.5.19

One Year On, EU Has 145,000 Data Law Complaints

BigBrothers

Securityweek

24.5.19

No Root Password for 20% of Popular Docker Containers

Crypto

Securityweek

24.5.19

Flaw Exposes Mitsubishi PLCs to Remote DoS Attacks

Attack  ICS

Securityweek

24.5.19

Hunters.AI Emerges From Stealth With $5.4M in Seed Funding

IT

Securityweek

24.5.19

EU Adopts Powers to Respond to Cyberattacks

BigBrothers

Securityweek

24.5.19

Researcher Drops Windows 10 Zero-Day Exploit

Exploit

Securityweek

24.5.19

Chronicle’s study reveals CAs that issued most certificates to sign malware samples on VirusTotal

Virus

Securityaffairs

24.5.19

Facebook says it took down 2.19 billion accounts in Q1 2019

Social

Securityaffairs

24.5.19

PoC Exploits for CVE-2019-0708 wormable Windows flaw released online

Vulnerebility

Securityaffairs

24.5.19

UK provided evidence to 16 NATO allies of Russia hacking campaigns

BigBrothers

Securityaffairs

24.5.19

Tor Browser for Android is available through the Play Store

Android

Securityaffairs

24.5.19

Anonymous and LulzSec target the Italian Police and doctors

Hacking

Securityaffairs

24.5.19

Playing Cat and Mouse: Three Techniques Abused to Avoid Detection

Hacking

Securityaffairs

24.5.19

SandboxEscaper disclosed 3 Microsoft zero-day flaws in 24 hours

Vulnerebility

Securityaffairs

24.5.19

Emsisoft released a free Decrypter for the GetCrypt ransomware

Ransomware

Securityaffairs

24.5.19

ActiveX Controls in South Korean websites are affected by critical flaws

Vulnerebility

Securityaffairs

24.5.19

G Suite users’ passwords stored in plain-text for more than 14 years

Crypto

Securityaffairs

24.5.19

SandboxEscaper is back with a new Windows Zero-Day in Task Scheduler

Vulnerebility

Securityaffairs

24.5.19

U.S. Charges WikiLeaks' Julian Assange With Violating Espionage Act

BigBrothers

Thehackernews

24.5.19

Update: Hacker Disclosed 4 New Microsoft Zero-Day Exploits in Last 24 Hours

Exploit

Thehackernews

24.5.19

Investigating an Odd DNS Query

Security

SANS

24.5.19

US charges Assange with 17 counts under Espionage Act

BigBrothers

Net-security

24.5.19

How mainstream media coverage affects vulnerability management

Safety

Net-security

24.5.19

Solving the network visibility problem with NaaS

Security

Net-security

24.5.19

Enterprises: Analyze your IoT footprint to address security, privacy concerns

IoT

Net-security

24.5.19

A closer look at mobile permissions one year into GDPR

Privacy

Net-security

24.5.19

Most security pros have considered quitting due to a lack of resources

Security

Net-security

24.5.19

High-risk behaviors expose most travelers to cyber risks

Cyber

Net-security

24.5.19

If you haven’t yet patched the BlueKeep RDP vulnerability, do so now

Vulnerebility

Net-security

24.5.19

How to write an effective data breach notification?

Incindent

Net-security

24.5.19

Data privacy: A hot-button issue for Americans one year after GDPR

Privacy

Net-security

24.5.19

Cybercriminals continue to evolve the sophistication of their attack methods

Attack

Net-security

24.5.19

Companies increasingly investing in container adoption, security remains an issue

Security

Net-security

24.5.19

Number of connected devices reached 22 billion, where is the revenue?

Incindent

Net-security

24.5.19

How small businesses can keep their data secure

Security

Net-security

22.5.19

Official Tor Browser for Android available on Google Play

Android

Net-security

22.5.19

Google has been storing unhashed G Suite customer passwords

Security

Net-security

22.5.19

Google Warns G Suite Customers of Passwords Stored Unhashed Since 2005

Security

Securityweek

22.5.19

Firefox Now Has Fingerprinting and Crypto-mining Protection

Cryptocurrency

Securityweek

22.5.19

Attack Combines Phishing, Steganography, PowerShell to Deliver Malware

Phishing

Securityweek

22.5.19

Guardicore Raises $60 Million in Series C Funding

IT

Securityweek

22.5.19

Satan Ransomware Expands Portfolio of Exploits

Ransomware

Securityweek

22.5.19

Poor Security Hygiene Found Across Almost All Political Parties in US, Europe

Security

Securityweek

22.5.19

Microsoft Adds Live Response Capabilities to Defender ATP

Safety

Securityweek

22.5.19

Identity Management Firm Auth0 Raises $103 Million

IT

Securityweek

22.5.19

US Warns Chinese Drones May Steal Data: Report

BigBrothers

Securityweek

22.5.19

Awareness Training Firm KnowBe4 Acquires Awareness Measurement Firm CLTRe

Security

Securityweek

22.5.19

New Zero-Day Exploit for Bug in Windows 10 Task Scheduler

Exploit

Bleepingcomputer

22.5.19

Google Stored Unhashed G Suite Passwords for Over a Decade

Security

Bleepingcomputer

22.5.19

Tor Browser 8.5 for Android Released On The Google Play Store

Android

Bleepingcomputer

22.5.19

JSWorm 2.0 Ransomware Decryptor Gets Your Files Back For Free

Ransomware

Bleepingcomputer

22.5.19

Hackers Steal Payment Card Data Using Rogue Iframe Phishing

Phishing

Bleepingcomputer

22.5.19

New Cumulative Updates for Windows 10 1809 and 1803 Released

Vulnerebility

Bleepingcomputer

22.5.19

Cracked Phishing Kit 16Shop Lets One Thief Steal From Another

Phishing

Bleepingcomputer

22.5.19

Microsoft Releases Windows 10 Version 1903 - May 2019 Update

Security

Bleepingcomputer

22.5.19

Forbes Global 2000 Firm Leaked Plain Text Passwords and Data

Incindent

Bleepingcomputer

22.5.19

Contractor Faces Jail for Using Govt Servers for CryptoMining

Cryptocurrency

Bleepingcomputer

22.5.19

Firefox 67 Released With Cryptominer Blocking, Performance Boost

Safety

Bleepingcomputer

22.5.19

194 of The Top 1000 Docker Containers Don’t Have Root Passwords

Incindent

Bleepingcomputer

22.5.19

Decrypter for JSWorm 2.0

Anti-Ransom Tool

Anti-Ransom Tool

22.5.19

The Satan Ransomware adds new exploits to its arsenal

Ransomware

Securityaffairs

22.5.19

Emsisoft released a free Decrypter for JSWorm 2.0

Ransomware

Securityaffairs

22.5.19

Group-IB blocked more than 180,000 links to pirated copies of Game of Thrones

CyberCrime

Securityaffairs

22.5.19

After latest Microsoft Windows updates some PCs running Sophos AV not boot

Vulnerebility

Securityaffairs

22.5.19

Millions of Golfers Land in Privacy Hazard After Cloud Misconfig

Privacy

Threatpost

22.5.19

Cisco Starts Patching Firmware Bug; Millions of Devices Still Vulnerable

Vulnerebility

Threatpost

22.5.19

HCL Exposes Customer, Personnel Info in Wide-Ranging Data Leak

Incindent

Threatpost

22.5.19

Mozilla Tackles Two Critical Flaws with Firefox 67 Release

Vulnerebility

Threatpost

22.5.19

Intel Fixes Critical, High-Severity Flaws Across Several Products

Vulnerebility

Threatpost

22.5.19

Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter

Safety

Threatpost

22.5.19

DDoS attacks in Q1 2019

Attack

Securelist

22.5.19

PoC Exploit For Unpatched Windows 10 Zero-Day Flaw Published Online

Exploit

Thehackernews

22.5.19

Core Elastic Stack Security Features Now Available For Free Users As Well

Security

Thehackernews

22.5.19

Getting ready for digital transformation: The biggest cybersecurity challenges

Cyber

Net-security

22.5.19

The security challenges of managing complex cloud environments

Security

Net-security

22.5.19

Organizations face operational deficiencies as they deal with hybrid IT complexities

Security

Net-security

22.5.19

Is your perimeter inventory leaving you exposed? Why it’s time to switch from IP to DNS

Exploit

Net-security

22.5.19

Global secure email gateway market growth driven by data loss prevention capabilities

Spam

Net-security

21.5.19

Core Elastic Stack security features now available to all users

Vulnerebility

Net-security

21.5.19

Microsoft updates break AV software, again!

Vulnerebility

Net-security

21.5.19

LeakedSource Operator Pleads Guilty in Canada

Incindent

Securityweek

21.5.19

US Delays Huawei Ban for 90 Days

BigBrothers

Securityweek

21.5.19

DHS Highlights Common Security Oversights by Office 365 Customers

BigBrothers

Securityweek

21.5.19

Siemplify Raises $30 Million in Series C Funding

IT

Securityweek

21.5.19

Linux Kernel Privilege Escalation Vulnerability Found in RDS Over TCP

Vulnerebility

Securityweek

21.5.19

Faulty Database Script Exposed Salesforce Data to Wrong Users

Exploit

Securityweek

21.5.19

Windows 10 Could Break If Capability SIDs Are Removed From Permissions

IT

Bleepingcomputer

21.5.19

BlueKeep Remote Desktop Exploits Are Coming, Patch Now!

Exploit

Bleepingcomputer

21.5.19

Firefox Lockwise Aims to Revamp Browser Password Management

Safety

Bleepingcomputer

21.5.19

Microsoft Defender ATP Adds Live Response for SecOps

Safety

Bleepingcomputer

21.5.19

MuddyWater Hacking Group Upgrades Arsenal to Avoid Detection

APT

Bleepingcomputer

21.5.19

Microsoft Officially Releases Microsoft Edge for Mac

IT

Bleepingcomputer

21.5.19

Microsoft Rolls Out Syncing Over Mobile Data for Your Phone

IT

Bleepingcomputer

21.5.19

Ubuntu 19.04 Now Available in the Hyper-V Quick Create Gallery

IT

Bleepingcomputer

21.5.19

MuddyWater BlackWater campaign used new anti-detection techniques

APT

Securityaffairs

21.5.19

US Commerce Department delays Huawei ban for 90 Days

BigBrothers

Securityaffairs

21.5.19

Data belonging to Instagram influencers and celebrities exposed online

Social

Securityaffairs

21.5.19

Linux kernel privilege escalation flaw CVE-2019-11815 affects RDS

Vulnerebility

Securityaffairs

21.5.19

Defiant Tech firm who operated LeakedSource pleads guilty

Security

Securityaffairs

21.5.19

ZombieLoad: How Intel’s Latest Side Channel Bug Was Discovered and Disclosed

Vulnerebility

Threatpost

21.5.19

Slack Bug Allows Remote File Hijacking, Malware Injection

Virus

Threatpost

21.5.19

Windows 10 Update Bricks PCs, Microsoft Offers Workarounds

Vulnerebility

Threatpost

21.5.19

Salesforce Woes Linger as Admins Clean Up After Service Outage

Security

Threatpost

21.5.19

Behind the Naming of ZombieLoad and Other Intel Spectre-Like Flaws

Vulnerebility

Threatpost

21.5.19

Using Shodan Monitoring

Security

SANS

21.5.19

Five ways automating IAM saves you money

Security

Net-security

21.5.19

How effective are login challenges at preventing Google account takeovers?

Security

Net-security

21.5.19

Traditional approach to data security hindering digital transformation initiatives

Security

Net-security

21.5.19

SD-WAN adoption growing as enterprises embrace app-centric architecture transition

Security

Net-security

21.5.19

Engineering teams are struggling because they’re missing the right automation

Security

Net-security

21.5.19

ThreatQ adds support for mobile and PRE-ATT&CK in response to rapid customer adoption

Security

Net-security

20.5.19

Huawei Vows to Deliver Android Security Updates After Google Cut-Off

Android

Securityweek

20.5.19

TeamViewer Confirms It Was Hacked in 2016

Hacking

Securityweek

20.5.19

User Data Exposed in Stack Overflow Hack

Incindent

Securityweek

20.5.19

Hacktivist Attacks Declined 95 Percent Since 2015: IBM

Hacking

Securityweek

20.5.19

Slack Flaw Allows Hackers to Steal, Manipulate Downloads

Hacking

Securityweek

20.5.19

Tenable Updates Free Vulnerability Assessment Solution

Safety

Securityweek

20.5.19

Wormable Windows RDS Vulnerability Poses Serious Risk to ICS

Virus

Securityweek

20.5.19

Stack Overflow Discloses Security Breach

Incindent

Securityweek

20.5.19

Authorities Takedown GozNym Cybercrime Group That Stole an Estimated $100 Million

CyberCrime

Securityweek

20.5.19

Cisco Patches Critical Vulnerabilities in Prime Infrastructure (PI) Software

Vulnerebility

Securityweek

20.5.19

Group Seeks Investigation of Deep Packet Inspection Use by ISPs

Security

Securityweek

20.5.19

Facebook Partially Restores Privacy Feature Abused in Massive Breach

Social

Securityweek

20.5.19

Dutch Probe China's Huawei for Possible Spying: Report

BigBrothers

Securityweek

20.5.19

Google Starts Tracking Zero-Days Exploited in the Wild

Exploit

Securityweek

20.5.19

Red Cross Website Hacked in Latest Singapore Cyber Attack

Attack

Securityweek

20.5.19

Microsoft Releases Attack Surface Analyzer 2.0

Safety

Securityweek

20.5.19

Chronicle experts spotted a Linux variant of the Winnti backdoor

Virus

Securityaffairs

20.5.19

Google will block Huawei from using Android and its services

BigBrothers

Securityaffairs

20.5.19

Amnesty International filed a lawsuit against Israeli surveillance firm NSO

BigBrothers

Securityaffairs

20.5.19

US Tech Giants Google, Intel, Qualcomm, Broadcom Break Up With Huawei

BigBrothers

Thehackernews

20.5.19

Microsoft Releases Windows Updates to Fix GOV.UK Connection Issues

Vulnerebility

Bleepingcomputer

20.5.19

Microsoft Edge to Make it Easier to Clear Your Browsing Data

Privacy

Bleepingcomputer

20.5.19

Google Wants Your Phone to Protect Against Account Takeover Attacks

Attack

Bleepingcomputer

20.5.19

Google is using Your Gmail Account to Track Your Purchases

Privacy

Bleepingcomputer

20.5.19

Unpatched Ethereum Clients expose the ecosystem to 51% Attack risk

Vulnerebility

Securityaffairs

20.5.19

Salesforce faced one of its biggest service disruption of ever

Security

Securityaffairs

20.5.19

Dutch intelligence investigate alleged Huawei ‘backdoor’

BigBrothers

Securityaffairs

20.5.19

CVE-2019-0604 Attack

Attack

SANS

20.5.19

On the path to Zero Trust security: Time to get started

Security

Net-security

20.5.19

Microsoft’s Attack Surface Analyzer now works on Macs and Linux, too

Safety

Net-security

20.5.19

Ransomware and malware attacks decline, attackers adopting covert tactics

Ransomware

Net-security

20.5.19

Over half of all reported vulnerabilities in Q1 2019 have a remote attack vector

Vulnerebility

Net-security

20.5.19

Phishing targeting SaaS and webmail services increased to 36% of all phishing attacks

Phishing

Net-security

20.5.19

Companies investing in advanced forensic capabilities to identify attackers in greater detail

Forensics

Net-security

19.5.19

The NSO WhatsApp Vulnerability – This is How It Happened

Vulnerebility blog

Checkpoint

19.5.19

Vulnerability Spotlight: Multiple vulnerabilities in Wacom Update Helper

Vulnerebility blog

Cisco Talos

19.5.19

Vulnerability Spotlight: Remote code execution bug in Antenna House Rainbow PDF Office document converter

Vulnerebility blog

Cisco Talos

19.5.19

Vulnerability Spotlight: Remote code execution vulnerabilities in Adobe Acrobat Reader

Vulnerebility blog

Cisco Talos

19.5.19

Microsoft Patch Tuesday — May 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

19.5.19

Vulnerability Spotlight: Multiple vulnerabilities in the Roav A1 Dashcam

Vulnerebility blog

Cisco Talos

19.5.19

EternalBlue reaching new heights since WannaCryptor outbreak

Ransomware blog

Eset

19.5.19

Survey: What should companies do to restore trust post-breach?

Cyber blog

Eset

19.5.19

Ice Hockey World Championship: The risks of free live streaming

Cyber blog

Eset

19.5.19

Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage

Malware blog

Eset

19.5.19

Verizon’s data breach report: What the numbers say

Incident blog

Eset

19.5.19

Ransom News

Ransom

Ransom

19.5.19

Number of hacktivist attacks declined by 95 percent since 2015

Hacking

Securityaffairs

19.5.19

Dozens of Linksys router models leak data useful for hackers

Incindent

Securityaffairs

19.5.19

Unistellar attackers already wiped over 12,000 MongoDB databases

Incindent

Securityaffairs

19.5.19

Facebook banned Archimedes Group, misinformation made in Israel

Social

Securityaffairs

18.5.19

Windows May Hang for Sophos Users After Installing May Updates

Vulnerebility

Bleepingcomputer

18.5.19

Windows 10 Won't Boot When Using System Restore After Updating

Vulnerebility

Bleepingcomputer

18.5.19

TeamViewer Confirms Undisclosed Breach From 2016

Incindent

Bleepingcomputer

18.5.19

Some GOV.UK Sites Unreachable Due to HSTS Changes in Windows Updates

Vulnerebility

Bleepingcomputer

18.5.19

Cisco Upgrades Remote Code Execution Flaws to Critical Severity

Vulnerebility

Bleepingcomputer

18.5.19

Over 12,000 MongoDB Databases Deleted by Unistellar Attackers

Incindent

Bleepingcomputer

18.5.19

Paterson Public Schools Notified of Breach, Threatens with Civil Case

Incindent

Bleepingcomputer

18.5.19

Chinese state-sponsored hackers breached TeamViewer in 2016

BigBrothers

Securityaffairs

18.5.19

A flaw in Slack could allow hackers to steal, manipulate downloaded files

Vulnerebility

Securityaffairs

18.5.19

Cisco addressed a critical flaw in networks management tool Prime Infrastructure

Vulnerebility

Securityaffairs

18.5.19

Stack Overflow Q&A platform announced a data breach

Incindent

Securityaffairs

18.5.19

XSS flaw in WordPress Live Chat Plugin lets attackers compromise WP sites

Vulnerebility

Securityaffairs

18.5.19

Hackers Accessed Stack Overflow's Production Systems

Hacking

Bleepingcomputer

18.5.19

Chrome Bug Causing Address Bar to Show Searches Over Site History

Vulnerebility

Bleepingcomputer

18.5.19

Unsecured Survey Database Exposes Info of 8 Million People

Incindent

Bleepingcomputer

18.5.19

Facebook Bans Israeli Entity For Creating Fake Accounts

Social

Bleepingcomputer

18.5.19

Bug in WordPress Live Chat Plugin Lets Hackers Inject Scripts

Vulnerebility

Bleepingcomputer

18.5.19

Windows 10 KB4494441 Update May Be Shown As Installed Twice

Vulnerebility

Bleepingcomputer

18.5.19

How Decoding Network Traffic Can Save Your Data Bacon

Privacy

Threatpost

18.5.19

Ransomware ‘Remediation’ Firm Exposed: Researchers Weigh in on Paying

Ransomware

Threatpost

18.5.19

WordPress WP Live Chat Support Plugin Fixes XSS Flaw

Vulnerebility

Threatpost

18.5.19

Report Reveals TeamViewer Was Breached By Chinese Hackers In 2016

BigBrothers

Thehackernews

18.5.19

Hackers Breach Stack Overflow Q&A Site, Some Users' Data Exposed

Incindent

Thehackernews

17.5.19

Past, present, and future of the Dark Web

Cyber

Securityaffairs

17.5.19

Google ‘0Day In the Wild’ project tracks zero-days exploited in the Wild

Exploit

Securityaffairs

17.5.19

A joint operation by international police dismantled GozNym gang

Virus

Securityaffairs

17.5.19

Cisco Service Provider, WebEx Bugs Offer Up Remote Code Execution

Vulnerebility

Threatpost

17.5.19

Mobile Risks Boom in a Post-Perimeter World

Mobil

Threatpost

17.5.19

Forbes Becomes Latest Victim of Magecart Payment Card Skimmer

Hacking

Threatpost

17.5.19

How can we give cybersecurity analysts a helping hand?

Cyber

Net-security

17.5.19

Memory analysis is the ground truth

Analysis

Net-security

17.5.19

The largest breaches over the past three years have caused massive and irreparable damage

Incindent

Net-security

17.5.19

Half of companies missed GDPR deadline, 70% admit systems won’t scale

Privacy

Net-security

17.5.19

Analysis of device data shines a light on cybersecurity risks in healthcare

Cyber

Net-security

17.5.19

Data will be processed by edge computing in 59% of IoT deployments by 2025

IoT

Net-security

16.5.19

GozNym Cybercrime Group Behind $100 Million Damages Dismantled

CyberCrime

Bleepingcomputer

16.5.19

Microsoft Tech Support Scams Invade Azure Cloud Services

Spam

Bleepingcomputer

16.5.19

Over 757K Fraudulently Obtained IPv4 Addresses Revoked by ARIN

Security

Bleepingcomputer

16.5.19

Windows 10 Insider Build 18898 Now Shows Drive Types in Task Manager

Vulnerebility

Bleepingcomputer

16.5.19

Azure Active Directory Now Supports 256 Character Passwords

Crypto

Bleepingcomputer

16.5.19

Google Discloses Bluetooth Flaw in Titan Security Key, Issues Recall

Vulnerebility

Bleepingcomputer

16.5.19

Attackers Evade Detection By Randomizing TLS Handshake Ciphers

Hacking

Bleepingcomputer

16.5.19

Google Payment Privacy Settings Hidden Behind Special URL

Hacking

Bleepingcomputer

16.5.19

Hackers Inject Magecart Card Skimmer in Forbes’ Subscription Site

Hacking

Bleepingcomputer

16.5.19

Windows 10 Spectre 2 Mitigation Now Uses Retpoline By Default

Vulnerebility

Bleepingcomputer

16.5.19

List of MDS Speculative Execution Vulnerability Advisories & Updates

Vulnerebility

Bleepingcomputer

16.5.19

Microsoft Releases Windows 7 & 8.1 Cumulative Updates KB4499164 & KB4499151

Vulnerebility

Bleepingcomputer

16.5.19

Microsoft's May 2019 Patch Tuesday Fixes 79 Vulnerabilities

Vulnerebility

Bleepingcomputer

16.5.19

Windows 10 May 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

16.5.19

Cybercrime Gang Behind GozNym Banking Malware Dismantled

Virus

Threatpost

16.5.19

Microsoft renewed its Attack Surface Analyzer, version 2.0 is online

Security

Securityaffairs

16.5.19

A flaw in Google Titan Security Keys expose users to Bluetooth Attacks

Vulnerebility

Securityaffairs

16.5.19

The stealthy email stealer in the TA505 hacker group’s arsenal

Hacking

Securityaffairs

16.5.19

Magecart hackers inject card Skimmer in Forbes Subscription Site

Hacking

Securityaffairs

16.5.19

'GozNym' Banking Malware Gang Dismantled by International Law Enforcement

Virus

Thehackernews

16.5.19

Bluetooth Flaw Found in Google Titan Security Keys; Get Free Replacement

Vulnerebility

Thehackernews

16.5.19

The Risk of Authenticated Vulnerability Scans

Vulnerebility

SANS

16.5.19

Intel MDS attack mitigation: An overview

Attack

Net-security

16.5.19

Google offers free replacement for buggy Titan Security Keys

Vulnerebility

Net-security

16.5.19

Intel MDS Vulnerabilities: What You Need to Know

Vulnerebility

Securityweek

16.5.19

Google's Titan Security Keys Vulnerable to Bluetooth Attacks

Vulnerebility

Securityweek

16.5.19

Trump Bars U.S. Companies From Foreign Telecoms Posing Security Risk

BigBrothers

Securityweek

16.5.19

Researchers Link Disparate Chinese Hacking Groups

CyberCrime

Securityweek

16.5.19

Hackers Exploit ASUS Update Process to Install Backdoor

Virus

Securityweek

16.5.19

UK Supreme Court Overturns Ultimate Authority of Investigatory Powers Tribunal

BigBrothers

Securityweek

16.5.19

Security Automation Firm Respond Raises $20 Million

IT

Securityweek

16.5.19

Picreel and Alpaca Forms Compromised by Magecart Attacks

Attack

Securityweek

16.5.19

SAP Patches Multiple Missing Authorization Checks

Vulnerebility

Securityweek

16.5.19

Israel Spyware Firm NSO Operates in Shadowy Cyber World

BigBrothers

Securityweek

16.5.19

Huawei Chairman Says Ready to Sign 'No-Spy' Deal With UK

BigBrothers

Securityweek

16.5.19

BlackTech espionage group exploited ASUS update process to deliver Plead Backdoor

CyberSpy

Securityaffairs

16.5.19

SAP Security Patch Day for May 2019 fixes many missing authorization checks

Vulnerebility

Securityaffairs

16.5.19

Twitter inadvertently collected and shared iOS location data

Apple

Securityaffairs

16.5.19

Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks

Vulnerebility

Securityaffairs

16.5.19

Intel ZombieLoad Side-Channel Attack: 10 Takeaways

Attack

Threatpost

16.5.19

Billions of Malicious Bot Attacks Take to Cipher-Stunting to Hide

BotNet

Threatpost

16.5.19

Google Titan Security Key Recalled After Bluetooth Pairing Bug

Vulnerebility

Threatpost

16.5.19

Spam and phishing in Q1 2019

Spam

Securelist

16.5.19

Identity theft victims could lead us to accept more security-improving friction

Security

Net-security

16.5.19

CISOs: What would you do over?

Security

Net-security

16.5.19

When all else fails, organizations realize they must share threat intel

Security

Net-security

16.5.19

CEOs and business leaders trust AI, but employees are more cautious

IT

Net-security

16.5.19

The six biggest cybersecurity risks facing the utilities industry

Cyber

Net-security

15.5.19

Microsoft Patches RDS Vulnerability Allowing WannaCry-Like Attacks

Vulnerebility

Securityweek

15.5.19

San Francisco Bans Facial Recognition Use by Police

Privacy

Securityweek

15.5.19

New Class of Vulnerabilities Leak Data From Intel Chips

Vulnerebility

Securityweek

15.5.19

Boost Mobile Detected Unauthorized Activity on Customer Accounts

Mobil

Securityweek

15.5.19

Twitter Collected and Shared iOS Location Data

Apple

Securityweek

15.5.19

Adobe Patches Over 80 Vulnerabilities in Acrobat Products

Vulnerebility

Securityweek

15.5.19

Facebook Launches Global CTF Competition

Social

Securityweek

15.5.19

Apple Patches 21 Vulnerabilities in WebKit

Vulnerebility

Securityweek

15.5.19

Remote Code Execution Vulnerability Impacts SQLite

Vulnerebility

Securityweek

15.5.19

Siemens Addresses Vulnerabilities in LOGO, SINAMICS Products

Vulnerebility

Securityweek

15.5.19

Microsoft plugs wormable RDP flaw, new speculative execution side channel vulnerabilities

Vulnerebility

Net-security

15.5.19

What does it take to be an infosec product strategist?

Security

Net-security

15.5.19

Microoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks

Vulnerebility

Securityaffairs

15.5.19

Adobe patches over 80 flaws in Flash, Acrobat Reader, and Media Encoder

Vulnerebility

Securityaffairs

15.5.19

Millions of computers powered by Intel chips are affected by MDS flaws

Vulnerebility

Securityaffairs

15.5.19

Thrangrycat flaw could allow compromising millions of Cisco devices

Vulnerebility

Securityaffairs

15.5.19

New Class of CPU Flaws Affect Almost Every Intel Processor Since 2011

Attack

Thehackernews

15.5.19

Microsoft Releases Patches For A Critical 'Wormable Flaw' and 78 Other Issues

Vulnerebility

Thehackernews

15.5.19

Adobe Releases Critical Patches for Flash, Acrobat Reader, and Media Encoder

Vulnerebility

Thehackernews

15.5.19

WhatsApp Zero-Day Exploited in Targeted Spyware Attacks

Attack

Threatpost

15.5.19

Intel CPUs Impacted By New Class of Spectre-Like Attacks

Attack

Threatpost

15.5.19

Microsoft Patches Zero-Day Bug Under Active Attack

Vulnerebility

Threatpost

15.5.19

Apple Patches Intel Side-Channel Bugs; Updates iOS, macOS and More

Vulnerebility

Threatpost

15.5.19

Adobe Addresses Critical Adobe Flash Player, Acrobat Reader Flaws

Vulnerebility

Threatpost

15.5.19

Linux Kernel Flaw Allows Remote Code-Execution

Vulnerebility

Threatpost

15.5.19

Cynet: An Autonomous Security Platform for Any Size Organization

Security

Threatpost

15.5.19

ZombieLoad: Cross-Privilege-Boundary Data Sampli

Papers

Papers

15.5.19

RIDL: Rogue In-Flight Data Load

Papers

Papers

15.5.19

Fallout: Reading Kernel Writes From User Space

Papers

Papers

15.5.19

Microsoft May 2019 Patch Tuesday

Vulnerebility

SANS

15.5.19

Security spring cleaning: 5 tips for tidying up network safeguards

Security

Net-security

15.5.19

Organizations dissatisfied with WAFs ineffective protection, time-consuming management, high cost

Security

Net-security

15.5.19

Cybersecurity, privacy and technologies still top challenges for IT audit teams and leaders

Security

Net-security

15.5.19

Employees are aware of USB drive security risks, but don’t follow best practices

Security

Net-security

15.5.19

Consumer spending on technology to reach $1.32 trillion in 2019

IT

Net-security

14.5.19

Microsoft Releases May 2019 Office Updates With Security Fixes

Vulnerebility

Bleepingcomputer

14.5.19

Security Updates Released for Adobe Flash Player and Media Encoder

Vulnerebility

Bleepingcomputer

14.5.19

New RIDL and Fallout Attacks Impact All Modern Intel CPUs

Vulnerebility

Bleepingcomputer

14.5.19

Microsoft Fixes Critical Remote Desktop Flaw, Blocks Worm Malware

Vulnerebility

Bleepingcomputer

14.5.19

Keyloggers Injected in Web Trust Seal Supply Chain Attack

Attack

Bleepingcomputer

14.5.19

Hackers Access Over 461,000 Accounts in Uniqlo Data Breach

Incindent

Bleepingcomputer

14.5.19

Google Chrome Offers a Glimpse of it's Upcoming Settings Screen

IT

Bleepingcomputer

14.5.19

Adobe Says Upgrade Creative Cloud Apps or Risk 3rd Party Claims

IT

Bleepingcomputer

14.5.19

Fxmsp Chat Logs Reveal the Hacked Antivirus Vendors, AVs Respond

Hacking

Bleepingcomputer

14.5.19

Linksys Smart Wi-Fi Routers Leak Info of Connected Devices

Security

Bleepingcomputer

14.5.19

U.S. Govt Issues Microsoft Office 365 Security Best Practices

BigBrothers

Bleepingcomputer

14.5.19

New Game Boy Emulator Has a Remote 'Cloud Gaming' Mode

IT

Bleepingcomputer

14.5.19

New Details Emerge of Fxmsp's Hacking of Antivirus Companies

Hacking

Bleepingcomputer

14.5.19

Sensitive Information of Millions of Panama Citizens Leaked

Incindent

Bleepingcomputer

14.5.19

Linux Kernel Prior to 5.0.8 Vulnerable to Remote Code Execution

Vulnerebility

Bleepingcomputer

14.5.19

North Korea-linked ScarCruft APT adds Bluetooth Harvester to its arsenal

APT

Securityaffairs

14.5.19

Malware Training Sets: FollowUP

Virus

Securityaffairs

14.5.19

Hackers Add Security Software Removal to Banload Banking Malware

Virus

Securityweek

14.5.19

Flaw Affecting Millions of Cisco Devices Let Attackers Implant Persistent Backdoor

Virus

Thehackernews

14.5.19

Cryptocurrency Hacks Still Growing — What Does That Mean for the Industry?

Cryptocurrency

Thehackernews

14.5.19

ScarCruft continues to evolve, introduces Bluetooth harvester

Hacking

Securelist

14.5.19

Apple May 2019 security updates fix numerous issues

Apple

Net-security

14.5.19

WhatsApp flaw used to install spyware by simply calling the target

Social

Net-security

14.5.19

WhatsApp zero-day exploited in targeted attacks to deliver NSO spyware

Social

Securityaffairs

14.5.19

Unprotected DB exposed PII belonging to nearly 90% of Panama citizens

Incindent

Securityaffairs

14.5.19

CVE-2019-11815 Remote Code Execution affects Linux Kernel prior to 5.0.8

Vulnerebility

Securityaffairs

14.5.19

Facebook sues data analytics firm Rankwave over alleged data misuse

Social

Securityaffairs

14.5.19

Reading the Yoroi Cyber Security Annual Report 2018

CyberCrime

Securityaffairs

14.5.19

Over 10k+ GPS trackers could be abused to spy on individuals in the UK

Mobil

Securityaffairs

14.5.19

Expert discovered how to brick all Samsung mobile phones

Mobil

Securityaffairs

14.5.19

Hackers Used WhatsApp 0-Day Flaw to Secretly Install Spyware On Phones

Vulnerebility

Thehackernews

14.5.19

Report Links Vast Online Disinformation Campaign to Iran

BigBrothers

Securityweek

14.5.19

Facebook Patches WhatsApp Flaw Exploited to Spy on Users

Social

Securityweek

14.5.19

US, EU Spar Over Sharing Electronic Evidence in Investigations

BigBrothers

Securityweek

14.5.19

Nine Charged in SIM Hijacking Scheme

Mobil

Securityweek

14.5.19

GAO Makes Recommendations to Improve Security of Taxpayer Data

Security

Securityweek

14.5.19

New Bill Proposes Cybersecurity Training for U.S. House Members

Cyber

Securityweek

14.5.19

Website Infections Holding Steady at 1%, But Attacks Becoming Stealthier: Report

Virus

Securityweek

14.5.19

Leak Reveals Activity of Iranian Hacking Group

CyberCrime

Securityweek

14.5.19

Sectigo Acquires IoT Security Firm Icon Labs

IoT

Securityweek

14.5.19

North Korea-Linked 'ScarCruft' Adds Bluetooth Harvester to Toolkit

APT

Securityweek

14.5.19

Remote Code Execution Flaw Found in Kaspersky Products

Vulnerebility

Securityweek

14.5.19

NVIDIA Patches High Severity Bugs in GPU Display Driver

Vulnerebility

Securityweek

14.5.19

Pair of Cisco Bugs, One Unpatched, Affect Millions of Devices

Vulnerebility

Threatpost

14.5.19

Twitter Leaks Apple iOS Users’ Location Data to Ad Partner

Social

Threatpost

14.5.19

ScarCruft APT Adds Bluetooth Harvester to its Malware Bag of Tricks

APT

Threatpost

14.5.19

ThreatList: Top 5 Most Dangerous Attachment Types

Spam

Threatpost

14.5.19

Prioritizing risks in a climate of geopolitical threats

Security

Net-security

14.5.19

The lurking danger of hacked email reply chains

Hacking

Net-security

14.5.19

Cybersecurity skills shortage still the root cause of rising security incidents

Cyber

Net-security

14.5.19

While data enables innovation, its vulnerability continues to cause anxiety among IT leaders

Vulnerebility

Net-security

14.5.19

High-risk vulnerability in Cisco’s secure boot process impacts millions of devices

Vulnerebility

Net-security

13.5.19

SharePoint servers under attack through CVE-2019-0604

Vulnerebility

Net-security

13.5.19

Blocking Hyperlink Auditing Tracking Pings with Extensions

Security

Bleepingcomputer

13.5.19

Arch Linux for WSL is now Available in the Microsoft Store

IT

Bleepingcomputer

13.5.19

Microsoft is Relaunching Power Toys For Windows 10 Users

IT

Bleepingcomputer

13.5.19

Pacha Group declares war to rival crypto mining hacking groups

Cryptocurrency

Securityaffairs

13.5.19

Microsoft SharePoint Vulnerability Exploited in the Wild

Vulnerebility

Securityweek

13.5.19

From Phishing To Ransomware?

Ransomware

SANS

13.5.19

What CISOs should focus on when deciding on a strategy

Security

Net-security

13.5.19

Tips to spring clean your company’s social media and stay protected

Social

Net-security

13.5.19

May 2019 Patch Tuesday forecast: Latest OS updates impact performance

Vulnerebility

Net-security

13.5.19

Despite warnings, most people still don’t change their passwords

Security

Net-security

13.5.19

As IT companies approach digital transformation, key issues remain a struggle

Security

Net-security

13.5.19

PII capturing websites still applying poor security measures one year after GDPR

Privacy

Net-security

12.5.19

Trashing the Flow of Data

Vulnerebility blog

Checkpoint

12.5.19

PlaNETWORK: Face to Face with Cyber Crime

Cyber blog

Project Zero

12.5.19

Vulnerability Spotlight: Remote code execution bug in SQLite

Vulnerebility blog

Cisco Talos

12.5.19

Vulnerability Spotlight: Multiple bugs in several Jenkins plugins

Vulnerebility blog

Cisco Talos

12.5.19

Types of backup and five backup mistakes to avoid

Security blog

Eset

12.5.19

Hackers steal US$41 million worth of Bitcoin from cryptocurrency exchange

Cryptocurrency blog

Eset

12.5.19

Turla LightNeuron: An email too far

Malware blog

Eset

12.5.19

Turkish Personal Data Protection Authority fined Facebook for Photo API bug

Social

Securityaffairs

12.5.19

Hacking the ‘Unhackable’ eyeDisk USB stick

Hacking

Securityaffairs

12.5.19

Security breach suffered by credit bureau Equifax has cost $1.4 Billion

Incindent

Securityaffairs

12.5.19

Experts found a remote-code execution flaw in SQLite

Vulnerebility

Securityaffairs

11.5.19

Ransom News

Ransom

Ransom

11.5.19

Over 100 flaws in management and access control systems expose buildings to hack

Vulnerebility

Securityaffairs

11.5.19

U.S. DoJ charges 9 individuals that stole $2.5M through SIM swapping

CyberCrime

Securityaffairs

11.5.19

Microsoft SharePoint CVE-2019-0604 flaw exploited in the wild

Vulnerebility

Securityaffairs

11.5.19

Facebook Sues South Korea Data Analytics Firm

Social

Securityweek

11.5.19

U.S. Charges 9 'SIM Swapping' Attackers For Stealing $2.5 Million

Attack

Thehackernews

11.5.19

Nigerian BEC Scammers Shifting to RATs As Tool of Choice

Spam

Bleepingcomputer

11.5.19

Google Considers Removing Android ADB Backup and Restore

Android

Bleepingcomputer

11.5.19

NVIDIA Patches High Severity Windows GPU Display Driver Flaws

Vulnerebility

Bleepingcomputer

11.5.19

Windows 10 Insider Build 18895 Fixes the Your Phone App

Vulnerebility

Bleepingcomputer

11.5.19

Microsoft Office Asking Users to Send More Usage Data

Privacy

Bleepingcomputer

11.5.19

Crypto-Mining Hacking Groups Wage War in the Cloud

Cryptocurrency

Bleepingcomputer

11.5.19

The 2019 DBIR is out

Incindent

Securelist

11.5.19

Heap Buffer Overflow Vulnerability found in Kaspersky Antivirus Engine

Vulnerebility

Securityaffairs

11.5.19

Over 100 Flaws Expose Buildings to Hacker Attacks

Vulnerebility

Securityweek

11.5.19

Android Q Enables TLS 1.3 Support by Default

Android

Securityweek

11.5.19

FIN7 Linked to Escalating Active Exploits for Microsoft SharePoint Bug

Exploit

Threatpost

11.5.19

The WannaCry Security Legacy and What’s to Come

Ransomware

Threatpost

11.5.19

Nvidia Warns Windows Gamers on GPU Driver Flaws

Vulnerebility

Threatpost

11.5.19

ThreatList: Nigerian Cybercrime Surged 54 Percent in 2018

CyberCrime

Threatpost

10.5.19

DHS and FBI published a Malware Analysis Report on North Korea-linked tool ELECTRICFISH

BigBrothers

Securityaffairs

10.5.19

Top-Tier Russian Hacking group Fxmsp claims hack of major AntiVirus Companies

Hacking

Securityaffairs

10.5.19

Nigerian Cybercrime 'Group' Has 400 Malicious Actors

CyberCrime

Securityweek

10.5.19

Symantec CEO Quits Unexpectedly, Stock Sinks After Missing Estimates

Security

Securityweek

10.5.19

U.S. Charges Chinese Hackers Over Massive 2015 Anthem Breach

BigBrothers

Securityweek

10.5.19

Russian Hackers Claim Breach of Three U.S. Anti-Virus Companies

Hacking

Securityweek

10.5.19

North Korean Hackers Using ELECTRICFISH Tunnels to Exfiltrate Data

BigBrothers

Thehackernews

10.5.19

Six Men Accused of Stealing Over $2.4M in SIM Swapping Attacks

Attack

Bleepingcomputer

10.5.19

Fake Pirate Chick VPN Pushed AZORult Info Stealing Trojan

Virus

Bleepingcomputer

10.5.19

U.S Indicts Chinese Hackers for Anthem Data Breach

Incindent

Bleepingcomputer

10.5.19

Mozilla to Delete Usage Data Collected From Firefox Addon Fix

Security

Bleepingcomputer

10.5.19

North Korean Hackers Use ELECTRICFISH Malware to Steal Data

Virus

Bleepingcomputer

10.5.19

Site Promoting KeePass Password Manager Pushes Malware

Virus

Bleepingcomputer

10.5.19

Android Q Hardens Security, Adds Better Encryption

Android

Bleepingcomputer

10.5.19

Jokeroo Ransomware as a Service Pulls an Exit Scam

Ransomware

Bleepingcomputer

10.5.19

Firefox May Add Some Tor Features for Super Private Browsing Mode

Security

Bleepingcomputer

10.5.19

Hackers Selling Access and Source Code From Antivirus Companies

Hacking

Bleepingcomputer

10.5.19

Developer Creates a Two-Way Chat Using Only CSS and HTML

IT

Bleepingcomputer

10.5.19

Android Q: Enhanced security for consumers and enterprises

Android

Net-security

10.5.19

‘Unhackable’ Biometric USB Offers Up Passwords in Plain Text

Crypto

Threatpost

10.5.19

Chinese Hackers Behind 2015 Anthem Data Breach Indicted

Incindent

Threatpost

10.5.19

Hackers Take Over IoT Devices to ‘Click’ on Ads

IoT

Threatpost

10.5.19

Alpine Linux Docker Images Shipped for 3 Years with Root Accounts Unlocked

Incindent

Threatpost

10.5.19

Serious Phar Flaw Allows Arbitrary Code Execution on Drupal

Vulnerebility

Threatpost

10.5.19

Researchers in the Dark on Powerful LightNeuron Malware, for Years

Virus

Threatpost

10.5.19

DoJ indicted a member of China-based hacking group behind Anthem hack

BigBrothers

Securityaffairs

10.5.19

Freedom Mobile data breach impacts at least 15,000 customers

Incindent

Securityaffairs

10.5.19

U.S. Government Details ELECTRICFISH Malware Used by North Korea

BigBrothers

Securityweek

10.5.19

Whistleblower Says Facebook Generating Terror Content

Social

Securityweek

10.5.19

U.S. Blocks China Mobile, Citing National Security

BigBrothers

Securityweek

10.5.19

U.S. Charges Chinese Hacker For 2015 Anthem Data Breach

BigBrothers

Thehackernews

10.5.19

DSSuite - A Docker Container with Didier's Tools

Hacking

SANS

10.5.19

A deeper look: How the 281 data breaches in Q1 2019 will impact companies

Incindent

Net-security

10.5.19

Three ways GDPR benefits US companies

Privacy

Net-security

10.5.19

Healthcare IT pros now confident in their cyber attack response ability

Cyber

Net-security

10.5.19

Only 14% of organizations have completed migration to Windows 10

IT

Net-security

10.5.19

AI-optimized chipsets entering a new era as they become more specialized

IT

Net-security

10.5.19

Orange signs an agreement for the acquisition of 100% of SecureLink

Security

Net-security

9.5.19

Cisco Talos warns of hardcoded credentials in Alpine Linux Docker Images

Hacking

Securityaffairs

9.5.19

5 Factors Growing the Cyberthreat Management Industry

Cyber

Securityaffairs

9.5.19

Information Services Giant Wolters Kluwer hit by ransomware attack

Ransomware

Securityaffairs

9.5.19

Vulnerability in UC Browser Apps exposes to phishing attacks

Phishing

Securityaffairs

9.5.19

Identity Verification Firm Evident Raises $20 Million

IT

Securityweek

9.5.19

Ex-Intelligence Analyst Charged With Leaks to Reporter

BigBrothers

Securityweek

9.5.19

New Samsung Exynos Chip Secures IoT Devices With Short-Range Comms

IoT

Securityweek

9.5.19

Authorities Arrest Administrators of Portal to Dark Web Marketplaces

Crime

Securityweek

9.5.19

Phar Vulnerabilities Patched in Drupal, TYPO3

Vulnerebility

Securityweek

9.5.19

Hard-Coded Credentials Found in Alpine Linux Docker Images

Hacking

Securityweek

9.5.19

IT Specialist Convicted on Cyber Hacking Charges Sentenced

Security

Securityweek

9.5.19

Bug in Alpine Linux Docker Image Leaves Root Account Unlocked

Vulnerebility

Bleepingcomputer

9.5.19

Over 275 Million Records Exposed by Unsecured MongoDB Database

Incindent

Bleepingcomputer

9.5.19

Facebook Removed Pre-Approval for Some Cryptocurrency-Related Ads

Cryptocurrency

Bleepingcomputer

9.5.19

Microsoft Pulls Office Update KB4462238 Due to Freezing Bug

Vulnerebility

Bleepingcomputer

9.5.19

Windows 10 Insider Build 18894 Enhances Search in File Explorer

Vulnerebility

Bleepingcomputer

9.5.19

Nation State Actors Regularly Breach Public Sector Systems

BigBrothers

Bleepingcomputer

9.5.19

Microsoft Edge Beta Downloads Leaked, Based on Chromium 75

Security

Bleepingcomputer

9.5.19

Dharma Ransomware Uses Legit Antivirus Tool To Distract Victims

Ransomware

Bleepingcomputer

9.5.19

Microsoft Announces Enhanced Enterprise BitLocker Management

Security

Bleepingcomputer

9.5.19

UC Browser for Android Vulnerable to URL Spoofing Attacks

Android

Bleepingcomputer

9.5.19

Scammers Try to Trick YouTubers Into Giving Up Password

Spam

Bleepingcomputer

9.5.19

FIN7.5: the infamous cybercrime rig “FIN7” continues its activities

APT

Securelist

9.5.19

Verizon Data Breach Report: Espionage, C-Suite and Cloud Attacks on the Rise

Incindent

Threatpost

9.5.19

Google Touts Android Q’s New Security Update Process and Better Privacy Controls for Apps

Privacy

Threatpost

9.5.19

Airbnb Superhost Secretly Recorded Guests with Hidden Bedroom Camera

Security

Threatpost

9.5.19

Google Patches Critical Remote Code-Execution Flaws in Android

Android

Threatpost

9.5.19

Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware

Virus

Securityaffairs

9.5.19

Google May 2019 Patches address 4 RCE flaws in Android

Android

Securityaffairs

9.5.19

Information Services Giant Wolters Kluwer Hit by Malware Attack

Virus

Securityweek

9.5.19

Machine Data Analytics Firm Sumo Logic Raises $110 Million

IT

Securityweek

9.5.19

Cybercriminals Unleash MegaCortex Ransomware in Global Attack Campaign

Ransomware

Securityweek

9.5.19

Canadian Telecom Firm Freedom Mobile Exposed Customer Details

Incindent

Securityweek

9.5.19

WordPress 5.2 Brings New Security Features

Security

Securityweek

9.5.19

Ongoing Attack Stealing Credit Cards From Over A Hundred Shopping Sites

Attack

Thehackernews

9.5.19

TURLA LIGHTNEURON

Report

Report

9.5.19

Securing satellites: The new space race

Security

Net-security

9.5.19

C-level executives increasingly and proactively targeted by social breaches

Incindent

Net-security

9.5.19

3 months, 1900 reported breaches, 1.9 billion records exposed

Incindent

Net-security

9.5.19

The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors

IoT

Net-security

9.5.19

Whose (usage) data is it, anyway?

Security

Net-security

9.5.19

How institutions, advisors, and investors think about digital assets

Security

Net-security

8.5.19

Yomi Hunter Joined the VirusTotal Sandbox Program!

Virus

Securityaffairs

8.5.19

International Police operation seized DeepDotWeb and arrested its administrators

BigBrothers

Securityaffairs

8.5.19

Most of the servers at City of Baltimore shut down after ransomware attack

Ransomware

Securityaffairs

8.5.19

Hackers Steal $41 Million worth of Bitcoin from Binance Exchange

Hacking

Securityaffairs

8.5.19

Google Patches Remotely Exploitable Vulnerabilities in Android

Android

Securityweek

8.5.19

Jenkins Vulnerability Exploited to Deliver 'Kerberods' Malware

Virus

Securityweek

8.5.19

New Product Protects SMBs From Credential Stuffing Attacks

Attack

Securityweek

8.5.19

Orange Acquires Cybersecurity Firm SecureLink

Cyber

Securityweek

8.5.19

Unpatched Flaw in UC Browser Apps Could Let Hackers Launch Phishing Attacks

Phishing

Thehackernews

8.5.19

Google Chrome to Introduce Improved Cookie Controls Against Online Tracking

Security

Thehackernews

8.5.19

Baltimore City Shuts Down Most of Its Servers After Ransomware Attack

Ransomware

Thehackernews

8.5.19

Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak

BigBrothers

Threatpost

8.5.19

Critical Flaw in Cisco Elastic Services Controller Allows Full System Takeover

Vulnerebility

Threatpost

8.5.19

Ukrainian Charged With Launching 100 Million Malicious Ads

Virus

Threatpost

8.5.19

Amid Bug Bounty Hype, Sometimes Security is Left in the Dust

Security

Threatpost

8.5.19

Top 5 Configuration Mistakes That Create Field Days for Hackers

Security

Threatpost

8.5.19

Cynet Free IR tool offering empowers responders to know and act against active attacks

Attack

Net-security

8.5.19

WordPress updates are digitally signed at last!

Security

Net-security

8.5.19

Local Authorities in Texas and Maryland Hit by Ransomware

Ransomware

Bleepingcomputer

8.5.19

Researcher Finds CSS-Only Method to Track Mouse Movements

Security

Bleepingcomputer

8.5.19

Cisco Fixes Critical Vulnerability in Elastic Services Controller

Vulnerebility

Bleepingcomputer

8.5.19

Google Chrome To Stop Sites From Messing with the Back Button

Security

Bleepingcomputer

8.5.19

FBI Seize DeepDotWeb For Taking Commissions From Illegal Sites

BigBrothers

Bleepingcomputer

8.5.19

Burger King's Online Store for Kids Exposes Customers’ Info

Incindent

Bleepingcomputer

8.5.19

Microsoft Edge for Mac Leaked, Includes Browser Protection

Incindent

Bleepingcomputer

8.5.19

Confluence Servers Hacked to Install Miners and Rootkits

Cryptocurrency

Bleepingcomputer

8.5.19

NSA Hacking Tools Used by Chinese Hackers One Year Before Leak

BigBrothers

Bleepingcomputer

8.5.19

Tor Browser 8.0.9 Released to Fix Disabled NoScript Addon

Security

Bleepingcomputer

8.5.19

LulZSec and Anonymous Ita hackers published sensitive data from 30,000 Roman lawyers

APT

Securityaffairs

8.5.19

Cisco addresses a critical flaw in Elastic Services Controller

Vulnerebility

Securityaffairs

8.5.19

LightNeuron, a Turla’s backdoor used to compromise exchange mail servers

APT

Securityaffairs

8.5.19

Hackers Steal $40 Million in Bitcoin From Cryptocurrency Exchange Binance

Cryptocurrency

Securityweek

8.5.19

Cyberattack Cripples Baltimore's Government Computer Servers

Attack

Securityweek

8.5.19

Verizon Publishes 2019 Data Breach Investigations Report (DBIR)

Analysis

Securityweek

8.5.19

NIST Working on Industrial IoT Security Guide for Energy Companies

BigBrothers

Securityweek

8.5.19

Microsoft Launches New Solutions to Protect Elections From Hacking

Security

Securityweek

8.5.19

Binance Hacked — Hackers Stole Over $40 Million Worth Of Bitcoin

Hacking

Thehackernews

8.5.19

Critical flaw allows attackers to take over Cisco Elastic Services Controllers

Vulnerebility

Net-security

8.5.19

Email roulette, May 2019

Security

SANS

8.5.19

Executing a multi-cloud strategy: Crawl, walk, run

Security

Net-security

8.5.19

Is curiosity killing patient privacy?

Privacy

Net-security

8.5.19

Open banking establishes new access to banks’ networks, creating additional security issues

Security

Net-security

8.5.19

Mobile carriers believe security and reliability concerns will increase with 5G

Mobil

Net-security

8.5.19

Senior payment executives’ thoughts on SME PCI compliance and security

Security

Net-security

7.5.19

Microsoft Windows 10 will get a full built-in Linux Kernel for WSL 2

IT

Thehackernews

7.5.19

Chinese Hackers Used NSA Hacking Tools Before Shadow Brokers Leaked Them

Hacking

Thehackernews

7.5.19

ATMitch: New Evidence Spotted In The Wild

Security

Securityaffairs

7.5.19

Buckeye APT group used Equation Group tools prior to ShadowBrokers leak

APT

Securityaffairs

7.5.19

New MegaCortex Ransomware targets enterprise networks

Ransomware

Securityaffairs

7.5.19

Privileged Access Management Solutions Are Shifting to the Cloud: Survey

Security

Securityweek

7.5.19

Turla Uses Sophisticated Backdoor to Hijack Exchange Mail Servers

APT

Securityweek

7.5.19

SIEM Solutions Firm Exabeam Raises $75 Million

IT

Securityweek

7.5.19

Proofpoint to Acquire Meta Networks for $120 Million

IT

Securityweek

7.5.19

GandCrab Ransomware Detected Targeting Manufacturing Firm

Ransomware

Securityweek

7.5.19

Researchers discover highly stealthy Microsoft Exchange backdoor

Virus

Net-security

7.5.19

Turla Backdoor Deployed in Attacks Against Worldwide Targets

APT

Bleepingcomputer

7.5.19

WordPress 5.2 to Come with Supply-Chain Attack Protection

Attack

Bleepingcomputer

7.5.19

App Stores Pull Meet24 and Meet4U Dating Apps For FTC Violations

Mobil

Bleepingcomputer

7.5.19

Evil Clippy Makes Malicious Office Docs that Dodge Detection

Virus

Bleepingcomputer

7.5.19

Amazon to Disable S3 Path-Style Access Used to Bypass Censorship

Security

Bleepingcomputer

7.5.19

Microsoft to Ship a True Linux Kernel With Windows 10 WSL

IT

Bleepingcomputer

7.5.19

Microsoft Launches Multi-Shell Windows Terminal Console App

Security

Bleepingcomputer

7.5.19

Upcoming Microsoft Edge Features Announced at Build 2019

Security

Bleepingcomputer

7.5.19

Chrome for Android to Allow In-App Browser Updates

Android

Bleepingcomputer

7.5.19

Israel Bombs Building as Retaliation for Hamas Cyber Attack

BigBrothers

Bleepingcomputer

7.5.19

ICS-CERT warns of several flaws in the GE Communicator software

Vulnerebility

Securityaffairs

7.5.19

A bug in Mirai code allows crashing C2 servers

Vulnerebility

Securityaffairs

7.5.19

Other Sierra AirLink router models affected by critical flaws

Vulnerebility

Securityaffairs

7.5.19

Chinese Hackers Used NSA Tool a Year Before Shadow Brokers Leak

BigBrothers

Securityweek

7.5.19

PrinterLogic Vulnerability Allows Remote Code Execution

Vulnerebility

Securityweek

7.5.19

Several Vulnerabilities Found in GE Power Meter Software

Vulnerebility

Securityweek

7.5.19

U.S. Charges Ukrainian for Malvertising

Virus

Securityweek

7.5.19

Industry Reactions to Cybersecurity Workforce Executive Order

Cyber

Securityweek

7.5.19

5G Conference Warns on Security as Huawei Controversy Rages

Mobil

Securityweek

7.5.19

Israel Bombs Hamas Cyber HQ in Response to Cyberattack

BigBrothers

Securityweek

7.5.19

Google Announces Fourth-Annual Capture the Flag Event

Security

Securityweek

7.5.19

Popular Online Tutoring Marketplace 'Wyzant' Suffers Data Breach

Incindent

Thehackernews

7.5.19

Researchers Weigh in on Trump’s Cyber Workforce Executive Order

Cyber

Threatpost

7.5.19

Amid Bug Bounty Hype, Sometimes Security is Left in the Dust

Vulnerebility

Threatpost

7.5.19

Extinguishing the IoT Insecurity Dumpster Fire

IoT

Threatpost

7.5.19

Tor Security Add-On Abruptly Killed by Mozilla Bug

Security

Threatpost

7.5.19

WP Live Chat WordPress Plugin Re-Patches File Upload Flaw

Vulnerebility

Threatpost

7.5.19

Oracle WebLogic Exploit-fest Continues with GandCrab Ransomware, XMRig

Ransomware

Threatpost

7.5.19

High-Severity Bug Leaves Cisco TelePresence Gear Open to Attack

Vulnerebility

Threatpost

7.5.19

Avengers: Endgame Sites Promise Digital Downloads, Deliver Info-Harvesting

Security

Threatpost

7.5.19

High-Severity PrinterLogic Flaws Enable Remote Code Execution

Vulnerebility

Threatpost

7.5.19

Text and Text

Security

SANS

7.5.19

Unhackable? New chip makes the computer an unsolvable puzzle

Security

Net-security

7.5.19

C-Suite execs and policy makers find cybersecurity technology investments essential

Cyber

Net-security

7.5.19

Flaws in the design of IoT devices prevent them from notifying homeowners about problems

IoT

Net-security

7.5.19

Cryptographic breakthrough allows using handshake-style encryption for time-delayed communications

Crypto

Net-security

7.5.19

Network as a Service market to exceed $50bn by 2025

IT

Net-security

6.5.19

Other Sierra AirLink router models affected by critical flaws

Vulnerebility

Securityaffairs

6.5.19

IDF hit Hamas, it is the first time a state launched an immediate physical attack in response to a cyber attack

Attack

Securityaffairs

6.5.19

Magecart Skimming Attack Hits Hundreds of Campus e-Commerce Sites

Attack

Securityweek

6.5.19

European, US Investigators Make Major Darknet Bust

BigBrothers

Securityweek

6.5.19

Hundreds of Git Repositories Held for Ransom

Ransomware

Securityweek

6.5.19

Israel Neutralizes Cyber Attack by Blowing Up A Building With Hackers

BigBrothers

Thehackernews

6.5.19

Panda Malware: It’s Not Just About Cryptocurrencies Anymore

Malware blog

F5 Labs

6.5.19

Regional Threat Perspectives: United States

Security blog

F5 Labs

6.5.19

Gozi Banking Trojan Pivots Towards Italian Banks in February and March

Malware blog

F5 Labs

6.5.19

Denial of Service Vulnerabilities Discovered in HTTP/2

Vulnerebility blog

F5 Labs

6.5.19

Regional Threat Perspectives: Australia

Security blog

F5 Labs

6.5.19

Ramnit Returns to its Banking Roots, Just in Time for Italian Tax Season

Malware blog

F5 Labs

6.5.19

CARBANAK Week Part Four: The CARBANAK Desktop Video Player

Malware blog

FireEye

6.5.19

CARBANAK Week Part Two: Continuing the CARBANAK Source Code Analysis

Malware blog

FireEye

6.5.19

CARBANAK Week Part Three: Behind the CARBANAK Backdoor

Malware blog

FireEye

6.5.19

Vulnerabilities in ISPsystem

Vulnerebility blog

Checkpoint

6.5.19

Deobfuscating APT32 Flow Graphs with Cutter and Radare2

APT blog

Checkpoint

6.5.19

Beapy: Cryptojacking Worm Hits Enterprises in China

Cryptocurrency blog

Symantec

6.5.19

Dispelling Myths Around SGX Malware

Malware blog

Symantec

6.5.19

Qakbot levels up with new obfuscation techniques

Malware blog

Cisco Talos

6.5.19

Sodinokibi ransomware exploits WebLogic Server vulnerability

Ransomware blog

Cisco Talos

6.5.19

Vulnerability Spotlight: Multiple vulnerabilities in Sierra Wireless AirLink ES450

Vulnerebility blog

Cisco Talos

6.5.19

JasperLoader Emerges, Targets Italy with Gootkit Banking Trojan

Malware blog

Cisco Talos

6.5.19

The UK plans to legislate to secure IoT, but is it really the answer?

IoT blog

Eset

6.5.19

World Password Day: A day to review your defenses

Security blog

Eset

6.5.19

D-Link camera vulnerability allows attackers to tap into the video stream

Vulnerebility blog

Eset

6.5.19

Buhtrap backdoor and ransomware distributed via major advertising platform

Ransomware blog

Eset

6.5.19

BEC fraud losses almost doubled last year

Spam blog

Eset

6.5.19

Over 23 million breached accounts used ‘123456’ as password

Incident blog

Eset

6.5.19

What will phishers do once push-based MFA becomes widely used?

Phishing

Net-security

6.5.19

Flaw in pre-installed software opens Dell computers to remote hijack

Hacking

Net-security

6.5.19

Firefox 66.0.4 Released With Fix for Disabled Addons

Security

Bleepingcomputer

6.5.19

New Extortion Email Scam Threatens to Release Your Sex Tape

Spam

Bleepingcomputer

6.5.19

Fix for Tor Browser NoScript Addon Being Disabled

Vulnerebility

Bleepingcomputer

6.5.19

Alleged Ukrainian Malvertiser Extradited, Faces Hacking Charges

Hacking

Bleepingcomputer

6.5.19

Retefe Banking Trojan resurfaces in the threat landscape with innovations

Virus

Securityaffairs

6.5.19

NoScript temporarily disabled in Tor Browser … how to fix it?

Security

Securityaffairs

6.5.19

Ukrainian national Oleksii Petrovich Ivanov extradited to US facing hacking charges

BigBrothers

Securityaffairs

6.5.19

A hacker has taken over at least 29 IoT botnets

BotNet  IoT

Securityaffairs

6.5.19

2020 Campaign Staffers Being Trained to Handle Cyber Threats

Cyber

Securityweek

6.5.19

PSD2 and strong customer authentication: Are all elements equal?

Security

Net-security

6.5.19

Researchers working on tools that aim to eliminate computer bugs

Vulnerebility

Net-security

6.5.19

What differentiates the strongest cybersecurity programs from the rest

Cyber

Net-security

6.5.19

Trust is at a tipping point: Consumers will react strongly if they feel their privacy is compromised

Privacy

Net-security

6.5.19

Government embracing digital transformation but struggling to implement data security

BigBrothers

Net-security

5.5.19

Hackers stole card data from 201 campus online stores in US and Canada, is it the Magecart group?

CyberCrime

Securityaffairs

5.5.19

Japan will develop its first-ever malware as a defense measure against cyber attacks

Virus

Securityaffairs

5.5.19

Mysterious attacks wipe Git repositories and ask a ransom to rescue code

Ransomware

Securityaffairs

5.5.19

Mozilla plans to ban Firefox Extensions containing obfuscated code

Security

Securityaffairs

5.5.19

Expert found hundred of vulnerable Jenkins Plugins

Vulnerebility

Securityaffairs

4.5.19

Dark Web’s Wall Street Market & Valhalla Seized, Six Arrested

CyberCrime

Bleepingcomputer

4.5.19

New MegaCortex Ransomware Found Targeting Business Networks

Ransomware

Bleepingcomputer

4.5.19

Firefox Addons Being Disabled Due to an Expired Certificate

Security

Bleepingcomputer

4.5.19

Attackers Wiping GitHub and GitLab Repos, Leave Ransom Notes

Ransomware

Bleepingcomputer

4.5.19

Windows 10 1809 Cumulative Update KB4495667 Released With Fixes

Vulnerebility

Bleepingcomputer

4.5.19

Microsoft Now Lets You Reply to Android Texts in Windows 10

Android

Bleepingcomputer

4.5.19

Over 200 College Campus Stores Infected with Card Stealing Scripts

Virus

Bleepingcomputer

4.5.19

Microsoft Ports Process Explorer and Monitor to Windows ARM64

IT

Bleepingcomputer

4.5.19

Ransom

Ransom

Ransom

4.5.19

Europol Shuts Down Two Major Illegal 'Dark Web' Trading Platforms

BigBrothers

Thehackernews

4.5.19

Using the Human Factor in Cyber Attacks

Attack

Securityaffairs

4.5.19

Authorities shut down major darknet marketplaces: the Wall Street Market and Valhalla

CyberCrime

Securityaffairs

4.5.19

Cisco addresses a critical flaw in Nexus 9000 switches

Vulnerebility

Securityaffairs

4.5.19

Mozilla Bans Firefox Extensions Containing Obfuscated Code

Security

Securityweek

4.5.19

CrowdStrike Endpoint Security Platform Now Detects Firmware Attacks

Attack

Securityweek

4.5.19

New Strain of Android Malware Found on Third-Party App Store

Android

Securityweek

4.5.19

UK Publishes Proposed Regulation for IoT Device Security

IoT

Securityweek

4.5.19

Vulnerabilities Found in Over 100 Jenkins Plugins

Vulnerebility

Securityweek

4.5.19

German Police Shut Down Major 'Darknet' Illegal Trading Site

BigBrothers

Securityweek

4.5.19

News Wrap: Cartoon Network Hack, the Catholic Church and Jason Statham Scams

Spam

Threatpost

4.5.19

Multiple Sierra Wireless AirLink Routers Open to Remote Code Execution

Vulnerebility

Threatpost

4.5.19

Retefe Banking Trojan Resurfaces, Says Goodbye to Tor

Virus

Threatpost

4.5.19

Researchers Weigh in on Trump’s Cyber Workforce Executive Order

Cyber

Threatpost

4.5.19

PrinterLogic Print Management Software fails to validate SSL certificates or the integrity of software updates.

Alert

Alert

3.5.19

MEGALOCKER DECRYPTOR

Ransomware

Anti-Ramson Tool

3.5.19

Chrome Will Allow Sites to Check Your OS Dark Mode Settings

Security

Bleepingcomputer

3.5.19

Mozilla To Disable Firefox Add-Ons with Obfuscated Code

Security

Bleepingcomputer

3.5.19

Microsoft PM Explains Why Chromium Edge Can’t Run Google Earth

IT

Bleepingcomputer

3.5.19

Decryptor for MegaLocker and NamPoHyu Virus Ransomware Released

Ransomware

Bleepingcomputer

3.5.19

Windows 10 1903 Rolling Out Improved Windows Update Controls

Vulnerebility

Bleepingcomputer

3.5.19

Qakbot Assembles Itself from Encrypted Halves to Evade Detection

BotNet

Bleepingcomputer

3.5.19

Coinhive Dead but Browser-Based Cryptomining Still a Threat

Cryptocurrency

Bleepingcomputer

3.5.19

Public 10KBLAZE Exploits May Impact 90% of SAP Production Systems

Exploit

Bleepingcomputer

3.5.19

Scammers Create Google Search Ads to Lure PayPal, Amazon Clients

Spam

Bleepingcomputer

3.5.19

Mozilla will block Firefox add-ons that contain obfuscated code

Security

Net-security

3.5.19

Dell Security Support Tool Harbors High-Severity Flaws

Vulnerebility

Threatpost

3.5.19

Cisco Warns of Critical Nexus 9000 Data Center Flaw

Vulnerebility

Threatpost

3.5.19

D-Link Cloud Camera Flaw Gives Hackers Access to Video Stream

Vulnerebility

Threatpost

3.5.19

Critical Flaws Found in Eight Wireless Presentation Systems

Vulnerebility

Threatpost

3.5.19

Ladders, SkyMed Leak Employment, Medical Data for Millions

Security

Threatpost

3.5.19

AA19-122A : New Exploits for Unsecure SAP Systems

Exploit

CERT

3.5.19

10KBLAZE exploits could affect 9 out of 10 SAP installs of more than 50k customers

Exploit

Securityaffairs

3.5.19

Ladders Database Exposed 13M User Records

Incindent

Securityaffairs

3.5.19

Russian national Anton Bogdanov indicted for $1.5M cyber tax fraud scheme

BigBrothers

Securityaffairs

3.5.19

APT34: Glimpse project

APT

Securityaffairs

3.5.19

Trump Signs Executive Order to Bolster Cybersecurity Workforce

Cyber

Securityweek

3.5.19

TSA Lacks Cybersecurity Expertise to Manage Pipeline Security Program: Report

Cyber

Securityweek

3.5.19

DoS Attack Blamed for U.S. Grid Disruptions: Report

Attack

Securityweek

3.5.19

Dell Patches Remote Code Execution Vulnerability in SupportAssist Client

Vulnerebility

Securityweek

3.5.19

PoC Exploits for Old SAP Configuration Flaws Increase Risk of Attacks

Exploit

Securityweek

3.5.19

A few Ghidra tips for IDA users, part 3 - conversion, labels, and comments

Forensics

SANS

3.5.19

Google offers auto-delete option for location, web tracking history

Privacy

Net-security

3.5.19

Consumers care deeply about their privacy, security, and how their personal information is handled

Security

Net-security

3.5.19

Cybercriminals targeting social media: Facebook and Instagram are becoming phishers’ favorites

CyberCrime

Net-security

3.5.19

Cybercriminals thriving on companies overlooking fundamental security requirements

CyberCrime

Net-security

3.5.19

60% of businesses have experienced a serious security breach in the last two years

Incindent

Net-security

3.5.19

A wave of regulation is coming to the cryptocurrency economy

Cryptocurrency

Net-security

2.5.19

Magecart Group 12 also targets Opencart-based online stores

CyberCrime

Securityaffairs

2.5.19

A ‘Cyber Event’ disrupted power grid operations in three US states

BigBrothers

Securityaffairs

2.5.19

Assange Refuses Extradition to US; Long Legal Fight Expected

BigBrothers

Securityweek

2.5.19

Russian Charged With Stealing $1.5 Million From IRS

BigBrothers

Securityweek

2.5.19

Cisco Patches Critical Vulnerability in Data Center Switches

Vulnerebility

Securityweek

2.5.19

US Calls for Cautious EU Policy on 5G Networks

Mobil

Securityweek

2.5.19

Xinjiang Surveillance App Targets Legal, Everyday Behaviour: Rights Group

Mobil

Securityweek

2.5.19

50,000 companies running SAP installations open to attack via publicly released exploits

Exploit

Net-security

2.5.19

Magecart Group 12 Targets OpenCart Websites

CyberCrime

Bleepingcomputer

2.5.19

Office 365 Accounts Compromised via ATO Attacks Used in BEC Scams

Spam

Bleepingcomputer

2.5.19

Dell Computers Exposed to RCE Attacks by SupportAssist Flaws

Vulnerebility

Bleepingcomputer

2.5.19

Windows 10 1809 Cumulative Update KB4501835 Released With Fixes

Vulnerebility

Bleepingcomputer

2.5.19

Database Exposes Medical Info, PII Data of 137k People in U.S.

Incindent

Bleepingcomputer

2.5.19

Windows 10 Friendly Dates Not Included in the May 2019 Update

Vulnerebility

Bleepingcomputer

2.5.19

Windows 10 Insider Build 18890 Released With Bug Fixes

Vulnerebility

Bleepingcomputer

2.5.19

Windows 10 Security Feature Slows Launching of Large Programs

Security

Bleepingcomputer

2.5.19

Citrix Confirms Hackers Stole Sensitive Employee Personal Information

Hacking

Bleepingcomputer

2.5.19

Polymorphic Magecart Skimmer Uses Over Fifty Payment Gateways

CyberCrime

Bleepingcomputer

2.5.19

Sophos UTM 9.602 Released That Fixes 3 Vulnerabilities

Vulnerebility

Bleepingcomputer

2.5.19

Sodinokibi Ransomware Being Installed on Exploited WebLogic Servers

Ransomware

Bleepingcomputer

2.5.19

DHS Says Federal Agencies Have 15 Days to Fix Critical Flaws

BigBrothers

Bleepingcomputer

2.5.19

GitHub-Hosted Malware Targets Accountants With Ransomware

Ransomware

Bleepingcomputer

2.5.19

Microsoft 365 Adds More Control Over Encrypted Emails, Increases Privacy

Crypto

Bleepingcomputer

2.5.19

Emotet Trojan Is the Most Prevalent Threat in Healthcare Systems

Virus

Bleepingcomputer

2.5.19

Google Docs Says Chromium-Based Microsoft Edge Is Not Supported

IT

Bleepingcomputer

2.5.19

New Phishing Campaign From 'FBI Director Wray' is Hysterical

Phishing

Bleepingcomputer

2.5.19

Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws

Vulnerebility

Net-security

2.5.19

Cartoon Network Hacked Worldwide to Show Brazilian Stripper Videos

Hacking

Threatpost

2.5.19

Muhstik Botnet Variant Targets Just-Patched Oracle WebLogic Flaw

BotNet

Threatpost

2.5.19

Ad Server Patched to Stop Possible Malware Distribution

Virus

Threatpost

2.5.19

Wipro Attackers Have Operated Under the Radar for Years

Attack

Threatpost

2.5.19

DHS Shortens Deadline For Gov Agencies to Fix Critical Flaws

Vulnerebility

Threatpost

2.5.19

How to Hack Dell computers exploiting a flaw in pre-installed Dell SupportAssist

Vulnerebility

Securityaffairs

2.5.19

Tenable experts found 15 flaws in wireless presentation systems

Vulnerebility

Securityaffairs

2.5.19

Pre-Installed Software Flaw Exposes Most Dell Computers to Remote Hacking

Vulnerebility

Thehackernews

2.5.19

Google Adds New Option to 'Auto-Delete' Your Location History and Activity Data

Privacy

Thehackernews

2.5.19

Microsoft 365 updates for better enterprise data privacy

Privacy

Net-security

2.5.19

APT trends report Q1 2019

APT

Securelist

2.5.19

Decrypter pro ZQ

Anti-Ransom Tool

Anti-Ransom Tool

2.5.19

Citrix confirmed hackers had access to its network for five months

Hacking

Securityaffairs

2.5.19

Victims of ZQ Ransomware can decrypt their files for free

Ransomware

Securityaffairs

2.5.19

Many Vulnerabilities Found in Wireless Presentation Devices

Vulnerebility

Securityweek

2.5.19

Putin Signs Controversial Internet Law

BigBrothers

Securityweek

2.5.19

Electrum DDoS Botnet Builds Army of 150,000 Hosts

BotNet

Securityweek

2.5.19

Hackers Had Access to Citrix Network for Five Months

Hacking

Securityweek

2.5.19

Majority of Encrypted Email Clients Vulnerable to Signature Spoofing

Vulnerebility

Securityweek

2.5.19

Cloud Security Firm DivvyCloud Raises $19 Million

IT

Securityweek

2.5.19

Another Day, Another Suspicious UDF File

Virus

SANS

2.5.19

Open source security: The risk issue is unpatched software, not open source use

Security

Net-security

2.5.19

Supply chain attacks: Mitigation and protection

Attack

Net-security

2.5.19

Cybercriminals continue to target intellectual property, putting brand reputation at risk

Cyber

Net-security

2.5.19

Only 55% of companies plan to be ready for CCPA implementation

Security

Net-security

2.5.19

Consumers increasingly deploying biometrics as PINs and passwords continue to fail

Security

Net-security

1.5.19

Julian Assange sentenced to 50 weeks in jail

Crime

Securityaffairs

1.5.19

DHS BOD 19-02 directive – Critical flaws must be fixed within 15 Days

BigBrothers

Securityaffairs

1.5.19

MIVD Dutch intelligence warns of Russian, Chinese cyber espionage

BigBrothers

Securityaffairs

1.5.19

rooks exploit Oracle WebLogic flaw to deliver Sodinokibi Ransomware

Ransomware

Securityaffairs

1.5.19

Vodafone discovered backdoors in Huawei equipment. But it was 2011 ..

BigBrothers

Securityaffairs

1.5.19

Norsk Hydro estimates March cyber attack cost at $50 Million

Attack

Securityaffairs

1.5.19

Saint Ambrose Catholic Parish – Crooks stole $1.75M in BEC Attack

Spam

Securityaffairs

1.5.19

Microsoft Expands Security and Compliance Features for 365 Customers

Security

Securityweek

1.5.19

Kaspersky Analyzes Hacking Group's Homegrown Attack Tools

CyberCrime

Securityweek

1.5.19

Muhstik Botnet Exploits Recent Oracle WebLogic Vulnerability

Vulnerebility

Securityweek

1.5.19

Two Vulnerabilities Expose Rockwell Controllers to DoS Attacks

Vulnerebility

Securityweek

1.5.19

'Privacy-Focused' Facebook Puts the Spotlight on Groups

Social

Securityweek

1.5.19

DHS Orders Agencies to Patch Critical Vulnerabilities Within 15 Days

BigBrothers

Securityweek

1.5.19

Local Credit Union Sues Fiserv Over 'Amateurish Security Lapses'

Security

Securityweek

1.5.19

New Sodinokibi Ransomware Delivered via Oracle WebLogic Flaw

Ransomware

Securityweek

1.5.19

Dutch Warn of 'Worrying' Russian, Chinese Cyber-Spying

BigBrothers

Securityweek

1.5.19

2020 U.S. Presidential Candidates Vulnerable to Email Attacks

Attack

Securityweek

1.5.19

Apple Claims Parental Control Apps Removed Due to Use of MDM

Apple

Securityweek

1.5.19

Security Operations Firm Red Canary Raises $34 Million

IT

Securityweek

1.5.19

Vodafone Identified Huawei Security Flaw Decade Ago

Vulnerebility

Securityweek

1.5.19

Norsk Hydro Says Cyber Attack Cost It Around $50 Mln

Attack

Securityweek

1.5.19

WikiLeaks' Julian Assange Sentenced to 50 Weeks in UK Jail

Crime

Thehackernews

1.5.19

DHS Orders Federal Agencies to Patch Critical Flaws Within 15 Days

Vulnerebility

Thehackernews

1.5.19

Hackers Found Exploiting Oracle WebLogic RCE Flaw to Spread Ransomware

Ransomware

Thehackernews

1.5.19

Over Dozen Popular Email Clients Found Vulnerable to Signature Spoofing Attacks

Attack

Thehackernews

1.5.19

Rapidly Growing Electrum Botnet Infects Over 152,000 Users; Steals $4.6 Million

BotNet

Thehackernews

1.5.19

Unprotected Database Exposes Personal Info of 80 Million American Households

Incindent

Thehackernews

1.5.19

Researchers Compromise Netflix Content in Widevine DRM Hack

Hacking

Threatpost

1.5.19

New ‘Sodinokibi’ Ransomware Exploits Critical Oracle WebLogic Flaw

Ransomware

Threatpost

1.5.19

Fake Jason Statham Bilks a Fan Out of Serious Money

Spam

Threatpost

1.5.19

BEC Hack Cons Catholic Church Out of $1.75 Million

Spam

Threatpost

1.5.19

Muhstik Botnet Variant Targets Just-Patched Oracle WebLogic Flaw

BotNet

Threatpost

1.5.19

Malware Infests Popular Pirate Streaming Hardware

Virus

Teahrtpost

1.5.19

MuddyWater APT Hones an Arsenal of Custom Tools

APT

Threatpost

1.5.19

Apple Defends Parental Control App Removal Amid Backlash

Apple

Threatpost

1.5.19

Introduction to KAPE

Security

SANS

1.5.19

Researchers develop cybersecurity system to test for vulnerabilities in technologies that use GPS

Vulnerebility

Net-security

1.5.19

As organizations continue to adopt multicloud strategies, security remains an issue

Security

Net-security

1.5.19

How much does the average employee know about data privacy?

Privacy

Net-security

1.5.19

Security and compliance obstacles among the top challenges for cloud native adoption

Security

Net-security

1.5.19

5G brings great opportunities but requires a network transformation

Mobil

Net-security

1.5.19

Which cyber threats should financial institutions be on the lookout for?

Cyber

Net-security

30.4.19

$1.75 Million Stolen by Crooks in Church BEC Attack

Spam

Bleepingcomputer

30.4.19

Crooks Build Fake Hack Tools and Game Cheats for Profit

Hacking

Bleepingcomputer

30.4.19

Botnet of Over 100K Devices Used to DDoS Electrum Servers

BotNet

Bleepingcomputer

30.4.19

Exposed Database Leaks Addresses, Income Info of Millions of Americans

Incindent

Bleepingcomputer

30.4.19

Windows 10 Users Avoiding October 2018 Update Shows Report

IT

Bleepingcomputer

30.4.19

Tech Support Scammers Freeze Browsers Using Iframes

Spam

Bleepingcomputer

30.4.19

Google Chrome 74 Now Synchronizes with Windows 10 Dark Mode

IT

Bleepingcomputer

30.4.19

Breaches, ID Theft & Malware: Schools At Risk From Vulnerabilities

Virus

Bleepingcomputer

30.4.19

Windows Security Update Caused Recent Antivirus Conflicts and Freezes

Security

Bleepingcomputer

30.4.19

Microsoft Asks Users to Call Windows 10 Devs About Taskbar Experience

IT

Bleepingcomputer

30.4.19

Europeans Hit with Multi-Stage Malware Loader via Signed Malspam

Virus

Bleepingcomputer

30.4.19

Fake Windows PC Cleaner Drops AZORult Info-Stealing Trojan

Virus

Bleepingcomputer

30.4.19

know what you did last summer, MuddyWater blending in the crowd

APT

Securelist

30.4.19

Docker Hub Hack Affects 190K Accounts

Incindent

Threatpost

30.4.19

2 Million IoT Devices Vulnerable to Complete Takeover

IoT

Threatpost

30.4.19

Apple Defends Parental Control App Removal Amid Backlash

Apple

Threatpost

30.4.19

MuddyWater APT Hones an Arsenal of Custom Tools

APT

Threatpost

30.4.19

Malware Infests Popular Pirate Streaming Hardware

Virus

Threatpost

30.4.19

Facebook funds research on the impact of social media on elections

Social

Securityaffairs

30.4.19

ElectrumDoSMiner botnet reached 152,000 hosts

BotNet

Securityaffairs

30.4.19

United Airlines covers up seat cameras to respond to privacy concerns

Privacy

Securityaffairs

30.4.19

Unprotected Database Stored Information on 80 Million U.S. Households

Incindent

Securityweek

30.4.19

ImmuniWeb Launches Free Testing Tool for Website Security and PCI Compliance

Safety

Securityweek

30.4.19

Facebook to Fund Research on Social Media Impact on Elections

Social

Securityweek

30.4.19

Making the most of threat intelligence with threat intelligence gateways

Security

Net-security

30.4.19

Hacking our way into cybersecurity for medical devices

Hacking

Net-security

30.4.19

SEC demands better disclosure for cybersecurity incidents and threats

Cyber

Net-security

30.4.19

Most adults are concerned about malware and phishing on social media

Phishing

Net-security

30.4.19

Companies face regulatory fines and cybersecurity threats, still fail to protect sensitive data

Cyber

Net-security

29.4.19

New Emotet variant uses connected devices as proxy C2 servers

Virus

Securityaffairs

29.4.19

Report: Unknown Data Breach Exposes 80 Million US Households

Incindent

Securityaffairs

29.4.19

Over 23 million breached accounts were using ‘123456’ as password

Incindent

Securityaffairs

29.4.19

Amnesty International Hong Kong Office hit by state-sponsored attack

Attack

Securityaffairs

29.4.19

Microsoft removes Password-Expiration Policy in security baseline for Windows 10

Security

Securityaffairs

29.4.19

GDPR Conformance Does Not Excuse Companies from Vicarious Liability

Privacy

Securityweek

29.4.19

Docker Hub Breach Hits 190,000 Accounts

Incindent

Securityweek

29.4.19

Oracle Patches WebLogic Zero-Day Exploited in Attacks

Exploit

Securityweek

29.4.19

Slack Lists Cybersecurity Risks Ahead of Going Public

Cyber

Securityweek

29.4.19

Attackers breached Docker Hub, grabbed keys and tokens

Attack

Net-security

29.4.19

Slack warns investors it might be targeted by organized crime, nation-state hackers

CyberCrime

Net-security

29.4.19

Critical flaw in Qualcomm chips exposes sensitive data for Android Devices

Android

Securityaffairs

29.4.19

Signed Malspam campaigns hit Europeans with Multi-Stage JasperLoader

Spam

Securityaffairs

29.4.19

AESDDoS bot exploits CVE-2019-3396 flaw to hit Atlassian Confluence Server

Vulnerebility

Securityaffairs

29.4.19

Slack Lists Cybersecurity Risks Ahead of Going Public

Cyber

Securityweek

29.4.19

Update about Weblogic CVE-2019-2725 (Exploits Used in the Wild, Patch Status)

Vulnerebility

SANS

29.4.19

GE trade secret theft case demonstrates need for document behavior monitoring

Security

Net-security

29.4.19

The leading sources of stress for cybersecurity leaders? Regulation, threats, skills shortage

Cyber

Net-security

29.4.19

Researchers develop new technique to identify malware in embedded systems

Virus

Net-security

29.4.19

Most SMBs would pay a ransom in order to recover stolen data

Incindent

Net-security

29.4.19

A surprising number of used drives sold on eBay hold sensitive data

Incindent

Net-security

28.4.19

NIST ACTS Toolkit could find Finds bugs safety-critical systems

Safety

Securityaffairs

28.4.19

Magecart skimmer scripts hosted on GitHub infected 200+ e-commerce sites

CyberCrime

Securityaffairs

28.4.19

Docker Hub Database hacked, 190,000 users impacted

CyberCrime

Securityaffairs

28.4.19

Experts release PoC exploit for unpatched flaw in WordPress WooCommerce Extension

Exploit

Securityaffairs

28.4.19

Cisco discovered several flaws in Sierra Wireless AirLink ES450 devices

Vulnerebility

Securityaffairs

28.4.19

AESDDoS Botnet Targets Vulnerability in Atlassian’s Confluence Server

BotNet

Securityweek

28.4.19

Docker Hub Suffers a Data Breach, Asks Users to Reset Password

Incindent

Thehackernews

28.4.19

New York, Canada, Ireland Launch New Investigations Into Facebook Privacy Breaches

Social

Thehackernews

27.4.19

Quick Tip for Dissecting CVE-2017-11882 Exploits

Exploit

SANS

27.4.19

Ransom

Ransom

Ransom

27.4.19

Docker Hub Database Hack Exposes Sensitive Data of 190K Users

Incindent

Bleepingcomputer

27.4.19

GitHub-Hosted Magecart Card Skimmer Found on Hundreds of Stores

CyberCrime

Bleepingcomputer

27.4.19

Old Vulnerabilities Are Still Good Tricks for Today's Attacks

Vulnerebility

Bleepingcomputer

27.4.19

Custom Start Menus in Roaming Profiles Reset After Windows 10 Upgrades

Vulnerebility

Bleepingcomputer

27.4.19

Windows 10 and Windows 7 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

27.4.19

Windows 10 Insider Build 18885 Fixes USB Drive Letter Reassignments

Vulnerebility

Bleepingcomputer

27.4.19

A Closer Look at the RobbinHood Ransomware

Ransomware

Bleepingcomputer

27.4.19

Vulnerable Confluence Servers Get Infected with Ransomware, Trojans

Ransomware

Bleepingcomputer

27.4.19

News Wrap: Amazon Echo Privacy, Facebook FTC Fines and Biometrics Regulation

Security

Threatpost

27.4.19

GoDaddy Shutters 14,000 Subdomains Tied to ‘Snake Oil’ Scams

Spam

Threatpost

27.4.19

Facial Recognition ‘Consent’ Doesn’t Exist, Threatpost Poll Finds

Security

Threatpost

27.4.19

Critical Flaws in Sierra Wireless 5G Gateway Allow RCE, Command Injection

Vulnerebility

Threatpost

27.4.19

Users Urged to Disable WordPress Plugin After Unpatched Flaw Disclosed

Vulnerebility

Threatpost

27.4.19

Millions of IoT Devices exposed to remote hacks due to iLnkP2P flaws

IoT

Securityaffairs

27.4.19

Beapy Cryptojacking campaign leverages EternalBlue exploit to spread

Cryptocurrency

Securityaffairs

27.4.19

P2P Flaws Expose Millions of IoT Devices to Remote Attacks

IoT

Securityweek

27.4.19

Cyptojacking Attacks Target Enterprises With NSA-Linked Exploits

Cryptocurrency

Securityweek

27.4.19

Cisco Finds Serious Flaws in Sierra Wireless AirLink Devices

Vulnerebility

Securityweek

27.4.19

Microsoft Removes Password-Expiration Policy in Windows 10

Security

Securityweek

27.4.19

Irish Regulator Investigates Facebook Over Exposed Passwords

Social

Securityweek

26.4.19

Microsoft Rolls Out Android Notification Syncing for Windows 10

IT

Bleepingcomputer

26.4.19

Hundreds of GoDaddy Accounts Used for "Miracle" Product Scams

Spam

Bleepingcomputer

26.4.19

Atlanta Hawks Online Shop Hit with Credit Card Stealing Attack

Attack

Bleepingcomputer

26.4.19

The Anatomy of Highly Profitable Credential Stuffing Attacks

Attack

Bleepingcomputer

26.4.19

Devious Chase Bank Phishing Scam Asks For Selfies

Phishing

Bleepingcomputer

26.4.19

Emotet Uses Compromised Devices as Proxy Command Servers

Virus

Bleepingcomputer

26.4.19

Over 500% Increase in Ransomware Attacks Against Businesses

Ransomware

Bleepingcomputer

26.4.19

EternalBlue Exploit Serves Beapy Cryptojacking Campaign

Cryptocurrency

Bleepingcomputer

26.4.19

TA505 Spear Phishing Campaign Uses LOLBins to Avoid Detection

Phishing

Bleepingcomputer

26.4.19

French Users of Microsoft Games and Sites Hit With Scam Ads

BigBrothers

Bleepingcomputer

26.4.19

GitHub Service Abused by Attackers to Host Phishing Kits

Phishing

Bleepingcomputer

26.4.19

Apple Updates XProtect to Block 'Windows' Malware on Macs

Apple

Bleepingcomputer

26.4.19

Windows 10 Version 1903 Drops Password Expiration Policies

Vulnerebility

Bleepingcomputer

26.4.19

NIST Tool Finds Errors in Complex Safety-Critical Software

Security

Securityweek

26.4.19

Canada Privacy Watchdog Taking Facebook to Court

Privacy

Securityweek

26.4.19

Reports Huawei to Supply UK Networks Draw Criticism

BigBrothers

Securityweek

26.4.19

Cybercriminals Using GitHub to Host Phishing Kits

Phishing

Securityweek

26.4.19

Leaked Carbanak Source Code Reveals No New Exploits

Exploit

Securityweek

26.4.19

Special-Purpose Vehicle Maker Aebi Schmidt Hit by Malware

Virus

Securityweek

26.4.19

Oracle, Gemalto Downplay Java Card Vulnerabilities

Vulnerebility

Securityweek

26.4.19

Amnesty Says Hong Kong Office Hit by China-linked Cyber Attack

Attack

Securityweek

26.4.19

The strengths and weaknesses of different VPN protocols

Security

Securityaffairs

26.4.19

Special-Purpose Vehicle Maker Aebi Schmidt Hit by Malware

Virus

Securityaffairs

26.4.19

Crooks abuse GitHub platform to host phishing kits

Phishing

Securityaffairs

26.4.19

Flaws in Social Warfare plugin actively exploited in the wild

Vulnerebility

Securityaffairs

26.4.19

Britain ‘Approves’ Huawei role in building ‘non-core’ parts for 5G Network

BigBrothers

Securityaffairs

26.4.19

A flaw in Rockwell Controller allows attackers to redirect users to malicious Sites

Vulnerebility

Securityaffairs

26.4.19

Critical Unpatched Flaw Disclosed in WordPress WooCommerce Extension

Vulnerebility

Thehackernews

26.4.19

'Highly Critical' Unpatched Zero-Day Flaw Discovered In Oracle WebLogic

Vulnerebility

Thehackernews

26.4.19

Qualcomm Critical Flaw Exposes Private Keys For Android Devices

Android

Threatpost

26.4.19

Android-Based Sony Smart-TVs Open to Image Pilfering

Android

Threatpost

26.4.19

Service Accounts Redux - Collecting Service Accounts with PowerShell

Security

SANS

26.4.19

Best practices when implementing SD-WAN

Security

Net-security

26.4.19

Too fast, too insecure: Securing Mongo Express web administrative interfaces

Security

Net-security

26.4.19

Consumers trust banks most with their personal data, 68% still fear identity theft

Incindent

Net-security

26.4.19

Global spending on digital transformation to reach $1.18 trillion in 2019

Security

Net-security

26.4.19

Cybercriminals are becoming more methodical and adaptive

CyberCrime

Net-security

26.4.19

Established companies leveraging fintech capabilities for growth

Security

Net-security

25.4.19

Researchers flag new Oracle WebLogic zero-day RCE flaw

Vulnerebility

Net-security

25.4.19

Another European manufacturer crippled by ransomware

Ransomware

Net-security

25.4.19

Qualcomm chips leak crypto data from secure execution environment

Crypto

Net-security

25.4.19

Unpatched Vulnerability Alert - WebLogic Zero Day

Vulnerebility

SANS

25.4.19

Point Blank Gamers Targeted with Backdoor Malware

Virus

Threatpost

25.4.19

Facebook May Face $5 Billion FTC Fine for Data Misuse

Social

Threatpost

25.4.19

Facial Recognition is Here: But Are We Ready?

Security

Threatpost

25.4.19

Adware-Ridden Apps in Google Play Infect 30 Million Android Users

Android

Threatpost

25.4.19

Poll: Are You Creeped Out by Facial Recognition?

Security

Threatpost

25.4.19

Latest Qbot Variant Evades Detection, Infects Thousands

Virus

Threatpost

25.4.19

Zero-day vulnerability in Oracle WebLogic

Vulnerebility

Securityaffairs

25.4.19

Facebook Could Be Fined Up To $5 Billion Over Privacy Violations

Social

Thehackernews

25.4.19

Congress Asks Google 10 Questions On Its Location Tracking Database

Privacy

Thehackernews

25.4.19

IoT Security Firm VDOO Raises $32 Million

IoT

Securityweek

25.4.19

Facebook Anticipates an FTC Privacy Fine of up to $5 Billion

Social

Securityweek

25.4.19

Former DHS Head Took up Cyber Despite White House Aversion

BigBrothers

Securityweek

25.4.19

Digital Guardian Announces $30 Million Financing Round

IT

Securityweek

25.4.19

Government Officials Targeted With Trojanized TeamViewer

Virus

Securityweek

25.4.19

BEC Fraud Losses Grew to $1.3 Billion in 2018: FBI

Spam

Securityweek

25.4.19

DNSpionage Hackers Use New Malware in Recent Attacks

Virus

Securityweek

25.4.19

Serious Vulnerabilities Found in Fujifilm X-Ray Devices

Vulnerebility

Securityweek

25.4.19

The latest DDoS attacks are mostly multi-vector and morph over time

Attack

Net-security

25.4.19

You can’t fix what you can’t see: A new way of looking at network performance

Security

Net-security

25.4.19

Employers should develop cybersecurity protocols and invest more in employee training programs

Cyber

Net-security

25.4.19

Researchers develop new tool for safety-critical software testing

Security

Net-security

25.4.19

Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

Security

Net-security

25.4.19

Where data privacy executives plan to focus their strategies and budgets

Privacy

Net-security

24.4.19

If I Had to Do It Over Again, Part 3

Security blog

F5 Labs

24.4.19

Ramnit Returns to its Banking Roots, Just in Time for Italian Tax Season

Malware blog

F5 Labs

24.4.19

Regional Threat Perspectives: Europe

Cyber blog

F5 Labs

24.4.19

CARBANAK Week Part One: A Rare Occurrence

Malware blog

FireEye

24.4.19

Spear Phishing Campaign Targets Ukraine Government and Military; Infrastructure Reveals Potential Link to So-Called Luhansk People's Republic

Phishing blog

FireEye

24.4.19

FLASHMINGO: The FireEye Open Source Automatic Analysis Tool for Flash

Exploit blog

FireEye

24.4.19

CARBANAK Week Part Two: Continuing the CARBANAK Source Code Analysis

Malware blog

FireEye

24.4.19

FINTEAM: Trojanized TeamViewer Against Government Targets

Malware blog

Checkpoint

24.4.19

PreAMo: A Clicker Campaign found on Google Play

Malware blog

Checkpoint

24.4.19

Vulnerability Spotlight: Symantec Endpoint Protection kernel memory information disclosure vulnerability

Vulnerebility blog

Cisco Talos

24.4.19

DNSpionage brings out the Karkoff

Hacking blog

Cisco Talos

24.4.19

DNS Hijacking Abuses Trust In Core Internet Service

Hacking blog

Cisco Talos

24.4.19

New HawkEye Reborn Variant Emerges Following Ownership Change

Malware blog

Cisco Talos

24.4.19

Vulnerability Spotlight: Denial of service in VMWare Workstation 15

Vulnerebility blog

Cisco Talos

24.4.19

Vulnerability Spotlight: Multiple vulnerabilities in Shimo VPN's helper tool

Vulnerebility blog

Cisco Talos

24.4.19

WannaCryptor ‘accidental hero’ pleads guilty to malware charges

Ransomware blog

Eset

24.4.19

Embracing creativity to improve cyber-readiness

Cyber blog

Eset

24.4.19

Bug in EA’s Origin client left gamers open to attacks

Attack blog

Eset

24.4.19

Your Android phone can now double as a security key

OS Blog

Eset

24.4.19

Microsoft reveals breach affecting webmail users

Incident blog

Eset

24.4.19

Qbot Malware Dropped via Context-Aware Phishing Campaign

Virus

Bleepingcomputer

24.4.19

Stuart City is the new victim of the Ryuk Ransomware

Ransomware

Securityaffairs

24.4.19

The Russian Shadow in Eastern Europe: Gamaredon ‘s Ukrainian MOD Campaign

BigBrothers

Securityaffairs

24.4.19

OilRig APT uses Karkoff malware along with DNSpionage in recent attacks

APT

Securityaffairs

24.4.19

Chrome 74 Patches 39 Vulnerabilities

Vulnerebility

Securityweek

24.4.19

Rockwell Controller Flaw Allows Hackers to Redirect Users to Malicious Sites

Virus

Securityweek

24.4.19

Britain 'Approves' Huawei Role in 5G Network

BigBrothers

Securityweek

24.4.19

Where have all the Domain Admins gone? Rooting out Unwanted Domain Administrators

Security

SANS

24.4.19

Oops. 228K Danish Passports Have Swapped Fingerprint Data

Incindent

Bleepingcomputer

24.4.19

Chrome 74 Released with 39 Security Fixes and New Features

Vulnerebility

Bleepingcomputer

24.4.19

Windows 10 May 2019 Update to Be Blocked If Using USB Drives

IT

Bleepingcomputer

24.4.19

NSpionage Drops New Karkoff Malware, Cherry-Picks Its Victims

Virus

Bleepingcomputer

24.4.19

Microsoft Not Giving Up on Classic Windows Paint Yet

IT

Bleepingcomputer

24.4.19

Cybercrime's Total Earnings Skyrocketed to $2.7 Billion Says the FBI

CyberCrime

Bleepingcomputer

24.4.19

Malware Hosted in Google Sites Sends Data to MySQL Server

Virus

Bleepingcomputer

24.4.19

Source Code for pCarbanak Backdoor Shared with Larger Infosec Community

Virus

Bleepingcomputer

24.4.19

ShadowHammer Targets Multiple Companies, ASUS Just One of Them

CyberCrime

Bleeingcomputer

24.4.19

Kaspersky speculates the involvement of ShadowPad attackers in Operation ShadowHammer

CyberCrime

Securityaffairs

24.4.19

odybuilding.com forces password reset after a security breach

Incindent

Securityaffairs

24.4.19

FireEye experts found source code for CARBANAK malware on VirusTotal

Virus

Securityaffairs

24.4.19

Targeted Attacks hit multiple embassies with Trojanized TeamViewer

Attack

Securityaffairs

24.4.19

Kaspersky Links ShadowHammer Supply-Chain Attack to ShadowPad Hackers

Attack

Securityweek

24.4.19

Banking Trojan Drive-by Download Leverages Trust in Google Sites

Virus

Securityweek

24.4.19

Bodybuilding.com Discloses Data Breach

Incindent

Securityweek

24.4.19

UK's NCSC Suggests Automatic Blocking of Common Passwords

BigBrothers

Securityweek

24.4.19

Carbanak Source Code Discovered on VirusTotal

CyberCrime

Securityweek

24.4.19

Vietnam-Linked Hackers Use Atypical Executables to Avoid Detection

APT

Securityweek

24.4.19

'Karkoff' Is the New 'DNSpionage' With Selective Targeting Strategy

CyberSpy

Thehackernews

24.4.19

Hackers Actively Exploiting Widely-Used Social Share Plugin for WordPress

Exploit

Thehackernews

24.4.19

Exploits for Social Warfare WordPress Plugin Reach Critical Mass

Exploit

Threatpost

24.4.19

Carbanak Source Code Unveils a Startlingly Complex Malware

Virus

Threatpost

24.4.19

Malicious VBA Office Document Without Source Code

Virus

SANS

24.4.19

Which employees receive the most highly targeted email-borne threats?

Spam

Net-security

24.4.19

Latest numbers show why BEC/EAC scams are here to stay

Spam

Net-security

24.4.19

Nearly half of firms suffer data breaches at hands of vendors

Incindent

Net-security

24.4.19

What you can expect at HITBSecConf2019 Amsterdam

Congress

Net-security

24.4.19

A casual approach to workplace communications presents major security risks

Security

Net-security

24.4.19

Research on private key generation reveals theft of ETH funds from accounts with discoverable keys

Crypto

Net-security

23.4.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in March 2019

Cyber blog

F5 Labs

23.4.19

Application Protection Report 2019, Episode 2: 2018 Breach Trends

Security blog

F5 Labs

23.4.19

4 Areas Where Infosec Facts and Fiction Clash: Mind the Gap Pt. 2

Security blog

F5 Labs

23.4.19

Trust and Reputation in the Digital Era

Security blog

F5 Labs

23.4.19

TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping

ICS blog

FireEye

23.4.19

Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware

APT blog

FireEye

23.4.19

Finding Weaknesses Before the Attackers Do

Cyber blog

FireEye

23.4.19

Churning Out Machine Learning Models: Handling Changes in Model Predictions

Security blog

FireEye

23.4.19

Is Privacy Really iPhone? Researchers Weigh in on Apple’s Targeted Ad Tracking

Apple

Threatpost

23.4.19

FBI: BEC Scam Losses Almost Double To Reach $1.2 Billion

Spam

Threatpost

23.4.19

Whitepaper: Third-Party Risk to the Nth Degree

Security

Net-security

23.4.19

Are your passwords among the 100,000 most breached ones?

Incindent

Net-security

23.4.19

Operation ShadowHammer: a high-profile supply chain attack

Attack

Securelist

23.4.19

Iran-linked APT34: Analyzing the webmask project

APT

Securityaffairs

23.4.19

EmCare reveals patient and employee data were hacked

Incindent

Securityaffairs

23.4.19

Source Code for CARBANAK Banking Malware Found On VirusTotal

Virus

Thehackernews

23.4.19

Windows April Updates Also Have Problems with McAfee Software

Security

Bleepingcomputer

23.4.19

Microsoft Windows Defender ATP APIs Now Generally Available

Security

Bleepingcomputer

23.4.19

Windows 7 Now Showing End of Support Warnings

Security

Bleepingcomputer

23.4.19

Bodybuilding.com Security Breach, All Customer Passwords Reset

Incindent

Bleepingcomputer

23.4.19

Medical Information of Almost 150K Rehab Patients Exposed

Incindent

Bleepingcomputer

23.4.19

Office 365 Custom Rules to Block Azure Blob Storage Phishing Attacks

Phishing

Bleepingcomputer

23.4.19

Microsoft Discontinues Windows 10 Sets Tabbed Window Feature

IT

Bleepingcomputer

23.4.19

Google Chrome is Testing a New Extension Menu

IT

Bleepingcomputer

23.4.19

The foundation: Quantifying risk with focused security measurement

Security

Net-security

23.4.19

Attackers are weaponizing more vulnerabilities than ever before

Vulnerebility

Net-security

23.4.19

PDF: The vehicle of choice for malware and fraud

Virus

Net-security

23.4.19

Scientists may have identified a new way to improve network security

Security

Net-security

23.4.19

As bad bots grow more sophisticated, so does the number of industries impacted by them

ICS

Net-security

23.4.19

Underserved populations unaware of cybersecurity risks

 

Net-security

22.4.19

Millions of Medical Documents for Addiction and Recovery Patients Leaked

Incindent

Threatpost

22.4.19

Evil TeamViewer Attacks Under the Guise of the U.S. State Department

Attack

Threatpost

22.4.19

France’s ‘Secure’ Telegram Replacement Hacked in an Hour

BigBrothers

Threatpost

22.4.19

WannaCry Hero Pleads Guilty to Kronos Malware Charges

Crime

Threatpost

22.4.19

jQuery JavaScript library flaw opens the doors for attacks on hundreds of millions of websites

Vulnerebility

Securityaffairs

22.4.19

Russian Twitter bot activity increased in the wake Mueller report release

BotNet

Securityaffairs

22.4.19

Campaign leverages Bit.ly, BlogSpot, and Pastebin to distribute RevengeRAT

Virus

Securityaffairs

22.4.19

A flaw in Shopify API flaw exposed revenue and traffic data of thousands of stores

Vulnerebility

Securityaffairs

22.4.19

Ride-Hailing Company operating in Iran exposes data of Iranian Drivers

APT

Securityaffairs

22.4.19

60 Million records of LinkedIn users exposed online

Incindent

Securityaffairs

22.4.19

INPIVX hidden service, a new way to organize ransomware attacks

Ransomware

Securityaffairs

22.4.19

Healthcare Firm EmCare Says 60,000 Employees and Patients Exposed in Breach

Incindent

Securityweek

22.4.19

Source Code of Iran-Linked Hacking Tools Posted Online

APT

Securityweek

22.4.19

WannaCry 'Hero' Marcus Hutchins Pleads Guilty to Creating Malware

Crime

Securityweek

22.4.19

.rar Files and ACE Exploit CVE-2018-20250

Exploit

SANS

20.4.19

Security Researcher Pleads Guilty To Malware Writing Charges

Crime

Bleepingcomputer

20.4.19

Windows 10 Start Menu Gets Its Own Process in Build 1903

IT

Bleepingcomputer

20.4.19

Nintendo Super Mario Bros. Now Playable on Commodore 64

IT

Bleepingcomputer

20.4.19

Marcus Hutchins pleads guilty to two counts of banking malware creation

Crime

Securityaffairs

20.4.19

Avast, Avira, Sophos and other antivirus solutions show problems after

Security

Securityaffairs

20.4.19

Google is going to block logins from embedded browsers against MitM phishing attacks

Phishing

Securityaffairs

20.4.19

Google to Block Logins From Embedded Browsers to Prevent Phishing

Phishing

Securityweek

20.4.19

Ransom News

Ransom

Ransom

20.4.19

New INPIVX Service May Change the Ransomware Game

Ransomware

Bleepingcomputer

20.4.19

Mozilla Firefox to Enable Hyperlink Ping Tracking By Default

Security

Bleepingcomputer

20.4.19

The New Microsoft Edge Sometimes Impersonates Other Browsers

Security

Bleepingcomputer

20.4.19

Google to Block Logins from Embedded Browser Frameworks

Security

Bleepingcomputer

20.4.19

The HotList is The Latest Instagram Phishing Scam Attack

Phishing

Bleepingcomputer

20.4.19

Cyber Attack Forces The Weather Channel Off the Air

Attack

Bleepingcomputer

20.4.19

Unsecured Databases Leak 60 Million Records of Scraped LinkedIn Data

Incindent

Bleepingcomputer

20.4.19

Ride-Hailing Company Exposes Sensitive Info of Iranian Drivers

Incindent

Bleepingcomputer

20.4.19

Windows 10 Application Guard Added to the New Microsoft Edge

Security

Bleepingcomputer

20.4.19

RevengeRAT Distributed via Bit.ly, BlogSpot, and Pastebin C2 Infrastructure

Virus

Bleepingcomputer

20.4.19

Easter Attack Affects Half a Billion Apple iOS Users via Chrome Bug

iOS

Threatpost

20.4.19

Three-Fourths of Consumers Don’t Trust Facebook, Threatpost Poll Finds

Social

Threatpost

20.4.19

Shopify Flaw Exposed Thousands of Merchants’ Revenue, Traffic Numbers

Incindent

Threatpost

20.4.19

Insecure Ride App Database Leaks Data of 300K Iranian Drivers

Incindent

Threatpost

20.4.19

Microsoft’s Latest Patch Hoses Some Antivirus Software

Vulnerebility

Threatpost

20.4.19

Weather Channel Knocked Off-Air in Dangerous Precedent

Cyber

Threatpost

20.4.19

Poll: Facebook Harvests Email Contacts for 1.5M Users – Is Enough, Enough?

Social

Threatpost

20.4.19

Cisco Patches Critical Flaw In ASR 9000 Routers

Vulnerebility

Threatpost

20.4.19

Hacker broke into super secure French Government’s Messaging App Tchap hours after release

BigBrothers

Securityaffairs

20.4.19

Facebook admitted to have stored millions of Instagram users’ passwords in plaintext

Social

Securityaffairs

20.4.19

Operator of Codeshop Cybercrime Marketplace Sentenced to 90 months in prison

CyberCrime

Securityaffairs

20.4.19

Source code of tools used by OilRig APT leaked on Telegram

APT

Securityaffairs

20.4.19

Ransomware attack knocks Weather Channel off the Air

Ransomware

Securityaffairs

20.4.19

Broadcom WiFi Driver bugs expose devices to hack

Hacking

Securityaffairs

20.4.19

Google to Block Logins From Embedded Browsers to Prevent Phishing

Phishing

Securityaffairs

20.4.19

Facebook Collected Email Contacts of 1.5 Million Users Without Consent

Social

Securityweek

20.4.19

Operator of Codeshop Cybercrime Marketplace Sentenced to Prison

CyberCrime

Securityweek

20.4.19

Facebook Stored Millions of Instagram Users' Passwords in Plaintext

Social

Thehackernews

20.4.19

Hacker Breaks Into French Government's New Secure Messaging App

BigBrothers

Thehackernews

19.4.19

Hacker Group Exposes Iranian APT Operations and Members

APT

Bleepingcomputer

19.4.19

DLL Cryptomix Ransomware Variant Installed Via Remote Desktop

Ransomware

Bleepingcomputer

19.4.19

'Sea Turtle' Campaign Focuses on DNS Hijacking to Compromise Targets

Cyber

Bleepingcomputer

19.4.19

Broadcom WiFi Driver Flaws Expose Computers, Phones, IoT to RCE Attacks

Attack

Bleepingcomputer

19.4.19

Instagram Only Showing a Blank White Screen for Many Users

Social

Bleepingcomputer

19.4.19

Microsoft Edge File Permissions Clash with IE, Allow XXE Attacks

Attack

Bleepingcomputer

19.4.19

Evernote Fixes Remote Code Execution Vulnerability in macOS App

Apple

Bleepingcomputer

19.4.19

Malicious AutoHotkey Scripts Used to Steal Info, Remotely Access Systems

Virus

Bleepingcomputer

19.4.19

Navicent Health Data Breach Exposes Patient's Personal Info

Incindent

Bleepingcomputer

19.4.19

UK Announces Introduction of Online Pornography Age Checks in July

Security

Bleepingcomputer

19.4.19

Analyzing OilRig’s malware that uses DNS Tunneling

Virus

Securityaffairs

19.4.19

Drupal patched security vulnerabilities in Symfony, jQuery

Vulnerebility

Securityaffairs

19.4.19

Facebook ‘unintentionally’ collected contacts from 1.5 Million email accounts without permission

Social

Securityaffairs

19.4.19

APT28 and Upcoming Elections: evidence of possible interference (Part II)

APT

Securityaffairs

19.4.19

State-Sponsored Hackers Use Sophisticated DNS Hijacking in Ongoing Attacks

Attack

Securityweek

19.4.19

Russian Hackers Use RATs to Target Financial Entities

Virus

Securityweek

19.4.19

Symfony, jQuery Vulnerabilities Patched in Drupal

Vulnerebility

Securityweek

19.4.19

Network DoS Attack on PLCs Can Disrupt Physical Processes

Attack

Securityweek

19.4.19

Cisco Patches Critical Flaw in ASR 9000 Routers

Vulnerebility

Securityweek

19.4.19

Mysterious Operative Haunted Kaspersky Critics

Security

Securityweek

19.4.19

Bad Bots Steal Accounts, Content and Skew the Web Ecosystem

BotNet

Securityweek

19.4.19

Fortinet Settles Whistleblower Case for $545,000

Security

Securityweek

19.4.19

Facebook Stored Millions of Instagram Users' Passwords in Plaintext

Social

Thehackernews

19.4.19

Facebook Collected Contacts from 1.5 Million Email Accounts Without Users' Permission

Social

Thehackernews

19.4.19

DevSecOps: Fast development without sacrificing safety

Security

Net-security

19.4.19

Google will check apps by new developers more thoroughly

Security

Net-security

19.4.19

Building a modern data registry: Go beyond data classification

Security

Net-security

19.4.19

Worldwide IT spending to grow just 1.1% in 2019

IT

Net-security

19.4.19

The biggest hurdles to digital transformation initiatives? Budget and top-down support

Security

Net-security

18.4.19

Researchers: Facebook’s Data-Leveraging Scandal Puts Users on Notice

Social

Threatpost

18.4.19

ThreatList: Bad Bots Account for a Fifth of All Web Traffic, FinServ Hit the Worst

BotNet

Threatpost

18.4.19

State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally

Hacking

Threatpost

18.4.19

Ubiquitous Bug Allows HIPAA-Protected Malware to Hide Behind Medical Images

Virus

Threatpost

18.4.19

Russian TA505 threat actor target financial entities worldwide

APT

Securityaffairs

18.4.19

Cisco addresses a critical bug in ASR 9000 series Routers

Vulnerebility

Securityaffairs

18.4.19

RCE flaw in Electronic Arts Origin client exposes gamers to hack

Incindent

Securityaffairs

18.4.19

Code execution – Evernote

Hacking

Securityaffairs

18.4.19

Drupal Releases Core CMS Updates to Patch Several Vulnerabilities

Vulnerebility

Thehackernews

18.4.19

Researcher Hijacks a Microsoft Service Using Loophole in Azure Cloud Platform

Hacking

Thehackernews

18.4.19

Over 100 Million JustDial Users' Personal Data Found Exposed On the Internet

Incindent

Thehackernews

18.4.19

Microsoft 365 security: Protecting users from an ever-evolving threat landscape

Security

Net-security

18.4.19

Broadcom WiFi chipset drivers contain multiple vulnerabilities

Vulnerebility

Alert

18.4.19

Malware Sample Delivered Through UDF Image

Virus

SANS

18.4.19

One hundred percent of endpoint security tools eventually fail

Security

Net-security

18.4.19

The perimeter is vanishing, how will you secure your network?

Security

Net-security

18.4.19

Consumers willing to adopt smart payments but companies need to guarantee security

Security

Net-security

18.4.19

Which organizations place a premium on security and privacy?

Privacy

Net-security

18.4.19

HITB Haxpo 2019: Celebrating the culture of hacking through the years

Congress

Net-security

18.4.19

Attention CISOs: Five steps to get the security funding you need

Security

Net-security

17.4.19

Wipro Confirms Hack and Supply Chain Attacks on Customers

Attack

Threatpost

17.4.19

Windows Zero-Day Emerges in Active Exploits

Exploit

Threatpost

17.4.19

Authentication Bypass Bug Hits Top Enterprise VPNs

Vulnerebility

Threatpost

17.4.19

Malspam Campaigns Distribute HawkEye Keylogger, Post Ownership Change

Spam

Threatpost

17.4.19

Oracle Squashes 53 Critical Bugs in April Security Update

Vulnerebility

Threatpost

17.4.19

Justdial is leaking personal details of all customers real-time

Incindent

Securityaffairs

17.4.19

Russian Hackers Scrambled to Erase Digital Footprints After Triton Attribution Report

Hacking

Securityweek

17.4.19

Brazilian Hackers Described as Adaptable Pirates

Hacking

Securityweek

17.4.19

Researcher Took Control of Microsoft's Live Tile Service, Defacement PoC Demoed

Exploit

Bleepingcomputer

17.4.19

Script Kiddies Do What They Do Best: Infect Themselves

Virus

Bleepingcomputer

17.4.19

Over 80% of All Phishing Attacks Targeted U.S. Organizations

BigBrothers

Bleepingcomputer

17.4.19

'NamPoHyu Virus' Ransomware Targets Remote Samba Servers

Ransomware

Bleepingcomputer

17.4.19

Twitter Announces 'Hide Replies' Feature, Less Reliance on User Reports

Social

Bleepingcomputer

17.4.19

Malvertising Campaign Abused Chrome to Hijack 500 Million iOS User Sessions

iOS

Bleepingcomputer

17.4.19

New Microsoft Edge to Warn Users When in Administrator Mode

IT

Bleepingcomputer

17.4.19

Hacker Group Uses RATVERMIN Backdoor to Target Ukrainian Military

BigBrothers

Bleepingcomputer

17.4.19

Scranos Operation Uses Signed Rootkit to Steal Login and Payment Info

Virus

Bleepingcomputer

17.4.19

European Commission is not in possession of evidence of issues with Kaspersky products

BigBrothers

Securityaffairs

17.4.19

A new variant of HawkEye stealer emerges in the threat landscape

Virus

Securityaffairs

17.4.19

eGobbler hackers used Chrome bug to deliver 500Million+ ads to iOS users

iOS

Securityaffairs

17.4.19

Iranian Hackers Heavily Reliant on DNS Tunneling

BigBrothers

Securityweek

17.4.19

European Commission: No Evidence of Issues With Kaspersky Products

BigBrothers

Securityweek

17.4.19

Blue Cross of Idaho data breach, 5,600 customers affected

Virus

Securityaffairs

17.4.19

FireEye releases FLASHMINGO tool to analyze Adobe Flash files

Security

Securityaffairs

17.4.19

Oracle Releases 297 Fixes in April 2019 Critical Patch Update

Vulnerebility

Securityweek

17.4.19

State Launches Online Data Survey as Part of Facebook Probe

Social

Securityweek

17.4.19

Cyber Espionage Campaign Against Ukrainian Government Continues

CyberSpy

Securityweek

17.4.19

Cross-Platform Rootkit and Spyware Hits Targets Worldwide

Virus

Securityweek

17.4.19

Blue Cross of Idaho Hacked, Some Member Information Accessed

Hacking

Securityweek

17.4.19

A few Ghidra tips for IDA users, part 2 - strings and parameters

Virus

SANS

17.4.19

What’s in a cybersecurity question? Getting to the root of cyber insights

Cyber

Net-security

17.4.19

Banks continue to prioritize risk management over customer convenience

Security

Net-security

17.4.19

What you can expect at Cyber Week 2019

Congress

Net-security

17.4.19

Cyber espionage and sabotage attacks pose an increasing threat to the energy industry

CyberSpy

Net-security

16.4.19

Adblock Plus filter can be exploited to execute arbitrary code in web pages

Exploit

Securityaffairs

16.4.19

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Virus

Securityaffairs

16.4.19

Ecuador suffered 40 Million Cyber attacks after the Julian Assange arrest

BigBrothers

Securityaffairs

16.4.19

CVE-2019-0803 Windows flaw exploited to deliver PowerShell Backdoor

Exploit

Securityaffairs

16.4.19

New Variant of HawkEye Stealer Emerges

Virus

Securityweek

16.4.19

Norsk Hydro Delays Financial Report Due to Cyberattack

Attack

Securityweek

16.4.19

Open Source Tool From FireEye Automates Analysis of Flash Files

Security

Securityweek

16.4.19

Intel Adds Hardware Shield to New 8th Gen Intel Core vPro Mobile CPUs

IT

Securityweek

16.4.19

Google Makes it Tough for Rogue App Developers Get Back on Android Play Store

Android

Thehackernews

16.4.19

Scranos: New Rapidly Evolving Rootkit-Enabled Spyware Discovered

Virus

Thehackernews

16.4.19

Hackers used credentials of a Microsoft Support worker to access users’ webmail

Incindent

Net-security

16.4.19

Employee cybersecurity essentials part 2: Lost devices and unsafe connections

Cyber

Net-security

16.4.19

Fake Instagram Apps on Google Play Harvest User Logins

Android

Threatpost

16.4.19

TicTocTrack Smartwatch Flaws Can Be Abused to Track Kids

Vulnerebility

Threatpost

16.4.19

Authentication Bypass Bug Hits Top Enterprise VPNs

Vulnerebility

Threatpost

16.4.19

Adblock Plus Filters Can Be Exploited to Run Malicious Code

Virus

Bleepingcomputer

16.4.19

New Malicious Medical DICOM Image Files Cause HIPAA Headache

Virus

Bleepingcomputer

16.4.19

Mobile VPNs Promoted by 'You Are Infected' or 'Hacked' Ads

Virus

Bleepingcomputer

16.4.19

Gnosticplayers round 5 – 65 Million+ fresh accounts from 6 security breaches available for sale

Incindent

Securityaffairs

16.4.19

Hackers Access Microsoft Email Services Accounts

Hacking

Securityweek

16.4.19

Ecuador Says Hit by 40 Million Cyber Attacks Since Assange Arrest

Cyber

Securityweek

16.4.19

Odd DNS Requests that are Normal

Security

SANS

16.4.19

Bad security hygiene still a major risk for enterprise IT networks

Security

Net-security

16.4.19

As IT security automation increases, so does the need for highly skilled staff

Security

Net-security

16.4.19

What is driving organizations’ cloud adoption?

Security

Net-security

15.4.19

Hackers Publish AAF Member Data, Claim It's 'FBI Watchlist'

BigBrothers

Bleepingcomputer

15.4.19

Important Severity Remote Code Execution Vulnerability Patched in Tomcat

Vulnerebility

Bleepingcomputer

15.4.19

Patched Windows Zero-Day Provided Full Control Over Vulnerable Systems

Vulnerebility

Bleepingcomputer

15.4.19

A new DDoS technique abuses HTML5 Hyperlink Audit Ping in massive attacks

Attack

Securityaffairs

15.4.19

Utah County Struck by Ransomware

Ransomware

Securityweek

15.4.19

Microsoft Outlook Breach Widens in Scope, Impacting MSN And Hotmail – Report

Incindent

Threatpost

15.4.19

Authentication Bypass Bug Hits Top Enterprise VPNs

Vulnerebility

Threatpost

15.4.19

Rogue Waves: Preparing the Internet for the Next Mega DDoS Attack

Attack

Threatpost

15.4.19

New zero-day vulnerability CVE-2019-0859 in win32k.sys

Vulnerebility

Securelist

15.4.19

Google introduces many G Suite security enhancements

Security

Net-security

15.4.19

Healthcare orgs have to achieve true cybersecurity, not only compliance

Cyber

Net-security

15.4.19

The Apache Software Foundation has released

Vulnerebility

Securityaffairs

15.4.19

Locked Shields 2019 – Chapeau, France wins Cyber Defence Exercise

BigBrothers

Securityaffairs

15.4.19

Windows Flaw Exploited to Deliver PowerShell Backdoor

Exploit

Securityweek

15.4.19

Large-scale DDoS Attack Abuses HTML's Hyperlink Audit Ping Facility

Attack

Securityweek

15.4.19

Google Helps Police Identify Devices Close to Crime Scenes Using Location Data

BigBrothers

Thehackernews

15.4.19

Apache Tomcat Patches Important Remote Code Execution Flaw

Vulnerebility

Thehackernews

15.4.19

Multiple Enterprise VPN Apps Allow Attackers to Bypass Authentication

Attack

Bleepingcomputer

15.4.19

Yellow Pencil WordPress Plugin flaw expose tens of thousands of sites

Vulnerebility

Securityaffairs

15.4.19

Romanian duo convicted of fraud Scheme infecting 400,000 computers

Virus

Securityaffairs

15.4.19

Major coordinated disinformation campaign hit the Lithuanian Defense

BigBrothers

Securityaffairs

15.4.19

Whatsapp, Instagram, Facebook down worldwide

Social

Securityaffairs

15.4.19

Attackers hacked support agent to access Microsoft Outlook email accounts

Attack

Securityaffairs

15.4.19

Manufacturing sector most vulnerable to insider threats

Vulnerebility

Net-security

15.4.19

The top emerging risks organizations are facing

Security

Net-security

15.4.19

The correlation between DDoS attacks and cryptomining

Cryptocurrency

Net-security

14.4.19

The Muddy Waters of APT Attacks

APT blog

Checkpoint

14.4.19

Two in Three Hotel Websites Leak Guest Booking Details and Allow Access to Personal Data

Incident blog

Symantec

14.4.19

Microsoft Patch Tuesday – April 2019

Vulnerebility blog

Symantec

14.4.19

Virtually Unlimited Memory: Escaping the Chrome Sandbox

Vulnerebility blog

Project Zero

14.4.19

Sextortion profits decline despite higher volume, new techniques

Spam blog

Cisco Talos

14.4.19

Vulnerability Spotlight: Adobe Acrobat Reader remote code execution

Vulnerebility blog

Cisco Talos

14.4.19

Gustuff banking botnet targets Australia

BotNet blog

Cisco Talos

14.4.19

Microsoft Patch Tuesday — April 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

14.4.19

Hackers crack university defenses in just two hours

Hacking blog

Eset

14.4.19

WPA3 flaws may let attackers steal Wi-Fi passwords

Attack blog

Eset

14.4.19

Credential-stuffing attacks behind 30 billion login attempts in 2018

Incident blog

Eset

14.4.19

OceanLotus: macOS malware update

Malware blog

Eset

14.4.19

The Nasty List Phishing Scam is Sweeping Through Instagram

Phishing

Bleepingcomputer

14.4.19

RobbinHood Ransomware Claims It's Protecting Your Privacy

Ransomware

Bleepingcomputer

14.4.19

These hackers have breached FBI-affiliated websites and leaked data online

BigBrothers

Securityaffairs

14.4.19

Microsoft's Work with Chinese Military University Raises Eyebrows

BigBrothers

Securityweek

14.4.19

Hackers Compromise Microsoft Support Agent to Access Outlook Email Accounts

Hacking

Thehackernews

14.4.19

Configuring MTA-STS and TLS Reporting For Your Domain

Crypto

SANS

13.4.19

Windows is Slower After April 2019 Updates According to Users

Vulnerebility

Bleepingcomputer

13.4.19

Bill Introduced to Protect the Privacy Rights of Americans

Security

Bleepingcomputer

13.4.19

Malware Creates Cryptominer Botnet Using EternalBlue and Mimikatz

Cryptocurrency

Bleepingcomputer

13.4.19

Thousands of WordPress Sites Exposed by Yellow Pencil Plugin Flaw

Vulnerebility

Bleepingcomputer

13.4.19

Sextortion Scammers Change Tactics to Bypass Spam Protection

Spam

Bleepingcomputer

13.4.19

The hacker behind Matrix.org hack offers advice to improve security

Hacking

Securityaffairs

13.4.19

Malware campaign uses multiple propagation methods, including EternalBlue

Virus

Securityaffairs

13.4.19

Siemens addressed several DoS flaws in many products

ICS

Securityaffairs

13.4.19

Russia Fines Facebook $47 Over Citizens' Data Privacy Dispute

Social

Thehackernews

13.4.19

Encrypted Messaging Project "Matrix" Suffers Extensive Cyber Attack

Attack

Thehackernews

13.4.19

WPA3 design issues and implementation vulnerabilities in hostapd and wpa_supplicant

Alert

Alert

12.4.19

APT28 and Upcoming Elections: evidence of possible interference

APT

Securityaffairs

12.4.19

Emsisoft released a free decryptor for CryptoPokemon ransomware

Ransomware

Securityaffairs

12.4.19

VPN apps insecurely store session cookies in memory and log files

Security

Securityaffairs

12.4.19

Zero-day in popular Yuzo Related Posts WordPress Plugin exploited in the wild

Exploit

Securityaffairs

12.4.19

Microsoft Introduces Security Configuration Framework

Security

Securityweek

12.4.19

Attacker Offers Advice to Matrix.org After Hacking Its Systems

Attack

Securityweek

12.4.19

UK Government Proposes Digital Harms Legislation to Regulate Online Content

BigBrothers

Securityweek

12.4.19

Facebook Pays $120,000 in Bounties at BountyCon

Social

Securityweek

12.4.19

Industry Reactions to New Triton Attacks on Critical Infrastructure

ICS

Securityweek

12.4.19

Bayrob Malware Operators Convicted in the U.S.

Virus

Securityweek

12.4.19

SAS 2019: Joe FitzPatrick Warns of the ‘$5 Supply Chain Attack’

Congress

Threatpost

12.4.19

North Korea’s Hidden Cobra Strikes U.S. Targets with HOPLIGHT

APT

Threatpost

12.4.19

WordPress Yellow Pencil Plugin Flaws Actively Exploited

Exploit

Threatpost

12.4.19

ThreatList: Tax Scammers Launch a Raft of Fake Mobile Apps

Spam

Threatpost

12.4.19

Romanian Duo Convicted of Malware Scheme Infecting 400,000 Computers

Virus

Threatpost

12.4.19

WordPress Urges Users to Uninstall Yuzo Plugin After Flaw Exploited

Exploit

Threatpost

12.4.19

SAS 2019: Fake News Peddlers Adopt Clever New Trick to Fool Facebook, Twitter

Congress

Threatpost

12.4.19

Amazon Auditors Listen to Echo Recordings, Report Says

Security

Threatpost

12.4.19

When Windows 10 Comes to Live: The First Few Minutes in the Live of a Windows 10 System

IT

SANS

12.4.19

Enterprise VPN apps store authentication and session cookies insecurely

Security

Net-security

12.4.19

A quarter of phishing emails bypass Office 365 security

Phishing

Net-security

12.4.19

77% of orgs lack a cybersecurity incident response plan

Incindent

Net-security

12.4.19

CryptoPokemon

Anti-Ramson Tool

Anti-Ramson Tool

12.4.19

Hacked Uniden Commercial Site Serves Emotet Trojan

Virus

Bleepingcomputer

12.4.19

Mozilla Firefox For ARM64 Beta Now Available

IT

Bleepingcomputer

12.4.19

Home Office Leaks the Emails of Hundreds of EU Citizens

Incindent

Bleepingcomputer

12.4.19

Tax Fraud and ID Theft Services Getting Cheaper on the Dark Web

Incindent

Bleepingcomputer

12.4.19

Hyperlink Auditing Pings Being Used to Perform DDoS Attacks

Attack

Bleepingcomputer

12.4.19

Microsoft's April 2019 Updates are Causing Windows to Freeze

Vulnerebility

Bleepingcomputer

12.4.19

VSDC Site Hacked Again to Spread Password Stealing Malware

Virus

Bleepingcomputer

12.4.19

Office 365 Team Discovers Phishing Email Pushing WinRAR Exploit

Exploit

Bleepingcomputer

12.4.19

Popular Yuzo WordPress Plugin Exploited to Redirect Users to Scams

Exploit

Bleepingcomputer

12.4.19

WPA3 Wi-Fi Standard Affected by New Dragonblood Vulnerabilities

Attack

Bleepingcomputer

12.4.19

Threat Group Uses Pastebin, GitHub In SneakyPastes Operation

Security

Bleepingcomputer

12.4.19

Windows 10 Insider Build 18875 Released, Merges Fast and Skip Ahead Rings

Vulnerebility

Bleepingcomputer

12.4.19

DHS and FBI Issue Advisory on North Korean HOPLIGHT Malware

BigBrothers

Bleepingcomputer

12.4.19

Google Wants To Block Potentially Risky Non-Secure Downloads

Security

Bleepingcomputer

12.4.19

New Extortion Email Threatens to Install WannaCry and DDoS Your Network

Attack

Bleepingcomputer

12.4.19

New TajMahal Cyberespionage Kit Includes 80 Malicious Modules

Virus

Bleepingcomputer

12.4.19

25% of Phishing Emails Bypass Office 365 Default Security

Phishing

Bleepingcomputer

12.4.19

Two Thirds of Hotel Sites Leak Guest Booking Info to Third-Parties

Incindent

Bleepingcomputer

12.4.19

Chrome Saying It's Managed by Your Organization May Indicate Malware

Virus

Bleepingcomputer

12.4.19

VSDC video editing software website hacked again

Hacking

Securityaffairs

12.4.19

FBI/DHS MAR report details HOPLIGHT Trojan used by Hidden Cobra APT

APT

Securityaffairs

12.4.19

VMware Patches DoS, Information Disclosure Flaws in Graphics Components

Vulnerebility

Securityweek

12.4.19

WikiLeaks Set 21st Century Model for Cyber-Leak Journalism

Security

Securityweek

12.4.19

Many New Security Features, Services Added to Google Cloud

Security

Securityweek

12.4.19

Julian Assange: A Decade of Stunning Leaks of U.S. Secrets

BigBrothers

Securityweek

12.4.19

Russian MPs Approve Controversial Bill Restricting Internet

BigBrothers

Securityweek

12.4.19

Enterprise IoT Security Firm Armis Raises $65 Million

IoT

Securityweek

12.4.19

Hamas-Linked Threat Actor's Infrastructure Disrupted

APT

Securityweek

12.4.19

The surveillance economy has set its sights on smartphone sensors

Mobil

Net-security

12.4.19

How password-less security benefits helpdesks

Security

Net-security

12.4.19

Who are the biggest targets of credential stuffing attacks?

Attack

Net-security

11.4.19

Large-scale SIM swap fraud

Mobil

Securelist

11.4.19

WikiLeaks Founder Julian Assange arrested and charged in US with computer hacking conspiracy

Crime

Securityaffairs

11.4.19

Assange Charged in US With Computer Hacking Conspiracy

Crime

Securityweek

11.4.19

U.S. Attributes New Trojan to North Korean Hackers

BigBrothers

Securityweek

11.4.19

Siemens Patches Serious DoS Flaws in Many Industrial Products

Vulnerebility

Securityweek

11.4.19

Assange Arrested in London After Ecuador Withdraws Asylum

Crime

Securityweek

11.4.19

Amazon Auditors Listen to Echo Recordings, Report Says

Security

Threatpost

11.4.19

SAS 2019: Fake News Peddlers Adopt Clever New Trick to Fool Facebook, Twitter

Congress

Threatpost

11.4.19

Popular Video Editing Software Website Hacked to Spread Banking Trojan

Virus

Thehackernews

11.4.19

WikiLeaks Founder Julian Assange Arrested After Ecuador Withdraws Asylum

Crime

Thehackernews

11.4.19

Security Flaws in WPA3 Protocol Let Attackers Hack WiFi Password

Attack

Thehackernews

11.4.19

How to Find Hidden Cameras in your AirBNB

Privacy

SANS

11.4.19

WPA3 design flaws affect security of new Wi-Fi standard

Vulnerebility

Net-security

11.4.19

WikiLeaks’ Julian Assange arrested in London

Crime

Net-security

11.4.19

TRITON attackers detected at another critical infrastructure facility

ICS

Net-security

11.4.19

WPA3 attacks allow hackers to hack Wi-Fi password

Attack

Securityaffairs

11.4.19

SAP April 2019 Security Patch Day addresses High severity flaws in Crystal Reports, NetWeaver

Vulnerebility

Securityaffairs

11.4.19

Genesis Store black marketplace offers more than 60k+ stolen bot profiles

CyberCrime

Securityaffairs

11.4.19

'Dragonblood' Flaws in WPA3 Allow Recovery of Wi-Fi Passwords

Attack

Securityweek

11.4.19

Cars Exposed to Hacker Attacks by Hardcoded Credentials in MyCar Apps

Hacking

Securityweek

11.4.19

Cloud Security Firm Bitglass Raises $70 Million

IT

Securityweek

11.4.19

Baldr Stealer Malware Active in the Wild With Ongoing Updates

Virus

Securityweek

11.4.19

TajMahal APT Can Steal Data From CDs, Printer Queues

APT

Securityweek

11.4.19

Over 60,000 Stolen Profiles Sold on Underground Marketplace

Incindent

Securityweek

11.4.19

SAS 2019: Triton ICS Malware Hits A Second Victim

Congress

Threatpost

11.4.19

SAS 2019: Joe FitzPatrick Warns of the ‘$5 Supply Chain Attack’

Congress

Threatpost

11.4.19

The Anatomy of Threat Hunting: What You Need to Know and Why

Security

Threatpost

11.4.19

Vendor risk management programs are running harder just to stay in place

Security

Net-security

11.4.19

Regulating the IoT: Impact and new considerations for cybersecurity and new government regulations

IoT

Net-security

11.4.19

Finance knocks business and professional services off top spot in four most attacked industries

Security

Net-security

11.4.19

Mainframe security is top priority for 85% of IT pros yet few are adequately protecting their systems

Security

Net-security

10.4.19

Yahoo Offers $117.5M Settlement in Data Breach Lawsuit

Incindent

Threatpost

10.4.19

The Anatomy of Threat Hunting: What You Need to Know and Why

Security

Threatpost

10.4.19

SAS 2019: Triton ICS Malware Hits A Second Victim

Congress

Threatpost

10.4.19

[SI-LAB] EMOTET spread in Chile impacted hundreds of users and targeted financial and banking services

Virus

Securityaffairs

10.4.19

Minnesota Department of Human Services suffered a security breach

Securityaffairs

10.4.19

Microsoft April 2019 Patch Tuesday fixes Windows 0days under attack

Vulnerebility

Securityaffairs

10.4.19

Sophisticated TajMahal APT Framework remained under the radar for 5 years

APT

Securityaffairs

10.4.19

Yoroi Welcomes “Yomi: The Malware Hunter”

Virus

Securityaffairs

10.4.19

Experts spotted a new Mirai variant that targets new processors

BotNet

Securityaffairs

10.4.19

Czech Court: Rights of Alleged Russian Hacker Violated

Security

Securityweek

10.4.19

SAP Patches High Severity Flaws in Crystal Reports, NetWeaver

Vulnerebility

Securityweek

10.4.19

Reservation Systems Used by Many Hotels Expose User Data

Incindent

Securityweek

10.4.19

Hackers Behind Triton ICS Malware Found in 2nd Critical Infrastructure Facility

ICS

Securityweek

10.4.19

Sophisticated 'TajMahal APT Framework' Remained Undetected for 5 Years

APT

Thehackernews

10.4.19

Demo Exploit Code Available for Privilege Escalation Bug in Windows

Exploit

Bleepingcomputer

10.4.19

Windows Server 2008 Requires KB4493730 to Get Future Updates

Vulnerebility

Bleepingcomputer

10.4.19

Criminal Market Sells Over 60K Digital Identities For $5-$200

CyberCrime

Bleepingcomputer

10.4.19

Microsoft's April 2019 Patch Tuesday Fixes 74 Vulnerabilities

Vulnerebility

Bleepingcomputer

10.4.19

Windows 10 April 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

10.4.19

Adobe Releases April 2019 Security Updates for Flash, Shockwave, and More

Vulnerebility

Bleepingcomputer

10.4.19

Cryptominers Still Top Threat In March Despite Coinhive Demise

Cryptocurrency

Bleepingcomputer

10.4.19

April 2019 Patch Tuesday: Microsoft fixes two actively exploited bugs

Vulnerebility

Net-security

10.4.19

Adobe Patch Tuesday updates for April 2019 address 43 flaws in its products

Vulnerebility

Securityaffairs

10.4.19

Yahoo proposes $117.5 million for the settlement of data breach

Incindent

Securityaffairs

10.4.19

Experts spotted the iOS version of the Exodus surveillance app

Apple

Securityaffairs

10.4.19

LimeRAT spreads in the wild

Virus

Securityaffairs

10.4.19

Minnesota State Agency Breach May Have Put Thousands at Risk

BigBrothers

Securityweek

10.4.19

Microsoft Patches Windows Privilege Escalation Flaws Exploited in Attacks

Exploit

Securityweek

10.4.19

New Mirai Variant Targets More Processor Architectures

BotNet

Securityweek

10.4.19

Adobe Patches 43 Flaws Across Eight Products

Vulnerebility

Securityweek

10.4.19

Microsoft Releases April 2019 Security Updates — Two Flaws Under Active Attack

Vulnerebility

Thehackernews

10.4.19

Adobe Releases Security Patches for Flash, Acrobat Reader, Other Products

Vulnerebility

Thehackernews

10.4.19

Gaza Cybergang Group1, operation SneakyPastes

APT

Securelist

10.4.19

Project TajMahal – a sophisticated new APT framework

APT

Securelist

10.4.19

SAS 2019: Meet ‘TajMahal,’ A New and Highly Advanced APT Framework

Congress

Threatpost

10.4.19

SAS 2019: Genesis Marketplace Peddles 60K Stolen Digital Identities

Congress

Threatpost

10.4.19

SAS 2019: Gaza Cybergang Blends Sophistication Levels in Highly Effective Spy Effort

Congress

Threatpost

10.4.19

Intel Patches High-Severity Flaws in Media SDK, Mini PC

Vulnerebility

Threatpost

10.4.19

Adobe Fixes 24 Critical Flaws in Acrobat Reader, Flash, Shockwave Player

Vulnerebility

Threatpost

10.4.19

Blue + Red: An Infosec Purple Pyramid

Hacking

SANS

10.4.19

Hacking healthcare: A call for infosec researchers to probe biomedical devices

Hacking

Net-security

10.4.19

What hackers inside your company are after: Convenience

Hacking

Net-security

10.4.19

Windows 10: New update controls for end users, automatic removal of broken updates

Vulnerebility

Net-security

10.4.19

Coinhive stops digging, but cryptomining still dominates

Cryptocurrency

Net-security

9.4.19

Distributor of the Reveton Police Ransomware Jailed by UK's NCA

Ransomware

Bleepingcomputer

9.4.19

New Info-stealer Baldr Emerges As a Reliable, Long-Term Player

Virus

Bleepingcomputer

9.4.19

Verizon Fixes Bugs Allowing Full Control of Fios Quantum Router

Vulnerebility

Bleepingcomputer

9.4.19

Mirai Botnet Variants Targeting New Processors and Architectures

BotNet

Bleepingcomputer

9.4.19

Phishing Scheme Uses Legit Signup Forms to Steal Payment Card Data

Phishing

Bleepingcomputer

9.4.19

Microsoft’s Chromium-Based Edge Coming to Windows 10 ARM PCs

IT

Bleepingcomputer

9.4.19

Xiaomi Browsers Still Vulnerable After Failed Patches

Vulnerebility

Bleepingcomputer

9.4.19

Windows 10 Microsoft Edge Installer Also Works on Windows 7

IT

Bleepingcomputer

9.4.19

Microsoft Released the Windows 10 May 2019 Update to Insiders

Vulnerebility

Bleepingcomputer

9.4.19

Anubis Android Trojan Spotted with Almost Functional Ransomware Module

Ransomware

Bleepingcomputer

9.4.19

The Chromium-Based Microsoft Edge Browser Is Now Available

IT

Bleepingcomputer

9.4.19

UK Investigating Microsoft, Nintendo and Sony for Billing Practices

BigBrothers

Bleepingcomputer

9.4.19

Cyber Attack Shuts Down Hoya Corp's Thailand Plant for Three Days

Cyber

Bleepingcomputer

9.4.19

Students Hack High School WiFi to Get Out of Tests

Hacking

Bleepingcomputer

9.4.19

UK Wants to Hold Companies Liable for Harmful Online Behavior

BigBrothers

Bleepingcomputer

9.4.19

Hacker's Claims of Breaching Israeli Voter Registry Under Investigation

BigBrothers

Bleepingcomputer

9.4.19

Digital Doppelgangers

Virus

Securelist

9.4.19

Researcher Reveals Multiple Flaws in Verizon Fios Routers — PoC Released

Vulnerebility

Thehackernews

9.4.19

iOS Version of Exodus Spyware Discovered in an Escalating Italian Spy Scandal

Apple

Securityweek

9.4.19

New Version of Flame Malware Platform Discovered

Virus

Securityweek

9.4.19

Duqu Remained Active After Operations Were Exposed in 2011

Virus

Securityweek

9.4.19

Verizon Patches Vulnerabilities Affecting Millions of Routers

Vulnerebility

Securityweek

9.4.19

Verizon Router Command Injection Flaw Impacts Millions

Exploit

Threatpost

9.4.19

Samsung Galaxy S10 Fingerprint Sensor Duped With 3D Print

Mobil

Threatpost

9.4.19

'Exodus' Surveillance Malware Found Targeting Apple iOS Users

Apple

Thehackernews

9.4.19

New Module Suggests Fourth Team Involved in Stuxnet Development

Virus

Securityweek

9.4.19

TP-Link Routers Vulnerable to Zero-Day Buffer Overflow Attack

Attack

Threatpost

9.4.19

SAS 2019: Genesis Marketplace Peddles 60K Stolen Digital Identities

Congress

Threatpost

9.4.19

SAS 2019: 4 Stuxnet-Related APTs Form Gossip Girl, an ‘Apex Threat Actor’

Congress

Threatpost

9.4.19

Gain immediate visibility into your actual cyber risk for free

Cyber

Net-security

9.4.19

PoC exploit for Carpe Diem Apache bug released

Exploit

Net-security

9.4.19

Gulf countries came under hackers’ spotlight in 2018, with more than 130 000 payment cards compromised

Incindent

Securityaffairs

9.4.19

AeroGrow suffered a payment card data breach

Incindent

Securityaffairs

9.4.19

Attorney: Mar-a-Lago Infiltrator Had Hidden-Camera Detector

Virus

Securityweek

9.4.19

Leap in Cyber Attacks Against Elections in OECD Countries: Canada

Attack

Securityweek

9.4.19

SEC Allows Shareholder Votes on Amazon Facial "Rekognition"

Spam

Securityweek

9.4.19

Apple Device Management Firm Fleetsmith Raises $30 Million

Apple

Securityweek

9.4.19

A few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code

Virus

SANS

9.4.19

Is your organization getting physical security right?

Security

Net-security

9.4.19

Adhering to the mobility requirements of NIST 800-171 does not have to keep you awake at night

Security

Net-security

9.4.19

Framing supply chain attacks

Attack

Net-security

9.4.19

90% of OT organizations are cyberattack victims, yet visibility into OT systems is still limited

Cyber

Net-security

8.4.19

SAS 2019: Exodus Spyware Found Targeting Apple iOS Users

Congress

Threatpost

8.4.19

Spam Campaigns Spread TrickBot Malware with Tax Lure

Spam

Threatpost

8.4.19

Victims of Planetary Ransomware can decrypt their files for free

Ransomware

Securityaffairs

8.4.19

Recent Roaming Mantis campaign hit hundreds of users worldwide

Cyber

Securityaffairs

8.4.19

Cyber Risk Company RiskLens Raises $20 Million

IT

Securityweek

8.4.19

With $600 Million Cybersecurity Budget, JPMorgan Chief Endorses AI and Cloud

Cyber

Securityweek

8.4.19

Cost of Data Breach in UK Increases More Than 41% in Two Years

Incindent

Securityweek

8.4.19

NSA Releases Reverse Engineering Tool’s Source Code

BigBrothers

Securityweek

8.4.19

Most OT Organizations Hit by Damaging Cyberattacks: Survey

Cyber

Securityweek

8.4.19

FileTSAR: Free digital forensic investigations toolkit for law enforcement

Forensics

Net-security

8.4.19

Magento sites under attack through easily exploitable SQLi flaw

Exploit

Net-security

8.4.19

Decrypter for Planetary

Anti-Ramson Tool

Anti-Ramson Tool

8.4.19

Sextortion Scams Now Using Password Protected Evidence Files

Spam

Bleepingcomputer

8.4.19

Planetary Ransomware Decryptor Gets Your Files Back For Free

Ransomware

Bleepingcomputer

8.4.19

Major Browsers to Prevent Disabling of Click Tracking Privacy Risk

Privacy

Bleepingcomputer

8.4.19

AI Chatbot Helps People Find Info on Scams and Frauds

Spam

Bleepingcomputer

8.4.19

Unofficial patches released for Java flaws disclosed by Google Project Zero

Vulnerebility

Securityaffairs

8.4.19

Rockwell Automation fixes multiple DoS flaws in Stratix Switch introduced by Cisco Software

Vulnerebility

Securityaffairs

8.4.19

Payment Card Data Stolen From AeroGrow Website

Incindent

Securityweek

8.4.19

Fake Office 365 Payment Information Update

Phishing

SANS

8.4.19

Perimeter solutions: Do layers of security make a difference?

Security

Net-security

8.4.19

CIOs and CISOs hold off on crucial updates due to potential impact on business operations

Security

Net-security

8.4.19

Securing your app and driving down call center fraud

Mobil

Net-security

8.4.19

Insights gained from working on more than 750 cybersecurity incidents

Cyber

Net-security

8.4.19

The unique business-critical threats facing converged IT-OT systems

Security

Net-security

8.4.19

Scaling innovation is critical for digital transformation success, but clearly presents a challenge

Security

Net-security

7.4.19

DNS hijacking campaigns target Gmail, Netflix, and PayPal users

Hacking

Securityaffairs

7.4.19

FIN6 group starts using LockerGoga and Ryuk Ransomware

Ransomware

Securityaffairs

7.4.19

DoS flaw in several MikroTik Routers exploited in attacks

Exploit

Securityaffairs

7.4.19

Magento Attacked Through Card Skimming Exploit

Exploit

Securityaffairs

6.4.19

Genesee County, Michigan Recovering from Ransomware Attack

Ransomware

Bleepingcomputer

6.4.19

FIN6 Group Diversifies Activity, Uses LockerGoga and Ryuk Ransomware

Ransomware

Bleepingcomputer

6.4.19

Google Adding Chrome Admin Policy to Uninstall Blacklisted Extensions

Security

Bleepingcomputer

6.4.19

Qt5-Based GUI Apps Susceptible to Remote Code Execution

Exploit

Bleepingcomputer

6.4.19

Year-Old DoS Vulnerability Allows Attacks on Some MikroTik Routers

Vulnerebility

Bleepingcomputer

6.4.19

EU States Test and Strengthen Readiness for Election Cyber Threats

Cyber

Bleepingcomputer

6.4.19

Cybercrime Market with Roughly 385,000 Members Found on Facebook

Social

Bleepingcomputer

6.4.19

Ransom

Anti-Ramson Tool

Anti-Ramson Tool

6.4.19

Hackers can add, remove cancer and other illnesses from Computer Tomography scans

Hacking

Securityaffairs

6.4.19

Hackers Can Add, Remove Cancer From CT Scans: Researchers

Hacking

Securityweek

6.4.19

Ongoing DNS Hijacking Campaign Targets Gmail, PayPal, Netflix Users

Phishing

Securityweek

6.4.19

Beagle: Graph transforms for DFIR data & logs

Security

SANS

5.4.19

ICO Fines London Council for Gangs Matrix Data Leak Exposing 203 People

Incindent

Bleepingcomputer

5.4.19

Study Shows Screen Time Before Bed Is Not Bad For Teenagers

Security

Bleepingcomputer

5.4.19

Beware of Calls Saying Your Social Security Number is Suspended

Social

Bleepingcomputer

5.4.19

Xwo Malware scans the Internet for Exposed Services, Default Passwords

Virus

Securityaffairs

5.4.19

Ursnif: The Latest Evolution of the Most Popular Banking Malware

Virus

Securityaffairs

5.4.19

Flaws in Pre-Installed security App on Xiaomi Phones open to hack them

Vulnerebility

Securityaffairs

5.4.19

Step By Step Office Dropper Dissection

Virus

Securityaffairs

5.4.19

More than 2 million Apache HTTP servers still affected by CVE-2019-0211 flaw

Vulnerebility

Securityaffairs

5.4.19

Foreign Interference in Canadian Election 'Very Likely', Says Minister

BigBrothers

Securityweek

5.4.19

Unofficial Patch Released for Java Flaws Found by Google Researcher

Vulnerebility

Securityweek

5.4.19

Rockwell Patches Stratix Switch Flaws Introduced by Cisco Software

Vulnerebility

Securityweek

5.4.19

Unpatched Flaw in Xiaomi's Built-in Browser App Lets Hackers Spoof URLs

Vulnerebility

Thehackernews

5.4.19

Hackers Abuse Google Cloud Platform to Attack D-Link Routers

Attack

Threatpost

5.4.19

LokiBot Trojan Spotted Hitching a Ride Inside .PNG Files

Virus

Threatpost

5.4.19

Consumer routers targeted by DNS hijacking attackers

Attack

Net-security

5.4.19

April Patch Tuesday Forecast: Be aware of end-of-service issues and browser exploits

Exploit

Net-security

5.4.19

Hundreds of millions of UC Browser users for Android are threatened

OS Blog

Dr Web

5.4.19

Doctor Web: Android banker Flexnet uses computer games to steal money from users

Cryptocurrency blog

Dr Web

5.4.19

Study of the Belonard Trojan, exploiting zero-day vulnerabilities in Counter-Strike 1.6

Vulnerebility blog

Dr Web

5.4.19

Doctor Web’s experts reveal a Trojan exploiting zero-day vulnerabilities of the official Counter Strike client

Malware blog

Dr Web

5.4.19

Doctor Web warns: Cybercriminals spread Android Trojans via Instagram

Malware blog

Dr Web

5.4.19

Doctor Web has detected malicious activity in a cryptocurrency monitoring tool 

Cryptocurrency blog

Dr Web

5.4.19

Reverse Engineering the April Fools Snake Game For Fun (and No Profit)

OS Blog

Checkpoint

5.4.19

Vulnerability in Xiaomi Pre-Installed Security App

Vulnerebility blog

Checkpoint

5.4.19

Dozens of Apps on Microsoft Store Displaying Adult, Gambling Content

Malware blog

Symantec

5.4.19

540 million records on Facebook users exposed by third-party apps

Social blog

Eset

5.4.19

NIST cybersecurity resources for smaller businesses

Security blog

Eset

5.4.19

Windows 10 Insider Build 18362.30 Released to Fix Boot Breaking Bug

Vulnerebility

Bleepingcomputer

5.4.19

Researchers Hack Google Maps Snake Game to Add God Mode, AI Auto-Play

Hacking

Bleepingcomputer

5.4.19

Microsoft Is Redesigning the Windows 10 Update Experience

Vulnerebility

Bleepingcomputer

5.4.19

Windows 10 May 2019 Update Announced, Insiders Get it First

Vulnerebility

Bleepingcomputer

5.4.19

Xiaomi Pre-Installed Security App Vulnerable to MiTM Attacks

Attack

Bleepingcomputer

5.4.19

Samsung Galaxy S10 Fingerprint Scanner Tricked with 3D Print

Mobil

Bleepingcomputer

5.4.19

Windows 10 1809 Changed the Default Removal Policy for External Drives

Vulnerebility

Bleepingcomputer

5.4.19

London Blue Scammers Extend Operation, Attack Targets in Asia

Spam

Bleepingcomputer

5.4.19

CIA Exortion Scams Using SatoshiBox to Sell Alleged Proof for $500

BigBrothers

Bleepingcomputer

5.4.19

New Xwo Web Scanner Helps MongoLock Ransomware Find Victims

Ransomware

Bleepingcomputer

5.4.19

Windows 10 News App Blunder Made Users Think They're Infected

IT

Bleepingcomputer

5.4.19

Financial Mobile Apps Fail to Follow Proper Security Standards

Mobil

Bleepingcomputer

5.4.19

Windows 10 1809 Cumulative Update Released with Huge List of Fixes

Vulnerebility

Bleepingcomputer

5.4.19

540 Mllion Facebook Records Leaked by Public Amazon S3 Buckets

Social

Bleepingcomputer

5.4.19

Realistic Phishing Attacks Take Advantage of U.S. Tax Season

Phishing

Bleepingcomputer

5.4.19

NVIDIA Fixes Flaws in Linux4Tegra Driver for Jetson AI Supercomputers

Vulnerebility

Bleepingcomputer

5.4.19

This Preinstalled Mobile Security App Delivered Vulnerabilities, Not Protection

Mobil

Threatpost

5.4.19

Facebook and Amazon are Locked in a Blame Game Over Leaked Data: Who’s Really To Blame?

Privacy

Threatpost

5.4.19

Hackers Could Turn Pre-Installed Antivirus App on Xiaomi Phones Into Malware

Virus

Thehackernews

5.4.19

Cisco fixes flaws RV320 and RV325 routers targeted in attacks

Attack

Securityaffairs

5.4.19

NSA releases the source code of the GHIDRA reverse engineering framework

BigBrothers

Securityaffairs

5.4.19

US Colleges Halt Work With Huawei Following Federal Charges

BigBrothers

Securityweek

5.4.19

NVIDIA Patches High Severity Flaws in Tegra Drivers

Vulnerebility

Securityweek

5.4.19

New 'Xwo' Malware Looks for Exposed Services, Default Passwords

Virus

Securityweek

5.4.19

Hundreds Targeted in Recent Roaming Mantis Campaign

Cyber

Securityweek

5.4.19

Cisco Patches Router Vulnerabilities Targeted in Attacks

Vulnerebility

Securityweek

5.4.19

WHOIS after GDPR: A quick recap for CISOs

Privacy

Net-security

5.4.19

Only 12% of enterprises are consistently able to detect insider threats

Security

Net-security

5.4.19

What is shadow mining and why is it a security threat?

Security

Net-security

5.4.19

85% of organizations fail to meet even basic PAM security hygiene

Security

Net-security

5.4.19

Vendor revenue from IT infrastructure products for cloud environments grew 28% year over year

Security

Net-security

4.4.19

SAS 2019 to Tackle APTs, Supply Chains and More

APT

Threatpost

4.4.19

BEC Scam Gang London Blue Evolves Tactics, Targets

Spam

Threatpost

4.4.19

Nvidia Fixes 8 High-Severity Flaws Allowing DoS, Code Execution

Vulnerebility

Threatpost

4.4.19

Free Cynet Threat Assessment for Mid-sized and Large Organizations

Security

Threatpost

4.4.19

How to Maximize the Value of Your Cybersecurity Investment

Cyber

Threatpost

4.4.19

BasBanke: Trend-setting Brazilian banking Trojan

Virus

Securelist

4.4.19

The German chemicals giant Bayer hit by a cyber attack

Attack

Securityaffairs

4.4.19

New XLoader variant leverage Twitter to hide C2 addresses

Virus

Securityaffairs

4.4.19

Advantech addressed code execution and DoS flaws in WebAccess software

Vulnerebility

Securityaffairs

4.4.19

TXOne Networks Unveils First Industrial Cybersecurity Product

Cyber

Securityweek

4.4.19

Microsoft Not Concerned About Disclosed Edge, IE Flaws

Vulnerebility

Securityweek

4.4.19

Facebook Demanded User Email Passwords

Social

Securityweek

4.4.19

Bayer Confirms Cyber Attack But Says No Data Stolen

Attack

Securityweek

4.4.19

NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

Security

Thehackernews

4.4.19

New Waves of Scans Detected by an Old Rule

Security

SANS

4.4.19

Vulnerability found in Guard Provider, Xiaomi’s pre-installed security app

Vulnerebility

Net-security

4.4.19

Microsoft rolls out new security capabilities for Azure customers

Security

Net-security

4.4.19

Roaming Mantis, part IV

Virus

Securelist

4.4.19

Experts found 540 Million Facebook user records on unprotected Amazon S3 buckets

Social

Securityaffairs

4.4.19

OceanLotus APT group leverages a steganography-based loader to deliver backdoors

APT

Securityaffairs

4.4.19

AWS S3 Buckets Exposed Millions of Facebook Records

Social

Securityweek

4.4.19

XLoader Trojan Poses as Security App for Android

Android

Securityweek

4.4.19

Canadian Authorities Raid RAT Developer

Virus

Securityweek

4.4.19

Microsoft Paid $2,000,000 in Bounty Rewards in 2018

Security

Securityweek

4.4.19

Long Equipment Life Cycles Expose Manufacturing Industry to Attacks: Study

Attack

Securityweek

4.4.19

540 Million Facebook User Records Found On Unprotected Amazon Servers

Social

Thehackernews

4.4.19

WordPress iOS App Bug Leaked Secret Access Tokens to Third-Party Sites

Apple

Thehackernews

4.4.19

The security challenges that come with serverless computing

Security

Net-security

4.4.19

Attackers fighting back against security teams while also targeting supply chains

Attack

Net-security

4.4.19

79% of organizations want a federal privacy law amid lack of compliance

Privacy

Net-security

4.4.19

As fraud attacks grow more sophisticated, a need for contextual detection strategies increases

Attack

Net-security

4.4.19

Organizations still use low levels or no automation of key security and incident response tasks

Incindent

Net-security

4.4.19

Backdoors inevitably create vulnerabilities that can be exploited by malicious actors

Virus

Net-security

3.4.19

Splitting atoms in XNU

Vulnerebility blog

Project Zero

3.4.19

Look who’s stalking

Cyber blog

Eset

3.4.19

Cryptocurrency exchange loses millions in heist

Cryptocurrency blog

Eset

3.4.19

Insider Attacks More Common, Harder to Detect After Cloud Migration

Attack

Bleepingcomputer

3.4.19

Georgia Tech Data Breach Exposes Info for 1.3 Million People

Incindent

Bleepingcomputer

3.4.19

Dozens of Credit Card Info Skimming Scripts Infect Thousands of Sites

Virus

Bleepingcomputer

3.4.19

CIA Porn Extortion Scams Now Use Password Protected PDFs

BigBrothers

Bleepingcomputer

3.4.19

Verizon Customers Targeted in Mobile-Focused Phishing Campaigns

Phishing

Bleepingcomputer

3.4.19

Azure AD Password Protection Available, Lowers Spray Attack Risks

Attack

Bleepingcomputer

3.4.19

Cryptojacking Still a Foreign Concept for Many Security Pros

Cryptocurrency

Bleepingcomputer

3.4.19

Chromium Microsoft Edge Can Play 4K Netflix Video, Unlike Chrome

IT

Bleepingcomputer

3.4.19

OceanLotus APT Uses Steganography to Load Backdoors

APT

Bleepingcomputer

3.4.19

Mozilla Aims to Reduce Web Site Notification Spam in Firefox

Spam

Bleepingcomputer

3.4.19

Apache Bug Lets Normal Users Gain Root Access Via Scripts

Vulnerebility

Bleepingcomputer

3.4.19

Chromium-Based Microsoft Edge Added to Windows 10 Sandbox

Security

Bleepingcomputer

3.4.19

Google Fixes Two Critical Android Code Execution Vulnerabilities

Vulnerebility

Bleepingcomputer

3.4.19

U.S. Airlines Cancel, Delay Flights Because of Aerodata Outage

Security

Bleepingcomputer

3.4.19

Notepad++ Adds GPG Signature to Verify Authenticity

IT

Bleepingcomputer

3.4.19

New York Albany Capital Hit by Ransomware Attack

Ransomware

Bleepingcomputer

3.4.19

Torrent Malware Goes Down as Pirated Streaming Usage Increases

Virus

Bleepingcomputer

3.4.19

vxCrypter Is the First Ransomware to Delete Duplicate Files

Ransomware

Bleepingcomputer

3.4.19

Researchers Trick Tesla to Drive into Oncoming Traffic

Security

Bleepingcomputer

3.4.19

Mobile-First Phishing Kit Targets Verizon Customers

Phishing

Threatpost

3.4.19

ThreatList: Half of All Attacks Aim at Supply Chain

Attack

Threatpost

3.4.19

Researchers Trick Tesla to Drive into Oncoming Traffic

IT

Bleepingcomputer

3.4.19

Chrome May Soon Allow Custom Avatars for Browser Profiles

IT

Bleepingcomputer

3.4.19

Beware of stalkerware

Cyber

Securelist

3.4.19

Group-IB report: JS-sniffers infected 2440 websites around the world

Virus

Securityaffairs

3.4.19

Georgia Tech security breach exposed up to 1.3 million individuals

Incindent

Securityaffairs

3.4.19

Code Execution, DoS Flaws Patched in Advantech WebAccess

Vulnerebility

Securityweek

3.4.19

Container Security Firm Aqua Raises $62 Million

IT

Securityweek

3.4.19

Georgia Tech Data Breach Exposes 1.3 Million Users' Personal Data

Incindent

Thehackernews

3.4.19

In-Depth Analysis of JS Sniffers Uncovers New Families of Credit Card-Skimming Code

Virus

Thehackernews

3.4.19

A few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters

Virus

SANS

3.4.19

Patched Apache flaw is a serious threat for web hosting providers

Vulnerebility

Net-security

3.4.19

Facebook Caught Asking Some Users Passwords for Their Email Accounts

Social

Thehackernews

3.4.19

New Apache Web Server Bug Threatens Security of Shared Web Hosts

Vulnerebility

Thehackernews

3.4.19

Georgia Tech data breach: 1.3M students and staff potentially affected

Incindent

Net-security

3.4.19

Crooks use hidden directories of compromised HTTPS sites to deliver malware

Virus

Securityaffairs

3.4.19

CVE-2019-0211 Apache flaw allows getting root access via script

Vulnerebility

Securityaffairs

3.4.19

Georgia Tech Breach Hits Up to 1.3 Million People

Incindent

Securityweek

3.4.19

Chinese Woman Carrying Malware Allegedly Got Into Mar-a-Lago

Virus

Securityweek

3.4.19

Google Patches Critical Vulnerabilities in Android's Media Framework

Android

Securityweek

3.4.19

To DevSecOps or not to DevSecOps?

Security

Net-security

3.4.19

Digital transformation goes hand-in-hand with Zero Trust security

Security

Net-security

3.4.19

Women are increasingly climbing the cybersecurity leadership ladder

Cyber

Net-security

3.4.19

Securing your home increasingly means securing all of your IoT devices

IoT

Net-security

3.4.19

Current and emerging third-party cyber risk management approaches and challenges

Cyber

Net-security

3.4.19

Consumers concerned about privacy but willing to take risks for convenience

Privacy

Net-security

2.4.19

Financial Apps are Ripe for Exploit via Reverse Engineering

Exploit

Threatpost

2.4.19

Mobile-First Phishing Kit Targets Verizon Customers

Phishing

Threatpost

2.4.19

Google’s April Android Security Bulletin Warns of 3 Critical Bugs

Android

Threatpost

2.4.19

26k+ Kibana Instances exposed Elasticsearch databases online

Incindent

Securityaffairs

2.4.19

ACROS Security Launches 0patch PRO

Vulnerebility

Securityweek

2.4.19

PoC Exploits Released for Unpatched Edge, IE Vulnerabilities

Vulnerebility

Securityweek

2.4.19

A LockerGoga primer and decrypters for Mira and Aurora ransomwares

Ransomware

Net-security

2.4.19

Game of Threats

Security

Securelist

2.4.19

Analyzing AZORult malware using NSA Ghidra suite

Virus

Securityaffairs

2.4.19

Closure JavaScript Library introduced XSS issue in Google Search and potentially other services

Vulnerebility

Securityaffairs

2.4.19

BREAKING: new update about DDoS’er Linux/DDoSMan ELF malware based on Elknot

Virus

Securityaffairs

2.4.19

Israeli Watchdog Finds Online Manipulation Ahead of Vote

BigBrothers

Securityweek

2.4.19

Application Security Management Firm Sqreen Raises $14 Million

IT

Securityweek

2.4.19

Mira and Aurora Decryptor

Anti-Ramson Tool

Anti-Ramson Tool

2.4.19

Computer systems in the City of Albany hit in Ransomware Attack

Ransomware

Securityaffairs

2.4.19

Security Policy Management Firm Tufin Sets Terms for IPO

Security

Securityweek

2.4.19

Facebook's Call for Global Internet Regulation Sparks Debate

Social

Securityweek

2.4.19

Preview: SecurityWeek's 2019 Singapore ICS Cyber Security Conference – Apr. 16-18

Congress

Securityweek

2.4.19

Head of Money Mule Operation Extradited to the United States

BigBrothers

Securityweek

2.4.19

JavaScript Library Introduced XSS Flaw in Google Search

Vulnerebility

Securityweek

2.4.19

Google Warns of Growing Android Attack Vector: Backdoored SDKs and Pre-Installed Apps

Android

Threatpost

2.4.19

March Madness Scams Give Attackers Fast Break

Spam

Threatpost

2.4.19

Fake AV is Back: LaCie Network Drives Used to Spread Malware

Virus

SANS

2.4.19

The CIO’s greatest roadblock to Agile development: Security governance

Security

Net-security

2.4.19

Encryption deployment increases as organizations struggle to address compliance requirements

Crypto

Net-security

2.4.19

90% of companies interested in crowdsourced security programs

Security

Net-security

2.4.19

Financial sector recognizes the benefits of hybrid cloud but still struggles to enable IT transformation

Security

Net-security

2.4.19

45% of taxpayers do not securely store tax documents

Security

Net-security

1.4.19

Attackers Store Malware in Hidden Directories of Compromised HTTPS Sites

Virus

Securityweek

1.4.19

Exodus Android Spyware With Possible Links to Italian Government Analyzed

Android

Securityweek

1.4.19

Magento Patches Critical Vulnerabilities

Vulnerebility

Securityweek

1.4.19

Serious Path Traversal Flaw Found in Kubernetes

Vulnerebility

Securityweek

1.4.19

Buca di Beppo, Planet Hollywood Restaurants Hit by Card Breach

Incindent

Securityweek

1.4.19

0-Day in TP-Link SR20 Routers Allows Command Execution

Vulnerebility

Securityweek

1.4.19

Investigator Says Amazon Chief's Phone Hacked by Saudis

Hacking

Securityweek

1.4.19

Thousands of Unprotected Kibana Instances Exposing Elasticsearch Databases

Incindent

Thehackernews

1.4.19

Investigator told Saudis hacked into Amazon CEO Jeff Bezos’ phone

Cyber

Securityaffairs

1.4.19

Buca di Beppo, Planet Hollywood and other restaurants owned by Earl Enterprises hit by card breach

Incindent

Securityaffairs

1.4.19

New Linux/DDosMan threat emerged from an evolution of the older Elknot

Virus

Securityaffairs

1.4.19

VMware addressed vulnerabilities disclosed at Pwn2Own 2019

Congress

Securityaffairs

1.4.19

Intel VISA Tech Can Be Abused, Researchers Allege

Security

Threatpost

1.4.19

Medical Weed Dispensary Exposes Health Data for Thousands

Incindent

Threatpost

1.4.19

ThreatList: Game of Thrones, a Top Malware Conduit for Cybercriminals

Cyber

Threatpost

1.4.19

Google Play Boots Italian Spyware Apps That Infected Hundreds

Android

Threatpost

1.4.19

Analysis of PDFs Created with OpenOffice/LibreOffice

Security

SANS

1.4.19

Microsoft adds tamper protection to Microsoft Defender ATP

Safety

Net-security

1.4.19

3.1 million customer records possibly stolen in Toyota hack

Incindent

Net-security

1.4.19

How to Marie Kondo your data

Security

Net-security

1.4.19

Nearly all consumers are backing up their computers, but data loss is here to stay

Security

Net-security

1.4.19

Main threat source to industrial computers? Mass-distributed malware

Virus

Net-security

1.4.19

Organizations investing in security analytics and machine learning to tackle cyberthreats

Cyber

Net-security

1.4.19

Security and privacy still the top inhibitors of cloud adoption

Privacy

Net-security

1.4.19

Automatically and invisibly encrypt email as soon as it is received on any trusted device

Crypto

Net-security