List  Articles  Page  2019  2018  2017  2016  1  2  3  4  5  6  7  8

Date

Name

Categorie

Web

31.3.19

Five Easy Steps to Keep on Your Organization’s DevOps Security Checklist

Vulnerebility blog

F5 Labs

31.3.19

Application Protection Report 2019, Episode 1: PHP Reconnaissance

Security blog

F5 Labs

31.3.19

Why Attacks on Cryptocurrency Exchanges Show No Signs of Slowing Down

Cryptocurrency blog

F5 Labs

31.3.19

4 Areas Where Infosec Facts and Fiction Clash: Mind the Gap Pt. 1

Cyber blog

F5 Labs

31.3.19

Commando VM: The First of Its Kind Windows Offensive Distribution

Security blog

FireEye

31.3.19

World Backup Day: Is your data in safe hands?

Cyber blog

Eset

31.3.19

Man jailed for destroying former employer’s data

Cyber blog

Eset

31.3.19

Global police arrest dozens of people in dark web sting

Cyber blog

Eset

31.3.19

Ex-NSA contractor Harold Thomas Martin pleads guilty to federal charge of willful retention of national defense information

BigBrothers

Securityaffairs

31.3.19

Experts released the List of ~600 MAC addresses hit in ASUS hack

Hacking

Securityaffairs

31.3.19

Ironically, Phishing Kit Hosted on Nigerian Government Site

BigBrothers

Bleepingcomputer

31.3.19

Windows 10 Build 1903 Opens Folders in Their Own Process by Default

IT

Bleepingcomputer

31.3.19

Microsoft took control of 99 domains used by Iran-linked Phosphorus APT

APT

Securityaffairs

31.3.19

Exodus, a government malware that infected innocent victims

Virus

Securityaffairs

31.3.19

"404" is not Malware

Virus

SANS

30.3.19

Windows 10 April 2019 Update Almost Ready After Anti-Cheat Bug Fix

Vulnerebility

Bleepingcomputer

30.3.19

MAC Addresses Targeted by the ASUS Supply Chain Attack Now Available

Vulnerebility

Bleepingcomputer

30.3.19

Oracle Sends Warning Emails About Paid-for Critical Java 8 Update

Vulnerebility

Bleepingcomputer

30.3.19

VMware Fixes Critical Vulnerabilities in ESXi, Workstation and Fusion

Vulnerebility

Bleepingcomputer

30.3.19

Toyota Security Breach Exposes Personal Info of 3.1 Million Clients

Incindent

Bleepingcomputer

30.3.19

Chromium Browsers to Get SVG Support for Site Favicons

IT

Bleepingcomputer

30.3.19

Only 10% of Tech Companies Protected From Phishing by DMARC Enforcement

Spam

Bleepingcomputer

30.3.19

IoT Attacks Escalating with a 217.5% Increase in Volume

IoT

Bleepingcomputer

30.3.19

Hackers stole $19 Million from Bithumb cryptocurrency exchange

Cryptocurrency

Securityaffairs

30.3.19

Expert disclosed two Zero-Day flaws in Microsoft browsers

Vulnerebility

Securityaffairs

30.3.19

Initial fixes for Cisco RV320 and RV325 routers were incomplete

Vulnerebility

Securityaffairs

30.3.19

Hackers Steal $19 Million From Bithumb Cryptocurrency Exchange

Cryptocurrency

Thehackernews

30.3.19

Ransom News

Ransom

Ransom

30.3.19

Zero-Day Bug Lays Open TP-Link Smart Home Router

Vulnerebility

Threatpost

30.3.19

Magento Patches Critical SQL Injection and RCE Vulnerabilities

Vulnerebility

Threatpost

30.3.19

Critical Rockwell Automation Bug in Drive Component Puts IIoT Plants at Risk

IoT

Threatpost

30.3.19

Toyota Motor Corporation (TMC) sales subsidiary and its affiliates suffered a data breach that exposed personal information of millions of customers in Japan.

Incindent

Securityaffairs

30.3.19

Commando VM – Using Windows for pen testing and red teaming

Security

Securityaffairs

30.3.19

Unpatched Zero-Days in Microsoft Edge and IE Browsers Disclosed Publicly

Vulnerebility

Thehackernews

30.3.19

Bots and botnets in 2018

BotNet

Securelist

30.3.19

Annotating Golang binaries with Cutter and Jupyter

Virus

SANS

29.3.19

Victims of attacks in the Philippines are filing lawsuit against company enabling them

BigBrothers

Securityaffairs

29.3.19

Magento fixed a critical Magento SQL Injection flaw

Vulnerebility

Securityaffairs

29.3.19

Malware researchers decrypted the Qrypter Payload

Virus

Securityaffairs

29.3.19

Google developer disclosed Zero-Day flaw in TP-Link SR20 Routers

Vulnerebility

Securityaffairs

29.3.19

Georgia Man Admits to Hacking Accounts of Athletes and Musicians

Hacking

Securityweek

29.3.19

Millions of Toyota Customers in Japan Hit by Data Breach

Incindent

Securityweek

29.3.19

Cisco Improperly Patched Exploited Router Vulnerabilities

Vulnerebility

Securityweek

29.3.19

Microsoft Launches Azure Security Center for IoT

IoT

Securityweek

29.3.19

Commando VM — Turn Your Windows Computer Into A Hacking Machine

Hacking

Thehackernews

29.3.19

Here's the List of ~600 MAC Addresses Targeted in Recent ASUS Hack

Hacking

Thehackernews

29.3.19

Critical Magento SQL Injection Vulnerability Discovered – Patch Your Sites

Vulnerebility

Thehackernews

29.3.19

New Shodan Monitor service allows tracking Internet-Exposed devices

Security

Securityaffairs

29.3.19

WinRAR CVE-2018-20250 flaw exploited in multiple campaigns

Vulnerebility

Securityaffairs

29.3.19

VMware Patches Flaws Disclosed at Pwn2Own 2019

Congress

Securityweek

29.3.19

Ex-NSA Contractor Pleads Guilty in Theft of Secret Documents

BigBrothers

Securityweek

29.3.19

Proxy Emerges From Stealth with $13.6 Million in Funding

Incindent

Securityweek

29.3.19

Critical Flaw Allows Hackers to Take Control of PowerFlex AC Drives

Vulnerebility

Securityweek

29.3.19

Ex-NSA Contractor Pleads Guilty to 20-Year-Long Theft of Classified Data

BigBrothers

Thehackernews

29.3.19

The return of the BOM

CyberCrime

Securelist

29.3.19

Lazarus Group Widens Tactics in Cryptocurrency Attacks

APT

Threatpost

29.3.19

FTC Demands Broadband Providers Reveal Data Handling Practices

BigBrothers

Threatpost

29.3.19

Grindr Poses National Security Risk, U.S. Gov Says

BigBrothers

Threatpost

29.3.19

Zero-Day TP-Link SR20 Router Vulnerability Disclosed by Google Dev

Vulnerebility

Bleepingcomputer

29.3.19

New Microsoft Edge May Have Support for Internet Explorer Tabs

IT

Bleepingcomputer

29.3.19

New Bill to Protect U.S. Senate Personal Devices, Accounts from Hackers

BigBrothers

Bleepingcomputer

29.3.19

Windows 10 Version 1809 Is Now in Broad Deployment, Available to Everyone

Vulnerebility

Bleepingcomputer

29.3.19

Microsoft Fixing Azure Service Failures Impacting Western Europe

Vulnerebility

Bleepingcomputer

29.3.19

Cisco Botches Fix for RV320, RV325 Routers, Just Blocks 'curl' User Agent

Vulnerebility

Bleepingcomputer

29.3.19

Vigilantes Counter Christchurch Manifesto with Weaponized Version

Security

Bleepingcomputer

29.3.19

Gustuff Android Malware Targets 100+ Banking and 32 Cryptocurrency Apps

Android

Bleepingcomputer

29.3.19

Serverless, shadow APIs and Denial of Wallet attacks

Attack

Net-security

29.3.19

Enterprises fear disruption to business critical applications, yet don’t prioritize securing them

Security

Net-security

29.3.19

Lessons learned from the many crypto hacks

Crypto

Net-security

29.3.19

CIOs admit certificate-related outages routinely impact critical business applications and services

Security

Net-security

29.3.19

Status of AI implementation at automotive organizations

IT

Net-security

28.3.19

Gustuff Android banking trojan targets 125+ banking, and 32 cryptocurrency apps

Android

Securityaffairs

28.3.19

Lazarus APT continues to target cryptocurrency businesses with Mac malware

APT

Securityaffairs

28.3.19

New Shodan Service Keeps Track of Internet-Exposed Systems

Security

Securityweek

28.3.19

Android Trojan Targets Banks, Crypto-Currencies, e-Commerce

Android

Securityweek

28.3.19

Ex-NSA Contractor Expected to Plead Guilty in Document Theft

BigBrothers

Securityweek

28.3.19

UK Identifies Fresh Huawei Risks to Telecom Networks

BigBrothers

Securityweek

28.3.19

WinRAR Vulnerability Exploited to Deliver New Malware

Vulnerebility

Securityweek

28.3.19

Elfin Hacking Group Targets Multiple U.S. and Saudi Arabian Firms

CyberCrime

Thehackernews

28.3.19

UNNAM3D Ransomware Locks Files in Protected Archives, Demands Gift Cards

Ransomware

Bleepingcomputer

28.3.19

Ransomware Hits Garage of Canadian Domain Registration Authority

Ransomware

Bleepingcomputer

28.3.19

Office Depot Pays $25 Million To Settle Deceptive Tech Support Lawsuit

IT

Bleepingcomputer

28.3.19

Microsoft Defender ATP Adds Tamper Protection

Safety

Bleepingcomputer

28.3.19

Mozila Releases Firefox 66.0.2 with Fixes for Windows 10, Office 365 Issues

Vulnerebility

Bleepingcomputer

28.3.19

Microsoft Retaliates Against APT35 Hacker Group by Seizing 99 Domains

APT

Bleepingcomputer

28.3.19

Microsoft Releases Windows 10 Build 18865 (20H1) With Narrator Fixes

Vulnerebility

Bleepingcomputer

28.3.19

20% of Industrial Control Systems Affected by Critical Vulnerabilities

Vulnerebility

Bleepingcomputer

28.3.19

Microsoft Plans to Add Native Caret Browsing to Chrome

IT

Bleepingcomputer

28.3.19

Microsoft's Application Guard Extension Protects Chrome and Firefox Users

Safety

Bleepingcomputer

28.3.19

Cisco botched patches for its RV320/RV325 routers

Vulnerebility

Net-security

28.3.19

Two white hats hack a Tesla, get to keep it

Vulnerebility blog

Eset

28.3.19

Global police arrest dozens of people in dark web sting

Cyber blog

Eset

28.3.19

Cisco Talos adds new Content Category

Security blog

Cisco Talos

28.3.19

Vulnerability Spotlight: Multiple vulnerabilities in GOG Galaxy Games

Vulnerebility blog

Cisco Talos

28.3.19

Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.

APT blog

Symantec

28.3.19

ASUS Software Updates Used for Supply Chain Attacks

Attack blog

Symantec

28.3.19

Karta – Matching Open Sources in Binaries

BigBrother blog

Checkpoint

28.3.19

WinRAR Zero-day Abused in Multiple Campaigns

Vulnerebility blog

FireEye

28.3.19

SilkETW: Because Free Telemetry is … Free!

Security blog

FireEye

28.3.19

Cisco Releases Flood of Patches for IOS XE, But Leaves Some Routers Open to Attack

Vulnerebility

Threatpost

28.3.19

Grindr Poses National Security Risk, U.S. Gov Says

BigBrothers

Threatpost

28.3.19

Threat Landscape for Industrial Automation Systems in H2 2018

ICS

Securelist

28.3.19

ASUS fixes supply chain of Live Update tool hit in Operation ShadowHammer

CyberCrime

Securityaffairs

28.3.19

Microsoft Takes Control of 99 Domains Used by Iranian Cyberspies

CyberSpy

Securityweek

28.3.19

NVIDIA Patches Serious Flaw in GeForce Experience Software

Vulnerebility

Securityweek

28.3.19

New Settings Let Hackers Easily Pentest Facebook, Instagram Mobile Apps

Social

Thehackernews

28.3.19

When it comes to file sharing, the cloud has very few downsides

Security

Net-security

28.3.19

Security remains a top concern for IoT executives, but small fixes can shore up ecosystem resilience

IoT

Net-security

28.3.19

Algorithms can now find bugs in computer chips before they are made

Security

Net-security

28.3.19

Third-party cyber risk management is a burden on human and financial resources

Security

Net-security

28.3.19

SMBs willing to invest more to protect their businesses

Security

Net-security

28.3.19

Running your Own Passive DNS Service

Security

SANS

27.3.19

Operation SaboTor – Police arrested 61 vendors and buyers in the dark web

CyberCrime

Securityaffairs

27.3.19

LUCKY ELEPHANT campaign targets South Asian governments

BigBrothers

Securityaffairs

27.3.19

Norsk Hydro estimates losses between $35M – $41M in the first week after cyberattack

Attack

Securityaffairs

27.3.19

A new AZORult C++ variant can establish RDP connections

Virus

Securityaffairs

27.3.19

Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018

ICS

Securityweek

27.3.19

North Korea-Linked Hackers Target macOS Users

Apple

Securityweek

27.3.19

Hackers Are Loving PowerShell, Study Finds

Hacking

Securityweek

27.3.19

Iran-Linked Cyberspy Group APT33 Continues Attacks on Saudi Arabia, U.S.

APT

Securityweek

27.3.19

ASUS Patches Hijacked System Update Utility

Hacking

Securityweek

27.3.19

Ransomware Behind Norsk Hydro Attack Takes On Wiper-Like Capabilities

Ransomware

Threatpost

27.3.19

Cybercriminals Have a Heyday with WinRAR Bug in Fresh Campaigns

CyberCrime

Threatpost

27.3.19

Gamers Beware: Nvidia Fixes High-Severity GeForce Experience Bug

Vulnerebility

Threatpost

27.3.19

The ransomware attack cost Norsk Hydro $40 million so far

Ransomware

Net-security

27.3.19

ASUS confirms server compromise, releases fixed Live Update tool

Vulnerebility

Net-security

27.3.19

U.S. Federal Reserve System Exposed to Increased Risk of Unauthorized Access

BigBrothers

Bleepingcomputer

27.3.19

NVIDIA Patches High Severity GeForce Experience Vulnerability

Vulnerebility

Bleepingcomputer

27.3.19

UC Browser for Android, Desktop Exposes 500+ Million Users to MiTM Attacks

Attack

Bleepingcomputer

27.3.19

ASUS Admits Its Live Update Utility Was Backdoored by APT Group

APT

Bleepingcomputer

27.3.19

Microsoft's Leaked Edge Insider Browser Works on Windows 7

IT

Bleepingcomputer

27.3.19

iOS 12.2 Patches Over 50 Security Vulnerabilities

Apple

Bleepingcomputer

27.3.19

Skype Experiencing Global Instant Messaging Delays

IT

Bleepingcomputer

27.3.19

Firefox to Import Windows Root Certs To Avoid Antivirus SSL Scanning Issues

Safety

Bleepingcomputer

27.3.19

Apple Introduces New Products During 'It's Show Time' Event

Apple

Bleepingcomputer

27.3.19

Emsisoft has Released a Decryptor for the Hacked Ransomware

Ransomware

Bleepingcomputer

27.3.19

ASUS Live Update Infected with Backdoor in Supply Chain Attack

Attack

Bleepingcomputer

27.3.19

Tesla Model 3 Hacked on the Last Day of Pwn2Own

Congress

Bleepingcomputer

27.3.19

The AZORult Legacy Lives On. Hello AZORult++!

Virus

Bleepingcomputer

27.3.19

Telegram Now Lets You Delete a Received Message From Sender's Device

Social

Bleepingcomputer

27.3.19

Microsoft's Leaked Edge Browser Should Make Google Worried

IT

Bleepingcomputer

27.3.19

VirusTotal Goes Retro with New ASCII Site for Older Browsers

Security

Bleepingcomputer

27.3.19

Experts found 36 vulnerabilities in the LTE protocol

Mobil

Securityaffairs

27.3.19

Whitehat settings allow white hat hackers to Test Facebook mobile apps

Social

Securityaffairs

27.3.19

The Ursnif Gangs keep Threatening Italy

Virus

Securityaffairs

27.3.19

EU Presents Plan for Safe 5G Amid Huawei Suspicions

BigBrothers

Securityweek

27.3.19

AZORult Variant Can Establish RDP Connections

Virus

Securityweek

27.3.19

Norsk Hydro May Have Lost $40M in First Week After Cyberattack

Attack

Securityweek

27.3.19

Apple Patches Vulnerabilities in iOS, macOS, Safari

Apple

Securityweek

27.3.19

Cyber Risk Assessment Firm Sayata Labs Emerges From Stealth

Cyber

Securityweek

27.3.19

Facebook Blocks More Accounts Over Influence Campaigns

Social

Securityweek

27.3.19

Build-time security: Block risk and security issues from production rings

Security

Net-security

27.3.19

Weighing the options: The role of cyber insurance in ransomware attacks

Ransomware

Net-security

27.3.19

Encrypted attacks growing steadily, cybercriminals are increasingly targeting non-standard ports

CyberCrime

Net-security

27.3.19

New blockchain system uses reputation to fend off 51 percent attacks

Attack

Net-security

27.3.19

61% of CIOs believe employees leak data maliciously

Security

Net-security

27.3.19

Does siloed data negatively impact your organization?

Security

Net-security

26.3.19

Apple iOS 12.2 Patches 51 Serious Flaws

Apple

Threatpost

26.3.19

ASUS Patches Live Update Bug That Allowed APT to Infect Thousands of PCs

APT

Threatpost

26.3.19

Cryptocurrency businesses still being targeted by Lazarus

Cryptocurrency

Securelist

26.3.19

Some ASUS Updates Drop Backdoors on PCs in ‘Operation ShadowHammer’

Attack

Threatpost

26.3.19

Drones are Quickly Becoming a Cybersecurity Nightmare

Cyber

Threatpost

26.3.19

Malware Payloads Hide in Images: Steganography Gets a Reboot

Virus

Threatpost

26.3.19

FEMA Exposes PII for Millions of Hurricane, Wildfire Survivors

BigBrothers

Threatpost

26.3.19

ThreatList: Remote Workers Threaten 1 in 3 Organizations

Security

Threatpost

26.3.19

Bugs in Grandstream Gear Lay Open SMBs to Range of Attacks

Attack

Threatpost

26.3.19

Operation ShadowHammer

APT

Securelist

26.3.19

What you can expect at the 10th annual HITB Security Conference in The Netherlands

Congress

Net-security

26.3.19

PewCrypt Ranson Tool

Anti-Ramson Tool

Anti-Ramson Tool

26.3.19

iOS 12.2 update addresses some troubling vulnerabilities

Apple

Securityaffairs

26.3.19

How to get back files encrypted by the Hacked Ransomware for free

Ransomware

Securityaffairs

26.3.19

Microsoft experts found high severity flaws in Huawei PCManager

Vulnerebility

Securityaffairs

26.3.19

Operation ShadowHammer – Supply-Chain attack hit ASUS users

Attack

Securityaffairs

26.3.19

Anubis II – malware and afterlife

Virus

Securityaffairs

26.3.19

Free Tools: spotting APTs through Malware streams

APT

Securityaffairs

26.3.19

Hackers raised fake tornado alarms in two Texas towns

Hacking

Securityaffairs

26.3.19

PewDiePie ransomware oblige users subscribe to PewDiePie YouTube channel

Ransomware

Securityaffairs

26.3.19

New Settings Help Hackers Test Facebook Mobile Apps

Social

Securityweek

26.3.19

LockerGoga Ransomware Neutralized by Shortcut Files

Ransomware

Securityweek

26.3.19

Microsoft Finds Privilege Escalation, Code Execution Flaws in Huawei Tool

Vulnerebility

Securityweek

26.3.19

Researchers Uncover Vulnerabilities in LTE Wireless Protocol

Vulnerebility

Securityweek

26.3.19

Supply-Chain Attack Used to Install Backdoors on ASUS Computers

Attack

Securityweek

26.3.19

Major U.S. Chemical Firms Hit by Cyberattack

BigBrothers

Securityweek

26.3.19

DHS Warns of Vulnerabilities in Medtronic Defibrillators

BigBrothers

Securityweek

26.3.19

Industrial Cybersecurity Firm CyberX Raises $18 Million

IT

Securityweek

26.3.19

Second Critical Crypto Flaw Found in Swiss E-Voting System

Vulnerebility

Securityweek

26.3.19

Warning: ASUS Software Update Server Hacked to Distribute Malware

Virus

Thehackernews

26.3.19

Latest iOS 12.2 Update Patches Some Serious Security Vulnerabilities

Apple

Thehackernews

26.3.19

Insecure UC Browser 'Feature' Lets Hackers Hijack Android Phones Remotely

Android

Thehackernews

26.3.19

Apple fixed some interesting bugs in iOS and macOS

Apple

Net-security

26.3.19

How to build an effective vulnerability management program

Safety

Net-security

26.3.19

Cybercriminals are increasingly using encryption to conceal and launch attacks

Cyber

Net-security

26.3.19

Guilty by association: The reality of online retail third-party data leaks

Security

Net-security

26.3.19

Less than 20% of IT pros have complete access to critical data in public clouds

Security

Net-security

26.3.19

Most companies help employees cover costs to obtain professional certifications

Security

Net-security

26.3.19

CFOs and CIOs must collaborate on digital transformation to remain competitive

Cyber

Net-security

26.3.19

Attackers compromised ASUS to deliver backdoored software updates

Hacking

Net-security

26.3.19

Secure workloads without slowing down your DevOps flows

Vulnerebility

Net-security

25.3.19

Ransomware or Wiper? LockerGoga Straddles the Line

Ransomware blog

Cisco Talos

25.3.19

Vulnerability Spotlight: Multiple Vulnerabilities in CUJO Smart Firewall, Das U-Boot, OCTEON SDK, Webroot BrightCloud

Vulnerebility blog

Cisco Talos

25.3.19

IPv6 unmasking via UPnP

Security blog

Cisco Talos

25.3.19

Facebook exposed millions of user passwords to employees

Social blog

Eset

25.3.19

Most second-hand thumb drives contain data from past owners

Security blog

Eset

25.3.19

I Still Didn’t See What You Did

Spam blog

Eset

25.3.19

Google hit with €1.49 billion antitrust fine by EU

Incident blog

Eset

25.3.19

Fake or Fake: Keeping up with OceanLotus decoys

APT blog

Eset

25.3.19

You should pick your Android security app wisely, test shows

OS Blog

Eset

25.3.19

I didn’t see what you did, redux

Spam blog

Eset

25.3.19

Facebook suffer most severe outage ever

Social blog

Eset

25.3.19

Telegram allows users to delete any sent/received message from both sides with no time limit

Social

Securityaffairs

25.3.19

Microsoft Defender APT now protects also macOS

Safety

Securityaffairs

25.3.19

Federal Emergency Management Agency’s (FEMA) data leak exposes data of 2.3M survivors

Incindent

Securityaffairs

25.3.19

WordPress Social Warfare plugin zero-day exploited in attacks

Exploit

Securityaffairs

25.3.19

Malware Static Analysis

Virus

Securityaffairs

25.3.19

Watchdog: FEMA Wrongly Released Personal Data of Victims

Incindent

Securityweek

25.3.19

Cisco Patches High Severity Vulnerabilities in IP Phones

Vulnerebility

Securityweek

25.3.19

"VelvetSweatshop" Maldocs: Shellcode Analysis

Virus

SANS

25.3.19

Employee cybersecurity essentials part 1: Passwords and phishing

Cyber

Net-security

25.3.19

What worries you the most when responding to a cybersecurity incident?

Incindent

Net-security

25.3.19

Consumers willing to dump apps that collect private data, but can’t tell which are doing so

Incindent

Net-security

25.3.19

2017 Cisco WebEx flaw increasingly leveraged by attackers, phishing campaigns rise

Vulnerebility

Net-security

25.3.19

The success of the digital workplace depends on the practical implementation of new technology

Security

Net-security

24.3.19

Ransom News

Ransom

Ransom

24.3.19

Chrome 74 Dark Mode Now Syncs with Windows 10 Color Settings

IT

Bleepingcomputer

24.3.19

FEMA Data Leak Exposes Personal Info of 2.3M Disaster Survivors

Incindent

Bleepingcomputer

24.3.19

70% of Ransomware Attacks Targeted SMBs, BEC Attacks Increased by 130%

Analysis

Bleepingcomputer

24.3.19

Microsoft is Adding a Graphing Mode to the Windows 10 Calculator

IT

Bleepingcomputer

24.3.19

Zero-Day WordPress Plugin Vulnerability Used to Add Malicious Redirects

Vulnerebility

Bleepingcomputer

24.3.19

Mozilla Firefox and Microsoft Edge Hacked on Second Day of Pwn2Own

Congress

Bleepingcomputer

24.3.19

2 Million Emails of 350K+ Clients Possibly Exposed in Oregon DHS Data Breach

Incindent

Bleepingcomputer

24.3.19

Windows 7 Gets an Extra Life With Windows Virtual Desktop

IT

Bleepingcomputer

24.3.19

13-Year-Old Allegedly Hacked Teacher Account to Create Student 'Hit List'

Hacking

Bleepingcomputer

24.3.19

An Outage is Bad for Facebook, but Great for PornHub

Social

Bleepingcomputer

24.3.19

Safari, Virtualbox, VMware Get Hacked During First Day of Pwn2Own 2019

Congress

Bleepingcomputer

24.3.19

Cisco Fixes High-Severity Vulnerabilities in IP Phone 77800, 8800

Vulnerebility

Bleepingcomputer

24.3.19

Facebook Employees Could Access Unencrypted Passwords for Millions of Users

Social

Bleepingcomputer

24.3.19

Microsoft Defender ATP Brings Enterprise Protection to Macs

Safety

Bleepingcomputer

24.3.19

Fake CDC Emails Warning of Flu Pandemic Push Ransomware

Ransomware

Bleepingcomputer

24.3.19

"VelvetSweatshop" Maldocs

Virus

SANS

23.3.19

Pwn2Own 2019 Day 3: Experts hacked Tesla 3 browser

Congress

Securityaffairs

23.3.19

Russian APT groups target European governments ahead of May Elections

APT

Securityaffairs

23.3.19

Medtronic’s implantable heart defibrillators vulnerable to hack

Vulnerebility

Securityaffairs

23.3.19

Cisco addresses High-Severity flaws in IP Phone 8800 and 7800 series

Vulnerebility

Securityaffairs

23.3.19

Pwn2Own 2019 Day 2 – Hackers earned $270,000 for Firefox, Edge hacks

Congress

Securityaffairs

23.3.19

FIN7 is back with a previously unseen SQLRat malware

CyberCrime

Securityaffairs

23.3.19

Pwn2Own 2019: Researchers Win Tesla After Hacking Its Browser

Congress

Securityweek

23.3.19

UK Police Federation Hit by Ransomware

Ransomware

Securityweek

23.3.19

Russian Hackers Target European Governments Ahead of Elections: FireEye

BigBrothers

Securityweek

23.3.19

Industry Reactions to Norsk Hydro Breach: Feedback Friday

Incindent

Securityweek

23.3.19

Microsoft Launches Defender ATP Endpoint Security for macOS

Safety

Securityweek

23.3.19

D.C. Attorney General Introduces New Data Security Bill

Security

Securityweek

23.3.19

Critical DoS Bug Bubbles Up in Facebook Fizz TLS 1.3 Project

Vulnerebility

Threatpost

23.3.19

WordPress Plugin Patched After Zero Day Discovered

Vulnerebility

Threatpost

23.3.19

Medtronic Defibrillators Have Critical Flaws, Warns DHS

Vulnerebility

Threatpost

23.3.19

Firefox and Edge Fall to Hackers on Day Two of Pwn2Own

Congress

Threatpost

23.3.19

Spycams Secretly Live-Streamed 1,600 Motel Guests

Privacy

Threatpost

23.3.19

Google Play Touts Certs in Quest For Enterprise Security

Android

Threatpost

23.3.19

Analysis: Drone Tech Creates New Type of Blended Threat

Security

Threatpost

23.3.19

Medtronic's Implantable Defibrillators Vulnerable to Life-Threatening Hacks

Vulnerebility

Thehackernews

23.3.19

Microsoft Announces Windows Defender ATP Antivirus for Mac

Safety

Thehackernews

23.3.19

Introduction to analysing Go binaries

Security

SANS

22.3.19

Facebook Stored Passwords in Plain Text For Years

Social

Threatpost

22.3.19

WordPress Plugin Patched After Zero Day Discovered

Vulnerebility

Threatpost

22.3.19

MyPillow and Amerisleep Targeted in Magecart Group Attacks

Attack

Threatpost

22.3.19

Hackers Take Down Safari, VMware and Oracle at Pwn2Own

Congress

Threatpost

22.3.19

Cisco Patches High-Severity Flaws in IP Phones

Vulnerebility

Threatpost

22.3.19

AZORult++: Rewriting history

Virus

Securelist

22.3.19

Norsk Hydro cyber attack: What’s new?

Attack

Net-security

22.3.19

Hacking microcontroller firmware through a USB

Hacking

Securelist

22.3.19

Facebook passwords stored in plain text, hundreds of millions users affected

Social

Securityaffairs

22.3.19

South Korea – 1,600 guests at 30 motels secretly live streamed

Incindent

Securityaffairs

22.3.19

Researchers Earn $270,000 for Firefox, Edge Hacks at Pwn2Own 2019

Congress

Securityweek

22.3.19

Global Security Spend Set to Grow to $133.8 Billion by 2022: IDC

Security

Securityweek

22.3.19

Facebook Mistakenly Stored Millions of Users' Passwords in Plaintext

Social

Thehackernews

22.3.19

New Wave of Extortion Emails: Central Intelligence Agency Case

BigBrothers

SANS

22.3.19

Worldwide spending on security solutions expected to continue growing

Security

Net-security

22.3.19

The privacy risks of pre-installed software on Android devices

Android

Net-security

22.3.19

Cost of telecommunications fraud estimated at €29 billion a year

CyberCrime

Net-security

22.3.19

Businesses have cybersecurity best practice guidelines but fail in practice

Cyber

Net-security

22.3.19

Quality Assurance and Testing is a bottleneck to implementing DevOps for many organizations

Security

Net-security

22.3.19

Experts to help boards tackle cybersecurity threats

Net-security

21.3.19

Instagram Testing Anti-Squatting Feature that Locks Old Usernames

Social

Bleepingcomputer

21.3.19

Putty 0.71 Fixes Weakness That Allows Fake Login Prompts

Vulnerebility

Bleepingcomputer

21.3.19

Lithuanian Pleads Guilty to Stealing $100 Million From Google, Facebook

BigBrothers

Bleepingcomputer

21.3.19

KB4493132 Update Notifies Windows 7 Users of End of Support Date

Vulnerebility

Bleepingcomputer

21.3.19

Windows 10 Insider Preview Build 18362 (19H1) Fixes Autoupdate of Apps

Vulnerebility

Bleepingcomputer

21.3.19

1,600 Hotel Guests Secretly Live Streamed to 4,000+ Subscribers

Incindent

Bleepingcomputer

21.3.19

Microsoft Releases Windows 10 Build 18860 (20H1) With Swiftkey Enhancements

Vulnerebility

Bleepingcomputer

21.3.19

Google Fined $1.7 Billion for Anti-Competitive Practices in Online Advertising

Security

Bleepingcomputer

21.3.19

Payment Card Thieves Slip into MyPillow and AmeriSleep Bedding Sites

Cyber

Bleepingcomputer

21.3.19

Google Photos Bug Exposed the Location & Time of Your Pictures

Vulnerebility

Bleepingcomputer

21.3.19

Fake eBay Ad in Google Search Led to Tech Support Scams

Spam

Bleepingcomputer

21.3.19

Facebook Stored Passwords of Hundreds of Millions Users in Plain Text

Social

Securityweek

21.3.19

Multiple Vulnerabilities Patched in PuTTY and LibSSH2

Vulnerebility

Securityweek

21.3.19

Facebook Pays Big Bounty for DoS Flaw in Fizz TLS Library

Social

Securityweek

21.3.19

FIN7 Hackers Use New Malware in Recent Attacks

Virus

Securityweek

21.3.19

Finland to Investigate Suspected Nokia Chinese Data Breach

Incindent

Securityweek

21.3.19

Many Vulnerabilities Found in Oracle's Java Card Technology

Vulnerebility

Securityweek

21.3.19

Schneider Electric Working on Patch for Flaw in Triconex TriStation Emulator

ICS

Securityweek

21.3.19

Pwn2Own 2019 Day 1 – participants hacked Apple, Oracle, VMware products

Congress

Securityaffairs

21.3.19

Experts found a critical vulnerability in the NSA Ghidra tool

Vulnerebility

Securityaffairs

21.3.19

Apple, Oracle, VMware Software Hacked at Pwn2Own 2019

Congress

Securityweek

21.3.19

Researchers Use UPnP Protocol to Unmask IPv6 Address

Security

Securityweek

21.3.19

Windows Hello Support Added to Firefox 66

Security

Securityweek

21.3.19

Multiple Vulnerabilities Fixed in CUJO Smart Firewall

Vulnerebility

Securityweek

21.3.19

Authentication Bypass Vulnerability Found in SoftNAS Cloud

Vulnerebility

Securityweek

21.3.19

Vulnerability in NSA's Reverse Engineering Tool Allows Remote Code Execution

Vulnerebility

Securityweek

21.3.19

Man Pleads Guilty Over $100M BEC Scheme Targeting Google, Facebook

Spam

Securityweek

21.3.19

Google Photos Flaw Allowed Hackers to Track Users

Hacking

Securityweek

21.3.19

European Government Websites Are Delivering Tracking Cookies to Visitors

BigBrothers

Securityweek

21.3.19

Norsk Hydro Restoring Systems, But Not Paying Ransom

Ransomware

Securityweek

21.3.19

Webinar Today: Managing Cyber Threats in the Era of Industry 4.0

Cyber

Securityweek

21.3.19

EU Fines Google for Anti-trust Breach

BigBrothers

Securityweek

21.3.19

[SI-LAB] LockerGoga is the most active ransomware that focuses on targeting companies

Ransomware

Securityaffairs

21.3.19

MyPillow and Amerisleep are the latest victims of Magecart gangs

Cyber

Securityaffairs

21.3.19

Putty users have to download a new release that fixes 8 flaws

Vulnerebility

Securityaffairs

21.3.19

SimBad malware infected million Android users through Play Store

Android

Securityaffairs

21.3.19

New MageCart Attacks Target Bedding Retailers My Pillow and Amerisleep

Attack

Thehackernews

21.3.19

Years-Long Phishing Campaign Targets Saudi Gov Agencies

Phishing

Threatpost

21.3.19

Mac-Focused Malvertising Campaign Abuses Google Firebase DBs

Apple

Threatpost

21.3.19

Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats

Mobil

Threatpost

21.3.19

New Wave of Extortion Emails: Central Intelligence Agency Case

Spam

SANS

21.3.19

You may trust your users, but can you trust their files?

Security

Net-security

21.3.19

Breaking the cybersecurity stalemate by investing in people

Cyber

Net-security

21.3.19

Average DDoS attack sizes decrease 85% due to FBI’s shutdown of DDoS-for-hire websites

Attack

Net-security

21.3.19

CEOs more likely to receive pay rise after a cyber attack. Wait, what?

Attack

Net-security

21.3.19

Most IT and security professionals feel vulnerable to insider threats

Vulnerebility

Net-security

21.3.19

Latest tactics used by cybercriminals to bypass traditional email security

Security

Net-security

20.3.19

Fin7 Ramps Up Campaigns With Two Fresh Malware Samples

Virus

Threatpost

20.3.19

Uber Deployed ‘Surfcam Spyware’ in Australia to Crush the Competition – Report

Virus

Threatpost

20.3.19

Attackers are exploiting IMAP to bypass MFA on Office 365, G Suite accounts

Attack

Net-security

20.3.19

Norsk Hydro cyber attack: What happened?

Cyber

Net-security

20.3.19

KDE Connect Kicked From Google Play, Returns Less the App It Was

Android

Bleepingcomputer

20.3.19

Heeere's Clippy! He's Back, but Only for Microsoft Teams.

Security

Bleepingcomputer

20.3.19

Netflix and AMEX Customers Actively Targeted by Phishing Campaigns

Phishing

Bleepingcomputer

20.3.19

DDoS-for-Hire Crackdown Leads to 85% Drop in Attack Sizes

Attack

Bleepingcomputer

20.3.19

Windows 10 Insider Preview Build 18361 (19H1) Still Has Some Bugs to Fix

Vulnerebility

Bleepingcomputer

20.3.19

Microsoft Antimalware Crashing With Error 0x800106ba on Windows 7 & 8

Vulnerebility

Bleepingcomputer

20.3.19

80% of the Top Exploited Vulnerabilities Targeted Microsoft in 2018

Vulnerebility

Bleepingcomputer

20.3.19

Business Email Compromise (BEC) Attacks Moving to Mobile

Spam

Bleepingcomputer

20.3.19

LockerGoga Ransomware Sends Norsk Hydro Into Manual Mode

Ransomware

Bleepingcomputer

20.3.19

Assessing Internal Network with JavaScript, Despite Same-Origin Policy

Virus

Bleepingcomputer

20.3.19

Fraud, Cyber Attacks, and Phishing Follow Christchurch Attack

Attack

Bleepingcomputer

20.3.19

Microsoft Edge Insider Closer to Release With New Installers

Security

Bleepingcomputer

20.3.19

Google+ Gives Final Warning to Backup Data Before It's Deleted

Social

Bleepingcomputer

20.3.19

89% of EU Government Sites Infiltrated by Ad Tracking Scripts

BigBrothers

Bleepingcomputer

20.3.19

New HTTPS Interception Tools Available from Cloudflare

Safety

Bleepingcomputer

20.3.19

JNEC.a Ransomware Spread by WinRAR Ace Exploit

Ransomware

Bleepingcomputer

20.3.19

AMD Believes SPOILER Vulnerability Does Not Impact Its Processors

Vulnerebility

Bleepingcomputer

20.3.19

PuTTY Releases Important Software Update to Patch 8 High-Severity Flaws

Vulnerebility

Thehackernews

20.3.19

Google Will Prompt European Android Users to Select Preferred Default Browser

Android

Thehackernews

20.3.19

Google white hat hacker found new bug class in Windows

Vulnerebility

Securityaffairs

20.3.19

The Document that Microsoft Eluded AppLocker and AMSI

Safety

Securityaffairs

20.3.19

Kaspersky Files Complaint Against Apple Over App Store Policy

Apple

Securityweek

20.3.19

Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack

Attack

Threatpost

20.3.19

Cardinal RAT Resurrected to Target FinTech Firms

Virus

Threatpost

20.3.19

Host of Flaws Found in CUJO Smart Firewall

Vulnerebility

Threatpost

20.3.19

Using AD to find hosts that aren't in AD - fun with the [IPAddress] construct!

Security

SANS

20.3.19

How the Google and Facebook outages could impact application security

Social

Net-security

20.3.19

A network is only as strong as its weakest shard

Security

Net-security

20.3.19

Unsurprisingly, only 14% of companies are compliant with CCPA

Security

Net-security

20.3.19

Nearly half of organizations lack the necessary talent to maintain security measures

Security

Net-security

20.3.19

Fewer than 28% of gov.uk using DMARC effectively in line with guidelines

Spam

Net-security

20.3.19

(ISC)² brings its Secure Summit to The Hague

ICS

Net-security

19.3.19

Experts observed the growth of hi-tech crime landscape in Asia in 2018

Crime

Securityaffairs

19.3.19

Aluminum producer Norsk Hydro hit by a massive cyber attack

Ransomware

Securityaffairs

19.3.19

New JNEC.a Ransomware delivered through WinRAR exploit

Ransomware

Securityaffairs

19.3.19

EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks

BigBrothers

Securityaffairs

19.3.19

Old Tech Spills Digital Dirt on Past Owners

Security

Threatpost

19.3.19

Norsk Hydro Calls Ransomware Attack ‘Severe’

Ransomware

Threatpost

19.3.19

Researcher Says NSA’s Ghidra Tool Can Be Used for RCE

BigBrothers

Threatpost

19.3.19

ThreatList: DDoS Attack Sizes Drop 85 Percent Post FBI Crackdown

BigBrothers

Threatpost

19.3.19

Industrial Cybersecurity Firm Nozomi Launches Research Department

Cyber

Securityweek

19.3.19

Cloudflare Launches New HTTPS Interception Detection Tools

Safety

Securityweek

19.3.19

Mobile App Security Firm Blue Cedar Raises $17 Million

Mobil

Securityweek

19.3.19

Microsoft Dominates 2018's Most Exploited Vulnerabilities

Vulnerebility

Securityweek

19.3.19

Researcher Finds Novel Bug Class in Windows Kernel

Vulnerebility

Securityweek

19.3.19

Aluminum Giant Norsk Hydro Hit by Ransomware

Ransomware

Securityweek

19.3.19

Norway's Norsk Hydro Hit by 'Extensive' Cyberattack

BigBrothers

Securityweek

19.3.19

Android Q — Google Adds New Mobile Security and Privacy Features

Android

Thehackernews

19.3.19

Ransomware Attack Forces Aluminum Manufacturer to Shutdown Systems Worldwide

Ransomware

Thehackernews

19.3.19

Libssh Releases Update to Patch 9 New Security Vulnerabilities

Vulnerebility

Thehackernews

19.3.19

Mirai variant picks up new tricks, expands list of targeted devices

BotNet

Net-security

19.3.19

A new development shows a potential shift to using Mirai to target enterprises

BotNet

Securityaffairs

19.3.19

Slack Launched Encryption Key Addon For Businesses

Security

Securityaffairs

19.3.19

GCHQ implements World War II cipher machines in encryption app CyberChef

BigBrothers

Securityaffairs

19.3.19

Could Beto O’Rourke become the first US President with a past of hacking?

BigBrothers

Securityaffairs

19.3.19

Hackers used Scanbox framework to hack Pakistani Govt’s passport application tracking site

BigBrothers

Securityaffairs

19.3.19

Google Open Sources Sandboxed API

Security

Securityweek

19.3.19

New Mirai Variant Targets Enterprise IoT Devices

BotNet

Securityweek

19.3.19

Slack Introduces Enterprise Key Management Tool

Security

Securityweek

19.3.19

Mirai Variant Adds Dozen New Exploits to Target Enterprise IoT Devices

BotNet

Thehackernews

19.3.19

Wireshark 3.0.0 and Npcap: Some Remarks

Security

SANS

19.3.19

The art of securing ERP applications: Protecting your critical business processes

Security

Net-security

19.3.19

Four key security tips when using any collaboration technology

Security

Net-security

19.3.19

The modern threat landscape and expanding CISO challenges

Security

Net-security

19.3.19

Tax season scaries: How to keep your data safe from insider threats

Security

Net-security

19.3.19

G Suite admins can now disable SMS and voice 2FA

Mobil

Net-security

19.3.19

Cyber preparedness essential to protect EU from large scale cyber attacks

BigBrothers

Net-security

18.3.19

'Shameless' Scammers Seek to Cash in on Christchurch Massacre

Spam

Securityweek

18.3.19

Android Q Brings New Privacy and Security Features

Android

Securityweek

18.3.19

EU Adopts New Response Protocol for Major Cyberattacks

BigBrothers

Securityweek

18.3.19

Chrome, Firefox Get Windows Defender Application Guard Extensions

Safety

Securityweek

18.3.19

Australia's Intelligence Agency Publishes its Vulnerability Disclosure Process

BigBrothers

Securityweek

18.3.19

Beto O'Rourke 'Mortified' Over Articles Written as Teen Member of Cult of the Dead Cow Hacker Group

CyberCrime

Securityweek

18.3.19

Dragos Acquires NexDefense, Releases Free ICS Assessment Tools

ICS

Securityweek

18.3.19

New Mirai Variant Comes with 27 Exploits, Targets Enterprise Devices

BotNet

Bleepingcomputer

18.3.19

New Sextortion Email Uses CIA Investigation as Scare Tactic

BigBrothers

Bleepingcomputer

18.3.19

Privacy Regulations Needed for Next-Gen Cars

Privacy

Threatpost

18.3.19

Mirai Variant Goes After Enterprise Systems

BotNet

Threatpost

18.3.19

Google Gives Users More Choice with Location-Tracking Apps

Privacy

Threatpost

18.3.19

Fourth Major Credential Spill in a Month Hits DreamMarket

Incindent

Threatpost

18.3.19

Cryptojacking of businesses’ cloud resources still going strong

Cryptocurrency

Net-security

18.3.19

Android Q will come with improved privacy protections

Android

Net-security

18.3.19

Google took down 2.3 billion bad ads in 2018,including 58.8M phishing ads

Phishing

Securityaffairs

18.3.19

gnosticplayers offers 26 Million new accounts for sale on the Dark Web

Incindent

Securityaffairs

18.3.19

Unprotected Elasticsearch DB exposed 33 Million job profiles in China

Incindent

Securityaffairs

18.3.19

Experts uncovered a malspam campaign using Boeing 737 Max crashes

Spam

Securityaffairs

18.3.19

Massive attacks bypass MFA on Office 365 and G Suite accounts via IMAP Protocol

Attack

Securityaffairs

18.3.19

Ukraine Ready to Take on Russian Election Hackers

BigBrothers

Securityweek

18.3.19

EU to Slap Google With Fresh Fine: Sources

BigBrothers

Securityweek

18.3.19

Round 4 — Hacker Puts 26 Million New Accounts Up For Sale On Dark Web

Incindent

Thehackernews

18.3.19

Video: Maldoc Analysis: Excel 4.0 Macro

Virus

SANS

18.3.19

Latest trends in automated threat intelligence-driven network security

Security

Net-security

18.3.19

Meet the new generation of white hats

Security

Net-security

18.3.19

Current phishing defense strategies and execution are not hitting the mark

Phishing

Net-security

18.3.19

2019 may be a record year for enterprise breaches, but secure collaboration tools could help

Incindent

Net-security

18.3.19

Security fatigue leads many to distrust personal data protection, can you blame them?

Privacy

Net-security

17.3.19

“CryptoSink” Campaign Deploys a New Miner Malware

Cryptocurrency blog

F5 Labs

17.3.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in February 2019

Security blog

F5 Labs

17.3.19

Intentionally Insecure: Poor Security Practices in the Cloud

Security blog

F5 Labs

17.3.19

Good Bots, Bad Bots, and What You Can Do About Both

BotNet blog

F5 Labs

17.3.19

Dissecting a NETWIRE Phishing Campaign's Usage of Process Hollowing

Phishing blog

FireEye

17.3.19

Breaking the Bank: Weakness in Financial AI Applications

Security blog

FireEye

17.3.19

Going ATOMIC: Clustering and Associating Attacker Activity at Scale

Attack blog

FireEye

17.3.19

APT40: Examining a China-Nexus Espionage Actor

APT blog

FireEye

17.3.19

FLARE Script Series: Recovering Stackstrings Using Emulation with ironstrings

Malware blog

FireEye

17.3.19

New Zealand Mobile Carriers Block 8chan, 4chan, and LiveLeak

Mobil

Bleepingcomputer

17.3.19

Spam Warns about Boeing 737 Max Crashes While Pushing Malware

Spam

Bleepingcomputer

17.3.19

Windows 10 Insider Preview Build 18358 Fixes Poor Game Performance

Vulnerebility

Bleepingcomputer

17.3.19

18-Year Old Arrested in Japan for Stealing $130k in Cryptocurrency

Cryptocurrency

Bleepingcomputer

17.3.19

257K Legal Documents Leaked By Unprotected Elasticsearch Server

Incindent

Bleepingcomputer

17.3.19

Insecure Database Exposes 800,000 Singapore Blood Donors

Incindent

Bleepingcomputer

17.3.19

Over 100 Exploits Found for 19-Year Old WinRAR RCE Bug

Exploit

Bleepingcomputer

17.3.19

Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection

Vulnerebility

Threatpost

17.3.19

GlitchPOS Malware Appears to Steal Credit-Card Numbers

Virus

Threatpost

17.3.19

Lenovo Patches Intel Firmware Flaws in Multiple Product Lines

Vulnerebility

Threatpost

17.3.19

Threatlist: IMAP-Based Attacks Compromising Accounts at ‘Unprecedented Scale’

Attack

Threatpost

17.3.19

Insider Threats Get Mean, Nasty and Very Personal

Security

Threatpost

17.3.19

US-CERT warns of New Zealand mosque shooting scams and malware campaigns

BigBrothers

Securityaffairs

17.3.19

Israeli Candidate for PM Benny Gantz hacked by Iranian cyberspies

CyberSpy

Securityaffairs

17.3.19

Maldoc: Excel 4.0 Macros

Virus

SANS

16.3.19

EPIC Promises to Fix Game Launcher after Privacy Concerns

Hacking

Bleepingcomputer

16.3.19

Google Chrome Adding Support For Nintendo Switch Gamepads

IT

Bleepingcomputer

16.3.19

New Tune Extension Turns Google Chrome Into a Safe Space

Security

Bleepingcomputer

16.3.19

Google Now Lets G Suite Admins Disable Insecure Phone 2FA

Mobil

Bleepingcomputer

16.3.19

Unsecured Database Exposed 33 Million Job Profiles in China

Incindent

Bleepingcomputer

16.3.19

Students Hack School System to Change Grades and Attendance

Hacking

Bleepingcomputer

16.3.19

Intel Fixes High Severity Vulnerabilities in Graphics Driver for Windows

Vulnerebility

Bleepingcomputer

16.3.19

Multi-Factor Auth Bypassed in Office 365 and G Suite IMAP Attacks

Attack

Bleepingcomputer

16.3.19

Malicious Javascript Active on FILA UK and Other Websites

Virus

Bleepingcomputer

16.3.19

Pakistani Government Site Compromised, Logs Visitor Keystrokes

BigBrothers

Bleepingcomputer

16.3.19

Ransom News

Ransom

Ransom

16.3.19

Windows Kernel Logic Bug Class: Access Mode Mismatch in IO Manager

Vulnerebility blog

Project Zero

16.3.19

Google Took Down 2.3 Billion Bad Ads in 2018

Security

Securityweek

16.3.19

E-Commerce Company Gearbest Leaked User Information

Incindent

Securityweek

16.3.19

China Does Not Ask Firms to Spy on Others: Premier

BigBrothers

Securityweek

16.3.19

Hackers Bypass MFA on Cloud Accounts via IMAP Protocol

Attack

Securityweek

16.3.19

Recently Patched WinRAR Flaw Exploited in APT Attacks

APT

Securityweek

16.3.19

G Suite Admins Can Now Disable Phone 2-SV

Mobil

Securityweek

16.3.19

Leading Israeli Candidate for PM Targeted by Iranian Hackers

Hacking

Securityweek

16.3.19

Details of Actively Exploited Windows Flaw Made Public

Exploit

Securityweek

16.3.19

NATO Takes Huawei Security Concerns Seriously: Stoltenberg

BigBrothers

Securityweek

16.3.19

WordPress 5.1.1 Patches Remote Code Execution Vulnerability

Vulnerebility

Securityweek

16.3.19

Code Execution Flaw Found in Sonatype Nexus Repository Manager

Vulnerebility

Securityweek

16.3.19

U.S. Senators Want Transparency on Senate Cyberattacks

BigBrothers

Securityweek

16.3.19

US Warns of Sophisticated Cyberattacks From Russia, China

BigBrothers

Securityweek

16.3.19

Default Account in Cisco CSPC Allows Unauthorized Access

Hacking

Securityweek

16.3.19

German legislative body wants to tighten penalties against black marketplace operators

BigBrothers

Securityaffairs

16.3.19

Secur Solutions Group data leak exposes 800,000 Singapore blood donors

Incindent

Securityaffairs

15.3.19

It is the first time in the history that civic groups hold a protest against a national CERT

Security

Securityaffairs

15.3.19

Recently fixed WinRAR bug actively exploited in the wild

Vulnerebility

Securityaffairs

15.3.19

Experts published details of the actively exploited CVE-2019-0808 Windows Flaw

Vulnerebility

Securityaffairs

15.3.19

A few binary plating 0-days for Windows

Vulnerebility

Securityaffairs

15.3.19

GlitchPOS PoS Malware appears in the cybercrime underground

Virus

Securityaffairs

15.3.19

Payment data of thousands of customers of UK and US online stores could have been compromised

Incindent

Securityaffairs

15.3.19

Torrent Risks: How to get infected through torrent with a good reputation

Security

Securityaffairs

15.3.19

Cisco addresses a critical static credential flaw in Common Services Platform Collector

Vulnerebility

Securityaffairs

15.3.19

CSRF flaw in WordPress potentially allowed the hack of websites

Vulnerebility

Securityaffairs

15.3.19

Cisco Patches Critical ‘Default Password’ Bug

Vulnerebility

Threatpost

15.3.19

Zero-Days in Counter-Strike Client Used to Build Major Botnet

BotNet

Threatpost

15.3.19

GlitchPOS Malware Appears to Steal Credit-Card Numbers

Virus

Threatpost

15.3.19

Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection

Vulnerebility

Threatpost

15.3.19

Threatlist: IMAP-Based Attacks Compromising Accounts at ‘Unprecedented Scale’

Attack

Threatpost

15.3.19

Insider Threats Get Mean, Nasty and Very Personal

Safety

Threatpost

15.3.19

Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested

Hacking

Threatpost

15.3.19

Patched WinRAR Bug Still Under Active Attack—Thanks to No Auto-Updates

Vulnerebility

Thehackernews

15.3.19

Binary Analysis with Jupyter and Radare2

Security

SANS

15.3.19

90% of consumers value additional security measures to verify mobile-based transactions

Security

Net-security

15.3.19

Unsecured Gearbest server exposes millions of shoppers and their orders

Incindent

Net-security

15.3.19

Thinking of threat intelligence as a contributing member of your security team

Security

Net-security

15.3.19

The quantum sea change: Navigating the impacts for cryptography

Crypto

Net-security

15.3.19

Do people with malicious intent present the biggest threat to personal data?

Virus

Net-security

15.3.19

Is AI really intelligent or are its procedures just averagely successful?

Security

Net-security

15.3.19

Data breach reports delayed as organizations struggle to achieve GDPR compliance

Privacy

Net-security

14.3.19

SimBad: A Rogue Adware Campaign On Google Play

OS Blog

Checkpoint

14.3.19

Operation Sheep: Pilfer-Analytics SDK in Action

OS Blog

Checkpoint

14.3.19

Beware of Bitcoin Investment Emails Pushing Clipboard Hijackers

Hacking

Bleepingcomputer

14.3.19

Microsoft Edge Insider Addons Store Discovered, 84 Extensions

Security

Bleepingcomputer

14.3.19

39% of All Counter-Strike 1.6 Servers Used to Infect Players

Virus

Bleepingcomputer

14.3.19

DMSniff Point-of-Sale Malware Silently Attacked SMBs For Years

Virus

Bleepingcomputer

14.3.19

Microsoft Releases Windows 10 Build 18855 (20H1) to Skip Ahead Users With Bug Fixes

Vulnerebility

Bleepingcomputer

14.3.19

Facebook and Instagram Down in Global Outage

Social

Bleepingcomputer

14.3.19

Windows 10 Build 18356 Bug Opting Users Out of Insider Program

Vulnerebility

Bleepingcomputer

14.3.19

Chinese IT Services Giant Harvests Contacts, Tracks Users

Privacy

Bleepingcomputer

14.3.19

Wordpress 5.1.1 Fixes XSS Vulnerability Leading to Website Takeovers

Vulnerebility

Bleepingcomputer

14.3.19

SimBad Adware Found in 210 Android Apps With Over 150M Installs

Android

Bleepingcomputer

14.3.19

Windows 7 Gets SHA-2 Support To Enable Future Updates

Vulnerebility

Bleepingcomputer

14.3.19

Microsoft March 2019 Patch Tuesday Includes Fixes for 64 Vulnerabilities

Vulnerebility

Bleepingcomputer

14.3.19

Unsecured API Leads to 'Yelp for Conservatives' App Data Leak

Security

Bleepingcomputer

14.3.19

CCleaner Professional Adds Software Updater Feature

Security

Bleepingcomputer

14.3.19

Two thirds of Android antimalware apps are ineffective or unreliable

Android

Net-security

14.3.19

Public-interest technology: Why companies should get involved

Security

Net-security

14.3.19

Microsoft Patch Tuesday – March 2019

Vulnerebility blog

Symantec

14.3.19

Several Cryptojacking Apps Found on Microsoft Store

Cryptocurrency blog

Symantec

14.3.19

Whitefly: Espionage Group has Singapore in Its Sights

BigBrother blog

Symantec

14.3.19

GlitchPOS: New PoS malware for sale

Malware blog

Cisco Talos

14.3.19

Microsoft Patch Tuesday — March 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

14.3.19

Vulnerability Spotlight: Privilege escalation bug in CleanMyMac X's helper service

Vulnerebility blog

Cisco Talos

14.3.19

The sights and sounds of Cisco Talos at RSA 2019

Exploit blog

Cisco Talos

14.3.19

Vulnerability Spotlight: Multiple local vulnerabilities in Pixar Renderman

Vulnerebility blog

Cisco Talos

14.3.19

Cisco, Talos tout importance of IoT security at RSA keynote

IoT blog

Cisco Talos

14.3.19

Vulnerability Spotlight: Remote code execution vulnerability in Antenna House Rainbow PDF Office Server Document Converter

Vulnerebility blog

Cisco Talos

14.3.19

Cisco Talos Honeypot Analysis Reveals Rise in Attacks on Elasticsearch Clusters

Attack blog

Cisco Talos

14.3.19

39% of all existing Counter-Strike 1.6 game servers online are malicious

Virus

Securityaffairs

14.3.19

DMSniff POS Malware has flown under the radar for at least four years

Virus

Securityaffairs

14.3.19

Many Security Apps on Google Play Inefficient, Fake: Study

Android

Securityweek

14.3.19

Telegram Gained 3 Million New Users During WhatsApp, Facebook Outage

Social

Thehackernews

14.3.19

New WordPress Flaw Lets Unauthenticated Remote Attackers Hack Sites

Social

Thehackernews

14.3.19

Intel Windows 10 Graphics Drivers Riddled With Flaws

Vulnerebility

Threatpost

14.3.19

Threat Groups SandCat, FruityArmor Exploiting Microsoft Win32k Flaw

Exploit

Threatpost

14.3.19

MAGA ‘Safe Space’ App Developer Threatens Security Researcher

Security

Threatpost

14.3.19

Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested

Crime

Threatpost

14.3.19

Three Ways DNS is Weaponized and How to Mitigate the Risk

Security

Threatpost

14.3.19

CVE-2019-0797 Windows Zero-Day exploited by FruityArmor and SandCat APT Groups

APT

Securityaffairs

14.3.19

Modular Cryptojacking malware uses worm abilities to spread

Cryptocurrency

Securityaffairs

14.3.19

Russia attempts to prevent Russian citizens from using ProtonMail

BigBrothers

Securityaffairs

14.3.19

Facebook Faces Criminal Probe of Data Deals: Report

Social

Securityweek

14.3.19

Multiple Security Flaws Discovered in Visitor Management Systems

Vulnerebility

Securityweek

14.3.19

Serious Crypto Flaw Affects Swiss, Australian E-Voting Systems

BigBrothers

Securityweek

14.3.19

Windows Zero-Day Exploited by FruityArmor, SandCat Threat Groups

Exploit

Securityweek

14.3.19

Zero-Day Flaws in Counter-Strike 1.6 Let Malicious Servers Hack Gamers' PCs

Vulnerebility

Thehackernews

14.3.19

Firefox Send — Free Encrypted File Transfer Service Now Available For All

Security

Thehackernews

14.3.19

Tip: Ghidra & ZIP Files

Security

SANS

14.3.19

Malspam pushes Emotet with Qakbot as the follow-up malware

Virus

SANS

14.3.19

Moving from traditional on-premise solutions to cloud-based security

Security

Net-security

14.3.19

Protecting applications against DFA attacks

Attack

Net-security

14.3.19

Businesses recognize the need for AI & ML tools in cybersecurity

Cyber

Net-security

14.3.19

Companies unprepared for PSD2, stricter EU requirements will drive fraud to other regions

BigBrothers

Net-security

14.3.19

Urgent need for IT security legal framework in Europe

Net-security

13.3.19

Spam and phishing in 2018

Spam

Securelist

13.3.19

The fourth horseman: CVE-2019-0797 vulnerability

Vulnerebility

Securelist

13.3.19

Researchers expose massive mobile adware and data stealing campaigns with 250 million downloads

Incindent

Net-security

13.3.19

Mozilla releases Firefox Send, a free encrypted file transfer service

Security

Net-security

13.3.19

March 2019 Patch Tuesday: Microsoft patches two actively exploited Windows flaws

Vulnerebility

Net-security

13.3.19

Adobe Patches Critical Photoshop, Digital Edition Flaws

Vulnerebility

Threatpost

13.3.19

Microsoft Patches Two Win32k Bugs Under Active Attack

Attack

Threatpost

13.3.19

Unpatched Windows Bug Allows Attackers to Spoof Security Dialog Boxes

Vulnerebility

Threatpost

13.3.19

Federal Focus on Cyber Plays Out in President’s Budget, IoT Legislation

IoT

Threatpost

13.3.19

ThreatList: Phishing Attacks Doubled in 2018

Phishing

Threatpost

13.3.19

Microsoft Patch Tuesday updates for March 2019 patches two Windows flaws exploited in targeted attacks

Vulnerebility

Securityaffairs

13.3.19

Users claim Samsung Galaxy S10 Face Recognition can be bypassed

Mobil

Securityaffairs

13.3.19

Venezuelan 'Cyber-Attack' Possible But Unlikely, Experts Say

BigBrothers

Securityweek

13.3.19

Cloudflare Raises $150 Million

IT

Securityweek

13.3.19

New Variant of Ursnif Targeting Japan

Virus

Securityweek

13.3.19

Microsoft Patches Two Windows Flaws Exploited in Targeted Attacks

Exploit

Securityweek

13.3.19

F5 Networks to Acquire NGINX for $670 Million

IT

Securityweek

13.3.19

Malspam pushes Emotet with Qakbot as the follow-up malware

Virus

SANS

13.3.19

The threat of quantum computers and the solutions that can protect us today

Safety

Net-security

13.3.19

Network performance requirements grow in the era of 5G: Are your security processes ready?

Mobil

Net-security

13.3.19

How susceptible are hospital employees to phishing attacks?

Phishing

Net-security

13.3.19

Data management challenges are having a severe impact on profitability

Security

Net-security

13.3.19

Exploitation of vulnerabilities in Moxa industrial switches could disrupt communication between ICS components

ICS

Net-security

12.3.19

North Korean Hackers Behind $571M Crypto Heists Says UN Report

BigBrothers

Bleepingcomputer

12.3.19

Windows 10 Insider Preview Build 18356 Released Along With Phone Screen Feature

Vulnerebility

Bleepingcomputer

12.3.19

Windows 7 KB4489878 and Windows 8.1 KB4489881 Released

Vulnerebility

Bleepingcomputer

12.3.19

Windows 10 March 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

12.3.19

Microsoft Releases the March 2019 Updates for Office

Vulnerebility

Bleepingcomputer

12.3.19

Malware Spreads As a Worm, Uses Cryptojacking Module to Mine for Monero

Cryptocurrency

Bleepingcomputer

12.3.19

Microsoft Testing Android Screen Mirroring on Windows 10 PCs

Android

Bleepingcomputer

12.3.19

Adobe Releases March 2019 Security Fixes for Photoshop CC and Digital Editions

Vulnerebility

Bleepingcomputer

12.3.19

Yatron Ransomware Plans to Spread Using EternalBlue NSA Exploits

Ransomware

Bleepingcomputer

12.3.19

Adobe Patch Tuesday updates address critical in Photoshop, Digital Editions

Vulnerebility

Securityaffairs

12.3.19

Mysterious open database included ‘BreedReady’ status for 1.8 Million Women

Incindent

Securityaffairs

12.3.19

Apex Legends for Android: a Fake App could Compromise your Smartphone

Android

Securityaffairs

12.3.19

Senators Reintroduce IoT Cybersecurity Improvement Bill

BigBrothers

Securityweek

12.3.19

Germany to Consult US Over Huawei Security Fears: Merkel

BigBrothers

Securityweek

12.3.19

Box Enterprise Shared Links Leak Sensitive Information

Security

Securityweek

12.3.19

Ten Principles for a New Approach to Regulating the Internet

Security

Securityweek

12.3.19

Pro-Brexit Twitter Manipulation Continues

Social

Securityweek

12.3.19

Adobe Patches Flaws in Sandbox, Photoshop, Digital Editions

Vulnerebility

Securityweek

12.3.19

NASA's Cybersecurity Program Gets Failing Grade

BigBrothers

Securityweek

12.3.19

Microsoft Releases Patches for 64 Flaws — Two Under Active Attack

Vulnerebility

Thehackernews

12.3.19

Adobe Releases Patches for Critical Flaws in Photoshop CC and Digital Edition

Vulnerebility

Thehackernews

12.3.19

Windows 10 Now Automatically Uninstalls Updates That Cause Problems

IT

Thehackernews

12.3.19

Marriott CEO reveals more details about the massive data breach

Incindent

Net-security

12.3.19

Is your company leaking sensitive data via its Box account?

Security

Net-security

12.3.19

Cuckoo SandBox on AWS

APT blog

Checkpoint

12.3.19

Gaming industry still in the scope of attackers in Asia

Spam blog

Eset

12.3.19

Over 2 billion records exposed by email marketing firm

Incident blog

Eset

12.3.19

Windows 10 to Automatically Remove Updates That Cause Problems

IT

Bleepingcomputer

12.3.19

Google Chrome to Block Drive-By-Downloads from Ad Frames

Safety

Bleepingcomputer

12.3.19

NVIDIA Removing Support For 3D Vision in Game Ready Drivers

IT

Bleepingcomputer

12.3.19

Medical IoT Devices with Outdated Operating Sytems Exposed to Hacking

IoT

Bleepingcomputer

12.3.19

New "Final Warning" Sextortion Emails State Adult Sites Infected You

Spam

Bleepingcomputer

12.3.19

Samsung Galaxy S10 Face Recognition Can Easily Be Bypassed

Mobil

Bleepingcomputer

12.3.19

Creepy Database Lists 'BreedReady' Status for 1.8 Million Women

Incindent

Bleepingcomputer

12.3.19

Vulnerability research hub Crowdfense is willing to pay $3 Million for iOS, Android zero-day exploits

Android

Securityaffairs

12.3.19

Moxa Industrial Switches plagued with several flaws

ICS

Securityaffairs

12.3.19

Georgia County Criticized Over $400K Ransomware Payment

Ransomware

Securityweek

12.3.19

Researcher Claims Iranian APT Behind 6TB Data Heist at Citrix

APT

Threatpost

12.3.19

Google Patches Critical Bluetooth RCE Bug

Android

Threatpost

12.3.19

Facebook Alleges Two Ukrainians Scraped Data From 63K Profiles

Social

Threatpost

12.3.19

Forrester: Ransomware Set to Resurge As Firms Pay Off Attacks

Ransomware

Threatpost

12.3.19

What happened to trust and transparency in cybersecurity?

Cyber

Net-security

12.3.19

The reality of container escapes

Safety

Net-security

12.3.19

IT managers can’t ignore endpoints because most cyberattacks start ther

Safety

Net-security

12.3.19

Researchers unveil February 2019’s most wanted malware

Virus

Net-security

12.3.19

Hidden third-party tags could be leaving Fortune 100 companies at risk

Security

Net-security

11.3.19

Samsung Galaxy S10 Face Recognition Can Easily Be Bypassed

Vulnerebility

Securityaffairs

11.3.19

Creepy Database Lists 'BreedReady' Status for 1.8 Million Women

Incindent

Securityaffairs

11.3.19

Equifax Was Aware of Cybersecurity Weaknesses for Years, Senate Report Says

Analysis

Securityweek

11.3.19

GIF Attack on Facebook Messenger Earned Hacker $10,000

Social

Securityweek

11.3.19

Research Firm Offers $3 Million for iOS, Android 0-Days

Android

Securityweek

11.3.19

Mark Zuckerberg Describes a New Privacy-Centric Facebook

Social

Securityweek

11.3.19

BEWARE – New 'Creative' Phishing Attack You Really Should Pay Attention To

Phishing

Thehackernews

11.3.19

Game Development Companies Backdoored in Supply-Chain Attacks

Attack

Bleepingcomputer

11.3.19

Severe RCE vulnerability affected popular StackStorm Automation Software

Vulnerebility

Securityaffairs

11.3.19

STOP ransomware encrypts files and steals victim’s data

Ransomware

Securityaffairs

11.3.19

Google Launches New Cloud Security Services

Safety

Securityweek

11.3.19

Many Vulnerabilities Discovered in Moxa Industrial Switches

ICS

Securityweek

11.3.19

Microsoft Asks Users to Call Windows 10 Devs About ALT+TAB Feature

IT

Bleepingcomputer

11.3.19

STOP Ransomware Installing Password Stealing Trojans on Victims

Ransomware

Bleepingcomputer

11.3.19

A predatory tale: Who’s afraid of the thief?

Cyber

Securelist

11.3.19

Crooks use The Pirate Bay to spread PirateMatryoshka malware via reputed seeders

Virus

Securityaffairs

11.3.19

Severe Flaw Disclosed In StackStorm DevOps Automation Software

Vulnerebility

Thehackernews

11.3.19

Saudi caller ID Dalil app exposed data of more than 5 million users

Incindent

Securityaffairs

11.3.19

Venezuelan Minister declares Venezuela’s Blackout may be caused by cyberattack carried by US

BigBrothers

Securityaffairs

11.3.19

Attack on Software Giant Citrix Attributed to Iranian Hackers

Attack

Securityweek

11.3.19

Venezuela's Maduro Says Cyber Attack Prevented Power Restoration

Cyber

Securityweek

11.3.19

Citrix Data Breach – Iranian Hackers Stole 6TB of Sensitive Data

Incindent

Thehackernews

11.3.19

BigBobRoss Remove Tool

Anti-Ransom Tool

Anti-Ransom Tool

11.3.19

Wireshark 3.0.0 and Npcap

Safety

SANS

11.3.19

RSA Conference 2019: The Expanding Automation Platform Attack Surface

Congress

Threatpost

11.3.19

Free decrypters for BigBobRoss ransomware released

Ransomware

Net-security

11.3.19

Webinar – DevSecOps at Hulu: When security and DevOps meet

Security

Net-security

11.3.19

The impact of spear phishing on organizations and how to combat this growing threa

Phishing

Net-security

11.3.19

How can healthcare organizations remedy their cybersecurity ailments?

Cyber

Net-security

11.3.19

What can we expect of this March Patch Tuesday?

Vulnerebility

Net-security

11.3.19

Cybersecurity skills gap worsens, security teams are understaffed

Cyber

Net-security

10.3.19

Malicious HTA Analysis by a Reader

Virus

SANS

10.3.19

Jackson County paid $400,000 to crooks after ransomare attack

Ransomware

Securityaffairs

10.3.19

Stop Decryptor

Anti-Ransom Tool

Anti-Ransom Tool

10.3.19

RSA 2019 Presention

Conference

Conference

10.3.19

Ransomware Attack on Jackson County Gets Cybercriminals $400,000

Ransomware

Bleepingcomputer

10.3.19

Cookie Walls Do Not Comply with the GDPR According to Dutch Watchdog

Privacy

Bleepingcomputer

10.3.19

Vulnerabilities in car alarm systems exposed 3 million cars to hack

Vulnerebility

Securityaffairs

10.3.19

A Comparison Study of SSH Port Activity - TCP 22 & 2222

Security

SANS

9.3.19

Smart Car Alarms Ironically Expose Millions of Vehicles to Remote Hijacking

Hacking

Bleepingcomputer

9.3.19

Citrix Learns About Internal Network Security Breach from FBI

BigBrothers

Bleepingcomputer

9.3.19

1.8 Million Users Attacked by Android Banking Malware, 300% Increase Since 2017

Virus

Bleepingcomputer

9.3.19

Windows 10 Insider Preview Build 18353 Released With Sandbox Improvements

Vulnerebility

Bleepingcomputer

9.3.19

Insecure Database Leads to Over 800 Million Records Data Breach

Incindent

Bleepingcomputer

9.3.19

Ransom News

Ransom

Ransom

9.3.19

More than 2 billion records exposed online by email validation biz Verifications.io

Incindent

Securityaffairs

9.3.19

SLUB Backdoor leverages GitHub and Slack in targeted attacks

Virus

Securityaffairs

9.3.19

FBI informed software giant Citrix of a security breach

BigBrothers

Securityaffairs

9.3.19

Evading AV with JavaScript Obfuscation

Virus

Securityaffairs

9.3.19

Flaws in Smart Alarms Exposed Millions of Cars to Dangerous Hacking

Vulnerebility

Securityweek

9.3.19

How China Exploits Social Media to Influence American Public

Exploit

Securityweek

9.3.19

Slack, GitHub Abused by New SLUB Backdoor in Targeted Attacks

Virus

Securityweek

9.3.19

RSAC 2019: The Dark Side of Machine Learning

Hacking

Threatpost

9.3.19

RSA Conference 2019 Recap

Congress

Threatpost

9.3.19

RSA Conference 2019: Operational Technology Widens Supply Chain Attack Surface

Congress

Threatpost

9.3.19

Citrix Falls Prey to Password-Spraying Attack

Attack

Threatpost

9.3.19

RSA Conference 2019: Emotet Takes Aim at Latin America

Congress

Threatpost

9.3.19

RSA Conference 2019: Firms Continue to Fail at IoT Security

Congress

Threatpost

8.3.19

Android Messaging: A Few Bugs Short of a Chain

OS Blog

Project Zero

8.3.19

PXE Dust: Finding a Vulnerability in Windows Servers Deployment Services

Vulnerebility blog

Checkpoint

8.3.19

Flaws in smart car alarms exposed 3 million cars to hijack

Vulnerebility blog

Eset

8.3.19

RSA conference, USA 2019: Keynotes and key words

Security blog

Eset

8.3.19

RSA 2019: Protecting your privacy in a NIST and GDPR world

Security blog

Eset

8.3.19

International Women’s Day 2019: How can we be better allies?

Cyber blog

Eset

8.3.19

Latest Chrome update plugs a zero-day hole

Vulnerebility blog

Eset

8.3.19

RSA – IoT security meets SMB

IoT blog

Eset

8.3.19

Payment processors remain phishers’ favorites

Phishing blog

Eset

8.3.19

Teen earns US$1 million in bug bounties

Security blog

Eset

8.3.19

Researchers create system that predicts vulnerability severity from tweets

Vulnerebility

Net-security

8.3.19

Google discloses Windows zero-day actively exploited in targeted attacks

Vulnerebility

Securityaffairs

8.3.19

Zerodium $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Security

Securityaffairs

8.3.19

Google Discloses Actively Exploited Windows Vulnerability

Vulnerebility

Securityweek

8.3.19

Analysing meterpreter payload with Ghidra

Security

SANS

8.3.19

Zero-day Chrome/Windows combo actively exploited in the wild

Vulnerebility

Net-security

8.3.19

Growing mobile cybersecurity incidents spur plans for increased security investment

Cyber

Net-security

8.3.19

Google Advises Upgrade to Windows 10 to Fix Windows 7 Zero-Day Bug

Vulnerebility

Bleepingcomputer

8.3.19

What We Know About Microsoft’s Chromium-Based Edge Browser

IT

Bleepingcomputer

8.3.19

Russia Passes Bill That Outlaws Disrespecting Russian Officials Online

BigBrothers

Bleepingcomputer

8.3.19

Facebook Removes Campaigns Used to Sow Discord in UK and Romania

Social

Bleepingcomputer

8.3.19

Notepad++ No Longer Code Signed, Dev Won't Support Overpriced Cert Industry

IT

Bleepingcomputer

8.3.19

New SLUB Backdoor Uses Slack, GitHub as Communication Channels

Virus

Bleepingcomputer

8.3.19

Windows 10 KB4482887 Cumulative Update Causing Major Stuttering in Games

Vulnerebility

Bleepingcomputer

8.3.19

FTC Issue PSA on Social Security Number Scams

Social

Bleepingcomputer

8.3.19

#Opfail: Phisher Attaches Powershell Exec Instead of Malware

Phishing

Bleepingcomputer

8.3.19

Cisco security updates fix dozens of flaws in Nexus Switches

Vulnerebility

Securityaffairs

8.3.19

Zerodium Offers $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Security

Securityweek

8.3.19

Man Admits to Hacking Minnesota Databases Over Cop Acquittal

Hacking

Securityweek

8.3.19

RSA Conference 2019: Firms Continue to Fail at IoT Security

Congress

Threatpost

8.3.19

RSA Conference 2019: Ultrasound Hacked in Two Clicks

Congress

Threatpost

8.3.19

RSAC 2019: For Domestic Abuse, IoT Devices Pose New Threat

IoT

Threatpost

8.3.19

IoT devices using CoAP increasingly used in DDoS attacks

IoT

Net-security

7.3.19

12,449 Data Breaches Confirmed in 2018, a 424% Increase Over the Previous Year

Incindent

Bleepingcomputer

7.3.19

Unpatched UPnP-Enabled Devices Left Exposed to Attacks

Attack

Bleepingcomputer

7.3.19

StealthWorker Malware Uses Windows, Linux Bots to Hack Websites

Virus

Bleepingcomputer

7.3.19

Microsoft Releases Windows 10 Build 18850 (20H1) to Skip Ahead Users

Vulnerebility

Bleepingcomputer

7.3.19

Microsoft Open Sources the Windows 10 Calculator on GitHub

IT

Bleepingcomputer

7.3.19

Google Chrome Update Patches Zero-Day Actively Exploited in the Wild

Vulnerebility

Bleepingcomputer

7.3.19

NSA's Ghidra Reverse Engineering Framework Stirs Up Malware Researchers

BigBrothers

Bleepingcomputer

7.3.19

Hackers Revive Microsoft Office Equation Editor Exploit

Exploit

Bleepingcomputer

7.3.19

Adware Apps in Google Play Simulate Uninstall for Persistence

Android

Bleepingcomputer

7.3.19

Cloudflare Deploys Firewall Rule to Block New Drupal Exploits

Safety

Bleepingcomputer

7.3.19

Malicious Mobile Software Attacks Almost Doubled in 2018

Virus

Bleepingcomputer

7.3.19

Jokeroo Ransomware-as-a-Service Offers Multiple Membership Packages

Ransomware

Bleepingcomputer

7.3.19

Microsoft Releases Windows 10 Build 18351 (19H1) With Only Bug Fixes

Vulnerebility

Bleepingcomputer

7.3.19

Screenshots of Microsoft’s Chromium-Based Edge Browser Leaked Online

Incindent

Bleepingcomputer

7.3.19

Photo gallery: RSA Conference 2019 Expo, part four

Congress

Net-security

7.3.19

Windows Servers in danger of being compromised via WDS bug

Vulnerebility

Net-security

7.3.19

For enterprises, malware is the most expensive type of attack

Virus

Net-security

7.3.19

Users of Cisco switches, security appliances need to get patching

Vulnerebility

Net-security

7.3.19

StealthWorker Malware Uses Windows, Linux Bots to Hack Websites

Virus

Securityaffairs

7.3.19

Study Finds Rampant Sale of SSL/TLS Certificates on Dark Web

Security

Securityweek

7.3.19

Organizations Not Positioned for Success in Tackling Cyber Demands: Deloitte

Cyber

Securityweek

7.3.19

Hungarian Judge OKs Extradition of Portuguese Hacker

Crime

Securityweek

7.3.19

Financial Cyberthreats in 2018

CyberCrime

Securelist

7.3.19

Pirate matryoshka

Hacking

Securelist

7.3.19

Microsoft warns of economic damages caused by Iran-linked hackers

CyberSpy

Securityaffairs

7.3.19

Too much UPnP-enabled connected devices still vulnerable to cyber attacks

Attack

Securityaffairs

7.3.19

Cisco Patches Two Dozen Serious Flaws in Nexus Switches

Vulnerebility

Securityweek

7.3.19

Several Industrial Automation Products Affected by WibuKey DRM Flaws

ICS

Securityweek

7.3.19

How are execs tackling cyber risk that comes with digital transformation?

Cyber

Net-security

7.3.19

Keep an Eye on Disposable Email Addresses

Spam

SANS

7.3.19

Whitefly espionage group was linked to SingHealth Singapore Healthcare Breach

CyberSpy

Securityaffairs

7.3.19

Cybaz-Yoroi ZLAB shed the light on Op. ‘Pistacchietto’: An Italian Job

Cyber

Securityaffairs

7.3.19

Google Chrome Zero-Day Vulnerability CVE-2019-5786 actively exploited in the wild

Vulnerebility

Securityaffairs

7.3.19

Coinbase CEO confirms that Ex-Hacking Team members will ‘Transition Out’ of Neutrino

BigBrothers

Securityaffairs

7.3.19

Iranian Hackers Caused Losses in Hundreds of Millions: Report

CyberSpy

Securityweek

7.3.19

China's Huawei Sues US Over Federal Ban on Its Products

BigBrothers

Securityweek

7.3.19

Cybersecurity Startup PolySwarm Launches Malware Detection Marketplace

Security

Securityweek

7.3.19

Virsec Launches Application Memory Firewall

Safety

Securityweek

7.3.19

Fortanix Releases Open Source SDK for Intel SGX Enclaves

Safety

Securityweek

7.3.19

New CyberArk Solution Secures AWS Accounts

Safety

Securityweek

7.3.19

Google Patches Actively Exploited Chrome Vulnerability

Vulnerebility

Securityweek

7.3.19

Massive Singapore Healthcare Breach Linked to 'Whitefly' Cyberspy Group

Incindent

Securityweek

7.3.19

Secureworks Launches Orchestration and Automation Solution

Safety

Securityweek

7.3.19

NTT Acquires WhiteHat Security

BigBrothers

Securityweek

7.3.19

NSA Makes Reverse Engineering Tool Freely Available

BigBrothers

Securityweek

7.3.19

New Google Chrome Zero-Day Vulnerability Found Actively Exploited in the Wild

Vulnerebility

Thehackernews

7.3.19

RSA Conference 2019: UniKey Patches BleedingBit Flaws Granting Access To Hotel Rooms, Cars

Congress

Threatpost

7.3.19

RSA Conference 2019: Cryptographers’ Panel Decries Adi Shamir’s Visa Issues

Congress

Threatpost

7.3.19

RSA Conference 2019: The Sky’s the Limit For Satellite Hacks

Congress

Threatpost

7.3.19

RSA Conference 2019: How to Defend Against an AI vs AI ‘Flash War’

Congress

Threatpost

7.3.19

Organizations still ignoring a large piece of their cybersecurity defense

Cyber

Net-security

7.3.19

Photo gallery: RSA Conference 2019 Expo, part three

Congress

Net-security

6.3.19

RSA Conference 2019: Data-Wiping Cyberattacks Plague Financial Firms

Congress

Threatpost

6.3.19

RSA Conference 2019: Cryptographers’ Panel Decries Adi Shamir’s Visa Issues

Congress

Threatpost

6.3.19

RSA Conference 2019: Microsoft, Google, Twitter on Federal Privacy Regs

Congress

Threatpost

6.3.19

Google plugs Chrome zero-day exploited in the wild

Vulnerebility

Net-security

6.3.19

NSA unveils Ghidra reverse engineering tool at RSA Conference 2019

BigBrothers

Net-security

6.3.19

Sale of SSL/TLS certificates on the dark web is rampant

Security

Net-security

6.3.19

SPOILER CPU Vulnerebility

Papers

Papers

6.3.19

NSA released Ghidra, its multi-platform reverse engineering framework

BigBrothers

Securityaffairs

6.3.19

[SI-LAB] #OpJerusalem 2019 – JCry ransomware is now infecting Windows users

Ransomware

Securityaffairs

6.3.19

APT40 cyberespionage group supporting growth of China’s naval sector

APT

Securityaffairs

6.3.19

Iran-Linked Chafer APT recently used python-based backdoor

APT

Securityaffairs

6.3.19

Rockwell Automation Patches Critical DoS/RCE Flaw in RSLinx Software

Vulnerebility

Securityweek

6.3.19

BlackBerry Cylance Unveils Behavioral Analytics Solution

Mobil

Securityweek

6.3.19

Rush Health System Reports Data Breach Affecting 45,000

Incindent

Securityweek

6.3.19

Armor Scientific Emerges From Stealth With Wearable Authentication Solution

Security

Securityweek

6.3.19

Huawei Opens Brussels Security Lab in Bid to Reassure EU

BigBrothers

Securityweek

6.3.19

NSA Releases GHIDRA 9.0 — Free, Powerful Reverse Engineering Tool

BigBrothers

Thehackernews

6.3.19

Malspam with password-protected word docs still pushing IcedID (Bokbot) with Trickbot

Spam

SANS

6.3.19

RSA Conference 2019: How to Be Better, on Trust, AI and IoT

Congress

Threatpost

6.3.19

RSAC 2019: TLS Markets Flourish on the Dark Web

Security

Threatpost

6.3.19

RSA Conference: BEC Scammer Gang Takes Aim at Boy Scouts, Other Nonprofts

Congress

Threatpost

6.3.19

Users are too confident in their protection from threats

Security

Net-security

6.3.19

IoT automation platforms open smart buildings to new threats

IoT

Net-security

6.3.19

Attack traffic increased by 32 percent in 2018

Attack

Net-security

6.3.19

Photo gallery: RSA Conference 2019 Expo

Congress

Net-security

6.3.19

Key 2019 cybersecurity industry trends

Cyber

Net-security

5.3.19

Jmail Breaker: Profiting from Joomla’s Mail Service

Vulnerebility blog

Checkpoint

5.3.19

MacOS Malware Pedia

OS Blog

Checkpoint

5.3.19

A New InfoStealer Campaign Targets APAC Windows Servers

Malware blog

Checkpoint

5.3.19

Boost Windows 10 Performance with Retpoline Spectre Mitigation

Security

Bleepingcomputer

5.3.19

CryptoMix Clop Ransomware Says It's Targeting Networks, Not Computers

Ransomware

Bleepingcomputer

5.3.19

Vulnerable Docker Hosts Actively Abused in Cryptojacking Campaigns

Cryptocurrency

Bleepingcomputer

5.3.19

Windows 10 May Soon Run on the Nintendo Switch

IT

Bleepingcomputer

5.3.19

Microsoft Sees 250% Phishing Increase, Malware Decline by 34%

Phishing

Bleepingcomputer

5.3.19

#OpJerusalem Targeted Israeli Windows Users with JCry Ransomware

BigBrothers

Bleepingcomputer

5.3.19

Alphabet's Backstory Helps Enterprises Hunt Down Security Threats

Safety

Bleepingcomputer

5.3.19

Windows 10 IoT Core Test Interface Lets Attackers Take Over Devices

Attack

Bleepingcomputer

5.3.19

Mobile malware evolution 2018

Mobil

Securelist

5.3.19

Iran-Linked Hackers Use Python-Based Backdoor in Recent Attacks

BigBrothers

Securityweek

5.3.19

Secure Data Storage Provider RackTop Systems Raises $15 Million

IT

Securityweek

5.3.19

Comcast Acquires AI Cybersecurity Firm BluVector

Safety

Securityweek

5.3.19

New VMware Firewall Focuses on Known Good Behavior

Safety

Securityweek

5.3.19

State-Sponsored Hackers Supporting China’s Naval Modernization Efforts: Report

BigBrothers

Securityweek

5.3.19

Security Shifts Left to be Part of Software Development Best Practice: Report

Security

Securityweek

5.3.19

Alphabet's Chronicle Launches Security Telemetry Platform

Security

Securityweek

5.3.19

CrowdStrike Launches EDR Solution for Mobile Devices

Mobil

Securityweek

5.3.19

Huawei HCSTC centre opens in Brussels opens to build digital trust through verification standards

Cyber

Securityaffairs

5.3.19

Hundreds of Docker Hosts compromised in cryptojacking campaigns

Cryptocurrency

Securityaffairs

5.3.19

Google Chronicle announced Backstory to protect businesses

Safety

Securityaffairs

5.3.19

Microsoft enabled Retpoline mitigations against the Spectre Variant 2 for Windows 10

Vulnerebility

Securityaffairs

5.3.19

Annual RSA Conference Exclusive 2019 Edition of Cyber Defense Magazine is arrived

Congress

Securityaffairs

5.3.19

Google Project Zero discloses zero-day in Apple macOS Kernel

Apple

Securityaffairs

5.3.19

German police storing bodycam footage on Amazon servers

BigBrothers

Securityaffairs

5.3.19

Google Launches Backstory — A New Cyber Security Tool for Businesses

Safety

Thehackernews

5.3.19

Researchers Link 'Sharpshooter' Cyber Attacks to North Korean Hackers

Attack

Thehackernews

5.3.19

Teen Becomes First to Earn $1M in Bug Bounties with HackerOne

Security

Threatpost

5.3.19

BSides SF 2019: Remote-Root Bug in Logitech Harmony Hub Patched and Explained

Exploit

Threatpost

5.3.19

RSAC 2019: Joomla! Mail Flaw Exploited to Create Mass Phishing Infrastructure

Exploit

Threatpost

5.3.19

RSAC 2019: Most Consumers Say ‘No’ to Cumbersome Data Privacy Practices

Privacy

Threatpost

5.3.19

RSAC 2019: Picking Apart the Foreshadow Attack

Attack

Threatpost

5.3.19

Key 2019 cybersecurity industry trends

Cyber

Net-security

5.3.19

Powershell, Active Directory and the Windows Host Firewall

Attack

SANS

5.3.19

BSides SF 2019: Remote-Root Bug in Logitech Harmony Hub Patched and Explained

Congress

Threatpost

5.3.19

Teen Becomes First to Earn $1M in Bug Bounties with HackerOne

Security

Threatpost

5.3.19

Smart Ski Helmet Headphone Flaws Leak Personal, GPS Data

Vulnerebility

Threatpost

5.3.19

If an organization has been breached, it’s more likely to be targeted again

Incindent

Net-security

5.3.19

Phishers shift efforts to attack SaaS and webmail services

Phishing

Net-security

5.3.19

How malware traverses your network without you knowing about it

Virus

Net-security

5.3.19

The patterns of elite DevSecOps practices

Security

Net-security

5.3.19

Worldwide spending on public cloud services and infrastructure to increase 23.8% over 2018

Security

Net-security

4.3.19

Microsoft Rolls Out Spectre Variant 2 Mitigations for Windows 10

Security

Securityweek

4.3.19

Tripwire Launches Industrial Cybersecurity Assessment Service

Cyber

Securityweek

4.3.19

KnowBe4 Announces New Funding Round at $800 Million Valuation

Security

Securityweek

4.3.19

Eyeing Russia, EU Girds for Cyberthreats to Parliament Vote

BigBrothers

Securityweek

4.3.19

Better Security Not Sole Factor for Improved Breach Detection Times: FireEye

Incindent

Securityweek

4.3.19

Researchers Link 'Sharpshooter' Cyber Attacks to North Korean Hackers

BigBrothers

Thehackernews

4.3.19

Google Discloses Unpatched 'High-Severity' Flaw in Apple macOS Kernel

Apple

Thehackernews

4.3.19

Project Zero Discloses High-Severity Apple macOS Flaw

Apple

Threatpost

4.3.19

Traditional cybersecurity staff retention tactics becoming less effective

Cyber

Net-security

4.3.19

Container Escape Hack Targets Vulnerable Linux Kernel

Vulnerebility

Threatpost

4.3.19

RSAC 2019: 58% of Orgs Have Unfilled Cyber Positions

Cyber

Threatpost

4.3.19

Windows Exploit Suggester Lists Known Exploits for Your Windows Install

Exploit

Bleepingcomputer

4.3.19

Experts collect more evidence that link Op ‘Sharpshooter’ to North Korea

BigBrothers

Securityaffairs

4.3.19

NecursBotnet adopts a new strategy to evade detection

BotNet

Securityaffairs

4.3.19

Cisco Publishes Annual CISO Benchmark Study

Security

Securityweek

4.3.19

RSAC 2019: An Antidote for Tech Gone Wrong

Security

Threatpost

4.3.19

Visitor Kiosk Access Systems Riddled with Bugs

Vulnerebility

Threatpost

4.3.19

Ongoing global cyber espionage campaign broader that previously known

CyberSpy

Net-security

4.3.19

Enterprise ttitudes to cybersecurity: Strategies to balance risk and business acceleration

Cyber

Net-security

4.3.19

Human behavior can be your biggest cybersecurity risk

Cyber

Net-security

4.3.19

Operation Sharpshooter  pdf

Alert - Operation

McAfee

4.3.19

Open MongoDB Databases Expose Chinese Surveillance Data

BigBrothers

Bleepingcomputer

4.3.19

Op 'Sharpshooter' Connected to North Korea's Lazarus Group

CyberSpy

Bleepingcomputer

4.3.19

Windows 10 Update KB4482887 Released With Performance Fix for Spectre Bug

Vulnerebility

Bleepingcomputer

4.3.19

Threat actors using FrameworkPOS malware in POS attacks

Virus

Securityaffairs

4.3.19

The Wireshark Foundation released Wireshark 3.0.0

Security

Securityaffairs

4.3.19

Data Breach Cost Marriott $28 Million So Far

Incindent

Securityweek

4.3.19

How the Dark Web Data Bazaar Fuels Enterprise Attacks

Attack

Threatpost

4.3.19

RSAC 2019: New Operation Sharpshooter Data Reveals Higher Complexity, Scop

CyberSpy

Threatpost

4.3.19

A strong security posture starts with application dependency mapping

Security

Net-security

4.3.19

How cloud storage providers can preempt cyber attacks with business continuity

Cyber

Net-security

4.3.19

A third of 2018’s vulnerabilities have public exploits, 50% can be exploited remotel

Vulnerebility

Net-security

4.3.19

IT teams are struggling with network infrastructure challenges caused by the cloud

Security

Net-security

4.3.19

Organizations are seeing integration challenges hinder digital transformation initiatives

Security

Net-security

3.3.19

DJ Marshmello concert on Fortnite: An iconic event that also attracted scammers

Spam blog

Eset

3.3.19

ICAO victim of a major cyberattack in 2016

APT blog

Eset

3.3.19

Coinhive cryptocurrency miner to call it a day next week

Cryptocurrency blog

Eset

3.3.19

‘Highly critical’ bug exposes unpatched Drupal sites to attacks

Cryptocurrency blog

Eset

3.3.19

How to spot if your password was stolen in a security breach

Incident blog

Eset

3.3.19

Google aims for password-free app and site logins on Android

OS Blog

Eset

3.3.19

Escalating DNS attacks have domain name steward worried

Attack blog

Eset

3.3.19

Cyber-extortionists take aim at lucrative targets

Cyber blog

Eset

3.3.19

ML-era in cybersecurity: A step toward a safer world or the brink of chaos?

Cyber blog

Eset

3.3.19

How costly are sweetheart swindles?

Spam blog

Eset

3.3.19

Ransomware Pretends to Be Proton Security Team Securing Data From Hackers

Ransomware

Bleepingcomputer

3.3.19

Update ColdFusion Now, Critical Zero-Day Bug Exploited in the Wild

Vulnerebility

Bleepingcomputer

3.3.19

Phisher Announces More Attacks Against Hedge Funds and Financial Firms

Phishing

Bleepingcomputer

3.3.19

Chrome and Firefox Can Take Screenshots of Sites From the Command Line

Security

Bleepingcomputer

3.3.19

First Hacker Millionaire on HackerOne

Security

Bleepingcomputer

3.3.19

A Cobalt Strike flaw exposed attackers’ infrastructure

CyberCrime

Securityaffairs

3.3.19

The operator of DDoS-for-hire service pleads guilty

Attack

Securityaffairs

3.3.19

[SI-LAB] FlawedAmmyy Leveraging Undetected XLM Macros as an Infection Vehicle

Virus

Securityaffairs

3.3.19

DDoS-for-Hire Service Admin Pleads Guilty

Attack

Securityweek

2.3.19

Kaspersky AV Having Certificate Conflicts with Google Chromecast

Security

Bleepingcomputer

2.3.19

Wireshark 3 Released with New Npcap Windows Packet Capturing Driver

Security

Bleepingcomputer

2.3.19

App Security Improvement Alerts Android Devs of 6 New Vulnerabilities

Android

Bleepingcomputer

2.3.19

YouTube Disables Comments on Videos with Young Children

Security

Bleepingcomputer

2.3.19

Microsoft Releases Windows 10 Build 18845 (20H1) With Emoji 12.0 and Fixes

Vulnerebility

Bleepingcomputer

2.3.19

Cisco Fixes Critical RCE Vulnerability in RV110W, RV130W, and RV215W Routers

Vulnerebility

Bleepingcomputer

2.3.19

MageCart Group Evolves Tactics To Better Steal Your Credit Cards

Hacking

Bleepingcomputer

2.3.19

Microsoft Announces Azure Sentinel and Threat Experts Cloud-Based Tech

Security

Bleepingcomputer

2.3.19

Ransom News

Ransom News

Ransom

2.3.19

Cisco addressed CVE-2019-1663 RCE flaw in wireless routers

Vulnerebility

Securityaffairs

2.3.19

Emissary Panda updated its weapons for attacks in the past 2 years

Attack

Securityaffairs

2.3.19

Cybaze-Yoroi ZLab analyze GoBrut: A new GoLang Botnet

BotNet

Securityaffairs

2.3.19

Only now we known that International Civil Aviation Organization (ICAO) was hacked in 2016

BigBrothers

Securityaffairs

2.3.19

Analyzing the evolution of MageCart cybercrime groups’ TTPs

CyberCrime

Securityaffairs

2.3.19

Adobe Patches ColdFusion Vulnerability Exploited in the Wild

Vulnerebility

Securityweek

2.3.19

Two White Hats Earn Over $1 Million via Bug Bounty Programs

Security

Securityweek

2.3.19

Adobe Patches Critical ColdFusion Vulnerability With Active Exploit

Exploit

Threatpost

2.3.19

Necurs Botnet Evolves to Hide in the Shadows, with New Payload

BotNet

Threatpost

2.3.19

Podcast: RSA Conference 2019 Preview

Congress

Threatpost

2.3.19

RSA Conference 2019 Show Coverage

Congress

Threatpost

1.3.19

Cobalt Strike Bug Exposes Attacker Servers

Attack

Securityweek

1.3.19

Cisco Patches Critical Vulnerability in Wireless Routers

Vulnerebility

Securityweek

1.3.19

Wireshark 3.0.0 Released

Security

Securityweek

1.3.19

PoS Clients Targeted with Cobalt Strike, Card Scraping Malware

Virus

Securityweek

1.3.19

Magecart Hackers Change Tactics Following Public Exposure

Incindent

Securityweek

1.3.19

U.S. Government Says Thales Must Divest HSM Business Before Acquiring Gemalto

BigBrothers

Securityweek

1.3.19

China's APT27 Hackers Use Array of Tools in Recent Attacks

APT

Securityweek

1.3.19

Ireland's Data Protection Commission Reports Multiple GDPR Investigations on Tech Giants

Privacy

Securityweek

1.3.19

Bug in Cobalt Strike pentesting tool used to identify malicious servers

Virus

Net-security

1.3.19

Critical Cisco Wireless Patch for RV Series, CVE-2019-1663.

Vulnerebility

SANS

1.3.19

CoinHive Cryptocurrency Mining Service will shut down on March 8, 2019

Cryptocurrency

Securityaffairs

1.3.19

Ransomware, Trojan and Miner together against “PIK-Group”

Ransomware

Securityaffairs

1.3.19

Hackers Favorite CoinHive Cryptocurrency Mining Service Shutting Down

Cryptocurrency

Thehackernews

1.3.19

UN Aviation Agency Concealed Serious Hack: Media

BigBrothers

Securityweek

1.3.19

Cequence Security Secures $17 Million in Series B Funding

IT

Securityweek

1.3.19

Lawyer: Russian Cybercrime Suspect on Hunger Strike

CyberSpy

Securityweek

1.3.19

Application Security Firm Contrast Security Raises $65 Million

IT

Securityweek

1.3.19

Microsoft Unveils New Azure, Windows Defender ATP Tools

Security

Securityweek

1.3.19

Dow Jones Watchlist Found Exposed to Open Internet

Incindent

Securityweek

1.3.19

Cisco Fixes Critical Flaw in Wireless VPN, Firewall Routers

Vulnerebility

Threatpost

1.3.19

Coinhive to Mine Its Last Monero in March

Cryptocurrency

Threatpost

1.3.19

Enterprises are blind to over half of malware sent to their employees

Virus

Net-security

1.3.19

Businesses need to rethink security priorities due to shifting trends

Security

Net-security

1.3.19

Half of business leaders say a breach could end their business, others remain unaware

Incindent

Net-security

1.3.19

40% of malicious URLs were found on good domains

Virus

Net-security

1.3.19

By 2025 workforce most likely to consist of humans and bots

BotNet

Net-security

1.3.19

ENISA provides recommendations to improve the cybersecurity of EU electoral processes

BigBrothers

Net-security

1.3.19

Phishing, software supply chain attacks greatest threats for businesses

Phishing

Net-security

1.3.19

Cisco SOHO wireless VPN firewalls and routers open to attack

Exploit

Net-security

28.2.19

Topps.com Sports Collectible Site Exposes Payment Info in MageCart Attack

Attack

Bleepingcomputer

28.2.19

Coinhive In-Browser Cryptomining Service Shuts Down on March 8

Cryptocurrency

Bleepingcomputer

28.2.19

Outlook and Microsoft Account Phishing Emails Utilize Azure Blob Storage

Phishing

Bleepingcomputer

28.2.19

Social Media Attacks Generate $3.25 Billion for Crooks Each Year

Attack

Bleepingcomputer

28.2.19

Icons and Screenshots of Microsoft's Chromium-based Edge Browser Leaked Online

Security

Bleepingcomputer

28.2.19

New Elevation of Privilege Vulnerability Found in Cisco WebEx Meetings

Vulnerebility

Bleepingcomputer

28.2.19

AltFS Fileless File System Aims to Evade Detection by Security Software

Security

Bleepingcomputer

28.2.19

TLS 1.3 Support Coming to iOS 12.2, Enabled System-Wide in Beta Releases

Crypto

Bleepingcomputer

28.2.19

Cyber-Espionage Group Customizes Old, Public Tools

CyberSpy

Bleepingcomputer

28.2.19

Web Site for a Bangladesh Embassy Compromised with Malicious Docs

Virus

Bleepingcomputer

28.2.19

28 Billion Credential Stuffing Attempts During Second Half of 2018

Incindent

Bleepingcomputer

28.2.19

Google Enhances Google Play Protect on Android, but Is It Enough?

Android

Bleepingcomputer

28.2.19

Thunderclap Vulnerabilities Allow Attacks Using Thunderbolt Peripherals

Vulnerebility

Bleepingcomputer

28.2.19

Windows 10 Insider Preview Build 18346 Released With Bug Fixes

Vulnerebility

Bleepingcomputer

28.2.19

Adobe Sends Emails About Retirement of Shockwave on April 9th

Security

Bleepingcomputer

28.2.19

Malvertising Attack Sneaks JavaScript Payload in Polyglot Images

Virus

Bleepingcomputer

28.2.19

Intel SGX Card Extends Memory Protections to Existing Cloud Servers

Safety

Securityweek

28.2.19

Cisco WebEx Meetings affected by a new elevation of privilege flaw

Vulnerebility

Securityaffairs

28.2.19

PDF zero-day samples harvest user data when opened in Chrome

Vulnerebility

Securityaffairs

28.2.19

Multiple threat actors are targeting Elasticsearch Clusters

Security

Securityaffairs

28.2.19

Thunderclap vulnerabilities allows to hack most of moder computers

Vulnerebility

Securityaffairs

28.2.19

U.S. Cyber Command disrupted blocked Russian troll factory during 2018 midterms

BigBrothers

Securityaffairs

28.2.19

Experts devised 3 attacks Show Signed PDF Documents Cannot Be Trusted

Attack

Securityaffairs

28.2.19

Phishing impersonations

Phishing

SANS

28.2.19

Fighting credential stuffing attacks is an uphill battle

Attack

Net-security

28.2.19

Cloud business initiatives accelerating faster than security teams’ ability to secure them

Security

Net-security

28.2.19

Attackers continue to enhance their performance, apply smart business techniques

Attack

Net-security

28.2.19

Privileged credential abuse is involved in 74% of data breaches

Incindent

Net-security

28.2.19

Researchers and businesses need to work together to expose IoT vulnerabilities

IoT

Net-security

27.2.19

Facebook Says 'Clear History' Feature Ready This Year

Social

Securityweek

27.2.19

Identity Protection Firm Obsidian Security Raises $20 Million

IT

Securityweek

27.2.19

Swedish Police Arrest Russia Spy Suspect

BigBrothers

Securityweek

27.2.19

Elasticsearch Clusters Under Attack From Multiple Hacking Groups

Attack

Securityweek

27.2.19

US Lawmakers Kick Off Debate Over Online Privacy

BigBrothers

Securityweek

27.2.19

Chrome Zero-Day Exploited to Harvest User Data via PDF Files

Exploit

Securityweek

27.2.19

'Farseer' Backdoor Targets Users in South East Asia

Virus

Securityweek

27.2.19

Severe Flaws in SHAREit Android App Let Hackers Steal Your Files

Android

Thehackernews

27.2.19

Ring Doorbell Flaw Opens Door to Spying

Vulnerebility

Threatpost

27.2.19

Thunderclap Flaws Shatter Peripheral Security

Vulnerebility

Threatpost

27.2.19

Cisco Patches High-Severity Webex Vulnerability For Third Time

Vulnerebility

Threatpost

27.2.19

Card-Skimming Scripts Hide Behind Google Analytics, Angular

Hacking

Threatpost

27.2.19

Bronze Union APT Updates Remote Access Trojans in Fresh Wave of Attacks

APT

Threatpost

27.2.19

Modern browser APIs can be abused for hijacking device resources

Hacking

Net-security

27.2.19

Sessions and events to check out at RSA Conference 2019

Congress

Net-security

27.2.19

Recently disclosed Drupal CVE-2019-6340 RCE flaw exploited in the wild

Vulnerebility

Securityaffairs

27.2.19

The Arsenal Behind the Australian Parliament Hack

BigBrothers

Securityaffairs

27.2.19

Author of NeverQuest botnet pleads guilty to bank fraud

BotNet

Securityaffairs

27.2.19

'Thunderclap' Flaws Expose Computers to Attacks via Peripheral Devices

Vulnerebility

Securityweek

27.2.19

Neverquest Trojan Operator Pleads Guilty

Virus

Securityweek

27.2.19

Russia's Ex-Cybersecurity Chief Gets 22-Year Sentence in Jail

BigBrothers

Securityweek

27.2.19

New Attacks Show Signed PDF Documents Cannot Be Trusted

Attack

Securityweek

27.2.19

NVIDIA Patches High Risk Vulnerabilities in GPU Display Drivers

Vulnerebility

Securityweek

27.2.19

New Attack Runs Code After Closing Browser Tab

Attack

Securityweek

27.2.19

Hackers Exploit WinRAR Vulnerability to Deliver Malware

Vulnerebility

Securityweek

27.2.19

High-Severity SHAREit App Flaws Open Files for the Taking

Vulnerebility

Threatpost

27.2.19

‘Cloudborne’ IaaS Attack Allows Persistent Backdoors in the Cloud

Attack

Threatpost

27.2.19

How WebAuthn aims to solve the password problem

Security

Net-security

27.2.19

Social media-enabled cybercrime is generating $3.25 billion a year

CyberCrime

Net-security

27.2.19

Increasing security measures are driving cybercriminals to alter their techniques

Hacking

Net-security

27.2.19

Researchers eavesdrop on DNA synthesizer to steal genetic blueprint

IT

Net-security

27.2.19

Consumer attitudes towards security breaches are changing significantly

Incindent

Net-security

26.2.19

Hackers Backdoor Cloud Servers to Attack Future Customers

Attack

Bleepingcomputer

26.2.19

Apex Legends Fans Targeted with Malware and Scam Campaigns

Spam

Bleepingcomputer

26.2.19

Malspam Exploits WinRAR ACE Vulnerability to Install a Backdoor

Virus

Bleepingcomputer

26.2.19

Smart Homes at Risk Due to Unpatched Vulnerabilities, Weak Credentials

Vulnerebility

Bleepingcomputer

26.2.19

NVIDIA Patches Security Issues in GPU Display Driver for Windows, Linux

Vulnerebility

Bleepingcomputer

26.2.19

CyberSecurity Firm Darkmatter Request to be Trusted Root CA Raises Concerns

IT

Bleepingcomputer

26.2.19

B0r0nt0K Ransomware Wants $75,000 Ransom, Infects Linux Servers

Ransomware

Bleepingcomputer

26.2.19

LinkedIn Messaging Abused to Target US Companies With Backdoors

Virus

Bleepingcomputer

26.2.19

How to Attack and Defend a Prosthetic Arm

Hacking

Securelist

26.2.19

Huawei Says US Has 'No Evidence' of 5G Spying Allegations

BigBrothers

Securityweek

26.2.19

Backdoor Targets U.S. Companies via LinkedIn

Virus

Securityweek

26.2.19

Latest WinRAR Flaw Being Exploited in the Wild to Hack Windows Computers

Exploit

Thehackernews

26.2.19

Critical WinRAR Flaw Found Actively Being Exploited

Exploit

Threatpost

26.2.19

PDF viewers, online validation services vulnerable to digital signature spoofing attacks

Attack

Net-security

26.2.19

Latest WinRAR, Drupal flaws under active exploitation

Exploit

Net-security

26.2.19

The Dark Sides of Modern Cars: Hacking and Data Collection

Security

Threatpost

26.2.19

OSSPatcher: Automated mobile application patching for bugs in open source libraries

Mobil

Net-security

26.2.19

Many computers are vulnerable to hacking through common plug-in devices

Vulnerebility

Net-security

26.2.19

Malware spam campaign exploits WinRAR flaw to deliver Backdoor

Spam

Securityaffairs

26.2.19

ToRPEDO attack allows intercepting calls and track locations on 4G/5G

Attack

Securityaffairs

26.2.19

Drupal RCE Flaw Exploited in Attacks Days After Patch

Vulnerebility

Securityweek

26.2.19

Hackers Can Plant Backdoors on Bare Metal Cloud Servers: Researchers

Virus

Securityweek

26.2.19

China's Telecom Dominance a Security Challenge: UK's GCHQ

BigBrothers

Securityweek

26.2.19

Mozilla May Reject UAE Firm's Root Inclusion Request

Security

Securityweek

26.2.19

Serious Flaws in WibuKey DRM Impact Siemens Products

Vulnerebility

Securityweek

26.2.19

Android Gets FIDO2 Certification—Now Supports Secure Passwordless Logins

Android

Thehackernews

26.2.19

Ad Blocking With Pi Hole

Security

SANS

26.2.19

Threatpost Data: Password Managers Are Worth the Risk, Readers Say

Crypto

Threatpost

26.2.19

Most IoT devices are being compromised by exploiting rudimentary vulnerabilities

IoT

Net-security

26.2.19

Healthcare industry: Key trends and cybersecurity challenges

Cyber

Net-security

25.2.19

ToRPEDO Privacy Attack on 4G/5G Networks Affects All U.S. Carrier

Attack

Threatpost

25.2.19

Google Ditches Passwords in Latest Android Device

Android

Threatpost

25.2.19

New privacy-breaking attacks against phones on 4G and 5G cellular networks

Attack

Net-security

25.2.19

ICANN calls for wholesale DNSSEC deployment

Security

Net-security

25.2.19

Prosecutors ask 3-Year Sentence in ‘Fappening’ Case for ex-teacher

Security

Securityaffairs

25.2.19

Expert awarded $10,000 for a new XSS flaw in Yahoo Mail

Vulnerebility

Securityaffairs

25.2.19

European Telecommunications Standards Institute Publishes New IoT Security Standard

IoT

Securityweek

25.2.19

Support for FIDO2 Passwordless Authentication Added to Android

Android

Securityweek

25.2.19

Consumer Groups Protest Being Left Out of Senate Privacy Hearing

BigBrothers

Securityweek

25.2.19

California Introduces New Data Breach Notification Law

Incindent

Securityweek

25.2.19

Prosecutors Seek 3-Year Sentence in 'Celebgate' Hacking Case

Hacking

Securityweek

25.2.19

New Service From Cisco's Duo Labs Analyzes Chrome Extensions

Security

Securityweek

25.2.19

Report: Apps Give Facebook Sensitive Health and Other Data

Social

Securityweek

25.2.19

New Attacks Against 4G, 5G Mobile Networks Re-Enable IMSI Catchers

Mobil

Thehackernews

25.2.19

B0r0nt0K ransomware demands $75,000 ransom to the victims

Ransomware

Securityaffairs

25.2.19

ICANN warns of large-scale attacks on Internet infrastructure

Attack

Securityaffairs

25.2.19

CVE-2019-9019 affects British Airways Entertainment System on Boeing 777-36N(ER)

Vulnerebility

Securityaffairs

25.2.19

Duo Labs presents CRXcavator Service that analyzes Chrome Extensions

Security

Securityaffairs

25.2.19

70000 Pakistani banks’ cards with PINs go on sale on the dark web.

Incindent

Securityaffairs

25.2.19

Fbot malware targets HiSilicon DVR/NVR Soc devices

Virus

Securityaffairs

25.2.19

Crooks offer millions to skilled black hats to help them in

Security

Securityaffairs

25.2.19

Data Breaches of the Week: Tales of PoS Malware, Latrine Status

Virus

Threatpost

25.2.19

Reddit Gold: Alice and Bob, Caught in a Web of Lies

Crypto

Threatpost

25.2.19

Phishing Scam Cloaks Malware With Fake Google reCAPTCHA

Phishing

Threatpost

25.2.19

Video: HackerOne CEO on the Evolving Bug Bounty Landscape

Security

Threatpost

25.2.19

How to combat delivery ramifications after a data breach

Incindent

Net-security

25.2.19

Businesses believe they should be patching their Android devices more frequently

Android

Net-security

25.2.19

Blocking compromised passwords from the Collection leak

Cryptocurrency

Net-security

25.2.19

Accidental data breaches are often compounded by a failure to encrypt

Crypto

Net-security

25.2.19

Don’t miss these keynotes at RSAC 2019

Congress

Net-security

23.2.19

Campaigns through LinkedIn ’s DM deliver More_eggs backdoor via fake job offers

Social

Securityaffairs

23.2.19

Cr1ptT0r Ransomware targets D-Link NAS Devices and embedded systems

Ransomware

Securityaffairs

23.2.19

WhatsApp fixes Face ID and Touch ID authentication bypass

Apple

Securityaffairs

23.2.19

Google forgot to tell customers that Nest Hub has a microphone

IT

Securityaffairs

23.2.19

NY Governor Cuomo Calls For Investigation on Facebook Health Data Collection

Social

Bleepingcomputer

23.2.19

Tax Returns Exposed in TurboTax Credential Stuffing Attacks

Attack

Bleepingcomputer

23.2.19

Windows 10 Build 18343 Released to Insiders with Windows Sandbox Improvements

Vulnerebility

Bleepingcomputer

23.2.19

Office 365 Phishing Page Comes with Live Chat Support

Phishing

Bleepingcomputer

23.2.19

Windows 10 20H1 Build 18841 Released to Skip Ahead Insiders

IT

Bleepingcomputer

23.2.19

DDoS Attacks Ranked As Highest Threat by Enterprises

Attack

Bleepingcomputer

23.2.19

19-Year Old WinRAR RCE Vulnerability Gets Micropatch Which Keeps ACE Support

Vulnerebility

Bleepingcomputer

23.2.19

Cr1ptT0r Ransomware Infects D-Link NAS Devices, Targets Embedded Systems

Ransomware

Bleepingcomputer

23.2.19

Apple Adds Better Cross-Site Tracking Prevention in iOS 12.2 Beta and Safari 12.1

Apple

Bleepingcomputer

23.2.19

Malware Campaigns Target Users of PornHub, XVideos, Other Adult Websites

Virus

Bleepingcomputer

23.2.19

Warning Issued Over Attacks on Internet Infrastructure

Attack

Securityweek

23.2.19

Bug Allows Bypass of WhatsApp Face ID, Touch ID Protection

Apple

Securityweek

23.2.19

Entrust to Acquire Hardware Security Module Maker nCipher

Crypto

Securityweek

23.2.19

Cybercriminals Promise Millions to Skilled Black Hats: Report

CyberCrime

Securityweek

23.2.19

DrainerBot SKD Sucks Data and Battery From Android Devices

Android

Securityweek

23.2.19

Pulse Secure Unveils Software Defined Perimeter Solution

Security

Securityweek

23.2.19

Researcher Earns $10,000 for Another XSS Flaw in Yahoo Mail

Vulnerebility

Securityweek

23.2.19

How to Stop Facebook App From Tracking Your Location In the Background

Social

Thehackernews

23.2.19

Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App

Hacking

Thehackernews

22.2.19

Adobe Patches Critical Information Disclosure Flaw in Reader, Again

Vulnerebility

Bleepingcomputer

22.2.19

Windows Servers Vulnerable to IIS Resource Exhaustion DoS Attacks

Vulnerebility

Bleepingcomputer

22.2.19

Drupal Fixes “Highly Critical” Vulnerability

Vulnerebility

Bleepingcomputer

22.2.19

GandCrab Ransomware Affiliates Continue to Push Decryptable Versions

Ransomware

Bleepingcomputer

22.2.19

Mozilla Firefox 67 to Warn About Breached Sites Using New Add-On

Security

Bleepingcomputer

22.2.19

Microsoft Edge Secret Whitelist Allows Facebook to Autorun Flash

Security

Bleepingcomputer

22.2.19

New Attack Kit Combines Trojans and Tools to Spread Miners, Steal Data

Virus

Bleepingcomputer

22.2.19

Windows 10 Insider Preview Build 18342 Released With Numerous Improvements

Vulnerebility

Bleepingcomputer

22.2.19

New AI-Powered Site Generates Horrific Images of Cats

IT

Bleepingcomputer

22.2.19

JD Finance Android App Caught Storing Screenshots With Banking Info

Android

Bleepingcomputer

22.2.19

Should you trust that Chrome extension? Use CRXcavator to decide

Security

Bleepingcomputer

22.2.19

Researcher Earns $10,000 for Another XSS Flaw in Yahoo Mail

Vulnerebility

Bleepingcomputer

22.2.19

Mexican Privacy Watchdog Criticizes Government Over Spyware

Virus

Securityweek

22.2.19

Cisco addresses flaws in HyperFlex and Prime Infrastructure

Vulnerebility

Securityaffairs

22.2.19

Expert found a DoS flaw in Windows Servers running IIS

Vulnerebility

Securityaffairs

22.2.19

Adobe released second fix for the same Adobe Reader flaw

Vulnerebility

Securityaffairs

22.2.19

Security experts released new GandCrab Decryptor for free

Ransomware

Securityaffairs

22.2.19

Criminal groups promising salaries averaging $360,000 per year to accomplices

CyberCrime

Net-security

22.2.19

Exposure of sensitive data via cloud applications and services increases 20%

Security

Net-security

22.2.19

92% of organizations rank users as their primary security concern

Security

Net-security

22.2.19

Almost Half A Million Delhi Citizens' Personal Data Exposed Online

Incindent

Thehackernews

22.2.19

Highly Critical Drupal RCE Flaw Affects Millions of Websites

Vulnerebility

Threatpost

22.2.19

19-Year-Old WinRAR Flaw Plagues 500 Million Users

Vulnerebility

Threatpost

22.2.19

Adobe Re-Patches Critical Acrobat Reader Flaw

Vulnerebility

Threatpost

22.2.19

ThreatList: Porn-Focused Malware Triples, Dark Web Loves It

Virus

Threatpost

22.2.19

Tech companies fret over data privacy, but ready to bet on IPO market

Privacy

Net-security

22.2.19

The risks associated with the influx of unauthorized collaboration tools

Security

Net-security

22.2.19

K2 Cyber Security releases new platform protecting hybrid clouds against sophisticated attacks

Safety

Net-security

22.2.19

Cisco fixes risky flaws in HyperFlex and Prime infrastructure

Vulnerebility

Net-security

21.2.19

Google's Nest Hub Has a Microphone It Forgot to Mention

Security

Securityweek

21.2.19

Cisco Patches High Severity Flaws in HyperFlex, Prime Infrastructure

Vulnerebility

Securityweek

21.2.19

Adobe Releases Second Patch for Data Leakage Flaw in Reader

Vulnerebility

Securityweek

21.2.19

Windows Servers Vulnerable to DoS Attacks, Microsoft Warns

Vulnerebility

Securityweek

21.2.19

Roger Stone Allegedly Communicated With Mysterious Hacker Guccifer 2.0

Crime

Securityweek

21.2.19

Threats to users of adult websites in 2018

Cyber

Securelist

21.2.19

Another Critical Flaw in Drupal Discovered — Update Your Site ASAP!

Vulnerebility

Thehackernews

21.2.19

Critical bug in WINRAR affects all versions released in the last 19 years

Vulnerebility

Securityaffairs

21.2.19

CVE-2019-6340 Critical flaw in Drupal allows Remote Code Execution

Vulnerebility

Securityaffairs

21.2.19

The interface of WinPot ATM Malware looks like a slot machine

Virus

Securityaffairs

21.2.19

Microsoft says Russian APT28 espionage group hit Democratic Institutions in Europe

APT

Securityaffairs

21.2.19

Expert released a PoC for a remote code execution flaw in mIRC App

Exploit

Securityaffairs

21.2.19

North Korea’s Lazarus APT targets Russian Entities

APT

Securityaffairs

21.2.19

Highly critical Drupal RCE flaw could lead to new Drupalgeddon, patch now!

Vulnerebility

Net-security

21.2.19

500,000+ WinRAR users open to compromise via a 19-year-old flaw

Vulnerebility

Net-security

21.2.19

Extracting a 19 Year Old Code Execution from WinRAR

Vulnerebility blog

Checkpoint

21.2.19

North Korea Turns Against New Targets?!

APT blog

Checkpoint

21.2.19

Vol.3 – 2019 Security Report

Cyber blog

Checkpoint

21.2.19

Combing Through Brushaloader Amid Massive Detection Uptick

Malware blog

Cisco Talos

21.2.19

JavaScript bridge makes malware analysis with WinDbg easier

Malware blog

Cisco Talos

21.2.19

Siegeware: When criminals take over your smart building

Cyber blog

Eset

21.2.19

Switzerland offers cash for finding security holes in its e-voting system

BigBrother blog

Eset

21.2.19

Criminal hacking hits Managed Service Providers: Reasons and responses

Hacking blog

Eset

21.2.19

Google – “Here’s how we cracked down on bad apps last year”

OS Blog

Eset

21.2.19

Smoke damage and hard drives

Hardware blog

Eset

21.2.19

Warning: Critical WinRAR Flaw Affects All Versions Released In Last 19 Years

Vulnerebility

Thehackernews

21.2.19

As US Pushes to Ban Huawei, UK Considers Softer Approach

BigBrothers

Securityweek

21.2.19

Online ATM-style Scam Puts Shoppers at Risk: Symantec

Spam

Securityweek

21.2.19

Blockchain Security Startup CipherTrace Emerges With $15M in Funding

Cryptocurrency

Securityweek

21.2.19

New GandCrab Ransomware Decryptor Released

Ransomware

Securityweek

21.2.19

Firms Moving Sensitive Data to Cloud, But Security Still a Problem: Oracle

Security

Securityweek

21.2.19

WinPot ATM Malware Resembles a Slot Machine

Virus

Securityweek

21.2.19

Canada Helping Australia Determine 'Full Extent' of Hack

BigBrothers

Securityweek

21.2.19

Critical Drupal Vulnerability Allows Remote Code Execution

Vulnerebility

Securityweek

21.2.19

Apple’s Shazam App Boots Facebook Ads and Other Third-Party SDKs

Apple

Threatpost

21.2.19

GitHub Increases Rewards, Scope For Bug-Bounty Program

Security

Threatpost

21.2.19

Separ Malware Plucks Hundreds of Companies’ Credentials in Ongoing Phish

Phishing

Threatpost

21.2.19

Password Manager Firms Blast Back at ‘Leaky Password’ Revelations

Security

Threatpost

21.2.19

Researcher: Not Hard for a Hacker to Capsize a Ship at Sea

Cyber

Threatpost

21.2.19

Microsoft: Russia’s Fancy Bear Working to Influence EU Elections

APT

Threatpost

21.2.19

Simple Powershell Keyloggers are Back

Virus

SANS

21.2.19

How are businesses facing the cybersecurity challenges of increasing cloud adoption?

Cyber

Net-security

21.2.19

(ISC)² Secure Summit EMEA will welcome hundreds of the best minds in cybersecurity

ICS

Net-security

21.2.19

Formjacking is the new get rich quick scheme for cybercriminals

Cryptocurrency

Net-security

21.2.19

Prevent shadow IT: Companies need security covering multiple communication vectors

Security

Net-security

21.2.19

Global mobile networks to support 12.3 billion devices and IoT connections by 2022

IoT

Net-security

20.2.19

GandCrabDecryptor v5.2

Anti-Ramson Tool

Ransom

20.2.19

Formjacking Surpasses Ransomware and Cryptojacking as Top Threat of 2018

Cryptocurrency

Bleepingcomputer

20.2.19

Windows 10 Cumulative Update Build 17134.619 Released With Fixes

Vulnerebility

Bleepingcomputer

20.2.19

Flaw in mIRC App Allows Attackers to Execute Commands Remotely

Vulnerebility

Bleepingcomputer

20.2.19

Cards Used at 137 Restaurants Exposed by Point-of-Sale Breach

Incindent

Bleepingcomputer

20.2.19

GitHub Updates Bug Bounty Program with Expanded Scope, Higher Rewards

Security

Bleepingcomputer

20.2.19

Ukraine Announces Joint Exercises with EU to Fend Off Russian Cyber Threats

BigBrothers

Bleepingcomputer

20.2.19

North Korean APT Lazarus Targets Russian Entities with KEYMARBLE Backdoor

APT

Bleepingcomputer

20.2.19

GandCrab Decrypter Available for v5.1, New 5.2 Variant Already Out

Ransomware

Bleepingcomputer

20.2.19

Linux Subsystem Files Accessible via Explorer in Future Windows 10 Releases

IT

Bleepingcomputer

20.2.19

Hackers Use Compromised Banks as Starting Points for Phishing Attacks

Phishing

Bleepingcomputer

20.2.19

Windows 7 and Server 2008 Updates to Require SHA-2 Support Starting July

Security

Bleepingcomputer

20.2.19

Multi-Stage Rietspoof Malware Drops Multiple Malicious Payloads

Virus

Bleepingcomputer

20.2.19

State Actor Behind Parliament Breach Says Australian Prime Minister

BigBrothers

Bleepingcomputer

20.2.19

2.7 Million Health-Related Calls, Sensitive Info Exposed for Six Years

Incindent

Bleepingcomputer

20.2.19

Kaspersky Lab Launches New Threat Intelligence Tool

Safety

Securityweek

20.2.19

Armorblox Emerges From Stealth With Natural Language Understanding Platform

Security

Securityweek

20.2.19

Microsoft Says Russian Hackers Targeted Democratic Institutions in Europe

BigBrothers

Securityweek

20.2.19

Cyber and Physical Convergence Opens Doors for Attackers: Report

Attack

Securityweek

20.2.19

Rockwell Automation to Patch Publicly Disclosed Power Monitor Flaws

Vulnerebility

Securityweek

20.2.19

Supply Chain Attacks Nearly Doubled in 2018: Symantec

Attack

Securityweek

20.2.19

Potential Privacy Lapse Found in Americans' 2010 Census Data

Privacy

Securityweek

20.2.19

Breach at PoS Firm Hits Hundreds of U.S. Restaurants, Hotels

Incindent

Securityweek

20.2.19

18,000 Android Apps Violate Google's Ad ID Policies: Analysis

Android

Securityweek

20.2.19

GitHub Increases Bug Bounty Program Rewards, Expands Scope

Security

Securityweek

20.2.19

New Multi-Stage Malware Updated Daily

Virus

Securityweek

20.2.19

Phishers’ new trick for bypassing email URL filters

Phishing

Net-security

20.2.19

Rockwell Automation industrial energy meter vulnerable to public exploits

Vulnerebility

Net-security

20.2.19

New GandCrab Decryptor Unlocks Files of Updated Ransomware

Ransomware

Threatpost

20.2.19

ATM Jackpotting Malware Hones Its Heist Tools

Cyber

Threatpost

20.2.19

When Cyberattacks Pack a Physical Punch

Cyber

Threatpost

20.2.19

Microsoft to Kill Updates for Legacy OS Using SHA-1

Security

Threatpost

20.2.19

ThreatList: APT Adversaries Up the Ante on Speed, Target Telecom

APT

Threatpost

20.2.19

ATM robber WinPot: a slot machine instead of cutlets

Cyber

Securelist

20.2.19

Security breach at North Country PoS firm hits hundreds of US restaurants and Hotels

Incindent

Securityaffairs

20.2.19

Experts found a Remote Code Execution flaw in WordPress 5.0.0

Vulnerebility

Securityaffairs

20.2.19

Exposed MongoDB revealed facial recognition abuse for tracking the Uyghur Muslim minority in China.

Exploit

Securityaffairs

20.2.19

The Muncy malware is on the rise

Virus

Securityaffairs

20.2.19

These Are the Countries With the Best and Worst Cybersecurity

Cyber

Securityaffairs

20.2.19

The Long Run of Shade Ransomware

Ransomware

Securityaffairs

20.2.19

Palo Alto Networks to Acquire Security Automation Firm Demisto for $560 Million

IT

Securityweek

20.2.19

Micro Focus Acquires Cyber-Threat Protection Firm Interset

IT

Securityweek

20.2.19

North Korea's Lazarus Hackers Found Targeting Russian Entities

APT

Securityweek

20.2.19

Russian State-Sponsored Hackers Are Fastest: CrowdStrike

BigBrothers

Securityweek

20.2.19

Fintech Security Firm nsKnox Raises $15 Million

IT

Securityweek

20.2.19

Offensive Security Releases Kali Linux 2019.1

Security

Securityweek

20.2.19

'Digital Gangsters': UK Wants Tougher Rules for Facebook

Social

Securityweek

20.2.19

Privilege Escalation Vulnerability Found in LG Device Manager

Vulnerebility

Securityweek

20.2.19

British Intelligence Says Huawei Risk Manageable: FT

BigBrothers

Securityweek

20.2.19

Wendy's Reaches $50 Million Settlement With Banks Over Data Breach

Incindent

Securityweek

20.2.19

Exploit Code Published for Recent Container Escape Vulnerability

Exploit

Securityweek

20.2.19

Storage Maker QNAP Warns of Malware Targeting Its NAS Devices

Virus

Securityweek

20.2.19

Legislation Would Stiffen Penalties for Ransomware Attacks

Ransomware

Securityweek

20.2.19

US Facebook Fine Over Privacy Could Be in Billions: Reports

Social

Securityweek

20.2.19

Critical Flaw Uncovered In WordPress That Remained Unpatched for 6 Years

Vulnerebility

Thehackernews

20.2.19

More Russian language malspam pushing Shade (Troldesh) ransomware

Ransomware

SANS

20.2.19

Ryuk: What does the helpdesk tell us?

Ransomware

Net-security

20.2.19

Insights on modern adversaries and their tactics, techniques, and procedures

Hacking

Net-security

20.2.19

European standards org releases consumer IoT cybersecurity standard

IoT

Net-security

20.2.19

Free decryption tool could save victims millions in ransomware payments

Ransomware

Net-security

19.2.19

Detecting Trojan attacks against deep neural networks

Virus

Net-security

19.2.19

Webinar: Defending account takeovers at Remitly

Congress

Net-security

19.2.19

IT security incidents affecting German critical infrastructure are on the rise

BigBrothers

Net-security

19.2.19

How RSA Conference 2019 brings diverse security professionals together

Congress

Net-security

19.2.19

Offensive Security announced the release of Kali Linux 2019.1

Security

Securityaffairs

19.2.19

Group-IB: More than 70% of Russian banks are not ready for cyberattacks

Cyber

Securityaffairs

19.2.19

Learn How XDR Can Take Breach Protection Beyond Endpoint Security

Security

Thehackernews

19.2.19

LPG Gas Company Leaked Details, Aadhaar Numbers of 6.7 Million Indian Customers

Incindent

Thehackernews

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers

Security

Thehackernews

19.2.19

When Cyberattacks Pack a Physical Punch

Cyber

Threatpost

19.2.19

Gnosticplayers round 3 – 92 Million fresh accounts from 8 unreported security breaches available for sale

Incindent

Securityaffairs

19.2.19

Expert found privilege escalation issue in LG Device Manager

Vulnerebility

Securityaffairs

19.2.19

PoC Exploit Code for recent container escape flaw in runc published online

Exploit

Securityaffairs

19.2.19

ATT&CKized Splunk – Threat Hunting with MITRE’s ATT&CK using Splunk

Security

Securityaffairs

19.2.19

Australia Says 'State Actor' Hacked Parties, Parliament

BigBrothers

Securityweek

19.2.19

Offensive Security Releases Kali Linux 2019.1

Security

Securityweek

19.2.19

'Digital Gangsters': UK Wants Tougher Rules for Facebook

Social

Securityweek

19.2.19

Privilege Escalation Vulnerability Found in LG Device Manager

Vulnerebility

Securityweek

19.2.19

British Intelligence Says Huawei Risk Manageable: FT

BigBrothers

Securityweek

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers

Security

Thehackernews

19.2.19

Building security into cloud native apps with NGINX

Security

Net-security

19.2.19

Indicators of poor password hygiene exposed

Security

Net-security

19.2.19

74% of organizations face outages due to expired certificates

Security

Net-security

18.2.19

New Trickbot module implements Remote App Credential-Grabbing features

Virus

Securityaffairs

18.2.19

Free Tool: Honey Feed

IT

Securityaffairs

18.2.19

Wendy's Reaches $50 Million Settlement With Banks Over Data Breach

Incindent

Securityweek

18.2.19

Exploit Code Published for Recent Container Escape Vulnerability

Vulnerebility

Securityweek

18.2.19

Storage Maker QNAP Warns of Malware Targeting Its NAS Devices

Virus

Securityweek

18.2.19

Legislation Would Stiffen Penalties for Ransomware Attacks

Ransomware

Securityweek

18.2.19

Popular Torrent Uploader 'CracksNow' Caught Spreading Ransomware

Ransomware

Thehackernews

18.2.19

How to Hack Facebook Accounts? Just Ask Your Targets to Open a Link

Social

Thehackernews

18.2.19

Mozilla Adding a Picture-in-Picture Mode to Firefox

IT

Bleepingcomputer

18.2.19

Google to Let you Link Directly to a Word or Phrase in Chrome

IT

Bleepingcomputer

18.2.19

Toyota PASTA Car-Hacking Tool will be soon on GitHub

Hacking

Securityaffairs

18.2.19

Windows App runs on Mac to download MacOS malware

Apple

Securityaffairs

18.2.19

Facebook login phishing campaign can deceive tech-savvy users

Social

Securityaffairs

18.2.19

Facebook paid $25,000 for CSRF exploit that leads to Account Takeover

Social

Securityaffairs

18.2.19

US Facebook Fine Over Privacy Could Be in Billions: Reports

BigBrothers

Securityweek

18.2.19

Australia Says 'State Actor' Hacked Parties, Parliament

BigBrothers

Securityweek

18.2.19

Over 92 Million New Accounts Up for Sale from More Unreported Breaches

Incindent

Thehackernews

18.2.19

Know What You Are Logging

Security

SANS

18.2.19

The importance of consumer trust in the second-hand mobile market

Security

Net-security

18.2.19

2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

Incindent

Net-security

17.2.19

Several Cryptojacking Apps Found on Microsoft Store

Malware blog

Symantec

17.2.19

Microsoft Patch Tuesday – February 2019

Vulnerebility blog

Symantec

17.2.19

Microsoft Patch Tuesday — February 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

17.2.19

Vulnerability Spotlight: Adobe Acrobat Reader DC text field remote code execution vulnerability

Vulnerebility blog

Cisco Talos

17.2.19

What you can learn from Cisco Talos’ new oil pumpjack workshop

ICS blog

Cisco Talos

17.2.19

Malta’s leading bank resumes operations after cyberheist-induced shutdown

Attack blog

Eset

17.2.19

Navigating the murky waters of Android banking malware

Malware blog

Eset

17.2.19

Attack at email provider wipes out almost two decades’ worth of data

Spam blog

Eset

17.2.19

When love becomes a nightmare: Online dating scams

Spam blog

Eset

17.2.19

Why you should choose a pseudonym at Starbucks

Social blog

Eset

17.2.19

Apple to pay teenager who uncovered FaceTime bug

OS Blog

Eset

17.2.19

First clipper malware discovered on Google Play

Cryptocurrency blog

Eset

17.2.19

Russia is going to disconnect from the internet as part of a planned test

BigBrothers

Securityaffairs

17.2.19

A new batch of 127 million records appears in the dark web

Incindent

Securityaffairs

17.2.19

Astaroth Trojan relies on legitimate os and antivirus processes to steal data

Virus

Securityaffairs

17.2.19

Finding Property Values in Office Documents

Virus

SANS

16.2.19

Apple Requiring 2-Factor Authentication on Developer Account Holders

Apple

Bleepingcomputer

16.2.19

Google Fixing Chrome API to Prevent Incognito Mode Detection

Vulnerebility

Bleepingcomputer

16.2.19

Brokerage Firms Warned by FINRA Regulator of New Phishing Attack

Phishing

Bleepingcomputer

16.2.19

Ai-Powered Website Generates Realistic Human Faces On the Spot

IT

Bleepingcomputer

16.2.19

18,000 Android Apps Track Users by Violating Advertising ID Policies

Android

Bleepingcomputer

16.2.19

Cryptojacking Coinhive Miners Land on the Microsoft Store For the First Time

Cryptocurrency

Bleepingcomputer

16.2.19

Collection of 127 Million Stolen Accounts Up for Sale on the Dark Web

Incindent

Bleepingcomputer

16.2.19

Google Rejected Roughly 55% More Android Apps in 2018, Still Not Enough

Android

Bleepingcomputer

16.2.19

Coffee Meets Bagel Dating App Discloses Data Breach on Valentine's Day

Incindent

Bleepingcomputer

16.2.19

Emotet Uses Camouflaged Malicious Macros to Avoid Antivirus Detection

Virus

Bleepingcomputer

16.2.19

Microsoft Releases First Windows 10 20H1 Build 18836 To Skip Ahead Users

IT

Bleepingcomputer

16.2.19

Ransomware Attacks Target MSPs to Mass-Infect Customers

Ransomware

Bleepingcomputer

16.2.19

Mozilla Adds Persistent Private Browsing to Firefox for iOS

Privacy

Bleepingcomputer

16.2.19

South Korea is Censoring the Internet by Snooping on SNI Traffic

BigBrothers

Bleepingcomputer

16.2.19

Shlayer Malware Disables macOS Gatekeeper to Run Unsigned Payloads

Apple

Bleepingcomputer

16.2.19

OpenOffice Zero-Day Code Execution Flaw Gets Free Micropatch

Vulnerebility

Bleepingcomputer

16.2.19

Ransom News

Ransom

Ransom News

16.2.19

Data Breach Bonanza: Dating Apps, Equifax, Mass Credential Dumps

Incindent

Threatpost

16.2.19

Trickbot Malware Goes After Remote Desktop Credentials

Virus

Threatpost

16.2.19

Eight Cryptojacking Apps Booted From Microsoft Store

Cryptocurrency

Threatpost

16.2.19

Ultra-Sneaky Phishing Scam Swipes Facebook Credentials

Social

Threatpost

16.2.19

Where’s the Equifax Data? Does It Matter?

Incindent

Threatpost

16.2.19

Tips on How to Fight Back Against DNS Spoofing Attacks

Attack

Threatpost

16.2.19

Ever-Changing Emotet Evolves Again with Fresh Evasion Tactic

Virus

Threatpost

16.2.19

Threatpost Poll: Over Half of Firms Asked Struggle with Mobile Security

Mobil

Threatpost

16.2.19

Coffee Meets Bagel Dating App Warns Users of Breach

Incindent

Threatpost

16.2.19

Google Play Cracks Down on Malicious Apps

Android

Threatpost

16.2.19

Critical OkCupid Flaw Exposes Daters to App Takeovers

Vulnerebility

Threatpost

16.2.19

Lenovo Watch X Riddled with Security Vulnerabilities

Vulnerebility

Threatpost

16.2.19

Cryptojacking Applications Land in Microsoft Store

Cryptocurrency

Securityweek

15.2.19

US Says Ex-intel Official Defected to Iran, Revealed Secrets

BigBrothers

Securityweek

15.2.19

DHS Cyber Leader Says 2020 Security Preparations Underway

BigBrothers

Securityweek

15.2.19

CSRF Vulnerability in Facebook Earns Researcher $25,000

Vulnerebility

Securityweek

15.2.19

Mozilla, Others Want Big Retailers to Pledge Minimum IoT Security

IoT

Securityweek

15.2.19

Facebook Taps User Data to Defend Workers From Threats

Social

Securityweek

15.2.19

Hackers Target WordPress Sites via WP Cost Estimation Plugin

Hacking

Securityweek

15.2.19

New Variant of Shlayer macOS Malware Discovered

Apple

Securityweek

15.2.19

Germany to Let NATO Use its Cyber Skills

BigBrothers

Securityweek

15.2.19

Google Paid Out $3.4 Million for Vulnerabilities Reported in 2018

Vulnerebility

Securityweek

15.2.19

6,500 Publicly Disclosed Data Breaches in 2018: Report

Incindent

Securityweek

15.2.19

IT Asset Management Firm Axonius Raises $13 Million

IT

Securityweek

15.2.19

Former U.S. Air Force Officer Indicted for Aiding Iranian Cyber Attacks

BigBrothers

Securityweek

15.2.19

Increasing Involvement of Nation-states in Ransomware Attacks

Ransomware

Securityweek

15.2.19

Many ICS Vulnerability Advisories Contain Errors: Report

ICS

Securityweek

15.2.19

Cryptojacking Coinhive Miners for the first time found on the Microsoft Store

Cryptocurrency

Securityaffairs

15.2.19

Group-IB helped to arrest phone scammers profiting off the backs of the Russian elderly

Spam

Securityaffairs

15.2.19

Coffee Meets Bagel dating app confirms data breach

Incindent

Securityaffairs

15.2.19

Germany makes its cyber capabilities available for NATO alliance

BigBrothers

Securityaffairs

15.2.19

Experts spotted a new strain of Shlayer macOS Malware

Apple

Securityaffairs

15.2.19

SAP security fixes address Critical flaw in SAP HANA XSA

Vulnerebility

Securityaffairs

15.2.19

Bank of Valletta shut down its operations after a cyber attack

Attack

Securityaffairs

15.2.19

0patch released micropatch for code execution flaw in OpenOffice

Vulnerebility

Securityaffairs

15.2.19

Ubuntu snapd flaw allows getting root access to the system.

Vulnerebility

Securityaffairs

15.2.19

WARNING – New Phishing Attack That Even Most Vigilant Users Could Fall For

Phishing

Thehackernews

15.2.19

Hacker Breaches Dozens of Sites, Puts 127 Million New Records Up for Sale

Hacking

Thehackernews

15.2.19

Ex-US Intelligence Agent Charged With Spying and Helping Iranian Hackers

BigBrothers

Thehackernews

15.2.19

Bank of Valletta suspended all operations in wake of cyber attack

Attack

Net-security

15.2.19

How organizations handle disruptive data sources

Security

Net-security

15.2.19

SaaS spending increasing by 78 percent year-over-year

Security

Net-security

15.2.19

Increased appetite for biometrics fueled by speed, security and convenience

Security

Net-security

15.2.19

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

Security

Net-security

15.2.19

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Security

Net-security

15.2.19

Machine learning fundamentals: What cybersecurity professionals need to know

IT

Net-security

15.2.19

Three reasons employee monitoring software is making a comeback

Privacy

Net-security

15.2.19

Old H-Worm Delivered Through GitHub

Virus

SANS

14.2.19

Cyber Attack on Malta's Bank of Valletta

Cyber

Securityweek

14.2.19

Third-Party Patch Released for Code Execution Flaw in OpenOffice

Vulnerebility

Securityweek

14.2.19

Windows App Caught Running on Mac, Installing Malware

Virus

Securityweek

14.2.19

China Calls US Concerns Over Huawei 'Groundless'

BigBrothers

Securityweek

14.2.19

U.S. Senators Announce Federal Cybersecurity Workforce Bills

BigBrothers

Securityweek

14.2.19

South Korea is Censoring the Internet by Snooping on SNI Traffic

BigBrothers

Bleepingcomputer

14.2.19

Shlayer Malware Disables macOS Gatekeeper to Run Unsigned Payloads

Apple

Bleepingcomputer

14.2.19

OpenOffice Zero-Day Code Execution Flaw Gets Free Micropatch

Vulnerebility

Bleepingcomputer

14.2.19

DNS Manipulation in Venezuela in regards to the Humanitarian Aid Campaign

Safety

Securelist

14.2.19

0patch released micropatch for code execution flaw in OpenOffice

Vulnerebility

Securityaffairs

14.2.19

Ubuntu snapd flaw allows getting root access to the system.

Vulnerebility

Securityaffairs

14.2.19

Snapd Flaw Lets Attackers Gain Root Access On Linux Systems

Vulnerebility

Thehackernews

14.2.19

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure

Hacking

Threatpost

14.2.19

Lenovo Watch X Riddled with Security Vulnerabilities

Vulnerebility

Threatpost

14.2.19

ThreatList: Banking Trojans Are Still The Top Big Bad for Email

Virus

Threatpost

14.2.19

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

Virus

Net-security

14.2.19

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Security

Net-security

14.2.19

Most wanted malware in January 2019: A new threat speaks up

Virus

Net-security

14.2.19

NIST Cybersecurity Framework: Five years later

Cyber

Net-security

13.2.19

Cisco Network Assurance Engine Bug Allows Login with Old Passwords

Vulnerebility

Bleepingcomputer

13.2.19

New Astaroth Trojan Variant Exploits Anti-Malware Software to Steal Info

Virus

Bleepingcomputer

13.2.19

Canonical Snapd Vulnerability Gives Root Access in Linux

Vulnerebility

Bleepingcomputer

13.2.19

The Scarlet Widow Gang Entraps Victims Using Romance Scams

Spam

Bleepingcomputer

13.2.19

Microsoft Releases the February 2019 Updates for Office

Vulnerebility

Bleepingcomputer

13.2.19

Weird Phishing Campaign Uses Links With Almost 1,000 Characters

Phishing

Bleepingcomputer

13.2.19

Windows 7 KB4486563 and Windows 8.1 KB4487000 Released

Vulnerebility

Bleepingcomputer

13.2.19

Microsoft February 2019 Patch Tuesday Includes Fixes for 70 Vulnerabilities

Vulnerebility

Bleepingcomputer

13.2.19

Microsoft Patches PrivExchange Vulnerability in February Quarterly Updates

Vulnerebility

Bleepingcomputer

13.2.19

Windows 10 February 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

13.2.19

Experts found a way to create a super-malware implanted in SGX-enclaves

Virus

Securityaffairs

13.2.19

Malicious PDF Analysis

Virus

Securityaffairs

13.2.19

Hacker deleted all data from VFEmail Servers, including backups

Hacking

Securityaffairs

13.2.19

SAP Patches Critical Vulnerability in HANA XSA

Vulnerebility

Securityweek

13.2.19

Extensive 'Living Off the Land' Hides Stealthy Malware Campaign

Virus

Securityweek

13.2.19

Indictment: Hackers Charged With Making Threats to Schools

Hacking

Securityweek

13.2.19

UK Data Intelligence Firm to Acquire IDology for $300 Million

BigBrothers

Securityweek

13.2.19

Intel SGX Can Be Abused to Hide Advanced Malware: Researchers

Virus

Securityweek

13.2.19

Hackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups

Hacking

Thehackernews

13.2.19

Researchers Implant "Protected" Malware On Intel SGX Enclaves

Virus

Thehackernews

13.2.19

Snapd flaw gives attackers root access on Linux systems

Vulnerebility

Net-security

13.2.19

February 2019 Patch Tuesday: PrivExchange hole plugged

Vulnerebility

Net-security

13.2.19

Critical WordPress Plugin Flaw Allows Complete Website Takeover

Vulnerebility

Threatpost

13.2.19

‘Dirty Sock’ Flaw in snapd Allows Root Access to Linux Servers

Vulnerebility

Threatpost

13.2.19

Unpatched Apple macOS Hole Exposes Safari Browsing History

Apple

Threatpost

13.2.19

Microsoft Patch Tuesday updates for February 2019 fixes IE Zero-Day

Vulnerebility

Securityaffairs

13.2.19

Microsoft Patches Internet Explorer Zero-Day Reported by Google

Vulnerebility

Securityweek

13.2.19

Hacker Erases Email Provider's Servers, Backups

Hacking

Securityweek

13.2.19

Microsoft Patch Tuesday — February 2019 Update Fixes 77 Flaws

Vulnerebility

Thehackernews

13.2.19

New Unpatched macOS Flaw Lets Apps Spy On Your Safari Browsing History

Apple

Thehackernews

13.2.19

Fake Updates campaign still active in 2019

Cyber

SANS

13.2.19

Microsoft Patches Zero-Day Browser Bug Under Active Attack

Vulnerebility

Threatpost

13.2.19

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure

Attack

Threatpost

13.2.19

Siemens Warns of Critical Remote-Code Execution ICS Flaw

ICS

Threatpost

13.2.19

SMBs spending a day each week dealing with cybersecurity issues

Cyber

Net-security

13.2.19

Healthcare email fraud: Attack attempts jump 473% over two years

Attack

Net-security

13.2.19

Nearly two-thirds of organizations say tech skills gap is impacting IT audits

IT

Net-security

13.2.19

Impersonation, sender forgery and corporate email spoofing top the charts

Spam

Net-security

12.2.19

TrickBot Banking Trojan Now Steals RDP, VNC, and PuTTY Credentials

BotNet

Bleepingcomputer

12.2.19

Dunkin' Donuts Issues Alert for Credential Stuffing Attack, Passwords Reset

Attack  Incindent

Bleepingcomputer

12.2.19

Windows Malware Runs on Macs, Bypasses Gatekeeper to Target Software Pirates

Apple

Bleepingcomputer

12.2.19

Adobe Releases Security Fixes for Flash Player, ColdFusion, and More

Vulnerebility

Bleepingcomputer

12.2.19

Hackers Wipe VFEmail Servers, May Shut Down After Catastrophic Data Loss

Incindent

Bleepingcomputer

12.2.19

Coalition of State Attorney Generals Urge FTC to Update Identity Theft Rules

Safety

Bleepingcomputer

12.2.19

Adobe Releases February 2019 Patch Updates For 75 Vulnerabilities

Vulnerebility

Thehackernews

12.2.19

Gootkit: Unveiling the Hidden Link with AZORult

Virus

Securityaffairs

12.2.19

Symantec Acquires Zero Trust Cloud Security Startup Luminate Security

IT

Securityweek

12.2.19

Application Security Firm ShiftLeft Raises $20 Million

IT

Securityweek

12.2.19

Adobe Patches Disclosed Data Leakage Flaw in Reader

Vulnerebility

Securityweek

12.2.19

Unofficial Patch Released for Adobe Reader Zero-Day

Vulnerebility

Securityweek

12.2.19

Lawmakers Back Bill to Isolate Russian Internet

BigBrothers

Securityweek

12.2.19

macOS Vulnerability Leaks Safari Data

Apple

Securityweek

12.2.19

Container Escape Flaw Hits AWS, Google Cloud, Linux Distros

Vulnerebility

Securityweek

12.2.19

Bot Protection Firm PerimeterX Raises $43 Million

IT

Securityweek

12.2.19

Hackers hit VFEmail, wipe US servers and backups

Hacking

Net-security

12.2.19

Adobe Fixes 43 Critical Acrobat and Reader Flaws

Vulnerebility

Threatpost

12.2.19

Major Container Security Flaw Threatens Cascading Attacks

Vulnerebility

Threatpost

12.2.19

Xiaomi M365 Electric Scooter Hacked and Remotely Controlled

Mobil

Threatpost

12.2.19

Micropatch prevents malicious PDFs from Calling Home

Virus

Securityaffairs

12.2.19

620 million accounts stolen from 16 hacked websites available for sale on the dark web

Incindent

Securityaffairs

12.2.19

Docker runc flaw opens the door to a ‘Doomsday scenario’

Vulnerebility

Securityaffairs

12.2.19

Xiaomi Electric Scooters Vulnerable to Life-Threatening Remote Hacks

Vulnerebility

Thehackernews

12.2.19

RunC Flaw Lets Attackers Escape Linux Containers to Gain Root on Hosts

Vulnerebility

Thehackernews

12.2.19

Beware!! New Windows .exe Malware Found Targeting macOS Computers

Virus

Thehackernews

12.2.19

RunC container escape flaw enables root access to host system

Vulnerebility

Net-security

12.2.19

OkCupid account hijackings highlight website account management issues

Hacking

Net-security

12.2.19

Temporary Patch Released For Adobe Reader Zero-Day

Vulnerebility

Threatpost

12.2.19

Privacy Protection Bypass Flaw in macOS Gives Access to Browsing History

Vulnerebility

Bleepingcomputer

12.2.19

Microsoft States Windows Update DNS Issues are Finally Fixed

Vulnerebility

Bleepingcomputer

12.2.19

RunC Vulnerability Gives Attackers Root Access on Docker, Kubernetes Hosts

Vulnerebility

Bleepingcomputer

12.2.19

Adobe Reader Zero-Day Micropatch Stops Malicious PDFs from Calling Home

Vulnerebility

Bleepingcomputer

12.2.19

New Offensive USB Cable Allows Remote Attacks over WiFi

Attack

Bleepingcomputer

12.2.19

First CryptoCurrency Clipboard Hijacker Found on Google Play Store

Cryptocurrency

Bleepingcomputer

12.2.19

MetaMask app on Google Play was a Clipboard Hijacker

Android

Securityaffairs

12.2.19

Chrome OS Network Manager Sandboxed, Stripped of Root Privileges

OS

Securityweek

12.2.19

U.S. Senators Urge VPN Ban for Federal Workers Over Spying

BigBrothers

Threatpost

12.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

12.2.19

Security wellness takes more than a fad diet

Security

Net-security

12.2.19

Is 2019 the year national privacy law is established in the US?

Privacy

Net-security

12.2.19

88% of UK businesses breached during the last 12 months

Incindent

Net-security

12.2.19

People still shocked by how easy it is to track someone online

Security

Net-security

11.2.19

Have You Seen an Email Virus Recently?

Virus

SANS

11.2.19

Exposed: Instagram, OKCupid, Mumsnet All Face Data Concerns

Social

Threatpost

11.2.19

First ‘Clipper’ Malware Discovered on Google Play

Android

Threatpost

11.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

11.2.19

First CryptoCurrency Clipboard Hijacker Found on Google Play Store

Cryptocurrency

Bleepingcomputer

11.2.19

A mysterious code prevents QNAP NAS devices to be updated

Vulnerebility

Securityaffairs

11.2.19

Clipper Malware Slips Into Google Play

Android

Securityweek

11.2.19

China Police Get Power to Remotely 'Inspect' Company Networks in China

BigBrothers

Securityweek

11.2.19

Password Checkup Chrome extension warns users about compromised logins

Safety

Securityaffairs

11.2.19

Tenable Adds 'Predictive Prioritization' to Vulnerability Management Offering

Vulnerebility

Securityweek

11.2.19

Senators Concerned Over DHS Employees Using Foreign VPNs

BigBrothers

Securityweek

11.2.19

Linux Miner Removes Competing Malware From Infected Systems

Cryptocurrency

Securityweek

11.2.19

Switzerland Launches Bug Bounty Program for E-Voting Systems

BigBrothers

Securityweek

11.2.19

First Android Clipboard Hijacking Crypto Malware Found On Google Play Store

Android

Thehackernews

11.2.19

BEC-style attacks exploded in Q4 2018

Spam

Net-security

11.2.19

Facebook, Twitter Trackers Whitelisted by Brave Browser

Social

Bleepingcomputer

11.2.19

Windows95 v2.0 Let's You Play DOOM, Wolfenstein 3D, and More

IT

Bleepingcomputer

11.2.19

Thousands of RDM refrigeration systems exposed online are at risk

Incindent

Securityaffairs

11.2.19

Adiantum will bring encryption on Android devices without cryptographic acceleration

Android

Securityaffairs

11.2.19

Google open sourced the ClusterFuzz fuzzing platform

IT

Securityaffairs

11.2.19

Undercover Spy Exposed in NYC Was 1 of Many

CyberSpy

Securityweek

11.2.19

Bezos Case Exposes Billionaires' Vulnerability to Hackers

Security

Securityweek

11.2.19

Product showcase: Veriato Cerebral user & entity behavior analytics software

Privacy

Net-security

11.2.19

Zero trust browsing: Protect your organization from its own users

Privacy

Net-security

11.2.19

There’s a growing disconnect between data privacy expectations and reality

Privacy

Net-security

11.2.19

Average DDoS attack volumes grew by 194% in 12 months

Attack

Net-security

10.2.19

Decompiled Undertale RPG Source Code Released on GitHub

IT

Bleepingcomputer

10.2.19

New Linux coin miner kills competing malware to maximize profits

Cryptocurrency

Securityaffairs

10.2.19

Maldoc Analysis of the Weekend

Virus

SANS

9.2.19

Windows 10 Insider Preview Build 18334 Released With Gaming Improvements

IT

Bleepingcomputer

9.2.19

Mail Attachment Builds Ransomware Downloader from Super Mario Image

Ransomware

Bleepingcomputer

9.2.19

Coinminer Targets Linux, Kills Competition to Maximize Profits

Cryptocurrency

Bleepingcomputer

9.2.19

Apple Patched Two Actively Exploited Zero-Days in iOS 12.1.4

Apple

Bleepingcomputer

9.2.19

Like Microsoft Edge, Chrome is Getting Tab Hover Card Images

IT

Bleepingcomputer

9.2.19

GandCrab ransomware campaign targets Italy using steganography

Ransomware

Securityaffairs

9.2.19

Exclusive – MalwareMustDie Team analyzed the Cayosin Botnet and its criminal ecosystem

BotNet

Securityaffairs

9.2.19

Ransom News

Ransom

Ransom

9.2.19

Refrigeration Systems Used by Supermarkets, Hospitals Left Exposed Online

Incindent

Securityweek

9.2.19

Merkel Opens Spy Agency's Massive New Berlin HQ

BigBrothers

Securityweek

9.2.19

Google Improves Android Encryption with Adiantum

Android

Securityweek

9.2.19

Study Analyzes Challenges, Concerns for IT/OT Convergence

Analysis

Securityweek

9.2.19

Site Isolation is Coming to Firefox

Safety

Securityweek

9.2.19

Carbonite to Acquire Webroot for $618 Million in Cash

IT

Securityweek

9.2.19

Google Open Sources Fuzzing Platform

IT

Securityweek

9.2.19

NATO Opens Defense Innovation Challenge Seeking C4ISR Solutions

BigBrothers

Securityweek

9.2.19

FireOS Flaw Allowed Limited Content Injection in Amazon Tablets

OS

Threatpost

9.2.19

Google Boosts Encryption For Low-End Android Devices

Android

Threatpost

8.2.19

Adiantum: A new encryption scheme for low-end Android devices

Android

Net-security

8.2.19

Apple fixes FaceTime eavesdropping bug, two iOS zero-days

Apple

Net-security

8.2.19

TWOSENSE.AI Awarded $2.42M Behavioral Biometrics Security Contract by DoD

Security

Bleepingcomputer

8.2.19

New Phishing Attack Uses Google Translate as Camouflage

Phishing

Bleepingcomputer

8.2.19

Wells Fargo Hit By Nationwide Outage, ATMs and Online Banking Down

Security

Bleepingcomputer

8.2.19

Microsoft Provides Mitigations, Workarounds for PrivExchange Vulnerability

Vulnerebility

Bleepingcomputer

8.2.19

Microsoft Now Allows Skype Users to Blur the Background on Video Calls

IT

Bleepingcomputer

8.2.19

Google Introduces Adiantum Storage Encryption to Low-End Android Devices

Crypto

Bleepingcomputer

8.2.19

Apple Releases Fix for Group FaceTime Snooping Bug in iOS and macOS

Apple

Bleepingcomputer

8.2.19

Business Email Compromise Attacks See Almost 500% Increase

Spam

Bleepingcomputer

8.2.19

Netography to Make Network Security Autonomous, Funded by Andreessen Horowitz

Security

Bleepingcomputer

8.2.19

Three out of the four flaws fixed with iOS 12.1.4 were exploited in the wild

Apple

Securityaffairs

8.2.19

Hackers broke into Australia’s Parliament Computer Network

BigBrothers

Securityaffairs

8.2.19

Huawei 'Shocked, Amused' by Espionage Accusations

BigBrothers

Securityweek

8.2.19

Google Spots Attacks Exploiting iOS Zero-Day Flaws

Apple

Securityweek

8.2.19

Google Created Faster Storage Encryption for All Low-End Devices

Crypto

Thehackernews

8.2.19

Latest iOS 12.1.4 Update Patches 2 Zero-Day and FaceTime Bugs

Apple

Thehackernews

8.2.19

Apple Patches FaceTime Spying Vulnerability

Apple

Securityweek

8.2.19

Australia Wields Vast Decryption Powers Before Planned Review

BigBrothers

Securityweek

8.2.19

20 Indicted in Multimillion-Dollar Online Fraud Scheme

CyberCrime

Securityweek

8.2.19

Australian Parliament Computer Network Breached

BigBrothers

Securityweek

8.2.19

Phishers Serve Fake Login Pages via Google Translate

Phishing

Securityweek

8.2.19

Vulnerabilities in Kunbus Industrial Gateway allows to control the devices

ICS

Securityaffairs

8.2.19

ThreatList: Latest DDoS Trends by the Numbers

Attack

Threatpost

8.2.19

Apple Fixes Pesky FaceTime Bug in iOS 12.1.4 Update

Apple

Threatpost

8.2.19

Flaw in Multiple Airline Systems Exposes Passenger Data

Vulnerebility

Threatpost

8.2.19

Phishing Kit with JavaScript Keylogger

Phishing

SANS

8.2.19

Mild to medium volume expected for February 2019 Patch Tuesday

Vulnerebility

Net-security

8.2.19

DevOps and DevSecOps developments to watch in 2019

Security

Net-security

8.2.19

Infosec pros believe data isn’t secure in the cloud, despite desire for mass adoption

Security

Net-security

8.2.19

ETSI releases TS 103 457 to secure functions in a virtualized environment

Security

Net-security

8.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

Expert publicly disclosed the existence of 0day flaw in macOS Mojave

Apple

Securityaffairs

7.2.19

Zero-day Vulnerability Highlights the Responsible Disclosure Dilemma

Vulnerebility

Securityweek

7.2.19

Micro-segmentation Security Firm Illumio Raises $65 Million

IT

Securityweek

7.2.19

Critical Flaws Allow Hackers to Take Control of Kunbus Industrial Gateway

Vulnerebility

Securityweek

7.2.19

Fortinet Introduces New Next-Generation Firewalls

Safety

Securityweek

7.2.19

German Competition Watchdog Demands More Control for Facebook Users

Social

Securityweek

7.2.19

Network Security Firm Netography Emerges From Stealth

Security

Securityweek

7.2.19

France to Tighten 5G Security: Minister

BigBrothers

Securityweek

7.2.19

2018 in Snort Rules

Safety blog

Cisco Talos

7.2.19

Reverse RDP Attack: Code Execution on RDP Clients

Attack blog

Checkpoint

7.2.19

Report: Under the Hood of Cyber Crime

Cyber blog

Checkpoint

7.2.19

The Curious Case of Convexity Confusion

Security blog

Project Zero

7.2.19

Tech Support Scams Now Get Users to Install Potentially Unwanted Apps

Spam blog

Symantec

7.2.19

DanaBot updated with new C&C communication

BotNet blog

Eset

7.2.19

Google rolls out Chrome extension to warn you about compromised logins

Safety blog

Eset

7.2.19

European Commission orders recall of children’s smartwatch over privacy concerns

BigBrother blog

Eset

7.2.19

59,000 Breaches Disclosed in First Eight Months of GDPR

Privacy

Securityweek

7.2.19

Ursnif: Long Live the Steganography and AtomBombing!

Virus

Securityaffairs

7.2.19

DDoS Attacks in Q4 2018

Analysis  Attack

Securelist

7.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

New Docs Show Pricing for Windows 7 Extended Security Updates

Security

Bleepingcomputer

7.2.19

"Lucky Draw" Smishing Campaign Asks Money to Deliver Car Prize

Android

Bleepingcomputer

7.2.19

59K Data Breaches Reported, 91 Fines Imposed Since GDPR Enactment

Incindent

Bleepingcomputer

7.2.19

Researcher Declines to Share Zero-Day macOS Keychain Exploit with Apple

Apple

Bleepingcomputer

7.2.19

Mozilla's Site Isolation Coming to Firefox, First Milestone in February

Security

Bleepingcomputer

7.2.19

What do successful pentesting attacks have in common?

Attack

Net-security

7.2.19

8 months of GDPR: 59,000+ reported breaches, 91 fines

Privacy

Net-security

7.2.19

Android devices could be hacked by viewing a malicious PNG Image

Android

Securityaffairs

7.2.19

Lawmakers Concerned About Apple's Handling of FaceTime Spying Bug

Apple

Securityweek

7.2.19

Chinese Hackers Spy on U.S. Law Firm, Major Norwegian MSP

BigBrothers

Securityweek

7.2.19

macOS Mojave Zero-Day Allows Theft of Keychain Passwords

Apple

Securityweek

7.2.19

Webinar Today: Merging OT/ICS Threat Detection Into Your SOC

ICS

Securityweek

7.2.19

Scammers Abuse Gmail Address Feature in Fraud Attacks

Spam

Securityweek

7.2.19

MacOS Zero-Day Exposes Apple Keychain Passwords

Apple

Threatpost

7.2.19

Clever Phishing Attack Enlists Google Translate to Spoof Login Page

Phishing

Threatpost

7.2.19

Lookalike domains: Artificial intelligence may come to the rescue

Security

Net-security

7.2.19

Malicious macros can trigger RCE in LibreOffice, OpenOffice

Virus

Net-security

7.2.19

The problem with vulnerable IoT companion apps

IoT

Net-security

6.2.19

30% of Automotive Companies Lacking a Dedicated Cybersecurity Team

Cyber

Bleepingcomputer

6.2.19

Power Company Has Security Breach Due to Downloaded Game

Incindent

Bleepingcomputer

6.2.19

Cryptojacking Overtakes Ransomware, Malware-as-a-Service on the Rise

Ransomware

Bleepingcomputer

6.2.19

GandCrab Ransomware Helps Shady Data Recovery Firms Hide Ransom Costs

Ransomware

Bleepingcomputer

6.2.19

Microsoft Released the February 2019 Non-Security Office Updates

Security

Bleepingcomputer

6.2.19

Microsoft Confirms Windows Update Problems Were Caused by DNS Issues

Security

Bleepingcomputer

6.2.19

Google Launches Password Checkup Extension to Alert Users of Data Breaches

Safety

Bleepingcomputer

6.2.19

OpenOffice Vulnerable to Remote Code Execution, LibreOffice Patched

Vulnerebility

Bleepingcomputer

6.2.19

Microsoft Confirms Serious ‘PrivExchange’ Vulnerability

Vulnerebility

Threatpost

6.2.19

Modern Cybercrime: It Takes a Village

CyberCrime

Threatpost

6.2.19

What are Data Manipulation Attacks, and How to Mitigate Against Them

Attack

Threatpost

6.2.19

Security expert Marco Ramilli released for free the Malware Hunter tool

Security

Securityaffairs

6.2.19

A critical couterfeiting vulnerability addressed in Zcash

Cryptocurrency

Securityaffairs

6.2.19

With No Unifying U.S. Federal Privacy Law, States Are Implementing Their Own

BigBrothers

Securityweek

6.2.19

Check-in Links Sent by Several Airlines Expose Passenger Data

Incindent

Securityweek

6.2.19

Android Phones Can Get Hacked Just by Looking at a PNG Image

Android

Thehackernews

6.2.19

Marvell Avastar wireless SoCs have multiple vulnerabilities

Alert News

Alert

6.2.19

New ExileRAT backdoor used in attacks aimed at users in Tibet

Virus

Securityaffairs

6.2.19

Reverse RDP Attack – Rogue RDP Server can be used to hack RDP clients

Attack

Securityaffairs

6.2.19

SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM.

Virus

Securityaffairs

6.2.19

Critical Zcash Bug Could Have Allowed 'Infinite Counterfeit' Cryptocurrency

Cryptocurrency

Thehackernews

6.2.19

How to Delete Accidentally Sent Messages, Photos on Facebook Messenger

Social

Thehackernews

6.2.19

Web App Security Firm Signal Sciences Raises $35 Million

IT

Securityweek

6.2.19

New LuckyCat-Linked RAT Targets Users in Tibet

Virus

Securityweek

6.2.19

Don't Let Huawei Help Set Up 5G, US Warns EU Nations

BigBrothers

Securityweek

6.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

6.2.19

'No Material Impact' From Foreign Meddling in 2018 US Vote: Report

BigBrothers

Securityweek

6.2.19

Smart Watch Recalled in Europe Over Privacy Risks

BigBrothers

Securityweek

6.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

6.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

6.2.19

Hancitor malspam and infection traffic from Tuesday 2019-02-05

Spam

SANS

6.2.19

IoT Scale Flaws Enable Denial of Service, Privacy Issues

IoT

Threatpost

6.2.19

The impact of cyber-enabled economic warfare escalation

Cyber

Net-security

6.2.19

5 reasons why asset management is a hot topic in 2019

Cyber

Net-security

6.2.19

70 real-life hackers and cybersecurity practitioners share their personal insights

Hacking

Net-security

5.2.19

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Hacking

Thehackernews

5.2.19

Google's New Tool Alerts When You Use Compromised Credentials On Any Site

Security

Thehackernews

5.2.19

Code Execution Flaw Found in LibreOffice, OpenOffice

Vulnerebility

Securityweek

5.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

5.2.19

Smart Watch Recalled in Europe Over Privacy Risks

Privacy

Securityweek

5.2.19

'No Material Impact' From Foreign Meddling in 2018 US Vote: Report

BigBrothers

Securityweek

5.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

5.2.19

Mitigations against Mimikatz Style Attacks

Attack

SANS

5.2.19

Remote Desktop Protocol Clients Rife with Remote Code-Execution Flaws

Vulnerebility

Threatpost

5.2.19

EU Recalls Children’s Smartwatch That Leaks Location Data

BigBrothers

Threatpost

5.2.19

Google Patches Critical .PNG Image Bug

Vulnerebility

Threatpost

5.2.19

Severe RCE Flaw Disclosed in Popular LibreOffice and OpenOffice Software

Vulnerebility

Thehackernews

5.2.19

Huddle House Suffers Payment Card Breach

Incindent

Securityweek

5.2.19

Code Execution Flaw Found in LibreOffice, OpenOffice

Vulnerebility

Securityweek

5.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

5.2.19

Mozilla Resumes Firefox 65 Rollout After AVs Disable HTTPS Scanning

Safety

Bleepingcomputer

5.2.19

RDP Clients Exposed to Reverse RDP Attacks by Major Protocol Issues

Attack

Bleepingcomputer

5.2.19

Severe bug in LibreOffice and OpenOffice suites allows remote code execution

Vulnerebility

Securityaffairs

5.2.19

Huddle House Fast Food Chain Suffers Data Breach in POS System

Incindent

Bleepingcomputer

5.2.19

Mozilla Adding CryptoMining and Fingerprint Blocking to Firefox

Cryptocurrency

Bleepingcomputer

5.2.19

Windows 10 Update Continues Having Issues After DNS Fixes

Safety

Bleepingcomputer

5.2.19

ExileRat Targeting Tibetan Supporters via Malicious PowerPoint Docs

Virus

Bleepingcomputer

5.2.19

Mozilla to Automatically Block Auto-Playing Audio in Firefox 66

Security

Bleepingcomputer

5.2.19

Microsoft Authenticator App Now Delivers Security Notifications

Security

Bleepingcomputer

5.2.19

Windows 3.0 File Manager Reborn in All Its Nostalgic Glory

IT

Bleepingcomputer

5.2.19

Google Working on Chrome Never-Slow Mode for Faster Browsing

Security

Bleepingcomputer

5.2.19

The APT Name Game: How Grim Threat Actors Get Goofy Monikers

APT

Threatpost

5.2.19

‘Collection #1’ Data Dump Hacker Identified

Incindent

Threatpost

5.2.19

ExileRAT shares C2 with LuckyCat, targets Tibet

Malware blog

Cisco Talos

5.2.19

SpeakUp: A New Undetected Backdoor Linux Trojan

Malware blog

Checkpoint

5.2.19

Houzz discloses data breach, asks some users to reset passwords

Incident blog

Eset

5.2.19

Roughly 500,000 Ubiquity devices may be affected by flaw already exploited in the wild

Exploit

Securityaffairs

5.2.19

Experts found popular beauty apps in the Play Store including malicious code

Virus

Securityaffairs

5.2.19

New Backdoor Targets Linux Servers

Virus

Securityweek

5.2.19

Researchers Identify Hacker Behind Massive Data Breach Collection

Incindent

Securityweek

5.2.19

New Canon Printers Bring SIEM Integration, Other Security Features

Safety

Securityweek

5.2.19

Wikipedia Articles as part of Tech Support Scamming Campaigns?

Spam

SANS

5.2.19

Spy Campaign Spams Pro-Tibet Group With ExileRAT

Virus

Net-security

5.2.19

Why vaporworms might be the scourge of 2019

Cyber

Net-security

5.2.19

AI won’t solve all of our cybersecurity problems

Cyber

Net-security

4.2.19

New SpeakUp Backdoor Infects Linux and macOS with Miners

Apple

Bleepingcomputer

4.2.19

QuadrigaCX exchange lost access to $145 Million funds after founder dies

CyberCrime

Bleepingcomputer

4.2.19

Young hacker gets 10 years jail sentence for SIM Swapping attacks

Crime

Bleepingcomputer

4.2.19

Flaw Possibly Affecting 500,000 Ubiquity Devices Exploited in the Wild

Exploit

Securityweek

4.2.19

Extreme Networks Launches IoT Defense Solution For Enterprises

IoT

Securityweek

4.2.19

Attackers Use CoAP for DDoS Amplification

Attack

Securityweek

4.2.19

Senators Reintroduce DHS Cyber Hunt and Incident Response Teams Act

BigBrothers

Securityweek

4.2.19

Cryptocurrency Firm Losses $145 Million After CEO Dies With Only Password

Cryptocurrency

Thehackernews

4.2.19

Struts Vulnerability CVE-2017-5638 on VMware vCenter - the Gift that Keeps on Giving

Vulnerebility

SANS

4.2.19

SpeakUp Linux Backdoor Sets Up for Major Attack

Virus

Threatpost

4.2.19

Metro Bank is the first bank that disclosed SS7 attacks against its customers

Attack

Securityaffairs

4.2.19

U.S. Energy Firm Fined $10 Million for Security Failures

ICS

Securityweek

4.2.19

Several Popular Beauty Camera Apps Caught Stealing Users' Photos

Android

Thehackernews

4.2.19

First Hacker Convicted of 'SIM Swapping' Attack Gets 10 Years in Prison

Mobil

Thehackernews

4.2.19

Houzz Break-In: Data Breach Announced

Incindent

Bleepingcomputer

4.2.19

New Malware Siphons Cryptocurrency Wallets and Credentials, Credit Cards

Cryptocurrency

Bleepingcomputer

4.2.19

Security firm Recorded Future discovered the hacker behind Collection #1

Incindent

Securityaffairs

4.2.19

Chrome to Display Warnings About Similar or Lookalike URLs

Security

Bleepingcomputer

4.2.19

Can Enterprises execute a GRC Movement?

Security

Securityaffairs

4.2.19

Four differences between the GDPR and the CCPA

Privacy

Net-security

4.2.19

CISOs: Change your mindset or lose your job

Security

Net-security

4.2.19

Evaluating the biggest cyber threats to the electric power sector

ICS

Net-security

4.2.19

Email authentication use growing steadily in every industry sector

Cyber

Net-security

4.2.19

RSA Conference 2019 USA: What you can expect at this year’s event

Congress

Net-security

4.2.19

Video: Analyzing a Simple HTML Phishing Attachment

Phishing

SANS

3.2.19

Sextortion Scam Stating Xvideos Was Hacked to Record You Through Webcam

Spam

Bleepingcomputer

3.2.19

New Scam Holds YouTube Channels for Ransom

Spam

Bleepingcomputer

3.2.19

Experts observed a new sextortion scam Xvideos-themed

Spam

Securityaffairs

3.2.19

Hacker who reported a flaw in Hungarian Magyar Telekom faces up to 8-years in jail

Crime

Securityaffairs

3.2.19

Operators of the TheMoon botnet offer it as a service

BotNet

Securityaffairs

3.2.19

IBM experts warn of malicious abuses of Apple Siri Shortcuts

Apple

Securityaffairs

3.2.19

Scanning for WebDAV PROPFIND Exploiting CVE-2017-7269

Exploit

SANS

2.2.19

Cyber Security Week in Review (Feb. 1)

Cyber blog

Cisco Talos

2.2.19

Fake Cisco Job Posting Targets Korean Candidates

BigBrother blog

Cisco Talos

2.2.19

Vulnerability Spotlight: Multiple vulnerabilities in ACD Systems Canvas Draw 5

Vulnerebility blog

Cisco Talos

2.2.19

Examining Pointer Authentication on the iPhone XS

Exploit blog

Project Zero

2.2.19

Four new caches of stolen logins put Collection #1 in the shade

Incident blog

Eset

2.2.19

Japan to probe citizens’ IoT devices in the name of security

BigBrother blog

Eset

2.2.19

Cybercrime black markets: Dark web services and their prices

Cyber blog

Eset

2.2.19

‘We’re coming for you’, global police warn DDoS attack buyers

Attack blog

Eset

2.2.19

“Love you” malspam gets a makeover for massive Japan-targeted campaign

Spam blog

Eset

2.2.19

DHS Cyber Hunt Teams to Be Authorized by Reintroduced Bipartisan Bill

BigBrothers

Bleepingcomputer

2.2.19

Windows 10 Insider Preview Build 18329 Released with Mixed Reality Win32 Apps

Vulnerebility

Bleepingcomputer

2.2.19

New Site Monitors Censorship on Apple's Chinese App Store

BigBrothers

Bleepingcomputer

2.2.19

DHS Security Tech Innovation Program Means Big Money for SMBs

BigBrothers

Bleepingcomputer

2.2.19

Mozilla Halts Firefox 65 Rollout Due to Insecure Certificate Errors

Safety

Bleepingcomputer

2.2.19

Google Outage Causing Google Charts and Other APIs to Not Work

IT

Bleepingcomputer

2.2.19

Basecamp Successfully Defends Against Credential Stuffing Attack

Attack

Bleepingcomputer

2.2.19

Microsoft Forcing Skype Classic Users to Upgrade to Version 8

IT

Bleepingcomputer

2.2.19

Ethical Hacker Exposes Magyar Telekom Vulnerabilities, Faces 8 Years in Jail

Crime

Bleepingcomputer

2.2.19

Linux Kernel Spectre Protection Changes to Boost App Performance

Attack

Bleepingcomputer

2.2.19

Many Windows 10 Users Unable to Connect to Windows Update Service

Security

Bleepingcomputer

2.2.19

Dell Introduces Dell SafeGuard and Response Solutions To Fight Evolving Threats

Safety

Bleepingcomputer

2.2.19

Microsoft Announces Earnings for Second Fiscal Quarter of 2019

IT

Bleepingcomputer

2.2.19

Android Apps With Millions of Installs Collect Selfies, Push Porn Ads

Android

Bleepingcomputer

2.2.19

Airbus Data Breach Exposes Employee Credentials, Professional Contact Details

Incindent

Bleepingcomputer

2.2.19

Home Design website Houzz suffered a data breach

Incindent

Securityaffairs

2.2.19

Apple issued a partial fix for recent FaceTime spying bug

Apple

Securityaffairs

2.2.19

Ransom News

Ransom News

Ransom

2.2.19

US authorities aim to dismantle North Korea’s Joanap Botnet

BotNet

Securityaffairs

2.2.19

The return of the AdvisorsBot malware

Virus

Securityaffairs

2.2.19

State Bank of India left archive with millions of Customer messages exposed

Incindent

Securityaffairs

2.2.19

Malicious Hackers Can Abuse Siri Shortcuts: IBM

Virus

Securityweek

2.2.19

Industrial Internet Consortium and OpenFog Consortium Merge

ICS

Securityweek

2.2.19

UK Data Watchdog Fines Leave.EU, Eldon Insurance

BigBrothers

Securityweek

2.2.19

Apple Partially Fixes FaceTime Spying Bug

Apple

Securityweek

2.2.19

Israel Seeks to Beat Election Cyber Bots

BigBrothers

Securityweek

2.2.19

Home Design Website Houzz Alerts Users of Data Breach

Incindent

Securityweek

2.2.19

Hacker who reported flaw in Hungarian Telekom faces up to 8-years in prison

Vulnerebility

Thehackernews

2.2.19

New Mac Malware Targets Cookies to Steal From Cryptocurrency Wallets

Apple

Thehackernews

2.2.19

Most Magento shops get compromised via vulnerable extensions

Vulnerebility

Net-security

2.2.19

Chafer APT Takes Aim at Diplomats in Iran with Improved Custom Malware

APT

Threatpost

2.2.19

Houzz Urges Password Resets After Data Breach

Incindent

Threatpost

2.2.19

Cybercriminals Aim for the Super Bowl Goal Posts

CyberCrime

Threatpost

1.2.19

Microsoft Opens Up Skip Ahead Ring As It Prepares First Windows 10 19H2 Build

IT

Bleepingcomputer

1.2.19

Mozilla Finally Nixing Extensions In Firefox Private Windows

Privacy

Bleepingcomputer

1.2.19

Love Letter Malspam Serves Cocktail of Malware, Heavily Targets Japan

Spam

Bleepingcomputer

1.2.19

Chrome 72 Released with 58 Security Fixes, Deprecates TLS 1.0 and 1.1

Vulnerebility

Bleepingcomputer

1.2.19

Fake Survey Scammers on YouTube Have Terrible OpSec Skills

Spam

Bleepingcomputer

1.2.19

Police Forces Team Up To Hunt Down Users of DDoS Services

BigBrothers

Bleepingcomputer

1.2.19

New LockerGoga Ransomware Allegedly Used in Altran Attack

Ransomware

Bleepingcomputer

1.2.19

Theoretical Ransomware Attack Could Lead to Global Damages Says Report

Ransomware

Bleepingcomputer

1.2.19

Apple Disabled Group FaceTime While Working on Bug Fix

Apple

Bleepingcomputer

1.2.19

Microsoft Adds New Privacy and Compliance Features to Microsoft 365

Privacy

Bleepingcomputer

1.2.19

Firefox 65 Released with Updated Content Blocking, MSI Installers, and More

Security

Bleepingcomputer

1.2.19

Microsoft 365 Experiencing Issues, Users Unable to Access URLs From Emails

Security

Bleepingcomputer

1.2.19

Hackers Stole $1.7 Billion in Cryptocurrency Last Year

Cryptocurrency

Bleepingcomputer

1.2.19

Brave Browser Taunts Chrome, Edge, and Firefox in New Privacy Ad

Privacy

Bleepingcomputer

1.2.19

Disable FaceTime Now! Bug Lets Callers Snoop On You Without Permission

Apple

Bleepingcomputer

1.2.19

Discover Card Users Affected by Data Breach, New Credit Cards Issued

Incindent

Bleepingcomputer

1.2.19

DNS DDoS Attack Protections to be Forcefully Enabled for Non-Compliant Sites

Attack

Bleepingcomputer

1.2.19

Windows System Guard Launch Causing Blank Boot Screens in UEFI PCs

Safety

Bleepingcomputer

1.2.19

TamperMonkey May Be the Next Victim of Google's Chrome Manifest V3 Changes

IT

Bleepingcomputer

1.2.19

Spam Campaign Follows the White Rabbit to NSFW Phishing Scams

Spam

Bleepingcomputer

1.2.19

Azorult Trojan Steals Passwords While Hiding as Google Update

Virus

Bleepingcomputer

1.2.19

Researchers reveal new privacy attack against 3G, 4G, and 5G mobile users

Mobil

Net-security

1.2.19

Facebook dismantled a vast manipulation campaign tied to Iran

Social

Securityaffairs

1.2.19

CookieMiner Mac Malware steals browser cookies and sensitive Data

Apple

Securityaffairs

1.2.19

New York Investigating Apple's Response to FaceTime Spying Bug

Apple

Securityweek

1.2.19

Minnesota Department of Human Services Reports Data Breach

Incindent

Securityweek

1.2.19

Facebook Takes Down Vast Iran-led Manipulation Campaign

Social

Securityweek

1.2.19

GitHub Helps Developers Keep Dependencies Secure via Dependabot

Security

Securityweek

1.2.19

Firms That Sold Fake Social Media Activity Settle With New York State

Social

Securityweek

1.2.19

Dell Teams With CrowdStrike, Secureworks for New Endpoint Security Offering

Security

Securityweek

1.2.19

Airbus Data Takes Flight; and Billions of Credentials Dumped on Dark Web

Incindent

Threatpost

1.2.19

Facebook Boots Hundreds of Iran-Linked Accounts For Spreading Misinformation

Social

Threatpost

1.2.19

TheMoon Rises Again, With a Botnet-as-a-Service Threat

BotNet

Threatpost

1.2.19

Prepare to Defend Your Network Against Swarm-as-a-Service

Security

Threatpost

1.2.19

2019 Already Marred By Slew of Data Breach Incidents

Incindent

Threatpost

1.2.19

Safeguarding your data from human error and phishing attacks with the cloud

Phishing

Net-security

1.2.19

Is your organization ready for the data explosion?

Incindent

Net-security

1.2.19

Employees report 23,000 phishing incidents annually, costing $4.3 million to investigate

Phishing

Net-security

1.2.19

Companies getting serious about AI and analytics, 58% are evaluating data science platforms

IT

Net-security

1.2.19

Sextortion: Follow the Money Part 3 - The cashout begins!

Security

SANS

31.1.19

Airbus data breach exposes some employees’data

Incindent

Securityaffairs

31.1.19

Researchers published the PoC exploit code for Linux SystemD bugs

Exploit

Securityaffairs

31.1.19

Exclusive: spreading CSV Malware via Google Sheets

Virus

Securityaffairs

31.1.19

Imperva mitigated DDoS attack generated 500 Million Packets per Second, the largest ever

Attack

Securityaffairs

31.1.19

Skyscanner launches a public bug bounty program

Security

Securityaffairs

31.1.19

Mac Malware Steals Browser Cookies, Sensitive Data

Apple

Securityweek

31.1.19

Cloud Security Firm Aporeto Raises $20 Million

IT

Securityweek

31.1.19

The Tricky Balance in Declining or Accepting Online Payments

Security

Securityweek

31.1.19

U.S. Takes Aim at North Korea's Joanap Botnet

BigBrothers

Securityweek

31.1.19

Employee Data Compromised in Airbus Breach

Incindent

Securityweek

31.1.19

Huawei: How the Telecoms Giant is Seen Around the World

BigBrothers

Securityweek

31.1.19

Firefox 65 Brings Improved Privacy Protections

Privacy

Securityweek

31.1.19

Airbus Suffers Data Breach, Some Employees' Data Exposed

Incindent

Securityweek

31.1.19

FBI Mapping 'Joanap Malware' Victims to Disrupt the North Korean Botnet

BigBrothers

Thehackernews

31.1.19

Stealthy Malware Disguises Itself as a WordPress License Key

Virus

Threatpost

31.1.19

Google Pulls Data-Chugging App From iOS Devices

Apple

Threatpost

31.1.19

Mac “CookieMiner” Malware Aims to Gobble Crypto Funds

Apple

Threatpost

31.1.19

Attackers Can Track Kids’ Locations via Connected Watches

Attack

Threatpost

31.1.19

Apple Blasts Facebook Over Data-Sucking ‘Research’ App

Apple

Threatpost

31.1.19

New Mac malware steals cookies, cryptocurrency and computing power

Apple

Net-security

31.1.19

Google also abused its Apple developer certificate to collect iOS user data

Apple

Net-security

31.1.19

Taking ethical action in identity: 5 steps for better biometrics

Security

Net-security

31.1.19

Microsoft rolls out new tools for enterprise security and compliance teams

Security

Net-security

31.1.19

eCommerce credit card fraud is nearly an inevitability

Incindent

Net-security

31.1.19

Free training course material on network forensics for cybersecurity specialists

Cyber

Net-security

31.1.19

Facebook to shut down iOS app that allowed for near total data access

Social

Net-security

31.1.19

Tracking Unexpected DNS Changes

Security

Net-security

30.1.19

Facebook paid teens $20 to install a Research App that spies on them

Social

Securityaffairs

30.1.19

Yahoo Breach Settlement Rejected by Judge

Incindent

Securityweek

30.1.19

Facebook Paid Users to Track Smartphone Use: Report

Social

Securityweek

30.1.19

Travel Search Website Skyscanner Launches Bug Bounty Program

Security

Securityweek

30.1.19

Bangladesh to Sue Philippine Bank Over $81M Cyber Heist

CyberCrime

Securityweek

30.1.19

Internet Society Publishes Privacy Code of Conduct

Privacy

Securityweek

30.1.19

Encryption Firm Fortanix Raises $23 Million

IT

Securityweek

30.1.19

Mimecast Acquires Cloud Migration Firm Simply Migrate

IT

Securityweek

30.1.19

Suspected GDPR violations prompt over 95,000 complaints

BigBrother blog

Eset

30.1.19

Russia hit by new wave of ransomware spam

Ransomware blog

Eset

30.1.19

Hear me out! Thousands tell UK taxman to wipe their voice IDs

Security blog

Eset

30.1.19

Apple takes Group FaceTime offline after discovery of spying bug

Vulnerebility blog

Eset

30.1.19

voucher_swap: Exploiting MIG reference counting in iOS 12

Exploit blog

Project Zero

30.1.19

Vulnerability Spotlight: Multiple vulnerabilities in coTURN

Vulnerebility blog

Cisco Talos

30.1.19

Vulnerability Spotlight: Python.org certificate parsing denial-of-service

Vulnerebility blog

Cisco Talos

30.1.19

Vulnerability Spotlight: Multiple WIBU SYSTEMS WubiKey vulnerabilities

Vulnerebility blog

Cisco Talos

30.1.19

APT39: An Iranian Cyber Espionage Group Focused on Personal Information

APT blog

FireEye

30.1.19

Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities

BigBrothers

Securelist

30.1.19

Reading the ENISA Threat Landscape Report 2018

Analysis

Securityaffairs

30.1.19

Iran-Linked APT39 group use off-the-shelf tools to steal data

APT

Securityaffairs

30.1.19

Mimecast Acquires Cloud Migration Firm Simply Migrate

IT

Securityweek

30.1.19

Facebook Paid Teens $20 to Install 'Research' App That Collects Private Data

Social

Thehackernews

30.1.19

iCloud Possibly Suffered A Privacy Breach Last Year That Apple Kept a Secret

Apple

Thehackernews

30.1.19

Sofacy’s Zepakab Downloader Spotted In-The-Wild

APT

Securityaffairs

30.1.19

Netanyahu accuses Iran of cyber attacks carried out daily

BigBrothers

Securityaffairs

30.1.19

U.S. Intel Community: Russia, China Can Disrupt Critical Infrastructure

BigBrothers

Securityweek

30.1.19

DNS Providers to Cease Implementing DNS Resolver Workarounds

Security

Securityweek

30.1.19

Iran-Linked Hackers Use Array of Tools to Steal Data: FireEye

BigBrothers

Securityweek

30.1.19

CR19-010: The United States vs. Huawei

BigBrothers

SANS

30.1.19

Mozilla Firefox 65 Ups the Ante on Privacy with Anti-Tracking Efforts

Security

Threatpost

30.1.19

Feds Dismantle Dark Web Credentials Market

Security

Threatpost

30.1.19

Japan to Hunt Down Citizens’ Insecure IoT Devices

IoT

Threatpost

30.1.19

Mozilla releases anti tracking policy, enhances tracking protection in Firefox 65

Security

Net-security

30.1.19

Enterprises are struggling with cloud complexity and security

Security

Net-security

30.1.19

The biggest cybersecurity challenge? Communicating threats internally

Cyber

Net-security

30.1.19

$1.7 billion in cryptocurrency was stolen and scammed in 2018

Cryptocurrency

Net-security

29.1.19

Law enforcement worldwide hunting users of DDoS-for-Hire services

Attack

Securityaffairs

29.1.19

US DoJ charges Huawei sanctions violations and in technology espionage

BigBrothers

Securityaffairs

29.1.19

Symantec Adds New Features, Services to Endpoint Security Offering

Safety

Securityweek

29.1.19

Israel Blocks Iran Cyber-attacks 'Daily': Netanyahu

BigBrothers

Securityweek

29.1.19

Researcher Escalates Privileges on Exchange 2013 via NTLM Relay Attack

Attack

Securityweek

29.1.19

Crypto Hardware Maker nCipher Re-Emerges From Thales After 20 Years

Cryptocurrency

Securityweek

29.1.19

2019 Singapore ICS Cyber Security Conference Call for Presentations Closes Jan. 31

ICS

Securityweek

29.1.19

Salt Security Emerges From Stealth With API Protection Solution

Security

Securityweek

29.1.19

Japan to Survey 200 Million Gadgets for Cyber Security

BigBrothers

Securityweek

29.1.19

How to Recover Lost or Deleted Files?

Security

Thehackernews

29.1.19

Critical FaceTime bug turns iPhones, Macs into eavesdropping tools

Apple

Net-security

29.1.19

Researchers Allege ‘Systemic’ Privacy, Security Flaws in Popular IoT Devices

IoT

Threatpost

29.1.19

Apple Disables Group FaceTime Following Major Privacy Glitch

Apple

Threatpost

29.1.19

Medical Device Security Firm Medigate Raises $15 Million

IT

Securityweek

29.1.19

Apple Working on Patch to Prevent FaceTime Spying

Apple

Securityweek

29.1.19

U.S. Charges Huawei in Technology Theft, Sanctions Violations

BigBrothers

Securityweek

29.1.19

Appeals Court to Hear Case of Reporter Alleging Surveillance

Cyber

Securityweek

29.1.19

Authorities Seize Hacked Server Marketplace

Hacking

Securityweek

29.1.19

Authorities Track Down Users of DDoS Services

CyberCrime

Securityweek

29.1.19

Zero-Days in WordPress Plugin Actively Exploited

Vulnerebility

Securityweek

29.1.19

Privacy Fears Raised Over Facebook Messaging Apps Integration

Social

Securityweek

29.1.19

Netcraft Launches Anti-Phishing Mobile App

Phishing

Securityweek

29.1.19

Boardrooms Are Still Not Singing the Security Song

Security

Securityweek

29.1.19

Facebook Launches Privacy and Data Use Business Hub

Social

Securityweek

29.1.19

Industry Reactions to Data Privacy Day

Privacy

Securityweek

29.1.19

Disable FaceTime, a bug lets you hear a person’s audio before he answers

Apple

Securityaffairs

29.1.19

Authorities shut down XDEDIC marketplace in an international operation

CyberCrime

Securityaffairs

29.1.19

Hackers compromise WordPress sites via Zero-Day flaws in Total Donations plugin

Vulnerebility

Securityaffairs

29.1.19

Aztarna – the open-source scanning tool for vulnerable robots

Security

Securityaffairs

29.1.19

Dailymotion forces password reset in response to credential stuffing Attack

Attack

Securityaffairs

29.1.19

Europol Now Going After People Who Bought DDoS-for-Hire Services

BigBrothers

Thehackernews

29.1.19

Police Shut Down xDedic – An Online Market for Cyber Criminals

BigBrothers

Thehackernews

29.1.19

New FaceTime Bug Lets Callers Hear and See You Without You Picking Up

Vulnerebility

Thehackernews

29.1.19

WordPress Users Urged to Delete Zero-Day-Ridden Plugin

Vulnerebility

Threatpost

29.1.19

Active Scans Target Vulnerable Cisco Routers for Remote Code-Execution

Vulnerebility

Threatpost

29.1.19

Dailymotion Fights Ongoing Credential-Stuffing Attack

Attack

Threatpost

29.1.19

Microsoft Exchange 2013 and newer are vulnerable to NTLM relay attacks

Alert

Alert

29.1.19

How privacy and security concerns affect password practices

Security

Net-security

29.1.19

Emotet: A veritable Swiss Army knife of malicious capabilities

Virus

Net-security

29.1.19

Global IT spending to reach $3.8 trillion in 2019, up 3.2% from 2018

IT

Net-security

29.1.19

What steps consumers need to take to protect themselves online

Security

Net-security

29.1.19

Facebook plans to integrate WhatsApp, Messenger and Instagram

Social

Net-security

29.1.19

Relaying Exchange?s NTLM authentication to domain admin (and more)

Security

SANS

28.1.19

Hackers are targeting Cisco RV320/RV325, over 9K routers exposed online

Exploit

Securityaffairs

28.1.19

Cobalt cybercrime gang abused Google App Engine in recent attacks

CyberCrime

Securityaffairs

28.1.19

Hackers Target Cisco Routers via Recently Patched Flaws

Vulnerebility

Securityweek

28.1.19

Misinformation Woes Could Multiply With 'Deepfake' Videos

Security

Securityweek

28.1.19

New Exploit Threatens Over 9,000 Hackable Cisco RV320/RV325 Routers Worldwide

Exploit

Thehackernews

28.1.19

Researchers Release Tool That Finds Vulnerable Robots on the Internet

Vulnerebility

Thehackernews

28.1.19

Cryptocurrency and Blockchain Networks: Facing New Security Paradigms

Cryptocurrency blog

FireEye

28.1.19

Bypassing Network Restrictions Through RDP Tunneling

Malware blog

FireEye

28.1.19

Cisco AMP tracks new campaign that delivers Ursnif

Malware blog

Cisco Talos

28.1.19

What we learned by unpacking a recent wave of Imminent RAT infections using AMP

Malware blog

Cisco Talos

28.1.19

Dynamic Data Resolver (DDR) - IDA Plugin

Security blog

Cisco Talos

28.1.19

Emotet re-emerges after the holidays

Malware blog

Cisco Talos

28.1.19

Vulnerability Deep Dive: TP-Link TL-R600VPN remote code execution vulnerabilities

Vulnerebility blog

Cisco Talos

28.1.19

Pylocky Unlocked: Cisco Talos releases PyLocky ransomware decryptor

Ransomware blog

Cisco Talos

28.1.19

Why we want users' feedback on Snort rule documentation

Security blog

Cisco Talos

28.1.19

Microsoft Patch Tuesday — January 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

28.1.19

Vulnerability Spotlight: Multiple Apple IntelHD5000 privilege escalation vulnerabilities

Vulnerebility blog

Cisco Talos

28.1.19

Vulnerability Spotlight: Multiple privilege escalation vulnerabilities in CleanMyMac X

Vulnerebility blog

Cisco Talos

28.1.19

2019 State of Malware report: Trojans and cryptominers dominate threat landscape

Malware blog

Malwarebytes

28.1.19

Sly criminals package ransomware with malicious ransom note

Ransomware blog

Malwarebytes

28.1.19

A user’s right to choose: Why Malwarebytes detects Potentially Unwanted Programs (PUPs)

Malware blog

Malwarebytes

28.1.19

Browser push notifications: a feature asking to be abused

Security blog

Malwarebytes

28.1.19

Has two-factor authentication been defeated? A spotlight on 2FA’s latest challenge

Safety blog

Malwarebytes

28.1.19

Collection 1 data breach: what you need to know

Incident blog

Malwarebytes

28.1.19

Hosting malicious sites on legitimate servers: How do threat actors get away with it?

Malware blog

Malwarebytes

28.1.19

Improved Fallout EK comes back after short hiatus

BigBrother blog

Malwarebytes

28.1.19

The Advanced Persistent Threat files: APT10

APT blog

Malwarebytes

28.1.19

Cybersecurity Barometer: Cybercrime’s impact on privacy and security

Cyber blog

Eset

28.1.19

Can you spot the phish? Take Google’s test

Phishing blog

Eset

28.1.19

Former employee blamed for hack of WordPress plugin maker

Hacking blog

Eset

28.1.19

Google fined €50 million for violating EU data privacy rules

BigBrother blog

Eset

28.1.19

Email security does not end with your password

Security blog

Eset

28.1.19

ENISA outlines top cyber threats and trends in 2018

Cyber

Net-security

28.1.19

Dailymotion Resets Passwords After Credential Stuffing Attack

Attack

Bleepingcomputer

28.1.19

Hackers Targeting Cisco RV320/RV325 Routers Using New Exploits

Exploit

Bleepingcomputer

28.1.19

Microsoft 365 Suffers Massive Two Day Outage, Outlook and Exchange Down

Security

Bleepingcomputer

28.1.19

Google Chrome Adding Support for Signed HTTP Exchanges

Security

Bleepingcomputer

28.1.19

Microsoft To-Do Beta Finally Lets You Attach Files to Tasks

Security

Bleepingcomputer

28.1.19

Facebook Details the "Defense-in-Depth” Approach Used to Secure its Platform

Social

Bleepingcomputer

28.1.19

Resolve to Be More Involved In Your Local Community - REVISITED

Security

SANS

28.1.19

How to know when you’re ready for a fractional CISO

Security

Net-security

28.1.19

How accepting that your network will get hacked will help you develop a plan to recover faster

Security

Net-security

27.1.19

Ransom News

Ransom

Ransom

27.1.19

Video: Analyzing Encrypted Malicious Office Documents

Virus

SANS

27.1.19

Flood of Complaints to EU Countries Since Data Law Adopted

BigBrothers

Securityweek

27.1.19

Undercover Agents Target Cybersecurity Watchdog

Cyber

Securityweek

27.1.19

Ursnif Trojan Uses Fileless Persistence and CAB for Stealthily Data Exfiltration

Virus

Securityweek

27.1.19

Trump Ally Stone Charged With Lying About Hacked Emails

BigBrothers

Securityweek

27.1.19

Local privilege escalation bug fixed in CheckPoint ZoneAlarm

Vulnerebility

Securityaffairs

27.1.19

Upcoming Ukraine elections in the crosshairs of hackers

BigBrothers

Securityaffairs

27.1.19

Anatova ransomware – Expert believe it will be a dangerous threat

Ransomware

Securityaffairs

27.1.19

Using steganography to obfuscate PDF exploits

Exploit

Securityaffairs

26.1.19

Check Point ZoneAlarm Flaw Allows Privilege Escalation

Vulnerebility

Securityweek

26.1.19

Flood of Complaints to EU Countries Since Data Law Adopted

BigBrothers

Securityweek

26.1.19

The Story of Manuel’s Java RAT.

Virus

Securityaffairs

26.1.19

“Collection #1” Data Breach Analysis – Part 2

Incindent

Securityaffairs

26.1.19

Are you Ready for DNS Flag Day?

Security

SANS

26.1.19

Phishing Campaign Delivers Nasty Ransomware, Credential-Theft Two-Punch

Ransomware

Threatpost

26.1.19

Razy Malware Attacks Browser Extensions to Steal Cryptocurrency

Cryptocurrency

Threatpost

26.1.19

LabKey Vulnerabilities Threaten Medical Research Data

Vulnerebility

Threatpost

25.1.19

YouTube to Stop Recommending Conspiracy Theory Videos

IT

Bleepingcomputer

25.1.19

PowerShell Command Leaks "April 2019 Update" as Next Windows 10 Update

IT

Bleepingcomputer

25.1.19

GDPR Behind 42K Data Breach Notifications, 255 Investigations

Privacy

Bleepingcomputer

25.1.19

U.S. Government Systems Will Be 'At Risk for Years to Come'

BigBrothers

Bleepingcomputer

25.1.19

VeryMal Malvertiser Delivers Image-Based Malware

Virus

Bleepingcomputer

25.1.19

How Reserved Storage Works in the Next Version of Windows 10

IT

Bleepingcomputer

25.1.19

Two distinct campaigns are spread GandCrab ransomware and Ursnif Trojan via weaponized docs

Ransomware

Securityaffairs

25.1.19

Microsoft Exchange zero-day and exploit could allow anyone to be an admin

Vulnerebility

Securityaffairs

25.1.19

"Cobalt" Hackers Use Google App Engine in Recent Attacks

APT

Securityweek

25.1.19

Hackers Using RDP Are Increasingly Using Network Tunneling to Bypass Protections

Hacking

Securityweek

25.1.19

Flaws Expose Phoenix Contact Industrial Switches to Attacks

ICS

Securityweek

25.1.19

Data Leak in Ghostscript Could Allow Command Execution

Incindent

Securityweek

25.1.19

CISSP Price Hike Dismays Certified Security Professionals

Security

Securityweek

25.1.19

Microsoft Chief Calls for 'Global Standard' on Privacy

Privacy

Securityweek

25.1.19

GDPR Compliance Brings Other Benefits: Cisco Study

Privacy

Securityweek

25.1.19

GandCrab ransomware and Ursnif virus spreading via MS Word macros

Ransomware

Thehackernews

25.1.19

Razy Malware Attacks Browser Extensions to Steal Cryptocurrency

Cryptocurrency

Threatpost

25.1.19

Vulnerable cloud infrastructure experiencing increasing attacks

Vulnerebility

Net-security

25.1.19

Researcher warns of privilege escalation flaw in Check Point ZoneAlarm

Vulnerebility

Net-security

25.1.19

Windows 10 Insider Build 18323 Released With Light Theme Improvements

IT

Bleepingcomputer

25.1.19

Microsoft Office 365 Now Available in the Mac App Store

IT

Bleepingcomputer

25.1.19

Google Chrome Adding Malicious Drive-By-Downloads Protection

Virus

Bleepingcomputer

25.1.19

New Ursnif Malware Campaign Uses Fileless Infection to Avoid Detection

Virus

Bleepingcomputer

25.1.19

Google Now Publicly Lists Sites Using Chrome Platform Features

IT

Bleepingcomputer

25.1.19

Microsoft Adds OneDrive Cloud File Sharing to Skype

IT

Bleepingcomputer

25.1.19

AA19-024A : DNS Infrastructure Hijacking Campaign

CERT

US CERT

25.1.19

Kaspersky links GreyEnergy and Zebrocy activities

APT

Securityaffairs

25.1.19

New Russian Language Malspam is delivering Redaman Banking Malware

Virus

Securityaffairs

25.1.19

Google to Appeal 50-Million-Euro French Data Consent Fine

Privacy

Securityweek

25.1.19

AWS Provides Secure Access to Internal Assets With Amazon WorkLink

Security

Securityweek

25.1.19

Ongoing Campaign Delivers Redaman Banking Trojan

Virus

Securityweek

25.1.19

Fighting Fire with Fire: API Automation Risks

Security

Threatpost

25.1.19

GDPR-ready organizations see lowest incidence of data breaches

Privacy

Net-security

25.1.19

83% of global respondents experienced phishing attacks in 2018

Phishing

Net-security

25.1.19

The most effective security strategies to guard sensitive information

Security

Net-security

25.1.19

Enterprises turn to MSPs to mitigate huge skills gap concerns

Security

Net-security

24.1.19

Check Point Fixes Privilege Escalation Bug in ZoneAlarm Free

Vulnerebility

Bleepingcomputer

24.1.19

NumPy Is Awaiting Fix for Critical Remote Code Execution Bug

Vulnerebility

Bleepingcomputer

24.1.19

GDPR Compliance Lowers Data Breach Frequency and Impact Says Report

Privacy

Bleepingcomputer

24.1.19

Beware of Exit Map Spam Pushing GandCrab v5.1 Ransomware

Ransomware

Bleepingcomputer

24.1.19

Running Sysmon 8.0.0? Update to 8.0.4 to Avoid a Memory Leak

IT

Bleepingcomputer

24.1.19

Facebook Will Preemptively Close Pages of Owners Who Previously Broke Rules

Social

Bleepingcomputer

24.1.19

Researchers Create Algorithm to Protect Kids from Disturbing YouTube Videos

Security

Bleepingcomputer

24.1.19

Voicemail Phishing Campaign Tricks You Into Verifying Password

Phishing

Bleepingcomputer

24.1.19

Wine 4.0 Available with Vulkan, Direct3D 12, Game Controller Support

IT

Bleepingcomputer

24.1.19

Georgia Official Seeks to Replace Criticized Voting Machines

BigBrothers

Securityweek

24.1.19

State of Malware: Attacks on Business Grow as Threats Become More Sophisticated

Virus

Securityweek

24.1.19

Identity Management Firm Keyfactor Raises $77 Million

IT

Securityweek

24.1.19

U.S. Senators Voice Cyber Concerns Over China-Made Metro Rail Cars

BigBrothers

Securityweek

24.1.19

Link Found Between GreyEnergy and Zebrocy Attacks

Attack

Securityweek

24.1.19

Bit-and-Piece DDoS Method Emerges to Torment ISPs

Attack

Threatpost

24.1.19

ThreatList: Credential-Sniffing Phishing Attacks Erupted in 2018

Phishing

Threatpost

24.1.19

Razy in search of cryptocurrency

Cryptocurrency

Securelist

24.1.19

GreyEnergy’s overlap with Zebrocy

APT

Securelist

24.1.19

Cisco addresses flaws in its products, including Small Business routers and Webex

Vulnerebility

Securityaffairs

24.1.19

Cisco Patches Flaws in Webex, SD-WAN, Other Products

Vulnerebility

Securityweek

24.1.19

Attackers Use Steganography to Obfuscate PDF Exploits

Exploit

Securityweek

24.1.19

Millions of PCs Found Running Outdated Versions of Popular Software

Security

Thehackernews

24.1.19

China Blocks Microsoft's Bing Search Engine, Despite Offering Censored Results

BigBrothers

Thehackernews

24.1.19

PHP PEAR supply chain attack: Backdoor added to installer

Attack

Net-security

24.1.19

Cisco fixes security holes in SD-WAN, Webex, Small Business routers

Vulnerebility

Net-security

24.1.19

Organizations waste money storing useless IT hardware

IT

Net-security

24.1.19

DHS issues emergency Directive to prevent DNS hijacking attacks

Attack

Securityaffairs

24.1.19

Expert shares PoC exploit code for remote iOS 12 jailbreak On iPhone X

Apple

Securityaffairs

24.1.19

PHP PEAR official site hacked, tainted package manager distributed for 6 months

Hacking

Securityaffairs

24.1.19

EU-Japan Deal to Protect Data Exchanges Takes Effect

BigBrothers

Securityweek

24.1.19

Apple Patches Dozens of Vulnerabilities in iOS, macOS

Apple

Securityweek

24.1.19

Code Execution Vulnerability Impacts Linux Package Manager

Vulnerebility

Securityweek

24.1.19

WhiteHat Security Launches New Software Testing Products

Security

Securityweek

24.1.19

Malspam with Word docs uses macro to run Powershell script and steal system data

Spam

SANS

24.1.19

Malware in Ad-Based Images Targets Mac Users

Apple

Threatpost

24.1.19

Redaman Spams Russian Banking Customers with Rotating Tactics

Spam

Threatpost

24.1.19

Branching out more efficiently and securely with SD-WAN

Security

Net-security

24.1.19

Reimagining risk management to mitigate looming economic dangers

Security

Net-security

24.1.19

Microsoft remains the most impersonated brand, Netflix phishing spikes

Phishing

Net-security

24.1.19

Cyberattacks fueled by geopolitical tension are increasing

Attack

Net-security

23.1.19

New Anatova Ransomware Supports Modules for Extra Functionality

Ransomware

Bleepingcomputer

23.1.19

Online Casino Database Leaks Details of Over 100 Million Bets

Incindent

Bleepingcomputer

23.1.19

265 Researchers Take Down 100,000 Malware Distribution Websites

Virus

Bleepingcomputer

23.1.19

DHS Issues Emergency Directive to Prevent DNS Hijacking Attacks

BigBrothers

Bleepingcomputer

23.1.19

Apple Fixes Numerous Security Vulnerabilities in iOS, macOS, and More

Apple

Bleepingcomputer

23.1.19

Chroe Extension Manifest V3 May Break uBlock Origin Content Blocker

Cyber

Bleepingcomputer

23.1.19

Microsoft Releases KB4476976 Cumulative Update With Quality Improvements

Vulnerebility

Bleepingcomputer

23.1.19

Arizona Lawmaker Wants to Tax Porn to Fund Border Security

Security

Bleepingcomputer

23.1.19

Outdated Software Exposes PC Users to Security Risks Says Report

Security

Bleepingcomputer

23.1.19

Monero: Cybercrime’s Top Choice for Mining Malware

Cryptocurrency

Threatpost

23.1.19

6 Signs of Successful Threat Hunting

Cyber

Threatpost

23.1.19

‘Chaos’ iPhone X Attack Alleges Remote Jailbreak

Apple

Threatpost

23.1.19

U.S. Gov Issues Urgent Warning of DNS Hijacking Attacks

Attack

Threatpost

23.1.19

Hacker threatened a family using a Nest Camera to broadcast a fake missile attack alert

Hacking

Securityaffairs

23.1.19

Recorded Future Adds Third-Party Risk to Threat Intelligence Platform

Safety

Securityweek

23.1.19

Flaws in Moxa IIoT Product Expose ICS to Remote Attacks

IoT

Securityweek

23.1.19

Webinar Today With VirusTotal: Intelligence Powered Malware Hunting

Virus

Securityweek

23.1.19

Alphabet's Jigsaw Helps Users Identify Phishing Attacks

Phishing

Securityweek

23.1.19

Analyzing 2018 Attacks to Prepare for Those in 2019

Attack

Securityweek

23.1.19

DHS Warns Federal Agencies of DNS Hijacking Attacks

Attack

Securityweek

23.1.19

Hacker Uses Nest Camera to Broadcast Hoax Nuke Alert

Hacking

Securityweek

23.1.19

Chinese Hacker Publishes PoC for Remote iOS 12 Jailbreak On iPhone X

Apple

Thehackernews

23.1.19

Someone Hacked PHP PEAR Site and Replaced the Official Package Manager

Hacking

Thehackernews

23.1.19

RogueRobin Malware Uses Google Drive as C2 Channel

Virus

Threatpost

23.1.19

Microsoft Windows RCE Flaw Gets Temporary Micropatch

Vulnerebility

Threatpost

23.1.19

Apple delivers security patches, plugs an RCE achievable via FaceTime

Apple

Net-security

23.1.19

DHS Orders U.S. Federal Agencies to Audit DNS Security for Their Domains

BigBrothers

Thehackernews

23.1.19

Community Project Crushes 100,000 Malware Sites in 10 Months

Virus

Securityweek

23.1.19

Hacker Uses Nest Camera to Broadcast Hoax Nuke Alert

Hacking

Securityweek

23.1.19

URLhaus identified and shut down 100,000 malware sites in 10 Months

Virus

Securityaffairs

23.1.19

Critical flaw in Linux APT package manager could allow remote hack

Vulnerebility

Securityaffairs

23.1.19

0patch releases unofficial security patches for 3 Windows flaws yet to be fixed

Vulnerebility

Securityaffairs

23.1.19

Google Fined $57M in Largest GDPR Slap Yet

Privacy

Threatpost

23.1.19

Adobe Issues Unscheduled Updates for Experience Manager Platform

Vulnerebility

Threatpost

23.1.19

How Web Apps Can Turn Browser Extensions Into Backdoors

Virus

Threatpost

23.1.19

Cybercriminals increasingly taking aim at businesses

CyberCrime

Net-security

23.1.19

Debunkng conventional wisdom to get out of the security and privacy rut

Privacy

Net-security

23.1.19

Should enterprises delay efforts to remediate most vulnerabilities?

Vulnerebility

Net-security

23.1.19

Most out of date applications exposed: Shockwave, VLC and Skype top the list

Hacking

Net-security

22.1.19

Microsoft Announces New Windows 10 Devices, Personalized Learning Tools

IT

Bleepingcomputer

22.1.19

Remote Code Exeution Bug Patched in APT Linux Package Manager

APT

Bleepingcomputer

22.1.19

Windows Contacts Remote Code Execution Zero-Day Gets Micropatch

Vulnerebility

Bleepingcomputer

22.1.19

Apple Pay Rolls Out to Target, Taco Bell and Other Top US Retailers

Apple

Bleepingcomputer

22.1.19

Malwarebytes Fixes Windows 7 Freeze Problem in New Update

Vulnerebility

Bleepingcomputer

22.1.19

New Rumba STOP Ransomware Being Installed by Software Cracks

Ransomware

Bleepingcomputer

22.1.19

Ransomware Attacks May Soon Require Disclosure in North Carolina

Ransomware

Bleepingcomputer

22.1.19

Malware, User Privacy Failures Found in Top Free VPN Android Apps

Virus

Bleepingcomputer

22.1.19

Windows Zero-Day Bug That Lets Attackers Read Any File Gets Micropatch

Vulnerebility

Bleepingcomputer

22.1.19

Data Collected from Old Breaches Is Not a New Data Breach

Incindent

Bleepingcomputer

22.1.19

Google Fined €50 Million by French Watchdog for Lack of Transparency

Privacy

Bleepingcomputer

22.1.19

MySQL Design Flaw Allows Malicious Servers to Steal Files from Clients

Vulnerebility

Bleepingcomputer

22.1.19

Ex-Employee Hacks WPML WordPress Plugin Site and Spams Users

Hacking

Bleepingcomputer

22.1.19

Adobe fixed XSS flaws in Experience Manager that can result in information Disclosure

Vulnerebility

Securityaffairs

22.1.19

Did you win at online casinos? Watch out, your data might have had exposed online

Incindent

Securityaffairs

22.1.19

Unofficial Patches Released for Three Unfixed Windows Flaws

Vulnerebility

Securityweek

22.1.19

GDPR Complaints Filed Against Eight International Streaming Companies

Privacy

Securityweek

22.1.19

Let's Encrypt Begins Retirement of TLS-SNI-01 Validation

Crypto

Securityweek

22.1.19

Proposed Law Classifies Ransomware Infection as a Data Breach

Ransomware

Securityweek

22.1.19

WhatsApp Fights Fake News With Message Forwarding Limit

Social

Securityweek

22.1.19

Adobe Patches Information Disclosure Flaws in Experience Manager

Vulnerebility

Securityweek

22.1.19

Russian Watchdog Launches 'Administrative Proceedings' Against Facebook, Twitter

BigBrothers

Securityweek

22.1.19

The Geopolitical Influence on Business Risk Management

BigBrothers

Securityweek

22.1.19

Mitsubishi Develops Cybersecurity Technology for Cars

Cyber

Securityweek

22.1.19

Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems

APT

Thehackernews

22.1.19

Threat Trends Analysis Report

Cyber blog

Checkpoint

22.1.19

A Nasty Trick: From Credential Theft Malware to Business Disruption

Malware blog

FireEye

22.1.19

Global DNS Hijacking Campaign: DNS Record Manipulation at Scale

Hacking blog

FireEye

22.1.19

Digging Up the Past: Windows Registry Forensics Revisited

Security blog

FireEye

22.1.19

OVERRULED: Containing a Potentially Destructive Adversary

APT blog

FireEye

22.1.19

Alleged Russian Hacker Pleads Not Guilty After Extradition to United States

BigBrothers

Thehackernews

22.1.19

New malware found using Google Drive as its command-and-control server

Virus

Thehackernews

22.1.19

Google fined $57 million by France for lack of transparency and consent

Privacy

Thehackernews

22.1.19

VLC Responds to Criticism Over Lack of HTTPS for Updates

Security

Securityweek

22.1.19

Mitsubishi Develops Cybersecurity Technology for Cars

Cyber

Securityweek

22.1.19

A flaw in MySQL could allow rogue servers to steal files from clients

Vulnerebility

Securityaffairs

22.1.19

France watchdog fines Google with $57 million under the EU GDPR

Privacy

Securityaffairs

22.1.19

0patch releases micropatch for Windows Contacts RCE zero-day

Vulnerebility

Net-security

22.1.19

Industry reactions to Google’s €50 million GDPR violation fine

Privacy

Net-security

22.1.19

Business resilience should be a core company strategy, so why are businesses struggling to take action?

Security

Net-security

22.1.19

Agents of disruption: Four testing topics argue the case for agentless security

Security

Net-security

22.1.19

SSDP amplification attacks rose 639%

Attack

Net-security

22.1.19

DNS Firewalling with MISP

Safety

SANS

21.1.19

Taking a page from the kernel's book: A TLB issue in mremap()

Bug blog

Project Zero

21.1.19

NRSMiner updates to newer version

Cryptocurrency blog

F-Secure Blog

21.1.19

Twitter bug may have exposed private tweets of Android users for years

Social blog

Eset

21.1.19

Two men charged with hacking into SEC in stock-trading scheme

Hacking blog

Eset

21.1.19

773 million email IDs, 21 million passwords for anyone to see in massive data dump

Incident blog

Eset

21.1.19

New Year’s resolutions: Routing done right

Hardware blog

Eset

21.1.19

Car and almost $1m on offer for Tesla Model 3 hacks

Hacking blog

Eset

21.1.19

What makes a cybercriminal?

Cyber blog

Eset

21.1.19

Face unlock on many Android smartphones falls for a photo

Hardware blog

Eset

21.1.19

Omron addressed multiple flaws in its CX-Supervisor product

Vulnerebility

Securityaffairs

21.1.19

France Hits Google With 50 Million Euro Data Consent Fine

Privacy

Securityweek

21.1.19

DarkHydrus Hackers Use Google Drive in Recent Attacks

APT

Securityweek

21.1.19

Websites Can Exploit Browser Extensions to Steal User Data

Exploit

Securityweek

21.1.19

Report: Facebook's Privacy Lapses May Result in Record Fine

Social

Securityweek

21.1.19

Former Employee Hacks Popular WordPress Plugin’s Website

Hacking

Securityweek

21.1.19

Flaws in Omron HMI Product Exploitable via Malicious Project Files

Vulnerebility

Securityweek

21.1.19

DNC: Russian Hackers Attacked Us Again After Midterm Elections

BigBrothers

Securityweek

21.1.19

Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution

Vulnerebility

Net-security

21.1.19

Iranian developer advertised BlackRouter RaaS

BigBrothers

Securityaffairs

21.1.19

Unpatched Cisco critical flaw CVE-2018-15439 exposes small Business Networks to hack

Vulnerebility

Securityaffairs

21.1.19

Russian hacker Alexander Zhukov extradited by Bulgaria to US

BigBrothers

Securityaffairs

21.1.19

Microsoft launches Azure DevOps bug bounty program

Security

Net-security

21.1.19

Beware the man in the cloud: How to protect against a new breed of cyberattack

Security

Net-security

21.1.19

Machine learning trumps AI for security analysts

Security

Net-security

21.1.19

Cybercrime could cost companies trillions over the next five years

CyberCrime

Net-security

21.1.19

Researchers analyze DDoS attacks as coordinated gang activities

Attack

Net-security

20.1.19

DarkHydrus APT Uses Google Drive to Send Commands to RogueRobin Trojan

APT

Bleepingcomputer

20.1.19

Mozilla is Adding an Ad Blocker to Firefox Focus 9.0

Security

Bleepingcomputer

20.1.19

Phishing Attack Allegedly Targeted US DNC After 2018 Midterms

Phishing

Bleepingcomputer

20.1.19

Fallout Exploit Kit is Back with New Vulnerabilities and Payloads

Exploit

Bleepingcomputer

20.1.19

Amazon, Apple, Others Hit with GDPR Complaints, €18.8B Maximum Penalties

Privacy

Bleepingcomputer

20.1.19

Vulnerabilities Found in Highly Popular Firmware for WiFi Chips

Vulnerebility

Bleepingcomputer

20.1.19

Facebook Caught Red Handed While Swiping Money From Children

Social

Bleepingcomputer

20.1.19

DarkHydrus adds Google Drive support to its RogueRobin Trojan

Virus

Securityaffairs

20.1.19

“Collection #1” Data Breach Analysis – Part 1

Incindent

Securityaffairs

20.1.19

6 Reasons We Need to Boost Cybersecurity Focus in 2019

Cyber

Securityaffairs

20.1.19

A bug in Microsoft partner portal ‘exposes ‘ support requests to all partners

Vulnerebility

Securityaffairs

20.1.19

ES File Explorer vulnerabilities potentially impact 100 Million Users

Vulnerebility

Securityaffairs

20.1.19

Bulgaria Extradites Russian Hacker to US: Embassy

BigBrothers

Securityweek

19.1.19

Ransom News

Ransom News

Ransom

19.1.19

Fallout Exploit Kit now includes exploit for CVE-2018-15982 Flash zero-day

Exploit

Securityaffairs

19.1.19

Android apps use the motion sensor to evade detection and deliver Anubis malware

Android

Securityaffairs

19.1.19

Oracle critical patch advisory addresses 284 flaws, 33 critical

Vulnerebility

Securityaffairs

19.1.19

Exploit for Recent Flash Zero-Day Added to Fallout Exploit Kit

Exploit

Securityweek

19.1.19

Hackers Actively Scanning for ThinkPHP Vulnerability, Akamai Says

Vulnerebility

Securityweek

19.1.19

Xbash Malware Uninstalls Cloud Security Products

Virus

Securityweek

19.1.19

Marco Rubio Proposes New Federal Data Privacy Bill

BigBrothers

Securityweek

19.1.19

Barracuda Adds Incident Response to Email Security Offering

Safety

Securityweek

19.1.19

PCI SSC Releases New Security Standards for Payment Software

Security

Securityweek

19.1.19

Microsoft Launches Azure DevOps Bug Bounty Program

Security

Securityweek

19.1.19

Rate of Cybersecurity Venture Funding Not Sustainable, Investors Say

Cyber

Securityweek

19.1.19

Impact of U.S. Government Shutdown on Cybersecurity: Feedback Friday

BigBrothers

Securityweek

19.1.19

Threatpost News Wrap Podcast For Jan. 18

Security

Threatpost

19.1.19

Twitter Android Glitch Exposed Private Tweets for Years

Social

Threatpost

19.1.19

Critical, Unpatched Cisco Flaw Leaves Small Business Networks Wide Open

Vulnerebility

Threatpost

19.1.19

Google Play Removes Malicious Malware-Ridden Apps

Android

Threatpost

19.1.19

Fallout EK Retools for a Fresh New 2019 Look

Exploit

Threatpost

19.1.19

Sextortion Bitcoin on the Move

Cryptocurrency

SANS

18.1.19

Windows Zero-Day Bug that Overwrites Files Gets Interim Fix

Vulnerebility

Bleepingcomputer

18.1.19

BlackRouter Ransomware Promoted as a RaaS by Iranian Developer

Ransomware

Bleepingcomputer

18.1.19

Twitter Fixes Four Year Old Bug in Android App Exposing Private Tweets

Social

Bleepingcomputer

18.1.19

Data Breach Collection with 773 Million Email Entries Leaked Online

Incindent

Bleepingcomputer

18.1.19

ES File Explorer Flaws Put 100 Million Users' Data at Risk, Fix Promised

Vulnerebility

Bleepingcomputer

18.1.19

Microsoft Launches Azure DevOps Bounty Program

Security

Bleepingcomputer

18.1.19

Android Apps Steal Banking Info, Use Motion Sensor to Evade Detection

Android

Bleepingcomputer

18.1.19

Fake GPS Apps with 50M Installs Just Show Ads and Run Google Maps

Android

Bleepingcomputer

18.1.19

Rocke's Cryptominers Kills Competition, Uninstall Cloud Security Products

Cryptocurrency

Bleepingcomputer

18.1.19

Flaw in Telegram Reveals Awful OpSec from Malware Author

Vulnerebility

Bleepingcomputer

18.1.19

Banks in West Africa Hit with Off-The-Shelf Malware, Free Tools

Safety

Bleepingcomputer

18.1.19

Emsisoft Browser Security Protects You from Malicious Sites

Safety

Bleepingcomputer

18.1.19

Bipartisan Bill Introduced to Ban Sale of US Tech to Chinese Companies

BigBrothers

Bleepingcomputer

18.1.19

Windows 10 19H1 Update Splits Up Windows Search and Cortana

IT

Bleepingcomputer

18.1.19

Windows 10 Insider Build 18317 Released and Breaks WSL Again

IT

Bleepingcomputer

18.1.19

EU Copyright Directive to Turn Google into Ghost Town

Privacy

Bleepingcomputer

18.1.19

Over 140 International Airlines Affected by Major Security Breach

Incindent

Bleepingcomputer

18.1.19

LoJax Command and Control Domains Still Active

Virus

Bleepingcomputer

18.1.19

MageCart Skimmer Hits Hundreds of Sites In Ad Supply Chain Attack

Attack

Bleepingcomputer

18.1.19

Facebook Closes Hundreds of 'Inauthentic' Russia-Linked Pages

Social

Securityweek

18.1.19

Bug in Twitter Android App Exposed Protected Tweets

Social

Securityweek

18.1.19

Portuguese Hacker Linked to 'Football Leaks' Held in Hungary

Hacking

Securityweek

18.1.19

New Android Malware Apps Use Motion Sensor to Evade Detection

Android

Thehackernews

18.1.19

A Twitter Bug Left Android Users' Private Tweets Exposed For 4 Years

Social

Thehackernews

18.1.19

Twitter fixed a bug in its Android App that exposed Protected Tweets

Social

Securityaffairs

18.1.19

Attacks in the wild leverage flaw in ThinkPHP Framework

Vulnerebility

Securityaffairs

18.1.19

Cyber-Jackpot: 773M Credentials Dumped on the Dark Web

Cyber

Threatpost

18.1.19

Microsoft Launches Azure DevOps Bug Bounty Program

Security

Threatpost

18.1.19

Apple CEO Demands Federal Data Privacy Legislation

Apple

Threatpost

18.1.19

Most Facebook users aren’t aware that Facebook tracks their interests

Social

Net-security

18.1.19

Mining malware evades agent-based cloud security solutions

Cryptocurrency

Net-security

18.1.19

New requirements for the secure design and development of modern payment software

Security

Net-security

18.1.19

Protecting privileged access in DevOps and cloud environments

Safety

Net-security

18.1.19

Risk managers see cybersecurity as the biggest threat to business

Cyber

Net-security

17.1.19

Collection #1 dump, 773 million emails, 21 million passwords

Security

Securityaffairs

17.1.19

Drupal fixes 2 critical code execution issues flaws in Drupal 7, 8.5 and 8.6

Vulnerebility

Securityaffairs

17.1.19

South Korea: hackers compromised Defense Acquisition Program Administration PCs

BigBrothers

Securityaffairs

17.1.19

Ongoing Attacks Hit West African Financial Institutions Since Mid-2017

Attack

Securityweek

17.1.19

New Magecart Group Targets French Ad Agency

Hacking

Securityweek

17.1.19

773 Million Records Amassed in Massive Data Breach Collection

Incindent

Securityweek

17.1.19

Misconfigured Server Leaks Oklahoma Department of Securities Data

BigBrothers

Securityweek

17.1.19

Serious Flaws Found in ControlByWeb Industrial Weather Station

ICS

Securityweek

17.1.19

ERP Security Firm Onapsis Acquires Competitor Virtual Forge

IT

Securityweek

17.1.19

Flaw in Reservation System Impacts Many Airlines

Vulnerebility

Securityweek

17.1.19

Pessimism Pervades World Economic Forum Annual Survey

IT

Securityweek

17.1.19

Battle Lines Forming Ahead of a Looming U.S. Privacy Law Fight

BigBrothers

Securityweek

17.1.19

773 million records exposed in massive data breach

Incindent

Securityweek

17.1.19

Cryptomining Malware Uninstalls Cloud Security Products

Cryptocurrency

Threatpost

17.1.19

Millions of Oklahoma Gov Files Exposed by Wide-Open Server

BigBrothers

Threatpost

17.1.19

Ukrainian Police Arrest 6 Hackers Linked to DDoS and Financial Attacks

Crime

Thehackernews

17.1.19

Unprotected Government Server Exposes Years of FBI Investigations

BigBrothers

Thehackernews

17.1.19

Hackers infect e-commerce sites by compromising their advertising partner

Hacking

Thehackernews

17.1.19

South Korea: hackers compromised Defense Acquisition Program Administration PCs

BigBrothers

Securityaffairs

17.1.19

GreyEnergy: Welcome to 2019

APT

Securityaffairs

17.1.19

I swiped right, Viewing sensitive data cached in your Safari browser.

Security

Securityaffairs

17.1.19

Two Code Execution Flaws Patched in Drupal

Vulnerebility

Securityweek

17.1.19

U.S. in Criminal Probe of China's Huawei: Report

BigBrothers

Securityweek

17.1.19

Singapore Imposes $740,000 Fines Over Major Cyber Attack

Attack

Securityweek

17.1.19

Vulnerability Allowed Fortnite Account Takeover Without Credentials

Vulnerebility

Securityweek

17.1.19

More .gov Domains Hit by Government Shutdown

BigBrothers

Securityweek

17.1.19

WordPress to Warn on Outdated PHP Versions

Security

Securityweek

17.1.19

The Rise and Fall of Ashiyane - Iran's Foremost Hacker Forum

BigBrothers

Securityweek

17.1.19

Hackers Can Abuse Legitimate Features to Hijack Industrial Controllers

ICS

Securityweek

17.1.19

Oracle Patches 33 Critical Vulnerabilities With January Updates

Vulnerebility

Securityweek

17.1.19

Zix to Acquire AppRiver for $275 Million in Cash

IT

Securityweek

17.1.19

Fortnite Hacked Via Insecure Single Sign-On

Hacking

Threatpost

17.1.19

VOIPO Database Exposes Millions of Texts, Call Logs

Incindent

Threatpost

17.1.19

Magecart Returns with Advertising Library Tactic

Hacking

Threatpost

17.1.19

Threatpost Survey Says: 2FA is Just Fine, But Go Ahead and Kill SMS

Safety

Threatpost

17.1.19

Millions of Oklahoma Gov Files Exposed by Wide-Open Server

BigBrothers

Threatpost

17.1.19

U.S. Issues Multiple Charges For 2016 SEC Hack

BigBrothers

Threatpost

17.1.19

Compromised ad company serves Magecart skimming code to hundreds of websites

Hacking

Net-security

17.1.19

2019 cybersecurity workforce: Recruiting vs. re-skilling

Cyber

Net-security

17.1.19

How IT organizations are transforming to meet the demands of the digital economy

IT

Net-security

17.1.19

Encryption is key to protecting information as it travels outside the network

Crypto

Net-security

16.1.19

Hacking Fortnite

Hacking blog

Checkpoint

16.1.19

Researcher releases PoC for Windows VCF file RCE vulnerability

Vulnerebility

Net-security

16.1.19

Fortnite vulnerabilities would have allowed attackers to intercept and steal login credentials

Vulnerebility

Net-security

16.1.19

Bug in Fortnite Authentication Left Accounts Open to Take Over

Vulnerebility

Bleepingcomputer

16.1.19

Firefox 66 Lets You Reconfigure Keyboard Shortcuts for Extensions

IT

Bleepingcomputer

16.1.19

Emotet Returns from the Holidays With New Tricks

Virus

Bleepingcomputer

16.1.19

Djvu Ransomware Spreading New .TRO Variant Through Cracks & Adware Bundles

Ransomware

Bleepingcomputer

16.1.19

Google Docs, Sheets, Slides, and Sites Get Material Design

IT

Bleepingcomputer

16.1.19

Zero-Day Vulnerabilities Leave Smart Buildings Open to Cyber Attacks

Vulnerebility

Bleepingcomputer

16.1.19

Windows 10 Version 1803 Cumulative Update Build 17134.556 Released

Vulnerebility

Bleepingcomputer

16.1.19

Microsoft Says Outlook Mobile Now Ready For Pentagon Use

BigBrothers

Bleepingcomputer

16.1.19

Flight Booking System Flaw Affected Customers of 141 Airlines Worldwide

Vulnerebility

Thehackernews

16.1.19

Fortnite Flaws Allowed Hackers to Takeover Gamers' Accounts

Hacking

Thehackernews

16.1.19

Unprotected VOIP Server Exposed Millions of SMS Messages, Call Logs

Exploit

Thehackernews

16.1.19

Multiple Fortnite flaws allowed experts to takeover players’ accounts

Vulnerebility

Securityaffairs

16.1.19

Huawei Founder Says Company Would Not Share User Secrets

BigBrothers

Securityweek

16.1.19

Zix to Acquire AppRiver for $275 Million in Cash

IT

Securityweek

16.1.19

Researchers Link Chilean Interbank Attack to North Korea

BigBrothers

Securityweek

16.1.19

Popular Web Hosting Services Found Vulnerable to Multiple Flaws

Vulnerebility

Thehackernews

16.1.19

Two Hackers Charged with Hacking SEC System in Stock-Trading Scheme

Hacking

Thehackernews

16.1.19

Experts link attack on Chilean interbank network Redbanc NK Lazarus APT

APT

Securityaffairs

16.1.19

Cranes, drills and other industrial machines exposed to hack by RF protocols

ICS

Securityaffairs

16.1.19

Huawei Founder Says Company Would Not Share User Secrets

BigBrothers

Securityweek

16.1.19

Researchers Link Chilean Interbank Attack to North Korea

BigBrothers

Securityweek

16.1.19

Emotet infections and follow-up malware

Virus

SANS

16.1.19

Radio frequency remote controller weaknesses have serious safety implications

Exploit

Net-security

16.1.19

Companies still struggle to detect IoT device breaches

IoT

Net-security

16.1.19

The costs of cyberattacks increased 52% to $1.1 million

Cyber

Net-security

16.1.19

BEC scammers add payroll diversion to their repertoire

Spam

Net-security

16.1.19

Data Breach Roundup: U.S. Healthcare, Cryptopia, SingHealth and Experian

Incindent

Threatpost

16.1.19

IDenticard Zero-Days Allow Corporate Building Access, Location Recon

Vulnerebility

Threatpost

16.1.19

ThreatList: $1.7M is the Average Cost of a Cyber-Attack

Attack

Threatpost

16.1.19

Judge: Law Enforcement Can’t Force Suspects to Unlock iPhones with FaceID

BigBrothers

Threatpost

15.1.19

New York Privacy Bill Forces Businesses to Disclose Consumer Data Use

Privacy

Bleepingcomputer

15.1.19

BEC Scammers Go After Employee Paychecks

Spam

Bleepingcomputer

15.1.19

Microsoft and Walgreens Boots Alliance Establish Health Care Partnership

IT

Bleepingcomputer

15.1.19

Windows Security Patch Breaks PowerShell Remoting

Vulnerebility

Bleepingcomputer

15.1.19

Flaws in a Card Access Control System May Allow Hackers to Bypass Security

Vulnerebility

Bleepingcomputer

15.1.19

Reminder: Microsoft to end support for Windows 7 in 1-year from today

Security

Thehackernews

15.1.19

36-Year-Old SCP Clients' Implementation Flaws Discovered

Vulnerebility

Thehackernews

15.1.19

How to Secure Your Mid-Size Organization From the Next Cyber Attack

Attack

Thehackernews

15.1.19

Unpatched vCard Flaw Could Let Attackers Hack Your Windows PCs

Vulnerebility

Thehackernews

15.1.19

Too many issues in Pentagon networks expose it to cybersecurity risks

BigBrothers

Thehackernews

15.1.19

A flaw in vCard processing could allow hackers to compromise a Win PC

Vulnerebility

Thehackernews

15.1.19

New Variant of BEC Seeks to Divert Payroll Deposits

Hacking

Securityweek

15.1.19

Researchers Create PoC Malware for Hacking Smart Buildings

Virus

Securityweek

15.1.19

U.S. Charges 8 in Securities Hacking Scheme

BigBrothers

Securityweek

15.1.19

Defense Department Continuously Challenged on Cybersecurity

BigBrothers

Securityweek

15.1.19

Old RF Protocols Expose Cranes to Remote Hacker Attacks

Attack

Securityweek

15.1.19

As IoT Grows, Confidence in Security Remains Low

IoT

Securityweek

15.1.19

IAM Provider OneLogin Raises $100 Million

IT

Securityweek

15.1.19

Cloud Security Firm Sonrai Emerges From Stealth With $18.5 Million in Funding

IT

Securityweek

15.1.19

Schneider Electric Teams With Nozomi on Critical Infrastructure Security

ICS

Securityweek

15.1.19

Hack a Tesla Model 3, get cash and the car

Hacking

Net-security

15.1.19

Widely used building access system can be easily compromised

IoT

Net-security

15.1.19

New Ransomware Bundles PayPal Phishing Into Its Ransom Note

Ransomware

Bleepingcomputer

15.1.19

Hope You're Using Protection as Love Letter MalSpam has Nasty Surprises

Spam

Bleepingcomputer

15.1.19

First Windows 10 Build for Microsoft’s Foldable Devices Appears Online

IT

Bleepingcomputer

15.1.19

Escaping Containers to Execute Commands on Play with Docker Servers

Exploit

Bleepingcomputer

15.1.19

Massachusetts Amends Law Protecting Consumers From Security Breaches

Incindent

Bleepingcomputer

15.1.19

Microsoft Awarded Five-Year $1.76 Billion IDIQ Contract by DoD

IT

Bleepingcomputer

15.1.19

Hundreds of Cybersecurity Risks Still Affecting the Pentagon

BigBrothers

Bleepingcomputer

15.1.19

Godaddy Injecting JavaScript That May Break Customer Sites

Hacking

Bleepingcomputer

15.1.19

Police Can't Force You To Unlock Your Phone Using Face or Fingerprint Scan

BigBrothers

Thehackernews

15.1.19

Mozilla will disable Adobe Flash by default starting from Firefox 69

Security

Securityaffairs

15.1.19

German Watchdog will request Facebook changes

BigBrothers

Securityaffairs

15.1.19

Secured MongoDB archive exposed 202 Million private resumes

Incindent

Securityaffairs

15.1.19

Researchers Invited to Hack a Tesla at Pwn2Own 2019

Congress

Securityweek

15.1.19

Check Point Acquires Web Application Security Startup ForceNock

IT

Securityweek

15.1.19

Security Expectations and Mis-Conceptions in Migrating ERP to the Cloud

Security

Securityweek

15.1.19

Firefox 69 to Disable Adobe Flash by Default

Security

Securityweek

15.1.19

Unpatched Flaws in Building Access System Allow Hackers to Create Fake Badges

Vulnerebility

Securityweek

15.1.19

Senator Voices Concern of Taxpayer Fraud During Government Shutdown

BigBrothers

Securityweek

15.1.19

Hackers who DDoSed African telecom and US hospital get long prison sentences

CyberCrime

Net-security

15.1.19

SmokeLoader malware downloader enters list of most wanted malware

Virus

Net-security

15.1.19

90% of companies face significant obstacles with digital transformation

Safety

Net-security

15.1.19

43% of businesses are still running Windows 7, security threats remain

Security

Net-security

15.1.19

Criminals wielding Ryuk ransomware specialize in targeting enterprises

Ransomware

Net-security

15.1.19

How to build a better CISO

Security

Net-security

15.1.19

A new taxonomy for SCADA attacks

ICS

Net-security

15.1.19

Data Exposed in OXO, Amazon and MongoDB Leaks

Incindent

Threatpost

15.1.19

Hack Allows Escape of Play-with-Docker Containers

Hacking

Threatpost

15.1.19

Threatpost Poll: Can We Fix 2FA?

Vulnerebility

Threatpost

15.1.19

Ryuk Hauls in $3.7M in ‘Earnings,’ Adds TrickBot to the Attack Mix

Ransomware

Threatpost

15.1.19

Popular Web-Hosting Platform Bluehost Riddled with Flaws, Researcher Claims

Vulnerebility

Threatpost

15.1.19

Mozilla Kills Default Support for Adobe Flash in Firefox 69

Security

Threatpost

14.1.19

Digital Workplace Firm WorkJam Acquires Secure Communications Firm Peerio

IT

Securityweek

14.1.19

Schneider Electric Vehicle Charging Stations Exposed to Hacker Attacks

Incindent

Securityweek

14.1.19

Zurich Rejects Mondelez' $100 Million NotPetya Insurance Claim Citing 'Act of War'

Ransomware

Securityweek

14.1.19

Microsoft LAPS - Blue Team / Red Team

Safety

SANS

14.1.19

Windows 7 KMS Activation Issues Caused by Microsoft Mistake, Not an Update

Vulnerebility

Bleepingcomputer

14.1.19

Mozilla to Disable Flash Plugin by Default in Firefox 69

Security

Bleepingcomputer

14.1.19

Microsoft Releases KB4487345 Update to Fix Windows 7 Share Issues

Vulnerebility

Bleepingcomputer

14.1.19

Zurich refuses to pay Mondelez for NotPetya damages because it’s ‘an act of war’

Ransomware

Securityaffairs

14.1.19

Huawei Fires Sales Manager Who Poland Charged With Spying

BigBrothers

Securityweek

14.1.19

Computers at the City Hall of Del Rio were infected by ransomware

Ransomware

Securityaffairs

14.1.19

Which is the link between Ryuk ransomware and TrickBot?

Ransomware

Securityaffairs

14.1.19

TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal

APT

Securityaffairs

14.1.19

Considering an SD-WAN deployment? The best solution may already be in your network

IT

Net-security

14.1.19

Strategies for expertly protecting industrial control systems

ICS

Net-security

14.1.19

Most organizations are migrating data for ERP apps to the cloud

Security

Net-security

14.1.19

Revenue from sales of IT infrastructure products for cloud environments reached $16.8 billion

IT

Net-security

13.1.19

Ryuk Ransomware Partners with TrickBot to Gain Access to Infected Networks

Ransomware

Bleepingcomputer

13.1.19

Fake Movie File Infects PC to Steal Cryptocurrency, Poison Google Results

Cryptocurrency

Bleepingcomputer

13.1.19

Del Rio City Hall Forced to Use Paper After Ransomware Attack

Ransomware

Bleepingcomputer

13.1.19

New Batch of 9 Adware Apps in Google Play Installed Over 8 Million Times

Android

Bleepingcomputer

13.1.19

Apple's Latest iPhone Models Get Price Cuts of Up to 20% in China

Apple

Bleepingcomputer

13.1.19

US Carriers Promise Again to Stop Selling Customer Location Data

Security

Bleepingcomputer

13.1.19

Microsoft Releases Cumulative Update KB4476976 To Fix Action Center Issues

Vulnerebility

Bleepingcomputer

13.1.19

Microsoft 365 Business Gets Self Service Password Reset Writeback

Security

Bleepingcomputer

13.1.19

U.S. Government Shutdown Leaves Its Sites with Expired TLS Certificates

BigBrothers

Bleepingcomputer

13.1.19

Windows KB4480960 & KB4480970 Updates Causing Network and License Problems

Vulnerebility

Bleepingcomputer

13.1.19

Criminals Grabbed at Least 4.3 Percent of All Monero Coins on the Market

Cryptocurrency

Bleepingcomputer

13.1.19

Linux systemd Affected by Memory Corruption Vulnerabilities, No Patches Yet

Vulnerebility

Bleepingcomputer

13.1.19

Firefox 65 to Show Certificates Used in Man-in-the-Middle SSL Attacks

Safety

Bleepingcomputer

13.1.19

Unprotected MongoDB Exposes Over 200 Millions Resumes

Incindent

Bleepingcomputer

13.1.19

Hacktivist Martin Gottesfeld 10 years in prison for hospital cyberattack

Crime

Securityaffairs

13.1.19

apid7 announced the release of Metasploit 5.0

Safety

Securityaffairs

13.1.19

Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections

Attack

Securityaffairs

13.1.19

Snorpy a Web Base Tool to Build Snort/Suricata Rules

Safety

SANS

12.1.19

A Zebrocy Go Downloader

APT

Securelist

12.1.19

The world’s southernmost security conference

Congress

Securelist

12.1.19

British hacker sentenced to jail for attack on Liberian Telecoms firms

Crime

Securityaffairs

12.1.19

Phishers Use Zero-Width Spaces to Bypass Office 365 Protections

Phishing

Securityweek

12.1.19

Quick Maldoc Analysis

Virus

SANS

12.1.19

Yet Another Bypass: Is 2FA Broken? Authentication Experts Weigh In

Security

Threatpost

12.1.19

Pre-Installed Android App Impacts Millions with Slew of Malicious Activity

Android

Threatpost

12.1.19

TA505 Crime Gang Debuts Brand-New ServHelper Backdoor

CyberCrime

Threatpost

12.1.19

U.S. Government Shutdown Leaves Dozens of .Gov Websites Vulnerable

BigBrothers

Threatpost

11.1.19

Does WhatsApp Has A Privacy Bug That Could Expose Your Messages?

Social

Thehackernews

11.1.19

DoSing Hospital Networks Landed This Hacktivist in Jail for Over 10 Years

Crime

Thehackernews

11.1.19

Victims of Pylocky ransomware can decrypt their files for free

Ransomware

Securityaffairs

11.1.19

The ‘AVE_MARIA’ Malware

Virus

Securityaffairs

11.1.19

UK Hacker Jailed for Attack on Liberian Telecoms Firm

Crime

Securityweek

11.1.19

Most People Expect a Serious Cyberattack Against Their Country

BigBrothers

Securityweek

11.1.19

Rapid7 Releases Metasploit 5.0

Safety

Securityweek

11.1.19

Was North Korea Wrongly Accused of Ransomware Attacks?

Ransomware

Securityweek

11.1.19

Medical Device Security Firm Cynerio Raises $7 Million

IT

Securityweek

11.1.19

Juniper Networks Patches Over 60 Flaws in Junos, ATP Products

Vulnerebility

Securityweek

11.1.19

Juniper releases barrage of security fixes for security, networking devices

Vulnerebility

Net-security

11.1.19

Poland Charges Huawei Manager and Pole With Spying for China

BigBrothers

Securityweek

11.1.19

Hacktivist Gets 10-Year Prison Sentence for DDoS Attack on Hospitals

Crime

Securityweek

11.1.19

Blacklisted Kaspersky Tipped NSA on Security Breach: Media

BigBrothers

Securityweek

11.1.19

EU Top Court Adviser: Google Can Limit Right to be Fo rgotten

BigBrothers

Securityweek

11.1.19

TLS Certificates for Many .gov Domains Not Renewed Due to Government Shutdown

BigBrothers

Securityweek

11.1.19

Facebook and Google Launch Asia-Pacific Bug Hunting Conference

Congress

Securityweek

11.1.19

Google Secures Public DNS Queries With DNS-over-TLS

Security

Securityweek

11.1.19

Hyatt Hotels Launches Public Bug Bounty Program

Security

Securityweek

11.1.19

Cisco Patches Serious DoS Flaws in Email Security Appliance

Vulnerebility

Securityweek

11.1.19

Reddit Locks Down Accounts Due to 'Security Concern'

Incindent

Securityweek

11.1.19

Netanyahu Says Israel Ready to Thwart Election Cyber Meddling

BigBrothers

Securityweek

11.1.19

Iran-Linked DNS Hijacking Attacks Target Organizations Worldwide

BigBrothers

Securityweek

11.1.19

Reddit locked Down accounts due to alleged security breach

Incindent

Securityaffairs

11.1.19

CISCO addresses DoS bugs in CISCO ESA products

Vulnerebility

Securityaffairs

11.1.19

Alleged Iran-linked APT groups behind global DNS Hijacking campaign

APT

Securityaffairs

11.1.19

Three security bugs found in the popular Linux suite systemd

Vulnerebility

Securityaffairs

11.1.19

PyLocky Ransomware Decryption Tool Released — Unlock Files For Free

Ransomware

Thehackernews

11.1.19

Over 202 Million Chinese Job Seekers' Details Exposed On the Internet

Incindent

Thehackernews

11.1.19

New Systemd Privilege Escalation Flaws Affect Most Linux Distributions

Vulnerebility

Thehackernews

11.1.19

Hackers Using Zero-Width Spaces to Bypass MS Office 365 Protection

Hacking

Thehackernews

11.1.19

Four cybersecurity trends every CIO should know

Cyber

Net-security

11.1.19

There’s a sizable gap between confidence in security programs and their effectiveness

Security

Net-security

11.1.19

Evaluating €1bn in cybersecurity research funding

Cyber

Net-security

11.1.19

Cisco fixes serious DoS flaws in its email security appliances

Vulnerebility

Net-security

11.1.19

Google Search Results Spoofed to Create Fake News

Security

Threatpost

11.1.19

‘Unprecedented’ DNS Hijacking Attacks Linked to Iran

BigBrothers

Threatpost

10.1.19

New ServHelper Backdoor and FlawedGrace RAT Pushed by Necurs Botnet

BotNet

Bleepingcomputer

10.1.19

Microsoft Patches RCE, Information Disclosure Vulnerabilities in Exchange Server

Vulnerebility

Bleepingcomputer

10.1.19

Reddit Users Locked Out of Their Accounts for Unusual Activity

Security

Bleepingcomputer

10.1.19

Google Chrome Ad Blocker Expands Worldwide Starting July 9th

Security

Bleepingcomputer

10.1.19

AMD Unveils 7nm Radeon VII GPU as Response to NVIDIA's RTX 2080

IT

Bleepingcomputer

10.1.19

Google Adds DNS-over-TLS Support to Its Public DNS Service

Security

Bleepingcomputer

10.1.19

Hyatt Launches Public Bug Bounty Program on HackerOne

Security

Bleepingcomputer

10.1.19

Google Rolls Out Activity Cards to Help You Find Past Searches

Security

Bleepingcomputer

10.1.19

Using Google Knowledge Graph to Spoof Search Results

IT

Bleepingcomputer

10.1.19

Windows 10 Build 18312 (19H1) Released With Reserved Storage Implementation

Vulnerebility

Bleepingcomputer

10.1.19

Apple Orders 10 Percent Production Cut for New iPhone Models

Apple

Bleepingcomputer

10.1.19

WordPress-Related Vulnerabilities Tripled in 2018

Vulnerebility

Bleepingcomputer

10.1.19

CryptoMix Ransomware Exploits Sick Children to Coerce Payments

Ransomware

Bleepingcomputer

10.1.19

Crooks Use Email to Scam St Lawrence College Parents Out of Tuition

Spam

Bleepingcomputer

10.1.19

Activity Stream Snippets Launched in Firefox To Market Mozilla Offerings

IT

Bleepingcomputer

10.1.19

Latest Malwarebytes Update Causing Windows 7 to Freeze

Vulnerebility

Bleepingcomputer

10.1.19

5 Adware Apps in Google Play Installed 9 Million Times

Android

Bleepingcomputer

10.1.19

Microsoft Delivers January 2019 Office Update

Vulnerebility

Bleepingcomputer

10.1.19

Microsoft January 2019 Patch Tuesday Includes 51 Security Updates

Vulnerebility

Bleepingcomputer

10.1.19

Adobe Releases January 2019 Security Updates. None for Flash Player!

Vulnerebility

Bleepingcomputer

10.1.19

Microsoft Releases Windows 7 & 8.1 Cmulative Updates KB4480970 & KB4480963

Vulnerebility

Bleepingcomputer

10.1.19

Microsoft Debuts Azure Migrate and Azure Site Recovery Enhancements

Security

Bleepingcomputer

10.1.19

Microsoft Releases Servicing Stack Updates for Windows 10 Version 1703

Vulnerebility

Bleepingcomputer

10.1.19

Windows 10 January 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

10.1.19

Microsoft Adding Office 365 Threat Auto-Investigation to GCC Offering

Security

Bleepingcomputer

10.1.19

Google DNS Service (8.8.8.8) Now Supports DNS-over-TLS Security

Security

Thehackernews

10.1.19

Turns Out Kaspersky Labs Helped FBI Catch Alleged NSA Leaker

BigBrothers

Thehackernews

10.1.19

Ironic turn … Kaspersky Labs helped NSA to catch alleged data thief

BigBrothers

Securityaffairs

10.1.19

First Google security patches for Android in 2019 fix a critical flaw

Android

Securityaffairs

10.1.19

ate attorneys general announced a $1.5 million settlement with Neiman Marcus

Crime

Securityaffairs

10.1.19

Google Patches Critical Vulnerability in Android

Android

Securityweek

10.1.19

DoS Vulnerability Found in Scapy Packet Manipulation Tool

Vulnerebility

Securityweek

10.1.19

The Promise and Peril of 5G

Mobil

Threatpost

10.1.19

Intel Patches High-Severity Privilege-Escalation Bugs

Vulnerebility

Threatpost

10.1.19

Critical Flaw in Cisco’s Email Security Appliance Enables ‘Permanent DoS’

Vulnerebility

Threatpost

10.1.19

Microsoft Issues Multiple Critical Patches for Edge Browser

Vulnerebility

Threatpost

10.1.19

ICEPick-3PC: A Sophisticated Adware That Collects Data En Masse

Android

Threatpost

10.1.19

Google Play Boots 85 Malicious Adware Apps

Android

Threatpost

10.1.19

ThreatList: WordPress Vulnerabilities Tripled in 2018

Vulnerebility

Threatpost

10.1.19

Biometrics in 2019: Increased Security or New Attack Vector?

Attack

Threatpost

10.1.19

Understanding how data becomes intelligence is central for any successful security program

Security

Net-security

10.1.19

GDPR: Five tips for organizations to remain compliant

Privacy

Net-security

10.1.19

Small manufacturers play important role in supply chain security

Security

Net-security

10.1.19

Email security predictions: What we can expect in 2019

Spam

Net-security

10.1.19

Deception for proactive defense

Safety

Net-security

10.1.19

G Suite warns admins about domain data exfiltration attempts

Security

Net-security

10.1.19

Heartbreaking Emails: "Love You" Malspam

Security

SANS

9.1.19

German Police Seek Help In Finding Parcel Bomber With MAC Address

BigBrothers

Thehackernews

9.1.19

State attorneys general announced a $1.5 million settlement with Neiman Marcus

Crime

Securityaffairs

9.1.19

SAP Releases 'Hot News' Security Notes on First Patch Day of 2019

Vulnerebility

Securityweek

9.1.19

Transmute Launches Blockchain Framework Focused on Identity

Security

Securityweek

9.1.19

FireEye Adds New Features to Email Security Product

Safety

Securityweek

9.1.19

CES – singularity and securing the car

Security blog

Eset

9.1.19

New Year’s resolutions: Get your passwords shipshape

Cyber blog

Eset

9.1.19

EU offers bug bounties on popular open source software

BigBrother blog

Eset

9.1.19

Personal data of German political elite dumped online

BigBrother blog

Eset

9.1.19

What is threat cumulativity and what does it mean for digital security?

Security blog

Eset

9.1.19

This Netflix-themed scam prompts FTC to issue warning

Spam blog

Eset

9.1.19

Ransomware vs. printing press? US newspapers face “foreign cyberattack”

Malware blog

Eset

9.1.19

2018: Research highlights from ESET’s leading lights

Malware blog

Eset

9.1.19

Analysis of the latest Emotet propagation campaign

Malware blog

Eset

9.1.19

What should you do with your old devices

Hardware blog

Eset

9.1.19

SPARE: Five tips for a safer online shopping experience

Cyber blog

Eset

9.1.19

Google Removes 85 Adware Apps That Infect 9 Million Android Users

Android

Thehackernews

9.1.19

Microsoft Patch Tuesday — January 2019 Security Updates Released

Vulnerebility

Thehackernews

9.1.19

20-Year-Old Man Arrested For Carrying Out Germany's Biggest Data Leak

BigBrothers

Thehackernews

9.1.19

Vietnam Accuses Facebook of Breaching New Cyber Law

Social

Securityweek

9.1.19

Sophos Acquires Cloud Security Firm Avid Secure

Security

Securityweek

9.1.19

Microsoft January 2019 Patch Tuesday updates fix 7 critical vulnerabilities

Vulnerebility

Securityaffairs

9.1.19

Adobe addresses Important’ Flaws in Connect, Digital Editions

Vulnerebility

Securityaffairs

9.1.19

German youngster behind massive data leak of German politicians data

BigBrothers

Securityaffairs

9.1.19

Microsoft Issues Multiple Critical Patches for Edge Browser

Vulnerebility

Threatpost

9.1.19

Adobe Patches Important Bugs in Connect and Digital Edition

Vulnerebility

Threatpost

9.1.19

Malvertising Campaign Delivers Double Whammy of Ransomware and Info-Stealing

Ransomware

Threatpost

9.1.19

Shipping Firms Speared with Targeted ‘Whaling’ Attacks

Attack

Threatpost

9.1.19

Neiman Marcus Reaches $1.5 Million Data Breach Settlement

Incindent

Securityweek

9.1.19

Australia's Early Warning Network Hacked

BigBrothers

Securityweek

9.1.19

Microsoft Patches Critical Flaws in Edge, Hyper-V, DHCP

Vulnerebility

Securityweek

9.1.19

U.S. Senators Introduce Bi-Partisan Bill to Counter China Hacking Threat

BigBrothers

Securityweek

9.1.19

gganimate: Animate YouR Security Analysis

Security

SANS

9.1.19

Battling attacks from global criminal networks in the financial sector

Attack

Net-security

9.1.19

Modern CISO challenges: Implementing DevSecOps, improving security operations

Cyber

Net-security

9.1.19

Encryption backdoors open a Pandora’s Box for cybersecurity

Cyber

Net-security

9.1.19

Worldwide spending on IoT to reach $745 billion in 2019

IoT

Net-security

9.1.19

Popular coding advice doesn’t necessarily equal secure coding advice

Security

Net-security

8.1.19

Microsoft told to Pay €1100 After Forced Windows 10 Upgrade Breaks PC

Security

Bleepingcomputer

8.1.19

New Side-Channel Attack Steals Data from Windows, Linux Page Cache

Attack

Bleepingcomputer

8.1.19

NCSC Starts Campaign to Help Industry Fight Foreign State Threats

BigBrothers

Bleepingcomputer

8.1.19

OXO Discloses MageCart Attack That Targeted Customer Data on Oxo.com

Attack

Bleepingcomputer

8.1.19

Microsoft Pulls Office 2010 January 2019 Updates After Excel Blunder

Vulnerebility

Bleepingcomputer

8.1.19

Microsoft Announces Unlimited Private Repos for GitHub Free

IT

Bleepingcomputer

8.1.19

Google Emails Users About Private Data Exposed by Google+ API Bug

Incindent

Bleepingcomputer

8.1.19

Coinbase suspended Ethereum Classic (ETC) trading after a successful 51% attack

Attack

Securityaffairs

8.1.19

New Side-Channel Attack Targets OS Page Cache

Attack

Securityweek

8.1.19

German, 20, Confesses to Massive Data Hack Spurred by 'Annoyance'

BigBrothers

Securityweek

8.1.19

Government Incident Highlights Loophole in U.S. Breach Disclosure Regulations

BigBrothers

Securityweek

8.1.19

Adobe Patches 'Important' Flaws in Connect, Digital Editions

Vulnerebility

Securityweek

8.1.19

Radware to Acquire Bot Mitigation Firm ShieldSquare

BotNet

Securityweek

8.1.19

Suspect, 20, Held Over Massive German Politician Data Hack

BigBrothers

Securityweek

8.1.19

Zerodium Offers to Buy Zero-Day Exploits at Higher Prices Than Ever

Security

Thehackernews

8.1.19

Ethereum Classic (ETC) Hit by Double-Spend Attack Worth $1.1 Million

Attack

Thehackernews

8.1.19

Zerodium offers $2 million for remote iOS jailbreak, $1 million for WhatsApp RCE

Security

Net-security

8.1.19

Nine 2019 Cybersecurity Predictions

Cyber

Securityaffairs

8.1.19

Tens of thousands of hot tubs are exposed to hack

Incindent

Securityaffairs

8.1.19

ckers have stolen customer data from Titan Manufacturing and Distributing company for nearly one year

Incindent

Securityaffairs

8.1.19

The United States and China - A Different Kind of Cyberwar

CyberWar

Securityweek

8.1.19

Zerodium Offers $2 Million for iOS Hacks, $1 Million for Chat App Exploits

Cyber

Securityweek

8.1.19

U.S. Companies Urged to Protect Against Foreign Government Hackers

BigBrothers

Securityweek

8.1.19

Hackers Steal Customer Data From Manufacturing Company

Incindent

Securityweek

8.1.19

Akamai Acquires Identity Management Firm Janrain

Security

Securityweek

8.1.19

Managed Healthcare Provider Humana Discloses Data Breach

Incindent

Securityweek

8.1.19

Hackers Infiltrate Early Warning Network System to Send Spam

Spam

Threatpost

8.1.19

Zerodium Raises Zero-Day Payout Ceiling to $2M

Vulnerebility

Threatpost

8.1.19

ThreatList: Container Security Lags Amidst DevOps Enthusiasm

Security

Threatpost

8.1.19

Is Privileged Access Management still a pain?

Vulnerebility

Net-security

8.1.19

The rising importance of Data Loss Prevention in today’s data protection landscape

Incindent

Net-security

8.1.19

Rise of DevOps exposes organizations to risk via container vulnerabilities

Vulnerebility

Net-security

8.1.19

Top vulnerabilities hospital executives should address immediately

Vulnerebility

Net-security

8.1.19

Growing demand to meet regulatory compliance drives overall network encryption market

Crypto

Net-security

7.1.19

unCAPTCHA AI Cracks Google reCAPTCHAs with 90% Accuracy

Hacking

Threatpost

7.1.19

Skype Glitch Allowed Android Authentication Bypass

Vulnerebility

Threatpost

7.1.19

Snowden’s Attorney Urges Canada to Take in Whistleblower Helpers (Part Two)

BigBrothers

Threatpost

7.1.19

GandCrab Operators Use Vidar Infostealer as a Forerunner

Cyber

Bleepingcomputer

7.1.19

App Store Games Found Communicating with Golduck Malware C&C servers

Virus

Bleepingcomputer

7.1.19

Apples Taunts Competitors on Lack of Privacy With CES 2019 Ad

Apple

Bleepingcomputer

7.1.19

AustralianEarly Warning Network hacked and used to send fake alerts

Spam

Securityaffairs

7.1.19

ReiKey app for macOS can detect Mac Keyloggers using event taps

Apple

Securityaffairs

7.1.19

Skype Glitch Allowed Android Authentication Bypass

Android

Threatpost

7.1.19

Latest Phishing Technique Uses Fake Fonts to Evade Detection

Phishing

Securityweek

7.1.19

BlackBerry Offers Its Security Technology to IoT Device Makers

Mobil

Securityweek

7.1.19

NSA to Release Reverse Engineering Tool for Free Public Use

BigBrothers

Securityweek

7.1.19

Most popular home routers lack basic software security features

Cyber

Net-security

7.1.19

EU launches bug bounties on free and open source software

BigBrothers

Net-security

7.1.19

Hacker Uses Australian Early Warning Network to Send Spam Alerts

Spam

Bleepingcomputer

7.1.19

Opera Blacklists Tampermonkey Extension Being Installed by Malware

Virus

Bleepingcomputer

7.1.19

NSA to release its GHIDRA reverse engineering tool for free

BigBrothers

Thehackernews

7.1.19

SA will reveal its GHIDRA Reverse Engineering tool at RSA Conference

BigBrothers

Securityaffairs

7.1.19

Dark Overlord hacking crew publishes first batch of confidential 9/11 files

Incindent

Securityaffairs

7.1.19

Industry Reactions to Massive Data Leak in Germany

Incindent

Securityweek

7.1.19

German IT Security Agency Defends Response in Hacking Case

BigBrothers

Securityweek

7.1.19

US Gadget Love Forecast to Grow Despite Trust Issues

Security

Securityweek

7.1.19

Analyzing Encrypted Malicious Office Documents

Virus

SANS

7.1.19

Shifting the burden: Long-term magnifying consequence

Security

Net-security

7.1.19

January 2019 Patch Tuesday forecast: Partly cloudy followed by heavy fog around Java

Vulnerebility

Net-security

7.1.19

The average PC gamer has experienced almost 5 cyberattacks due to poor security habits

Cyber

Net-security

7.1.19

The attack surface is growing faster than it has at any other point in the history of technology

Security

Net-security

7.1.19

Security analytics to reach $12 billion by 2024

Security

Net-security

6.1.19

27% of Passwords From Town of Salem Breach Already Cracked

Incindent

Bleepingcomputer

6.1.19

New ReiKey app for macOS can Detect Mac Keyloggers

Apple

Bleepingcomputer

6.1.19

Blur data leak potentially exposed data of 2.4 Million users

Incindent

Securityaffairs

6.1.19

Malicious .tar Attachments

Virus

SANS

5.1.19

Wide-Ranging German Doxxing Incident Hits Hundreds of Politicians

Incindent

Threatpost

5.1.19

Weather Channel App in a Deluge of Legal Trouble for Data Misuse

Security

Threatpost

5.1.19

Did Arora Ransomware infect you? You can decrypt file for free

Ransomware

Securityaffairs

5.1.19

igh Severity DoS bug affects Several Yokogawa products

Attack

Securityaffairs

5.1.19

Flaw in Skype for Android exposes photos and contacts

Android

Securityaffairs

5.1.19

Town of Salem Data Breach Exposes 7.6 Million Gamers' Accounts

Incindent

Thehackernews

5.1.19

NSA Releasing the GHIDRA Reverse Engineering Tool at RSAConference

BigBrothers

Bleepingcomputer

5.1.19

Google Speech2Text API Helps Defeat reCAPTCHA Challenge, Again

IT

Bleepingcomputer

5.1.19

5.25 Million Unencrypted Passport Numbers Accessed in Starwood Breach

Incindent

Bleepingcomputer

5.1.19

Google Acquires Q&A Startup Superpod to Boost Assistant IQ

IT

Bleepingcomputer

5.1.19

A Malicious JPEG?

Virus

SANS

4.1.19

Face Unlock Feature Is Useless in 4 out of 10 Phones

Apple

Bleepingcomputer

4.1.19

How to Decrypt the Aurora Ransomware with AuroraDecrypter

Ransomware

Bleepingcomputer

4.1.19

Microsoft Released the January 2019 Non-Security Office Updates

Vulnerebility

Bleepingcomputer

4.1.19

New NRSMiner cryptominer NSA-Linked EternalBlue Exploit

Cryptocurrency

Bleepingcomputer

4.1.19

Adobe Fixes Two Critical Acrobat and Reader Flaws

Vulnerebility

Threatpost

4.1.19

Marriott Revises Breach Scope to 383M Records

Incindent

Threatpost

4.1.19

Phishing Tactic Hides Tracks with Custom Fonts

Phishing

Threatpost

4.1.19

Wide-Ranging German Doxxing Incident Hits Hundreds of Politicians

BigBrothers

Threatpost

4.1.19

Hundreds of Thousands Download Spyware from Google Play

Android

Securityweek

4.1.19

HR1 Bill Includes Provisions to Improve U.S. Election Security

BigBrothers

Securityweek

4.1.19

Fewer Affected in Marriott Hack, but Passports a Red Flag

Incindent

Securityweek

4.1.19

Serious DoS Flaw Impacts Several Yokogawa Products

Vulnerebility

Securityweek

4.1.19

Ransomware Attack Against Hosting Provider Confirms MSPs Are Prime Targets

Ransomware

Securityweek

4.1.19

Hackers Leak Personal Data from Hundreds of German Politicians On Twitter

BigBrothers

Thehackernews

4.1.19

Apple Removes iPhone 7 and 8 From German Stores

IT

Bleepingcomputer

4.1.19

Private Data, Official Docs of Hundreds of German Politicians Leaking for at Least a Month

BigBrothers

Bleepingcomputer

4.1.19

Hackers leak data on hundreds of German Politicians, including Chancellor Merkel

BigBrothers

Securityaffairs

4.1.19

Town of Salem RP Game hacked, more than 7.6M Players affected

Hacking

Securityaffairs

4.1.19

Vulnerability in Skype for Android Exposes User Data

Vulnerebility

Securityweek

4.1.19

Massive Data Leak Targets German Officials Including Merkel

BigBrothers

Securityweek

4.1.19

New Phishing Tactic Uses Custom Web Fonts to Prevent Detection

Phishing

Bleepingcomputer

4.1.19

Windows 10 Insider Build 18309 Released With More Password-less Sign-in Options

IT

Bleepingcomputer

4.1.19

New Android Malware Combines Info-Stealing and Phishing Features

Android

Bleepingcomputer

4.1.19

Microsoft Edge for iOS Beta Brings Picture-in-Picture and MSN Kids News Feed

iOS

Bleepingcomputer

4.1.19

Android Messages Can Now Detect and Block Spam

Spam

Bleepingcomputer

4.1.19

Adobe Acrobat and Reader Security Updates Released for Critical Bugs

Vulnerebility

Bleepingcomputer

4.1.19

Python 3.7 Is Now Available in the Microsoft Store for Windows 10

IT

Bleepingcomputer

4.1.19

Adobe Issues Emergency Patches for Two Critical Flaws in Acrobat and Reader

Vulnerebility

Thehackernews

4.1.19

Adobe addressed two critical flaws in Adobe Acrobat, Reader

Vulnerebility

Securityaffairs

4.1.19

Hackers defaced Dublin Luas website and demand ransom

Ransomware

Securityaffairs

4.1.19

A Dozen Flaws in Popular Mac Clean-Up Software Allow Local Root Access

Vulnerebility

Threatpost

4.1.19

Multiple Vulnerabilities Patched in CleanMyMac Utility

Vulnerebility

Securityweek

3.1.19

Chromecast Hacker Calls it Quits After Hearing FBI Is Looking Into Him

Crime

Bleepingcomputer

3.1.19

Microsoft's Bali Data Bank to Help Users Manage Their Data

Hacking

Bleepingcomputer

3.1.19

Dual Data Leaks of Blur, Town of Salem Impact Millions

Incindent

Threatpost

3.1.19

Snowden’s Attorney Talks Govt Harrassment of Whistleblower Helpers (Part One)

Cyber

Threatpost

3.1.19

MobSTSPYInfo-Stealing Trojan Goes Global Via Google Play

Android

Threatpost

3.1.19

Two Critical Flaws Patched in Adobe Acrobat, Reader

Vulnerebility

Securityweek

3.1.19

Blur Exposes Information of 2.4 Million Users

Incindent

Securityweek

3.1.19

Website of Dublin Tram System Hacked

Hacking

Securityweek

3.1.19

Google's New Fucsia OS to Support Android Apps

Android 

Bleepingcomputer

3.1.19

Irish Rail Oprator Gets Ransom Note on Its Website

Ransomware

Bleepingcomputer

3.1.19

Microsoft Patents Silent Voice Command Input Method

IT

Bleepingcomputer

3.1.19

Thousands of Google Chromecast Devices Hijacked to Promote PewDiePie

Hacking

Thehackernews

3.1.19

Google Partially Patches Flaw in Chrome for Android 3 Years After Disclosure

Android

Thehackernews

3.1.19

After 3 years, Google partially fixes a bug in Android Google Chrome

Security

Securityaffairs

3.1.19

Hackers Hijack Smart TVs to Promote PewDiePie

Hacking

Threatpost

3.1.19

New Crypto-Mining Attacks Leverage NSA-Linked EternalBlue Exploit

Cryptocurrency

Securityweek

3.1.19

Hackers Attempt to Sell Stolen 9/11 Documents

Incindent

Securityweek

3.1.19

Windows 10 Dark Mode in Chrome Delayed by Missing Laptop?

IT

Bleepingcomputer

3.1.19

Hacker Streaming PewDiePie Videos on Exposed Chromecast Devices

Hacking

Bleepingcomputer

3.1.19

Apple Cuts Down Revenue Estimate for 2019 First Quarter

Apple

Bleepingcomputer

3.1.19

Windows 10 October 2018 Update Bug Breaks FLAC Support

Vulnerebility

Bleepingcomputer

3.1.19

Updating to Windows 10 1809 Deactivates Built-in Admin Account

Vulnerebility

Bleepingcomputer

3.1.19

Abine Blur Password Manager User Data Exposed Online

Incindent

Bleepingcomputer

3.1.19

Master Decryption Key Released for FilesLocker Ransomware

Ransomware

Bleepingcomputer

3.1.19

Microsoft Adds New Microsoft 365 Security and Compliance Bundles

Security

Bleepingcomputer

3.1.19

ICS Security Experts Share Tales From the Trenches

ICS

Securityweek

3.1.19

New Protocol Authenticates USB Type-C Chargers, Devices

Safety

Securityweek

3.1.19

Vulnerability in Chrome for Android Patched Three Years After Disclosure

Android

Securityweek

3.1.19

Security Concerns Prompt Closing of Dividend Applications

Security

Securityweek

3.1.19

Inside PolySwarm's Decentralized Threat Intelligence Marketplace

Cyber

Securityweek

3.1.19

Automated System Bypasses Google reCAPTCHA Again

Security

Securityweek

3.1.19

New unCaptcha automated system bypasses Google reCAPTCHA once again

Security

Securityaffairs

3.1.19

Cloud Hosting Provider DataResolution.net hit by the Ryuk ransomware

Ransomware

Securityaffairs

3.1.19

EU Offers Bug Bounties For 14 Open Source Projects

BigBrothers

Threatpost

3.1.19

Newsmaker Interview: Bruce Schneier on Physical Cyber Threats

Cyber

Threatpost

3.1.19

Chrome in Android Leaks Device Fingerprinting Info

Privacy

Threatpost

2.1.19

Malicious Script Leaking Data via FTP

Virus

SANS

2.1.19

Court Dismisses Lawsuit Against Google's Facial Recognition Tech

Crime

Bleepingcomputer

2.1.19

How to Decrypt the FilesLocker Ransomware with FilesLockerDecrypter

Ransomware

Bleepingcomputer

2.1.19

wget utility potential leaked password via extended filesystem attributes

Security

Securityaffairs

2.1.19

Vietnam's Draconian Cybersecurity Bill Comes Into Effect

BigBrothers

Securityweek

2.1.19

Ryuk Ransomware Suspected in U.S. Newspaper Attack

Ransomware

Securityweek

2.1.19

EU to Run Bug Bounty Programs for 14 Free Software Projects

BigBrothers

Securityweek

2.1.19

Hackers stole $750,000 worth Bitcoin from Electrum wallets

Cryptocurrency

Securityaffairs

2.1.19

Google Chrome to Support Windows 10's Dark Mode Setting

IT

Bleepingcomputer

2.1.19

Experts analyzed the distribution technique used in a recent Emotet campaign

Virus

Securityaffairs

2.1.19

EU to Run Bug Bounty Programs for 14 Free Software Projects

BigBrothers

Securityweek

2.1.19

Maldoc with Nonfunctional Shellcode

Virus

SANS

1.1.19

2019 Malware Trends to Watch

Virus

Threatpost

1.1.19

Ransomware vs. printing press? US newspapers face “foreign cyberattack”

Ransomware blog

Eset

1.1.19

2018: Research highlights from ESET’s leading lights

Malware blog

Eset

1.1.19

Analysis of the latest Emotet propagation campaign

Malware blog

Eset

1.1.19

What should you do with your old devices

Security blog

Eset

1.1.19

Cryptocurrency Wallet Hacks Spark Dustup

Cryptocurrency

Threatpost

1.1.19

Threatlist: Dark Web Markets See an Evolution in Q3

Cyber

Threatpost

1.1.19

Malware Attack Crippled Production of Major U.S. Newspapers

Virus

Threatpost