Calendar 2020 April- Home  2020  2019  2018  2017  2016

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2020 - January February March April May June July August September October November December


Date

Name

Category

Web

30.4.20

Passwordless Authentication Provider 'Secret Double Octopus' Raises $15 Million

Security

Securityweek

30.4.20

COVID-19 Lockdown Fuels Increase in RDP Attacks

Attack

Securityweek

30.4.20

Targeted Phishing Attacks Successfully Hacked Top Executives At 150+ Companies

Phishing

Thehackernews

30.4.20

Google announces cull of low-quality, misleading Chrome extensions

Security

Net-security

30.4.20

How to thwart human-operated ransomware campaigns?

Ransomware

Net-security

30.4.20

APT trends report Q1 2020

APT

Securelist

30.4.20

EventBot, a new Android mobile targets financial institutions across Europe

Android

Securityaffairs

30.4.20

RDP brute-force attacks rocketed since beginning of COVID-19

Attack

Securityaffairs

30.4.20

YARA 4.0.0 Released With Important New Features

Security

Securityweek

30.4.20

Android Ransomware Asks for Victim's Credit Card Info

Android

Securityweek

30.4.20

Google Steps Up Fight on Spam in Chrome Web Store

Spam

Securityweek

30.4.20

Critical Vulnerability in Salt Requires Immediate Patching

Vulnerebility

Securityweek

30.4.20

Hackers Knew How to Target PLCs in Israel Water Facility Attacks: Sources

ICS

Securityweek

30.4.20

New Android Malware Steals Banking Passwords, Private Data and Keystrokes

Android

Thehackernews

30.4.20

Cato SDP: Cloud-Scale and Global Remote Access Solution Review

Security

Thehackernews

30.4.20

Critical Bugs Found in 3 Popular e-Learning Plugins for WordPress Sites

Vulnerebility

Thehackernews

30.4.20

AA20-120A : Microsoft Office 365 Security RecommendationsCERTCERT

30.4.20

Millions of Brute-Force Attacks Hit Remote Desktop AccountsAttack

Threatpost

30.4.20

EFF: Google, Apple’s Contact-Tracing System Open to CyberattacksSecurity

Threatpost

30.4.20

High-Severity Cisco IOS XE Flaw Threatens SD-WAN RoutersVulnerebility

Threatpost

30.4.20

Critical GitLab Flaw Earns Bounty Hunter $20KSecurityThreatpost

30.4.20

ThreatList: Human-Mimicking Bots Spike, Targeting e-Commerce and TravelSecurity

Threatpost

30.4.20

Journalist Matthew Keys is now charged with an attack on a magazineAttackSecurityaffairs

30.4.20

Estonian intelligence reports foreign hackers breached Mail.ee email providerBigBrothersSecurityaffairs

30.4.20

Android Phone Makers Improve Patching PracticesAndroidSecurityweek

30.4.20

Researcher Earns $20,000 From GitLab for Critical VulnerabilityVulnerebilitySecurityweek

30.4.20

Collecting IOCs from IMAP Folder

Security

SANS

30.4.20

As companies rely on digital revenue, the need for web and mobile app security skyrockets

Mobil

Net-security

30.4.20

Keeping your app’s secrets secret

Mobil

Net-security

30.4.20

Suspicious business emails increase, imposters pretend to be executives

Security

Net-security

30.4.20

Organizations look to build resiliency with hybrid and multi-cloud architectures

Security

Net-security

30.4.20

Global NAC market estimated to reach $2.21 billion by 2024

IT

Net-security

29.4.20

Privacy Preserving Protocols to Trace Covid19 Exposure

Privacy

SANS

29.4.20

Google found zero-click vulnerabilities in Apple’s multimedia processing componentsAppleSecurityaffairs

29.4.20

Adobe addresses several critical flaws in Illustrator, Bridge, and MagentoVulnerebilitySecurityaffairs
29.4.20Google Researchers Find Multiple Vulnerabilities in Apple's ImageIO FrameworkAppleSecurityweek
29.4.20Convict in LA Times Hack Again Accused of Attacking MediaHackingSecurityweek
29.4.20Microsoft, Google Announce Wider Availability of Secure VMsVulnerebilitySecurityweek
29.4.20Six Critical Vulnerabilities Patched in MagentoVulnerebilitySecurityweek

29.4.20

Adobe fixes critical flaws in Magento, Adobe Illustrator and Bridge

Vulnerebility

Net-security

29.4.20

WordPress Plugin Bug Opens 100K Websites to CompromiseVulnerebility

Threatpost

29.4.20Sophisticated Android Spyware Attack Spreads via Google PlayAndroid

Threatpost

29.4.20Troves of Zoom Credentials Shared on Hacker ForumsIncindent

Threatpost

29.4.20Enterprise Security Woes Explode with Home Networks in the MixExploitThreatpost
29.4.20‘Black Rose Lucy’ is Back, Now Pushing RansomwareRansomware

Threatpost

29.4.20

Critical Adobe Illustrator, Bridge and Magento Flaws PatchedVulnerebilityThreatpost
29.4.20Hackers Leak Biopharmaceutical Firm’s Data Stolen in Ransomware AttackRansomwareThreatpost
29.4.20Hiding in plain sight: PhantomLance walks into a marketAPTSecurelist
29.4.20PhantomLance, a four-year-long cyberespionage spying campaignCyberSpySecurityaffairs
29.4.20SANDMAN AND FINEPROXY BEHIND THE DDOS ATTACKS AGAINST TIMETV.LIVEAttackSecurityaffairs

29.4.20

Adobe Patches 22 Vulnerabilities in Bridge, IllustratorVulnerebilitySecurityweek
29.4.20Rapid7 to Acquire Cloud Security Firm DivvyCloud for $145 MillionITSecurityweek
29.4.20PhantomLance: Vietnamese Cyberspies Targeted Android Users for YearsCyberSpySecurityweek
29.4.20New Version of Infection Monkey Maps to MITRE ATT&CK FrameworkHackingSecurityweek
29.4.20Critical Security Patches Released for Magento, Adobe Illustrator and BridgeVulnerebilityThehackernews

29.4.20

Is the future of information security and tech conferences virtual?

Security

Net-security
29.4.20

Assessing the risks of ACH payments

Security

Net-security
29.4.20

Cybersecurity pros share insights into their current work situations

Cyber

Net-security
29.4.20

Would you trust Amazon Alexa more if given the option to adjust privacy settings?

Privacy

Net-security
29.4.20

445 million attacks detected since the beginning of 2020, COVID-19 wreaks havoc

Attack

Net-security

28.4.20

Experts warn of deliveries scams that use a COVID-19 themeSpamSecurityaffairs

28.4.20

Outlaw is Back, a New Crypto-Botnet Targets European OrganizationsCryptocurrencySecurityaffairs
28.4.20100k+ WordPress sites exposed to hack due to a bug in Real-Time Find and Replace pluginHackingSecurityaffairs
28.4.20China Mandates Cybersecurity Reviews for Tech Product AcquisitionsBigBrothersSecurityweek
28.4.20Cloud Security Company Accurics Emerges From Stealth ModeSecuritySecurityweek
28.4.20Code Injection Vulnerability Found in 'Real-Time Find and Replace' WordPress PluginVulnerebilitySecurityweek
28.4.20Mozilla Says Many Popular Video Call Apps Meet Its Minimum Security StandardsSecuritySecurityweek
28.4.20Researchers Uncover Novel Way to De-anonymize Device IDs to Users' BiometricsSecurityThehackernews

28.4.20

Which video call apps should you use if you care about privacy?

Privacy

Net-security

28.4.20

Agent Tesla delivered by the same phishing campaign for over a year

Phishing  Virus

SANS

28.4.20U.S. Universities Hit With ‘Adult Dating’ Spear-Phishing AttackBigBrothers  Phishing

Threatpost

28.4.20Single Malicious GIF Opened Microsoft Teams to Nasty AttackAttack

Threatpost

28.4.20Hackers Mount Zero-Day Attacks on Sophos FirewallsVulnerebility

Threatpost

28.4.20GDPR Compliance Site Leaks Git Data, PasswordsPrivacyThreatpost
28.4.20Shade Ransomware gang shut down operations and releases 750K decryption keysRansomwareSecurityaffairs
28.4.20Group-IB helps to detain operators of scam-service issuing fake passes to move around Moscow amid COVID-19 virus lockdownCyberCrimeSecurityaffairs
28.4.20Shade Ransomware Authors Release Decryption KeysRansomwareSecurityweek
28.4.20Iran Paper Accuses US of Stealing Its .ComBigBrothersSecurityweek
28.4.20Critical Ignition Gateway Vulnerability Can Lead to Disruption in PlantsVulnerebilitySecurityweek
28.4.20

The battle against ransomware: Lessons from the front lines

Ransomware

Net-security
28.4.20

The state of data quality: Too much, too wild and too skewed

Security

Net-security
28.4.20

How to formulate a suitable identity proofing strategy

Security

Net-security
28.4.20

Why people talk a good game about privacy, but fail to follow up in real life?

Privacy

Net-security
28.4.2064% of workers say their quality of work has improved amid pandemic disruptionSecurityNet-security
27.4.20Hackers targeted ICS/SCADA systems at water facilities, Israeli government warnsBigBrothers  ICSSecurityaffairs
27.4.20FCC Only Partially Improved Its Cybersecurity Posture, GAO SaysBigBrothersSecurityweek
27.4.20Israel Says Hackers Targeted SCADA Systems at Water FacilitiesBigBrothers  ICSSecurityweek
27.4.20Collection of South Korean, U.S. Payment Cards Emerges on Underground MarketBigBrothersSecurityweek
27.4.20Kaspersky and SecurityWeek Present SAS@home Virtual Event — April 28-30CongressSecurityweek
27.4.20Hacking Microsoft Teams accounts with a GIF imageHackingSecurityaffairs
27.4.20Previously undetected VictoryGate Botnet already infected 35,000 devicesBotNetSecurityaffairs
27.4.20Microsoft Teams Vulnerability Exposed Organizations to AttacksAttack  VulnerebilitySecurityweek
27.4.20How An Image Could've Let Attackers Hack Microsoft Teams AccountsHackingThehackernews
27.4.20

Attackers exploiting a zero-day in Sophos firewalls, have yours been hit?

Vulnerebility

Net-security
27.4.20Hackers exploit SQL injection zero-day issue in Sophos firewallHackingSecurityaffairs
27.4.20Coronavirus-themed attacks April 19 – April 25, 2020SecuritySecurityaffairs
27.4.20Crooks target US universities with malware used by nation-state actorsBigBrothersSecurityaffairs
27.4.20Malware Delivered to Sophos Firewalls via Zero-Day VulnerabilityVirus  VulnerebilitySecurityweek
27.4.20Intelligence Agencies Share Web Shell Detection TechniquesBigBrothersSecurityweek
27.4.20

Powershell Payload Stored in a PSCredential Object

Security

SANS
27.4.20

Three firmware blind spots impacting securit

SecurityNet-security
27.4.20

Understanding the basics of API security

Security

Net-security
27.4.20

Third-party compliance risk could become a bigger problem

Security

Net-security
27.4.20

Most IT leaders believe remote workers are a security risk

Security

Net-security
27.4.20

Privacy pros expecting an increase in privacy rights requests as a result of COVID-19

Privacy

Net-security
27.4.20

Looking to break into cybersecurity without direct experience? Find out how

Cyber

Net-security
26.4.20

Video: Malformed .docm File

Virus

SANS
26.4.20Ransom NewsRansomRansom
26.4.20Ubuntu 20.04 LTS for Windows 10 Released on Microsoft StoreOS

Bleepingcomputer

26.4.20Microsoft Edge: New feature and improvements coming soonOS

Bleepingcomputer

26.4.20Phishing uses lay-off Zoom meeting alerts to steal credentialsPhishingBleepingcomputer
26.4.20Phishing attacks target US Payroll Protection Program LoansPhishing

Bleepingcomputer

26.4.20Researchers: 30,000% increase in pandemic-related threatsSecurity

Bleepingcomputer

26.4.20BazarBackdoor: TrickBot gang’s new stealthy network-hacking malwareVirus

Bleepingcomputer

26.4.20US universities targeted with malware used by state-backed actorsVirus

Bleepingcomputer

26.4.20400.000 US, South Korean card records put up for sale onlineBigBrothers

Bleepingcomputer

26.4.20Phishing spoofs US Federal Reserve to steal online bank accountsPhishing

Bleepingcomputer

26.4.20Windows 10 KB4549951 update fails to install, causes BSODsOS

Bleepingcomputer

26.4.20SeaChange video platform allegedly hit by Sodinokibi ransomwareRansomware

Bleepingcomputer

26.4.20New GreyNoise free service alerts you when your devices get hackedHacking

Bleepingcomputer

26.4.20NSA: Hackers exploit these vulnerabilities to deploy backdoorsBigBrothers

Bleepingcomputer

26.4.20Creative Skype phishing campaign uses Google's .app gTLDPhishing

Bleepingcomputer

26.4.20Malwarebytes releases new VPN service for WindowsSafetyBleepingcomputer
26.4.20Customer complaint phishing pushes network hacking malwarePhishing  Virus

Bleepingcomputer

26.4.20Valve reassures gamers after CS:GO and Team Fortress 2 leaksIncindent

Bleepingcomputer

26.4.20State-backed phishing targets govt employees with fast food luresPhishing

Bleepingcomputer

26.4.20New iOS zero-days actively used against high-profile targetsAppleBleepingcomputer
26.4.20

MALWARE Bazaar

Virus

SANS
26.4.20‘Boundless Cybersecurity’ Protects Organizations Mobilizing for the New Business NormalSafety blogSonicwall
26.4.20Securing Telecommuters with Expanded Endpoint Visibility and ControlSafety blogSonicwall
26.4.20What you need to know about government contact tracing appsBigBrother blogAvast blog
26.4.20Apple flaw puts iPhones & iPads at riskOS BlogAvast blog
26.4.20Studying How Cybercriminals Prey on the COVID-19 PandemicCyber blogPalo Alto Unity42
26.4.20XDR Listed as a Top Security and Risk Management Trend by GartnerCyber blog

Palo Alto

26.4.203 Myths About Security in the CloudCyber blog

Palo Alto

26.4.20Keep Adversaries at Bay with Managed Detection and ResponseCyber blog

Palo Alto

26.4.20MITRE Round 2 Results Solidify Cortex XDR as a Leader in EDRCyber blog

Palo Alto

26.4.20Cortex XDR Further Extends Network Visibility and Endpoint ControlCyber blogPalo Alto
26.4.20The Industry’s Most Comprehensive SASE Just Got Better with CloudGenixCyber blog

Palo Alto

26.4.20Five Remote Access Security Risks And How To Protect Against ThemCyber blogPalo Alto
26.4.20Bad actor sells Huiying Medical Technology’s source code for AI-assisted COVID-19 detectionVirusSecurityaffairs
26.4.20Facebook vs NSO Group lawsuit: 1,400+ users were targeted with Pegasus spywareSocialSecurityaffairs
26.4.20Zscaler saw 30,000% increase in Coronavirus-themed attacksAttackSecurityaffairs
26.4.20Experts found Symlink race issues in 28 antivirus productsSecuritySecurityaffairs
25.4.20Window 10 update weakened Google Chrome's securityOS

Bleepingcomputer

25.4.20Revive ad servers being hacked to distribute malicious adsVirus

Bleepingcomputer

25.4.20Microsoft releases OOB security updates for Microsoft OfficeOSBleepingcomputer
25.4.20DoppelPaymer Ransomware hits Los Angeles County city, leaks filesRansomware

Bleepingcomputer

25.4.20FBI warns of COVID-19 phishing targeting US health providersPhishing

Bleepingcomputer

25.4.20Windows 10 KB4550945 update released with Windows Update fixesOS

Bleepingcomputer

25.4.20Researcher discloses four IBM zero-days after refusal to fixVulnerebility

Bleepingcomputer

25.4.20New Microsoft 365 Personal and Family released with AI editorOS

Bleepingcomputer

25.4.20New Coronavirus screenlocker malware is extremely annoyingVirus

Bleepingcomputer

25.4.20Spearphishing campaigns target oil, gas companies with spywarePhishing

Bleepingcomputer

25.4.20FBI says that sharing personal info online only helps scammersBigBrothers

Bleepingcomputer

25.4.20How to download the Windows 10 2004 ISO from Microsoft nowOS

Bleepingcomputer

25.4.20Windows 10 SMBGhost RCE exploit demoed by researchersOS

Bleepingcomputer

25.4.20267 million Facebook profiles sold for $600 on the dark webSocial

Bleepingcomputer

25.4.20FBI: Extortion scammers more active due to stay-at-home ordersSpamBleepingcomputer
25.4.20Window 10 update weakened Google Chrome's securityOS

Bleepingcomputer

25.4.20Revive ad servers being hacked to distribute malicious adsVirus

Bleepingcomputer

25.4.20Microsoft releases OOB security updates for Microsoft OfficeOSBleepingcomputer
25.4.20DoppelPaymer Ransomware hits Los Angeles County city, leaks filesRansomware

Bleepingcomputer

25.4.20FBI warns of COVID-19 phishing targeting US health providersPhishing

Bleepingcomputer

25.4.20Windows 10 KB4550945 update released with Windows Update fixesOS

Bleepingcomputer

25.4.20Researcher discloses four IBM zero-days after refusal to fixVulnerebility

Bleepingcomputer

25.4.20New Microsoft 365 Personal and Family released with AI editorOS

Bleepingcomputer

25.4.20New Coronavirus screenlocker malware is extremely annoyingVirus

Bleepingcomputer

25.4.20Spearphishing campaigns target oil, gas companies with spywarePhishing

Bleepingcomputer

25.4.20FBI says that sharing personal info online only helps scammersBigBrothers

Bleepingcomputer

25.4.20How to download the Windows 10 2004 ISO from Microsoft nowOS

Bleepingcomputer

25.4.20Windows 10 SMBGhost RCE exploit demoed by researchersOS

Bleepingcomputer

25.4.20267 million Facebook profiles sold for $600 on the dark webSocial

Bleepingcomputer

25.4.20FBI: Extortion scammers more active due to stay-at-home ordersSpamBleepingcomputer
25.4.20CYBEREASON MOBILE: ANOTHER STEP TOWARDS OUR VISION TO PROTECT IT ALLSafety blogCybereason
25.4.20MITRE ATT&CK EVALUATIONS SHOWCASE CYBEREASON’S DETAILED CONTEXT AND VISIBILITYSafety blogCybereason
25.4.20UNDERSTANDING THE MITRE ATT&CK APT29 (ROUND 2) PRODUCT EVALUATIONSAPT blogCybereason
25.4.20Q&A: MAINTAINING SECURE BUSINESS CONTINUITY WITH LIOR DIVSecurity blogCybereason
25.4.20RECOMMENDED READING DURING A PANDEMICSecurity blogCybereason
25.4.20Mirai “COVID” Variant Disregards Stay-at-Home OrdersBotNet blogF5 Labs
25.4.20Ransomware: Local Government in the Firing LineRansomware blogF5 Labs
25.4.20Separating the Signal from the Noise: How Mandiant Intelligence Rates Vulnerabilities — Intelligence for Vulnerability Management, Part ThreeVulnerebility blog

FireEye

25.4.20Think Fast: Time Between Disclosure, Patch Release and Vulnerability Exploitation — Intelligence for Vulnerability Management, Part TwoVulnerebility blog

FireEye

25.4.20Vietnamese Threat Actors APT32 Targeting Wuhan Government and Chinese Ministry of Emergency Management in Latest Example of COVID-19 Related EspionageAPT blogFireEye
25.4.20IR Case: The Florentine Banker GroupMalware blogCheckpoint
25.4.20OptOut – Compiler Undefined Behavior OptimizationsSecurity blogCheckpoint
25.4.20You Won't Believe what this One Line Change Did to the Chrome SandboxSecurity blogCisco Talos
25.4.20Threat Spotlight: MedusaLockerSecurity blogCisco Talos
25.4.20Talos Incident Response announces new, lower price through July 25Incident blogCisco Talos
25.4.20Vulnerability Spotlight: Zoom Communications user enumerationVulnerebility blogCisco Talos
25.4.20iOS Mail app flaws may have left iPhone users vulnerable for yearsOS Blog

Eset

25.4.20Following ESET’s discovery, a Monero mining botnet is disruptedCryptocurrency blog

Eset

25.4.20Buying a secondhand device? Here’s what to keep in mindHardware blog

Eset

25.4.20Serious flaws found in multiple smart home hubs: Is your device among them?Vulnerebility blogEset
25.4.20How gamification can boost your cybersecurity trainingCyber blogEset
25.4.20Work from home: Should your digital assistant be on or off?Security blogEset
25.4.20Hey there! Are you using WhatsApp? Your account may be hackableSocial blogEset
25.4.20

Nintendo Confirms Breach of 160,000 Accounts

Incindent

Threatpost

25.4.20

Apple Pushes Back Against Zero-Day Exploit Claims

Apple

Threatpost

25.4.20

SAS@home Virtual Summit Showcases New Threat Intel, Industry Changes

Congress

Threatpost

25.4.20

Latest Apple Text-Bomb Crashes iPhones via Message Notifications

Apple

Threatpost
25.4.20

News Wrap: Nintendo Account Hacks, Apple Zero Days, NFL Security

Security

Threatpost
25.4.20

Nintendo confirms that hackers might have hijacked 160,000 user accounts

Incindent

Securityaffairs
25.4.20

Hoaxcalls Botnet expands the target list and adds new DDoS capabilities

Attack  BotNet

Securityaffairs
25.4.20

Flaws in ABB DCS Allow Hackers to Cause Disruption in Industrial Environments

Vulnerebility

Securityweek
24.4.20South Korean and US payment card details worth nearly $2M up for sale in the undergroundBigBrothersSecurityaffairs
24.4.20SeaChange video delivery software solutions provider hit by Sodinokibi ransomwareRansomwareSecurityaffairs
24.4.20NSA and ASD issue a report warning of web shells deploymentsBigBrothersSecurityaffairs
24.4.20Mozilla offers bigger rewards for Firefox flaws under its bug bounty programVulnerebilitySecurityaffairs
24.4.20'VictoryGate' Botnet Infected 35,000 Devices via USB DrivesBotNetSecurityweek
24.4.20Apple Finds No Evidence of Attacks Targeting iOS Mail App VulnerabilitiesAppleSecurityweek
24.4.20New GreyNoise Service Alerts Organizations of Compromised NetworksSecuritySecurityweek
24.4.20Hoaxcalls Botnet Expands Targets List, DDoS CapabilitiesBotNetSecurityweek
24.4.20Malicious USB Drives Infect 35,000 Computers With Crypto-Mining BotnetCryptocurrencyThehackernews
24.4.20

Skype Phishing Attack Targets Remote Workers’ Passwords

Phishing

Threatpost

24.4.20

Valve Confirms CS:GO, Team Fortress 2 Source-Code Leak

Incindent

Threatpost

24.4.20

A Dozen Nation-Backed APTs Tap COVID-19 to Cover Spy Attacks

APT

Threatpost

24.4.20

WHO, CDC and Bill and Melinda Gates Foundation Victims of Credential Dump, Report

Security

Threatpost
24.4.20

Fake Skype, Signal Apps Used to Spread Surveillanceware

Security

Threatpost
24.4.20

Expert identifies new Nazar APT group referenced in 2017 Shadow Brokers leak

APT

Securityaffairs
24.4.20

Vietnam-linked APT32 group launches COVID-19-themed attacks against China

APT

Securityaffairs
24.4.20

Mozilla Offers Bigger Rewards for Firefox Vulnerabilities

Vulnerebility

Securityweek
24.4.20

Malwarebytes Unveils New Privacy VPN Service

Safety

Securityweek
24.4.20

Automated Red Teaming Firm Randori Raises $20 Million

IT

Securityweek
24.4.20

Nazar: Old Iran-Linked APT Operation Monitored by NSA

APT

Securityweek
24.4.20

Vietnamese Hackers Mount COVID-19 Espionage Campaigns Against China

APT

Securityweek
24.4.20

Malicious Excel With a Strong Obfuscation and Sandbox Evasion

Virus

SANS
24.4.20

Five best practices for achieving and maintaining SOC 2 compliance

Security

Net-security
24.4.20

Client-side web security

Security

Net-security
24.4.20

Work-from-home creates multitude of opportunities for leaks

Security

Net-security
24.4.20

The true costs incurred by businesses for technology downtime

Security

Net-security
23.4.20A look at the ATM/PoS malware landscape from 2017-2019VirusSecurelist
23.4.20Microsoft issued Out-of-Band advisory to address Autodesk FBX flawsVulnerebilitySecurityaffairs
23.4.20State-sponsored hackers are using COVID-19 lures, Google warnsVirusSecurityaffairs
23.4.20Uptick in RPA Software Adoption Reveals Need for Anti-Hacking TrainingHackingSecurityaffairs
23.4.20Cybereason Unveils New Mobile Device Security OfferingsSecuritySecurityweek
23.4.20Zoom Announces Better Encryption, Other Security ImprovementsCryptoSecurityweek
23.4.20Chinese Threat Actor Targets Uyghurs With New iOS ExploitAppleSecurityweek
23.4.20Researchers Turn Antivirus Software Into Destructive ToolsSecuritySecurityweek
23.4.20Zero-Day Vulnerabilities in iOS Mail App Exploited in Targeted AttacksAppleSecurityweek
23.4.20Hackers Trick 3 British Private Equity Firms Into Sending Them $1.3 MillionCyberCrimeThehackernews
23.4.20

Web shell malware continues to evade many security tools

Virus

Net-security

23.4.20

Phishers exploiting employees’ layoff, payroll concerns

Exploit  Phishing

Net-security

23.4.20LA County Hit with DoppelPaymer Ransomware AttackRansomware

Threatpost

23.4.20Apple Patches Two iOS Zero-Days Abused for YearsApple

Threatpost

23.4.20Microsoft Issues Out-Of-Band Security Update For Office, Paint 3DVulnerebility

Threatpost

23.4.20Connected Home Hubs Open Houses to Full Remote TakeoverSecurityThreatpost
23.4.20Fast-Moving DDoS Botnet Exploits Unpatched ZyXel RCE BugBotNet  Exploit  Vulnerebility

Threatpost

23.4.20Small Businesses Tapping COVID-19 Loans Hit with Data ExposureIncindentThreatpost
23.4.20Hacking Apple iPhones and iPads by sending emails to the victimsAppleSecurityaffairs
23.4.20COVID-19 – Neo-Nazis spread a list of credentials for Gates Foundation, NIH, and WHO employeesCyberSecurityaffairs
23.4.20Microsoft Out-of-Band Advisory Addresses Autodesk FBX VulnerabilitiesVulnerebilitySecurityweek
23.4.20Nation-backed Hackers Tune Attacks to COVID-19 Fears: GoogleHackingSecurityweek
23.4.20Zero-Day Warning: It's Possible to Hack iPhones Just by Sending EmailsAppleThehackernews
23.4.20

Let’s be realistic about our expectations of AI

Cyber

Net-security

23.4.20

Massive work-from-home movement exposes cybersecurity weaknesses

Cyber

Net-security

23.4.20

Google unveils secure remote access service to unburden enterprise VPNs

Security

Net-security

23.4.20

With a transition to remote work, network visibility becomes more critical than ever

Security

Net-security

23.4.20

Bad bot traffic increases, comprising almost one quarter of all website traffic

Security

Net-security

23.4.20

Application performance becoming a key concern, influenced by increasing SD-WAN complexity

Security

Net-security

23.4.20

Try the (ISC)2 Utilizing Big Data course – a $200 value – for FREE!

Security

Net-security

22.4.20

What does it take to become a good reverse engineer?

Hacking

Securelist
22.4.20

SAS, sweet SAS

Congress

Securelist
22.4.20

DoppelPaymer Ransomware hits City of Torrance and demands a 680K+ ransom

Ransomware

Securityaffairs
22.4.20

A new Insomnia iOS exploit used to spy on China’s Uyghur minority

Exploit  iOS

Securityaffairs
22.4.20

China-linked Winnti APT targets South Korean Gaming firm

APT

Securityaffairs
22.4.20

SBA Reports Data Breach in Disaster Loan Application Website

Incindent

Securityweek
22.4.20

Flaw Could Have Allowed Hackers to Identify All Zoom Users in a Company

Vulnerebility

Securityweek
22.4.20

Hackers Can Exfiltrate Data From Air-Gapped Computers Via Fan Vibrations

Attack

Securityweek
22.4.20

FBI Official: Number of Coronavirus Cyber Complaints on Rise

BigBrothers

Securityweek
22.4.20

Chinese Hackers Using New iPhone Hack to Spy On Uyghur Muslims

Apple  BigBrothers

Thehackernews
22.4.20

Update MS Office, Paint 3D to plug RCE vulnerabilities

Vulnerebility

Net-security
22.4.20

Multiple vulnerabilities discovered in smart home devices

Vulnerebility

Net-security
22.4.20NFL Tackles Cybersecurity Concerns Ahead of 2020 Draft DayCyber

Threatpost

22.4.20RCE Exploit Released for IBM Data Risk Manager, No Patch AvailableExploit

Threatpost

22.4.20Banking.BR Android Trojan Emerges in Credential-Stealing AttacksAndroid

Threatpost

22.4.20Oil and Gas Firms Targeted With Agent Tesla SpywareVirusThreatpost
22.4.20Cyberattackers Ramp Up to 1.5M COVID-19 Emails Per DayCyberThreatpost
22.4.20OpenSSL Project fixed high-severity CVE-2020-1967 DoS issue in OpenSSLVulnerebilitySecurityaffairs
22.4.20Oil and Gas Companies Targeted With Agent Tesla MalwareVirusSecurityweek
22.4.20Tax Phishing Campaign Reminds of DMARC LimitationsPhishingSecurityweek
22.4.20Spike in Company Compromises Correlates With LockdownsIncindentSecurityweek
22.4.20ForgeRock Raises $93.5 Million Ahead of IPOITSecurityweek
22.4.20IBM Tells Researcher It Will Not Patch Serious Data Risk Manager FlawsVulnerebilitySecurityweek
22.4.20

Five contingency best practices for SOCs to handle uncertainty

Security

Net-security
22.4.20

Foiling content-borne attacks against a remote workforce

Attack

Net-security
22.4.20

Review: Cybersecurity – Attack and Defense Strategies

Cyber

Net-security
22.4.20

Are businesses prepared for a surge in cybercrime and fraud?

CyberCrime

Net-security
22.4.20

What is the impact of AI and ML tools on cybersecurity?

Cyber

Net-security
22.4.20

Odix is disarming the growing malware threat

Virus

Net-security
21.4.20Expert discloses 4 zero-days in IBM Data Risk ManagerVulnerebilitySecurityaffairs
21.4.20Spearphishing attacks hit the oil and gas industry sectorAttack  ICS  PhishingSecurityaffairs
21.4.20How to Protect Against COVID-19 Email ScamsSpamSecurityaffairs
21.4.20High-Severity Vulnerability in OpenSSL Allows DoS AttacksVulnerebilitySecurityweek
21.4.20Chinese Hackers Target South Korean Gaming CompanyBigBrothersSecurityweek
21.4.20High Court to Hear Case About Reach of Computer Hacking LawCyberCrimeSecurityweek

21.4.20

Microsoft Will Not Patch Security Bypass Flaw Abusing MSTSCVulnerebilitySecurityweek
21.4.20Google Launches Cloud-Based Remote Access SolutionSecuritySecurityweek

21.4.20

Google Creates COVID-19 Grant Fund to Boost Bug HuntingSecuritySecurityweek
21.4.20Researcher Discloses 4 Zero-Day Bugs in IBM's Enterprise Security SoftwareVulnerebilityThehackernews
21.4.20Unpatchable 'Starbleed' Bug in FPGA Chips Exposes Critical Devices to HackersVulnerebilityThehackernews
21.4.20Foxit PDF Reader, PhantomPDF Open to Remote Code ExecutionVulnerebility

Threatpost

21.4.20Bitcoin Stealers Hide in 700+ Ruby Developer LibrariesCryptocurrency

Threatpost

21.4.20Mootbot Botnet Targets Fiber Routers with Dual Zero-DaysBotNet

Threatpost

21.4.20Maze Ransomware Attack Hits CognizantRansomwareThreatpost
21.4.20267 Million Facebook identities available for 500 euros on the dark webIncindentSecurityaffairs
21.4.20Threat Report Portugal Q1 2020CyberCrimeSecurityaffairs

21.4.20

Law enforcement and Microsoft join forces to dismantle botnet using LED Light Control ConsoleBotNetSecurityaffairs
21.4.20Starbleed: Flaw in FPGA Chips Exposes Safety-Critical Devices to AttacksAttackSecurityweek

21.4.20

Coronavirus Crisis Forces Tor Project LayoffsSecuritySecurityweek
21.4.20

SpectX: Log Parser for DFIR

Security

SANS
21.4.20

CISOs: Quantifying cybersecurity for the board of directors

Cyber

Net-security
21.4.20

Top threat detection trends and challenges for cybersecurity professionals

CyberNet-security
21.4.20

46% of SMBs have been targeted by ransomware, 73% have paid the ransom

Ransomware

Net-security
21.4.20

Phishers exploit Zoom, WebEx brands to target businesses

Phishing

Net-security
21.4.20

COVID-19 affects web traffic and attack trends

Security

Net-security

21.4.20

How Hoxhunt minimizes cybersecurity risks from human error

Cyber

Net-security

20.4.20

US Government concerned by cyber attacks on Czech hospitals during COVID19 crisisBigBrothersSecurityaffairs

20.4.20

Proposed government Coronavirus contact tracing app leaked dataIncindentSecurityaffairs

20.4.20

Uniswap and Lendf.me hacked, attacker stole $25 million worth of cryptocurrencyCryptocurrencySecurityaffairs
20.4.20Patching Pulse Secure VPN Not Enough to Keep Attackers Out, CISA WarnsVulnerebilitySecurityweek
20.4.20Pompeo Concerned by Cyber Attacks on Czech HospitalsAttackSecurityweek

20.4.20

Massachusetts, Indiana Settle With Equifax Over 2017 Data BreachIncindentSecurityweek

20.4.20

LED Light Control Console Abused to Spew MalwareVirusSecurityweek
20.4.20Twitter Fails to Obtain Permission to Disclose Surveillance RequestsSocialSecurityweek
20.4.20Maze Ransomware Caused Disruptions at CognizantRansomwareSecurityweek
20.4.20COVID-Themed Lures Target SCADA Sectors With Data Stealing MalwareICSThehackernews

20.4.20

Multi-cloud key management and BYOK

Security

Net-security

20.4.20

Windows 10: Manage Reserved Storage from the command lineOS

Bleepingcomputer

20.4.20

Coronavirus Dark Web Scams: From infected blood to ventilatorsSpam

Bleepingcomputer

20.4.20IT services giant Cognizant suffers Maze Ransomware cyber attackRansomwareBleepingcomputer
20.4.20Windows 10 making it easier to manage default file associationsOS

Bleepingcomputer

20.4.20

Tor Project cut a third of its staff due to the CoronavirusSecuritySecurityaffairs

20.4.20

Understanding web security solutions

Security

Net-security
20.4.20

Starbleed vulnerability: Attackers can gain control over FPGAs

Vulnerebility

Net-security
20.4.20

Average bandwidth of DDoS attacks increasing, APIs and applications under attack

Attack

Net-security
20.4.20

Does working remotely actually work?

Security

Net-security
20.4.20

Handbook: Cyber-Risk Oversight 2020

Cyber

Net-security

19.4.20

Ransom NewsRansomRansom

19.4.20

KPOT Analysis: Obtaining the Decrypted KPOT EXE

Virus

SANS
19.4.20Popular Webkinz World online children’s game hacked, 23M credentials leakedIncindentSecurityaffairs
19.4.20Cyberattack reports quadrupled during Coronavirus outbreak, FBI warnsBigBrothersSecurityaffairs

19.4.20

Coronavirus-themed attacks April 12 – April 18, 2020SecuritySecurityaffairs
19.4.20Are Maze operators behind the attack on the IT services giant Cognizant?RansomwareSecurityaffairs
19.4.20

Maldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store

Apple

SANS
19.4.20

Hacker claims to have stolen 39 million Aptoide app store users

Android

Securityaffairs

19.4.20

Coronavirus-themed campaign targets energy sector with PoetRAT

Virus

Securityaffairs
19.4.20

Trickbot is the most prolific malware operation using COVID-19 themed lures

BotNet  Virus

Securityaffairs

19.4.20

The New Front in Hospitals’ Battle Against COVID-19: RansomwareRansomware blogSonicwall
19.4.20‘Boundless Cybersecurity’ Protects Organizations Mobilizing for the New Business NormalCyber blogSonicwall
19.4.20US Consumers lose over $13M in COVID-19 scamsSpam blogAvast blog

19.4.20

Malicious Attackers Target Government and Medical Organizations With COVID-19 Themed Phishing CampaignsMalware blog   Phishing blogPalo Alto Unity42
19.4.20APT41 Using New Speculoos Backdoor to Target Organizations GloballyAPT blogPalo Alto Unity42
19.4.20GuLoader: Malspam Campaign Installing NetWire RATMalware blogPalo Alto Unity42
19.4.20Manage A Remote SOC: Shift Management TipsCyber blog

Palo Alto

19.4.20Cloud Security 2021: 4 Key Trends You Shouldn’t MissCyber blog

Palo Alto

19.4.20

Working from Home During COVID-19: Secure Access for Remote WorkersCyber blog

Palo Alto

19.4.20Book Review: “Black Box Thinking”Cyber blog

Palo Alto

19.4.20The Rush to Video Conferencing – Are We Failing to Use Good Cyber Hygiene?...Cyber blogPalo Alto
19.4.20Securing US Federal Agency Remote Workers and Branch OfficesCyber blog

Palo Alto

19.4.20

Book Review: “Black Box Thinking”Cyber blogPalo Alto
19.4.20The Rush to Video Conferencing – Are We Failing to Use Good Cyber Hygiene?...Cyber blog

Palo Alto

19.4.20Securing US Federal Agency Remote Workers and Branch OfficesCyber blogPalo Alto

19.4.20

US govt: Hacker used stolen AD credentials to ransom hospitalsBigBrothers  Ransomware

Bleepingcomputer

19.4.20Microsoft: Trickbot in hundreds of unique COVID-19 lures per weekBotNet

Bleepingcomputer

19.4.20Leading accounting firm MNP hit with cyberattackAttackBleepingcomputer
19.4.20Microsoft helped stop a botnet controlled via an LED light consoleBotNet

Bleepingcomputer

19.4.20GitHub accounts stolen in ongoing phishing attacksIncindent  Phishing

Bleepingcomputer

19.4.20

Windows 10 2004 almost here, final build released to Insiders!OS

Bleepingcomputer

19.4.20Fake Valorant beta key generators are stealing gamers' passwordsVirus

Bleepingcomputer

19.4.20Hackers steal WiFi passwords using upgraded Agent Tesla malwareVirus

Bleepingcomputer

19.4.20Gmail blocked 18M COVID-19-themed phishing emails in a weekPhishing

Bleepingcomputer

19.4.20Zoom to let you report Zoom-bombing attackers crashing meetingsAttack

Bleepingcomputer

19.4.20

Windows Defender broken by recent updates, how to fixOS

Bleepingcomputer

19.4.20Nemty Ransomware shuts down public RaaS operation, goes privateRansomware

Bleepingcomputer

19.4.20US issues guidance on North Korean hackers, offers $5M rewardBigBrothers

Bleepingcomputer

19.4.20Exploit for Zoom Windows zero-day being sold for $500,000Exploit

Bleepingcomputer

19.4.20Cloudflare dashboard and APIs are down, some sites having issuesSafetyBleepingcomputer

18.4.20

Microsoft Office security updates may break VBA programs, how to fixOS

Bleepingcomputer

18.4.20

Microsoft Office April security updates fix critical RCE bugsOS

Bleepingcomputer

18.4.20

Intel April Platform Update fixes high severity security issuesVulnerebilityBleepingcomputer

18.4.20

Microsoft April 2020 Patch Tuesday fixes 3 zero-days, 15 critical flawsOS

Bleepingcomputer

18.4.20

RagnarLocker ransomware hits EDP energy giant, asks for €10MRansomware

Bleepingcomputer

18.4.20

Windows 10 Cumulative Updates KB4549951 & KB4549949 ReleasedOS

Bleepingcomputer

18.4.20

Microsoft delays end of support for older Windows, software versionsOS

Bleepingcomputer

18.4.20

FBI warns of ongoing COVID-19 scams targeting govt, health careBigBrothers

Bleepingcomputer

18.4.20

Russian hackers tried to steal San Francisco airport Windows accountsBigBrothers

Bleepingcomputer

18.4.20

Google reenables FTP support in Chrome due to pandemicSecurity

Bleepingcomputer

18.4.20

US consumers report $12M in COVID-19 scam losses since JanuarySpam

Bleepingcomputer

18.4.20

Cloudflare drops Google's reCAPTCHA due to privacy concernsSafety

Bleepingcomputer

18.4.20

Over 500,000 Zoom accounts sold on hacker forums, the dark webIncindent

Bleepingcomputer

18.4.20

Microsoft Outlook outage affecting Australians since SaturdayBigBrothers

Bleepingcomputer

18.4.20

Credit card thieves target WooCommerce sites with new skimmerCyberCrimeBleepingcomputer

18.4.20

INCIDENT RESPONSE: DON’T LET THAT DATA AGE-OUTIncident blogCybereason

18.4.20

What is Cross-Site Scripting (XSS)?Hacking blogF5 Labs

18.4.20

Four Risks to Consider with Expanded VPN DeploymentsCyber blogF5 Labs

18.4.20

Limited Shifts in the Cyber Threat Landscape Driven by COVID-19Cyber blog

FireEye

18.4.20

Think Fast: Time Between Disclosure, Patch Release and Vulnerability Exploitation — Intelligence for Vulnerability Management, Part TwoVulnerebility blog

FireEye

18.4.20

Ransomware Evolved: Double ExtortionRansomware blogCheckpoint

18.4.20

Threat Actors Migrating to the CloudSecurity blogCheckpoint

18.4.20

PoetRAT: Python RAT uses COVID-19 lures to target Azerbaijan public and private sectorsMalware blogCisco Talos

18.4.20

Vulnerability Spotlight: Information disclosure vulnerability in Microsoft Media FoundationVulnerebility blogCisco Talos

18.4.20

Microsoft Patch Tuesday — April 2020: Vulnerability disclosures and Snort coverageVulnerebility blogCisco Talos

18.4.20

Quarterly Report: Incident Response trends in Spring 2020Incident blogCisco Talos

18.4.20

Scams, lies, and coronavirusSpam blog

Eset

18.4.20

Apple releases mobility data to help combat COVID‑19Cyber blog

Eset

18.4.20

Half a million Zoom accounts for sale on the dark webIncident blog

Eset

18.4.20

Americans report US$13 million in losses from coronavirus scamsSpam blogEset

18.4.20

Is “global privacy” an oxymoron?Cyber blogEset

18.4.20

Attacks on Linksys Routers Trigger Mass Password ResetAttack

Threatpost

18.4.20

Hackers Update Age-Old Excel 4.0 Macro AttackAttack

Threatpost

18.4.20

Zoom Bombing Attack Hits U.S. Government MeetingBigBrothers

Threatpost

18.4.20

DHS Urges Pulse Secure VPN Users To Update PasswordsBigBrothersThreatpost

18.4.20

Experts shed the light on the mysterious critical VMware vCenter Server issueVulnerebilitySecurityaffairs

18.4.20

Cisco addresses critical issues in IP Phones and UCS DirectorVulnerebilitySecurityaffairs

18.4.20

A Brand New Ursnif/ISFB Campaign Targets Italian OrganizationsVirusSecurityaffairs

18.4.20

Hackers Targeting Azerbaijan Show Interest in SCADA SystemsBigBrothersSecurityweek

18.4.20

Several Botnets Using Zero-Day Vulnerability to Target Fiber RoutersBotNet  VulnerebilitySecurityweek

18.4.20

Google Sees Millions of COVID-19-Related Malicious Emails DailyVirusSecurityweek

18.4.20

Ad Fraud Operation Accounted for Large Amount of Connected TV TrafficIncindentSecurityweek

17.4.20

Gmail blocked 18 Million phishing and malware emails using COVID-19 lures in a week

Phishing

Securityaffairs

17.4.20

Mastering Communication in Cyber Intelligence Activities: A Concise User Guide

Cyber

Securityaffairs

17.4.20

Syria-linked APT group SEA targets Android users with COVID19 lures

APT

Securityaffairs

17.4.20

DHS Working on Cloud-based Root-of-Trust to Secure Agency Email on Mobile Devices

BigBrothers

Securityweek
17.4.20

GitHub Shares Details on Six Chrome Vulnerabilities

Vulnerebility

Securityweek
17.4.20

GitHub Warns Users of Sophisticated Phishing Campaign

Phishing

Securityweek
17.4.20

Financial Phishing Jumped to 51% of All Phishing in 2019: Kaspersky

Phishing

Securityweek
17.4.20

CISA Warns Patched Pulse Secure VPNs Could Still Expose Organizations to Hackers

Vulnerebility

Thehackernews

17.4.20

Weaponized RTF Document Generator & Mailer in PowerShell

Security

SANS

17.4.20

760+ malicious packages found typosquatting on RubyGems

Virus

Net-security

17.4.20

AA20-107A : Continued Threat Actor Exploitation Post Pulse Secure VPN PatchingCERTCERT

17.4.20

Shipping giant MSC discloses a malware-based attackAttack  VirusSecurityaffairs
17.4.20Hunting the coronavirus in the dark web – A month laterCyberSecurityaffairs
17.4.20Cisco Patches Critical Flaws in IP Phones, UCS DirectorVulnerebilitySecurityweek
17.4.20Zoom Rolls Out New Measures as Security Fears MountSecuritySecurityweek
17.4.20Details Released for Flaw Allowing Full Control Over VMware DeploymentsVulnerebilitySecurityweek
17.4.20'Not a Safe Platform': India Bans Zoom for Government UseBigBrothersSecurityweek
17.4.20Double Extortion: Ransomware's New Normal Combining Encryption with Data TheftRansomwareSecurityweek
17.4.20Zoom Revamps Bug Bounty ProgramSecuritySecurityweek

17.4.20

Using AppLocker to Prevent Living off the Land Attacks

Attack

SANS
17.4.20

Office printers: The ticking IT time bomb hiding in plain sight

Security

Net-security
17.4.20

Surge in remote working reveals concerns around unprotected endpoints

Security

Net-security
17.4.20

What type of data is trending on the dark web?

Security

Net-security
17.4.20

Researchers develop self-healing and self-concealing PUF for hardware security

Security

Net-security
17.4.20

Using Cisco IP phones? Fix these critical vulnerabilities

Vulnerebility

Net-security

16.4.20

Financial Cyberthreats in 2019CyberCrimeSecurelist
16.4.20Linksys force password reset to prevent Router hijackingHackingSecurityaffairs
16.4.20U.S. offers up to $5 Million rewards for info on North Korea-linked operationsBigBrothersSecurityaffairs
16.4.20Pentagon Paid Out $290,000 for Vulnerabilities in Air Force Data CenterBigBrothersSecurityweek
16.4.20Syrian Hackers Target Mobile Users With COVID-19 LuresMobilSecurityweek

16.4.20

Shipping Giant MSC Confirms Outage Caused by Malware AttackVirusSecurityweek
16.4.20Linksys Prompts Password Reset to Prevent Router HackingHackingSecurityweek
16.4.20Over 700 Malicious Typosquatted Libraries Found On RubyGems RepositoryVirusThehackernews

16.4.20

Intel Fixes High-Severity Flaws in NUC, Discontinues Buggy Compute ModuleVulnerebility

Threatpost

16.4.20PPE, COVID-19 Medical Supplies Targeted by BEC ScamsSpam

Threatpost

16.4.20Malicious Google Web Extensions Harvest Cryptowallet SecretsCryptocurrency

Threatpost

16.4.20Taxpayers Targeted With Improved NetWire RAT VariantVirusThreatpost
16.4.20Tencent Ups Top Bug-Bounty Award to $15KSecurityThreatpost

16.4.20

Hackers are again attacking Portuguese banking organizations via Android Trojan-BankerAndroidSecurityaffairs
16.4.20A zero-day exploit for Zoom Windows RCE offered for $500,000ExploitSecurityaffairs
16.4.20Coronavirus-themed attack: Experts uncovered flight refund scamSpamSecurityaffairs
16.4.20SAP's April 2020 Security Updates Patch Five Critical VulnerabilitiesVulnerebilitySecurityweek
16.4.20Digital.ai Launches With Software Development and Security PlatformSecuritySecurityweek

16.4.20

North Korean Threat Actors Acted as Hackers-for-Hire, Says U.S. GovernmentBigBrothersSecurityweek
16.4.20Breach-and-Attack Simulation Firm SafeBreach Raises $19 MillionITSecurityweek
16.4.20How to transform your revolutionary idea into a reality: $100K Nokia Bell Labs PrizeITThehackernews
16.4.20U.S. Offers Rewards up to $5 Million for Information on North Korean HackersBigBrothersThehackernews
16.4.20

On my mind: Transitioning to third-party cloud services

Security

Net-security
16.4.20

Information security goes non-binary

SecurityNet-security
16.4.20

Phishing kits: The new bestsellers on the underground market

Phishing

Net-security
16.4.20

Challenges companies face when implementing digital transformation initiatives

Security

Net-security
16.4.20

US victims lose $13 million from COVID-19-related scams

Spam

Net-security

15.4.20

Guidance on the North Korean Cyber ThreatCERTCERT

15.4.20

No IOCs? No Problem! Getting a Start Hunting for Malicious Office Files

Virus

SANS
15.4.20

Google removed 49 Chrome Extensions that were hijacking cryptocurrency wallets

Cryptocurrency

Securityaffairs
15.4.20

Meet AttackerKB, Rapid7's Crowdsourced Vulnerability Knowledge Base

Security

Securityweek
15.4.20

How to Steer Your Security Organization in a Toxic Environment

Security

Securityweek

15.4.20

Attack on San Francisco Airport Linked to Russian Hackers

APT

Securityweek
15.4.20

Network Traffic Analysis Firm Awake Security Raises $36 Million

IT

Securityweek
15.4.20

Oracle's April 2020 Critical Patch Update Brings 397 Security Fixes

Vulnerebility

Securityweek
15.4.20

GAO Criticizes Pentagon Over Cyber Hygiene Efforts

BigBrothers

Securityweek
15.4.20How much is the phish? Underground market of phishing kits is booming – Group-IBPhishingSecurityaffairs
15.4.20Russia-linked Energetic Bear APT behind San Francisco airport attacksAPTSecurityaffairs
15.4.20Identity Verification Provider Onfido Raises $100 MillionITSecurityweek
15.4.2049 New Google Chrome Extensions Caught Hijacking Cryptocurrency WalletsCryptocurrencyThehackernews

15.4.20

Microsoft offers free threat notification service to healthcare, human rights organizations

Security

Net-security

15.4.20

Microsoft April 2020 Patch Tuesday

OS

SANS
15.4.20Microsoft addresses three Windows issues actively exploitedExploit  VulnerebilitySecurityaffairs
15.4.20Adobe addresses five issues in ColdFusion, After Effects, Digital EditionsVulnerebilitySecurityaffairs
15.4.20Crooks target Healthcare facilities involved in Coronavirus containment with RansomwareRansomwareSecurityaffairs
15.4.20Tencent Partners With HackerOne for Bug Bounty ProgramSecuritySecurityweek
15.4.20Windows Vulnerabilities Exploited for Code Execution, Privilege EscalationVulnerebilitySecurityweek
15.4.20Adobe Patches Flaws in ColdFusion, After Effects, Digital EditionsVulnerebilitySecurityweek
15.4.20Google Keeps Support for FTP in ChromeSecuritySecurityweek
15.4.20Credentials of 4 Million Quidd Users Found on Dark WebIncindentSecurityweek
15.4.20Microsoft Issues Patches for 4 Bugs Exploited as Zero-Day in the WildOSThehackernews
15.4.20

Microsoft April 2020 Patch Tuesday

OS

SANS
15.4.20

Application security: Getting it right, from the start

Security

Net-security

15.4.20

Cybersecurity in a remote workplace: A joint effort

Cyber

Net-security

15.4.20

Are we doing enough to protect connected cars?

Safety

Net-security

15.4.20

Zoom in crisis: How to respond and manage product security incidents

Incindent

Net-security

15.4.20

April 2020 Patch Tuesday: Microsoft fixes four actively exploited vulnerabilities

Vulnerebility

Net-security

15.4.20

Will Zoom manage to retain security-conscious customers?

Security

Net-security

14.4.20

4 Million Quidd account details shared on hacking forums

Incindent

Securityaffairs
14.4.20

FTC says $12 million were lost due to Coronavirus-related scams

Spam

Securityaffairs
14.4.20

Siemens Industrial Devices Affected by 'SegmentSmack' Linux Kernel Flaw

ICS

Securityweek
14.4.20

Fingerprint-Exposing Flaw in OnePlus 7 Phone Highlights TEE Issues

Vulnerebility

Securityweek
14.4.20

Silicon Valley Legends Launch Beyond Identity in Quest to Eliminate Passwords

Security

Securityweek
14.4.20

Backup or Disaster Recovery for Protection Against Ransomware?

Ransomware

Securityweek
14.4.20

SCUF Gaming Exposes Data on 1.1 Million Customers

Incindent

Securityweek
14.4.20

Dell Releases A New Cybersecurity Utility To Detect BIOS Attacks

Safety

Thehackernews
14.4.20

Hackers Targeting Critical Healthcare Facilities With Ransomware During Coronavirus Pandemic

Ransomware

Thehackernews
14.4.20

VMware plugs critical flaw in vCenter Server, patch ASAP!

Vulnerebility

Net-security
14.4.20

Oracle Tackles a Massive 405 Bugs for Its April Quarterly Patch Update

Vulnerebility

Threatpost

14.4.20

Overlay Malware Leverages Chrome Browser, Targets Banks and Heads to Spain

Virus

Threatpost

14.4.20

500,000+ Zoom accounts available for sale on the Dark Web

Incindent

Securityaffairs
14.4.20

Apple and Google join forces to develop Contact Tracing app against Coronavirus

Apple

Securityaffairs
14.4.20

Zscaler to Acquire Cloudneeti to Solve Cloud Misconfiguration Problems

Security

Securityweek
14.4.20

The dangers of assumptions in security

Security

Net-security

14.4.20

GDPR, CCPA and beyond: How synthetic data can reduce the scope of stringent regulations

Privacy

Net-security

14.4.20

Shift to work-from-home: Most IT pros worried about cloud security

Security

Net-security

14.4.20

A worrisome increase in call traffic from fraudsters exploiting the pandemic

Exploit

Net-security

14.4.20

New lower pricing for CISSP, CCSP and SSCP online instructor-led training

Security

Net-security

13.4.20The Dutch police took down 15 DDoS-for-hire services in a weekAttack  BigBrothersSecurityaffairs

13.4.20

Danish pump maker DESMI reveals cyber attackAttackSecurityaffairs

13.4.20

San Francisco International Airport Discloses Data BreachIncindentSecurityweek

13.4.20

Dutch Police Arrest Man Over DDoS Attack on Government WebsiteBigBrothers  CrimeSecurityweek

13.4.20

SEC Settles With Two Traders Charged in EDGAR Hacking CaseHackingSecurityweek
13.4.20

Look at the same phishing campaign 3 months apart

Phishing

SANS

13.4.20

Sodinokibi Ransomware crew chooses Monero for ransom paymentsRansomwareSecurityaffairs

13.4.20

Thousands Zoom credentials available on a Dark Web forumCyberCrimeSecurityaffairs

13.4.20

Coronavirus-themed attacks April 05 – April 11, 2020SecuritySecurityaffairs

13.4.20

A new e-skimmer found on WordPress site using the WooCommerce pluginCyberCrimeSecurityaffairs

13.4.20

Apple and Google Team Up on Virus 'Contact Tracing' by SmartphoneAppleSecurityweek

13.4.20

Reader Analysis: "Dynamic analysis technique to get decrypted KPOT Malware."

Virus

SANS

13.4.20

When your laptop is your workspace, the real office never closes

Security

Net-security

13.4.20

Small businesses unprepared for remote working, most don’t provide cybersecurity training

Security

Net-security

13.4.20

You have to consider cybersecurity at all points of a cloud migration

Security

Net-security

12.4.20New Wiper Malware impersonates security researchers as prankVirus

Bleepingcomputer

12.4.20Sodinokibi Ransomware to stop taking Bitcoin to hide money trailRansomware

Bleepingcomputer

12.4.20Windows 10: The new hidden features found in preview buildsOSBleepingcomputer
12.4.20Windows Defender incorrectly flagged Winaero Tweaker as HackToolOS

Bleepingcomputer

12.4.20YouTube borked when users enable Firefox anti-fingerprintingPrivacy

Bleepingcomputer

12.4.20Windows 10X: Latest news and info on Microsoft's upcoming OSOS

Bleepingcomputer

12.4.20VMWare releases fix for critical vCenter Server vulnerabilityVulnerebility

Bleepingcomputer

12.4.20San Francisco Intl Airport discloses data breach after hackIncindent

Bleepingcomputer

12.4.20Dutch police arrests suspect behind DDoS attacks on government sitesBigBrothers

Bleepingcomputer

12.4.20Large email extortion campaign underway, DON'T PANIC!Spam

Bleepingcomputer

12.4.20Ransom NewsRansomRansom
124.20US wants to ban China Telecom over national cybersecurity risksBigBrothers

Bleepingcomputer

12.4.20The Sandboxie Windows sandbox isolation tool is now open-source!OS

Bleepingcomputer

12.4.20Over 3.6M users installed iOS fleeceware from Apple’s App StoreApple

Bleepingcomputer

12.4.20Leak shows Windows 10 2004 could come as 'May 2020 Update'OSBleepingcomputer
12.4.20Visa urges merchants to migrate e-commerce sites to Magento 2.xCyberCrime

Bleepingcomputer

12.4.20Travelex Reportedly Paid $2.3 Million Ransom to Restore OperationsRansomware

Bleepingcomputer

12.4.20Phishing emails impersonate the White House and VP Mike PencePhishing

Bleepingcomputer

12.4.20New IoT botnet launches stealthy DDoS attacks, spreads malwareBotNet  IoT

Bleepingcomputer

12.4.20Hackers struggle morally and economically over CoronavirusHacking

Bleepingcomputer

12.4.20Windows 10 will list unused files and apps you can removeOS

Bleepingcomputer

12.4.20Windows 10 is testing WSL Linux integration in File ExplorerOS

Bleepingcomputer

12.4.20Zoom removes meeting IDs from client title bar to boost securitySecurity

Bleepingcomputer

12.4.20Microsoft: No surge in malicious attacks, only more COVID-19 luresVirus

Bleepingcomputer

12.4.20fox now tells Mozilla what your default browser is every daySecurity

Bleepingcomputer

12.4.20Zoom creates council of CISOs to solve security, privacy issuesPrivacy

Bleepingcomputer

12.4.20

SonicWall Unveils Partner Program Designed for MSSPs

Safety blog

Sonicwall
12.4.20

The New Front in Hospitals’ Battle Against COVID-19: Ransomware

Ransomware blog

Sonicwall
12.4.20

Remote workers targeted for cyberattacks

Attack blog

Avast blog
12.4.20

Prisma Cloud Helps 3-GIS Secure AWS Workloads

Cyber blog

Palo Alto

12.4.20

Book Review: “Design for How People Think”

Cyber blog

Palo Alto

12.4.20

How DNS Security Helps Secure Your Remote Workforce

Cyber blog

Palo Alto

12.4.20

How to Protect Against Cyberattacks When Working from Home During COVID-19

Cyber blog

Palo Alto

12.4.20

Helping Companies Meet US Government Guidance on Securing Remote Workforces

Cyber blog

Palo Alto
12.4.20SFO discloses data breach following the hack of 2 of its websitesIncindentSecurityaffairs
12.4.20Hackers accessed staff mailboxes at Italian bank Monte dei PaschiSecuritySecurityaffairs
12.4.20Fake Cisco ‘Critical Update’ used in phishing campaign to steal WebEx credentialsPhishingSecurityaffairs
12.4.20Google and Apple Plan to Turn Phones into COVID-19 Contact-Tracking DevicesBigBrothersThehackernews
12.4.20Wireshark 3.2.3 Released: Mac Users Pay Attention PleaseSafetySANS
11.4.20Microsoft releases April 2020 Office updates with crash fixesOS

Bleepingcomputer

11.4.20

Microsoft and Google postpone insecure authentication removalOS

Bleepingcomputer

11.4.20

Chrome 81 Released With 32 Security Fixes and Web NFC APISafety

Bleepingcomputer

11.4.20

NASA under 'significantly increasing' hacking, phishing attacksHacking  PhishingBleepingcomputer

11.4.20

Drug testing firm sends data breach alerts after ransomware attackRansomware

Bleepingcomputer

11.4.20

Firefox 75 released with Windows 10 performance improvementsSafety

Bleepingcomputer

11.4.20

Microsoft buys corp.com to prevent Windows account hijackingHacking

Bleepingcomputer

11.4.20

BEC gift card scams switch to online stores due to pandemicSpam

Bleepingcomputer

11.4.20

Scammers target Australians financially affected by pandemicSpam

Bleepingcomputer

11.4.20

80% of all exposed Exchange servers still unpatched for critical flawVulnerebility

Bleepingcomputer

11.4.20

Microsoft script installs Folding@Home in Windows 10's SandboxIT

Bleepingcomputer

11.4.20

FBI warns again of BEC scammers exploiting cloud email servicesExploit  Spam

Bleepingcomputer

11.4.20

PSA: Fake Zoom installers being used to distribute malwareVirus

Bleepingcomputer

11.4.20

Interpol: Ransomware attacks on hospitals are increasingRansomware

Bleepingcomputer

11.4.20

New Microsoft Edge features will make you more productiveOS

Bleepingcomputer

11.4.20

Microsoft Edge is now 2nd most popular desktop browser, beats FirefoxOS

Bleepingcomputer

11.4.20

3 STRAIGHTFORWARD WAYS TO BUILD A SOC

Security blog

Cybereason

11.4.20

PERSPECTIVES ON MAINTAINING SECURE BUSINESS CONTINUITY: A GUIDE

Security blog

Cybereason

11.4.20

CORONAVIRUS PANIC, SECURITY, AND YOU

Security blog

Cybereason

11.4.20

INSIGHTS FROM A FIRESIDE CHAT ON RANSOMWARE, CLOUD ADOPTION, & CISOS

Ransomware blog

Cybereason

11.4.20

MalBus Actor Changed Market from Google Play to ONE Store

Malware blog

Mcafee blog

11.4.20

Transitioning to a Mass Remote Workforce – We Must Verify Before Trusting

Security blog

Mcafee blog

11.4.20

COVID-19 Threat Update – now includes Blood for Sale

Security blog

Mcafee blog

11.4.20

Thinking Outside the Bochs: Code Grafting to Unpack Malware in Emulation

Malware blog

FireEye

11.4.20

Zero-Day Exploitation Increasingly Demonstrates Access to Money, Rather than Skill — Intelligence for Vulnerability Management, Part One

Exploit blog

FireEye

11.4.20

COVID-19 goes mobile: Coronavirus malicious applications discovered

Malware blog

Checkpoint

11.4.20

Threat Actors Migrating to the Cloud

Security blog

Checkpoint

11.4.20

Fingerprint cloning: Myth or reality?

Security blog

Cisco Talos

11.4.20

Zoom security: Getting the settings right

Security blog

Eset

11.4.20

Ever needed a Zoom password? Probably not. But why not?

Security blog

Eset

11.4.20

Top tips for videoconferencing security

Security blog

Eset

11.4.20

600,000 people affected in email provider breach

Incident blog

Eset

11.4.20

What to do you if your phone is lost or stolen

Hardware blog

Eset

11.4.20

Critical Vuln in vCenter vmdir (CVE-2020-3952)

Vulnerebility

SANS

11.4.20

Apple, Google Team on Coronavirus Tracking – Sparking Privacy Fears

Apple

Threatpost

11.4.20

Critical VMware Bug Opens Up Corporate Treasure to Hackers

Vulnerebility

Threatpost

11.4.20

WooCommerce Falls to Fresh Card-Skimmer Malware

Virus

Threatpost

11.4.20

Compromised Zoom Credentials Swapped in Underground Forums

Incindent

Threatpost

11.4.20

SFO Websites Hacked: Airport Discloses Data Breach

Incindent

Threatpost

11.4.20

Apple App Store Riddled With Money-Sucking Fleeceware Apps

Apple

Threatpost

11.4.20

Travelex Pays $2.3M in Bitcoin to Hackers Who Hijacked Network in January

Cryptocurrency

Threatpost

10.4.20

Sophos Sandboxie is now available as an open-source toolSafetySecurityaffairs
10.4.20CVE2020-3952 flaw could allow attackers to hack VMware vCenter ServerVulnerebilitySecurityaffairs
10.4.20Hacker stole $250K from decentralized Bitcoin exchange BisqCryptocurrencySecurityaffairs
10.4.20DoppelPaymer crew leaked internal confidential documents belonging to aerospace companiesIncindentSecurityaffairs
10.4.20Tails OS version 4.5 supports the Secure BootSafetySecurityaffairs
10.4.20SASE Firm Cato Networks Raises $77 MillionITSecurityweek
10.4.20Data Governance Startup Okera Raises $15 Million in Series B FundingITSecurityweek
10.4.20Sophos Releases Sandboxie in Open SourceSafetySecurityweek
10.4.20Zoom Credentials Database Available on Dark WebIncindentSecurityweek
10.4.20New Dell Utility Alerts Security Teams of BIOS AttacksAttackSecurityweek
10.4.20Drones Take Italians' Temperature and Issue FinesBigBrothersSecurityweek
10.4.20Hackers Can Compromise VMware vCenter Server Via Newly Patched FlawVulnerebilitySecurityweek
10.4.20US Threatens to Block China Telecom From American MarketBigBrothersSecurityweek
10.4.20RigUp Database Exposed 76,000 Files From U.S. Energy SectorIncindentSecurityweek
10.4.20Botnet Targets Critical Vulnerability in Grandstream ApplianceBotNet  VulnerebilitySecurityweek

10.4.20

Beware of fake COVID-19-themed emails from President Trump

BigBrothers

Net-security

10.4.20

PowerShell Sample Extracting Payload From SSL

Crypto

SANS
10.4.20

April 2020 Patch Tuesday forecast: Uncertainty reigns, but patching endures through pandemic

Vulnerebility

Net-security

10.4.20

Cisco ‘Critical Update’ Phishing Attack Steals Webex Credentials

Phishing

Threatpost

10.4.20

Zoom Taps Ex-Facebook CISO Amid Security Snafus, Lawsuit

Social

Threatpost

10.4.20

‘Unbreakable’ Smart Lock Draws FTC Ire for Deceptive Security Claims

BigBrothers

Threatpost

10.4.20

Cloudflare Axes Google reCAPTCHA Due to Privacy, Price

Privacy

Threatpost
10.4.20

Unique P2P Architecture Gives DDG Botnet ‘Unstoppable’ Status

BotNet

Threatpost

10.4.20

Copycat Site Serves Up Raccoon Stealer

Virus

Threatpost
10.4.20

Travelex paid $2.3 Million ransom to restore after a ransomware attack

Ransomware

Securityaffairs
10.4.20

Google and Mozilla address serious flaws in Firefox and Chrome browsers

Vulnerebility

Securityaffairs
10.4.20

Data Privacy Firm Privitar Raises $80 Million in Series C Funding Round

IT

Securityweek
10.4.20

COVID-19 Lures Only a Fraction of Daily Phishing Emails

Phishing

Securityweek
10.4.20

Bugcrowd Raises $30 Million in Series D Funding Round

IT

Securityweek
10.4.20

Performing deception to OS Fingerprint (Part 1: nmap)

Security

SANS
10.4.20

10 considerations in order to ensure business continuity for PKI

Crypto

Net-security

10.4.20

Enterprises regard the cloud as critical for innovation, but struggle with security

Security

Net-security

10.4.20

Cybercriminals capitalize on COVID-19 fears, push shady websites, pharmaceuticals

CyberCrime

Net-security
9.4.20

Phishers prefer Tesla, top 3 malware strains in Coronavirus phishing campaigns

Phishing

Securityaffairs
9.4.20

German foreign ministry limits the use of Zoom over security concerns

BigBrothers

Securityaffairs
9.4.20

Less than 2% of all daily malspam are Coronavirus-themed attacks, Microsoft reports

Attack

Securityaffairs
9.4.20

Avast Launches Security-Focused Browser for Android

Android

Securityweek
9.4.20

Zoom Working on Security Improvements Amid More Bans

Security

Securityweek
9.4.20

Potent 'dark_nexus' IoT Botnet Emerges

BigBrothers  IoT

Securityweek
9.4.20

US, Britain Warn That Hackers Increasingly Use Coronavirus Bait

BigBrothers

Securityweek
9.4.20

Serious Vulnerabilities Patched in Chrome, Firefox

Vulnerebility

Securityweek

9.4.20

7 Ways Hackers and Scammers Are Exploiting Coronavirus Panic

Exploit  Spam

Thehackernews
9.4.20

Video conferencing for teams and consumers: What is the right choice for you?

Security

Net-security
9.4.20

AA20-099A : COVID-19 Exploited by Malicious Cyber Actors

CERT

CERT
9.4.20

‘Fake Fingerprints’ Bypass Scanners with 3D Printing

Vulnerebility

Threatpost

9.4.20

PowerPoint ‘Weakness’ Opens Door to Malicious Mouse-Over Attack

Virus

Threatpost

9.4.20

WhatsApp Axes COVID-19 Mass Message Forwarding

Social

Threatpost

9.4.20

ThreatList: Skype-Themed Apps Hide a Raft of Malware

Security

Threatpost
9.4.20

Dark_Nexus Botnet Compromises Thousands of ASUS, D-Link Routers

BotNet

Threatpost
9.4.20

China-Linked Hackers Systematically Targeted Linux Servers for Years

APT

Securityweek
9.4.20

Accenture Acquires Critical Infrastructure Protection Firm Revolutionary Security

Safety

Securityweek
9.4.20

Vulnerabilities in B&R Automation Software Facilitate Attacks on ICS Networks

ICS

Securityweek
9.4.20

Know thy enemy: The evolving behaviors of today’s cybercriminals

CyberCrime

Net-security

9.4.20

What do CISOs want from cybersecurity vendors right now?

Security

Net-security

9.4.20

Third-party risk is broken, businesses unprepared for supply chain disruptions

Security

Net-security

9.4.20

APT attacks targeting Linux, Windows and Android remained undetected for nearly a decade

APT

Net-security

9.4.20

Pandemic driving global e-commerce growth, but fraud is on the increase too

Security

Net-security
8.4.20Spam and phishing in 2019Phishing  SpamSecurelist
8.4.20NASA warns of a significant increase in cyber attacks during Coronavirus outbreakCyberSecurityaffairs
8.4.20NSO CEO claims Facebook wanted NSO surveillance tool to spy on usersSocialSecurityaffairs
8.4.20Dark Nexus, a new IoT botnet that targets a broad range of devicesBotNet  IoTSecurityaffairs
8.4.20WhatsApp new policy limits forwarding of viral messagesSocialSecurityaffairs
8.4.20Maze ransomware gang discloses data from drug testing firm HMRRansomwareSecurityaffairs
8.4.20Cisco Research Shows High Success Rate in Bypassing Fingerprint AuthenticationVulnerebilitySecurityweek
8.4.20NASA Sees Increase in Cyberattacks During Coronavirus OutbreakHackers' New Target During Pandemic: Video Conference CallsCyberSecurityweek
8.4.20Internet Overseers Seek Crackdown on Coronavirus Website ScamsSpamSecurityweek
8.4.20Security, Privacy Issues Found in Government COVID-19 Mobile AppsMobilSecurityweek
8.4.20Dark Nexus: A New Emerging IoT Botnet Malware Spotted in the WildBotNet  IoTThehackernews
8.4.20

Actively exploited MS Exchange flaw present on 80% of exposed servers

Exploit

Net-security
8.4.20Official Government COVID-19 Apps Hide a Raft of ThreatsSecurity

Threatpost

8.4.20xHelper: The Russian Nesting Doll of Android MalwareAndroid

Threatpost

8.4.20FIN6 and TrickBot Combine Forces in ‘Anchor’ AttacksCyberCrime

Threatpost

8.4.20Serious Exchange Flaw Still Plagues 350K ServersVulnerebilityThreatpost
8.4.20xHelper, the Unkillable Android malware that re-Installs after factory resetAndroidSecurityaffairs
8.4.20Increase in Exploited Zero-Days Shows Broader Access to VulnerabilitiesVulnerebilitySecurityweek
8.4.20Free Security Tools, Resources Offered During Coronavirus OutbreakSecuritySecurityweek
8.4.20Enterprise Content Firewall Provider Accellion Raises $120 MillionITSecurityweek
8.4.20How Has the Coronavirus Pandemic Impacted Cybersecurity Professionals?CyberSecurityweek
8.4.20

German malspam pushes ZLoader malware

Spam  Virus

SANS
8.4.20

Cybersecurity during the pandemic: Try these security solutions for free!

Cyber

Net-security

8.4.20

Radio frequency: An invisible espionage threat to enterprises

CyberSpy

Net-security

8.4.20

Happy developers more likely to build secure apps

Mobil

Net-security
8.4.20

Encryption is finally being used primarily to protect personal data rather than just for compliance

Crypto

Net-security
8.4.20

On-demand webinar: Securing your remote workforce

Security

Net-security
7.4.20Coronavirus: Europol arrests man behind €6M face masks and hand sanitisers scamBigBrothersSecurityaffairs
7.4.20Updated: Italian email provider Email.it hacked, data of 600k users available for saleHackingSecurityaffairs
7.4.20WhatsApp Tightens Sharing Limits to Curb Virus MisinformationSocialSecurityweek
7.4.20Russian Telco Hijacked Internet Traffic of Major Networks - Accident or Malicious Action?BigBrothersSecurityweek
7.4.20Healthcare Cybersecurity Firm CyberMDX Raises $20 MillionITSecurityweek
7.4.20Google Patches Critical RCE Vulnerabilities in Android's System ComponentVulnerebilitySecurityweek
7.4.20FBI Expects Increase in COVID-19-Themed BEC ScamsBigBrothers  SpamSecurityweek
7.4.20Unveiled: How xHelper Android Malware Re-Installs Even After Factory ResetAndroidThehackernews
7.4.20

Increase in RDP Scanning

Security

SANS
7.4.20

Spotting and blacklisting malicious COVID-19-themed sites

Virus

Net-security

7.4.20

Full-time bug hunting: Pros and cons of an emerging career

Vulnerebility

Net-security

7.4.20

Testing and Accountability

Security

Securelist
7.4.20

Unkillable xHelper and a Trojan matryoshka

Virus

Securelist
7.4.20

Italian email provider Email.it hacked, data of 600k users available for sale

Hacking

Securityaffairs
7.4.20Government VPN Servers Targeted in Zero-Day AttackAttack  BigBrothers

Threatpost

7.4.20Beyond Zoom: How Safe Are Slack and Other Collaboration Apps?Security

Threatpost

7.4.20Apple Safari Flaws Enable One-Click Webcam AccessApple

Threatpost

7.4.20A Brisk Private Trade in Zero-Days Widens Their UseVulnerebility

Threatpost

7.4.20FBI Threatens ‘Zoom Bombing’ Trolls With Jail TimeBigBrothers

Threatpost

7.4.20Interpol warns that crooks are increasingly targeting hospitalsBigBrothersSecurityaffairs
7.4.20ENISA released a Tool to map dependencies to International StandardsSecuritySecurityaffairs
7.4.20Key Ring digital wallet exposes data of 14 Million users in data leakIncindentSecurityaffairs
7.4.20DarkHotel APT uses VPN zero-day in attacks on Chinese government agenciesAPT  BigBrothersSecurityaffairs
7.4.20Pre-Installed Utility Renders HP Computers Vulnerable to AttacksAttack  VulnerebilitySecurityweek
7.4.20Magecart Hackers Continue Improving SkimmersCyberCrimeSecurityweek
7.4.20South Korea-Linked Hackers Targeted Chinese Government via VPN Zero-DayAPT  BigBrothersSecurityweek
7.4.208,000 Unprotected Redis Instances Accessible From InternetSecuritySecurityweek
7.4.20Microsoft Launches Free Zero Trust Assessment ToolSecuritySecurityweek
7.4.20Kinsing Linux Malware Deploys Crypto-Miner in Container EnvironmentsCryptocurrencySecurityweek
7.4.20Periscope BuySpeed is vulnerable to stored cross-site scriptingAlertAlert
7.4.20

Password Protected Malicious Excel Files

Spam

SANS

7.4.20

Qualys VMDR: Discover, prioritize, and patch critical vulnerabilities in real time

Vulnerebility

Net-security

7.4.20

Download: CISO Checklist for Secure Remote Working

Security

Net-security

6.4.20Russian telco Rostelecom hijacks traffic for IT giants, including Google, Amazon and FacebookBigBrothersSecurityaffairs
6.4.20Hackers target Docker servers to deploy the new Kinsing cryptocurrency minerCryptocurrencySecurityaffairs
6.4.20Google Rolls Back Recently Introduced Chrome CSRF ProtectionSafetySecurityweek
6.4.20Millions of Digital Wallets Exposed by Key RingIncindentSecurityweek
6.4.20Mozilla Patches Two Firefox Vulnerabilities Exploited in AttacksExploitSecurityweek
6.4.20Zoom Caught in Cybersecurity Debate — Here's Everything You Need To KnowCyberThehackernews
6.4.20

Two critical Firefox vulnerabilities exploited by attackers, patch now!

Exploit  Vulnerebility

Net-security
6.4.20YARA webinar follow upVirusSecurelist
6.4.20Popular OGUsers hacking forum breached for the second time in a yearHackingSecurityaffairs
6.4.20Experts uncovered hidden behavior in thousands of Android AppsAndroidSecurityaffairs
6.4.20Coronavirus-themed attacks March 29 – April 04, 2020SecuritySecurityaffairs
6.4.20

Maldoc XLS Invoice with Excel 4 Macros

Spam

SANS

6.4.20

Threat detection and the evolution of AI-powered security solutions

Security

Net-security

6.4.20

TLS 1.3: Slow adoption of stronger web encryption is empowering the bad guys

Crypto

Net-security

6.4.20

Cybercrime and disinformation during the pandemic

Cyber

Net-security

6.4.20

Total end-user spending on IT infrastructure products recovers

Security

Net-security

5.4.20DOJ Says Zoom-Bombing is Illegal, Could Lead to Jail TimeBigBrothers

Bleepingcomputer

5.4.20How to Use Windows 10 to Stay Focused While Working From HomeOS

Bleepingcomputer

5.4.20Windows PCs Exposed to Attacks by Critical HP Support Assistant BugsVulnerebility

Bleepingcomputer

5.4.20Discord Turned Into an Account Stealer by Updated MalwareVirus

Bleepingcomputer

5.4.20Mozilla Patches Two Actively Exploited Firefox Zero-DaysExploit

Bleepingcomputer

5.4.20Microsoft: Emotet Took Down a Network by Overheating All ComputersVirus

Bleepingcomputer

5.4.20Apple Paid $75K For Bugs Letting Sites Hijack iPhone CamerasApple

Bleepingcomputer

5.4.20Zoom's Web Client is Down, Users Report 403 Forbidden ErrorsHacking

Bleepingcomputer

5.4.20New Coronavirus-Themed Malware Locks You Out of WindowsVirus

Bleepingcomputer

5.4.20Twitter Reveals That Firefox Cached Private Data For Up to 7 DaysSocial

Bleepingcomputer

5.4.20WordPress Plugin Bug Can Be Exploited to Create Rogue AdminsExploit

Bleepingcomputer

5.4.20IRS Warns of Surge in Economic Stimulus Payment ScamsSpam

Bleepingcomputer

5.4.20FBI Warns of Attacks on Remote Work, Distance Learning PlatformsBigBrothers

Bleepingcomputer

5.4.20Office 365 Phishing Uses CSS Tricks to Bypass Email GatewaysPhishing

Bleepingcomputer

5.4.20How to Mitigate the Windows Font Parsing Zero-Day Bug via GPOOS

Bleepingcomputer

5.4.20Introduce Kids to Cybersecurity With This Free Activity BookCyber

Bleepingcomputer

5.4.20Cloudflare Launches a DNS-Based Parental Control ServiceSafety

Bleepingcomputer

5.4.20Hacker Group Backdoors Thousands of Microsoft SQL Servers DailyVirus

Bleepingcomputer

5.4.20Microsoft is Alerting Hospitals Vulnerable to Ransomware AttacksRansomware

Bleepingcomputer

5.4.20Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC LinksAttack

Bleepingcomputer

5.4.20How to Secure Your Zoom Meetings from Zoom-Bombing AttacksAttack

Bleepingcomputer

5.4.20Microsoft Updates Windows 10 PowerToys With New UtilitiesOS

Bleepingcomputer

5.4.20Securing SaaS: Protect More, Manage LessSafety blogSonicwall
5.4.20Zoom flaw is Windows security riskVulnerebility blogAvast blog
5.4.20Grandstream and DrayTek Devices Exploited to Power New Hoaxcalls DDoS BotnetAttack blog  IoT blogPalo Alto Unity42
5.4.20GuLoader: Malspam Campaign Installing NetWire RATMalware blogPalo Alto Unity42
5.4.20Best Practices for Video Conferencing SecurityCyber blog

Palo Alto

5.4.20Securing IoT in Federal AgenciesCyber blog

Palo Alto

5.4.20Announcing New QuickStart Services for StrataCyber blog

Palo Alto

5.4.20The Zero Trust Learning Curve: Deploying Zero Trust One Step at a TimeCyber blog

Palo Alto

5.4.20

New Bypass Technique or Corrupt Word Document?

Virus

SANS
5.4.20

New Coronavirus-themed campaign spread Lokibot worldwide

Spam

Securityaffairs
5.4.20

Firefox 74.0.1 addresses two zero-days exploited in the wild

Exploit

Securityaffairs
5.4.20

Microsoft’s case study: Emotet took down an entire network in just 8 days

Virus

Securityaffairs
4.4.20Microsoft Delays Disabling Insecure TLS in Browsers Until JulySafety

Bleepingcomputer

4.4.20WinRAR 5.90 Final Released For Windows, Mac, Linux, and AndroidIT

Bleepingcomputer

4.4.20Critical WordPress Plugin Bug Lets Hackers Turn Users Into AdminsVulnerebility

Bleepingcomputer

4.4.20Cloudflare's 1.1.1.1 DNS Passes Privacy Audit, Some Issues FoundPrivacy  Safety

Bleepingcomputer

4.4.20Grammarly is Now Available for Microsoft Word on MacApple

Bleepingcomputer

4.4.20Windows 10 KB4554364 Update Fixes Internet Connectivity IssuesOS

Bleepingcomputer

4.4.20FBI Warns of Ongoing Zoom-Bombing Attacks on Video MeetingsBigBrothers

Bleepingcomputer

4.4.20Banking Malware Spreading via COVID-19 Relief Payment PhishingPhishing  Virus

Bleepingcomputer

4.4.20UK's ICO Says Mobile Tracking is Legal During COVID-19 CrisisMobil

Bleepingcomputer

4.4.20Microsoft Edge to Warn Of Credentials Leaked in Data BreachesIncindent

Bleepingcomputer

4.4.20Hackers Take Advantage of Zoom's Popularity to Push MalwareVirus

Bleepingcomputer

4.4.20Office 365 Rebrands as Microsoft 365 With New Consumer FeaturesOS

Bleepingcomputer

4.4.20Microsoft Cloud Services See 775% Growth As More Work RemotelyOS

Bleepingcomputer

4.4.20How to Replace Windows 10 System Programs With Non-Microsoft AppsOS

Bleepingcomputer

4.4.20Phishing Attack Says You're Exposed to Coronavirus, Spreads MalwarePhishing

Bleepingcomputer

4.4.20WHY WE CREATED REMOTE WORKFORCE PROTECTIONSecurity blog

Cybereason

4.4.20CORONAVIRUS PANIC, SECURITY, AND YOUSecurity blog

Cybereason

4.4.20PERSPECTIVES ON MAINTAINING SECURE BUSINESS CONTINUITY: A GUIDESecurity blogCybereason
4.4.20Nemty Ransomware – Learning by DoingRansomware blogMcafee blog
4.4.20Cyberthreats Targeting Canada, Winter 2019Cyber blogF5 Labs
4.4.20Cyberthreats Targeting Australia, Winter 2019Cyber blogF5 Labs
4.4.20Cyberthreats Targeting the United States, Winter 2019Cyber blogF5 Labs
4.4.20FakeNet Genie: Improving Dynamic Malware Analysis with Cheat Codes for FakeNet-NGMalware blog

FireEye

4.4.20Kerberos Tickets on Linux Red TeamsSecurity blog

FireEye

4.4.20It’s Your Money and They Want It Now — The Cycle of Adversary PursuitSecurity blog

FireEye

4.4.20Malicious Android Apps Exploit Coronavirus PanicOS BlogSymantec
4.4.20COVID-19 Outbreak Prompts Opportunistic Wave of Malicious Email CampaignsSpam blogSymantec
4.4.20TFW you-get-really-excited-you-patch-diffed-a-0day-used-in-the-wild-but-then-find-out-it-is-the-wrong-vulnVulnerebility blogProject Zero
4.4.20AZORult brings friends to the partyMalware blog

Cisco Talos

4.4.20Trickbot: A primerMalware blog

Cisco Talos

4.4.20COVID-19 relief package provides another platform for bad actorsSecurity blogCisco Talos
4.4.20Threat Update: COVID-19Security blogCisco Talos
4.4.20Zoom’s privacy and security woes in the spotlightSecurity blog

Eset

4.4.20Work from home: Securing RDP and remote accessHacking blog

Eset

4.4.20Marriott hacked again, 5.2 million guests affectedIncident blog

Eset

4.4.20Coronavirus con artists continue to spread infections of their ownSecurity blog

Eset

4.4.20Have you backed up your smartphone lately?Hardware blogEset
4.4.20Work from home: Videoconferencing with security in mindSecurity blogEset
4.4.20Cloud Providers, CDNs Team Up to Battle Internet Routing AttacksAttack

Threatpost

4.4.20Spearphishing Campaign Exploits COVID-19 To Spread Lokibot InfostealerBotNet

Threatpost

4.4.20lf-Propagating Malware Targets Thousands of Docker Ports Per DayVirus

Threatpost

4.4.20Hacking iPhone or MacBook devices by tricking into visiting a siteAppleSecurityaffairs
4.4.20Open Cloud Database Exposes 200 Million AmericansIncindentSecurityaffairs
4.4.20Magecart group 7 use new e-skimmer to steal payment dataCyberCrimeSecurityaffairs
4.4.20Keys Used to Encrypt Zoom Meetings Sent to China: ResearchersCryptoSecurityweek
4.4.20Hacker 'Ceasefire' Gets Little Traction as Pandemic Fuels AttacksHackingSecurityweek
4.4.20Apple Awards Researcher $75,000 for Camera Hacking VulnerabilitiesAppleSecurityweek
3.4.20How Just Visiting A Site Could Have Hacked Your iPhone or MacBook CameraAppleThehackernews
3.4.20Researchers Discover Hidden Behavior in Thousands of Android AppsAndroidSecurityweek
3.4.20Unpatched Flaw in Discontinued Plugin Exposes WordPress Sites to AttacksVulnerebilitySecurityweek

3.4.20

Twitter Tells Users Firefox Possibly Exposed Personal InformationSocialSecurityweek
3.4.20Twitter discloses privacy issue that caused caching of files sent via DMs in FirefoxSocialSecurityaffairs

3.4.20

100,000 WordPress sites using the Contact Form 7 Datepicker plugin are exposed to hackHackingSecurityaffairs
3.4.20

Obfuscated with a Simple 0x0A

Virus

SANS
3.4.20

In COVID-19 Scam Scramble, Cybercrooks Recycle Phishing Kits

Phishing

Threatpost

3.4.20

Zoom Removes Data-Mining LinkedIn Feature

Cryptocurrency

Threatpost

3.4.20

M Digital Wallet Items Exposed in Key Ring Cloud Misconfig

Vulnerebility

Threatpost

3.4.20

Emerging MakeFrame Skimmer from Magecart Sets Sights on SMBs

CyberCrime

Threatpost

3.4.20

Google Squashes High-Severity Flaws in Chrome Browser

Vulnerebility

Threatpost

3.4.20

Hackers exploited IE and Firefox flaws in attacks on entities in China, Japan

Exploit

Securityaffairs
3.4.20

Zoom's Security and Privacy Woes Violated GDPR, Expert Says

Privacy

Securityweek

3.4.20

Researcher Finds New Class of Windows Vulnerabilities

Vulnerebility

Securityweek
3.4.20

Class Action Lawsuit Filed Against Marriott Over New Data Breach

Incindent

Securityweek

3.4.20

Firefox, IE Vulnerabilities Exploited in Attacks on China, Japan

Exploit

Securityweek
3.4.20

How to balance privacy concerns around facial recognition technology

Privacy

Net-security

3.4.20

Is remote work the new normal?

Security

Net-security

3.4.20

While nearly 90% of companies are backing up data, only 41% do it daily

Security

Net-security

3.4.20

Most find data security challenging with respect to UCaaS/CCaaS deployments

Security

Net-security

2.4.20

Loncom packer: from backdoors to Cobalt StrikeVirusSecurelist
2.4.20New COVID19 wiper overwrites MBR making computers unusableVirusSecurityaffairs
2.4.20Crooks use tainted Zoom apps to target users at home due to Coronavirus outbreakMobilSecurityaffairs

2.4.20

Browser Makers Delay Removal of TLS 1.0 and 1.1 SupportSafetySecurityweek
2.4.20Watchdog Finds New Problems With FBI Wiretap ApplicationsBigBrothersSecurityweek
2.4.20Coronavirus Malware Makes Devices Unusable by Overwriting MBRVirusSecurityweek
2.4.20Zoom Vulnerabilities Expose Users to Spying, Other AttacksVulnerebilitySecurityweek
2.4.20Nigerian Threat Actors Specializing in BEC Attacks Continue to EvolveSpamSecurityweek
2.4.20Magecart Hackers Inject iFrame Skimmers in 19 Sites to Steal Payment DataHackingThehackernews

2.4.20

Mozilla will fund open source COVID-19-related technology projects

Security

Net-security

2.4.20

Are your MS SQL servers part of a cryptomining botnet? Check now!

BotNet  Cryptocurrency

Net-security

2.4.20

Vulnerable VPN appliances at healthcare organizations open doors for ransomware gangs

Ransomware

Net-security

2.4.20

Top Email Protections Fail in Latest COVID-19 Phishing CampaignPhishing

Threatpost

2.4.20Two Zoom Zero-Day Flaws UncoveredVulnerebility

Threatpost

2.4.20Critical WordPress Plugin Bug Can Lock Admins Out of WebsitesVulnerebility

Threatpost

2.4.20Coronavirus ‘Financial Relief’ Phishing Attacks SpikePhishing

Threatpost

2.4.20Wiper Malware Called “Coronavirus” Spreads Among Windows VictimsVirusThreatpost
2.4.20Microsoft issues targeted notification to hospitals vulnerable to Ransomware attacksRansomwareSecurityaffairs
2.4.20Zoom client for Windows could allow hackers to steal users’Windows passwordHackingSecurityaffairs
2.4.20Vollgar botnet has managed to infect around 3k MSSQL DB servers dailyBotNetSecurityaffairs
2.4.20Vollgar Campaign Targets MS-SQL Servers With Backdoors, Crypto-MinersCryptocurrencySecurityweek
2.4.20Trojanized Zoom Apps Target Remote WorkersVirusSecurityweek
2.4.20Patch Released for Linux Kernel Vulnerability Disclosed at Hacking ContestVulnerebilitySecurityweek
2.4.20Unpatched Zoom App Bug Lets Hackers Steal Your Windows PasswordVulnerebilityThehackernews
2.4.20

TPOT's Cowrie to ISC Logs

Security

SANS

2.4.20

How can you strengthen an enterprise third-party risk management program?

Security

Net-security

2.4.20

vFeed: Leveraging actionable vulnerability intelligence as a service indicators

Security

Net-security

2.4.20

Best practices and challenges in adopting continuous software testin

Security

Net-security

2.4.20

Total number of IoT connections to reach 83 billion by 2024

IoT

Net-security

2.4.20

Large number of mobile apps may be vulnerable to hacking

Hacking  Mobil  Vulnerebility

Net-security

2.4.20

Guide: Making the financial case for outsourcing endpoint protection

Safety

Net-security

1.4.20

Experts published PoC exploits for CVE-2020-0796 privilege escalation flaw on WindowsExploit  VulnerebilitySecurityaffairs
1.4.20New Raccoon Stealer uses Google Cloud Services to evade detectionVirusSecurityaffairs

1.4.20

LimeRAT malware delivered using 8-year-old VelvetSweatshop trickVirusSecurityaffairs
1.4.20AWS Security Service 'Amazon Detective' Now Generally AvailableSecuritySecurityweek
1.4.20SecurityWeek Launches Virtual Cybersecurity Event SeriesCyberSecurityweek
1.4.20Critical Flaw in SEO Plugin Exposed Many WordPress Sites to AttacksVulnerebilitySecurityweek
1.4.20Panther Labs Launches Open-Source Cloud-Native SIEMSafetySecurityweek
1.4.20SMBGhost Vulnerability Allows Privilege Escalation on Windows SystemsVulnerebilitySecurityweek

1.4.20

WARNING: Hackers Install Secret Backdoor on Thousands of Microsoft SQL ServersVirusThehackernews

1.4.20

Millions of routers running OpenWRT vulnerable to attack

Attack

Net-security

1.4.20

Marriott International 2020 data breach: 5.2 million customers affected

Incindent

Net-security

1.4.20

Millions of Guests Impacted in Marriott Data Breach, AgainIncindent

Threatpost

1.4.20Covid-19 Poll Results: One in Four Prioritize Health Over PrivacyPrivacy

Threatpost

1.4.20Zoom Scrutinized As Security Woes MountSecurity

Threatpost

1.4.208-Year-Old VelvetSweatshop Bug Resurrected in LimeRAT CampaignVirus

Threatpost

1.4.20Watering-Holes Target Asian Ethnic Victims with Flash Update DecoyAPT

Threatpost

1.4.20A critical flaw in Rank Math WordPress plugin allows hackers to give users Admins privilegesVulnerebilitySecurityaffairs

1.4.20

Marriott discloses data breach impacting up to 5.2 Million guestsIncindentSecurityaffairs
1.4.20Internet Society Expands Program for Secure Internet Routing FrameworkSecuritySecurityweek
1.4.20Palo Alto Networks to Acquire CloudGenix for $420 MillionITSecurityweek
1.4.20Marriott Suffers Second Breach Exposing Data of 5.2 Million Hotel GuestsIncindentThehackernews
1.4.20

Qakbot malspam sent from an infected Windows host

Spam

SANS

1.4.20

Identity fraud: Protecting your customers from the new kids in town

Safety

Net-security

1.4.20

Who’s responsible for protecting personal information

Safety

Net-security

1.4.20

Are ransom payers fueling ransomware?

Ransomware

Net-security

1.4.20

Researchers develop a way to quickly purge old network data

Security

Net-security

1.4.20

CISO’s guide to choosing an automated security questionnaire platform

Security

Net-security