Calendar 2020 August- Home  2020  2019  2018  2017  2016  1  2  3  4  5  6  7

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2020 - January February March April May June July August September October November December


Date

Name

Category

Web

31.8.20

Microsoft tests fix for bug that defrags SSD drives too often

OS

Bleepingcomputer

31.8.20

US govt warns of North Korean hackers targeting banks worldwide

BigBrothers

Bleepingcomputer

31.8.20

From zero to hero: Zero2Automated malware reverse engineering course

Virus

Bleepingcomputer

31.8.20

New Zealand stock exchange halted trading after DDoS attacks

Attack

Bleepingcomputer

31.8.20

SunCrypt Ransomware sheds light on the Maze ransomware cartel

Ransomware

Bleepingcomputer

31.8.20

With Empire gone, patrons eye other illegal darkweb markets

CyberCrime

Bleepingcomputer

31.8.20

Hackers for hire attack architecture firm via 3ds Max exploit

Exploit

Bleepingcomputer

31.8.20

Lazarus hackers target cryptocurrency orgs with fake job offers

APT

Bleepingcomputer

31.8.20

Chrome 85 released with security fixes, app shortcuts, AVIF support

Vulnerebility

Bleepingcomputer

31.8.20

Google Chrome is now faster, delivers 10% quicker page loads

IT

Bleepingcomputer

31.8.20

Ryuk successor Conti Ransomware releases data leak site

Ransomware

Bleepingcomputer

31.8.20

Firefox 80 released with new and faster extensions blocklist

Security

Bleepingcomputer

31.8.20

DarkSide Ransomware hits North American real estate developer

Ransomware

Bleepingcomputer

31.8.20

Office 365 adds transcription, voice commands in Word for the web

OS

Bleepingcomputer

31.8.20

Office 365 now opens attachments in a sandbox to prevent infections

OS

Bleepingcomputer

31.8.20

Microsoft 365 Admin Portal is down, Office 365 services also affected

OS

Bleepingcomputer

31.8.20

Google Chrome 85 fixes WebGL code execution vulnerability

Vulnerebility

Bleepingcomputer

31.8.20

Zoom went down and schools got a digital snow day

IT

Bleepingcomputer

31.8.20

Dark web market Empire down for days from DDoS attack

Attack

Bleepingcomputer

31.8.20

Iranian hackers attack exposed RDP servers to deploy Dharma ransomware

Ransomware

Bleepingcomputer

31.8.20

US DoJ wants the funds stored by North Korea in 280 BTC and ETH

BigBrothers

Securityaffairs
31.8.20

Emotet botnet has begun to use a new ‘Red Dawn’ template

BotNet  Virus

Securityaffairs
31.8.20

Malicious npm package ‘fallguys’ removed from the official repository

Virus

Securityaffairs
31.8.20

Finding The Original Maldoc

Virus

SANS
31.8.20

Five critical cloud security challenges and how to overcome them

Vulnerebility

Net-security

31.8.20

Qualys Multi-Vector EDR: Protection across the entire threat lifecycle

Safety

Net-security

31.8.20

How to drive business value through balanced development automation

Security

Net-security

31.8.20

A new project enables data to be read directly from compressed IoT data

IoT

Net-security

30.8.20Pandemic triggers most scams in recent historySpam blog

Avast blog

30.8.20

DoppelPaymer: The latest ransomware innovation is all about distributionRansomware blog

Avast blog

30.8.20Cetus: Cryptojacking Worm Targeting Docker DaemonsCryptocurrency blog

Palo Alto Unity42

30.8.20The State of Exploit Development: 80% of Exploits Publish Faster than CVEsExploit blogPalo Alto Unity42

30.8.20

OPERATION BLACKOUT VIRTUAL EDITION: ELECTION SECURITY TABLETOPSBigBrother blog

Cybereason

30.8.20TIME FOR AN UPGRADE: HOW TO SWITCH FROM SYMANTEC TO CYBEREASONSafety blog

Cybereason

30.8.20How Credential Stuffing Bots Bypass DefensesBotNet blog

F5 Labs

30.8.20

The New Kid On The Cyber Block: Data ManipulationCyber blog

F5 Labs

30.8.20A Hands-On Introduction to Mandiant's Approach to OT Red TeamingSecurity blog

FireEye

30.8.20COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker ModuleSecurity blog

FireEye

30.8.20

Emulation of Malicious Shellcode With SpeakeasyMalware blog

FireEye

30.8.20Gozi: The Malware with a Thousand FacesMalware blog

Checkpoint

30.8.20An Old Bot’s Nasty New Tricks: Exploring Qbot’s Latest Attack MethodsMalware blog

Checkpoint

30.8.20

What to expect when you're electing: The building blocks of disinformation campaignsCyber blogCisco Talos
30.8.20Vulnerability Spotlight: Remote code execution, privilege escalation bugs in Microsoft Azure SphereVulnerebility blogCisco Talos
30.8.20Vulnerability Spotlight: Use-after-free vulnerability in Google Chrome WebGL could lead to code executionVulnerebility blogCisco Talos

30.8.20

DDoS extortion campaign targets financial firms, retailersAttack blog

Eset

30.8.20

New Chrome, Firefox versions fix security bugs, bring productivity featuresVulnerebility blog

Eset

30.8.20FBI, CISA warn of spike in vishing attacksBigBrother blog

Eset

30.8.20Cyber attacks: Several Canadian government services disruptedBigBrother blog

Eset

30.8.20

How to secure your TikTok accountSocial blogEset
30.8.20North Korea-linked APT group BeagleBoyz targets banksAPTSecurityaffairs
30.8.20FBI warns of an increase in online romance scamsBigBrothersSecurityaffairs

30.8.20

Experts demonstrate the PIN is useless in EMV contactless transactionsAttackSecurityaffairs

29.8.20

Elon Musk Confirms, Tesla Factory a Target of Foiled Cyberattack

Attack

Threatpost

29.8.20

DoJ Aims to Seize 280 Cryptocurrency Accounts Used by Hackers

Cryptocurrency

Threatpost

29.8.20

Instagram ‘Help Center’ Phishing Scam Pilfers Credentials

Social

Threatpost

29.8.20

Former Cisco employee pleads guilty to hacking, damaging company systems

Hacking

Securityaffairs

29.8.20

Iran-linked Charming Kitten APT contacts targets via WhatsApp, LinkedIn

APT

Securityaffairs

29.8.20

Spooks Called in as Cyberattacks Again Halt NZ Stock Exchange

Attack

Securityweek

29.8.20

Researchers Analyze Traffic Statistics of Popular Cybercrime Forums

CyberCrime

Securityweek

29.8.20

New Attacks Allow Bypassing EMV Card PIN Verification

Attack

Securityweek

28.8.20

Elon Musk confirms that Russian hackers tried to recruit Tesla employee to plant a malwareBigBrothersSecurityaffairs

28.8.20

Lemon_Duck cryptomining malware evolves to target Linux devicesCryptocurrencySecurityaffairs

28.8.20

Cisco addresses ten high-risk issues in NX-OS softwareHackingSecurityaffairs

28.8.20

Former Employee Admits Hacking, Damaging Cisco SystemsHackingSecurityweek

28.8.20

Justice Dept: North Korean Hackers Stole Virtual CurrencyBigBrothersSecurityweek
28.8.20Iranian Hackers Target Academic Researcher via WhatsApp, LinkedInBigBrothersSecurityweek

28.8.20

North Korean Hackers Are Back at Targeting BanksBigBrothersSecurityweek

28.8.20

Walmart Says Teaming With Microsoft in Bid for TikTokSocialSecurityweek

28.8.20

Elon Musk Confirms Russian Hackers Attempted to Recruit Tesla EmployeeBigBrothersSecurityweek

28.8.20

Iranian Hackers Pose as Journalists to Trick Victims Into Installing MalwareBigBrothersThehackernews

28.8.20

Example of Malicious DLL Injected in PowerShell

Virus

SANS

28.8.20

Magecart’s Success Paves Way For Cybercriminal Credit Card ‘Sniffer’ Market

CyberCrime

Threatpost

28.8.20

Malicious Attachments Remain a Cybercriminal Threat Vector Favorite

Spam  Virus

Threatpost

28.8.20

Revamped Qbot Trojan Packs New Punch: Hijacks Email Threads

Hacking

Threatpost

28.8.20

Ex-Cisco Employee Pleads Guilty to Deleting 16K Webex Teams Accounts

Incindent

Threatpost

28.8.20

Facebook Hits Back At Apple’s iOS 14 Privacy Update

Apple  Social

Threatpost

28.8.20

Group with numerous faces: chronicle of UltraRank’s deceptive JS-sniffer campaigns

Hacking

Securityaffairs

28.8.20

Experts hacked 28,000 unsecured printers to raise awareness of printer security issues

Hacking

Securityaffairs

28.8.20

350 million decrypted email addresses left exposed on an unsecured server

Incindent

Securityaffairs

28.8.20

Anubis, a new info-stealing malware spreads in the wild

Virus

Securityaffairs
28.8.20

REvil ransomware operators breached healthcare org Valley Health Systems

Ransomware

Securityaffairs

28.8.20

Cisco Patches High-Severity Vulnerabilities in NX-OS Software

Vulnerebility

Securityweek

28.8.20

Researchers Hijack 28,000 Printers to Show How Easily They Can Be Hacked

Hacking

Securityweek

28.8.20

Fastly to Acquire Web Application Security Firm Signal Sciences for $775 Million

IT

Securityweek

28.8.20

Microsoft Warns of New 'Anubis' Info-Stealer Distributed in the Wild

Virus

Securityweek
28.8.20

Vulnerability reporting is returning to normal

Vulnerebility

Net-security

28.8.20

Data protection critical to keeping customers coming back for more

Security

Net-security

28.8.20

The global cost of cybercrime per minute to reach $11.4 million by 2021

CyberCrime

Net-security

28.8.20

Worldwide AI spending to reach more than $110 billion in 2024

IT

Net-security

28.8.20

People spend a little less time looking at fake news headlines than factual ones

Security

Net-security

27.8.20

New Zealand stock exchange (NZX) halted 2 days by DDoS attackAttackSecurityaffairs

27.8.20

Microsoft fixes code execution, privilege escalation in Microsoft Azure SphereVulnerebilitySecurityaffairs

27.8.20

Vulnerabilities Expose Popular DVB-T2 Set-Top Boxes to Botnets: ResearchersBotNet  VulnerebilitySecurityweek

27.8.20

Cyber Attack Halts New Zealand Stock Market for Third Straight DayBigBrothersSecurityweek

27.8.20

UltraRank Group Stole Card Data From Hundreds of Sites Using JS SniffersCyberCrimeSecurityweek

27.8.20

Google Location-Tracking Tactics Troubled Its Own EngineersHackingSecurityweek

27.8.20

QakBot Banking Trojan Returned With New Sneaky Tricks to Steal Your MoneyVirusThehackernews

27.8.20

Disinformation Spurs a Thriving Industry as U.S. Election Looms

BigBrothers

Threatpost

27.8.20

Cisco Patches ‘High-Severity’ Bugs Impacting Switches, Fibre Storage

Vulnerebility

Threatpost

27.8.20

Hackers Exploit Autodesk Flaw in Recent Cyberespionage Attack

Attack

Threatpost

27.8.20

FBI arrested a Russian national for recruiting employee of US firm to plant malware

BigBrothers

Securityaffairs

27.8.20

Hackers for hire group target organizations via 3ds Max exploit

Exploit

Securityaffairs

27.8.20

Facebook: Apple Privacy Changes Will Muck Up Online Ads

Social

Securityweek

27.8.20

Ghanaian Extradited to U.S. for Cybercrimes That Caused Millions in Losses

BigBrothers

Securityweek

27.8.20

GrammaTech Releases Open Source API Security Tool

Security

Securityweek

27.8.20

Secretive Palantir Lifts Veil Before Wall Street Stock Sale

Cyber

Securityweek

27.8.20

Chrome 85 Released With 20 Security Fixes

Security

Securityweek

27.8.20

Mercenary Cyberspies Used Autodesk 3ds Max Exploits in Attacks

Attack  Exploit

Securityweek

27.8.20

Russian Arrested for Recruiting Employee of U.S. Company to Plant Malware

BigBrothers

Securityweek

27.8.20

Participant in Phony Tech Support Scheme Pleads Guilty

Mobil

Securityweek

27.8.20

Malware Detection Company AffirmLogic Raises $25 Million

IT

Securityweek

27.8.20

Russian Arrested After Offering $1 Million to U.S. Company Employee for Planting Malware

BigBrothers

Thehackernews

27.8.20

AA20-239A : FASTCash 2.0: North Korea's BeagleBoyz Robbing BanksCERTCERT

27.8.20

Security.txt - one small file for an admin, one giant help to a security researcher

Security

SANS

27.8.20

How do I select a password management solution for my business?

Safety

Net-security

27.8.20

Facing gender bias in facial recognition technology

Security

Net-security

27.8.20

Confirmed: Browsing histories can be used to track users

Privacy

Net-security

27.8.20

91% of cybersecurity pros want stricter internet measures to tackle misinformation

Security

Net-security

27.8.20

Researchers develop AI technique to protect medical devices from anomalous instructions

Security

Net-security

27.8.20

A look at enterprise network and application modernization efforts

Security

Net-security

27.8.20

Swap Detector: Open source tool for detecting API usage errors

Security

Net-security

26.8.20

Safari Bug Revealed After Apple Takes Nearly a Year to Patch

Apple

Threatpost
26.8.20

Shoring Up the 2020 Election: Secure Vote Tallies Aren’t the Problem

BigBrothers

Threatpost

26.8.20

Lazarus Group Targets Cryptocurrency Firms Via LinkedIn Messages

APT

Threatpost
26.8.20

Four More Bugs Patched in Microsoft’s Azure Sphere IoT Platform

IoT

Threatpost
26.8.20

Transparent Tribe: Evolution analysis, part 2

APT

Securelist
26.8.20

DeathStalker cyber-mercenary group targets the financial sector

Virus

Securityaffairs
26.8.20

Lazarus APT targets cryptocurrency organizations with using LinkedIn lures

APT

Securityaffairs
26.8.20

Expert discloses unpatched Safari flaw that allows stealing local files

Apple

Securityaffairs
26.8.20

Google Project Zero expert found 3 flaws in Apache Web Server

Vulnerebility

Securityaffairs
26.8.20

'Add Photo' Feature on Turkey's Virus App Sparks Alarm

Virus

Securityweek
26.8.20

MITRE Introduces 'Shield' Defense Knowledge Base

Safety

Securityweek
26.8.20

CISA Details Strategy for Secure 5G Deployment

Safety

Securityweek
26.8.20

Microsoft Announces Public Preview of Application Guard for Office

OS

Securityweek
26.8.20

Microsoft Patches Code Execution, Privilege Escalation Flaws in Azure Sphere

OS

Securityweek
26.8.20

SaaS Security Platform Provider ReliaQuest Raises $300 Million

IT

Securityweek
26.8.20

Unpatched Safari Vulnerability Allows Theft of Local Files

Apple

Securityweek
26.8.20

Military's Top Cyber Official Defends More Aggressive Stance

BigBrothers

Securityweek
26.8.20

Hack-for-Hire Group Targets Financial Sector Since 2012

CyberCrime

Securityweek
26.8.20

APT Hackers Exploit Autodesk 3D Max Software for Industrial Espionage

APT

Thehackernews
26.8.20

Popular iOS SDK Caught Spying on Billions of Users and Committing Ad Fraud

Apple

Thehackernews
26.8.20

Malicious Excel Sheet with a NULL VT Score

Virus

SANS
26.8.20

The state of GDPR compliance in the mobile app space

Privacy

Net-security
26.8.20

A 2020 approach to security: People matter

Security

Net-security
26.8.20

Researchers aim to improve code patching in embedded systems

SecurityNet-security
26.8.20

Online fraud against businesses drops, increases against consumers during reopening

CyberCrime

Net-security
26.8.20

Most organizations have no Active Directory cyber disaster recovery plan

Cyber

Net-security
26.8.20

New AI algorithm to detect cryptocurrency miners as they steal power

Cryptocurrency

Net-security
25.8.20Install Windows 10 updates manually with this open-source toolOS

Bleepingcomputer

25.8.20How to run Windows 10 programs in a WSL Linux shellOS

Bleepingcomputer

25.8.20Freepik data breach: Hackers stole 8.3M records via SQL injectionIncindent

Bleepingcomputer

25.8.20US government warns remote workers of ongoing vishing campaignBigBrothers

Bleepingcomputer

25.8.20WordPress WooCommerce stores under attack, patch nowAttack  Vulnerebility

Bleepingcomputer

25.8.20Windows 10 Settings gets a modern Disk Management toolOS

Bleepingcomputer

25.8.20DarkSide: New targeted ransomware demands million dollar ransomsRansomware

Bleepingcomputer

25.8.20US financial regulator warns of phishing sites impersonating brokersPhishing

Bleepingcomputer

25.8.20Community-provided Amazon Machine Images come with malware riskVirus

Bleepingcomputer

25.8.20Windows 10 2009 is almost here, released to enterprise for testingOS

Bleepingcomputer

25.8.20Malware can no longer disable Microsoft Defender via the RegistrySafety

Bleepingcomputer

25.8.20University of Utah hit by ransomware, pays $457K ransomRansomware

Bleepingcomputer

25.8.20WSL2 now rolling out to devices running Windows 10 1903 and 1909OS

Bleepingcomputer

25.8.20Windows 10 KB4566116 update fixes crashing settings, unlock bugOS

Bleepingcomputer

25.8.20Microsoft enables TLS 1.3 by default in latest Windows 10 buildsOS

Bleepingcomputer

25.8.20Windows 10 Updates Health Report - KB4566782 & KB4565351OS

Bleepingcomputer

25.8.20Google fixes Gmail bug allowing attackers to send spoofed emailsVulnerebility

Bleepingcomputer

25.8.20MITRE shares this year's top 25 most dangerous software bugsVulnerebility

Bleepingcomputer

25.8.20Memory leak in IBM DB2 gives access to sensitive data, causes DoSIncindent

Bleepingcomputer

25.8.20Gun exchange site confirms data breach after database posted onlineIncindentBleepingcomputer
25.8.20

Keep An Eye on LOLBins

OS

SANS
25.8.20

Iran-Linked ‘Newbie’ Hackers Spread Dharma Ransomware Via RDP Ports

Ransomware

Threatpost
25.8.20

APIs Are the Next Frontier in Cybercrime

CyberCrime

Threatpost

25.8.20

Google Fixes High-Severity Chrome Browser Code Execution Bug

Vulnerebility

Threatpost
25.8.20

SourMint SDK used by 1200 iOS apps shows malicious behavior

Apple

Securityaffairs
25.8.20

Dark web Empire Market still down after 3 days. DDoS attack or exit scam?

CyberCrime

Securityaffairs
25.8.20

Canadian delivery company Canpar Express suffered a ransomware attack

Ransomware

Securityaffairs
25.8.20

Cybercriminal greeners from Iran attack companies worldwide for financial gain

CyberCrime

Securityaffairs
25.8.20

WordPress Sites Targeted via Vulnerabilities in WooCommerce Discounts Plugin

Vulnerebility

Securityweek
25.8.20

Palo Alto Networks to Acquire Incident Response Firm The Crypsis Group for $265 Million

IT

Securityweek
25.8.20

TikTok Sues Over Ban Ordered by Trump

BigBrothers

Securityweek
25.8.20

Malicious Behavior Found in Advertising SDK Used by 1,200 iOS Apps

Apple

Securityweek
25.8.20

CISA, FBI Alert Warns of Vishing Campaign

BigBrothers

Securityweek
25.8.20

Google Researcher Reported 3 Flaws in Apache Web Server Software

Vulnerebility

Thehackernews
25.8.20

Three places for early warning of ransomware and breaches that aren’t the dark web

Ransomware

Net-security
25.8.20

ERP security: Dispelling common misconceptions

Security

Net-security
25.8.20

PinK: A new way of implementing a key-value store in SSDs

Security

Net-security
25.8.20

New attack vectors make securing virtual companies even more challenging

Attack

Net-security
25.8.20

The evolution of IoT asset tracking devices

IoT

Net-security
25.8.20

Malicious iOS SDK breaches user privacy for millions

Apple

Net-security
24.8.20Lifting the veil on DeathStalker, a mercenary triumvirateAPTSecurelist

24.8.20

Grandoreiro campaign impersonates Spanish Agencia TributariaBigBrothersSecurityaffairs

24.8.20

Freepik Discloses Data Breach Impacting 8.3 Million UsersIncindentSecurityweek

24.8.20

Barr 'Vehemently Opposed' to Pardoning SnowdenBigBrothersSecurityweek
24.8.20Financially-Motivated Iranian Hackers Adopt Dharma RansomwareRansomwareSecurityweek
24.8.20

Tracking A Malware Campaign Through VT

Virus

Net-security
24.8.20Transparent Tribe APT hit 1000+ victims in 27 countries in the last 12 monthsAPTSecurityaffairs

24.8.20

A Google Drive weakness could allow attackers to serve malwareVirusSecurityaffairs

24.8.20

Adobe released open- source tool Stringlifier to identify randomly generated stringsSecuritySecurityaffairs

24.8.20

ATM vendors Diebold and NCR fixed deposit forgery bugsVulnerebilitySecurityaffairs
24.8.20

Small Challenge: A Simple Word Maldoc - Part 4

Virus

SANS

24.8.20

Protect your organization in the age of Magecart

Cyber

Net-security

24.8.20

COVID-19 impact on digital transformation, cloud and security strategies

Security

Net-security

24.8.20

How can companies avoid the risks of unexpected expenses related to cloud migration?

Security

Net-security

24.8.20

Researchers develop a process to categorize massive datasets, making data more accessible

SecurityNet-security

23.8.20

Microsoft issues out of band KB4578013 Windows security updateOS

Bleepingcomputer

23.8.20

Spotify hit with outage after forgetting to renew a certifficateSecurity

Bleepingcomputer

23.8.20

Lucifer cryptomining DDoS malware now targets Linux systemsCryptocurrency

Bleepingcomputer

23.8.20

US govt exposes new North Korean BLINDINGCAN backdoor malwareBigBrothers

Bleepingcomputer

23.8.20

Microsoft Teams users can't join meetings hosted in North AmericaSecurity

Bleepingcomputer

23.8.20

Tor Project shares proposals to limit DDoS impact on Onion sitesSafety

Bleepingcomputer

23.8.20

Researchers detail bug in wireless devices impacting critical sectorsICS

Bleepingcomputer

23.8.20

FritzFrog malware attacks Linux servers over SSH to mine MoneroCryptocurrency

Bleepingcomputer

23.8.20

Zoom web client outage prevents users from joining meetingsSecurity

Bleepingcomputer

23.8.20

Kali Linux gets a GUI desktop in Windows Subsystem for LinuxSafety

Bleepingcomputer

23.8.20

Microsoft Defender ATP adds new malicious behavior blocking featureSafety

Bleepingcomputer

23.8.20

Kali Linux 2020.3 begins journey of replacing Bash with ZSHSafety

Bleepingcomputer

23.8.20

Microsoft is killing off insecure Cloud App Security cipher suitesSecurity

Bleepingcomputer

23.8.20

Cryptojacking worm steals AWS credentials from Docker systemsCryptocurrency

Bleepingcomputer

23.8.20

Duri campaign smuggles malware via HTML and JavaScriptVirus

Bleepingcomputer

23.8.20

Gym app management platform exposed info of thousands of usersIncindent

Bleepingcomputer

23.8.20

World's largest cruise line operator Carnival hit by ransomwareRansomware

Bleepingcomputer

23.8.20

Windows Control Flow Guard support added to Rust, Clang compilersVulnerebility

Bleepingcomputer

23.8.20

Begin your journey to become a cybersecurity pro with this bundleCyber

Bleepingcomputer

23.8.20

Popular Notepad++ text editor banned in ChinaBigBrothersBleepingcomputer

23.8.20

Remote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common?

Security

SANS

22.8.20Google Chrome will warn users when submitting insecure formsSecurity

Bleepingcomputer

22.8.20Microsoft announces plans to ditch legacy Edge in Windows 10OS

Bleepingcomputer

22.8.20Microsoft fixes actively exploited Windows bug reported 2 years agoOS

Bleepingcomputer

22.8.20What's new in Windows 10 20H2, arriving later this yearOS

Bleepingcomputer

22.8.20New Microsoft Edge features will save you money when shopping onlineOS

Bleepingcomputer

22.8.20Business technology giant Konica Minolta hit by new ransomwareRansomware

Bleepingcomputer

22.8.20Canada suffers cyberattack used to steal COVID-19 relief paymentsBigBrothers

Bleepingcomputer

22.8.20Windows 10 features that boost your computer's securityOS

Bleepingcomputer

22.8.20U.S. spirits and wine giant hit by cyberattack, 1TB of data stolenIncindent

Bleepingcomputer

22.8.20SANS shares details on attack that led to their data breachIncindent

Bleepingcomputer

22.8.20How to install and update Fortnite on iOS after App Store banApple

Bleepingcomputer

22.8.20New Google Chrome feature makes it easier to browse privatelySecurity

Bleepingcomputer

22.8.20Over 25% of all UK universities were attacked by ransomwareRansomware

Bleepingcomputer

22.8.20Emotet malware strikes U.S. businesses with COVID-19 spamVirus

Bleepingcomputer

22.8.20Windows Defender deletes Citrix components mislabeled as malwareVirus

Bleepingcomputer

22.8.20Microsoft Edge Dev gets new security and privacy featuresSecurity

Bleepingcomputer

22.8.20Canon USA's stolen files leaked by Maze ransomware gangRansomware

Bleepingcomputer

22.8.20Expired certificate led to an undercount of COVID-19 resultsSecurity

Bleepingcomputer

22.8.20Surface Duo: All the Specs, Features, Software, Price and Release DateIT

Bleepingcomputer

22.8.20NSA discloses new Russian-made Drovorub malware targeting LinuxBigBrothers  Virus

Bleepingcomputer

22.8.20Mekotio banking trojan imitates update alerts to steal BitcoinVirus

Bleepingcomputer

22.8.20Stealthy RedCurl hackers steal corporate documentsVirus

Bleepingcomputer

22.8.20CISA alerts of phishing attack targeting SBA loan relief accountsPhishing

Bleepingcomputer

22.8.20U.S. stock broker regulator FINRA warns of copycat phishing sitePhishing

Bleepingcomputer

22.8.20Windows 10 Tips apps will soon show new features in an updateOS

Bleepingcomputer

22.8.20Windows, IE11 zero-day vulnerabilities chained in targeted attackOS

Bleepingcomputer

22.8.20Windows 10 to give power users more control over their GPUsOS

Bleepingcomputer

22.8.20Dharma ransomware created a hacking toolkit to make cybercrime easyRansomware

Bleepingcomputer

22.8.20SAP updates security note for critical RECON vulnerabilityVulnerebility

Bleepingcomputer

22.8.20SANS infosec training org suffers data breach after phishing attackIncindentBleepingcomputer
22.8.20Thousands of WordPress WooCommerce stores potentially exposed to hackHackingSecurityaffairs
22.8.20Popular Freepik site discloses data breach impacting 8.3M usersIncindentSecurityaffairs
22.8.20A Google Drive 'Feature' Could Let Attackers Trick You Into Installing MalwareAttack  VirusThehackernews
22.8.20Ransom NewsRansomRansom
22.8.20“Mailto” attacks could steal filesHacking blog

Avast blog

22.8.20Lessons learned from the ProctorU breach: Be transparent and timelyIncident blog

Avast blog

22.8.20Wireshark Tutorial: Decrypting HTTPS TrafficSecurity blogPalo Alto Unity42
22.8.20CYBER SECURITY TIPS FOR ALLOWING EMPLOYEES TO WORK FROM HOMECyber blogCybereason
22.8.20DEEPFAKES: NOVELTY TREND OR NOVEL THREAT?Cyber blogCybereason
22.8.20HACKER SUMMER CAMP IS CANCELLED, LONG LIVE VIRTUAL HACKER SUMMER CAMPCyber blogCybereason
22.8.20OPERATION BLACKOUT VIRTUAL EDITION: ELECTION SECURITY TABLETOPSCyber blogCybereason
22.8.20How I Designed an Open Source HTTPS CheckerSecurity blogF5 Labs
22.8.20The New Kid On The Cyber Block: Data ManipulationCyber blogF5 Labs
22.8.20Vulnerability Spotlight: Internet Systems Consortium BIND server DoSVulnerebility blogCisco Talos
22.8.20Grandoreiro banking trojan impersonates Spain’s tax agencyMalware blog

Eset

22.8.20How to prepare and protect your digital legacySafety blog

Eset

22.8.20Ritz London clients scammed after apparent data breachIncident blog

Eset

22.8.20Attack of the Instagram clonesSocial blogEset
22.8.20

Former Uber CSO Charged With Paying ‘Hush Money’ in 2016 Breach Cover-Up

Incindent

Threatpost
22.8.20

Researchers Sound Alarm Over Malicious AWS Community AMIs

Virus

Threatpost

22.8.20

News Wrap: AWS Cryptojacking Worm, IBM Privacy Lawsuit and More

Security

Threatpost
22.8.20

University of Utah Pays $457K After Ransomware Attack

Ransomware

Threatpost
22.8.20

Hackers are targeting teleworkers with vishing campaign, CISA and FBI warn

BigBrothers

Securityaffairs
22.8.20

Steel sheet giant Hoa Sen Group hacked by Maze ransomware operators

Ransomware

Securityaffairs
22.8.20

Mozilla offers rewards for Bypassing Firefox Exploit Mitigations

Exploit

Securityaffairs
22.8.20

ZDI Shares "Crazy" Stories on 15-Year Anniversary

IT

Securityweek
22.8.20

Microsoft Enables TLS 1.3 by Default in Windows 10 Insider Preview

OS

Securityweek
21.8.20

ATM makers fix flaws allowing illegal cash withdrawals

Vulnerebility

Net-security
21.8.20University of Utah pays a $457,000 ransom to ransomware gangRansomwareSecurityaffairs
21.8.20Microsoft Out-of-Band security patch fixes Windows privilege escalation flawsOSSecurityaffairs
21.8.20Adobe Open Sources Tool for Sanitizing Logs, Detecting Exposed CredentialsSafetySecurityweek
21.8.20Mozilla Offering Rewards for Bypassing Firefox Exploit MitigationsExploitSecurityweek
21.8.20Security of Post-Election Vote Count Top Worry: US OfficialBigBrothersSecurityweek
21.8.20University of Utah Pays $457,000 to Ransomware OperatorsRansomwareSecurityweek
21.8.20CERT/CC Warns of Vulnerabilities in Diebold Nixdorf, NCR ATMsBigBrothersSecurityweek
21.8.20Former Uber CSO Charged Over 2016 Data Breach Cover-UpIncindentSecurityweek
21.8.20Operation Transparent tribeOperationOperation
21.8.20

Senate Bill Would Expand Facial-Recognition Restrictions Nationwide

BigBrothers

Threatpost
21.8.20

Transparent Tribe Mounts Ongoing Spy Campaign on Military, Government

BigBrothers  CyberSpy

Threatpost

21.8.20

Cisco Critical Flaw Patched in WAN Software Solution

Vulnerebility

Threatpost
21.8.20

Microsoft Out-of-Band Security Update Fixes Windows Remote Access Flaw

Vulnerebility

Threatpost
21.8.20

IBM Settles Lawsuit Over Weather Channel App Data Privacy

Privacy

Threatpost
21.8.20

IBM AI-Powered Data Management Software Subject to Simple Exploit

Exploit

Threatpost
21.8.20

Google fixed email spoofing flaw 7 hours after public disclosure

Vulnerebility

Securityaffairs
21.8.20

Shared memory flaw in IBM Db2 can lead to Information Disclosure

Vulnerebility

Securityaffairs
21.8.20

CVE-2020-3446 default credentials bug exposes Cisco ENCS, CSP Appliances to hack

Vulnerebility

Securityaffairs
21.8.20

FritzFrog Botnet Uses Proprietary P2P Protocol

BotNet

Securityweek
21.8.20

Google Patches Email Spoofing Vulnerability After Public Disclosure

Vulnerebility

Securityweek
21.8.20

EU Regulators Wrangle Over Twitter Data Privacy Penalty

BigBrothers  Privacy

Securityweek
21.8.20

Pentest-as-a-Service Company Cobalt Raises $29 Million

IT

Securityweek
21.8.20

Vulnerability in IBM Db2 Leads to Information Disclosure, Denial of Service

Vulnerebility

Securityweek
21.8.20

Former Uber Security Chief Charged Over Covering Up 2016 Data Breach

Incindent

Thehackernews
21.8.20

Hackers Target Defense Contractors' Employees By Posing as Recruiters

Hacking

Thehackernews
21.8.20

Experian South Africa Suffers Data Breach Affecting Millions; Attacker Identified

Incindent

Thehackernews
21.8.20

Microsoft Issues Emergency Security Updates for Windows 8.1 and Server 2012 R2

OS

Thehackernews
21.8.20Diebold Nixdorf ProCash 2100xe USB ATM does not adequately secure communications between CCDM and hostAlertAlert
21.8.20NCR SelfServ ATM BNA contains multiple vulnerabilitiesAlertAlert
21.8.20NCR SelfServ ATM dispenser software contains multiple vulnerabilitiesAlertAlert
21.8.20

Brand impersonation is a go-to tactic for attackers, especially for credential phishing and BEC attacks

Spam

Net-security

21.8.20

Know the threats to mobile security

Mobil

Net-security

21.8.20

Global public cloud services market grew 26% YOY in 2019 with revenues totaling $233.4 billion

Security

Net-security

21.8.20

Save-to-transform as a catalyst for embracing digital disruption

Security

Net-security
20.8.20

Transparent Tribe: Evolution analysis,part 1

APT

Securelist
20.8.20

Experian South Africa discloses data breach, 24 million customers impacted

Incindent

Securityaffairs
20.8.20

U.S. Details North Korean Malware Used in Attacks on Defense Organizations

BigBrothers

Securityweek
20.8.20

Default Credentials Expose Cisco ENCS, CSP Appliances to Attacks

Attack

Securityweek
20.8.20

Out-of-Band Update Patches Privilege Escalation Flaws in Windows 8.1, Server 2012

Vulnerebility

Securityweek
20.8.20

Experts Reported Security Bug in IBM's Db2 Data Management Software

Vulnerebility

Thehackernews
20.8.20

Office 365 Mail Forwarding Rules (and other Mail Rules too)

Security

SANS
20.8.20

The Sounds a Key Make Can Produce 3D-Printed Replica

IT

Threatpost
20.8.20

Airline DMARC Policies Lag, Opening Flyers to Email Fraud

Spam

Threatpost

20.8.20

Researchers Warn of Flaw Affecting Millions of IoT Devices

IoT

Threatpost
20.8.20

FritzFrog Botnet Attacks Millions of SSH Servers

Cryptocurrency

Threatpost
20.8.20

CISA’s MAR warns of North Korean BLINDINGCAN RAT

Virus

Securityaffairs
20.8.20

Over 6,000 email accounts belonging to Taiwan government agencies hacked by Chinese hacked

BigBrothers

Securityaffairs
20.8.20

FritzFrog cryptocurrency P2P botnet targets Linux servers over SSH

Cryptocurrency

Securityaffairs
20.8.20

Crypto-Mining Worm Targets AWS Credentials

Cryptocurrency

Securityweek
20.8.20

Over 70% of ICS Vulnerabilities Disclosed in First Half of 2020 Remotely Exploitable

ICS

Securityweek
20.8.20

Academics Devise Attacks Targeting Email End-to-End Encryption

Attack

Securityweek
20.8.20

Vulnerability in Thales Product Could Expose Millions of IoT Devices to Attacks

IoT

Securityweek
20.8.20

Thousands of Taiwan Government Email Accounts 'Hacked by China'

BigBrothers

Securityweek
20.8.20

The Promise and Threat of Quantum Computing

Security

Securityweek
20.8.20

Ongoing Campaign Uses HTML Smuggling for Malware Delivery

Virus

Securityweek

20.8.20

What enterprises should consider when it comes to IoT security

IoT

Net-security

20.8.20

Disrupting a power grid with cheap equipment hidden in a coffee cup

Security

Net-security

20.8.20

62% of blue teams have difficulty stopping red teams during adversary simulation exercises

Security

Net-security

20.8.20

Most ICS vulnerabilities disclosed this year can be exploited remotely

ICS

Net-security

20.8.20

Thousands of ISO certifications at risk of lapsing due to halted re-certification audits

Security

Net-security

20.8.20

Expand your cloud expertise: Discount on CCSP training

Security

Net-security

19.8.20

Fileless worm builds cryptomining, backdoor-planting P2P botnet

Cryptocurrency

Net-security
19.8.20

Researchers Warn of Active Malware Campaign Using HTML Smuggling

Virus

Threatpost
19.8.20

IcedID Trojan Rebooted with New Evasive Tactics

Virus

Threatpost

19.8.20

Large Orgs Plagued with Bugs, Face Giant Patch Backlogs

Vulnerebility

Threatpost
19.8.20

AWS Cryptojacking Worm Spreads Through the Cloud

Cryptocurrency

Threatpost
19.8.20

Actively exploited CVE-2020-1464 Windows Spoofing flaw was known since 2018

Exploit

Securityaffairs
19.8.20

A flaw in Concrete5 CMS could have allowed website takeover

Vulnerebility

Securityaffairs
19.8.20

Critical flaw in Jenkins Server can cause information disclosure

Vulnerebility

Securityaffairs
19.8.20

Ukraine police and Binance dismantled a cyber gang behind $42M money laundering

Cryptocurrency

Securityaffairs
19.8.20

New Microsoft Defender ATP Capability Blocks Malicious Behaviors

Virus

Securityweek
19.8.20

Carnival Corp. Hacked; Guest and Worker Information Accessed

BigBrothers

Securityweek
19.8.20

Senate: WikiLeaks Knowingly Assisted Russian Influence Effort Before 2016 Election

BigBrothers

Securityweek
19.8.20

China Slams US 'Abuse' Over New Huawei Sanctions

BigBrothers

Securityweek
19.8.20

TikTok Ramps Up Defense Against US Accusations

BigBrothers

Securityweek
19.8.20

Vulnerability Allowing Full Server Takeover Found in Concrete5 CMS

Vulnerebility

Securityweek
19.8.20

Password Management Company Keeper Security Raises $60 Million

IT

Securityweek
19.8.20

Anti-Fraud Platform Provider SpyCloud Raises $30 Million

IT

Securityweek
19.8.20

A New Fileless P2P Botnet Malware Targeting SSH Servers Worldwide

BotNet

Thehackernews
19.8.20

Example of Word Document Delivering Qakbot

BotNet

SANS
19.8.20

Kali Linux 2020.3 released: A new shell and a Bluetooth Arsenal for NetHunter

OS

Net-security

19.8.20

Five ways to maximize FIDO

Security

Net-security

19.8.20

The benefits of providing employees with an identity compromise solution

Security

Net-security

19.8.20

Telehealth is the future of healthcare, but how secure is it?

Security

Net-security

19.8.20

Large-scale migrations away from on-premise environments are underway

Security

Net-security

19.8.20

Computer scientists create benchmarks to advance quantum computer performance

IT

Net-security

18.8.20Cruise line operator Carnival Corporation suffers a ransomware attackRansomwareSecurityaffairs
18.8.20U.S. Army Report Describes North Korea's Cyber Warfare CapabilitiesBigBrothersSecurityweek
18.8.20Chrome 86 to Alert Users of Insecure FormsSecuritySecurityweek
18.8.20DDoS Extorters Claim to Be Armada Collective, Fancy BearAttackSecurityweek
18.8.20Critical Jenkins Server Vulnerability Could Leak Sensitive InformationVulnerebilityThehackernews
18.8.20

Using API's to Track Attackers

Attack

SANS
18.8.20

Updated cryptojacking worm steals AWS credentials

Cryptocurrency

Net-security

18.8.20

Chrome 86 will prominently warn about insecure forms on secure pages

Security

Net-security

18.8.20Network intruders selling access to high-value companiesSecurity

Bleepingcomputer

18.8.20Microsoft August 2020 Patch Tuesday fixes 2 zero-days, 120 flawsOS

Bleepingcomputer

18.8.20Windows 10 Cumulative Updates KB4566782 & KB4565351 ReleasedOS

Bleepingcomputer

18.8.20Colorado city forced to pay $45,000 ransom to decrypt filesRansomware

Bleepingcomputer

18.8.20Adobe fixes critical code execution bugs in Acrobat and ReaderVulnerebility

Bleepingcomputer

18.8.20Citrix fixes critical bugs allowing takeover of XenMobile ServersVulnerebility

Bleepingcomputer

18.8.20Twitter experiencing issues sending account verification codesSocial

Bleepingcomputer

18.8.20vBulletin fixes ridiculously easy to exploit zero-day RCE bugVulnerebility

Bleepingcomputer

18.8.20Upgraded Agent Tesla malware steals passwords from browsers, VPNsVirus

Bleepingcomputer

18.8.20Michigan State University discloses credit card theft incidentIncindent

Bleepingcomputer

18.8.20Avaddon ransomware launches data leak site to extort victimsRansomware

Bleepingcomputer

18.8.20Office 365 will let you manage phishing simulation emailsPhishing

Bleepingcomputer

18.8.20Hacked government, college sites push malware via fake hacking toolsBigBrothers

Bleepingcomputer

18.8.20ProctorU confirms data breach after database leaked onlineIncindent

Bleepingcomputer

18.8.20How to restore Windows Photo Viewer in Windows 10OS

Bleepingcomputer

18.8.20Useful Registry hacks to optimize your Windows 10 experienceOS

Bleepingcomputer

18.8.20Bugs in HDL Automation expose IoT devices to remote hijackingIoT

Bleepingcomputer

18.8.20Samsung rolls out Android updates fixing critical vulnerabilitiesAndroid

Bleepingcomputer

18.8.20Fake security advisory used in clever cPanel phishing attackPhishing

Bleepingcomputer

18.8.20FBI: Iranian hackers trying to exploit critical F5 BIG-IP flawBigBrothers

Bleepingcomputer

18.8.20

Jack Daniels, Ritz London Face Cyberattacks

Hacking

Threatpost
18.8.20

Cyberattacks Hit Thousands of Canadian Tax, Benefit Accounts

BigBrothers

Threatpost

18.8.20

‘EmoCrash’ Exploit Stoppered Emotet For 6 Months

Exploit

Threatpost
18.8.20

TeamTNT is the first cryptomining bot that steals AWS credentials

Cryptocurrency

Securityaffairs

18.8.20

CISA warns of phishing attacks delivering KONNI RAT

Virus

Securityaffairs
18.8.20

Thousands of Canadian government accounts hacked, Treasury Board of Canada Secretariat say

BigBrothers

Securityaffairs
18.8.20

Multiple Uninstallers Released for China-Linked 'GoldenSpy' Malware

APT

Securityweek
18.8.20

Actively Exploited Windows Spoofing Flaw Patched Two Years After Disclosure

Exploit  Vulnerebility

Securityweek
18.8.20

Radiflow Launches Industrial Risk Analysis Platform

IT

Securityweek
18.8.20

SANS Institute Says Multiple Employees Targeted in Recent Attack

Attack

Securityweek
18.8.20

US Adds Sanctions on China's Huawei to Limit Technology Access

BigBrothers

Securityweek
18.8.20

ISC Blocked

Security

SANS
18.8.20

How do I select a risk assessment solution for my business?

Security

Net-security

18.8.20

Why do healthcare organizations have a target on their back?

Security

Net-security

18.8.20

Terrascan open source software helps developers build secure cloud infrastructure

Security

Net-security

18.8.20

Publicly reported data breaches down 52%, exposed records way up!

Incindent

Net-security

18.8.20

Pandemic accelerates investments in tech, automation, workplace transformation

Security

Net-security

18.8.20

Potential Apache Struts 2 RCE flaw fixed, PoCs released

Vulnerebility

Net-security
17.8.20US shares info on election interference tied to Russia, China, IranBigBrothers

Bleepingcomputer

17.8.20Reddit hit by coordinated hack promoting Trump's reelectionHacking

Bleepingcomputer

17.8.20CCleaner fixes bug that wipes Firefox extension settingsVulnerebility

Bleepingcomputer

17.8.20TeamViewer fixes bug that lets attackers access your PCVulnerebility

Bleepingcomputer

17.8.20Chromium browser sneaked through review, released on Microsoft StoreOS

Bleepingcomputer

17.8.20Intel leak: 20GB of source code, internal docs from alleged breachIncindent

Bleepingcomputer

17.8.20Nearly 50% of all smartphones affected by Qualcomm Snapdragon bugsVulnerebility

Bleepingcomputer

17.8.20KrØØk attack variants impact Qualcomm, MediaTek Wi-Fi chipsAttack

Bleepingcomputer

17.8.20Canon confirms ransomware attack in internal memoRansomware

Bleepingcomputer

17.8.20Unpatched bug in Windows print spooler lets malware run as adminOS

Bleepingcomputer

17.8.20Hackers abuse lookalike domains and favicons for credit card theftHacking

Bleepingcomputer

17.8.20Technology giant Konica Minolta hit by a ransomware attackRansomwareSecurityaffairs
17.8.20CISA Warns of Phishing Emails Delivering KONNI MalwareVirusSecurityweek
17.8.20'Vaccine' Kept Emotet Infections Away for Six MonthsVirusSecurityweek
17.8.20Researchers Exploited A Bug in Emotet to Stop the Spread of MalwareVirusThehackernews
17.8.20How AppTrana Managed Cloud WAF Tackles Evolving Attacking TechniquesAttackThehackernews
17.8.20The Australian government wants to respond to attacks on critical infrastructureBigBrothersSecurityaffairs
17.8.20Ritz hotel diners were victims of a sophisticated scamSpamSecurityaffairs
17.8.20Texas man sentenced to 57 months for the hacking of a major tech firm in New YorkCrimeSecurityaffairs
17.8.20Thousands of Canadian Government Accounts HackedBigBrothersSecurityweek
17.8.20

3 tips to increase speed and minimize risk when making IT decisions

Security

Net-security

17.8.20

Users turn to independent search engines for privacy, but also get misinformation

Privacy

Net-security

17.8.20

Internal audit leaders should develop new skills to stay relevant

Security

Net-security

17.8.20

Healthcare breaches declined sharply during the first half of 2020

Incindent

Net-security

17.8.20

Army researchers awarded patent for secure comms

Security

Net-security

16.8.20Google banned 2500+ Chinese YouTube channels for disinformationBigBrothers

Bleepingcomputer

16.8.20Office 365 services will drop support for older Office clientsOS

Bleepingcomputer

16.8.20Google Home erroneous update reveals the $450 million ADT dealSecurity

Bleepingcomputer

16.8.20Microsoft now lets you run Android apps in Windows 10OS

Bleepingcomputer

16.8.20Microsoft fixes 'No Internet' bug in latest Windows 10 Dev buildOS

Bleepingcomputer

16.8.20ProtonVPN: US servers overloaded in warzone for Call of Duty updatesIT

Bleepingcomputer

16.8.20Microsoft adds Windows 10 DNS over HTTPS settings sectionOS

Bleepingcomputer

16.8.20Microsoft releases Windows 10 Version 2004 security baselineOS

Bleepingcomputer

16.8.20Google to pay $7.5M in class action settlement. That's $5 a victim.IT

Bleepingcomputer

16.8.20Twitter for Android vulnerability gave access to direct messagesAndroid

Bleepingcomputer

16.8.20Hackers can abuse Microsoft Teams updater to install malwareVirus

Bleepingcomputer

16.8.20Facebook plugin bug lets hackers hijack WordPress sites’ chatSocial

Bleepingcomputer

16.8.20FBI: Networks exposed to attacks due to Windows 7 end of lifeBigBrothers

Bleepingcomputer

16.8.20Suspicious Canon outage leads to image.canon data lossIncindent

Bleepingcomputer

16.8.20NSA offers advice on how to reduce location tracking risksBigBrothers

Bleepingcomputer

16.8.20Vulnerable perimeter devices: a huge attack surfaceAttack

Bleepingcomputer

16.8.20Microsoft paid almost $14M in bounties over the last 12 monthsSecurity

Bleepingcomputer

16.8.20NodeJS module downloaded 7M times lets hackers inject codeVirus

Bleepingcomputer

16.8.20Interpol: Lockbit ransomware attacks affecting American SMBsRansomware

Bleepingcomputer

16.8.20WastedLocker ransomware abuses Windows feature to evade detectionRansomware

Bleepingcomputer

16.8.20Windows 10: HOSTS file blocking telemetry is now flagged as a riskOS

Bleepingcomputer

16.8.20Newsletter plugin bugs let hackers inject backdoors on 300K sitesVirus

Bleepingcomputer

16.8.20

Small Challenge: A Simple Word Maldoc - Part 3

Virus

SANS
16.8.20Ransom NewsRansomRansom
16.8.20

Sodinokibi ransomware gang stole 1TB of data from Brown-Forman

Ransomware

Securityaffairs
16.8.20

Emotet malware employed in fresh COVID19-themed spam campaign

Virus

Securityaffairs
16.8.20

PoC exploit code for two Apache Struts 2 flaws available online

Exploit

Securityaffairs
16.8.20

Wireshark 3.2.6 Released

Security

SANS
15.8.20Scammers sell fake likes, views on ReelsSpam blog

Avast blog

15.8.20An elections security progress report: Black Hat editionCongress blog

Avast blog

15.8.20Script-Based Malware: A New Attacker Trend on Internet ExplorerMalware blogPalo Alto Unity42
15.8.20PROTECTING AGAINST POTENTIAL CYBERSECURITY THREATS BROUGHT ON BY REMOTE WORKSafety blogCybereason
15.8.20HACKER SUMMER CAMP IS CANCELLED, LONG LIVE VIRTUAL HACKER SUMMER CAMPCongress blogCybereason
15.8.20On Drovorub: Linux Kernel Security Best PracticesSecurity blog

Mcafee blog

15.8.20Vulnerability Discovery in Open Source Libraries Part 1: Tools of the TradeVulnerebility blog

Mcafee blog

15.8.20Digital Identity is an Increasingly Popular Attack Vector for CybercriminalsCyber blogF5 Labs
15.8.20Securing APIs: 10 Best Practices for Keeping Your Data and Infrastructure SafeSecurity blogF5 Labs
15.8.20Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle ApproachMalware blogFireEye
15.8.20Repurposing Neural Networks to Generate Synthetic Media for Information OperationsCyber blogFireEye
15.8.20COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker ModuleHacking blogFireEye
15.8.20Keeping the gate locked on your IoT devices: Vulnerabilities found on Amazon’s AlexaIoT blogCheckpoint
15.8.20Don’t be silly – it’s only a lightbulbHacking blogCheckpoint
15.8.20MMS Exploit Part 5: Defeating Android ASLR, Getting RCEExploit blogProject Zero
15.8.20Attribution: A PuzzleVulnerebility blogCisco Talos
15.8.20Microsoft Patch Tuesday for Aug. 2020 — Snort rules and prominent vulnerabilitiesVulnerebility blogCisco Talos
15.8.20Barbervisor: Journey developing a snapshot fuzzer with Intel VT-xSecurity blogCisco Talos
15.8.20Google will test new feature in Chrome to curb phishingPhishing blog

Eset

15.8.20Mekotio: These aren’t the security updates you’re looking for…Security blog

Eset

15.8.20What is the cost of a data breach?Incident blog

Eset

15.8.20Twitter working to fix issue with 2FA featureSocial blog

Eset

15.8.20Black Hat 2020: Fixing voting issues – boiling the ocean?

Congress blog

Eset

15.8.20

Mac Users Targeted by Spyware Spreading via Xcode Projects

Apple

Threatpost
15.8.20

Instagram Retained Deleted User Data Despite GDPR Rules

Privacy  Social

Threatpost

15.8.20

PoC Exploit Targeting Apache Struts Surfaces on GitHub

Exploit

Threatpost
15.8.20

Critical Flaws in WordPress Quiz Plugin Allow Site Takeover

Vulnerebility

Threatpost

15.8.20

UPDATE: Canon Ransomware Attack Results in Leaked Data, Report

Ransomware

Threatpost
15.8.20

XCSSET Mac spyware spreads via Xcode Projects

Apple

Securityaffairs
15.8.20

North Korea’s Lazarus compromised dozens of organizations in Israel

APT

Securityaffairs
15.8.20

Threat Report Portugal: Q2 2020

Security

Securityaffairs
15.8.20

Texas Man Sentenced to 57 Months in Prison for Hacking Major Tech Firm

Crime

Securityweek
15.8.20

Maryland Officials Warn Gun Dealers About Phishing Scams

Phishing

Securityweek
15.8.20

Adaptive Shield Emerges From Stealth to Secure SaaS Applications

Safety

Securityweek
15.8.20

Amazon Alexa Vulnerabilities Could Have Exposed User Data

Vulnerebility

Securityweek
15.8.20

XCSSET Mac Malware Steals Information, Spreads via Xcode Projects

Apple

Securityweek
14.8.20Maze ransomware gang leaked Canon USA’s stolen filesRansomwareSecurityaffairs
14.8.20Chinese APT CactusPete targets military and financial orgs in Eastern EuropeAPTSecurityaffairs
14.8.20Facebook, Google Step Up Election Protection EffortsSocialSecurityweek
14.8.20Windows Defender Detected Citrix Services as MalwareVirusSecurityweek
14.8.20UK Cybersecurity Firm Says North Korean Attacks on Israel SuccessfulBigBrothersSecurityweek
14.8.20New Trials in England for Troubled Virus Tracing AppVirusSecurityweek
14.8.20FBI, NSA Share Details on New 'Drovorub' Linux Malware Used by RussiaBigBrothersSecurityweek
14.8.20

Definition of 'overkill' - using 130 MB executable to hide 24 kB malware

Virus

SANS
14.8.20

High-Severity TinyMCE Cross-Site Scripting Flaw Fixed

Vulnerebility

Threatpost

14.8.20

Amazon Alexa ‘One-Click’ Attack Can Divulge Personal Data

Attack  Privacy

Threatpost

14.8.20

ReVoLTE Attack Allows Hackers to Listen in on Mobile Calls

Attack

Threatpost

14.8.20

NSA, FBI Warn of Linux Malware Used in Espionage Attacks

BigBrothers

Threatpost
14.8.20

CactusPete APT Hones Toolset, Resurfaces with New Espionage Targets

APT

Threatpost

14.8.20

Zoom Faces More Legal Challenges Over End-to-End Encryption

Safety

Threatpost
14.8.20

Threat actor leaked data for U.S. gun exchange site on hacking forum

Hacking

Securityaffairs
14.8.20

FBI and NSA joint report details APT28’s Linux malware Drovorub

APT

Securityaffairs
14.8.20

Microsoft failed to fix LSASS elevation of privilege flaw

Vulnerebility

Securityaffairs
14.8.20

Google to Run Experiment in Fight Against URL Spoofing in Chrome

Safety

Securityweek
14.8.20

China-Linked 'CactusPete' Hackers Successful Despite Lack of Sophistication

APT

Securityweek
14.8.20

Corporate Espionage Group 'RedCurl' Launching Targeted Attacks Since 2018

CyberSpy

Securityweek
14.8.20

State-backed hacking, cyber deterrence, and the need for international norms

Cyber

Net-security

14.8.20

In reality, how important is zero trust?

Cyber

Net-security

14.8.20

CIOs prioritizing IAM over endpoint security and security awareness training

Cyber

Net-security

14.8.20

What is the impact of the pandemic on managed services providers?

Cyber

Net-security

14.8.20

Most security pros are concerned about human error exposing cloud data

Cyber

Net-security

13.8.20CactusPete APT group’s updated Bisonal backdoorAPTSecurelist
13.8.20Corporate Espionage Group 'RedCurl' Targeted at Least 14 OrganizationsCyberSpySecurityweek
13.8.20Potentially Serious Vulnerability Found in Popular WYSIWYG Editor TinyMCEVulnerebilitySecurityweek
13.8.20FireEye Launches Public Bug Bounty Program on BugcrowdSecuritySecurityweek
13.8.20Microsoft's Patch for LSASS Flaw Incomplete, Google Researcher SaysVulnerebilitySecurityweek
13.8.20New Attack Lets Hackers Decrypt VoLTE Encryption to Spy on Phone CallsAttackThehackernews
13.8.20Amazon Alexa Bugs Allowed Hackers to Install Malicious Skills RemotelyVulnerebilityThehackernews
13.8.20AA20-225A : Malicious Cyber Actor Spoofing COVID-19 Loan Relief Webpage via Phishing EmailsCERTCERT
13.8.20

Citrix Warns of Critical Flaws in XenMobile Server

Vulnerebility

Threatpost

13.8.20

TikTok Surreptitiously Collected Android User Data Using Google-Prohibited Tactic

Social

Threatpost

13.8.20

Rent a hacker: Group-IB uncovers corporate espionage group RedCurl

CyberSpy

Securityaffairs
13.8.20

Israel announced to have foiled an attempted cyber-attack on defence firms

BigBrothers

Securityaffairs
13.8.20

Threat actors managed to control 23% of Tor Exit nodes

Hacking

Securityaffairs
13.8.20

SANS Institute Email Breach – 28,000 User Records exposed

Incindent

Securityaffairs
13.8.20

Agent Tesla includes new password-stealing capabilities from browsers and VPNs

Virus

Securityaffairs
13.8.20

SASE Provider Perimeter 81 Raises $40 Million

IT

Securityweek
13.8.20

Israel Says Foiled Cyber Attack on Its Defence Firms

BigBrothers

Securityweek
13.8.20

SecurityWeek to Host Virtual Cloud Security Summit on August 13, 2020

Congress

Securityweek
13.8.20

Hackers Breach Customer Data at Michigan State Online Store

Incindent

Securityweek
13.8.20

Windows and IE Zero-Day Vulnerabilities Chained in 'PowerFall' Attacks

Attack

Securityweek
13.8.20

ICS Cyber Security Conference Call for Presentations Extended to August 31, 2020

ICS

Securityweek
13.8.20

To the Brim at the Gates of Mordor Pt. 1

Virus

SANS

13.8.20

Surge in cyber attacks targeting open source software projects

Attack

Net-security

13.8.20

Cyber crisis response failing to adapt to modern threats

Cyber

Net-security

13.8.20

Content farms develop and spread fake news about COVID-19 for profit

Cyber

Net-security

13.8.20

SD-WAN: A key enabler for remote workforces and enhanced security

Security

Net-security

13.8.20

Intel, SAP, and Citrix release critical security updates

Vulnerebility

Net-security

12.8.20Internet Explorer and Windows zero-day exploits used in Operation PowerFallExploitSecurelist
12.8.20City of Lafayette (Colorado) paid $45,000 ransom after ransowmare attackRansomwareSecurityaffairs
12.8.20Google Awards $10,000 for Remote Code Execution Vulnerability in ChromeVulnerebilitySecurityweek
12.8.20Mozilla Cybersecurity Staff Hit by LayoffsCyberSecurityweek
12.8.20SANS Institute Says 28,000 User Records Exposed in Email BreachIncindentSecurityweek
12.8.20SAP Releases August 2020 Security UpdatesVulnerebilitySecurityweek
12.8.20Intel Patches Many Privilege Escalation Vulnerabilities in Server BoardsVulnerebilitySecurityweek
12.8.20Microsoft Reveals New Innocent Ways Windows Users Can Get HackedHackingThehackernews
12.8.20Flaws in Samsung Phones Exposed Android Users to Remote AttacksAndroidThehackernews
12.8.20Critical Adobe Acrobat and Reader Bugs Allow RCEVulnerebility

Threatpost

12.8.20Two 0-Days Under Active Attack, Among 120 Bugs Patched by MicrosoftOS

Threatpost

12.8.20Researcher Publishes Patch Bypass for vBulletin 0-DayExploit

Threatpost

12.8.20Cybersecurity Skills Gap Worsens, Fueled by Lack of Career DevelopmentCyberThreatpost
12.8.20Agent Tesla Spyware Adds Fresh Tricks to Its ArsenalVirus

Threatpost

12.8.20Critical Intel Flaw Afflicts Several Motherboards, Server Systems, Compute ModulesVulnerebilityThreatpost
12.8.20Samsung Quietly Fixes Critical Galaxy Flaws Allowing Spying, Data WipingVulnerebilityThreatpost
12.8.20Citrix fixed flaws in XenMobile that will be likely exploited soonVulnerebilitySecurityaffairs
12.8.20Microsoft August 2020 Patch Tuesday fixed actively exploited zero-daysVulnerebilitySecurityaffairs
12.8.20Adobe Acrobat and Reader affected by critical flawsVulnerebilitySecurityaffairs
12.8.20Flaws in ‘Find My Mobile’ exposed Samsung phones to hackVulnerebilitySecurityaffairs
12.8.20Malicious Actor Controlled 23% of Tor Exit NodesVirusSecurityweek
12.8.20PepsiCo CISO Joins FireEye BoardITSecurityweek
12.8.20Microsoft Patches Actively Exploited Windows, IE VulnerabilitiesVulnerebilitySecurityweek
12.8.20Citrix Expects Hackers to Exploit Newly Patched XenMobile VulnerabilitiesVulnerebilitySecurityweek
12.8.20Adobe Patches 11 Critical Vulnerabilities in Acrobat and ReaderVulnerebilitySecurityweek
12.8.20vBulletin Patches Zero-Day Exploited in AttacksAttack  ExploitSecurityweek
12.8.20HDL Smart Devices in Homes and Buildings Exposed to Hacker AttacksHackingSecurityweek
12.8.20Critical Flaws Affect Citrix Endpoint Management (XenMobile Servers)VulnerebilityThehackernews
12.8.20Google Chrome Bug Could Let Hackers Bypass CSP Protection; Update Web BrowsersHackingThehackernews
12.8.20

Microsoft August 2020 Patch Tuesday

OS

SANS

12.8.20

Maximizing data privacy: Making sensitive data secure by default

Privacy

Net-security

12.8.20

Organizations knowingly ship vulnerable code despite using AppSec tools

Apple

Net-security

12.8.20

Expanding attack surfaces leave security teams stretched thin

Attack

Net-security

12.8.20

Half of IT teams can’t fully utilize cloud security solutions due to understaffing

Cyber

Net-security

12.8.20

How to maintain or improve employee productivity in virtual or hybrid workplaces

Cyber

Net-security

12.8.20

August 2020 Patch Tuesday: Microsoft fixes two vulnerabilities under attack

OS

Net-security

11.8.20Avaddon ransomware operators have launched their data leak siteRansomwareSecurityaffairs
11.8.20Researcher discloses exploit code for a vBulletin zero-dayVulnerebilitySecurityaffairs
11.8.20DEF CON 2020 Wrap-Up: Hacking Phones, Cars and SatellitesCongressSecurityweek
11.8.20Data Security Company Symmetry Systems Emerges From StealthSecuritySecurityweek
11.8.20A New vBulletin 0-Day RCE Vulnerability and Exploit Disclosed PubliclyExploitThehackernews
11.8.20

Exploits for vBulletin zero-day released, attacks are ongoing

Exploit

Net-security
11.8.20Google Chrome Browser Bug Exposes Billions of Users to Data TheftIncindent

Threatpost

11.8.20TeamViewer Flaw in Windows App Allows Password-CrackingVulnerebility

Threatpost

11.8.20DDoS Attacks Cresting Amid PandemicAttack

Threatpost

11.8.20Google Fixes Mysterious Audio Recording Blip in Smart SpeakersVulnerebilityThreatpost
11.8.20TeamViewer flaw can allow hackers to steal System passwordVulnerebilitySecurityaffairs
11.8.20Nefilim ransomware operators claim to have hacked the SPIE groupRansomwareSecurityaffairs
11.8.20Facebook Open Sources Analysis Tool for Python CodeSocialSecurityweek
11.8.20'Find My Mobile' Vulnerabilities Exposed Samsung Galaxy Phones to AttacksAndroidSecurityweek
11.8.20'Have I Been Pwned' Code Base Going Open SourceSecuritySecurityweek
11.8.20Vulnerabilities in Qualcomm Chips Expose Billions of Devices to AttacksVulnerebilitySecurityweek
11.8.20Trump Moves on China Apps May Create New Internet 'Firewall'BigBrothersSecurityweek
11.8.20

Businesses prioritize security and collaboration tools to manage sustained remote work environments

Cyber

Net-security

11.8.20

Securing human resources from cyber attack

Cyber

Net-security

11.8.20

10-point plan for securing employee health data collected for COVID-19 prevention

Cyber

Net-security
10.8.20

Scoping web application and web service penetration tests

Security

SANS

10.8.20

Facebook open-sources a static analyzer for Python code

Social

Net-security

10.8.20

Critical ManageEngine ADSelfService Plus RCE flaw patched

Vulnerebility

Net-security

10.8.20DDoS attacks in Q2 2020AttackSecurelist
10.8.20Black Hat Wrap-Up: IoT and Hardware Vulnerabilities Take the SpotlightCongressSecurityweek
10.8.20TikTok, WeChat Bans Not Crucial to US Security: ExpertsBigBrothersSecurityweek
10.8.20Accounts of Reddit Moderators Hijacked in Pro-Trump HackHackingSecurityweek
10.8.20Over 30 Vulnerabilities Discovered Across 20 CMS ProductsVulnerebilitySecurityweek
10.8.20TeamViewer Flaw Could Let Hackers Steal System Password RemotelyVulnerebilityThehackernews
10.8.20Researcher Demonstrates Several Zoom Vulnerabilities at DEF CON 28CongressThehackernews
10.8.20NCSC Director warns of interference on elections tied to Russia, China, IranBigBrothersSecurityaffairs
10.8.20INTERNET BLOCKING IN MYANMAR – SECRET BLOCK LIST AND NO MEANS TO APPEALCyberCrimeSecurityaffairs
10.8.20Spying on satellite internet comms with a $300 listening stationCyberSpySecurityaffairs
10.8.20US OCC imposed an $80 Million fine to Capital One for 2019 hackIncindentSecurityaffairs
10.8.20UN Reports Sharp Increase in Cybercrime During PandemicBigBrothersSecurityweek
10.8.20Newsletter plugin bugs let hackers inject backdoors on 300K sitesVirus

Bleepingcomputer

10.8.20Zello resets all user passwords after data breachIncindent

Bleepingcomputer

10.8.20FBI sees surge in online shopping scams, FTC says most reports everBigBrothers

Bleepingcomputer

10.8.20Netwalker ransomware earned $25 million in just five monthsRansomware

Bleepingcomputer

10.8.20US govt exposes Chinese espionage malware secretly used since 2008BigBrothers

Bleepingcomputer

10.8.20Hackers could have stolen PayPal funds from Meetup usersIncindent

Bleepingcomputer

10.8.20Havenly discloses data breach after 1.3M accounts leaked onlineIncindent

Bleepingcomputer

10.8.20Confirmed: Garmin received decryptor for WastedLocker ransomwareRansomware

Bleepingcomputer

10.8.20How to fix Windows Update problems in Windows 10OS

Bleepingcomputer

10.8.20How to use Windows 10 to see what's using the most disk spaceOS

Bleepingcomputer

10.8.20Three suspects charged for roles in Twitter hack, Bitcoin scamCryptocurrency  Social

Bleepingcomputer

10.8.20GandCrab ransomware operator arrested in BelarusRansomware

Bleepingcomputer

10.8.20Microsoft PowerToys update fixes launcher, adds color pickerOS

Bleepingcomputer

10.8.20US government sites abused to redirect users to porn sitesBigBrothers

Bleepingcomputer

10.8.20Microsoft fixes Windows 10 2004 Bluetooth and Intel GPU issuesOS

Bleepingcomputer

10.8.20Windows 10 2004 KB4568831 update released with printing fixesOS

Bleepingcomputer

10.8.20QNAP urges users to update Malware Remover after QSnatch alertVirus

Bleepingcomputer

10.8.20Bypassing Windows 10 UAC with mock folders and DLL hijackingHacking  OS

Bleepingcomputer

10.8.20Hackers stole Twitter employee credentials via phone phishingSocial

Bleepingcomputer

10.8.20Canadian MSP discloses data breach, failed ransomware attackRansomware

Bleepingcomputer

10.8.20Linux warning: TrickBot malware is now infecting your systemsVirus

Bleepingcomputer

10.8.20KDE archive tool flaw let hackers take over Linux accountsVulnerebility

Bleepingcomputer

10.8.20Office 365 phishing abuses Google Ads to bypass email filtersPhishing

Bleepingcomputer

10.8.20EU sanctions Russian espionage unit, Chinese and North Korean firmsBigBrothers

Bleepingcomputer

10.8.20Startups disclose data breaches after massive 386M records leakIncindent

Bleepingcomputer

10.8.20US defense contractors targeted by North Korean phishing attacksBigBrothers  Phishing

Bleepingcomputer

10.8.20Firefox 79 released with new Lockwise password export featureSecurity

Bleepingcomputer

10.8.20Vermont Tax Department exposed 3 years worth of tax return infoIncindent

Bleepingcomputer

10.8.20Sneaky Doki Linux malware infiltrates Docker cloud instancesVirus

Bleepingcomputer

10.8.20Zoom bug allowed attackers to crack private meeting passwordsAttack

Bleepingcomputer

10.8.20

Small Challenge: A Simple Word Maldoc - Part 2

Virus

SANS

10.8.20

The precision of security undermined by a failure to correlate

Security

Net-security

10.8.20

Internal investigations are changing in the age of COVID-19

Security

Net-security

10.8.20

Why the rapid transition to cloud demands that DevOps shift left

Security

Net-security

10.8.20

6,600 organizations bombarded with 100,000+ BEC attacks

Spam

Net-security

10.8.20

DevOps is transforming database development in the healthcare sector

Security

Net-security

8.8.20Homoglyph attacks used in phishing campaign and Magecart attacksCyberCrime  PhishingSecurityaffairs
8.8.20Microsoft now detects CCleaner as a Potentially Unwanted ApplicationVirus

Bleepingcomputer

8.8.20BootHole GRUB bootloader bug lets hackers hide malware in Linux, WindowsVirus

Bleepingcomputer

8.8.20Microsoft to remove all Windows downloads signed with SHA-1OS

Bleepingcomputer

8.8.20FBI warns of Netwalker ransomware targeting US government and orgsBigBrothers  Ransomware

Bleepingcomputer

8.8.20The IRS asks tax professionals to enable multi-factor authenticationSafety

Bleepingcomputer

8.8.20

Business giant Dussmann Group's data leaked after ransomware attackRansomware

Bleepingcomputer

8.8.20Critical Wordpress plugin bug lets hackers take over hosting accountVulnerebility

Bleepingcomputer

8.8.20Emotet malware now steals your email attachments to attack contactsVirus

Bleepingcomputer

8.8.20Magento gets security updates for severe code execution bugsVulnerebility

Bleepingcomputer

8.8.20

North Korean hackers created VHD ransomware for enterprise attacksBigBrothers  Ransomware

Bleepingcomputer

8.8.20Hacker leaks 386 million user records from 18 companies for freeIncindent

Bleepingcomputer

8.8.20Industrial VPN vulnerabilities put critical infrastructure at riskVulnerebility

Bleepingcomputer

8.8.20Netflix credential phishing hides behind working CAPTCHAPhishing

Bleepingcomputer

8.8.20Feature-rich Ensiko malware can encrypt, targets Windows, macOS, LinuxVirus

Bleepingcomputer

8.8.20Promo.com discloses data breach after 22M user records leaked onlineIncindent

Bleepingcomputer

8.8.20

Office 365 adds new features to help identify malicious spamOS

Bleepingcomputer

8.8.20Office 365 phishing baits employees with fake SharePoint alertsOS

Bleepingcomputer

8.8.20Windows 10 Desktop Windows Manager crashes due to DirectX bugOS

Bleepingcomputer

8.8.20Garmin confirms ransomware attack, services coming back onlineRansomware

Bleepingcomputer

8.8.20

UK and US warn QNAP owners to upgrade firmware to block malwareVirus

Bleepingcomputer

8.8.20CheckMail7Anti-Ramson ToolAnti-Ramson Tool
8.8.20Ransom NewsRansomRansom
8.8.20NSA warns against Wi-Fi, Bluetooth, and apps that expose locationBigBrother blog

Avast blog

8.8.20Over 130M records from recent data breaches for saleIncident blog

Avast blog

8.8.20Do these three things to keep stalkerware at baySecurity blog

Avast blog

8.8.20

COVID-19 tracking apps are easy targets for hackersHacking blog

Avast blog

8.8.20Contact tracing apps face their day of reckoningSecurity blog

Avast blog

8.8.20UK lockdown triggers increase in phishing scamsPhishing blog

Avast blog

8.8.20Bitcoin scammers hijack major Twitter accountsCryptocurrency blog

Avast blog

8.8.20

What does the Twitter hack mean for the future of democracy?Social blog

Avast blog

8.8.20DoJ charges Chinese hackers with targeting COVID-19 research centersBigBrother blog

Avast blog

8.8.20IBM report shows true cost of data breachesIncident blog

Avast blog

8.8.20What we can learn from the Garmin ransomware attackRansomware blog

Avast blog

8.8.20

What to do about the BootHole vulnerabilityVulnerebility blog

Avast blog

8.8.20

INCREASE IN REMOTE WORK SPURS DEMAND FOR EDR CYBERSECURITYCyber blogCybereason
8.8.20Robot Character Analysis Reveals Trust IssuesSecurity blog

Mcafee blog

8.8.20Call an Exorcist! My Robot’s Possessed!Security blog

Mcafee blog

8.8.20Dopple-ganging up on Facial Recognition SystemsSecurity blog

Mcafee blog

8.8.20

Ripple20 Critical Vulnerabilities – Detection Logic and SignaturesVulnerebility blog

Mcafee blog

8.8.20Repurposing Neural Networks to Generate Synthetic Media for Information OperationsSecurity blogFireEye
8.8.20Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle ApproachMalware blogFireEye
8.8.20Stadeo: Deobfuscating Stantinko and moreSecurity blog

Eset

8.8.20

Small and medium‑sized businesses: Big targets for ransomware attacksRansomware blog

Eset

8.8.20Beyond KrØØk: Even more Wi‑Fi chips vulnerable to eavesdroppingVulnerebility blog

Eset

8.8.20Blackbaud data breach: What you should knowIncident blog

Eset

8.8.20

NSA shares advice on how to limit location trackingBigBrother blog

Eset

8.8.20

Scanning Activity Include Netcat Listener

SecuritySANS
8.8.20Remotely hack a Mercedes-Benz E-Class is possible, experts demonstratedHackingSecurityaffairs
8.8.20FBI warns of Iran-linked hackers attempting to exploit F5 BIG-IP flawBigBrothersSecurityaffairs

8.8.20

Qualcomm and MediaTek Wi-Fi chips impacted by Kr00k-Like attacksAttackSecurityaffairs

7.8.20

Hitblockdown002Conference PressConference Press
7.8.20Defcon 28Conference PressConference Press
7.8.20BlackHat 2020 USAConference PressConference Press

7.8.20

Hackers Dump 20GB of Intel’s Confidential Data OnlineIncindent

Threatpost

7.8.20Qualcomm Bugs Open 40 Percent of Android Handsets to AttackAttack  Vulnerebility

Threatpost

7.8.20Attackers Horn in on MFA Bypass Options for Account TakeoversHacking

Threatpost

7.8.20Have I Been Pwned Set to Go Open-SourceSecurityThreatpost
7.8.20Reddit massive hack: hackers defaced channels with pro-Trump messagesHackingSecurityaffairs

7.8.20

Did Maze ransomware operators steal 10 GB of data from Canon?RansomwareSecurityaffairs
7.8.20Intel investigates security breach after the leak of 20GB of internal documentsIncindentSecurityaffairs

7.8.20

Chinese Researchers Show How They Remotely Hacked a Mercedes-BenzHacking

Securityweek

7.8.20TikTok and WeChat: Chinese Apps Dogged by Security FearsBigBrothersSecurityweek

7.8.20

Spam and phishing in Q2 2020Phishing  SpamSecurelist
7.8.20Trump Bans Dealings With Chinese Owners of TikTok, WeChatBigBrothers

Securityweek

7.8.20Qualcomm, MediaTek Wi-Fi Chips Vulnerable to Kr00k-Like AttacksAttackSecurityweek
7.8.20Capital One Fined $80 Million in Data BreachIncindent

Securityweek

7.8.20Researchers Revive 'Foreshadow' Attack by Extending It Beyond L1 CacheAttackSecurityweek

7.8.20

Capital One Fined $80 Million for 2019 Data Breach Affecting 106 Million UsersIncindentThehackernews
7.8.20Evasive Credit Card Skimmers Using Homograph Domains and Infected FaviconCyberCrimeThehackernews
7.8.20How COVID-19 Has Changed Business Cybersecurity Priorities ForeverCyberCrimeThehackernews

7.8.20

Researchers flag two zero-days in Windows Print Spooler

Vulnerebility

Net-security

7.8.20

Canon Admits Ransomware Attack in Employee Note, ReportRansomware

Threatpost

7.8.20Black Hat 2020: Mercedes-Benz E-Series Rife with 19 BugsCongress

Threatpost

7.8.20High-Severity Cisco DoS Flaw Plagues Small-Business SwitchesVulnerebility

Threatpost

7.8.20Black Hat 2020: Satellite Comms Globally Open to $300 Eavesdropping HackCongress

Threatpost

7.8.20Black Hat 2020: Influence Campaigns Are a Cybersecurity ProblemCongress

Threatpost

7.8.20

Black Hat 2020: ‘Zero-Click’ MacOS Exploit Chain Uses Microsoft Office MacrosCongress

Threatpost

7.8.20Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big ProfitsCongress

Threatpost

7.8.20U.S. Offers Reward of $10M for Info Leading to Discovery of Election MeddlingBigBrothers

Threatpost

7.8.20Google Threat Analysis Group took down ten influence operations in Q2 2020CyberSecurityaffairs
7.8.20Intel Investigating Data Leak of Technical Documents, ToolsIncindent

Securityweek

7.8.20

US Senate Votes to Ban TikTok on Government PhonesBigBrothersSecurityweek
7.8.20Twitter Moves to Reduce Reach of 'State-affiliated' MediaSocial

Securityweek

7.8.20U.S. Government Launches Cyber Career Path ToolBigBrothersSecurityweek
7.8.20Silverfort Raises $30 Million to Expand Agentless Authentication PlatformITSecurityweek
7.8.20Intel, ARM, IBM, AMD Processors Vulnerable to New Side-Channel AttacksAttackThehackernews

7.8.20

TA551 (Shathak) Word docs push IcedID (Bokbot)

Spam

SANS

7.8.20

August 2020 Patch Tuesday forecast: Planning for the end?

Vulnerebility

Net-security

7.8.20

DDoS attacks in April, May and June 2020 double compared to Q2 2019

Attack

Net-security

7.8.20

What are the benefits of automated, cloud-native patch management?

Security

Net-security

7.8.20

Consumers don’t entirely trust smart home tech

Security

Net-security

6.8.20

Incident Response Analyst Report 2019IncindentSecurelist

6.8.20

Netwalker ransomware operators claim to have stolen data from Forsee PowerRansomwareSecurityaffairs

6.8.20

US Offers $10 Million Reward Against Election InterferenceITSecurityweek

6.8.20

Researcher Discovers New HTTP Request Smuggling Attack VariantsAttackSecurityweek

6.8.20

Twitter Says Android App Vulnerability Exposed Direct MessagesSocial

Securityweek

6.8.20

State Department offers $10 million for info on hackers targeting U.S. elections

BigBrothers

Net-security

6.8.20

TeamViewer flaw could be exploited to crack users’ password

Exploit

Net-security

6.8.20

Black Hat 2020: Open-Source AI to Spur Wave of ‘Synthetic Media’ AttacksCongress

Threatpost

6.8.20

Black Hat 2020: Scaling Mail-In Voting Spawns Broad ChallengesCongress

Threatpost

6.8.20

High-Severity Android RCE Flaw Fixed in August Security UpdateAndroid

Threatpost

6.8.20

Black Hat 2020: In a Turnaround, Voting Machine Vendor Embraces Ethical HackersCongress

Threatpost

6.8.20

Black Hat 2020: Linux Spyware Stack Ties Together 5 Chinese APTsCongress

Threatpost

6.8.20

Twitter Fixes High-Severity Flaw Affecting Android UsersAndroid

Threatpost

6.8.20

Microsoft Teams Patch Bypass Allows RCEVulnerebility

Threatpost

6.8.20

NSA Warns Smartphones Leak Location DataBigBrothers

Threatpost

6.8.20

A Cyber ‘Vigilante’ is Sabotaging Emotet’s ReturnVirusThreatpost

6.8.20

FBI is warning of cyber attacks against Windows 7 systems that reached end-of-lifeBigBrothersSecurityaffairs

6.8.20

Hackers can abuse Microsoft Teams updater to deliver malicious payloadsVirusSecurityaffairs

6.8.20

NSA releases a guide to reduce location tracking risksBigBrothers

Securityaffairs

6.8.20

US Talks Tougher on Chinese Tech, But Offers Few SpecificsBigBrothersSecurityweek

6.8.20

Porn Video Interrupts US Court Hearing for Accused Twitter HackerSocialSecurityweek

6.8.20

Researcher Details Sophisticated macOS Attack via Office Document MacrosApple

Securityweek

6.8.20

Colorado City Pays $45,000 Ransom After Cyber-AttackRansomwareSecurityweek

6.8.20

Researcher Demonstrates 4 New Variants of HTTP Request Smuggling AttackAttackThehackernews

6.8.20

A Fork of the FTCode Powershell Ransomware

Ransomware

SANS

6.8.20

How can security leaders maximize security budgets during a time of budget cuts?

Security

Net-security

6.8.20

Misconfigured cloud storage services are commonplace in 93% of deployments

Security

Net-security

6.8.20

25% of IT workers don’t enforce security policies

Security

Net-security

6.8.20

Malware attacks abusing machine identities grew 8x over the last 10 years

Virus

Net-security

6.8.20

Cybercriminals are developing and boosting their attacks

CyberCrime

Net-security

6.8.20

Discounted CISSP exam prep pricing is back

Security

Net-security

6.8.20

Firefox to block redirect tracking

Privacy

Net-security

5.8.20

Hacker leaks passwords for 900+ Pulse Secure VPN enterprise servers

Incindent

Securityaffairs

5.8.20

Exclusive: TIM’s Red Team Research finds 4 zero-days in WOWZA Streaming Engine product

Vulnerebility

Securityaffairs

5.8.20

Flaw in popular NodeJS ‘express-fileupload’ module allows DoS attacks and code injection

Attack

Securityaffairs

5.8.20

Vulnerabilities in Protocol Gateways Can Facilitate Attacks on Industrial Systems

ICS

Securityweek

5.8.20

Federal Program Offers New Cybersecurity Tool for Elections

BigBrothers

Securityweek

5.8.20

Drone Maker DJI Says Claims About Security of Pilot App 'Misleading'

Security

Securityweek

5.8.20

Apple Touch ID Flaw Could Have Let Attackers Hijack iCloud Accounts

Apple

Thehackernews

5.8.20

Newsletter WordPress Plugin Opens Door to Site TakeoverSecurity

Threatpost

5.8.20

Twitter Could Face $250M FTC Fine Over Improper Data UseSocial

Threatpost

5.8.20

NetWalker Ransomware Rakes in $29M Since MarchRansomware

Threatpost

5.8.20

Apple Knocked Off Perch as Most Imitated Brand for Phishing AttacksApple

Threatpost

5.8.20

UberEats data leaked on the dark webCyberCrimeSecurityaffairs

5.8.20

US govt agencies share details of the China-linked espionage malware TaidoorBigBrothersSecurityaffairs

5.8.20

High-Wattage IoT Botnets Can Manipulate Energy Market: ResearchersBotNet  IoT

Securityweek

5.8.20

GreyNoise Raises $4.8 Million in Seed Funding to Combat Alert FatigueITSecurityweek

5.8.20

Tampa Teenager Accused in Twitter Hack Pleads Not GuiltySocial

Securityweek

5.8.20

Google Patches Over 50 Vulnerabilities in Android With August 2020 UpdatesAndroid

Securityweek

5.8.20

Microsoft Paid Out Nearly $14 Million via Bug Bounty Programs in Past YearSecuritySecurityweek

5.8.20

U.S. Attributes Taidoor Malware to Chinese Government HackersBigBrothers

Securityweek

5.8.20

Traffic Analysis Quiz: What's the Malware From This Infection?

Spam

SANS

5.8.20

Engaging business units in security governance: Why everyone should be concerned

Security

Net-security

5.8.20

Security analysis of legacy programming environments reveals critical flaws

Vulnerebility

Net-security

5.8.20

As personal use of managed devices becomes ubiquitous, risks increase

Security

Net-security

5.8.20

Many companies have not taken basic steps to protect their remote workforce

Security

Net-security

5.8.20

Ways AI could be used to facilitate crime over the next 15 years

Crime

Net-security

5.8.20

4 in 10 organizations punish staff for cybersecurity errors

Cyber

Net-security

4.8.20

Maze Ransomware operators published data from LG and XeroxRansomwareSecurityaffairs

4.8.20

NetWalker ransomware operators have made $25 million since March 2020RansomwareSecurityaffairs

4.8.20

Interpol Warns of 'Alarming' Cybercrime Rate During PandemicCyberCrime

Securityweek

4.8.20

Legacy Programming Languages Pose Serious Risks to Industrial RobotsITSecurityweek

4.8.20

French Trial Ordered for Alleged Russian Bitcoin FraudsterBigBrothers

Securityweek

4.8.20

US Government Warns of a New Strain of Chinese 'Taidoor' VirusBigBrothersThehackernews

4.8.20

Reminder: Patch Cisco ASA / FTD Devices (CVE-2020-3452). Exploitation Continues

Exploit  Vulnerebility

SANS

4.8.20

Analysis of 92 billion rejected emails uncovers threat actors’ motivations

Security

Net-security

4.8.20

PE Tree: Free open source tool for reverse-engineering PE files

Security

Net-security

4.8.20

Black Hat USA 2020 Preview: Election Security, COVID Disinformation and MoreCongress

Threatpost

4.8.20

Meetup Critical Flaws Allow ‘Group’ Takeover, Payment TheftVulnerebility

Threatpost

4.8.20

Garmin Pays Up to Evil Corp After Ransomware Attack — ReportsRansomware

Threatpost

4.8.20

Black Hat USA 2020: Critical Meetup.com Flaws Reveal Common AppSec HolesCongress

Threatpost

4.8.20

Google Updates Ad Policies to Counter Influence Campaigns, ExtortionSecurity

Threatpost

4.8.20

Netgear Won’t Patch 45 Router Models Vulnerable to Serious FlawVulnerebility

Threatpost

4.8.20

Hackers stole €1.2m worth of cryptocurrency from 2getherCryptocurrencySecurityaffairs

4.8.20

Reading the 2020 Cost of a Data Breach ReportIncindentSecurityaffairs

4.8.20

Belarussian authorities arrested GandCrab ransomware distributorRansomwareSecurityaffairs

4.8.20

Havenly discloses data breach, 1.3M accounts available onlineIncindentSecurityaffairs

4.8.20

Ghostwriter disinformation campaign aimed at discrediting NATOBigBrothersSecurityaffairs

4.8.20

FBI issued a flash alert about Netwalker ransomware attacksRansomwareSecurityaffairs

4.8.20

Garmin allegedly paid for a decryptor for WastedLocker ransomwareRansomwareSecurityaffairs

4.8.20

QNAP urges users to update Malware Remover after QSnatch joint alertVirusSecurityaffairs

4.8.20

A critical flaw in wpDiscuz WordPress plugin lets hackers take over hosting accountVulnerebilitySecurityaffairs

4.8.20

The author of FastPOS PoS malware pleads guiltyVirusSecurityaffairs

4.8.20

BlackBerry Releases Open Source Reverse Engineering ToolSecurity

Securityweek

4.8.20

Ransomware Feared as Possible Saboteur for November ElectionRansomwareSecurityweek

4.8.20

Hackers Could Target Organizations via Flaws in Mitsubishi Factory Automation ProductsVulnerebility

Securityweek

4.8.20

Google Analysis of Zero-Days Exploited in 2019 Finds 'Detection Bias'VulnerebilitySecurityweek

4.8.20

Foreign Threats Loom Ahead of US Presidential ElectionBigBrothers

Securityweek

4.8.20

How the FBI Identified Twitter HackersBigBrothersSecurityweek

4.8.20

Microsoft to Keep Exploring TikTok Deal After Talks With TrumpBigBrothers

Securityweek

4.8.20

Powershell Bot with Multiple C2 Protocols

BotNet

SANS

4.8.20

A Silicon Valley business exec’s tips for maintaining organizational security

Security

Net-security

4.8.20

How to implement expedited security strategies during a crisis

Security

Net-security

4.8.20

New defense method enables telecoms, ISPs to protect consumer IoT devices

IoT

Net-security

4.8.20

The pandemic had a negative impact on data center operations

Security

Net-security

4.8.20

eBook: Planning for Office 365 Gaps

IT

Net-security

4.8.20

Meetup vulnerabilities enabled group takeovers, payment redirections

Vulnerebility

Net-security

4.8.20

Granting employees admin status is convenient but risky

Security

Net-security

4.8.20

How AI can alleviate data lifecycle risks and challenges

Security

Net-security

4.8.20

How privacy can decrease safety

Privacy

Net-security

4.8.20

The COVID-19 pandemic and its impact on cybersecurity

Cyber

Net-security

4.8.20

IT skills shortage forces organizations to prioritize education

Security

Net-security

4.8.20

IoT data management services to reach $42.9 billion by 2026

IoT

Net-security

1.8.20

Four individuals charged for the recent Twitter hackSocialSecurityaffairs

1.8.20

Trump says he will ban popular Chinese video app TikTok in the USBigBrothersSecurityaffairs

1.8.20

Trump Says Will bar TikTok From USBigBrothers

Securityweek

1.8.20

US Charges Three People for Roles in Epic Twitter HackSocialSecurityweek

1.8.20

Building a .freq file with Public Domain Data Sources

Security

SANS

1.8.20

Twitter: Epic Account Hack Caused by Mobile Spearphishing

Attack  Social

Threatpost

1.8.20

Black Hat USA 2020 Preview: Election Security, COVID Disinformation and More

Congress

Threatpost

1.8.20

4 Unpatched Bugs Plague Grandstream ATAs for VoIP Users

Vulnerebility

Threatpost

1.8.20

Authorities Arrest Alleged 17-Year-Old ‘Mastermind’ Behind Twitter Hack

Social

Threatpost

1.8.20

CWT Travel Agency Faces $4.5M Ransom in Cyberattack, Report

Cyber

Threatpost

1.8.20

Anti-NATO Disinformation Campaign Leveraged CMS Compromises

BigBrothers

Threatpost

1.8.20

Updates provided by Red Hat for BootHole cause systems to hang

Vulnerebility

Securityaffairs

1.8.20

US Charges Three People for Roles in Epic Twitter Hack

Social

Securityaffairs

1.8.20

Florida Teen Charged in Massive Twitter Hack, Bitcoin Theft

Social

Securityweek

1.8.20

17-Year-Old 'Mastermind', 2 Others Behind the Biggest Twitter Hack Arrested

Social

Thehackernews