Date | Name | Category | Web |
31.8.20 | Microsoft tests fix for bug that defrags SSD drives too often | OS | Bleepingcomputer |
31.8.20 | US govt warns of North Korean hackers targeting banks worldwide | BigBrothers | Bleepingcomputer |
31.8.20 | From zero to hero: Zero2Automated malware reverse engineering course | Virus | Bleepingcomputer |
31.8.20 | New Zealand stock exchange halted trading after DDoS attacks | Attack | Bleepingcomputer |
31.8.20 | SunCrypt Ransomware sheds light on the Maze ransomware cartel | Ransomware | Bleepingcomputer |
31.8.20 | With Empire gone, patrons eye other illegal darkweb markets | CyberCrime | Bleepingcomputer |
31.8.20 | Hackers for hire attack architecture firm via 3ds Max exploit | Exploit | Bleepingcomputer |
31.8.20 | Lazarus hackers target cryptocurrency orgs with fake job offers | APT | Bleepingcomputer |
31.8.20 | Chrome 85 released with security fixes, app shortcuts, AVIF support | Vulnerebility | Bleepingcomputer |
31.8.20 | Google Chrome is now faster, delivers 10% quicker page loads | IT | Bleepingcomputer |
31.8.20 | Ryuk successor Conti Ransomware releases data leak site | Ransomware | Bleepingcomputer |
31.8.20 | Firefox 80 released with new and faster extensions blocklist | Security | Bleepingcomputer |
31.8.20 | DarkSide Ransomware hits North American real estate developer | Ransomware | Bleepingcomputer |
31.8.20 | Office 365 adds transcription, voice commands in Word for the web | OS | Bleepingcomputer |
31.8.20 | Office 365 now opens attachments in a sandbox to prevent infections | OS | Bleepingcomputer |
31.8.20 | Microsoft 365 Admin Portal is down, Office 365 services also affected | OS | Bleepingcomputer |
31.8.20 | Google Chrome 85 fixes WebGL code execution vulnerability | Vulnerebility | Bleepingcomputer |
31.8.20 | Zoom went down and schools got a digital snow day | IT | Bleepingcomputer |
31.8.20 | Dark web market Empire down for days from DDoS attack | Attack | Bleepingcomputer |
31.8.20 | Iranian hackers attack exposed RDP servers to deploy Dharma ransomware | Ransomware | Bleepingcomputer |
31.8.20 | US DoJ wants the funds stored by North Korea in 280 BTC and ETH | BigBrothers | Securityaffairs |
31.8.20 | Emotet botnet has begun to use a new ‘Red Dawn’ template | BotNet Virus | Securityaffairs |
31.8.20 | Malicious npm package ‘fallguys’ removed from the official repository | Virus | Securityaffairs |
31.8.20 | | Virus | SANS |
31.8.20 | | Vulnerebility | Net-security |
31.8.20 | | Safety | Net-security |
31.8.20 | | Security | Net-security |
31.8.20 | | IoT | Net-security |
30.8.20 | Pandemic triggers most scams in recent history | Spam blog | Avast blog |
30.8.20 | DoppelPaymer: The latest ransomware innovation is all about distribution | Ransomware blog | Avast blog |
30.8.20 | Cetus: Cryptojacking Worm Targeting Docker Daemons | Cryptocurrency blog | Palo Alto Unity42 |
30.8.20 | The State of Exploit Development: 80% of Exploits Publish Faster than CVEs | Exploit blog | Palo Alto Unity42 |
30.8.20 | OPERATION BLACKOUT VIRTUAL EDITION: ELECTION SECURITY TABLETOPS | BigBrother blog | Cybereason |
30.8.20 | TIME FOR AN UPGRADE: HOW TO SWITCH FROM SYMANTEC TO CYBEREASON | Safety blog | Cybereason |
30.8.20 | How Credential Stuffing Bots Bypass Defenses | BotNet blog | F5 Labs |
30.8.20 | The New Kid On The Cyber Block: Data Manipulation | Cyber blog | F5 Labs |
30.8.20 | A Hands-On Introduction to Mandiant's Approach to OT Red Teaming | Security blog | FireEye |
30.8.20 | COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module | Security blog | FireEye |
30.8.20 | Emulation of Malicious Shellcode With Speakeasy | Malware blog | FireEye |
30.8.20 | Gozi: The Malware with a Thousand Faces | Malware blog | Checkpoint |
30.8.20 | An Old Bot’s Nasty New Tricks: Exploring Qbot’s Latest Attack Methods | Malware blog | Checkpoint |
30.8.20 | What to expect when you're electing: The building blocks of disinformation campaigns | Cyber blog | Cisco Talos |
30.8.20 | Vulnerability Spotlight: Remote code execution, privilege escalation bugs in Microsoft Azure Sphere | Vulnerebility blog | Cisco Talos |
30.8.20 | Vulnerability Spotlight: Use-after-free vulnerability in Google Chrome WebGL could lead to code execution | Vulnerebility blog | Cisco Talos |
30.8.20 | DDoS extortion campaign targets financial firms, retailers | Attack blog | Eset |
30.8.20 | New Chrome, Firefox versions fix security bugs, bring productivity features | Vulnerebility blog | Eset |
30.8.20 | FBI, CISA warn of spike in vishing attacks | BigBrother blog | Eset |
30.8.20 | Cyber attacks: Several Canadian government services disrupted | BigBrother blog | Eset |
30.8.20 | How to secure your TikTok account | Social blog | Eset |
30.8.20 | North Korea-linked APT group BeagleBoyz targets banks | APT | Securityaffairs |
30.8.20 | FBI warns of an increase in online romance scams | BigBrothers | Securityaffairs |
30.8.20 | Experts demonstrate the PIN is useless in EMV contactless transactions | Attack | Securityaffairs |
29.8.20 | | Attack | Threatpost |
29.8.20 | | Cryptocurrency | Threatpost |
29.8.20 | | Social | Threatpost |
29.8.20 | Former Cisco employee pleads guilty to hacking, damaging company systems | Hacking | Securityaffairs |
29.8.20 | Iran-linked Charming Kitten APT contacts targets via WhatsApp, LinkedIn | APT | Securityaffairs |
29.8.20 | Spooks Called in as Cyberattacks Again Halt NZ Stock Exchange | Attack | Securityweek |
29.8.20 | Researchers Analyze Traffic Statistics of Popular Cybercrime Forums | CyberCrime | Securityweek |
29.8.20 | New Attacks Allow Bypassing EMV Card PIN Verification | Attack | Securityweek |
28.8.20 | Elon Musk confirms that Russian hackers tried to recruit Tesla employee to plant a malware | BigBrothers | Securityaffairs |
28.8.20 | Lemon_Duck cryptomining malware evolves to target Linux devices | Cryptocurrency | Securityaffairs |
28.8.20 | Cisco addresses ten high-risk issues in NX-OS software | Hacking | Securityaffairs |
28.8.20 | Former Employee Admits Hacking, Damaging Cisco Systems | Hacking | Securityweek |
28.8.20 | Justice Dept: North Korean Hackers Stole Virtual Currency | BigBrothers | Securityweek |
28.8.20 | Iranian Hackers Target Academic Researcher via WhatsApp, LinkedIn | BigBrothers | Securityweek |
28.8.20 | North Korean Hackers Are Back at Targeting Banks | BigBrothers | Securityweek |
28.8.20 | Walmart Says Teaming With Microsoft in Bid for TikTok | Social | Securityweek |
28.8.20 | Elon Musk Confirms Russian Hackers Attempted to Recruit Tesla Employee | BigBrothers | Securityweek |
28.8.20 | Iranian Hackers Pose as Journalists to Trick Victims Into Installing Malware | BigBrothers | Thehackernews |
28.8.20 | | Virus | SANS |
28.8.20 | | CyberCrime | Threatpost |
28.8.20 | | Spam Virus | Threatpost |
28.8.20 | | Hacking | Threatpost |
28.8.20 | | Incindent | Threatpost |
28.8.20 | | Apple Social | Threatpost |
28.8.20 | Group with numerous faces: chronicle of UltraRank’s deceptive JS-sniffer campaigns | Hacking | Securityaffairs |
28.8.20 | Experts hacked 28,000 unsecured printers to raise awareness of printer security issues | Hacking | Securityaffairs |
28.8.20 | 350 million decrypted email addresses left exposed on an unsecured server | Incindent | Securityaffairs |
28.8.20 | Anubis, a new info-stealing malware spreads in the wild | Virus | Securityaffairs |
28.8.20 | REvil ransomware operators breached healthcare org Valley Health Systems | Ransomware | Securityaffairs |
28.8.20 | Cisco Patches High-Severity Vulnerabilities in NX-OS Software | Vulnerebility | Securityweek |
28.8.20 | Researchers Hijack 28,000 Printers to Show How Easily They Can Be Hacked | Hacking | Securityweek |
28.8.20 | Fastly to Acquire Web Application Security Firm Signal Sciences for $775 Million | IT | Securityweek |
28.8.20 | Microsoft Warns of New 'Anubis' Info-Stealer Distributed in the Wild | Virus | Securityweek |
28.8.20 | | Vulnerebility | Net-security |
28.8.20 | | Security | Net-security |
28.8.20 | | CyberCrime | Net-security |
28.8.20 | | IT | Net-security |
28.8.20 | | Security | Net-security |
27 .8.20 | New Zealand stock exchange (NZX) halted 2 days by DDoS attack | Attack | Securityaffairs |
27 .8.20 | Microsoft fixes code execution, privilege escalation in Microsoft Azure Sphere | Vulnerebility | Securityaffairs |
27 .8.20 | Vulnerabilities Expose Popular DVB-T2 Set-Top Boxes to Botnets: Researchers | BotNet Vulnerebility | Securityweek |
27 .8.20 | Cyber Attack Halts New Zealand Stock Market for Third Straight Day | BigBrothers | Securityweek |
27 .8.20 | UltraRank Group Stole Card Data From Hundreds of Sites Using JS Sniffers | CyberCrime | Securityweek |
27 .8.20 | Google Location-Tracking Tactics Troubled Its Own Engineers | Hacking | Securityweek |
27 .8.20 | QakBot Banking Trojan Returned With New Sneaky Tricks to Steal Your Money | Virus | Thehackernews |
27 .8.20 | | BigBrothers | Threatpost |
27 .8.20 | | Vulnerebility | Threatpost |
27 .8.20 | | Attack | Threatpost |
27 .8.20 | FBI arrested a Russian national for recruiting employee of US firm to plant malware | BigBrothers | Securityaffairs |
27 .8.20 | Hackers for hire group target organizations via 3ds Max exploit | Exploit | Securityaffairs |
27 .8.20 | Facebook: Apple Privacy Changes Will Muck Up Online Ads | Social | Securityweek |
27 .8.20 | Ghanaian Extradited to U.S. for Cybercrimes That Caused Millions in Losses | BigBrothers | Securityweek |
27 .8.20 | GrammaTech Releases Open Source API Security Tool | Security | Securityweek |
27 .8.20 | Secretive Palantir Lifts Veil Before Wall Street Stock Sale | Cyber | Securityweek |
27 .8.20 | Chrome 85 Released With 20 Security Fixes | Security | Securityweek |
27 .8.20 | Mercenary Cyberspies Used Autodesk 3ds Max Exploits in Attacks | Attack Exploit | Securityweek |
27 .8.20 | Russian Arrested for Recruiting Employee of U.S. Company to Plant Malware | BigBrothers | Securityweek |
27 .8.20 | Participant in Phony Tech Support Scheme Pleads Guilty | Mobil | Securityweek |
27 .8.20 | Malware Detection Company AffirmLogic Raises $25 Million | IT | Securityweek |
27 .8.20 | Russian Arrested After Offering $1 Million to U.S. Company Employee for Planting Malware | BigBrothers | Thehackernews |
27 .8.20 | AA20-239A : FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks | CERT | CERT |
27 .8.20 | | Security | SANS |
27 .8.20 | | Safety | Net-security |
27 .8.20 | | Security | Net-security |
27 .8.20 | | Privacy | Net-security |
27 .8.20 | | Security | Net-security |
27 .8.20 | | Security | Net-security |
27 .8.20 | | Security | Net-security |
27 .8.20 | | Security | Net-security |
26.8.20 | | Apple | Threatpost |
26.8.20 | | BigBrothers | Threatpost |
26.8.20 | | APT | Threatpost |
26.8.20 | | IoT | Threatpost |
26.8.20 | Transparent Tribe: Evolution analysis, part 2 | APT | Securelist |
26.8.20 | DeathStalker cyber-mercenary group targets the financial sector | Virus | Securityaffairs |
26.8.20 | Lazarus APT targets cryptocurrency organizations with using LinkedIn lures | APT | Securityaffairs |
26.8.20 | Expert discloses unpatched Safari flaw that allows stealing local files | Apple | Securityaffairs |
26.8.20 | Google Project Zero expert found 3 flaws in Apache Web Server | Vulnerebility | Securityaffairs |
26.8.20 | 'Add Photo' Feature on Turkey's Virus App Sparks Alarm | Virus | Securityweek |
26.8.20 | MITRE Introduces 'Shield' Defense Knowledge Base | Safety | Securityweek |
26.8.20 | CISA Details Strategy for Secure 5G Deployment | Safety | Securityweek |
26.8.20 | Microsoft Announces Public Preview of Application Guard for Office | OS | Securityweek |
26.8.20 | Microsoft Patches Code Execution, Privilege Escalation Flaws in Azure Sphere | OS | Securityweek |
26.8.20 | SaaS Security Platform Provider ReliaQuest Raises $300 Million | IT | Securityweek |
26.8.20 | Unpatched Safari Vulnerability Allows Theft of Local Files | Apple | Securityweek |
26.8.20 | Military's Top Cyber Official Defends More Aggressive Stance | BigBrothers | Securityweek |
26.8.20 | Hack-for-Hire Group Targets Financial Sector Since 2012 | CyberCrime | Securityweek |
26.8.20 | APT Hackers Exploit Autodesk 3D Max Software for Industrial Espionage | APT | Thehackernews |
26.8.20 | Popular iOS SDK Caught Spying on Billions of Users and Committing Ad Fraud | Apple | Thehackernews |
26.8.20 | | Virus | SANS |
26.8.20 | | Privacy | Net-security |
26.8.20 | | Security | Net-security |
26.8.20 | | Security | Net-security |
26.8.20 | | CyberCrime | Net-security |
26.8.20 | | Cyber | Net-security |
26.8.20 | | Cryptocurrency | Net-security |
25.8.20 | Install Windows 10 updates manually with this open-source tool | OS | Bleepingcomputer |
25.8.20 | How to run Windows 10 programs in a WSL Linux shell | OS | Bleepingcomputer |
25.8.20 | Freepik data breach: Hackers stole 8.3M records via SQL injection | Incindent | Bleepingcomputer |
25.8.20 | US government warns remote workers of ongoing vishing campaign | BigBrothers | Bleepingcomputer |
25.8.20 | WordPress WooCommerce stores under attack, patch now | Attack Vulnerebility | Bleepingcomputer |
25.8.20 | Windows 10 Settings gets a modern Disk Management tool | OS | Bleepingcomputer |
25.8.20 | DarkSide: New targeted ransomware demands million dollar ransoms | Ransomware | Bleepingcomputer |
25.8.20 | US financial regulator warns of phishing sites impersonating brokers | Phishing | Bleepingcomputer |
25.8.20 | Community-provided Amazon Machine Images come with malware risk | Virus | Bleepingcomputer |
25.8.20 | Windows 10 2009 is almost here, released to enterprise for testing | OS | Bleepingcomputer |
25.8.20 | Malware can no longer disable Microsoft Defender via the Registry | Safety | Bleepingcomputer |
25.8.20 | University of Utah hit by ransomware, pays $457K ransom | Ransomware | Bleepingcomputer |
25.8.20 | WSL2 now rolling out to devices running Windows 10 1903 and 1909 | OS | Bleepingcomputer |
25.8.20 | Windows 10 KB4566116 update fixes crashing settings, unlock bug | OS | Bleepingcomputer |
25.8.20 | Microsoft enables TLS 1.3 by default in latest Windows 10 builds | OS | Bleepingcomputer |
25.8.20 | Windows 10 Updates Health Report - KB4566782 & KB4565351 | OS | Bleepingcomputer |
25.8.20 | Google fixes Gmail bug allowing attackers to send spoofed emails | Vulnerebility | Bleepingcomputer |
25.8.20 | MITRE shares this year's top 25 most dangerous software bugs | Vulnerebility | Bleepingcomputer |
25.8.20 | Memory leak in IBM DB2 gives access to sensitive data, causes DoS | Incindent | Bleepingcomputer |
25.8.20 | Gun exchange site confirms data breach after database posted online | Incindent | Bleepingcomputer |
25.8.20 | | OS | SANS |
25.8.20 | | Ransomware | Threatpost |
25.8.20 | | CyberCrime | Threatpost |
25.8.20 | | Vulnerebility | Threatpost |
25.8.20 | SourMint SDK used by 1200 iOS apps shows malicious behavior | Apple | Securityaffairs |
25.8.20 | Dark web Empire Market still down after 3 days. DDoS attack or exit scam? | CyberCrime | Securityaffairs |
25.8.20 | Canadian delivery company Canpar Express suffered a ransomware attack | Ransomware | Securityaffairs |
25.8.20 | Cybercriminal greeners from Iran attack companies worldwide for financial gain | CyberCrime | Securityaffairs |
25.8.20 | WordPress Sites Targeted via Vulnerabilities in WooCommerce Discounts Plugin | Vulnerebility | Securityweek |
25.8.20 | Palo Alto Networks to Acquire Incident Response Firm The Crypsis Group for $265 Million | IT | Securityweek |
25.8.20 | TikTok Sues Over Ban Ordered by Trump | BigBrothers | Securityweek |
25.8.20 | Malicious Behavior Found in Advertising SDK Used by 1,200 iOS Apps | Apple | Securityweek |
25.8.20 | CISA, FBI Alert Warns of Vishing Campaign | BigBrothers | Securityweek |
25.8.20 | Google Researcher Reported 3 Flaws in Apache Web Server Software | Vulnerebility | Thehackernews |
25.8.20 | | Ransomware | Net-security |
25.8.20 | | Security | Net-security |
25.8.20 | | Security | Net-security |
25.8.20 | | Attack | Net-security |
25.8.20 | | IoT | Net-security |
25.8.20 | | Apple | Net-security |
24.8.20 | Lifting the veil on DeathStalker, a mercenary triumvirate | APT | Securelist |
24.8.20 | Grandoreiro campaign impersonates Spanish Agencia Tributaria | BigBrothers | Securityaffairs |
24.8.20 | Freepik Discloses Data Breach Impacting 8.3 Million Users | Incindent | Securityweek |
24.8.20 | Barr 'Vehemently Opposed' to Pardoning Snowden | BigBrothers | Securityweek |
24.8.20 | Financially-Motivated Iranian Hackers Adopt Dharma Ransomware | Ransomware | Securityweek |
24.8.20 | | Virus | Net-security |
24.8.20 | Transparent Tribe APT hit 1000+ victims in 27 countries in the last 12 months | APT | Securityaffairs |
24.8.20 | A Google Drive weakness could allow attackers to serve malware | Virus | Securityaffairs |
24.8.20 | Adobe released open- source tool Stringlifier to identify randomly generated strings | Security | Securityaffairs |
24.8.20 | ATM vendors Diebold and NCR fixed deposit forgery bugs | Vulnerebility | Securityaffairs |
24.8.20 | | Virus | SANS |
24.8.20 | | Cyber | Net-security |
24.8.20 | | Security | Net-security |
24.8.20 | | Security | Net-security |
24.8.20 | | Security | Net-security |
23.8.20 | Microsoft issues out of band KB4578013 Windows security update | OS | Bleepingcomputer |
23.8.20 | Spotify hit with outage after forgetting to renew a certifficate | Security | Bleepingcomputer |
23.8.20 | Lucifer cryptomining DDoS malware now targets Linux systems | Cryptocurrency | Bleepingcomputer |
23.8.20 | US govt exposes new North Korean BLINDINGCAN backdoor malware | BigBrothers | Bleepingcomputer |
23.8.20 | Microsoft Teams users can't join meetings hosted in North America | Security | Bleepingcomputer |
23.8.20 | Tor Project shares proposals to limit DDoS impact on Onion sites | Safety | Bleepingcomputer |
23.8.20 | Researchers detail bug in wireless devices impacting critical sectors | ICS | Bleepingcomputer |
23.8.20 | FritzFrog malware attacks Linux servers over SSH to mine Monero | Cryptocurrency | Bleepingcomputer |
23.8.20 | Zoom web client outage prevents users from joining meetings | Security | Bleepingcomputer |
23.8.20 | Kali Linux gets a GUI desktop in Windows Subsystem for Linux | Safety | Bleepingcomputer |
23.8.20 | Microsoft Defender ATP adds new malicious behavior blocking feature | Safety | Bleepingcomputer |
23.8.20 | Kali Linux 2020.3 begins journey of replacing Bash with ZSH | Safety | Bleepingcomputer |
23.8.20 | Microsoft is killing off insecure Cloud App Security cipher suites | Security | Bleepingcomputer |
23.8.20 | Cryptojacking worm steals AWS credentials from Docker systems | Cryptocurrency | Bleepingcomputer |
23.8.20 | Duri campaign smuggles malware via HTML and JavaScript | Virus | Bleepingcomputer |
23.8.20 | Gym app management platform exposed info of thousands of users | Incindent | Bleepingcomputer |
23.8.20 | World's largest cruise line operator Carnival hit by ransomware | Ransomware | Bleepingcomputer |
23.8.20 | Windows Control Flow Guard support added to Rust, Clang compilers | Vulnerebility | Bleepingcomputer |
23.8.20 | Begin your journey to become a cybersecurity pro with this bundle | Cyber | Bleepingcomputer |
23.8.20 | Popular Notepad++ text editor banned in China | BigBrothers | Bleepingcomputer |
23.8.20 | | Security | SANS |
22.8.20 | Google Chrome will warn users when submitting insecure forms | Security | Bleepingcomputer |
22.8.20 | Microsoft announces plans to ditch legacy Edge in Windows 10 | OS | Bleepingcomputer |
22.8.20 | Microsoft fixes actively exploited Windows bug reported 2 years ago | OS | Bleepingcomputer |
22.8.20 | What's new in Windows 10 20H2, arriving later this year | OS | Bleepingcomputer |
22.8.20 | New Microsoft Edge features will save you money when shopping online | OS | Bleepingcomputer |
22.8.20 | Business technology giant Konica Minolta hit by new ransomware | Ransomware | Bleepingcomputer |
22.8.20 | Canada suffers cyberattack used to steal COVID-19 relief payments | BigBrothers | Bleepingcomputer |
22.8.20 | Windows 10 features that boost your computer's security | OS | Bleepingcomputer |
22.8.20 | U.S. spirits and wine giant hit by cyberattack, 1TB of data stolen | Incindent | Bleepingcomputer |
22.8.20 | SANS shares details on attack that led to their data breach | Incindent | Bleepingcomputer |
22.8.20 | How to install and update Fortnite on iOS after App Store ban | Apple | Bleepingcomputer |
22.8.20 | New Google Chrome feature makes it easier to browse privately | Security | Bleepingcomputer |
22.8.20 | Over 25% of all UK universities were attacked by ransomware | Ransomware | Bleepingcomputer |
22.8.20 | Emotet malware strikes U.S. businesses with COVID-19 spam | Virus | Bleepingcomputer |
22.8.20 | Windows Defender deletes Citrix components mislabeled as malware | Virus | Bleepingcomputer |
22.8.20 | Microsoft Edge Dev gets new security and privacy features | Security | Bleepingcomputer |
22.8.20 | Canon USA's stolen files leaked by Maze ransomware gang | Ransomware | Bleepingcomputer |
22.8.20 | Expired certificate led to an undercount of COVID-19 results | Security | Bleepingcomputer |
22.8.20 | Surface Duo: All the Specs, Features, Software, Price and Release Date | IT | Bleepingcomputer |
22.8.20 | NSA discloses new Russian-made Drovorub malware targeting Linux | BigBrothers Virus | Bleepingcomputer |
22.8.20 | Mekotio banking trojan imitates update alerts to steal Bitcoin | Virus | Bleepingcomputer |
22.8.20 | Stealthy RedCurl hackers steal corporate documents | Virus | Bleepingcomputer |
22.8.20 | CISA alerts of phishing attack targeting SBA loan relief accounts | Phishing | Bleepingcomputer |
22.8.20 | U.S. stock broker regulator FINRA warns of copycat phishing site | Phishing | Bleepingcomputer |
22.8.20 | Windows 10 Tips apps will soon show new features in an update | OS | Bleepingcomputer |
22.8.20 | Windows, IE11 zero-day vulnerabilities chained in targeted attack | OS | Bleepingcomputer |
22.8.20 | Windows 10 to give power users more control over their GPUs | OS | Bleepingcomputer |
22.8.20 | Dharma ransomware created a hacking toolkit to make cybercrime easy | Ransomware | Bleepingcomputer |
22.8.20 | SAP updates security note for critical RECON vulnerability | Vulnerebility | Bleepingcomputer |
22.8.20 | SANS infosec training org suffers data breach after phishing attack | Incindent | Bleepingcomputer |
22.8.20 | Thousands of WordPress WooCommerce stores potentially exposed to hack | Hacking | Securityaffairs |
22.8.20 | Popular Freepik site discloses data breach impacting 8.3M users | Incindent | Securityaffairs |
22.8.20 | A Google Drive 'Feature' Could Let Attackers Trick You Into Installing Malware | Attack Virus | Thehackernews |
22.8.20 | Ransom News | Ransom | Ransom |
22.8.20 | “Mailto” attacks could steal files | Hacking blog | Avast blog |
22.8.20 | Lessons learned from the ProctorU breach: Be transparent and timely | Incident blog | Avast blog |
22.8.20 | Wireshark Tutorial: Decrypting HTTPS Traffic | Security blog | Palo Alto Unity42 |
22.8.20 | CYBER SECURITY TIPS FOR ALLOWING EMPLOYEES TO WORK FROM HOME | Cyber blog | Cybereason |
22.8.20 | DEEPFAKES: NOVELTY TREND OR NOVEL THREAT? | Cyber blog | Cybereason |
22.8.20 | HACKER SUMMER CAMP IS CANCELLED, LONG LIVE VIRTUAL HACKER SUMMER CAMP | Cyber blog | Cybereason |
22.8.20 | OPERATION BLACKOUT VIRTUAL EDITION: ELECTION SECURITY TABLETOPS | Cyber blog | Cybereason |
22.8.20 | How I Designed an Open Source HTTPS Checker | Security blog | F5 Labs |
22.8.20 | The New Kid On The Cyber Block: Data Manipulation | Cyber blog | F5 Labs |
22.8.20 | Vulnerability Spotlight: Internet Systems Consortium BIND server DoS | Vulnerebility blog | Cisco Talos |
22.8.20 | Grandoreiro banking trojan impersonates Spain’s tax agency | Malware blog | Eset |
22.8.20 | How to prepare and protect your digital legacy | Safety blog | Eset |
22.8.20 | Ritz London clients scammed after apparent data breach | Incident blog | Eset |
22.8.20 | Attack of the Instagram clones | Social blog | Eset |
22.8.20 | | Incindent | Threatpost |
22.8.20 | | Virus | Threatpost |
22.8.20 | | Security | Threatpost |
22.8.20 | | Ransomware | Threatpost |
22.8.20 | Hackers are targeting teleworkers with vishing campaign, CISA and FBI warn | BigBrothers | Securityaffairs |
22.8.20 | Steel sheet giant Hoa Sen Group hacked by Maze ransomware operators | Ransomware | Securityaffairs |
22.8.20 | Mozilla offers rewards for Bypassing Firefox Exploit Mitigations | Exploit | Securityaffairs |
22.8.20 | ZDI Shares "Crazy" Stories on 15-Year Anniversary | IT | Securityweek |
22.8.20 | Microsoft Enables TLS 1.3 by Default in Windows 10 Insider Preview | OS | Securityweek |
21.8.20 | | Vulnerebility | Net-security |
21.8.20 | University of Utah pays a $457,000 ransom to ransomware gang | Ransomware | Securityaffairs |
21.8.20 | Microsoft Out-of-Band security patch fixes Windows privilege escalation flaws | OS | Securityaffairs |
21.8.20 | Adobe Open Sources Tool for Sanitizing Logs, Detecting Exposed Credentials | Safety | Securityweek |
21.8.20 | Mozilla Offering Rewards for Bypassing Firefox Exploit Mitigations | Exploit | Securityweek |
21.8.20 | Security of Post-Election Vote Count Top Worry: US Official | BigBrothers | Securityweek |
21.8.20 | University of Utah Pays $457,000 to Ransomware Operators | Ransomware | Securityweek |
21.8.20 | CERT/CC Warns of Vulnerabilities in Diebold Nixdorf, NCR ATMs | BigBrothers | Securityweek |
21.8.20 | Former Uber CSO Charged Over 2016 Data Breach Cover-Up | Incindent | Securityweek |
21.8.20 | Operation Transparent tribe | Operation | Operation |
21.8.20 | | BigBrothers | Threatpost |
21.8.20 | | BigBrothers CyberSpy | Threatpost |
21.8.20 | | Vulnerebility | Threatpost |
21.8.20 | | Vulnerebility | Threatpost |
21.8.20 | | Privacy | Threatpost |
21.8.20 | | Exploit | Threatpost |
21.8.20 | Google fixed email spoofing flaw 7 hours after public disclosure | Vulnerebility | Securityaffairs |
21.8.20 | Shared memory flaw in IBM Db2 can lead to Information Disclosure | Vulnerebility | Securityaffairs |
21.8.20 | CVE-2020-3446 default credentials bug exposes Cisco ENCS, CSP Appliances to hack | Vulnerebility | Securityaffairs |
21.8.20 | FritzFrog Botnet Uses Proprietary P2P Protocol | BotNet | Securityweek |
21.8.20 | Google Patches Email Spoofing Vulnerability After Public Disclosure | Vulnerebility | Securityweek |
21.8.20 | EU Regulators Wrangle Over Twitter Data Privacy Penalty | BigBrothers Privacy | Securityweek |
21.8.20 | Pentest-as-a-Service Company Cobalt Raises $29 Million | IT | Securityweek |
21.8.20 | Vulnerability in IBM Db2 Leads to Information Disclosure, Denial of Service | Vulnerebility | Securityweek |
21.8.20 | Former Uber Security Chief Charged Over Covering Up 2016 Data Breach | Incindent | Thehackernews |
21.8.20 | Hackers Target Defense Contractors' Employees By Posing as Recruiters | Hacking | Thehackernews |
21.8.20 | Experian South Africa Suffers Data Breach Affecting Millions; Attacker Identified | Incindent | Thehackernews |
21.8.20 | Microsoft Issues Emergency Security Updates for Windows 8.1 and Server 2012 R2 | OS | Thehackernews |
21.8.20 | Diebold Nixdorf ProCash 2100xe USB ATM does not adequately secure communications between CCDM and host | Alert | Alert |
21.8.20 | NCR SelfServ ATM BNA contains multiple vulnerabilities | Alert | Alert |
21.8.20 | NCR SelfServ ATM dispenser software contains multiple vulnerabilities | Alert | Alert |
21.8.20 | | Spam | Net-security |
21.8.20 | | Mobil | Net-security |
21.8.20 | | Security | Net-security |
21.8.20 | | Security | Net-security |
20.8.20 | Transparent Tribe: Evolution analysis,part 1 | APT | Securelist |
20.8.20 | Experian South Africa discloses data breach, 24 million customers impacted | Incindent | Securityaffairs |
20.8.20 | U.S. Details North Korean Malware Used in Attacks on Defense Organizations | BigBrothers | Securityweek |
20.8.20 | Default Credentials Expose Cisco ENCS, CSP Appliances to Attacks | Attack | Securityweek |
20.8.20 | Out-of-Band Update Patches Privilege Escalation Flaws in Windows 8.1, Server 2012 | Vulnerebility | Securityweek |
20.8.20 | Experts Reported Security Bug in IBM's Db2 Data Management Software | Vulnerebility | Thehackernews |
20.8.20 | | Security | SANS |
20.8.20 | | IT | Threatpost |
20.8.20 | | Spam | Threatpost |
20.8.20 | | IoT | Threatpost |
20.8.20 | | Cryptocurrency | Threatpost |
20.8.20 | CISA’s MAR warns of North Korean BLINDINGCAN RAT | Virus | Securityaffairs |
20.8.20 | Over 6,000 email accounts belonging to Taiwan government agencies hacked by Chinese hacked | BigBrothers | Securityaffairs |
20.8.20 | FritzFrog cryptocurrency P2P botnet targets Linux servers over SSH | Cryptocurrency | Securityaffairs |
20.8.20 | Crypto-Mining Worm Targets AWS Credentials | Cryptocurrency | Securityweek |
20.8.20 | Over 70% of ICS Vulnerabilities Disclosed in First Half of 2020 Remotely Exploitable | ICS | Securityweek |
20.8.20 | Academics Devise Attacks Targeting Email End-to-End Encryption | Attack | Securityweek |
20.8.20 | Vulnerability in Thales Product Could Expose Millions of IoT Devices to Attacks | IoT | Securityweek |
20.8.20 | Thousands of Taiwan Government Email Accounts 'Hacked by China' | BigBrothers | Securityweek |
20.8.20 | The Promise and Threat of Quantum Computing | Security | Securityweek |
20.8.20 | Ongoing Campaign Uses HTML Smuggling for Malware Delivery | Virus | Securityweek |
20.8.20 | | IoT | Net-security |
20.8.20 | | Security | Net-security |
20.8.20 | | Security | Net-security |
20.8.20 | | ICS | Net-security |
20.8.20 | | Security | Net-security |
20.8.20 | | Security | Net-security |
19.8.20 | | Cryptocurrency | Net-security |
19.8.20 | | Virus | Threatpost |
19.8.20 | | Virus | Threatpost |
19.8.20 | | Vulnerebility | Threatpost |
19.8.20 | | Cryptocurrency | Threatpost |
19.8.20 | Actively exploited CVE-2020-1464 Windows Spoofing flaw was known since 2018 | Exploit | Securityaffairs |
19.8.20 | A flaw in Concrete5 CMS could have allowed website takeover | Vulnerebility | Securityaffairs |
19.8.20 | Critical flaw in Jenkins Server can cause information disclosure | Vulnerebility | Securityaffairs |
19.8.20 | Ukraine police and Binance dismantled a cyber gang behind $42M money laundering | Cryptocurrency | Securityaffairs |
19.8.20 | New Microsoft Defender ATP Capability Blocks Malicious Behaviors | Virus | Securityweek |
19.8.20 | Carnival Corp. Hacked; Guest and Worker Information Accessed | BigBrothers | Securityweek |
19.8.20 | Senate: WikiLeaks Knowingly Assisted Russian Influence Effort Before 2016 Election | BigBrothers | Securityweek |
19.8.20 | China Slams US 'Abuse' Over New Huawei Sanctions | BigBrothers | Securityweek |
19.8.20 | TikTok Ramps Up Defense Against US Accusations | BigBrothers | Securityweek |
19.8.20 | Vulnerability Allowing Full Server Takeover Found in Concrete5 CMS | Vulnerebility | Securityweek |
19.8.20 | Password Management Company Keeper Security Raises $60 Million | IT | Securityweek |
19.8.20 | Anti-Fraud Platform Provider SpyCloud Raises $30 Million | IT | Securityweek |
19.8.20 | A New Fileless P2P Botnet Malware Targeting SSH Servers Worldwide | BotNet | Thehackernews |
19.8.20 | | BotNet | SANS |
19.8.20 | | OS | Net-security |
19.8.20 | | Security | Net-security |
19.8.20 | | Security | Net-security |
19.8.20 | | Security | Net-security |
19.8.20 | | Security | Net-security |
19.8.20 | | IT | Net-security |
18.8.20 | Cruise line operator Carnival Corporation suffers a ransomware attack | Ransomware | Securityaffairs |
18.8.20 | U.S. Army Report Describes North Korea's Cyber Warfare Capabilities | BigBrothers | Securityweek |
18.8.20 | Chrome 86 to Alert Users of Insecure Forms | Security | Securityweek |
18.8.20 | DDoS Extorters Claim to Be Armada Collective, Fancy Bear | Attack | Securityweek |
18.8.20 | Critical Jenkins Server Vulnerability Could Leak Sensitive Information | Vulnerebility | Thehackernews |
18.8.20 | | Attack | SANS |
18.8.20 | | Cryptocurrency | Net-security |
18.8.20 | | Security | Net-security |
18.8.20 | Network intruders selling access to high-value companies | Security | Bleepingcomputer |
18.8.20 | Microsoft August 2020 Patch Tuesday fixes 2 zero-days, 120 flaws | OS | Bleepingcomputer |
18.8.20 | Windows 10 Cumulative Updates KB4566782 & KB4565351 Released | OS | Bleepingcomputer |
18.8.20 | Colorado city forced to pay $45,000 ransom to decrypt files | Ransomware | Bleepingcomputer |
18.8.20 | Adobe fixes critical code execution bugs in Acrobat and Reader | Vulnerebility | Bleepingcomputer |
18.8.20 | Citrix fixes critical bugs allowing takeover of XenMobile Servers | Vulnerebility | Bleepingcomputer |
18.8.20 | Twitter experiencing issues sending account verification codes | Social | Bleepingcomputer |
18.8.20 | vBulletin fixes ridiculously easy to exploit zero-day RCE bug | Vulnerebility | Bleepingcomputer |
18.8.20 | Upgraded Agent Tesla malware steals passwords from browsers, VPNs | Virus | Bleepingcomputer |
18.8.20 | Michigan State University discloses credit card theft incident | Incindent | Bleepingcomputer |
18.8.20 | Avaddon ransomware launches data leak site to extort victims | Ransomware | Bleepingcomputer |
18.8.20 | Office 365 will let you manage phishing simulation emails | Phishing | Bleepingcomputer |
18.8.20 | Hacked government, college sites push malware via fake hacking tools | BigBrothers | Bleepingcomputer |
18.8.20 | ProctorU confirms data breach after database leaked online | Incindent | Bleepingcomputer |
18.8.20 | How to restore Windows Photo Viewer in Windows 10 | OS | Bleepingcomputer |
18.8.20 | Useful Registry hacks to optimize your Windows 10 experience | OS | Bleepingcomputer |
18.8.20 | Bugs in HDL Automation expose IoT devices to remote hijacking | IoT | Bleepingcomputer |
18.8.20 | Samsung rolls out Android updates fixing critical vulnerabilities | Android | Bleepingcomputer |
18.8.20 | Fake security advisory used in clever cPanel phishing attack | Phishing | Bleepingcomputer |
18.8.20 | FBI: Iranian hackers trying to exploit critical F5 BIG-IP flaw | BigBrothers | Bleepingcomputer |
18.8.20 | | Hacking | Threatpost |
18.8.20 | | BigBrothers | Threatpost |
18.8.20 | | Exploit | Threatpost |
18.8.20 | TeamTNT is the first cryptomining bot that steals AWS credentials | Cryptocurrency | Securityaffairs |
18.8.20 | CISA warns of phishing attacks delivering KONNI RAT | Virus | Securityaffairs |
18.8.20 | Thousands of Canadian government accounts hacked, Treasury Board of Canada Secretariat say | BigBrothers | Securityaffairs |
18.8.20 | Multiple Uninstallers Released for China-Linked 'GoldenSpy' Malware | APT | Securityweek |
18.8.20 | Actively Exploited Windows Spoofing Flaw Patched Two Years After Disclosure | Exploit Vulnerebility | Securityweek |
18.8.20 | Radiflow Launches Industrial Risk Analysis Platform | IT | Securityweek |
18.8.20 | SANS Institute Says Multiple Employees Targeted in Recent Attack | Attack | Securityweek |
18.8.20 | US Adds Sanctions on China's Huawei to Limit Technology Access | BigBrothers | Securityweek |
18.8.20 | | Security | SANS |
18.8.20 | | Security | Net-security |
18.8.20 | | Security | Net-security |
18.8.20 | | Security | Net-security |
18.8.20 | | Incindent | Net-security |
18.8.20 | | Security | Net-security |
18.8.20 | | Vulnerebility | Net-security |
17.8.20 | US shares info on election interference tied to Russia, China, Iran | BigBrothers | Bleepingcomputer |
17.8.20 | Reddit hit by coordinated hack promoting Trump's reelection | Hacking | Bleepingcomputer |
17.8.20 | CCleaner fixes bug that wipes Firefox extension settings | Vulnerebility | Bleepingcomputer |
17.8.20 | TeamViewer fixes bug that lets attackers access your PC | Vulnerebility | Bleepingcomputer |
17.8.20 | Chromium browser sneaked through review, released on Microsoft Store | OS | Bleepingcomputer |
17.8.20 | Intel leak: 20GB of source code, internal docs from alleged breach | Incindent | Bleepingcomputer |
17.8.20 | Nearly 50% of all smartphones affected by Qualcomm Snapdragon bugs | Vulnerebility | Bleepingcomputer |
17.8.20 | KrØØk attack variants impact Qualcomm, MediaTek Wi-Fi chips | Attack | Bleepingcomputer |
17.8.20 | Canon confirms ransomware attack in internal memo | Ransomware | Bleepingcomputer |
17.8.20 | Unpatched bug in Windows print spooler lets malware run as admin | OS | Bleepingcomputer |
17.8.20 | Hackers abuse lookalike domains and favicons for credit card theft | Hacking | Bleepingcomputer |
17.8.20 | Technology giant Konica Minolta hit by a ransomware attack | Ransomware | Securityaffairs |
17.8.20 | CISA Warns of Phishing Emails Delivering KONNI Malware | Virus | Securityweek |
17.8.20 | 'Vaccine' Kept Emotet Infections Away for Six Months | Virus | Securityweek |
17.8.20 | Researchers Exploited A Bug in Emotet to Stop the Spread of Malware | Virus | Thehackernews |
17.8.20 | How AppTrana Managed Cloud WAF Tackles Evolving Attacking Techniques | Attack | Thehackernews |
17.8.20 | The Australian government wants to respond to attacks on critical infrastructure | BigBrothers | Securityaffairs |
17.8.20 | Ritz hotel diners were victims of a sophisticated scam | Spam | Securityaffairs |
17.8.20 | Texas man sentenced to 57 months for the hacking of a major tech firm in New York | Crime | Securityaffairs |
17.8.20 | Thousands of Canadian Government Accounts Hacked | BigBrothers | Securityweek |
17.8.20 | | Security | Net-security |
17.8.20 | | Privacy | Net-security |
17.8.20 | | Security | Net-security |
17.8.20 | | Incindent | Net-security |
17.8.20 | | Security | Net-security |
16.8.20 | Google banned 2500+ Chinese YouTube channels for disinformation | BigBrothers | Bleepingcomputer |
16.8.20 | Office 365 services will drop support for older Office clients | OS | Bleepingcomputer |
16.8.20 | Google Home erroneous update reveals the $450 million ADT deal | Security | Bleepingcomputer |
16.8.20 | Microsoft now lets you run Android apps in Windows 10 | OS | Bleepingcomputer |
16.8.20 | Microsoft fixes 'No Internet' bug in latest Windows 10 Dev build | OS | Bleepingcomputer |
16.8.20 | ProtonVPN: US servers overloaded in warzone for Call of Duty updates | IT | Bleepingcomputer |
16.8.20 | Microsoft adds Windows 10 DNS over HTTPS settings section | OS | Bleepingcomputer |
16.8.20 | Microsoft releases Windows 10 Version 2004 security baseline | OS | Bleepingcomputer |
16.8.20 | Google to pay $7.5M in class action settlement. That's $5 a victim. | IT | Bleepingcomputer |
16.8.20 | Twitter for Android vulnerability gave access to direct messages | Android | Bleepingcomputer |
16.8.20 | Hackers can abuse Microsoft Teams updater to install malware | Virus | Bleepingcomputer |
16.8.20 | Facebook plugin bug lets hackers hijack WordPress sites’ chat | Social | Bleepingcomputer |
16.8.20 | FBI: Networks exposed to attacks due to Windows 7 end of life | BigBrothers | Bleepingcomputer |
16.8.20 | Suspicious Canon outage leads to image.canon data loss | Incindent | Bleepingcomputer |
16.8.20 | NSA offers advice on how to reduce location tracking risks | BigBrothers | Bleepingcomputer |
16.8.20 | Vulnerable perimeter devices: a huge attack surface | Attack | Bleepingcomputer |
16.8.20 | Microsoft paid almost $14M in bounties over the last 12 months | Security | Bleepingcomputer |
16.8.20 | NodeJS module downloaded 7M times lets hackers inject code | Virus | Bleepingcomputer |
16.8.20 | Interpol: Lockbit ransomware attacks affecting American SMBs | Ransomware | Bleepingcomputer |
16.8.20 | WastedLocker ransomware abuses Windows feature to evade detection | Ransomware | Bleepingcomputer |
16.8.20 | Windows 10: HOSTS file blocking telemetry is now flagged as a risk | OS | Bleepingcomputer |
16.8.20 | Newsletter plugin bugs let hackers inject backdoors on 300K sites | Virus | Bleepingcomputer |
16.8.20 | | Virus | SANS |
16.8.20 | Ransom News | Ransom | Ransom |
16.8.20 | Sodinokibi ransomware gang stole 1TB of data from Brown-Forman | Ransomware | Securityaffairs |
16.8.20 | Emotet malware employed in fresh COVID19-themed spam campaign | Virus | Securityaffairs |
16.8.20 | PoC exploit code for two Apache Struts 2 flaws available online | Exploit | Securityaffairs |
16.8.20 | | Security | SANS |
15.8.20 | Scammers sell fake likes, views on Reels | Spam blog | Avast blog |
15.8.20 | An elections security progress report: Black Hat edition | Congress blog | Avast blog |
15.8.20 | Script-Based Malware: A New Attacker Trend on Internet Explorer | Malware blog | Palo Alto Unity42 |
15.8.20 | PROTECTING AGAINST POTENTIAL CYBERSECURITY THREATS BROUGHT ON BY REMOTE WORK | Safety blog | Cybereason |
15.8.20 | HACKER SUMMER CAMP IS CANCELLED, LONG LIVE VIRTUAL HACKER SUMMER CAMP | Congress blog | Cybereason |
15.8.20 | On Drovorub: Linux Kernel Security Best Practices | Security blog | Mcafee blog |
15.8.20 | Vulnerability Discovery in Open Source Libraries Part 1: Tools of the Trade | Vulnerebility blog | Mcafee blog |
15.8.20 | Digital Identity is an Increasingly Popular Attack Vector for Cybercriminals | Cyber blog | F5 Labs |
15.8.20 | Securing APIs: 10 Best Practices for Keeping Your Data and Infrastructure Safe | Security blog | F5 Labs |
15.8.20 | Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle Approach | Malware blog | FireEye |
15.8.20 | Repurposing Neural Networks to Generate Synthetic Media for Information Operations | Cyber blog | FireEye |
15.8.20 | COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module | Hacking blog | FireEye |
15.8.20 | Keeping the gate locked on your IoT devices: Vulnerabilities found on Amazon’s Alexa | IoT blog | Checkpoint |
15.8.20 | Don’t be silly – it’s only a lightbulb | Hacking blog | Checkpoint |
15.8.20 | MMS Exploit Part 5: Defeating Android ASLR, Getting RCE | Exploit blog | Project Zero |
15.8.20 | Attribution: A Puzzle | Vulnerebility blog | Cisco Talos |
15.8.20 | Microsoft Patch Tuesday for Aug. 2020 — Snort rules and prominent vulnerabilities | Vulnerebility blog | Cisco Talos |
15.8.20 | Barbervisor: Journey developing a snapshot fuzzer with Intel VT-x | Security blog | Cisco Talos |
15.8.20 | Google will test new feature in Chrome to curb phishing | Phishing blog | Eset |
15.8.20 | Mekotio: These aren’t the security updates you’re looking for… | Security blog | Eset |
15.8.20 | What is the cost of a data breach? | Incident blog | Eset |
15.8.20 | Twitter working to fix issue with 2FA feature | Social blog | Eset |
15.8.20 | Black Hat 2020: Fixing voting issues – boiling the ocean? | Congress blog | Eset |
15.8.20 | | Apple | Threatpost |
15.8.20 | | Privacy Social | Threatpost |
15.8.20 | | Exploit | Threatpost |
15.8.20 | | Vulnerebility | Threatpost |
15.8.20 | | Ransomware | Threatpost |
15.8.20 | XCSSET Mac spyware spreads via Xcode Projects | Apple | Securityaffairs |
15.8.20 | North Korea’s Lazarus compromised dozens of organizations in Israel | APT | Securityaffairs |
15.8.20 | Threat Report Portugal: Q2 2020 | Security | Securityaffairs |
15.8.20 | Texas Man Sentenced to 57 Months in Prison for Hacking Major Tech Firm | Crime | Securityweek |
15.8.20 | Maryland Officials Warn Gun Dealers About Phishing Scams | Phishing | Securityweek |
15.8.20 | Adaptive Shield Emerges From Stealth to Secure SaaS Applications | Safety | Securityweek |
15.8.20 | Amazon Alexa Vulnerabilities Could Have Exposed User Data | Vulnerebility | Securityweek |
15.8.20 | XCSSET Mac Malware Steals Information, Spreads via Xcode Projects | Apple | Securityweek |
14.8.20 | Maze ransomware gang leaked Canon USA’s stolen files | Ransomware | Securityaffairs |
14.8.20 | Chinese APT CactusPete targets military and financial orgs in Eastern Europe | APT | Securityaffairs |
14.8.20 | Facebook, Google Step Up Election Protection Efforts | Social | Securityweek |
14.8.20 | Windows Defender Detected Citrix Services as Malware | Virus | Securityweek |
14.8.20 | UK Cybersecurity Firm Says North Korean Attacks on Israel Successful | BigBrothers | Securityweek |
14.8.20 | New Trials in England for Troubled Virus Tracing App | Virus | Securityweek |
14.8.20 | FBI, NSA Share Details on New 'Drovorub' Linux Malware Used by Russia | BigBrothers | Securityweek |
14.8.20 | | Virus | SANS |
14.8.20 | | Vulnerebility | Threatpost |
14.8.20 | | Attack Privacy | Threatpost |
14.8.20 | | Attack | Threatpost |
14.8.20 | | BigBrothers | Threatpost |
14.8.20 | | APT | Threatpost |
14.8.20 | | Safety | Threatpost |
14.8.20 | Threat actor leaked data for U.S. gun exchange site on hacking forum | Hacking | Securityaffairs |
14.8.20 | FBI and NSA joint report details APT28’s Linux malware Drovorub | APT | Securityaffairs |
14.8.20 | Microsoft failed to fix LSASS elevation of privilege flaw | Vulnerebility | Securityaffairs |
14.8.20 | Google to Run Experiment in Fight Against URL Spoofing in Chrome | Safety | Securityweek |
14.8.20 | China-Linked 'CactusPete' Hackers Successful Despite Lack of Sophistication | APT | Securityweek |
14.8.20 | Corporate Espionage Group 'RedCurl' Launching Targeted Attacks Since 2018 | CyberSpy | Securityweek |
14.8.20 | | Cyber | Net-security |
14.8.20 | | Cyber | Net-security |
14.8.20 | | Cyber | Net-security |
14.8.20 | | Cyber | Net-security |
14.8.20 | | Cyber | Net-security |
13.8.20 | CactusPete APT group’s updated Bisonal backdoor | APT | Securelist |
13.8.20 | Corporate Espionage Group 'RedCurl' Targeted at Least 14 Organizations | CyberSpy | Securityweek |
13.8.20 | Potentially Serious Vulnerability Found in Popular WYSIWYG Editor TinyMCE | Vulnerebility | Securityweek |
13.8.20 | FireEye Launches Public Bug Bounty Program on Bugcrowd | Security | Securityweek |
13.8.20 | Microsoft's Patch for LSASS Flaw Incomplete, Google Researcher Says | Vulnerebility | Securityweek |
13.8.20 | New Attack Lets Hackers Decrypt VoLTE Encryption to Spy on Phone Calls | Attack | Thehackernews |
13.8.20 | Amazon Alexa Bugs Allowed Hackers to Install Malicious Skills Remotely | Vulnerebility | Thehackernews |
13.8.20 | AA20-225A : Malicious Cyber Actor Spoofing COVID-19 Loan Relief Webpage via Phishing Emails | CERT | CERT |
13.8.20 | | Vulnerebility | Threatpost |
13.8.20 | | Social | Threatpost |
13.8.20 | Rent a hacker: Group-IB uncovers corporate espionage group RedCurl | CyberSpy | Securityaffairs |
13.8.20 | Israel announced to have foiled an attempted cyber-attack on defence firms | BigBrothers | Securityaffairs |
13.8.20 | Threat actors managed to control 23% of Tor Exit nodes | Hacking | Securityaffairs |
13.8.20 | SANS Institute Email Breach – 28,000 User Records exposed | Incindent | Securityaffairs |
13.8.20 | Agent Tesla includes new password-stealing capabilities from browsers and VPNs | Virus | Securityaffairs |
13.8.20 | SASE Provider Perimeter 81 Raises $40 Million | IT | Securityweek |
13.8.20 | Israel Says Foiled Cyber Attack on Its Defence Firms | BigBrothers | Securityweek |
13.8.20 | SecurityWeek to Host Virtual Cloud Security Summit on August 13, 2020 | Congress | Securityweek |
13.8.20 | Hackers Breach Customer Data at Michigan State Online Store | Incindent | Securityweek |
13.8.20 | Windows and IE Zero-Day Vulnerabilities Chained in 'PowerFall' Attacks | Attack | Securityweek |
13.8.20 | ICS Cyber Security Conference Call for Presentations Extended to August 31, 2020 | ICS | Securityweek |
13.8.20 | | Virus | SANS |
13.8.20 | | Attack | Net-security |
13.8.20 | | Cyber | Net-security |
13.8.20 | | Cyber | Net-security |
13.8.20 | | Security | Net-security |
13.8.20 | | Vulnerebility | Net-security |
12.8.20 | Internet Explorer and Windows zero-day exploits used in Operation PowerFall | Exploit | Securelist |
12.8.20 | City of Lafayette (Colorado) paid $45,000 ransom after ransowmare attack | Ransomware | Securityaffairs |
12.8.20 | Google Awards $10,000 for Remote Code Execution Vulnerability in Chrome | Vulnerebility | Securityweek |
12.8.20 | Mozilla Cybersecurity Staff Hit by Layoffs | Cyber | Securityweek |
12.8.20 | SANS Institute Says 28,000 User Records Exposed in Email Breach | Incindent | Securityweek |
12.8.20 | SAP Releases August 2020 Security Updates | Vulnerebility | Securityweek |
12.8.20 | Intel Patches Many Privilege Escalation Vulnerabilities in Server Boards | Vulnerebility | Securityweek |
12.8.20 | Microsoft Reveals New Innocent Ways Windows Users Can Get Hacked | Hacking | Thehackernews |
12.8.20 | Flaws in Samsung Phones Exposed Android Users to Remote Attacks | Android | Thehackernews |
12.8.20 | Critical Adobe Acrobat and Reader Bugs Allow RCE | Vulnerebility | Threatpost |
12.8.20 | Two 0-Days Under Active Attack, Among 120 Bugs Patched by Microsoft | OS | Threatpost |
12.8.20 | Researcher Publishes Patch Bypass for vBulletin 0-Day | Exploit | Threatpost |
12.8.20 | Cybersecurity Skills Gap Worsens, Fueled by Lack of Career Development | Cyber | Threatpost |
12.8.20 | Agent Tesla Spyware Adds Fresh Tricks to Its Arsenal | Virus | Threatpost |
12.8.20 | Critical Intel Flaw Afflicts Several Motherboards, Server Systems, Compute Modules | Vulnerebility | Threatpost |
12.8.20 | Samsung Quietly Fixes Critical Galaxy Flaws Allowing Spying, Data Wiping | Vulnerebility | Threatpost |
12.8.20 | Citrix fixed flaws in XenMobile that will be likely exploited soon | Vulnerebility | Securityaffairs |
12.8.20 | Microsoft August 2020 Patch Tuesday fixed actively exploited zero-days | Vulnerebility | Securityaffairs |
12.8.20 | Adobe Acrobat and Reader affected by critical flaws | Vulnerebility | Securityaffairs |
12.8.20 | Flaws in ‘Find My Mobile’ exposed Samsung phones to hack | Vulnerebility | Securityaffairs |
12.8.20 | Malicious Actor Controlled 23% of Tor Exit Nodes | Virus | Securityweek |
12.8.20 | PepsiCo CISO Joins FireEye Board | IT | Securityweek |
12.8.20 | Microsoft Patches Actively Exploited Windows, IE Vulnerabilities | Vulnerebility | Securityweek |
12.8.20 | Citrix Expects Hackers to Exploit Newly Patched XenMobile Vulnerabilities | Vulnerebility | Securityweek |
12.8.20 | Adobe Patches 11 Critical Vulnerabilities in Acrobat and Reader | Vulnerebility | Securityweek |
12.8.20 | vBulletin Patches Zero-Day Exploited in Attacks | Attack Exploit | Securityweek |
12.8.20 | HDL Smart Devices in Homes and Buildings Exposed to Hacker Attacks | Hacking | Securityweek |
12.8.20 | Critical Flaws Affect Citrix Endpoint Management (XenMobile Servers) | Vulnerebility | Thehackernews |
12.8.20 | Google Chrome Bug Could Let Hackers Bypass CSP Protection; Update Web Browsers | Hacking | Thehackernews |
12.8.20 | | OS | SANS |
12.8.20 | | Privacy | Net-security |
12.8.20 | | Apple | Net-security |
12.8.20 | | Attack | Net-security |
12.8.20 | | Cyber | Net-security |
12.8.20 | | Cyber | Net-security |
12.8.20 | | OS | Net-security |
11.8.20 | Avaddon ransomware operators have launched their data leak site | Ransomware | Securityaffairs |
11.8.20 | Researcher discloses exploit code for a vBulletin zero-day | Vulnerebility | Securityaffairs |
11.8.20 | DEF CON 2020 Wrap-Up: Hacking Phones, Cars and Satellites | Congress | Securityweek |
11.8.20 | Data Security Company Symmetry Systems Emerges From Stealth | Security | Securityweek |
11.8.20 | A New vBulletin 0-Day RCE Vulnerability and Exploit Disclosed Publicly | Exploit | Thehackernews |
11.8.20 | | Exploit | Net-security |
11.8.20 | Google Chrome Browser Bug Exposes Billions of Users to Data Theft | Incindent | Threatpost |
11.8.20 | TeamViewer Flaw in Windows App Allows Password-Cracking | Vulnerebility | Threatpost |
11.8.20 | DDoS Attacks Cresting Amid Pandemic | Attack | Threatpost |
11.8.20 | Google Fixes Mysterious Audio Recording Blip in Smart Speakers | Vulnerebility | Threatpost |
11.8.20 | TeamViewer flaw can allow hackers to steal System password | Vulnerebility | Securityaffairs |
11.8.20 | Nefilim ransomware operators claim to have hacked the SPIE group | Ransomware | Securityaffairs |
11.8.20 | Facebook Open Sources Analysis Tool for Python Code | Social | Securityweek |
11.8.20 | 'Find My Mobile' Vulnerabilities Exposed Samsung Galaxy Phones to Attacks | Android | Securityweek |
11.8.20 | 'Have I Been Pwned' Code Base Going Open Source | Security | Securityweek |
11.8.20 | Vulnerabilities in Qualcomm Chips Expose Billions of Devices to Attacks | Vulnerebility | Securityweek |
11.8.20 | Trump Moves on China Apps May Create New Internet 'Firewall' | BigBrothers | Securityweek |
11.8.20 | | Cyber | Net-security |
11.8.20 | | Cyber | Net-security |
11.8.20 | | Cyber | Net-security |
10.8.20 | | Security | SANS |
10.8.20 | | Social | Net-security |
10.8.20 | | Vulnerebility | Net-security |
10.8.20 | DDoS attacks in Q2 2020 | Attack | Securelist |
10.8.20 | Black Hat Wrap-Up: IoT and Hardware Vulnerabilities Take the Spotlight | Congress | Securityweek |
10.8.20 | TikTok, WeChat Bans Not Crucial to US Security: Experts | BigBrothers | Securityweek |
10.8.20 | Accounts of Reddit Moderators Hijacked in Pro-Trump Hack | Hacking | Securityweek |
10.8.20 | Over 30 Vulnerabilities Discovered Across 20 CMS Products | Vulnerebility | Securityweek |
10.8.20 | TeamViewer Flaw Could Let Hackers Steal System Password Remotely | Vulnerebility | Thehackernews |
10.8.20 | Researcher Demonstrates Several Zoom Vulnerabilities at DEF CON 28 | Congress | Thehackernews |
10.8.20 | NCSC Director warns of interference on elections tied to Russia, China, Iran | BigBrothers | Securityaffairs |
10.8.20 | INTERNET BLOCKING IN MYANMAR – SECRET BLOCK LIST AND NO MEANS TO APPEAL | CyberCrime | Securityaffairs |
10.8.20 | Spying on satellite internet comms with a $300 listening station | CyberSpy | Securityaffairs |
10.8.20 | US OCC imposed an $80 Million fine to Capital One for 2019 hack | Incindent | Securityaffairs |
10.8.20 | UN Reports Sharp Increase in Cybercrime During Pandemic | BigBrothers | Securityweek |
10.8.20 | Newsletter plugin bugs let hackers inject backdoors on 300K sites | Virus | Bleepingcomputer |
10.8.20 | Zello resets all user passwords after data breach | Incindent | Bleepingcomputer |
10.8.20 | FBI sees surge in online shopping scams, FTC says most reports ever | BigBrothers | Bleepingcomputer |
10.8.20 | Netwalker ransomware earned $25 million in just five months | Ransomware | Bleepingcomputer |
10.8.20 | US govt exposes Chinese espionage malware secretly used since 2008 | BigBrothers | Bleepingcomputer |
10.8.20 | Hackers could have stolen PayPal funds from Meetup users | Incindent | Bleepingcomputer |
10.8.20 | Havenly discloses data breach after 1.3M accounts leaked online | Incindent | Bleepingcomputer |
10.8.20 | Confirmed: Garmin received decryptor for WastedLocker ransomware | Ransomware | Bleepingcomputer |
10.8.20 | How to fix Windows Update problems in Windows 10 | OS | Bleepingcomputer |
10.8.20 | How to use Windows 10 to see what's using the most disk space | OS | Bleepingcomputer |
10.8.20 | Three suspects charged for roles in Twitter hack, Bitcoin scam | Cryptocurrency Social | Bleepingcomputer |
10.8.20 | GandCrab ransomware operator arrested in Belarus | Ransomware | Bleepingcomputer |
10.8.20 | Microsoft PowerToys update fixes launcher, adds color picker | OS | Bleepingcomputer |
10.8.20 | US government sites abused to redirect users to porn sites | BigBrothers | Bleepingcomputer |
10.8.20 | Microsoft fixes Windows 10 2004 Bluetooth and Intel GPU issues | OS | Bleepingcomputer |
10.8.20 | Windows 10 2004 KB4568831 update released with printing fixes | OS | Bleepingcomputer |
10.8.20 | QNAP urges users to update Malware Remover after QSnatch alert | Virus | Bleepingcomputer |
10.8.20 | Bypassing Windows 10 UAC with mock folders and DLL hijacking | Hacking OS | Bleepingcomputer |
10.8.20 | Hackers stole Twitter employee credentials via phone phishing | Social | Bleepingcomputer |
10.8.20 | Canadian MSP discloses data breach, failed ransomware attack | Ransomware | Bleepingcomputer |
10.8.20 | Linux warning: TrickBot malware is now infecting your systems | Virus | Bleepingcomputer |
10.8.20 | KDE archive tool flaw let hackers take over Linux accounts | Vulnerebility | Bleepingcomputer |
10.8.20 | Office 365 phishing abuses Google Ads to bypass email filters | Phishing | Bleepingcomputer |
10.8.20 | EU sanctions Russian espionage unit, Chinese and North Korean firms | BigBrothers | Bleepingcomputer |
10.8.20 | Startups disclose data breaches after massive 386M records leak | Incindent | Bleepingcomputer |
10.8.20 | US defense contractors targeted by North Korean phishing attacks | BigBrothers Phishing | Bleepingcomputer |
10.8.20 | Firefox 79 released with new Lockwise password export feature | Security | Bleepingcomputer |
10.8.20 | Vermont Tax Department exposed 3 years worth of tax return info | Incindent | Bleepingcomputer |
10.8.20 | Sneaky Doki Linux malware infiltrates Docker cloud instances | Virus | Bleepingcomputer |
10.8.20 | Zoom bug allowed attackers to crack private meeting passwords | Attack | Bleepingcomputer |
10.8.20 | | Virus | SANS |
10.8.20 | | Security | Net-security |
10.8.20 | | Security | Net-security |
10.8.20 | | Security | Net-security |
10.8.20 | | Spam | Net-security |
10.8.20 | | Security | Net-security |
8.8.20 | Homoglyph attacks used in phishing campaign and Magecart attacks | CyberCrime Phishing | Securityaffairs |
8.8.20 | Microsoft now detects CCleaner as a Potentially Unwanted Application | Virus | Bleepingcomputer |
8.8.20 | BootHole GRUB bootloader bug lets hackers hide malware in Linux, Windows | Virus | Bleepingcomputer |
8.8.20 | Microsoft to remove all Windows downloads signed with SHA-1 | OS | Bleepingcomputer |
8.8.20 | FBI warns of Netwalker ransomware targeting US government and orgs | BigBrothers Ransomware | Bleepingcomputer |
8.8.20 | The IRS asks tax professionals to enable multi-factor authentication | Safety | Bleepingcomputer |
8.8.20 | Business giant Dussmann Group's data leaked after ransomware attack | Ransomware | Bleepingcomputer |
8.8.20 | Critical Wordpress plugin bug lets hackers take over hosting account | Vulnerebility | Bleepingcomputer |
8.8.20 | Emotet malware now steals your email attachments to attack contacts | Virus | Bleepingcomputer |
8.8.20 | Magento gets security updates for severe code execution bugs | Vulnerebility | Bleepingcomputer |
8.8.20 | North Korean hackers created VHD ransomware for enterprise attacks | BigBrothers Ransomware | Bleepingcomputer |
8.8.20 | Hacker leaks 386 million user records from 18 companies for free | Incindent | Bleepingcomputer |
8.8.20 | Industrial VPN vulnerabilities put critical infrastructure at risk | Vulnerebility | Bleepingcomputer |
8.8.20 | Netflix credential phishing hides behind working CAPTCHA | Phishing | Bleepingcomputer |
8.8.20 | Feature-rich Ensiko malware can encrypt, targets Windows, macOS, Linux | Virus | Bleepingcomputer |
8.8.20 | Promo.com discloses data breach after 22M user records leaked online | Incindent | Bleepingcomputer |
8.8.20 | Office 365 adds new features to help identify malicious spam | OS | Bleepingcomputer |
8.8.20 | Office 365 phishing baits employees with fake SharePoint alerts | OS | Bleepingcomputer |
8.8.20 | Windows 10 Desktop Windows Manager crashes due to DirectX bug | OS | Bleepingcomputer |
8.8.20 | Garmin confirms ransomware attack, services coming back online | Ransomware | Bleepingcomputer |
8.8.20 | UK and US warn QNAP owners to upgrade firmware to block malware | Virus | Bleepingcomputer |
8.8.20 | CheckMail7 | Anti-Ramson Tool | Anti-Ramson Tool |
8.8.20 | Ransom News | Ransom | Ransom |
8.8.20 | NSA warns against Wi-Fi, Bluetooth, and apps that expose location | BigBrother blog | Avast blog |
8.8.20 | Over 130M records from recent data breaches for sale | Incident blog | Avast blog |
8.8.20 | Do these three things to keep stalkerware at bay | Security blog | Avast blog |
8.8.20 | COVID-19 tracking apps are easy targets for hackers | Hacking blog | Avast blog |
8.8.20 | Contact tracing apps face their day of reckoning | Security blog | Avast blog |
8.8.20 | UK lockdown triggers increase in phishing scams | Phishing blog | Avast blog |
8.8.20 | Bitcoin scammers hijack major Twitter accounts | Cryptocurrency blog | Avast blog |
8.8.20 | What does the Twitter hack mean for the future of democracy? | Social blog | Avast blog |
8.8.20 | DoJ charges Chinese hackers with targeting COVID-19 research centers | BigBrother blog | Avast blog |
8.8.20 | IBM report shows true cost of data breaches | Incident blog | Avast blog |
8.8.20 | What we can learn from the Garmin ransomware attack | Ransomware blog | Avast blog |
8.8.20 | What to do about the BootHole vulnerability | Vulnerebility blog | Avast blog |
8.8.20 | INCREASE IN REMOTE WORK SPURS DEMAND FOR EDR CYBERSECURITY | Cyber blog | Cybereason |
8.8.20 | Robot Character Analysis Reveals Trust Issues | Security blog | Mcafee blog |
8.8.20 | Call an Exorcist! My Robot’s Possessed! | Security blog | Mcafee blog |
8.8.20 | Dopple-ganging up on Facial Recognition Systems | Security blog | Mcafee blog |
8.8.20 | Ripple20 Critical Vulnerabilities – Detection Logic and Signatures | Vulnerebility blog | Mcafee blog |
8.8.20 | Repurposing Neural Networks to Generate Synthetic Media for Information Operations | Security blog | FireEye |
8.8.20 | Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle Approach | Malware blog | FireEye |
8.8.20 | Stadeo: Deobfuscating Stantinko and more | Security blog | Eset |
8.8.20 | Small and medium‑sized businesses: Big targets for ransomware attacks | Ransomware blog | Eset |
8.8.20 | Beyond KrØØk: Even more Wi‑Fi chips vulnerable to eavesdropping | Vulnerebility blog | Eset |
8.8.20 | Blackbaud data breach: What you should know | Incident blog | Eset |
8.8.20 | NSA shares advice on how to limit location tracking | BigBrother blog | Eset |
8.8.20 | | Security | SANS |
8.8.20 | Remotely hack a Mercedes-Benz E-Class is possible, experts demonstrated | Hacking | Securityaffairs |
8.8.20 | FBI warns of Iran-linked hackers attempting to exploit F5 BIG-IP flaw | BigBrothers | Securityaffairs |
8.8.20 | Qualcomm and MediaTek Wi-Fi chips impacted by Kr00k-Like attacks | Attack | Securityaffairs |
7.8.20 | Hitblockdown002 | Conference Press | Conference Press |
7.8.20 | Defcon 28 | Conference Press | Conference Press |
7.8.20 | BlackHat 2020 USA | Conference Press | Conference Press |
7.8.20 | Hackers Dump 20GB of Intel’s Confidential Data Online | Incindent | Threatpost |
7.8.20 | Qualcomm Bugs Open 40 Percent of Android Handsets to Attack | Attack Vulnerebility | Threatpost |
7.8.20 | Attackers Horn in on MFA Bypass Options for Account Takeovers | Hacking | Threatpost |
7.8.20 | Have I Been Pwned Set to Go Open-Source | Security | Threatpost |
7.8.20 | Reddit massive hack: hackers defaced channels with pro-Trump messages | Hacking | Securityaffairs |
7.8.20 | Did Maze ransomware operators steal 10 GB of data from Canon? | Ransomware | Securityaffairs |
7.8.20 | Intel investigates security breach after the leak of 20GB of internal documents | Incindent | Securityaffairs |
7.8.20 | Chinese Researchers Show How They Remotely Hacked a Mercedes-Benz | Hacking | Securityweek |
7.8.20 | TikTok and WeChat: Chinese Apps Dogged by Security Fears | BigBrothers | Securityweek |
7.8.20 | Spam and phishing in Q2 2020 | Phishing Spam | Securelist |
7.8.20 | Trump Bans Dealings With Chinese Owners of TikTok, WeChat | BigBrothers | Securityweek |
7.8.20 | Qualcomm, MediaTek Wi-Fi Chips Vulnerable to Kr00k-Like Attacks | Attack | Securityweek |
7.8.20 | Capital One Fined $80 Million in Data Breach | Incindent | Securityweek |
7.8.20 | Researchers Revive 'Foreshadow' Attack by Extending It Beyond L1 Cache | Attack | Securityweek |
7.8.20 | Capital One Fined $80 Million for 2019 Data Breach Affecting 106 Million Users | Incindent | Thehackernews |
7.8.20 | Evasive Credit Card Skimmers Using Homograph Domains and Infected Favicon | CyberCrime | Thehackernews |
7.8.20 | How COVID-19 Has Changed Business Cybersecurity Priorities Forever | CyberCrime | Thehackernews |
7.8.20 | | Vulnerebility | Net-security |
7.8.20 | Canon Admits Ransomware Attack in Employee Note, Report | Ransomware | Threatpost |
7.8.20 | Black Hat 2020: Mercedes-Benz E-Series Rife with 19 Bugs | Congress | Threatpost |
7.8.20 | High-Severity Cisco DoS Flaw Plagues Small-Business Switches | Vulnerebility | Threatpost |
7.8.20 | Black Hat 2020: Satellite Comms Globally Open to $300 Eavesdropping Hack | Congress | Threatpost |
7.8.20 | Black Hat 2020: Influence Campaigns Are a Cybersecurity Problem | Congress | Threatpost |
7.8.20 | Black Hat 2020: ‘Zero-Click’ MacOS Exploit Chain Uses Microsoft Office Macros | Congress | Threatpost |
7.8.20 | Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits | Congress | Threatpost |
7.8.20 | U.S. Offers Reward of $10M for Info Leading to Discovery of Election Meddling | BigBrothers | Threatpost |
7.8.20 | Google Threat Analysis Group took down ten influence operations in Q2 2020 | Cyber | Securityaffairs |
7.8.20 | Intel Investigating Data Leak of Technical Documents, Tools | Incindent | Securityweek |
7.8.20 | US Senate Votes to Ban TikTok on Government Phones | BigBrothers | Securityweek |
7.8.20 | Twitter Moves to Reduce Reach of 'State-affiliated' Media | Social | Securityweek |
7.8.20 | U.S. Government Launches Cyber Career Path Tool | BigBrothers | Securityweek |
7.8.20 | Silverfort Raises $30 Million to Expand Agentless Authentication Platform | IT | Securityweek |
7.8.20 | Intel, ARM, IBM, AMD Processors Vulnerable to New Side-Channel Attacks | Attack | Thehackernews |
7.8.20 | | Spam | SANS |
7.8.20 | | Vulnerebility | Net-security |
7.8.20 | | Attack | Net-security |
7.8.20 | | Security | Net-security |
7.8.20 | | Security | Net-security |
6.8.20 | Incident Response Analyst Report 2019 | Incindent | Securelist |
6.8.20 | Netwalker ransomware operators claim to have stolen data from Forsee Power | Ransomware | Securityaffairs |
6.8.20 | US Offers $10 Million Reward Against Election Interference | IT | Securityweek |
6.8.20 | Researcher Discovers New HTTP Request Smuggling Attack Variants | Attack | Securityweek |
6.8.20 | Twitter Says Android App Vulnerability Exposed Direct Messages | Social | Securityweek |
6.8.20 | | BigBrothers | Net-security |
6.8.20 | | Exploit | Net-security |
6.8.20 | Black Hat 2020: Open-Source AI to Spur Wave of ‘Synthetic Media’ Attacks | Congress | Threatpost |
6.8.20 | Black Hat 2020: Scaling Mail-In Voting Spawns Broad Challenges | Congress | Threatpost |
6.8.20 | High-Severity Android RCE Flaw Fixed in August Security Update | Android | Threatpost |
6.8.20 | Black Hat 2020: In a Turnaround, Voting Machine Vendor Embraces Ethical Hackers | Congress | Threatpost |
6.8.20 | Black Hat 2020: Linux Spyware Stack Ties Together 5 Chinese APTs | Congress | Threatpost |
6.8.20 | Twitter Fixes High-Severity Flaw Affecting Android Users | Android | Threatpost |
6.8.20 | Microsoft Teams Patch Bypass Allows RCE | Vulnerebility | Threatpost |
6.8.20 | NSA Warns Smartphones Leak Location Data | BigBrothers | Threatpost |
6.8.20 | A Cyber ‘Vigilante’ is Sabotaging Emotet’s Return | Virus | Threatpost |
6.8.20 | FBI is warning of cyber attacks against Windows 7 systems that reached end-of-life | BigBrothers | Securityaffairs |
6.8.20 | Hackers can abuse Microsoft Teams updater to deliver malicious payloads | Virus | Securityaffairs |
6.8.20 | NSA releases a guide to reduce location tracking risks | BigBrothers | Securityaffairs |
6.8.20 | US Talks Tougher on Chinese Tech, But Offers Few Specifics | BigBrothers | Securityweek |
6.8.20 | Porn Video Interrupts US Court Hearing for Accused Twitter Hacker | Social | Securityweek |
6.8.20 | Researcher Details Sophisticated macOS Attack via Office Document Macros | Apple | Securityweek |
6.8.20 | Colorado City Pays $45,000 Ransom After Cyber-Attack | Ransomware | Securityweek |
6.8.20 | Researcher Demonstrates 4 New Variants of HTTP Request Smuggling Attack | Attack | Thehackernews |
6.8.20 | | Ransomware | SANS |
6.8.20 | | Security | Net-security |
6.8.20 | | Security | Net-security |
6.8.20 | | Security | Net-security |
6.8.20 | | Virus | Net-security |
6.8.20 | | CyberCrime | Net-security |
6.8.20 | | Security | Net-security |
6.8.20 | | Privacy | Net-security |
5.8.20 | Hacker leaks passwords for 900+ Pulse Secure VPN enterprise servers | Incindent | Securityaffairs |
5.8.20 | Exclusive: TIM’s Red Team Research finds 4 zero-days in WOWZA Streaming Engine product | Vulnerebility | Securityaffairs |
5.8.20 | Flaw in popular NodeJS ‘express-fileupload’ module allows DoS attacks and code injection | Attack | Securityaffairs |
5.8.20 | Vulnerabilities in Protocol Gateways Can Facilitate Attacks on Industrial Systems | ICS | Securityweek |
5.8.20 | Federal Program Offers New Cybersecurity Tool for Elections | BigBrothers | Securityweek |
5.8.20 | Drone Maker DJI Says Claims About Security of Pilot App 'Misleading' | Security | Securityweek |
5.8.20 | Apple Touch ID Flaw Could Have Let Attackers Hijack iCloud Accounts | Apple | Thehackernews |
5.8.20 | Newsletter WordPress Plugin Opens Door to Site Takeover | Security | Threatpost |
5.8.20 | Twitter Could Face $250M FTC Fine Over Improper Data Use | Social | Threatpost |
5.8.20 | NetWalker Ransomware Rakes in $29M Since March | Ransomware | Threatpost |
5.8.20 | Apple Knocked Off Perch as Most Imitated Brand for Phishing Attacks | Apple | Threatpost |
5.8.20 | UberEats data leaked on the dark web | CyberCrime | Securityaffairs |
5.8.20 | US govt agencies share details of the China-linked espionage malware Taidoor | BigBrothers | Securityaffairs |
5.8.20 | High-Wattage IoT Botnets Can Manipulate Energy Market: Researchers | BotNet IoT | Securityweek |
5.8.20 | GreyNoise Raises $4.8 Million in Seed Funding to Combat Alert Fatigue | IT | Securityweek |
5.8.20 | Tampa Teenager Accused in Twitter Hack Pleads Not Guilty | Social | Securityweek |
5.8.20 | Google Patches Over 50 Vulnerabilities in Android With August 2020 Updates | Android | Securityweek |
5.8.20 | Microsoft Paid Out Nearly $14 Million via Bug Bounty Programs in Past Year | Security | Securityweek |
5.8.20 | U.S. Attributes Taidoor Malware to Chinese Government Hackers | BigBrothers | Securityweek |
5.8.20 | | Spam | SANS |
5.8.20 | | Security | Net-security |
5.8.20 | | Vulnerebility | Net-security |
5.8.20 | | Security | Net-security |
5.8.20 | | Security | Net-security |
5.8.20 | | Crime | Net-security |
5.8.20 | | Cyber | Net-security |
4.8.20 | Maze Ransomware operators published data from LG and Xerox | Ransomware | Securityaffairs |
4.8.20 | NetWalker ransomware operators have made $25 million since March 2020 | Ransomware | Securityaffairs |
4.8.20 | Interpol Warns of 'Alarming' Cybercrime Rate During Pandemic | CyberCrime | Securityweek |
4.8.20 | Legacy Programming Languages Pose Serious Risks to Industrial Robots | IT | Securityweek |
4.8.20 | French Trial Ordered for Alleged Russian Bitcoin Fraudster | BigBrothers | Securityweek |
4.8.20 | US Government Warns of a New Strain of Chinese 'Taidoor' Virus | BigBrothers | Thehackernews |
4.8.20 | | Exploit Vulnerebility | SANS |
4.8.20 | Analysis of 92 billion rejected emails uncovers threat actors’ motivations | Security | Net-security |
4.8.20 | | Security | Net-security |
4.8.20 | Black Hat USA 2020 Preview: Election Security, COVID Disinformation and More | Congress | Threatpost |
4.8.20 | Meetup Critical Flaws Allow ‘Group’ Takeover, Payment Theft | Vulnerebility | Threatpost |
4.8.20 | Garmin Pays Up to Evil Corp After Ransomware Attack — Reports | Ransomware | Threatpost |
4.8.20 | Black Hat USA 2020: Critical Meetup.com Flaws Reveal Common AppSec Holes | Congress | Threatpost |
4.8.20 | Google Updates Ad Policies to Counter Influence Campaigns, Extortion | Security | Threatpost |
4.8.20 | Netgear Won’t Patch 45 Router Models Vulnerable to Serious Flaw | Vulnerebility | Threatpost |
4.8.20 | Hackers stole €1.2m worth of cryptocurrency from 2gether | Cryptocurrency | Securityaffairs |
4.8.20 | Reading the 2020 Cost of a Data Breach Report | Incindent | Securityaffairs |
4.8.20 | Belarussian authorities arrested GandCrab ransomware distributor | Ransomware | Securityaffairs |
4.8.20 | Havenly discloses data breach, 1.3M accounts available online | Incindent | Securityaffairs |
4.8.20 | Ghostwriter disinformation campaign aimed at discrediting NATO | BigBrothers | Securityaffairs |
4.8.20 | FBI issued a flash alert about Netwalker ransomware attacks | Ransomware | Securityaffairs |
4.8.20 | Garmin allegedly paid for a decryptor for WastedLocker ransomware | Ransomware | Securityaffairs |
4.8.20 | QNAP urges users to update Malware Remover after QSnatch joint alert | Virus | Securityaffairs |
4.8.20 | A critical flaw in wpDiscuz WordPress plugin lets hackers take over hosting account | Vulnerebility | Securityaffairs |
4.8.20 | The author of FastPOS PoS malware pleads guilty | Virus | Securityaffairs |
4.8.20 | BlackBerry Releases Open Source Reverse Engineering Tool | Security | Securityweek |
4.8.20 | Ransomware Feared as Possible Saboteur for November Election | Ransomware | Securityweek |
4.8.20 | Hackers Could Target Organizations via Flaws in Mitsubishi Factory Automation Products | Vulnerebility | Securityweek |
4.8.20 | Google Analysis of Zero-Days Exploited in 2019 Finds 'Detection Bias' | Vulnerebility | Securityweek |
4.8.20 | Foreign Threats Loom Ahead of US Presidential Election | BigBrothers | Securityweek |
4.8.20 | How the FBI Identified Twitter Hackers | BigBrothers | Securityweek |
4.8.20 | Microsoft to Keep Exploring TikTok Deal After Talks With Trump | BigBrothers | Securityweek |
4.8.20 | | BotNet | SANS |
4.8.20 | | Security | Net-security |
4.8.20 | | Security | Net-security |
4.8.20 | | IoT | Net-security |
4.8.20 | | Security | Net-security |
4.8.20 | | IT | Net-security |
4.8.20 | | Vulnerebility | Net-security |
4.8.20 | | Security | Net-security |
4.8.20 | | Security | Net-security |
4.8.20 | | Privacy | Net-security |
4.8.20 | | Cyber | Net-security |
4.8.20 | | Security | Net-security |
4.8.20 | | IoT | Net-security |
1.8.20 | Four individuals charged for the recent Twitter hack | Social | Securityaffairs |
1.8.20 | Trump says he will ban popular Chinese video app TikTok in the US | BigBrothers | Securityaffairs |
1.8.20 | Trump Says Will bar TikTok From US | BigBrothers | Securityweek |
1.8.20 | US Charges Three People for Roles in Epic Twitter Hack | Social | Securityweek |
1.8.20 | | Security | SANS |
1.8.20 | Twitter: Epic Account Hack Caused by Mobile Spearphishing | Attack Social | Threatpost |
1.8.20 | Black Hat USA 2020 Preview: Election Security, COVID Disinformation and More | Congress | Threatpost |
1.8.20 | 4 Unpatched Bugs Plague Grandstream ATAs for VoIP Users | Vulnerebility | Threatpost |
1.8.20 | Authorities Arrest Alleged 17-Year-Old ‘Mastermind’ Behind Twitter Hack | Social | Threatpost |
1.8.20 | CWT Travel Agency Faces $4.5M Ransom in Cyberattack, Report | Cyber | Threatpost |
1.8.20 | Anti-NATO Disinformation Campaign Leveraged CMS Compromises | BigBrothers | Threatpost |
1.8.20 | Updates provided by Red Hat for BootHole cause systems to hang | Vulnerebility | Securityaffairs |
1.8.20 | US Charges Three People for Roles in Epic Twitter Hack | Social | Securityaffairs |
1.8.20 | Florida Teen Charged in Massive Twitter Hack, Bitcoin Theft | Social | Securityweek |
1.8.20 | 17-Year-Old 'Mastermind', 2 Others Behind the Biggest Twitter Hack Arrested | Social | Thehackernews |
| | | |