Date | Name | Category | Web |
29.2.20 | uBlock Origin 1.25 Now Blocks Cloaked First-Party Scripts, Firefox Only | Security | Bleepingcomputer |
29.2.20 | Mozilla Enables DNS-over-HTTPS by Default for All USA Users | Security | Bleepingcomputer |
29.2.20 | New Critical RCE Bug in OpenBSD SMTP Server Threatens Linux Distros | Vulnerebility | Bleepingcomputer |
29.2.20 | Credit Card Skimmer Running on 13 Sites, Despite Notification | CyberCrime | Bleepingcomputer |
29.2.20 | DoppelPaymer Ransomware Launches Site to Post Victim's Data | Ransomware | Bleepingcomputer |
29.2.20 | PayPal Users Hit With Fraudulent 'Target' Charges via Google Pay | Phishing | Bleepingcomputer |
29.2.20 | New Mozart Malware Gets Commands, Hides Traffic Using DNS | Virus | Bleepingcomputer |
29.2.20 | WhatsApp, Telegram Group Invite Links Leaked in Public Searches | Social | Bleepingcomputer |
29.2.20 | Malvertising in Govt, Enterprise Targets Old Software, Macs | Apple | Bleepingcomputer |
29.2.20 | Racoon Malware Steals Your Data From Nearly 60 Apps | Virus | Bleepingcomputer |
29.2.20 | Windows 10 Gets Temp Patch for Critical Flaw Fixed In Buggy Update | OS | Bleepingcomputer |
29.2.20 | Google Brings Its Lighthouse Pagespeed Extension to Firefox | Security | Bleepingcomputer |
29.2.20 | 2019 TLS Telemetry Report Summary | Safety blog | F5 Labs |
29.2.20 | Application Protection Research Series—Summary 2nd Edition | Security blog | F5 Labs |
29.2.20 | The Perfect Cybersecurity Applicant is Likely a Veteran | Cyber blog | F5 Labs |
29.2.20 | Ransomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT | Ransomware blog | FireEye |
29.2.20 | CPR evasion encyclopedia: The Check Point evasion repository | Cyber blog | Checkpoint |
29.2.20 | New Research Paper: Prevalence and impact of low-entropy packing schemes in the malware ecosystem | Malware blog | Cisco Talos |
29.2.20 | Vulnerability Spotlight: Multiple vulnerabilities in Moxa AWK-3131A | Vulnerebility blog | Cisco Talos |
29.2.20 | Firefox turns on DNS over HTTPS by default for US users | Safety blog | Eset |
29.2.20 | Cyberbullying: How is it different from face‑to‑face bullying? | Cyber blog | Eset |
29.2.20 | Facial recognition company Clearview AI hit by data theft | Cyber blog | Eset |
29.2.20 | RSA 2020 – Hacking humans | Congress blog | Eset |
29.2.20 | Did someone file your taxes before you? | Security blog | Eset |
29.2.20 | Is bug hunting a viable career choice? | Vulnerebility blog | Eset |
29.2.20 | KrØØk: Serious vulnerability affected encryption of billion+ Wi‑Fi devices | Vulnerebility blog | Eset |
29.2.20 | Is your phone listening to you? | Hardware blog | Eset |
29.2.20 | | Congress | Threatpost |
29.2.20 | | Hacking | Threatpost |
29.2.20 | | Apple | Threatpost |
29.2.20 | All versions of Apache Tomcat are affected by the Ghostcat flaw | Vulnerebility | Securityaffairs |
29.2.20 | Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates | BigBrothers Social | Securityaffairs |
29.2.20 | Apache Tomcat Affected by Serious 'Ghostcat' Vulnerability | Vulnerebility | Securityweek |
29.2.20 | Microsoft Boosts PUA Protections in Edge | Safety | Securityweek |
29.2.20 | ProtonMail Fights Email Spoofing With New DKIM Key Management Feature | Hacking Safety | Securityweek |
29.2.20 | Assange's UK Extradition Hearing Paused Until May | BigBrothers | Securityweek |
29.2.20 | GhostCat: New High-Risk Vulnerability Affects Servers Running Apache Tomcat | Vulnerebility | Thehackernews |
28.2.20 | Which are the most dangerous mobile app stores online? | Mobil | Securityaffairs |
28.2.20 | Cisco addresses vulnerabilities in FXOS, UCS Manager and NX-OS Software | Vulnerebility | Securityaffairs |
28.2.20 | NRC Health health care company hit with ransomware | Ransomware | Securityaffairs |
28.2.20 | Let's Encrypt Issues Over 1 Billion Certificates | Safety | Securityweek |
28.2.20 | Intel Patched Over 230 Vulnerabilities in Its Products in 2019 | Vulnerebility | Securityweek |
28.2.20 | Let's Encrypt Issued A Billion Free SSL Certificates in the Last 4 Years | Safety | Thehackernews |
28.2.20 | | Hacking | Net-security |
28.2.20 | | Cyber | Net-security |
28.2.20 | | Congress | Net-security |
28.2.20 | 2019 TLS TELEMETRY REPORT | Report | Report |
28.2.20 | | IoT | Threatpost |
28.2.20 | | Android | Threatpost |
28.2.20 | | Congress | Threatpost |
28.2.20 | Facial recognition firm Clearview AI reveals intruders stole its client list | Cyber | Securityaffairs |
28.2.20 | Lampion malware origin servers geolocated in Turkey | Virus | Securityaffairs |
28.2.20 | Facebook Sues Analytics Firm for Data Misuse | Social | Securityweek |
28.2.20 | Cisco to Release Updates for Wireless Products Affected by Kr00k Vulnerability | Vulnerebility | Securityweek |
28.2.20 | Cybercriminals Target Lincoln Health Care Company | CyberCrime | Securityweek |
28.2.20 | Inside the Rising Cybercrime Threat in Latin America | CyberCrime | Securityweek |
28.2.20 | | Security | SANS |
28.2.20 | | Ransomware | Net-security |
28.2.20 | | Crypto | Net-security |
28.2.20 | | Privacy | Net-security |
28.2.20 | | Congress | Net-security |
27.2.20 | Roaming Mantis, part V | APT | Securelist |
27.2.20 | Hunting the coronavirus in the dark web | CyberCrime | Securityaffairs |
27.2.20 | QL Dump from popular Indian BGR tech site leaked online | Incindent | Securityaffairs |
27.2.20 | New strain of Cerberus Android banking trojan can steal Google Authenticator codes | Android | Securityaffairs |
27.2.20 | Data on Detection of Malicious Documents in Gmail are impressive | Virus | Securityaffairs |
27.2.20 | Threat actors scan Internet for Vulnerable Microsoft Exchange Servers | Vulnerebility | Securityaffairs |
27.2.20 | Cisco Patches Flaws in FXOS, UCS Manager and NX-OS Software | Vulnerebility | Securityweek |
27.2.20 | Hackers Looking for Exchange Servers Affected by Recently Patched Flaw | Vulnerebility | Securityweek |
27.2.20 | Less Than Half of Vulnerabilities in Popular Docker Images Pose Risk: Study | Vulnerebility | Securityweek |
27.2.20 | Framework Isolates Libraries in Firefox to Improve Security | Security | Securityweek |
27.2.20 | Online 'Impersonator' Tried to Contact Campaigns, DNC Says | Security | Securityweek |
27.2.20 | Hacker Earns $8,500 for Vulnerability in HackerOne Platform | Security | Securityweek |
27.2.20 | Facebook and Google Postpone Asia-Pacific Bug Hunting Conference | Social | Securityweek |
27.2.20 | | Vulnerebility | Net-security |
27.2.20 | | Congress | Threatpost |
27.2.20 | | Attack | Threatpost |
27.2.20 | | Congress | Threatpost |
27.2.20 | | Vulnerebility | Threatpost |
27.2.20 | | Hacking | Threatpost |
27.2.20 | | APT | Threatpost |
27.2.20 | | Attack | Threatpost |
27.2.20 | | Security | SANS |
27.2.20 | Kr00k Wi-Fi Encryption flaw affects more than a billion devices | Vulnerebility | Securityaffairs |
27.2.20 | Over 20 Zyxel Firewalls Impacted by Recent Zero-Day Vulnerability | Vulnerebility | Securityweek |
27.2.20 | Privacy Management Firm OneTrust Raises $210 Million at $2.7 Billion Valuation | IT | Securityweek |
27.2.20 | RSA Conference 2020: Product Announcement Summary (Day 3) | Congress | Securityweek |
27.2.20 | McAfee Buys Browser Isolation Firm Light Point Security | Security | Securityweek |
27.2.20 | New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices | Vulnerebility | Thehackernews |
27.2.20 | | Security | Net-security |
27.2.20 | | Virus | Net-security |
27.2.20 | | Security | Net-security |
27.2.20 | | Security | Net-security |
27.2.20 | | Vulnerebility | Net-security |
27.2.20 | | Congress | Net-security |
27.2.20 | | Vulnerebility | Net-security |
27.2.20 | | IoT | Net-security |
27.2.20 | | Exploit | Net-security |
26.2.20 | Kr00k Vulnerebility | Papers | Papers |
26.2.20 | Kr00k Vulnerebility | Threats News | Threats News |
26.2.20 | Reading Municipal Light Department, an electric utility in Massachusetts, hit by ransomware | Ransomware | Securityaffairs |
26.2.20 | Google Boosts Detection of Malicious Documents in Gmail | Virus | Securityweek |
26.2.20 | Kr00k Vulnerability Exposed Data From Over a Billion Wi-Fi Devices | Vulnerebility | Securityweek |
26.2.20 | Iranian Cyberspies Focus on Long-Running Operations | BigBrothers CyberSpy | Securityweek |
26.2.20 | Intel Announces New Hardware-based Security Capabilities | Security | Securityweek |
26.2.20 | FBI Official: Russia Wants to See US 'Tear Ourselves Apart' | BigBrothers | Securityweek |
26.2.20 | New LTE Network Flaw Could Let Attackers Impersonate 4G Mobile Users | Mobil Vulnerebility | Thehackernews |
26.2.20 | Google Advises Android Developers to Encrypt App Data On Device | Android | Thehackernews |
26.2.20 | Samsung leaked data of a few UK Customers | Incindent | Securityaffairs |
26.2.20 | Silence Hacking Crew threatens Australian banks of DDoS attacks | Attack BigBrothers | Securityaffairs |
26.2.20 | New Cyber Attack Campaign Leverages the COVID-19 Infodemic | Virus | Securityaffairs |
26.2.20 | Fbot re-emerged, the backstage | Virus | Securityaffairs |
26.2.20 | Massachusetts Electric Utility Hit by Ransomware | Ransomware | Securityweek |
26.2.20 | OpenSMTPD Vulnerability Leads to Command Injection | Vulnerebility | Securityweek |
26.2.20 | UK Financial Regulator Admits to Data Breach | Incindent | Securityweek |
26.2.20 | Google Advises Android Developers to Encrypt App Data On Device | Android | Thehackernews |
26.2.20 | | Congress | Threatpost |
26.2.20 | | Congress | Threatpost |
26.2.20 | | Attack | Threatpost |
26.2.20 | | BigBrothers | Threatpost |
26.2.20 | Decathlon Spain data leak exposed Spanish employees’ data & more | Incindent | Securityaffairs |
26.2.20 | Zyxel addresses Zero-Day vulnerability in NAS devices | Vulnerebility | Securityaffairs |
26.2.20 | Firefox Gets DNS-over-HTTPS as Default in U.S. | Safety | Securityweek |
26.2.20 | Samsung Says it Leaked Data on Handful of UK Customers | Incindent | Securityweek |
26.2.20 | RSA Conference 2020: Product Announcement Summary (Day 2) | Congress | Securityweek |
26.2.20 | Over 100 Vulnerabilities Patched in MyBB in Past 5 Years | Vulnerebility | Securityweek |
26.2.20 | Firefox enables DNS-over-HTTPS by default (with Cloudflare) for all U.S. users | Safety | Thehackernews |
26.2.20 | | Phishing | Net-security |
26.2.20 | | IoT | Net-security |
26.2.20 | | Cyber | Net-security |
26.2.20 | | Incindent | Net-security |
26.2.20 | | Congress | Net-security |
25.2.20 | IMP4GT: IMPersonation Attacks in 4G NeTwor | Papers | Papers |
25.2.20 | IMP4GT | Attack | Attack |
25.2.20 | Experts discovered a new critical OpenSMTPD RCE flaw exploited in the wild | Exploit | Securityaffairs |
25.2.20 | Google fixes Chrome zero-day flaw exploited in the wild | Exploit | Securityaffairs |
25.2.20 | European Commission has chosen the Signal app to secure its communications | Security | Securityaffairs |
25.2.20 | State-Sponsored Cyberspies Use Sophisticated Server Firewall Bypass Technique | Vulnerebility | Securityweek |
25.2.20 | Zyxel Patches Zero-Day Vulnerability in Network Storage Products | Vulnerebility | Securityweek |
25.2.20 | KPMG on Key Cybersecurity Considerations for 2020 | Cyber | Securityweek |
25.2.20 | HackerOne Surpasses $82 Million in Paid Bounties | Security | Securityweek |
25.2.20 | Mobile Networks Vulnerable to IMP4GT Impersonation Attacks | Attack Mobil | Securityweek |
25.2.20 | Install Latest Chrome Update to Patch 0-Day Bug Under Active Attacks | Attack | Thehackernews |
25.2.20 | | Security | Net-security |
25.2.20 | Mobile malware evolution 2019 | Analysis Mobil | Securelist |
25.2.20 | South Korea suffers from the spread of people infected with Corona 19 | Virus | Securityaffairs |
25.2.20 | Hacking campaign targets sites running popular Duplicator WordPress plugin | Hacking | Securityaffairs |
25.2.20 | Google Patches Chrome Vulnerability Exploited in the Wild | Vulnerebility | Securityweek |
25.2.20 | BEC Group Abuses Google G Suite in Scheme Targeting Thousands of Firms | Security | Securityweek |
25.2.20 | New OpenSMTPD RCE Flaw Affects Linux and OpenBSD Email Servers | Vulnerebility | Thehackernews |
25.2.20 | Why Minimizing Human Error is the Only Viable Defense Against Spear Phishing | Phishing | Thehackernews |
25.2.20 | | Vulnerebility | Net-security |
25.2.20 | | Apple | Threatpost |
25.2.20 | | Incindent | Threatpost |
25.2.20 | | Security | Net-security |
25.2.20 | ZyXEL NAS pre-authentication command injection in weblogin.cgi | Alert | Alert |
25.2.20 | | Security | Net-security |
25.2.20 | | Cyber | Net-security |
25.2.20 | Lampion malware v2 February 2020 | Virus | Securityaffairs |
25.2.20 | Raccoon Malware, a success case in the cybercrime ecosystem | Virus | Securityaffairs |
25.2.20 | Slickwraps discloses data leak that impacted 850,000 user accounts | Incindent | Securityaffairs |
25.2.20 | SECURITI.ai Wins RSA Conference 2020 Innovation Sandbox Contest | Congress | Securityweek |
25.2.20 | Pentagon Adopts New Ethical Principles for Using AI in War | BigBrothers | Securityweek |
25.2.20 | RSA Conference 2020: Product Announcement Summary (Day 1) | Congress | Securityweek |
25.2.20 | Vulnerabilities in Moxa Networking Device Expose Industrial Environments to Attacks | Vulnerebility | Securityweek |
25.2.20 | Mismanagement of Device Identities Could Cost Businesses Billions: Report | Security | Securityweek |
25.2.20 | Canada Privacy Watchdog Probes Facial Recognition Startup | Privacy | Securityweek |
25.2.20 | Slickwraps Discloses Data Breach | Incindent | Securityweek |
25.2.20 | Cisco Unveils SecureX Security Platform | Security | Securityweek |
25.2.20 | Vulnerabilities Allow Hackers to Access Honeywell Fire Alarm Systems | Vulnerebility | Securityweek |
25.2.20 | | Spam | SANS |
25.2.20 | | Security | Net-security |
25.2.20 | | Security | Net-security |
25.2.20 | | Security | Net-security |
25.2.20 | | Security | Net-security |
24.2.20 | Windows 10 Privacy Guide: Settings Everyone Should Use | OS | Bleepingcomputer |
24.2.20 | Privacy Concerns Raised Over New Google Chrome Feature | Privacy | Bleepingcomputer |
24.2.20 | Windows 10 Gets Temp Fix for Critical Security Vulnerability | OS | Bleepingcomputer |
24.2.20 | Extension Brings Internet Explorer Menu Bar to Microsoft Edge | OS | Bleepingcomputer |
24.2.20 | Slickwraps Data Breach Exposes Financial and Customer Info | Incindent | Bleepingcomputer |
24.2.20 | Android Malware: Joker Still Fools Google's Defense, New Clicker Found | Android | Bleepingcomputer |
24.2.20 | Google Cleans Play Store of Nearly 600 Apps for Ad Policy Violation | Privacy | Bleepingcomputer |
24.2.20 | New Mexico Sues Google for Mining Children's Data | Privacy | Bleepingcomputer |
24.2.20 | Microsoft Unveils Their New Windows 10 System Icons | OS | Bleepingcomputer |
24.2.20 | FTC Refunds Victims of Office Depot Tech Support Scam | Spam | Bleepingcomputer |
24.2.20 | FBI recommends using passphrases instead of complex passwords | BigBrothers | Securityaffairs |
24.2.20 | FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019 | Analysis | Securityaffairs |
24.2.20 | Man Tied to Ex-Congresswoman Campaign Arrested in Hack Spree | Crime | Securityweek |
24.2.20 | 2016 Again? Russia Back to Stirring Chaos in U.S. Election | BigBrothers | Securityweek |
24.2.20 | | Cyber | Net-security |
24.2.20 | ISS reveals malware attack impacted parts of the IT environment | Virus | Securityaffairs |
24.2.20 | Google sued by New Mexico attorney general for collecting student data through its Education Platform | Privacy | Securityaffairs |
24.2.20 | ObliqueRAT, a new malware employed in attacks on government targets in Southeast Asia | Virus | Securityaffairs |
24.2.20 | | Virus | SANS |
24.2.20 | By exploiting an LTE vulnerability, attackers can impersonate mobile phone users | Exploit Mobil | Net-security |
24.2.20 | | Security | Net-security |
24.2.20 | | Safety | Net-security |
24.2.20 | | Ransomware | Net-security |
24.2.20 | | Security | Net-security |
24.2.20 | | Security | Net-security |
24.2.20 | | Security | Net-security |
23.2.20 | WhatsApp Phishing URLs Skyrocket With Over 13,000% Surge | Phishing Social | Bleepingcomputer |
23.2.20 | Credit Card Skimmer Found on Nine Sites, Researchers Ignored | CyberCrime | Bleepingcomputer |
23.2.20 | Hackers Share Stolen MGM Resorts Guest Database with 10M+ Records | Incindent | Bleepingcomputer |
23.2.20 | Google Tells Microsoft Edge Users To Get Chrome for Better Security | Security | Bleepingcomputer |
23.2.20 | Microsoft Defender ATP for Linux Now In Public Preview | Safety | Bleepingcomputer |
23.2.20 | New Actors Attack Industrial Control Systems, Old Ones Mature | ICS | Bleepingcomputer |
23.2.20 | Tesla Pays $10K for Microsoft SQL Server Reporting Services Bug | Security | Bleepingcomputer |
23.2.20 | Microsoft Rolls Out New Windows 10 Optional Update Experience | OS | Bleepingcomputer |
23.2.20 | Microsoft Adds Enterprise Windows 10 Tamper Protection Controls | OS | Bleepingcomputer |
23.2.20 | Swiss Govt Says Ransomware Victims Ignored Warnings, Had Poor Security | Ransomware | Bleepingcomputer |
23.2.20 | Windows 10 KB4532693 Update Bug Reportedly Deletes User Files | OS | Bleepingcomputer |
23.2.20 | Zero-Day in WordPress Plugin Exploited to Create Admin Accounts | Exploit Vulnerebility | Bleepingcomputer |
23.2.20 | Over 20,000 WordPress Sites Run Trojanized Premium Themes | Virus | Bleepingcomputer |
23.2.20 | DRBControl Espionage Operation Hits Gambling, Betting Companies | CyberSpy | Bleepingcomputer |
23.2.20 | Dharma Ransomware Attacks Italy in New Spam Campaign | Ransomware Spam | Bleepingcomputer |
23.2.20 | SonicWall Firewall Certified via NetSecOPEN Laboratory Testing, Earns Perfect Security Effectiveness Score Against Private CVE Attacks | Safety blog | Sonicwall |
23.2.20 | Hackers infect VPNs to plant hidden backdoors | Hacking blog | Avast blog |
23.2.20 | Can You Trust Your AutoIT Decompiler? | Security blog | Palo Alto Unity42 |
23.2.20 | How to Use a Firewall for Network Traffic Analysis and Behavioral Detection | Cyber blog | Palo Alto |
23.2.20 | What’s it Like Being a Woman in Cybersecurity? | Cyber blog | Palo Alto |
23.2.20 | The Three T’s of Shift Left Security | Cyber blog | Palo Alto |
23.2.20 | What the Cybersecurity Industry Needs to Discuss at the RSA Conference 2020 | Cyber blog | Palo Alto |
23.2.20 | Book Review: “Cyber Smart” | Cyber blog | Palo Alto |
23.2.20 | Tapping the True Potential of the 5G Digital Economy | Cyber blog | Palo Alto |
23.2.20 | Holistic SDN Security Makes Security Comprehensive Everywhere | Cyber blog | Palo Alto |
23.2.20 | Cloud Native Security Beyond Your Vendor’s Tools | Cyber blog | Palo Alto |
23.2.20 | | Virus | SANS |
23.2.20 | Joker malware still able to bypass Google Play Store checks | Android | Securityaffairs |
23.2.20 | Google removed nearly 600 apps from the Play Store for ad policy violation | Android Privacy | Securityaffairs |
22.2.20 | US Govt Warns of Ransomware Attacks on Pipeline Operations | BigBrothers Ransomware | Bleepingcomputer |
22.2.20 | Ring Forces 2FA On All Users to Secure Cameras from Hackers | Hacking | Bleepingcomputer |
22.2.20 | Firefox 73.0.1 Released With Fixes for Linux, Windows Crashes | Vulnerebility | Bleepingcomputer |
22.2.20 | AZORult Malware Infects Victims via Fake ProtonVPN Installer | Virus | Bleepingcomputer |
22.2.20 | Phishing on Instagram Baits Russians With Free Money Promise | Phishing | Bleepingcomputer |
22.2.20 | Windows, Linux Devices at Risk Due to Unsigned Peripheral Firmware | OS | Bleepingcomputer |
22.2.20 | Hacker Group Catfishes Israeli Soldiers Into Installing Mobile RAT | BigBrothers Virus | Bleepingcomputer |
22.2.20 | Microsoft Surface Laptop 3 Screens Are Spontaneously Cracking | Hacking | Bleepingcomputer |
22.2.20 | World Health Organization Warns of Coronavirus Phishing Attacks | Phishing | Bleepingcomputer |
22.2.20 | Windows 10 Users Affected by New Shutdown Bug, How to Fix | OS | Bleepingcomputer |
22.2.20 | Russia Blocks Tutanota Email, Service Still Usable Over Tor or VPN | BigBrothers | Bleepingcomputer |
22.2.20 | Unsafe WordPress Plugin Installed on Nearly 200,000 Sites | Vulnerebility | Bleepingcomputer |
22.2.20 | Windows 10X to Feature Faster Updates, Win32 Apps Support | OS | Bleepingcomputer |
22.2.20 | Targeted Phishing Attack Aims For Well-Known Corporate Brands | Phishing | Bleepingcomputer |
22.2.20 | Windows 10 Gets the Mac Hot Corners Feature With New App | OS | Bleepingcomputer |
22.2.20 | How to See the First Show You Watched on Netflix | IT | Bleepingcomputer |
22.2.20 | CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II | Cyber blog | Mcafee blog |
22.2.20 | Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles | Security blog | Mcafee blog |
22.2.20 | Introduction and Application of Model Hacking | Security blog | Mcafee blog |
22.2.20 | CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I | Cyber blog | Mcafee blog |
22.2.20 | What Can Pandemics Teach Us About Cyber Security? | Cyber blog | F5 Labs |
22.2.20 | Prioritizing Vulnerability Management Using Machine Learning | Vulnerebility blog | F5 Labs |
22.2.20 | M-Trends 2020: Insights From the Front Lines | Cyber blog | FireEye |
22.2.20 | Managed Defense: The Analytical Mindset | Security blog | FireEye |
22.2.20 | "Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests | BigBrother blog | FireEye |
22.2.20 | The Missing LNK — Correlating User Search LNK files | Malware blog | FireEye |
22.2.20 | Hamas Android Malware On IDF Soldiers-This is How it Happened | OS Blog | Checkpoint |
22.2.20 | Android App Fraud – Haken Clicker and Joker Premium Dialer | OS Blog | Checkpoint |
22.2.20 | Mitigations are attack surface, too | Exploit blog | Project Zero |
22.2.20 | Escaping the Chrome Sandbox with RIDL | Exploit blog | Project Zero |
22.2.20 | ObliqueRAT: New RAT hits victims' endpoints via malicious documents | Malware blog | Cisco Talos |
22.2.20 | Vulnerability Spotlight: Memory corruption, DoS vulnerabilities in CoTURN | Vulnerebility blog | Cisco Talos |
22.2.20 | Building a bypass with MSBuild | Vulnerebility blog | Cisco Talos |
22.2.20 | Up close and personal with Linux malware | Malware blog | Eset |
22.2.20 | MGM Resorts data breach exposes details of 10.6 million guests | Incident blog | Eset |
22.2.20 | Linux and malware: Should you worry? | Malware blog | Eset |
22.2.20 | What DNS encryption means for enterprise threat hunters | Safety blog | Eset |
22.2.20 | Sensitive plastic surgery photos exposed online | Incident blog | Eset |
22.2.20 | Plugin flaw leaves up to 200,000 WordPress sites at risk of attack | Attack blog Vulnerebility blog | Eset |
22.2.20 | FC Barcelona Twitter account hacked – again | Social blog | Eset |
22.2.20 | RSAC 2020: Editors’ Preview of Hottest Sessions, Speakers and Themes | Congress | Threatpost |
22.2.20 | New ‘Haken’ Malware Found On Eight Apps In Google Play Store | Android | Threatpost |
22.2.20 | ISS World Hit with Malware Attack that Shuts Down Global Computer Network | Virus | Threatpost |
22.2.20 | Burning Man Tickets for $225? Yep, Too Good to Be True | CyberCrime | Threatpost |
22.2.20 | | Privacy | Threatpost |
22.2.20 | | Attack | Threatpost |
22.2.20 | VMware addresses serious flaws in vRealize Operations for Horizon Adapter | Vulnerebility | Securityaffairs |
22.2.20 | New Mexico Sues Google Over Collection of Children's Data | Privacy | Securityweek |
22.2.20 | Google Removes 600 Android Apps for Displaying Disruptive Ads | Android | Securityweek |
22.2.20 | Malware Attack Takes ISS World's Systems Offline | Virus | Securityweek |
22.2.20 | Microsoft Brings Defender Antivirus for Linux, Coming Soon for Android and iOS | Safety | Thehackernews |
21.2.20 | M-TRENDS 2020 FIREEYE MANDIANT SERVICES | SPECIAL REPORT | Report | Report |
21.2.20 | Exclusive: Pakistan and India to armaments: Operation Transparent Tribe is back 4 years later | BigBrothers | Securityaffairs |
21.2.20 | DOD DISA US agency discloses a security breach | BigBrothers Incindent | Securityaffairs |
21.2.20 | FireEye Spotted Over 500 New Malware Families in 2019 | Virus | Securityweek |
21.2.20 | VMware Patches Serious Flaws in vRealize Operations for Horizon Adapter | Vulnerebility | Securityweek |
21.2.20 | U.S. Combat Support Agency Discloses 2019 Data Breach | BigBrothers | Securityweek |
21.2.20 | Fraudulent Login Attacks Against Banks Surge: Akamai | Attack | Securityweek |
21.2.20 | 20,000 WordPress Websites Infected via Trojanized Themes | Virus | Securityweek |
21.2.20 | Google Bans 600 Android Apps from Play Store for Serving Disruptive Ads | Android | Thehackernews |
21.2.20 | | Vulnerebility | Net-security |
21.2.20 | | Attack Vulnerebility | Threatpost |
21.2.20 | | Incindent | Threatpost |
21.2.20 | | CyberCrime Spam | Threatpost |
21.2.20 | | Android | Threatpost |
21.2.20 | | Vulnerebility | Threatpost |
21.2.20 | 2019 YEAR IN REVIEW ICS VULNERABILITIES | Report | Report |
21.2.20 | 2019 YEAR IN REVIEW THE ICS L ANDSCAPE AND THREAT ACTIVIT Y GROUPS | Report | Report |
21.2.20 | 2019 YEAR IN REVIEW LESSONS LEARNED FROM THE FRONT LINES OF ICS CYBERSECURITY | Report | Report |
21.2.20 | | Crypto | SANS |
21.2.20 | | Security | Net-security |
21.2.20 | Dragos Report: Analysis of ICS flaws disclosed in 2019 | ICS | Securityaffairs |
21.2.20 | Croatia’s largest petrol station chain INA group hit by ransomware attack | Ransomware | Securityaffairs |
21.2.20 | UK, US and its allies blame Russia’s GRU for 2019 cyber-attacks on Georgia | BigBrothers | Securityaffairs |
21.2.20 | Adobe released out-of-band updates for After Effects and Media Encoder apps | Vulnerebility | Securityaffairs |
21.2.20 | Cisco fixes a static default credential issue in Smart Software Manager tool | Vulnerebility | Securityaffairs |
21.2.20 | Georgia Blames Russia for Cyberattack, US, UK Agree | BigBrothers | Securityweek |
21.2.20 | Cisco Patches Critical Flaw in Smart Licensing Solution | Vulnerebility | Securityweek |
21.2.20 | Over 400 ICS Vulnerabilities Disclosed in 2019: Report | ICS | Securityweek |
21.2.20 | Microsoft Threat Protection Now Generally Available | Safety | Securityweek |
21.2.20 | US, UK Blame Russia for 2019 Cyber Attacks in Georgia | BigBrothers | Securityweek |
21.2.20 | Fidelis Adds Risk Simulation and MITRE ATT&CK Mapping to Elevate Platform | Security | Securityweek |
21.2.20 | Cometdocs Threatens Legal Action Over Disclosure of Security Issues | Security | Securityweek |
21.2.20 | | Security | SANS |
21.2.20 | | Security | Net-security |
21.2.20 | | Congress | Net-security |
21.2.20 | | Vulnerebility | Net-security |
21.2.20 | | Security | Net-security |
20.2.20 | Cybersecurity Research During the Coronavirus Outbreak and After | Cyber | Securelist |
20.2.20 | Personal details of 10.6M MGM Resorts guests leaked online | Incindent | Securityaffairs |
20.2.20 | ZeroFOX Raises $74 Million to Expand Social Media Threat Protection Business | IT | Securityweek |
20.2.20 | CrowdStrike Co-Founder and CTO Steps Down to Launch Nonprofit Policy Accelerator | IT | Securityweek |
20.2.20 | Ring Rolls Out Mandatory 2FA, New Privacy Controls | Safety | Securityweek |
20.2.20 | Scam Alert: You've Been Selected for 'Like of the Year 2020' Cash Prizes | Social Spam | Thehackernews |
20.2.20 | Adobe Patches Critical Bugs Affecting Media Encoder and After Effects | Vulnerebility | Thehackernews |
20.2.20 | | Security | Net-security |
20.2.20 | | Vulnerebility | Threatpost |
20.2.20 | | Spam | Threatpost |
20.2.20 | | BigBrothers | Threatpost |
20.2.20 | | Ransomware | Threatpost |
20.2.20 | | Mobil Virus | Threatpost |
20.2.20 | Hackers are actively exploiting a Zero-Day in WordPress ThemeREX Plugin to create Admin Accounts | Vulnerebility | Securityaffairs |
20.2.20 | DRBControl cyber-espionage group targets gambling, betting companies | CyberSpy | Securityaffairs |
20.2.20 | Trump 'Offered Pardon' to Assange If He Denied Russia Leak, Court Hears | BigBrothers | Securityweek |
20.2.20 | EU Proposes Rules for Artificial Intelligence to Limit Risks | BigBrothers | Securityweek |
20.2.20 | Vulnerable Out of Band Consoles Put Industrial Assets at Risk | Vulnerebility | Securityweek |
20.2.20 | | Security | Net-security |
20.2.20 | | Attack | Net-security |
20.2.20 | | Security | Net-security |
20.2.20 | | Incindent | Net-security |
20.2.20 | Factbook: Healthcare IT practices and cyber preparedness | Cyber | Net-security |
19.2.20 | Uncovering New Magecart Implant Attacking eCommerce | CyberCrime | Securityaffairs |
19.2.20 | 5 Ways artificial intelligence Is Being Used to Keep Sensitive Information Secure | Security | Securityaffairs |
19.2.20 | SentinelOne Achieves Unicorn Status After $200 Million Funding Round | IT | Securityweek |
19.2.20 | WordPress Websites Hacked via Vulnerabilities in Two Themes Plugins | Vulnerebility | Securityweek |
19.2.20 | Google Brings Titan Security Keys to More Countries | Security | Securityweek |
19.2.20 | Huawei Loses Legal Challenge Against US Federal Purchase Ban | BigBrothers | Securityweek |
19.2.20 | ForgePoint Capital Announces $450 Million Cybersecurity Investment Fund | IT | Securityweek |
19.2.20 | Operations at U.S. Natural Gas Facilities Disrupted by Ransomware Attack | Ransomware | Securityweek |
19.2.20 | Ring Makes 2-Factor Authentication Mandatory Following Recent Hacks | Hacking | Thehackernews |
19.2.20 | US Govt Warns Critical Industries After Ransomware Hits Gas Pipeline Facility | BigBrothers Ransomware | Thehackernews |
19.2.20 | | Virus | Net-security |
19.2.20 | | Ransomware | Net-security |
19.2.20 | 2019 Year End Report Vulnerability QuickView | Report | Report |
19.2.20 | AA20-049A : Ransomware Impacting Pipeline Operations | CERT | CERT |
19.2.20 | Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs | Vulnerebility | Threatpost |
19.2.20 | Hacker Scheme Threatens AdSense Customers with Account Suspension | Hacking | Threatpost |
19.2.20 | FC Barcelona Suffers Likely Credential-Stuffing Attack on Twitter | Social | Threatpost |
19.2.20 | Ring Mandates 2FA After Rash of Hacks | Safety | Threatpost |
19.2.20 | Iran-Backed APTs Collaborate on 3-Year ‘Fox Kitten’ Global Spy Campaign | APT BigBrothers | Threatpost |
19.2.20 | Active Exploits Hit Vulnerable WordPress ThemeGrill Plugin | Exploit | Threatpost |
19.2.20 | US CISA warns of Ransomware attacks impacting pipeline operations | BigBrothers Ransomware | Securityaffairs |
19.2.20 | Rise in Malware Using Encryption Shows Importance of Network Traffic Inspection | Virus | Securityweek |
19.2.20 | Google Removes Mideast Android App ToTok | Android | Securityweek |
19.2.20 | Over 22,000 Vulnerabilities Disclosed in 2019: Report | Vulnerebility | Securityweek |
19.2.20 | Dell to Sell RSA Security Unit for $2 Billion | IT | Securityweek |
19.2.20 | | Security | Net-security |
19.2.20 | | Crypto | Net-security |
19.2.20 | | Vulnerebility | Net-security |
19.2.20 | | Attack | Net-security |
19.2.20 | | Analysis Virus | Net-security |
19.2.20 | | Safety | Net-security |
18.2.20 | Unsigned Firmware running on peripherals could expose Windows, Linux systems to hack | Hacking Vulnerebility | Securityaffairs |
18.2.20 | Hacking IoT devices with Focaccia-Board: A Multipurpose Breakout Board to hack hardware in a clean and easy way! | Hacking IoT | Securityaffairs |
18.2.20 | Encryption Firm With NSA Roots Raises $10 Million | IT | Securityweek |
18.2.20 | F-Secure Patches Old AV Bypass Vulnerability | Vulnerebility | Securityweek |
18.2.20 | Egnyte Launches New Content Visibility and Control Platform | IT | Securityweek |
18.2.20 | ExtraHop Expands Enterprise IoT Security Features | IoT | Securityweek |
18.2.20 | Serious Vulnerabilities Expose SonicWall SMA Appliances to Remote Attacks | Vulnerebility | Securityweek |
18.2.20 | Microsoft Trials Election Security Solution in Wisconsin | Security | Securityweek |
18.2.20 | Peripherals With Unsigned Firmware Expose Windows, Linux Computers to Attacks | Attack Vulnerebility | Securityweek |
18.2.20 | Iranian Hackers Exploiting VPN Flaws to Backdoor Organizations Worldwide | BigBrothers Exploit | Thehackernews |
18.2.20 | AZORult spreads as a fake ProtonVPN installer | Virus | Securelist |
18.2.20 | CVE-2019-0604 SharePoint Remote code execution (RCE) vulnerability | Vulnerebility | Securityaffairs |
18.2.20 | Flaw in WordPress ThemeGrill Demo Importer WordPress theme plugin expose 200K+ sites to hack | Vulnerebility | Securityaffairs |
18.2.20 | FC Barcelona and the International Olympic Committee Twitter accounts hacked | Hacking | Securityaffairs |
18.2.20 | Google Axes 500 Chrome Extensions Exfiltrating User Data | Security | Securityweek |
18.2.20 | Trump Threatens Intelligence Block Over Huawei: US Diplomat | BigBrothers | Securityweek |
18.2.20 | Critical Bug in WordPress Theme Plugin Opens 200,000 Sites to Hackers | Vulnerebility | Thehackernews |
18.2.20 | OpenSSH now supports FIDO U2F security keys for 2-factor authentication | Safety | Thehackernews |
18.2.20 | | OS | SANS |
18.2.20 | | Cyber | Net-security |
18.2.20 | | Congress | Net-security |
18.2.20 | | Cyber | Net-security |
18.2.20 | | Security | Net-security |
18.2.20 | | Cyber | Net-security |
17.2.20 | Russian govn blocked Tutanota service in Russia to stop encrypted communication | BigBrothers | Securityaffairs |
17.2.20 | Launching the First “Yomi Hunting” Challenge! | Security | Securityaffairs |
17.2.20 | Cyberwarfare: A deep dive into the latest Gamaredon Espionage Campaign | BigBrothers | Securityaffairs |
17.2.20 | IDF soldiers tricked into installing malicious apps by Hamas operatives posing as attractive women | BigBrothers | Securityaffairs |
17.2.20 | Flaw in WordPress Themes Plugin Allowed Hackers to Become Site Admin | Vulnerebility | Securityweek |
17.2.20 | Iranian Hackers Exploited Enterprise VPN Flaws in Major Campaign | BigBrothers | Securityweek |
17.2.20 | Smartphone Voting Stirs Interest -- and Security Fears | BigBrothers Mobil | Securityweek |
17.2.20 | Microsoft Pulls UEFI-Related Windows Update After Users Report Problems | Vulnerebility | Securityweek |
17.2.20 | A Dozen Vulnerabilities Affect Millions of Bluetooth LE Powered Devices | Vulnerebility | Thehackernews |
17.2.20 | Fox Kitten Campaign – Iranian hackers exploit 1-day VPN flaws in attacks | BigBrothers | Securityaffairs |
17.2.20 | US administration requests $9.8B for cyber 2021 budget for the Department of Defense | BigBrothers | Securityaffairs |
17.2.20 | Organizers of major hacking conferences in Asia put them on hold due to Coronavirus outbreak | Hacking | Securityaffairs |
17.2.20 | IOTA cryptocurrency shuts down entire network after a coordinated attack on its Trinity wallet | Cryptocurrency | Securityaffairs |
17.2.20 | Israeli Army: Hamas Hackers Tried to ‘Seduce’ Soldiers | BigBrothers | Securityweek |
17.2.20 | | Social | Net-security |
17.2.20 | | Security | Net-security |
17.2.20 | | Security | Net-security |
17.2.20 | | Security | Net-security |
17.2.20 | | Security | SANS |
16.2.20 | Microsoft Confirms Windows 10 KB4524244 Issues and Pulls the Update | OS | Bleepingcomputer |
16.2.20 | IRS Urges Taxpayers to Enable Multi-Factor Authentication | Spam | Bleepingcomputer |
16.2.20 | Windows Terminal 0.9 Released with Command Line Arguments and More | OS | Bleepingcomputer |
16.2.20 | Plastic Surgery Patient Photos, Info Exposed by Leaky Database | Incindent | Bleepingcomputer |
16.2.20 | Mobile Phishing Campaign Uses over 200 Pages to Spoof Bank Sites | Phishing | Bleepingcomputer |
16.2.20 | US Govt Updates Info on North Korean Malware | BigBrothers | Bleepingcomputer |
16.2.20 | Tech Conferences in Asia On Hold Due To Coronavirus Outbreak | Virus | Bleepingcomputer |
16.2.20 | Windows 10 KB4524244 Update Causes Freezes, Installation Issues | OS | Bleepingcomputer |
16.2.20 | U.S. Store Chain Rutter’s Hit by Credit Card Stealing Malware | Virus | Bleepingcomputer |
16.2.20 | Parallax RAT: Common Malware Payload After Hacker Forums Promotion | Virus | Bleepingcomputer |
16.2.20 | Helix Bitcoin Mixer Owner Charged for Laundering Over $310 Million | Cryptocurrency | Bleepingcomputer |
16.2.20 | US Charges Huawei With Conspiracy to Steal Trade Secrets, Racketeering | BigBrothers | Bleepingcomputer |
16.2.20 | Sextortion Emails Sent by Emotet Earn 10 Times More Than Necurs | Virus | Bleepingcomputer |
16.2.20 | Mozilla Firefox to Support Chrome's Image Lazy Loading Feature | Security | Bleepingcomputer |
16.2.20 | SweynTooth Bug Collection Affects Hundreds of Bluetooth Products | Vulnerebility | Bleepingcomputer |
16.2.20 | Ransom News | Ransom | Ransom |
16.2.20 | 7 Factors to Consider When Evaluating Endpoint Protection Solutions | Safety blog | Sonicwall |
16.2.20 | A tale of two phishes: coronavirus safety and W-9 forms | Malware blog | Avast blog |
16.2.20 | Wireshark Tutorial: Examining Qakbot Infections | Malware blog | Palo Alto Unity42 |
16.2.20 | Unit 42 CTR: Leaked Code from Docker Registries | Incident blog | Palo Alto Unity42 |
16.2.20 | Unit 42 CTR: Sensitive Data Exposed in GitHub | Incident blog | Palo Alto Unity42 |
16.2.20 | Securing the Software Development Supply Chain | Cyber blog | Palo Alto |
16.2.20 | Tapping the True Potential of the 5G Digital Economy | Cyber blog | Palo Alto |
16.2.20 | Holistic SDN Security Makes Security Comprehensive Everywhere | Cyber blog | Palo Alto |
16.2.20 | Cloud Native Security Beyond Your Vendor’s Tools | Cyber blog | Palo Alto |
16.2.20 | Palo Alto Networks Executives Recognized as CRN Channel Chiefs | Cyber blog | Palo Alto |
16.2.20 | The Future of the Cloud Native Security Platform: Q&A with John Morell... | Cyber blog | Palo Alto |
16.2.20 | Announcing Cortex XDR Managed Threat Hunting Service And New XDR Features | Cyber blog | Palo Alto |
16.2.20 | Windows 10 KB4532693 Update Bug Hides User Data, Loads Wrong Profile | OS | Bleepingcomputer |
16.2.20 | Windows 10 Insider Build 19564 Released With New Calendar App, GPU Settings | OS | Bleepingcomputer |
16.2.20 | WordPress Cookie Consent Plugin Fixes Critical Flaw for 700K Users | Vulnerebility | Bleepingcomputer |
16.2.20 | Microsoft Urges Exchange Admins to Disable SMBv1 to Block Malware | Safety Virus | Bleepingcomputer |
16.2.20 | Microsoft Posts Updated Dev Roadmap for the Edge Browser | OS | Bleepingcomputer |
16.2.20 | Office 365 Users Get Automated Protection From Malicious Docs | Virus | Bleepingcomputer |
16.2.20 | Google Play Protect Blocked 1.9 Billion Malware Installs in 2019 | Android | Bleepingcomputer |
16.2.20 | BEC Fraud Profits from Gift Cards, Down 63% Over Holidays | CyberCrime | Bleepingcomputer |
16.2.20 | Microsoft Releases February 2020 Office Updates With Security Fixes | Vulnerebility | Bleepingcomputer |
16.2.20 | Amex, Chase Fraud Protection Emails Used as Clever Phishing Lure | Phishing | Bleepingcomputer |
16.2.20 | FBI: Cybercrime Victims Lost $3.5 Billion in 2019 | CyberCrime | Bleepingcomputer |
16.2.20 | Microsoft Patches Actively Exploited Internet Explorer Zero-Day | Vulnerebility | Bleepingcomputer |
16.2.20 | Microsoft's February 2020 Patch Tuesday Fixes 99 Flaws, IE 0day | Vulnerebility | Bleepingcomputer |
16.2.20 | Windows 10 Cumulative Updates KB4532693 & KB4532691 Released | Vulnerebility | Bleepingcomputer |
16.2.20 | Adobe Releases the February 2020 Security Updates | Vulnerebility | Bleepingcomputer |
16.2.20 | NextMotion plastic surgery tech firm data leak | Incindent | Securityaffairs |
16.2.20 | SweynTooth Bluetooth flaws affect devices from major system-on-a-chip (SoC) vendors | Vulnerebility | Securityaffairs |
16.2.20 | The cyber attack against Austria’s foreign ministry has ended | BigBrothers | Securityaffairs |
16.2.20 | USCYBERCOM Shares More North Korean Malware Samples | BigBrothers | Securityweek |
15.2.20 | Microsoft Backpedals on Forcing Bing Search for Office 365 Users | OS | Bleepingcomputer |
15.2.20 | Microsoft Reveals More Windows 10X Details, Here's What we Know | OS | Bleepingcomputer |
15.2.20 | Google Removes Dashlane Password Manager from Chrome Web Store | Security | Bleepingcomputer |
15.2.20 | FTC Warns of Ongoing Scams Using Coronavirus Bait | BigBrothers | Bleepingcomputer |
15.2.20 | Firefox 73 Released With Security Fixes, New DoH Provider, More | Vulnerebility | Bleepingcomputer |
15.2.20 | SoundCloud Fixed API Flaws That Could Lead to Account Takeover | Vulnerebility | Bleepingcomputer |
15.2.20 | StockX Adds 2-Step Verification for Better Security, Enable Now | Security | Bleepingcomputer |
15.2.20 | Dell SupportAssist Bug Exposes Business, Home PCs to Attacks | Vulnerebility | Bleepingcomputer |
15.2.20 | Windows Server 2008 Servers Don’t Boot After KB4539602 Update | OS | Bleepingcomputer |
15.2.20 | Ragnar Locker Ransomware Targets MSP Enterprise Support Tools | Ransomware | Bleepingcomputer |
15.2.20 | U.S. Charges Chinese Military Hackers for Equifax Breach | BigBrothers | Bleepingcomputer |
15.2.20 | Improve Your Windows 10 PC With These Free Apps | OS | Bleepingcomputer |
15.2.20 | NEW CYBER ESPIONAGE CAMPAIGNS TARGETING PALESTINIANS - PART 2: THE DISCOVERY OF THE NEW, MYSTERIOUS PIEROGI BACKDOOR | BigBrother blog | Cybereason |
15.2.20 | NEW CYBER ESPIONAGE CAMPAIGNS TARGETING PALESTINIANS - PART 1: THE SPARK CAMPAIGN | BigBrother blog | Cybereason |
15.2.20 | Knock, Knock – Who’s There? | Security blog | Mcafee blog |
15.2.20 | How Chinese Cybercriminals Use Business Playbook to Revamp Underground | BigBrother blog | Mcafee blog |
15.2.20 | Intelligence in the Enterprise | Security blog | Mcafee blog |
15.2.20 | Are Gen Z-ers More Security Savvy Online than Millennials? | Security blog | F5 Labs |
15.2.20 | Prioritizing Vulnerability Management Using Machine Learning | Security blog | F5 Labs |
15.2.20 | Top Attacks Against Service Providers 2017-2019 | Attack blog | F5 Labs |
15.2.20 | "Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests | BigBrother blog | F5 Labs |
15.2.20 | Managed Defense: The Analytical Mindset | Security blog | F5 Labs |
15.2.20 | A day^W^W Several months in the life of Project Zero - Part 2: The Chrome exploit of suffering | Exploit blog | Project Zero |
15.2.20 | A day^W^W Several months in the life of Project Zero - Part 1: The Chrome bug of suffering | Exploit blog | Project Zero |
15.2.20 | Mitigations are attack surface, too | Exploit blog | Project Zero |
15.2.20 | Threat actors attempt to capitalize on coronavirus outbreak | Security blog | Cisco Talos |
15.2.20 | Loda RAT Grows Up | Malware blog | Cisco Talos |
15.2.20 | Vulnerability Spotlight: Remote code execution vulnerability in Apple Safari | Vulnerebility blog | Cisco Talos |
15.2.20 | Vulnerability Spotlight: Use-after-free vulnerability in Windows 10 win32kbase | Vulnerebility blog | Cisco Talos |
15.2.20 | Vulnerability Spotlight: Code execution vulnerability in Microsoft Media Foundation | Vulnerebility blog | Cisco Talos |
15.2.20 | Vulnerability Spotlight: Code execution vulnerability in Microsoft Excel | Vulnerebility blog | Cisco Talos |
15.2.20 | Microsoft Patch Tuesday — Feb. 2020: Vulnerability disclosures and Snort coverage | Vulnerebility blog | Cisco Talos |
15.2.20 | Vulnerability Spotlight: Information leak vulnerability in Adobe Acrobat Reader’s JavaScript function | Vulnerebility blog | Cisco Talos |
15.2.20 | Introducing Cisco Talos Incident Response: Stories from the Field | Security blog | Cisco Talos |
15.2.20 | Vulnerability Spotlight: Accusoft ImageGear library code execution vulnerabilities | Vulnerebility blog | Cisco Talos |
15.2.20 | PayPal remains the most‑spoofed brand in phishing scams | Phishing blog | Eset |
15.2.20 | How romance scammers break your heart – and your bank account | Spam blog | Eset |
15.2.20 | FBI: Cybercrime losses tripled over the last 5 years | Cyber blog | Eset |
15.2.20 | Almost 2 billion malware installs thwarted by Google Play Protect in 2019 | Malware blog | Eset |
15.2.20 | Digital addiction: How to get your children off their screens | Cyber blog | Eset |
15.2.20 | Microsoft Patch Tuesday fixes IE zero‑day and 98 other flaws | Vulnerebility blog | Eset |
15.2.20 | Competing in esports: 3 things to watch out for | Cyber blog | Eset |
15.2.20 | AR20-045E : MAR-10271944-2.v1 – North Korean Trojan: ARTFULPIE | CERT Analysy | CERT Analysy |
15.2.20 | AR20-045D : MAR-10271944-1.v1 – North Korean Trojan: HOTCROISSANT | CERT Analysy | CERT Analysy |
15.2.20 | AR20-045C : MAR-10265965-3.v1 – North Korean Trojan: CROWDEDFLOUNDER | CERT Analysy | CERT Analysy |
15.2.20 | AR20–045B : MAR-10265965-2.v1 – North Korean Trojan: SLICKSHOES | CERT Analysy | CERT Analysy |
15.2.20 | AR20-045A : MAR-10265965-1.v1 – North Korean Trojan: BISTROMATH | CERT Analysy | CERT Analysy |
15.2.20 | AR20-045F : MAR-10271944-3.v1 – North Korean Trojan: BUFFETLINE | CERT Analysy | CERT Analysy |
15.2.20 | AR19-304A : MAR-10135536-8 – North Korean Trojan: HOPLIGHT | CERT Analysy | CERT Analysy |
15.2.20 | Hackers Can Seize Control of Ballots Cast Using the Voatz Voting App, Researchers Say | Hacking | Threatpost |
15.2.20 | SMS Phishing Campaign Targets Mobile Bank App Users in North America | Mobil Phishing | Threatpost |
15.2.20 | Apple iPhone Users Targeted with Bogus Dating App for Valentine’s Day | Apple | Threatpost |
15.2.20 | News Wrap: Valentine’s Day Scams and Emotet’s Wi-Fi Hack | Security | Threatpost |
15.2.20 | Huawei Controversy Highlights 5G Security Implications | BigBrothers Mobil | Threatpost |
15.2.20 | 500 Malicious Chrome Extensions Impact Millions of Users | Virus | Threatpost |
15.2.20 | US Govt agencies detail North Korea-linked HIDDEN COBRA malware | BigBrothers | Securityaffairs |
15.2.20 | Russian watchdog fines Twitter, Facebook for not moving user data to local servers | BigBrothers Social | Securityaffairs |
15.2.20 | 3 Employees Suspended in $4M Puerto Rico Online Scam | Spam | Securityweek |
15.2.20 | SweynTooth: Bluetooth Vulnerabilities Expose Many Devices to Attacks | Attack Vulnerebility | Securityweek |
15.2.20 | Many Upstream Oil and Gas Companies Invested in Cybersecurity in 2019: Survey | Cyber | Securityweek |
14.2.20 | Nedbank client data compromised in security breach at third-party provider | Incindent | Securityaffairs |
14.2.20 | PoS malware infected systems at 71 locations operated by US store chain Rutter’s | Virus | Securityaffairs |
14.2.20 | Facebook Spars With EU Regulator Over Dating App Delay | Social | Securityweek |
14.2.20 | Over 70 Rutter's Stores Hit by Payment Card Breach | Incindent | Securityweek |
14.2.20 | MIT Researchers Find Vulnerabilities in Voatz Voting App | Vulnerebility | Securityweek |
14.2.20 | Twitter, Facebook Fined for Not Moving User Data to Russia | Social | Securityweek |
14.2.20 | Microsoft Brings Safe Documents, Application Guard to More 365 ProPlus Users | Security | Securityweek |
14.2.20 | Official: Puerto Rico Govt Loses $2.6M in Phishing Scam | Phishing | Securityweek |
14.2.20 | U.S. Charges Huawei with Stealing Trade Secrets from 6 Companies | BigBrothers | Thehackernews |
14.2.20 | 500 Chrome Extensions Caught Stealing Private Data of 1.7 Million Users | Incindent | Thehackernews |
14.2.20 | Puerto Rico Gov Hit By $2.6M Phishing Scam | Phishing | Threatpost |
14.2.20 | Privacy Experts Skeptical of Proposed Data Protection Agency | Privacy | Threatpost |
14.2.20 | Critical WordPress Plugin Bug Afflicts 700K Sites | Vulnerebility | Threatpost |
14.2.20 | Google: Efforts Against Bad Android Apps on Play Store Are Working | Android | Threatpost |
14.2.20 | Helix Bitcoin Mixer operator charged for laundering over $300M worth of Bitcoin | Cryptocurrency | Securityaffairs |
14.2.20 | Three Italian universities hacked by LulzSec_ITA collective | Hacking | Securityaffairs |
14.2.20 | Huawei Hit With New US Charges of Trade Secrets Theft | BigBrothers | Securityweek |
14.2.20 | New Backdoor Attacks Leverage Political Turmoil in Middle East | Virus | Securityweek |
14.2.20 | Profinet Vulnerability Exposes Siemens, Moxa Devices to DoS Attacks | Attack Vulnerebility | Securityweek |
14.2.20 | | Security | SANS |
14.2.20 | | Cyber | Net-security |
14.2.20 | | Security | Net-security |
14.2.20 | | Security | Net-security |
14.2.20 | | Security | Net-security |
13.2.20 | MoleRATs APT group targets Palestinian territories | APT | Securityaffairs |
13.2.20 | US officials claim Huawei Equipment has secret backdoor for spying | BigBrothers | Securityaffairs |
13.2.20 | Google: Protections Added by Samsung to Android Kernel Increase Attack Surface | Android Attack | Securityweek |
13.2.20 | Threat Intelligence Company Sixgill Raises $15 Million | IT | Securityweek |
13.2.20 | Threat From Spoofed Emails Grows, While DMARC Implementation Lags | Spam | Securityweek |
13.2.20 | Google Play Protect prevented 1.9 billion malware installs from Third-party stores in 2019 | Android | Securityaffairs |
13.2.20 | WhatsApp Defends Encryption as It Tops 2 Billion Users | Social | Securityweek |
13.2.20 | Facebook Removes More State-Linked Misleading Accounts | Social | Securityweek |
13.2.20 | SOC-as-a-Service Company Cysiv Raises $26 Million | IT | Securityweek |
13.2.20 | 2020 State of Malware Report | Report | Report |
13.2.20 | 2020 SONICWALL CYBER THREAT REPORT | Report | Report |
13.2.20 | DDoS attacks in Q4 2019 | Attack | Securelist |
13.2.20 | 600+ installs of WordPress Cookie Consent Plugin vulnerable to hack. Fix it now! | Vulnerebility | Securityaffairs |
13.2.20 | Microsoft recommends Exchange admins to disable the SMBv1 protocol | Safety | Securityaffairs |
13.2.20 | White House Claims Huawei Equipment Has Backdoor for Spying | BigBrothers | Securityweek |
13.2.20 | | CyberCrime | Threatpost |
13.2.20 | | Attack | Threatpost |
13.2.20 | | Attack | Threatpost |
13.2.20 | | Security | Threatpost |
13.2.20 | | Vulnerebility | Threatpost |
13.2.20 | | Vulnerebility | Threatpost |
13.2.20 | | Incindent | Threatpost |
13.2.20 | | Vulnerebility | Threatpost |
13.2.20 | | Vulnerebility | Threatpost |
13.2.20 | 2019 INTERNET CRIME REPORT | Report | Report |
13.2.20 | IBM ServeRAID Manager exposes unauthenticated Java Remote Method Invocation (RMI) service | Alert | Alert |
13.2.20 | Siemens fixed multiple DoS flaws in several products | ICS | Securityaffairs |
13.2.20 | SAP Releases 13 Security Notes on February 2020 Patch Day | Vulnerebility | Securityweek |
13.2.20 | Google Play Protect Scans 100 Billion Android Apps Daily | Android | Securityweek |
13.2.20 | Emotet Malware Now Hacks Nearby Wi-Fi Networks to Infect New Victims | Virus | Thehackernews |
13.2.20 | | Vulnerebility | SANS |
13.2.20 | | Security | Net-security |
13.2.20 | | Security | Net-security |
13.2.20 | | Cryptocurrency | Net-security |
13.2.20 | | Security | Net-security |
13.2.20 | | Security | Net-security |
13.2.20 | | Security | Net-security |
13.2.20 | | CyberCrime | Net-security |
12.2.20 | Reading the 2019 Internet Crime Complaint Center (IC3) report | CyberCrime | Securityaffairs |
12.2.20 | Crypto AG was spied for US, German intelligence agencies for decades | BigBrothers | Securityaffairs |
12.2.20 | Microsoft Patch Tuesday updates for February 2020 fix IE 0day flaw | Vulnerebility | Securityaffairs |
12.2.20 | 440M records found online in unprotected database belonging to Estée Lauder | Incindent | Securityaffairs |
12.2.20 | Apple Joins FIDO Alliance | Apple | Securityweek |
12.2.20 | Siemens Patches Serious DoS Vulnerabilities in Several Products | ICS | Securityweek |
12.2.20 | Randori Arms Red Teams With New Automated Attack Platform | Attack | Securityweek |
12.2.20 | BEC Losses Surpassed $1.7 Billion in 2019: FBI | Spam Incindent | Securityweek |
12.2.20 | Over 15.1 Billion Records Exposed in Data Breaches in 2019 | Incindent | Securityweek |
12.2.20 | KBOT Malware Shows Viruses Are Not Extinct | Virus | Securityweek |
12.2.20 | Deep Instinct Raises $43 Million in Series C Funding Round | IT | Securityweek |
12.2.20 | Emotet Malware Now Hacks Nearby Wi-Fi Networks to Infect New Victims | Virus | Securityweek |
12.2.20 | Adobe addresses 42 flaws in its five products | Vulnerebility | Securityaffairs |
12.2.20 | OT attacks increased by over 2000 percent in 2019, IBM reports | Attack ICS | Securityaffairs |
12.2.20 | Coronavirus-Themed Emails Deliver Malware, Phishing, Scams | Phishing Spam Virus | Securityweek |
12.2.20 | Beauty and the Breach: Estée Lauder Exposes 440 Million Records in Unprotected Database | Incindent | Securityweek |
12.2.20 | Switzerland Investigating Alleged CIA, German Front Company | BigBrothers | Securityweek |
12.2.20 | Microsoft Patches IE Zero-Day, 98 Other Vulnerabilities | Vulnerebility | Securityweek |
12.2.20 | US, German Spies Plundered Global Secrets Via Swiss Encryption Firm: Report | BigBrothers | Securityweek |
12.2.20 | Equifax Breach is the Latest of Many Hacks Linked to China | BigBrothers Incindent | Securityweek |
12.2.20 | Adobe Patches 42 Vulnerabilities Across Five Products | Vulnerebility | Securityweek |
12.2.20 | Update Microsoft Windows Systems to Patch 99 New Security Flaws | Vulnerebility | Thehackernews |
12.2.20 | Adobe Releases Patches for Dozens of Critical Flaws in 5 Software | Vulnerebility | Thehackernews |
12.2.20 | | Spam | SANS |
12.2.20 | | Virus | Net-security |
12.2.20 | | Security | Net-security |
12.2.20 | | Apple | Net-security |
12.2.20 | | Attack | Net-security |
12.2.20 | | Security | Net-security |
12.2.20 | | Security | Net-security |
12.2.20 | | Vulnerebility | Net-security |
11.2.20 | Dell SupportAssist flaw exposes computers to hack, patch it asap! | Vulnerebility | Securityaffairs |
11.2.20 | Safer internet day – Cybercrime facts Infographic | CyberCrime | Securityaffairs |
11.2.20 | Flaws in Accusoft ImageGear Expose Users to Remote Attacks | Vulnerebility | Securityweek |
11.2.20 | Another Flaw in Dell SupportAssist Allows Code Execution With Elevated Privileges | Vulnerebility | Securityweek |
11.2.20 | Firefox 74 Will Disable TLS 1.0 and TLS 1.1 by Default | Safety | Securityweek |
11.2.20 | Echobot Malware Drives Significant Increase in OT Attacks | Virus | Securityweek |
11.2.20 | App Used by Israel's Ruling Party Leaked Personal Data of All 6.5 Million Voters | BigBrothers | Thehackernews |
11.2.20 | | Attack Phishing | Net-security |
11.2.20 | | Attack | Net-security |
11.2.20 | South Korean Woori Bank is accused of unauthorized use of customer data | Incindent | Securityaffairs |
11.2.20 | The Altsbit exchange will exit in May following a hack | Hacking | Securityaffairs |
11.2.20 | China Denies U.S. Allegations Over Military 'Hackers' | BigBrothers | Securityweek |
11.2.20 | Emotet Now Hacks Nearby Wi-Fi Networks to Spread Like a Worm | Virus | Threatpost |
11.2.20 | Docker Registries Expose Hundreds of Orgs to Malware, Data Theft | Incindent Virus | Threatpost |
11.2.20 | BYO-Bug Tactic Attacks Windows Kernel with Outdated Driver | Attack | Threatpost |
11.2.20 | Active PayPal Phishing Scam Targets SSNs, Passport Photos | Phishing | Threatpost |
11.2.20 | Equifax Breach: Four Members of Chinese Military Charged with Hacking | Incindent | Threatpost |
11.2.20 | Chinese Military personnel charged with hacking into credit reporting agency Equifax | BigBrothers | Securityaffairs |
11.2.20 | Unique Illinois Privacy Law Leads to $550M Facebook Deal | Social | Securityweek |
11.2.20 | Chinese Military Stole Masses of Americans’ Data, US Says | BigBrothers | Securityweek |
11.2.20 | Misconfigured Docker Registries Expose Thousands of Repositories | Incindent | Securityweek |
11.2.20 | | Security | Net-security |
11.2.20 | | Incindent | Net-security |
11.2.20 | | Security | Net-security |
11.2.20 | | Security | Net-security |
11.2.20 | | Ransomware | Net-security |
10.2.20 | U.S. Charges 4 Chinese Military Hackers Over Equifax Data Breach | BigBrothers | Thehackernews |
10.2.20 | Netanyahu’s party Elector app exposes data on over 6.5M Israelis | BigBrothers Social | Securityaffairs |
10.2.20 | Presidential Candidates' Use of DMARC Improves, but Remains Short of Optimum | BigBrothers | Securityweek |
10.2.20 | Ransomware Hits North Miami Beach Police Department | Ransomware | Securityweek |
10.2.20 | Chinese Military Hackers Charged Over Equifax Data Breach | BigBrothers Incindent | Securityweek |
10.2.20 | Netherlands University Pays $240,000 After Targeted Ransomware Attack | Ransomware | Securityweek |
10.2.20 | Facebook Paid $2.2 Million in Bug Bounty Rewards in 2019 | Social | Securityweek |
10.2.20 | KBOT: sometimes they come back | Virus | Securelist |
10.2.20 | 1.2 million CPR numbers for Danish citizen leaked through tax service | Incindent | Securityaffairs |
10.2.20 | A sad story of pedophilia on how disgusting images fed the web | BigBrothers Cyber | Securityaffairs |
10.2.20 | Malaysia’s MyCERT warns cyber espionage campaign carried out by APT40 | BigBrothers | Securityaffairs |
10.2.20 | A cyber-attack on major banks could trigger a liquidity crisis, ECB President Christine Lagarde warns | Attack BigBrothers | Securityaffairs |
10.2.20 | Israel's Likud Party Exposed Details of Over 6 Million Voters | BigBrothers | Securityweek |
10.2.20 | Facebook's Twitter, Instagram Accounts Hacked | Social | Securityweek |
10.2.20 | | Security | Net-security |
10.2.20 | | Attack | Net-security |
10.2.20 | | Phishing | SANS |
10.2.20 | Massive DDoS attack brought down 25% Iranian Internet connectivity | Attack | Securityaffairs |
10.2.20 | The number of cyber attacks on Saudi Aramco is increasing | Attack | Securityaffairs |
10.2.20 | Maastricht University finally paid a 30 bitcoin ransom to crooks | Ransomware | Securityaffairs |
10.2.20 | Iran Says Foils Cyberattack Targeting Internet Providers | BigBrothers | Securityweek |
10.2.20 | | Cyber | Net-security |
10.2.20 | | BigBrothers | Net-security |
10.2.20 | | Security | Net-security |
10.2.20 | | Security | Net-security |
9.2.20 | Windows 10 Start Menu Suggests Firefox Users Switch to Edge | OS | Bleepingcomputer |
9.2.20 | Microsoft’s Surface Duo Spotted in the Wild, Video Leaked | OS | Bleepingcomputer |
9.2.20 | Lock My PC Used By Tech Support Scammers, Dev Offers Free Recovery | Spam | Bleepingcomputer |
9.2.20 | Windows 7 Users Suddenly Can't Shut Down Their PCs, How to Fix | OS | Bleepingcomputer |
9.2.20 | Twitter Outage Prevents Users From Sending New Tweets | Social | Bleepingcomputer |
9.2.20 | TA505 Hackers Behind Maastricht University Ransomware Attack | Ransomware | Bleepingcomputer |
9.2.20 | Microsoft Releases Windows 7 Update to Fix Wallpaper Bug | OS | Bleepingcomputer |
9.2.20 | Misconfigured Docker Registries Expose Orgs to Critical Risks | Incindent | Bleepingcomputer |
9.2.20 | Emotet Hacks Nearby Wi-Fi Networks to Spread to New Victims | Virus | Bleepingcomputer |
9.2.20 | Critical Android Bluetooth Flaw Exploitable without User Interaction | Android | Bleepingcomputer |
9.2.20 | Japanese Defense Contractors Kobe Steel, Pasco Disclose Breaches | BigBrothers Incindent | Bleepingcomputer |
9.2.20 | Google Chrome to Block Mixed Content Downloads, Prevents MiTM Attacks | Attack | Bleepingcomputer |
9.2.20 | Phishing Attack Disables Google Play Protect, Drops Anubis Trojan | Android Phishing | Bleepingcomputer |
9.2.20 | DoJ Asks Victims of the Quantum DDoS Service to Come Forward | BigBrothers | Bleepingcomputer |
9.2.20 | Ransomware Exploits GIGABYTE Driver to Kill AV Processes | Ransomware | Bleepingcomputer |
9.2.20 | Oscar Nominated Movies Featured in Phishing, Malware Attacks | Phishing Virus | Bleepingcomputer |
9.2.20 | BEC Scammers’ Interest in the Real Estate Sector Rises | Spam | Bleepingcomputer |
9.2.20 | Bug in Philips Smart Light Allows Hopping to Devices on the Network | Vulnerebility | Bleepingcomputer |
9.2.20 | Medicaid CCO Vendor Breach Exposes Health, Personal Info of 654K | Incindent | Bleepingcomputer |
9.2.20 | Mailto (NetWalker) Ransomware Targets Enterprise Networks | Ransomware | Bleepingcomputer |
9.2.20 | Ransom News | Ransom | Ransom |
9.2.20 | Cisco Patches Critical CDP Flaws Affecting Millions of Devices | Vulnerebility | Bleepingcomputer |
9.2.20 | Microsoft Starts Testing Hyper-V for Windows 10 ARM64 Devices | OS | Bleepingcomputer |
9.2.20 | Charming Kitten Hackers Impersonate Journalist in Phishing Attacks | Phishing | Bleepingcomputer |
9.2.20 | New Ransomware Strain Halts Toll Group Deliveries | Ransomware | Bleepingcomputer |
9.2.20 | Windows 10 Search Is Broken and Shows Blank Results, How to Fix | OS | Bleepingcomputer |
9.2.20 | Bitbucket Abused to Infect 500,000+ Hosts with Malware Cocktail | Virus | Bleepingcomputer |
9.2.20 | Realtek Fixes DLL Hijacking Flaw in HD Audio Driver for Windows | Hacking Vulnerebility | Bleepingcomputer |
9.2.20 | Chrome 80 Released With 56 Security Fixes, Cookie Changes, More | Vulnerebility | Bleepingcomputer |
9.2.20 | Emotet Gets Ready for Tax Season With Malicious W-9 Forms | Virus | Bleepingcomputer |
9.2.20 | FBI Warns of DDoS Attack on State Voter Registration Site | Attack BigBrothers | Bleepingcomputer |
9.2.20 | WhatsApp Bug Allowed Attackers to Access the Local File System | Social Vulnerebility | Bleepingcomputer |
9.2.20 | Google Bug Sent Private Google Photos Videos to Other Users | Vulnerebility | Bleepingcomputer |
9.2.20 | Inside Cybercriminal Inc.: SonicWall Exposes New Cyberattack Data, Threat Actor Behaviors in Latest Report | Cyber blog | Sonicwall |
9.2.20 | Unit 42 Cloud Threat Report: Spring 2020 | Cyber blog | Palo Alto Unity42 |
9.2.20 | Unit 42 CTR: Leaked Code from Docker Registries | Cyber blog | Palo Alto Unity42 |
9.2.20 | Unit 42 CTR: Sensitive Data Exposed in GitHub | Cyber blog | Palo Alto Unity42 |
9.2.20 | Actors Still Exploiting SharePoint Vulnerability to Attack Middle East Government Organizations | Vulnerebility blog | Palo Alto Unity42 |
9.2.20 | The Cloud’s Sunny Future: The Rewards of Working in Cloud Security | Cyber blog | Palo Alto |
9.2.20 | Announcing Cortex XDR Managed Threat Hunting Service And New XDR Features | Cyber blog | Palo Alto |
9.2.20 | The Road to 100 on the HRC’s 2020 Corporate Equality Index | Cyber blog | Palo Alto |
9.2.20 | Book Review: “The Fifth Domain” | Cyber blog | Palo Alto |
9.2.20 | Cyborgs, Trolls and Bots: A Guide to Online Misinformation | BotNet | Securityweek |
9.2.20 | IoT devices at major Manufacturers infected with crypto-miner | Cryptocurrency IoT | Securityaffairs |
9.2.20 | Facebook’s official Twitter and Instagram accounts hacked by OurMine | Social | Securityaffairs |
9.2.20 | Group-IB detects Half a Million Indian Banks’ Cards on Joker’s Stash Cardshop | CyberCrime | Securityaffairs |
8.2.20 | Office 365 to Block Harmful Content Regardless of Custom Configs | Security | Bleepingcomputer |
8.2.20 | New EmoCheck Tool Checks if You're Infected With Emotet | Virus | Bleepingcomputer |
8.2.20 | Twitter Fixed Issue Exploited to Match Phone Numbers to Accounts | Social | Bleepingcomputer |
8.2.20 | Nintendo Hacker Pleads Guilty to Child Porn Charges, Faces 25 Years | IT | Bleepingcomputer |
8.2.20 | Bouygues Construction Shuts Down Network to Thwart Maze Ransomware | Ransomware | Bleepingcomputer |
8.2.20 | DoD to Require Cybersecurity Certification From Defense Contractors | BigBrothers | Bleepingcomputer |
8.2.20 | DoppelPaymer Ransomware Sells Victims' Data on Darknet if Not Paid | Ransomware | Bleepingcomputer |
8.2.20 | 'Hack' Creates Fake Google Maps Traffic Jams With 99 Cell Phones | Mobil | Bleepingcomputer |
8.2.20 | 38,000 Flash Games Archived for Offline Play and Preservation | IT | Bleepingcomputer |
8.2.20 | Notepad and Paint Become Optional Features in Windows 10 | OS | Bleepingcomputer |
8.2.20 | Tech Support Scam Hitting Microsoft Edge Start Page Takes a Break | Spam | Bleepingcomputer |
8.2.20 | Pirated Software is All Fun and Games Until Your Data’s Stolen | Hacking | Bleepingcomputer |
8.2.20 | THE HOLE IN THE BUCKET: ATTACKERS ABUSE BITBUCKET TO DELIVER AN ARSENAL OF MALWARE | Malware blog | Cybereason |
8.2.20 | U.S. Battleground County Website Security Survey | BigBrother blog | Mcafee blog |
8.2.20 | Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in December 2019 | Security blog | F5 Labs |
8.2.20 | STOMP 2 DIS: Brilliance in the (Visual) Basics | Malware blog | FireEye |
8.2.20 | Quarterly Report: Incident Response trends in fall 2019 | Incident blog | Cisco Talos |
8.2.20 | Vulnerability Spotlight: Denial-of-service, information leak bugs in Mini-SNMPD | Vulnerebility blog | Cisco Talos |
8.2.20 | Critical Bluetooth bug leaves Android users open to attack | OS Blog Vulnerebility blog | Eset |
8.2.20 | Facebook now lets parents monitor their children’s chats | Social blog | Eset |
8.2.20 | How to catch a cybercriminal: Tales from the digital forensics lab | Cyber blog | Eset |
8.2.20 | Electric scooters vulnerable to remote hacks | Vulnerebility blog | Eset |
8.2.20 | Facebook privacy settings: Protect your data with these tips | Social blog | Eset |
8.2.20 | Would you get hooked by a phishing scam? Test yourself | Phishing blog | Eset |
8.2.20 | Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANs | Vulnerebility | Threatpost |
8.2.20 | Magecart Gang Attacks Olympic Ticket Reseller and Survival Food Sites | CyberCrime | Threatpost |
8.2.20 | Google Chrome To Bar HTTP File Downloads | Security | Threatpost |
8.2.20 | Phishing Campaign Targets 250 Android Apps with Anubis Malware | Android Phishing | Threatpost |
8.2.20 | Wacom Tablet Data Exfiltration Raises Security Concerns | Security | Threatpost |
8.2.20 | Critical Android Bluetooth Bug Enables RCE, No User Interaction Needed | Android | Threatpost |
8.2.20 | RobbinHood ransomware exploit GIGABYTE driver flaw to kill security software | Ransomware | Securityaffairs |
8.2.20 | Chrome Will Block Insecure Downloads on HTTPS Pages | Security | Securityweek |
8.2.20 | IoT Devices at Major Manufacturers Infected With Malware via Supply Chain Attack | Attack IoT Virus | Securityweek |
8.2.20 | Organizations Quick to Patch Critical Citrix ADC Vulnerability | Vulnerebility | Securityweek |
7.2.20 | Japanese defense contractors Pasco and Kobe Steel disclose security breaches | BigBrothers | Securityaffairs |
7.2.20 | DoJ Looking for Victims of 'Quantum Stresser' DDoS Service | BigBrothers | Securityweek |
7.2.20 | Brazil Judge Rejects Hacking Accusation Against Greenwald | Hacking | Securityweek |
7.2.20 | Critical Bluetooth Vulnerability Exposes Android Devices to Attacks | Attack Vulnerebility | Securityweek |
7.2.20 | Happy New Fear! Gift-wrapped spam and phishing | Phishing Spam | Securelist |
7.2.20 | Iran-linked APT group Charming Kitten targets journalists, political and human rights activists | APT | Securityaffairs |
7.2.20 | Critical Android Bluetooth flaw CVE-2020-0022 could be exploited without user interaction | Android | Securityaffairs |
7.2.20 | Malicious Optimizers Hosted on Google Play Amassed 470,000 Downloads | Android | Securityweek |
7.2.20 | Japanese Defense Contractors Pasco, Kobe Steel Disclose Old Breaches | Incindent | Securityweek |
7.2.20 | | Virus | SANS |
7.2.20 | | Exploit Phishing | Net-security |
7.2.20 | | Vulnerebility | Net-security |
7.2.20 | U.S. Finance Sector Hit with Targeted Backdoor Campaign | Virus | Threatpost |
7.2.20 | Charming Kitten Uses Fake Interview Requests to Target Public Figures | Security | Threatpost |
7.2.20 | Metamorfo Returns with Keylogger Trick to Target Financial Firms | Virus | Threatpost |
7.2.20 | Dropbox Passes $1M Milestone for Bug-Bounty Payouts | Security | Threatpost |
7.2.20 | Iranian Hackers Target Journalists in New Phishing Campaign | BigBrothers Phishing | Securityweek |
7.2.20 | | Cyber | Net-security |
7.2.20 | | Security | Net-security |
7.2.20 | | Crypto | Net-security |
7.2.20 | | Mobil | Net-security |
6.2.20 | cdpwn – Millions of devices at risk due to flaws in implementations of Cisco Discovery Protocol (CDP) | Vulnerebility | Securityaffairs |
6.2.20 | Hacking Wi-Fi networks by exploiting a flaw in Philips Smart Light Bulbs | Exploit | Securityaffairs |
6.2.20 | New Campaign Leverages BitBucket to Deliver Arsenal of Malware | Virus | Securityweek |
6.2.20 | DLL Hijacking Vulnerability Found in Realtek HD Audio Driver | Hacking Vulnerebility | Securityweek |
6.2.20 | Cloud Security Firm Netskope Raises $340 Million at $3 Billion Valuation | IT | Securityweek |
6.2.20 | Forescout Technologies to be Acquired in $1.9 Billion Deal | IT | Securityweek |
6.2.20 | Patch Management Company Automox Raises $30 Million | IT | Securityweek |
6.2.20 | Louisiana Governor Urges Officials to Ready for Cyberattacks | BigBrothers | Securityweek |
6.2.20 | FBI Director Warns of Ongoing Russian 'Information Warfare' | BigBrothers | Securityweek |
6.2.20 | | Virus | Net-security |
6.2.20 | Cisco Discovery Protocol (CDP) enabled devices are vulnerable to denial-of-service and remote code execution | Alert | Alert |
6.2.20 | CamuBot Banking Trojan Returns In Targeted Attacks | Attack Virus | Threatpost |
6.2.20 | Critical Cisco ‘CDPwn’ Flaws Break Network Segmentation | Vulnerebility | Threatpost |
6.2.20 | New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers | IoT Virus | Threatpost |
6.2.20 | Gamaredon APT Improves Toolset to Target Ukraine Government, Military | APT | Threatpost |
6.2.20 | WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE | Social Virus | Threatpost |
6.2.20 | Critical Cisco ‘CDPwn’ Protocol Flaws Explained: Podcast | Vulnerebility | Threatpost |
6.2.20 | Chrome 80 Released With 56 Security Fixes | Security Vulnerebility | Securityweek |
6.2.20 | Google Shared Private Videos With Wrong Users | Security | Securityweek |
6.2.20 | CERN Physics Lab Drops Facebook Over Data Concerns | Social | Securityweek |
6.2.20 | Hackers Can Steal Data From Air-Gapped Computers Via Screen Brightness | Attack | Securityweek |
6.2.20 | 5 High Impact Flaws Affect Cisco Routers, Switches, IP Phones and Cameras | Vulnerebility | Thehackernews |
6.2.20 | | Security | SANS |
6.2.20 | | Exploit IoT | Net-security |
6.2.20 | | CyberCrime | Net-security |
6.2.20 | | Incindent | Net-security |
6.2.20 | | Cyber | Net-security |
6.2.20 | | IoT | Net-security |
6.2.20 | | Vulnerebility | Net-security |
5.2.20 | Microsoft detects 77,000 active web shells on a daily basis | Security | Securityaffairs |
5.2.20 | Expert released PoC exploit code for unpatched backdoor in HiSilicon chips | Exploit | Securityaffairs |
5.2.20 | Leidos Buys L3Harris Security and Automation Business for $1 Billion | IT | Securityweek |
5.2.20 | Cisco Discovery Protocol Flaws Expose Tens of Millions of Devices to Attacks | Vulnerebility | Securityweek |
5.2.20 | Vulnerability in WhatsApp Desktop Exposed User Files | Social Vulnerebility | Securityweek |
5.2.20 | Smart Lightbulbs Used to Compromise Home and Business Networks | Incindent | Securityweek |
5.2.20 | Iowa Fiasco Highlights Security Risks in US Vote, Officials Say | BigBrothers | Securityweek |
5.2.20 | Trial Begins for Ex-CIA Worker Charged With Leaking Secrets | BigBrothers | Securityweek |
5.2.20 | Exfiltrating Data from Air-Gapped Computers Using Screen Brightness | Attack | Thehackernews |
5.2.20 | Dropbox paid more than $1 Million via its bug bounty program | Security | Securityaffairs |
5.2.20 | Hackers abuse BitBucket to infect 500K+ hosts with arsenal of malware | Virus | Securityaffairs |
5.2.20 | Cybersecurity Bill Would Set Defense Plan for Local Agencies | Cyber | Securityweek |
5.2.20 | Sudo Vulnerability Allows Privilege Escalation to Root | Vulnerebility | Securityweek |
5.2.20 | Irish Regulator Probes Google, Tinder Over Data Processing | Security | Securityweek |
5.2.20 | Android's February 2020 Update Patches Critical System Vulnerabilities | Android | Securityweek |
5.2.20 | Twitter Moves to Curb Manipulated Content Including 'Deepfakes' | Social | Securityweek |
5.2.20 | Dropbox Paid Out Over $1 Million Through Bug Bounty Program | Security | Securityweek |
5.2.20 | Israeli Venture Firm Partners With NYC to Launch Cybersecurity Accelerator | BigBrothers IT | Securityweek |
5.2.20 | Flaw in Philips Smart Light Bulbs Exposes Your WiFi Network to Hackers | Vulnerebility | Thehackernews |
5.2.20 | | Attack Vulnerebility | Net-security |
5.2.20 | Twitter API Abused to Uncover User Identities | Social | Threatpost |
5.2.20 | Community Housing Nonprofit Hit with $1.2M Loss in BEC Scam | Spam | Threatpost |
5.2.20 | Ransomware Attack Hinders Toll Group Operations | Ransomware | Threatpost |
5.2.20 | Two Critical Android Bugs Get Patched in February Update | Android | Threatpost |
5.2.20 | Medtronic Patches Implanted Device, CareLink Programmer Bugs | Vulnerebility | Threatpost |
5.2.20 | Google mistakenly shared private videos of some users with others in 2019 | Privacy | Securityaffairs |
5.2.20 | Facebook fixed a WhatsApp bug that allowed hackers to access local file system | Social | Securityaffairs |
5.2.20 | Android's February 2020 Update Patches Critical System Vulnerabilities | Android | Securityweek |
5.2.20 | Twitter Moves to Curb Manipulated Content Including 'Deepfakes' | Social | Securityweek |
5.2.20 | Dropbox Paid Out Over $1 Million Through Bug Bounty Program | Security | Securityweek |
5.2.20 | Israeli Venture Firm Partners With NYC to Launch Cybersecurity Accelerator | IT | Securityweek |
5.2.20 | This WhatsApp Bug Could Have Let Attackers Access Files On Your PCs | Social | Thehackernews |
5.2.20 | | Cyber | Net-security |
5.2.20 | | Security | Net-security |
5.2.20 | | Ransomware Virus | Net-security |
5.2.20 | | Security | Net-security |
5.2.20 | | IoT Mobil | Net-security |
4.2.20 | Using 99 mobile phones to create a fake traffic jam in Google Maps | Mobil | Securityaffairs |
4.2.20 | The city of Racine was offline following a ransomware attack | Ransomware | Securityaffairs |
4.2.20 | Toll Group shuts down some online systems after ransomware attack | Ransomware | Securityaffairs |
4.2.20 | Hackers abused Twitter API to match usernames to phone numbers | Social | Securityaffairs |
4.2.20 | NCA arrested six men in UK over Malta Bank Cyber-Heist | CyberCrime | Securityaffairs |
4.2.20 | Vulnerabilities in Mini-SNMPD Lead to DoS, Information Disclosure | Attack Vulnerebility | Securityweek |
4.2.20 | Twitter Suspends Fake Accounts for Exploiting API Vulnerability | Exploit Social | Securityweek |
4.2.20 | HPE Acquires Identity Management Firm Scytale | IT | Securityweek |
4.2.20 | Australian Shipping Giant Toll Hit by Ransomware | Ransomware | Securityweek |
4.2.20 | Google Accidentally Shared Private Videos of Some Users With Others | Privacy | Thehackernews |
4.2.20 | Hackers Exploited Twitter Bug to Find Linked Phone Numbers of Users | Exploit Social | Thehackernews |
4.2.20 | | Ransomware | Net-security |
4.2.20 | | Security | Net-security |
4.2.20 | | BotNet | Threatpost |
4.2.20 | | Virus | Threatpost |
4.2.20 | | Security | Threatpost |
4.2.20 | | Spam | Threatpost |
4.2.20 | Sudo CVE-2019-18634 flaw allows Non-Privileged Linux and macOS Users run commands as Root | Vulnerebility | Securityaffairs |
4.2.20 | Vulnerability in Linear eMerge Access Controllers Exploited in the Wild | Vulnerebility | Securityweek |
4.2.20 | Medtronic Releases Patches for Cardiac Device Flaws Disclosed in 2018, 2019 | Vulnerebility | Securityweek |
4.2.20 | Six Arrested in UK Over Malta Bank Cyber-Heist | Crime | Securityweek |
4.2.20 | | Cyber | Net-security |
4.2.20 | | Cyber | Net-security |
4.2.20 | | Mobil | Net-security |
4.2.20 | | Security | Net-security |
3.2.20 | Police are warning crooks are using cleaners to compromise businesses | Hacking | Securityaffairs |
3.2.20 | Ransomware brought down services of popular TV search engine TVEyes | Ransomware | Securityaffairs |
3.2.20 | Attackers are hacking NSC Linear eMerge E3 building access systems to launch DDoS attacks | Attack | Securityaffairs |
3.2.20 | Apollon Darknet market is allegedly pulling an exit scam | CyberCrime Spam | Securityaffairs |
3.2.20 | Russia’s watchdog Roskomnadzor threatens to fine Twitter and Facebook | BigBrothers Social | Securityaffairs |
3.2.20 | The Russian Government blocked ProtonMail and ProtonVPN | BigBrothers | Securityaffairs |
3.2.20 | Microsoft announces the launch of a bug bounty program for Xbox | Vulnerebility | Securityaffairs |
3.2.20 | Microsoft warns TA505 changed tactic in an ongoing malware campaign | Virus | Securityaffairs |
3.2.20 | Chinese Hackers Target Hong Kong Universities With New Backdoor Variant | BigBrothers Virus | Securityweek |
3.2.20 | Trend Micro Patches More Vulnerabilities in Anti-Threat Toolkit | Vulnerebility | Securityweek |
3.2.20 | Sudo Bug Lets Non-Privileged Linux and macOS Users Run Commands as Root | Vulnerebility | Thehackernews |
3.2.20 | | Exploit | Net-security |
3.2.20 | | Virus | SANS |
3.2.20 | | Attack | Net-security |
3.2.20 | | Cyber | Net-security |
3.2.20 | | Security | Net-security |
3.2.20 | | Security | Net-security |
3.2.20 | | Security | Net-security |
2.2.20 | Devious Spamhaus Phishing Scam Warns You're on an Email Block List | Phishing | Bleepingcomputer |
2.2.20 | Coronavirus Phishing Attacks Are Actively Targeting the US | Phishing | Bleepingcomputer |
2.2.20 | New Intel Microcodes for Windows 10 Released to Fix CPU Bugs | OS | Bleepingcomputer |
2.2.20 | Microsoft Offers Free Windows 10 VMs for Edge Legacy Testing | OS | Bleepingcomputer |
2.2.20 | Russia Threatens Facebook, Twitter With Fines, Demands User Data | BigBrothers Social | Bleepingcomputer |
2.2.20 | Winnti Group Infected Hong Kong Universities With Malware | Virus | Bleepingcomputer |
2.2.20 | Microsoft Detects New TA505 Malware Attacks After Short Break | Virus | Bleepingcomputer |
2.2.20 | NEC Defense Contracts Info Potentially Compromised in Breach | Incindent | Bleepingcomputer |
2.2.20 | TrickBot Uses a New Windows 10 UAC Bypass to Launch Quietly | BotNet | Bleepingcomputer |
2.2.20 | Microsoft Launches Xbox Bounty Program With $20K Maximum Payout | Security | Bleepingcomputer |
2.2.20 | The Adware Families That Changed the Antivirus Industry | Virus | Bleepingcomputer |
2.2.20 | Russia Blocks ProtonMail and ProtonVPN, Tor to the Rescue | BigBrothers | Bleepingcomputer |
2.2.20 | Avast Shuts Down Jumpshot After Getting Caught Selling User's Data | Privacy | Bleepingcomputer |
2.2.20 | Linux Kernel 5.6 Source Tree Includes WireGuard VPN | OS | Bleepingcomputer |
2.2.20 | Malware Tries to Trump Security Software With POTUS Impeachment | BigBrothers Virus | Bleepingcomputer |
2.2.20 | AlphaBay Dark Web Market Mod Faces 20 Years After Pleading Guilty | CyberCrime | Bleepingcomputer |
2.2.20 | Emotet Uses Coronavirus Scare to Infect Japanese Targets | Virus | Bleepingcomputer |
2.2.20 | New 'I Got Phished' Service Alerts Companies of Phished Employees | Phishing | Bleepingcomputer |
2.2.20 | Google Chrome Tests Replacing URLs With Search Queries in Address Bar | Security | Bleepingcomputer |
2.2.20 | 200K WordPress Sites Exposed to Takeover Attacks by Plugin Bug | Vulnerebility | Bleepingcomputer |
2.2.20 | Critical Remote Code Execution Bug Fixed in OpenBSD SMTP Server | Vulnerebility | Bleepingcomputer |
2.2.20 | FBI Warns of Rise in Social Security Scams Spoofing Its Phone Number | BigBrothers Mobil Spam | Bleepingcomputer |
2.2.20 | Magento 2.3.4 Fixes Critical Code Execution Vulnerabilities | Vulnerebility | Bleepingcomputer |
2.2.20 | Ubuntu Invites Windows 7 Users With Linux Switch Guides | OS | Bleepingcomputer |
2.2.20 | Apple iOS 13.3.1 Released With Fix for Location Tracking | Apple | Bleepingcomputer |
2.2.20 | Windows 10 1909 KB4532695 Update Fixes File Explorer Bugs | OS | Bleepingcomputer |
2.2.20 | Google Pays $6.5 Million to Hackers for Reporting Security Bugs | Security | Bleepingcomputer |
2.2.20 | Ransom News | Ransom | Ransom |
2.2.20 | Coronavirus Affecting Business as Remote Workforces Expand Beyond Expected Capacity | Malware blog | Sonicwall |
2.2.20 | Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed | Hacking blog | Palo Alto Unity42 |
2.2.20 | xHunt Campaign: New Watering Hole Identified for Credential Harvesting | Hacking blog | Palo Alto Unity42 |
2.2.20 | Earn Beacon Gold While Becoming a Ninja at Using Our Products | Cyber blog | Palo Alto |
2.2.20 | Data Security for the Future: DLP and Secure Access Service Edge | Cyber blog | Palo Alto |
2.2.20 | Book Review: Cult of the Dead Cow | Cyber blog | Palo Alto |
2.2.20 | Navigating Federal Data Protection Compliance Requirements in the Cloud | Cyber blog | Palo Alto |
2.2.20 | 3 Observations About Leadership in an Age of Digital Transformation | Cyber blog | Palo Alto |
2.2.20 | Book Review: Code Girls | Cyber blog | Palo Alto |
2.2.20 | 3 Tools for K-12 Cybersecurity: Keeping Schools Safe in a Digital World | Cyber blog | Palo Alto |
2.2.20 | 5 Years of Delighting Our Customers with Outstanding Customer Support | Cyber blog | Palo Alto |
2.2.20 | Crooks start exploiting Coronavirus as bait to spread malware | Virus | Securityaffairs |
2.2.20 | Winnti APT Group targeted Hong Kong Universities | APT | Securityaffairs |
2.2.20 | | Safety | SANS |
1.2.20 | Windows 10 Optional Cumulative Update KB4532695 Released | OS | Bleepingcomputer |
1.2.20 | Android Flash Tool Lets You Install Android Using a Browser | Android | Bleepingcomputer |
1.2.20 | Ransomware Bitcoin Wallet Frozen by UK Court to Recover Ransom | Ransomware | Bleepingcomputer |
1.2.20 | Kali Linux Adds Single Installer Image, Default Non-Root User | OS | Bleepingcomputer |
1.2.20 | Ring Android App Sent Sensitive User Data to 3rd Party Trackers | Android | Bleepingcomputer |
1.2.20 | Ragnarok Ransomware Targets Citrix ADC, Disables Windows Defender | Ransomware | Bleepingcomputer |
1.2.20 | OurMine Hackers Are Back, Hijack NFL Teams' Social Accounts | Hacking Social | Bleepingcomputer |
1.2.20 | FBI Releases Alert on Iranian Hackers' Defacement Techniques | BigBrothers | Bleepingcomputer |
1.2.20 | Microsoft Asked to Unshackle Windows 7 From Proprietary Tyranny | OS | Bleepingcomputer |
1.2.20 | Google Chrome Gets Improved Tab Feature, Thanks to Microsoft | IT | Bleepingcomputer |
1.2.20 | Windows 7 To Get Post End of Life Update to Fix Wallpaper Bug | Vulnerebility | Bleepingcomputer |
1.2.20 | Google Rolls Back Change Making Search Results Look Like Ads | Security | Bleepingcomputer |
1.2.20 | RCE Exploit for Windows RDP Gateway Demoed by Researcher | Exploit | Bleepingcomputer |
1.2.20 | First MageCart Hackers Caught, Infected Hundreds of Web Stores | CyberCrime Virus | Bleepingcomputer |
1.2.20 | Microsoft's IE Zero-day Fix is Breaking Windows Printing | Vulnerebility | Bleepingcomputer |
1.2.20 | 6 OF THE BEST MALICIOUS LIFE CYBERSECURITY HISTORY STORIES FROM 2019 | Malware blog | Cybereason |
1.2.20 | WHY IS EMOTET SO POPULAR AND WHO IS IT TARGETING NOW? | Malware blog | Cybereason |
1.2.20 | Abusing DLL Misconfigurations — Using Threat Intelligence to Weaponize R&D | Hacking blog | FireEye |
1.2.20 | Zoom-Zoom: We Are Watching You | Vulnerebility blog | Checkpoint |
1.2.20 | Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure (Part II) | Vulnerebility blog | Checkpoint |
1.2.20 | Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure (Part I) | Vulnerebility blog | Checkpoint |
1.2.20 | Phorpiex Arsenal: Part I | BotNet blog | Checkpoint |
1.2.20 | Predator the Thief | Security blog | Checkpoint |
1.2.20 | Part II: Returning to Adobe Reader symbols on macOS | Exploit blog | Project Zero |
1.2.20 | Don’t get sacked! Scams to look out for this Super Bowl | Spam blog | Eset |
1.2.20 | Winnti Group targeting universities in Hong Kong | APT blog | Eset |
1.2.20 | IoT laws are coming: What to expect | IoT blog | Eset |
1.2.20 | Hackers blitz social media accounts of 15 NFL teams | Social blog | Eset |
1.2.20 | How to take charge of your Google privacy settings | Security blog | Eset |
1.2.20 | Job hunting? Beware hiring scams using spoofed company websites | Spam blog | Eset |
1.2.20 | AA20-031A : Detecting Citrix CVE-2019-19781 | CERT | CERT |
1.2.20 | OpenSMTPD vulnerable to local privilege escalation and remote code execution | Alert | Alert |
1.2.20 | | Security | Threatpost |
1.2.20 | | Ransomware | Threatpost |
1.2.20 | | CyberCrime | Threatpost |
1.2.20 | | Virus | Threatpost |
1.2.20 | | BigBrothers Virus | Threatpost |
1.2.20 | | Security | Threatpost |
1.2.20 | Hackers penetrated NEC defense business division in 2016 | Hacking | Securityaffairs |
| | | |