Calendar 2020 February- Home  2020  2019  2018  2017  2016  Articles

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2020 - January February March April May June July August September October November December


Date

Name

Category

Web

29.2.20

uBlock Origin 1.25 Now Blocks Cloaked First-Party Scripts, Firefox OnlySecurity

Bleepingcomputer

29.2.20

Mozilla Enables DNS-over-HTTPS by Default for All USA UsersSecurity

Bleepingcomputer

29.2.20

New Critical RCE Bug in OpenBSD SMTP Server Threatens Linux DistrosVulnerebility

Bleepingcomputer

29.2.20

Credit Card Skimmer Running on 13 Sites, Despite NotificationCyberCrime

Bleepingcomputer

29.2.20

DoppelPaymer Ransomware Launches Site to Post Victim's DataRansomware

Bleepingcomputer

29.2.20

PayPal Users Hit With Fraudulent 'Target' Charges via Google PayPhishing

Bleepingcomputer

29.2.20

New Mozart Malware Gets Commands, Hides Traffic Using DNSVirus

Bleepingcomputer

29.2.20

WhatsApp, Telegram Group Invite Links Leaked in Public SearchesSocial

Bleepingcomputer

29.2.20

Malvertising in Govt, Enterprise Targets Old Software, MacsApple

Bleepingcomputer

29.2.20

Racoon Malware Steals Your Data From Nearly 60 AppsVirus

Bleepingcomputer

29.2.20

Windows 10 Gets Temp Patch for Critical Flaw Fixed In Buggy UpdateOS

Bleepingcomputer

29.2.20

Google Brings Its Lighthouse Pagespeed Extension to FirefoxSecurity

Bleepingcomputer

29.2.20

2019 TLS Telemetry Report Summary

Safety blog

F5 Labs

29.2.20

Application Protection Research Series—Summary 2nd Edition

Security blog

F5 Labs

29.2.20

The Perfect Cybersecurity Applicant is Likely a Veteran

Cyber blog

F5 Labs

29.2.20

Ransomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT

Ransomware blog

FireEye

29.2.20

CPR evasion encyclopedia: The Check Point evasion repository

Cyber blog

Checkpoint

29.2.20

New Research Paper: Prevalence and impact of low-entropy packing schemes in the malware ecosystem

Malware blog

Cisco Talos

29.2.20

Vulnerability Spotlight: Multiple vulnerabilities in Moxa AWK-3131A

Vulnerebility blog

Cisco Talos

29.2.20

Firefox turns on DNS over HTTPS by default for US users

Safety blog

Eset

29.2.20

Cyberbullying: How is it different from face‑to‑face bullying?

Cyber blog

Eset

29.2.20

Facial recognition company Clearview AI hit by data theft

Cyber blog

Eset

29.2.20

RSA 2020 – Hacking humans

Congress blog

Eset

29.2.20

Did someone file your taxes before you?

Security blog

Eset

29.2.20

Is bug hunting a viable career choice?

Vulnerebility blog

Eset

29.2.20

KrØØk: Serious vulnerability affected encryption of billion+ Wi‑Fi devices

Vulnerebility blog

Eset

29.2.20

Is your phone listening to you?

Hardware blog

Eset

29.2.20

RSAC 2020: Ransomware a ‘National Crisis,’ CISA Says, Ramps ICS Focus

Congress

Threatpost

29.2.20

Bruce Schneier Proposes ‘Hacking Society’ for a Better Tomorrow

Hacking

Threatpost

29.2.20

Patrick Wardle: Apple Devices Hit With Recycled macOS Malware

Apple

Threatpost

29.2.20

All versions of Apache Tomcat are affected by the Ghostcat flaw

Vulnerebility

Securityaffairs

29.2.20

Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalatesBigBrothers  SocialSecurityaffairs

29.2.20

Apache Tomcat Affected by Serious 'Ghostcat' VulnerabilityVulnerebilitySecurityweek

29.2.20

Microsoft Boosts PUA Protections in EdgeSafetySecurityweek

29.2.20

ProtonMail Fights Email Spoofing With New DKIM Key Management FeatureHacking  SafetySecurityweek

29.2.20

Assange's UK Extradition Hearing Paused Until MayBigBrothersSecurityweek

29.2.20

GhostCat: New High-Risk Vulnerability Affects Servers Running Apache TomcatVulnerebilityThehackernews

28.2.20

Which are the most dangerous mobile app stores online?MobilSecurityaffairs

28.2.20

Cisco addresses vulnerabilities in FXOS, UCS Manager and NX-OS SoftwareVulnerebilitySecurityaffairs

28.2.20

NRC Health health care company hit with ransomwareRansomwareSecurityaffairs

28.2.20

Let's Encrypt Issues Over 1 Billion CertificatesSafetySecurityweek

28.2.20

Intel Patched Over 230 Vulnerabilities in Its Products in 2019VulnerebilitySecurityweek

28.2.20

Let's Encrypt Issued A Billion Free SSL Certificates in the Last 4 YearsSafetyThehackernews

28.2.20

Hacking has become a viable career, according to HackerOne

Hacking

Net-security

28.2.20

What is plaguing public sector cyber readiness?

Cyber

Net-security

28.2.20

Photos: RSA Conference 2020, part 4

Congress

Net-security

28.2.20

2019 TLS TELEMETRY REPORTReportReport

28.2.20

IoT Insecurity: When Your Vacuum Turns on You

IoT

Threatpost

28.2.20

Google’s War on Android App Permissions, 60 Percent Successful

Android

Threatpost

28.2.20

RSAC 2020: GM’s Transportation Future Hinges on Cybersecurity

Congress

Threatpost

28.2.20

Facial recognition firm Clearview AI reveals intruders stole its client listCyberSecurityaffairs

28.2.20

Lampion malware origin servers geolocated in TurkeyVirusSecurityaffairs

28.2.20

Facebook Sues Analytics Firm for Data MisuseSocialSecurityweek

28.2.20

Cisco to Release Updates for Wireless Products Affected by Kr00k VulnerabilityVulnerebilitySecurityweek

28.2.20

Cybercriminals Target Lincoln Health Care CompanyCyberCrimeSecurityweek

28.2.20

Inside the Rising Cybercrime Threat in Latin AmericaCyberCrimeSecurityweek

28.2.20

Show me Your Clipboard Data!

Security

SANS

28.2.20

Only 38% of US govt workers received ransomware prevention training

Ransomware

Net-security

28.2.20

Tiny cryptographic ID chip can help combat hardware counterfeiting

Crypto

Net-security

28.2.20

More than 40% of privacy compliance technology will rely on AI by 2023

Privacy

Net-security

28.2.20

Photos: RSA Conference 2020, part 3

Congress

Net-security

27.2.20

Roaming Mantis, part VAPTSecurelist

27.2.20

Hunting the coronavirus in the dark webCyberCrimeSecurityaffairs

27.2.20

QL Dump from popular Indian BGR tech site leaked onlineIncindentSecurityaffairs

27.2.20

New strain of Cerberus Android banking trojan can steal Google Authenticator codesAndroidSecurityaffairs

27.2.20

Data on Detection of Malicious Documents in Gmail are impressiveVirusSecurityaffairs

27.2.20

Threat actors scan Internet for Vulnerable Microsoft Exchange ServersVulnerebilitySecurityaffairs

27.2.20

Cisco Patches Flaws in FXOS, UCS Manager and NX-OS SoftwareVulnerebilitySecurityweek

27.2.20

Hackers Looking for Exchange Servers Affected by Recently Patched FlawVulnerebilitySecurityweek

27.2.20

Less Than Half of Vulnerabilities in Popular Docker Images Pose Risk: StudyVulnerebilitySecurityweek

27.2.20

Framework Isolates Libraries in Firefox to Improve SecuritySecuritySecurityweek

27.2.20

Online 'Impersonator' Tried to Contact Campaigns, DNC SaysSecuritySecurityweek

27.2.20

Hacker Earns $8,500 for Vulnerability in HackerOne PlatformSecuritySecurityweek

27.2.20

Facebook and Google Postpone Asia-Pacific Bug Hunting ConferenceSocialSecurityweek

27.2.20

CWE list now includes hardware security weaknesses

Vulnerebility

Net-security

27.2.20

RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks

Congress

Threatpost

27.2.20

Billions of Devices Open to Wi-Fi Eavesdropping Attacks

Attack

Threatpost

27.2.20

RSAC 2020: Smart Baby Monitor Vulnerable to Remote Hackers

Congress

Threatpost

27.2.20

Unpatched Security Flaws Open Connected Vacuum to Takeover

Vulnerebility

Threatpost

27.2.20

Hackers Cashing In On Healthcare Industry Security Weaknesses

Hacking

Threatpost

27.2.20

Iranian APT Targets Govs With New Malware

APT

Threatpost

27.2.20

Stalkerware Attacks Increased 50 Percent Last Year, Report

Attack

Threatpost

27.2.20

Offensive Tools Are For Blue Teams Too

Security

SANS

27.2.20

Kr00k Wi-Fi Encryption flaw affects more than a billion devicesVulnerebilitySecurityaffairs

27.2.20

Over 20 Zyxel Firewalls Impacted by Recent Zero-Day VulnerabilityVulnerebilitySecurityweek

27.2.20

Privacy Management Firm OneTrust Raises $210 Million at $2.7 Billion ValuationITSecurityweek

27.2.20

RSA Conference 2020: Product Announcement Summary (Day 3)CongressSecurityweek

27.2.20

McAfee Buys Browser Isolation Firm Light Point SecuritySecuritySecurityweek

27.2.20

New Wi-Fi Encryption Vulnerability Affects Over A Billion DevicesVulnerebilityThehackernews

27.2.20

A new way for securing web browsers from hackers

Security

Net-security

27.2.20

Modern malware is increasingly leveraging evasive behaviors

Virus

Net-security

27.2.20

One in five SMBs use no endpoint security at all

Security

Net-security

27.2.20

What is driving the machine identity crisis?

Security

Net-security

27.2.20

Flaw affecting 1B+ Wi-Fi-enabled devices allows attackers to decrypt wireless network packets

Vulnerebility

Net-security

27.2.20

Photos: RSA Conference 2020, part 2

Congress

Net-security

27.2.20

Attackers probing for vulnerable Microsoft Exchange Servers, is yours one of them?

Vulnerebility

Net-security

27.2.20

Shadow IoT: A growing threat to enterprise security

IoT

Net-security

27.2.20

Google fixes another Chrome zero-day exploited in the wild

Exploit

Net-security

26.2.20

Kr00k VulnerebilityPapersPapers

26.2.20

Kr00k VulnerebilityThreats NewsThreats News

26.2.20

Reading Municipal Light Department, an electric utility in Massachusetts, hit by ransomwareRansomwareSecurityaffairs

26.2.20

Google Boosts Detection of Malicious Documents in GmailVirusSecurityweek

26.2.20

Kr00k Vulnerability Exposed Data From Over a Billion Wi-Fi DevicesVulnerebilitySecurityweek

26.2.20

Iranian Cyberspies Focus on Long-Running OperationsBigBrothers  CyberSpySecurityweek

26.2.20

Intel Announces New Hardware-based Security CapabilitiesSecuritySecurityweek

26.2.20

FBI Official: Russia Wants to See US 'Tear Ourselves Apart'BigBrothersSecurityweek

26.2.20

New LTE Network Flaw Could Let Attackers Impersonate 4G Mobile UsersMobil  VulnerebilityThehackernews

26.2.20

Google Advises Android Developers to Encrypt App Data On DeviceAndroidThehackernews

26.2.20

Samsung leaked data of a few UK Customers

Incindent

Securityaffairs

26.2.20

Silence Hacking Crew threatens Australian banks of DDoS attacks

Attack  BigBrothers

Securityaffairs

26.2.20

New Cyber Attack Campaign Leverages the COVID-19 Infodemic

Virus

Securityaffairs

26.2.20

Fbot re-emerged, the backstage

Virus

Securityaffairs

26.2.20

Massachusetts Electric Utility Hit by Ransomware

Ransomware

Securityweek

26.2.20

OpenSMTPD Vulnerability Leads to Command Injection

Vulnerebility

Securityweek

26.2.20

UK Financial Regulator Admits to Data Breach

Incindent

Securityweek

26.2.20

Google Advises Android Developers to Encrypt App Data On Device

Android

Thehackernews

26.2.20

RSAC 2020: Blockchain is ‘Garbage In’, Voting Needs Paper Ballots

Congress

Threatpost

26.2.20

RSAC 2020 Keynote: Changing the World’s False Perception of Cybersecurity

Congress

Threatpost

26.2.20

Google Patches Chrome Browser Zero-Day Bug, Under Attack

Attack

Threatpost

26.2.20

Sen. Schumer Pushes for TSA Employee Ban on TikTok App at Work

BigBrothers

Threatpost

26.2.20

Decathlon Spain data leak exposed Spanish employees’ data & moreIncindentSecurityaffairs

26.2.20

Zyxel addresses Zero-Day vulnerability in NAS devicesVulnerebilitySecurityaffairs

26.2.20

Firefox Gets DNS-over-HTTPS as Default in U.S.SafetySecurityweek

26.2.20

Samsung Says it Leaked Data on Handful of UK CustomersIncindentSecurityweek

26.2.20

RSA Conference 2020: Product Announcement Summary (Day 2)CongressSecurityweek

26.2.20

Over 100 Vulnerabilities Patched in MyBB in Past 5 YearsVulnerebilitySecurityweek

26.2.20

Firefox enables DNS-over-HTTPS by default (with Cloudflare) for all U.S. usersSafetyThehackernews

26.2.20

Almost three-quarters of all phishing sites now use SSL protection

Phishing

Net-security

26.2.20

Mixed-signal circuits can stop side-channel attacks against IoT devices

IoT

Net-security

26.2.20

Combat complexity to prevent cybersecurity fatigue

Cyber

Net-security

26.2.20

Healthcare industry at greatest risk of data breach

Incindent

Net-security

26.2.20

Photos: RSA Conference 2020, part 1

Congress

Net-security

25.2.20

IMP4GT: IMPersonation Attacks in 4G NeTworPapersPapers

25.2.20

IMP4GTAttackAttack

25.2.20

Experts discovered a new critical OpenSMTPD RCE flaw exploited in the wildExploitSecurityaffairs

25.2.20

Google fixes Chrome zero-day flaw exploited in the wildExploitSecurityaffairs

25.2.20

European Commission has chosen the Signal app to secure its communicationsSecuritySecurityaffairs

25.2.20

State-Sponsored Cyberspies Use Sophisticated Server Firewall Bypass TechniqueVulnerebilitySecurityweek

25.2.20

Zyxel Patches Zero-Day Vulnerability in Network Storage ProductsVulnerebilitySecurityweek

25.2.20

KPMG on Key Cybersecurity Considerations for 2020CyberSecurityweek

25.2.20

HackerOne Surpasses $82 Million in Paid BountiesSecuritySecurityweek

25.2.20

Mobile Networks Vulnerable to IMP4GT Impersonation AttacksAttack  MobilSecurityweek

25.2.20

Install Latest Chrome Update to Patch 0-Day Bug Under Active AttacksAttackThehackernews

25.2.20

Infoblox announces enterprise best practices for DoT/DoH

Security

Net-security

25.2.20

Mobile malware evolution 2019Analysis  MobilSecurelist

25.2.20

South Korea suffers from the spread of people infected with Corona 19VirusSecurityaffairs

25.2.20

Hacking campaign targets sites running popular Duplicator WordPress pluginHackingSecurityaffairs

25.2.20

Google Patches Chrome Vulnerability Exploited in the WildVulnerebilitySecurityweek

25.2.20

BEC Group Abuses Google G Suite in Scheme Targeting Thousands of FirmsSecuritySecurityweek

25.2.20

New OpenSMTPD RCE Flaw Affects Linux and OpenBSD Email ServersVulnerebilityThehackernews

25.2.20

Why Minimizing Human Error is the Only Viable Defense Against Spear PhishingPhishingThehackernews

25.2.20

A new RCE in OpenSMTPD’s default install, patch available

Vulnerebility

Net-security

25.2.20

Apple Takes Heat Over ‘Vulnerable’ iOS Cut-and-Paste Data

Apple

Threatpost

25.2.20

Data Breach Occurs at Agency in Charge of Secure White House Communications

Incindent

Threatpost

25.2.20

Researchers trick autonomous car autopilot with phantom images

Security

Net-security

25.2.20

ZyXEL NAS pre-authentication command injection in weblogin.cgiAlertAlert

25.2.20

Review: Specops Key Recovery

Security

Net-security

25.2.20

ENISA publishes procurement guidelines for cybersecurity in hospitals

Cyber

Net-security

25.2.20

Lampion malware v2 February 2020

Virus

Securityaffairs

25.2.20

Raccoon Malware, a success case in the cybercrime ecosystem

Virus

Securityaffairs

25.2.20

Slickwraps discloses data leak that impacted 850,000 user accounts

Incindent

Securityaffairs

25.2.20

SECURITI.ai Wins RSA Conference 2020 Innovation Sandbox Contest

Congress

Securityweek

25.2.20

Pentagon Adopts New Ethical Principles for Using AI in War

BigBrothers

Securityweek

25.2.20

RSA Conference 2020: Product Announcement Summary (Day 1)

Congress

Securityweek

25.2.20

Vulnerabilities in Moxa Networking Device Expose Industrial Environments to Attacks

Vulnerebility

Securityweek

25.2.20

Mismanagement of Device Identities Could Cost Businesses Billions: Report

Security

Securityweek

25.2.20

Canada Privacy Watchdog Probes Facial Recognition Startup

Privacy

Securityweek

25.2.20

Slickwraps Discloses Data Breach

Incindent

Securityweek

25.2.20

Cisco Unveils SecureX Security Platform

Security

Securityweek

25.2.20

Vulnerabilities Allow Hackers to Access Honeywell Fire Alarm Systems

Vulnerebility

Securityweek

25.2.20

Quick look at a couple of current online scam campaigns

Spam

SANS

25.2.20

Cybersecurity hiring challenges and retention issues demand new talent pipelines

Security

Net-security

25.2.20

Cloud-based collaboration tools are a major driver of data exfiltration

Security

Net-security

25.2.20

The importance of risk reduction for robotic process automation

Security

Net-security

25.2.20

eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

Security

Net-security

24.2.20

Windows 10 Privacy Guide: Settings Everyone Should UseOS

Bleepingcomputer

24.2.20

Privacy Concerns Raised Over New Google Chrome FeaturePrivacy

Bleepingcomputer

24.2.20

Windows 10 Gets Temp Fix for Critical Security VulnerabilityOS

Bleepingcomputer

24.2.20

Extension Brings Internet Explorer Menu Bar to Microsoft EdgeOS

Bleepingcomputer

24.2.20

Slickwraps Data Breach Exposes Financial and Customer InfoIncindent

Bleepingcomputer

24.2.20

Android Malware: Joker Still Fools Google's Defense, New Clicker FoundAndroid

Bleepingcomputer

24.2.20

Google Cleans Play Store of Nearly 600 Apps for Ad Policy ViolationPrivacy

Bleepingcomputer

24.2.20

New Mexico Sues Google for Mining Children's DataPrivacy

Bleepingcomputer

24.2.20

Microsoft Unveils Their New Windows 10 System IconsOS

Bleepingcomputer

24.2.20

FTC Refunds Victims of Office Depot Tech Support ScamSpam

Bleepingcomputer

24.2.20

FBI recommends using passphrases instead of complex passwords

BigBrothers

Securityaffairs

24.2.20

FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019

Analysis

Securityaffairs

24.2.20

Man Tied to Ex-Congresswoman Campaign Arrested in Hack Spree

Crime

Securityweek

24.2.20

2016 Again? Russia Back to Stirring Chaos in U.S. Election

BigBrothers

Securityweek

24.2.20

OpenDXL Ontology: An open source language for connecting cybersecurity tools

Cyber

Net-security

24.2.20

ISS reveals malware attack impacted parts of the IT environmentVirusSecurityaffairs

24.2.20

Google sued by New Mexico attorney general for collecting student data through its Education PlatformPrivacySecurityaffairs

24.2.20

ObliqueRAT, a new malware employed in attacks on government targets in Southeast AsiaVirusSecurityaffairs

24.2.20

Maldoc: Excel 4 Macros in OOXML Format

Virus

SANS

24.2.20

By exploiting an LTE vulnerability, attackers can impersonate mobile phone users

Exploit  Mobil

Net-security

24.2.20

Changing the mindset of the CISO: From enforcer to enabler

Security

Net-security

24.2.20

Users still engaging in risky password, authentication practices

Safety

Net-security

24.2.20

Increased monetization means more ransomware attacks

Ransomware

Net-security

24.2.20

Organizations lack confidence in their network security

Security

Net-security

24.2.20

97% of IT leaders worried about insider data breaches

Security

Net-security

24.2.20

Download: The Ultimate Security Pros’ Checklist

Security

Net-security

23.2.20

WhatsApp Phishing URLs Skyrocket With Over 13,000% SurgePhishing  Social

Bleepingcomputer

23.2.20

Credit Card Skimmer Found on Nine Sites, Researchers IgnoredCyberCrime

Bleepingcomputer

23.2.20Hackers Share Stolen MGM Resorts Guest Database with 10M+ RecordsIncindent

Bleepingcomputer

23.2.20

Google Tells Microsoft Edge Users To Get Chrome for Better SecuritySecurity

Bleepingcomputer

23.2.20

Microsoft Defender ATP for Linux Now In Public PreviewSafety

Bleepingcomputer

23.2.20New Actors Attack Industrial Control Systems, Old Ones MatureICS

Bleepingcomputer

23.2.20

Tesla Pays $10K for Microsoft SQL Server Reporting Services BugSecurity

Bleepingcomputer

23.2.20

Microsoft Rolls Out New Windows 10 Optional Update ExperienceOS

Bleepingcomputer

23.2.20Microsoft Adds Enterprise Windows 10 Tamper Protection ControlsOS

Bleepingcomputer

23.2.20

Swiss Govt Says Ransomware Victims Ignored Warnings, Had Poor SecurityRansomware

Bleepingcomputer

23.2.20Windows 10 KB4532693 Update Bug Reportedly Deletes User FilesOS

Bleepingcomputer

23.2.20

Zero-Day in WordPress Plugin Exploited to Create Admin AccountsExploit  Vulnerebility

Bleepingcomputer

23.2.20

Over 20,000 WordPress Sites Run Trojanized Premium ThemesVirus

Bleepingcomputer

23.2.20DRBControl Espionage Operation Hits Gambling, Betting CompaniesCyberSpy

Bleepingcomputer

23.2.20

Dharma Ransomware Attacks Italy in New Spam CampaignRansomware  SpamBleepingcomputer
23.2.20SonicWall Firewall Certified via NetSecOPEN Laboratory Testing, Earns Perfect Security Effectiveness Score Against Private CVE AttacksSafety blogSonicwall

23.2.20

Hackers infect VPNs to plant hidden backdoorsHacking blogAvast blog
23.2.20Can You Trust Your AutoIT Decompiler?Security blogPalo Alto Unity42

23.2.20

How to Use a Firewall for Network Traffic Analysis and Behavioral DetectionCyber blog

Palo Alto

23.2.20

What’s it Like Being a Woman in Cybersecurity?Cyber blog

Palo Alto

23.2.20The Three T’s of Shift Left SecurityCyber blog

Palo Alto

23.2.20

What the Cybersecurity Industry Needs to Discuss at the RSA Conference 2020Cyber blog

Palo Alto

23.2.20

Book Review: “Cyber Smart”Cyber blog

Palo Alto

23.2.20Tapping the True Potential of the 5G Digital EconomyCyber blog

Palo Alto

23.2.20

Holistic SDN Security Makes Security Comprehensive EverywhereCyber blog

Palo Alto

23.2.20Cloud Native Security Beyond Your Vendor’s ToolsCyber blog

Palo Alto

23.2.20

Simple but Efficient VBScript Obfuscation

Virus

SANS

23.2.20

Joker malware still able to bypass Google Play Store checks

Android

Securityaffairs
23.2.20

Google removed nearly 600 apps from the Play Store for ad policy violation

Android  Privacy

Securityaffairs

22.2.20

US Govt Warns of Ransomware Attacks on Pipeline OperationsBigBrothers  Ransomware

Bleepingcomputer

22.2.20Ring Forces 2FA On All Users to Secure Cameras from HackersHacking

Bleepingcomputer

22.2.20Firefox 73.0.1 Released With Fixes for Linux, Windows CrashesVulnerebility

Bleepingcomputer

22.2.20AZORult Malware Infects Victims via Fake ProtonVPN InstallerVirus

Bleepingcomputer

22.2.20Phishing on Instagram Baits Russians With Free Money PromisePhishing

Bleepingcomputer

22.2.20Windows, Linux Devices at Risk Due to Unsigned Peripheral FirmwareOS

Bleepingcomputer

22.2.20Hacker Group Catfishes Israeli Soldiers Into Installing Mobile RATBigBrothers  Virus

Bleepingcomputer

22.2.20Microsoft Surface Laptop 3 Screens Are Spontaneously CrackingHacking

Bleepingcomputer

22.2.20World Health Organization Warns of Coronavirus Phishing AttacksPhishing

Bleepingcomputer

22.2.20Windows 10 Users Affected by New Shutdown Bug, How to FixOS

Bleepingcomputer

22.2.20Russia Blocks Tutanota Email, Service Still Usable Over Tor or VPNBigBrothers

Bleepingcomputer

22.2.20

Unsafe WordPress Plugin Installed on Nearly 200,000 SitesVulnerebility

Bleepingcomputer

22.2.20Windows 10X to Feature Faster Updates, Win32 Apps SupportOS

Bleepingcomputer

22.2.20Targeted Phishing Attack Aims For Well-Known Corporate BrandsPhishing

Bleepingcomputer

22.2.20Windows 10 Gets the Mac Hot Corners Feature With New AppOS

Bleepingcomputer

22.2.20How to See the First Show You Watched on NetflixITBleepingcomputer

22.2.20

CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II

Cyber blog

Mcafee blog
22.2.20

Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles

Security blog

Mcafee blog
22.2.20

Introduction and Application of Model Hacking

Security blog

Mcafee blog
22.2.20

CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I

Cyber blog

Mcafee blog
22.2.20

What Can Pandemics Teach Us About Cyber Security?

Cyber blog

F5 Labs
22.2.20

Prioritizing Vulnerability Management Using Machine Learning

Vulnerebility blog

F5 Labs
22.2.20

M-Trends 2020: Insights From the Front Lines

Cyber blog

FireEye
22.2.20

Managed Defense: The Analytical Mindset

Security blog

FireEye
22.2.20

"Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests

BigBrother blog

FireEye
22.2.20

The Missing LNK — Correlating User Search LNK files

Malware blog

FireEye
22.2.20

Hamas Android Malware On IDF Soldiers-This is How it Happened

OS Blog

Checkpoint

22.2.20

Android App Fraud – Haken Clicker and Joker Premium Dialer

OS Blog

Checkpoint
22.2.20

Mitigations are attack surface, too

Exploit blog

Project Zero
22.2.20

Escaping the Chrome Sandbox with RIDL

Exploit blog

Project Zero
22.2.20

ObliqueRAT: New RAT hits victims' endpoints via malicious documents

Malware blog

Cisco Talos

22.2.20

Vulnerability Spotlight: Memory corruption, DoS vulnerabilities in CoTURN

Vulnerebility blog

Cisco Talos

22.2.20

Building a bypass with MSBuild

Vulnerebility blog

Cisco Talos

22.2.20

Up close and personal with Linux malware

Malware blog

Eset

22.2.20

MGM Resorts data breach exposes details of 10.6 million guests

Incident blog

Eset

22.2.20

Linux and malware: Should you worry?

Malware blog

Eset

22.2.20

What DNS encryption means for enterprise threat hunters

Safety blog

Eset

22.2.20

Sensitive plastic surgery photos exposed online

Incident blog

Eset
22.2.20

Plugin flaw leaves up to 200,000 WordPress sites at risk of attack

Attack blog  Vulnerebility blog

Eset
22.2.20

FC Barcelona Twitter account hacked – again

Social blog

Eset

22.2.20

RSAC 2020: Editors’ Preview of Hottest Sessions, Speakers and Themes

Congress

Threatpost

22.2.20

New ‘Haken’ Malware Found On Eight Apps In Google Play Store

Android

Threatpost

22.2.20

ISS World Hit with Malware Attack that Shuts Down Global Computer Network

Virus

Threatpost

22.2.20

Burning Man Tickets for $225? Yep, Too Good to Be True

CyberCrime

Threatpost

22.2.20

Lawsuit Claims Google Collects Minors’ Locations, Browsing History

Privacy

Threatpost

22.2.20

Active Attacks Target Popular Duplicator WordPress Plugin

Attack

Threatpost
22.2.20

VMware addresses serious flaws in vRealize Operations for Horizon Adapter

VulnerebilitySecurityaffairs
22.2.20

New Mexico Sues Google Over Collection of Children's Data

PrivacySecurityweek
22.2.20

Google Removes 600 Android Apps for Displaying Disruptive Ads

AndroidSecurityweek
22.2.20

Malware Attack Takes ISS World's Systems Offline

VirusSecurityweek
22.2.20

Microsoft Brings Defender Antivirus for Linux, Coming Soon for Android and iOS

SafetyThehackernews

21.2.20

M-TRENDS 2020 FIREEYE MANDIANT SERVICES | SPECIAL REPORT

ReportReport

21.2.20

Exclusive: Pakistan and India to armaments: Operation Transparent Tribe is back 4 years laterBigBrothersSecurityaffairs
21.2.20DOD DISA US agency discloses a security breachBigBrothers  IncindentSecurityaffairs
21.2.20FireEye Spotted Over 500 New Malware Families in 2019VirusSecurityweek
21.2.20VMware Patches Serious Flaws in vRealize Operations for Horizon AdapterVulnerebilitySecurityweek
21.2.20U.S. Combat Support Agency Discloses 2019 Data BreachBigBrothersSecurityweek
21.2.20Fraudulent Login Attacks Against Banks Surge: AkamaiAttackSecurityweek
21.2.2020,000 WordPress Websites Infected via Trojanized ThemesVirusSecurityweek
21.2.20Google Bans 600 Android Apps from Play Store for Serving Disruptive AdsAndroidThehackernews

21.2.20

Cisco drops security fixes for Smart Software Manager, security appliances

Vulnerebility

Net-security

21.2.20

Critical Cisco Bug Opens Software Licencing Manager to Remote Attack

Attack  Vulnerebility

Threatpost

21.2.20

MGM Grand Breach Leaked Details of 10.6 Million Guests Last Summer

Incindent

Threatpost

21.2.20

Cybergang Favors G Suite and Physical Checks For BEC Attacks

CyberCrime  Spam

Threatpost

21.2.20

Google Bans 600 Android Apps for Obnoxious Ads

Android

Threatpost

21.2.20

Critical Adobe Flaws Fixed in Out-of-Band Update

Vulnerebility

Threatpost

21.2.202019 YEAR IN REVIEW ICS VULNERABILITIESReportReport
21.2.202019 YEAR IN REVIEW THE ICS L ANDSCAPE AND THREAT ACTIVIT Y GROUPSReportReport
21.2.202019 YEAR IN REVIEW LESSONS LEARNED FROM THE FRONT LINES OF ICS CYBERSECURITYReportReport
21.2.20

Quick Analysis of an Encrypted Compound Document Format

Crypto

SANS

21.2.20

Looking at the future of identity access management (IAM)

Security

Net-security

21.2.20Dragos Report: Analysis of ICS flaws disclosed in 2019ICSSecurityaffairs
21.2.20Croatia’s largest petrol station chain INA group hit by ransomware attackRansomwareSecurityaffairs
21.2.20UK, US and its allies blame Russia’s GRU for 2019 cyber-attacks on GeorgiaBigBrothersSecurityaffairs
21.2.20Adobe released out-of-band updates for After Effects and Media Encoder appsVulnerebilitySecurityaffairs

21.2.20

Cisco fixes a static default credential issue in Smart Software Manager toolVulnerebilitySecurityaffairs
21.2.20Georgia Blames Russia for Cyberattack, US, UK AgreeBigBrothersSecurityweek
21.2.20Cisco Patches Critical Flaw in Smart Licensing SolutionVulnerebilitySecurityweek
21.2.20Over 400 ICS Vulnerabilities Disclosed in 2019: ReportICSSecurityweek
21.2.20Microsoft Threat Protection Now Generally AvailableSafetySecurityweek

21.2.20

US, UK Blame Russia for 2019 Cyber Attacks in GeorgiaBigBrothersSecurityweek
21.2.20Fidelis Adds Risk Simulation and MITRE ATT&CK Mapping to Elevate PlatformSecuritySecurityweek
21.2.20Cometdocs Threatens Legal Action Over Disclosure of Security IssuesSecuritySecurityweek
21.2.20

Whodat? Enumerating Who "owns" a Workstation for IR

Security

SANS

21.2.20

Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps

Security

Net-security

21.2.20

10 hot industry newcomers to watch at RSA Conference 2020

Congress

Net-security

21.2.20

High-risk vulnerabilities and public cloud-based attacks on the rise

Vulnerebility

Net-security

21.2.20

Worldwide ICT spending forecast to reach $4.3 trillion in 2020

Security

Net-security

20.2.20

Cybersecurity Research During the Coronavirus Outbreak and After

Cyber

Securelist

20.2.20

Personal details of 10.6M MGM Resorts guests leaked online

Incindent

Securityaffairs

20.2.20

ZeroFOX Raises $74 Million to Expand Social Media Threat Protection Business

IT

Securityweek

20.2.20

CrowdStrike Co-Founder and CTO Steps Down to Launch Nonprofit Policy Accelerator

IT

Securityweek

20.2.20

Ring Rolls Out Mandatory 2FA, New Privacy Controls

Safety

Securityweek

20.2.20

Scam Alert: You've Been Selected for 'Like of the Year 2020' Cash Prizes

Social  Spam

Thehackernews

20.2.20

Adobe Patches Critical Bugs Affecting Media Encoder and After Effects

Vulnerebility

Thehackernews

20.2.20

What is flowing through your enterprise network?

Security

Net-security

20.2.20

BlueKeep Flaw Plagues Outdated Connected Medical Devices

Vulnerebility

Threatpost

20.2.20

Latest Tax Scams Target Apps and Tax-Prep Websites

Spam

Threatpost

20.2.20

Hamas Ensnares Israeli Soldiers with Pretty ‘Ladies’

BigBrothers

Threatpost

20.2.20

U.S. Pipeline Disrupted by Ransomware Attack

Ransomware

Threatpost

20.2.20

SMS Attack Spreads Emotet, Steals Bank Credentials

Mobil  Virus

Threatpost

20.2.20

Hackers are actively exploiting a Zero-Day in WordPress ThemeREX Plugin to create Admin AccountsVulnerebilitySecurityaffairs

20.2.20

DRBControl cyber-espionage group targets gambling, betting companiesCyberSpySecurityaffairs

20.2.20

Trump 'Offered Pardon' to Assange If He Denied Russia Leak, Court HearsBigBrothersSecurityweek

20.2.20

EU Proposes Rules for Artificial Intelligence to Limit RisksBigBrothersSecurityweek

20.2.20

Vulnerable Out of Band Consoles Put Industrial Assets at RiskVulnerebilitySecurityweek

20.2.20

Are CISOs ready for zero trust architectures?

Security

Net-security

20.2.20

Most credential abuse attacks against the financial sector targeted APIs

Attack

Net-security

20.2.20

Cloud misconfigurations surge, organizations need continuous controls

Security

Net-security

20.2.20

Number of records exposed in healthcare breaches doubled from 2018 to 2019

Incindent

Net-security

20.2.20

Factbook: Healthcare IT practices and cyber preparednessCyberNet-security

19.2.20

Uncovering New Magecart Implant Attacking eCommerceCyberCrimeSecurityaffairs

19.2.20

5 Ways artificial intelligence Is Being Used to Keep Sensitive Information SecureSecuritySecurityaffairs
19.2.20SentinelOne Achieves Unicorn Status After $200 Million Funding RoundITSecurityweek
19.2.20WordPress Websites Hacked via Vulnerabilities in Two Themes PluginsVulnerebilitySecurityweek
19.2.20Google Brings Titan Security Keys to More CountriesSecuritySecurityweek
19.2.20Huawei Loses Legal Challenge Against US Federal Purchase BanBigBrothersSecurityweek
19.2.20ForgePoint Capital Announces $450 Million Cybersecurity Investment FundITSecurityweek
19.2.20Operations at U.S. Natural Gas Facilities Disrupted by Ransomware AttackRansomwareSecurityweek
19.2.20Ring Makes 2-Factor Authentication Mandatory Following Recent HacksHackingThehackernews
19.2.20US Govt Warns Critical Industries After Ransomware Hits Gas Pipeline FacilityBigBrothers  RansomwareThehackernews

19.2.20

Free trojanized WordPress themes lead to widespread compromise of web servers

Virus

Net-security

19.2.20

US gas pipeline shut down due to ransomware

Ransomware

Net-security

19.2.202019 Year End Report Vulnerability QuickViewReportReport
19.2.20AA20-049A : Ransomware Impacting Pipeline OperationsCERTCERT
19.2.20Lenovo, HP, Dell Peripherals Face Unpatched Firmware BugsVulnerebility

Threatpost

19.2.20Hacker Scheme Threatens AdSense Customers with Account SuspensionHacking

Threatpost

19.2.20FC Barcelona Suffers Likely Credential-Stuffing Attack on TwitterSocial

Threatpost

19.2.20Ring Mandates 2FA After Rash of HacksSafety

Threatpost

19.2.20Iran-Backed APTs Collaborate on 3-Year ‘Fox Kitten’ Global Spy CampaignAPT  BigBrothers

Threatpost

19.2.20Active Exploits Hit Vulnerable WordPress ThemeGrill PluginExploit

Threatpost

19.2.20US CISA warns of Ransomware attacks impacting pipeline operationsBigBrothers  RansomwareSecurityaffairs
19.2.20Rise in Malware Using Encryption Shows Importance of Network Traffic InspectionVirusSecurityweek
19.2.20Google Removes Mideast Android App ToTokAndroidSecurityweek
19.2.20Over 22,000 Vulnerabilities Disclosed in 2019: ReportVulnerebilitySecurityweek
19.2.20Dell to Sell RSA Security Unit for $2 BillionITSecurityweek
19.2.20

The top four Office 365 security pain points

Security

Net-security
19.2.20

Jon Callas: Encryption is a technology that rearranges power

Crypto

Net-security

19.2.20

A third of all vulnerabilities in 2019 had a CVSS v2 score of 7.0 and above

Vulnerebility

Net-security
19.2.20

8.4 million: Number of DDoS attacks researchers saw last year alone

Attack

Net-security

19.2.20

Researchers observed a 125% increase in malware targeting Windows 7

Analysis  Virus

Net-security
19.2.20

Test CISSP knowledge with interactive flash cards

Safety

Net-security
18.2.20

Unsigned Firmware running on peripherals could expose Windows, Linux systems to hack

Hacking  Vulnerebility

Securityaffairs
18.2.20

Hacking IoT devices with Focaccia-Board: A Multipurpose Breakout Board to hack hardware in a clean and easy way!

Hacking  IoT

Securityaffairs
18.2.20

Encryption Firm With NSA Roots Raises $10 Million

IT

Securityweek
18.2.20

F-Secure Patches Old AV Bypass Vulnerability

Vulnerebility

Securityweek
18.2.20

Egnyte Launches New Content Visibility and Control Platform

IT

Securityweek
18.2.20

ExtraHop Expands Enterprise IoT Security Features

IoT

Securityweek
18.2.20

Serious Vulnerabilities Expose SonicWall SMA Appliances to Remote Attacks

Vulnerebility

Securityweek
18.2.20

Microsoft Trials Election Security Solution in Wisconsin

Security

Securityweek
18.2.20

Peripherals With Unsigned Firmware Expose Windows, Linux Computers to Attacks

Attack  Vulnerebility

Securityweek
18.2.20

Iranian Hackers Exploiting VPN Flaws to Backdoor Organizations Worldwide

BigBrothers Exploit

Thehackernews
18.2.20AZORult spreads as a fake ProtonVPN installerVirusSecurelist
18.2.20CVE-2019-0604 SharePoint Remote code execution (RCE) vulnerabilityVulnerebilitySecurityaffairs
18.2.20Flaw in WordPress ThemeGrill Demo Importer WordPress theme plugin expose 200K+ sites to hackVulnerebilitySecurityaffairs
18.2.20FC Barcelona and the International Olympic Committee Twitter accounts hackedHackingSecurityaffairs
18.2.20Google Axes 500 Chrome Extensions Exfiltrating User DataSecuritySecurityweek
18.2.20Trump Threatens Intelligence Block Over Huawei: US DiplomatBigBrothersSecurityweek
18.2.20Critical Bug in WordPress Theme Plugin Opens 200,000 Sites to HackersVulnerebilityThehackernews
18.2.20OpenSSH now supports FIDO U2F security keys for 2-factor authenticationSafetyThehackernews
18.2.20

Discovering contents of folders in Windows without permissions

OS

SANS
18.2.20

The challenges of cyber research and vulnerability disclosure for connected healthcare devices

Cyber

Net-security
18.2.20

Sessions, events and seminars to check out at RSA Conference 2020

Congress

Net-security

18.2.20

Focus on cyber resilience increasing sharply as oil companies seek to protect their assets

Cyber

Net-security
18.2.20

IT and business process automation growing with cloud architectures

Security

Net-security

18.2.20

Cyber Guardian Network offers enhanced tools and technologies for MSSPs

Cyber

Net-security
17.2.20Russian govn blocked Tutanota service in Russia to stop encrypted communicationBigBrothersSecurityaffairs
17.2.20Launching the First “Yomi Hunting” Challenge!SecuritySecurityaffairs
17.2.20Cyberwarfare: A deep dive into the latest Gamaredon Espionage CampaignBigBrothersSecurityaffairs
17.2.20IDF soldiers tricked into installing malicious apps by Hamas operatives posing as attractive womenBigBrothersSecurityaffairs
17.2.20Flaw in WordPress Themes Plugin Allowed Hackers to Become Site AdminVulnerebilitySecurityweek
17.2.20Iranian Hackers Exploited Enterprise VPN Flaws in Major CampaignBigBrothersSecurityweek
17.2.20Smartphone Voting Stirs Interest -- and Security FearsBigBrothers  MobilSecurityweek
17.2.20Microsoft Pulls UEFI-Related Windows Update After Users Report ProblemsVulnerebilitySecurityweek
17.2.20A Dozen Vulnerabilities Affect Millions of Bluetooth LE Powered DevicesVulnerebilityThehackernews
17.2.20Fox Kitten Campaign – Iranian hackers exploit 1-day VPN flaws in attacksBigBrothersSecurityaffairs
17.2.20US administration requests $9.8B for cyber 2021 budget for the Department of DefenseBigBrothersSecurityaffairs
17.2.20Organizers of major hacking conferences in Asia put them on hold due to Coronavirus outbreakHackingSecurityaffairs
17.2.20IOTA cryptocurrency shuts down entire network after a coordinated attack on its Trinity walletCryptocurrencySecurityaffairs
17.2.20Israeli Army: Hamas Hackers Tried to ‘Seduce’ SoldiersBigBrothersSecurityweek
17.2.20

Three API security risks in the wake of the Facebook breach

Social

Net-security
17.2.20

SecOps teams face challenges in understanding how security tools work

Security

Net-security

17.2.20

Researchers design a tool to identify the source of errors caused by software update

Security

Net-security
17.2.20

Key technology trends that will redefine businesses over the next three years

Security

Net-security

17.2.20

SOAR or not to SOAR?

Security

SANS
16.2.20Microsoft Confirms Windows 10 KB4524244 Issues and Pulls the UpdateOS

Bleepingcomputer

16.2.20IRS Urges Taxpayers to Enable Multi-Factor AuthenticationSpam

Bleepingcomputer

16.2.20Windows Terminal 0.9 Released with Command Line Arguments and MoreOS

Bleepingcomputer

16.2.20

Plastic Surgery Patient Photos, Info Exposed by Leaky DatabaseIncindent

Bleepingcomputer

16.2.20Mobile Phishing Campaign Uses over 200 Pages to Spoof Bank SitesPhishing

Bleepingcomputer

16.2.20US Govt Updates Info on North Korean MalwareBigBrothers

Bleepingcomputer

16.2.20Tech Conferences in Asia On Hold Due To Coronavirus OutbreakVirus

Bleepingcomputer

16.2.20

Windows 10 KB4524244 Update Causes Freezes, Installation IssuesOS

Bleepingcomputer

16.2.20U.S. Store Chain Rutter’s Hit by Credit Card Stealing MalwareVirus

Bleepingcomputer

16.2.20Parallax RAT: Common Malware Payload After Hacker Forums PromotionVirus

Bleepingcomputer

16.2.20Helix Bitcoin Mixer Owner Charged for Laundering Over $310 MillionCryptocurrency

Bleepingcomputer

16.2.20US Charges Huawei With Conspiracy to Steal Trade Secrets, RacketeeringBigBrothers

Bleepingcomputer

16.2.20Sextortion Emails Sent by Emotet Earn 10 Times More Than NecursVirus

Bleepingcomputer

16.2.20

Mozilla Firefox to Support Chrome's Image Lazy Loading FeatureSecurity

Bleepingcomputer

16.2.20SweynTooth Bug Collection Affects Hundreds of Bluetooth ProductsVulnerebility

Bleepingcomputer

16.2.20

Ransom NewsRansomRansom
16.2.207 Factors to Consider When Evaluating Endpoint Protection SolutionsSafety blogSonicwall
16.2.20A tale of two phishes: coronavirus safety and W-9 formsMalware blogAvast blog

16.2.20

Wireshark Tutorial: Examining Qakbot InfectionsMalware blog

Palo Alto Unity42

16.2.20Unit 42 CTR: Leaked Code from Docker RegistriesIncident blog

Palo Alto Unity42

16.2.20Unit 42 CTR: Sensitive Data Exposed in GitHubIncident blog

Palo Alto Unity42

16.2.20Securing the Software Development Supply ChainCyber blog

Palo Alto

16.2.20

Tapping the True Potential of the 5G Digital EconomyCyber blog

Palo Alto

16.2.20Holistic SDN Security Makes Security Comprehensive EverywhereCyber blog

Palo Alto

16.2.20Cloud Native Security Beyond Your Vendor’s ToolsCyber blog

Palo Alto

16.2.20Palo Alto Networks Executives Recognized as CRN Channel Chiefs Cyber blog

Palo Alto

16.2.20The Future of the Cloud Native Security Platform: Q&A with John Morell...Cyber blog

Palo Alto

16.2.20Announcing Cortex XDR Managed Threat Hunting Service And New XDR FeaturesCyber blog

Palo Alto

16.2.20

Windows 10 KB4532693 Update Bug Hides User Data, Loads Wrong ProfileOS

Bleepingcomputer

16.2.20Windows 10 Insider Build 19564 Released With New Calendar App, GPU SettingsOS

Bleepingcomputer

16.2.20WordPress Cookie Consent Plugin Fixes Critical Flaw for 700K UsersVulnerebility

Bleepingcomputer

16.2.20Microsoft Urges Exchange Admins to Disable SMBv1 to Block MalwareSafety  Virus

Bleepingcomputer

16.2.20

Microsoft Posts Updated Dev Roadmap for the Edge BrowserOS

Bleepingcomputer

16.2.20Office 365 Users Get Automated Protection From Malicious DocsVirus

Bleepingcomputer

16.2.20Google Play Protect Blocked 1.9 Billion Malware Installs in 2019Android

Bleepingcomputer

16.2.20BEC Fraud Profits from Gift Cards, Down 63% Over HolidaysCyberCrime

Bleepingcomputer

16.2.20

Microsoft Releases February 2020 Office Updates With Security FixesVulnerebility

Bleepingcomputer

16.2.20Amex, Chase Fraud Protection Emails Used as Clever Phishing LurePhishing

Bleepingcomputer

16.2.20FBI: Cybercrime Victims Lost $3.5 Billion in 2019CyberCrime

Bleepingcomputer

16.2.20Microsoft Patches Actively Exploited Internet Explorer Zero-DayVulnerebility

Bleepingcomputer

16.2.20

Microsoft's February 2020 Patch Tuesday Fixes 99 Flaws, IE 0dayVulnerebility

Bleepingcomputer

16.2.20Windows 10 Cumulative Updates KB4532693 & KB4532691 ReleasedVulnerebility

Bleepingcomputer

16.2.20Adobe Releases the February 2020 Security UpdatesVulnerebility

Bleepingcomputer

16.2.20NextMotion plastic surgery tech firm data leakIncindentSecurityaffairs
16.2.20SweynTooth Bluetooth flaws affect devices from major system-on-a-chip (SoC) vendorsVulnerebilitySecurityaffairs
16.2.20The cyber attack against Austria’s foreign ministry has endedBigBrothersSecurityaffairs
16.2.20USCYBERCOM Shares More North Korean Malware SamplesBigBrothersSecurityweek

15.2.20

Microsoft Backpedals on Forcing Bing Search for Office 365 UsersOS

Bleepingcomputer

15.2.20Microsoft Reveals More Windows 10X Details, Here's What we KnowOS

Bleepingcomputer

15.2.20Google Removes Dashlane Password Manager from Chrome Web StoreSecurity

Bleepingcomputer

15.2.20FTC Warns of Ongoing Scams Using Coronavirus BaitBigBrothers

Bleepingcomputer

15.2.20Firefox 73 Released With Security Fixes, New DoH Provider, MoreVulnerebility

Bleepingcomputer

15.2.20SoundCloud Fixed API Flaws That Could Lead to Account TakeoverVulnerebility

Bleepingcomputer

15.2.20

StockX Adds 2-Step Verification for Better Security, Enable NowSecurity

Bleepingcomputer

15.2.20

Dell SupportAssist Bug Exposes Business, Home PCs to AttacksVulnerebility

Bleepingcomputer

15.2.20Windows Server 2008 Servers Don’t Boot After KB4539602 UpdateOS

Bleepingcomputer

15.2.20Ragnar Locker Ransomware Targets MSP Enterprise Support ToolsRansomware

Bleepingcomputer

15.2.20U.S. Charges Chinese Military Hackers for Equifax BreachBigBrothers

Bleepingcomputer

15.2.20Improve Your Windows 10 PC With These Free AppsOS

Bleepingcomputer

15.2.20

NEW CYBER ESPIONAGE CAMPAIGNS TARGETING PALESTINIANS - PART 2: THE DISCOVERY OF THE NEW, MYSTERIOUS PIEROGI BACKDOORBigBrother blogCybereason
15.2.20NEW CYBER ESPIONAGE CAMPAIGNS TARGETING PALESTINIANS - PART 1: THE SPARK CAMPAIGNBigBrother blogCybereason
15.2.20Knock, Knock – Who’s There?Security blogMcafee blog
15.2.20How Chinese Cybercriminals Use Business Playbook to Revamp UndergroundBigBrother blogMcafee blog
15.2.20Intelligence in the EnterpriseSecurity blogMcafee blog
15.2.20Are Gen Z-ers More Security Savvy Online than Millennials?Security blogF5 Labs

15.2.20

Prioritizing Vulnerability Management Using Machine LearningSecurity blogF5 Labs

15.2.20

Top Attacks Against Service Providers 2017-2019Attack blogF5 Labs
15.2.20"Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian InterestsBigBrother blogF5 Labs
15.2.20Managed Defense: The Analytical MindsetSecurity blogF5 Labs
15.2.20A day^W^W Several months in the life of Project Zero - Part 2: The Chrome exploit of sufferingExploit blogProject Zero
15.2.20A day^W^W Several months in the life of Project Zero - Part 1: The Chrome bug of sufferingExploit blogProject Zero
15.2.20Mitigations are attack surface, tooExploit blogProject Zero

15.2.20

Threat actors attempt to capitalize on coronavirus outbreakSecurity blog

Cisco Talos

15.2.20Loda RAT Grows UpMalware blog

Cisco Talos

15.2.20Vulnerability Spotlight: Remote code execution vulnerability in Apple SafariVulnerebility blog

Cisco Talos

15.2.20Vulnerability Spotlight: Use-after-free vulnerability in Windows 10 win32kbaseVulnerebility blog

Cisco Talos

15.2.20Vulnerability Spotlight: Code execution vulnerability in Microsoft Media FoundationVulnerebility blog

Cisco Talos

15.2.20Vulnerability Spotlight: Code execution vulnerability in Microsoft ExcelVulnerebility blog

Cisco Talos

15.2.20

Microsoft Patch Tuesday — Feb. 2020: Vulnerability disclosures and Snort coverageVulnerebility blog

Cisco Talos

15.2.20Vulnerability Spotlight: Information leak vulnerability in Adobe Acrobat Reader’s JavaScript functionVulnerebility blog

Cisco Talos

15.2.20Introducing Cisco Talos Incident Response: Stories from the FieldSecurity blog

Cisco Talos

15.2.20Vulnerability Spotlight: Accusoft ImageGear library code execution vulnerabilitiesVulnerebility blog

Cisco Talos

15.2.20PayPal remains the most‑spoofed brand in phishing scamsPhishing blog

Eset

15.2.20How romance scammers break your heart – and your bank accountSpam blog

Eset

15.2.20

FBI: Cybercrime losses tripled over the last 5 yearsCyber blog

Eset

15.2.20Almost 2 billion malware installs thwarted by Google Play Protect in 2019Malware blog

Eset

15.2.20Digital addiction: How to get your children off their screensCyber blogEset
15.2.20Microsoft Patch Tuesday fixes IE zero‑day and 98 other flawsVulnerebility blogEset
15.2.20Competing in esports: 3 things to watch out for

Cyber blog

Eset

15.2.20

AR20-045E : MAR-10271944-2.v1 – North Korean Trojan: ARTFULPIE

CERT Analysy

CERT Analysy
15.2.20

AR20-045D : MAR-10271944-1.v1 – North Korean Trojan: HOTCROISSANT

CERT Analysy

CERT Analysy
15.2.20

AR20-045C : MAR-10265965-3.v1 – North Korean Trojan: CROWDEDFLOUNDER

CERT Analysy

CERT Analysy
15.2.20

AR20–045B : MAR-10265965-2.v1 – North Korean Trojan: SLICKSHOES

CERT Analysy

CERT Analysy
15.2.20

AR20-045A : MAR-10265965-1.v1 – North Korean Trojan: BISTROMATH

CERT Analysy

CERT Analysy
15.2.20

AR20-045F : MAR-10271944-3.v1 – North Korean Trojan: BUFFETLINE

CERT Analysy

CERT Analysy

15.2.20

AR19-304A : MAR-10135536-8 – North Korean Trojan: HOPLIGHT

CERT Analysy

CERT Analysy

15.2.20

Hackers Can Seize Control of Ballots Cast Using the Voatz Voting App, Researchers Say

Hacking

Threatpost

15.2.20

SMS Phishing Campaign Targets Mobile Bank App Users in North America

Mobil  Phishing

Threatpost

15.2.20

Apple iPhone Users Targeted with Bogus Dating App for Valentine’s Day

Apple

Threatpost

15.2.20

News Wrap: Valentine’s Day Scams and Emotet’s Wi-Fi Hack

Security

Threatpost

15.2.20

Huawei Controversy Highlights 5G Security Implications

BigBrothers  Mobil

Threatpost

15.2.20

500 Malicious Chrome Extensions Impact Millions of Users

Virus

Threatpost

15.2.20

US Govt agencies detail North Korea-linked HIDDEN COBRA malware

BigBrothers

Securityaffairs
15.2.20

Russian watchdog fines Twitter, Facebook for not moving user data to local servers

BigBrothers  Social

Securityaffairs
15.2.20

3 Employees Suspended in $4M Puerto Rico Online Scam

Spam

Securityweek
15.2.20

SweynTooth: Bluetooth Vulnerabilities Expose Many Devices to Attacks

Attack  Vulnerebility

Securityweek
15.2.20

Many Upstream Oil and Gas Companies Invested in Cybersecurity in 2019: Survey

Cyber

Securityweek

14.2.20

Nedbank client data compromised in security breach at third-party providerIncindentSecurityaffairs
14.2.20PoS malware infected systems at 71 locations operated by US store chain Rutter’sVirusSecurityaffairs
14.2.20Facebook Spars With EU Regulator Over Dating App DelaySocialSecurityweek
14.2.20Over 70 Rutter's Stores Hit by Payment Card BreachIncindentSecurityweek

14.2.20

MIT Researchers Find Vulnerabilities in Voatz Voting AppVulnerebilitySecurityweek
14.2.20Twitter, Facebook Fined for Not Moving User Data to RussiaSocialSecurityweek
14.2.20Microsoft Brings Safe Documents, Application Guard to More 365 ProPlus UsersSecuritySecurityweek
14.2.20Official: Puerto Rico Govt Loses $2.6M in Phishing ScamPhishingSecurityweek
14.2.20U.S. Charges Huawei with Stealing Trade Secrets from 6 CompaniesBigBrothersThehackernews

14.2.20

500 Chrome Extensions Caught Stealing Private Data of 1.7 Million UsersIncindentThehackernews

14.2.20

Puerto Rico Gov Hit By $2.6M Phishing ScamPhishing

Threatpost

14.2.20Privacy Experts Skeptical of Proposed Data Protection AgencyPrivacy

Threatpost

14.2.20Critical WordPress Plugin Bug Afflicts 700K SitesVulnerebility

Threatpost

14.2.20Google: Efforts Against Bad Android Apps on Play Store Are WorkingAndroid

Threatpost

14.2.20

Helix Bitcoin Mixer operator charged for laundering over $300M worth of BitcoinCryptocurrencySecurityaffairs
14.2.20Three Italian universities hacked by LulzSec_ITA collectiveHackingSecurityaffairs
14.2.20Huawei Hit With New US Charges of Trade Secrets TheftBigBrothersSecurityweek
14.2.20New Backdoor Attacks Leverage Political Turmoil in Middle EastVirusSecurityweek
14.2.20Profinet Vulnerability Exposes Siemens, Moxa Devices to DoS AttacksAttack  VulnerebilitySecurityweek

14.2.20

Keep an Eye on Command-Line Browsers

Security

SANS
14.2.20

Seven cybersecurity and privacy forecasts for 2020

Cyber

Net-security
14.2.20

43% of IT professionals are still tracking assets in spreadsheets

Security

Net-security

14.2.20

Digital certificates still cause unplanned downtime and application outages

Security

Net-security
14.2.20

Global spending on smart cities initiatives to total nearly $124 billion in 2020

Security

Net-security

13.2.20

MoleRATs APT group targets Palestinian territoriesAPTSecurityaffairs

13.2.20

US officials claim Huawei Equipment has secret backdoor for spyingBigBrothersSecurityaffairs

13.2.20

Google: Protections Added by Samsung to Android Kernel Increase Attack SurfaceAndroid  AttackSecurityweek

13.2.20

Threat Intelligence Company Sixgill Raises $15 MillionITSecurityweek

13.2.20

Threat From Spoofed Emails Grows, While DMARC Implementation LagsSpamSecurityweek

13.2.20

Google Play Protect prevented 1.9 billion malware installs from Third-party stores in 2019AndroidSecurityaffairs

13.2.20

WhatsApp Defends Encryption as It Tops 2 Billion UsersSocialSecurityweek

13.2.20

Facebook Removes More State-Linked Misleading AccountsSocialSecurityweek

13.2.20

SOC-as-a-Service Company Cysiv Raises $26 MillionITSecurityweek

13.2.20

2020 State of Malware ReportReportReport

13.2.20

2020 SONICWALL CYBER THREAT REPORTReportReport

13.2.20

DDoS attacks in Q4 2019AttackSecurelist

13.2.20

600+ installs of WordPress Cookie Consent Plugin vulnerable to hack. Fix it now!VulnerebilitySecurityaffairs

13.2.20

Microsoft recommends Exchange admins to disable the SMBv1 protocolSafetySecurityaffairs

13.2.20

White House Claims Huawei Equipment Has Backdoor for SpyingBigBrothersSecurityweek

13.2.20

FBI: $3.5B Lost in 2019 to Known Cyberscams, Ransomware

CyberCrime

Threatpost

13.2.20

Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches

Attack

Threatpost

13.2.20

SoundCloud Tackles DoS, Account Takeover Issues

Attack

Threatpost

13.2.20

Katie Moussouris: The Bug Bounty Conflict of Interest

Security

Threatpost

13.2.20

Mozilla Firefox 73 Browser Update Fixes High-Severity RCE Bugs

Vulnerebility

Threatpost

13.2.20

Intel Patches High-Severity Flaw in Security Engine

Vulnerebility

Threatpost

13.2.20

Estée Lauder Exposes 440M Records, with Email Addresses, Network Info

Incindent

Threatpost

13.2.20

Adobe Addresses Critical Flash, Framemaker Flaws

Vulnerebility

Threatpost

13.2.20

Dell Patches SupportAssist Flaw That Allows Arbitrary Code Execution

Vulnerebility

Threatpost

13.2.202019 INTERNET CRIME REPORTReportReport

13.2.20

IBM ServeRAID Manager exposes unauthenticated Java Remote Method Invocation (RMI) serviceAlertAlert

13.2.20

Siemens fixed multiple DoS flaws in several productsICSSecurityaffairs

13.2.20

SAP Releases 13 Security Notes on February 2020 Patch DayVulnerebilitySecurityweek

13.2.20

Google Play Protect Scans 100 Billion Android Apps DailyAndroidSecurityweek

13.2.20

Emotet Malware Now Hacks Nearby Wi-Fi Networks to Infect New VictimsVirusThehackernews

13.2.20

March Patch Tuesday is Coming - the LDAP Changes will Change Your Life!

Vulnerebility

SANS

13.2.20

Security pros anticipate automation will reduce IT security headcount, but not replace human expertise

Security

Net-security

13.2.20

A closer look at the global threat landscape

Security

Net-security

13.2.20

Cryptocurrency crime losses more than double to $4.5 billion in 2019

Cryptocurrency

Net-security

13.2.20

Employees aware of privacy risks, but unsure of how they affect the workplace

Security

Net-security

13.2.20

Crucial trends shaping the managed services market

Security

Net-security

13.2.20

Download: The (ISC)2 Exam Action Plan for CISSP, SSCP, or CCSP certification

Security

Net-security

13.2.20

Half of cybercrime losses in 2019 were the result of BEC scams

CyberCrime

Net-security
12.2.20Reading the 2019 Internet Crime Complaint Center (IC3) reportCyberCrimeSecurityaffairs

12.2.20

Crypto AG was spied for US, German intelligence agencies for decadesBigBrothersSecurityaffairs

12.2.20

Microsoft Patch Tuesday updates for February 2020 fix IE 0day flawVulnerebilitySecurityaffairs

12.2.20

440M records found online in unprotected database belonging to Estée LauderIncindentSecurityaffairs

12.2.20

Apple Joins FIDO AllianceAppleSecurityweek

12.2.20

Siemens Patches Serious DoS Vulnerabilities in Several ProductsICSSecurityweek

12.2.20

Randori Arms Red Teams With New Automated Attack PlatformAttackSecurityweek

12.2.20

BEC Losses Surpassed $1.7 Billion in 2019: FBISpam  IncindentSecurityweek

12.2.20

Over 15.1 Billion Records Exposed in Data Breaches in 2019IncindentSecurityweek

12.2.20

KBOT Malware Shows Viruses Are Not ExtinctVirusSecurityweek

12.2.20

Deep Instinct Raises $43 Million in Series C Funding RoundITSecurityweek

12.2.20

Emotet Malware Now Hacks Nearby Wi-Fi Networks to Infect New VictimsVirusSecurityweek
12.2.20Adobe addresses 42 flaws in its five productsVulnerebilitySecurityaffairs

12.2.20

OT attacks increased by over 2000 percent in 2019, IBM reportsAttack  ICSSecurityaffairs

12.2.20

Coronavirus-Themed Emails Deliver Malware, Phishing, ScamsPhishing  Spam  VirusSecurityweek

12.2.20

Beauty and the Breach: Estée Lauder Exposes 440 Million Records in Unprotected DatabaseIncindentSecurityweek

12.2.20

Switzerland Investigating Alleged CIA, German Front CompanyBigBrothersSecurityweek

12.2.20

Microsoft Patches IE Zero-Day, 98 Other VulnerabilitiesVulnerebilitySecurityweek

12.2.20

US, German Spies Plundered Global Secrets Via Swiss Encryption Firm: ReportBigBrothersSecurityweek

12.2.20

Equifax Breach is the Latest of Many Hacks Linked to ChinaBigBrothers  IncindentSecurityweek

12.2.20

Adobe Patches 42 Vulnerabilities Across Five ProductsVulnerebilitySecurityweek

12.2.20

Update Microsoft Windows Systems to Patch 99 New Security FlawsVulnerebilityThehackernews

12.2.20

Adobe Releases Patches for Dozens of Critical Flaws in 5 SoftwareVulnerebilityThehackernews

12.2.20

Malpsam pushes Ursnif through Italian language Word docs

Spam

SANS

12.2.20

Emotet: Crimeware you need to be aware of

Virus

Net-security

12.2.20

Credential exposure report: Poor password habits still pose a serious threat

Security

Net-security

12.2.20

Mac threats are growing faster than their Windows counterparts

Apple

Net-security

12.2.20

The rise of human-driven fraud attacks

Attack

Net-security

12.2.20

Download: IR Management and Reporting PowerPoint template

Security

Net-security

12.2.20

MorganFranklin names Jason Berland as Managing Director of its IAM service offering

Security

Net-security

12.2.20

February 2020 Patch Tuesday: Microsoft fixes 99 vulnerabilities, Adobe 42

Vulnerebility

Net-security
11.2.20Dell SupportAssist flaw exposes computers to hack, patch it asap!VulnerebilitySecurityaffairs
11.2.20Safer internet day – Cybercrime facts InfographicCyberCrimeSecurityaffairs
11.2.20Flaws in Accusoft ImageGear Expose Users to Remote AttacksVulnerebilitySecurityweek
11.2.20Another Flaw in Dell SupportAssist Allows Code Execution With Elevated PrivilegesVulnerebilitySecurityweek
11.2.20Firefox 74 Will Disable TLS 1.0 and TLS 1.1 by DefaultSafetySecurityweek
11.2.20Echobot Malware Drives Significant Increase in OT AttacksVirusSecurityweek
11.2.20App Used by Israel's Ruling Party Leaked Personal Data of All 6.5 Million VotersBigBrothersThehackernews
11.2.20

The 25 most impersonated brands in phishing attacks

Attack  Phishing

Net-security

11.2.20

12,000+ Jenkins servers can be exploited to launch, amplify DDoS attacks

Attack

Net-security

11.2.20South Korean Woori Bank is accused of unauthorized use of customer dataIncindentSecurityaffairs
11.2.20The Altsbit exchange will exit in May following a hackHackingSecurityaffairs
11.2.20China Denies U.S. Allegations Over Military 'Hackers'BigBrothersSecurityweek
11.2.20Emotet Now Hacks Nearby Wi-Fi Networks to Spread Like a WormVirus

Threatpost

11.2.20Docker Registries Expose Hundreds of Orgs to Malware, Data TheftIncindent  Virus

Threatpost

11.2.20BYO-Bug Tactic Attacks Windows Kernel with Outdated DriverAttack

Threatpost

11.2.20Active PayPal Phishing Scam Targets SSNs, Passport PhotosPhishing

Threatpost

11.2.20Equifax Breach: Four Members of Chinese Military Charged with HackingIncindentThreatpost
11.2.20Chinese Military personnel charged with hacking into credit reporting agency EquifaxBigBrothersSecurityaffairs
11.2.20Unique Illinois Privacy Law Leads to $550M Facebook DealSocialSecurityweek
11.2.20Chinese Military Stole Masses of Americans’ Data, US SaysBigBrothersSecurityweek
11.2.20Misconfigured Docker Registries Expose Thousands of RepositoriesIncindentSecurityweek
11.2.20

Cybersecurity is a board level issue: 3 CISOs tell why

Security

Net-security

11.2.20

In 2019, a total of 7,098 reported breaches exposed 15.1 billion records

Incindent

Net-security

11.2.20

Organizations struggling to find skilled security staff, leaving 82% of security teams understaffed

Security

Net-security

11.2.20

eBook: 8 Real World Use Cases for SOAR

Security

Net-security

11.2.20

Ransomware uses vulnerable, signed driver to disable endpoint security

Ransomware

Net-security
10.2.20U.S. Charges 4 Chinese Military Hackers Over Equifax Data BreachBigBrothersThehackernews
10.2.20Netanyahu’s party Elector app exposes data on over 6.5M IsraelisBigBrothers  SocialSecurityaffairs
10.2.20Presidential Candidates' Use of DMARC Improves, but Remains Short of OptimumBigBrothersSecurityweek
10.2.20Ransomware Hits North Miami Beach Police DepartmentRansomwareSecurityweek
10.2.20Chinese Military Hackers Charged Over Equifax Data BreachBigBrothers  IncindentSecurityweek
10.2.20Netherlands University Pays $240,000 After Targeted Ransomware AttackRansomwareSecurityweek
10.2.20Facebook Paid $2.2 Million in Bug Bounty Rewards in 2019SocialSecurityweek
10.2.20KBOT: sometimes they come backVirusSecurelist
10.2.201.2 million CPR numbers for Danish citizen leaked through tax serviceIncindentSecurityaffairs
10.2.20A sad story of pedophilia on how disgusting images fed the webBigBrothers  CyberSecurityaffairs
10.2.20Malaysia’s MyCERT warns cyber espionage campaign carried out by APT40BigBrothersSecurityaffairs
10.2.20A cyber-attack on major banks could trigger a liquidity crisis, ECB President Christine Lagarde warnsAttack  BigBrothersSecurityaffairs
10.2.20Israel's Likud Party Exposed Details of Over 6 Million VotersBigBrothersSecurityweek
10.2.20Facebook's Twitter, Instagram Accounts HackedSocialSecurityweek
10.2.20

Shadow IT accounts with weak passwords endanger organizations

Security

Net-security
10.2.20

The frequency of DDoS attacks depends on the day and time

Attack

Net-security

10.2.20

Current PayPal phishing campaign or "give me all your personal information"

Phishing

SANS
10.2.20Massive DDoS attack brought down 25% Iranian Internet connectivityAttackSecurityaffairs
10.2.20The number of cyber attacks on Saudi Aramco is increasingAttackSecurityaffairs
10.2.20Maastricht University finally paid a 30 bitcoin ransom to crooksRansomwareSecurityaffairs
10.2.20Iran Says Foils Cyberattack Targeting Internet ProvidersBigBrothersSecurityweek
10.2.20

5 tips for acquiring cyber talent in 2020

Cyber

Net-security

10.2.20

What the government infosec landscape will look this year

BigBrothers

Net-security

10.2.20

The future of DNS security: From extremes to a new equilibrium

Security

Net-security

10.2.20

Study: The Blind Spots of Email Security

Security

Net-security

9.2.20Windows 10 Start Menu Suggests Firefox Users Switch to EdgeOS

Bleepingcomputer

9.2.20Microsoft’s Surface Duo Spotted in the Wild, Video LeakedOS

Bleepingcomputer

9.2.20Lock My PC Used By Tech Support Scammers, Dev Offers Free RecoverySpam

Bleepingcomputer

9.2.20Windows 7 Users Suddenly Can't Shut Down Their PCs, How to FixOS

Bleepingcomputer

9.2.20Twitter Outage Prevents Users From Sending New TweetsSocial

Bleepingcomputer

9.2.20TA505 Hackers Behind Maastricht University Ransomware AttackRansomware

Bleepingcomputer

9.2.20Microsoft Releases Windows 7 Update to Fix Wallpaper BugOS

Bleepingcomputer

9.2.20Misconfigured Docker Registries Expose Orgs to Critical RisksIncindent

Bleepingcomputer

9.2.20Emotet Hacks Nearby Wi-Fi Networks to Spread to New VictimsVirus

Bleepingcomputer

9.2.20Critical Android Bluetooth Flaw Exploitable without User InteractionAndroid

Bleepingcomputer

9.2.20Japanese Defense Contractors Kobe Steel, Pasco Disclose BreachesBigBrothers  Incindent

Bleepingcomputer

9.2.20Google Chrome to Block Mixed Content Downloads, Prevents MiTM AttacksAttack

Bleepingcomputer

9.2.20Phishing Attack Disables Google Play Protect, Drops Anubis TrojanAndroid  Phishing

Bleepingcomputer

9.2.20DoJ Asks Victims of the Quantum DDoS Service to Come ForwardBigBrothers

Bleepingcomputer

9.2.20Ransomware Exploits GIGABYTE Driver to Kill AV ProcessesRansomware

Bleepingcomputer

9.2.20Oscar Nominated Movies Featured in Phishing, Malware AttacksPhishing  Virus

Bleepingcomputer

9.2.20BEC Scammers’ Interest in the Real Estate Sector RisesSpam

Bleepingcomputer

9.2.20Bug in Philips Smart Light Allows Hopping to Devices on the NetworkVulnerebility

Bleepingcomputer

9.2.20Medicaid CCO Vendor Breach Exposes Health, Personal Info of 654KIncindent

Bleepingcomputer

9.2.20Mailto (NetWalker) Ransomware Targets Enterprise NetworksRansomware

Bleepingcomputer

9.2.20Ransom NewsRansomRansom
9.2.20Cisco Patches Critical CDP Flaws Affecting Millions of DevicesVulnerebility

Bleepingcomputer

9.2.20Microsoft Starts Testing Hyper-V for Windows 10 ARM64 DevicesOS

Bleepingcomputer

9.2.20Charming Kitten Hackers Impersonate Journalist in Phishing AttacksPhishing

Bleepingcomputer

9.2.20New Ransomware Strain Halts Toll Group DeliveriesRansomware

Bleepingcomputer

9.2.20Windows 10 Search Is Broken and Shows Blank Results, How to FixOS

Bleepingcomputer

9.2.20Bitbucket Abused to Infect 500,000+ Hosts with Malware CocktailVirus

Bleepingcomputer

9.2.20Realtek Fixes DLL Hijacking Flaw in HD Audio Driver for WindowsHacking  Vulnerebility

Bleepingcomputer

9.2.20Chrome 80 Released With 56 Security Fixes, Cookie Changes, MoreVulnerebility

Bleepingcomputer

9.2.20Emotet Gets Ready for Tax Season With Malicious W-9 FormsVirus

Bleepingcomputer

9.2.20FBI Warns of DDoS Attack on State Voter Registration SiteAttack  BigBrothers

Bleepingcomputer

9.2.20WhatsApp Bug Allowed Attackers to Access the Local File SystemSocial  Vulnerebility

Bleepingcomputer

9.2.20Google Bug Sent Private Google Photos Videos to Other UsersVulnerebility

Bleepingcomputer

9.2.20Inside Cybercriminal Inc.: SonicWall Exposes New Cyberattack Data, Threat Actor Behaviors in Latest ReportCyber blogSonicwall
9.2.20Unit 42 Cloud Threat Report: Spring 2020Cyber blog

Palo Alto Unity42

9.2.20Unit 42 CTR: Leaked Code from Docker RegistriesCyber blog

Palo Alto Unity42

9.2.20Unit 42 CTR: Sensitive Data Exposed in GitHubCyber blog

Palo Alto Unity42

9.2.20Actors Still Exploiting SharePoint Vulnerability to Attack Middle East Government OrganizationsVulnerebility blog

Palo Alto Unity42

9.2.20The Cloud’s Sunny Future: The Rewards of Working in Cloud SecurityCyber blog

Palo Alto

9.2.20Announcing Cortex XDR Managed Threat Hunting Service And New XDR FeaturesCyber blog

Palo Alto

9.2.20The Road to 100 on the HRC’s 2020 Corporate Equality IndexCyber blog

Palo Alto

9.2.20Book Review: “The Fifth Domain”Cyber blog

Palo Alto

9.2.20Cyborgs, Trolls and Bots: A Guide to Online MisinformationBotNetSecurityweek
9.2.20IoT devices at major Manufacturers infected with crypto-minerCryptocurrency  IoTSecurityaffairs
9.2.20Facebook’s official Twitter and Instagram accounts hacked by OurMineSocialSecurityaffairs
9.2.20Group-IB detects Half a Million Indian Banks’ Cards on Joker’s Stash CardshopCyberCrimeSecurityaffairs
8.2.20Office 365 to Block Harmful Content Regardless of Custom ConfigsSecurity

Bleepingcomputer

8.2.20New EmoCheck Tool Checks if You're Infected With EmotetVirus

Bleepingcomputer

8.2.20Twitter Fixed Issue Exploited to Match Phone Numbers to AccountsSocial

Bleepingcomputer

8.2.20Nintendo Hacker Pleads Guilty to Child Porn Charges, Faces 25 YearsIT

Bleepingcomputer

8.2.20Bouygues Construction Shuts Down Network to Thwart Maze RansomwareRansomware

Bleepingcomputer

8.2.20DoD to Require Cybersecurity Certification From Defense ContractorsBigBrothers

Bleepingcomputer

8.2.20DoppelPaymer Ransomware Sells Victims' Data on Darknet if Not PaidRansomware

Bleepingcomputer

8.2.20'Hack' Creates Fake Google Maps Traffic Jams With 99 Cell PhonesMobil

Bleepingcomputer

8.2.2038,000 Flash Games Archived for Offline Play and PreservationIT

Bleepingcomputer

8.2.20Notepad and Paint Become Optional Features in Windows 10OS

Bleepingcomputer

8.2.20Tech Support Scam Hitting Microsoft Edge Start Page Takes a BreakSpam

Bleepingcomputer

8.2.20Pirated Software is All Fun and Games Until Your Data’s StolenHacking

Bleepingcomputer

8.2.20THE HOLE IN THE BUCKET: ATTACKERS ABUSE BITBUCKET TO DELIVER AN ARSENAL OF MALWAREMalware blogCybereason
8.2.20U.S. Battleground County Website Security SurveyBigBrother blogMcafee blog
8.2.20Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in December 2019Security blogF5 Labs
8.2.20STOMP 2 DIS: Brilliance in the (Visual) BasicsMalware blogFireEye
8.2.20Quarterly Report: Incident Response trends in fall 2019Incident blog

Cisco Talos

8.2.20Vulnerability Spotlight: Denial-of-service, information leak bugs in Mini-SNMPDVulnerebility blog

Cisco Talos

8.2.20Critical Bluetooth bug leaves Android users open to attackOS Blog  Vulnerebility blog

Eset

8.2.20Facebook now lets parents monitor their children’s chatsSocial blog

Eset

8.2.20How to catch a cybercriminal: Tales from the digital forensics labCyber blog

Eset

8.2.20Electric scooters vulnerable to remote hacksVulnerebility blog

Eset

8.2.20Facebook privacy settings: Protect your data with these tipsSocial blogEset
8.2.20Would you get hooked by a phishing scam? Test yourselfPhishing blogEset
8.2.20Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANsVulnerebility

Threatpost

8.2.20Magecart Gang Attacks Olympic Ticket Reseller and Survival Food SitesCyberCrime

Threatpost

8.2.20Google Chrome To Bar HTTP File DownloadsSecurity

Threatpost

8.2.20Phishing Campaign Targets 250 Android Apps with Anubis MalwareAndroid  Phishing

Threatpost

8.2.20Wacom Tablet Data Exfiltration Raises Security ConcernsSecurity

Threatpost

8.2.20Critical Android Bluetooth Bug Enables RCE, No User Interaction NeededAndroid

Threatpost

8.2.20RobbinHood ransomware exploit GIGABYTE driver flaw to kill security softwareRansomwareSecurityaffairs
8.2.20Chrome Will Block Insecure Downloads on HTTPS PagesSecuritySecurityweek
8.2.20IoT Devices at Major Manufacturers Infected With Malware via Supply Chain AttackAttack  IoT  VirusSecurityweek
8.2.20Organizations Quick to Patch Critical Citrix ADC VulnerabilityVulnerebilitySecurityweek
7.2.20Japanese defense contractors Pasco and Kobe Steel disclose security breachesBigBrothersSecurityaffairs
7.2.20DoJ Looking for Victims of 'Quantum Stresser' DDoS ServiceBigBrothersSecurityweek
7.2.20Brazil Judge Rejects Hacking Accusation Against GreenwaldHackingSecurityweek
7.2.20Critical Bluetooth Vulnerability Exposes Android Devices to AttacksAttack  VulnerebilitySecurityweek
7.2.20Happy New Fear! Gift-wrapped spam and phishingPhishing  SpamSecurelist
7.2.20Iran-linked APT group Charming Kitten targets journalists, political and human rights activistsAPTSecurityaffairs
7.2.20Critical Android Bluetooth flaw CVE-2020-0022 could be exploited without user interactionAndroidSecurityaffairs
7.2.20Malicious Optimizers Hosted on Google Play Amassed 470,000 DownloadsAndroidSecurityweek
7.2.20Japanese Defense Contractors Pasco, Kobe Steel Disclose Old BreachesIncindentSecurityweek
7.2.20

Sandbox Detection Tricks & Nice Obfuscation in a Single VBScript

Virus

SANS

7.2.20

Phishers impersonate WHO, exploit coronavirus-related anxiety

Exploit  Phishing

Net-security

7.2.20

February 2020 Patch Tuesday forecast: A lot of love coming our way

Vulnerebility

Net-security

7.2.20U.S. Finance Sector Hit with Targeted Backdoor CampaignVirus

Threatpost

7.2.20Charming Kitten Uses Fake Interview Requests to Target Public FiguresSecurity

Threatpost

7.2.20Metamorfo Returns with Keylogger Trick to Target Financial FirmsVirus

Threatpost

7.2.20Dropbox Passes $1M Milestone for Bug-Bounty PayoutsSecurity

Threatpost

7.2.20Iranian Hackers Target Journalists in New Phishing CampaignBigBrothers  PhishingSecurityweek
7.2.20

Review: Cyber Minds

Cyber

Net-security

7.2.20

Discrepancies between data sanitization policy creation and execution put data at risk

Security

Net-security

7.2.20

43% of cloud databases are currently unencrypted

Crypto

Net-security

7.2.20

In 2020, 5G deployments will continue at a frantic pace

Mobil

Net-security

6.2.20

cdpwn – Millions of devices at risk due to flaws in implementations of Cisco Discovery Protocol (CDP)VulnerebilitySecurityaffairs

6.2.20

Hacking Wi-Fi networks by exploiting a flaw in Philips Smart Light BulbsExploitSecurityaffairs

6.2.20

New Campaign Leverages BitBucket to Deliver Arsenal of MalwareVirusSecurityweek

6.2.20

DLL Hijacking Vulnerability Found in Realtek HD Audio DriverHacking  VulnerebilitySecurityweek

6.2.20

Cloud Security Firm Netskope Raises $340 Million at $3 Billion ValuationITSecurityweek

6.2.20

Forescout Technologies to be Acquired in $1.9 Billion DealITSecurityweek

6.2.20

Patch Management Company Automox Raises $30 MillionITSecurityweek

6.2.20

Louisiana Governor Urges Officials to Ready for CyberattacksBigBrothersSecurityweek

6.2.20

FBI Director Warns of Ongoing Russian 'Information Warfare'BigBrothersSecurityweek

6.2.20

Emotet can spread to poorly secured Wi-Fi networks and computers on them

Virus

Net-security

6.2.20

Cisco Discovery Protocol (CDP) enabled devices are vulnerable to denial-of-service and remote code execution

Alert

Alert

6.2.20

CamuBot Banking Trojan Returns In Targeted Attacks

Attack  Virus

Threatpost

6.2.20

Critical Cisco ‘CDPwn’ Flaws Break Network Segmentation

Vulnerebility

Threatpost

6.2.20

New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers

IoT  Virus

Threatpost

6.2.20

Gamaredon APT Improves Toolset to Target Ukraine Government, Military

APT

Threatpost

6.2.20

WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE

Social  Virus

Threatpost

6.2.20

Critical Cisco ‘CDPwn’ Protocol Flaws Explained: Podcast

Vulnerebility

Threatpost

6.2.20

Chrome 80 Released With 56 Security Fixes

Security  Vulnerebility

Securityweek

6.2.20

Google Shared Private Videos With Wrong Users

Security

Securityweek

6.2.20

CERN Physics Lab Drops Facebook Over Data Concerns

Social

Securityweek

6.2.20

Hackers Can Steal Data From Air-Gapped Computers Via Screen Brightness

Attack

Securityweek

6.2.20

5 High Impact Flaws Affect Cisco Routers, Switches, IP Phones and Cameras

Vulnerebility

Thehackernews

6.2.20

Fake browser update pages are "still a thing"

Security

SANS

6.2.20

Honware: IoT honeypot for detecting zero-day exploits

Exploit  IoT

Net-security

6.2.20

Which vulnerabilities were most exploited by cybercriminals in 2019?

CyberCrime

Net-security

6.2.20

The Goldilocks principle for zero trust fraud prevention

Incindent

Net-security

6.2.20

Cyberattackers decreased their activity at the end of 2019, but only to change tactics

Cyber

Net-security

6.2.20

How IoT devices open a portal for chaos across the network

IoT

Net-security

6.2.20

CDPwn vulnerabilities open millions of Cisco enterprise devices to attack

Vulnerebility

Net-security

5.2.20Microsoft detects 77,000 active web shells on a daily basisSecuritySecurityaffairs
5.2.20Expert released PoC exploit code for unpatched backdoor in HiSilicon chipsExploitSecurityaffairs
5.2.20Leidos Buys L3Harris Security and Automation Business for $1 BillionITSecurityweek
5.2.20Cisco Discovery Protocol Flaws Expose Tens of Millions of Devices to AttacksVulnerebilitySecurityweek
5.2.20Vulnerability in WhatsApp Desktop Exposed User FilesSocial  VulnerebilitySecurityweek
5.2.20Smart Lightbulbs Used to Compromise Home and Business NetworksIncindentSecurityweek
5.2.20Iowa Fiasco Highlights Security Risks in US Vote, Officials SayBigBrothersSecurityweek
5.2.20Trial Begins for Ex-CIA Worker Charged With Leaking SecretsBigBrothersSecurityweek
5.2.20Exfiltrating Data from Air-Gapped Computers Using Screen BrightnessAttackThehackernews
5.2.20Dropbox paid more than $1 Million via its bug bounty programSecuritySecurityaffairs
5.2.20Hackers abuse BitBucket to infect 500K+ hosts with arsenal of malwareVirusSecurityaffairs
5.2.20Cybersecurity Bill Would Set Defense Plan for Local AgenciesCyberSecurityweek
5.2.20Sudo Vulnerability Allows Privilege Escalation to RootVulnerebilitySecurityweek
5.2.20Irish Regulator Probes Google, Tinder Over Data ProcessingSecuritySecurityweek
5.2.20Android's February 2020 Update Patches Critical System VulnerabilitiesAndroidSecurityweek
5.2.20Twitter Moves to Curb Manipulated Content Including 'Deepfakes'SocialSecurityweek
5.2.20Dropbox Paid Out Over $1 Million Through Bug Bounty ProgramSecuritySecurityweek
5.2.20Israeli Venture Firm Partners With NYC to Launch Cybersecurity AcceleratorBigBrothers  ITSecurityweek
5.2.20Flaw in Philips Smart Light Bulbs Exposes Your WiFi Network to HackersVulnerebilityThehackernews
5.2.20

Touch panels deployed in critical infrastructure vulnerable to remote attacks

Attack  Vulnerebility

Net-security
5.2.20Twitter API Abused to Uncover User IdentitiesSocial

Threatpost

5.2.20Community Housing Nonprofit Hit with $1.2M Loss in BEC ScamSpam

Threatpost

5.2.20Ransomware Attack Hinders Toll Group OperationsRansomware

Threatpost

5.2.20Two Critical Android Bugs Get Patched in February UpdateAndroid

Threatpost

5.2.20Medtronic Patches Implanted Device, CareLink Programmer BugsVulnerebilityThreatpost
5.2.20Google mistakenly shared private videos of some users with others in 2019PrivacySecurityaffairs
5.2.20Facebook fixed a WhatsApp bug that allowed hackers to access local file systemSocialSecurityaffairs
5.2.20Android's February 2020 Update Patches Critical System VulnerabilitiesAndroidSecurityweek
5.2.20Twitter Moves to Curb Manipulated Content Including 'Deepfakes'SocialSecurityweek
5.2.20Dropbox Paid Out Over $1 Million Through Bug Bounty ProgramSecuritySecurityweek
5.2.20Israeli Venture Firm Partners With NYC to Launch Cybersecurity AcceleratorITSecurityweek
5.2.20This WhatsApp Bug Could Have Let Attackers Access Files On Your PCsSocialThehackernews
5.2.20

How can we harness human bias to have a more positive impact on cybersecurity awareness?

Cyber

Net-security

5.2.20

HECVAT toolkit helps higher education institutions assess cloud adoption risk

Security

Net-security

5.2.20

Malware and ransomware attack volume down due to more targeted attacks

Ransomware  Virus

Net-security

5.2.20

Lack of .GOV validation and HTTPS leaves states susceptible to voter disinformation campaigns

Security

Net-security

5.2.20

Mobile data roaming traffic generated by consumer and IoT devices expected to surge

IoT  Mobil

Net-security
4.2.20Using 99 mobile phones to create a fake traffic jam in Google MapsMobilSecurityaffairs
4.2.20The city of Racine was offline following a ransomware attackRansomwareSecurityaffairs
4.2.20Toll Group shuts down some online systems after ransomware attackRansomwareSecurityaffairs
4.2.20Hackers abused Twitter API to match usernames to phone numbersSocialSecurityaffairs
4.2.20NCA arrested six men in UK over Malta Bank Cyber-HeistCyberCrimeSecurityaffairs
4.2.20Vulnerabilities in Mini-SNMPD Lead to DoS, Information DisclosureAttack  VulnerebilitySecurityweek
4.2.20Twitter Suspends Fake Accounts for Exploiting API VulnerabilityExploit  SocialSecurityweek
4.2.20HPE Acquires Identity Management Firm ScytaleITSecurityweek
4.2.20Australian Shipping Giant Toll Hit by RansomwareRansomwareSecurityweek
4.2.20Google Accidentally Shared Private Videos of Some Users With OthersPrivacyThehackernews
4.2.20Hackers Exploited Twitter Bug to Find Linked Phone Numbers of UsersExploit  SocialThehackernews
4.2.20

New ransomware targets industrial control systems

Ransomware

Net-security

4.2.20

State-sponsored actors may have abused Twitter API to de-anonymize users

Security

Net-security

4.2.20

TrickBot Switches to a New Windows 10 UAC Bypass to Evade Detection

BotNet

Threatpost

4.2.20

AZORult Campaign Adopts Novel Triple-Encryption Technique

Virus

Threatpost

4.2.20

Tesla Autopilot Duped By ‘Phantom’ Images

Security

Threatpost

4.2.20

Ashley Madison Breach Extortion Scam Targets Hundreds

Spam

Threatpost

4.2.20

Sudo CVE-2019-18634 flaw allows Non-Privileged Linux and macOS Users run commands as Root

Vulnerebility

Securityaffairs
4.2.20

Vulnerability in Linear eMerge Access Controllers Exploited in the Wild

Vulnerebility

Securityweek
4.2.20

Medtronic Releases Patches for Cardiac Device Flaws Disclosed in 2018, 2019

Vulnerebility

Securityweek
4.2.20

Six Arrested in UK Over Malta Bank Cyber-Heist

Crime

Securityweek
4.2.20

How CISOs can justify cybersecurity purchases

Cyber

Net-security

4.2.20

What makes some organizations more cyber resilient than others?

Cyber

Net-security

4.2.20

Scientists test forensic methods to acquire data from damaged mobile phones

Mobil

Net-security

4.2.20

Automation is advancing faster than the enterprise knowledge required to support it

Security

Net-security
3.2.20Police are warning crooks are using cleaners to compromise businessesHackingSecurityaffairs
3.2.20Ransomware brought down services of popular TV search engine TVEyesRansomwareSecurityaffairs
3.2.20Attackers are hacking NSC Linear eMerge E3 building access systems to launch DDoS attacksAttackSecurityaffairs
3.2.20Apollon Darknet market is allegedly pulling an exit scamCyberCrime  SpamSecurityaffairs
3.2.20Russia’s watchdog Roskomnadzor threatens to fine Twitter and FacebookBigBrothers  SocialSecurityaffairs
3.2.20The Russian Government blocked ProtonMail and ProtonVPNBigBrothersSecurityaffairs
3.2.20Microsoft announces the launch of a bug bounty program for XboxVulnerebilitySecurityaffairs
3.2.20Microsoft warns TA505 changed tactic in an ongoing malware campaignVirusSecurityaffairs
3.2.20Chinese Hackers Target Hong Kong Universities With New Backdoor VariantBigBrothers  VirusSecurityweek
3.2.20Trend Micro Patches More Vulnerabilities in Anti-Threat ToolkitVulnerebilitySecurityweek
3.2.20Sudo Bug Lets Non-Privileged Linux and macOS Users Run Commands as RootVulnerebilityThehackernews
3.2.20

Wuhan coronavirus exploited to deliver malware, phishing, hoaxes

Exploit

Net-security
3.2.20

Analysis of a triple-encrypted AZORult downloader

Virus

SANS

3.2.20

Layering diverse defenses is crucial for stopping email attacks

Attack

Net-security

3.2.20

The current landscape for supporting innovation in cybersecurity in the EU

Cyber

Net-security

3.2.20

Interconnectivity and networking predictions for 2020 and beyond

Security

Net-security

3.2.20

Do your employees feel valued? 64% have one foot out the door

Security

Net-security
3.2.20

Now available: eSentire’s 2019 Annual Threat Intelligence Report

SecurityNet-security
2.2.20Devious Spamhaus Phishing Scam Warns You're on an Email Block ListPhishing

Bleepingcomputer

2.2.20Coronavirus Phishing Attacks Are Actively Targeting the USPhishing

Bleepingcomputer

2.2.20New Intel Microcodes for Windows 10 Released to Fix CPU BugsOS

Bleepingcomputer

2.2.20Microsoft Offers Free Windows 10 VMs for Edge Legacy TestingOS

Bleepingcomputer

2.2.20Russia Threatens Facebook, Twitter With Fines, Demands User DataBigBrothers  Social

Bleepingcomputer

2.2.20Winnti Group Infected Hong Kong Universities With MalwareVirus

Bleepingcomputer

2.2.20Microsoft Detects New TA505 Malware Attacks After Short BreakVirus

Bleepingcomputer

2.2.20NEC Defense Contracts Info Potentially Compromised in BreachIncindent

Bleepingcomputer

2.2.20TrickBot Uses a New Windows 10 UAC Bypass to Launch QuietlyBotNet

Bleepingcomputer

2.2.20Microsoft Launches Xbox Bounty Program With $20K Maximum PayoutSecurity

Bleepingcomputer

2.2.20The Adware Families That Changed the Antivirus IndustryVirus

Bleepingcomputer

2.2.20Russia Blocks ProtonMail and ProtonVPN, Tor to the RescueBigBrothersBleepingcomputer
2.2.20Avast Shuts Down Jumpshot After Getting Caught Selling User's DataPrivacy

Bleepingcomputer

2.2.20Linux Kernel 5.6 Source Tree Includes WireGuard VPNOS

Bleepingcomputer

2.2.20Malware Tries to Trump Security Software With POTUS ImpeachmentBigBrothers  Virus

Bleepingcomputer

2.2.20AlphaBay Dark Web Market Mod Faces 20 Years After Pleading GuiltyCyberCrime

Bleepingcomputer

2.2.20Emotet Uses Coronavirus Scare to Infect Japanese TargetsVirus

Bleepingcomputer

2.2.20New 'I Got Phished' Service Alerts Companies of Phished EmployeesPhishing

Bleepingcomputer

2.2.20Google Chrome Tests Replacing URLs With Search Queries in Address BarSecurity

Bleepingcomputer

2.2.20200K WordPress Sites Exposed to Takeover Attacks by Plugin BugVulnerebility

Bleepingcomputer

2.2.20Critical Remote Code Execution Bug Fixed in OpenBSD SMTP ServerVulnerebility

Bleepingcomputer

2.2.20FBI Warns of Rise in Social Security Scams Spoofing Its Phone NumberBigBrothers  Mobil  Spam

Bleepingcomputer

2.2.20Magento 2.3.4 Fixes Critical Code Execution VulnerabilitiesVulnerebility

Bleepingcomputer

2.2.20Ubuntu Invites Windows 7 Users With Linux Switch GuidesOS

Bleepingcomputer

2.2.20Apple iOS 13.3.1 Released With Fix for Location TrackingApple

Bleepingcomputer

2.2.20Windows 10 1909 KB4532695 Update Fixes File Explorer BugsOS

Bleepingcomputer

2.2.20Google Pays $6.5 Million to Hackers for Reporting Security BugsSecurity

Bleepingcomputer

2.2.20Ransom NewsRansomRansom
2.2.20Coronavirus Affecting Business as Remote Workforces Expand Beyond Expected CapacityMalware blogSonicwall
2.2.20Attacker’s Tactics and Techniques in Unsecured Docker Daemons RevealedHacking blog

Palo Alto Unity42

2.2.20xHunt Campaign: New Watering Hole Identified for Credential HarvestingHacking blog

Palo Alto Unity42

2.2.20Earn Beacon Gold While Becoming a Ninja at Using Our ProductsCyber blog

Palo Alto

2.2.20Data Security for the Future: DLP and Secure Access Service EdgeCyber blog

Palo Alto

2.2.20Book Review: Cult of the Dead CowCyber blog

Palo Alto

2.2.20Navigating Federal Data Protection Compliance Requirements in the CloudCyber blog

Palo Alto

2.2.203 Observations About Leadership in an Age of Digital TransformationCyber blog

Palo Alto

2.2.20Book Review: Code GirlsCyber blog

Palo Alto

2.2.203 Tools for K-12 Cybersecurity: Keeping Schools Safe in a Digital WorldCyber blog

Palo Alto

2.2.205 Years of Delighting Our Customers with Outstanding Customer SupportCyber blog

Palo Alto

2.2.20Crooks start exploiting Coronavirus as bait to spread malwareVirusSecurityaffairs
2.2.20Winnti APT Group targeted Hong Kong UniversitiesAPTSecurityaffairs
2.2.20

Wireshark 3.2.1 Released

Safety

SANS

1.2.20

Windows 10 Optional Cumulative Update KB4532695 ReleasedOS

Bleepingcomputer

1.2.20Android Flash Tool Lets You Install Android Using a BrowserAndroid

Bleepingcomputer

1.2.20

Ransomware Bitcoin Wallet Frozen by UK Court to Recover RansomRansomware

Bleepingcomputer

1.2.20Kali Linux Adds Single Installer Image, Default Non-Root UserOS

Bleepingcomputer

1.2.20

Ring Android App Sent Sensitive User Data to 3rd Party TrackersAndroid

Bleepingcomputer

1.2.20Ragnarok Ransomware Targets Citrix ADC, Disables Windows DefenderRansomware

Bleepingcomputer

1.2.20

OurMine Hackers Are Back, Hijack NFL Teams' Social AccountsHacking  Social

Bleepingcomputer

1.2.20FBI Releases Alert on Iranian Hackers' Defacement TechniquesBigBrothers

Bleepingcomputer

1.2.20

Microsoft Asked to Unshackle Windows 7 From Proprietary TyrannyOS

Bleepingcomputer

1.2.20Google Chrome Gets Improved Tab Feature, Thanks to MicrosoftIT

Bleepingcomputer

1.2.20

Windows 7 To Get Post End of Life Update to Fix Wallpaper BugVulnerebility

Bleepingcomputer

1.2.20Google Rolls Back Change Making Search Results Look Like AdsSecurity

Bleepingcomputer

1.2.20

RCE Exploit for Windows RDP Gateway Demoed by ResearcherExploit

Bleepingcomputer

1.2.20First MageCart Hackers Caught, Infected Hundreds of Web StoresCyberCrime  Virus

Bleepingcomputer

1.2.20

Microsoft's IE Zero-day Fix is Breaking Windows PrintingVulnerebilityBleepingcomputer

1.2.20

6 OF THE BEST MALICIOUS LIFE CYBERSECURITY HISTORY STORIES FROM 2019Malware blog

Cybereason

1.2.20WHY IS EMOTET SO POPULAR AND WHO IS IT TARGETING NOW?Malware blog

Cybereason

1.2.20

Abusing DLL Misconfigurations — Using Threat Intelligence to Weaponize R&DHacking blogFireEye
1.2.20Zoom-Zoom: We Are Watching YouVulnerebility blogCheckpoint

1.2.20

Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure (Part II)Vulnerebility blogCheckpoint
1.2.20Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure (Part I)Vulnerebility blogCheckpoint

1.2.20

Phorpiex Arsenal: Part IBotNet blogCheckpoint
1.2.20Predator the ThiefSecurity blogCheckpoint

1.2.20

Part II: Returning to Adobe Reader symbols on macOSExploit blogProject Zero
1.2.20Don’t get sacked! Scams to look out for this Super BowlSpam blog

Eset

1.2.20

Winnti Group targeting universities in Hong KongAPT blog

Eset

1.2.20IoT laws are coming: What to expectIoT blog

Eset

1.2.20

Hackers blitz social media accounts of 15 NFL teamsSocial blog

Eset

1.2.20How to take charge of your Google privacy settingsSecurity blogEset

1.2.20

Job hunting? Beware hiring scams using spoofed company websitesSpam blogEset

1.2.20

AA20-031A : Detecting Citrix CVE-2019-19781CERTCERT
1.2.20OpenSMTPD vulnerable to local privilege escalation and remote code executionAlertAlert

1.2.20

Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program

Security

Threatpost

1.2.20

Sodinokibi Ransomware Group Sponsors Hacking Contest

Ransomware

Threatpost

1.2.20

Advanced Obfuscation Marks Widespread Info-Stealing Campaign

CyberCrime

Threatpost

1.2.20

Evil Corp Returns With New Malware Infection Tactic

Virus

Threatpost

1.2.20

Iranian Hackers Target U.S. Gov. Vendor With Malware

BigBrothers  Virus

Threatpost

1.2.20

Zero Day Initiative Bug Hunters Rake in $1.5M in 2019

Security

Threatpost

1.2.20

Hackers penetrated NEC defense business division in 2016HackingSecurityaffairs