Calendar 2020 January- Home  2020  2019  2018  2017  2016

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2020 - January  February  March  April  May  June  July  August  September  October  November  December


Date

Name

Category

Web

31.1.20

Make your own security key with Google’s OpenSK

Security

Net-security

31.1.20

Microsoft invites gamers and researchers to new Xbox bug bounty program

Security

Net-security

31.1.20

NIST Tests Forensic Methods for Getting Data From Damaged Mobile PhonesForensicsSecurityaffairs

31.1.20

New Project Informs Security Teams of Phished UsersSecuritySecurityweek

31.1.20

Researcher Finds Over 60 Vulnerabilities in Physical Security SystemsVulnerebilitySecurityweek

31.1.20

US Says EU Understands 5G Risks But Pushes on HuaweiBigBrothersSecurityweek

31.1.20

With Intelligence, Fans, Businesses and NFL Can Remain Protected Against Cyber ThreatsCyberSecurityweek

31.1.20

v02.20NewsNews

31.1.20

200K WordPress Sites Vulnerable to Plugin Flaw

Vulnerebility

Threatpost

31.1.20

Coronavirus Campaigns Spread Emotet, Malware

Spam  Virus

Threatpost

31.1.20

Bezos, WhatsApp Cyberattacks Show Growing Mobile Sophistication

Attack

Threatpost

31.1.20

Cisco Patches Two High-Severity Bugs in its Small Business Switch Lineup

Vulnerebility

Threatpost

31.1.20

U.N. Hack Stemmed From Microsoft SharePoint Flaw

BigBrothers  Vulnerebility

Threatpost

30.1.20

Cisco Small Business Switches affected by DoS and information disclosure flawsVulnerebility

Securityaffairs

30.1.20

Over 200K WordPress sites potentially exposed to hack due to Code Snippets flawVulnerebility

Securityaffairs

30.1.20

AI-based Document Classification Firm Concentric Emerges From StealthSecuritySecurityweek

30.1.20

Flaw in 'Code Snippets' Plugin Exposed Many WordPress Sites to AttacksVulnerebilitySecurityweek

30.1.20

Cisco Patches DoS, Information Disclosure Flaws in Small Business SwitchesVulnerebilitySecurityweek

30.1.20

Wawa Breach: Hackers Put 30 Million Stolen Payment Card Details for SaleIncindentThehackernews

30.1.20

Facebook to Pay $550M to Settle Class Action Case Over Facial Recognition

Social

Threatpost

30.1.20

Dell, HP Memory-Access Bugs Open Attacker Path to Kernel Privileges

Vulnerebility

Threatpost

30.1.20

Apple Security Updates Tackle iOS Device Tracking, RCE Flaws

Apple  iOS

Threatpost

30.1.20

Google Sets Record High in Bug-Bounty Payouts

Security

Threatpost

30.1.20

Critical Flaws in Magento e-Commerce Platform Allow Code-Execution

Vulnerebility

Threatpost

30.1.20

Video: Zoom Researcher Details Web Conference Security Risks, 2020 Threats

Security

Threatpost

30.1.20

Wawa Breach May Have Affected More Than 30 Million Customers

Incindent

Threatpost

30.1.20

Interior Department Halts Drone Operations Over Cybersecurity Concerns

Cyber

Securityweek

30.1.20

Devices Still Vulnerable to DMA Attacks Despite Protections

Attack

Securityweek

30.1.20

SEO Spam Dominated Website Infections in 2019: Report

Spam

Securityweek

30.1.20

EU Stops Short of Recommending Ban on China’s Huawei

BigBrothers

Securityweek

30.1.20

Serious Vulnerability Discovered in OpenSMTPD

Vulnerebility

Securityweek

30.1.20

Investment in Privacy Pays Cybersecurity Dividends: Cisco

Privacy

Securityweek

30.1.20

Magento 2.3.4 Patches Critical Code Execution Vulnerabilities

Vulnerebility

Securityweek

30.1.20

US Govn contractor Electronic Warfare Associates infected with Ryuk ransomwareBigBrothers

Securityaffairs

30.1.20

Leaked confidential report states United Nations has been hackedBigBrothers  Incindent

Securityaffairs

30.1.20

Wawa card breach: 30 million card records for sale in the dark webIncindentSecurityaffairs

30.1.20

CVE-2020-7247 RCE flaw in OpenSMTPD library affects many BSD and Linux distrosVulnerebility

Securityaffairs

30.1.20

Phantom of the ADAS – Phantom Attacks Against Advanced Driving Assistance SystemsAttack

Securityaffairs

30.1.20

Microsoft Azure Flaws Could Have Let Hackers Take Over Cloud ServersHacking  VulnerebilityThehackernews

30.1.20

Critical OpenSMTPD Bug Opens Linux and OpenBSD Mail Servers to HackersVulnerebilityThehackernews

30.1.20

How to Clear Data Facebook Collects About You from Other Sites and AppsSocialThehackernews

30.1.20

UN hacked: Attackers got in via SharePoint vulnerability

BigBrothers  Vulnerebility

Net-security

30.1.20

Photos: Cybertech Global Tel Aviv 2020

Congress

Net-security

30.1.20

Magento patches critical code execution vulnerabilities, upgrade ASAP!

Vulnerebility

Net-security

30.1.20

How to prioritize IT security projects

Security

Net-security

30.1.20

Organizational culture defines a successful cloud strategy

Security

Net-security

30.1.20

How industries are evolving their DevOps and security practices

Security

Net-security

30.1.20

Privacy ROI: Benefits from data privacy averaging 2.7 times the investment

Privacy

Net-security

30.1.20

Tech pros should consider modern APM tools to gain insight across the entire application stack

Security

Net-security

29.1.20

Critical RCE flaw in OpenSMTPD, patch available

Vulnerebility

Net-security

29.1.20

Most AV vendors will continue to support their products under Windows 7

Safety

Net-security

29.1.20

Leaked Report Shows United Nations Suffered Hack

Hacking

Securityweek
29.1.20

Apple Patches Tens of Vulnerabilities in iOS, macOS Catalina

Apple

Securityweek
29.1.20

New Public Company SCVX Formed to Acquire Cybersecurity Firms

IT

Securityweek
29.1.20

Russia Blocks Swiss-based ProtonMail Over Wave of Bomb Threats

BigBrothers

Securityweek
29.1.20

Use of SCPI Protocol Exposes Measurement Instruments to Attacks

Attack

Securityweek
29.1.20

Google Paid Out $6.5 Million Through Bug Bounty Programs in 2019

Security

Securityweek
29.1.20

Firm Says Wawa Customers' Hacked Credit Card Info Being Sold

CyberCrime  Incindent

Securityweek
29.1.20

Ring Doorbell App for Android Sends Out Loads of User Data

Android

Securityweek

29.1.20

Zoom Fixes Flaw Opening Meetings to HackersVulnerebilityThreatpost
29.1.20LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT NetworksCrypto  IoTThreatpost
29.1.20New ‘CacheOut’ Attack Targets Intel CPUsAttackThreatpost
29.1.20Trolls-For-Hire Pave Way For Sophisticated Social Media HacksHackingThreatpost
29.1.20Ring Doorbell App for Android Caught Sharing User Data with Facebook, Data-MinersCryptocurrency  SocialThreatpost
29.1.20MTTD and MTTR: Two Metrics to Improve Your CybersecurityCyberThreatpost

29.1.20

Magento 2.3.4 addresses three critical Code execution flawsVulnerebility

Securityaffairs

29.1.20A vulnerability in Zoom platform allowed miscreants to join Zoom meetingsVulnerebility

Securityaffairs

29.1.20A new piece of Snake Ransomware targets ICS processesICS  RansomwareSecurityaffairs
29.1.20Facebook Rolls Out Tool Globally to Clear Third-Party DataSocialSecurityweek
29.1.20Vulnerability Allowed Attackers to Join Zoom MeetingsVulnerebilitySecurityweek
29.1.20New Snake Ransomware Targets ICS ProcessesICS  RansomwareSecurityweek
29.1.20

Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more!

Security

Net-security

29.1.20

2019 saw more data breaches, fewer sensitive records exposed

Incindent

Net-security

29.1.20

2020: A year of deepfakes and deep deception

Security

Net-security

29.1.20

Are businesses prepared for an extinction-level cyber event?

Cyber

Net-security
29.1.20

50% of people would exercise at least one right under the CCPA

Security

Net-security

28.1.20

Millions of Devices Using LoRaWAN Exposed to Hacker AttacksAttackSecurityweek
28.1.20DEF CON China Conference Postponed Amid Coronavirus OutbreakCongressSecurityweek
28.1.20AppOmni Raises $10 Million to Help Companies Prevent Cloud MisconfigurationsITSecurityweek
28.1.20New 'CacheOut' Attack Leaks Data from Intel CPUs, VMs and SGX EnclaveAttackThehackernews

28.1.20

Cyber Threat Trends DashboardCyberCrimeSecurityaffairs
28.1.20Google Halts Publishing of Paid Chrome Extensions Due to FraudCyberCrimeSecurityweek
28.1.20UK Approves Restricted Huawei Role in 5G NetworkBigBrothers  MobilSecurityweek
28.1.20Cisco Launches Industrial IoT Security SolutionIoTSecurityweek
28.1.20CacheOut/L1DES: New Speculative Execution Attack Affecting Intel CPUsAttack  VulnerebilitySecurityweek
28.1.20Zoom Bug Could Have Let Uninvited People Join Private MeetingsVulnerebilityThehackernews

28.1.20

Google, Mozilla Ban Hundreds of Browser Extensions in Chrome, Firefox

Safety

Threatpost

28.1.20

N.Y. Could Ban Cities from Paying Ransomware Attackers

Ransomware

Threatpost

28.1.20

Mandatory IoT Security in the Offing with U.K. Proposal

IoT

Threatpost

28.1.20

As Necurs Botnet Falls from Grace, Emotet Rises

BotNet

Threatpost

28.1.20

Fortinet removed hardcoded SSH keys and database backdoors from FortiSIEM

Safety

Securityaffairs

28.1.20

Attacks on Citrix servers increase after the release of CVE-2019-19781 exploits

Attack  Exploit

Securityaffairs

28.1.20

Did H&M spy on its German employees? Privacy watchdog opens an investigation

Privacy

Securityaffairs
28.1.20

Aggah: How to run a botnet without renting a Server (for more than a year)

BotNet

Securityaffairs
28.1.20

Which was the most common threat to macOS devices in 2019? Shlayer malware

Apple

Securityaffairs
28.1.20

Operation Night Fury: Group-IB helps take down a cybergang behind the infection of hundreds of websites all over the world

Virus

Securityaffairs

28.1.20

Rui Pinto: Hacker Who Targeted Football and Angola's 'Princess'HackingSecurityweek
28.1.20Attacks on ADC Ramp Up as Citrix Releases Remaining PatchesAttack  HackingSecurityweek
28.1.20German Privacy Watchdog Investigates Clothing Retailer H&MBigBrothers  PrivacySecurityweek
28.1.20Three Magecart Hackers Arrested in IndonesiaCrimeSecurityweek
28.1.20Lessons Learned From 2016, but U.S. Faces New Election ThreatsBigBrothersSecurityweek
28.1.20World Economic Forum on Securing the Aviation Industry in the Age of ConvergenceBigBrothersSecurityweek

28.1.20

NSA Shares Guidance on Mitigating Cloud VulnerabilitiesBigBrothersSecurityweek
28.1.20Huawei and Supply Chain Security - The Great Geopolitical DebateBigBrothersSecurityweek
28.1.20Trend Micro OfficeScan Flaw Apparently Exploited in Mitsubishi Electric HackExploitSecurityweek
28.1.20PoC Exploits Created for Recently Patched 'BlueGate' Windows Server FlawsExploit  VulnerebilitySecurityweek
28.1.20

Emotet epoch 1 infection with Trickbot gtag mor84

BotNet  Virus

SANS

28.1.20

Data breach: Why it’s time to adopt a risk-based approach to cybersecurity

Incindent

Net-security

28.1.20

How to detect and prevent issues with vulnerable LoRaWAN networks

Security

Net-security

28.1.20

Security risks for e-scooters and riders exposed

Security

Net-security

28.1.20

52% of companies use cloud services that have experienced a breach

Incindent

Net-security
28.1.20

Benefits of blockchain pilot programs for risk management planning

Security

Net-security

27.1.20

Mozilla banned hundreds of malicious Firefox add-ons over the last weeks

Virus

Securityaffairs

27.1.20

A new piece of Ryuk Stealer targets government, military and finance sectors

BigBrothers  Ransomware

Securityaffairs

27.1.20

City of Potsdam offline following a cyberattack

Attack

Securityaffairs

27.1.20

Authorities arrest 3 Indonesian hackers behind many Magecart attacks

CyberCrime

Securityaffairs

27.1.20

Is Threat Hunting the new Fad?

Security

SANS

27.1.20

Recommendations for navigating the dynamic cybercrime landscap

CyberCrime

Net-security

27.1.20

You can upgrade Windows 7 for free! Why wouldn’t you?

OS

Net-security

27.1.20

Patients believe stronger privacy protections are more important than easier health data access

Privacy

Net-security

27.1.20

Top 10 policy trends to watch for globally in 2020

Cyber

Net-security

26.1.20

Patching the Citrix ADC Bug Doesn't Mean You Weren't HackedVulnerebility

Bleepingcomputer

26.1.20

PayPal, American Express Phishing Kits Added to 16Shop ServicePhishing

Bleepingcomputer

26.1.2010% of All Macs Shlayered, Malware Cocktail ServedApple

Bleepingcomputer

26.1.20Microsoft To Fix Windows 7 Black Wallpaper Bug for ESU CustomersOS

Bleepingcomputer

26.1.20New Ryuk Info Stealer Targets Government and Military SecretsRansomware

Bleepingcomputer

26.1.20Citrix Releases Final Patch as Ransomware Attacks Ramp UpRansomware

Bleepingcomputer

26.1.20DoS Exploit PoC Released for Critical Windows RDP Gateway BugsExploit

Bleepingcomputer

26.1.20

City of Potsdam Servers Offline Following CyberattackAttack

Bleepingcomputer

26.1.20

Microsoft is Adding Classic ‘Edge Mode’ to New Edge BrowserOS

Bleepingcomputer

26.1.20

U.S. Govt Agency Hit with New CARROTBALL Malware DropperBigBrothers

Bleepingcomputer

26.1.20Sonos Backtracks: Legacy Devices Will Get Updates After MaySecurity

Bleepingcomputer

26.1.20Bipartisan Coalition Bill Introduced to Reform NSA SurveillanceBigBrothers

Bleepingcomputer

26.1.20TrickBot Now Steals Windows Active Directory CredentialsBotNet

Bleepingcomputer

26.1.20Buchbinder Car Renter Exposes Info of Over 3 Million CustomersIncindent

Bleepingcomputer

26.1.20Critical MDhex Vulnerabilities Shake the Healthcare SectorVulnerebilityBleepingcomputer

26.1.20

LastPass Mistakenly Removes Extension from Chrome Store, Causes OutageSecurityBleepingcomputer

26.1.20

Euro Cup and Olympics Ticket Reseller Hit by MageCartCyberCrime

Bleepingcomputer

26.1.20

Sodinokibi Ransomware Threatens to Publish Data of Automotive GroupRansomware

Bleepingcomputer

26.1.20Maze Ransomware Not Getting Paid, Leaks Data Left and RightRansomware

Bleepingcomputer

26.1.20Thousands of WordPress Sites Hacked to Fuel Scam CampaignSpam

Bleepingcomputer

26.1.20Citrix Releases Scanner to Detect Hacked Citrix ADC AppliancesSafety

Bleepingcomputer

26.1.20The Half-Life Series is Free to Play Until March 2020IT

Bleepingcomputer

26.1.20Twitter Releases Updated Android App to Fix CrashesAndroid  Social

Bleepingcomputer

26.1.20

Microsoft to Force Bing Search in Chrome for Office 365 ProPlus UsersOS

Bleepingcomputer

26.1.20

Microsoft Exposes 250M Customer Support Records on Leaky ServersIncindent

Bleepingcomputer

26.1.20

Microsoft Starts Pushing Windows 10 1909 to More DevicesOS

Bleepingcomputer

26.1.20Final Windows 7 Update Breaks Desktop Wallpaper FunctionalityOS

Bleepingcomputer

26.1.20Windows 10 PowerToy Quick Launcher to Simplify Launching AppsOS

Bleepingcomputer

26.1.20ProtonVPN Apps Open Sourced for Added Transparency and SecuritySecurity

Bleepingcomputer

26.1.20FBI Warns Job Applicants of Scams Using Spoofed Company SitesBigBrothers

Bleepingcomputer

26.1.20This Citibank Phishing Scam Could Trick Many PeoplePhishingBleepingcomputer

26.1.20

Did the Saudi crown prince hack Jeff Bezos?

BigBrother blog

Avast blog

26.1.20

The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks

BigBrother blog

Palo Alto Unity42

26.1.20

Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices

BotNet blog

Palo Alto Unity42

26.1.20

3 SecOps Strategies To Enable Your Smart People To Focus on Smart Things

Cyber blog

Palo Alto

26.1.20

Cybersecurity Canon Candidate Book Review: Code Girls: The Untold Story of ...

Cyber blog

Palo Alto

26.1.20

5 Straight Years of Delighting Our Customers with Outstanding Customer Supp...

Cyber blog

Palo Alto

26.1.20

SC Media Names Prisma Cloud an Industry Innovator

Cyber blog

Palo Alto

26.1.20

Interpol Arrests 3 Indonesian Credit Card Hackers for Magecart Attacks

CyberCrime

Thehackernews

26.1.20

Visibility Gap of Your Security Tools

Security

SANS

26.1.20

Cisco Webex flaw allows unauthenticated remote attackers to join private meetings

Vulnerebility

Securityaffairs

26.1.20Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hackExploit  Hacking  VulnerebilitySecurityaffairs
26.1.20For the second time in a few days, Greek Government websites hit by DDoS attacksAttack  BigBrothersSecurityaffairs
26.1.20Trump, Johnson Talk Security Ahead of Huawei DecisionBigBrothersSecurityweek
26.1.20Cisco Webex Vulnerability Exploited to Join Meetings Without a PasswordVulnerebilitySecurityweek
25.1.20Wine 5.0 Released With Numerous Gaming Improvements for LinuxOS

Bleepingcomputer

25.1.20Phishing Incident at UPS Store Chain Exposes Customer InfoIncindent  Phishing

Bleepingcomputer

25.1.20Actively Exploited IE 11 Zero-Day Bug Gets Temporary PatchExploit

Bleepingcomputer

25.1.20Microsoft Tests Office 'Ads' in Windows 10 WordpadOS

Bleepingcomputer

25.1.20Windows EFS Feature May Help Ransomware AttackersRansomware

Bleepingcomputer

25.1.20BitPyLock Ransomware Now Threatens to Publish Stolen DataRansomware

Bleepingcomputer

25.1.20600 Computers Taken Down After Florida Library CyberattackAttack

Bleepingcomputer

25.1.20Infiltrating Networks: Easier Than Ever Due to Evil MarketsCyberCrime

Bleepingcomputer

25.1.20US Retailer Hanna Andersson Hacked to Steal Credit CardsCyberCrime

Bleepingcomputer

25.1.20FTCode Ransomware Now Steals Saved Login CredentialsRansomware

Bleepingcomputer

25.1.20Emotet Malware Dabbles in Extortion With New Spam TemplateSpam  Virus

Bleepingcomputer

25.1.20Mitsubishi Electric Warns of Data Leak After Security BreachIncindent

Bleepingcomputer

25.1.20Citrix Patches CVE-2019-19781 Flaw in Citrix ADC 11.1 and 12.0Vulnerebility

Bleepingcomputer

25.1.20New Nest Video Extortion Scam Plays Out Like a Spy GameSpam

Bleepingcomputer

25.1.20An Inside Look into Microsoft Rich Text Format and OLE ExploitsExploit blogMcafee blog
25.1.20Attacking the Organism: RetailAttack blog  Hacking blog

F5 Labs

25.1.202020 Cybersecurity Trends and ResolutionsCyber blog

F5 Labs

25.1.20Nice Try: 501 (Ransomware) Not ImplementedRansomware blogFireEye
25.1.20Vulnerability Spotlight: Multiple vulnerabilities in some AMD graphics cardsVulnerebility blog

Cisco Talos

25.1.20Breaking down a two-year run of Vivin’s cryptominersCryptocurrency blog

Cisco Talos

25.1.20Vulnerability Spotlight: Bitdefender BOX 2 bootstrap remote code execution vulnerabilitiesVulnerebility blog

Cisco Talos

25.1.20Google: Flaws in Apple’s privacy tool could enable trackingVulnerebility blog

Eset

25.1.20Microsoft exposed 250 million customer support recordsIncident blog

Eset

25.1.20Dating apps share personal data with advertisers, study saysHardware blog

Eset

25.1.203 ways to browse the web anonymouslySafety blog

Eset

25.1.20New Internet Explorer zero‑day remains unpatchedVulnerebility blog

Eset

25.1.20Expert released DOS Exploit PoC for Critical Windows RDP Gateway flawsExploit  VulnerebilitySecurityaffairs
25.1.20NK CARROTBALL dropper used in attacks on U.S. Govn AgencyBigBrothers  VirusSecurityaffairs
25.1.20Questions Linger Over Investigation Into Jeff Bezos' HackingBigBrothersSecurityweek
25.1.20Greece: Government Websites Hit by CyberattackBigBrothersSecurityweek
25.1.20Microsoft Releases Azure Security BenchmarkSecuritySecurityweek
25.1.20Bipartisan Bill Aims to Reform NSA Surveillance of AmericansBigBrothersSecurityweek
25.1.20Privacy Firm Finds Unsecured Cannabis Patient InformationPrivacySecurityweek
25.1.20UK 'to Decide on Huawei 5G Next Week'BigBrothersSecurityweek
25.1.20Citrix Releases More Patches for Exploited Flaw, Tool to Detect CompromiseVulnerebilitySecurityweek
25.1.20Researchers Earn $280,000 for Hacking Industrial Systems at Pwn2Own MiamiCongressSecurityweek
25.1.20

Fake Smart Factory Honeypot Highlights New Attack Threats

Attack

Threatpost

25.1.20

Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings

Vulnerebility

Threatpost

25.1.20

New Bill Proposes NSA Surveillance Reforms

BigBrothers

Threatpost

25.1.20

ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates

Ransomware

Threatpost

24.1.20

MDhex vulnerabilities open GE Healthcare patient monitoring devices to attackers

Vulnerebility

Net-security

24.1.20

Lessons from Microsoft’s 250 million data record exposure

Incindent

Net-security

24.1.20Russian operator of Cardplanet carding site pleads guilty in the USBigBrothers  CyberCrimeSecurityaffairs
24.1.20Cisco fixes critical issue in Cisco Firepower Management CenterVulnerebilitySecurityaffairs
24.1.20Russian Pleads Guilty to Running 'CardPlanet' to Sell Stolen Credit CardsCyberCrimeThehackernews
24.1.20THSuite data leak exposes cannabis users informationIncindentSecurityaffairs
24.1.20Iran-Linked PupyRAT backdoor used in recent attacks on European energy sectorVirusSecurityaffairs
24.1.20

Cisco Warns of Critical Network Security Tool Flaw

Vulnerebility

Threatpost

24.1.20

Google: Flaws in Apple’s Private-Browsing Technology Allow for Third-Party Tracking

Apple

Threatpost

24.1.20

Shlayer, No. 1 Threat for Mac, Targets YouTube, Wikipedia

IT

Threatpost

24.1.20

Critical, Unpatched ‘MDhex’ Bugs Threaten Hospital Devices

Vulnerebility

Threatpost

24.1.20

U.S. Gov Agency Targeted With Malware-Laced Emails

BigBrothers

Threatpost

24.1.20Russian Pleads Guilty in Virginia to Large-Scale Card FraudBigBrothers  CyberCrimeSecurityweek
24.1.20Safari's Intelligent Tracking Prevention Fails to Prevent TrackingBigBrothersSecurityweek
24.1.20Some Hackers Take the Ransom and Run: ResearchersRansomwareSecurityweek
24.1.20Cisco Patches Critical Vulnerability in Network Security ToolVulnerebilitySecurityweek
24.1.20CloudKnox Security Raises $12 Million in FundingITSecurityweek
24.1.20Vulnerabilities Found in GE Healthcare Patient Monitoring ProductsVulnerebilitySecurityweek
24.1.20Targeted Phishing Campaign Leverages Death of Iranian General Qasem SuleimaniPhishingSecurityweek
24.1.20What We Know, And Don’t, About the Alleged Bezos Phone HackBigBrothers  MobilSecurityweek
24.1.20

Why Phishing Remains So Popular?

Phishing

SANS
24.1.20

CISOs: Make 2020 the year you focus on third-party cyber risk

Cyber

Net-security

24.1.20

Over half of organizations were successfully phished in 2019

Phishing

Net-security

24.1.20

More authentication and identity tech needed with fraud expected to increase

Incindent

Net-security

23.1.20

IoC Scanner shows if Citrix appliances have been compromised via CVE-2019-19781

Vulnerebility

Net-security

23.1.20

It’s time to patch your Cisco security solutions again

Vulnerebility

Net-security

23.1.20

Cybercriminals using fake job listings to steal money, info from applicants

Cyber

Net-security

23.1.20Data Security Startup Privafy Emerges From Stealth ModeSecuritySecurityweek
23.1.20Iran-Linked RAT Used in Recent Attacks on European Energy SectorBigBrothers  VirusSecurityweek
23.1.20Mastercard Opens New Intelligence and Cyber Center in Vancouver, CanadaCyberSecurityweek
23.1.20Serious Vulnerabilities Expose Honeywell Surveillance Systems to AttacksVulnerebilitySecurityweek
23.1.20US Presses France for 'Strong Security Measures' Against HuaweiBigBrothersSecurityweek
23.1.20Shlayer Trojan attacks one in ten macOS usersAppleSecurelist
23.1.20NIST PRIVACY FRAMEWORKReportReport
23.1.20

Microsoft Leaves 250M Customer Service Records Open to the Web

Incindent

Threatpost

23.1.20

PoC Exploits Do More Good Than Harm: Threatpost Poll

Exploit

Threatpost

23.1.20

sLoad Malware Revamped as Powerful ‘StarsLord’ Loader

Virus

Threatpost

23.1.20

New Muhstik Botnet Attacks Target Tomato Routers

BotNet

Threatpost

23.1.20

Pwn2Own Miami Contestants Haul in $180K for Hacking ICS Equipment

Congress

Threatpost

23.1.20

Vivin Nets Thousands of Dollars Using Cryptomining Malware

Cryptocurrency

Threatpost
23.1.20250 Million Microsoft customer support records and PII exposed onlineIncindentSecurityaffairs
23.1.20Multiple Vulnerabilities Found in AMD ATI Radeon Graphics CardsVulnerebilitySecurityweek
23.1.20Wednesday is Deadline for Claims in 2017 Equifax Data BreachIncindentSecurityweek
23.1.20

Complex Obfuscation VS Simple Trick

Virus

SANS

23.1.20

Zero Trust: Beyond access controls

Security

Net-security

23.1.20

There is no easy fix to AI privacy problems

Security

Net-security

23.1.20

CIOs using AI to bridge gap between IT resources and cloud complexity

Security

Net-security

22.1.20

Did Apple drop end-to-end encrypted iCloud backups because of the FBI?

Apple  BigBrothers

Net-security
22.1.20

Malware attack took down 600 computers at Volusia County Public Library

Virus

Securityaffairs
22.1.20

Cyber Insurance Provider Coalition Acquires BinaryEdge

IT

Securityweek
22.1.20

UN Experts Urge Probe Into Alleged Saudi Hacking of Bezos Phone

BigBrothers

Securityweek
22.1.20

Intezer Raises $15 Million in Series B Funding

IT

Securityweek
22.1.20

World Economic Forum Global Risks Report Highlights Dangers of Digital innovation

Security

Securityweek
22.1.20

Source Code Released for All ProtonVPN Apps

Security

Securityweek
22.1.20

250 Million Microsoft Customer Support Records Exposed Online

Incindent

Thehackernews
22.1.20

Saudi Prince Allegedly Hacked World's Richest Man Jeff Bezos Using WhatsApp

BigBrothers

Thehackernews
22.1.20Jeff Bezos phone was hacked by Saudi crown princeBigBrothersSecurityaffairs
22.1.20OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propagandaBigBrothersSecurityaffairs
22.1.20Microsoft Exposed 250 Million Customer Support RecordsIncindentSecurityweek
22.1.20Unofficial Patch Released for Recently Disclosed Internet Explorer Zero-DayVulnerebilitySecurityweek
22.1.20Secure DevOps Company Sysdig Raises $70 MillionITSecurityweek
22.1.20French Spy Suspected of Selling Data on DarknetBigBrothersSecurityweek
22.1.20Saudi Dismisses Link to Hack of Amazon Owner BezosBigBrothersSecurityweek
22.1.20

Honeywell Maxpro VMS/NVR systems vulnerable to hijacking

Vulnerebility

Net-security
22.1.20Citrix Accelerates Patch Rollout For Critical RCE FlawVulnerebility

Threatpost

22.1.20Hacker Leaks More Than 500K Telnet Credentials for IoT DevicesIoT

Threatpost

22.1.20Microsoft Zero-Day Actively Exploited, Patch ForthcomingExploit

Threatpost

22.1.20FTCODE Ransomware Now Steals Chrome, Firefox CredentialsRansomware

Threatpost

22.1.2016Shop Phishing Gang Goes After PayPal UsersPhishing

Threatpost

22.1.20Yomi Hunter Catches the CurveBallExploitSecurityaffairs
22.1.20The Mystery of FbotBotNetSecurityaffairs
22.1.20US-based children’s clothing maker Hanna Andersson discloses a data breachBigBrothers  IncindentSecurityaffairs
22.1.20Design Weaknesses Expose Industrial Systems to Damaging AttacksICSSecurityweek
22.1.20Brazilian Prosecutors Accuse Glenn Greenwald in Hacking CaseHackingSecurityweek
22.1.20Snyk is Latest Cybersecurity Unicorn After Adding $150 Million in FundingITSecurityweek
22.1.20FireEye Acquires Cloud Governance Firm CloudvisorySafetySecurityweek
22.1.20

German language malspam pushes Ursnif

Spam

SANS

22.1.20

Container security requires continuous security in new DevSecOps models

Security

Net-security

22.1.20

Companies risk revenue growth due to innovation achievement gap

Security

Net-security

22.1.20

Email security industry miss rates when encountering threats are higher than 20%

Security

Net-security

22.1.20

State CIOs see innovation as critical priority, only 14% report extensive innovation

Security

Net-security

22.1.20

Download: State of Breach Protection 2020 survey results

Safety

Net-security
21.1.20Advanced "16Shop" Phishing Kit Expands OfferingsPhishingSecurityweek
21.1.20US Military Claimed 'Success' in Hacking ISIS: DocumentsBigBrothersSecurityweek
21.1.20Hackers Steal Employee and Corporate Information From Mitsubishi ElectricIncindentSecurityweek
21.1.20New Ransomware Process Leverages Native Windows FeaturesRansomwareSecurityweek
21.1.20Georgia Man Admits to Launching DDoS AttackAttackSecurityweek
21.1.20Realistic Factory Honeypot Shows Threats Faced by Industrial OrganizationsSecuritySecurityweek
21.1.20

Micropatch simulates workaround for recent zero-day IE flaw, removes negative side effects

Vulnerebility

Net-security

21.1.20

First patches for the Citrix ADC, Gateway RCE flaw released

Vulnerebility

Net-security

21.1.20

Researchers create OT honeypot, attract exploits and fraud

Security

Net-security

21.1.20

Mitsubishi Electric discloses data breach, possible data leak

Incindent

Net-security

21.1.20AA20-020A : Critical Vulnerability in Citrix Application Delivery Controller, Gateway, and SD-WAN WANOPCERTCERT
21.1.20NIST releases version 1.0 of the Privacy FrameworkSafetySecurityaffairs
21.1.20Expert found a hardcoded SSH Key in Fortinet SIEM appliancesSafetySecurityaffairs
21.1.20Mitsubishi Electric discloses data breach, media blame China-linked APTAPTSecurityaffairs
21.1.20Hardcoded SSH Key Found in Fortinet SIEM AppliancesSafetySecurityweek
21.1.20Hanna Andersson Data Breach: Hackers Compromise Website of Children's ClothierIncindentSecurityweek
21.1.20

DeepBlueCLI: Powershell Threat Hunting

Security

SANS

21.1.20

Data-driven vehicles: The next security challenge

Security

Net-security

21.1.20

Review: Enzoic for Active Directory

Security

Net-security

21.1.20

Techniques and strategies to overcome Kubernetes security challenges

Security

Net-security

21.1.20

Revenue from cloud IT infrastructure products declines

Security

Net-security

21.1.20

A look at cybersecurity for rail systems, building automation and the future of critical infrastructure

Cyber

Net-security

20.1.20NATO will send a counter-hybrid team to Montenegro to face Russia’s threatBigBrothersSecurityaffairs
20.1.20Apple Received Tens of Thousands of Government Requests in H1 2019AppleSecurityweek
20.1.20NIST Releases Framework for Privacy Risk ManagementSafetySecurityweek
20.1.20Citrix Releases First Patches for Critical ADC VulnerabilityVulnerebilitySecurityweek
20.1.20Citrix Releases Patches for Critical ADC Vulnerability Under Active AttackVulnerebilityThehackernews
20.1.20Citrix releases permanent fixes for CVE-2019-19781 flaw in ADC 11.1 and 12.0VulnerebilitySecurityaffairs
20.1.20WP Database Reset WordPress plugin flaws allow website takeoverVulnerebilitySecurityaffairs
20.1.20JhoneRAT uses Google Drive, Twitter, ImgBB, and Google Forms to target countries in Middle EastVirusSecurityaffairs
20.1.20Microsoft to Patch Internet Explorer Vulnerability Exploited in Targeted AttacksExploitSecurityweek
20.1.20Bot list with Telnet credentials for more than 500,000 servers and IoT devices leaked onlineBotNet  IoTSecurityaffairs
20.1.20Hackers patch Citrix servers to deploy their own backdoorVirusSecurityaffairs
20.1.20

Citrix ADC Exploits Update

Exploit

SANS

20.1.20

NIST Privacy Framework 1.0: Manage privacy risk, demonstrate compliance

Safety

Net-security

20.1.20

Business units and IT teams can no longer function in silos

Security

Net-security

19.1.20

New Jersey Synagogue Suffers Sodinokibi Ransomware AttackRansomware

Bleepingcomputer

19.1.20

Microsoft Issues Mitigation for Actively Exploited IE Zero-DayExploit

Bleepingcomputer

19.1.20New US Bill Wants to Assign State Cybersecurity CoordinatorsCyber

Bleepingcomputer

19.1.20How Malware Gains Trust by Abusing the Windows CryptoAPI FlawVulnerebility  Virus

Bleepingcomputer

19.1.20FBI Says State Actors Hacked US Govt Network With Pulse VPN FlawBigBrothers

Bleepingcomputer

19.1.20

Hackers Are Securing Citrix Servers, Backdoor Them for AccessHacking  Vulnerebility

Bleepingcomputer

19.1.20Fraudsters Set Up Site Selling Temporary Social Security NumbersCyberCrime

Bleepingcomputer

19.1.20WeLeakInfo.com Seized For Selling Info from Data Breaches, 2 ArrestedIncindent

Bleepingcomputer

19.1.20Dutch Govt Suggests Turning Off Citrix ADC Devices, Mitigations May FailBigBrothers  Vulnerebility

Bleepingcomputer

19.1.20Windows 10 Insider Build 19546 Adds Graphing Mode to CalculatorOS

Bleepingcomputer

19.1.20FBI to Warn State Officials of Election Infrastructure Cyber ThreatsBigBrothers

Bleepingcomputer

19.1.20Google Chrome Adds Protection for NSA's Windows CryptoAPI FlawBigBrothers  Safety

Bleepingcomputer

19.1.20

WordPress Plugin Bugs Let Hackers Wipe or Takeover Your SiteHacking

Bleepingcomputer

19.1.20

TrickBot Now Uses a Windows 10 UAC Bypass to Evade DetectionBotNet  OS

Bleepingcomputer

19.1.20PoCs for Windows CryptoAPI Bug Are Out, Show Real-Life Exploit RisksExploit

Bleepingcomputer

19.1.20Google to Kill Chrome Apps Across All PlatformsSecurity

Bleepingcomputer

19.1.20Customer-Owned Bank Informs 100k of Breach Exposing Account Balance, PIIIncindent

Bleepingcomputer

19.1.20Ako Ransomware Uses Spam to Infect Its VictimsRansomware

Bleepingcomputer

19.1.20

Online Pharmacy PlanetDrugsDirect Discloses Security BreachIncindent

Bleepingcomputer

19.1.20

iPhones Can Now Double As a Security Key for Google AccountsApple

Bleepingcomputer

19.1.20Microsoft's Indexer Diagnostics Helps Troubleshoot Windows SearchOS

Bleepingcomputer

19.1.20Microsoft's New Edge Browser Released, What You Need to KnowOS

Bleepingcomputer

19.1.20Microsoft Office January Security Updates Fix Code Execution BugsOS

Bleepingcomputer

19.1.20Windows 7 Begins to Show Full Screen Windows 10 Upgrade AlertsOS

Bleepingcomputer

19.1.20

Google Chrome Aims to Make Browser User-Agents ObsoleteSecurity

Bleepingcomputer

19.1.20

Ransom NewsRansomRansom

19.1.20

Windows BSOD Betrays Cryptominer Hidden in WAV FileCryptocurrency  OS

Bleepingcomputer

19.1.20Intel Patches High Severity Flaw in VTune Performance ProfilerVulnerebility

Bleepingcomputer

19.1.20Windows Terminal Adds Retro CRT Effects and Console SearchOS

Bleepingcomputer

19.1.20NSA's First Public Vulnerability Disclosure: An Effort to Build TrustBigBrothers

Bleepingcomputer

19.1.20

Windows 7 Gets Final Monthly Rollup Update Before End Of LifeVulnerebility

Bleepingcomputer

19.1.20Microsoft's January 2020 Patch Tuesday Fixes 49 VulnerabilitiesVulnerebility

Bleepingcomputer

19.1.20Windows 10 Cumulative Updates KB4528760 & KB4534273 ReleasedVulnerebility

Bleepingcomputer

19.1.20Microsoft Fixes Windows CryptoAPI Spoofing Flaw Reported by NSAVulnerebility

Bleepingcomputer

19.1.20Critical WordPress Plugin Bug Allows Admin Logins Without PasswordVulnerebility

Bleepingcomputer

19.1.20Adobe Releases Their January 2020 Security UpdatesVulnerebility

Bleepingcomputer

19.1.20United Nations Targeted With Emotet Malware Phishing AttackPhishing  Virus

Bleepingcomputer

19.1.20

Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline DevicesRansomware

Bleepingcomputer

19.1.20

Windows 7 Reaches End of Life Tomorrow, What You Need to KnowOS

Bleepingcomputer

19.1.20Microsoft to Support the New Edge Browser After Windows 7 EOLOS

Bleepingcomputer

19.1.20CISA Releases Test Tool for Citrix ADC CVE-2019-19781 VulnerabilityVulnerebility

Bleepingcomputer

19.1.20BEC Scammers Use Aging Report Phishing to Find New TargetsPhishing  Spam

Bleepingcomputer

19.1.20

Nemty Ransomware to Start Leaking Non-Paying Victim's DataRansomware

Bleepingcomputer

19.1.20Emotet Malware Restarts Spam Attacks After Holiday BreakSpam  Virus

Bleepingcomputer

19.1.20Android Trojan Steals Your Money to Fund International SMS AttacksAndroid

Bleepingcomputer

19.1.20Windows 7 Reminder: Get a Free Windows 10 Upgrade While You CanOS

Bleepingcomputer

19.1.20The Worst Cyberattacks and Data Breaches of 2019Incident blogSonicwall
19.1.20Bett 2020: SonicWall Showcases Cybersecurity Solutions for Educational InstitutionsCyber blogSonicwall
19.1.20Answers to 5 key questions about highly publicized NSA-Microsoft storyBigBrother blogAvast blog

19.1.20

The 12 weirdest cybersecurity stories you haven't heard aboutCyber blogAvast blog

19.1.20

New phishing tactics bait victimsPhishing blogAvast blog
19.1.20Threat Brief: Windows CryptoAPI Spoofing Vulnerability CVE-2020-0601Vulnerebility blogPalo Alto Unity42
19.1.20Exploits in the Wild for Citrix ADC and Citrix Gateway Directory Traversal Vulnerability CVE-2019-19781Exploit blogPalo Alto Unity42
19.1.20Getting Cloud Smart: Security for Hybrid and Public Federal CloudsCyber blog

Palo Alto

19.1.20Your SaaS Security ChecklistCyber blogPalo Alto
19.1.20Do Your SOC Metrics Incentivize Bad Behavior?Cyber blog

Palo Alto

19.1.20Why Cloud Security Seems So Hard, and How to Overcome These ChallengesCyber blogPalo Alto

19.1.20

Microsoft provides mitigation for actively exploited CVE-2020-0674 IE Zero-DayExploitSecurityaffairs

18.1.20

Turkish Hackers hit Greek Government websites and local stock exchangeBigBrothers  HackingSecurityaffairs

18.1.20

Cybercrime Statistics in 2019CyberCrime

Securityaffairs

18.1.20

Microsoft Warns of Unpatched IE Browser Zero-Day That's Under Active AttacksVulnerebilityThehackernews

18.1.20

Turkish Hackers Target Greek Government Websites, Stock ExchangeBigBrothersSecurityweek

18.1.20

FBI Takes Down Site Selling Subscriptions to Stolen DataBigBrothersSecurityweek

18.1.20

Microsoft Introduces Free Source Code AnalyzerSecuritySecurityweek

18.1.20

Attacker Installs Backdoor, Blocks Others From Exploiting Citrix ADC VulnerabilityExploit  VulnerebilitySecurityweek

18.1.20

New Legislation Would Require a Cybersecurity Coordinator in Every StateCyberSecurityweek

18.1.20

Data Security Startup Cyral Emerges From Stealth ModeSecuritySecurityweek

18.1.20

Industry Reactions to Crypto Vulnerability Found by NSA: Feedback FridayCryptoSecurityweek

18.1.20

IS CYBER RETALIATION FROM IRAN IMMINENT?BigBrother blog

Cybereason

18.1.20

6 OF THE BEST MALICIOUS LIFE CYBERSECURITY HISTORY STORIES FROM 2019Malware blog

Cybereason

18.1.20

CurveBall – An Unimaginative Pun but a Devastating BugVulnerebility blog

Mcafee blog

18.1.20

What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification ProcessVulnerebility blog

Mcafee blog

18.1.20

Security Lessons from Across the Pond: Local Government Ransomware AttacksBigBrother blog  Ransomware blogF5 Labs

18.1.20

Recommended Security Controls for 2020Security blog

F5 Labs

18.1.20

404 Exploit Not Found: Vigilante Deploying Mitigation for Citrix NetScaler Vulnerability While Maintaining BackdoorExploit blogFireEye

18.1.20

JhoneRAT: Cloud based python RAT targeting Middle Eastern countriesMalware blog

Cisco Talos

18.1.20

Vulnerability Spotlight: Multiple remote code execution vulnerabilities in Foxit PDF ReaderVulnerebility blog

Cisco Talos

18.1.20

Stolen emails reflect Emotet's organic growthMalware blog

Cisco Talos

18.1.20

Microsoft Patch Tuesday — Jan. 2020: Vulnerability disclosures and Snort coverageVulnerebility blog

Cisco Talos

18.1.20

New Snort rules protect against recently discovered Citrix vulnerabilityVulnerebility blog

Cisco Talos

18.1.20

Vulnerability Spotlight: Code execution vulnerability in E2fsprogsVulnerebility blog

Cisco Talos

18.1.20

What the continued escalation of tensions in the Middle East means for securityBigBrother blog

Cisco Talos

18.1.20

Vulnerability Spotlight: Two buffer overflow vulnerabilities in OpenCVVulnerebility blogCisco Talos

18.1.20

FBI shuts down website selling billions of stolen recordsBigBrother blog

Eset

18.1.20

You can now turn your iPhone into a Google security keyHardware blog

Eset

18.1.20

Cyberawareness in Australia: The good and the badBigBrother blog

Eset

18.1.20

Google to end support for third‑party cookies in ChromeSecurity blogEset

18.1.20

Microsoft patches severe Windows flaw after tip‑off from NSABigBrother blog  Vulnerebility blog

Eset

18.1.20

Millions of modems at risk of remote hijackingHacking blog

Eset

18.1.20

Windows 7 end of life: Time to move onOS Blog

Eset

18.1.20

5 major US wireless carriers vulnerable to SIM swapping attacksHardware blogEset

18.1.20

Threatpost Poll: Are Published PoC Exploits a Good or Bad Idea?Exploit

Threatpost

18.1.20

New JhoneRAT Malware Targets Middle EastVirus

Threatpost

18.1.20

News Wrap: PoC Exploits, Cable Haunt and Joker MalwareSecurity

Threatpost

18.1.20

Mobile Carrier Customer Service Ushers in SIM-Swap FraudMobil

Threatpost

18.1.20

Feds Cut Off Access to Billions of Breached Records with Site TakedownBigBrothers  Incindent

Threatpost

18.1.20

FBI Plans to Inform States of Election BreachesBigBrothersThreatpost

18.1.20

Hack the Army bug bounty program paid $275,000 in rewardsSecuritySecurityaffairs

17.1.20

Chinese police arrested the operator of unauthorized VPN service that made $1.6 million from his activityBigBrothers

Securityaffairs

17.1.20

Hackers Earn $275,000 for Vulnerabilities in U.S. Army SystemsBigBrothersSecurityweek
17.1.20Expert: Georgia Election Server Showed Signs of TamperingSecuritySecurityweek
17.1.20Siemens Warns of Security Risks Associated With Use of ActiveXSecuritySecurityweek

17.1.20

Microsoft Application Inspector: Check open source components for unwanted features

Security

Net-security

17.1.20

Law enforcement seized WeLeakInfo.com for selling access to data from data breaches

Incindent

Securityaffairs

17.1.20U.S. Girds for Cyber Threats From Iran as Military Clash Fears EbbBigBrothersSecurityweek
17.1.20Cloudflare Announces Free Security Services for Political CampaignsSecuritySecurityweek
17.1.20FBI Plans to Notify States About Local Election BreachesBigBrothers  IncindentSecurityweek
17.1.20Peter Leav Named CEO of McAfeeITSecurityweek
17.1.20PoC Exploits Published For Microsoft Crypto BugExploit

Threatpost

17.1.20‘Fleeceware’ Apps Downloaded 600M Times from Google PlayAndroid

Threatpost

17.1.20Critical Cisco Flaws Now Have PoC ExploitExploit  Vulnerebility

Threatpost

17.1.20Google Account Security Keys Launch for iPhoneApple

Threatpost

17.1.20Satan Ransomware Reborn to Torment BusinessesRansomware

Threatpost

17.1.20Expert released PoC exploits for recently disclosed Cisco DCNM flawsExploit  VulnerebilitySecurityaffairs
17.1.20Many High-Risk Users Have Bad Security Habits: Google SurveySecuritySecurityweek
17.1.20Facebook Introduces New Login AlertsSocialSecurityweek
17.1.20PoC Exploits Released for Cisco DCNM VulnerabilitiesExploit  VulnerebilitySecurityweek
17.1.20Equifax Ordered to Spend $1 Billion on Data Security Under Data Breach SettlementIncindentSecurityweek
17.1.20

Summing up CVE-2020-0601, or the Let?s Decrypt vulnerability

Vulnerebility

SANS

17.1.20

IoT cybersecurity’s worst kept secret

IoT

Net-security

17.1.20

How to govern cybersecurity risk at the board level

Cyber

Net-security
17.1.20

Worldwide IT spending to total $3.9 trillion in 2020

IT

Net-security
17.1.20

White Ops appoints Rhushabh ‘Rush’ Mehta as Sr. VP of Engineering

Security

Net-security
17.1.20

Facebook users will be notified when their credentials are used for third-party app logins

Social

Net-security
16.1.20Hundreds of million users installed Android fleeceware apps from Google PlayAndroidSecurityaffairs
16.1.20Two PoC exploits for CVE-2020-0601 NSACrypto flaw releasedExploitSecurityaffairs
16.1.20Rights Group Demands Israel Rein in Murky Spyware CompanyBigBrothersSecurityweek
16.1.20Unprotected Medical Systems Expose Data on Millions of PatientsIncindentSecurityweek
16.1.20PoC Exploits Released for Crypto Vulnerability Found by NSAExploitSecurityweek
16.1.20Use iPhone as Physical Security Key to Protect Your Google AccountsAppleThehackernews
16.1.20Equifax Settles Class-Action Breach Lawsuit for $380.5MIncindent

Threatpost

16.1.20U.N. Weathers Storm of Emotet-TrickBot MalwareBigBrothers  BotNet  Virus

Threatpost

16.1.20Podcast: NSA Reports Major Crypto-Spoofing Bug to MicrosoftBigBrothers

Threatpost

16.1.20Critical WordPress Bug Leaves 320,000 Sites Open to AttackVulnerebility

Threatpost

16.1.20A Practical Guide to Zero-Trust SecuritySecurity

Threatpost

16.1.20Trump Slams Apple for Refusing to Unlock Suspected Shooter’s iPhonesApple  BigBrothers

Threatpost

16.1.20

Oski Data-Stealing Malware Emerges to Target North America, ChinaVirusThreatpost

16.1.20

Critical auth bypass issues affect InfiniteWP Client and WP Time Capsule WordPress pluginsVulnerebilitySecurityaffairs
16.1.205ss5c Ransomware emerges after Satan went down in the hellRansomwareSecurityaffairs
16.1.20VMware addresses flaws in VMware Tools and Workspace ONE SDKVulnerebilitySecurityaffairs
16.1.20P&N Bank Data Breach Exposes Trove of User DataIncindentSecurityweek
16.1.20Public Bug Bounty Program Launched for KubernetesSecuritySecurityweek
16.1.20Organizations Feel Threat of Nation-State Attacks, Survey ShowsAttackSecurityweek
16.1.20Google Simplifies Enrollment Process for Advanced Protection ProgramSecuritySecurityweek

16.1.20

Picks of 2019 malware - the large, the small and the one full of null bytes

Virus

SANS

16.1.20

Embedding security, the right way

Security

Net-security

16.1.20

Emotet remains the dark market leader for delivery-as-a-service

CyberCrime  Virus

Net-security
16.1.20

Six trends attracting the attention of enterprise technology leaders

Security

Net-security
16.1.20

Global security services industry to experience spend growth of more than $80 billion

Security

Net-security

15.1.20

P&N Bank data breach may have impacted 100,000 West AustraliansIncindentSecurityaffairs
15.1.20Trusona Raises $20 Million in Series C Funding RoundITSecurityweek
15.1.20New 5ss5c Ransomware Likely Readied to Replace SatanRansomwareSecurityweek

15.1.20

Hacker offers for sale 49 million user records from US data broker LimeLeadsIncindentSecurityaffairs
15.1.20Iranian Threat Actors: Preliminary AnalysisBigBrothersSecurityaffairs
15.1.20Microsoft addresses CVE-2020-0601 flaw, the first issue ever reported by NSAVulnerebilitySecurityaffairs

15.1.20

Vulnerabilities Found in VMware Tools, Workspace ONE SDKVulnerebilitySecurityweek

15.1.20

Oracle's January 2020 CPU Delivers 334 New PatchesVulnerebilitySecurityweek

15.1.20

High-risk Google account owners can now use their iPhone as a security key

Apple

Net-security
15.1.20

Kubernetes bug bounty program open to anyone, rewards up to $10,000

Security

Net-security
15.1.20Adobe Patches Five Critical Illustrator CC FlawsVulnerebility

Threatpost

15.1.20

Microsoft Patches Major Crypto Spoofing BugVulnerebility

Threatpost

15.1.20

Google to Nix Chrome Support for Third-Party Cookies by 2022Privacy

Threatpost

15.1.20

Apple Denies FBI Request to Unlock Shooter’s iPhone—AgainApple  BigBrothers

Threatpost

15.1.20

Oracle Ties Previous All-Time Patch High with January UpdatesVulnerebility

Threatpost

15.1.20

Intel Fixes High-Severity Flaw in Performance Analysis ToolVulnerebility

Threatpost

15.1.20Card Skimmer Hits Australian Bushfire Donation SiteCyberCrime

Threatpost

15.1.20

Public Bug Bounty Takes Aim at Kubernetes Container ProjectSecurity

Threatpost

15.1.20January 2020 Adobe Patch Tuesday updates fix issues in Illustrator, Experience ManagerVulnerebilitySecurityaffairs

15.1.20

Why Russian APT Fancy Bear hacked the Ukrainian energy firm Burisma?APTSecurityaffairs

15.1.20

SAP Releases 6 Security Notes on January 2020 Patch DayVulnerebilitySecurityweek

15.1.20

Encryption Battle Reignited as US Govt at Loggerheads With AppleBigBrothers  CryptoSecurityweek

15.1.20

NSA Discloses Serious Windows Vulnerability to MicrosoftBigBrothers  VulnerebilitySecurityweek

15.1.20

Google Says it Will Phase Out Web-Tracking 'Cookies'PrivacySecurityweek
15.1.20"KRYPTOGRAFIE OKOLO NÁS", KAREL BURDAKnihyKnihy

15.1.20

AA20-014A : Critical Vulnerabilities in Microsoft Windows Operating SystemsCERTCERT

15.1.20

Multiple caching service providers are vulnerable to HTTP cache poisoningAlertAlert

15.1.20

Microsoft Windows Remote Desktop Gateway allows for unauthenticated remote code executionAlertAlert

15.1.20

Microsoft Windows CryptoAPI fails to properly validate ECC certificate chainsAlertAlert

15.1.20

Microsoft Patch Tuesday for January 2020

Vulnerebility

SANS

15.1.20

Companies increasingly reporting attacks attributed to foreign governments

BigBrothers

Net-security

15.1.20

Cyber attackers turn to business disruption as primary attack objective

Cyber

Net-security

15.1.20

Budgetary, policy, workforce issues influencing DOD and intelligence community IT priorities

BigBrothers

Net-security

15.1.20

January 2020 Patch Tuesday: Microsoft nukes Windows crypto flaw flagged by the NSA

Vulnerebility

Net-security

14.1.20

Google Researchers Detail Critical iMessage VulnerabilityVulnerebilitySecurityweek

14.1.20

Go Huawei: UK PM Challenges US Critics of China FirmBigBrothersSecurityweek

14.1.20

Tinder, Grindr Accused of Illegally Sharing User DataSocialSecurityweek

14.1.20

Major U.S. Mobile Carriers Vulnerable to SIM Swapping AttacksMobilSecurityweek
14.1.20Adobe Patches Vulnerabilities in Illustrator, Experience ManagerVulnerebilitySecurityweek

14.1.20

Hundreds of Millions of PCs Remain Vulnerable as Windows 7 Reaches End of LifeVulnerebilitySecurityweek
14.1.20Phishing Campaign Targeting Ukrainian Firm Burisma Linked to Russian CyberspiesCyberSpy  PhishingSecurityweek

14.1.20

Update Windows 10 Immediately to Patch a Flaw Discovered by the NSAVulnerebilityThehackernews

14.1.20

Adobe Releases First 2020 Patch Tuesday Software UpdatesVulnerebilityThehackernews

14.1.20

Cisco addressed a high-severity bug in Webex that could allow Remote Code ExecutionVulnerebilitySecurityaffairs

14.1.20

Security pitfalls to avoid when programming using an API

Security

Net-security

14.1.20

2020 forecast: Attackers will target non-traditional systems

Attack

Net-security

14.1.20

Unpatched Citrix Flaw Now Has PoC ExploitsVulnerebility

Threatpost

14.1.20‘Cable Haunt’ Bug Plagues Millions of Home ModemsVulnerebility

Threatpost

14.1.20

Joker Android Malware Snowballs on Google PlayAndroid

Threatpost

14.1.20Scammers Dupe Texas School District Out of $2.3MSpam

Threatpost

14.1.20

CES Surveillance Hype Worries Privacy AdvocatesIT

Threatpost

14.1.20

China-linked APT40 group hides behind 13 front companiesAPTSecurityaffairs
14.1.20US officials meet UK peers to remark the urgency to ban Huawei 5G techBigBrothers  MobilSecurityaffairs

14.1.20

Facebook quickly fixed a bug exploited in attacks that exposed Page Admins infoExploit  SocialSecurityaffairs
14.1.20Russia Hacked Ukrainian Gas Firm at Center of Trump ImpeachmentBigBrothersSecurityweek

14.1.20

NortonLifeLock to Sell ID Analytics Business to LexisNexis Risk SolutionsITSecurityweek
14.1.20US, UK Officials Meet as PM Johnson's Huawei Decision NearsBigBrothersSecurityweek

14.1.20

A 101 guide to mobile device management

Mobil

Net-security

14.1.20

Fraud prevents a third of businesses from expanding digital capabilities

Crime

Net-security

13.1.20

Hacker that hit UK National Lottery in 2016 was sentenced to prisonCrimeSecurityaffairs

13.1.20

Oski Stealer Targets Browser Data, Crypto Wallets in U.S.CryptocurrencySecurityweek

13.1.20

Facebook Rushes to Patch Bug Exposing Page AdminsSocialSecurityweek

13.1.20

Exploits Published for Citrix ADC Vulnerability, Patches Coming SoonExploitSecurityweek

13.1.20

Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking

Hacking

Net-security

13.1.20

Exploits for Citrix ADC and Gateway flaw abound, attacks are ongoing

Exploit

Net-security

13.1.20

Number of 5G connections to reach 1.5 billion globally by 2025

Mobil

Net-security

13.1.20

A case for establishing a common weakness enumeration for hardware security

Security

Net-security

13.1.205G – The Future of Security and Privacy in Smart CitiesMobilSecurityaffairs
13.1.20Maze Ransomware operators leak 14GB of files stolen from SouthwireRansomwareSecurityaffairs
13.1.20New Bill prohibits intelligence sharing with countries using Huawei 5G equipmentBigBrothers  MobilSecurityaffairs
13.1.20MageCart attack hit Australia bushfire DonorsCyberCrimeSecurityaffairs
13.1.20Google removed 1.7K+ Joker Malware infected apps from its Play StoreAndroidSecurityaffairs
13.1.20UK National Lottery Hacker Sentenced to PrisonBigBrothersSecurityweek
13.1.20Google Removes Trove of Risky 'Bread' Apps From Play StoreAndroidSecurityweek
13.1.20

Citrix ADC Exploits: Overview of Observed Payloads

Exploit

SANS

13.1.20

Transact with trust: Improving efficiencies and securing data with APIs

Security

Net-security

12.1.20Ransom NewsRansomRansom

12.1.20

Spear-Phishing Attacks Targeting Office 365 Users, SaaS Applications

Phishing blog

Sonicwall

12.1.20

Homeland Security warns of Iranian cyberattacks

BigBrother blog

Avast blog

12.1.20

Threat Brief: Iranian-Linked Cyber Operations

APT blog

Palo Alto Unity42

12.1.20

Harnessing the Power of User and Entity Behavior Analytics (UEBA) for Cloud Security

Cyber blog

Palo Alto

12.1.20

Prisma SaaS: An Octopus That Secures App Ecosystems

Cyber blog

Palo Alto

12.1.20

The Six Pillars of Effective Security Operations

Cyber blog

Palo Alto

12.1.20

Zero Trust Network Access: Build Your SASE on a Solid Foundation

Cyber blog

Palo Alto
12.1.20

Improve How You Enforce Security Policies with the Panorama Plugin for Cisc...

Cyber blog

Palo Alto

12.1.20

Cybersecurity Canon Candidate Book Review: Tribe of Hackers

Cyber blog

Palo Alto
12.1.20Sodinokibi Ransomware Publishes Stolen Data for the First TimeRansomware

Bleepingcomputer

12.1.20Android Trojan Kills Google Play Protect, Spews Fake App ReviewsAndroid

Bleepingcomputer

12.1.20Citrix ADC CVE-2019-19781 Exploits Released, Fix Now!Exploit

Bleepingcomputer

12.1.20Australia Bushfire Donors Affected by Credit Card Skimming AttackCyberCrime

Bleepingcomputer

12.1.20Maze Ransomware Publishes 14GB of Stolen Southwire FilesRansomware

Bleepingcomputer

12.1.20Sodinikibi Ransomware Hits New York Airport SystemsRansomware

Bleepingcomputer

12.1.20Beware of Amazon Prime Support Scams in Google Search AdsSpam

Bleepingcomputer

12.1.20US Govt Warns of Attacks on Unpatched Pulse VPN ServersBigBrothers

Bleepingcomputer

12.1.20VVVVVV Source Code Released to Mark 10th AnniversaryIT

Bleepingcomputer

12.1.20Microsoft Enables Security Defaults in Azure Active DirectorySecurity

Bleepingcomputer

12.1.20Google Chrome Will Support Windows 7 After End of LifeOS

Bleepingcomputer

12.1.20Ako Ransomware: Another Day, Another Infection Attacking BusinessesRansomware

Bleepingcomputer

12.1.20Card-Stealing Scripts Infect Perricone's European Skin Care SitesCyberCrime  Virus

Bleepingcomputer

12.1.20Google Removed Over 1.7K Joker Malware Infected Apps from Play StoreAndroid  Virus

Bleepingcomputer

12.1.20KDE Plasma Welcomes Windows 7 Refugees to the Linux SideOS

Bleepingcomputer

12.1.20Windows 10 Feature Updates Stop Including Drivers Needing ApprovalOS

Bleepingcomputer

12.1.20Sodinokibi Ransomware Says Travelex Will Pay, One Way or AnotherRansomware

Bleepingcomputer

12.1.20TrickBot Gang Created a Custom Post-Exploitation FrameworkBotNet  Exploit

Bleepingcomputer

12.1.20Cryptojacking Drops by 78% in Southeast Asia After INTERPOL ActionBigBrothers  Cryptocurrency

Bleepingcomputer

12.1.20Windows 10 Insider Build 19541 Warns If Apps Are Using Your LocationOS

Bleepingcomputer

12.1.20Mozilla Firefox 72.0.1 Patches Actively Exploited Zero-DayExploit  Vulnerebility

Bleepingcomputer

12.1.20Attackers Are Scanning for Vulnerable Citrix Servers, Secure NowVulnerebility

Bleepingcomputer

12.1.20TikTok Flaws Allowed Hackers to Delete Videos, Steal User InfoVulnerebility

Bleepingcomputer

12.1.20SNAKE Ransomware Is the Next Threat Targeting Business NetworksRansomware

Bleepingcomputer

12.1.20Tails 4.2 Fixes Numerous Security Flaws, Improves Direct UpgradesOS

Bleepingcomputer

12.1.20Microsoft Releases January 2020 Office Updates With Crash FixesOS  Vulnerebility

Bleepingcomputer

12.1.20Medical Info of Roughly 50K Exposed in Minnesota Hospital BreachIncindent

Bleepingcomputer

12.1.20Go-Based LiquorBot Adapts Cryptomining Payload to Infected HostCryptocurrency

Bleepingcomputer

12.1.20

PoC exploits for Citrix ADC and Gateway CVE-2019-19781 flaw released online

Exploit

Securityaffairs
12.1.20

Citrix ADC Exploits are Public and Heavily Used. Attempts to Install Backdoor

Exploit

SANS
11.1.20Iran Cyber Threat UpdateBigBrother blog

Mcafee blog

11.1.20

We Be Jammin’ – Bypassing Chamberlain myQ Garage DoorsVulnerebility blog

Mcafee blog

11.1.20

The Cloning of The Ring – Who Can Unlock Your Door?Security blog

Mcafee blog

11.1.20

The Tradeoff Between Convenience and Security – A Balancing Act for Consumers and ManufacturersCyber blog

Mcafee blog

11.1.20Black Friday, Cyber Monday and the Seasonal E-Commerce OnslaughtCyber blogF5 Labs

11.1.20

Build Your Immunity Across All App-Security Insertion PointsSecurity blog

F5 Labs

11.1.20

Is the Cloud Safe? Part 2: Breach Highlights for the Past 3 YearsSafety blog

F5 Labs

11.1.20SAIGON, the Mysterious Ursnif ForkMalware blog

FireEye

11.1.20

Tik or Tok? Is TikTok secure enough?BigBrother blogCheckpoint

11.1.20

Remote iPhone Exploitation Part 3: From Memory Corruption to JavaScript and Back -- Gaining Code ExecutionExploit blogProject Zero

11.1.20

Remote iPhone Exploitation Part 2: Bringing Light into the Darkness -- a Remote ASLR BypassExploit blogProject Zero
11.1.20Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641Exploit blogProject Zero

11.1.20

Policy and Disclosure: 2020 EditionCyber blogProject Zero

11.1.20

Connected cars: How to improve their connection to cybersecurityCyber blog

Eset

11.1.20

Mozilla rushes out patch for Firefox zero‑dayVulnerebility blog

Eset

11.1.20

CES – Taking a smart city for a test driveSecurity blog

Eset

11.1.20

Facebook bans deepfakes but not all altered contentSocial blogEset
11.1.20PoC Exploits Released for Citrix ADC and Gateway RCE VulnerabilityExploit  VulnerebilityThehackernews
11.1.20FBI Tightening Up Wiretap Protocols After Watchdog ReportBigBrothersSecurityweek

11.1.20

Pulse Secure VPN Vulnerability Still Widely Exploited, CISA WarnsVulnerebilitySecurityweek

11.1.20

Dixons Fined by UK Regulator Over Data BreachBigBrothers  IncindentSecurityweek

11.1.20

Christmas Ransomware Attack Hit New York Airport ServersRansomwareSecurityweek
11.1.20New Bill Would Prohibit Intelligence Sharing With Countries That Use HuaweiBigBrothersSecurityweek

11.1.20

Remote Code Execution Flaw Impacts E2fsprogs Filesystem UtilityVulnerebilitySecurityweek

11.1.20

Cable Haunt: Millions of Cable Modems With Broadcom Chips Vulnerable to AttacksAttack  VulnerebilitySecurityweek

11.1.20

Pwn2Own 2020: Researchers Again Invited to Hack TeslaCongressSecurityweek
11.1.20AA20-010A : Continued Exploitation of Pulse Secure VPN VulnerabilityCERTCERT

11.1.20

Cable Haunt flaw exposes 200M+ Broadcom-based cable modems at remote hijackingIncindentSecurityaffairs

11.1.20

CISA warns that Pulse Secure VPN issue CVE-2019-11510 is still exploitedExploit  VulnerebilitySecurityaffairs

11.1.20

Albany County Airport authority hit by a ransomware attackRansomwareSecurityaffairs
11.1.20Two MageCart groups competed to steal credit cards data from Perricone MD ‘s European skincare sitesCyberCrimeSecurityaffairs

11.1.20

Oil-and-Gas APT Pivots to U.S. Power Plants

APT

Threatpost

11.1.20

Cisco Webex Bug Allows Remote Code Execution

Vulnerebility

Threatpost

11.1.20

Lifeline Assistance Phone Users Targeted with ‘Uninstallable’ Adware

Mobil  Virus

Threatpost

10.1.20Microsoft Phishing Scam Exploits Iran Cyberattack ScarePhishing

Bleepingcomputer

10.1.20

Firefox 72 Out With Fingerprinter Blocking, Hidden Notification PromptsSafety

Bleepingcomputer

10.1.20

MageCart Attackers Steal Card Info from Focus Camera ShoppersCyberCrime

Bleepingcomputer

10.1.20MP Says Austria Unprepared After Cyberattack on Foreign MinistryBigBrothers

Bleepingcomputer

10.1.20Fake Windows 10 Desktop Used in New Police Browser Lock ScamOS

Bleepingcomputer

10.1.20

InfoTrax Gets Slap on The Wrist After Being Breached 20+ TimesIncindent

Bleepingcomputer

10.1.20

Nvidia CES Game Ready Driver Adds a Maximum Frame Rate SettingIT

Bleepingcomputer

10.1.20IT Executive Steals $6 Million, Busted by Word Doc MetadataCyberCrime

Bleepingcomputer

10.1.20Sodinokibi Ransomware Hits Travelex, Demands $3 MillionRansomware

Bleepingcomputer

10.1.20

US Govt Says Iran's Cyberattacks Can Disrupt Critical InfrastructureBigBrothers

Bleepingcomputer

10.1.20

How to Stop Microsoft From Testing New Features in EdgeOS

Bleepingcomputer

10.1.20BusKill Cable Starts a Self-Destruct Routine on Stolen LaptopsSafety

Bleepingcomputer

10.1.20

Kali Linux to Default to Non-Root User With 2020.1 ReleaseOS

Bleepingcomputer

10.1.20Linux Gamers Banned in Battlefield V if Using Wine and DXVKIT

Bleepingcomputer

10.1.20

Exploit Fully Breaks SHA-1, Lowers the Attack Bar

Attack  Exploit

Threatpost

10.1.20

TrickBot Adds Custom, Stealthy Backdoor to its Arsenal

Virus

Threatpost

10.1.20

4 Ring Employees Fired For Spying on Customers

CyberSpy

Threatpost

10.1.20

California’s Tough New Privacy Law and Its Biggest Challenges

BigBrothers  Incindent

Threatpost

10.1.2056.25 million US residents records collected by CheckPeople exposed on a Chinese serverIncindentSecurityaffairs

10.1.20

North Korea-linked Lazarus APT continues to target cryptocurrency exchangesAPT  CryptocurrencySecurityaffairs

10.1.20

Experts warn of ongoing scans for Citrix servers affected by CVE-2019-19781VulnerebilitySecurityaffairs
10.1.20TrickBot gangs developed the PowerTrick backdoor for high-value targetsVirusSecurityaffairs
10.1.20Hackers Scan for Vulnerable Citrix ADC SystemsVulnerebilitySecurityweek

10.1.20

Connected Cars Moving Targets for HackersHackingSecurityweek

10.1.20

More Threat Groups Target Electric Utilities in North AmericaHackingSecurityweek
10.1.20North Korean Hackers Continue to Target Cryptocurrency ExchangesCryptocurrencySecurityweek

10.1.20

Threat From Pre-Installed Malware on Android Phones is GrowingAndroidSecurityweek
10.1.20PayPal Patches Vulnerability That Exposed User PasswordsVulnerebilitySecurityweek
10.1.20

More Data Exfiltration

Security

SANS

10.1.20

Companies: Lean into consumer privacy to win

Privacy

Net-security

10.1.20

January 2020 Patch Tuesday forecast: Let’s start the new decade right

Vulnerebility

Net-security

10.1.20

What students think about university data security

Security

Net-security

9.1.20Interpol: Goldfish Alpha operation reduces cryptojacking by 78%BigBrothers  CyberCrimeSecurityaffairs

9.1.20

TrickBot Operators Create New Backdoor for Important TargetsVirusSecurityweek

9.1.20

Rockwell Automation to Acquire Cybersecurity Firm AvnetITSecurityweek
9.1.20Critical Firefox 0-Day Under Active Attacks – Update Your Browser Now!VulnerebilityThehackernews
9.1.20

Quick Analyzis of a(nother) Maldoc

Virus

SANS

9.1.20

Attackers exploiting critical Citrix ADC, Gateway flaw, company yet to release fixes

Vulnerebility

Net-security

9.1.20

Mozilla patches actively exploited Firefox zero-day

Exploit  Vulnerebility

Net-security

9.1.20Smartphone shopaholicMobilSecurelist

9.1.20

Google Ditches Patch-Time Bug Disclosure in Favor of 90-Day Policy

Vulnerebility

Threatpost

9.1.20

TikTok Riddled With Security Flaws

Vulnerebility

Threatpost

9.1.20

Liverpool Voyeur Used IM-RAT to Video Women at Home

Virus

Threatpost

9.1.20

Mozilla Releases Firefox 72: High-Severity Bugs Patched, Fingerpinting Nixed

Vulnerebility

Threatpost

9.1.20

Drake Lyrics Used as Calling Card in Malware Attack

Virus

Threatpost

9.1.20

Man Sentenced in ATM Skimming Conspiracy

CyberCrime

Threatpost

9.1.20Mozilla addresses CVE-2019-17026 Firefox Zero-Day exploited in targeted attacksExploit  VulnerebilitySecurityaffairs

9.1.20

The city of Las Vegas announced it has suffered a cyber attackAttackSecurityaffairs
9.1.20MITRE presents ATT&CK for ICS, a knowledge base for ICSICSSecurityaffairs
9.1.20Shambles AttackAttackAttack

9.1.20

Shambles  AttackPapersPapers
9.1.20Citrix Application Delivery Controller and Citrix Gateway web server vulnerabilityAlertAlert

9.1.20

Mozilla Patches Firefox Zero-Day Exploited in Targeted AttacksExploit  VulnerebilitySecurityweek

9.1.20

Nepal Deports 122 Chinese Nationals After Cyber RaidBigBrothers  CyberCrimeSecurityweek

9.1.20

FBI Asks Apple for Phone Data From Saudi Shooting SuspectApple  BigBrothersSecurityweek
9.1.20Interpol Announces Successful Operation Against Cryptojacking in Southeast AsiaBigBrothers  CryptocurrencySecurityweek

9.1.20

Google Project Zero Updates Vulnerability Disclosure PolicyVulnerebilitySecurityweek

9.1.20

Kuwait Denies US Troop Pullout, Says News Agency HackedBigBrothersSecurityweek

9.1.20

Firefox 72 Blocks Fingerprinting Scripts by DefaultSafetySecurityweek
9.1.20Travelex Says Financially Unaffected by HackingHackingSecurityweek

9.1.20

BlackBerry Announces Automotive Security SolutionMobilSecurityweek

9.1.20

China-Made TikTok App Riddled With Security Holes: ResearchersBigBrothersSecurityweek

9.1.20

Las Vegas Reports Cyber Attack; Extent of Breach UnclearAttack  IncindentSecurityweek
9.1.20Threat Posed by Iran to Industrial Systems After Killing of Top GeneralICSSecurityweek

9.1.20

Windows 7 - End of Life

Safety

SANS

9.1.20

California’s IoT cybersecurity bill: What it gets right and wrong

IoT

Net-security

9.1.20

When do you plan to upgrade to 5G?

Mobil

Net-security

9.1.20

eBook: How Hackers Plan Their Attacks

Security

Net-security

8.1.20

Security flaws allowed hijacking any TikTok account

Vulnerebility

Securityaffairs

8.1.20

MITRE Releases ATT&CK Knowledge Base for Industrial Control Systems

ICS

Securityweek

8.1.20

App on Google Play exploited Android bug to deliver spyware

Android

Net-security

8.1.20

Travelex extorted by ransomware gang, services still offline a week after the hit

Ransomware

Net-security

8.1.20

ATT&CK for ICS: Knowledge base of techniques used by cyber adversaries

ICS

Net-security

8.1.20Operation AppleJeus SequelAppleSecurelist
8.1.20SNAKE Ransomware is targeting business networksRansomwareSecurityaffairs
8.1.20Researchers Demonstrate How to Hack Any TikTok Account by Sending SMSHacking  MobilThehackernews
8.1.20

Facebook Cracks Down on Deepfake Videos

Social

Threatpost

8.1.20

Google Fixes Critical Android RCE Flaw

Android

Threatpost

8.1.20

Sodinokibi Ransomware Behind Travelex Fiasco: Report

Ransomware

Threatpost
8.1.20

FBI Taps Apple to Unlock Pensacola Shooter’s iPhone

Apple  BigBrothers

Threatpost

8.1.20Facebook declares war to Deepfake videosSocialSecurityaffairs
8.1.20Medical info of 49,351 patients exposed in Alomere Health hospital breachIncindentSecurityaffairs
8.1.20MageCart gang compromised popular Focus Camera websiteCyberCrimeSecurityaffairs
8.1.20Google blocks Xiaomi integrations on Nest hub over privacy concernsMobil  PrivacySecurityaffairs
8.1.20China-based Bronze President APT targets South and East AsiaAPTSecurityaffairs
8.1.20Malicious app exploiting CVE-2019-2215 zero-day available in Google Play since MarchAndroid  ExploitSecurityaffairs
8.1.20Chinese Cyber-Espionage Group Targeted NGOs for YearsAPTSecurityweek
8.1.20Iran Strikes Back at US With Missile Attack at Bases in IraqBigBrothersSecurityweek
8.1.20

Why the 2020 US presidential election is still vulnerable to foreign interference

BigBrothers

Net-security
8.1.20

Smart cities are on the rise, what are the dangers?

Security

Net-security
8.1.20

Trends that will shape the 2020 technology market

IT

Net-security
8.1.20

Are you ready for the end of Windows 7 support?

Safety

Net-security
7.1.20Mimecast Acquires Threat Protection Provider SegasecSecuritySecurityweek
7.1.20Microsoft Access Files Could Include Unintentionally Saved Sensitive DataSecuritySecurityweek
7.1.20Are Overlapping Security Tools Adversely Impacting Your Security Posture?SecuritySecurityweek
7.1.20Accenture to Acquire Symantec's Security Services Unit from BroadcomITSecurityweek
7.1.20Android's January 2020 Update Patches 40 VulnerabilitiesAndroidSecurityweek
7.1.20Facebook, Samsung, Ring Unveil New Privacy, Security Tools at CES 2020SocialSecurityweek
7.1.203 Google Play Store Apps Exploit Android Zero-Day Used by NSO GroupAndroidThehackernews
7.1.20

A Quick Update on Scanning for CVE-2019-19781 (Citrix ADC / Gateway Vulnerability)

Vulnerebility

SANS
7.1.20

PCs still running Windows 7 will soon be significantly more at risk of ransomware

Ransomware

Net-security
7.1.20

Facial recognition hardware to reach over 800 million devices by 2024

IT

Net-security
7.1.20

Burner phones are an eavesdropping risk for international travelers

Mobil

Net-security
7.1.20

Data ownership vs. data processing: A moral dilemma?

IT

Net-security
7.1.20

Cisco Data Center Network Manager flaws fixed, Cisco ASA appliances under attack

Attack

Net-security
7.1.20

ToTok Returned to Google Play Despite ‘Spy Tool’ Claims

Android  BigBrothers  CyberSpy

Threatpost

7.1.20

Hackers Deface U.S. Gov Website With Pro-Iran Messages

BigBrothers

Threatpost

7.1.20

DeathRansom Campaign Linked to Malware Cornucopia

Ransomware  Virus

Threatpost
7.1.20

Magecart Hits Parents and Students via Blue Bear Attack

Hacking

Threatpost

7.1.20Potential for Iranian Cyber Response to U.S. Military Strike in BaghdadCERTCERT
7.1.20HappyHotel, popular search engine for love hotels in Japan discloses data breachIncindentSecurityaffairs
7.1.20Microsoft report: around 0.08% of RDP brute-force attacks are successfulAttackSecurityaffairs
7.1.20DHS warns of Iran-linked attacks in a National Terrorism Advisory System bulletinBigBrothersSecurityaffairs
7.1.20School software provider Active Network discloses data breachIncindentSecurityaffairs
7.1.20App Found in Google Play Exploits Recent Android Zero-DayAndroid  ExploitSecurityweek
7.1.20Insight Partners Acquires IoT Security Firm Armis at $1.1 Billion ValuationITSecurityweek
7.1.20Antivirus Vendors Patch Bug First Discovered 10 Years AgoVulnerebilitySecurityweek
7.1.20Google Blocks Xiaomi Integrations Over Privacy ConcernsPrivacySecurityweek
7.1.20Pulse Secure VPN Vulnerability Exploited to Deliver RansomwareExploit  Ransomware  VulnerebilitySecurityweek
7.1.20DHS Warns of Possible Iranian Cyberattacks After Killing of Qassem SoleimaniBigBrothersSecurityweek
7.1.20'Serious' Cyber Attack Hits Austrian MinistryBigBrothersSecurityweek
7.1.20

SNMP service: still opened to the public and still queried by attackers

Attack

SANS
6.1.20Clop Ransomware Now Kills Windows 10 Apps and 3rd Party ToolsRansomware

Bleepingcomputer

6.1.20Microsoft Products Reaching End of Life in 2020IT

Bleepingcomputer

6.1.20FBI Warns of Maze Ransomware Focusing on U.S. CompaniesBigBrothers  Ransomware

Bleepingcomputer

6.1.20U.S. Government Issues Warning About Possible Iranian CyberattacksBigBrothers

Bleepingcomputer

6.1.20Colorado Town Wires Over $1 Million to BEC ScammersSpam

Bleepingcomputer

6.1.20Maze Ransomware Sued for Publishing Victim's Stolen DataRansomware

Bleepingcomputer

6.1.20Python 2.7 Reaches End of Life After 20 Years of DevelopmentIT

Bleepingcomputer

6.1.20Poloniex Forces Password Reset After Data Leak Found OnlineIncindent

Bleepingcomputer

6.1.20Popular U.S. Restaurant Owner Hit by Credit Card Stealing MalwareVirus

Bleepingcomputer

6.1.20Ransomware Attackers Offer Holiday Discounts and GreetingsRansomware

Bleepingcomputer

6.1.20Austria’s foreign ministry is facing a ‘serious cyberattack’BigBrothersSecurityaffairs
6.1.20California IT service provider Synoptek pays ransom after Sodinokibi attackRansomwareSecurityaffairs
6.1.20Federal Depository Library Program Govn agency breached by Iranian hackersBigBrothersSecurityaffairs
6.1.20DeathRansom ransomware evolves encrypting files, but experts identified its authorRansomwareSecurityaffairs
6.1.20Popular Mideast App Accused of Spying Back on Google PlayAndroidSecurityweek
6.1.20'Iranian Hackers' Claim Breach of US Govt WebsiteBigBrothersSecurityweek
6.1.20Iranian Cyberattacks Feared After Killing of Top GeneralBigBrothersSecurityweek
6.1.20

Increase in Number of Sources January 3rd and 4th: spoofed

Security

SANS
6.1.20

Modern security product certification best practices

SecurityNet-security
6.1.20

Five cyber risks that will define 2020

Cyber

Net-security
6.1.20

RSA Conference 2020 USA: What you can expect at this year’s event

Congress

Net-security
6.1.20

Automotive cybersecurity incidents doubled in 2019, up 605% since 2016

Incindent

Net-security
5.1.20Ransom NewsRansomRansom
5.1.20Ransomware attackers wish victims happy holidays, offer discountsRansomware blogAvast blog
5.1.209 Cybersecurity Predictions for Europe, the Middle East and Africa in 2020Cyber blog

Palo Alto

5.1.20Improve How You Enforce Security Policies with the Panorama Plugin for Cisc...Cyber blog

Palo Alto

5.1.20Cybersecurity Canon Candidate Book Review: Tribe of HackersCyber blog

Palo Alto

5.1.2010 Articles from Security Roundtable That You Shouldn’t MissCyber blogPalo Alto
5.1.20Cybersecurity Canon Candidate Book Review: Defensive Security Handbook – Be...Cyber blogPalo Alto
5.1.20

KringleCon 2019

Congress

SANS

5.1.20U.S. CISA Agency warns of possible cyber attacks from IranBigBrothersSecurityaffairs
5.1.20BusKill, a $20 USB Dead Man’s Switch for Linux LaptopSecuritySecurityaffairs
4.1.20Facebook fined $1.65 by Brazil Governenment over Cambridge AnalyticaSocialSecurityaffairs
4.1.20Cisco Talos discovered 2 critical flaws in the popular OpenCV libraryVulnerebilitySecurityaffairs
4.1.20US Army banned the popular TikTok app over China security concernsBigBrothersSecurityaffairs
4.1.20Travelex currency exchange suspends services after malware attackVirusSecurityaffairs
4.1.20MOBILE MALWARE: FROM CONSUMER FRAUD TO ENTERPRISE ESPIONAGEMalware blog

Cybereason

4.1.20IS CYBER RETALIATION FROM IRAN IMMINENT?BigBrother blog

Cybereason

4.1.20Google disables Xiaomi smart home integration after camera bugVulnerebility blog

Eset

4.1.20Simple steps to protect yourself against identity theftCyber blog

Eset

4.1.2020 tips for 2020: Be smarter with your smartphoneCyber blog

Eset

4.1.2020 tips for 2020: Mistakes to avoidCyber blogEset
4.1.20Iran May Respond With Cyberattacks to Killing of Qassem SoleimaniBigBrothersSecurityweek
4.1.20How Will Iran Retaliate to Soleimani Killing?BigBrothersSecurityweek
4.1.20Cyberattack Forces Currency Exchange Giant Travelex OfflineAttackSecurityweek
4.1.20Serious Vulnerabilities Patched in OpenCV Computer Vision LibraryVulnerebilitySecurityweek
4.1.20Apple Targets Jailbreaking in New Complaint Against CorelliumAppleSecurityweek
4.1.20Firefox 72 Will Let Users Delete Telemetry DataPrivacySecurityweek
4.1.20Landry's Discloses Payment Card IncidentIncindentSecurityweek
4.1.20

3 Critical Bugs Allow Remote Attacks on Cisco NX-OS and Switches

Vulnerebility

Threatpost

4.1.20

Google Boots Security Camera Maker From Nest Hub After Private Images Go Public

Privacy  Security

Threatpost

4.1.20

Cybercriminals Fill Up on Gas Pump Transaction Scams Ahead of Oct. Deadline

Spam

Threatpost
4.1.20

Travelex Knocked Offline by System-Wide Malware Attack

Virus

Threatpost

4.1.20

Ransomware Attack Topples Telemarketing Firm, Leaving Hundreds Jobless

Ransomware

Threatpost
3.1.20

TikTok Banned By U.S. Army Over China Security Concerns

BigBrothers

Threatpost

3.1.20

California Adopts Strictest Privacy Law in U.S.

Privacy

Threatpost

3.1.20

Data Breach Affects 63 Landry’s Restaurants

Incindent

Threatpost
3.1.20Cisco addresses several flaws in its DCNM productVulnerebilitySecurityaffairs
3.1.20Remote Command Execution and Information disclosure flaws affect dozens of D-Link routersVulnerebilitySecurityaffairs
3.1.20US restaurant chain Landry’s discloses payment card breachIncindentSecurityaffairs
3.1.20Poloniex forces password reset following a data leakIncindentSecurityaffairs

3.1.20

Crooks use Star Wars saga as bait in Phishing and malware attacksPhishing  VirusSecurityaffairs
3.1.20Watch out, sextortion scammers are using a new tacticSpamSecurityaffairs
3.1.20Cisco DCNM Users Warned of Serious VulnerabilitiesVulnerebilitySecurityweek
3.1.20Critical Vulnerabilities Impact Ruckus Wi-Fi RoutersVulnerebilitySecurityweek
3.1.20Unprotected Database Leaks Data of Wyze UsersIncindentSecurityweek

3.1.20

ProtonMail Launches Encrypted Calendar ApplicationSafetySecurityweek
3.1.20Remote Command Execution Vulnerability Affects Many D-Link RoutersVulnerebilitySecurityweek
3.1.20Xiaomi Cameras Connected to Google Nest Expose Video Feeds From OthersHackingThehackernews
3.1.20Landry's Restaurant Chain Suffers Payment Card Theft Via PoS MalwareVirusThehackernews

3.1.20

CCPA - Quick Overview

Privacy

SANS

2.1.20

High Risk Vulnerabilities Addressed in Big Monitoring FabricVulnerebilitySecurityweek

2.1.20

Facebook Fined $1.65 Mn by BrazilSocialSecurityweek

2.1.20

Feds: No Evidence Hackers Disrupted North Carolina VotingBigBrothersSecurityweek

2.1.20

Microsoft Seizes Web Domains Used by North Korean HackersAPTSecurityweek
2.1.20Wawa Facing Lawsuits Over Data Breach at All of its StoresIncindentSecurityweek

2.1.20

UN Backs Russia on Internet Convention, Alarming Rights AdvocatesBigBrothersSecurityweek

2.1.20

UAE Denies Developing Popular Mideast App as Spy ToolBigBrothersSecurityweek

2.1.20

Nepal Arrests 122 Chinese Over Suspected Cyber ScamBigBrothersSecurityweek

2.1.20

Thai Officials Say Prison Cameras Were Hacked, BroadcastBigBrothersSecurityweek

2.1.20

Evolution of OpenSSL Security After HeartbleedCryptoSecurityweek

2.1.20

Popular Mideast App Pulled After Report it Was Spying ToolAndroidSecurityweek
2.1.20Mastercard to Buy Supply Chain Monitoring Firm RiskReconITSecurityweek

2.1.20

British Hacker Sentenced for Blackmailing AppleAppleSecurityweek

2.1.20

Citrix Vulnerability Leaves 80,000 Companies at RiskVulnerebilitySecurityweek

2.1.20

Three GozNym Malware Operators SentencedVirusSecurityweek

2.1.20

Twitter, Facebook Target State-Linked Accounts Made to ManipulateSocialSecurityweek

2.1.20

As US Congress Delays on Privacy, California Law in FocusBigBrothersSecurityweek

2.1.20

Over 50 Islands Restaurants Hit by Payment Card BreachIncindentSecurityweek

2.1.20

Data of Honda Owners in North America Exposed OnlineIncindentSecurityweek
2.1.20Vulnerability in Twitter App Enabled Hackers to Obtain Information, Control AccountsSocialSecurityweek

2.1.20

Shitcoin Wallet Chrome extension steals crypto-wallet private keys and passwords

Cryptocurrency

Securityaffairs

2.1.20

Ransomware in Node.js

Ransomware

SANS

1.1.20

Mariah Carey ‘s Twitter Hacked on New Year’s EveSocialSecurityaffairs

1.1.20

Irish National Cyber Security Strategy warns of ​attacks on Irish data centresBigBrothersSecurityaffairs

1.1.20

"Nim httpclient/1.0.4"

Security

SANS

1.1.20

Expert finds Starbucks API Key exposed onlineIncindentSecurityaffairs

1.1.20

7 Tips for Maximizing Your SOC

Security

Threatpost

1.1.20

2020 Cybersecurity Trends to Watch

Cyber

Threatpost

1.1.20

Starbucks Devs Leave API Key in GitHub Public Repo

Security

Bleepingcomputer

1.1.20

Sextortion Email Scammers Try New Tactics to Bypass Spam Filters

Spam

Bleepingcomputer

1.1.20

How to Join the Windows Insider Program with a Local Account

OS

Bleepingcomputer

1.1.20

Special Olympics New York Hacked to Send Phishing Emails

Phishing

Bleepingcomputer

1.1.20

Microsoft Takes North Korean Hacking Group Thallium to Court

APT

Bleepingcomputer

1.1.20

Wyze Exposes User Data via Unsecured ElasticSearch Cluster

Incindent

Bleepingcomputer

1.1.20

Dark web Grey Market still down, users speculate possible Exit Scam

CyberCrime

Securityaffairs