Calendar 2020 July- Home  2020  2019  2018  2017  2016  1  2  3  4  5  6  7

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2020 - January February March April May June July August September October November December


Date

Name

Category

Web

31.7.20

WastedLocker: technical analysis

Virus

Securelist

31.7.20

Cisco fixes critical and high-severity flaws in Data Center Network Manager

Vulnerebility

Securityaffairs

31.7.20

IndieFlix streaming service leaves thousands of confidential agreements, filmmaker SSNs, videos exposed on public server

CyberCrime

Securityaffairs

31.7.20

EU has imposed sanctions on foreign actors for the first time ever

BigBrothers

Securityaffairs

31.7.20

Autofill Through Biometric Authentication Coming to Chrome

Safety

Securityweek

31.7.20

BootHole Patches Causing Many Systems to Become Unbootable

Vulnerebility

Securityweek

31.7.20

Mimecast Acquires Messaging Security Provider MessageControl

Security

Securityweek

31.7.20

Cybercriminals Could Be Cloning Payment Cards Using Stolen EVM Data

CyberCrime

Securityweek

31.7.20

Twitter Employees Targeted With Phone Spear-Phishing in Recent Attack

Attack  Social

Securityweek

31.7.20

Bill Aimed at Ending 'Warrant-Proof' Encryption Introduced in House

BigBrothers

Securityweek

31.7.20

Red Hat's BootHole Patches Cause Systems to Hang

Vulnerebility

Securityweek

31.7.20

EU sanctions hackers from China, Russia, North Korea who're wanted by the FBI

BigBrothers

Thehackernews
31.7.20

New Attack Leverages HTTP/2 for Effective Remote Timing Side-Channel Leaks

Attack

Thehackernews

31.7.20

Twitter employees were spear-phished over the phone

Phishing  Social

Net-security

31.7.20

Cisco fixes critical flaws in data center and SD-WAN solutions

Vulnerebility

Net-security

31.7.20

GRUB2 bootloader is vulnerable to buffer overflowAlertAlert

31.7.20

Vermont Taxpayers Warned of Data Leak Over the Past Three Years

Incindent

Threatpost

31.7.20

Critical, High-Severity Cisco Flaws Fixed in Data Center Network Manager

Vulnerebility

Threatpost

31.7.20

Critical Security Flaw in WordPress Plugin Allows RCE

Vulnerebility

Threatpost

31.7.20

Billions of Devices Impacted by Secure Boot Bypass

Vulnerebility

Threatpost

31.7.20

Zoom Flaw Could Have Allowed Hackers To Crack Meeting Passcodes

Vulnerebility

Threatpost

31.7.20

Doki Backdoor Infiltrates Docker Servers in the Cloud

Virus

Threatpost

31.7.20

Critical Magento Flaws Allow Code Execution

Vulnerebility

Threatpost

31.7.20

Critical Bugs in Utilities VPNs Could Cause Physical Damage

Vulnerebility

Threatpost

31.7.20

Facial-Recognition Flop: Face Masks Thwart Virus, Stump Security Systems

Virus

Threatpost

31.7.20

OkCupid Security Flaw Threatens Intimate Dater Details

Vulnerebility

Threatpost

31.7.20

Expert discloses details of 3 Tor zero-day flaws … new ones to come

Vulnerebility

Securityaffairs

31.7.20

Offensive Security Acquires Cybersecurity Training Project VulnHub

Safety

Securityweek

31.7.20

Cisco Patches Serious Vulnerabilities in Data Center Network Manager

Vulnerebility

Securityweek

31.7.20

Python Developers: Prepare!!!

Security

SANS

31.7.20

What are script-based attacks and what can be done to prevent them?

Attack

Net-security

31.7.20

How do I select an endpoint protection solution for my business?

Security

Net-security

31.7.20

Lack of training, career development, and planning fuel the cybersecurity profession crisis

Cyber

Net-security

31.7.20

Global CPaaS market to reach $25 billion by 2025

Security

Net-security

30.7.20

Operation North Star – North-Korea hackers targeted US defense and aerospace companies

BigBrothers

Securityaffairs

30.7.20

BootHole issue allows installing a stealthy and persistent malware

Virus

Securityaffairs

30.7.20

U.S. experts claim China-linked hackers have infiltrated Vatican networks

BigBrothers

Securityaffairs

30.7.20

EU Sanctions on Russian, Chinese 'Cyber Attackers'

BigBrothers

Securityweek

30.7.20

Vulnerability Allowed Brute-Forcing Passwords of Private Zoom Meetings

Vulnerebility

Securityweek

30.7.20

US Warns of 'Consequences' If Brazil Picks Huawei 5G

BigBrothers

Securityweek

30.7.20

FBI Warns of NetWalker Ransomware Targeting Businesses

Ransomware

Securityweek

30.7.20

Companies Respond to 'BootHole' Vulnerability

Vulnerebility

Securityweek

30.7.20

Britain Names Turkish Speaker as New Top Spy

BigBrothers

Securityweek

30.7.20

'BootHole' Flaw Allows Installation of Stealthy Malware, Affects Billions of Devices

Android

Securityweek

30.7.20

Identity and Data Protection Provider Ermetic Raises $17 Million

IT

Securityweek

30.7.20

'Ghostwriter' – Widespread Disinformation Campaign Associated with Russia

BigBrothers

Securityweek

30.7.20

Zoom Bug Allowed Snoopers Crack Private Meeting Passwords in Minutes

Vulnerebility

Thehackernews

30.7.20

Critical GRUB2 Bootloader Bug Affects Billions of Linux and Windows Systems

Vulnerebility

Thehackernews

30.7.20

Bug in widely used bootloader opens Windows, Linux devices to persistent compromise

Vulnerebility

Net-security

30.7.20

The average total cost of a data breach declined, but costs increased for many organizations

Incindent

Net-security

30.7.20

Delivering and maintaining security at the speed of digital transformation

Security

Net-security

30.7.20

Things to consider when selecting enterprise SSDs for critical workloads

Security

Net-security

30.7.20

Most consumers believe government regulation should help address privacy risks

Privacy

Net-security

30.7.20

Businesses are preparing for a cloud-based approach to applications

Security

Net-security

29.7.20

APT trends report Q2 2020APTSecurelist

29.7.20

Doki, an undetectable Linux backdoor targets Docker ServersVirusSecurityaffairs

29.7.20

AWS Fraud Detection Service Becomes Generally AvailableSecurity

Securityweek

29.7.20

Vatican Allegedly Hacked by China Ahead of Key TalksHackingSecurityweek

29.7.20

Video Creation Service Promo.com Discloses Data BreachIncindent

Securityweek

29.7.20

US Officials: Russia Behind Spread of Virus DisinformationBigBrothersSecurityweek

29.7.20

North Korean Hackers Operate VHD Ransomware, Kaspersky SaysRansomware

Securityweek

29.7.20

Cybersecurity Training Company RangeForce Raises $16 MillionITSecurityweek

29.7.20

ZDI Announces Rules, Prizes for Pwn2Own Tokyo 2020CongressSecurityweek

29.7.20

Industrial VPN Flaws Could Let Attackers Target Critical InfrastructuresVulnerebilityThehackernews

29.7.20

OkCupid Dating App Flaws Could've Let Hackers Read Your Private MessagesMobilThehackernews

29.7.20

Researchers Warn of High-Severity Dell PowerEdge Server Flaw

Vulnerebility

Threatpost

29.7.20

Lazarus Group Brings APT Tactics to Ransomware

APT

Threatpost

29.7.20

North Korea-Linked Lazarus APT is behind the VHD ransomware

APT

Securityaffairs

29.7.20

ShinyHunters leaked over 386 million user records from 18 companies

Incindent

Securityaffairs

29.7.20

Pirate Ship Sailing to Developing World: Group-IB Uncovers Real Captains of Online Piracy Crew

CyberCrime

Securityaffairs

29.7.20

Nefilim ransomware operators leaked data alleged stolen from the Dussmann group

Ransomware

Securityaffairs

29.7.20

Industrial Systems Can Be Hacked Remotely via VPN Vulnerabilities

ICS

Securityweek

29.7.20

U.S. Election Administrators Failed to Implement Phishing Protections: Study

Phishing

Securityweek

29.7.20

All I want this Tuesday: More Data

Security

SANS

29.7.20

Security teams increasingly stressed due to lack of proper tools, executive support

Security

Net-security

29.7.20

Public cloud environments leave numerous paths open for exploitation

Exploit

Net-security

29.7.20

Assessing the email security controls used by 10,000 U.S. state and local election administrators

Security

Net-security

29.7.20

Building a quantum internet: Fast data exchange, difficult to eavesdrop

Security

Net-security

29.7.20

UCaaS market to reach $24.3 billion by 2026

IT

Net-security

29.7.20

Researchers find critical RCE vulnerabilities in industrial VPN solutions

Vulnerebility

Net-security

28.7.20

Lazarus on the hunt for big gameAPTSecurelist

28.7.20

Hacking IoT & RF Devices with BürtleinaBoardIoT

Securityaffairs

28.7.20

QSnatch malware infected over 62,000 QNAP NAS DevicesVirusSecurityaffairs

28.7.20

FBI warns US companies on the use of Chinese Tax SoftwareBigBrothersSecurityaffairs

28.7.20

Several New Mac Malware Families Attributed to North Korean HackersApple  BigBrothers

Securityweek

28.7.20

Source Code From Major Firms Leaked via Unprotected DevOps InfrastructureIncindentSecurityweek

28.7.20

US, UK Warn of Malware Targeting QNAP NAS DevicesVirus 

Securityweek

28.7.20

Facebook Says EU Antitrust Probe Invades Employee PrivacyBigBrothers  SocialSecurityweek

28.7.20

Undetectable Linux Malware Targeting Docker Servers With Exposed APIsVirusThehackernews

28.7.20

QSnatch Data-Stealing Malware Infected Over 62,000 QNAP NAS DevicesVirusThehackernews

28.7.20

How well do face recognition algorithms identify people wearing masks?

Security

Net-security

28.7.20

62,000 QNAP NAS devices infected with persistent QSnatch malware

Virus

Net-security

28.7.20

Encryption Under ‘Full-Frontal Nuclear Assault’ By U.S. Bills

BigBrothers  Crypto

Threatpost

28.7.20

Attackers Exploiting High-Severity Network Security Flaw, Cisco Warns

Exploit  Vulnerebility

Threatpost

28.7.20

Microsoft Revamps Windows Insider Preview Bug Bounty Program

OS

Threatpost

28.7.20

Garmin says many of the systems are returning to operation

Ransomware

Securityaffairs

28.7.20

Source code of Cerberus Android Trojan offered for sale for $100,000

Android

Securityaffairs

28.7.20

FBI warns cyber actors abusing protocols as new DDoS attack vectors

BigBrothers

Securityaffairs

28.7.20

Hacker Replaced Emotet Payloads With GIF Images

Virus

Securityweek

28.7.20

Garmin Says Systems Back Online After Cyber Attack

Ransomware

Securityweek

28.7.20

Bluetooth-Enabled 'Mooltipass' Hardware Password Manager Unveiled

Security

Securityweek

28.7.20

Digital Banking Service Dave Says Data Stolen in Third-Party Breach

Incindent

Securityweek

28.7.20

AA20-209A : Potential Legacy Risk from Malware Targeting QNAP NAS DevicesCERTCERT

28.7.20

In Memory of Donald Smith

Security

SANS

28.7.20

Review: Cyber Warfare – Truth, Tactics, and Strategies

Cyber

Net-security

28.7.20

The distinction between human and bot behavior is becoming increasingly blurred

Security

Net-security

28.7.20

What is privacy and why does it matter?

Privacy

Net-security

28.7.20

NIST selects algorithms to form a post-quantum cryptography standard

Security

Net-security

28.7.20

75% of cardholders prefer contactless cards to other payment methods

Security

Net-security

27.7.20

Cerberus Android malware source code offered for sale for $100,000

Android

Bleepingcomputer

27.7.20

Source code from dozens of companies leaked online

Incindent

Bleepingcomputer

27.7.20

No More Ransom turns 4: Saves $632 million in ransomware payments

Ransomware

Bleepingcomputer

27.7.20

Dave data breach affects 7.5 million users, leaked on hacker forum

Incindent

Bleepingcomputer

27.7.20

Microsoft's PowerToys 0.20 adds a built-in Windows 10 Color Picker

OS

Bleepingcomputer

27.7.20

Samsung is reportedly building an Exynos CPU for Windows 10 PCs

IT

Bleepingcomputer

27.7.20

FBI Issues Alert on Use of Chinese Tax Software

BigBrothers

Securityweek

27.7.20

Australian Watchdog Accuses Google of Privacy Breaches

BigBrothers

Securityweek

27.7.20

CISA Says Hackers Exploited BIG-IP Vulnerability in Attacks on U.S. Government

BigBrothers

Securityweek

27.7.20

Microsoft Adds Scenario-Based Rewards to Windows Insider Preview Bounty Program

OS

Securityweek

27.7.20

Attackers are exploiting Cisco ASA/FTD flaw in search for sensitive data

Exploit

Net-security

27.7.20

NSA/CISA joint report warns on attacks on critical industrial systems

ICS

Securityaffairs

27.7.20

Shadow attacks allow replacing content in signed PDF files

Attack

Securityaffairs

27.7.20

REMnux 7, a Linux toolkit for malware analysts released

Security

Securityaffairs

27.7.20

Records for 7.5 million users of the digital banking app Dave leaked online

Incindent

Securityaffairs

27.7.20

Analyzing Metasploit ASP .NET Payloads

Exploit

SANS

27.7.20

It’s time to tap the next generation of cyber defenders

Cyber

Net-security

27.7.20

Attackers have created a specialized economy around email account takeover

Attack

Net-security

27.7.20

DeimosC2: Open source tool to manage post-exploitation issues

Exploit

Net-security

27.7.20

Integrated cloud-native security platforms can overcome limitations of traditional security products

Security

Net-security

27.7.20

Data crisis: Companies pivot from disruption to transformation

Security

Net-security

26.7.20

Evolution of Valak, from Its Beginnings to Mass DistributionMalware blog

Palo Alto Unity42

26.7.20

OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its InventoryAPT blog

Palo Alto Unity42

26.7.20Threat Brief: Microsoft DNS Server Wormable Vulnerability CVE-2020-1350Vulnerebility blogPalo Alto Unity42

26.7.20

WHAT IS A VPN, AND HOW CAN IT HELP ENTERPRISES WITH REMOTE WORKERS?Security blog

Cybereason

26.7.20ENSURING DATA PRIVACY: UPDATE ON EU COURT OF JUSTICE RULINGSecurity blog

Cybereason

26.7.20NEED A BOOST? STRETCH YOUR SKILLS WITH THE CYBEREASON SUMMER CTF!Security blogCybereason

26.7.20

Hunting for Blues – the WSL Plan 9 Protocol BSODSecurity blog

Mcafee blog

26.7.20McAfee COVID-19 Report Reveals Pandemic Threat EvolutionCyber blog

Mcafee blog

26.7.20Unique Threats to Operational Technology and Cyber Physical SystemsCyber blogFireEye

26.7.20

Making the Most of a Security IncidentIncident blogF5 Labs
26.7.20Steering a Cyber-Course Through Covid-19’s Troubled WatersCyber blogF5 Labs

26.7.20

CYBER ATTACK TRENDS: 2020 MID-YEAR REPORTAttack blogCheckpoint
26.7.20MMS Exploit Part 2: Effective Fuzzing of the Qmage CodecExploit blogCheckpoint

26.7.20

Prometei botnet and its quest for MoneroBotNet blogCisco Talos
26.7.20Premier League team narrowly avoids losing £1 million to scammersSpam blog

Eset

26.7.20Google adds security enhancements to Gmail, Meet and ChatSecurity blog

Eset

26.7.20

Privacy watchdogs urge videoconferencing services to boost privacy protectionsSecurity blog

Eset

26.7.20Argentine telecom company hit by major ransomware attackRansomware blog

Eset

26.7.207 VPN services leaked data of over 20 million users, says reportIncident blog

Eset

26.7.20

Data breach reports down by one‑third in first half of 2020Incident blogEset

26.7.20

Cracking Maldoc VBA Project PasswordsVirusSANS
26.7.20ndisasm Update 2.15SecuritySANS

26.7.20

New ‘Meow’ attack has deleted almost 4,000 unsecured databasesAttack

Bleepingcomputer

26.7.20Linux-based malware analysis toolkit REMnux 7 releasedSecurity

Bleepingcomputer

26.7.20Microsoft Edge now blocks abusive notifications to reduce web spamOS

Bleepingcomputer

26.7.20

US govt confirms active exploitation of F5 BIG-IP RCE flawExploit

Bleepingcomputer

26.7.20Microsoft working on a fix for Windows 10 Sandbox failing to openOS

Bleepingcomputer

26.7.20Garmin outage caused by confirmed WastedLocker ransomware attackRansomware

Bleepingcomputer

26.7.20

Emotet malware operation hacked to show memes to victimsVirus

Bleepingcomputer

26.7.20Cisco patches ASA/FTD firewall flaw actively exploited by hackersVulnerebility

Bleepingcomputer

26.7.205 severe D-Link router vulnerabilities disclosed, patch nowVulnerebility

Bleepingcomputer

26.7.20UK govt warns of ransomware, BEC attacks against sports sectorRansomware

Bleepingcomputer

26.7.20How to stop Microsoft Edge launching automatically on loginOS

Bleepingcomputer

26.7.20

D-Link addressed 5 flaws on some router models, some of them reached EoL

Vulnerebility

Securityaffairs

26.7.20

US CISA warns of attacks exploiting CVE-2020-5902 flaw in F5 BIG-IP

Attack  Exploit

Securityaffairs
26.7.20

Threat actors are hijacking the infamous Emotet botnet

BotNet  Virus

Securityaffairs

25.7.20

AA20-206A : Threat Actor Exploitation of F5 BIG-IP CVE-2020-5902CERTCERT

25.7.20

Malicious ‘Blur’ Photo App Campaign Discovered on Google Play

Android

Threatpost

25.7.20

NSA Urgently Warns on Industrial Cyberattacks, Triconex Critical Bug

BigBrothers

Threatpost

25.7.20

DJI Drone App Riddled With Privacy Issues, Researchers Allege

Vulnerebility

Threatpost

25.7.20

News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags

Security

Threatpost

25.7.20

Quantum Loop: US Unveils Blueprint for 'Virtually Unhackable' Internet

Security

Securityweek

25.7.20

Garmin Outage Raises Fear of Ransomware Attack

Ransomware

Securityweek

25.7.20

AI Cybersecurity Company CalypsoAI Raises $13 Million

IT

Securityweek

25.7.20

Twitter Says Hackers Accessed Dutch Politician's Inbox

Social

Securityweek
25.7.20

NSA, CISA Urge Critical Infrastructure Operators to Secure OT Assets

BigBrothers

Securityweek

24.7.20

CVE-2020-3452 flaw in Cisco ASA/FTD exploited within hours after the disclosureExploitSecurityaffairs

24.7.20

Spanish state-owned railway infrastructure manager ADIF infected with ransomwareRansomwareSecurityaffairs
24.7.20Twitter revealed that hackers accessed DM Inboxes in July attackSocial

Securityaffairs

24.7.20Chinese Drone Giant DJI Responds to Disclosure of Android App Security IssuesAndroid

Securityweek

24.7.20Website Security Breach Exposes 1 Million DNA ProfilesIncindentSecurityweek
24.7.20Vulnerability in Cisco Firewalls Exploited Shortly After DisclosureVulnerebilitySecurityweek
24.7.20Exposed Twilio SDK Abused for Malvertising AttackAttackSecurityweek

24.7.20

Researchers Reveal New Security Flaw Affecting China's DJI DronesVulnerebilityThehackernews

24.7.20

Smartwatch Maker Garmin Shuts Down Services After Ransomware AttackRansomwareThehackernews

24.7.20

ASUS Home Router Bugs Open Consumers to Snooping Attacks

Attack

Threatpost

24.7.20

Garmin Suffers Reported Ransomware Attack

Ransomware

Threatpost

24.7.20

Cisco, Zoom and Others Must Bolster Security, Say Privacy Chiefs

Privacy

Threatpost

24.7.20

Sharp Spike in Ransomware in U.S. as Pandemic Inspires Attackers

Ransomware

Threatpost

24.7.20

Cisco Network Security Flaw Leaks Sensitive Data

Vulnerebility

Threatpost

24.7.20

Twitter: Hackers Accessed Private Messages for Elite Accounts

Social

Threatpost

24.7.20

Garmin shut down its services after an alleged ransomware attack

Ransomware

Securityaffairs

24.7.20

PoC Released for Critical CVE-2020-1147 flaw, SharePoint servers exposed to hack

Vulnerebility

Securityaffairs

24.7.20

Exposed Twilio SDK Abused for Malvertising Attack

Attack

Securityweek

24.7.20

Risk Assessment Company CyCognito Raises $30 Million

IT

Securityweek

24.7.20

Apple Offers Hackable iPhones to Security Researchers

Apple

Securityweek

24.7.20

Facebook Unveils New Privacy, Security Features for Messenger

Social

Securityweek

24.7.20AA20-205A : NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control SystemsCERTCERT
24.7.20

Compromized Desktop Applications by Web Technologies

Security

SANS

24.7.20

Ransomware recovery: Moving forward without backing up

Ransomware

Net-security

24.7.20

Threat highlight: Analysis of 5+ million unmanaged, IoT, and IoMT devices

IoT

Net-security

24.7.20

The future of work: 74% believe they will emerge stronger

Security

Net-security

24.7.20

27% of consumers hit with pandemic-themed phishing scams

Phishing

Net-security

24.7.20

IT teams failing to deliver a positive remote employee experience

Security

Net-security

23.7.20

Remove unwanted Windows 10 apps with this new open source toolOS

Bleepingcomputer

23.7.20

Twitter hackers read private messages of 36 high-profile accountsSocial

Bleepingcomputer

23.7.20

New cryptojacking botnet uses SMB exploit to spread to Windows systemsCryptocurrency

Bleepingcomputer

23.7.20

Twilio exposes SDK, attackers inject it with malvertising codeVirus

Bleepingcomputer

23.7.20

Lazarus hackers deploy ransomware, steal data using MATA malwareAPT

Bleepingcomputer

23.7.20

Microsoft Outlook crashes, deletes mails for some POP accountsOS

Bleepingcomputer

23.7.20

D-Link blunder: Firmware encryption key exposed in unencrypted imageCrypto

Bleepingcomputer

23.7.20

Critical SharePoint flaw dissected, RCE details now availableVulnerebility

Bleepingcomputer

23.7.20

US offers $2 million for info on Ukrainians charged for SEC hackCrime

Bleepingcomputer

23.7.20

New ‘Meow’ attack has wiped over 1,800 unsecured databasesAttack

Bleepingcomputer

23.7.20

Windows 10 KB4559004 cumulative update fixes File Explorer, LTE issuesOS

Bleepingcomputer

23.7.20

Microsoft 365 adds endpoint data leak protection in public previewOS

Bleepingcomputer

23.7.20

Microsoft Edge gets new features on desktop and mobileOS

Bleepingcomputer

23.7.20

Emotet botnet is now heavily spreading QakBot malwareVirus

Bleepingcomputer

23.7.20

Malwarebytes fixes bug causing Windows 10 2004 performance issuesOS

Bleepingcomputer

23.7.20

US indicts hackers working with China's Ministry of State SecurityBigBrothers

Bleepingcomputer

23.7.20

Outlook affected by one-minute startup delays on Windows 10OS

Bleepingcomputer

23.7.20

DeepSource resets logins after employee falls for Sawfish phishingPhishing

Bleepingcomputer

23.7.20

Adobe Photoshop gets fixes for critical security vulnerabilitiesVulnerebility

Bleepingcomputer

23.7.20

Phishing campaign uses Google Cloud Services to steal Office 365 loginsPhishing

Bleepingcomputer

23.7.20

Lorien Health Services discloses ransomware attack affecting nearly 50,000Ransomware

Bleepingcomputer

23.7.20

Microsoft will disable insecure TLS in Office 365 on Oct 15OS

Bleepingcomputer

23.7.20

Emotet-TrickBot malware duo is back infecting Windows machinesVirus

Bleepingcomputer

23.7.20

Coinbase blocked Twitter hackers from stealing an extra $280KSocial

Bleepingcomputer

23.7.20

Office 365 adds new security configuration analysis featureOS

Bleepingcomputer

23.7.20

Microsoft investigating Windows 10 2004 'No Internet' bug, how to fixOS

Bleepingcomputer

23.7.20

Windows 10 Store 'wsreset' tool lets attackers bypass antivirusOSBleepingcomputer

23.7.20

Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into SDK

Exploit

Net-security

23.7.20

New MATA Multi-platform malware framework linked to NK Lazarus APTAPT

Securityaffairs

23.7.20

Multi-Platform Malware Framework Linked to North Korean HackersAPT

Securityweek

23.7.20

Researchers Disclose New Methods for Replacing Content in Signed PDF FilesVirus

Securityweek

23.7.20

Twitter Says Hackers Accessed DM Inboxes in Recent AttackSocial

Securityweek

23.7.20

Regulators Urge Video Conferencing Companies to Improve Security, PrivacyPrivacy

Securityweek

23.7.20

North Korean Hackers Spotted Using New Multi-Platform Malware FrameworkAPTThehackernews

23.7.20

Leak Exposes Private Data of Genealogy Service Users

Incindent

Threatpost

23.7.20

Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware

Virus

Threatpost

23.7.20

Lazarus Group Surfaces with Advanced Malware Framework

APT

Threatpost

23.7.20

OilRig APT Drills into Malware Innovation with Unique Backdoor

APT

Threatpost

23.7.20

Apple Security Research Device Program Draws Mixed Reactions

Apple

Threatpost

23.7.20

Prometei, a new modular crypto-mining botnet exploits Windows SMB

Cryptocurrency

Securityaffairs

23.7.20

US agencies offer $2M in reward for Ukrainian hackers that breached the SEC

BigBrothers

Securityaffairs

23.7.20

Dozens of unsecured databases wiped by mysterious Meow attack

Attack

Securityaffairs

23.7.20

Open Source Tool Checks SAP Systems for RECON Attack IOCs

Attack

Securityweek

23.7.20

PoC Released for Critical Vulnerability Exposing SharePoint Servers to Attacks

Vulnerebility

Securityweek

23.7.20

US Offers $2mn Bounty for Ukrainian SEC Hackers

Crime

Securityweek

23.7.20

Chinese Threat Actor Uses New MgBot Variant in Attacks on India, Hong Kong

BotNet

Securityweek

23.7.20

Polymer Launches Solution to Avoid Data Leaks via Collaboration Tools

Incindent

Securityweek

23.7.20

Simple Blacklisting with MISP & pfSense

Safety

SANS

23.7.20

REMnux toolkit for malware analysis version 7 released

Virus

Net-security

23.7.20

How do cybercriminals secure cybercrime?

Cyber

Net-security

23.7.20

Closing the skills gap can minimize the business impact of cyberattacks

Cyber

Net-security

23.7.20

Organizations with poor privacy practices 80% more likely to suffer data breach

Incindent

Net-security

23.7.20

Human error: Understand the mistakes that weaken cybersecurity

Cyber

Net-security

23.7.20

Deep Packet Inspection challenges for telecom and security vendors

Security

Net-security

23.7.20

There’s CISSP training, then there’s official CISSP training

Security

Net-security

22.7.20

MATA: Multi-platform targeted malware framework

APT

Securelist
22.7.20Citrix Workspace flaw can allow remote hack of devices running vulnerable appVulnerebilitySecurityaffairs

22.7.20

US DoJ charged two Chinese hackers working with MSS

BigBrothers

Securityaffairs

22.7.20

French Trial Sought for Alleged Russian Bitcoin Criminal

BigBrothers

Securityweek

22.7.20

China Accuses US of 'Slander' Over Coronavirus Research Hacking Claims

BigBrothers

Securityweek

22.7.20

DeepSource Says Hackers Compromised Its GitHub Application

Hacking

Securityweek

22.7.20

Vulnerability Allows Remote Hacking of Devices Running Citrix Workspace App

Vulnerebility

Securityweek

22.7.20

US Charges 2 Chinese Hackers for Targeting COVID-19 Research and Trade Secrets

BigBrothers

Thehackernews

22.7.20

Microsoft releases new encryption, data security enterprise tools

Crypto

Net-security

22.7.20

Chris Vickery: AI Will Drive Tomorrow’s Data Breaches

Incindent

Threatpost

22.7.20

Diebold ATM Terminals Jackpotted Using Machine’s Own Software

Virus

Threatpost

22.7.20

Critical Adobe Photoshop Flaws Patched in Emergency Update

Vulnerebility

Threatpost

22.7.20

Adobe fixed critical code execution flaws in Bridge, Photoshop and Prelude products

Vulnerebility

Securityaffairs

22.7.20

US DoJ charges Chinese hackers for targeting COVID-19 research

BigBrothers

Securityaffairs

22.7.20

U.S. Indicts Two Chinese Nationals for Hacking Hundreds of Organizations

BigBrothers

Securityweek

22.7.20

US Accuses Chinese Hackers in Targeting of COVID-19 Research

BigBrothers

Securityweek

22.7.20

Adobe Patches Critical Code Execution Flaws in Bridge, Photoshop, Prelude

Vulnerebility

Securityweek

22.7.20

New Security Capabilities Announced for Microsoft 365, Azure

Security

Securityweek

22.7.20

Chinese Hackers Escalate Attacks Against India and Hong Kong Amid Tensions

BigBrothers

Thehackernews

22.7.20

A few IoCs related to CVE-2020-5092

Vulnerebility

SANS

22.7.20

How do I select a DMARC solution for my business?

Spam

Net-security

22.7.20

Cybersecurity teams are struggling with a lack of visibility into key security controls

Cyber

Net-security

22.7.20

Researchers develop new learning algorithm to boost AI efficiency

Security

Net-security

22.7.20

20,000+ new vulnerability reports predicted for 2020, shattering previous records

Vulnerebility

Net-security

22.7.20

Emerging risk trends: Top risks to identify and address

Security

Net-security

21.7.20

Couple of interesting Covid-19 related stats

Security

SANS

21.7.20

Details and PoC for critical SharePoint RCE flaw released

Vulnerebility

Net-security

21.7.20

GReAT thoughts: Awesome IDA Pro pluginsVirusSecurelist

21.7.20

Phishing campaign aimed at stealing Office 365 logins abuses Google Cloud ServicesPhishingSecurityaffairs

21.7.20

7 VPN services left data of millions of users exposed onlineIncindentSecurityaffairs

21.7.20

Cloud computing provider Blackbaud paid a ransom after data breachIncindentSecurityaffairs

21.7.20

BadPower attack could burn your device through fast chargingAttackSecurityaffairs

21.7.20

Microsoft to Retire TLS 1.0/1.1 in Office 365 Starting October 15Crypto

Securityweek

21.7.20

Fortinet Acquires SASE Cloud Provider OPAQ NetworksITSecurityweek

21.7.20

Democrats 'Gravely Concerned' Over Foreign Interference in US VoteBigBrothers

Securityweek

21.7.20

Vulnerable Cellular Routers Targeted in Latest Attacks on Israel Water FacilitiesBigBrothersSecurityweek

21.7.20

Emotet Resumes Activity After Five Months of SilenceVirus

Securityweek

21.7.20

Mac Cryptocurrency Traders Targeted by Trojanized Apps

Cryptocurrency

Threatpost

21.7.20

Facebook’s NSO Group Lawsuit Over WhatsApp Spying Set to Proceed

Social

Threatpost

21.7.20

REVil ransomware infected 18,000 computers at Telecom Argentina

Ransomware

Securityaffairs

21.7.20

Two more cyber attacks hit Israel’s water facilities in June

Attack

Securityaffairs

21.7.20

Yaniv Vardi Appointed CEO of Industrial Cybersecurity Firm Claroty

ICS

Securityweek

21.7.20

Alleged Ripoff Report Hacker Extradited to United States

Crime

Securityweek

21.7.20

Cloud Company Blackbaud Pays Ransomware Operators to Avoid Data Leak

Ransomware

Securityweek

21.7.20

Sextortion Update: The Final Final Chapter

Security

SANS

21.7.20

In addition to traditional DDoS attacks, researchers see various abnormal traffic patterns

Attack

Net-security

21.7.20

Internet security is improving, but exposures still run rampant

Security

Net-security

21.7.20

Digital privacy: A double-edged sword

Privacy

Net-security

21.7.20

Everyone’s talking about microservices, who’s actually doing it?

Security

Net-security

21.7.20

Digital transformation: Affected and accelerated by COVID-19

Security

Net-security

21.7.20

BadPower: Fast chargers can be modified to damage mobile devices

Mobil

Net-security

21.7.20

Infosec is a mindset as well as a job, but burnout can happen to anyone

Security

Net-security

20.7.20

21-Year-Old Cypriot Hacker Extradited to U.S. Over Fraud and Extortion ChargesCrimeThehackernews

20.7.20

Critical SIGred Windows DNS bug gets micropatch after PoCs releasedVulnerebility

Bleepingcomputer

20.7.20

How to use Windows 10 File History to make secure backupsOS

Bleepingcomputer

20.7.20

Microsoft Edge 84 introduces Storage Access API to improve privacyOS

Bleepingcomputer

20.7.20

Windows 10 2004: List of compatibility issues blocking updatesOS

Bleepingcomputer

20.7.20

New phishing campaign abuses a trio of enterprise cloud servicesPhishingBleepingcomputer

20.7.20

Tedrade banking malware families target users worldwideVirusSecurityaffairs

20.7.20

UK 'Confident' Moscow Helped Hackers Target Virus VaccineBigBrothers

Securityweek

20.7.20

Ransomware Functionality Removed From ThiefQuest Mac MalwareRansomwareSecurityweek

20.7.20

Hackers Accessed, Downloaded Twitter User Data in Recent AttackAttack  Social

Securityweek

20.7.20

More Fake Cryptocurrency Apps Deliver GMERA Malware to Mac UsersCryptocurrencySecurityweek

20.7.20

Germany's Top Court Reins in State Access to Online DataBigBrothers

Securityweek

20.7.20

Twitter Attack Was Work of Young Hacker Pals: NYTSocialSecurityweek

20.7.20

A flaw in Zoom’s Vanity URL feature could have been exploited in phishing attacks

Vulnerebility

Securityaffairs

20.7.20

Ghost Squad Hackers defaced a second European Space Agency (ESA) site in a week

BigBrothers

Securityaffairs

20.7.20

Twitter reveals that hackers also downloaded data from eight compromised accounts

Social

Securityaffairs

20.7.20

Diebold Nixdorf warns of a wave of ATM black box attacks across Europe

Attack

Securityaffairs

20.7.20

Scanning Activity for ZeroShell Unauthenticated Access

Virus

SANS

20.7.20

People work more while at home, but worry about data security

Security

Net-security

20.7.20

Healthcare technology goals and CIO challenges

Security

Net-security

20.7.20

Cloud services help adapt and respond to COVID-19 challenges

Security

Net-security

20.7.20

Overconfident about their security, businesses are falling victims to bot attacks

Attack

Net-security

19.7.20

Introducing the Cryptonice HTTPS Scanner

Security blog

F5 Labs

19.7.20

How Credential Stuffing Is Evolving

Security blog

F5 Labs

19.7.20

What APIs Are and Why They Matter

Security blog

F5 Labs

19.7.20

The Five Cybersecurity Practices Every Organization Should Adopt

Cyber blog

F5 Labs

19.7.20

Cybersecurity Myths That Are Harming Your Business

Cyber blog

F5 Labs

19.7.20

Technical Controls for a Secure Open Banking Initiative

Security blog

F5 Labs

19.7.20

How to Guard Against Identity Theft in Times of Increasing Online Fraud

Security blog

F5 Labs

19.7.20

Coronavirus, Data Privacy & the New Online Social Contract

Cyber blog

F5 Labs

19.7.20

Getting Audited for DoD CMMC

Security blog

F5 Labs

19.7.20

Qbot Banking Trojan Still Up to Its Old Tricks

Malware blog

F5 Labs

19.7.20

Will gRPC Be the Next Protocol to Slip by Your Defenses?

Security blog

F5 Labs

19.7.20

Windows Server Containers Are Open, and Here’s How You Can Break Out

Security blog

Palo Alto Unity42

19.7.20

3 Vulnerabilities Found on AvertX IP Cameras

Vulnerebility blog

Palo Alto Unity42

19.7.20

CERTIFIED BUSINESS SECURITY!

Security blog

Cybereason

19.7.20

A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES

Malware blog

Cybereason

19.7.20

Ripple20 Vulnerability Mitigation Best Practices

Vulnerebility blog

Mcafee blog

19.7.20

My Adventures Hacking the iParcelBox

Hacking blog

Mcafee blog

19.7.20

What’s in the Box? Part II: Hacking the iParcelBox

Hacking blog

Mcafee blog

19.7.20

RagnarLocker Ransomware Threatens to Release Confidential Information

Ransomware blog

Mcafee blog

19.7.20

OneDrive Phishing Awareness

Phishing blog

Mcafee blog

19.7.20

MMS Exploit Part 1: Introduction to the Samsung Qmage Codec and Remote Attack Surface

Exploit blog

Project Zero

19.7.20

What to expect when you’re electing: Talos’ 2020 election security primerBigBrother blog

Cisco Talos

19.7.20

Vulnerability Spotlight: Multiple vulnerabilities in RemoteFX affects, AMD, Intel chipsVulnerebility blog

Cisco Talos

19.7.20

Ransom NewsRansomRansom

19.7.20

Zone.Identifier: A Coupe Of Observations

Security

SANS

19.7.20

Emotet botnet surges back after months of absence

Virus

Securityaffairs

19.7.20

Experts warn of massive internet scans for SAP systems affected by RECON Vulnerability

Vulnerebility

Securityaffairs

18.7.20

Cloudflare outage takes down Discord, BleepingComputer, and other sitesSecurity

Bleepingcomputer

18.7.20

Twitter: Hackers targeted 130 accounts, no passwords accessedSocial

Bleepingcomputer

18.7.20

Emotet spam trojan surges back to life after 5 months of silenceVirus

Bleepingcomputer

18.7.20

Magento adds 2FA to protect against card skimming attacksAttack

Bleepingcomputer

18.7.20

Microsoft releases open-source Linux version of Procmon toolOS

Bleepingcomputer

18.7.20

Twitter starts rolling out new LinkedIn-style DMs interfaceSocial

Bleepingcomputer

18.7.20

Microsoft fixes Windows 10 2004 boot fails caused by Disk CleanupOS

Bleepingcomputer

18.7.20

Federal agencies told to patch wormable Windows DNS bug in 24 hoursVulnerebility

Bleepingcomputer

18.7.20

T-Mobile announces free Scam Shield robocall and scam protectionSpam

Bleepingcomputer

18.7.20

Orange confirms ransomware attack exposing business customers' dataRansomware

Bleepingcomputer

18.7.20

New Android malware steals your dating and social accountsAndroid

Bleepingcomputer

18.7.20

Russian hackers target COVID-19 vaccine research with custom malwareBigBrothers

Bleepingcomputer

18.7.20

Scammers hacked Twitter and hijacked accounts using admin toolSocial

Bleepingcomputer

18.7.20

PoC exploits released for SAP Recon vulnerabilities, patch now!Exploit

Bleepingcomputer

18.7.20

CISA Emergency Directive Orders Immediate Fix of Windows DNS Server Bug

Vulnerebility

Threatpost

18.7.20

Twitter Hack Update: What We Know (and What We Don’t)

Social

Threatpost

18.7.20

Thousands of Vulnerable F5 BIG-IP Users Still Open to Takeover

Vulnerebility

Threatpost

18.7.20

Orange Business Services hit by Nefilim ransomware operators

Ransomware

Securityaffairs

18.7.20

U.S. Government Agencies Instructed to Patch Wormable Windows Server Flaw

BigBrothers

Securityweek

17.7.20

Operation In(ter)ceptionOperationOperation

17.7.20

Iran-linked APT35 accidentally exposed 40 GB associated with their operationsAPTSecurityaffairs

17.7.20

Introducing the PhishingKitTrackerPhishingSecurityaffairs

17.7.20

DHS CISA urges government agencies to fix SIGRed Windows Server DNS bug within 24hBigBrothersSecurityaffairs

17.7.20

ExpressVPN Announces Bug Bounty Program on BugcrowdVulnerebility

Securityweek

17.7.20

Apple Patches Multiple Code Execution Flaws in Audio ComponentsAppleSecurityweek

17.7.20

Industry Reactions to Twitter Hack: Feedback FridaySocial

Securityweek

17.7.20

Internet Scanned for SAP Systems Affected by RECON VulnerabilityVulnerebilitySecurityweek

17.7.20

Twitter Says Hackers Targeted 130 Accounts in Recent AttackAttack  Social

Securityweek

17.7.20

Kremlin Denies UK Claims of Vote Meddling, Vaccine HackingBigBrothersSecurityweek

17.7.20

Zoom's Vanity URLs Could Have Been Abused for Phishing AttacksPhishingSecurityweek

17.7.20

Iranian Hackers Accidentally Exposed Their Training Videos (40 GB) OnlineBigBrothersThehackernews

17.7.20

Biomedical orgs working on COVID-19 vaccines open to cyber attacks

BigBrothers

Net-security

17.7.20

A look at modern adversary behavior and the usage of open source tools in the enterprise

SecurityNet-security

17.7.20

AA20-198A : Malicious Cyber Actor Use of Network Tunneling and Spoofing to Obfuscate GeolocationCERTCERT

17.7.20

Threat Actors Introduce Unique ‘Newbie’ Hacker Forum

Hacking

Threatpost

17.7.20

Zoom Addresses Vanity URL Zero-Day

Vulnerebility

Threatpost

17.7.20

Amazon-Themed Phishing Campaigns Swim Past Security Checks

Phishing

Threatpost

17.7.20

Hackers Look to Steal COVID-19 Vaccine Research

BigBrothers

Threatpost

17.7.20

LokiBot Redux Attacks Massive List of Common Android Apps

Android

Threatpost

17.7.20

New Android BlackRock malware targets hundreds of apps

Android

Securityaffairs

17.7.20

Group-IB helps to detain fraudsters that used cloned SIM cards to steal money from banks’ VIP customers

Hacking

Securityaffairs

17.7.20

UK, US, Canada Accuse Russia of Hacking Virus Vaccine Trials

BigBrothers

Securityweek

17.7.20

Iran-Linked Hackers Accidentally Exposed 40 GB of Their Files

APT

Securityweek

17.7.20

Hunting for SigRed Exploitation

Exploit

SANS

17.7.20

Cisco patches critical flaws in VPN routers and firewalls

Vulnerebility

Net-security

17.7.20

New wave of attacks aiming to rope home routers into IoT botnets

IoT

Net-security

17.7.20

Most global brands fail to implement security controls to prevent data leakage and theft

Security

Net-security

17.7.20

The effectiveness of using DNS as a foundational element in future network security best practices

Security

Net-security

17.7.20

Tech sector job interviews test performance anxiety rather than competence at coding

Security

Net-security

17.7.20

Cybersecurity concerns front and center as online voting expected to shape future elections

Cyber

Net-security

17.7.20

High-profile Twitter accounts hijacked to push Bitcoin scam. How did it happen?

Social

Net-security

16.7.20

The Streaming Wars: A Cybercriminal’s PerspectiveCyberCrimeSecurelist

16.7.20

UK NCSC blames Russia-linked APT29 for attacks on COVID-19 vaccine researchAPT  BigBrothersSecurityaffairs

16.7.20

Cisco fixes 5 critical flaws that could allow router firewall takeoverVulnerebilitySecurityaffairs

16.7.20

Several High-Profile Twitter accounts hacked in a Bitcoin scamHackingSecurityaffairs

16.7.20

Critical Vulnerabilities Can Be Exploited to Hack Cisco Small Business RoutersVulnerebility

Securityweek

16.7.20

UK Says Russian Hackers Trying to Steal Virus Vaccine ResearchBigBrothersSecurityweek

16.7.20

Google Cloud Unveils New Service for Government WorkloadsBigBrothersSecurityweek

16.7.20

Top Court Scraps EU-US Data Pact in New Blow to BrusselsBigBrothers

Securityweek

16.7.20

Experts Say Twitter Breach Troubling, Undermines TrustIncindent  SocialSecurityweek

16.7.20

Seven Ransomware Families Target Industrial SoftwareRansomwareSecurityweek

16.7.20

Data Governance and Security Provider Privacera Raises $13.5 MillionIT

Securityweek

16.7.20

Hackers Used Internal Twitter Tools to Hijack High-Profile AccountsSocialSecurityweek

16.7.20

More Countries Waking up to Huawei Threats, US SayBigBrothersSecurityweek

16.7.20

Why Can Application Security Be Considered A Enabler For Business?SecurityThehackernews

16.7.20

New Android Malware Now Steals Passwords For Non-Banking Apps TooAndroidThehackernews

16.7.20

A New Flaw In Zoom Could Have Let Fraudsters Mimic OrganisationsVulnerebilityThehackernews

16.7.20

Apple, Kanye, Gates, Bezos, more hacked in Twitter account crypto scam

Social

Bleepingcomputer

16.7.20

Citrix: No breach, hacker stole business info from third party

Vulnerebility

Bleepingcomputer

16.7.20

Cisco fixes critical pre-auth flaws allowing router takeover

Vulnerebility

Bleepingcomputer

16.7.20

Microsoft Outlook is crashing worldwide with 0xc0000005 errors, how to fix

OS

Bleepingcomputer

16.7.20

Microsoft removes Windows 10 2004 Thunderbolt dock update block

OS

Bleepingcomputer

16.7.20

Google Chrome ends Windows 10 memory optimization test after CPU hit

Security

Bleepingcomputer

16.7.20

Microsoft Office July security updates patch critical RCE bugs

OS

Bleepingcomputer

16.7.20

WhatsApp is down, users reporting worldwide outage

Social

Bleepingcomputer

16.7.20

Microsoft fixes Windows 10 issue causing reboots, LSASS crashes

OS

Bleepingcomputer

16.7.20

Chrome 84 released with important security enhancements

Security

Bleepingcomputer

16.7.20

Windows 10 2004 servicing stack update fixes privilege escalation bug

OS

Bleepingcomputer

16.7.20

Microsoft July 2020 Patch Tuesday: 123 vulnerabilities, 18 Critical!

OS

Bleepingcomputer

16.7.20

Microsoft patches critical wormable SigRed bug in Windows DNS Server

OS

Bleepingcomputer

16.7.20

Windows 10 Cumulative Updates KB4565503 & KB4565483 Released

OS

Bleepingcomputer

16.7.20

Wattpad data breach exposes account info for millions of users

Incindent

Bleepingcomputer

16.7.20

Adobe fixes critical bugs in Creative Cloud, Media Encoder

Vulnerebility

Bleepingcomputer

16.7.20

New GoldenHelper malware found in official Chinese tax software

Virus

Bleepingcomputer

16.7.20

Android chat app uses public code to spy, exposes user data

Android

Bleepingcomputer

16.7.20

Critical SAP Recon flaw exposes thousands of customers to attacks

Vulnerebility

Bleepingcomputer

16.7.20

New AgeLocker Ransomware uses Googler's utility to encrypt files

Ransomware

Bleepingcomputer

16.7.20

LiveAuctioneers reports data breach after user records sold online

Incindent

Bleepingcomputer

16.7.20

Microsoft extends security for Azure Storage file shares, data lakes

OS

Bleepingcomputer

16.7.20

Microsoft Office 365 will add support for disposable emails

OS

Bleepingcomputer

16.7.20

Windows 10's Feedback Hub: A forum for political trolls, spammers

OS

Bleepingcomputer

16.7.20

Malware adds online sandbox detection to evade analysis

Virus

Bleepingcomputer

16.7.20

How to use Windows 10’s Storage Sense to free up Disk Space

OS

Bleepingcomputer

16.7.20

Brazil’s Banking Trojans Go Global

Virus

Threatpost

16.7.20

Twitter Confirms it was Hacked in an Unprecedented Cryptocurrency Scam

Cryptocurrency  Social

Threatpost

16.7.20

LokiBot Redux Attacks Massive List of Common Android Apps

Virus

Threatpost

16.7.20

CIA covert operations likely behind attacks against APT34 and FSB

APT  BigBrothers

Securityaffairs

16.7.20

New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data

Incindent

Securityaffairs

16.7.20

Industrial Cybersecurity Firm Claroty Releases Open Source Database Parser

ICS

Securityweek

16.7.20

Twitter Confirms 'Security Incident' Involving Hacked Accounts

Social

Securityweek

16.7.20

Twitter Accounts of Apple, Musk, Gates, Others Hit in Major Hack

Social

Securityweek

16.7.20

Several High-Profile Accounts Hacked in the Biggest Twitter Hack of All Time

Vulnerebility

Thehackernews

16.7.20

340 GDPR fines for a total of €158,135,806 issued since May 2018

Privacy

Net-security

16.7.20

How secure is your web browser?

Security

Net-security

16.7.20

20% of credential stuffing attacks target media companies

Attack

Net-security

16.7.20

New threat environment elements and global attack trends

Security

Net-security

16.7.20

Data professionals: Job security and shifting career priorities in the wake of the pandemic

Security

Net-security

15.7.20

GReAT Ideas follow-upVirus

Securelist

15.7.20

How to Extend Security Across Your Kubernetes InfrastructureSecuritySecurityaffairs

15.7.20

US applauds British ban on China’s Huawei for 5G networksBigBrothersSecurityaffairs

15.7.20

Exclusive, Ghost Squad Hackers defaced European Space Agency (ESA) siteBigBrothersSecurityaffairs

15.7.20

GoldenHelper, a new malware delivered via Chinese tax softwareVirusSecurityaffairs

15.7.20

Chrome 84 Brings 38 Security Patches, Resumes CSRF Protection RolloutVulnerebility

Securityweek

15.7.20

Citrix Says Data Sold on Dark Web Comes From Third PartyCyberCrimeSecurityweek

15.7.20

'Tetrade' Brazilian Banking Trojans Go InternationalVirus

Securityweek

15.7.20

Vulnerabilities Impact Multiple Rittal Products Due to Use of Same FirmwareVulnerebility

Securityweek

15.7.20

Cisco Investigating Report of Vulnerability Found in Counterfeit SwitchesVulnerebility

Securityweek

15.7.20

US Hails British Ban on China's HuaweiBigBrothersSecurityweek

15.7.20

Oracle's July 2020 CPU Includes 443 New PatchesVulnerebility

Securityweek

15.7.20

Catalan Leader Demands Investigation Into Spain Spying ClaimBigBrothers

Securityweek

15.7.20

Critical, Wormable Bug in Windows DNS Servers Could Allow Full Infrastructure CompromiseVulnerebilitySecurityweek

15.7.20

4 Dangerous Brazilian Banking Trojans Now Trying to Rob Users WorldwideVirusThehackernews

15.7.20

Investigation highlights the dangers of using counterfeit Cisco switches

Vulnerebility

Net-security

15.7.20

PATCH NOW - SIGRed - CVE-2020-1350 - Microsoft DNS Server Vulnerability

Vulnerebility

SANS

15.7.20

Critical SAP Bug Allows Full Enterprise System Takeover

Vulnerebility

Threatpost

15.7.20

Microsoft Tackles 123 Fixes for July Patch Tuesday

Vulnerebility

Threatpost

15.7.20

Adobe Discloses Critical Code-Execution Bugs in July Update

Vulnerebility

Threatpost

15.7.20

Critical DNS Bug Opens Windows Servers to Infrastructure Hijacking

Vulnerebility

Threatpost

15.7.20

DMARC Adoption Spikes, Higher Ed Remains Behind

Spam

Threatpost

15.7.20

Leaked Details of 142 Million MGM Hotel Guests Found for Sale on Dark Web

Incindent

Threatpost

15.7.20

The Tetrade: Brazilian banking malware goes global

Virus

Securelist

15.7.20

Microsoft July 2020 Security Updates address 123 vulnerabilities

Vulnerebility

Securityaffairs

15.7.20

Microsoft fixes critical wormable RCE SigRed in Windows DNS servers

Vulnerebility

Securityaffairs

15.7.20

Adobe fixes over a dozen flaws in Media Encoder, Download Manager

Vulnerebility

Securityaffairs

15.7.20

Critical, Wormable Bug in Windows DNS Servers Could Allow Full Infrastructure Compromise

Vulnerebility

Securityaffairs

15.7.20

SAP Releases 10 Security Notes on July 2020 Patch Day

Vulnerebility

Securityweek

15.7.20

Microsoft Patches 123 Vulnerabilities With July 2020 Security Updates

Vulnerebility

Securityweek

15.7.20

Researchers Find More Malware Delivered via Chinese Tax Software

Virus

Securityweek

15.7.20

Adobe Patches Critical Vulnerabilities in Media Encoder, Download Manager

Vulnerebility

Securityweek

15.7.20

17-Year-Old Critical 'Wormable' RCE Vulnerability Impacts Windows DNS Servers

Vulnerebility

Thehackernews

15.7.20

Adobe Issues July 2020 Critical Security Patches for Multiple Software

Vulnerebility

Thehackernews

15.7.20

Word docs with macros for IcedID (Bokbot)

Virus

SANS

15.7.20

Email impersonations becoming pervasive, preying on a distracted and dispersed workforce

Security

Net-security

15.7.20

Businesses express concerns around ethical risks for their AI initiatives

Security

Net-security

15.7.20

Is DNS a vital component of your security strategy?

Security

Net-security

15.7.20

2020: The year of increased attack sophistication

Attack

Net-security

15.7.20

July 2020 Patch Tuesday: Microsoft plugs wormable Windows DNS Server RCE flaw

Vulnerebility

Net-security

15.7.20

Critical flaw gives attackers control of vulnerable SAP business applications

Vulnerebility

Net-security

14.7.20

The Tetrade: Brazilian banking malware goes globalVirusSecurelist

14.7.20

3.4 Million user records from LiveAuctioneers hack available for saleITSecurityaffairs

14.7.20

NightLion hacker is selling details of 142 million MGM Resorts hotel guestsIncindentSecurityaffairs

14.7.20

Critical SAP Recon vulnerability exposes thousands of system to full take overVulnerebilitySecurityaffairs

14.7.20

UK to Exclude Huawei From Role in High-Speed Phone NetworkBigBrothers

Securityweek

14.7.20

Blockchain Security Startup Valid Network Raises $8 Million in Seed RoundCryptocurrencySecurityweek

14.7.20

Cloud Application Security Firm Traceable Emerges From Stealth ModeSafety

Securityweek

14.7.20

Google Cloud Unveils Confidential VMs Powered by AMD EPYC ProcessorsITSecurityweek

14.7.20

Top Trump Aide Warns of 'Strong Actions' on TikTok, Angering ChinaBigBrothers

Securityweek

14.7.20

'RECON' Vulnerability Exposes Thousands of SAP Systems to AttacksVulnerebilitySecurityweek

14.7.20

LiveAuctioneers Data Breach Impacts 3.4 Million UsersIncindentSecurityweek

14.7.20

The Enemy Within: How Insider Threats Are ChangingSecurity

Threatpost

14.7.20

A ‘New Age’ of Sophisticated Business Email Compromise is ComingSpam

Threatpost

14.7.20

Secret Service Creates Cyber Fraud Task ForcesBigBrothersThreatpost

14.7.20

Critical SAP Bug Allows Full Enterprise System TakeoverVulnerebilityThreatpost

14.7.20

TrickBot Sample Accidentally Warns Victims They’re InfectedVirusThreatpost

14.7.20

New Mirai variant includes exploit for a flaw in Comtrend RoutersBotNetSecurityaffairs

14.7.20

Trump admits to have authorized a cyber attack on Russian troll farm in 2018BigBrothersSecurityaffairs

14.7.20

Mozilla Joins Apple, Google in Reducing TLS Certificate LifespansCrypto

Securityweek

14.7.20

New Mirai Variant Targets Vulnerability in Comtrend RoutersBotNetSecurityweek

14.7.20

New Highly-Critical SAP Bug Could Let Attackers Take Over Corporate ServersVulnerebilityThehackernews

14.7.20

AA20-195A : Critical Vulnerability in SAP NetWeaver AS JavaCERTCERT

14.7.20

How do I select a network detection and response solution for my business?

Security

Net-security

14.7.20

Ransomware, then and now: The change in data theft behavior

Ransomware

Net-security

14.7.20

Researchers extract personal data from video conference screenshots

Hacking

Net-security

14.7.20

Remote working security challenges urge MFA implementation

Safety

Net-security

14.7.20

HITB Lockdown: Hands-on technical trainings coming next week!

Congress

Net-security

13.7.20

Personal details and SSNs of 40,000 US citizens available for saleIncindentSecurityaffairs

13.7.20

Malware campaign attempts to evade analysis with Any.Run sandboxVirusSecurityaffairs

13.7.20

Hacker claims to have breached Night Lion security firmIncindentSecurityaffairs

13.7.20

Israel Court Rejects Amnesty Petition Against Spyware Firm NSOBigBrothers

Securityweek

13.7.20

U.S. Secret Service Creates Cyber Fraud Task ForceBigBrothersSecurityweek

13.7.20

Russian Found Guilty of Hacking LinkedIn, Formspring, DropboxBigBrothers

Securityweek

13.7.20

Trump Confirms U.S. Launched Cyberattack on Russian Troll Farm in 2018BigBrothers

Securityweek

13.7.20

Amazon Says Email to Employees Banning TikTok Was a MistakeSpamSecurityweek

13.7.20

Backdoors Identified in Tens of C-Data Fiber Broadband DevicesVirus

Securityweek

13.7.20

POST-INCIDENT REVIEW AND THE BIG DATA PROBLEM

Incident blog

Cybereason

13.7.20

WHAT MODERN RANSOMWARE LOOKS LIKE

Ransomware blog

Cybereason

13.7.20

FAKESPY MASQUERADES AS POSTAL SERVICE APPS AROUND THE WORLD

Malware blog

Cybereason

13.7.20

RANSOMWARE: WEAPONS OF MASS DISRUPTION

Ransomware blog

Cybereason

13.7.20

HOW TO DESIGN A PREVENTION STACK TO STOP RANSOMWARE

Ransomware blog

Cybereason

13.7.20

NEXT-GENERATION ANTIVIRUS 101: LAYERS OF PREVENTION

Malware blog

Cybereason

13.7.20

308% ROI BY USING CYBEREASON, ACCORDING TO FORRESTER TOTAL ECONOMIC IMPACT STUDY

Cyber blog

Cybereason

13.7.20

UBU: CHAMPIONING DIVERSITY, EQUITY, AND INCLUSION AT CYBEREASON

Security blog

Cybereason

13.7.20

CYBEREASON’S NEWEST HONEYPOT SHOWS HOW MULTISTAGE RANSOMWARE ATTACKS SHOULD HAVE CRITICAL INFRASTRUCTURE PROVIDERS ON HIGH ALERT

Ransomware blog

Cybereason

13.7.20

HOW I MADE MY COMPANY’S OFFICE INTO A FANCY INTERNET CAFE AND WHY SHOULD YOU TOO

Cyber blog

Cybereason

13.7.20

WHAT ARE ADVERSARY EMULATION PLANS?

Security blog

Cybereason

13.7.20

WHY NOT DETECT EVERY TTP IN THE MITRE ATT&CK FRAMEWORK?

Hacking blog

Cybereason

13.7.20

VALAK: MORE THAN MEETS THE EYE

Malware blog

Cybereason

13.7.20

LOVE YOUR ENEMIES BEFORE YOU DESTROY THEM — HACKING FOR GOOD

Hacking blog

Cybereason

13.7.20

Records of 45 million+ travelers to Thailand and Malaysia surfaced in the darkweb

CyberCrime

Securityaffairs

13.7.20

Google updates policies to ban any ads for surveillance solutions and services

Security

Securityaffairs

13.7.20

Maldoc: VBA Purging Example

Spam

SANS

13.7.20

Cyberwarfare: The changing role of force

Cyber

Net-security

13.7.20

Security alerts more than doubled in the last 5 years, SecOps teams admit they can’t get to them all

Security

Net-security

12.7.20

Threat Assessment: EKANS Ransomware

Ransomware blog

Palo Alto Unity42

12.7.20

Attackers Cryptojacking Docker Images to Mine for Monero

Cryptocurrency blog

Palo Alto Unity42

12.7.20

Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices

Cryptocurrency blog

Palo Alto Unity42

12.7.20

An Overview of GPS Tracking and Future Application for IoT

IoT blog

Palo Alto Unity42

12.7.20

AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations

Malware blog

Palo Alto Unity42

12.7.20

Threat Assessment: Hangover Threat Group

Cyber blog

Palo Alto Unity42

12.7.20

6 New Vulnerabilities Found on D-Link Home Routers

Vulnerebility blog

Palo Alto Unity42

12.7.20

Goodbye Mworm, Hello Nworm: TrickBot Updates Propagation Module

Malware blog

Palo Alto Unity42

12.7.20

Rootless Containers: The Next Trend in Container Security

Security blog

Palo Alto Unity42

12.7.20

Vulnerability Spotlight: SQL injection vulnerability in Glacies IceHRM

Vulnerebility blogCisco Talos

12.7.20

New Snort rule addresses critical vulnerability in F5 BIG-IP

Vulnerebility blogCisco Talos

12.7.20

WastedLocker Goes "Big-Game Hunting" in 2020

Security blogCisco Talos

12.7.20

Vulnerability Spotlight: Google Chrome PDFium memory corruption vulnerability

Vulnerebility blogCisco Talos

12.7.20

Vulnerability Spotlight: Information disclosure vulnerability in Mozilla Firefox

Vulnerebility blogCisco Talos

12.7.20

Vulnerability Spotlight: Remote code execution vulnerabilities in LEADTOOLS 20

Vulnerebility blogCisco Talos

12.7.20

Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks

Malware blogCisco Talos

12.7.20

PROMETHIUM extends global reach with StrongPity3 APT

APT blogCisco Talos

12.7.20

Vulnerability Spotlight: Denial-of-service vulnerability in NVIDIA driver

Vulnerebility blogCisco Talos

12.7.20

Cisco Talos replacing all mentions of 'blacklist,' 'whitelist'

Security blogCisco Talos

12.7.20

IndigoDrop spreads via military-themed lures to deliver Cobalt Strike

BigBrother blogCisco Talos

12.7.20

Quarterly report: Incident Response trends in Summer 2020

Incident blogCisco Talos

12.7.20

Tor2Mine is up to their old tricks — and adds a few new ones

Cryptocurrency blogCisco Talos

12.7.20

Vulnerability Spotlight: Two code execution vulnerabilities in Microsoft Excel

Vulnerebility blogCisco Talos

12.7.20

Vulnerability Spotlight: Remote code execution vulnerability in Firefox’s SharedWorkerService function

Vulnerebility blogCisco Talos

12.7.20

Microsoft Patch Tuesday for June 2020 — Snort rules and prominent vulnerabilities

Vulnerebility blogCisco Talos

12.7.20

Vulnerability Spotlight: Multiple vulnerabilities in Siemens LOGO! PLC

Vulnerebility blogCisco Talos

12.7.20

Vulnerability Spotlight: Two vulnerabilities in Zoom could lead to code execution

Vulnerebility blogCisco Talos

12.7.20

Vulnerability Spotlight: VMware Workstation 15 denial-of-service vulnerability

Vulnerebility blogCisco Talos

12.7.20

How to unc0ver a 0-day in 4 hours or lessExploit blogProject Zero

12.7.20

FF Sandbox Escape (CVE-2020-12388)Exploit blogProject Zero

12.7.20

A survey of recent iOS kernel exploitsExploit blogProject Zero

12.7.20

VALAK: MORE THAN MEETS THE EYE

Malware blog

Cybereason

12.7.20

LOVE YOUR ENEMIES BEFORE YOU DESTROY THEM — HACKING FOR GOOD

Hacking blog

Cybereason

12.7.20

Turing in His Grave: What Human CAPTCHA Solvers Reveal About Control Design

Security blog

FireEye

12.7.20

As Healthcare Industry Transforms Overnight, Tech Community Must Act

Cyber blog

FireEye

12.7.20

Fraudulent Unemployment Claims Signal Consumers to Step Up Personal Identity Protection

Incident blog

FireEye

12.7.20

Bringing VandaTheGod down to Earth: Exposing the person behind a 7-year hacktivism campaign

Hacking blog

Checkpoint

12.7.20

Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta

Security blog

Cisco Talos

12.7.20

People know reusing passwords is risky – then do it anyway

Security blog

Eset

12.7.20

Critical Android flaw lets attackers hijack almost any app, steal data

OS Blog

Eset

12.7.20

Crooks threaten to leak customer data stolen from e‑commerce sites

Incident blog

Eset

12.7.20

From Agent.BTZ to ComRAT v4: A ten‑year journey

Malware blog

Eset

12.7.20

Two years later, has GDPR fulfilled its promise?

Security blog

Eset

12.7.20

Zoom fixes zero-day RCE bug affecting Windows 7, more updates soonVulnerebility

Bleepingcomputer

12.7.20

TrickBot malware mistakenly warns victims that they are infectedVirus

Bleepingcomputer

12.7.20

How to enable Windows 10's hidden features using Mach2OS

Bleepingcomputer

12.7.20

Apple: Closing MacBooks with camera covers leads to display damageApple

Bleepingcomputer

12.7.20

Microsoft will not support PHP 8.0 for Windows in 'any capacity'Security

Bleepingcomputer

12.7.20

How to protect your Verizon number from SIM swapping attacksAttack  Mobil

Bleepingcomputer

12.7.20

Uber Eats outage in multiple countries, 'Internal Server Error" reportsSecurity

Bleepingcomputer

12.7.20

eToro accounts peddled by the thousands on cybercrime forumsCyberCrime

Bleepingcomputer

12.7.20

US Secret Service creates new Cyber Fraud Task ForceBigBrothers

Bleepingcomputer

12.7.20

Mozilla reduces TLS certificate lifespan to 1 year in SeptemberCrypto

Bleepingcomputer

12.7.20

Over 1,300 phishing kits for sale on hacker forumPhishing

Bleepingcomputer

12.7.20

How to import and backup saved passwords in Google ChromeSafety

Bleepingcomputer

12.7.20

Conti ransomware shows signs of being Ryuk's successorRansomware

Bleepingcomputer

12.7.20

Google will ban ads for stalkerware starting August 11Hacking

Bleepingcomputer

12.7.20

Microsoft testing new Windows 10 KDP anti-malware protectionOS

Bleepingcomputer

12.7.20

Persuasive Office 365 phishing uses fake Zoom suspension alertsPhishing

Bleepingcomputer

12.7.20

Evilnum hackers use the same malware supplier as FIN6, CobaltHacking

Bleepingcomputer

12.7.20

Joker Android malware keeps evading Google Play Store defensesAndroid

Bleepingcomputer

12.7.20

Over 15 billion credentials in circulation on hacker forumsHacking

Bleepingcomputer

12.7.20

Palo Alto Networks fixes another severe flaw in PAN-OS devicesVulnerebility

Bleepingcomputer

12.7.20

Microsoft warns of Office 365 phishing via malicious OAuth appsPhishing

Bleepingcomputer

12.7.20

First look: Microsoft's Project Freta detects Linux malware for freeVirus

Bleepingcomputer

12.7.20

NVIDIA fixes code execution bug in GeForce Experience softwareVulnerebility

Bleepingcomputer

12.7.20

Microsoft fixes Word, Skype hangs in July Office 2020 updatesOS

Bleepingcomputer

12.7.20

Risky blogspot.in domain for sale after Google fails to renew itSecurity

Bleepingcomputer

12.7.20

DOJ indict Fxmsp hacker for selling access to hacked orgs, AV firmsBigBrothers

Bleepingcomputer

12.7.20

ThiefQuest info-stealing Mac wiper gets free decryptorApple

Bleepingcomputer

12.7.20

Mitigating critical F5 BIG-IP RCE flaw not enough, bypass foundVulnerebility

Bleepingcomputer

12.7.20

How to uninstall Microsoft Edge forced-installed via Windows UpdateOS

Bleepingcomputer

12.7.20

Microsoft takes down domains used in COVID-19-related cybercrimeCyberCrime

Bleepingcomputer

12.7.20

Windows 10: The beginning of the end for Control PanelOS

Bleepingcomputer

12.7.20

US Treasury shares tips on spotting money mule and imposter scamsSpam

Bleepingcomputer

12.7.20

First reported Russian BEC scam gang targets Fortune 500 firmsSpam

Bleepingcomputer

12.7.20

Citrix fixes 11 flaws in ADC, Gateway, and SD-WAN WANOP appliancesVulnerebility

Bleepingcomputer

12.7.20

Microsoft Defender ATP web content filtering is now freeSafety

Bleepingcomputer

12.7.20

EDP energy giant confirms Ragnar Locker ransomware attackRansomware

Bleepingcomputer

12.7.20

Ransomware attack on insurance MSP Xchanging affects clientsRansomware

Bleepingcomputer

12.7.20

New Google Chrome feature to drastically reduce battery usageSecurity

Bleepingcomputer

12.7.20

Microsoft's new Windows 10 Alt+Tab plan looks like a messOS

Bleepingcomputer

12.7.20

Windows 10 2004 upgrades blocked by useless "What needs your attention" alertsOS

Bleepingcomputer

12.7.20

North Korean hackers linked to credit card stealing attacks on US storesBigBrothers

Bleepingcomputer

12.7.20

PoC exploits released for F5 BIG-IP vulnerabilities, patch now!Exploit

Bleepingcomputer

12.7.20

Windows 10's Microsoft Store Codecs patches are confusing usersOS

Bleepingcomputer

12.7.20

.NET Core vulnerability lets attackers evade malware detectionAttack

Bleepingcomputer

12.7.20

New Behave! extension warns of website port scans, local attacksAttack

Bleepingcomputer

12.7.20

Companies start reporting ransomware attacks as data breachesRansomware

Bleepingcomputer

12.7.20

Try2Cry ransomware tries to worm its way to other Windows systemsRansomware

Bleepingcomputer

12.7.20

US Cyber Command urges F5 customers to patch critical BIG-IP flawVulnerebility

Bleepingcomputer

12.7.20

Avaddon ransomware shows that Excel 4.0 macros are still effectiveRansomware

Bleepingcomputer

12.7.20

Windows 10 2004 breaks OneDrive connectivity for some usersOS

Bleepingcomputer

12.7.20

Microsoft Defender ATP now helps secure network devicesSafety

Bleepingcomputer

12.7.20

Malwarebytes AdwCleaner now removes malware from the command lineVirus

Bleepingcomputer

12.7.20

Surge of MongoDB ransom attacks use GDPR as extortion leverageRansomware

Bleepingcomputer

12.7.20

Windows 10 background image tool can be abused to download malwareOS

Bleepingcomputer

12.7.20

NSA releases guidance on securing IPsec Virtual Private NetworksBigBrothers

Bleepingcomputer

12.7.20

Microsoft shares Windows 10 2004 workaround for Storage Spaces issueOS

Bleepingcomputer

12.7.20

Researchers link APT15 hackers to Chinese military companyAPT

Bleepingcomputer

12.7.20

Hundreds arrested after encrypted messaging network takeoverCrypto

Bleepingcomputer

12.7.20

GoldenSpy backdoor installed by tax software gets remotely removedVirus

Bleepingcomputer

12.7.20

Microsoft unveils new Windows 10 Start Menu with theme-aware tilesOS

Bleepingcomputer

12.7.20

Federal Reserve shares tips on mitigating synthetic identity fraudCyberCrime

Bleepingcomputer

12.7.20

TrickBot malware now checks screen resolution to evade analysisVirus

Bleepingcomputer

12.7.20

Windows POS malware uses DNS to smuggle stolen credit cardsVirus

Bleepingcomputer

12.7.20

US Govt shares tips on defending against cyberattacks via TorBigBrothers

Bleepingcomputer

12.7.20

Windows 10 PowerToys 0.19 released in huge stability bug fixOS

Bleepingcomputer

12.7.20

Dozens of US news sites hacked in WastedLocker ransomware attacksRansomware

Bleepingcomputer

12.7.20

Mozilla rolls out emergency Firefox update to fix search issuesVulnerebility

Bleepingcomputer

12.7.20

Microsoft lifts Windows 10 2004 update block on Surface devicesOS

Bleepingcomputer

12.7.20

Scanning Home Internet Facing Devices to Exploit

Exploit

SANS

12.7.20

Yevgeniy Nikulin, Russian hacker behind Dropbox and LinkedIn hacks found guiltyCrimeSecurityaffairs

12.7.20

Exclusive: Any Chingari App (Indian TikTok Clone) Account Can Be Hacked EasilySocialThehackernews

11.7.20

SpartCrypt DecryptorAnti-Ramson ToolAnti-Ramson Tool

11.7.20

Facebook Offering Big Rewards for Vulnerabilities in Hermes, Spark ARSocial

Securityweek

11.7.20

Google Updates Policies to Reject Ads for SpywareVirusSecurityweek

11.7.20

Zoom Working on Patch for Code Execution Vulnerability in Windows ClientVulnerebility

Securityweek

11.7.20

Hackers are scanning the web for vulnerable Citrix systemsVulnerebilitySecurityaffairs

11.7.20

Evilnum Group targets European and British fintech companiesHackingSecurityaffairs

11.7.20

Juniper Networks addressed many issues in its productsVulnerebilitySecurityaffairs

11.7.20

Report: Most Popular Home Routers Have ‘Critical’ FlawsVulnerebility

Threatpost

11.7.20

Popular TP-Link Family of Kasa Security Cams Vulnerable to AttackVulnerebility

Threatpost

11.7.20

Google Bans Stalkerware Ads – With a LoopholeSecurityThreatpost

11.7.20

Smartwatch Hack Could Trick Dementia Patients into OverdosingHackingThreatpost

10.7.20

Researchers found allegedly intentional backdoors in FTTH devices from Chinese vendor C-Data

Virus

Securityaffairs

10.7.20

KingComposer fixes a reflected XSS impacting 100,000 WordPress sites

Vulnerebility

Securityaffairs

10.7.20

Pre-Installed malware spotted on other Android phones sold in US

Android

Securityaffairs

10.7.20

Juniper Networks Patches Critical Vulnerabilities in Firewalls

Vulnerebility

Securityweek

10.7.20

Evilnum Group Targets Fintech Companies in Europe

Hacking

Securityweek

10.7.20

UK, Australia Investigate Clearview Facial Recognition Firm

BigBrothers

Securityweek

10.7.20

Attackers are probing Citrix controllers and gateways through recently patched flaws

Vulnerebility

Net-security

10.7.20

Zoom Zero-Day Allows RCE, Patch on the WayVulnerebility

Threatpost

10.7.20

Joker Android Malware Dupes Its Way Back Onto Google PlayAndroid

Threatpost

10.7.20

BlueLeaks Server Seized By German Police: ReportBigBrothersThreatpost

10.7.20

Microsoft Warns on OAuth Attacks Against Cloud App UsersAttackThreatpost

10.7.20

‘Undeletable’ Malware Shows Up in Yet Another Android DeviceAndroidThreatpost

10.7.20

Zoom is working on a patch for a zero-day in Windows clientVulnerebilitySecurityaffairs

10.7.20

Joker malware apps bypassed Google’s Play Store security checksAndroidSecurityaffairs

10.7.20

15 billion credentials available in the cybercrime marketplacesCyberCrimeSecurityaffairs

10.7.20

Palo Alto Networks addresses another high severity issue in PAN-OS devicesVulnerebilitySecurityaffairs

10.7.20

Google Tsunami vulnerability scanner is now open-sourceVulnerebilitySecurityaffairs

10.7.20

Vulnerabilities in Popular Open Source Management Tool Expose Hospitals to AttacksVulnerebility

Securityweek

10.7.20

Honeywell Sees Rise in USB-Borne Malware That Can Cause Major ICS DisruptionICS  VirusSecurityweek

10.7.20

Researchers Find Pre-Installed Malware on More Android Phones in U.S.Android

Securityweek

10.7.20

Germany Seizes Server Hosting Pilfered U.S. Police FilesBigBrothersSecurityweek

10.7.20

Microsoft Adds New Data Corruption Preventions to WindowsSafetySecurityweek

10.7.20

Powerful Conti Ransomware EmergesRansomware

Securityweek

10.7.20

Cyberattack Simulation Company XM Cyber Raises $17 MillionITSecurityweek

10.7.20

Joker Malware Apps Once Again Bypass Google's Security to Spread via Play StoreAndroidThehackernews

10.7.20

Excel spreasheet macro kicks off Formbook infection

Spam

SANS

10.7.20

July 2020 Patch Tuesday forecast: Will the CVE trend continue?

Vulnerebility

Net-security

10.7.20

An effective cloud security posture begins with these three step

Security

Net-security

10.7.20

USB storage devices: Convenient security nightmares

Security

Net-security

10.7.20

Companies see the importance of integrated solutions to streamline business processes

Security

Net-security

10.7.20

Zoom zero-day flaw allows code execution on victim’s Windows machine

Vulnerebility

Net-security

10.7.20

Three major gaps in the Cyberspace Solarium Commission’s report that need to be addressed

Cyber

Net-security

9.7.20

Notorious Hacker ‘Fxmsp’ Outed After Widespread Access-DealingHackingThreatpost

9.7.20

Microsoft Seizes Malicious Domains Used in Mass Office 365 AttacksVirusThreatpost
9.7.2015 Billion Credentials Currently Up for Grabs on Hacker ForumsHackingThreatpost
9.7.20Advertising Plugin for WordPress Threatens Full Site TakeoversSecurityThreatpost
9.7.20DOJ indicts Fxmsp hacker for selling access to hacked businessesBigBrothersSecurityaffairs
9.7.20Google Patches Critical Android Vulnerabilities With July 2020 UpdatesAndroid

Securityweek

9.7.20Over 5 Billion Unique Credentials Offered on Cybercrime MarketplacesCyberCrimeSecurityweek
9.7.20Huawei Urges UK Not to Rush Into 5G DecisionBigBrothers

Securityweek

9.7.20

F5 BIG-IP contains multiple vulnerabilities including unauthenticated remote command executionAlertAlert

9.7.20

Three major gaps in the Cyberspace Solarium Commission’s report that need to be addressed

Cyber

Net-security
9.7.20

70% of organizations experienced a public cloud security incident in the last year

Security

Net-security
9.7.20

In the age of disruption, comprehensive network visibility is key

Security

Net-security
9.7.20

BYOD adoption is growing rapidly, but security is lagging

Security

Net-security
9.7.20

Western Digital expands family of data center HDD solutions

IT

Net-security

8.7.20

Redirect auctionHackingSecurelist

8.7.20

Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flawVulnerebilitySecurityaffairs
8.7.20Magecart Group Hits 570 Websites in Three YearsCyberCrime

Securityweek

8.7.20Russian BEC Ring Targets Many Multinational OrganizationsBigBrothersSecurityweek
8.7.20Free Tool Enables Recovery of Files Encrypted by ThiefQuest Mac MalwareApple

Securityweek

8.7.20Federal Judge Upholds Maine's Strict Internet Privacy LawPrivacySecurityweek
8.7.20Hackers Find Way to Bypass Mitigation for Exploited BIG-IP VulnerabilityVulnerebilitySecurityweek

8.7.20

Magecart Group 8 skimmed card info from 570+ online shops

CyberCrime

Net-security

8.7.20Credit-Card Skimmer Has Unlikely Target: Microsoft ASP.NET SitesCyberCrime

Threatpost

8.7.20Citrix Bugs Allow Unauthenticated Code Injection, Data TheftVulnerebility

Threatpost

8.7.20Cerberus Banking Trojan Unleashed on Google PlayAndroidThreatpost
8.7.20Keeper Threat Group Rakes in $7M from Hundreds of Compromised E-Commerce SitesHackingThreatpost
8.7.20BEC Hotshot with Opulent Social Media Presence to Face U.S. ChargesSpamThreatpost
8.7.20First-Ever Russian BEC Gang, Cosmic Lynx, UncoveredSpamThreatpost
8.7.20Malicious app in Google Play used to deliver Cerberus Banking TrojanAndroidSecurityaffairs
8.7.20SentinelOne released free decryptor for ThiefQuest ransomwareRansomwareSecurityaffairs
8.7.20New release of Lampion trojan spreads in Portugal with some improvements on the VBS downloaderVirusSecurityaffairs
8.7.20Project Freta, a free service that allows finding malware in OS memory snapshotsSecuritySecurityaffairs
8.7.20Cerberus Banking Trojan Delivered via App Hosted on Google PlayAndroid

Securityweek

8.7.20Feds Unseal 2018 Indictment Charging Kazakh Man in HacksBigBrothersSecurityweek
8.7.20Citrix Patches 11 Vulnerabilities in Networking ProductsVulnerebility

Securityweek

8.7.20Microsoft Files Lawsuit to Seize Fake Domains Used in COVID-19-Themed BEC AttacksSpamSecurityweek
8.7.20Citrix Issues Critical Patches for 11 New Flaws Affecting Multiple ProductsVulnerebilityThehackernews
8.7.20

Attackers are bypassing F5 BIG-IP RCE mitigation – you might want to patch after all

Attack

Net-security
8.7.20

If You Want Something Done Right, You Have To Do It Yourself... Malware Too!

Virus

SANS

8.7.20

How do I select an application security testing solution for my business?

Security

Net-security

8.7.20

Tech businesses must rethink their IT infrastructure

Security

Net-security

8.7.20

MongoDB is subject to continual attacks when exposed to the internet

Attack

Net-security

8.7.20

Exposing the privacy risks of home security cameras

Privacy

Net-security
7.7.20Authors of Purple Fox EK adds 2 Microsoft exploitsExploit

Securityaffairs

7.7.20EDP Renewables North America Discloses Data BreachSafety

Securityweek

7.7.20Purple Fox Exploit Kit Targets Vulnerabilities Linked to DarkHotel GroupExploitSecurityweek
7.7.20Free Microsoft Service Looks at OS Memory Snapshots to Find MalwareSecurity

Securityweek

7.7.20Britain Set to Axe Huawei 5G Involvement: ReportBigBrothers

Securityweek

7.7.20Nigerian Instagram Star Extradited to U.S. Over Role in Cybercrime SchemesCrimeSecurityweek
7.7.20BIG-IP Vulnerability Exploited to Deliver DDoS MalwareExploit  Virus  Vulnerebility

Securityweek

7.7.20China Urges 'Fair' Treatment After France Restricts HuaweiBigBrothersSecurityweek
7.7.20Microsoft Launches Free Linux Forensics and Rootkit Malware Detection ServiceSecurityThehackernews
7.7.20RedRum DecryptorAnti-Ramson ToolAnti-Ramson Tool
7.7.20

Admins Urged to Patch Critical F5 Flaw Under Active Attack

Attack

Threatpost

7.7.20

Purple Fox EK Adds Microsoft Exploits to Arsenal

Exploit

Threatpost

7.7.20

Lazarus Group Adds Magecart to the Mix

APT

Threatpost
7.7.20

Android Users Hit with ‘Undeletable’ Adware

Android

Threatpost
7.7.20

Ransomware infected systems at Xchanging, a DXC subsidiary

Ransomware

Securityaffairs

7.7.20

Unsecured Chinese companies leak users’ sensitive personal and business data

BigBrothers

Securityaffairs

7.7.20

Former Yahoo! employee who accessed 6K accounts avoids jail

Crime

Securityaffairs

7.7.20

Facebook, Others, Block Govt Requests on Hong Kong User Data

Social

Securityweek
7.7.20

Try2Cry Ransomware Spreads via USB Drives

Ransomware

Securityweek
7.7.20

Summary of CVE-2020-5902 F5 BIG-IP RCE Vulnerability Exploits

Exploit  Vulnerebility

SANS

7.7.20

Better cybersecurity hinges on understanding actual risks and addressing the right problems

Cyber

Net-security

7.7.20

Business efficiency metrics are more important than detection metrics

Security

Net-security

7.7.20

Elasticsearch security: Understand your options and apply best practices

Security

Net-security

7.7.20

Researchers discover how to pinpoint the location of a malicious drone operator

Virus

Net-security
7.7.20

Global data center networking market to reach $40.9 billion by 2025

Security

Net-security
6.7.20North Korean Lazarus APT stole credit card data from US and EU storesAPT

Securityaffairs

6.7.20Threat actors are attempting to exploit recently fixed F5 BIG-IP flawExploit

Securityaffairs

6.7.20Former Yahoo! Employee Avoids Jail After Hacking User AccountsCrime

Securityweek

6.7.20NSA Publishes Recommendations on Securing IPsec VPNsBigBrothersSecurityweek
6.7.20Magecart Attacks on Claire's and Other U.S. Stores Linked to North KoreaBigBrothers

Securityweek

6.7.20Nigerian Man Charged With Cyber Fraud Against US CompaniesCrimeSecurityweek
6.7.20Cato MDR: Managed Threat Detection and Response Made EasySafetyThehackernews
6.7.20Pig in a poke: smartphone adwareAndroidSecurelist
6.7.20Hackers Start Exploiting Recently Patched BIG-IP VulnerabilityExploit  Vulnerebility

Securityweek

6.7.20Huawei Not Totally Banned From France, Says Watchdog: ReportBigBrothersSecurityweek
6.7.20

CVE-2020-5902 F5 BIG-IP Exploitation Attempt

Vulnerebility

SANS

6.7.20

Data exfiltration: The art of distancing

Security

Net-security

6.7.20

Cybersecurity software sales and training in a no-touch world

Cyber

Net-security

6.7.20

Review: Cybersecurity Threats, Malware Trends, and Strategies

Cyber

Net-security

6.7.20

Managers and employees support digital transformation, but see room for improvement

Security

Net-security
5.7.20Critical RCE Flaw (CVSS 10) Affects F5 BIG-IP Application Security ServersVulnerebilityThehackernews
5.7.20US Cyber Command urges F5 customers to fix critical flaw in BIG-IP productBigBrothers  Vulnerebility

Securityaffairs

5.7.20European police infiltrate and dismantled EncroChat chat networkCyberCrime

Securityaffairs

5.7.20Try2Cry ransomware implements wormable capability to infect other Windows systemsRansomware

Securityaffairs

4.7.20Police Arrested Hundreds of Criminals After Hacking Into Encrypted Chat NetworkCyberCrimeThehackernews
4.7.20Critical Apache Guacamole Flaws Put Remote Desktops at Risk of HackingVulnerebilityThehackernews
4.7.20Microsoft Releases Urgent Windows Update to Patch Two Critical FlawsVulnerebilityThehackernews
4.7.20A New Ransomware Targeting Apple macOS Users Through Pirated AppsRansomwareThehackernews
4.7.20US Senate Panel OKs Online Child Protection Bill Amid Privacy FearsBigBrothers  Privacy

Securityweek

4.7.20Cyberattacks Possibly Involved in Explosions at Iranian Nuclear, Military FacilitiesBigBrothersSecurityweek
4.7.20Apache Guacamole Vulnerabilities Facilitate Attacks on EnterprisesVulnerebility

Securityweek

4.7.20ICS-Targeting Snake Ransomware Isolates Infected Systems Before EncryptionRansomwareSecurityweek
4.7.20CISA Warns Enterprises of Risks Associated With TorSafety

Securityweek

4.7.20Cisco Discloses Details of Chrome, Firefox VulnerabilitiesVulnerebilitySecurityweek
4.7.20Alleged cyber attacks caused fire and explosions at nuclear and military facilities in IranAttack

Securityaffairs

4.7.20Hackers are targeting unsecured MongoDB databaseHacking

Securityaffairs

4.7.20Sodinokibi Ransomware Operators hit electrical energy company Light S.A.Ransomware

Securityaffairs

4.7.20Maze Ransomware operators hacked Highways Authority Of India (Nhai)Ransomware

Securityaffairs

4.7.20Cisco addresses flaws in Small Business Routers and SwitchesVulnerebility

Securityaffairs

4.7.20Critical Apache Guacamole flaws expose organizations at risk of hackVulnerebility

Securityaffairs

4.7.20Netgear is releasing fixes for ten issues affecting 79 productsVulnerebility

Securityaffairs

4.7.20The U.S. FCC considers Huawei and ZTE as national security threatsBigBrothers

Securityaffairs

4.7.20New EvilQuest ransomware targets macOS usersRansomwareSecurityaffairs