Calendar 2020 March- Home  2020  2019  2018  2017  2016

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2020 - January  February  March  April  May  June  July  August  September  October  November  December


Date

Name

Category

Web

31.3.20

Holy Water targets religious figures and charities in AsiaAPTSecurityaffairs

31.3.20

42 million records of Iranian users of unofficial Telegram fork leaked onlineIncindentSecurityaffairs

31.3.20

FBI warns of nation-state actors using the Kwampirs malwareBigBrothersSecurityaffairs

31.3.20

FBI Warns of Ongoing Kwampirs Attacks Targeting Global IndustriesBigBrothersSecurityweek

31.3.20

CISOs Suffering From Increasingly Complex Workload: CiscoSecuritySecurityweek

31.3.20

New Marriott Data Breach Impacts Up to 5.2 Million GuestsIncindentSecurityweek

31.3.20

CISO Conversations: Verizon, AT&T CISOs Talk Communications Sector SecuritySecuritySecurityweek

31.3.20

Industrial Controllers Still Vulnerable to Stuxnet-Style AttacksAttack  ICSSecurityweek
31.3.20Zoom Updates Privacy Policy After Experts Raise ConcernsPrivacySecurityweek

31.3.20

Holy water: ongoing targeted water-holing attack in AsiaAPTSecurelist

31.3.20

Microsoft Edge will warn users if their credentials have been compromisedIncindentSecurityaffairs

31.3.20

Kwampirs threat actor continues to breach transnational healthcare orgs

Incindent

Net-security

31.3.20

Webinar – Getting Inside the Mind of an Attacker: TLS Attacks and Pitfalls

Attack

Net-security

31.3.20

Versiant LYNX Customer Service Portal is vulnerable to stored cross-site scriptingAlertAlert

31.3.20

Vertiv Avocent UMG-4000 vulnerable to command injection and cross-site scripting vulnerabilitiesAlertAlert

31.3.20

Zoom Kills iOS App’s Data-Sharing Facebook Feature

Apple  Social

Threatpost

31.3.20

Zeus Sphinx Banking Trojan Arises Amid COVID-1

Virus

Threatpost

31.3.20

Nation-State Attacks Drop in Latest Google Analysis

BigBrothers

Threatpost

31.3.20

Crooks leverage Zoom’s popularity in Coronavirus outbreak to serve malware

Virus

Securityaffairs

31.3.20

Zeus Sphinx spam campaign attempt to exploit Coronavirus outbreak

Exploit

Securityaffairs
31.3.20

Vulnerabilities Expose Lexus, Toyota Cars to Hacker Attacks

Vulnerebility

Securityweek

31.3.20

State-Backed Players Join Pandemic Cyber Crime Attacks

Attack

Securityweek

31.3.20

Microsoft to Add Compromised Password Notification to Edge

Safety

Securityweek

31.3.20

FBI: Cybercriminals Mailing Malicious USB Devices to Victims

BigBrothers

Securityweek
31.3.20

Zettaset Launches Software-Defined Encryption for Kubernetes Environments

Crypto

Securityweek

31.3.20

Corporate Workers Warned of 'COVID-19 Payment' Emails Delivering Banking Trojan

Virus

Securityweek

31.3.20

Kwampirs Targeted Attacks Involving Healthcare Sector

Attack

SANS

31.3.20

Distributed disruption: Coronavirus multiplies the risk of severe cyberattac

Security

Net-security

31.3.20

21% of SMBs do not have a data backup or disaster recovery solution in plac

Security

Net-security

31.3.20

Steering your network in the right direction with segmentation

Security

Net-security

31.3.20

The potential impact of SAP security remediation

Security

Net-security
31.3.20

Researchers find shift in monthly web traffic amidst pandemic

Security

Net-security

31.3.20

Remote work and web conferencing: Security and privacy considerations

Privacy  Security

Net-security

30.3.20

Voter information for 4,934,863 Georgians leaked onlineIncindentSecurityaffairs

30.3.20

Utah Investigating Hacking of Candidate's Virtual EventHackingSecurityweek
30.3.20Vulnerabilities in DrayTek Enterprise Routers Exploited in AttacksVulnerebilitySecurityweek

30.3.20

RDP and VPN use soars, increasing enterprise cyber risk

Cyber

Net-security

30.3.20

Your colleague was infected with Coronavirus, this is the latest phishing lure

Phishing  Virus

Securityaffairs
30.3.20

AppTrana Offers Protection to Online Businesses During Coronavirus Outbreak

Safety

Thehackernews

30.3.20

COVID-19: Hackers Begin Exploiting Zoom's Overnight Success to Spread Malware

Exploit  Virus

Thehackernews

30.3.20

Source code of Dharma ransomware now surfacing on public hacking forumsRansomwareSecurityaffairs
30.3.20Privacy Rights May Become Next Victim of Killer PandemicPrivacySecurityweek

30.3.20

Crashing explorer.exe with(out) a click

Security

SANS

30.3.20

Should you hire a specialized cybersecurity recruiter?

Cyber

Net-security

30.3.20

Debunking vulnerability management myths for a safer enterprise

Vulnerebility

Net-security

30.3.20

Why we need to secure IoT connections sooner than later

IoT

Net-security

30.3.20

Seven key cybersecurity trends for 2020 by world-leading professionals

Cyber

Net-security
30.3.20

Organizations not properly set up to manage risk, coronavirus pandemic reveals

Security

Net-security

30.3.20

Whitepaper: Cloud security risks and how to mitigate them

Security

Net-security

29.3.20

Coronavirus-themed attacks March 22 – March 28, 2020SecuritySecurityaffairs

29.3.20

FIN7 hackers target enterprises with weaponized USB drives via USPSCyberCrimeSecurityaffairs

29.3.20

Ransom NewsRansomwareRansomware

29.3.20

Microsoft's Windows 10 Dockable 'News Bar' Now In BetaOS

Bleepingcomputer

29.3.20

FTC Warns VoIP Providers to Stop Facilitating Coronavirus ScamsBigBrothers

Bleepingcomputer

29.3.20

US Small Business Administration Grants Used as Phishing BaitBigBrothers  Phishing

Bleepingcomputer

29.3.20

FBI: Hackers Sending Malicious USB Drives & Teddy Bears via USPSBigBrothers

Bleepingcomputer

29.3.20

Google Advises Against Disabling Sites During the PandemicSecurity

Bleepingcomputer

29.3.20

Actively Exploited Windows Font Parsing Bugs Get Temporary FixExploit  OS

Bleepingcomputer

29.3.20

Russian-Speaking Hackers Attack Pharma, Manufacturing Companies in EuropeBigBrothers

Bleepingcomputer

29.3.20

Google Warned Users of 40,000 State-Sponsored Attacks in 2019BigBrothers

Bleepingcomputer

29.3.20

Ryuk Ransomware Keeps Targeting Hospitals During the PandemicRansomware

Bleepingcomputer

29.3.20

Windows 10 Search Getting New Features for Business CustomersOS

Bleepingcomputer

29.3.20

New Windows 10 Bug Causes Internet Connectivity Issues, Fix in AprilOS

Bleepingcomputer

29.3.20

Unpatched iOS Bug Blocks VPNs From Encrypting All TrafficApple

Bleepingcomputer

29.3.20

Chubb Cyber Insurer Allegedly Hit By Maze Ransomware AttackRansomwareBleepingcomputer

29.3.20

Critical buffer overflow in CODESYS allows remote code executionICSSecurityaffairs

29.3.20

Hackers target zero-day flaws in enterprise Draytek network devicesVulnerebilitySecurityaffairs

29.3.20

AMD admits hacker stole source code files related to its GPUsHackingSecurityaffairs

29.3.20

Europol: Criminals Exploit Virus Crisis as Fresh OpportunityBigBrothers  ExploitSecurityweek

29.3.20

How to Simplify Endpoint SecuritySecurity blogSonicwall

29.3.20

Hackers leak Russian cyberweapon plansBigBrother blogAvast blog

29.3.20

Don’t Panic: COVID-19 Cyber ThreatsCyber blog

Palo Alto Unity42

29.3.20

Secure Connectivity is The Only ConnectivityCyber blog

Palo Alto

29.3.20

Prisma Cloud Native Security Platform Embeds Security into DevOps LifecycleCyber blog

Palo Alto

29.3.20

COVID-19 (coronavirus) Partner and Customer StatementCyber blog

Palo Alto

29.3.20

Palo Alto Networks Joins Bay Area Companies to Provide Funds for COVID-19Cyber blog

Palo Alto

29.3.20

Google Resumes Chrome Releases on an Adjusted ScheduleSecurity

Bleepingcomputer

29.3.20

Chinese Hackers Use Cisco, Citrix, Zoho Exploits In Targeted AttacksBigBrothers

Bleepingcomputer

29.3.20

WordPress Malware Distributed via Pirated Coronavirus PluginsVirus

Bleepingcomputer

29.3.20

Google Chrome Adding Option to Always Show Full URLsSecurity

Bleepingcomputer

29.3.20

Windows 10 Insider Build 19592 Brings New 2-in-1 PC ExperienceOS

Bleepingcomputer

29.3.20

Malware Disguised as Google Updates Pushed via Hacked News SitesVirus

Bleepingcomputer

29.3.20

Microsoft Fixes Windows Defender Scan Bug With New UpdateOS

Bleepingcomputer

29.3.20

Tupperware Site Hacked With Fake Form to Steal Credit CardsHacking

Bleepingcomputer

29.3.20

Mozilla Firefox Gets a HTTPS Only Mode For More Secure BrowsingSecurity

Bleepingcomputer

29.3.20

Three More Ransomware Families Create Sites to Leak Stolen DataRansomware

Bleepingcomputer

29.3.20

HPE Warns of New Bug That Kills SSD Drives After 40,000 HoursVulnerebility

Bleepingcomputer

29.3.20

Tor Browser 9.0.7 Patches Bug That Could Deanonymize UsersVulnerebility

Bleepingcomputer

29.3.20

TeamViewer Stops Commercial Use Checks in Coronavirus-Affected RegionsSecurity

Bleepingcomputer

29.3.20

Microsoft Pauses Optional Windows Cumulative Updates Starting in MayOS

Bleepingcomputer

29.3.20

TrickBot Bypasses Online Banking 2FA Protection via Mobile AppBotNet

Bleepingcomputer

28.3.20

Windows 10 Optional Cumulative Update KB4541335 ReleasedOS

Bleepingcomputer

28.3.20

Ginp Mobile Banker Targets Spain with "Coronavirus Finder" LureVirus

Bleepingcomputer

28.3.20

Adobe Fixes Critical Vulnerability in Creative Cloud ApplicationVulnerebility

Bleepingcomputer

28.3.20

Microsoft Cuts Back More Office 365 Features to Handle High LoadOS

Bleepingcomputer

28.3.20

Unknown Hackers Use New Milum RAT in WildPressure CampaignVirus

Bleepingcomputer

28.3.20

Windows Defender Fix For Windows 10: Enable Network ScanningOS

Bleepingcomputer

28.3.20

Fake Corona Antivirus Software Used to Install Backdoor MalwareVirus

Bleepingcomputer

28.3.20

Hackers Hijack Routers’ DNS to Spread Malicious COVID-19 AppsVirus

Bleepingcomputer

28.3.20

Tech Giant GE Discloses Data Breach After Service Provider HackIncindent

Bleepingcomputer

28.3.20

Microsoft Warns of Hackers Exploiting Unpatched Windows BugsExploit

Bleepingcomputer

28.3.20

HHS.gov Open Redirect Used by Coronavirus Phishing to Spread MalwarePhishing  Virus

Bleepingcomputer

28.3.20

Google to Abandon Chrome 82 Development Due to Release DelaysSecurity

Bleepingcomputer

28.3.20

Windows Defender Bug in Windows 10 Skips Files During ScansOS

Bleepingcomputer

28.3.20

Israel Govt's New 'Shield' App Tracks Your Coronavirus ExposureBigBrothers

Bleepingcomputer

28.3.20

How to Make the Windows 10 Taskbar Completely TransparentOS

Bleepingcomputer

28.3.20

REMOTE WORK IS THE NEW NORMAL

Security blog

Cybereason

28.3.20

WHY WE CREATED REMOTE WORKFORCE PROTECTION

Safety blog

Cybereason

28.3.20

Ransomware Maze

Ransomware blog

Mcafee blog

28.3.20

Is the DoD CMMC the Model for All Future Compliance Standards?

Security blog

F5 Labs

28.3.20

Social Engineering Based on Stimulus Bill and COVID-19 Financial Compensation Schemes Expected to Grow in Coming Weeks

Social blog

FireEye

28.3.20

Six Facts about Address Space Layout Randomization on Windows

Vulnerebility blog

FireEye

28.3.20

Monitoring ICS Cyber Operation Tools and Software Exploit Modules To Anticipate Future Threats

ICS blog

FireEye

28.3.20

This Is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits

APT blog

FireEye

28.3.20

Google Play Store Played Again – Tekya Clicker Hides in 24 Children’s Games and 32 Utility Apps

OS Blog

Checkpoint

28.3.20

Breaking through Windows’ defenses: Analyzing mLNK Builder

Vulnerebility blog

Checkpoint

28.3.20

“I want to learn about exploitation! Where do I start?”

Exploit blog

Checkpoint

28.3.20

Vulnerability Spotlight: Intel Raid Web Console 3 denial-of-service bugs

Vulnerebility blog

Cisco Talos

28.3.20

Vulnerability Spotlight: Multiple vulnerabilities in Videolabs libmicrodns

Vulnerebility blog

Cisco Talos

28.3.20

Vulnerability Spotlight: Denial-of-service vulnerability in GStreamer

Vulnerebility blog

Cisco Talos

28.3.20

What happens when the global supply chain breaks?

Attack blog

Eset

28.3.20

6 tips for safe and secure remote working

Security blog

Eset

28.3.20

HPE issues fix to stop some SSDs from self‑destructing

Security blog

Eset

28.3.20

Public health vs. personal privacy: Choose only one?

Security blog

Eset

28.3.20

Microsoft warns of two Windows zero‑day flaws

Vulnerebility blog

Eset

28.3.20

The good, the bad and the plain ugly

Security blog

Eset

28.3.20

Apple Unpatched VPN Bypass Bug Impacts iOS 13, Warn Researchers

Apple

Threatpost
28.3.20

0patch releases free unofficial patches for Windows 0days exploited in the wild

Exploit

Securityaffairs
28.3.20

Google issued 40,000 alerts of State-Sponsored attacks in 2019

BigBrothers

Securityaffairs
28.3.20

Google Sees Drop in Government-Backed Phishing Attempts

BigBrothers  Phishing

Securityweek
28.3.20

Russian Hackers Exploited Windows Flaws in Attacks on European Firms

APT  Exploit

Securityweek
28.3.20

Senator Urges Vendors to Secure Networking Devices Amid COVID-19 Outbreak

BigBrothers

Securityweek
28.3.20

Hackers Exploit Zero-Day Bugs in Draytek Devices to Target Enterprise Networks

Exploit

Thehackernews
27.3.20A missing authorization check in WordPre WPvivid plugin that can lead to the exposure of the database and all filesIncindentSecurityaffairs
27.3.20New financially motivated attacks in Western Europe traced to Russian-speaking threat actorsAPTSecurityaffairs
27.3.20Ryuk Ransomware operators continue to target hospitals during COVID19 outbreakRansomwareSecurityaffairs
27.3.20GitHub Paid Out Over $1 Million in Bug BountiesSecuritySecurityweek
27.3.20Websites of U.S. Presidential Candidates Pose Security, Privacy RisksBigBrothersSecurityweek
27.3.20Unofficial Patches Released for Exploited Windows Font Processing FlawsExploitSecurityweek
27.3.20Hackers Used Local News Sites to Install Spyware On iPhonesAppleThehackernews
27.3.20

Micropatches block exploitation of Windows zero-days under attack

Exploit

Net-security

27.3.20

Government-backed cyber attackers increasingly targeting journalists

BigBrothers

Net-security

27.3.20

Emerging APT Mounts Mass iPhone Surveillance Campaign

Apple  APT

Threatpost

27.3.20

Tokyo Olympics Postponed, But 5G Security Lessons Shine

Mobil

Threatpost

27.3.20

Tupperware Cyberattack Stores Away Customer Payment Cards

Attack  CyberCrime

Threatpost

27.3.20

Hackers Hijack Routers to Spread Malware Via Coronavirus Apps

Hacking

Threatpost

27.3.20

Critical CODESYS Bug Allows Remote Code Execution

Vulnerebility

Threatpost
27.3.20

As Zoom Booms, Incidents of ‘ZoomBombing’ Become a Growing Nuisance

Incindent

Threatpost
27.3.20iOS exploit chain deploys LightSpy feature-rich malwareApple  APTSecurelist
27.3.20Operation Poisoned News: Hong Kong iOS users targeted with watering hole attacksAppleSecurityaffairs
27.3.20Stealing videos from VLCIncindentSecurityaffairs
27.3.20No Patch for VPN Bypass Flaw Discovered in iOSAppleSecurityweek
27.3.20Spyware Delivered to iPhone Users in Hong Kong Via iOS ExploitsApple  ExploitSecurityweek
27.3.20AMD Confirms Hacker Stole Information on Graphics ProductsHackingSecurityweek
27.3.20

Malicious JavaScript Dropping Payload in the Registry

Virus

SANS

27.3.20

Across-the-board increase in DDoS attacks of all sizes

Attack

Net-security

27.3.20

Four ways to prevent data breaches

Incindent

Net-security

27.3.20

While many migrate security tools to the cloud, concerns remain

Security

Net-security

27.3.20

Researchers use AI and create early warning system to identify disinformation online

Security

Net-security
27.3.20

No, Corona Antivirus can’t fight COVID-19

Security

Net-security
27.3.20

Apple delivers March 2020 security updates for iDevices and software

Apple

Net-security
26.3.20Hackers hijack D-Link and Linksys routers to point users to coronavirus-themed sites serving malwareVirusSecurityaffairs
26.3.20FBI shuts down the Russian-based hacker platform DEER.IOBigBrothersSecurityaffairs
26.3.20WordPress WP-VCD malware delivered via pirated Coronavirus pluginsVirusSecurityaffairs
26.3.20China-linked APT41 group exploits Citrix, Cisco, Zoho flawsAPTSecurityaffairs
26.3.20Humio Raises $20 Million in Series B FundingITSecurityweek
26.3.20Credit Card Skimmer Found on Tupperware WebsiteCyberCrimeSecurityweek
26.3.20Apple Enables Full Third-Party Cookie Blocking in SafariAppleSecurityweek
26.3.20Remote Code Execution Vulnerability Patched in OpenWrtVulnerebilitySecurityweek
26.3.20

Apple Safari Blocks Ad-Targeting Cookie Support

Apple

Threatpost

26.3.20

Chinese Hackers Exploit Cisco, Citrix Flaws in Massive Espionage Campaign

APT  CyberSpy

Threatpost

26.3.20

GE Employees Lit Up with Sensitive Doc Breach

Incindent

Threatpost

26.3.20

Apple Update Fixes WebKit Flaws in iOS, Safari

Apple

Threatpost

26.3.20

TrickBot App Bypasses Non-SMS Banking 2FA

BotNet

Threatpost
26.3.20

Tupperware website has been compromised with a payment card skimmer

CyberCrime

Securityaffairs
26.3.20

China-linked APT41 group exploits Citrix, Cisco, Zoho flaws

APT

Securityaffairs
26.3.20

Insurance Giant Munich Re Invests in Rogue Device Mitigation Firm Sepio Systems

IT

Securityweek
26.3.20

Most Security Pros Prefer Enterprise Over Industrial Cybersecurity: Survey

ICS

Securityweek
26.3.20

Very Large Sample as Evasion Technique?

Virus

SANS

26.3.20

Evasive malware increasing, evading signature-based antivirus solutions

Virus

Net-security

26.3.20

As consumers turn online for purchases, many are targeted by pandemic-related digital fraud

CyberCrime

Net-security

26.3.20

Organizations struggle with patching endpoints against critical vulnerabilities

Vulnerebility

Net-security

26.3.20

Businesses can avoid fines if customer data is encrypted or redacted

Crypto

Net-security
26.3.20

Webinar: You don’t get a pass on cybersecurity during a crisis

Cyber

Net-security
25.3.20Fake Coronavirus Finder spread Ginp Mobile BankerVirusSecurityaffairs
25.3.20Most Security Pros Prefer Enterprise Over Industrial Cybersecurity: SurveyCyberSecurityweek
25.3.20FBI Shuts Down Hacker Platform, Arrests AdministratorBigBrothersSecurityweek
25.3.20Apple Patches Code Execution Vulnerabilities Across Product PortfolioAppleSecurityweek
25.3.20TrickBot Mobile App Bypasses 2‐Factor Authentication for Net Banking ServicesBotNet  VirusThehackernews
25.3.20

Password vulnerability at Fortune 1000 companies

Vulnerebility

Net-security
25.3.20Tor Browser 9.0.7 addresses a flaw that could allow unmasking Tor usersVulnerebilitySecurityaffairs
25.3.20Critical RCE Bug Affects Millions of OpenWrt-based Network DevicesVulnerebilitySecurityaffairs
25.3.20China's APT41 Exploited Citrix, Cisco, ManageEngine Flaws in Global CampaignAPTSecurityweek
25.3.20Impact of Coronavirus Outbreak on Early Stage Venture Investment in CybersecurityCyberSecurityweek
25.3.20Public ICS Hacking Tools Make It Easier to Launch Attacks: FireEyeICSSecurityweek
25.3.20GE Says Some Employees Hit by Data Breach at CanonIncindentSecurityweek
25.3.20

Cloud-native security considerations for critical enterprise workloads

Security

Net-security
25.3.20

Critical Adobe Flaw Fixed in Out-of-Band Security Update

Vulnerebility

Threatpost

25.3.20

Covid-19 Privacy Poll: Phone Tracking, Public Health and Surveillance

Mobil  Privacy

Threatpost

25.3.20

Tekya Malware Threatens Millions of Android Users via Google Play

Android

Threatpost

25.3.20

WHO Targeted in Espionage Attempt, COVID-19 Cyberattacks Spike

CyberSpy

Threatpost

25.3.20

Unknown ‘WildPressure’ Malware Campaign Lets Off Steam in Middle East

Virus

Threatpost
25.3.20

WildPressure, a new APT group targets the Middle East’s industrial sector

APT

Securityaffairs
25.3.20

Videolabs Patches Code Execution, DoS Vulnerabilities in libmicrodns Library

Vulnerebility

Securityweek
25.3.20

VMware Again Fails to Patch Privilege Escalation Vulnerability in Fusion

Vulnerebility

Securityweek
25.3.20

'WildPressure' Campaign Targets Industrial Sector in Middle East

APT

Securityweek
25.3.20

Critical RCE Bug Affects Millions of OpenWrt-based Network Devices

Vulnerebility

Thehackernews
25.3.20

Recent Dridex activity

Virus

SANS

25.3.20

How to secure customer data for SaaS success

Security

Net-security

25.3.20

Legal industry at great risk from insider data breache

Incindent

Net-security

25.3.20

Five steps to maintain business continuity during the coronavirus pandemic

Security

Net-security

25.3.20

Global 5G connections reach 17.7 million, 59 5G commercial networks live

Mobil

Net-security
24.3.20Adobe addressed a critical vulnerability in Adobe Creative Cloud App that allows deleting filesVulnerebilitySecurityaffairs
24.3.20Fortune 500 tech giant General Electric (GE) discloses data breach after Canon hackIncindentSecurityaffairs
24.3.20Microsoft, PayPal Invest in Anti-Fraud Startup Arkose LabsITSecurityweek
24.3.20Critical Flaw in Adobe Creative Cloud App Allows Hackers to Delete FilesVulnerebilitySecurityweek
24.3.20ZenKey: How Major Mobile Carriers Are Teaming Up to Eliminate PasswordsMobilSecurityweek
24.3.20WPvivid Backup Plugin Flaw Leads to WordPress Database LeakIncindentSecurityweek
24.3.20

Widely available ICS attack tools lower the barrier for attackers

ICS

Net-security
24.3.20Adobe addressed a critical vulnerability in Adobe Creative Cloud App that allows deleting filesVulnerebilitySecurityaffairs
24.3.20Fortune 500 tech giant General Electric (GE) discloses data breach after Canon hackIncindentSecurityaffairs
24.3.20Microsoft, PayPal Invest in Anti-Fraud Startup Arkose LabsITSecurityweek
24.3.20Critical Flaw in Adobe Creative Cloud App Allows Hackers to Delete FilesVulnerebilitySecurityweek
24.3.20ZenKey: How Major Mobile Carriers Are Teaming Up to Eliminate PasswordsMobilSecurityweek
24.3.20WPvivid Backup Plugin Flaw Leads to WordPress Database LeakIncindentSecurityweek
24.3.20

Hackers try to breach WHO, other COVID-19-fighting orgs

Virus

Net-security
24.3.20WildPressure targets industrial-related entities in the Middle EastAPTSecurelist
24.3.20MalwareBazaar – welcome to the abuse-ch malware repositoryVirusSecurityaffairs
24.3.20New York Attorney General asks domain registrars to crack down on coronavirus scam sitesSpamSecurityaffairs
24.3.20Over 50 Android Apps for Kids on Google Play Store Caught in Ad Fraud SchemeAndroidThehackernews
24.3.20

Fake Coronavirus ‘Vaccine’ Website Busted in DoJ Takedown

Virus

Threatpost

24.3.20

Microsoft Warns of Critical Windows Zero-Day Flaws

Vulnerebility

Threatpost

24.3.20

Apache Tomcat Exploit Poised to Pounce, Stealing Files

Exploit

Threatpost

24.3.20

Hackers Actively Exploit 0-Day in CCTV Camera Hardware

Exploit

Threatpost

24.3.20

Microsoft warns of targeted attacks exploiting Windows zero-day flaws

Vulnerebility

Securityaffairs
24.3.20

The University of Utah Health discloses security breach

Incindent

Securityaffairs
24.3.20

Authorities Warn of Escalating COVID-19-Themed Cyberattacks

Attack

Securityweek

24.3.20

Abuse.ch Launches Free Malware Repository

Virus

Securityweek
24.3.20

Coronavirus Confinement Challenges Intelligence Services

Cyber

Securityweek
24.3.20

Hackers Target Two Unpatched Flaws in Windows Adobe Type Manager Library

Vulnerebility

Securityweek

24.3.20

Warning — Two Unpatched Critical 0-Day RCE Flaws Affect All Windows Versions

OS  Vulnerebility

Thehackernews
24.3.20

Microsoft Windows Type 1 font parsing remote code execution vulnerabilities

Alert

Alert
24.3.20

Another Critical COVID-19 Shortage: Digital Security

Security

SANS

24.3.20

What’s preventing organizations from making pragmatic security decisions?

Security

Net-security

24.3.20

Python backdoor attacks and how to prevent them

Attack  Virus

Net-security

24.3.20

Social isolation is a risk factor for scam loss

Social  Spam

Net-security

24.3.20

Increasing number of false positives causing risk of alert fatigue

Security

Net-security

24.3.20

Top priorities for business leaders during COVID-19 crisis

Security

Net-security

24.3.20

Windows users under attack via two new RCE zero-days

Vulnerebility

Net-security

23.3.20

Operation Pangea: Europol dismantles criminal gangs selling coronavirus medicine, surgical masks

BigBrothersSecurityaffairs
23.3.20

Coronavirus-themed campaign delivers a new variant of Netwalker Ransomware

RansomwareSecurityaffairs
23.3.20

Vulnerability Exposed Tesla Central Touchscreen to DoS Attacks

Attack  VulnerebilitySecurityweek

23.3.20

Flaw in Password Managers Allowed Apps to Steal Credentials

VulnerebilitySecurityweek

23.3.20

University of Utah Health Discloses Data Breach

IncindentSecurityweek

23.3.20

538 Million Weibo users’ records being sold on Dark WebIncindentSecurityaffairs
23.3.20Botnet operators target multiple zero-day flaws in LILIN DVRsBotNet  Exploit  VulnerebilitySecurityaffairs
23.3.20New Mexico Agencies on Edge Amid Rising Ransomware AttacksRansomwareSecurityweek

23.3.20

Zero-Day Vulnerabilities in LILIN DVRs Exploited by Several BotnetsBotNet  Exploit  VulnerebilitySecurityweek

23.3.20

User Survey 2020 Report Shows Rapid Growth In Apache Pulsar AdoptionSecurityThehackernews

23.3.20

How to protect your online streaming accounts from cybercriminals?

CyberCrime

Net-security
23.3.20

Zyxel NAS, firewalls and LILIN DVRs and IP cameras conscripted into IoT botnet

BotNet  IoT

Net-security
23.3.20

Crowdsourced pentesting is not without its issues

Security

Net-security

23.3.20

Personal data protection today: We should demand more

SecurityNet-security

23.3.20

Keepnet Labs accidentally exposed an unprotected database with 5 Billion previously leaked records

Incindent

Securityaffairs
23.3.20

Coronavirus-themed attacks March 15 – March 21, 2020

Virus

Securityaffairs
23.3.20

Google addresses high severity bugs in Chrome

Vulnerebility

Securityaffairs

23.3.20

More COVID-19 Themed Malware

Virus

SANS
23.3.20

2020 cybersecurity risks: Insecure security tools, supply chains, abandonware

Cyber

Net-security
23.3.20

AI efforts are maturing from prototype to production, but obstacles remain

Security

Net-security

22.3.20

Microsoft Pauses New Edge Browser Versions Due to CoronavirusOS

Bleepingcomputer

22.3.20

Netwalker Ransomware Infecting Users via Coronavirus PhishingRansomware

Bleepingcomputer

22.3.20

UK Fintech Firm Finastra Hit By Ransomware, Shuts Down ServersRansomware

Bleepingcomputer

22.3.20

PwndLocker Fixes Crypto Bug, Rebrands as ProLock RansomwareRansomware

Bleepingcomputer

22.3.20

Extortion Emails Threaten to Infect Your Family With CoronavirusSpam  Virus

Bleepingcomputer

22.3.20

YouTube and Amazon Also Lowering Video Quality in EuropeIT

Bleepingcomputer

22.3.20

Audible Stories Give Parents a Break With Free Audio Books for ChildrenIT

Bleepingcomputer

22.3.20

FBI Warning: Phishing Emails Push Fake Govt Stimulus ChecksBigBrothers  Phishing

Bleepingcomputer

22.3.20

Firefox Reenables Insecure TLS to Improve Access to COVID19 InfoSecurity

Bleepingcomputer

22.3.20

Microsoft Shares Sneak Peek of Upcoming Windows 10 FeaturesOS

Bleepingcomputer

22.3.20

Rogers Data Breach Exposed Customer Info in Unsecured DatabaseIncindent

Bleepingcomputer

22.3.20

WHO Chief Impersonated in Phishing to Deliver HawkEye MalwarePhishing  Virus

Bleepingcomputer

22.3.20

Sodinokibi Ransomware Data Leaks Now Sold on Hacker ForumsRansomware

Bleepingcomputer

22.3.20

Netflix Reduces Video Quality in Europe by 25% to Lower LoadIT

Bleepingcomputer

22.3.20

Microsoft Delays Windows 10 1709 End of Service Due to PandemicOS

Bleepingcomputer

22.3.20

Netflix Party Lets You Watch Shows With Friends to Fight IsolationITBleepingcomputer

22.3.20

Microsoft Teams Reaches 44M Daily Users After 12M Weekly GainOS

Bleepingcomputer

22.3.20

RedLine Info-Stealing Malware Spread by Folding@home PhishingPhishing  Virus

Bleepingcomputer

22.3.20

Critical RCE Bug in Windows 7 and Server 2008 Gets MicropatchOS

Bleepingcomputer

22.3.20

Food Delivery Service in Germany Under DDoS AttackAttack  BigBrothers

Bleepingcomputer

22.3.20

Most Ransomware Gets Executed Three Days After Initial BreachRansomware

Bleepingcomputer

22.3.20

Ransomware Gangs to Stop Attacking Health Orgs During PandemicRansomware

Bleepingcomputer

22.3.20

Hackers Hide Malware C2 Communication By Faking News Site TrafficVirus

Bleepingcomputer

22.3.20

Google Prioritizes Security Updates After Halting Chrome ReleasesSafety

Bleepingcomputer

22.3.20

Trickbot, Emotet Malware Use Coronavirus News to Evade DetectionVirus

Bleepingcomputer

22.3.20

How to Change the Default Search Engine in Microsoft EdgeOS

Bleepingcomputer

22.3.20

Microsoft Scales Back Office 365 Features to Handle High LoadsOS

Bleepingcomputer

22.3.20

Emsisoft, Coveware Offer Free Ransomware Help During Coronavirus OutbreakRansomware

Bleepingcomputer

22.3.20

Adobe Fixes Nine Critical Vulnerabilities in Reader, AcrobatVulnerebility

Bleepingcomputer

22.3.20

VMware Fixes High Severity Privilege Escalation Bug in FusionVulnerebility

Bleepingcomputer

22.3.20

Firefox Password Manager To Be Secured With Windows 10 CredentialsOS

Bleepingcomputer

22.3.20

How to Protect Your Business During a Global Health Crisis

Safety blog

Sonicwall

22.3.20

EU Doc claims Russia spread COVID-19 disinfo to cause panic

BigBrother blog

Avast blog

22.3.20

Facing Facts: Clearview AI Case’s Impact on Consumers

Security blog

Avast blog

22.3.20

New Mirai Variant Targets Zyxel Network-Attached Storage Devices

BotNet blog

Palo Alto Unity42

22.3.20

The Best Method to Secure the Cloud Starts Offline

Cyber blog

Palo Alto

22.3.20

Launch a Remote SOC Today with Cortex XSOAR

Cyber blog

Palo Alto

22.3.20

Do MSSPs Have What it Takes to Win Today’s Cybersecurity War?

Cyber blog

Palo Alto

22.3.20

Book Review: “InSecurity”

Cyber blog

Palo Alto

22.3.20

Our March 16 Updated COVID-19 Guidance for Employees

Cyber blog

Palo Alto

22.3.20

New Coronavirus-themed attack uses fake WHO chief emails

Attack  Spam

Securityaffairs

22.3.20

UK Fintech company Finastra hit by a cyber attack

Attack

Securityaffairs

22.3.20

Mukashi, the new Mirai variant that targets Zyxel NAS

BotNet  IoT

Securityaffairs

22.3.20

Healthcare sector targeted : what you need to know about the hackers very unusual strategy

Hacking

Securityaffairs

22.3.20

Mozilla to Remove Support for FTP in Firefox

Security

Securityweek

22.3.20

Unprotected Database Exposed 5 Billion Previously Leaked Records

Incindent

Securityweek

22.3.20

Multiple DDoS Botnets Exploited 0-Day Flaws in LILIN DVR Surveillance Systems

BigBrothers  BotNet

Thehackernews

22.3.20

Mukashi: A New Mirai IoT Botnet Variant Targeting Zyxel NAS Devices

BotNet  IoT

Thehackernews

22.3.20

Honeypot - Scanning and Targeting Devices & Services

Safety

SANS

21.3.20

US Commerce Dept Shares Tips On Securing Virtual MeetingsBigBrothers

Bleepingcomputer

21.3.20

Windows 10 Secured-Core PCs Can Block Driver-Abusing MalwareOS

Bleepingcomputer

21.3.20

Windows Terminal v0.10 Released with Mouse Input SupportOS

Bleepingcomputer

21.3.20

Windows 10 Cumulative Update KB4541331 ReleasedOS

Bleepingcomputer

21.3.20

Nation-Backed Hackers Spread Crimson RAT via Coronavirus PhishingSpam  Virus

Bleepingcomputer

21.3.20

Microsoft Edge to Let You Set Custom Backgrounds for New TabsOS

Bleepingcomputer

21.3.20

New Nefilim Ransomware Threatens to Release Victims' DataRansomware

Bleepingcomputer

21.3.20

US Democratic Party Symbol Changed to a Rat in Google SearchBigBrothers

Bleepingcomputer

21.3.20

Google Chrome 82 to Enhance Privacy via New Cookie SettingsSafety

Bleepingcomputer

21.3.20

Windows 10 2004 to Upgrade WSL2 Linux Kernels via Windows UpdateOS

Bleepingcomputer

21.3.20

FBI Warns of Human Traffickers Luring Victims on Social NetworksBigBrothers

Bleepingcomputer

21.3.20

U.S. Health Department Site Hit With DDoS Cyber AttackAttack  BigBrothers

Bleepingcomputer

21.3.20

Windows 10 KB4551762 Security Update Fails to Install, Causes IssuesOS

Bleepingcomputer

21.3.20

Verily Coronavirus Screening Site Launches, Quickly Runs Out of SlotsCyber

Bleepingcomputer

21.3.20

Xbox Live and Support.xbox.com Experiencing an OutageSecurity

Bleepingcomputer

21.3.20

Folding@Home Now Has 23 Coronavirus Projects, Donate CPU Power!ITBleepingcomputer

21.3.20

‘AA’ RATED ADVANCED ENDPOINT PROTECTION

Safety blog

Cybereason

21.3.20

EAGLE VS. PANDA: DOES COVID-19 RHETORIC HAVE US ON THE BRINK OF WAR?

Safety blog

Cybereason

21.3.20

MEET THE ‘FUTUREPROOFED’ EDR PRODUCT WITH A VISION FOR WHERE THE MARKET IS STILL GOING

Safety blog

Cybereason

21.3.20

LAUNCHING NOW: CYBEREASON REMOTE WORKFORCE PROTECTION

Safety blog

Cybereason

21.3.20

JUST BECAUSE YOU’RE HOME DOESN’T MEAN YOU’RE SAFE

Security blog

Cybereason

21.3.20

A NOTE OF SUPPORT TO OUR CUSTOMERS DURING THE COVID-19 PANDEMIC

Cyber blog

Cybereason

21.3.20

GHOST IN THE MACHINE: RECONCILING AI AND TRUST IN THE CONNECTED WORLD

Malware blog

Cybereason

21.3.20

Staying Safe While Working Remotely

Security blog

Mcafee blog

21.3.20

SMBGhost – Analysis of CVE-2020-0796

Vulnerebility blog

Mcafee blog

21.3.20

Android/LeifAccess.A is the Silent Fake Reviewer Trojan

Malware blog

Mcafee blog

21.3.20

Mitigating Cybersecurity Threats Amid IT Talent Shortage

Cyber blog

F5 Labs

21.3.20

Cyber Threats Targeting Europe, Winter 2019

Cyber blog

F5 Labs

21.3.20

They Come in the Night: Ransomware Deployment Trends

Ransomware blog

FireEye

21.3.20

Six Facts about Address Space Layout Randomization on Windows

Security blog

FireEye

21.3.20

The Inside Scoop on a Six-Figure Nigerian Fraud Campaign

Spam blog

Checkpoint

21.3.20

Keep calm and carry on working (remotely)

Security blog

Eset

21.3.20

What to do if your Twitter account has been hacked

Social blog

Eset

21.3.20

Security flaws found in popular password managers

Vulnerebility blog

Eset

21.3.20

Work from home: Improve your security with MFA

Security blog

Eset

21.3.20

Stantinko’s new cryptominer features unique obfuscation techniques

Cryptocurrency blog

Eset

21.3.20

Work from home: How to set up a VPN

Security blog

Eset

21.3.20

FBI warns of human traffickers luring victims on dating apps

BigBrother blog

Eset

21.3.20

COVID‑19 and the shift to remote work

Security blog

Eset

21.3.20

Defying Covid-19’s Pall: Pwn2Own Goes Virtual

Congress

Threatpost

20.3.20

Experts found a new TrickBot module (rdpScanDll) built for RDP bruteforcing operationsVirusSecurityaffairs

20.3.20

ERT France – Pysa ransomware is targeting local governmentsRansomwareSecurityaffairs

20.3.20

Pwn2Own 2020 Day1 -researchers earned $180K for hacking Windows, Ubuntu, and macOSCongressSecurityaffairs

20.3.20

Oracle VirtualBox, Adobe Reader, Windows Hacked at Pwn2Own 2020CongressSecurityweek

20.3.20

Android Surveillance Campaign Leverages COVID-19 CrisisAndroidSecurityweek

20.3.20

Drupal Updates CKEditor to Patch XSS VulnerabilitiesVulnerebilitySecurityweek

20.3.20

NIST Updates Flagship SP 800-53 Security and Privacy ControlsBigBrothersSecurityweek

20.3.20

Google Patches High-Risk Chrome Flaws, Halts Upcoming ReleasesVulnerebilitySecurityweek

20.3.20

RDP-Capable TrickBot Targets Telecoms Sectors in U.S. and Hong KongVirusSecurityweek

20.3.20

NIST, DHS Publish Guidance on Securing Virtual Meetings, VPNsBigBrothersSecurityweek

20.3.20

California Man Gets Prison for Hacking Atlanta-Based CompanyHackingSecurityweek

20.3.20

Patch for Recently Disclosed VMware Fusion Vulnerability IncompleteVulnerebilitySecurityweek

20.3.20

The cybersecurity implications of working remotely

Cyber

Net-security

20.3.20

Overcoming crypto assessment challenges to improve quantum readines

Crypto

Net-security

20.3.20

How people deal with fake news or misinformation in their social media feeds

Social

Net-security

20.3.20

How finance leaders plan to react to COVID-19

Security

Net-security

20.3.20

ENISA looking for talented cybersecurity professionals

Cyber

Net-security

20.3.20

Google Advanced Protection users get new protections against Android malware

Android

Net-security

19.3.20

Is APT27 Abusing COVID-19 To Attack People ?!APTSecurityaffairs

19.3.20

Coronavirus news used by Emotet and Trickbot to evade detectionVirusSecurityaffairs

19.3.20

Authorities Eye Using Mobile Phone Tracking COVID-19’s Spread

Mobil

Threatpost

19.3.20

Magecart Cyberattack Targets NutriBullet Website

CyberCrime

Threatpost

19.3.20

Adobe Discloses Dozens of Critical Photoshop, Acrobat Reader Flaw

Vulnerebility

Threatpost

19.3.20

WordPress, Apache Struts Attract the Most Bug Exploits

Exploit

Threatpost

19.3.20

Azure Red Flag: Microsoft Accidentally Fixes Cloud Config ‘Bug’

Vulnerebility

Threatpost

19.3.20

Trend Micro Fixes Critical Flaws Under Attack

Attack  Vulnerebility

Threatpost

19.3.20

TrickBot Trojan Adds RDP Brute-Forcing to Its Arsenal

Virus

Threatpost

19.3.20

Hunting APTs with YARA

APT

Securelist

19.3.20

Cisco addresses multiple issues in its SD-WAN product

Security

Securityaffairs

19.3.20

Thousands of Coronavirus-related malicious domains are being created every day

Virus

Securityaffairs

19.3.20

Researchers Hack Windows, Ubuntu, macOS at Pwn2Own 2020

Congress

Securityweek

19.3.20

Cisco Patches Several Vulnerabilities in SD-WAN Solution

Vulnerebility

Securityweek

19.3.20

Researchers Track Coronavirus-Themed Cyberattacks

Attack

Securityweek

19.3.20

Analyzing Cyberspace Solarium Commission's Blueprint for a Cybersecure Nation

Cyber

Securityweek

19.3.20

COVID-19 Themed Multistage Malware

Virus

SANS

19.3.20

Too many alarms and too few security analysts? Think SOAR

Security

Net-security

19.3.20

Increase web application security without causing any user disruption

Security

Net-security

19.3.20

Exploring the risky behavior of IT security professionals

Security

Net-security

19.3.20

Organizations still struggle to manage foundational security

Security

Net-security

19.3.20

A week after Patch Tuesday, Adobe drops security fixes for six offerings

Vulnerebility

Net-security

18.3.20

VMware fixes high severity privilege escalation and DoS in its productsVulnerebilitySecurityaffairs

18.3.20

Adobe releases out-of-band patches for critical issues in Acrobat Reader, Photoshop, Bridge, ColdFusionVulnerebilitySecurityaffairs

18.3.20

Sixgill Introduces Dark Web Data Feed ProductSecuritySecurityweek

18.3.20

Adobe Patches Critical Flaws in Reader, ColdFusion, Other ProductsVulnerebilitySecurityweek

18.3.20

VMware Fixes Privilege Escalation Vulnerability in Fusion for MacVulnerebilitySecurityweek

18.3.20

Ransomware Is Mostly Deployed After Hours: ReportRansomwareSecurityweek

18.3.20

The Other Virus Threat: Surge in COVID-Themed CyberattacksAttackSecurityweek

18.3.20

Barr: FBI Probing If Foreign Gov't Behind HHS Cyber IncidentBigBrothersSecurityweek

18.3.20

Some commercial password managers vulnerable to attack by fake apps

Mobil

Net-security

18.3.20

Trend Micro addresses two issues exploited by hackers in the wild

Exploit

Securityaffairs

18.3.20

TrueFire Guitar tutoring website was hacked, financial data might have been exposed

Incindent

Securityaffairs

18.3.20

Hackers Crated Thousands of Coronavirus (COVID-19) Related Sites As Bait

Virus

Thehackernews

18.3.20

Adobe Releases Critical Patches for Acrobat Reader, Photoshop, Bridge, ColdFusion

Vulnerebility

Thehackernews

18.3.20

TrickBot Now Exploits Infected PCs to Launch RDP Brute Force Attacks

Attack  Exploit  Virus

Thehackernews

18.3.20

APT36 Taps Coronavirus as ‘Golden Opportunity’ to Spread Crimson RATAPT

Threatpost

18.3.20

A COVID-19 Cybersecurity Poll: Securing a Remote WorkforceVirus

Threatpost

18.3.20

Activities of a Nigerian Cybercriminal UncoveredCyberCrime

Threatpost

18.3.20

This Stalkerware Delivers Extra-Creepy FeaturesSecurity

Threatpost

18.3.20

Operators behind Nefilim Ransomware threaten to release stolen dataRansomwareSecurityaffairs

18.3.20

Most ransomware attacks take place outside the working hoursRansomwareSecurityaffairs

18.3.20

Corporate Finance firms leak 500K+ legal and financial documents onlineIncindentSecurityaffairs

18.3.20

Ursnif campaign targets Italy with a new infection ChainSpam  VirusSecurityaffairs

18.3.20

Trend Micro Patches Two Vulnerabilities Exploited in the WildExploit  VulnerebilitySecurityweek

18.3.20

Financial Services Firms Exposed 500,000 Sensitive DocumentsIncindentSecurityweek

18.3.20

Tech Companies Partner to Securely Connect IoT to CloudIoTSecurityweek

18.3.20

Private Application Access Firm Axis Security Emerges From StealthSecuritySecurityweek

18.3.20

Two Dozen Arrested for Laundering Funds From BEC, Other ScamsSpamSecurityweek

18.3.20

TrueFire Guitar Tutoring Website Suffers Magecart-style Credit Card BreachIncindentThehackernews

18.3.20

Trickbot gtag red5 distributed as a DLL file

Spam  Virus

SANS

18.3.20

Security is leaving the data center and moving to the edge

Security

Net-security

18.3.20

Healthcare cybersecurity in the time of coronaviru

Cyber  Virus

Net-security

18.3.20

Over 60% of the Fortune 1000 had at least one public breach over the last decade

Incindent

Net-security

18.3.20

How financial services firms are handling data privacy

Privacy

Net-security

17.3.20

A Quick Summary of Current Reflective DNS DDoS Attacks

Attack

SANS

17.3.20

The parabola of a prolific cyber-criminal known as Dton

CyberCrime

Securityaffairs

17.3.20

Attackers use a new CoronaVirus Ransomware to cover Kpot Infostealer infections

Ransomware

Securityaffairs

17.3.20

Users Complain About Windows Update That Patches SMBGhost Vulnerability

Vulnerebility

Securityweek

17.3.20

Senate Votes to Renew Surveillance Powers, Delaying Changes

BigBrothers

Securityweek

17.3.20

Rare Android Stalkerware Can Steal Data, Control Devices

Android

Securityweek

17.3.20

Researchers Uncover a Nigerian Hacker's Pursuit of his Million Dollar Dream

Hacking

Thehackernews

17.3.20

How to avoid a costly enterprise ransomware infection

Ransomware

Net-security

17.3.20

Convincing Google Impersonation Opens Door to MiTM, PhishingPhishing

Threatpost

17.3.20

Microsoft Edge Shares Privacy-Busting Telemetry, Research AllegesPrivacy

Threatpost

17.3.20

Aerial Direct, the O2’s largest UK partner suffered a data breachIncindentSecurityaffairs

17.3.20

Most organizations have yet to fix CVE-2020-0688 Microsoft Exchange flawVulnerebilitySecurityaffairs

17.3.20

A cyberattack hits the US Department of Health and Human ServicesAttack  BigBrothersSecurityaffairs

17.3.20

HHS Says DDoS Attack Failed to Cause DisruptionAttackSecurityweek

17.3.20

PE Firm to Buy Application Security Specialist Checkmarx at $1.15 Billion ValuationITSecurityweek

17.3.20

Organizations Slow to Patch Targeted Microsoft Exchange VulnerabilityVulnerebilitySecurityweek

17.3.20

COVID-19 Themed Phishing Campaigns ContinuePhishingSecurityweek

17.3.20

Slack Vulnerability Allowed Hackers to Hijack AccountsVulnerebilitySecurityweek

17.3.20

Playing the infinite game with threat intelligence and cyber fusion

Cyber

Net-security

17.3.20

Why ransomware continues to knock on healthcare’s door, enter, and create havoc

Ransomware

Net-security

17.3.20

WordPress and Apache Struts weaponized vulnerabilities on the rise

Vulnerebility

Net-security

17.3.20

Unplanned work makes it hard to deliver digital transformation

Security

Net-security

17.3.20

Coronavirus: You don’t get a pass when it comes to cybersecurity

Cyber

Net-security

17.3.20

Guide: Supplier CCPA readiness for security and IT teams

Security

Net-security

16.3.20

MonitorMinor, the outstanding stalkerware can track Gmail, WhatsApp, Instagram, and FacebookSocialSecurityaffairs

16.3.20

ProtonMail, ProtonVPN Will Use Alternative Routing to Bypass CensorshipVulnerebilitySecurityweek

16.3.20

Fake Covid-19 tracker app delivers ransomware, disinformation abounds

Ransomware

Net-security

16.3.20

MonitorMinor: vicious stalkerwareVirusSecurelist

16.3.20

Open Exchange Rates discloses a security breachIncindentSecurityaffairs

16.3.20

Experts warn of a new strain of ransomware, the PXJ RansomwareRansomwareSecurityaffairs

16.3.20

Many Backdoors Found in Zyxel CloudCNM SecuManager SoftwareVirusSecurityweek

16.3.20

Europol Arrests 26 SIM Swapping Fraudsters For Stealing Over $3 MillionCyberCrime  MobilThehackernews

16.3.20

Coronavirus-themed attacks February 1 – March 15, 2020AttackSecurityaffairs

16.3.20

Noooo, now Ancient Tortoise BEC scammers are launching Coronavirus-Themed attacksAttack  SpamSecurityaffairs

16.3.20

Massive cyber attack hit the town hall of Marseille ahead local electionAttackSecurityaffairs

16.3.20

BlackWater, a malware that uses Cloudflare Workers for C2 CommunicationVirusSecurityaffairs

16.3.20

How National Security Surveillance Nabs More Than SpiesBigBrothersSecurityweek

16.3.20

Desktop.ini as a post-exploitation tool

Exploit

SANS

16.3.20

How organizations can maintain a third-party risk management program from day one

Security

Net-security

16.3.20

Phishing is a huge concern among security decision-makers and influencers

Phishing

Net-security

16.3.20

Three actions to boost your organization’s resilience against coronavirus disruptions

Security

Net-security

16.3.20

Can 5G make you more vulnerable to cyberattacks?

Mobil

Net-security

16.3.20

Early investment in quantum computing could result in a competitive advantage

Security

Net-security

15.3.20

List of Free Software and Services During Coronavirus OutbreakVirus

Bleepingcomputer

15.3.20

BlackWater Malware Abuses Cloudflare Workers for C2 CommunicationVirus

Bleepingcomputer

15.3.20

Research Finds Microsoft Edge Has Privacy-Invading TelemetryPrivacy

Bleepingcomputer

15.3.20

COVID-19 Testing Center Hit By CyberattackAttack

Bleepingcomputer

15.3.20

Slack Bug Allowed Automating Account Takeover AttacksVulnerebility

Bleepingcomputer

15.3.20

Google Is Not Creating a Nationwide Coronavirus Info SiteSecurity

Bleepingcomputer

15.3.20

Ancient Tortoise BEC Scammers Launch Coronavirus-Themed AttackAttack  Spam

Bleepingcomputer

15.3.20

US Govt Shares Tips on Securing VPNs Used by Remote WorkersBigBrothers

Bleepingcomputer

15.3.20

Microsoft Unveils New Windows 10 Automatic Driver Update PlanOS

Bleepingcomputer

15.3.20

Europol Dismantles SIM Swap Criminal Groups That Stole MillionsCyberCrime  Mobil

Bleepingcomputer

15.3.20

VMWare Releases Fix for Critical Guest-to-Host VulnerabilityVulnerebility

Bleepingcomputer

15.3.20PornHub Helps Italians Stay Indoors with Free Premium AccessIT

Bleepingcomputer

15.3.20WordPress Plugin Bug Allows Malicious Code Injection on 100K SitesVirus

Bleepingcomputer

15.3.20Open Exchange Rates Data Breach Affects Users of Well-Known OrgsIncindent

Bleepingcomputer

15.3.20Discord Offers Enhanced Go Live Streaming Due to CoronavirusVirus

Bleepingcomputer

15.3.20Office 365 ATP To Block Email Domains That Fail AuthenticationSafety

Bleepingcomputer

15.3.20New CoronaVirus Ransomware Acts as Cover for Kpot InfostealerRansomware

Bleepingcomputer

15.3.20Microsoft Releases KB4551762 Security Update for SMBv3 VulnerabilityOS

Bleepingcomputer

15.3.20Hackers Get $1.6 Million for Card Data from Breached Online ShopsIncindent

Bleepingcomputer

15.3.2048K Windows Hosts Vulnerable to SMBGhost CVE-2020-0796 RCE AttacksVulnerebility

Bleepingcomputer

15.3.20Advanced Russian Hackers Use New Malware in Watering Hole OperationVirus

Bleepingcomputer

15.3.20Google Chrome Gets 'Default to Guest' Mode for Stateless BrowsingSecurity

Bleepingcomputer

15.3.20Windows Registry Helps Find Malicious Docs Behind InfectionsVirus

Bleepingcomputer

15.3.20DDR4 Memory Still At Rowhammer Risk, New Method Bypasses FixesVulnerebility

Bleepingcomputer

15.3.20Intel Patches High Severity Flaws in Windows Graphics DriversVulnerebility

Bleepingcomputer

15.3.20Microsoft Releases the March 2020 Security Updates for OfficeOS

Bleepingcomputer

15.3.20Ransom NewsRansomRansom

15.3.20

Strength in Numbers: SonicWall Named New Member of Cyber Threat Alliance

Cyber blog

Sonicwall

15.3.20

Details leaked on Windows SMBGhost bug

Vulnerebility blog

Avast blog

15.3.20

Be Vigilant About Performing ‘Security Hygiene’ During Coronavirus Threat

Malware blog

Avast blog

15.3.20

5 tips to fight mobile adware

Malware blog

Avast blog

15.3.20

Facing Facts: Clearview AI Case’s Impact on Consumers

Security blog

Avast blog

15.3.20

Cathay Pacific leaks data of 9.4 million customers

Incident blog

Avast blog

15.3.20

Threat Brief: Microsoft SMBv3 Wormable Vulnerability CVE-2020-0796

Vulnerebility blog

Palo Alto Unity42

15.3.20

2020 Unit 42 IoT Threat Report

IoT blog

Palo Alto Unity42

15.3.20

Cortex XDR™ Detects New Phishing Campaign Installing NetSupport Manager RAT

Malware blog  Phishing blog

Palo Alto Unity42

15.3.20

The Art of Automation: Creating Threat Intelligence Bots in the Cloud

Cyber blog

Palo Alto

15.3.20

Busted by Cortex XDR: a True Story of Human Intuition and AI

Cyber blog

Palo Alto

15.3.20

CCPA, GDPR and Beyond: How Data Loss Prevention Can Help with Compliance

Cyber blog

Palo Alto

15.3.20

Securely Connect and Scale Remote Workforces

Cyber blog

Palo Alto

15.3.20

Palo Alto Networks Statement Regarding COVID-19 (Coronavirus)

Cyber blog

Palo Alto

15.3.20

4 Steps to Reduce IoT Risk in Your Enterprise

Cyber blog

Palo Alto

15.3.20

Our March 6 COVID-19 Guidance for Palo Alto Networks Employees

Cyber blog

Palo Alto

15.3.20

How Prisma Cloud Secures Cloud Native App Development with DevOps Plugins

Cyber blog

Palo Alto
15.3.20Trump signed a bill to help small telecoms replace Huawei equipmentBigBrothersSecurityaffairs
15.3.20Slack bugs allowed take over victims’ accountsVulnerebilitySecurityaffairs
15.3.20A bug in Tor Browser allows execution of JavaScript even in Safest security levelVulnerebilitySecurityaffairs
15.3.20One of the major COVID-19 testing laboratories in Czech hit by cyberattackAttackSecurityaffairs
14.3.20Nasty Phishing Scam Pretends to Be Your HIV Test ResultsPhishing

Bleepingcomputer

14.3.20Microsoft March 2020 Patch Tuesday Fixes 115 VulnerabilitiesOS

Bleepingcomputer

14.3.20Microsoft Leaks Info on Wormable Windows SMBv3 CVE-2020-0796 FlawOS

Bleepingcomputer

14.3.20Entercom Radio Giant Says Data Breach Exposed User CredentialsIncindent

Bleepingcomputer

14.3.20Firefox 74 Released: Security Fixes, Improvements, and FixesVulnerebility

Bleepingcomputer

14.3.20Windows 10 Cumulative Update KB4540673 & KB4538461 ReleasedOS

Bleepingcomputer

14.3.20Microsoft Takes Control of Necurs U.S.-Based InfrastructureBigBrothers

Bleepingcomputer

14.3.20Paradise Ransomware Distributed via Uncommon Spam AttachmentRansomware

Bleepingcomputer

14.3.20New LVI Intel CPU Data Theft Vulnerability Requires Hardware FixVulnerebility

Bleepingcomputer

14.3.20Malware Unfazed by Google Chrome's New Password, Cookie EncryptionVirus

Bleepingcomputer

14.3.20Google Play Protect Miserably Fails Android Protection TestsAndroid

Bleepingcomputer

14.3.20Intricate Phishing Scam Uses Support Chatbot to ‘Assist’ VictimsPhishing

Bleepingcomputer

14.3.20NSA Warns About Microsoft Exchange Flaw as Attacks StartBigBrothers

Bleepingcomputer

14.3.20Malware Spread as Nude Extortion Pics of Friend's GirlfriendVirus

Bleepingcomputer

14.3.20Folding@Home Wants Your CPU Cycles for Coronavirus ResearchITBleepingcomputer
14.3.20Windows 10 PowerToys Excitement Builds as New Toys AnnouncedOS

Bleepingcomputer

14.3.20Twitter First: Trump Video Retweet Tagged as 'Manipulated Media'Social

Bleepingcomputer

14.3.20Ryuk Ransomware Behind Durham, North Carolina CyberattackRansomware

Bleepingcomputer

14.3.20Google Stops Issuing Security Warnings About Microsoft EdgeSecurity

Bleepingcomputer

14.3.20New US Bill Aims to Protect Researchers who Disclose Govt BackdoorsBigBrothersBleepingcomputer
14.3.20WHO'S HACKING THE HACKERS: NO HONOR AMONG THIEVESMalware blogCybereason
14.3.20GHOST IN THE MACHINE: RECONCILING AI AND TRUST IN THE CONNECTED WORLDMalware blogCybereason
14.3.20Cyber Threats Targeting Middle East, Winter 2019Cyber blogF5 Labs
14.3.20Crescendo: Real Time Event Viewer for macOSOS BlogFireEye
14.3.20Vicious Panda: The COVID CampaignMalware blogCheckpoint
14.3.20Microsoft Patch Tuesday — March 2020: Vulnerability disclosures and Snort coverageVulnerebility blog

Cisco Talos

14.3.20Vulnerability Spotlight: Information disclosure in Windows 10 KernelVulnerebility blog

Cisco Talos

14.3.20Vulnerability Spotlight: WAGO products contain remote code execution, other vulnerabilitiesVulnerebility blogCisco Talos
14.3.20Beware scams exploiting coronavirus fearsExploit blog

Eset

14.3.20Radio.com users affected in data breachIncident blog

Eset

14.3.204:15 p.m.: An urgent message from the CEOSecurity blog

Eset

14.3.20The pitfalls of being an influencer: What parents should know and doSecurity blogEset
14.3.20European power grid organization hit by cyberattackAttack blog

Eset

14.3.20Tracking Turla: New backdoor delivered via Armenian watering holesAPT blogEset
14.3.20Flaw in popular VPN service may have exposed customer dataVulnerebility blog

Eset

14.3.20Microsoft: 99.9 percent of hacked accounts didn’t use MFAHacking blogEset
14.3.20Coronavirus-Themed APT Attack Spreads MalwareAPT

Threatpost

14.3.20Working from Home: COVID-19’s Constellation of Security ChallengesSecurity

Threatpost

14.3.20ACLU Sues Over U.S. Airport Facial-Recognition TechnologyBigBrothers

Threatpost

14.3.20WordPress Plugin Bug in Popup Builder Threatens 100K WebsitesVulnerebility

Threatpost

14.3.20European police arrested tens of members of two SIM Hijacking GangsCyberCrime  MobilSecurityaffairs
14.3.20VMware fixes a critical bug in Workstation, Fusion that allows code execution on host From guestVulnerebilitySecurityaffairs
14.3.20Cookiethief, the Android malware that hijacks Facebook accountsAndroidSecurityaffairs
14.3.20European Authorities Dismantle Two SIM Hijacking GangsCyberCrime  MobilSecurityweek
14.3.20US Surveillance Powers Set to Temporarily ExpireBigBrothersSecurityweek
14.3.20Flaws in Popup Builder Plugin Impacted Over 100,000 WordPress SitesVulnerebilitySecurityweek
14.3.20Microsoft Deprecates Remote Desktop Connection ManagerOSSecurityweek
14.3.20Critical Flaw in VMware Workstation, Fusion Allows Code Execution on Host From GuestVulnerebilitySecurityweek
14.3.20China-linked APT Hackers Launch Coronavirus-Themed AttacksAPTSecurityweek
13.3.20State-sponsored hackers are launching Coronavirus-themed attacksAPTSecurityaffairs
13.3.20Flaws in the Popup Builder WordPress plugin expose 100K+ websites to hackVulnerebilitySecurityaffairs
13.3.20Russia-Linked Turla APT uses new malware in watering hole attacksAPTSecurityaffairs
13.3.20U.S. Senators Seek to Ban TikTok on Government DevicesBigBrothersSecurityweek
13.3.20Trump Signs Bill to Help Telecoms Replace Huawei EquipmentBigBrothersSecurityweek
13.3.20House Strikes Deal to Extend Surveillance PowersBigBrothersSecurityweek
13.3.20'Cookiethief' Android Malware Hijacks Facebook AccountsAndroidSecurityweek
13.3.20Currency Data Provider 'Open Exchange Rates' Discloses BreachIncindentSecurityweek
13.3.20New Android Cookie-Stealing Malware Found Hijacking Facebook AccountsAndroidThehackernews
13.3.20

VMware Patches for Bugs in DHCP Service (Workstation, Fusion, Horizon, VMRC)

Vulnerebility

SANS

13.3.20

Number of open source vulnerabilities surged in 2019

Vulnerebility

Net-security

13.3.20

Akamai Talks Massive Uptick in Credential-Stuffing Attacks Against Bank APIs

Attack  CyberCrime

Threatpost

13.3.20

Researchers Warn of Novel PXJ Ransomware Strain

Ransomware

Threatpost

13.3.20

Trojan Raids Android Users’ Cookie Jars

Android

Threatpost

13.3.20

$100K Paid Out for Google Cloud Shell Root Compromise

Security

Threatpost

13.3.20Microsoft fixes CVE-2020-0796, the SMBv3 wormable bug recently leakedVulnerebilitySecurityaffairs
13.3.20Card data stole from the Volusion security breach surfaces on the dark webIncindentSecurityaffairs
13.3.20Facebook Takedowns Reveal Sophistication of Russian TrollsSocialSecurityweek
13.3.20Out-of-Band Windows Updates Patch Wormable SMB VulnerabilityVulnerebilitySecurityweek
13.3.20Russia-Linked Turla Cyberspies Add More Malware to ArsenalBigBrothers  CyberSpySecurityweek
13.3.20Google Releases Tool to Block USB Keystroke Injection AttacksAttackSecurityweek
13.3.20Several Vulnerabilities Expose Phoenix Contact Industrial 4G Routers to AttacksAttack  Mobil  VulnerebilitySecurityweek
13.3.20Auth0 Adds Threat Intelligence Tools to Identification PlatformSafetySecurityweek
13.3.20Critical Patch Released for 'Wormable' SMBv3 Vulnerability — Install It ASAP!VulnerebilityThehackernews
13.3.20

Not all Ethernet NICs are Created Equal - Trying to Capture Invalid Ethernet Frames

Security

SANS
13.3.20

The human element in security is still needed to combat application vulnerabilities

Vulnerebility

Net-security

13.3.20

DDoS attacks could affect next generation 911 call systems

Attack

Net-security
13.3.20

Cloud + BYOD + IoT = major security gap

IoT  Safety

Net-security
13.3.20

Most computers easy to hack due to vulnerability in memory chips

Vulnerebility

Net-security
13.3.20

How to begin tapping the full value of your data

Security

Net-security
12.3.20Cookiethief: a cookie-stealing Trojan for AndroidAndroidSecurelist
12.3.20Experts disclose tens of flaws in Zyxel Cloud CNM SecuManager, includes dangerous backdoorsVulnerebilitySecurityaffairs
12.3.20Hacking a network, using an ‘invisibility cloak’ – Is it that simple?HackingSecurityaffairs
12.3.20Crooks use weaponized coronavirus map to deliver malwareVirusSecurityaffairs
12.3.20Talos found tens of dangerous flaws in WAGO ControllersICSSecurityaffairs
12.3.20Vulnerability Prompts Avast to Disable Emulator Used by AntivirusVulnerebilitySecurityweek
12.3.20Tech Must Be Treated Like Tobacco, Says Facebook WhistleblowerSocialSecurityweek
12.3.20Google Offering Higher Bonuses for Cloud Platform VulnerabilitiesVulnerebilitySecurityweek
12.3.20Microsoft SMBv3 compression remote code execution vulnerabilityAlertAlert
12.3.20Necurs Botnet in Crosshairs of Global Takedown OffensiveBotNet

Threatpost

12.3.20Wormable, Unpatched Microsoft Bug Threatens Corporate LANsVirus  Vulnerebility

Threatpost

12.3.20More Than Half of IoT Devices Vulnerable to Severe AttacksIoT

Threatpost

12.3.20New TrickBot Variant Updates Anti-Analysis TricksBotNet  Virus

Threatpost

12.3.20Flaws Riddle Zyxel’s Network Management SoftwareVulnerebility

Threatpost

12.3.20Phishing Attack Skirts Detection With YouTubeAttack  Phishing

Threatpost

12.3.20Avast disables the JavaScript engine component due to a severe issueVulnerebilitySecurityaffairs
12.3.20RCE in popular ThemeREX WordPress Plugin has been actively exploitedExploitSecurityaffairs
12.3.20Intel Patches 27 Vulnerabilities Across Product PortfolioVulnerebilitySecurityweek
12.3.20

Hancitor distributed through coronavirus-themed malspam

Spam

SANS
12.3.20

Scientists expose another security flaw in Intel processors

Vulnerebility

Net-security

12.3.20

The haphazard response to COVID-19 demonstrates the value of enterprise risk management

Safety

Net-security
12.3.20

Applying the 80/20 rule to cloud security

Security

Net-security
12.3.20

Economic impact and perceptions around the cybersecurity gender gap

Cyber

Net-security
12.3.20

Rising threats call for primary cyber resilience, new strategies for governments

BigBrothers

Net-security
11.3.20

Office network at the European Network of Transmission System Operators for Electricity (ENTSO-E) breached

Incindent

Securityaffairs
11.3.20

Bugs in Avast AntiTrack expose users to cyber attacks

Vulnerebility

Securityaffairs
11.3.20

Microsoft’s Patch Tuesday updates for March 2020 fix 115 issues

Vulnerebility

Securityaffairs
11.3.20

Microsoft accidentally reveals Wormable Win SMBv3 CVE-2020-0796 Flaw

Vulnerebility

Securityaffairs
11.3.20

Microsoft disrupted US-Based Infrastructure of the Necurs botnet

Vulnerebility

Securityaffairs
11.3.20

Critical Vulnerabilities in SAP Solution Manager Expose Companies to Attacks

Vulnerebility

Securityweek
11.3.20

US Needs Top Cyber Coordinator, Better Hacker 'Deterrence': Panel

Cyber

Securityweek
11.3.20

Tens of Vulnerabilities Expose WAGO Controllers, HMI Panels to Attacks

Vulnerebility

Securityweek
11.3.20

Firefox 74 Patches Vulnerabilities, Disables TLS 1.0 and 1.1

Vulnerebility

Securityweek
11.3.20

SOC-as-a-Service Specialist Arctic Wolf Raises $60 Million

IT

Securityweek
11.3.20

Dating App Maker Match Group Backs US Bill Seen as Privacy Threat

Privacy

Securityweek
11.3.20

Avast AntiTrack Flaw Allows MitM Attacks on HTTPS Traffic

Vulnerebility

Securityweek
11.3.20

Microsoft Working on Patches for Wormable SMB Vulnerability

Vulnerebility

Securityweek
11.3.20

European Electrical Energy Organization Discloses Breach

Incindent

Securityweek
11.3.20

Microsoft Patches 115 Vulnerabilities in Windows, Other Products

Vulnerebility

Securityweek
11.3.20

Microsoft Cracks Infrastructure of Infamous Necurs Botnet

BotNet

Securityweek
11.3.20

Facebook Awards $55,000 for Flaw That Could Lead to Account Hijacking

Security

Securityweek
11.3.20

Akamai's CDN Logs Uncover Emerging Phishing Attacks

Phishing

Securityweek
11.3.20

Beware of 'Coronavirus Maps' – It's a malware infecting PCs to steal passwords

Virus

Thehackernews
11.3.20

Warning — Unpatched Critical 'Wormable' Windows SMBv3 Flaw Disclosed

Vulnerebility

Thehackernews
11.3.20

Microsoft Issues March 2020 Updates to Patch 115 Security Flaws

Vulnerebility

Thehackernews
11.3.20

L1ght Looks to Protect Internet Users from Toxic and Predatory Behavior

Safety

Thehackernews
11.3.20

Poor Rowhammer Fixes On DDR4 DRAM Chips Re-Enable Bit Flipping Attacks

Attack

Thehackernews
11.3.20

Microsoft Hijacks Necurs Botnet that Infected 9 Million PCs Worldwide

Vulnerebility

Thehackernews
11.3.20

LVI Attacks: New Intel CPU Vulnerability Puts Data Centers At Risk

Vulnerebility

Thehackernews
11.3.20

Critical SMBv3 Vulnerability: Remote Code Executio

Vulnerebility

SANS
11.3.20

Coronavirus as an opportunity to evolve security architecture

Virus

Net-security

11.3.20

Wormable Windows SMBv3 RCE flaw leaked, but not patched

Vulnerebility

Net-security
11.3.20

Cybercriminals leveraging coronavirus outbreak to execute ransomware attacks

Ransomware

Net-security
11.3.20

DNS over HTTPS misuse or abuse: How to stay secure

Security

Net-security
11.3.20

IRS scams during tax season target unsuspecting consumers

Spam

Net-security
11.3.20

Multi-cloud and edge deployments threatened by security and connectivity problems

Security

Net-security
11.3.20

Excel template: Plan and monitor your security spending

Safety

Net-security
10.3.20Hackers use hackers spreading tainted hacking tools in long-running campaignHackingSecurityaffairs
10.3.20FBI arrested a Russian citizen suspected to be the mastermind of Deer.ioBigBrothersSecurityaffairs
10.3.20Microsoft warns of Human-Operated Ransomware as a growing threat to businessesRansomwareSecurityaffairs
10.3.20Load Value Injection: Intel CPUs Vulnerable to Reverse Meltdown AttackAttackSecurityweek
10.3.20Attacks Targeting Recent Microsoft Exchange Flaw Ramping UpAttackSecurityweek
10.3.20Hackers Hack Hacking Tools to Hack HackersHackingSecurityweek
10.3.20Hackers Exploiting Recently Patched ManageEngine Desktop Central VulnerabilityExploitSecurityweek
10.3.20Durham City, County Recovering After Ransomware AttackRansomwareSecurityweek
10.3.20AT&T, Palo Alto Networks and Broadcom Develop Firewall FrameworkSafetySecurityweek
10.3.20

Hackers are getting hacked via trojanized hacking tools

Virus

Net-security
10.3.20

Microsoft Exchange Server Flaw Exploited in APT Attacks

Attack  Vulnerebility

Threatpost

10.3.20

AMD Downplays CPU Threat Opening Chips to Data Leak Attacks

Attack

Threatpost

10.3.20

Former CIA employee Joshua Schulte was convicted of only minor charges

BigBrothers

Securityaffairs
10.3.20

Revista Factum suffered week-long cyber attacks for denouncing corruption by the president of El Salvador

BigBrothers

Securityaffairs
10.3.20

Google Allows Enrolling Security Keys on More Devices

Security

Securityweek
10.3.20

WatchGuard Technologies to Acquire Panda Security

Security

Securityweek
10.3.20

Minor Convictions for Ex-CIA Coder in Hacking Tools Case

BigBrothers

Securityweek
10.3.20

Proposed Bill Seeks to Protect Researchers Disclosing Classified Government Backdoors

BigBrothers

Securityweek
10.3.20

Facilities That Lost Data Center Status at Increased Risk of Cyberattacks: GAO

Cyber

Securityweek
10.3.20

Human-Operated Ransomware Is a Growing Threat to Businesses: Microsoft

Ransomware

Securityweek
10.3.20

Ex-CIA Accused of Leaking Secret Hacking Tools to WikiLeaks Gets Mistrial

BigBrothers

Thehackernews
10.3.20

Malicious Spreadsheet With Data Connection and Excel 4 Macros

Spam  Virus

SANS
10.3.20

Why a risk-based approach to application security can bolster your defenses

Security

Net-security

10.3.20

What is open threat intelligence and what is driving it?

Security

Net-security
10.3.20

PPP Daemon flaw opens Linux distros, networking devices to takeover attacks

Vulnerebility

Net-security
10.3.20

Researchers develop data exchange approach with blockchain-based security features

Security

Net-security
10.3.20

eBook: Automating Incident Response

Security

Net-security
9.3.20Take A Way: Exploring the Security Implications of AMD’s Cache Way PredictoPapersPapers
9.3.20Australia’s privacy watchdog sues Facebook over Cambridge Analytica scandalBigBrothers  SocialSecurityaffairs
9.3.20Nation-state actors are exploiting CVE-2020-0688 Microsoft Exchange server flawVulnerebilitySecurityaffairs
9.3.20Researchers Disclose Two New Attacks Against AMD CPUsAttackSecurityweek
9.3.20Aussie Watchdog Sues Facebook Over Cambridge Analytica BreachIncindent  SocialSecurityweek
9.3.20Virgin Media Accused of Downplaying Security IncidentIncindentSecurityweek
9.3.209 Years of AMD Processors Vulnerable to 2 New Side-Channel AttacksAttackThehackernews
9.3.20

Coronavirus-themed scams and attacks intensify

Virus

Net-security
9.3.20Sodinokibi Ransomware operators threaten to leak ‘dirty’ financial data of a companyRansomwareSecurityaffairs
9.3.20The City of Durham shut down its network after Ryuk Ransomware attackRansomwareSecurityaffairs
9.3.20Netgear fixes a critical RCE that could allow to takeover Flagship Nighthawk routersVulnerebilitySecurityaffairs
9.3.20New Coronavirus-themed malspam campaign delivers FormBook MalwareSpam  VirusSecurityaffairs
9.3.20Facebook sues Namecheap to protect people from domain name fraudSocialSecurityaffairs
9.3.20

Excel Maldocs: Hidden Sheets

Spam

SANS
9.3.20

Maximizing customer engagement when fraud prevention is top of mind

Incindent

Net-security

9.3.20

Europe’s Gaia-X cloud service faces a difficult future

Security

Net-security
9.3.20

Automate manual security, risk, and compliance processes in software development

Security

Net-security
9.3.20

SymTCP: New approach to protecting Army systems without massive amounts of manual intervention

BigBrothers

Net-security
9.3.20

Passwords still dominant authentication method, top cause of data breaches

Incindent

Net-security
8.3.20How to Use Google Chrome Extensions and Themes in Microsoft EdgeOS

Bleepingcomputer

8.3.20Data-Stealing FormBook Malware Preys on Coronavirus FearsVirus

Bleepingcomputer

8.3.20Ransomware Threatens to Reveal Company's 'Dirty' SecretsRansomware

Bleepingcomputer

8.3.20Zoho Fixes No-Auth RCE Zero-Day in ManageEngine Desktop CentralVulnerebility

Bleepingcomputer

8.3.20US Govt Shares Tips to Defend Against Coronavirus Cyber ScamsBigBrothers

Bleepingcomputer

8.3.20FBI Warns of BEC Attacks Abusing Microsoft Office 365, Google G SuiteBigBrothers

Bleepingcomputer

8.3.20Telus-Owned Koodo Mobile Announces Data Breach, Stolen Info for SaleIncindent

Bleepingcomputer

8.3.20Windows 10 KB4535996 Update Issues: Crashes, Slowdowns, Audio, MoreOS

Bleepingcomputer

8.3.20Emotet Actively Using Upgraded WiFi Spreader to Infect VictimsVirus

Bleepingcomputer

8.3.20TrickBot Malware Targets Italy in Fake WHO Coronavirus EmailsVirus

Bleepingcomputer

8.3.20Windows 10 Insider Build 19577 Released With New Windows Security IconOS

Bleepingcomputer

8.3.20US Govt Adds Stricter Requirements for .gov Domain RegistrationBigBrothers

Bleepingcomputer

8.3.20Microsoft Issues Fix for Windows 10 Drivers Blocked by Core IsolationOS

Bleepingcomputer

8.3.20Virgin Media Data Breach Exposes Info of 900,000 CustomersIncindent

Bleepingcomputer

8.3.20

Microsoft Shares Tactics Used in Human-Operated Ransomware AttacksRansomwareBleepingcomputer
8.3.20Ransom NewsRansomRansom
8.3.20PwndLocker Ransomware Gets Pwned: Decryption Now AvailableRansomware

Bleepingcomputer

8.3.20Attackers Deliver Malware via Fake Website Certificate ErrorsVirus

Bleepingcomputer

8.3.20T-Mobile Data Breach Exposes Customer's Personal, Financial InfoIncindent

Bleepingcomputer

8.3.20YouTube Web Site Subscriptions are Broken, Videos Not Displayed [Fixed]Vulnerebility

Bleepingcomputer

8.3.20Ryuk Ransomware Attacked Epiq Global Via TrickBot InfectionRansomware

Bleepingcomputer

8.3.20Carnival Cruise Line Operator Discloses Potential Data BreachIncindent

Bleepingcomputer

8.3.20J.Crew Disables User Accounts After Credential Stuffing AttackAttack  CyberCrime

Bleepingcomputer

8.3.20Microsoft Releases PowerShell 7.0 With New Features, Update AlertsOS

Bleepingcomputer

8.3.20Microsoft, Google Offer Free Remote Work Tools Due to CoronavirusIT

Bleepingcomputer

8.3.20Windows Explorer Used by Mailto Ransomware to Evade DetectionRansomware

Bleepingcomputer

8.3.20Microsoft Reveals a New Design for the Windows 10 Start MenuOS

Bleepingcomputer

8.3.20Zero-Day Bug Allowed Attackers to Register Malicious DomainsVulnerebility  Virus

Bleepingcomputer

8.3.20Let's Encrypt to Revoke 3 Million TLS Certificates Due to BugVulnerebility

Bleepingcomputer

8.3.20

Ransomware Attackers Use Your Cloud Backups Against YouRansomware

Bleepingcomputer

8.3.20Microsoft Releases March 2020 Office Updates With Fixes, ImprovementsVulnerebility

Bleepingcomputer

8.3.20

FBI lists cybercrime trends of 2019

BigBrother blogAvast blog
8.3.20

Cathay Pacific leaks data of 9.4 million customers

Incident blogAvast blog
8.3.20

Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations

BigBrother blogPalo Alto Unity42
8.3.20

Busted by Cortex XDR: Network Traffic Analysis in Action

Cyber blog

Palo Alto

8.3.20

Our March 6 COVID-19 Guidance for Palo Alto Networks Employees

Cyber blog

Palo Alto

8.3.20

Breaking Down Silos with DevSecOps

Cyber blog

Palo Alto

8.3.20

Why Proxy-Based Firewalls Are Not Enough

Cyber blog

Palo Alto

8.3.20

Securing Serverless Applications with Prisma Cloud

Cyber blog

Palo Alto

8.3.20

Book Review: “No Place to Hide”

Cyber blog

Palo Alto

8.3.20

Book Review: “The Perfect Weapon”

Cyber blog

Palo Alto

8.3.20

5 Cybersecurity Issues to Address in the Asia-Pacific Region

Cyber blog

Palo Alto

8.3.20

Book Review: “CISO Compass”

Cyber blog

Palo Alto

8.3.20

RSAC Day Three – Highlights from Social Media

Cyber blog

Palo Alto

8.3.20

EVRAZ operations in North America disrupted by Ryuk ransomwareRansomwareSecurityaffairs

7.3.20

UK NCSC Releases Tips on Securing Smart Security CamerasBigBrothers

Bleepingcomputer

7.3.20

German BSI Tells Local Govt Authorities Not to Pay RansomsBigBrothers

Bleepingcomputer

7.3.20

Chinese Security Firm Says CIA Hackers Attacked China Since 2008BigBrothers

Bleepingcomputer

7.3.20

SETI@home Search for Alien Life Project Shuts Down After 21 YearsIT

Bleepingcomputer

7.3.20

Cisco Offering Free 90-day Webex Licenses Due to CoronavirusIT

Bleepingcomputer

7.3.20

Nemty Ransomware Punishes Victims by Posting Their Stolen DataRansomware

Bleepingcomputer

7.3.20

US Charges Two With Laundering $100M for North Korean HackersBigBrothers  Cryptocurrency

Bleepingcomputer

7.3.20

Microsoft MVP Summit Now A Virtual Conf Over Coronavirus FearsSecurity

Bleepingcomputer

7.3.20

Windows 10 Y3K Bug: Won't Install After January 18, 3001OS

Bleepingcomputer

7.3.20

New PwndLocker Ransomware Targeting U.S. Cities, EnterprisesRansomware

Bleepingcomputer

7.3.20

Active Scans for Apache Tomcat Ghostcat Vulnerability Detected, Patch NowVulnerebility

Bleepingcomputer

7.3.20

US Drugstore Giant Walgreens Leaked Users' Sensitive InfoIncindent

Bleepingcomputer

7.3.20

Windows 10 1909 Starts Getting Microsoft's New Fluent IconsOS

Bleepingcomputer

7.3.20

New Evasion Encyclopedia Shows How Malware Detects Virtual MachinesVirus

Bleepingcomputer

7.3.20

How to Pause Windows 10 Automatic Updates To Avoid Critical BugsOS

Bleepingcomputer

7.3.20

CVE-2019-0090 flaw affects Intel Chips released in the last 5 yearsVulnerebility

Securityaffairs

7.3.20

CODE INTEGRITY IN THE KERNEL: A LOOK INTO CI.DLLMalware blogCybereason

7.3.20

Multi-tricks HiddenAds Malware

Malware blog

Mcafee blog

7.3.20

Android/LeifAccess.A is the Silent Fake Reviewer TrojanMalware blogMcafee blog

7.3.20

Multi-tricks HiddenAds MalwareMalware blogF5 Labs

7.3.20

Cyber Threats Targeting Asia, Winter 2019Cyber blogF5 Labs

7.3.20

New Perl Botnet (Tuyul) Found with Possible Indonesian AttributionBotNet blogF5 Labs

7.3.20

Is Your Organization Ready for COVID-19?Malware blog

Cisco Talos

7.3.20

Bisonal: 10 years of playSecurity blog

Cisco Talos

7.3.20

Video: What defenders can learn from past ransomware attacksRansomware blog

Eset

7.3.20

Virgin Media data leak exposes details of almost 1 million peopleIncident blog

Eset

7.3.20

Guildma: The Devil drives electricSecurity blog

Eset

7.3.20

Fraud Prevention Month: How to protect yourself from scamsSpam blog

Eset

7.3.20

Voice assistants can be hacked with ultrasonic wavesHacking blogEset

7.3.20

Brave comes out on top in browser privacy studySecurity blog

Eset

7.3.20

5 reasons to consider a career in cybersecurityCyber blogEset

7.3.20

Critical Zoho Zero-Day Flaw DisclosedVulnerebility

Threatpost

7.3.20

Spread of Coronavirus-Themed Cyberattacks Persists with New AttacksAttack  Virus

Threatpost

7.3.20

Next-Gen Ransomware Packs a ‘Human’ Punch, Microsoft WarnsRansomware

Threatpost

7.3.20

Travel leisure company Carnival Corporation discloses data breachIncindentSecurityaffairs

7.3.20

Expert publicly discloses Zoho ManageEngine zero-day on TwitterSocialSecurityaffairs

7.3.20

US, UK and Estonia Accuse Russia of Cyber Attack on Georgia

BigBrothers

Securityweek

7.3.20

IoT Security Firm Ordr Increases Funding to $50 Million

IoT

Securityweek

7.3.20

Accenture Acquires UK-Based Context Information Security for $140 Million

IT

Securityweek

7.3.20

Facebook Sues Namecheap Over Fraudulent Domains

Social

Securityweek

7.3.20

This Unpatchable Flaw Affects All Intel CPUs Released in Last 5 Years

Vulnerebility

Thehackernews

7.3.20

Chain Reactor: Simulate Adversary Behaviors on Linux

OS  Security

SANS

6.3.20

TrickBot targets Italy using fake WHO Coronavirus emails as baitSpam  VirusSecurityaffairs
6.3.20Virgin Media disclose data breach, over 900,000 Customers impactedIncindentSecurityaffairs
6.3.20Most of Linux distros affected by a critical RCE in PPP Daemon flawVulnerebilitySecurityaffairs
6.3.20FBI Working to 'Burn Down' Cyber Criminals' InfrastructureBigBrothersSecurityweek

6.3.20

Let's Encrypt Will Not Replace 1 Million Bug-Affected CertificatesVulnerebilitySecurityweek
6.3.20Zoho Working on Patch for Zero-Day Vulnerability in ManageEngine ProductVulnerebilitySecurityweek
6.3.20Virgin Media Exposed Personal Information of 900,000 PeopleIncindentSecurityweek
6.3.20Virgin Media Data Leak Exposes Details of 900,000 CustomersIncindentThehackernews
6.3.20

Unsecured databases continue leaking millions of records

Incindent

Net-security

6.3.20

Microsoft releases PowerShell 7 for Windows, macOS and Linux

OS

Net-security

6.3.20Let’s Encrypt Pushes Back Deadline to Revoke Some TLS CertificatesSecurity

Threatpost

6.3.20Trump, Sanders Are the Top Brands for CybercriminalsBigBrothers  CyberCrime

Threatpost

6.3.20

High-Severity Cisco Webex Flaws FixedVulnerebility

Threatpost

6.3.20Zynga Faces Lawsuit Over Massive Words with Friends BreachIncindent

Threatpost

6.3.20Chris Eng: Patch Management Challenges Drive ‘Security Debt’Vulnerebility

Threatpost

6.3.20Malware campaign employs fake security certificate updatesVirus

Threatpost

6.3.20US Lawmakers Propose Internet Controls to Fight Child PornBigBrothersSecurityweek
6.3.20China's TikTok Lures ADP Security Chief to Become New CISOBigBrothersSecurityweek

6.3.20

Nearly 1 Million Domains Use DMARC, but Only 13% Prevent Email SpoofingSpamSecurityweek
6.3.20Cathay Pacific Airways Fined Over Long-Running BreachIncindentSecurityweek
6.3.20Critical PPP Daemon Flaw Opens Most Linux Systems to Remote HackersVulnerebilityThehackernews
6.3.20

A Safe Excel Sheet Not So Safe

Security

SANS
6.3.20

March 2020 Patch Tuesday forecast: Let’s put the madness behind us

Vulnerebility

Net-security

6.3.20

Your cybersecurity strategy could use some ESP

Cyber

Net-security
6.3.20

Hackers using hidden mobile apps and unique distribution methods to target consumers

Mobil

Net-security
6.3.20

Corporate cybersecurity concerns and spend continue to rise, but so do breaches

Incindent

Net-security
6.3.20

54% of healthcare vendors have experienced a data breach of protected health information

Incindent

Net-security

5.3.20

Fake alerts about outdated security certificates lead to malware

Virus

Net-security

5.3.20

Hackers gained access to T-Mobile customers and employee personal info

Incindent

Securityaffairs

5.3.20

Cruise Operator Carnival Discloses 2019 Data Breach

Incindent

Securityweek

5.3.20

Vulnerability in Intel Chipsets Allows Hackers to Obtain Protected Data

Safety

Securityweek

5.3.20

Hackers Scanning for Apache Tomcat Servers Vulnerable to Ghostcat Attacks

Attack

Securityweek

5.3.20

A Massive U.S. Property and Demographic Database Exposes 200 Million Records

Incindent

Thehackernews

5.3.20

Hackers Compromise T-Mobile Employee' Email Accounts and Steal User' Data

Incindent

Thehackernews

5.3.20

You Can Now Run Android on an iPhone With 'Project Sandcastle'

Android  Apple

Thehackernews

5.3.20

Mokes and Buerak distributed under the guise of security certificates

Security

Securelist
5.3.20Hundreds of Microsoft sub-domains open to hijackingHackingSecurityaffairs
5.3.20Cisco addresses high severity RCE flaws in Webex PlayerVulnerebilitySecurityaffairs
5.3.20Most of the attacks on Telecom Sector in 2019 were carried out by China-linked hackersBigBrothersSecurityaffairs
5.3.20T-Mobile Notifying Customers of Data BreachIncindentSecurityweek
5.3.20Over 600 Microsoft Subdomains Can Be Hijacked: ResearchersHackingSecurityweek
5.3.20pppd vulnerable to buffer overflow due to a flaw in EAP packet processingAlertAlert
5.3.20Loyalty Cards Targeted in Tesco Clubcard AttackAttack

Threatpost

5.3.20Microsoft OneNote Used To Sidestep Phishing DetectionPhishing

Threatpost

5.3.20Critical Netgear Bug Impacts Flagship Nighthawk RouterVulnerebility

Threatpost

5.3.20US Lawmakers Told of Security Risks From China-owned TikTokBigBrothersSecurityweek
5.3.20Cisco Patches Remote Code Execution Flaws in Webex PlayerVulnerebilitySecurityweek
5.3.20Hamas-Linked Hackers Add Insurance and Retail to Target ListBigBrothers  HackingSecurityweek
5.3.20

Will You Put Your Password in a Survey?

Safety

SANS
5.3.20

Vulnerability allows attackers to register malicious lookalikes of legitimate web domains

Vulnerebility  Virus

Net-security

5.3.20

Most enterprises choose multi-cloud strategies, 55% plan to invest in data virtualization

Security

Net-security
5.3.20

Devices on 5G networks demand differentiated security solutions

Mobil

Net-security
5.3.20

Email domains without DMARC enforcement spoofed nearly 4X as often

Safety  Spam

Net-security
5.3.20

Guide: 10 critical issues to cover in your vendor security questionnaires

Security

Net-security
4.3.20

Let's Encrypt Revoking 3 Million Certificates

Safety

Net-security
4.3.20

Visser Precision, a part maker for Tesla, Boeing, and Lockheed Martin hit with data-stealing ransomware

Ransomware

Securityaffairs
4.3.20

Iranian government blocked Wikipedia Farsi due Coronavirus outbreak

BigBrothers

Securityaffairs
4.3.20

D.C. Council Passes Data Security Legislation

BigBrothers

Securityweek
4.3.20

A Zero-Day Homograph Domain Name Attack

Attack  Vulnerebility

Securityweek
4.3.20

Bug Forces Let's Encrypt to Revoke 3 Million Certificates

Vulnerebility

Securityweek
4.3.20

Let’s Encrypt will revoke 3m+ TLS/SSL certificates

Safety

Net-security
4.3.20Let’s Encrypt CA is revoking over 3 Million TLS certificates due to a bugVulnerebilitySecurityaffairs
4.3.20Google addresses over 70 flaws in Android, including a remotely exploitable issueAndroid  ExploitSecurityaffairs
4.3.20CIA Hacking unit APT-C-39 hit China since 2008BigBrothersSecurityaffairs
4.3.20CIA Hackers Targeted China in Decade-Long Campaign: Chinese Security FirmBigBrothersSecurityweek
4.3.20Let's Encrypt Revoking 3 Million TLS Certificates Issued Incorrectly Due to a BugVulnerebilityThehackernews
4.3.20

Ransomware getting more fearsome, but there’s reason for optimism

Ransomware

Net-security

4.3.20Have I Been Pwned No Longer For SaleSecurity

Threatpost

4.3.20DoppelPaymer Ransomware Used to Steal Data from Supplier to SpaceX, TeslaRansomware

Threatpost

4.3.20MediaTek Bug Actively Exploited, Affects Millions of Android DevicesAndroid  Exploit

Threatpost

4.3.20Cobalt Ulster Strikes Again With New ForeLord MalwareVirusThreatpost
4.3.20Let’s Encrypt to Revoke Millions of TLS CertsSafetyThreatpost
4.3.20The North Korean Kimsuky APT threatens South Korea evolving its TTPsAPT  BigBrothersSecurityaffairs
4.3.20Nemty ransomware operators launch their data leak siteRansomwareSecurityaffairs
4.3.20Mobile Payment Fraud on the RiseMobilSecurityweek
4.3.20Google Patches Critical Remotely Exploitable Android BugAndroidSecurityweek
4.3.20Google Launches Free Fuzzer Benchmarking ServiceITSecurityweek
4.3.20Legal Services Firm Epiq Hit by RansomwareRansomwareSecurityweek
4.3.20Researchers Claim CIA Was Behind 11-Year-Long Hacking Attacks Against ChinaBigBrothersThehackernews
4.3.20

How adaptive trust makes security efficient

Security

Net-security

4.3.20

A massive increase in eCrime behavior can easily disrupt business operations

CyberCrime

Net-security

4.3.20

Online payment fraud attempts see 73% increase

CyberCrime

Net-security

4.3.20

Social engineering: Mind the identity verification gap

Security

Net-security
3.3.20US officials charge two Chinese men for laundering cryptocurrency for North KoreaBigBrothersSecurityaffairs
3.3.20Super Tuesday Marks First Major Security Test of 2020SecuritySecurityweek
3.3.20Telecom Sector Increasingly Targeted by Chinese Hackers: CrowdStrikeBigBrothersSecurityweek
3.3.20U.S. Government Warns of Continuous Election Meddling EffortsBigBrothersSecurityweek
3.3.20Coder Charged in Massive CIA Leak Portrayed as VindictiveBigBrothersSecurityweek
3.3.20U.S. Charges Two Chinese Nationals Linked to North Korean Hacker AttacksBigBrothersSecurityweek
3.3.20

Introduction to EvtxEcmd (Evtx Explorer)

Safety

SANS
3.3.20

How to gather cyber threat intelligence from dark markets without breaking US law

BigBrothers

Net-security

3.3.20Cisco offers free 90-day Webex Licenses due to coronavirus outbreakVulnerebilitySecurityaffairs
3.3.20A bug in the Walgreens mobile app leaked customers’ messagesVulnerebility

Securityaffairs

3.3.20Experts warn of mass scans for Apache Tomcat Ghostcat flawVulnerebilitySecurityaffairs
3.3.20Patches Released for WordPress Plugin Vulnerabilities Exploited in AttacksVulnerebilitySecurityweek
3.3.20SurfingAttackPapersPapers
3.3.20SurfingAttackAttackAttack
3.3.20Walgreens Mobile App Leaks Prescription DataMobil

Threatpost

3.3.20Gamer Alert: Serious Nvidia Flaw Plagues Graphics DriverVulnerebility

Threatpost

3.3.20TrickBot Adds ActiveX Control, Hides Dropper in ImagesVirus

Threatpost

3.3.20NetSupport Manager RAT Spread via Bogus NortonLifeLock DocsVirus

Threatpost

3.3.20Forrester: Keeping Smart Cities Safe From HacksHacking

Threatpost

3.3.20Karkoff 2020: a new APT34 espionage operation involves Lebanon GovernmentAPT

Securityaffairs

3.3.20SurfingAttack – hacking phones via ultrasonic wavesAttackSecurityaffairs
3.3.20Businesses at Risk for Cyberattack But Take Few PrecautionsCyberSecurityweek
3.3.20Checkpoint Creates Encyclopedia of Malware Evasion TechniquesVirusSecurityweek
3.3.20Railroad Construction Firm RailWorks Falls Victim to RansomwareRansomwareSecurityweek
3.3.202 Chinese Charged with Laundering $100 Million for North Korean HackersBigBrothersThehackernews
3.3.20

Soon, your password will expire permanently

Security

Net-security

3.3.20

Security operations and the evolving landscape of threat intelligence

Security

Net-security

3.3.20

Do you have a data breach response plan?

Safety

Net-security

3.3.20

Researchers use ultrasound waves vibrating through tables to access cellphones

Security

Net-security
3.3.20

Download guide: Advanced Threat Protection Beyond the AV

Security

Net-security

3.3.20

Orgs that sacrifice mobile security are twice as likely to suffer a compromise

Mobil

Net-security
2.3.20Venezuela – Power outage knocked out part of the internet connectivityBigBrothersSecurityaffairs
2.3.20NVIDIA Patches DoS Flaws in GPU Driver and vGPU SoftwareVulnerebilitySecurityweek
2.3.20Walgreens Discloses Data Breach Related to Mobile AppIncindent  MobilSecurityweek
2.3.20Regulators Move to Fine Telecoms for Selling Location DataBigBrothersSecurityweek
2.3.20Hackers Can Use Ultrasonic Waves to Secretly Control Voice Assistant DevicesHackingThehackernews
2.3.20$1B to help telecom carriers to “rip and replace” Huawei and ZTE equipmentMobilSecurityaffairs
2.3.20Nemty ransomware “LOVE_YOU” malspam campaignRansomwareSecurityaffairs
2.3.2049 million unique email addresses of Straffic Marketing firm exposed onlineIncindentSecurityaffairs
2.3.20Russian spies are attempting to tap transatlantic undersea cablesBigBrothersSecurityaffairs
2.3.20US Congress Passes Bill Funding 'Rip and Replace' for Huawei GearBigBrothersSecurityweek
2.3.20

Secure vs. cleartext protocols - couple of interesting stats

Safety

SANS
2.3.20

Kali Linux evolution: What’s next for the open source pentesting Linux distro?

OS

Net-security

2.3.20

5 considerations for building a zero trust IT environment

Security

Net-security

2.3.20

You are focusing too much on vulnerabilities that pose little danger

Vulnerebility

Net-security

2.3.20

Exploring the impact that hybrid cloud is having on enterprise security and IT teams

Security

Net-security
1.3.20Chrome and Firefox Extension Lets You View Deleted Web PagesSecurity

Bleepingcomputer

1.3.20

Hiding Windows File Extensions is a Security Risk, Enable NowSecurity

Bleepingcomputer

1.3.20US Railroad Contractor Reports Data Breach After Ransomware AttackRansomware

Bleepingcomputer

1.3.20How to Clean Install Windows 10 2004 Before Official ReleaseOS

Bleepingcomputer

1.3.20NVIDIA Fixes High Severity Flaw in Windows GPU Display DriverVulnerebility

Bleepingcomputer

1.3.20

Hackers Use Windows 10 RDP ActiveX Control to Run TrickBot DropperVirus

Bleepingcomputer

1.3.20Critical Bugs in WordPress Plugins Let Hackers Take Over SitesVulnerebility

Bleepingcomputer

1.3.20Sodinokibi Ransomware Posts Alleged Data of Kenneth Cole Fashion GiantRansomware

Bleepingcomputer

1.3.2049 Million Unique Emails Exposed Due to Mishandled CredentialsSpam

Bleepingcomputer

1.3.20

Windows 10 KB4535996 Update Fixes Search, Printing IssuesOS

Bleepingcomputer

1.3.20Microsoft Edge Now Lets You Block Potentially Unwanted ProgramsOS

Bleepingcomputer

1.3.20Windows 10 2004 Is Coming, Released to Enterprise for TestingOS

Bleepingcomputer

1.3.20As Coronavirus Spreads, So Does Covid-19 Themed MalwareVirus

Bleepingcomputer

1.3.20Nemty Ransomware Actively Distributed via 'Love Letter' SpamRansomware

Bleepingcomputer

1.3.20

Cerberus Android Malware Can Bypass 2FA, Unlock Devices RemotelyAndroid

Bleepingcomputer

1.3.20FBI Says $140+ Million Paid to Ransomware, Offers Defense TipsRansomware

Bleepingcomputer

1.3.20

Cisco Working on Patches for New Kr00k WiFi VulnerabilityVulnerebility

Bleepingcomputer

1.3.20Norton LifeLock Phishing Scam Installs Remote Access TrojanPhishing  Virus

Bleepingcomputer

1.3.20Ransom NewsRansomRansom

1.3.20

SonicWall Wins Best UTM Security Solution at SC Awards 2020

Safety blog

Sonicwall

1.3.20

Catapult the Wi-Fi User Experience: Fast, Secure & Easy to Manage

Safety blog

Sonicwall

1.3.20

Cyberattacks target government agencies

BigBrother blog

Avast blog

1.3.20

Cortex XDR™ Detects New Phishing Campaign Installing NetSupport Manager RAT

Malware blog

Palo Alto Unity42

1.3.20

Deepfakes Extend the Concept of “Fake News,” and They’re Here to Stay

Cyber blog

Palo Alto

1.3.20

Book Review: “CISO Compass”

Cyber blog

Palo Alto

1.3.20

RSAC Day Three – Highlights from Social Media

Congress blog

Palo Alto

1.3.20

Book Review: “Digital Resilience”

Cyber blog

Palo Alto

1.3.20

RSAC Day Two – Highlights from Social Media

Congress blog

Palo Alto

1.3.20

The Role of Identity Access Management (IAM) in Cloud Security

Cyber blog

Palo Alto

1.3.20

Google Chronicle Integrates with Cortex XSOAR

Cyber blog

Palo Alto

1.3.20

Cortex XDR Earns “AA” Rating on NSS Labs 2020 AEP Test

Cyber blog

Palo Alto

1.3.20

RSAC Day One – Highlights from Social Media

Congress blog

Palo Alto

1.3.20

The Cortex XSOAR Ecosystem is Exploding with Partner-Owned Integrations

Cyber blog

Palo Alto

1.3.20

Redefining Security Orchestration and Automation with Cortex XSOAR

Cyber blog

Palo Alto

1.3.20

SQL Dump from BGR India Shared on Hacker ForumHacking

Bleepingcomputer

1.3.20Sodinokibi Ransomware May Tip NASDAQ on Attacks to Hurt Stock PricesRansomware

Bleepingcomputer

1.3.20Google Takes Aim at Microsoft Edge With Flurry of AdsOS

Bleepingcomputer

1.3.20Credit Card Skimmer Uses Fake CDNs To Evade DetectionSecurity

Bleepingcomputer

1.3.20

Hackers Scanning for Vulnerable Microsoft Exchange Servers, Patch Now!Vulnerebility

Bleepingcomputer

1.3.20DoppelPaymer Hacked Bretagne Télécom Using the Citrix ADC FlawVulnerebility

Bleepingcomputer

1.3.20Microsoft Rolls Out the New Edge Browser to Windows 10 UsersOS

Bleepingcomputer

1.3.20Kr00k Bug in Broadcom, Cypress WiFi Chips Leaks Sensitive InfoVulnerebility

Bleepingcomputer

1.3.20

Brave Browser Integrates Wayback Machine to View Deleted Web PagesSecurity

Bleepingcomputer

1.3.2018 Sniffers Steal Payment Card Data from Print Store CustomersCyberCrime

Bleepingcomputer

1.3.20Multiple WordPress Plugin Vulnerabilities Actively Being AttackedVulnerebility

Bleepingcomputer

1.3.20Microsoft Wants to do Away with Windows 10 Local AccountsOS

Bleepingcomputer

1.3.20

Hazelcast IMDG Discover Scan

Security

SANS
1.3.20

Sodinokibi Ransomware gang threatens to disclose data from Kenneth Cole fashion firm

Ransomware

Securityaffairs
1.3.20

Crooks are attempting to take over tens of thousands of WordPress sites

Security

Securityaffairs
1.3.20

US Railroad firm RailWorks discloses a data breach after a ransomware attack

Ransomware

Securityaffairs