Calendar 2020 May- Home  2020  2019  2018  2017  2016

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2020 - January February March April May June July August September October November December


Date

Name

Category

Web

30.5.20

VALAK: MORE THAN MEETS THE EYE

Malware blog

Cybereason

30.5.20

LOVE YOUR ENEMIES BEFORE YOU DESTROY THEM — HACKING FOR GOOD

Hacking blog

Cybereason

30.5.20

Turing in His Grave: What Human CAPTCHA Solvers Reveal About Control Design

Security blog

FireEye

30.5.20

As Healthcare Industry Transforms Overnight, Tech Community Must Act

Cyber blog

FireEye

30.5.20

Fraudulent Unemployment Claims Signal Consumers to Step Up Personal Identity Protection

Incident blog

FireEye

30.5.20

Bringing VandaTheGod down to Earth: Exposing the person behind a 7-year hacktivism campaign

Hacking blog

Checkpoint

30.5.20

Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta

Security blog

Cisco Talos

30.5.20

People know reusing passwords is risky – then do it anyway

Security blog

Eset

30.5.20

Critical Android flaw lets attackers hijack almost any app, steal data

OS Blog

Eset

30.5.20

Crooks threaten to leak customer data stolen from e‑commerce sites

Incident blog

Eset

30.5.20

From Agent.BTZ to ComRAT v4: A ten‑year journey

Malware blog

Eset

30.5.20

Two years later, has GDPR fulfilled its promise?

Security blog

Eset
30.5.20NTT Communications Data Breach Affects Customers, Threatens Supply ChainIncindent

Threatpost

30.5.20NSA Warns of Sandworm Backdoor Attacks on Mail ServersBigBrothers

Threatpost

30.5.20ACLU Sues Clearview AI Over Faceprint Collection, SaleSecurityThreatpost
30.5.20‘Hack-For-Hire’ Firms Spoof WHO To Target Google CredentialsHackingThreatpost
30.5.20Steganography Anchors Pinpoint Attacks on Industrial TargetsAttack  ICSThreatpost
30.5.20ICT solutions provider NTT Com discloses security breachIncindent

Securityaffairs

30.5.20Himera and AbSent-Loader Leverage Covid19 luresVirus

Securityaffairs

30.5.20Google Takes Action Against Misleading and Malicious Notifications in ChromeVirus

Securityweek

30.5.20New Yorker Indicted for Stealing Card Data via SQL Injection AttacksAttackSecurityweek
30.5.20NSA Publishes IOCs Associated With Russian Targeting of Exim ServersBigBrothers

Securityweek

30.5.20NetBeans Projects on GitHub Targeted in Apparent Supply Chain AttackAttackSecurityweek
30.5.20Exclusive – Any Mitron (Viral TikTok Clone) Profile Can Be Hacked in SecondsHackingThehackernews
30.5.20

The Impact of Researchers on Our Data

Security

SANS
29.5.2026 million LiveJournal accounts being shared on hacker forumsIncindent

Bleepingcomputer

29.5.20Windows 10 Storage Sense and Disk Cleanup merged in new appOS

Bleepingcomputer

29.5.20Arbonne MLM data breach exposes user passwords, personal infoIncindent

Bleepingcomputer

29.5.20Critical Android bug lets malicious apps hide in plain sightAndroid

Bleepingcomputer

29.5.20List of ransomware that leaks victims' stolen files if not paidRansomware

Bleepingcomputer

29.5.20New [F]Unicorn ransomware hits Italy via fake COVID-19 infection mapRansomware

Bleepingcomputer

29.5.20Hacking group builds new Ketrum malware from recycled backdoorsVirus

Bleepingcomputer

29.5.20Russian cyberspies use Gmail to control updated ComRAT malwareBigBrothers  Virus

Bleepingcomputer

29.5.20Hacker extorts online shops, sells databases if ransom not paidRansomware

Bleepingcomputer

29.5.20Windows Hello is getting two new features in Windows 10 2004OS

Bleepingcomputer

29.5.20The zero-day exploits of Operation WizardOpiumAPT  ExploitSecurelist
29.5.20Octopus Scanner Malware: open source supply chain attack via NetBeans projects on GitHubVirusSecurityaffairs
29.5.20An archive with 20 Million Taiwanese’ citizens leaked in the dark webIncindent

Securityaffairs

29.5.20Steganography in targeted attacks on industrial enterprises in Japan and EuropeAttack

Securityaffairs

29.5.20Cisco to Buy Network Intelligence Firm ThousandEyesIT

Securityweek

29.5.20Germany Confronts Russian Ambassador Over CyberattackBigBrothersSecurityweek
29.5.20Design Marketplace Minted Confirms Recent Data BreachIncindent

Securityweek

29.5.20Cisco Servers Hacked via Salt VulnerabilitiesVulnerebilitySecurityweek
29.5.20

Hackers breached six Cisco servers through SaltStack Salt vulnerabilities

Vulnerebility

Net-security
29.5.20

NSA warns about Sandworm APT exploiting Exim flaw

BigBrothers

Net-security
29.5.20Hackers Compromise Cisco Servers Via SaltStack FlawsVulnerebility

Threatpost

29.5.20Valak Loader Revamped to Rob Microsoft Exchange ServersVirus

Threatpost

29.5.20Google Location Tracking Lambasted in Arizona LawsuitPrivacyThreatpost
29.5.20PonyFinal Ransomware Targets Enterprise Servers Then Bides Its TimeRansomwareThreatpost
29.5.20Inside the Hoaxcalls Botnet: Both Success and FailureBotNetThreatpost
29.5.20Security breach impacted Cisco VIRL-PE infrastructureIncindentSecurityaffairs
29.5.20NSA warns Russia-linked APT group is exploiting Exim flaw since 2019BigBrothers

Securityaffairs

29.5.20Israel ’s national cyber chief warns of rising of cyber-warfareBigBrothers

Securityaffairs

29.5.20Japanese ICT Solutions Provider NTT Com Discloses Data BreachIncindent

Securityweek

29.5.20NSA: Russian Agents Have Been Hacking Major Email ProgramBigBrothersSecurityweek
29.5.20Google Adds GKE Open-Source Dependencies to Vulnerability Rewards ProgramVulnerebility

Securityweek

29.5.20Industrial Suppliers in Japan, Europe Targeted in Sophisticated AttacksICSSecurityweek
29.5.20Arizona Takes Google to Court Over Location TrackingBigBrothers

Securityweek

29.5.20Crowdsourced Security Testing Firm Synack Raises $52 MillionITSecurityweek
29.5.20Researchers Unmask Brazilian Hacker Who Attacked Thousands of WebsitesHacking

Securityweek

29.5.20Improved Version of Valak Malware Targets Enterprises in US, GermanyVirusSecurityweek
29.5.20

How to protect your business from COVID-19-themed vishing attacks

Phishing

Net-security
29.5.20

Despite lower number of vulnerability disclosures, security teams have their work cut out for them

Vulnerebility

Net-security
29.5.20

Why is SDP the most effective architecture for zero trust strategy adoption?

Security

Net-security
29.5.20

Employees abandoning security when working remotely

Security

Net-security
29.5.20

Global WAN optimization market forecast to reach $1.4 billion by 2025

Security

Net-security
28.5.20‘[F]Unicorn’ Ransomware Impersonates Legit COVID-19 Contact-Tracing AppRansomware

Threatpost

28.5.20DoubleGun Group Builds Massive Botnet Using Cloud ServicesBotNet

Threatpost

28.5.20

Hackers Sell Data from 26 Million LiveJournal Users on Dark WebIncindentThreatpost
28.5.20Google TAG report Q1 details about nation-state hacking and disinformationBigBrothersSecurityaffairs
28.5.20Valak a sophisticated malware that completely changed in 6 monthsVirus

Securityaffairs

28.5.20Ke3chang hacking group adds new Ketrum malware to its arsenalVirus

Securityaffairs

28.5.20Google Says Iran-Linked Hackers Targeted WHOBigBrothers

Securityweek

28.5.20

Israeli Cyber Chief: Major Attack on Water Systems ThwartedBigBrothersSecurityweek
28.5.20CISO Conversations: Mastercard, Ellie Mae Security Chiefs Discuss the People ProblemSecurity

Securityweek

28.5.20Surveillance Bill Vote Scrapped After Opposition From Trump, DoJBigBrothersSecurityweek

28.5.20

A New Free Monitoring Tool to Measure Your Dark Web ExposureSecurityThehackernews
28.5.20Researchers Uncover Brazilian Hacktivist's Identity Who Defaced Over 4800 SitesHackingThehackernews
28.5.20

Flashback on CVE-2019-1978

Vulnerebility

SANS
28.5.20

New fuzzing tool for USB drivers uncovers bugs in Linux, macOS, Windows

Vulnerebility

Net-security

28.5.20

StrandHogg 2.0: Critical Android flaw allows app hijacking, data theft

Android

Net-security
28.5.20

Solving the security challenges of remote working

Security

Net-security
28.5.20

Computer science student discovers privacy flaws in security and doorbell cameras

Vulnerebility

Net-security
28.5.20Microsoft warns about ongoing PonyFinal ransomware attacksRansomware

Securityaffairs

28.5.20Grandoreiro Malware implements new features in Q2 2020Virus

Securityaffairs

28.5.20

Real estate app leaking thousands of user records and sensitive private messagesMobil

Securityaffairs

28.5.20The evolution of ransomware in 2019: attackers think bigger, go deeper and grow more advancedRansomware

Securityaffairs

28.5.20Virus Apps Expose Tension Between Privacy and Need for DataVirus

Securityweek

28.5.20

HackerOne Says Bug Bounty Hunters Earned $100 Million Through Its PlatformSecuritySecurityweek
28.5.20

External attacks on cloud accounts grew 630 percent from January to April

Attack

Net-security
28.5.20

C-suite execs often pressure IT teams to make security exceptions for them

Security

Net-security

28.5.20

Operators rethinking security while making rapid progress toward 5G

Mobil

Net-security

27.5.20

Researchers dismantled ShuangQiang gang’s botnet that infected thousands of PCsBotNet

Securityaffairs

27.5.20

Boris Johnson to reduce Huawei’s role in national 5G networkBigBrothers  Mobil

Securityaffairs

27.5.20

Apple Patches Over 40 Vulnerabilities in macOS CatalinaApple

Securityweek

27.5.20

The Security of Your Android Device May Depend on Where You LiveAndroidSecurityweek

27.5.20

French Privacy Watchdog Okays Coronavirus Tracing AppBigBrothersSecurityweek

27.5.20

US Lawmakers Push for Internet Privacy Amendments to USA Freedom ActBigBrothers

Securityweek

27.5.20

Turla's Updated ComRAT Malware Uses Gmail for C&C CommunicationAPTSecurityweek

27.5.20

Governments Asked to Stop Cyberattacks on Healthcare SystemsBigBrothersSecurityweek

27.5.20

Chinese Researchers Disrupt Malware Attack That Infected Thousands of PCsVirusThehackernews

27.5.20

Frankenstein's phishing using Google Cloud Storage

Phishing

SANS

27.5.20

Account credentials of 26+ million LiveJournal users leaked online

Incindent

Net-security

27.5.20

Application threats and security trends you need to know about

Security

Net-security

27.5.20

What’s trending on the underground market?

Security

Net-security

27.5.20

The “Silent Night” Zloader/ZbPapersPapers

27.5.20

Turla APT Revamps One of Its Go-To Spy ToolsAPT

Threatpost

27.5.20

New iOS Jailbreak Tool Works on iPhone Models iOS 11 to iOS 13.5Apple

Threatpost

27.5.20

StrandHogg 2.0 Critical Bug Allows Android App HijackingAndroidThreatpost

27.5.20

StrandHogg 2.0 Android flaw affects over 1 Billion devicesAndroid

Securityaffairs

27.5.20

New Turla ComRAT backdoor uses Gmail for Command and ControlAPT

Securityaffairs

27.5.20

Qatar Tracing App Flaw Exposed 1 Mn Users' Data: AmnestyBigBrothers

Securityweek

27.5.20

Hacker Behind 'Doxxing' of German Politicians ChargedBigBrothersSecurityweek

27.5.20

Silent Night: A New Malware-as-a-Service Banking Trojan AnalyzedVirusSecurityweek

27.5.20

StrandHogg 2.0 Vulnerability Allows Hackers to Hijack Android DevicesAndroidSecurityweek

27.5.20

Samsung Unveils New Security Chip for Mobile DevicesMobil

Securityweek

27.5.20

FTC Settles With Canadian Smart Lock Maker Over Security PracticesBigBrothersSecurityweek

27.5.20

Vulnerabilities Found in Emerson SCADA Product Made for Oil and Gas IndustryICSSecurityweek

27.5.20

Jailbreak Tool Updated to Unlock iPhones Running iOS 13.5AppleSecurityweek

27.5.20

Internet Organizations Ask US House to Limit Access to Search, Browsing HistoryBigBrothersSecurityweek

27.5.20

New Android Flaw Affecting Over 1 Billion Phones Let Attackers Hijack AppsAndroidThehackernews

27.5.20

iOS contains an unspecified kernel vulnerabilityAlertAlert

27.5.20

Seriously, SHA3 where art thou?

Crypto

SANS

27.5.20

Creating an emergency ready cybersecurity program

Cyber

Net-security

27.5.20

Maintaining the SOC in the age of limited resources

Security

Net-security

27.5.20

23% of leading banks had an exposed database with potential data leakage

Incindent

Net-security

27.5.20

GDPR enforcement over the past two years

Privacy

Net-security

27.5.20

Patented algorithms predict, identify, diagnose and prevent abnormalities in complex systems

Security

Net-security

26.5.20

Spam and phishing in Q1 2020

Analysis  Phishing  Spam

Securelist

26.5.20

Hangzhou could permanently adopt COVID-19 contact-tracing app

Mobil  Privacy

Securityaffairs

26.5.20

Bugs in open-source libraries impact 70% of modern software

Vulnerebility

Securityaffairs

26.5.20

UK Set to Scale Back Huawei Role in 5G Network: Report

BigBrothers

Securityweek

26.5.20

Malware opens RDP backdoor into Windows systems

Virus

Net-security

26.5.20

New ComRAT Malware Uses Gmail to Receive Commands and Exfiltrate Data

Virus

Thehackernews

26.5.20

70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs

Mobil

Threatpost

26.5.20

ThreatList: People Know Reusing Passwords Is Dumb, But Still Do It

Security

Threatpost

26.5.20

Cisco fixed a critical issue in the Unified Contact Center Express

Vulnerebility

Securityaffairs

26.5.20

Crooks hacked e-shops and threaten to sell SQL databases if ransom not paid

Ransomware

Securityaffairs

26.5.20

Top UN Official Warns Malicious Emails on Rise in Pandemic

Virus

Securityweek

26.5.20

Why building backdoors into encryption won’t make us safer

Virus

Net-security

26.5.20

IoT security: In 2020, action needs to match awareness

IoT

Net-security

26.5.20

How do I select a backup solution for my business?

Security

Net-security

26.5.20

What hinders successful threat hunting?

Security

Net-security

26.5.20

Global DX spending to grow 10.4% in 2020

Security

Net-security

25.5.20

Aggressive in-app advertising in Android

Android

Securelist

25.5.20

Ragnar Ransomware encrypts files from virtual machines to evade detection

Ransomware

Securityaffairs

25.5.20

Maze ransomware operators leak credit card data from Costa Rica’s BCR bank

Ransomware

Securityaffairs

25.5.20

3 hacking forums have been hacked and database have been leaked online

Incindent

Securityaffairs

25.5.20

New Tool Can Jailbreak Any iPhone and iPad Using An Unpatched 0-Day Bug

Apple

Thehackernews

25.5.20

Zloader Maldoc Analysis With xlm-deobfuscator

Virus

SANS

25.5.20eBay port scans visitors' computers for remote access programsSecurityBleepingcomputer
25.5.20Hackers leak credit card info from Costa Rica's state bankIncindent

Bleepingcomputer

25.5.20Microsoft's PowerToys gets two new features on Windows 10OS

Bleepingcomputer

25.5.20Discord client turned into a password stealer by updated malwareVirus

Bleepingcomputer

25.5.20How to download Google Chrome's offline installerITBleepingcomputer
25.5.2025 million Mathway user records available for sale on the dark webIncindent

Securityaffairs

25.5.20Unc0ver is the first jailbreak that works on all recent iOS versions since 2014iOSSecurityaffairs
25.5.20Coronavirus Pandemic Claims Another Victim: RobocallsSecuritySecurityweek
25.5.20

Wireshark 3.2.4 Released

Security

SANS

25.5.20

Reality bites: Data privacy edition

Privacy

Net-security

25.5.20

Organizations plan to migrate most apps to the cloud in the next year

Security

Net-security

25.5.20

In an increasingly 5G and edge world, DNS matters

Security

Net-security

24.5.20

Data breach at easyJet puts 9 million at risk

Incident blog

Avast blog

24.5.20

How to protect yourself from data breaches

Incident blog

Avast blog

24.5.20

The latest security trends from Verizon’s annual breach report

Incident blog

Avast blog

24.5.20

Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding

Cryptocurrency blog

Palo Alto Unity42

24.5.20

Mirai and Hoaxcalls Botnets Target Legacy Symantec Web Gateways

BotNet blog

Palo Alto Unity42

24.5.20

Updated BackConfig Malware Targeting Government and Military Organizations in South Asia

BigBrother blog

Palo Alto Unity42

24.5.20

Threat Brief: Maze Ransomware Activities

Ransomware blog

Palo Alto Unity42

24.5.20

SilverTerrier: New COVID-19 Themed Business Email Compromise Schemes

Spam blog

Palo Alto Unity42
24.5.20

Cooperation and Collaborative Partnerships are Key to Protect Businesses

Cyber blog

Palo Alto

24.5.20

FLEXWORK

Cyber blog

Palo Alto

24.5.20

Cortex XDR Managed Threat Hunting Is Available To All Customers

Cyber blog

Palo Alto

24.5.20

Vulnerabilities in Conferencing Tools: Much Ado about Something or Nothing?

Cyber blog

Palo Alto

24.5.20

Are We Prepared to Deal with the Impact of Cyber Threats on 5G?

Cyber blog

Palo Alto

24.5.20

Why DevOps Needs to Change Security

Cyber blog

Palo Alto

24.5.20

CRN Names 10 Leaders from Palo Alto Networks to Women of the Channel List

Cyber blog

Palo Alto
24.5.20Personal details and documents for millions of Indians available in the deep webIncindent

Securityaffairs

24.5.20Online education site EduCBA discloses data breach and reset customers’ pwdsIncindentSecurityaffairs
24.5.20Experts observed a spike in COVID-19 related malspam emails containing GuLoaderSpam

Securityaffairs

24.5.20Voter information for 2 millions of Indonesians leaked onlineIncindentSecurityaffairs
24.5.20Silent Night Zeus botnet available for sale in underground forumsBotNetSecurityaffairs
24.5.20SyrkAnti-Ramson ToolAnti-Ramson Tool
24.5.20KokoKryptAnti-Ramson ToolAnti-Ramson Tool
24.5.20JavaLockerAnti-Ramson ToolAnti-Ramson Tool
24.5.20Online education site EduCBA discloses data breach after hackIncindentBleepingcomputer
24.5.20Winget: How to use Windows 10's new native Package ManagerOS

Bleepingcomputer

24.5.20Windows 10 KB4556799 Update Breaks Wireless LTE ConnectivityOS

Bleepingcomputer

24.5.20Microsoft Edge 83 released with extension sync and auto-profilesOS

Bleepingcomputer

24.5.20Microsoft is investigating issues in latest Windows 10 updateOS

Bleepingcomputer

24.5.20Voter info for millions of Indonesians shared on hacker forumIncindent

Bleepingcomputer

24.5.20Docker fixes Windows client bug letting programs run as SYSTEMVulnerebility

Bleepingcomputer

24.5.20Ransomware encrypts from virtual machines to evade antivirusRansomware

Bleepingcomputer

24.5.20Mathway investigates data breach after 25M records sold on dark webIncindent

Bleepingcomputer

24.5.20ZLoader banking malware is back, deployed in over 100 campaignsVirus

Bleepingcomputer

24.5.20Windows Hello can now complete payments in Google ChromeOS

Bleepingcomputer

24.5.20Microsoft releases Windows 10 Hyper-V VHDX for ARM64 devicesOS

Bleepingcomputer

23.5.20Hackers tried to use Sophos Firewall zero-day to deploy RansomwareRansomwareBleepingcomputer
23.5.20Microsoft Surface Book 3 is now available for purchaseIT

Bleepingcomputer

23.5.20Hacker shares 40 million Wishbone user records for freeIncindent

Bleepingcomputer

23.5.20Office 365 phishing uses Supreme Court theme and working CAPTCHAPhishing

Bleepingcomputer

23.5.20New Windows 10 Intel microcodes released in forced KB4497165 updateOS

Bleepingcomputer

23.5.20New PipeMon malware uses Windows print processors for persistenceVirus

Bleepingcomputer

23.5.20Vigilante hackers target 'scammers' with ransomware, DDoS attacksRansomware

Bleepingcomputer

23.5.20How to use Google Chrome Tab Groups to stay organizedIT

Bleepingcomputer

23.5.20Snake ransomware leaks patient data from Fresenius Medical CareRansomware

Bleepingcomputer

23.5.20Adobe releases critical out-of-band security updateVulnerebility

Bleepingcomputer

23.5.20GhostDNS exploit kit source code leaked to antivirus companyExploit

Bleepingcomputer

23.5.20Microsoft issues mitigation for the NXNSAttack DNS DDoS attackAttack

Bleepingcomputer

23.5.20NXNSAttack: Recursive DNS Inefficiencies and VulnerabilityPapersPapers
23.5.20

Home Chef Serves Up Data Breach for 8 Million Records

Incindent

Threatpost

23.5.20

Chafer APT Hits Middle East Govs With Latest Cyber-Espionage Attacks

APT

Threatpost

23.5.20

‘Coronavirus Report’ Emails Spread NetSupport RAT, Microsoft Warns

Virus

Threatpost

23.5.20

NSO Group Impersonates Facebook Security Team to Spread Spyware — Report

CyberCrime  Social

Threatpost
23.5.20

The Florida Unemployment System suffered a data breach

Incindent

Securityaffairs

23.5.20

Experts found a Privilege escalation issue in Docker Desktop for Windows

Vulnerebility

Securityaffairs
23.5.20

Free ImmuniWeb Tool Allows Organizations to Check Dark Web Exposure

CyberCrime

Securityweek
23.5.20IOCS VS. IOBSCyber blogCybereason
23.5.20WHY A CLOUD-NATIVE EPP IS CRITICAL FOR FUTUREPROOF SECURITY OPERATIONSCyber blogCybereason
23.5.20LEGACY A/V IS SO LAST YEARCyber blogCybereason
23.5.20How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMinerMalware blogMcafee blog
23.5.20Attacking the Organism: Telecom Service ProvidersHacking blogF5 Labs
23.5.20Using Real-Time Events in InvestigationsSecurity blog

FireEye

23.5.20Analyzing Dark Crystal RAT, a C# backdoorMalware blog

FireEye

23.5.20Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware IncidentsRansomware blogFireEye
23.5.20Safe-Linking – Eliminating a 20 year-old malloc() exploit primitiveExploit blogCheckpoint
23.5.20Vulnerability Spotlight: Memory corruption vulnerability in GNU Glibc leaves smart vehicles open to attackVulnerebility blogCisco Talos
23.5.20Vulnerability Spotlight: Authentication bypass vulnerability in some Epson projectorsVulnerebility blog

Cisco Talos

23.5.20The wolf is back...Security blog

Cisco Talos

23.5.20Vulnerability Spotlight: Multiple vulnerabilities in Nitro Pro PDF readerVulnerebility blog

Cisco Talos

23.5.20Insidious Android malware gives up all malicious features but one to gain stealthOS Blog

Eset

23.5.20How encryption can help protect your sensitive dataSafety blogEset
23.5.20Chrome 83 arrives with enhanced security and privacy controlsSecurity blog

Eset

23.5.20No “Game over” for the Winnti GroupAPT blogEset
23.5.20These things may be cool, but are they safe?Security blog

Eset

23.5.20Bluetooth flaw exposes countless devices to BIAS attacksAttack blog  Vulnerebility blogEset
23.5.20European supercomputers hacked to mine cryptocurrencyCryptocurrency blog

Eset

23.5.20

AgentTesla Delivered via a Malicious PowerPoint Add-In

Virus

SANS
22.5.20Cyber-Criminal espionage Operation insists on Italian ManufacturingCyberSpySecurityaffairs
22.5.20Microsoft warns of “massive campaign” using COVID-19 themed emailsSpam

Securityaffairs

22.5.20Winnti uses a new PipeMon backdoor in attacks aimed at the gaming industryVirusSecurityaffairs
22.5.20Ragnar Locker Ransomware Uses Virtual Machines for EvasionRansomwareSecurityweek
22.5.20Industry Reactions to Verizon 2020 DBIR: Feedback FridayIncindentSecurityweek
22.5.20Data Breach Hits Florida Unemployment SystemIncindentSecurityweek
22.5.20Hackers Attempted to Deploy Ransomware in Attacks Targeting Sophos FirewallsRansomwareSecurityweek
22.5.20Hackers Can Target Rockwell Industrial Software With Malicious EDS FilesVirusSecurityweek
22.5.20Bitter Israel-Iran Rivalry Takes New Forms OnlineBigBrothersSecurityweek
22.5.20

Cisco fixes critical RCE flaw in call center solution

Vulnerebility

Net-security
22.5.20

Critical Cisco Bug in Unified CCX Allows Remote Code Execution

Vulnerebility

Threatpost

22.5.20

Crooks Tap Google Firebase in Fresh Phishing Tactic

Phishing

Threatpost

22.5.20

Supreme Court Phish Targets Office 365 Credentials

Phishing

Threatpost

22.5.20

Silent Night Banking Trojan Charges Top Dollar on the Underground

Virus

Threatpost
22.5.20

Santander, one of the biggest European banks, was leaking sensitive data on their website

Incindent

Securityaffairs
22.5.20

Sophos blocked attacks exploiting XG Firewall zero-day to deploy Ransomware

Ransomware

Securityaffairs
22.5.20

Meal delivery service Home Chef discloses data breach

Incindent

Securityaffairs

22.5.20

Tens of thousands Israeli websites defaced

BigBrothers

Securityweek
22.5.20

Signal PINs Allow Users to Recover Data When Switching Phones

Mobil

Securityweek
22.5.20

Cisco Patches Critical Vulnerability in Contact Center Software

Vulnerebility

Securityweek
22.5.20

Surveillance Fears Drive Business Use of Secure Collaboration Tools

BigBrothers

Securityweek
22.5.20

Facebook Unveils Scam Warnings for Messenger Users

Social

Securityweek
22.5.20

Tools Used in GhostDNS Router Hijack Campaigns Dissected

Hacking

Securityweek
22.5.20

Hackers Start Leaking Files Stolen From Shipping Giant Toll

Incindent

Securityweek
22.5.20

Zoom to Provide Detailed Info on Upcoming End-to-End Encryption Feature

Safety

Securityweek
22.5.20

Create a safe haven for your customers to build loyalty

Security

Net-security
22.5.20

Integrating a SIEM solution in a large enterprise with disparate global centers

Safety

Net-security
22.5.20

The dark web is flooded with offers to purchase corporate network access

Cyber

Net-security
22.5.20

What can merchants do to avoid falling victim to large-scale ATO attacks?

Attack

Net-security
22.5.20

Number of active IoT devices expected to reach 24.1 billion in 2030

IoT

Net-security
22.5.20

Signal fixes location-revealing flaw, introduces Signal PINs

Mobil

Net-security
22.5.20

Beware of phishing emails urging for a LogMeIn security update

Phishing

Net-security
21.5.20Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi ArabiaReportReport
21.5.20Iran-linked Chafer APT group targets governments in Kuwait and Saudi ArabiaAPTSecurityaffairs
21.5.20Japan suspects HGV missile data leak in Mitsubishi security breachIncindent

Securityaffairs

21.5.20Israeli Websites Targeted in Major Cyber AttackBigBrothersSecurityweek
21.5.20Meal Kit Service Home Chef Confirms Data BreachIncindentSecurityweek
21.5.20Smarsh Adds Cybersecurity and Compliance to Archiving with Acquisition of EntredaCyberSecurityweek
21.5.20XSS, Open Redirect Vulnerabilities Patched in DrupalVulnerebilitySecurityweek
21.5.20Cyber Insurance Provider Coalition Raises $90 MillionITSecurityweek
21.5.20Microsoft Announces New Security Features for Devs, CustomersSecuritySecurityweek
21.5.20How Cybersecurity Enables Government, Health, EduTech Cope With COVID-19CyberThehackernews
21.5.20Iranian APT Group Targets Governments in Kuwait and Saudi ArabiaAPTThehackernews
21.5.20Home Chef announces data breach after hacker sells 8M user recordsIncindentBleepingcomputer
21.5.20How to enable the new Google Chrome 83 features nowSecurity

Bleepingcomputer

21.5.20Microsoft warns of 'massive' phishing attack pushing legit RATPhishing  Virus

Bleepingcomputer

21.5.20BEC Scammers target unemployment and CARES Act claimsSpam

Bleepingcomputer

21.5.20Windows 10 KB4556799 update won't install, has audio issues, bugsOS

Bleepingcomputer

21.5.20Windows Terminal 1.0 is here with numerous improvementsOS

Bleepingcomputer

21.5.20EasyJet hacked: data breach affects 9 million customersIncindent

Bleepingcomputer

21.5.20Google rolls out new Enhanced Safe Browsing security featureSafety

Bleepingcomputer

21.5.20Chrome 83 released with massive security and privacy upgradesSecurity

Bleepingcomputer

21.5.20NetWalker adjusts ransomware operation to only target enterpriseRansomware

Bleepingcomputer

21.5.20Microsoft announces new Chromium Edge features at Build 2020OS

Bleepingcomputer

21.5.20New Microsoft Teams enhancements announced at Build 2020IT

Bleepingcomputer

21.5.20

Verizon DBIR: Web App Attacks and Security Errors Surge

Attack

Threatpost

21.5.20

Fraudulent Unemployment, COVID-19 Relief Claims Earn BEC Gang Millions

Spam

Threatpost

21.5.20

NetWalker Ransomware Gang Hunts for Top-Notch Affiliates

Ransomware

Threatpost

21.5.20

Alleged Hacker Behind Massive ‘Collection 1’ Data Dump Arrested

Crime

Threatpost
21.5.20

VMware fixes CVE-2020-3956 Remote Code Execution issue in Cloud Director

Vulnerebility

Securityaffairs
21.5.20

Adobe fixed several memory corruption issues in some of its products

Vulnerebility

Securityaffairs
21.5.20

Israel is suspected to be behind the cyberattack on Iranian port

BigBrothers

Securityaffairs

21.5.20

Chrome 83 Brings Enhanced Safe Browsing, New Privacy and Security Controls

Security

Securityweek
21.5.20

Pandemic-related Supply Chain and Money Laundering Woes in the Dark Web

CyberCrime

Securityweek
21.5.20

Website Security Provider Source Defense Raises $10.5 Million

IT

Securityweek
21.5.20

Vulnerabilities Exposed Hundreds of Thousands of QNAP NAS Devices to Attacks

Vulnerebility

Securityweek
21.5.20

Japan Suspects Missile Data Leak in Mitsubishi Cyberattack

Incindent

Securityweek
21.5.20

Remote Code Execution Vulnerability Patched in VMware Cloud Director

Vulnerebility

Securityweek
21.5.20

Malware Triage with FLOSS: API Calls Based Behavior

Virus

SANS
21.5.20

The missing link in your SOC: Secure the mainframe

Security

Net-security
21.5.20

What do IGA solutions have in common with listening to music anywhere?

Security

Net-security
21.5.20

How secure are open source libraries?

Security

Net-security
21.5.20

Only 36% of critical infrastructures have a high level of cyber resilience

Security

Net-security
21.5.20

COVID-19 is driving diverging perspectives as enterprises decide which technologies to focus on

Security

Net-security
21.5.20

RedisAI and RedisGears address challenges customers have as they move AI into production

Security

Net-security
20.5.20IT threat evolution Q1 2020AnalysisSecurelist
20.5.20IT threat evolution Q1 2020. StatisticsAnalysisSecurelist
20.5.20Researchers disclose five Microsoft Windows zero-daysVulnerebilitySecurityaffairs
20.5.20Three flaws in Nitro Pro PDF reader expose businesses to hackVulnerebilitySecurityaffairs
20.5.20Canada Fines Facebook Over Misleading Privacy ClaimsBigBrothers

Securityweek

20.5.20Container Security Company Aqua Raises $30 Million in Series D RoundITSecurityweek
20.5.20Tech-Assisted COVID-19 Tracking Is Having Some IssuesSecuritySecurityweek
20.5.20Researcher Finds Memory Corruption Vulnerabilities in Several Adobe ProductsVulnerebility

Securityweek

20.5.20WordPress Malware Targets WooCommerce StoresVirusSecurityweek
20.5.20New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS AttacksAttackThehackernews
20.5.20Ukrainian Police Arrest Hacker Who Tried Selling Billions of Stolen RecordsCrimeThehackernews
20.5.20

Chrome 83: Enhanced Safe Browsing, Secure DNS, a Safety Check

Security

Net-security
20.5.20

Vulnerability in Qmail mail transport agent allows RCE

Vulnerebility

Net-security
20.5.20

EasyJet data breach: 9 million customers affected

Incindent

Net-security
20.5.202020-data-breach-investigations-reportReport

Report

20.5.20

Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices

Attack

Threatpost

20.5.20

Verizon Data Breach Report: DoS Skyrockets, Espionage Dips

Incindent

Threatpost

20.5.20

WolfRAT Android Malware Targets WhatsApp, Facebook Messenger

Android

Threatpost

20.5.20

Adobe Patches Critical RCE Flaw in Character Animator App

Vulnerebility

Threatpost
20.5.20

EasyJet Hackers Take Off with Travel Details for 9M Customers

Incindent

Threatpost
20.5.20

Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials

Phishing

Threatpost
20.5.20

Security Service of Ukraine arrested the popular hacker Sanix who sold billions of stolen credentials

Incindent

Securityaffairs
20.5.20

Bluetooth BIAS attack threatens billions of devices

Attack

Securityaffairs
20.5.20

Easyjet hacked: 9 million customer’s data exposed along with 2,200+ credit card details

Incindent

Securityaffairs
20.5.20

Nitro Pro Vulnerabilities Expose Many Enterprises to Attacks

Vulnerebility

Securityweek

20.5.20

Researchers Divulge Details on Five Windows Zero Days

Vulnerebility

Securityweek
20.5.20

Verizon 2020 DBIR: More Extensive, More Detailed and More Thorough Than Ever

Incindent

Securityweek
20.5.20

NXNSAttack: New DNS Vulnerability Allows Big DDoS Attacks

Attack

Securityweek

20.5.20

Bluetooth Vulnerability Allows Attackers to Impersonate Previously Paired Devices

Vulnerebility

Securityweek
20.5.20

Brazil's Biggest Cosmetic Brand Natura Exposes Personal Details of Its Users

Incindent

Thehackernews
20.5.20

British Airline EasyJet Suffers Data Breach Exposing 9 Million Customers' Data

Incindent

Thehackernews
20.5.20

Microsoft Word document with malicious macro pushes IcedID (Bokbot)

BotNet

SANS
20.5.20

CEOs and CISOs disagree on cyber strategies

Security

Net-security
20.5.20

With the threat landscape continuously changing, businesses must be ready for anything

Security

Net-security
20.5.20

With increased DevOps adoption, roles in software development teams are changing

Security

Net-security
20.5.20

Technologies in all layers of the cloud stack are at risk

Security

Net-security
20.5.20

Over half of security leaders still rely on spreadsheets

Security

Net-security
19.5.20REvil Ransomware found buyer for Trump data, now targeting MadonnaRansomwareBleepingcomputer
19.5.20Google Chrome to tidy up tabs with Tab Groups Collapse featureIT

Bleepingcomputer

19.5.20Hacker sells 129 million sensitive records of Russian car ownersBigBrothers

Bleepingcomputer

19.5.20Fake U.S. Dept of Treasury emails spreads new Node.js malwareBigBrothers

Bleepingcomputer

19.5.20Ransomware attack impacts Texas Department of TransportationRansomware

Bleepingcomputer

19.5.20Windows 10 Defender's hidden features revealed by this free toolOS

Bleepingcomputer

19.5.20FBI warns of ProLock ransomware decryptor not working properlyRansomware

Bleepingcomputer

19.5.20Microsoft Edge Canary now lets you read aloud your PDF filesOS

Bleepingcomputer

19.5.20European supercomputers hacked in mysterious cyberattacksAttack

Bleepingcomputer

19.5.20Zoom global outage preventing meetings, video, and audioIT

Bleepingcomputer

19.5.20What's new in Windows Subsystem for Linux 2.0, coming soonOS

Bleepingcomputer

19.5.20Windows 10 quietly got a built-in network sniffer, how to useOSBleepingcomputer
19.5.20

Australian product steel producer BlueScope hit by cyberattack

BigBrothers

Securityaffairs
19.5.20

Hackers Target Oil Producers During COVID-19 Slump

Hacking

Securityaffairs
19.5.20

Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways

BotNet

Securityaffairs
19.5.20

129 million records of Russian car owners available on the dark web

Incindent

Securityaffairs
19.5.20

Botnets Target Old Vulnerability in Symantec Secure Web Gateway

BotNet

Securityweek

19.5.20

EasyJet Reveals Cyber Attack on Nine Million Clients

Incindent

Securityweek
19.5.20

Court Curbs German Spies' Foreign Internet Surveillance

BigBrothers

Securityweek
19.5.20

DoJ Again Asks for Encryption Backdoors After Hacking US Naval Base Shooter's iPhones

BigBrothers

Securityweek

19.5.20

Increased Focus on iOS Hacking Leads to Drop in Exploit Prices

Apple

Securityweek
19.5.20

New Bluetooth Vulnerability Exposes Billions of Devices to Hackers

Vulnerebility

Securityweek
19.5.20

Phishers are trying to bypass Office 365 MFA via rogue apps

Phishing

Net-security
19.5.20

Money is still the root of most breaches

Incindent

Net-security
19.5.20Bluetooth devices supporting LE and specific BR/EDR implementations are vulnerable to method confusion attacksAlertAlert
19.5.20Bluetooth devices supporting BR/EDR are vulnerable to impersonation attacksAlertAlert
19.5.20

ProLock Ransomware Teams Up With QakBot Trojan to Infect Victims

Ransomware

Threatpost

19.5.20

Edison Mail iOS Bug Exposes Emails to Strangers

Apple

Threatpost

19.5.20

Verizon Data Breach Report: DoS Skyrockets, Espionage Dips

Incindent

Threatpost

19.5.20

Ransomware Gang Arrested for Spreading Locky to Hospitals

Ransomware

Threatpost
19.5.20

A bug in Edison Mail iOS app impacted over 6,400 users

Apple

Securityaffairs
19.5.20

Texas Department of Transportation (TxDOT) hit by a ransomware attack

Ransomware

Securityaffairs
19.5.20

Mandrake, a high sophisticated Android spyware used in targeted attacks

Android

Securityaffairs
19.5.20

Facebook Chief Wants EU Not China to Lead on Tech Rules

BigBrothers  Social

Securityweek

19.5.20

PE Firm Gets Cold Feet With $1.9 Billion Acquisition of Forescout Technologies

IT

Securityweek
19.5.20

Over 6,400 Edison Mail Users Hit by Security Bug in iOS App

Apple

Securityweek
19.5.20

Automating nmap scans

Security

SANS
19.5.20

CISOs are critical to thriving companies: Here’s how to support their efforts

Security

Net-security
19.5.20

Review: Kill Chain: The Cyber War on America’s Elections

Security

Net-security
19.5.20

How a good user experience brings the pieces of the enterprise IT jigsaw together

Security

Net-security
19.5.20

Mental Health Awareness Week: Coping with cybersecurity pressures amidst a global pandemic

Security

Net-security
19.5.20

How data intelligent organizations mitigate risk

Security

Net-security
18.5.20FBI warns US organizations of ProLock ransomware decryptor not workingBigBrothersSecurityaffairs
18.5.20Stored XSS in WP Product Review Lite plugin allows for automated takeoversVulnerebilitySecurityaffairs
18.5.20Australian Steel Maker BlueScope Hit by CyberattackBigBrothers

Securityweek

18.5.20Likely Breach Shuts Down Arkansas Unemployment ProgramIncindentSecurityweek
18.5.20Transportation Agency Hacked in 2nd Texas Government AttackBigBrothersSecurityweek
18.5.20Hackers Can Inject Code Into WordPress Sites via Flaw in Product Review PluginVulnerebilitySecurityweek
18.5.20U.S. Restriction on Chipmakers Deals Critical Blow to HuaweiBigBrothersSecurityweek
18.5.20Crypto-Mining Campaign Hits European SupercomputersCryptocurrencySecurityweek
18.5.20'Mandrake' Android Spyware Remained Undetected for 4 YearsAndroidSecurityweek
18.5.20France Says Breaks Up International ATM 'Jackpotting' NetworkCyberCrimeSecurityweek
18.5.20

Antivirus & Multiple Detections

Safety

SANS
18.5.20

Redefining business for a digital world with smart security decisions

Security

Net-security
18.5.20

Security threats associated with shadow IT

Security

Net-security
18.5.20

Security and the rapidly growing importance of mobile apps

Mobil

Net-security
18.5.20

Shifting responsibility is causing uncertainty and more security breaches

Security

Net-security
18.5.20

Identity-related breaches on the rise, prevention still a work in progress

SecurityNet-security
18.5.20

Less than a quarter of Americans use a password manager

Security

Net-security
17.5.20

Scanning for Outlook Web Access (OWA) & Microsoft Exchange Control Panel (ECP)

Vulnerebility

Net-security
17.5.20

Experts reported the hack of several supercomputers across Europe

Hacking

Securityaffairs
17.5.20

Coronavirus-themed attacks May 10 – May 16, 2020

Security

Securityaffairs
17.5.20

Elexon, a middleman in the UK power grid network hit by cyber-attack

BigBrothers

Securityaffairs
17.5.20

APT group targets high profile networks in Central Asia

APT

Securityaffairs
17.5.20

Microsoft is open-sourcing COVID-19 threat intelligence

Cyber

Securityaffairs
17.5.20

QNodeService Trojan spreads via fake COVID-19 tax relief

Virus

Securityaffairs
17.5.20Ransom NewsRansomRansom
17.5.20Thunderbolt flaw leads to Thunderspy exploitVulnerebility blog

Avast blog

17.5.20We never wanna repeat WannaCryRansomware blog

Avast blog

17.5.20Massive WordPress attack relies on old flawsAttack blog  Vulnerebility blogAvast blog
17.5.20Gartner Market Guide for Cloud Workload Protection Platforms: Key TakeawaysCyber blog

Palo Alto

17.5.20CRN Names 10 Leaders from Palo Alto Networks to Women of the Channel ListCyber blog

Palo Alto

17.5.20Containers are inherently secure – Reality or myth?Cyber blog

Palo Alto

17.5.20Palo Alto Networks Named Google Cloud Technology Partner of the YearCyber blog

Palo Alto

17.5.20Manage a Remote SOC: Micro-Surveys for Crisis ManagementCyber blogPalo Alto
17.5.20Scaling Security for Data Center Transformation: COVID-19 Amplifies TrendsCyber blog

Palo Alto

17.5.20Bridging the DevOps and Security Divide with DevSecOpsCyber blogPalo Alto
17.5.20WordPress malware finds WooCommerce sites for Magecart attacksVirusBleepingcomputer
17.5.20Critical WordPress plugin bug allows for automated takeoversVulnerebility

Bleepingcomputer

17.5.20Wannabe ransomware operators arrested before hospital attacksRansomware

Bleepingcomputer

17.5.20New BotSight browser extension reveals Twitter botsBotNet

Bleepingcomputer

17.5.20RATicate drops info stealing malware and RATs on industrial targetsVirus

Bleepingcomputer

17.5.20Ransomware recruits affiliates with huge payouts, automated leaksRansomware

Bleepingcomputer

17.5.20Backdoors in recent espionage attempts link to Microcin malwareVirus

Bleepingcomputer

17.5.20Microsoft Office 365 ATP getting malware campaign analysisVirus

Bleepingcomputer

17.5.20Free Grand Theft Auto V offer brings down Epic Games StoreIT

Bleepingcomputer

17.5.20New COMpfun malware variant gets commands from HTTP error codesVirus

Bleepingcomputer

17.5.20New Microsoft 365 sign-in pages already spoofed for phishingPhishing

Bleepingcomputer

17.5.20Hacker selling 550 million stolen user records on hacking forumIncindent

Bleepingcomputer

17.5.20Google Chrome will block resource-heavy ads starting AugustSecurity

Bleepingcomputer

17.5.20ProLock Ransomware teams up with QakBot trojan for network accessRansomware

Bleepingcomputer

17.5.20Scammers steal $10 million from Norway's state investment fundSpam

Bleepingcomputer

17.5.20Google WordPress plugin bug can be exploited for black hat SEOExploit

Bleepingcomputer

17.5.20RIP: Microsoft to drop support for Windows 10 on 32-bit systemsOS

Bleepingcomputer

17.5.20New Ramsay malware steals files from air-gapped computersVirus

Bleepingcomputer

17.5.20Windows 10 gets DNS over HTTPS support, how to testOS

Bleepingcomputer

17.5.20Microsoft: Fix for Outlook search failures coming later todayOS

Bleepingcomputer

17.5.20Microsoft warns of COVID-19 phishing spreading info-stealing malwarePhishing

Bleepingcomputer

17.5.20US warns of Chinese hackers targeting COVID-19 research orgsBigBrothers

Bleepingcomputer

17.5.20Ransomware now demands extra payment to delete stolen filesRansomware

Bleepingcomputer

17.5.20SAP May 2020 Security Patch Day delivers critical updatesVulnerebility

Bleepingcomputer

16.5.20Healthcare giant Magellan Health hit by ransomware attackRansomware

Bleepingcomputer

16.5.20Windows 10 2004 improves potentially unwanted app protectionOS

Bleepingcomputer

16.5.20Windows 10 2004 is almost here, what developers need to knowOS

Bleepingcomputer

16.5.20US govt shares list of most exploited vulnerabilities since 2016BigBrothers

Bleepingcomputer

16.5.20May 2020 Patch Tuesday: Microsoft fixes 111 vulnerabilities, 13 CriticalOS

Bleepingcomputer

16.5.20Windows 10 Cumulative Updates KB4556799 & KB4551853 ReleasedOS

Bleepingcomputer

16.5.20Microsoft Edge rolls out in Windows 10 2004 via Windows UpdateOS

Bleepingcomputer

16.5.20US govt exposes new North Korean malware, phishing attacksBigBrothers

Bleepingcomputer

16.5.20Adobe fixes critical vulnerabilities in Acrobat, Reader, and DNG SDKVulnerebility

Bleepingcomputer

16.5.20Researcher finds 1,236 websites infected with credit card stealersHacking

Bleepingcomputer

16.5.20Five Clear Steps to Enhance SecOps with MITRE ATT&CK ReportCybereason
16.5.202019 APPLICATION PROTECTION REPORT 2ND EDITIONReportF5 Labs
16.5.20THE STATE OF RANSOMWARE 2020ReportSOPHOS
16.5.20WHAT IS THE MITRE ATT&CK FRAMEWORK?Security blogCybereason
16.5.202019 Application Protection ReportSecurity blog

F5 Labs

16.5.20Are You Ready for DoD CMMC Compliance?Security blog

F5 Labs

16.5.20Reverse RDP – The Path Not TakenAttack blogCheckpoint
16.5.20The basics of a ransomware infection as Snake, Maze expandsRansomware blogCisco Talos
16.5.20Microsoft Patch Tuesday — May 2020: Vulnerability disclosures and Snort coverageVulnerebility blogCisco Talos
16.5.20Vulnerability Spotlight: Code execution vulnerability in Microsoft ExcelVulnerebility blog

Cisco Talos

16.5.20Vulnerability Spotlight: Remote code execution vulnerabilities in Adobe Acrobat ReaderVulnerebility blog

Cisco Talos

16.5.20Threat Spotlight: Astaroth — Maze of obfuscation and evasion reveals dark stealerRansomware blog

Cisco Talos

16.5.20Microsoft fixes vulnerability affecting all Windows versions since 1996Vulnerebility blog

Eset

16.5.20Mikroceen: Spying backdoor leveraged in high‑profile networks in Central AsiaAPT blogEset
16.5.20Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networksMalware blog

Eset

16.5.20Thunderbolt flaws open millions of PCs to physical hackingVulnerebility blogEset
16.5.20WannaCryptor remains a global threat three years onRansomware blog

Eset

16.5.20Lukas Stefanko: How we fought off a DDoS attack from a mobile botnetAttack blogEset
16.5.20Over 160 million user records put up for sale on the dark webIncident blog

Eset

16.5.20Breaking news? App promises news feeds, brings DDoS attacks insteadAttack blogEset
16.5.20

Hoaxcalls Botnet Exploits Symantec Secure Web Gateways

BotNet  Exploit

Threatpost

16.5.20

RATicate Group Hits Industrial Firms With Revolving Payloads

Virus

Threatpost

16.5.20

News Wrap: Ransomware Extortion Tactics, Contact-Tracing App Security Worries

Security

Threatpost

16.5.20

Paying Ransomware Crooks Doubles Clean-up Costs, Report

Ransomware

Threatpost
16.5.20

Chinese APT Tropic Trooper target air-gapped military Networks in Asia

APT

Securityaffairs
16.5.20

Interserve UK defense contractor hacked, up to 100,000 past and present employees details exposed

BigBrothers

Securityaffairs
16.5.20

Microsoft Open-Sources COVID-19 Threat Intelligence

Cyber

Securityweek

16.5.20

NortonLifeLock Releases Free Tool for Detecting Bots on Twitter

Social

Securityweek
16.5.20

Chinese Hackers Target Air-Gapped Military Networks

BigBrothers

Securityweek
16.5.20

US Seeks to Cut Off China's Huawei From Global Chip Suppliers

BigBrothers

Securityweek
16.5.20

Mysterious Chinese APT Linked to Multiple Central Asian Campaigns

APT

Securityweek
16.5.20

SHA3 Hashes (on Windows) - Where Art Thou?

Crypto

SANS
15.5.20Office 365 to let regular users revoke encrypted messagesOS

Bleepingcomputer

15.5.20Hackers' private chats leaked in stolen WeLeakData databaseIncindent

Bleepingcomputer

15.5.20Texas Courts hit by ransomware, network disabled to limit spreadRansomware

Bleepingcomputer

15.5.20Microsoft's Family Safety parental control app opens for testingOS

Bleepingcomputer

15.5.20WordPress plugin bugs can let hackers take over almost 1M sitesHacking

Bleepingcomputer

15.5.20Maze ransomware fails to encrypt Pitney Bowes, steals filesRansomware

Bleepingcomputer

15.5.20New Thunderbolt security flaws affect systems shipped before 2019Vulnerebility

Bleepingcomputer

15.5.20Windows 10: Limiting the bandwidth used by Windows UpdateOS

Bleepingcomputer

15.5.20ChatBooks discloses data breach after data sold on dark webIncindent

Bleepingcomputer

15.5.20Sodinokibi ransomware can now encrypt open and locked filesRansomware

Bleepingcomputer

15.5.20

Hashes in PowerShell

Security

SANS
15.5.20

Criminals boost their schemes with COVID-19 themed phishing templates

Phishing

Net-security
15.5.20Russian APT Turla’s COMpfun malware uses HTTP status codes to receive commandsAPTSecurityaffairs
15.5.20Palo Alto Networks addresses tens of serious issues in PAN-OSSecuritySecurityaffairs
15.5.20Threat actors are offering for sale 550 million stolen user recordsIncindentSecurityaffairs
15.5.20Vulnerabilities in SoftPAC Virtual Controller Expose OT Networks to AttacksVulnerebility

Securityweek

15.5.20Activists Allege TikTok Violated Agreement on Child ProtectionPrivacySecurityweek
15.5.20Venafi Acquires Kubernetes Services Provider JetstackSecuritySecurityweek
15.5.20'Ramsay' Espionage Framework Can Exfiltrate Data From Air-Gapped NetworksVirusSecurityweek
15.5.20UK Electricity Market Administrator Elexon Targeted by HackersHackingSecurityweek
15.5.20HTTP Status Codes Command This Malware How to Control Hacked SystemsVirusThehackernews
15.5.20

Utah Says No to Apple/Google COVID-19 Tracing; Debuts Startup App

Cyber

Threatpost

15.5.20

Login with Facebook Bug Earns $20K Bounty

Social

Threatpost

15.5.20

Microsoft Adds DNS-Over-HTTPS Support for Windows 10 Insiders

OS

Threatpost

15.5.20

BEC Gang Exploits G Suite, Long Domain Names in Cyberattacks

Attack

Threatpost
15.5.20

Innovative Spy Trojan Targets European Diplomatic Targets

Virus

Threatpost
15.5.20

TikTok Violated Children’s Privacy Law, FTC Complaint Says

Privacy

Threatpost
15.5.20

Crooks stole $10 million from Norway’s state investment fund Norfund

IT

Securityaffairs
15.5.20

Zerodium will no longer acquire certain types of iOS exploits due to surplus

iOS

Securityaffairs
15.5.20

Access to UK Supercomputer Suspended Following Cyberattack

Attack

Securityweek

15.5.20

Palo Alto Networks Patches Many Vulnerabilities in PAN-OS

Vulnerebility

Securityweek
15.5.20

China Rejects US Claim of Attempted Vaccine Theft as 'Smearing'

BigBrothers

Securityweek
15.5.20

Zerodium Expects iOS Exploit Prices to Drop as It Announces Surplus

Exploit

Securityweek
15.5.20Samsung Qmage codec for Android Skia library does not properly validate image filesAlertAlert
15.5.20

Base Conversions and Creating GUI Apps in PowerShell

Security

SANS
15.5.20

Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe

Vulnerebility

SANS
15.5.20

Modern crypto standards pave the way to stronger security

Crypto

Net-security
15.5.20

Windows 10 users get protection against PUAs

OS

Net-security

15.5.20

New software enables existing sensors to detect ransomware

Ransomware

Net-security

15.5.20

COVID-19 online fraud trends: Industries, schemes and targets

Security

Net-security

15.5.20

Businesses vulnerable to emerging risks have a gap in their insurance coverage

Security

Net-security

15.5.20

Educational organizations use cloud apps to share sensitive data outside of IT control

Security

Net-security
14.5.20

Cyberthreats on lockdown

Cyber

Securelist
14.5.20

COMpfun authors spoof visa application with HTTP status-based Trojan

APT  Virus

Securelist
14.5.20

China-linked hackers are attempting to steal COVID-19 Vaccine Research

BigBrothers

Securityaffairs
14.5.20

Google WordPress Site Kit plugin grants attacker Search Console Access

Attack

Securityaffairs
14.5.20

New Ramsay malware allows exfiltrating files from air-gapped computers

Virus

Securityaffairs
14.5.20

Senate Narrowly Rejects New Limits on Internet Surveillance

BigBrothers

Securityweek

14.5.20

VMware to Acquire Kubernetes Security Firm Octarine

IT

Securityweek
14.5.20

Flaw in WordPress Plugin Grants Access to Google Search Console

Vulnerebility

Securityweek
14.5.20

This Group of CISOs Is Pumping Their Own Money and Advice Into Security Startups

Security

Securityweek
14.5.20

Code Analysis Company SonarSource Acquires RIPS Technologies

IT

Securityweek
14.5.20

Effective Business Continuity Plans Require CISOs to Rethink WAN Connectivity

Security

Thehackernews
14.5.20

Improper Microsoft Patch for Reverse RDP Attacks Leaves 3rd-Party RDP Clients Vulnerable

Vulnerebility

Thehackernews
14.5.20

Fear the PrintDemon? Upgrade Windows to patch easily exploited flaw

Vulnerebility

Net-security
14.5.20

Ramsay Malware Targets Air-Gapped Networks

Virus

Threatpost

14.5.20

Paying the ransom = paying double

Ransomware

Net-security
14.5.20

Debunking myths related to client-side security and Magecart attacks

CyberCrime

Net-security

14.5.20

5 easy steps to immediately bolster cybersecurity during the pandemic

Cyber

Net-security
14.5.20

Eye-opening statistics about open source security, license compliance, and code quality risk

Security

Net-security

14.5.20

COVID-19 has contributed to record breaking cybercriminal activity

CyberCrime

Net-security
14.5.20

Unexpected downtime is crippling businesses, causing revenue losses

Security

Net-security

14.5.20

New features in Nutanix’s HCI platform simplify disaster recovery to protect business critical apps

Security

Net-security
14.5.20

Kali Linux 2020.2: New look, new packages, new installer options

OS

Net-security

13.5.20Chancellor Merkel has ‘hard evidence’ of Russian hackers targeted herBigBrothersSecurityaffairs
13.5.20Healthcare giant Magellan Health discloses data breach after ransomware attackRansomwareSecurityaffairs
13.5.20Microsoft May 2020 Patch Tuesday fixes 111 flaws, 13 CriticalVulnerebility

Securityaffairs

13.5.20Expert found 1,236 websites infected with Magecart e-skimmerCyberCrimeSecurityaffairs
13.5.20USCYBERCOM shares five new North Korea-linked malware samplesBigBrothersSecurityaffairs
13.5.20Trojan Lampion is back after 3 monthsVirusSecurityaffairs
13.5.20Adobe addresses critical issues in Acrobat, Reader, and DNG SDKVulnerebility

Securityaffairs

13.5.20Facebook Awards Researcher $20,000 for Account Hijacking VulnerabilitySocial

Securityweek

13.5.20SAP's May 2020 Security Updates Include Six Critical PatchesVulnerebilitySecurityweek
13.5.20Enterprise Identity Protection Firm Semperis Raises $40 MillionITSecurityweek
13.5.20CyberArk Acquires Identity as a Service Provider Idaptive for $70 MillionITSecurityweek
13.5.20Merkel Cites 'Hard Evidence' Russian Hackers Targeted HerBigBrothers

Securityweek

13.5.20Siemens Says Power Meters Affected by Urgent/11 VulnerabilitiesICSSecurityweek
13.5.20Thousands of Android Apps Leak Data Due to Firebase MisconfigurationsAndroidSecurityweek
13.5.20Microsoft's May 2020 Security Updates Patch 111 VulnerabilitiesVulnerebilitySecurityweek
13.5.20Adobe Patches 36 Vulnerabilities in Acrobat, DNG SDKVulnerebilitySecurityweek
13.5.20U.S. Cyber Command Shares More North Korean Malware VariantsBigBrothersSecurityweek
13.5.20Vulnerabilities in 'Page Builder' Plugin Expose 1 Million WordPress WebsitesVulnerebilitySecurityweek
13.5.20Researcher Spots New Malware Claimed to be 'Tailored for Air‑Gapped Networks'VirusThehackernews
13.5.20U.S Defense Warns of 3 New Malware Used by North Korean HackersBigBrothersThehackernews
13.5.20

Have you patched these top 10 routinely exploited vulnerabilities?

Vulnerebility

Net-security
13.5.20

How to implement least privilege in the cloud

Security

Net-security

13.5.20

Malspam with links to zip archives pushes Dridex malware

Spam  Virus

SANS
13.5.20

New third-party healthcare data rules: Increased access alongside privacy considerations

Privacy

Net-security
13.5.20

Advanced attack scenarios and sabotage of smart manufacturing environments

Attack  ICS

Net-security

13.5.20

Cybersecurity and compliance: Vital priorities for MSPs and their clients

Security

Net-security

13.5.20

Global remote work transitions fail to consider security gaps

Security

Net-security

13.5.20

May 2020 Patch Tuesday: Microsoft fixes 111 flaws, Adobe 36

OS

Net-security

12.5.20Popular Page Builder WordPress plugin fixes critical issues. Update it now!VulnerebilitySecurityaffairs
12.5.20Patch now your vBulletin install before hacker will target your forumVulnerebilitySecurityaffairs
12.5.20A cyber attack hit a port on Strait of Hormuz, Iran saidBigBrothers

Securityaffairs

12.5.20Shipping Giant Toll Confirms Hackers Stole Data in Recent AttackAttack

Securityweek

12.5.20Cybersecurity Threats to the Food Supply ChainCyberSecurityweek
12.5.20Ransomware Forces Shutdown of Texas Judiciary NetworkRansomwareSecurityweek
12.5.20Researchers Analyze Entry Points, Vectors for Manufacturing System AttacksAttackSecurityweek
12.5.20Over 4000 Android Apps Expose Users' Data via Misconfigured Firebase DatabasesAndroidThehackernews
12.5.20

Sphinx Malware Returns to Riddle U.S. Targets

Virus

Threatpost

12.5.20

Millions of Thunderbolt-Equipped Devices Open to ‘ThunderSpy’ Attack

Attack

Threatpost

12.5.20

Astaroth’s New Evasion Tactics Make It ‘Painful to Analyze’

Virus

Threatpost

12.5.20

Unpatched Bugs in Oracle iPlanet Open Door to Info-Disclosure, Injection

Vulnerebility

Threatpost
12.5.20

Zeus Sphinx continues to be used in Coronavirus-themed attacks

Attack

Securityaffairs
12.5.20

ATM vendor Diebold Nixdorf suffered a Ransomware attack

Ransomware

Securityaffairs

12.5.20

ATM Maker Diebold Nixdorf Hit by Ransomware

Ransomware

Securityweek

12.5.20

An Undisclosed Critical Vulnerability Affect vBulletin Forums — Patch Now

Vulnerebility

Thehackernews
12.5.20

Excel 4 Macro Analysis: XLMMacroDeobfuscator

Virus

SANS
12.5.20

Why a single online name and social cards will be the new norm

Social

Net-security
12.5.20

(ISC)2 Professional Development Institute: Timely and continuing education opportunities

Security

Net-security

12.5.20

Is remote work here to stay?

Security

Net-security

12.5.20

Total number of publicly reported breaches in Q1 2020 down 42% compared to last year

Incindent

Net-security

12.5.20

Home workplaces introduce new risks, poor password hygiene

Security

Net-security

12.5.20

Gain free access to Utilizing Big Data course, a $200 value

Security

Net-security

11.5.20

VMware is going to fix recent Salt issues in vROps

Vulnerebility

Securityaffairs
11.5.20

GDPR Data Security Checklist in the Age of COVID-19 and the Remote Workforce

Privacy

Securityaffairs

11.5.20

Experts disclose security flaws in Oracle’s iPlanet Web Server

Vulnerebility

Securityaffairs
11.5.20

STAMINA, a new approach to malware detection by Microsoft, Intel

Virus

Securityaffairs

11.5.20

Sodinokibi ransomware uses MS API to encrypt open and locked files

Ransomware

Securityaffairs
11.5.20

Blue Mockingbird Monero-Mining campaign targets web apps

Cryptocurrency

Securityaffairs

11.5.20

US Says Chinese Hacking Vaccine Research: Reports

BigBrothers

Securityweek

11.5.20

Hacker Group Advertises Data From Multiple Fresh Breaches

Incindent

Securityweek
11.5.20

VMware to Patch Recent Salt Vulnerabilities in vROps

Vulnerebility

Securityweek
11.5.20

Railway Vehicle Maker Stadler Hit by Malware Attack

Virus

Securityweek

11.5.20

Thunderspy: More Thunderbolt Flaws Expose Millions of Computers to Attacks

Vulnerebility

Securityweek
11.5.20

DigitalOcean Inadvertently Exposed Customer Data

Incindent

Securityweek
11.5.20

7 New Flaws Affect All Thunderbolt-equipped Computers Sold in the Last 9 Years

Vulnerebility

Thehackernews
11.5.20

vBulletin fixes critical vulnerability, patch immediately!

Vulnerebility

Net-security
11.5.20

Have you updated SaltStack Salt? Attacks are underway!

Attack

Net-security

11.5.20Sodinokibi ransomware uses MS API to encrypt open and locked filesRansomwareSecurityaffairs
11.5.20Blue Mockingbird Monero-Mining campaign targets web appsCryptocurrency

Securityaffairs

11.5.20Swiss rail vehicle manufacturer Stadler hit by a malware-based attackVirusSecurityaffairs
11.5.20Shiny Hunters group is selling data from 11 companies on the Dark WebHacking

Securityaffairs

11.5.20Coronavirus-themed attacks May 03 – May 09, 2020Security

Securityaffairs

11.5.20Microsoft, Intel Introduce 'STAMINA' Approach to Malware DetectionVirus

Securityweek

11.5.20

YARA v4.0.0: BASE64 Strings

Virus

SANS
11.5.20

Leveraging automation to maximize security budgets

Security

Net-security
11.5.20

Are you sure you would never fall for a phishing scam?

Phishing

Net-security

11.5.20

FIRST releases updated coordination principles for Multi-Party Vulnerability Coordination and Disclosure

Vulnerebility

Net-security

11.5.20

Ransomware on the rise, companies prioritizing disaster recovery

Ransomware

Net-security

11.5.20

Biometric device shipments revenue to drop by $2 billion

Security

Net-security

11.5.20

Open source algorithms for network graph analysis help discover patterns in data

Security

Net-security

10.5.20Hacker group floods dark web with data stolen from 11 companiesIncindent

Bleepingcomputer

10.5.20North Korean hackers infect real 2FA app to compromise MacsApple  APT

Bleepingcomputer

10.5.20Microsoft Edge is getting a new feature to reduce web spamSpam

Bleepingcomputer

10.5.20Rail vehicle manufacturer Stadler hit by cyberattack, blackmailedCyber

Bleepingcomputer

10.5.20Surface Laptop 3 screens with spontaneous cracks now fixed for freeSecurity

Bleepingcomputer

10.5.20Black Hat and DEF CON security conferences go virtual due to pandemicCongress

Bleepingcomputer

10.5.20Have fun learning robotics with a DIY Bionic Robot Lizard kitIT

Bleepingcomputer

10.5.20Twitter warns of legacy site theme shutting down on June 1Social

Bleepingcomputer

10.5.20Windows 10 upgrade bug prevents HDR video streamingOS

Bleepingcomputer

10.5.20Microsoft rolls out protection against Office 365 email stormsOS

Bleepingcomputer

10.5.20New Google Authenticator update makes it worth using againSecurity

Bleepingcomputer

10.5.20Windows 10's Game Mode reportedly causing freezes, FPS issuesOS

Bleepingcomputer

10.5.20Firefox 76.0.1 released to fix broken Amazon extension, crashesSecurity

Bleepingcomputer

10.5.20REvil ransomware threatens to leak A-list celebrities' legal docsRansomware

Bleepingcomputer

10.5.20Hackers sell stolen user data from HomeChef, ChatBooks, and ChronicleIncindent

Bleepingcomputer

10.5.20Ruhr University Bochum shuts down servers after ransomware attackRansomware

Bleepingcomputer

10.5.20Unemployed Americans offered ‘remote jobs’ as money mulesSecurity

Bleepingcomputer

10.5.20Microsoft leak: Windows 10 2004 being released last week of MayOS

Bleepingcomputer

10.5.20Intel graphics drivers now officially support Windows 10 2004OS

Bleepingcomputer

10.5.20Microsoft Teams call drops on desktop caused by iOS bugiOS

Bleepingcomputer

10.5.20Critical WordPress plugin bug lets hackers take over 1M sitesIncindent

Bleepingcomputer

10.5.20New "Aria-body" backdoor gets advanced hackers back in the spy gameVirus

Bleepingcomputer

10.5.20SilverTerrier BEC scammers target US govt healthcare agenciesBigBrothers  Spam

Bleepingcomputer

10.5.20Microsoft's GitHub account hacked, private repositories stolenHacking

Bleepingcomputer

10.5.20Cisco Webex phishing uses fake cert errors to steal credentialsPhishing

Bleepingcomputer

10.5.20Large scale Snake Ransomware campaign targets healthcare, moreRansomware

Bleepingcomputer

10.5.20Windows 10 Build 19624 released with Windows Update fixesOS

Bleepingcomputer

10.5.20Hackers use website favicon to camouflage credit card skimmerCrime

Bleepingcomputer

10.5.20Hacker sells 22 million Unacademy user records after data breachIncindent

Bleepingcomputer

10.5.20Critical Citrix ShareFile bugs could give access to private filesVulnerebility

Bleepingcomputer

10.5.20SAP announces security issues in cloud-based productsSecurity

Bleepingcomputer

10.5.20Massive campaign targets 900,000 WordPress sites in a weekIncindent

Bleepingcomputer

10.5.20Cyber volunteers release blocklists for 26,000 COVID-19 threatsCyber

Bleepingcomputer

10.5.20Microsoft releases May Office updates with fixes for auth issuesSecurity

Bleepingcomputer

10.5.20Toll Group hit by ransomware a second time, deliveries affectedRansomware

Bleepingcomputer

10.5.20

Why Securing Remote Work is Crucial To Ensuring Business Continuity

Security blog

Sonicwall

10.5.20

Remembering the ILOVEYOU virus twenty years later

Malware blog

Avast blog

10.5.20

New Android malware steals banking passwords

Malware blog

Avast blog

10.5.20

Massive WordPress attack relies on old flaws

Incident blog

Avast blog
10.5.20

Using a Full Lifecycle Approach to Secure Cloud Native Applications

Cyber blog

Palo Alto

10.5.20

The Right Approach to Securing 5G

Cyber blog

Palo Alto

10.5.20

Scaling Security for Data Center Transformation: COVID-19 Amplifies Trends

Cyber blog

Palo Alto

10.5.20

Power the New Normal with Prisma Access: Delivering Next-Gen Cybersecurity

Cyber blog

Palo Alto

10.5.20

Unit 42 Recognized by Microsoft on the MSRC Security Researcher Leaderboard

Cyber blog

Palo Alto
10.5.20

Nmap Basics - The Security Practitioner's Swiss Army Knife

Security

SANS
10.5.20BDGoGoogleDecryptorAnti-Ransom ToolAnti-Ransom Tool
10.5.20North Korea-linked Lazarus APT uses a Mac variant of the Dacls RATAPTSecurityaffairs
10.5.203.68 Million MobiFriends User details leaked onlineIncindentSecurityaffairs
10.5.20Sodinokibi gang hacked law firm of the celebrities and threatens to release the docsRansomwareSecurityaffairs
10.5.20SilverTerrier gang uses COVID-19 lures in BEC attacks against healthcare, government organizationsSpamSecurityaffairs
9.5.20Microsoft launches IoT-focused bounty program with $100K awardsIoT

Bleepingcomputer

9.5.20

InfinityBlack hacker group dismantled by European authoritiesHacking

Bleepingcomputer

9.5.20

Game patch gives hackers access to development content on Amazon S3Hacking

Bleepingcomputer

9.5.20

Nation-state hackers are targeting COVID-19 response orgsBigBrothers

Bleepingcomputer

9.5.20

Firefox 76 released with integrated data breach alertsIncindent

Bleepingcomputer

9.5.20

GitHub shuts down Popcorn Time repositories due to MPA DMCA noticeSecurity

Bleepingcomputer

9.5.20

GoDaddy notifies users of breached hosting accountsIncindent

Bleepingcomputer

9.5.20

LockBit ransomware self-spreads to quickly encrypt 225 systemsRansomware

Bleepingcomputer

9.5.20

Office 365 to stop data theft by disabling external forwardingSecurity

Bleepingcomputer

9.5.20

New VCrypt Ransomware locks files in password-protected 7ZIPsRansomware

Bleepingcomputer

9.5.20

Hackers exploit Salt RCE bugs in widespread attacks, PoCs publicExploit

Bleepingcomputer

9.5.20

CAM4 adult cam site exposes 11 million emails, private chatsIncindent

Bleepingcomputer

9.5.20

LineageOS outage caused by hackers breaching main infrastructureOS

Bleepingcomputer

9.5.20

Hacker sells 91 million Tokopedia accounts, cracked passwords sharedHacking

Bleepingcomputer

9.5.20

Debloating Windows 10 and increasing privacy with SharpAppOS

Bleepingcomputer

9.5.20Ransom NewsRansom

Ransom

9.5.20

TO PAY OR NOT TO PAY

Safety blog

Cybereason

9.5.20

CONVERGING ENDPOINT AND MOBILE SECURITY

Safety blog

Cybereason

9.5.20

2 METRICS TO EVALUATE MITRE ATT&CK RESULTS

Attack blog

Cybereason

9.5.20

EVENTBOT: A NEW MOBILE BANKING TROJAN IS BORN

Malware blog

Cybereason

9.5.20

ENS 10.7 Rolls Back the Curtain on Ransomware

Ransomware blog

Mcafee blog

9.5.20

Cybercriminals Actively Exploiting RDP to Target Remote Organizations

Cyber blog  Exploit blog

Mcafee blog

9.5.20

COVID-19 – Malware Makes Hay During a Pandemic

Malware blog

Mcafee blog

9.5.20

Tales From the Trenches; a Lockbit Ransomware Story

Ransomware blog

Mcafee blog

9.5.20

Is the Cloud Safe? Thinking About the Cloud Through a Security Lens

Security blog

F5 Labs

9.5.20

Demystifying API Attacks Using Gamification

Attack blog

F5 Labs

9.5.20

Excelerating Analysis, Part 2 — X[LOOKUP] Gon’ Pivot To Ya

Malware blog

FireEye

9.5.20

Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents

Ransomware blog

FireEye

9.5.20

Naikon APT: Cyber Espionage Reloaded

APT blog

Checkpoint

9.5.20

Bugs on the Windshield: Fuzzing the Windows Kernel

Vulnerebility blog

Checkpoint

9.5.20

Nazar: Spirits of the Past

APT blog

Checkpoint

9.5.20

First seen in the wild – Malware uses Corporate MDM as attack vector

Attack blog  Malware blog

Checkpoint

9.5.20

Vulnerability Spotlight: Code execution vulnerability in 3S CODESYS

Vulnerebility blog

Cisco Talos

9.5.20

Vulnerability Spotlight: Multiple code execution vulnerabilities in Accusoft ImageGear

Vulnerebility blog

Cisco Talos

9.5.20

Scams to watch out for not just this Mother’s Day

Spam blog

Eset

9.5.20

Digital transformation could be accelerated by COVID‑19

Security blog

Eset

9.5.20

5 common password mistakes you should avoid

Safety blog

Eset

9.5.20

Almost a million WordPress websites targeted in massive campaign

Cyber blog

Eset

9.5.20

Professional data leakage: How did that security vendor get my personal data?

Incident blog

Eset

9.5.20

Ghost blogging platform servers hacked to mine cryptocurrency

Cryptocurrency blog

Eset

9.5.20

It’s no time to let your guard down as coronavirus fraud remains a threat

Spam blog

Eset

9.5.20Report: Microsoft’s GitHub Account Gets HackedHacking

Threatpost

9.5.20Black Hat USA, DEF CON 28 Go VirtualCongress

Threatpost

9.5.20Hackers Breach 3.5 Million MobiFriends Dating App CredentialsIncindent

Threatpost

9.5.20Naikon’s AriaAPTSecurelist
9.5.20Microsoft investigates claims that its GitHub account has been hackedHacking

Securityaffairs

9.5.20Cloud Security Company Ermetic Emerges From Stealth ModeSecurity

Securityweek

9.5.20DigitalOcean Data Leak Incident Exposed Some of Its Customers DataIncindentThehackernews

8.5.20

H2 2019: Duration of phishing attacks grows, use of banking trojans wanes

Phishing  Virus

Net-security

8.5.20

GitHub Code Scanning aims to prevent vulnerabilities in open source software

Vulnerebility

Net-security

8.5.20

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Phishing

Securityaffairs
8.5.20

Massive cyber attack forced Ruhr University Bochum (RUB) to shut down its IT infrastructure

Attack

Securityaffairs

8.5.20

Cisco fixes High Severity issues in ASA and FTD products

Vulnerebility

Securityaffairs

8.5.20

Healthcare, Government Organizations Targeted in BEC Attacks With COVID-19 Lures

Spam

Securityweek

8.5.20

Google Authenticator Users Can Now Transfer 2SV Secrets Between Devices

Mobil

Securityweek

8.5.20

Industry Reactions to Alliance for Open 5G Systems: Feedback Friday

Mobil

Securityweek

8.5.20

Elementor Plugin Vulnerabilities Exploited to Hack WordPress Sites

Vulnerebility

Securityweek

8.5.20

Microsoft Investigating GitHub Account Hacking Claims

Hacking

Securityweek

8.5.20

Cisco Fixes High-Severity Flaws In Firepower Security Software, ASA

Vulnerebility

Threatpost

8.5.20

Naikon APT Hid Five-Year Espionage Attack Under Radar

APT

Threatpost

8.5.20

Zoom Beefs Up End-to-End Encryption to Thwart ‘Zoombombers’

Crypto

Threatpost

8.5.20

Blue Mockingbird Monero-Mining Campaign Exploits Web Apps

Cryptocurrency

Threatpost

8.5.20

Hackers Dumpster Dive for Taxpayer Data in COVID-19 Relief Money Scams

Spam

Threatpost
8.5.20

Issues in Elementor Pro and Ultimate Addons for Elementor exposed 1 Million WordPress sites at risk

Incindent

Securityaffairs

8.5.20

Poulight Stealer, a new Comprehensive Stealer from Russia

BigBrothers

Securityaffairs

8.5.20

Naikon APT is flying under the radar since 2015

APT

Securityaffairs

8.5.20

Zoom Agrees to Step Up Security After New York Probe

Security

Securityweek

8.5.20

Samsung Patches Critical 0-Click Vulnerability in Smartphones

Vulnerebility

Securityweek

8.5.20

Cisco Patches High Severity Vulnerabilities in Security Products

Vulnerebility

Securityweek

8.5.20

Critical Flaw in CODESYS Industrial Controller Software Allows Code Execution

Vulnerebility

Securityweek

8.5.20

Search Company Algolia Hacked via Recent Salt Vulnerabilities

Hacking

Securityweek

8.5.20

Using Nmap As a Lightweight Vulnerability Scanner

Safety

SANS

8.5.20

The new cyber risk reality of COVID-19 operating mode

Cyber

Net-security
8.5.20

99% of enterprise users reuse passwords across accounts

Safety

Net-security

8.5.20

How to increase cyber defense agility for the next lockdown

Cyber

Net-security

8.5.20

Financial services leading the way in adopting DevOps, still hurdles remain

Security

Net-security

8.5.20

Is the stress of card fraud worth the digital convenience?

Security

Net-security

7.5.20

Snake Ransomware hits Europe’s largest private hospital operator Fresenius during COVID-19 outbreakRansomwareSecurityaffairs

7.5.20

Brazilian trojan banker is targeting Portuguese users using browser overlayVirus

Securityaffairs

7.5.20

Samsung fixes a zero-click issue affecting its phonesMobil

Securityaffairs

7.5.20

North Korean Hackers Release Mac Variant of Dacls RATVirus

Securityweek

7.5.20

Recorded Future Releases Free Threat Intelligence Browser ExtensionSecurity

Securityweek

7.5.20

Chinese Naikon APT Rediscovered After New Five-year Stealth CampaignAPT

Securityweek

7.5.20

Zoom Acquires Keybase to Bring End-to-End Encryption to Video PlatformCrypto

Securityweek

7.5.20

Another Stuxnet-Style Vulnerability Found in Schneider Electric SoftwareICS

Securityweek

7.5.20

Czech, US to Cooperate on Security of 5G NetworksBigBrothers

Securityweek

7.5.20

This Asia-Pacific Cyber Espionage Campaign Went Undetected for 5 YearsCyberSpyThehackernews

7.5.20

How a favicon delivered a web credit card skimmer to victims

CyberCrime

Net-security

7.5.20

Firefox 76 delivers new password security features and security fixes

Security

Net-security

7.5.20

Passwords still widely used, despite known weaknesses

Safety

Net-security

7.5.20

Scanning with nmap?s NSE scripts

Safety

SANS

7.5.20

Lazarus Group Hides macOS Spyware in 2FA ApplicationCyberCrime

Threatpost

7.5.20

Attackers Claim Identity of Financial NGO to Steal Sharepoint, Office CredentialsIncindent

Threatpost

7.5.20

Ransomware Attack Takes Down Toll Group Systems, AgainRansomware

Threatpost

7.5.20

InfinityBlack Dismantled After Selling Millions of CredentialsIncindent

Threatpost

7.5.20

Microsoft Shells Out $100K for IoT SecurityITThreatpost

7.5.20

Unacademy hacked, 22 million accounts offered for saleIncindent

Securityaffairs

7.5.20

Shipping Giant Toll suffered a second ransomware attack in a few monthsRansomware

Securityaffairs

7.5.20

Nearly 1 Million WordPress Sites Targeted via Old VulnerabilitiesVulnerebility

Securityweek

7.5.20

New GitHub Features Help Find Vulnerabilities and Secrets in CodeVulnerebility

Securityweek

7.5.20

Firefox 76 Brings Security Patches, Breached Password AlertsVulnerebility

Securityweek

7.5.20

Seventy Percent of Firms Sacrifice Security for Faster InnovationSecurity

Securityweek

7.5.20

Two Popular VPNs Exposed Users to Attacks Via Fake UpdatesAttack

Securityweek

7.5.20

Facebook Launches 'Discover,' A Secure Proxy to Browse the Internet for FreeSocialThehackernews

7.5.20

Destination Cyberlandia: 3 keys to cyber happiness amid COVID-19

Cyber

Net-security

7.5.20

Shifts in device usage have large security implications

Security

Net-security

7.5.20

Most attacks successfully infiltrate production environments without detection

Attack

Net-security

7.5.20

Software vulnerabilities sometimes first announced on social media

Vulnerebility

Net-security

7.5.20

Worldwide IT spending expected to decline 5.1% in 2020

IT

Net-security

7.5.20

Get official CCSP online self-paced training

Security

Net-security

7.5.20

Adult live streaming site CAM4 found leaking data of millions of users

Incindent

Net-security

6.5.20

DDoS attacks in Q1 2020

Attack

Securelist

6.5.20

9% of SAP’s 440,000 customers impacted by security bugs in some cloud products

Vulnerebility

Securityaffairs

6.5.20

Data belonging 44 Million Pakistani mobile users leaked online

Incindent

Securityaffairs

6.5.20

Law enforcement agencies dismantled Infinity Black hacker group

Hacking

Securityaffairs

6.5.20

Citrix ShareFile Vulnerabilities Expose User Files

Vulnerebility

Securityweek

6.5.20

Australian Shipping Giant Toll Hit by Ransomware for Second Time

Ransomware

Securityweek

6.5.20

SAP Alerts Customers of Vulnerabilities in Cloud Products

Vulnerebility

Securityweek

6.5.20

Nearly a million WordPress sites targeted in extensive attacks

Attack

Net-security

6.5.20

Microsoft announces limited Azure Sphere bug bounty program

Security

Net-security

6.5.20

AA20-126A : APT Groups Target Healthcare and Essential Services

CERT

CERT

6.5.20

GoDaddy Hack Breaches Hosting Account Credentials

Incindent

Threatpost

6.5.20

Google Android RCE Bug Allows Attacker Full Device Access

Android

Threatpost

6.5.20

New Kaiji Botnet Targets IoT, Linux Devices

BotNet  IoT

Threatpost

6.5.20

Spear-Phishing Attack Spoofs EE To Target Executives

Phishing

Threatpost

6.5.20

Recorded Future to Provide Free Access to Elite Intelligence Through New Browser Extension

Security

Securityaffairs

6.5.20

CAM4 adult cam site leaked 11M database records including emails, private chats

Incindent

Securityaffairs

6.5.20

New 'Kaiji' Botnet Attacks Linux, IoT Devices via SSH Brute Force

BotNet  IoT

Securityweek

6.5.20

US and UK Warn of Adversaries Targeting COVID-19 Responders

BigBrothers

Securityweek

6.5.20

More Than 30 Firms Join Alliance Calling for 'Open' 5G systems

Mobil

Securityweek

6.5.20

Microsoft Offering Up to $100,000 for Vulnerabilities in Azure Sphere

Vulnerebility

Securityweek

6.5.20

Warning: Citrix ShareFile Flaw Could Let Attackers Steal Corporate Secrets

Incindent

Thehackernews

6.5.20

Keeping an Eye on Malicious Files Life Time

Virus

SANS

6.5.20

Helping healthcare combat cyber attackers

Attack

Net-security

6.5.20

Future of work: Delivering a modern workspace

Security

Net-security

6.5.20

Password psychology: People aren’t protecting themselves even though they know better

Crypto

Net-security

6.5.20

Is your smartphone pushing you to overshare?

Mobil

Net-security

6.5.20

Sensitive data is piling up on enterprise devices, Windows 10 machines behind on patching

OS

Net-security

5.5.20

GoDaddy discloses a data breach, web hosting account credentials exposed

Incindent

Securityaffairs
5.5.20

Expert released PoC exploit for CVE-2020-1967 DoS flaw in OpenSSL

Exploit  Vulnerebility

Securityaffairs
5.5.20

Kaiji, a new Linux malware targets IoT devices in the wild

Virus

Securityaffairs
5.5.20

European Authorities Dismantle 'InfinityBlack' Hacker Group

BigBrothers

Securityweek
5.5.20

European Virus Tracing Apps Highlight Battle for Privacy

Privacy

Securityweek
5.5.20

Most Attacks Don't Generate Security Alerts: Mandiant

Attack

Securityweek
5.5.20

Android's May 2020 Patches Fix Critical System Vulnerability

Android

Securityweek
5.5.20

Virtualized Cloud Visibility Firm Orca Security Raises $20.5 Million

IT

Securityweek
5.5.20

GoDaddy Informs Users of Data Breach

Incindent

Securityweek
5.5.20

PoC Exploit Released for DoS Vulnerability in OpenSSL

Exploit  Vulnerebility

Securityweek
5.5.20

Change This Browser Setting to Stop Xiaomi from Spying On Your Incognito Activities

Mobil

Thehackernews
5.5.20

Can you trust attachments with unfamiliar extensions?

Spam

Net-security
5.5.20

Phishers target investment brokers, aim for Office, SharePoint login credentials

Phishing

Net-security
5.5.20

Oracle: Unpatched Versions of WebLogic App Server Under Active Attack

Attack

Threatpost

5.5.20

Hackers Exploit Critical Flaw in Ghost Platform with Cryptojacking Attack

Cryptocurrency  Exploit

Threatpost

5.5.20

Airplane Hack Exposes Weaknesses of Alert and Avoidance Systems

Hacking

Threatpost

5.5.20

Microsoft spotted multiple malspam campaigns using malware-laced ISO and IMG files

Spam  Virus

Securityaffairs
5.5.20

Nation-state actors are targeting UK universities to steal info on COVID-19 research

BigBrothers

Securityaffairs
5.5.20

Firm's MDM Server Abused to Deliver Android Malware to 75% of Its Devices

Android

Securityweek
5.5.20

Power Supply Can Turn Into Speaker for Data Exfiltration Over Air Gap

Attack

Securityweek
5.5.20

COVID-19 Contact Tracing Apps: Effective Virus Risk Management Tools or Privacy Nightmare?

Security

Securityweek
5.5.20

Most Malicious Coronavirus-Related Domains Located in U.S.

Virus

Securityweek
5.5.20

Cloud Security Features Don't Replace the Need for Personnel Security Capabilities

Security

SANS
5.5.20

How to prevent permission bloat: Overlooked and hidden access

Security

Net-security
5.5.20

Why you should be rushing to deploy multi-factor authentication to support remote work

Safety

Net-security
5.5.20

Preventing account takeover and social engineering attacks

Attack

Net-security
5.5.20

Half of IT pros believe their cybersecurity teams are ready to detect attacks

Cyber

Net-security
5.5.20

Online learning surges as people look for ways to be productive at home

Security

Net-security
4.5.20DHS CISA alert provides recommendations on securing Office 365 installsBigBrothersSecurityaffairs

4.5.20

Hackers are scanning the internet for vulnerable Salt installs, Ghost blogging platform hackedVulnerebilitySecurityaffairs
4.5.20LineageOS servers hacked, attackers exploited unpatched Salt issuesVulnerebilitySecurityaffairs

4.5.20

TP-Link Patches Multiple Vulnerabilities in NC Cloud CamerasVulnerebilitySecurityweek
4.5.20New Executive Order Aims to Protect U.S. Power Grid From Backdoored EquipmentBigBrothersSecurityweek
4.5.20Flaws in Ninja Forms, LearnPress Plugins Exposed WordPress Sites to AttacksVulnerebilitySecurityweek
4.5.20Recent Salt Vulnerabilities Exploited to Hack LineageOS, Ghost, DigiCert ServersVulnerebilitySecurityweek
4.5.20New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into SpeakersAttack  VirusThehackernews
4.5.20Hackers Breach LineageOS, Ghost, DigiCert Servers Using SaltStack VulnerabilityVulnerebilityThehackernews
4.5.20

Fake Microsoft Teams notification emails are hitting inboxes

Phishing

Net-security

4.5.20

SaltStack Salt vulnerabilities actively exploited by attackers, patch ASAP

Exploit

Net-security
4.5.20

Help your helpdesk: Empower employees to self-reset their AD account password

Security

Net-security

4.5.20

India’s Jio Coronavirus symptom checker exposed test resultsIncindentSecurityaffairs
4.5.20Coronavirus-themed attacks April 26 – May 02, 2020CyberSecurityaffairs
4.5.20Cyber Threats Observatory Gets ImprovementsCyberSecurityaffairs
4.5.20TOKOPEDIA e-commerce hacked, 91 Million accounts available on the darkwebIncindentSecurityaffairs

4.5.20

ZIP & AES

Virus

SANS
4.5.20

Protecting corporate data in popular cloud-based collaborative apps

Safety

Net-security
4.5.20

CCPA privacy requests cost business up to $275k per million consumer records

Privacy

Net-security
4.5.20

Consumers will opt for competitors after a single ransomware-related service disruption

Ransomware

Net-security
4.5.20

Despite spending more on compliance, businesses still have basic IT weaknesses

Security

Net-security
4.5.20

5G infrastructure market estimated to reach $44.9 billion by 2025

Mobil

Net-security
4.5.20

CISSP online self-paced training only $561 for a limited time

Security

Net-security

3.5.20

Xiaomi tracks private browser and phone usage, defends behaviorPrivacy

Bleepingcomputer

3.5.20Sodinokibi, Ryuk ransomware drive up average ransom to $111,000Ransomware

Bleepingcomputer

3.5.20Opening 100 tabs in Google Chrome Mobile gets you a smiley faceMobilBleepingcomputer
3.5.20Microsoft Edge getting improved security, work at home featuresSecurity

Bleepingcomputer

3.5.20FCC: No more warnings for robocallers before finesBigBrothers

Bleepingcomputer

3.5.20

Hackers breach company’s MDM server to spread Android malwareAndroid

Bleepingcomputer

3.5.20New phishing campaign packs an info-stealer, ransomware punchPhishing

Bleepingcomputer

3.5.20Convincing Office 365 phishing uses fake Microsoft Teams alertsPhishing

Bleepingcomputer

3.5.20French daily Le Figaro database exposes users’ personal infoIncindent

Bleepingcomputer

3.5.20Hackers say they stole millions of credit cards from Banco BCRIncindent

Bleepingcomputer

3.5.20

US govt agencies to disable DoH until federal service is readyBigBrothers

Bleepingcomputer

3.5.20Ninja Forms WordPress plugin patch prevents takeover of 1M sitesVulnerebility

Bleepingcomputer

3.5.20Shade Ransomware Decryptor can now decrypt over 750K victimsRansomware

Bleepingcomputer

3.5.20New Android malware steals financial information, bypasses 2FAAndroid

Bleepingcomputer

3.5.20Microsoft Sway abused in PerSwaysion spear-phishing operationPhishing

Bleepingcomputer

3.5.20

Clop ransomware leaks ExecuPharm's files after failed ransomRansomware

Bleepingcomputer

3.5.20Bugs in WordPress plugins for online courses let students cheatVulnerebility

Bleepingcomputer

3.5.20US govt updates Microsoft Office 365 security best practicesBigBrothers

Bleepingcomputer

3.5.20Google updates Chrome Web Store policy to block extension spamSecurity

Bleepingcomputer

3.5.20Windows 10 Search now gives easy access to COVID-19 infoOS

Bleepingcomputer

3.5.20

Microsoft releases Windows 10 Build 19619 with freeze fixesOS

Bleepingcomputer

3.5.20Numerous sites leak user emails to advertising, analytics servicesPrivacy

Bleepingcomputer

3.5.20Microsoft releases Sysmon 11 with auto-backup of deleted filesOS

Bleepingcomputer

3.5.20RDP brute-force attacks are skyrocketing due to remote workingAttack

Bleepingcomputer

3.5.20Microsoft warns of malware surprise pushed via pirated moviesCryptocurrency

Bleepingcomputer

3.5.20

Securing Telecommuters with Expanded Endpoint Visibility and Control

Cyber blog

Sonicwall
3.5.20

Why Securing Remote Work is Crucial To Ensuring Business Continuity

Cyber blog

Sonicwall
3.5.20

Apple flaw puts iPhones & iPads at risk

OS Blog

Avast blog
3.5.20

New Android malware steals banking passwords

OS Blog

Avast blog
3.5.20

Don’t Panic: COVID-19 Cyber Threats

Cyber blog

Palo Alto Unity42

3.5.20

Anatomy of Formjacking Attacks

Cryptocurrency blog

Palo Alto Unity42
3.5.20

Learning from Home While School’s Out: Cybersecurity Education for Kids

Cyber blog

Palo Alto

3.5.20

What Kind of Cybersecurity Leader Are You? Advice for CSOs and Others

Cyber blog

Palo Alto

3.5.20

Highlighting the Latest Compute Security Capabilities in Prisma Cloud

Cyber blog

Palo Alto

3.5.20

Manage a Remote SOC: Playbooks for Monitoring Remote User Activity

Cyber blog

Palo Alto

3.5.20

Phishing PDF with Unusual Hostname

Phishing

SANS
3.5.20

TrickBot operators exploit COVID-19 as lures

BotNet

Securityaffairs
3.5.20

Fake Microsoft Teams notifications aim at stealing Office365 logins

CyberCrime

Securityaffairs
3.5.20

President Trump’s executive order bans foreign electrical equipment from national power grid

BigBrothers

Securityaffairs
3.5.20

French daily Le Figaro leaks 7.4 Billion records

Incindent

Securityaffairs

2.5.20

Ransom NewsRansomRansom

2.5.20

ShadeDecryptorAnti-Ransom ToolAnti-Ransom Tool

2.5.20

Rogue affiliates are running fake antivirus expiration scamsExploit

Bleepingcomputer

2.5.20

Adobe fixes critical vulnerabilities in Magento and IllustratorVulnerebility

Bleepingcomputer

2.5.20

Microsoft releases guidance on blocking ransomware attacksRansomwareBleepingcomputer

2.5.20

Hacking group used Google Play Store to push spyware for yearsAndroid

Bleepingcomputer

2.5.20

Lucy malware for Android adds file-encryption for ransomware opsAndroid  Ransomware

Bleepingcomputer

2.5.20

Fake Fedex and UPS delivery issues used in COVID-19 phishingPhishing

Bleepingcomputer

2.5.20

WordPress plugin bug lets hackers create rogue admin accountsVulnerebility

Bleepingcomputer

2.5.20

Twitter kills SMS-based tweeting in most countriesMobil

Bleepingcomputer

2.5.20

Microsoft investigating Windows 10 KB4549951 BSOD reportsOS

Bleepingcomputer

2.5.20

Shade Ransomware shuts down, releases 750K decryption keysRansomware

Bleepingcomputer

2.5.20

Asnarök malware exploits firewall zero-day to steal credentialsExploit  Virus

Bleepingcomputer

2.5.20

Microsoft Teams patched against image-based account takeoverVulnerebility

Bleepingcomputer

2.5.20

How to prevent new Windows 10 updates from ruining your dayOS

Bleepingcomputer

2.5.20

Hackers exploit zero-day in Sophos XG Firewall, fix releasedExploit  Vulnerebility

Bleepingcomputer

2.5.20

WSLFetch creates colorful Windows 10 WSL Linux informationOS

Bleepingcomputer

2.5.20

SMART FILTERING, SMART SAMPLING AND SMART SCALING

Security blog

Cybereason

2.5.20

EVENTBOT: A NEW MOBILE BANKING TROJAN IS BORN

Malware blog

Cybereason

2.5.20

Top Attacks Against Financial Services Organizations 2017–2019

Attack blog

F5 Labs

2.5.20

A Letter to the Present from a Post-Pandemic IT Director

Security blog

F5 Labs

2.5.20

Putting the Model to Work: Enabling Defenders With Vulnerability Intelligence — Intelligence for Vulnerability Management, Part Four

Vulnerebility blog

FireEye

2.5.20

Excelerating Analysis, Part 2 — X[LOOKUP] Gon’ Pivot To Ya

Malware blog

FireEye

2.5.20

E-Learning Platforms Getting Schooled – Multiple Vulnerabilities in WordPress’ Most Popular Learning Management System Plugins

Vulnerebility blog

Checkpoint

2.5.20

First Seen In the Wild – Mobile as Attack Vector Using MDM

Hardware blog

Checkpoint

2.5.20

Lucy’s Back: Ransomware Goes Mobile

Ransomware blog

Checkpoint

2.5.20

OptOut – Compiler Undefined Behavior Optimizations

Cyber blog

Checkpoint

2.5.20

Fuzzing ImageIO

Vulnerebility blog

Project Zero

2.5.20

Upgraded Aggah malspam campaign delivers multiple RATs

Malware blog  Spam blog

Cisco Talos

2.5.20

It’s no time to let your guard down as coronavirus fraud remains a threat

Cyber blog

Cisco Talos

2.5.20

Sextortion scammers still shilling with stolen passwords

Spam blog

Eset

2.5.20

ESET Threat Report

Cyber blog

Eset

2.5.20

Grandoreiro: How engorged can an EXE get?

Malware blog

Eset

2.5.20

Microsoft Teams flaw could let attackers hijack accounts

Incident blog

Eset

2.5.20

Microsoft Teams Impersonation Attacks Flood InboxesAttack

Threatpost

2.5.20

TrickBot Attack Exploits COVID-19 Fears with DocuSign-Themed PloyBotNet  Exploit

Threatpost

2.5.20

Upgraded Cerberus Spyware Spreads Rapidly via MDMVirus

Threatpost

2.5.20

News Wrap: Microsoft Sway Phish, Malicious GIF and Spyware AttacksSecurityThreatpost

2.5.20

Hackers are targeting recently patched WebLogic security vulnerabilityVulnerebilitySecurityaffairs

2.5.20

Maze Ransomware operators claim to have stolen millions of credit cards from Banco BCRRansomwareSecurityaffairs

2.5.20

New 'EventBot' Android Malware Targets Nearly 300 Financial AppsAndroidSecurityweek

2.5.20

Oracle Says Hackers Targeting Recently Patched VulnerabilitiesVulnerebilitySecurityweek

1.5.20

COVID-19 disinformation and misinformation campaigns continue to proliferateCyberCrimeSecurityaffairs

1.5.20

Europol analyses on criminal operations in Europe during COVID-19 CrisisBigBrothersSecurityaffairs

1.5.20

Over 800K WordPress sites are at risk due to a flaw in Ninja Forms pluginVulnerebilitySecurityaffairs

1.5.20

DHS Reiterates Recommendations on Securing Office 365BigBrothersSecurityweek

1.5.20

Several Vulnerabilities Patched With Release of WordPress 5.4.1VulnerebilitySecurityweek

1.5.20

CISA Reminds Federal Agencies to Use Its DNS ServiceBigBrothersSecurityweek

1.5.20

Sophisticated Phishing Kit Used by Multiple Groups to Target ExecutivesPhishingSecurityweek

1.5.20

Critical SaltStack RCE Bug (CVSS Score 10) Affects Thousands of Data CentersVulnerebilityThehackernews

1.5.20

Salt Bugs Allow Full RCE as Root on Cloud ServersVulnerebility

Threatpost

1.5.20

Microsoft Sway Abused in Office 365 Phishing AttackPhishing

Threatpost

1.5.20

Shade Threat Actors Call It Quits, Release 750K Encryption KeysCrypto

Threatpost

1.5.20

New Android Malware Targets PayPal, CapitalOne App UsersAndroidThreatpost

1.5.20

Critical WordPress e-Learning Plugin Bugs Open Door to CheatingVulnerebilityThreatpost

1.5.20

Crooks spread malware via pirated movies during COVID-19 outbreakVirusSecurityaffairs

1.5.20

Chegg discloses the third data breach in the last two yearsIncindentSecurityaffairs

1.5.20

Group-IB uncovers PerSwaysion – sophisticated phishing campaign targeting executives worldwideCyberCrime  PhishingSecurityaffairs

1.5.20

Experts found critical flaws in 3 popular e-Learning WordPress PluginsVulnerebilitySecurityaffairs

1.5.20

Criminals Quick to Exploit COVID-19 Crisis in EuropeCyberCrime  ExploitSecurityweek

1.5.20

Google 'Task Force' Fights Bad COVID-19 AdsCyberSecurityweek

1.5.20

EU Demands End to Coronavirus CyberattacksBigBrothersSecurityweek

1.5.20

Chegg Informs Employees of Data BreachIncindentSecurityweek

1.5.20

Attack traffic on TCP port 9673

Attack

SANS

1.5.20

Growth of APIs for new services

Security

Net-security

1.5.20

Mitigating cybersecurity risks for employees working remotely

Cyber

Net-security

1.5.20

Surge in phishing attacks using legitimate reCAPTCHA walls

Phishing

Net-security

1.5.20

What’s happening with all things cloud: Existing and future cloud strategies

Security

Net-security