Date | Name | Category | Web |
30.5.20 | VALAK: MORE THAN MEETS THE EYE | Malware blog | Cybereason |
30.5.20 | LOVE YOUR ENEMIES BEFORE YOU DESTROY THEM — HACKING FOR GOOD | Hacking blog | Cybereason |
30.5.20 | Turing in His Grave: What Human CAPTCHA Solvers Reveal About Control Design | Security blog | FireEye |
30.5.20 | As Healthcare Industry Transforms Overnight, Tech Community Must Act | Cyber blog | FireEye |
30.5.20 | Fraudulent Unemployment Claims Signal Consumers to Step Up Personal Identity Protection | Incident blog | FireEye |
30.5.20 | Bringing VandaTheGod down to Earth: Exposing the person behind a 7-year hacktivism campaign | Hacking blog | Checkpoint |
30.5.20 | Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta | Security blog | Cisco Talos |
30.5.20 | People know reusing passwords is risky – then do it anyway | Security blog | Eset |
30.5.20 | Critical Android flaw lets attackers hijack almost any app, steal data | OS Blog | Eset |
30.5.20 | Crooks threaten to leak customer data stolen from e‑commerce sites | Incident blog | Eset |
30.5.20 | From Agent.BTZ to ComRAT v4: A ten‑year journey | Malware blog | Eset |
30.5.20 | Two years later, has GDPR fulfilled its promise? | Security blog | Eset |
30.5.20 | NTT Communications Data Breach Affects Customers, Threatens Supply Chain | Incindent | Threatpost |
30.5.20 | NSA Warns of Sandworm Backdoor Attacks on Mail Servers | BigBrothers | Threatpost |
30.5.20 | ACLU Sues Clearview AI Over Faceprint Collection, Sale | Security | Threatpost |
30.5.20 | ‘Hack-For-Hire’ Firms Spoof WHO To Target Google Credentials | Hacking | Threatpost |
30.5.20 | Steganography Anchors Pinpoint Attacks on Industrial Targets | Attack ICS | Threatpost |
30.5.20 | ICT solutions provider NTT Com discloses security breach | Incindent | Securityaffairs |
30.5.20 | Himera and AbSent-Loader Leverage Covid19 lures | Virus | Securityaffairs |
30.5.20 | Google Takes Action Against Misleading and Malicious Notifications in Chrome | Virus | Securityweek |
30.5.20 | New Yorker Indicted for Stealing Card Data via SQL Injection Attacks | Attack | Securityweek |
30.5.20 | NSA Publishes IOCs Associated With Russian Targeting of Exim Servers | BigBrothers | Securityweek |
30.5.20 | NetBeans Projects on GitHub Targeted in Apparent Supply Chain Attack | Attack | Securityweek |
30.5.20 | Exclusive – Any Mitron (Viral TikTok Clone) Profile Can Be Hacked in Seconds | Hacking | Thehackernews |
30.5.20 | | Security | SANS |
29.5.20 | 26 million LiveJournal accounts being shared on hacker forums | Incindent | Bleepingcomputer |
29.5.20 | Windows 10 Storage Sense and Disk Cleanup merged in new app | OS | Bleepingcomputer |
29.5.20 | Arbonne MLM data breach exposes user passwords, personal info | Incindent | Bleepingcomputer |
29.5.20 | Critical Android bug lets malicious apps hide in plain sight | Android | Bleepingcomputer |
29.5.20 | List of ransomware that leaks victims' stolen files if not paid | Ransomware | Bleepingcomputer |
29.5.20 | New [F]Unicorn ransomware hits Italy via fake COVID-19 infection map | Ransomware | Bleepingcomputer |
29.5.20 | Hacking group builds new Ketrum malware from recycled backdoors | Virus | Bleepingcomputer |
29.5.20 | Russian cyberspies use Gmail to control updated ComRAT malware | BigBrothers Virus | Bleepingcomputer |
29.5.20 | Hacker extorts online shops, sells databases if ransom not paid | Ransomware | Bleepingcomputer |
29.5.20 | Windows Hello is getting two new features in Windows 10 2004 | OS | Bleepingcomputer |
29.5.20 | The zero-day exploits of Operation WizardOpium | APT Exploit | Securelist |
29.5.20 | Octopus Scanner Malware: open source supply chain attack via NetBeans projects on GitHub | Virus | Securityaffairs |
29.5.20 | An archive with 20 Million Taiwanese’ citizens leaked in the dark web | Incindent | Securityaffairs |
29.5.20 | Steganography in targeted attacks on industrial enterprises in Japan and Europe | Attack | Securityaffairs |
29.5.20 | Cisco to Buy Network Intelligence Firm ThousandEyes | IT | Securityweek |
29.5.20 | Germany Confronts Russian Ambassador Over Cyberattack | BigBrothers | Securityweek |
29.5.20 | Design Marketplace Minted Confirms Recent Data Breach | Incindent | Securityweek |
29.5.20 | Cisco Servers Hacked via Salt Vulnerabilities | Vulnerebility | Securityweek |
29.5.20 | | Vulnerebility | Net-security |
29.5.20 | | BigBrothers | Net-security |
29.5.20 | Hackers Compromise Cisco Servers Via SaltStack Flaws | Vulnerebility | Threatpost |
29.5.20 | Valak Loader Revamped to Rob Microsoft Exchange Servers | Virus | Threatpost |
29.5.20 | Google Location Tracking Lambasted in Arizona Lawsuit | Privacy | Threatpost |
29.5.20 | PonyFinal Ransomware Targets Enterprise Servers Then Bides Its Time | Ransomware | Threatpost |
29.5.20 | Inside the Hoaxcalls Botnet: Both Success and Failure | BotNet | Threatpost |
29.5.20 | Security breach impacted Cisco VIRL-PE infrastructure | Incindent | Securityaffairs |
29.5.20 | NSA warns Russia-linked APT group is exploiting Exim flaw since 2019 | BigBrothers | Securityaffairs |
29.5.20 | Israel ’s national cyber chief warns of rising of cyber-warfare | BigBrothers | Securityaffairs |
29.5.20 | Japanese ICT Solutions Provider NTT Com Discloses Data Breach | Incindent | Securityweek |
29.5.20 | NSA: Russian Agents Have Been Hacking Major Email Program | BigBrothers | Securityweek |
29.5.20 | Google Adds GKE Open-Source Dependencies to Vulnerability Rewards Program | Vulnerebility | Securityweek |
29.5.20 | Industrial Suppliers in Japan, Europe Targeted in Sophisticated Attacks | ICS | Securityweek |
29.5.20 | Arizona Takes Google to Court Over Location Tracking | BigBrothers | Securityweek |
29.5.20 | Crowdsourced Security Testing Firm Synack Raises $52 Million | IT | Securityweek |
29.5.20 | Researchers Unmask Brazilian Hacker Who Attacked Thousands of Websites | Hacking | Securityweek |
29.5.20 | Improved Version of Valak Malware Targets Enterprises in US, Germany | Virus | Securityweek |
29.5.20 | | Phishing | Net-security |
29.5.20 | | Vulnerebility | Net-security |
29.5.20 | | Security | Net-security |
29.5.20 | | Security | Net-security |
29.5.20 | | Security | Net-security |
28.5.20 | ‘[F]Unicorn’ Ransomware Impersonates Legit COVID-19 Contact-Tracing App | Ransomware | Threatpost |
28.5.20 | DoubleGun Group Builds Massive Botnet Using Cloud Services | BotNet | Threatpost |
28.5.20 | Hackers Sell Data from 26 Million LiveJournal Users on Dark Web | Incindent | Threatpost |
28.5.20 | Google TAG report Q1 details about nation-state hacking and disinformation | BigBrothers | Securityaffairs |
28.5.20 | Valak a sophisticated malware that completely changed in 6 months | Virus | Securityaffairs |
28.5.20 | Ke3chang hacking group adds new Ketrum malware to its arsenal | Virus | Securityaffairs |
28.5.20 | Google Says Iran-Linked Hackers Targeted WHO | BigBrothers | Securityweek |
28.5.20 | Israeli Cyber Chief: Major Attack on Water Systems Thwarted | BigBrothers | Securityweek |
28.5.20 | CISO Conversations: Mastercard, Ellie Mae Security Chiefs Discuss the People Problem | Security | Securityweek |
28.5.20 | Surveillance Bill Vote Scrapped After Opposition From Trump, DoJ | BigBrothers | Securityweek |
28.5.20 | A New Free Monitoring Tool to Measure Your Dark Web Exposure | Security | Thehackernews |
28.5.20 | Researchers Uncover Brazilian Hacktivist's Identity Who Defaced Over 4800 Sites | Hacking | Thehackernews |
28.5.20 | | Vulnerebility | SANS |
28.5.20 | | Vulnerebility | Net-security |
28.5.20 | | Android | Net-security |
28.5.20 | | Security | Net-security |
28.5.20 | | Vulnerebility | Net-security |
28.5.20 | Microsoft warns about ongoing PonyFinal ransomware attacks | Ransomware | Securityaffairs |
28.5.20 | Grandoreiro Malware implements new features in Q2 2020 | Virus | Securityaffairs |
28.5.20 | Real estate app leaking thousands of user records and sensitive private messages | Mobil | Securityaffairs |
28.5.20 | The evolution of ransomware in 2019: attackers think bigger, go deeper and grow more advanced | Ransomware | Securityaffairs |
28.5.20 | Virus Apps Expose Tension Between Privacy and Need for Data | Virus | Securityweek |
28.5.20 | HackerOne Says Bug Bounty Hunters Earned $100 Million Through Its Platform | Security | Securityweek |
28.5.20 | | Attack | Net-security |
28.5.20 | | Security | Net-security |
28.5.20 | | Mobil | Net-security |
27.5.20 | Researchers dismantled ShuangQiang gang’s botnet that infected thousands of PCs | BotNet | Securityaffairs |
27.5.20 | Boris Johnson to reduce Huawei’s role in national 5G network | BigBrothers Mobil | Securityaffairs |
27.5.20 | Apple Patches Over 40 Vulnerabilities in macOS Catalina | Apple | Securityweek |
27.5.20 | The Security of Your Android Device May Depend on Where You Live | Android | Securityweek |
27.5.20 | French Privacy Watchdog Okays Coronavirus Tracing App | BigBrothers | Securityweek |
27.5.20 | US Lawmakers Push for Internet Privacy Amendments to USA Freedom Act | BigBrothers | Securityweek |
27.5.20 | Turla's Updated ComRAT Malware Uses Gmail for C&C Communication | APT | Securityweek |
27.5.20 | Governments Asked to Stop Cyberattacks on Healthcare Systems | BigBrothers | Securityweek |
27.5.20 | Chinese Researchers Disrupt Malware Attack That Infected Thousands of PCs | Virus | Thehackernews |
27.5.20 | | Phishing | SANS |
27.5.20 | | Incindent | Net-security |
27.5.20 | | Security | Net-security |
27.5.20 | | Security | Net-security |
27.5.20 | The “Silent Night” Zloader/Zb | Papers | Papers |
27.5.20 | Turla APT Revamps One of Its Go-To Spy Tools | APT | Threatpost |
27.5.20 | New iOS Jailbreak Tool Works on iPhone Models iOS 11 to iOS 13.5 | Apple | Threatpost |
27.5.20 | StrandHogg 2.0 Critical Bug Allows Android App Hijacking | Android | Threatpost |
27.5.20 | StrandHogg 2.0 Android flaw affects over 1 Billion devices | Android | Securityaffairs |
27.5.20 | New Turla ComRAT backdoor uses Gmail for Command and Control | APT | Securityaffairs |
27.5.20 | Qatar Tracing App Flaw Exposed 1 Mn Users' Data: Amnesty | BigBrothers | Securityweek |
27.5.20 | Hacker Behind 'Doxxing' of German Politicians Charged | BigBrothers | Securityweek |
27.5.20 | Silent Night: A New Malware-as-a-Service Banking Trojan Analyzed | Virus | Securityweek |
27.5.20 | StrandHogg 2.0 Vulnerability Allows Hackers to Hijack Android Devices | Android | Securityweek |
27.5.20 | Samsung Unveils New Security Chip for Mobile Devices | Mobil | Securityweek |
27.5.20 | FTC Settles With Canadian Smart Lock Maker Over Security Practices | BigBrothers | Securityweek |
27.5.20 | Vulnerabilities Found in Emerson SCADA Product Made for Oil and Gas Industry | ICS | Securityweek |
27.5.20 | Jailbreak Tool Updated to Unlock iPhones Running iOS 13.5 | Apple | Securityweek |
27.5.20 | Internet Organizations Ask US House to Limit Access to Search, Browsing History | BigBrothers | Securityweek |
27.5.20 | New Android Flaw Affecting Over 1 Billion Phones Let Attackers Hijack Apps | Android | Thehackernews |
27.5.20 | iOS contains an unspecified kernel vulnerability | Alert | Alert |
27.5.20 | | Crypto | SANS |
27.5.20 | | Cyber | Net-security |
27.5.20 | | Security | Net-security |
27.5.20 | | Incindent | Net-security |
27.5.20 | | Privacy | Net-security |
27.5.20 | | Security | Net-security |
26.5.20 | Spam and phishing in Q1 2020 | Analysis Phishing Spam | Securelist |
26.5.20 | Hangzhou could permanently adopt COVID-19 contact-tracing app | Mobil Privacy | Securityaffairs |
26.5.20 | Bugs in open-source libraries impact 70% of modern software | Vulnerebility | Securityaffairs |
26.5.20 | UK Set to Scale Back Huawei Role in 5G Network: Report | BigBrothers | Securityweek |
26.5.20 | | Virus | Net-security |
26.5.20 | New ComRAT Malware Uses Gmail to Receive Commands and Exfiltrate Data | Virus | Thehackernews |
26.5.20 | | Mobil | Threatpost |
26.5.20 | | Security | Threatpost |
26.5.20 | Cisco fixed a critical issue in the Unified Contact Center Express | Vulnerebility | Securityaffairs |
26.5.20 | Crooks hacked e-shops and threaten to sell SQL databases if ransom not paid | Ransomware | Securityaffairs |
26.5.20 | Top UN Official Warns Malicious Emails on Rise in Pandemic | Virus | Securityweek |
26.5.20 | | Virus | Net-security |
26.5.20 | | IoT | Net-security |
26.5.20 | | Security | Net-security |
26.5.20 | | Security | Net-security |
26.5.20 | | Security | Net-security |
25.5.20 | Aggressive in-app advertising in Android | Android | Securelist |
25.5.20 | Ragnar Ransomware encrypts files from virtual machines to evade detection | Ransomware | Securityaffairs |
25.5.20 | Maze ransomware operators leak credit card data from Costa Rica’s BCR bank | Ransomware | Securityaffairs |
25.5.20 | 3 hacking forums have been hacked and database have been leaked online | Incindent | Securityaffairs |
25.5.20 | New Tool Can Jailbreak Any iPhone and iPad Using An Unpatched 0-Day Bug | Apple | Thehackernews |
25.5.20 | | Virus | SANS |
25.5.20 | eBay port scans visitors' computers for remote access programs | Security | Bleepingcomputer |
25.5.20 | Hackers leak credit card info from Costa Rica's state bank | Incindent | Bleepingcomputer |
25.5.20 | Microsoft's PowerToys gets two new features on Windows 10 | OS | Bleepingcomputer |
25.5.20 | Discord client turned into a password stealer by updated malware | Virus | Bleepingcomputer |
25.5.20 | How to download Google Chrome's offline installer | IT | Bleepingcomputer |
25.5.20 | 25 million Mathway user records available for sale on the dark web | Incindent | Securityaffairs |
25.5.20 | Unc0ver is the first jailbreak that works on all recent iOS versions since 2014 | iOS | Securityaffairs |
25.5.20 | Coronavirus Pandemic Claims Another Victim: Robocalls | Security | Securityweek |
25.5.20 | | Security | SANS |
25.5.20 | | Privacy | Net-security |
25.5.20 | | Security | Net-security |
25.5.20 | | Security | Net-security |
24.5.20 | Data breach at easyJet puts 9 million at risk | Incident blog | Avast blog |
24.5.20 | How to protect yourself from data breaches | Incident blog | Avast blog |
24.5.20 | The latest security trends from Verizon’s annual breach report | Incident blog | Avast blog |
24.5.20 | Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding | Cryptocurrency blog | Palo Alto Unity42 |
24.5.20 | Mirai and Hoaxcalls Botnets Target Legacy Symantec Web Gateways | BotNet blog | Palo Alto Unity42 |
24.5.20 | Updated BackConfig Malware Targeting Government and Military Organizations in South Asia | BigBrother blog | Palo Alto Unity42 |
24.5.20 | Threat Brief: Maze Ransomware Activities | Ransomware blog | Palo Alto Unity42 |
24.5.20 | SilverTerrier: New COVID-19 Themed Business Email Compromise Schemes | Spam blog | Palo Alto Unity42 |
24.5.20 | Cooperation and Collaborative Partnerships are Key to Protect Businesses | Cyber blog | Palo Alto |
24.5.20 | FLEXWORK | Cyber blog | Palo Alto |
24.5.20 | Cortex XDR Managed Threat Hunting Is Available To All Customers | Cyber blog | Palo Alto |
24.5.20 | Vulnerabilities in Conferencing Tools: Much Ado about Something or Nothing? | Cyber blog | Palo Alto |
24.5.20 | Are We Prepared to Deal with the Impact of Cyber Threats on 5G? | Cyber blog | Palo Alto |
24.5.20 | Why DevOps Needs to Change Security | Cyber blog | Palo Alto |
24.5.20 | CRN Names 10 Leaders from Palo Alto Networks to Women of the Channel List | Cyber blog | Palo Alto |
24.5.20 | Personal details and documents for millions of Indians available in the deep web | Incindent | Securityaffairs |
24.5.20 | Online education site EduCBA discloses data breach and reset customers’ pwds | Incindent | Securityaffairs |
24.5.20 | Experts observed a spike in COVID-19 related malspam emails containing GuLoader | Spam | Securityaffairs |
24.5.20 | Voter information for 2 millions of Indonesians leaked online | Incindent | Securityaffairs |
24.5.20 | Silent Night Zeus botnet available for sale in underground forums | BotNet | Securityaffairs |
24.5.20 | Syrk | Anti-Ramson Tool | Anti-Ramson Tool |
24.5.20 | KokoKrypt | Anti-Ramson Tool | Anti-Ramson Tool |
24.5.20 | JavaLocker | Anti-Ramson Tool | Anti-Ramson Tool |
24.5.20 | Online education site EduCBA discloses data breach after hack | Incindent | Bleepingcomputer |
24.5.20 | Winget: How to use Windows 10's new native Package Manager | OS | Bleepingcomputer |
24.5.20 | Windows 10 KB4556799 Update Breaks Wireless LTE Connectivity | OS | Bleepingcomputer |
24.5.20 | Microsoft Edge 83 released with extension sync and auto-profiles | OS | Bleepingcomputer |
24.5.20 | Microsoft is investigating issues in latest Windows 10 update | OS | Bleepingcomputer |
24.5.20 | Voter info for millions of Indonesians shared on hacker forum | Incindent | Bleepingcomputer |
24.5.20 | Docker fixes Windows client bug letting programs run as SYSTEM | Vulnerebility | Bleepingcomputer |
24.5.20 | Ransomware encrypts from virtual machines to evade antivirus | Ransomware | Bleepingcomputer |
24.5.20 | Mathway investigates data breach after 25M records sold on dark web | Incindent | Bleepingcomputer |
24.5.20 | ZLoader banking malware is back, deployed in over 100 campaigns | Virus | Bleepingcomputer |
24.5.20 | Windows Hello can now complete payments in Google Chrome | OS | Bleepingcomputer |
24.5.20 | Microsoft releases Windows 10 Hyper-V VHDX for ARM64 devices | OS | Bleepingcomputer |
23.5.20 | Hackers tried to use Sophos Firewall zero-day to deploy Ransomware | Ransomware | Bleepingcomputer |
23.5.20 | Microsoft Surface Book 3 is now available for purchase | IT | Bleepingcomputer |
23.5.20 | Hacker shares 40 million Wishbone user records for free | Incindent | Bleepingcomputer |
23.5.20 | Office 365 phishing uses Supreme Court theme and working CAPTCHA | Phishing | Bleepingcomputer |
23.5.20 | New Windows 10 Intel microcodes released in forced KB4497165 update | OS | Bleepingcomputer |
23.5.20 | New PipeMon malware uses Windows print processors for persistence | Virus | Bleepingcomputer |
23.5.20 | Vigilante hackers target 'scammers' with ransomware, DDoS attacks | Ransomware | Bleepingcomputer |
23.5.20 | How to use Google Chrome Tab Groups to stay organized | IT | Bleepingcomputer |
23.5.20 | Snake ransomware leaks patient data from Fresenius Medical Care | Ransomware | Bleepingcomputer |
23.5.20 | Adobe releases critical out-of-band security update | Vulnerebility | Bleepingcomputer |
23.5.20 | GhostDNS exploit kit source code leaked to antivirus company | Exploit | Bleepingcomputer |
23.5.20 | Microsoft issues mitigation for the NXNSAttack DNS DDoS attack | Attack | Bleepingcomputer |
23.5.20 | NXNSAttack: Recursive DNS Inefficiencies and Vulnerability | Papers | Papers |
23.5.20 | | Incindent | Threatpost |
23.5.20 | | APT | Threatpost |
23.5.20 | | Virus | Threatpost |
23.5.20 | | CyberCrime Social | Threatpost |
23.5.20 | The Florida Unemployment System suffered a data breach | Incindent | Securityaffairs |
23.5.20 | Experts found a Privilege escalation issue in Docker Desktop for Windows | Vulnerebility | Securityaffairs |
23.5.20 | Free ImmuniWeb Tool Allows Organizations to Check Dark Web Exposure | CyberCrime | Securityweek |
23.5.20 | IOCS VS. IOBS | Cyber blog | Cybereason |
23.5.20 | WHY A CLOUD-NATIVE EPP IS CRITICAL FOR FUTUREPROOF SECURITY OPERATIONS | Cyber blog | Cybereason |
23.5.20 | LEGACY A/V IS SO LAST YEAR | Cyber blog | Cybereason |
23.5.20 | How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner | Malware blog | Mcafee blog |
23.5.20 | Attacking the Organism: Telecom Service Providers | Hacking blog | F5 Labs |
23.5.20 | Using Real-Time Events in Investigations | Security blog | FireEye |
23.5.20 | Analyzing Dark Crystal RAT, a C# backdoor | Malware blog | FireEye |
23.5.20 | Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents | Ransomware blog | FireEye |
23.5.20 | Safe-Linking – Eliminating a 20 year-old malloc() exploit primitive | Exploit blog | Checkpoint |
23.5.20 | Vulnerability Spotlight: Memory corruption vulnerability in GNU Glibc leaves smart vehicles open to attack | Vulnerebility blog | Cisco Talos |
23.5.20 | Vulnerability Spotlight: Authentication bypass vulnerability in some Epson projectors | Vulnerebility blog | Cisco Talos |
23.5.20 | The wolf is back... | Security blog | Cisco Talos |
23.5.20 | Vulnerability Spotlight: Multiple vulnerabilities in Nitro Pro PDF reader | Vulnerebility blog | Cisco Talos |
23.5.20 | Insidious Android malware gives up all malicious features but one to gain stealth | OS Blog | Eset |
23.5.20 | How encryption can help protect your sensitive data | Safety blog | Eset |
23.5.20 | Chrome 83 arrives with enhanced security and privacy controls | Security blog | Eset |
23.5.20 | No “Game over” for the Winnti Group | APT blog | Eset |
23.5.20 | These things may be cool, but are they safe? | Security blog | Eset |
23.5.20 | Bluetooth flaw exposes countless devices to BIAS attacks | Attack blog Vulnerebility blog | Eset |
23.5.20 | European supercomputers hacked to mine cryptocurrency | Cryptocurrency blog | Eset |
23.5.20 | | Virus | SANS |
22.5.20 | Cyber-Criminal espionage Operation insists on Italian Manufacturing | CyberSpy | Securityaffairs |
22.5.20 | Microsoft warns of “massive campaign” using COVID-19 themed emails | Spam | Securityaffairs |
22.5.20 | Winnti uses a new PipeMon backdoor in attacks aimed at the gaming industry | Virus | Securityaffairs |
22.5.20 | Ragnar Locker Ransomware Uses Virtual Machines for Evasion | Ransomware | Securityweek |
22.5.20 | Industry Reactions to Verizon 2020 DBIR: Feedback Friday | Incindent | Securityweek |
22.5.20 | Data Breach Hits Florida Unemployment System | Incindent | Securityweek |
22.5.20 | Hackers Attempted to Deploy Ransomware in Attacks Targeting Sophos Firewalls | Ransomware | Securityweek |
22.5.20 | Hackers Can Target Rockwell Industrial Software With Malicious EDS Files | Virus | Securityweek |
22.5.20 | Bitter Israel-Iran Rivalry Takes New Forms Online | BigBrothers | Securityweek |
22.5.20 | | Vulnerebility | Net-security |
22.5.20 | | Vulnerebility | Threatpost |
22.5.20 | | Phishing | Threatpost |
22.5.20 | | Phishing | Threatpost |
22.5.20 | | Virus | Threatpost |
22.5.20 | Santander, one of the biggest European banks, was leaking sensitive data on their website | Incindent | Securityaffairs |
22.5.20 | Sophos blocked attacks exploiting XG Firewall zero-day to deploy Ransomware | Ransomware | Securityaffairs |
22.5.20 | Meal delivery service Home Chef discloses data breach | Incindent | Securityaffairs |
22.5.20 | Tens of thousands Israeli websites defaced | BigBrothers | Securityweek |
22.5.20 | Signal PINs Allow Users to Recover Data When Switching Phones | Mobil | Securityweek |
22.5.20 | Cisco Patches Critical Vulnerability in Contact Center Software | Vulnerebility | Securityweek |
22.5.20 | Surveillance Fears Drive Business Use of Secure Collaboration Tools | BigBrothers | Securityweek |
22.5.20 | Facebook Unveils Scam Warnings for Messenger Users | Social | Securityweek |
22.5.20 | Tools Used in GhostDNS Router Hijack Campaigns Dissected | Hacking | Securityweek |
22.5.20 | Hackers Start Leaking Files Stolen From Shipping Giant Toll | Incindent | Securityweek |
22.5.20 | Zoom to Provide Detailed Info on Upcoming End-to-End Encryption Feature | Safety | Securityweek |
22.5.20 | | Security | Net-security |
22.5.20 | | Safety | Net-security |
22.5.20 | | Cyber | Net-security |
22.5.20 | | Attack | Net-security |
22.5.20 | | IoT | Net-security |
22.5.20 | | Mobil | Net-security |
22.5.20 | | Phishing | Net-security |
21.5.20 | Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia | Report | Report |
21.5.20 | Iran-linked Chafer APT group targets governments in Kuwait and Saudi Arabia | APT | Securityaffairs |
21.5.20 | Japan suspects HGV missile data leak in Mitsubishi security breach | Incindent | Securityaffairs |
21.5.20 | Israeli Websites Targeted in Major Cyber Attack | BigBrothers | Securityweek |
21.5.20 | Meal Kit Service Home Chef Confirms Data Breach | Incindent | Securityweek |
21.5.20 | Smarsh Adds Cybersecurity and Compliance to Archiving with Acquisition of Entreda | Cyber | Securityweek |
21.5.20 | XSS, Open Redirect Vulnerabilities Patched in Drupal | Vulnerebility | Securityweek |
21.5.20 | Cyber Insurance Provider Coalition Raises $90 Million | IT | Securityweek |
21.5.20 | Microsoft Announces New Security Features for Devs, Customers | Security | Securityweek |
21.5.20 | How Cybersecurity Enables Government, Health, EduTech Cope With COVID-19 | Cyber | Thehackernews |
21.5.20 | Iranian APT Group Targets Governments in Kuwait and Saudi Arabia | APT | Thehackernews |
21.5.20 | Home Chef announces data breach after hacker sells 8M user records | Incindent | Bleepingcomputer |
21.5.20 | How to enable the new Google Chrome 83 features now | Security | Bleepingcomputer |
21.5.20 | Microsoft warns of 'massive' phishing attack pushing legit RAT | Phishing Virus | Bleepingcomputer |
21.5.20 | BEC Scammers target unemployment and CARES Act claims | Spam | Bleepingcomputer |
21.5.20 | Windows 10 KB4556799 update won't install, has audio issues, bugs | OS | Bleepingcomputer |
21.5.20 | Windows Terminal 1.0 is here with numerous improvements | OS | Bleepingcomputer |
21.5.20 | EasyJet hacked: data breach affects 9 million customers | Incindent | Bleepingcomputer |
21.5.20 | Google rolls out new Enhanced Safe Browsing security feature | Safety | Bleepingcomputer |
21.5.20 | Chrome 83 released with massive security and privacy upgrades | Security | Bleepingcomputer |
21.5.20 | NetWalker adjusts ransomware operation to only target enterprise | Ransomware | Bleepingcomputer |
21.5.20 | Microsoft announces new Chromium Edge features at Build 2020 | OS | Bleepingcomputer |
21.5.20 | New Microsoft Teams enhancements announced at Build 2020 | IT | Bleepingcomputer |
21.5.20 | | Attack | Threatpost |
21.5.20 | | Spam | Threatpost |
21.5.20 | | Ransomware | Threatpost |
21.5.20 | | Crime | Threatpost |
21.5.20 | VMware fixes CVE-2020-3956 Remote Code Execution issue in Cloud Director | Vulnerebility | Securityaffairs |
21.5.20 | Adobe fixed several memory corruption issues in some of its products | Vulnerebility | Securityaffairs |
21.5.20 | Israel is suspected to be behind the cyberattack on Iranian port | BigBrothers | Securityaffairs |
21.5.20 | Chrome 83 Brings Enhanced Safe Browsing, New Privacy and Security Controls | Security | Securityweek |
21.5.20 | Pandemic-related Supply Chain and Money Laundering Woes in the Dark Web | CyberCrime | Securityweek |
21.5.20 | Website Security Provider Source Defense Raises $10.5 Million | IT | Securityweek |
21.5.20 | Vulnerabilities Exposed Hundreds of Thousands of QNAP NAS Devices to Attacks | Vulnerebility | Securityweek |
21.5.20 | Japan Suspects Missile Data Leak in Mitsubishi Cyberattack | Incindent | Securityweek |
21.5.20 | Remote Code Execution Vulnerability Patched in VMware Cloud Director | Vulnerebility | Securityweek |
21.5.20 | | Virus | SANS |
21.5.20 | | Security | Net-security |
21.5.20 | | Security | Net-security |
21.5.20 | | Security | Net-security |
21.5.20 | | Security | Net-security |
21.5.20 | | Security | Net-security |
21.5.20 | | Security | Net-security |
20.5.20 | IT threat evolution Q1 2020 | Analysis | Securelist |
20.5.20 | IT threat evolution Q1 2020. Statistics | Analysis | Securelist |
20.5.20 | Researchers disclose five Microsoft Windows zero-days | Vulnerebility | Securityaffairs |
20.5.20 | Three flaws in Nitro Pro PDF reader expose businesses to hack | Vulnerebility | Securityaffairs |
20.5.20 | Canada Fines Facebook Over Misleading Privacy Claims | BigBrothers | Securityweek |
20.5.20 | Container Security Company Aqua Raises $30 Million in Series D Round | IT | Securityweek |
20.5.20 | Tech-Assisted COVID-19 Tracking Is Having Some Issues | Security | Securityweek |
20.5.20 | Researcher Finds Memory Corruption Vulnerabilities in Several Adobe Products | Vulnerebility | Securityweek |
20.5.20 | WordPress Malware Targets WooCommerce Stores | Virus | Securityweek |
20.5.20 | New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks | Attack | Thehackernews |
20.5.20 | Ukrainian Police Arrest Hacker Who Tried Selling Billions of Stolen Records | Crime | Thehackernews |
20.5.20 | | Security | Net-security |
20.5.20 | | Vulnerebility | Net-security |
20.5.20 | | Incindent | Net-security |
20.5.20 | 2020-data-breach-investigations-report | Report | Report |
20.5.20 | | Attack | Threatpost |
20.5.20 | | Incindent | Threatpost |
20.5.20 | | Android | Threatpost |
20.5.20 | | Vulnerebility | Threatpost |
20.5.20 | | Incindent | Threatpost |
20.5.20 | | Phishing | Threatpost |
20.5.20 | Security Service of Ukraine arrested the popular hacker Sanix who sold billions of stolen credentials | Incindent | Securityaffairs |
20.5.20 | Bluetooth BIAS attack threatens billions of devices | Attack | Securityaffairs |
20.5.20 | Easyjet hacked: 9 million customer’s data exposed along with 2,200+ credit card details | Incindent | Securityaffairs |
20.5.20 | Nitro Pro Vulnerabilities Expose Many Enterprises to Attacks | Vulnerebility | Securityweek |
20.5.20 | Researchers Divulge Details on Five Windows Zero Days | Vulnerebility | Securityweek |
20.5.20 | Verizon 2020 DBIR: More Extensive, More Detailed and More Thorough Than Ever | Incindent | Securityweek |
20.5.20 | NXNSAttack: New DNS Vulnerability Allows Big DDoS Attacks | Attack | Securityweek |
20.5.20 | Bluetooth Vulnerability Allows Attackers to Impersonate Previously Paired Devices | Vulnerebility | Securityweek |
20.5.20 | Brazil's Biggest Cosmetic Brand Natura Exposes Personal Details of Its Users | Incindent | Thehackernews |
20.5.20 | British Airline EasyJet Suffers Data Breach Exposing 9 Million Customers' Data | Incindent | Thehackernews |
20.5.20 | | BotNet | SANS |
20.5.20 | | Security | Net-security |
20.5.20 | | Security | Net-security |
20.5.20 | | Security | Net-security |
20.5.20 | | Security | Net-security |
20.5.20 | | Security | Net-security |
19.5.20 | REvil Ransomware found buyer for Trump data, now targeting Madonna | Ransomware | Bleepingcomputer |
19.5.20 | Google Chrome to tidy up tabs with Tab Groups Collapse feature | IT | Bleepingcomputer |
19.5.20 | Hacker sells 129 million sensitive records of Russian car owners | BigBrothers | Bleepingcomputer |
19.5.20 | Fake U.S. Dept of Treasury emails spreads new Node.js malware | BigBrothers | Bleepingcomputer |
19.5.20 | Ransomware attack impacts Texas Department of Transportation | Ransomware | Bleepingcomputer |
19.5.20 | Windows 10 Defender's hidden features revealed by this free tool | OS | Bleepingcomputer |
19.5.20 | FBI warns of ProLock ransomware decryptor not working properly | Ransomware | Bleepingcomputer |
19.5.20 | Microsoft Edge Canary now lets you read aloud your PDF files | OS | Bleepingcomputer |
19.5.20 | European supercomputers hacked in mysterious cyberattacks | Attack | Bleepingcomputer |
19.5.20 | Zoom global outage preventing meetings, video, and audio | IT | Bleepingcomputer |
19.5.20 | What's new in Windows Subsystem for Linux 2.0, coming soon | OS | Bleepingcomputer |
19.5.20 | Windows 10 quietly got a built-in network sniffer, how to use | OS | Bleepingcomputer |
19.5.20 | Australian product steel producer BlueScope hit by cyberattack | BigBrothers | Securityaffairs |
19.5.20 | Hackers Target Oil Producers During COVID-19 Slump | Hacking | Securityaffairs |
19.5.20 | Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways | BotNet | Securityaffairs |
19.5.20 | 129 million records of Russian car owners available on the dark web | Incindent | Securityaffairs |
19.5.20 | Botnets Target Old Vulnerability in Symantec Secure Web Gateway | BotNet | Securityweek |
19.5.20 | EasyJet Reveals Cyber Attack on Nine Million Clients | Incindent | Securityweek |
19.5.20 | Court Curbs German Spies' Foreign Internet Surveillance | BigBrothers | Securityweek |
19.5.20 | DoJ Again Asks for Encryption Backdoors After Hacking US Naval Base Shooter's iPhones | BigBrothers | Securityweek |
19.5.20 | Increased Focus on iOS Hacking Leads to Drop in Exploit Prices | Apple | Securityweek |
19.5.20 | New Bluetooth Vulnerability Exposes Billions of Devices to Hackers | Vulnerebility | Securityweek |
19.5.20 | | Phishing | Net-security |
19.5.20 | | Incindent | Net-security |
19.5.20 | Bluetooth devices supporting LE and specific BR/EDR implementations are vulnerable to method confusion attacks | Alert | Alert |
19.5.20 | Bluetooth devices supporting BR/EDR are vulnerable to impersonation attacks | Alert | Alert |
19.5.20 | | Ransomware | Threatpost |
19.5.20 | | Apple | Threatpost |
19.5.20 | | Incindent | Threatpost |
19.5.20 | | Ransomware | Threatpost |
19.5.20 | A bug in Edison Mail iOS app impacted over 6,400 users | Apple | Securityaffairs |
19.5.20 | Texas Department of Transportation (TxDOT) hit by a ransomware attack | Ransomware | Securityaffairs |
19.5.20 | Mandrake, a high sophisticated Android spyware used in targeted attacks | Android | Securityaffairs |
19.5.20 | Facebook Chief Wants EU Not China to Lead on Tech Rules | BigBrothers Social | Securityweek |
19.5.20 | PE Firm Gets Cold Feet With $1.9 Billion Acquisition of Forescout Technologies | IT | Securityweek |
19.5.20 | Over 6,400 Edison Mail Users Hit by Security Bug in iOS App | Apple | Securityweek |
19.5.20 | | Security | SANS |
19.5.20 | | Security | Net-security |
19.5.20 | | Security | Net-security |
19.5.20 | | Security | Net-security |
19.5.20 | | Security | Net-security |
19.5.20 | | Security | Net-security |
18.5.20 | FBI warns US organizations of ProLock ransomware decryptor not working | BigBrothers | Securityaffairs |
18.5.20 | Stored XSS in WP Product Review Lite plugin allows for automated takeovers | Vulnerebility | Securityaffairs |
18.5.20 | Australian Steel Maker BlueScope Hit by Cyberattack | BigBrothers | Securityweek |
18.5.20 | Likely Breach Shuts Down Arkansas Unemployment Program | Incindent | Securityweek |
18.5.20 | Transportation Agency Hacked in 2nd Texas Government Attack | BigBrothers | Securityweek |
18.5.20 | Hackers Can Inject Code Into WordPress Sites via Flaw in Product Review Plugin | Vulnerebility | Securityweek |
18.5.20 | U.S. Restriction on Chipmakers Deals Critical Blow to Huawei | BigBrothers | Securityweek |
18.5.20 | Crypto-Mining Campaign Hits European Supercomputers | Cryptocurrency | Securityweek |
18.5.20 | 'Mandrake' Android Spyware Remained Undetected for 4 Years | Android | Securityweek |
18.5.20 | France Says Breaks Up International ATM 'Jackpotting' Network | CyberCrime | Securityweek |
18.5.20 | | Safety | SANS |
18.5.20 | | Security | Net-security |
18.5.20 | | Security | Net-security |
18.5.20 | | Mobil | Net-security |
18.5.20 | | Security | Net-security |
18.5.20 | | Security | Net-security |
18.5.20 | | Security | Net-security |
17.5.20 | | Vulnerebility | Net-security |
17.5.20 | Experts reported the hack of several supercomputers across Europe | Hacking | Securityaffairs |
17.5.20 | Coronavirus-themed attacks May 10 – May 16, 2020 | Security | Securityaffairs |
17.5.20 | Elexon, a middleman in the UK power grid network hit by cyber-attack | BigBrothers | Securityaffairs |
17.5.20 | APT group targets high profile networks in Central Asia | APT | Securityaffairs |
17.5.20 | Microsoft is open-sourcing COVID-19 threat intelligence | Cyber | Securityaffairs |
17.5.20 | QNodeService Trojan spreads via fake COVID-19 tax relief | Virus | Securityaffairs |
17.5.20 | Ransom News | Ransom | Ransom |
17.5.20 | Thunderbolt flaw leads to Thunderspy exploit | Vulnerebility blog | Avast blog |
17.5.20 | We never wanna repeat WannaCry | Ransomware blog | Avast blog |
17.5.20 | Massive WordPress attack relies on old flaws | Attack blog Vulnerebility blog | Avast blog |
17.5.20 | Gartner Market Guide for Cloud Workload Protection Platforms: Key Takeaways | Cyber blog | Palo Alto |
17.5.20 | CRN Names 10 Leaders from Palo Alto Networks to Women of the Channel List | Cyber blog | Palo Alto |
17.5.20 | Containers are inherently secure – Reality or myth? | Cyber blog | Palo Alto |
17.5.20 | Palo Alto Networks Named Google Cloud Technology Partner of the Year | Cyber blog | Palo Alto |
17.5.20 | Manage a Remote SOC: Micro-Surveys for Crisis Management | Cyber blog | Palo Alto |
17.5.20 | Scaling Security for Data Center Transformation: COVID-19 Amplifies Trends | Cyber blog | Palo Alto |
17.5.20 | Bridging the DevOps and Security Divide with DevSecOps | Cyber blog | Palo Alto |
17.5.20 | WordPress malware finds WooCommerce sites for Magecart attacks | Virus | Bleepingcomputer |
17.5.20 | Critical WordPress plugin bug allows for automated takeovers | Vulnerebility | Bleepingcomputer |
17.5.20 | Wannabe ransomware operators arrested before hospital attacks | Ransomware | Bleepingcomputer |
17.5.20 | New BotSight browser extension reveals Twitter bots | BotNet | Bleepingcomputer |
17.5.20 | RATicate drops info stealing malware and RATs on industrial targets | Virus | Bleepingcomputer |
17.5.20 | Ransomware recruits affiliates with huge payouts, automated leaks | Ransomware | Bleepingcomputer |
17.5.20 | Backdoors in recent espionage attempts link to Microcin malware | Virus | Bleepingcomputer |
17.5.20 | Microsoft Office 365 ATP getting malware campaign analysis | Virus | Bleepingcomputer |
17.5.20 | Free Grand Theft Auto V offer brings down Epic Games Store | IT | Bleepingcomputer |
17.5.20 | New COMpfun malware variant gets commands from HTTP error codes | Virus | Bleepingcomputer |
17.5.20 | New Microsoft 365 sign-in pages already spoofed for phishing | Phishing | Bleepingcomputer |
17.5.20 | Hacker selling 550 million stolen user records on hacking forum | Incindent | Bleepingcomputer |
17.5.20 | Google Chrome will block resource-heavy ads starting August | Security | Bleepingcomputer |
17.5.20 | ProLock Ransomware teams up with QakBot trojan for network access | Ransomware | Bleepingcomputer |
17.5.20 | Scammers steal $10 million from Norway's state investment fund | Spam | Bleepingcomputer |
17.5.20 | Google WordPress plugin bug can be exploited for black hat SEO | Exploit | Bleepingcomputer |
17.5.20 | RIP: Microsoft to drop support for Windows 10 on 32-bit systems | OS | Bleepingcomputer |
17.5.20 | New Ramsay malware steals files from air-gapped computers | Virus | Bleepingcomputer |
17.5.20 | Windows 10 gets DNS over HTTPS support, how to test | OS | Bleepingcomputer |
17.5.20 | Microsoft: Fix for Outlook search failures coming later today | OS | Bleepingcomputer |
17.5.20 | Microsoft warns of COVID-19 phishing spreading info-stealing malware | Phishing | Bleepingcomputer |
17.5.20 | US warns of Chinese hackers targeting COVID-19 research orgs | BigBrothers | Bleepingcomputer |
17.5.20 | Ransomware now demands extra payment to delete stolen files | Ransomware | Bleepingcomputer |
17.5.20 | SAP May 2020 Security Patch Day delivers critical updates | Vulnerebility | Bleepingcomputer |
16.5.20 | Healthcare giant Magellan Health hit by ransomware attack | Ransomware | Bleepingcomputer |
16.5.20 | Windows 10 2004 improves potentially unwanted app protection | OS | Bleepingcomputer |
16.5.20 | Windows 10 2004 is almost here, what developers need to know | OS | Bleepingcomputer |
16.5.20 | US govt shares list of most exploited vulnerabilities since 2016 | BigBrothers | Bleepingcomputer |
16.5.20 | May 2020 Patch Tuesday: Microsoft fixes 111 vulnerabilities, 13 Critical | OS | Bleepingcomputer |
16.5.20 | Windows 10 Cumulative Updates KB4556799 & KB4551853 Released | OS | Bleepingcomputer |
16.5.20 | Microsoft Edge rolls out in Windows 10 2004 via Windows Update | OS | Bleepingcomputer |
16.5.20 | US govt exposes new North Korean malware, phishing attacks | BigBrothers | Bleepingcomputer |
16.5.20 | Adobe fixes critical vulnerabilities in Acrobat, Reader, and DNG SDK | Vulnerebility | Bleepingcomputer |
16.5.20 | Researcher finds 1,236 websites infected with credit card stealers | Hacking | Bleepingcomputer |
16.5.20 | Five Clear Steps to Enhance SecOps with MITRE ATT&CK | Report | Cybereason |
16.5.20 | 2019 APPLICATION PROTECTION REPORT 2ND EDITION | Report | F5 Labs |
16.5.20 | THE STATE OF RANSOMWARE 2020 | Report | SOPHOS |
16.5.20 | WHAT IS THE MITRE ATT&CK FRAMEWORK? | Security blog | Cybereason |
16.5.20 | 2019 Application Protection Report | Security blog | F5 Labs |
16.5.20 | Are You Ready for DoD CMMC Compliance? | Security blog | F5 Labs |
16.5.20 | Reverse RDP – The Path Not Taken | Attack blog | Checkpoint |
16.5.20 | The basics of a ransomware infection as Snake, Maze expands | Ransomware blog | Cisco Talos |
16.5.20 | Microsoft Patch Tuesday — May 2020: Vulnerability disclosures and Snort coverage | Vulnerebility blog | Cisco Talos |
16.5.20 | Vulnerability Spotlight: Code execution vulnerability in Microsoft Excel | Vulnerebility blog | Cisco Talos |
16.5.20 | Vulnerability Spotlight: Remote code execution vulnerabilities in Adobe Acrobat Reader | Vulnerebility blog | Cisco Talos |
16.5.20 | Threat Spotlight: Astaroth — Maze of obfuscation and evasion reveals dark stealer | Ransomware blog | Cisco Talos |
16.5.20 | Microsoft fixes vulnerability affecting all Windows versions since 1996 | Vulnerebility blog | Eset |
16.5.20 | Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia | APT blog | Eset |
16.5.20 | Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks | Malware blog | Eset |
16.5.20 | Thunderbolt flaws open millions of PCs to physical hacking | Vulnerebility blog | Eset |
16.5.20 | WannaCryptor remains a global threat three years on | Ransomware blog | Eset |
16.5.20 | Lukas Stefanko: How we fought off a DDoS attack from a mobile botnet | Attack blog | Eset |
16.5.20 | Over 160 million user records put up for sale on the dark web | Incident blog | Eset |
16.5.20 | Breaking news? App promises news feeds, brings DDoS attacks instead | Attack blog | Eset |
16.5.20 | | BotNet Exploit | Threatpost |
16.5.20 | | Virus | Threatpost |
16.5.20 | | Security | Threatpost |
16.5.20 | | Ransomware | Threatpost |
16.5.20 | Chinese APT Tropic Trooper target air-gapped military Networks in Asia | APT | Securityaffairs |
16.5.20 | Interserve UK defense contractor hacked, up to 100,000 past and present employees details exposed | BigBrothers | Securityaffairs |
16.5.20 | Microsoft Open-Sources COVID-19 Threat Intelligence | Cyber | Securityweek |
16.5.20 | NortonLifeLock Releases Free Tool for Detecting Bots on Twitter | Social | Securityweek |
16.5.20 | Chinese Hackers Target Air-Gapped Military Networks | BigBrothers | Securityweek |
16.5.20 | US Seeks to Cut Off China's Huawei From Global Chip Suppliers | BigBrothers | Securityweek |
16.5.20 | Mysterious Chinese APT Linked to Multiple Central Asian Campaigns | APT | Securityweek |
16.5.20 | | Crypto | SANS |
15.5.20 | Office 365 to let regular users revoke encrypted messages | OS | Bleepingcomputer |
15.5.20 | Hackers' private chats leaked in stolen WeLeakData database | Incindent | Bleepingcomputer |
15.5.20 | Texas Courts hit by ransomware, network disabled to limit spread | Ransomware | Bleepingcomputer |
15.5.20 | Microsoft's Family Safety parental control app opens for testing | OS | Bleepingcomputer |
15.5.20 | WordPress plugin bugs can let hackers take over almost 1M sites | Hacking | Bleepingcomputer |
15.5.20 | Maze ransomware fails to encrypt Pitney Bowes, steals files | Ransomware | Bleepingcomputer |
15.5.20 | New Thunderbolt security flaws affect systems shipped before 2019 | Vulnerebility | Bleepingcomputer |
15.5.20 | Windows 10: Limiting the bandwidth used by Windows Update | OS | Bleepingcomputer |
15.5.20 | ChatBooks discloses data breach after data sold on dark web | Incindent | Bleepingcomputer |
15.5.20 | Sodinokibi ransomware can now encrypt open and locked files | Ransomware | Bleepingcomputer |
15.5.20 | | Security | SANS |
15.5.20 | | Phishing | Net-security |
15.5.20 | Russian APT Turla’s COMpfun malware uses HTTP status codes to receive commands | APT | Securityaffairs |
15.5.20 | Palo Alto Networks addresses tens of serious issues in PAN-OS | Security | Securityaffairs |
15.5.20 | Threat actors are offering for sale 550 million stolen user records | Incindent | Securityaffairs |
15.5.20 | Vulnerabilities in SoftPAC Virtual Controller Expose OT Networks to Attacks | Vulnerebility | Securityweek |
15.5.20 | Activists Allege TikTok Violated Agreement on Child Protection | Privacy | Securityweek |
15.5.20 | Venafi Acquires Kubernetes Services Provider Jetstack | Security | Securityweek |
15.5.20 | 'Ramsay' Espionage Framework Can Exfiltrate Data From Air-Gapped Networks | Virus | Securityweek |
15.5.20 | UK Electricity Market Administrator Elexon Targeted by Hackers | Hacking | Securityweek |
15.5.20 | HTTP Status Codes Command This Malware How to Control Hacked Systems | Virus | Thehackernews |
15.5.20 | | Cyber | Threatpost |
15.5.20 | | Social | Threatpost |
15.5.20 | | OS | Threatpost |
15.5.20 | | Attack | Threatpost |
15.5.20 | | Virus | Threatpost |
15.5.20 | | Privacy | Threatpost |
15.5.20 | Crooks stole $10 million from Norway’s state investment fund Norfund | IT | Securityaffairs |
15.5.20 | Zerodium will no longer acquire certain types of iOS exploits due to surplus | iOS | Securityaffairs |
15.5.20 | Access to UK Supercomputer Suspended Following Cyberattack | Attack | Securityweek |
15.5.20 | Palo Alto Networks Patches Many Vulnerabilities in PAN-OS | Vulnerebility | Securityweek |
15.5.20 | China Rejects US Claim of Attempted Vaccine Theft as 'Smearing' | BigBrothers | Securityweek |
15.5.20 | Zerodium Expects iOS Exploit Prices to Drop as It Announces Surplus | Exploit | Securityweek |
15.5.20 | Samsung Qmage codec for Android Skia library does not properly validate image files | Alert | Alert |
15.5.20 | | Security | SANS |
15.5.20 | | Vulnerebility | SANS |
15.5.20 | | Crypto | Net-security |
15.5.20 | | OS | Net-security |
15.5.20 | | Ransomware | Net-security |
15.5.20 | | Security | Net-security |
15.5.20 | | Security | Net-security |
15.5.20 | | Security | Net-security |
14.5.20 | Cyberthreats on lockdown | Cyber | Securelist |
14.5.20 | COMpfun authors spoof visa application with HTTP status-based Trojan | APT Virus | Securelist |
14.5.20 | China-linked hackers are attempting to steal COVID-19 Vaccine Research | BigBrothers | Securityaffairs |
14.5.20 | Google WordPress Site Kit plugin grants attacker Search Console Access | Attack | Securityaffairs |
14.5.20 | New Ramsay malware allows exfiltrating files from air-gapped computers | Virus | Securityaffairs |
14.5.20 | Senate Narrowly Rejects New Limits on Internet Surveillance | BigBrothers | Securityweek |
14.5.20 | VMware to Acquire Kubernetes Security Firm Octarine | IT | Securityweek |
14.5.20 | Flaw in WordPress Plugin Grants Access to Google Search Console | Vulnerebility | Securityweek |
14.5.20 | This Group of CISOs Is Pumping Their Own Money and Advice Into Security Startups | Security | Securityweek |
14.5.20 | Code Analysis Company SonarSource Acquires RIPS Technologies | IT | Securityweek |
14.5.20 | Effective Business Continuity Plans Require CISOs to Rethink WAN Connectivity | Security | Thehackernews |
14.5.20 | Improper Microsoft Patch for Reverse RDP Attacks Leaves 3rd-Party RDP Clients Vulnerable | Vulnerebility | Thehackernews |
14.5.20 | | Vulnerebility | Net-security |
14.5.20 | | Virus | Threatpost |
14.5.20 | | Ransomware | Net-security |
14.5.20 | | CyberCrime | Net-security |
14.5.20 | | Cyber | Net-security |
14.5.20 | | Security | Net-security |
14.5.20 | | CyberCrime | Net-security |
14.5.20 | | Security | Net-security |
14.5.20 | | Security | Net-security |
14.5.20 | | OS | Net-security |
13.5.20 | Chancellor Merkel has ‘hard evidence’ of Russian hackers targeted her | BigBrothers | Securityaffairs |
13.5.20 | Healthcare giant Magellan Health discloses data breach after ransomware attack | Ransomware | Securityaffairs |
13.5.20 | Microsoft May 2020 Patch Tuesday fixes 111 flaws, 13 Critical | Vulnerebility | Securityaffairs |
13.5.20 | Expert found 1,236 websites infected with Magecart e-skimmer | CyberCrime | Securityaffairs |
13.5.20 | USCYBERCOM shares five new North Korea-linked malware samples | BigBrothers | Securityaffairs |
13.5.20 | Trojan Lampion is back after 3 months | Virus | Securityaffairs |
13.5.20 | Adobe addresses critical issues in Acrobat, Reader, and DNG SDK | Vulnerebility | Securityaffairs |
13.5.20 | Facebook Awards Researcher $20,000 for Account Hijacking Vulnerability | Social | Securityweek |
13.5.20 | SAP's May 2020 Security Updates Include Six Critical Patches | Vulnerebility | Securityweek |
13.5.20 | Enterprise Identity Protection Firm Semperis Raises $40 Million | IT | Securityweek |
13.5.20 | CyberArk Acquires Identity as a Service Provider Idaptive for $70 Million | IT | Securityweek |
13.5.20 | Merkel Cites 'Hard Evidence' Russian Hackers Targeted Her | BigBrothers | Securityweek |
13.5.20 | Siemens Says Power Meters Affected by Urgent/11 Vulnerabilities | ICS | Securityweek |
13.5.20 | Thousands of Android Apps Leak Data Due to Firebase Misconfigurations | Android | Securityweek |
13.5.20 | Microsoft's May 2020 Security Updates Patch 111 Vulnerabilities | Vulnerebility | Securityweek |
13.5.20 | Adobe Patches 36 Vulnerabilities in Acrobat, DNG SDK | Vulnerebility | Securityweek |
13.5.20 | U.S. Cyber Command Shares More North Korean Malware Variants | BigBrothers | Securityweek |
13.5.20 | Vulnerabilities in 'Page Builder' Plugin Expose 1 Million WordPress Websites | Vulnerebility | Securityweek |
13.5.20 | Researcher Spots New Malware Claimed to be 'Tailored for Air‑Gapped Networks' | Virus | Thehackernews |
13.5.20 | U.S Defense Warns of 3 New Malware Used by North Korean Hackers | BigBrothers | Thehackernews |
13.5.20 | | Vulnerebility | Net-security |
13.5.20 | | Security | Net-security |
13.5.20 | | Spam Virus | SANS |
13.5.20 | | Privacy | Net-security |
13.5.20 | | Attack ICS | Net-security |
13.5.20 | | Security | Net-security |
13.5.20 | | Security | Net-security |
13.5.20 | | OS | Net-security |
12.5.20 | Popular Page Builder WordPress plugin fixes critical issues. Update it now! | Vulnerebility | Securityaffairs |
12.5.20 | Patch now your vBulletin install before hacker will target your forum | Vulnerebility | Securityaffairs |
12.5.20 | A cyber attack hit a port on Strait of Hormuz, Iran said | BigBrothers | Securityaffairs |
12.5.20 | Shipping Giant Toll Confirms Hackers Stole Data in Recent Attack | Attack | Securityweek |
12.5.20 | Cybersecurity Threats to the Food Supply Chain | Cyber | Securityweek |
12.5.20 | Ransomware Forces Shutdown of Texas Judiciary Network | Ransomware | Securityweek |
12.5.20 | Researchers Analyze Entry Points, Vectors for Manufacturing System Attacks | Attack | Securityweek |
12.5.20 | Over 4000 Android Apps Expose Users' Data via Misconfigured Firebase Databases | Android | Thehackernews |
12.5.20 | Sphinx Malware Returns to Riddle U.S. Targets | Virus | Threatpost |
12.5.20 | Millions of Thunderbolt-Equipped Devices Open to ‘ThunderSpy’ Attack | Attack | Threatpost |
12.5.20 | Astaroth’s New Evasion Tactics Make It ‘Painful to Analyze’ | Virus | Threatpost |
12.5.20 | Unpatched Bugs in Oracle iPlanet Open Door to Info-Disclosure, Injection | Vulnerebility | Threatpost |
12.5.20 | Zeus Sphinx continues to be used in Coronavirus-themed attacks | Attack | Securityaffairs |
12.5.20 | ATM vendor Diebold Nixdorf suffered a Ransomware attack | Ransomware | Securityaffairs |
12.5.20 | ATM Maker Diebold Nixdorf Hit by Ransomware | Ransomware | Securityweek |
12.5.20 | An Undisclosed Critical Vulnerability Affect vBulletin Forums — Patch Now | Vulnerebility | Thehackernews |
12.5.20 | | Virus | SANS |
12.5.20 | | Social | Net-security |
12.5.20 | | Security | Net-security |
12.5.20 | | Security | Net-security |
12.5.20 | | Incindent | Net-security |
12.5.20 | | Security | Net-security |
12.5.20 | | Security | Net-security |
11.5.20 | VMware is going to fix recent Salt issues in vROps | Vulnerebility | Securityaffairs |
11.5.20 | GDPR Data Security Checklist in the Age of COVID-19 and the Remote Workforce | Privacy | Securityaffairs |
11.5.20 | Experts disclose security flaws in Oracle’s iPlanet Web Server | Vulnerebility | Securityaffairs |
11.5.20 | STAMINA, a new approach to malware detection by Microsoft, Intel | Virus | Securityaffairs |
11.5.20 | Sodinokibi ransomware uses MS API to encrypt open and locked files | Ransomware | Securityaffairs |
11.5.20 | Blue Mockingbird Monero-Mining campaign targets web apps | Cryptocurrency | Securityaffairs |
11.5.20 | US Says Chinese Hacking Vaccine Research: Reports | BigBrothers | Securityweek |
11.5.20 | Hacker Group Advertises Data From Multiple Fresh Breaches | Incindent | Securityweek |
11.5.20 | VMware to Patch Recent Salt Vulnerabilities in vROps | Vulnerebility | Securityweek |
11.5.20 | Railway Vehicle Maker Stadler Hit by Malware Attack | Virus | Securityweek |
11.5.20 | Thunderspy: More Thunderbolt Flaws Expose Millions of Computers to Attacks | Vulnerebility | Securityweek |
11.5.20 | DigitalOcean Inadvertently Exposed Customer Data | Incindent | Securityweek |
11.5.20 | 7 New Flaws Affect All Thunderbolt-equipped Computers Sold in the Last 9 Years | Vulnerebility | Thehackernews |
11.5.20 | | Vulnerebility | Net-security |
11.5.20 | | Attack | Net-security |
11.5.20 | Sodinokibi ransomware uses MS API to encrypt open and locked files | Ransomware | Securityaffairs |
11.5.20 | Blue Mockingbird Monero-Mining campaign targets web apps | Cryptocurrency | Securityaffairs |
11.5.20 | Swiss rail vehicle manufacturer Stadler hit by a malware-based attack | Virus | Securityaffairs |
11.5.20 | Shiny Hunters group is selling data from 11 companies on the Dark Web | Hacking | Securityaffairs |
11.5.20 | Coronavirus-themed attacks May 03 – May 09, 2020 | Security | Securityaffairs |
11.5.20 | Microsoft, Intel Introduce 'STAMINA' Approach to Malware Detection | Virus | Securityweek |
11.5.20 | | Virus | SANS |
11.5.20 | | Security | Net-security |
11.5.20 | | Phishing | Net-security |
11.5.20 | | Vulnerebility | Net-security |
11.5.20 | | Ransomware | Net-security |
11.5.20 | | Security | Net-security |
11.5.20 | | Security | Net-security |
10.5.20 | Hacker group floods dark web with data stolen from 11 companies | Incindent | Bleepingcomputer |
10.5.20 | North Korean hackers infect real 2FA app to compromise Macs | Apple APT | Bleepingcomputer |
10.5.20 | Microsoft Edge is getting a new feature to reduce web spam | Spam | Bleepingcomputer |
10.5.20 | Rail vehicle manufacturer Stadler hit by cyberattack, blackmailed | Cyber | Bleepingcomputer |
10.5.20 | Surface Laptop 3 screens with spontaneous cracks now fixed for free | Security | Bleepingcomputer |
10.5.20 | Black Hat and DEF CON security conferences go virtual due to pandemic | Congress | Bleepingcomputer |
10.5.20 | Have fun learning robotics with a DIY Bionic Robot Lizard kit | IT | Bleepingcomputer |
10.5.20 | Twitter warns of legacy site theme shutting down on June 1 | Social | Bleepingcomputer |
10.5.20 | Windows 10 upgrade bug prevents HDR video streaming | OS | Bleepingcomputer |
10.5.20 | Microsoft rolls out protection against Office 365 email storms | OS | Bleepingcomputer |
10.5.20 | New Google Authenticator update makes it worth using again | Security | Bleepingcomputer |
10.5.20 | Windows 10's Game Mode reportedly causing freezes, FPS issues | OS | Bleepingcomputer |
10.5.20 | Firefox 76.0.1 released to fix broken Amazon extension, crashes | Security | Bleepingcomputer |
10.5.20 | REvil ransomware threatens to leak A-list celebrities' legal docs | Ransomware | Bleepingcomputer |
10.5.20 | Hackers sell stolen user data from HomeChef, ChatBooks, and Chronicle | Incindent | Bleepingcomputer |
10.5.20 | Ruhr University Bochum shuts down servers after ransomware attack | Ransomware | Bleepingcomputer |
10.5.20 | Unemployed Americans offered ‘remote jobs’ as money mules | Security | Bleepingcomputer |
10.5.20 | Microsoft leak: Windows 10 2004 being released last week of May | OS | Bleepingcomputer |
10.5.20 | Intel graphics drivers now officially support Windows 10 2004 | OS | Bleepingcomputer |
10.5.20 | Microsoft Teams call drops on desktop caused by iOS bug | iOS | Bleepingcomputer |
10.5.20 | Critical WordPress plugin bug lets hackers take over 1M sites | Incindent | Bleepingcomputer |
10.5.20 | New "Aria-body" backdoor gets advanced hackers back in the spy game | Virus | Bleepingcomputer |
10.5.20 | SilverTerrier BEC scammers target US govt healthcare agencies | BigBrothers Spam | Bleepingcomputer |
10.5.20 | Microsoft's GitHub account hacked, private repositories stolen | Hacking | Bleepingcomputer |
10.5.20 | Cisco Webex phishing uses fake cert errors to steal credentials | Phishing | Bleepingcomputer |
10.5.20 | Large scale Snake Ransomware campaign targets healthcare, more | Ransomware | Bleepingcomputer |
10.5.20 | Windows 10 Build 19624 released with Windows Update fixes | OS | Bleepingcomputer |
10.5.20 | Hackers use website favicon to camouflage credit card skimmer | Crime | Bleepingcomputer |
10.5.20 | Hacker sells 22 million Unacademy user records after data breach | Incindent | Bleepingcomputer |
10.5.20 | Critical Citrix ShareFile bugs could give access to private files | Vulnerebility | Bleepingcomputer |
10.5.20 | SAP announces security issues in cloud-based products | Security | Bleepingcomputer |
10.5.20 | Massive campaign targets 900,000 WordPress sites in a week | Incindent | Bleepingcomputer |
10.5.20 | Cyber volunteers release blocklists for 26,000 COVID-19 threats | Cyber | Bleepingcomputer |
10.5.20 | Microsoft releases May Office updates with fixes for auth issues | Security | Bleepingcomputer |
10.5.20 | Toll Group hit by ransomware a second time, deliveries affected | Ransomware | Bleepingcomputer |
10.5.20 | Why Securing Remote Work is Crucial To Ensuring Business Continuity | Security blog | Sonicwall |
10.5.20 | Remembering the ILOVEYOU virus twenty years later | Malware blog | Avast blog |
10.5.20 | New Android malware steals banking passwords | Malware blog | Avast blog |
10.5.20 | Massive WordPress attack relies on old flaws | Incident blog | Avast blog |
10.5.20 | Using a Full Lifecycle Approach to Secure Cloud Native Applications | Cyber blog | Palo Alto |
10.5.20 | The Right Approach to Securing 5G | Cyber blog | Palo Alto |
10.5.20 | Scaling Security for Data Center Transformation: COVID-19 Amplifies Trends | Cyber blog | Palo Alto |
10.5.20 | Power the New Normal with Prisma Access: Delivering Next-Gen Cybersecurity | Cyber blog | Palo Alto |
10.5.20 | Unit 42 Recognized by Microsoft on the MSRC Security Researcher Leaderboard | Cyber blog | Palo Alto |
10.5.20 | | Security | SANS |
10.5.20 | BDGoGoogleDecryptor | Anti-Ransom Tool | Anti-Ransom Tool |
10.5.20 | North Korea-linked Lazarus APT uses a Mac variant of the Dacls RAT | APT | Securityaffairs |
10.5.20 | 3.68 Million MobiFriends User details leaked online | Incindent | Securityaffairs |
10.5.20 | Sodinokibi gang hacked law firm of the celebrities and threatens to release the docs | Ransomware | Securityaffairs |
10.5.20 | SilverTerrier gang uses COVID-19 lures in BEC attacks against healthcare, government organizations | Spam | Securityaffairs |
9.5.20 | Microsoft launches IoT-focused bounty program with $100K awards | IoT | Bleepingcomputer |
9.5.20 | InfinityBlack hacker group dismantled by European authorities | Hacking | Bleepingcomputer |
9.5.20 | Game patch gives hackers access to development content on Amazon S3 | Hacking | Bleepingcomputer |
9.5.20 | Nation-state hackers are targeting COVID-19 response orgs | BigBrothers | Bleepingcomputer |
9.5.20 | Firefox 76 released with integrated data breach alerts | Incindent | Bleepingcomputer |
9.5.20 | GitHub shuts down Popcorn Time repositories due to MPA DMCA notice | Security | Bleepingcomputer |
9.5.20 | GoDaddy notifies users of breached hosting accounts | Incindent | Bleepingcomputer |
9.5.20 | LockBit ransomware self-spreads to quickly encrypt 225 systems | Ransomware | Bleepingcomputer |
9.5.20 | Office 365 to stop data theft by disabling external forwarding | Security | Bleepingcomputer |
9.5.20 | New VCrypt Ransomware locks files in password-protected 7ZIPs | Ransomware | Bleepingcomputer |
9.5.20 | Hackers exploit Salt RCE bugs in widespread attacks, PoCs public | Exploit | Bleepingcomputer |
9.5.20 | CAM4 adult cam site exposes 11 million emails, private chats | Incindent | Bleepingcomputer |
9.5.20 | LineageOS outage caused by hackers breaching main infrastructure | OS | Bleepingcomputer |
9.5.20 | Hacker sells 91 million Tokopedia accounts, cracked passwords shared | Hacking | Bleepingcomputer |
9.5.20 | Debloating Windows 10 and increasing privacy with SharpApp | OS | Bleepingcomputer |
9.5.20 | Ransom News | Ransom | Ransom |
9.5.20 | TO PAY OR NOT TO PAY | Safety blog | Cybereason |
9.5.20 | CONVERGING ENDPOINT AND MOBILE SECURITY | Safety blog | Cybereason |
9.5.20 | 2 METRICS TO EVALUATE MITRE ATT&CK RESULTS | Attack blog | Cybereason |
9.5.20 | EVENTBOT: A NEW MOBILE BANKING TROJAN IS BORN | Malware blog | Cybereason |
9.5.20 | ENS 10.7 Rolls Back the Curtain on Ransomware | Ransomware blog | Mcafee blog |
9.5.20 | Cybercriminals Actively Exploiting RDP to Target Remote Organizations | Cyber blog Exploit blog | Mcafee blog |
9.5.20 | COVID-19 – Malware Makes Hay During a Pandemic | Malware blog | Mcafee blog |
9.5.20 | Tales From the Trenches; a Lockbit Ransomware Story | Ransomware blog | Mcafee blog |
9.5.20 | Is the Cloud Safe? Thinking About the Cloud Through a Security Lens | Security blog | F5 Labs |
9.5.20 | Demystifying API Attacks Using Gamification | Attack blog | F5 Labs |
9.5.20 | Excelerating Analysis, Part 2 — X[LOOKUP] Gon’ Pivot To Ya | Malware blog | FireEye |
9.5.20 | Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents | Ransomware blog | FireEye |
9.5.20 | Naikon APT: Cyber Espionage Reloaded | APT blog | Checkpoint |
9.5.20 | | Vulnerebility blog | Checkpoint |
9.5.20 | | APT blog | Checkpoint |
9.5.20 | | Attack blog Malware blog | Checkpoint |
9.5.20 | Vulnerability Spotlight: Code execution vulnerability in 3S CODESYS | Vulnerebility blog | Cisco Talos |
9.5.20 | Vulnerability Spotlight: Multiple code execution vulnerabilities in Accusoft ImageGear | Vulnerebility blog | Cisco Talos |
9.5.20 | Scams to watch out for not just this Mother’s Day | Spam blog | Eset |
9.5.20 | Digital transformation could be accelerated by COVID‑19 | Security blog | Eset |
9.5.20 | 5 common password mistakes you should avoid | Safety blog | Eset |
9.5.20 | Almost a million WordPress websites targeted in massive campaign | Cyber blog | Eset |
9.5.20 | Professional data leakage: How did that security vendor get my personal data? | Incident blog | Eset |
9.5.20 | Ghost blogging platform servers hacked to mine cryptocurrency | Cryptocurrency blog | Eset |
9.5.20 | It’s no time to let your guard down as coronavirus fraud remains a threat | Spam blog | Eset |
9.5.20 | Report: Microsoft’s GitHub Account Gets Hacked | Hacking | Threatpost |
9.5.20 | Black Hat USA, DEF CON 28 Go Virtual | Congress | Threatpost |
9.5.20 | Hackers Breach 3.5 Million MobiFriends Dating App Credentials | Incindent | Threatpost |
9.5.20 | Naikon’s Aria | APT | Securelist |
9.5.20 | Microsoft investigates claims that its GitHub account has been hacked | Hacking | Securityaffairs |
9.5.20 | Cloud Security Company Ermetic Emerges From Stealth Mode | Security | Securityweek |
9.5.20 | DigitalOcean Data Leak Incident Exposed Some of Its Customers Data | Incindent | Thehackernews |
8.5.20 | | Phishing Virus | Net-security |
8.5.20 | | Vulnerebility | Net-security |
8.5.20 | Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows | Phishing | Securityaffairs |
8.5.20 | Massive cyber attack forced Ruhr University Bochum (RUB) to shut down its IT infrastructure | Attack | Securityaffairs |
8.5.20 | Cisco fixes High Severity issues in ASA and FTD products | Vulnerebility | Securityaffairs |
8.5.20 | Healthcare, Government Organizations Targeted in BEC Attacks With COVID-19 Lures | Spam | Securityweek |
8.5.20 | Google Authenticator Users Can Now Transfer 2SV Secrets Between Devices | Mobil | Securityweek |
8.5.20 | Industry Reactions to Alliance for Open 5G Systems: Feedback Friday | Mobil | Securityweek |
8.5.20 | Elementor Plugin Vulnerabilities Exploited to Hack WordPress Sites | Vulnerebility | Securityweek |
8.5.20 | Microsoft Investigating GitHub Account Hacking Claims | Hacking | Securityweek |
8.5.20 | Cisco Fixes High-Severity Flaws In Firepower Security Software, ASA | Vulnerebility | Threatpost |
8.5.20 | Naikon APT Hid Five-Year Espionage Attack Under Radar | APT | Threatpost |
8.5.20 | Zoom Beefs Up End-to-End Encryption to Thwart ‘Zoombombers’ | Crypto | Threatpost |
8.5.20 | Blue Mockingbird Monero-Mining Campaign Exploits Web Apps | Cryptocurrency | Threatpost |
8.5.20 | Hackers Dumpster Dive for Taxpayer Data in COVID-19 Relief Money Scams | Spam | Threatpost |
8.5.20 | Issues in Elementor Pro and Ultimate Addons for Elementor exposed 1 Million WordPress sites at risk | Incindent | Securityaffairs |
8.5.20 | Poulight Stealer, a new Comprehensive Stealer from Russia | BigBrothers | Securityaffairs |
8.5.20 | Naikon APT is flying under the radar since 2015 | APT | Securityaffairs |
8.5.20 | Zoom Agrees to Step Up Security After New York Probe | Security | Securityweek |
8.5.20 | Samsung Patches Critical 0-Click Vulnerability in Smartphones | Vulnerebility | Securityweek |
8.5.20 | Cisco Patches High Severity Vulnerabilities in Security Products | Vulnerebility | Securityweek |
8.5.20 | Critical Flaw in CODESYS Industrial Controller Software Allows Code Execution | Vulnerebility | Securityweek |
8.5.20 | Search Company Algolia Hacked via Recent Salt Vulnerabilities | Hacking | Securityweek |
8.5.20 | | Safety | SANS |
8.5.20 | | Cyber | Net-security |
8.5.20 | | Safety | Net-security |
8.5.20 | | Cyber | Net-security |
8.5.20 | | Security | Net-security |
8.5.20 | | Security | Net-security |
7.5.20 | Snake Ransomware hits Europe’s largest private hospital operator Fresenius during COVID-19 outbreak | Ransomware | Securityaffairs |
7.5.20 | Brazilian trojan banker is targeting Portuguese users using browser overlay | Virus | Securityaffairs |
7.5.20 | Samsung fixes a zero-click issue affecting its phones | Mobil | Securityaffairs |
7.5.20 | North Korean Hackers Release Mac Variant of Dacls RAT | Virus | Securityweek |
7.5.20 | Recorded Future Releases Free Threat Intelligence Browser Extension | Security | Securityweek |
7.5.20 | Chinese Naikon APT Rediscovered After New Five-year Stealth Campaign | APT | Securityweek |
7.5.20 | Zoom Acquires Keybase to Bring End-to-End Encryption to Video Platform | Crypto | Securityweek |
7.5.20 | Another Stuxnet-Style Vulnerability Found in Schneider Electric Software | ICS | Securityweek |
7.5.20 | Czech, US to Cooperate on Security of 5G Networks | BigBrothers | Securityweek |
7.5.20 | This Asia-Pacific Cyber Espionage Campaign Went Undetected for 5 Years | CyberSpy | Thehackernews |
7.5.20 | | CyberCrime | Net-security |
7.5.20 | | Security | Net-security |
7.5.20 | | Safety | Net-security |
7.5.20 | | Safety | SANS |
7.5.20 | Lazarus Group Hides macOS Spyware in 2FA Application | CyberCrime | Threatpost |
7.5.20 | Attackers Claim Identity of Financial NGO to Steal Sharepoint, Office Credentials | Incindent | Threatpost |
7.5.20 | Ransomware Attack Takes Down Toll Group Systems, Again | Ransomware | Threatpost |
7.5.20 | InfinityBlack Dismantled After Selling Millions of Credentials | Incindent | Threatpost |
7.5.20 | Microsoft Shells Out $100K for IoT Security | IT | Threatpost |
7.5.20 | Unacademy hacked, 22 million accounts offered for sale | Incindent | Securityaffairs |
7.5.20 | Shipping Giant Toll suffered a second ransomware attack in a few months | Ransomware | Securityaffairs |
7.5.20 | Nearly 1 Million WordPress Sites Targeted via Old Vulnerabilities | Vulnerebility | Securityweek |
7.5.20 | New GitHub Features Help Find Vulnerabilities and Secrets in Code | Vulnerebility | Securityweek |
7.5.20 | Firefox 76 Brings Security Patches, Breached Password Alerts | Vulnerebility | Securityweek |
7.5.20 | Seventy Percent of Firms Sacrifice Security for Faster Innovation | Security | Securityweek |
7.5.20 | Two Popular VPNs Exposed Users to Attacks Via Fake Updates | Attack | Securityweek |
7.5.20 | Facebook Launches 'Discover,' A Secure Proxy to Browse the Internet for Free | Social | Thehackernews |
7.5.20 | | Cyber | Net-security |
7.5.20 | | Security | Net-security |
7.5.20 | | Attack | Net-security |
7.5.20 | | Vulnerebility | Net-security |
7.5.20 | | IT | Net-security |
7.5.20 | | Security | Net-security |
7.5.20 | | Incindent | Net-security |
6.5.20 | DDoS attacks in Q1 2020 | Attack | Securelist |
6.5.20 | 9% of SAP’s 440,000 customers impacted by security bugs in some cloud products | Vulnerebility | Securityaffairs |
6.5.20 | Data belonging 44 Million Pakistani mobile users leaked online | Incindent | Securityaffairs |
6.5.20 | Law enforcement agencies dismantled Infinity Black hacker group | Hacking | Securityaffairs |
6.5.20 | Citrix ShareFile Vulnerabilities Expose User Files | Vulnerebility | Securityweek |
6.5.20 | Australian Shipping Giant Toll Hit by Ransomware for Second Time | Ransomware | Securityweek |
6.5.20 | SAP Alerts Customers of Vulnerabilities in Cloud Products | Vulnerebility | Securityweek |
6.5.20 | | Attack | Net-security |
6.5.20 | | Security | Net-security |
6.5.20 | AA20-126A : APT Groups Target Healthcare and Essential Services | CERT | CERT |
6.5.20 | GoDaddy Hack Breaches Hosting Account Credentials | Incindent | Threatpost |
6.5.20 | Google Android RCE Bug Allows Attacker Full Device Access | Android | Threatpost |
6.5.20 | New Kaiji Botnet Targets IoT, Linux Devices | BotNet IoT | Threatpost |
6.5.20 | Spear-Phishing Attack Spoofs EE To Target Executives | Phishing | Threatpost |
6.5.20 | Recorded Future to Provide Free Access to Elite Intelligence Through New Browser Extension | Security | Securityaffairs |
6.5.20 | CAM4 adult cam site leaked 11M database records including emails, private chats | Incindent | Securityaffairs |
6.5.20 | New 'Kaiji' Botnet Attacks Linux, IoT Devices via SSH Brute Force | BotNet IoT | Securityweek |
6.5.20 | US and UK Warn of Adversaries Targeting COVID-19 Responders | BigBrothers | Securityweek |
6.5.20 | More Than 30 Firms Join Alliance Calling for 'Open' 5G systems | Mobil | Securityweek |
6.5.20 | Microsoft Offering Up to $100,000 for Vulnerabilities in Azure Sphere | Vulnerebility | Securityweek |
6.5.20 | Warning: Citrix ShareFile Flaw Could Let Attackers Steal Corporate Secrets | Incindent | Thehackernews |
6.5.20 | | Virus | SANS |
6.5.20 | | Attack | Net-security |
6.5.20 | | Security | Net-security |
6.5.20 | | Crypto | Net-security |
6.5.20 | | Mobil | Net-security |
6.5.20 | | OS | Net-security |
5.5.20 | GoDaddy discloses a data breach, web hosting account credentials exposed | Incindent | Securityaffairs |
5.5.20 | Expert released PoC exploit for CVE-2020-1967 DoS flaw in OpenSSL | Exploit Vulnerebility | Securityaffairs |
5.5.20 | Kaiji, a new Linux malware targets IoT devices in the wild | Virus | Securityaffairs |
5.5.20 | European Authorities Dismantle 'InfinityBlack' Hacker Group | BigBrothers | Securityweek |
5.5.20 | European Virus Tracing Apps Highlight Battle for Privacy | Privacy | Securityweek |
5.5.20 | Most Attacks Don't Generate Security Alerts: Mandiant | Attack | Securityweek |
5.5.20 | Android's May 2020 Patches Fix Critical System Vulnerability | Android | Securityweek |
5.5.20 | Virtualized Cloud Visibility Firm Orca Security Raises $20.5 Million | IT | Securityweek |
5.5.20 | GoDaddy Informs Users of Data Breach | Incindent | Securityweek |
5.5.20 | PoC Exploit Released for DoS Vulnerability in OpenSSL | Exploit Vulnerebility | Securityweek |
5.5.20 | Change This Browser Setting to Stop Xiaomi from Spying On Your Incognito Activities | Mobil | Thehackernews |
5.5.20 | | Spam | Net-security |
5.5.20 | | Phishing | Net-security |
5.5.20 | | Attack | Threatpost |
5.5.20 | | Cryptocurrency Exploit | Threatpost |
5.5.20 | | Hacking | Threatpost |
5.5.20 | Microsoft spotted multiple malspam campaigns using malware-laced ISO and IMG files | Spam Virus | Securityaffairs |
5.5.20 | Nation-state actors are targeting UK universities to steal info on COVID-19 research | BigBrothers | Securityaffairs |
5.5.20 | Firm's MDM Server Abused to Deliver Android Malware to 75% of Its Devices | Android | Securityweek |
5.5.20 | Power Supply Can Turn Into Speaker for Data Exfiltration Over Air Gap | Attack | Securityweek |
5.5.20 | COVID-19 Contact Tracing Apps: Effective Virus Risk Management Tools or Privacy Nightmare? | Security | Securityweek |
5.5.20 | Most Malicious Coronavirus-Related Domains Located in U.S. | Virus | Securityweek |
5.5.20 | | Security | SANS |
5.5.20 | | Security | Net-security |
5.5.20 | | Safety | Net-security |
5.5.20 | | Attack | Net-security |
5.5.20 | | Cyber | Net-security |
5.5.20 | | Security | Net-security |
4.5.20 | DHS CISA alert provides recommendations on securing Office 365 installs | BigBrothers | Securityaffairs |
4.5.20 | Hackers are scanning the internet for vulnerable Salt installs, Ghost blogging platform hacked | Vulnerebility | Securityaffairs |
4.5.20 | LineageOS servers hacked, attackers exploited unpatched Salt issues | Vulnerebility | Securityaffairs |
4.5.20 | TP-Link Patches Multiple Vulnerabilities in NC Cloud Cameras | Vulnerebility | Securityweek |
4.5.20 | New Executive Order Aims to Protect U.S. Power Grid From Backdoored Equipment | BigBrothers | Securityweek |
4.5.20 | Flaws in Ninja Forms, LearnPress Plugins Exposed WordPress Sites to Attacks | Vulnerebility | Securityweek |
4.5.20 | Recent Salt Vulnerabilities Exploited to Hack LineageOS, Ghost, DigiCert Servers | Vulnerebility | Securityweek |
4.5.20 | New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers | Attack Virus | Thehackernews |
4.5.20 | Hackers Breach LineageOS, Ghost, DigiCert Servers Using SaltStack Vulnerability | Vulnerebility | Thehackernews |
4.5.20 | | Phishing | Net-security |
4.5.20 | | Exploit | Net-security |
4.5.20 | | Security | Net-security |
4.5.20 | India’s Jio Coronavirus symptom checker exposed test results | Incindent | Securityaffairs |
4.5.20 | Coronavirus-themed attacks April 26 – May 02, 2020 | Cyber | Securityaffairs |
4.5.20 | Cyber Threats Observatory Gets Improvements | Cyber | Securityaffairs |
4.5.20 | TOKOPEDIA e-commerce hacked, 91 Million accounts available on the darkweb | Incindent | Securityaffairs |
4.5.20 | | Virus | SANS |
4.5.20 | | Safety | Net-security |
4.5.20 | | Privacy | Net-security |
4.5.20 | | Ransomware | Net-security |
4.5.20 | | Security | Net-security |
4.5.20 | | Mobil | Net-security |
4.5.20 | | Security | Net-security |
3.5.20 | Xiaomi tracks private browser and phone usage, defends behavior | Privacy | Bleepingcomputer |
3.5.20 | Sodinokibi, Ryuk ransomware drive up average ransom to $111,000 | Ransomware | Bleepingcomputer |
3.5.20 | Opening 100 tabs in Google Chrome Mobile gets you a smiley face | Mobil | Bleepingcomputer |
3.5.20 | Microsoft Edge getting improved security, work at home features | Security | Bleepingcomputer |
3.5.20 | FCC: No more warnings for robocallers before fines | BigBrothers | Bleepingcomputer |
3.5.20 | Hackers breach company’s MDM server to spread Android malware | Android | Bleepingcomputer |
3.5.20 | New phishing campaign packs an info-stealer, ransomware punch | Phishing | Bleepingcomputer |
3.5.20 | Convincing Office 365 phishing uses fake Microsoft Teams alerts | Phishing | Bleepingcomputer |
3.5.20 | French daily Le Figaro database exposes users’ personal info | Incindent | Bleepingcomputer |
3.5.20 | Hackers say they stole millions of credit cards from Banco BCR | Incindent | Bleepingcomputer |
3.5.20 | US govt agencies to disable DoH until federal service is ready | BigBrothers | Bleepingcomputer |
3.5.20 | Ninja Forms WordPress plugin patch prevents takeover of 1M sites | Vulnerebility | Bleepingcomputer |
3.5.20 | Shade Ransomware Decryptor can now decrypt over 750K victims | Ransomware | Bleepingcomputer |
3.5.20 | New Android malware steals financial information, bypasses 2FA | Android | Bleepingcomputer |
3.5.20 | Microsoft Sway abused in PerSwaysion spear-phishing operation | Phishing | Bleepingcomputer |
3.5.20 | Clop ransomware leaks ExecuPharm's files after failed ransom | Ransomware | Bleepingcomputer |
3.5.20 | Bugs in WordPress plugins for online courses let students cheat | Vulnerebility | Bleepingcomputer |
3.5.20 | US govt updates Microsoft Office 365 security best practices | BigBrothers | Bleepingcomputer |
3.5.20 | Google updates Chrome Web Store policy to block extension spam | Security | Bleepingcomputer |
3.5.20 | Windows 10 Search now gives easy access to COVID-19 info | OS | Bleepingcomputer |
3.5.20 | Microsoft releases Windows 10 Build 19619 with freeze fixes | OS | Bleepingcomputer |
3.5.20 | Numerous sites leak user emails to advertising, analytics services | Privacy | Bleepingcomputer |
3.5.20 | Microsoft releases Sysmon 11 with auto-backup of deleted files | OS | Bleepingcomputer |
3.5.20 | RDP brute-force attacks are skyrocketing due to remote working | Attack | Bleepingcomputer |
3.5.20 | Microsoft warns of malware surprise pushed via pirated movies | Cryptocurrency | Bleepingcomputer |
3.5.20 | Securing Telecommuters with Expanded Endpoint Visibility and Control | Cyber blog | Sonicwall |
3.5.20 | Why Securing Remote Work is Crucial To Ensuring Business Continuity | Cyber blog | Sonicwall |
3.5.20 | Apple flaw puts iPhones & iPads at risk | OS Blog | Avast blog |
3.5.20 | New Android malware steals banking passwords | OS Blog | Avast blog |
3.5.20 | Don’t Panic: COVID-19 Cyber Threats | Cyber blog | Palo Alto Unity42 |
3.5.20 | Anatomy of Formjacking Attacks | Cryptocurrency blog | Palo Alto Unity42 |
3.5.20 | Learning from Home While School’s Out: Cybersecurity Education for Kids | Cyber blog | Palo Alto |
3.5.20 | What Kind of Cybersecurity Leader Are You? Advice for CSOs and Others | Cyber blog | Palo Alto |
3.5.20 | Highlighting the Latest Compute Security Capabilities in Prisma Cloud | Cyber blog | Palo Alto |
3.5.20 | Manage a Remote SOC: Playbooks for Monitoring Remote User Activity | Cyber blog | Palo Alto |
3.5.20 | | Phishing | SANS |
3.5.20 | TrickBot operators exploit COVID-19 as lures | BotNet | Securityaffairs |
3.5.20 | Fake Microsoft Teams notifications aim at stealing Office365 logins | CyberCrime | Securityaffairs |
3.5.20 | President Trump’s executive order bans foreign electrical equipment from national power grid | BigBrothers | Securityaffairs |
3.5.20 | French daily Le Figaro leaks 7.4 Billion records | Incindent | Securityaffairs |
2.5.20 | Ransom News | Ransom | Ransom |
2.5.20 | ShadeDecryptor | Anti-Ransom Tool | Anti-Ransom Tool |
2.5.20 | Rogue affiliates are running fake antivirus expiration scams | Exploit | Bleepingcomputer |
2.5.20 | Adobe fixes critical vulnerabilities in Magento and Illustrator | Vulnerebility | Bleepingcomputer |
2.5.20 | Microsoft releases guidance on blocking ransomware attacks | Ransomware | Bleepingcomputer |
2.5.20 | Hacking group used Google Play Store to push spyware for years | Android | Bleepingcomputer |
2.5.20 | Lucy malware for Android adds file-encryption for ransomware ops | Android Ransomware | Bleepingcomputer |
2.5.20 | Fake Fedex and UPS delivery issues used in COVID-19 phishing | Phishing | Bleepingcomputer |
2.5.20 | WordPress plugin bug lets hackers create rogue admin accounts | Vulnerebility | Bleepingcomputer |
2.5.20 | Twitter kills SMS-based tweeting in most countries | Mobil | Bleepingcomputer |
2.5.20 | Microsoft investigating Windows 10 KB4549951 BSOD reports | OS | Bleepingcomputer |
2.5.20 | Shade Ransomware shuts down, releases 750K decryption keys | Ransomware | Bleepingcomputer |
2.5.20 | Asnarök malware exploits firewall zero-day to steal credentials | Exploit Virus | Bleepingcomputer |
2.5.20 | Microsoft Teams patched against image-based account takeover | Vulnerebility | Bleepingcomputer |
2.5.20 | How to prevent new Windows 10 updates from ruining your day | OS | Bleepingcomputer |
2.5.20 | Hackers exploit zero-day in Sophos XG Firewall, fix released | Exploit Vulnerebility | Bleepingcomputer |
2.5.20 | WSLFetch creates colorful Windows 10 WSL Linux information | OS | Bleepingcomputer |
2.5.20 | SMART FILTERING, SMART SAMPLING AND SMART SCALING | Security blog | Cybereason |
2.5.20 | EVENTBOT: A NEW MOBILE BANKING TROJAN IS BORN | Malware blog | Cybereason |
2.5.20 | Top Attacks Against Financial Services Organizations 2017–2019 | Attack blog | F5 Labs |
2.5.20 | A Letter to the Present from a Post-Pandemic IT Director | Security blog | F5 Labs |
2.5.20 | Putting the Model to Work: Enabling Defenders With Vulnerability Intelligence — Intelligence for Vulnerability Management, Part Four | Vulnerebility blog | FireEye |
2.5.20 | Excelerating Analysis, Part 2 — X[LOOKUP] Gon’ Pivot To Ya | Malware blog | FireEye |
2.5.20 | E-Learning Platforms Getting Schooled – Multiple Vulnerabilities in WordPress’ Most Popular Learning Management System Plugins | Vulnerebility blog | Checkpoint |
2.5.20 | First Seen In the Wild – Mobile as Attack Vector Using MDM | Hardware blog | Checkpoint |
2.5.20 | Lucy’s Back: Ransomware Goes Mobile | Ransomware blog | Checkpoint |
2.5.20 | OptOut – Compiler Undefined Behavior Optimizations | Cyber blog | Checkpoint |
2.5.20 | Fuzzing ImageIO | Vulnerebility blog | Project Zero |
2.5.20 | Upgraded Aggah malspam campaign delivers multiple RATs | Malware blog Spam blog | Cisco Talos |
2.5.20 | It’s no time to let your guard down as coronavirus fraud remains a threat | Cyber blog | Cisco Talos |
2.5.20 | Sextortion scammers still shilling with stolen passwords | Spam blog | Eset |
2.5.20 | ESET Threat Report | Cyber blog | Eset |
2.5.20 | Grandoreiro: How engorged can an EXE get? | Malware blog | Eset |
2.5.20 | Microsoft Teams flaw could let attackers hijack accounts | Incident blog | Eset |
2.5.20 | Microsoft Teams Impersonation Attacks Flood Inboxes | Attack | Threatpost |
2.5.20 | TrickBot Attack Exploits COVID-19 Fears with DocuSign-Themed Ploy | BotNet Exploit | Threatpost |
2.5.20 | Upgraded Cerberus Spyware Spreads Rapidly via MDM | Virus | Threatpost |
2.5.20 | News Wrap: Microsoft Sway Phish, Malicious GIF and Spyware Attacks | Security | Threatpost |
2.5.20 | Hackers are targeting recently patched WebLogic security vulnerability | Vulnerebility | Securityaffairs |
2.5.20 | Maze Ransomware operators claim to have stolen millions of credit cards from Banco BCR | Ransomware | Securityaffairs |
2.5.20 | New 'EventBot' Android Malware Targets Nearly 300 Financial Apps | Android | Securityweek |
2.5.20 | Oracle Says Hackers Targeting Recently Patched Vulnerabilities | Vulnerebility | Securityweek |
1.5.20 | COVID-19 disinformation and misinformation campaigns continue to proliferate | CyberCrime | Securityaffairs |
1.5.20 | Europol analyses on criminal operations in Europe during COVID-19 Crisis | BigBrothers | Securityaffairs |
1.5.20 | Over 800K WordPress sites are at risk due to a flaw in Ninja Forms plugin | Vulnerebility | Securityaffairs |
1.5.20 | DHS Reiterates Recommendations on Securing Office 365 | BigBrothers | Securityweek |
1.5.20 | Several Vulnerabilities Patched With Release of WordPress 5.4.1 | Vulnerebility | Securityweek |
1.5.20 | CISA Reminds Federal Agencies to Use Its DNS Service | BigBrothers | Securityweek |
1.5.20 | Sophisticated Phishing Kit Used by Multiple Groups to Target Executives | Phishing | Securityweek |
1.5.20 | Critical SaltStack RCE Bug (CVSS Score 10) Affects Thousands of Data Centers | Vulnerebility | Thehackernews |
1.5.20 | Salt Bugs Allow Full RCE as Root on Cloud Servers | Vulnerebility | Threatpost |
1.5.20 | Microsoft Sway Abused in Office 365 Phishing Attack | Phishing | Threatpost |
1.5.20 | Shade Threat Actors Call It Quits, Release 750K Encryption Keys | Crypto | Threatpost |
1.5.20 | New Android Malware Targets PayPal, CapitalOne App Users | Android | Threatpost |
1.5.20 | Critical WordPress e-Learning Plugin Bugs Open Door to Cheating | Vulnerebility | Threatpost |
1.5.20 | Crooks spread malware via pirated movies during COVID-19 outbreak | Virus | Securityaffairs |
1.5.20 | Chegg discloses the third data breach in the last two years | Incindent | Securityaffairs |
1.5.20 | Group-IB uncovers PerSwaysion – sophisticated phishing campaign targeting executives worldwide | CyberCrime Phishing | Securityaffairs |
1.5.20 | Experts found critical flaws in 3 popular e-Learning WordPress Plugins | Vulnerebility | Securityaffairs |
1.5.20 | Criminals Quick to Exploit COVID-19 Crisis in Europe | CyberCrime Exploit | Securityweek |
1.5.20 | Google 'Task Force' Fights Bad COVID-19 Ads | Cyber | Securityweek |
1.5.20 | EU Demands End to Coronavirus Cyberattacks | BigBrothers | Securityweek |
1.5.20 | Chegg Informs Employees of Data Breach | Incindent | Securityweek |
1.5.20 | | Attack | SANS |
1.5.20 | | Security | Net-security |
1.5.20 | | Cyber | Net-security |
1.5.20 | | Phishing | Net-security |
1.5.20 | | Security | Net-security |
| | | |