Calendar 2020 September- Home  2020  2019  2018  2017  2016  1  2  3  4  5  6  7

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2020 - January February March April May June July August September October November December


Date

Name

Category

Web

29.9.20

Why master YARA: from routine to extreme threat hunting cases. Follow-up

Cyber

Securelist
29.9.20

FBI and CISA warn of disinformation campaigns about the hack of voter systems

BigBrothers

Securityaffairs
29.9.20

QNAP urges users to update NAS firmware and app to prevent infections

Safety

Securityaffairs
29.9.20

Maritime transport and logistics giant CMA CGM hit with ransomware

Ransomware

Securityaffairs
29.9.20

Ransomware attack on Tyler Technologies might be worse than initially thought

Ransomware

Securityaffairs
29.9.20

VMware Unveils New Cloud Workload Security Solution

Security

Securityweek
29.9.20

China-Linked 'BlackTech' Hackers Start Targeting U.S.

APT

Securityweek
29.9.20

Ivanti Acquires MobileIron, Pulse Secure

IT

Securityweek
29.9.20

FBI, CISA Warn of Disinformation Campaigns Regarding Hacked Voting Systems

BigBrothers

Securityweek
29.9.20

McAfee Files for IPO

IT

Securityweek
29.9.20

New FinSpy Spyware Variants Identified, Dissected

CyberSpy

Securityweek
29.9.20

UHS Shuts Down Systems in U.S. Hospitals Following Cyberattack

Ransomware

Securityweek
29.9.20

French Shipping Giant CMA CGM Discloses Security Breach

Incindent

Securityweek
29.9.20

Large US hospital chain hobbled by Ryuk ransomware

Ransomware

Net-security
29.9.20

Permanent remote work puts greater pressure on IT teams

Cyber

Net-security
29.9.20

Review: ThreadFix 3.0

Security

Net-security
29.9.20

Managing Remote Access for Partners & Contractors

SecuritySANS
29.9.20

Mac, Linux Users Now Targeted by FinSpy Variants

CyberSpy

Threatpost
29.9.20

Joker Trojans Flood the Android Ecosystem

Android

Threatpost
29.9.20

Universal Health Services Ransomware Attack Impacts Hospitals Nationwide

Ransomware

Threatpost
29.9.20

Twitter Warns Developers of API Bug That Exposed App Keys, Tokens

Social

Threatpost
29.9.20

Windows 7 ‘Upgrade’ Emails Steal Outlook Credentials

Spam

Threatpost
29.9.20

UHS hospitals hit by Ryuk ransomware attack

Ransomware

Securityaffairs
29.9.20

REvil ransomware operators are recruiting new affiliates

Ransomware

Securityaffairs
29.9.20

New Pastebin Security Features Draw Criticism

IT

Securityweek
29.9.20

CISA Warns of Hackers Exploiting Zerologon Vulnerability

Exploit

Securityweek
29.9.20

$150 Million Stolen From Singaporean Crypto-Exchange KuCoin

Cryptocurrency

Securityweek
29.9.20

The lifecycle of a eureka moment in cybersecurity

Cyber

Net-security
29.9.20

Cybersecurity is a top priority for digital transformation

Cyber

Net-security
29.9.20

114 5G commercial networks now live worldwide

Mobil

Net-security
29.9.20

Report: Hunting Evasive Malware

Virus

Net-security
28.9.20Putin proposes new information security collaboration to US, including no-hack pact for electionBigBrothersSecurityaffairs
28.9.20Mount Locker ransomware operators demand multi-million dollar ransomsRansomwareSecurityaffairs
28.9.20Hacker Uploads Documents to WHO, UNESCO WebsitesBigBrothersSecurityweek
28.9.20Tyler Technologies Says Customers Reported Suspicious LoginsIncindentSecurityweek
28.9.20TikTok Gets Reprieve as Judge Halts Trump Download BanBigBrothersSecurityweek
28.9.20Twitter Says Bug Leading to API Key Leak PatchedSocialSecurityweek
28.9.20Researchers Uncover Cyber Espionage Operation Aimed At Indian ArmyBigBrothersThehackernews
28.9.20Red Team — Automation or Simulation?HackingThehackernews
28.9.20

PowerShell Backdoor Launched from a ShellCode

Virus

SANS
28.9.20

Hardware security: Emerging attacks and protection mechanisms

Attack

Net-security
28.9.20

Cybersecurity lessons learned from data breaches and brand trust matters

Incindent

Net-security
28.9.20

Measuring impact beyond a single incident

Incindent

Net-security
28.9.20

Rising reports of fraud signal that some COVID-related schemes may just be getting started

Cyber

Net-security
28.9.20

Financial risk and regulatory compliance pros struggling with collaboration

Cyber

Net-security
28.9.20

GRC teams have a number of challenges meeting regulatory demands

Security

Net-security
28.9.20Unknown FinSpy Mac and Linux versions found in EgyptCyberSpySecurityaffairs
28.9.20Google removes 17 Joker -infected apps from the Play StoreAndroidSecurityaffairs
28.9.20Apple addresses four vulnerabilities in macOSAppleSecurityaffairs
28.9.20Microsoft took down 18 Azure AD apps used by Chinese Gadolinium APTAPTSecurityaffairs
28.9.20Microsoft Says China-Linked Hackers Abused Azure in AttacksBigBrothersSecurityweek
28.9.20Chrome Vulnerabilities Expose Users to Attacks Via Malicious ExtensionsAttackSecurityweek
27.9.20Tyler Technologies warns clients to change remote support passwordsIncindent

Bleepingcomputer

27.9.20Microsoft Weekly Roundup: Windows 10, Ignite 2020, bugs and fixesOS

Bleepingcomputer

27.9.20ThunderX ransomware silenced with release of a free decryptorRansomware

Bleepingcomputer

27.9.20Louis Vuitton fixes data leak and account takeover vulnerabilityIncindent

Bleepingcomputer

27.9.20Apple fixes iPhone Wi-Fi and default apps issues in iOS 14.0.1Apple

Bleepingcomputer

27.9.20Twitter is warning devs that API keys and tokens may have leakedSocial

Bleepingcomputer

27.9.20Microsoft disrupts nation-state hacker op using Azure Cloud serviceHacking

Bleepingcomputer

27.9.20The Windows XP source code was allegedly leaked onlineIncindent

Bleepingcomputer

27.9.20Mount Locker ransomware joins the multi-million dollar ransom gameRansomware

Bleepingcomputer

27.9.20Microsoft confirms Group Policy Editor bug in Windows Server 2016OS

Bleepingcomputer

27.9.20Microsoft Edge's new feature will reduce memory and CPU usageOS

Bleepingcomputer

27.9.20Phishing attacks are targeting your social network accountsPhishing

Bleepingcomputer

27.9.20Scammers drain bank accounts using AnyDesk and SIM-swappingHacking

Bleepingcomputer

27.9.20Instagram bug allowed crashing the app via image sent to deviceSocial

Bleepingcomputer

27.9.20Microsoft: Hackers using Zerologon exploits in attacks, patch now!Exploit

Bleepingcomputer

27.9.20Government software provider Tyler Technologies hit by ransomwareRansomware

Bleepingcomputer

27.9.20AgeLocker ransomware targets QNAP NAS devices, steals dataRansomware

Bleepingcomputer

27.9.20U.S. fitness chains suffer data breach affecting 600K customersIncindent

Bleepingcomputer

27.9.20Tor Browser 10 released to sync with latest Firefox ESR versionSafety

Bleepingcomputer

27.9.20Hackers sell access to your network via remote management appsHackingBleepingcomputer
27.9.20A powerful DDoS attack hit Hungarian banks and telecoms servicesAttackSecurityaffairs
27.9.20Victims of ThunderX ransomware can recover their files for freeRansomwareSecurityaffairs
27.9.20Hackers stole more than $150 million from KuCoin cryptocurrency exchangeCryptocurrencySecurityaffairs
27.9.20Ransom NewsRansomRansom
26.9.20

Ring’s Flying In-Home Camera Drone Escalates Privacy Worries

Privacy

Threatpost
26.9.20

FortiGate VPN Default Config Allows MitM Attacks

Attack

Threatpost
26.9.20

Industrial Cyberattacks Get Rarer but More Complex

ICS

Threatpost
26.9.20

Microsoft Kills 18 Azure Accounts Tied to Nation-State Attacks

BigBrothers

Threatpost
26.9.20

Source Code of Windows XP, Server 2003 leaked

Incindent

Securityaffairs
26.9.20

Twitter warns developers of possible API keys leak

Social

Securityaffairs
26.9.20

Cisco fixes 34 High-Severity flaws in IOS and IOS XE software

Vulnerebility

Securityaffairs
26.9.20

Fortinet VPN with default certificate exposes 200,000 businesses to hack

Hacking

Securityaffairs
26.9.20

Apple Patches Four Vulnerabilities in macOS

Apple

Securityweek
26.9.20

Source Code of Windows XP, Server 2003 Allegedly Leaked

Incindent

Securityweek
26.9.20

FinSpy Spyware for Mac and Linux OS Targets Egyptian Organisations

CyberSpy

Thehackernews
26.9.20

Microsoft Windows XP Source Code Reportedly Leaked Online

Incindent

Thehackernews
26.9.20Lawsuit accuses Instagram of spying on usersSocial blogAvast blog
26.9.20iOS and Android scam apps spreading via TikTokOS BlogAvast blog
26.9.20Election hacking: A September updateBigBrother blogAvast blog
26.9.20Back to campus means understanding your data securitySecurity blogAvast blog
26.9.20Case Study: Emotet Thread Hijacking, an Email Attack TechniqueMalware blogPalo Alto Unity42
26.9.20VB2020: ANCHOR, BAZAR, AND THE TRICKBOT CONNECTIONCongress blogCybereason
26.9.20DIGITAL FORENSIC BREADCRUMBS AT THE 2020 GRACE HOPPER CELEBRATIONCyber blogCybereason
26.9.20GERMAN RANSOMWARE ATTACK: A RALLYING CRY FOR BULLISH DILIGENCERansomware blogCybereason
26.9.20JWT: A How Not to GuideSecurity blogF5 Labs
26.9.20Fuzzing Image Parsing in Windows, Part One: Color ProfilesSecurity blogFireEye
26.9.20#Instagram_RCE: Code Execution Vulnerability in Instagram App for Android and iOSSocial blogCheckpoint
26.9.20The Internet did my homeworkSecurity blogCisco Talos
26.9.20New Snort, ClamAV coverage strikes back against Cobalt StrikeHacking blogCisco Talos
26.9.205 tips for better Google Drive securitySecurity blog

Eset

26.9.20Ray‑Ban parent company reportedly suffers major ransomware attackRansomware blog

Eset

26.9.20179 arrested in massive dark web bustCyber blog

Eset

26.9.20New tool helps companies assess why employees click on phishing emailsPhishing blog

Eset

26.9.20Mozilla fixes flaw that let attackers hijack Firefox for Android via Wi‑FiHacking blog

Eset

25.9.20Shopify data breach illustrates the danger of insider threatsIncindent

Bleepingcomputer

25.9.20Windows 10 Package Manager can now install Microsoft Store appsOS

Bleepingcomputer

25.9.20New ransomware actor OldGremlin uses custom malware to hit top orgsRansomware

Bleepingcomputer

25.9.20Ray-Ban owner Luxottica confirms ransomware attack, work disruptedRansomware

Bleepingcomputer

25.9.20

Cyber insurer's security scans reduced ransomware claims by 65%Ransomware

Bleepingcomputer

25.9.20Emotet double blunder: fake ‘Windows 10 Mobile’ and outdated messagesVirus

Bleepingcomputer

25.9.20Windows Terminal 1.4 released with hyperlink and jump list supportOS

Bleepingcomputer

25.9.20Firefox 81 released with credit card autofill and new themeSecurity

Bleepingcomputer

25.9.20Microsoft Edge is coming to Linux in preview in OctoberOS

Bleepingcomputer

25.9.20Russian hackers use fake NATO training docs to breach govt networksBigBrothers

Bleepingcomputer

25.9.20Popular TikTok profiles promote scammy apps generating $500,000Social

Bleepingcomputer

25.9.20Texas businesses targeted in Department of State Health RFQ phishingPhishing

Bleepingcomputer

25.9.20Privacy-focused search engines & browsers that protect your dataPrivacy

Bleepingcomputer

25.9.20Strava app shows your info to nearby users unless this setting is disabledMobil

Bleepingcomputer

25.9.20

Microsoft is purchasing ZeniMax Media/Bethesda for $7.5 billionOS

Bleepingcomputer

25.9.20Windows 10 Health Report: September 2020 Updates' problems and fixesOS

Bleepingcomputer

25.9.20Google App Engine feature abused to create unlimited phishing pagesPhishing

Bleepingcomputer

25.9.20Microsoft explains why Windows 10 is crashing on Lenovo laptopsOS

Bleepingcomputer

25.9.20How to fix Windows 10 search problemsOS

Bleepingcomputer

25.9.20Tutanota encrypted email service suffers DDoS cyberattacksAttackBleepingcomputer
25.9.20

CISA says federal agency compromised by malicious cyber actor

BigBrothers

Securityaffairs
25.9.20

Polish police shut down major group of hackers in the country

BigBrothers

Securityaffairs
25.9.20

Officials: Washington Being Targeted by Phishing Campaign

Phishing

Securityweek
25.9.20

Maryland Man Gets 12 Months in Prison for Hacking Former Employer

Crime

Securityweek

25.9.20

CISA Says Threat Actor Breached Federal Agency's Network

BigBrothers

Securityweek
25.9.20

Government Software Provider Tyler Technologies Confirms Ransomware Attack

Ransomware

Securityweek
25.9.20

Russian Pleads Not Guilty in Foiled Tesla Ransomware Plot

BigBrothers  Ransomware

Securityweek
25.9.20

Fortinet VPN with Default Settings Leave 200,000 Businesses Open to Hackers

Hacking  Incindent

Thehackernews
25.9.20

Alien Android Banking Trojan Sidesteps 2FA

Android

Threatpost
25.9.20

Cisco Patch-Palooza Tackles 29 High-Severity Bugs

Vulnerebility

Threatpost
25.9.20

Free Apple iPhone 12? Chatbot Scam Spreads Via Texts

Spam

Threatpost
25.9.20

Feds Hit with Successful Cyberattack, Data Stolen

Incindent

Threatpost

25.9.20

Alien Android banking Trojan, the powerful successor of the Cerberus malware

Android

Securityaffairs
25.9.20

Cisco Patches 34 High-Severity Vulnerabilities in IOS Software

Vulnerebility

Securityweek
25.9.20

Instagram Remote Account Takeover Required No Action From Victim

Social

Securityweek
25.9.20

Nigerian Hacker Sentenced to Prison in U.S. for Targeting Government Employees

BigBrothers

Securityweek
25.9.20

Pandemic Leads to Rise in Industrial Systems Targeted Via RDP: Report

ICS

Securityweek
25.9.20

Using virtualization to isolate risky applications and other endpoint threats

Safety

Net-security

25.9.20

Layered security becomes critical as malware attacks rise

Virus

Net-security
25.9.20

What are the most hack-resistant industries?

Hacking

Net-security
25.9.20

Large vendor ecosystems and low visibility increase third-party cyber risk

Cyber

Net-security
25.9.20

Expansion opportunities in the next-generation wireless BSS market

IT

Net-security

25.9.20

Phishers are targeting employees with fake GDPR compliance reminders

Phishing

Net-security

24.9.20

Threat landscape for industrial automation systems. H1 2020 highlightsICSSecurelist

24.9.20

Instagram RCE gave hackers remote access to your deviceSocialSecurityaffairs

24.9.20

Hackers are using Zerologon exploits in attacks in the wildExploitSecurityaffairs

24.9.20

Microsoft, Italy and the Netherlands agencies warn of EMOTET campaignsBigBrothers  VirusSecurityaffairs

24.9.20

Russian Hackers Target Russian Companies With RansomwareBigBrothers  RansomwareSecurityweek

24.9.20

Microsoft Says Hackers Actively Targeting Zerologon VulnerabilityVulnerebilitySecurityweek

24.9.20

Government Software Provider Tyler Technologies Hit by Possible Ransomware AttackRansomwareSecurityweek

24.9.20

TikTok Urges Court to Block Trump's Ban on App in USBigBrothers  SocialSecurityweek

24.9.20

Google Launches Enterprise Threat Detection SolutionSafetySecurityweek

24.9.20

Major Instagram App Bug Could've Given Hackers Remote Access to Your PhoneSocialThehackernews

24.9.20

Party in Ibiza with PowerShell

Virus

SANS

24.9.20

OldGremlin Ransomware Group Bedevils Russian Orgs

Ransomware

Threatpost

24.9.20

CISA: LokiBot Stealer Storms Into a Resurgence

BotNet

Threatpost

24.9.20

Gamer Credentials Now a Booming, Juicy Target for Hackers

Hacking

Threatpost

24.9.20

Zerologon Patches Roll Out Beyond Microsoft

Virus

Threatpost

24.9.20

Data for 600K customers of U.S. fitness chains Town Sports leaked online

Incindent

Securityaffairs

24.9.20

Rogue employees at Shopify accessed customer info without authorization

Cyber

Securityaffairs

24.9.20

HOW OPERATORS USE SANDVINE TO BLOCK INDEPENDENT MEDIA IN EGYPT

BigBrothers

Securityaffairs

24.9.20

Samba addresses the CVE-2020-1472 Zerologon Vulnerability

Vulnerebility

Securityaffairs

24.9.20

Google Patches Privilege Escalation Vulnerability in Cloud Service

Vulnerebility

Securityweek

24.9.20

CrowdStrike Pushes Zero Trust With $96 Million Acquisition of Preempt Security

IT

Securityweek

24.9.20

Shopify Discloses Insider Threat Incident

Incindent

Securityweek

24.9.20

Detecting and Preventing Critical ZeroLogon Windows Server Vulnerability

Vulnerebility

Thehackernews

24.9.20

Credential stuffing is just the tip of the iceberg

Security

Net-security

24.9.20

Views and misconceptions of cybersecurity as a career path

Cyber

Net-security

24.9.20

NIST guide to help orgs recover from ransomware, other data integrity attacks

Ransomware

Net-security

24.9.20

IT incident management challenges during the post-pandemic rush to digital

Cyber

Net-security

24.9.20

High volumes of attacks keep targeting video game companies and players

Attack

Net-security

24.9.20

Shipments of next-gen smart IoT gateways to reach 21.4 million by 2025

IoT

Net-security

23.9.20

AA20-266A : LokiBot MalwareCERTCERT

23.9.20

Looking for sophisticated malware in IoT devicesIoTSecurelist
23.9.20HOW DO PROVIDERS IMPLEMENT INTERNET BLOCKING IN BELARUS?BigBrothersSecurityaffairs
23.9.20Group-IB detects a series of ransomware attacks by OldGremlinRansomwareSecurityaffairs
23.9.20Russia-linked APT28 targets govt bodies with fake NATO training docsAPTSecurityaffairs
23.9.20CISA Warns of Increased Use of LokiBot MalwareBigBrothers  BotNetSecurityweek
23.9.20New Zebrocy Campaign Suggests Russia Continues Attacks on NATOBigBrothers  CyberSpySecurityweek
23.9.20Samba Issues Patches for Zerologon VulnerabilityVulnerebilitySecurityweek
23.9.20FBI, CISA Warn of Disinformation Campaigns Targeting 2020 Election ResultsBigBrothersSecurityweek
23.9.20Facebook Says Fake Accounts From China Aimed at US PoliticsBigBrothers  SocialSecurityweek
23.9.20Airbnb Accounts Exposed to Hijacking Due to Phone Number RecyclingHackingSecurityweek
23.9.20A New Hacking Group Hitting Russian Companies With RansomwareRansomwareThehackernews

23.9.20

Malicious Word Document with Dynamic Content

Spam  Virus

SANS

23.9.20

CISA’s advisory warns of notable increase in LokiBot malware

BigBrothers  BotNet

Securityaffairs
23.9.20

Operation DisrupTor: police arrested 179 vendors engaged in the sale of illicit good

BigBrothers

Securityaffairs
23.9.20

German investigators blame Russian DoppelPaymer gang for deadly hospital attack

BigBrothers

Securityaffairs
23.9.20

Unprotected Server Leaks Data of Microsoft Bing Mobile App Users

Mobil

Securityweek
23.9.20

Microsoft Extending Threat Protection Portfolio, Unifying Security Solutions

Security

Securityweek
23.9.20

Global Police Sting Nets 179 Dark Web Sellers

CyberCrime

Securityweek
23.9.20

HackerOne Paid Out Over $107 Million in Bug Bounties

Security

Securityweek
23.9.20

Kognos Emerges From Stealth With Autonomous XDR Platform

Security

Securityweek
23.9.20

Unsecured Microsoft Bing Server Exposed Users' Search Queries and Location

Incindent

Thehackernews
23.9.20

Your best defense against ransomware: Find the early warning signs

Ransomware

Net-security
23.9.20

Infosec pros struggle to find opportunities to improve their work skills

Security

Net-security
23.9.20

Bit-and-piece DDoS attacks increased 570% in Q2 2020

Attack

Net-security
23.9.20

Most AppSec pros see a growing divide between them and developers

Security

Net-security
23.9.20

Cyberwarfare predicted to damage the economy in the coming year

Cyber

Net-security
23.9.20

Windows backdoor masquerading as VPN app installer

Virus

Net-security
22.9.20Hackers hit Luxottica, production stopped at two Italian plantsHackingSecurityaffairs
22.9.20A member The Dark Overlord group sentenced to 5 years in prisonCyberCrimeSecurityaffairs
22.9.20German Experts See Russian Link in Deadly Hospital HackingBigBrothersSecurityweek
22.9.20Microsoft Explains How It Processes Vulnerability ReportsVulnerebilitySecurityweek
22.9.20'Dark Overlord' Hacker Sentenced to 5 Years in PrisonCrimeSecurityweek
22.9.20British Hacker Sentenced to 5 Years for Blackmailing U.S. CompaniesHackingThehackernews
22.9.20

Firefox for Android Bug Allows ‘Epic Rick-Rolling’

Android

Threatpost
22.9.20

DHS Issues Dire Patch Warning for ‘Zerologon’

BigBrothers

Threatpost
22.9.20

Android Malware Bypasses 2FA And Targets Telegram, Gmail Passwords

Android

Threatpost
22.9.20

UPDATE – TikTok Ban: Security Experts Weigh in on the App’s Risks

Social

Threatpost
22.9.20

Fileless Malware Tops Critical Endpoint Threats for 1H 2020

Virus

Threatpost
22.9.20

Unsecured Microsoft Bing Server Leaks Search Queries, Location Data

Incindent

Threatpost
22.9.20

Alleged Activision hack, 500,000 Call Of Duty players impacted

Hacking

Securityaffairs
22.9.20

Discount Rules for WooCommerce WordPress plugin gets patch once again

Vulnerebility

Securityaffairs
22.9.20

FERC, NERC joint report on cyber incident response at electric utilities

BigBrothers

Securityaffairs
22.9.20

NSA Issues Cybersecurity Guidance for Remote Workers, System Admins

BigBrothers

Securityweek
22.9.20

Slightly broken overlay phishing

Phishing

SANS
22.9.20

iOS 14: New privacy and security features

iOS

Net-security
22.9.20

DaaS, BYOD, leasing and buying: Which is better for cybersecurity?

Cyber

Net-security
22.9.20

Secure data sharing in a world concerned with privacy

Privacy

Net-security
22.9.20

Only 44% of healthcare providers conform to protocols outlined by the NIST CSF

BigBrothers

Net-security
22.9.20

What are the traits of an effective CISO?

Cyber

Net-security
22.9.20

Shift to remote work and heavy reliance on service providers for security leaves blind spots

Security

Net-security
22.9.20

CISA orders federal agencies to implement Zerologon fix by Monday

BigBrothers

Net-security
21.9.20

US House Passes IoT Cybersecurity Improvement Act

BigBrothers

Securityaffairs
21.9.20

DHS CISA orders federal agencies to fix Zerologon flaw by Monday

BigBrothers

Securityaffairs
21.9.20

Firefox Flaw Allowed Hackers to Remotely Open Malicious Sites on Android Phones

Android

Securityweek
21.9.20

Mozilla Discontinues Firefox Feature Abused in Malware, Phishing Attacks

Hacking

Securityweek
21.9.20

Palantir Listing May Shine Light on Secretive Big Data Firm

Security

Securityweek
21.9.20

FERC, NERC Conduct Study on Cyber Incident Response at Electric Utilities

BigBrothers

Securityweek
21.9.20

Judge Halts WeChat Download Ban in US-China Tech Battle

BigBrothers

Securityweek
21.9.20

DHS Orders Federal Agencies to Immediately Patch 'Zerologon' Vulnerability

BigBrothers

Securityweek
21.9.20

A Patient Dies After Ransomware Attack Paralyzes German Hospital Systems

Ransomware

Thehackernews
21.9.20

Mozi Botnet is responsible for most of the IoT Traffic

BotNet  IoT

Securityaffairs
21.9.20

NCSC warns of a surge in ransomware attacks on education institutions

Ransomware

Securityaffairs
21.9.20

IPG Photonics high-performance laser developer hit with ransomware

Ransomware

Securityaffairs
21.9.20

Trump Backs Proposed Deal to Keep TikTok Operating in US

BigBrothers

Securityweek
21.9.20

As Trump Holds Back, Tech Firms Step in on Election Security

BigBrothers

Securityweek
21.9.20

5 simple steps to bring cyber threat intelligence sharing to your organization

Cyber

Net-security
21.9.20

Phish Scale: New method helps organizations better train their employees to avoid phishing

Phishing

Net-security
21.9.20

A look at the top threats inside malicious emails

Virus

Net-security
21.9.20

80% of businesses expect IT budgets to grow or remain steady in 2021

IT

Net-security
21.9.20

Cybercriminals moved quickly to capitalize on the COVID-19 outbreak using malicious emails

CyberCrime

Net-security
21.9.20

Whitepaper: Mobile banking regulations, threats and fraud prevention

Android

Net-security
21.9.20

Analysis of a Salesforce Phishing Emails

Phishing

SANS
20.9.20

Microsoft Sysmon now logs data copied to the Windows Clipboard

OS

Bleepingcomputer

20.9.20

Windows 10's Android app streaming is now available for some devices

OS

Bleepingcomputer

20.9.20

Microsoft: Fix for Windows Subsystem for Linux 2 error coming soon

OS

Bleepingcomputer

20.9.20

Windows 10 20H2 coming in October, final preview build released

OS

Bleepingcomputer

20.9.20

Leading U.S. laser developer IPG Photonics hit with ransomware

Ransomware

Bleepingcomputer

20.9.20

Microsoft removes Windows Defender ability after security concerns

Security

Bleepingcomputer

20.9.20

U.K. warns of surge in ransomware threats against education sector

Ransomware

Bleepingcomputer

20.9.20

Hands on with iOS 14's new data breach notification feature

iOS

Bleepingcomputer

20.9.20

Google Chrome's new feature will automatically group your tabs

IT

Bleepingcomputer

20.9.20

Maze ransomware now encrypts via virtual machines to evade detection

Ransomware

Bleepingcomputer

20.9.20

Ransomware attack at German hospital leads to death of patient

Ransomware

Bleepingcomputer

20.9.20

US 2020 Presidential apps riddled with tracking and security flaws

BigBrothers

Bleepingcomputer

20.9.20

Drug spammers start using new technique to bypass spam filters

Spam

Bleepingcomputer

20.9.20

U.S. charges Chinese Winnti hackers for attacking 100+ companies

BigBrothers

Bleepingcomputer

20.9.20

Internet Explorer now warns of Adobe Flash's upcoming demise

IT

Bleepingcomputer

20.9.20

Privacy-focused search engine DuckDuckGo is growing fast

Privacy

Bleepingcomputer

20.9.20

Google Chrome is making it easier to reset compromised passwords

Security

Bleepingcomputer

20.9.20

Windows 10 optional update KB4577062 (v1909/1903) released

OS

Bleepingcomputer

20.9.20

University Hospital New Jersey hit by SunCrypt ransomware, data leaked

Ransomware

Bleepingcomputer

20.9.20

This security awareness training email is actually a phishing scam

Phishing

Bleepingcomputer

20.9.20Crypt32Anti-Ramson ToolAnti-Ramson Tool
20.9.20CyborgAnti-Ramson ToolAnti-Ramson Tool
20.9.20Ransom NewsRansomRansom
20.9.20LockBit ransomware launches data leak site to double-extort victimsRansomware

Bleepingcomputer

20.9.20Staples data breach caused by bug in order tracking systemIncindent

Bleepingcomputer

20.9.20Outlook.com now lets you schedule emails for a later dateIT

Bleepingcomputer

20.9.20Windows Zerologon PoC exploits allow domain takeover. Patch Now!Exploit

Bleepingcomputer

20.9.20U.S. Dept of Veterans Affairs data breach affects 46,000 veteransBigBrothers

Bleepingcomputer

20.9.20Google Drive is having an outage, users see spinning wheelSecurity

Bleepingcomputer

20.9.20Adobe releases out-of-band security update for Adobe Media EncoderVulnerebility

Bleepingcomputer

20.9.20Surge in DDoS attacks targeting education and academic sectorAttack

Bleepingcomputer

20.9.20Windows 10 ‘Finger’ command can be abused to download or steal filesOS

Bleepingcomputer

20.9.20Microsoft Edge is getting a built-in password generatorOS

Bleepingcomputer

20.9.20New Windows 10 updates are force installing Microsoft EdgeOS

Bleepingcomputer

20.9.20UK government releases toolkit to easily disclose vulnerabilitiesBigBrothers

Bleepingcomputer

20.9.20US govt: China-sponsored hackers targeting Exchange, Citrix, F5 flawsBigBrothers

Bleepingcomputer

20.9.20Magento stores hit by largest automated hacking attack since 2015Hacking

Bleepingcomputer

20.9.20Staples discloses data breach exposing customer infoIncindent

Bleepingcomputer

20.9.20How to enable DNS-over-HTTPS (DoH) in Windows 10OS

Bleepingcomputer

20.9.20Hands-on with Windows 10's new Start MenuOS

Bleepingcomputer

20.9.20These Windows 10 tools give you complete control over privacyOS

Bleepingcomputer

20.9.20Razer data leak exposes personal information of gamersIncindent

Bleepingcomputer

20.9.20Fairfax County schools hit by Maze ransomware, student data leakedRansomware

Bleepingcomputer

20.9.20German encrypted email service Tutanota suffers DDoS attacksBigBrothersSecurityaffairs
20.9.20Hijacking nearby Firefox mobile browsers via WiFi by exploiting a bugExploitSecurityaffairs
20.9.20Mozi Botnet Accounted for Majority of IoT Traffic: IBMBotNetSecurityweek
20.9.20A Bug Could Let Attackers Hijack Firefox for Android via Wi-Fi NetworkHackingThehackernews
20.9.20Researchers Uncover 6-Year Cyber Espionage Campaign Targeting Iranian DissidentsBigBrothers  CyberSpyThehackernews
19.9.20Ransom NewsRansomRansom
19.9.20US staffing firm Artech discloses ransomware attack, data breachRansomware

Bleepingcomputer

19.9.20Windows 10 Control Panel gets another nail in its coffinOS

Bleepingcomputer

19.9.20Development Bank of Seychelles hit by ransomware attackRansomware

Bleepingcomputer

19.9.20Windows 10 is getting a built-in video conferencing featureOS

Bleepingcomputer

19.9.20Office 365 will let users view their quarantined phishing messagesPhishing

Bleepingcomputer

19.9.20Palo Alto Networks fixes critical flaw in PAN-OS firewall softwareVulnerebility

Bleepingcomputer

19.9.20Zoom adds two-factor authentication (2FA) support to all accountsSafety

Bleepingcomputer

19.9.20SoftServe hit by ransomware, Windows customization tool exploitedRansomware

Bleepingcomputer

19.9.20Microsoft: State-backed hackers are targeting the 2020 US electionsBigBrothers

Bleepingcomputer

19.9.20Hackers are fighting a war over 300K vulnerable WordPress sitesVulnerebility

Bleepingcomputer

19.9.20Windows 10 now lets you mount Linux ext4 filesystems in WSL 2OS

Bleepingcomputer

19.9.20Google Chrome's new Tab Groups feature now available for everyoneIT

Bleepingcomputer

19.9.20Microsoft: Windows 10 1903 support ending in December 2020OS

Bleepingcomputer

19.9.20Equinix data center giant hit by Netwalker Ransomware, $4.5M ransomRansomware

Bleepingcomputer

19.9.20Office 365 phishing runs real-time check of stolen domain loginsPhishing

Bleepingcomputer

19.9.20New CDRThief malware steals VoIP metadata from Linux softswitchesVirus

Bleepingcomputer

19.9.20ProLock ransomware increases payment demand and victim countRansomware

Bleepingcomputer

19.9.20BLURtooth vulnerability lets attackers defeat Bluetooth encryptionVulnerebility

Bleepingcomputer

19.9.20Microsoft Edge now gives you more control of your downloadsOS

Bleepingcomputer

19.9.20Azure now installs security updates on Windows VMs automaticallySecurityBleepingcomputer
19.9.20The debate over face mask recognitionSecurity blogAvast blog
19.9.20Will iOS 14 be the platform of privacy?OS BlogAvast blog
19.9.20The return of the cubicle: Rethinking office spaces post-lockdownSecurity blogAvast blog
19.9.20Here's what you need to know about the 5G revolutionHardware blogAvast blog
19.9.20Is proctoring software unfair to students?Security blogAvast blog
19.9.20Back to campus means understanding your data securitySecurity blogAvast blog
19.9.20Introducing Actionable Threat Objects and Mitigations (ATOMs)Malware blogPalo Alto Unity42
19.9.20Threat Brief: Microsoft Vulnerability CVE-2020-1472 “Zerologon”Vulnerebility blogPalo Alto Unity42
19.9.20Network Attack Trends: Attackers Leveraging High Severity and Critical ExploitsAttack blogPalo Alto Unity42
19.9.20CYBEREASON’S COMMITMENT TO INCLUSION IN CYBERSECURITYCyber blogCybereason
19.9.20DIGITAL FORENSIC BREADCRUMBS AT THE 2020 GRACE HOPPER CELEBRATIONCyber blogCybereason
19.9.20The Rising IoT Threat to the Agriculture Industry and the Global Food SupplyIoT blogF5 Labs
19.9.20A "DFUR-ent" Perspective on Threat Modeling and Application Log Forensic AnalysisSecurity blogFireEye
19.9.20Rampant Kitten – An Iranian Espionage CampaignBigBrother blogCheckpoint
19.9.20Vulnerability Spotlight: Remote code execution vulnerability Apple SafariVulnerebility blogCisco Talos
19.9.20Vulnerability Spotlight: Multiple vulnerabilities in Nitro Pro PDF readerVulnerebility blogCisco Talos
19.9.20Vulnerability Spotlight: Memory corruption in Google PDFiumVulnerebility blogCisco Talos
19.9.205 ways cybercriminals can try to extort youCyber blog

Eset

19.9.20Plugging in a strange USB drive – What could possibly go wrong?Security blog

Eset

19.9.20Emotet strikes Quebec’s Department of Justice: An ESET AnalysisMalware blog

Eset

19.9.20Sports data for ransom – it’s not all just fun and games anymoreRansomware blog

Eset

19.9.20Zoom makes 2FA available for all its usersSafety blogEset
19.9.20

Stubborn WooCommerce Plugin Bugs Get Third Patch

Vulnerebility

Threatpost
19.9.20

The TikTok Ban: Security Experts Weigh in on the App’s Risks

Social

Threatpost
19.9.20

SecOps Teams Wrestle with Manual Processes, HR Gaps

Cyber

Threatpost
19.9.20

Maze Ransomware Adopts Ragnar Locker Virtual-Machine Approach

Ransomware

Threatpost
19.9.20

Rampant Kitten ‘s arsenal includes Android malware that bypasses 2FA

Android

Securityaffairs
19.9.20

Chinese hackers stole info from Spanish centers working on Covid19 vaccine

BigBrothers

Securityaffairs
19.9.20

Hackers Collecting Intelligence on Potential Opponents to Iranian Regime

BigBrothers

Securityweek
19.9.20

CEO of Cyber Fraud Prevention Firm NS8 Charged With Fraud

Cyber

Securityweek
19.9.20

Health Care Patient, Donor Data May Have Been Breached

Incindent

Securityweek
19.9.20

Twitter Taking Steps to Protect Election-Related Accounts

Social

Securityweek
19.9.20

Chinese Hackers 'Stole Data From Spanish Vaccine Labs': Report

BigBrothers

Securityweek
19.9.20

US Bans WeChat, TikTok Citing Privacy, National Security

BigBrothers

Securityweek
18.9.20

US DoJ charges Iranian hackers for attacks on US satellite companies

BigBrothers

Securityaffairs
18.9.20

Ransomware en masse on the wane: top threats inside web-phishing in H1 2020

Ransomware

Securityaffairs
18.9.20

CISA Named Top-Level Root CVE Numbering Authority (CNA)

BigBrothers

Securityaffairs
18.9.20

US Banning Use of WeChat, TikTok for National Security

BigBrothers

Securityweek
18.9.20

U.S. Imposes Sanctions on 'APT39' Iranian Hackers

APT

Securityweek
18.9.20

Sumo Logic Stock Surges 22% on First Day of Trading

IT

Securityweek
18.9.20

More Details Emerge on Operations, Members of Chinese Group APT41

APT

Securityweek
18.9.20

Anonymous Site Ramps Up 'Doxxing' Campaign Against HK Activists

CyberCrime

Securityweek
18.9.20

U.S. Treasury Sanctions Hacking Group Backed by Iranian Intelligence

BigBrothers

Thehackernews
18.9.20

Android 11 — 5 New Security and Privacy Features You Need to Know

Android

Thehackernews
18.9.20

APT41 Operatives Indicted as Sophisticated Hacking Activity Continues

APT

Threatpost
18.9.20

Apple Bug Allows Code Execution on iPhone, iPad, iPod

Apple

Threatpost
18.9.20

California Elementary Kids Kicked Off Online Learning by Ransomware

Ransomware

Threatpost
18.9.20

Google Play Bans Stalkerware and ‘Misrepresentation’

Android

Threatpost
18.9.20

Mozi Botnet Accounts for Majority of IoT Traffic

BotNet  IoT

Threatpost
18.9.20

Maze ransomware uses Ragnar Locker virtual machine technique

Ransomware

Securityaffairs
18.9.20

Drupal addressed XSS and information disclosure flaws

Vulnerebility

Securityaffairs
18.9.20

Major Duesseldorf hospital infected with ransomware, patient died for consequences

Ransomware

Securityaffairs
18.9.20

iOS 14 and iPadOS 14 Patch Vulnerabilities, Introduce New Privacy Features

Apple

Securityweek
18.9.20

U.S. Charges Three Iranian Hackers for Attacks on Satellite Companies

BigBrothers

Securityweek
18.9.20

A Mix of Python & VBA in a Malicious Word Document

Virus

SANS
18.9.20

Justifying your 2021 cybersecurity budget

Cyber

Net-security
18.9.20

Incident management tools and processes insufficient to enable innovation

Incindent

Net-security
18.9.20

Google offers high-risk Chrome users additional scanning of risky files

Security

Net-security
18.9.20

Improving privacy of a global genomic data sharing network

Security

Net-security
18.9.20

What’s causing uncertainty about election security?

Security

Net-security
18.9.20

Ongoing and initial costs top list of barriers to 5G implementation

Mobil

Net-security
17.9.20SunCrypt ransomware operators leak data of University Hospital New JerseyRansomwareSecurityaffairs
17.9.20APT41 actors charged for attacks on more than 100 victims globallyAPTSecurityaffairs
17.9.20Information Disclosure, XSS Vulnerabilities Patched in DrupalVulnerebilitySecurityweek
17.9.20German Hospital Hacked, Patient Taken to Another City DiesBigBrothersSecurityweek
17.9.20Google Ups Malware Protection for 'Advanced Protection' UsersAndroidSecurityweek
17.9.20CISA Named Top-Level Root CVE Numbering AuthorityBigBrothersSecurityweek
17.9.20U.S. Charges Two State-Sponsored Iranian HackersBigBrothersSecurityweek
17.9.20Two Russians Charged Over $17M Cryptocurrency Fraud SchemeBigBrothersSecurityweek
17.9.20U.S. Announces Charges Against 2 Russian and 2 Iranian HackersBigBrothersThehackernews

17.9.20

Safari 14: New privacy and security features

Apple

Net-security

17.9.20Microsoft Windows Netlogon Remote Protocol (MS-NRPC) uses insecure AES-CFB8 initialization vectorAlertAlert
17.9.20

DoJ Indicts Two Hackers for Defacing Websites with Pro-Iran Messages

BigBrothers

Threatpost
17.9.20

Bluetooth Spoofing Bug Affects Billions of IoT Devices

IoT

Threatpost
17.9.20

Hackers Continue Cyberattacks Against Vatican, Catholic Orgs

Attack

Threatpost
17.9.20

DDoS Attacks Skyrocket as Pandemic Bites

Attack

Threatpost
17.9.20

Source code of Cerberus banking Trojan leaked on underground forums

Virus

Securityaffairs
17.9.20

NSA publishes guidance on UEFI Secure Boot customization

BigBrothers

Securityaffairs
17.9.20

U.S. Charges Alleged Hackers of Chinese APT41 Group for Attacks on 100 Firms

APT

Securityweek
17.9.20

Computer Attack Disables California School District's System

Attack

Securityweek
17.9.20

Box Showcases New Offerings for Remote Working Environment

Security

Securityweek
17.9.20

FBI adds 5 Chinese APT41 hackers to its Cyber's Most Wanted List

APT

Thehackernews
17.9.20

Suspicious Endpoint Containment with OSSEC

Security

SANS
17.9.20

Mobile messengers expose billions of users to privacy attacks

Attack

Net-security
17.9.20

DDoS attacks rise in intensity, sophistication and volume

Attack

Net-security
17.9.20

Product showcase: AppTrana

Security

Net-security
17.9.20

Most people ignore QR code security concerns

Security

Net-security
17.9.20

GAIA-X to strenghten European digital infrastructure sovereignity

SecurityNet-security
17.9.20

Microsoft open-sources tool that enables continuous developer-driven fuzzing

Security

Net-security
16.9.20

US CISA report shares details on web shells used by Iranian hackers

BigBrothers

Securityaffairs
16.9.20

New MrbMiner malware infected thousands of MSSQL DBs

Cryptocurrency

Securityaffairs
16.9.20

U.S. House Passes IoT Cybersecurity Bill

BigBrothers  IoT

Securityweek
16.9.20

Nozomi Networks Becomes CVE Numbering Authority

Security

Securityweek
16.9.20

NSA Publishes Guidance on UEFI Secure Boot Customization

BigBrothers

Securityweek
16.9.20

More Links Found Between North Korean and Russian Hacking Operations

BigBrothers

Securityweek
16.9.20

CISA Shares Details on Web Shells Employed by Iranian Hackers

BigBrothers

Securityweek
16.9.20

Man Pleads Guilty to Role in $600K Malware Protection Scam

Spam

Securityweek
16.9.20

Devo Technology Raises $60 Million, Names New CEO

IT

Securityweek
16.9.20

Flaws in Philips Patient Monitoring Products Can Lead to Patient Data Exposure

Vulnerebility

Securityweek
16.9.20

UK's NCSC Publishes Guide to Implementing a Vulnerability Disclosure Process

BigBrothers

Securityweek
16.9.20

2 Hackers Charged for Defacing Sites after U.S. Airstrike Killed Iranian General

BigBrothers

Thehackernews
16.9.20

IBM Spectrum Protect Plus Security Open to RCE

Vulnerebility

Threatpost
16.9.20

Windows Exploit Released For Microsoft ‘Zerologon’ Flaw

Exploit

Threatpost
16.9.20

MFA Bypass Bugs Opened Microsoft 365 to Attack

Attack

Threatpost
16.9.20

QR Codes Serve Up a Menu of Security Concerns

Security

Threatpost
16.9.20

Data Breaches Exposes Vets, COVID-19 Patients

Incindent

Threatpost
16.9.20

Microsoft open-sourced its Project OneFuzz fuzzing framework for Azure

Security

Securityaffairs
16.9.20

Out-of-band security update fixes Adobe Media Encoder issu

Vulnerebility

Securityaffairs
16.9.20

Experts warn of surge in DDoS attacks targeting education institutions

Attack

Securityaffairs
16.9.20

Voatz Under Fire From Infosec Community Over Its Views on Security Research

Security

Securityweek
16.9.20

U.S. Charges Hackers for Defacing Sites in Response to Killing of Qasem Soleimani

BigBrothers

Securityweek
16.9.20

How security theater misses critical gaps in attack surface and what to do about it

Attack

Net-security
16.9.20

Do Californians use CCPA to protect their privacy?

Privacy

Net-security
16.9.20

What are the most vulnerable departments and sectors to phishing attacks?

Attack

Net-security
16.9.20

eCrime campaigns outpace state-sponsored activity in first half of 2020

CyberCrime

Net-security
16.9.20

CISOs struggling to prep for security audits

Security

Net-security
16.9.20

Tracking global cybercrime activity and the impact on the digital economy

CyberCrime

Net-security
16.9.20

Report: The cybersecurity impact of COVID-19

Analysis

Net-security
16.9.20

Report: The state of email security

Analysis

Net-security
16.9.20

Are your domain controllers safe from Zerologon attacks?

Attack

Net-security
15.9.20UK NCSC releases the Vulnerability Disclosure ToolkitBigBrothersSecurityaffairs
15.9.20China-linked hackers target government agencies by exploiting flaws in Citrix, Pulse, and F5 systems, and MS ExchangeBigBrothersSecurityaffairs
15.9.20Microsoft Releases Open Source Fuzzing Framework for AzureSecuritySecurityweek
15.9.20Chinese Hackers Using Publicly Available Resources in Attacks on U.S. GovernmentBigBrothersSecurityweek
15.9.20Personal Information of 46,000 U.S. Veterans Exposed in Data BreachIncindentSecurityweek
15.9.20Europe Tests Gateway for Tracing Apps to Work Across BordersPrivacySecurityweek
15.9.20Oracle Announces Availability of Cloud Guard, Maximum Security ZonesSecuritySecurityweek
15.9.20Report: 97% of Cybersecurity Companies Have Leaked Data on the Dark WebCyberCrimeThehackernews
15.9.20CISA: Chinese Hackers Exploiting Unpatched Devices to Target U.S. AgenciesBigBrothersThehackernews
15.9.20

TikTok Fixes Flaws That Opened Android App to Compromise

Android

Threatpost
15.9.20

Magecart Attack Impacts More Than 10K Online Shoppers

Attack

Threatpost
15.9.20

Feds Warn Nation-State Hackers are Actively Exploiting Unpatched Microsoft Exchange, F5, VPN Bugs

Exploit

Threatpost
15.9.20

Cloud Leak Exposes 320M Dating-Site Records

Incindent

Threatpost
15.9.20

Thousands of Magento stores hacked in a few days in largest-ever skimming campaign

CyberCrime

Securityaffairs
15.9.20

Staples discloses data breach exposing customer order data

Incindent

Securityaffairs
15.9.20

Hundreds of Magento Stores Hacked Daily in Major Skimming Campaign

CyberCrime

Securityweek
15.9.20

Traffic Analysis Quiz: Oh No... Another Infection!

Virus

SANS
15.9.20

Aiming for a career in cybersecurity? Now is the time to pick up new skills

Cyber

Net-security
15.9.20

Attacked by ransomware? Five steps to recovery

Ransomware

Net-security
15.9.20

How to enforce real-time controls based on behavior risk scoring

Security

Net-security
15.9.20

Review: Web Security for Developers: Real Threats, Practical Defense

Security

Net-security
15.9.20

Attacks growing in both scope and sophistication, exposing gaps in the cloud native toolchain

Attack

Net-security
15.9.20

Five critical success factors for the 5G economy

Mobil

Net-security
14.9.20Zerologon attack lets hackers to completely compromise a Windows domainAttackSecurityaffairs
14.9.20Popular Marketing Tool exposes data of users of dating sitesIncindentSecurityaffairs
14.9.20Razer Customer Data Exposed by Server MisconfigurationIncindentSecurityweek
14.9.20Northern Virginia School System Hacked, Data Held for RansomRansomwareSecurityweek
14.9.20Vulnerabilities Expose Thousands of MobileIron Servers to Remote AttacksAttackSecurityweek
14.9.20Development Bank of Seychelles Hit by RansomwareRansomwareSecurityweek
14.9.20TikTok Rejects Microsoft Offer, Oracle Sole Remaining BidderBigBrothersSecurityweek
14.9.20CIRWA Project tracks ransomware attacks on critical infrastructureRansomwareSecurityaffairs
14.9.20Fairfax County Public Schools hit by Maze ransomwareRansomwareSecurityaffairs
14.9.20Gaming hardware manufacturer Razer suffered a data leakIncindentSecurityaffairs
14.9.20

Creating patched binaries for pentesting purposes

Security

SANS
14.9.20

In uncertain times, CISOs have a golden opportunity

Cyber

Net-security
14.9.20

Cyber losses are increasing in frequency and severity

Cyber

Net-security
14.9.20

Telehealth is healthcare industry’s biggest cybersecurity risk

Cyber

Net-security
14.9.20

Database monitoring improves DevOps success for financial services orgs

Security

Net-security
14.9.20

Emerging countries will adopt 5G faster than expected

Mobil

Net-security
13.9.20Leading US video delivery provider confirms ransomware attackRansomware

Bleepingcomputer

13.9.20Vivaldi 3.3 can pause the web with new 'Take a Break' featureSecurity

Bleepingcomputer

13.9.20Microsoft Office September security updates fix critical RCE bugsOS  Vulnerebility

Bleepingcomputer

13.9.20Samsung fixes critical Android flaws with September updatesAndroid

Bleepingcomputer

13.9.20Windows 10 2004 KB4571756 breaks Windows Subsystem for Linux 2OS

Bleepingcomputer

13.9.20Netwalker ransomware hits Pakistan's largest private power utilityRansomware

Bleepingcomputer

13.9.20Intel fixes critical flaw in corporate remote management platformVulnerebility

Bleepingcomputer

13.9.20Hackers use legit tool to take over Docker, Kubernetes platformsHacking

Bleepingcomputer

13.9.20Windows 10 starts bundling servicing stack updates with cumulative updatesOS

Bleepingcomputer

13.9.20Microsoft September 2020 Patch Tuesday fixes 129 vulnerabilitiesOS

Bleepingcomputer

13.9.20Windows 10 Cumulative Updates KB4571756 & KB4574727 ReleasedOS

Bleepingcomputer

13.9.20Ransomware delays first day of school for Hartford, ConnecticutRansomware

Bleepingcomputer

13.9.20Google Chrome starts blocking ads that slow down the browserSecurity

Bleepingcomputer

13.9.20Adobe fixes critical vulnerabilities in InDesign and FramemakerVulnerebility

Bleepingcomputer

13.9.20Microsoft fixes Windows 10 bug causing excessive SSD defraggingOS

Bleepingcomputer

13.9.20France warns of Emotet attacking companies, administrationBigBrothers  Virus

Bleepingcomputer

13.9.20DoppelPaymer ransomware hits Newcastle University, leaks dataRansomware

Bleepingcomputer

13.9.20Windows 10 Sandbox activation enables zero-day vulnerabilityOS

Bleepingcomputer

13.9.20Windows 10 themes can be abused to steal Windows passwordsOS

Bleepingcomputer

13.9.20Netwalker ransomware hits Argentinian government, demands $4 millionRansomware

Bleepingcomputer

13.9.20Ransom NewsRansom

Ransom

13.9.20

Office Documents with Embedded Objects

Virus

SANS
13.9.20

Bank of Seychelles hit by a ransomware attack

Ransomware

Securityaffairs
13.9.20

INVDoS, a severe DoS issue in Bitcoin core remained undisclosed for two years

Cryptocurrency

Securityaffairs
13.9.20

Malàsmoke gang could infect your PC while you watch porn sites

CyberCrime

Securityaffairs
13.9.20

University Project Tracks Ransomware Attacks on Critical Infrastructure

Ransomware

Securityweek
12.9.20Does your college know too much about you?Security blogAvast blog
12.9.20Hackers possibly “testing” pro-Trump websitesBigBrother blogAvast blog
12.9.20Is proctoring software unfair to students?Security blogAvast blog
12.9.20The Challenge of Persistence in Containers and ServerlessSecurity blogPalo Alto Unity42
12.9.20NO REST FOR THE WICKED: EVILNUM UNLEASHES PYVIL RATMalware blog

Cybereason

12.9.20CYBEREASON’S COMMITMENT TO INCLUSION IN CYBERSECURITYCyber blog

Cybereason

12.9.20The Disappearing IT Security Budget: A 2020 Cybersecurity CrisisCyber blog

F5 Labs

12.9.20API Authentication Incidents: 2020 APR, Vol. 2Incident blog

F5 Labs

12.9.20Attacking the Qualcomm Adreno GPUAttack blogCheckpoint
12.9.20Roundtable video: Disinformation and election securitySecurity blogCisco Talos
12.9.20Microsoft Patch Tuesday for Sept. 2020 — Snort rules and prominent vulnerabilitiesVulnerebility blogCisco Talos
12.9.20Vulnerability Spotlight: Privilege escalation in Windows 10 CLFS driverVulnerebility blogCisco Talos
12.9.20Portland passes the strictest facial recognition technology ban in the US yet Security blog

Eset

12.9.20Who is calling? CDRThief targets Linux VoIP softswitchesMalware blog

Eset

12.9.20UK University suffers cyberattack, ransomware gang claims responsibility BigBrother blog

Eset

12.9.20Lead‑offering business booming as usual!Security blog

Eset

12.9.20TikTok Family Pairing: Curate your children’s content and moreSocial blogEset
12.9.20

What's in Your Clipboard? Pillaging and Protecting the Clipboard

Security

SANS
12.9.20

WordPress Plugin Flaw Allows Attackers to Forge Emails

Attack

Threatpost
12.9.20

It’s No ‘Giggle’: Managing Expectations for Vulnerability Disclosure

Vulnerebility

Threatpost

12.9.20

APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins

APT

Threatpost
12.9.20

Office 365 Phishing Attack Leverages Real-Time Active Directory Validation

Attack

Threatpost
12.9.20

Threat actors target WordPress sites using vulnerable File Manager install

Vulnerebility

Securityaffairs
12.9.20

Iran denies any involvement in the attack against 2020 US election

BigBrothers

Securityaffairs
12.9.20

ICS Vendors Release Advisories for CodeMeter Vulnerabilities

ICS

Securityweek
11.9.20

Great news, now you can protect your Zoom account with 2FA

Safety

Securityaffairs
11.9.20

Decrypting TLS connections with new Raccoon Attack

Attack

Securityaffairs
11.9.20

Iran Says US Vote Hack Allegation 'Absurd'

BigBrothers

Securityweek
11.9.20

Zoom Rolls Out 2FA Support for All Accounts

Safety

Securityweek
11.9.20

Attacks Targeting Recent WordPress File Manager Flaw Ramping Up

Attack

Securityweek
11.9.20

Russian Military Hackers Targeted Credentials at Hundreds of Organizations in US, UK

BigBrothers

Securityweek
11.9.20

Chrome Sandbox Escape Vulnerability Earns Researchers $20,000

Vulnerebility

Securityweek
11.9.20

Data Center Provider Equinix Hit by Ransomware

Ransomware

Securityweek
11.9.20

New Linux Malware Steals Call Details from VoIP Softswitch Systems

Virus

Thehackernews
11.9.20

Ransomware And Zoom-Bombing: Cyberattacks Disrupt Back-to-School Plans

Ransomware

Threatpost
11.9.20

Microsoft Warns of Cyberattacks on Trump, Biden Election Campaigns

BigBrothers

Threatpost

11.9.20

Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks

Attack

Threatpost
11.9.20

Razer Gaming Fans Caught Up in Data Leak

Incindent

Threatpost
11.9.20

Govt.-Backed Contact-Tracing Apps Raise Privacy Hackles

BigBrothers

Threatpost

11.9.20

CDRThief Malware Targets VoIP Gear in Carrier Networks

Virus

Threatpost
11.9.20

Chinese, Iranian, and Russian APT groups target 2020 US election

APT

Securityaffairs
11.9.20

Palo Alto Networks fixes severe Code Execution and DoS flaws in PAN-OS

Vulnerebility

Securityaffairs
11.9.20

Colocation data centers giant Equinix data hit by Netwalker Ransomware

Ransomware

Securityaffairs
11.9.20

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Virus

Securityaffairs
11.9.20

'CDRThief' Malware Targets Linknat Softswitches

Virus

Securityweek
11.9.20

Russian Hackers Target U.S. Campaigns, Parties: Microsoft

BigBrothers

Securityweek
11.9.20

Container Security Firm StackRox Raises $26.5 Million

IT

Securityweek
11.9.20

Palo Alto Networks Patches Serious DoS, Code Execution Flaws in PAN-OS

Vulnerebility

Securityweek
11.9.20

BLURtooth Vulnerability Can Allow Bluetooth MITM Attacks

Attack

Securityweek
11.9.20

New Unpatched Bluetooth Flaw Lets Hackers Easily Target Nearby Devices

Vulnerebility

Thehackernews
11.9.20

Hackers Stole $5.4 Million From Eterbase Cryptocurrency Exchange

Cryptocurrency

Thehackernews
11.9.20

Four ways network traffic analysis benefits security teams

Security

Net-security
11.9.20

Ensuring cyber awareness in the healthcare sector

Cyber

Net-security
11.9.20

How does XDR improve enterprise security in the face of evolving threats?

Security

Net-security
11.9.20

Internet Impact Assessment Toolkit: Protect the core that underpins the Internet

Security

Net-security
11.9.20

Vendor revenue in the worldwide server market grew 19.8% year over year

Security

Net-security
10.9.20

An overview of targeted attacks and APTs on Linux

APT

Securelist
10.9.20

BLURtooth flaw allows attacking Bluetooth encryption process

Attack

Securityaffairs
10.9.20

Hackers stole $5.4 million from cryptocurrency exchange ETERBASE

Cryptocurrency

Securityaffairs
10.9.20

SeaChange video delivery provider discloses REVIL ransomware attack

Ransomware

Securityaffairs
10.9.20

Facebook May Have to Stop Moving EU User Data to US

Social

Securityweek
10.9.20

Hackers Steal $5.4 Million From Crypto Exchange Eterbase

Incindent

Securityweek
10.9.20

Microsoft Announces Public Preview of Automatic VM Guest Patching in Azure

Vulnerebility

Securityweek
10.9.20

UK Judge Refuses Assange Lawyers' Plea to Dismiss New US Allegations

BigBrothers

Securityweek
10.9.20

New Raccoon Attack Can Allow Decryption of TLS Connections

Attack

Securityweek
10.9.20

New Raccoon Attack Could Let Attackers Break SSL/TLS Encryption

Attack

Thehackernews
10.9.20

TeamTNT Gains Full Remote Takeover of Cloud Instances

Hacking

Threatpost
10.9.20

Zeppelin Ransomware Returns with New Trojan on Board

Ransomware

Threatpost

10.9.20

Spyware Labeled ‘TikTok Pro’ Exploits Fears of US Ban

BigBrothers  Social  Virus

Threatpost
10.9.20

Google Squashes Critical Android Media Framework Bug

Android

Threatpost
10.9.20

Critical Flaws in 3rd-Party Code Allow Takeover of Industrial Control Systems

Vulnerebility

Threatpost
10.9.20

US Revokes Visas For 1,000 Chinese Under Trump Order

BigBrothers

Securityweek
10.9.20

Intel Releases Firmware Updates to Patch Critical Vulnerability in AMT, ISM

Vulnerebility

Securityweek
10.9.20

Developer Security Firm Snyk Raises $200 Million at $2.6 Billion Valuation

IT

Securityweek
10.9.20

Recent Dridex activity

Virus

SANS
10.9.20

A First Look at macOS 11 Big Sur Network Traffic (New! Now with more GREASE!)

Apple

SANS
10.9.20

Vulnerabilities discovered in PAN-OS, which powers Palo Alto Networks’ firewalls

Vulnerebility

Net-security
10.9.20

How can the C-suite support CISOs in improving cybersecurity?

Cyber

Net-security
10.9.20

Plan for change but don’t leave security behind

Security

Net-security
10.9.20

Developing a plan for remote work security? Here are 6 key considerations

Security

Net-security
10.9.20

Nine out of ten IT pros have experienced a data breach

Incindent

Net-security
10.9.20

Most dev and IT practitioners work extra hours resolving incidents

IT

Net-security
9.9.20

Microsoft’s Patch Tuesday Packed with Critical RCE Bugs

Vulnerebility

Threatpost
9.9.20

Critical Intel Active Management Technology Flaw Allows Privilege Escalation

Vulnerebility

Threatpost

9.9.20

Critical Adobe Flaws Allow Attackers to Run JavaScript in Browsers

Vulnerebility

Threatpost
9.9.20

Cryptobugs Found in Numerous Google Play Store Apps

Crypto

Threatpost
9.9.20

Bug in Google Maps Opened Door to Cross-Site Scripting Attacks

Attack

Threatpost
9.9.20

Netwalker ransomware hit K-Electric, the major Pakistani electricity provider

Ransomware

Securityaffairs
9.9.20

Developer Security Firm Snyk Raises $200 Million at $2.6 Billion Valuation

IT

Securityweek
9.9.20

New YubiKey 5C NFC Security Key Brings NFC, USB-C Connections

IT

Securityweek
9.9.20

Clark County Schools Reports Computer Ransomware Attack

Ransomware

Securityweek
9.9.20

Critical Access Control Vulnerability Patched in SAP Marketing

Vulnerebility

Securityweek
9.9.20

Secureworks to Acquire Vulnerability Management Startup Delve Laboratories

Vulnerebility

Securityweek
9.9.20

Android's September 2020 Patches Fix Critical System Vulnerabilities

Android

Securityweek
9.9.20

Researcher Details Google Maps Vulnerability That Earned Him $10,000

Vulnerebility

Securityweek
9.9.20

Cybercriminals Are Using Legit Cloud Monitoring Tools As Backdoor

Virus

Thehackernews
9.9.20France, Japan, and New Zealand warn of a surgein Emotet attacksBigBrothers  VirusSecurityaffairs
9.9.20Microsoft September 2020 Patch Tuesday addresses 129 flawsVulnerebilitySecurityaffairs
9.9.20Adobe fixes critical flaws in Adobe InDesign, Framemaker, and Experience ManagerVulnerebilitySecurityaffairs
9.9.20Microsoft Patches 129 Vulnerabilities With September 2020 Security UpdatesVulnerebilitySecurityweek
9.9.20Researchers Spot First Cloud Attack Abusing Legitimate ToolAttackSecurityweek
9.9.20Swiss Official Airs Concerns About Data Privacy in USBigBrothersSecurityweek
9.9.20Vulnerabilities in CodeMeter Licensing Product Expose ICS to Remote AttacksICSSecurityweek
9.9.20Adobe Patches Critical Code Execution Flaws in AEM, FrameMaker, InDesignVulnerebilitySecurityweek
9.9.20Start of School in Hartford Delayed by Ransomware AttackRansomwareSecurityweek
9.9.20Microsoft Releases September 2020 Security Patches For 129 FlawsVulnerebilityThehackernews
9.9.20

Microsoft September 2020 Patch Tuesday

Vulnerebility

SANS
9.9.20

Most compliance requirements are completely absurd

Cyber

Net-security
9.9.20

How do I select a remote workforce protection solution for my business?

Cyber

Net-security
9.9.20

Organizations must rethink traditional IT strategy to succeed in the new normal

Cyber

Net-security
9.9.20

What happens to funds once they have been stolen in a cyberattack?

Cyber

Net-security
9.9.20

Intelligent processes and tech increase enterprises’ competitiveness

Security

Net-security
9.9.20

(ISC)² Exam Action Plan: Get your certification goals on track for success

Security

Net-security
9.9.20

September 2020 Patch Tuesday: Microsoft fixes over 110 CVEs again

OS

Net-security
8.9.20

How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces

Security

Threatpost
8.9.20

Expert found multiple critical issues in MoFi routers

Vulnerebility

Securityaffairs
8.9.20

Newcastle University infected with DoppelPaymer Ransomware

Ransomware

Securityaffairs
8.9.20

France national cyber-security agency warns of a surge in Emotet attacks

BigBrothers

Securityaffairs
8.9.20

Chilean bank BancoEstado hit by REVil ransomware

Ransomware

Securityaffairs
8.9.20

Russian national indicted for attempting to recruit Tesla employee to install malware

BigBrothers

Securityaffairs
8.9.20

US Federal systems must be covered by vulnerability-disclosure policies by March 2021

BigBrothers

Securityaffairs
8.9.20

Epic Manchego gang uses Excel docs that avoid detection

Security

Securityaffairs
8.9.20

Google Announces Confidential GKE Nodes, General Availability of Confidential VMs

Security

Securityweek
8.9.20

U.S. Unveils Cybersecurity Policies for Space Systems

BigBrothers

Securityweek
8.9.20

NSA, NCMF Lay Out Design Plans for Cyber Center for Education and Innovation

BigBrothers

Securityweek
8.9.20

China Launches Initiative for Global Data Security Issues

BigBrothers

Securityweek
8.9.20

Critical Vulnerabilities Expose MoFi Routers to Remote Attacks

Vulnerebility

Securityweek
8.9.20

Evilnum Cyberspies Update Arsenal in Recent Attacks

APT

Securityweek
8.9.20

Five Eyes Cybersecurity Agencies Release Incident Response Guidance

BigBrothers

Securityweek
8.9.20

State: Cybercrime on the Rise During Pandemic, Caution Urged

CyberCrime

Securityweek
8.9.20

Data Residency Company InCountry Raises $18 Million

IT

Securityweek
8.9.20

Cisco Patches Critical Vulnerability in Jabber for Windows

Vulnerebility

Securityweek
8.9.20

Russian Indicted for Attempting to Recruit Tesla Employee to Install Malware

BigBrothers

Securityweek
8.9.20

Warner Music Discloses Data Breach Affecting e-Commerce Websites

CyberCrime

Securityweek
8.9.20

Julian Assange: Prolific Leaker of Secrets Back in Spotlight

BigBrothers

Securityweek
8.9.20

Visa Issues Alert for 'Baka' JavaScript Skimmer

CyberCrime

Securityweek
8.9.20

Japan, France, New Zealand Warn of Sudden Uptick in Emotet Trojan Attacks

BigBrothers  Virus

Thehackernews
8.9.20

New PIN Verification Bypass Flaw Affects Visa Contactless Payments

Vulnerebility

Thehackernews
8.9.20

SMB Cybersecurity Catching Up to Enterprise… But the Human Element Still a Major Concern

Cyber

Thehackernews
8.9.20

Office: About OLE and ZIP Files

Virus

SANS
8.9.20

Popular Android apps are rife with cryptographic vulnerabilities

Android

Net-security
8.9.20

Securing Active Directory accounts against password-based attacks

Attack

Net-security
8.9.20

Mapping the motives of insider threats

Cyber

Net-security
8.9.20

Cybersecurity after COVID-19: Securing orgs against the new threat landscape

Cyber

Net-security
8.9.20

Global security appliance market revenue grew to $4.2B in Q2 2020

Security

Net-security
8.9.20

Are today’s organizations ready for the data age?

Security

Net-security
7.9.20Ransomware attack halts Argentinian border crossing for four hoursRansomware

Bleepingcomputer

7.9.20How to remove unwanted apps from Windows 10OS

Bleepingcomputer

7.9.20Visa warns of new Baka credit card JavaScript skimmerCyberCrime

Bleepingcomputer

7.9.20FBI issues second alert about ProLock ransomware stealing dataBigBrothers  Ransomware

Bleepingcomputer

7.9.20SunCrypt Ransomware shuts down North Carolina school districtRansomware

Bleepingcomputer

7.9.20Microsoft to finally kill Adobe Flash support by January 2021OS

Bleepingcomputer

7.9.20Thanos Ransomware adds Windows MBR locker that fails every timeRansomware

Bleepingcomputer

7.9.20Netwalker Ransomware hit Argentina’s official immigration agencyRansomwareSecurityaffairs
7.9.20Visa warns of new sophisticated credit card skimmer dubbed BakaCyberCrimeSecurityaffairs
7.9.20WhatsApp discloses six previously undisclosed flawsSocialSecurityaffairs
7.9.20

Researchers develop secure multi-user quantum communication network

Security

Net-security
7.9.20

How to protect yourself from the hidden threat of evasive scripts

Security

Net-security
7.9.20

How COVID-19 affected remote work, customer engagements, and return to the office plans

Security

Net-security
7.9.20

Global WAN optimization market to reach $4.88 billion by 2027

IT

Net-security
6.9.20Phishing adds overlay on official company page to steal loginsPhishing

Bleepingcomputer

6.9.20U.S. Department of Defense discloses critical and high severity bugsBigBrothers

Bleepingcomputer

6.9.20Microsoft releases KB4571744 to fix Windows 10 update issueOS

Bleepingcomputer

6.9.20Warner Music Group finds hackers compromised its online storesCyberCrime

Bleepingcomputer

6.9.20FBI: Thousands of orgs targeted by RDoS extortion campaignBigBrothers

Bleepingcomputer

6.9.20Microsoft brings iOS' spacebar cursor control to Windows 10iOS

Bleepingcomputer

6.9.20CNN-News18 allegedly hacked to deny PayTM hack claimsCrime

Bleepingcomputer

6.9.20Google rolls out Secure DNS support to Chrome for AndroidAndroid

Bleepingcomputer

6.9.20Microsoft Defender can ironically be used to download malwareOS

Bleepingcomputer

6.9.20Windows 10 Insider build 20206 includes new Emoji Picker, Voice TypingOS

Bleepingcomputer

6.9.20Cisco fixes critical code execution bug in Jabber for WindowsVulnerebility

Bleepingcomputer

6.9.20Epic Fail: Emotet malware uses fake ‘Windows 10 Mobile’ attachmentsVirus

Bleepingcomputer

6.9.20AlphaBay dark web marketplace moderator gets 11 years in prisonCyberCrime

Bleepingcomputer

6.9.20Microsoft Office update changes Outlook fallback encryptionOS

Bleepingcomputer

6.9.20A full replacement of all Huawei and ZTE hardware on American wireless networks will cost $1.837bnBigBrothersSecurityaffairs
6.9.20Hackers use overlay screens on legitimate sites to steal Outlook credentialsHackingSecurityaffairs
6.9.20FBI issued a second flash alert about ProLock ransomware in a few monthsRansomwareSecurityaffairs
5.9.20New Intel microcode updates for Windows 10 fix CPU hardware bugsVulnerebility

Bleepingcomputer

5.9.20Hackers actively exploiting severe bug in over 300K WordPress sitesExploit

Bleepingcomputer

5.9.20Attackers abuse Google DNS over HTTPS to download malwareVirus

Bleepingcomputer

5.9.20KryptoCibule malware dodges antivirus to steal cryptocurrencyCryptocurrency  Virus

Bleepingcomputer

5.9.20Magento plugin Magmi vulnerable to hijacking admin sessionsVulnerebility

Bleepingcomputer

5.9.20Valorant update causes VCRUNTIME140.dll is missing error, how to fixVulnerebility

Bleepingcomputer

5.9.20Windows 10 DirectStorage API will greatly reduce gaming load timesOS

Bleepingcomputer

5.9.20Hackers breached Norwegian Parliament emails to steal dataBigBrothers

Bleepingcomputer

5.9.20Google now pays for bugs used to bypass its anti-fraud systemsVulnerebility

Bleepingcomputer

5.9.20Iranian hackers are selling access to corporate networksBigBrothers

Bleepingcomputer

5.9.20Firefox 80.0.1 rolls out to fix crashes and download issuesVulnerebility

Bleepingcomputer

5.9.20Microsoft confirms why Windows Defender can’t be disabled via registryOS

Bleepingcomputer

5.9.20Credit card data smuggled via private Telegram channelSocial

Bleepingcomputer

5.9.20Cisco warns of actively exploited bugs in carrier-grade routersExploit

Bleepingcomputer

5.9.20Windows Subsystem for Linux is getting these useful new featuresOS

Bleepingcomputer

5.9.20Over 400 GOV.UK domains found on spam blacklistsBigBrothers

Bleepingcomputer

5.9.20Windows 10 2004 now blocked on devices with LTE cellular modemsOS

Bleepingcomputer

5.9.20American Payroll Association discloses credit card theft incidentIncindent

Bleepingcomputer

5.9.20Lenovo warns of Windows 10 2004 crashing ThinkPad laptopsOS

Bleepingcomputer

5.9.20Malware authors trick Apple into trusting malicious Shlayer appsApple

Bleepingcomputer

5.9.20Ransom NewsRansomRansom
5.9.20Everything you should know about social media scrapingSocial blogAvast blog
5.9.20Beware of FritzFrog, a nasty piece of malwareMalware blogAvast blog
5.9.20Hackers possibly “testing” pro-Trump websitesBigBrother blogAvast blog
5.9.20Thanos Ransomware: Destructive Variant Targeting State-Run Organizations in the Middle East and North AfricaRansomware blogPalo Alto Unity42
5.9.20Exploits in the Wild for vBulletin Pre-Auth RCE Vulnerability CVE-2020-17496Exploit blogPalo Alto Unity42
5.9.20TIME FOR AN UPGRADE: HOW TO SWITCH FROM SYMANTEC TO CYBEREASONSecurity blog

Cybereason

5.9.20NO REST FOR THE WICKED: EVILNUM UNLEASHES PYVIL RATMalware blog

Cybereason

5.9.20Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863Vulnerebility blogMcafee blog
5.9.20JITSploitation III: Subverting Control FlowVulnerebility blogProject Zero
5.9.20JITSploitation II: Getting Read/WriteVulnerebility blogProject Zero
5.9.20JITSploitation I: A JIT BugVulnerebility blogProject Zero
5.9.20Salfram: Robbing the place without removing your name tagSecurity blogCisco Talos
5.9.20Better email classification, courtesy of youSecurity blogCisco Talos
5.9.20Vulnerability Spotlight: Code execution, memory corruption vulnerabilities in Accusoft ImageGearVulnerebility blogCisco Talos
5.9.20Quarterly Report: Incident Response trends in Summer 2020Incident blogCisco Talos
5.9.20Vulnerability Spotlight: Multiple SQL, code injection vulnerabilities in OpenSISVulnerebility blogCisco Talos
5.9.20Microsoft debuts deepfake detection toolSecurity blog

Eset

5.9.20Houseparty – should I stay or should I go now?Security blog

Eset

5.9.20Norway’s parliament struck by hackersBigBrother blog

Eset

5.9.20KryptoCibule: The multitasking multicurrency cryptostealerMalware blog

Eset

5.9.20Security flaw allows bypassing PIN verification on Visa contactless paymentsVulnerebility blogEset
5.9.20

Vulnerability Disclosure: Ethical Hackers Seek Best Practices

Vulnerebility

Threatpost
5.9.20

WhatsApp Discloses 6 Bugs via Dedicated Security Site

Social

Threatpost

5.9.20

Attackers Steal Outlook Credentials Via Overlay Screens on Legitimate Sites

Attack

Threatpost
5.9.20

Facebook Debuts Third-Party Vulnerability Disclosure Policy

Social  Vulnerebility

Threatpost

5.9.20

SunCrypt Ransomware behind North Carolina school district data breach

Ransomware

Securityaffairs
5.9.20

U.S. Department of Defense discloses details about critical and high severity issues

BigBrothers

Securityaffairs
5.9.20

Warner Music Group online stores hit by look-like Magecart attack

CyberCrime

Securityaffairs
4.9.20

Digital Education: The cyberrisks of the online classroom

Cyber

Securelist
4.9.20

Evilnum APT used Python-based RAT PyVil in recent attacks

APT

Securityaffairs
4.9.20

Army Cyber Command Completes its Move to Georgia Base

BigBrothers

Securityweek
4.9.20

Facebook Announces Vulnerability Reporting and Disclosure Policy

Social

Securityweek
4.9.20

Evilnum hackers targeting financial firms with a new Python-based RAT

Virus

Thehackernews
4.9.20

A blast from the past - XXEncoded VB6.0 Trojan

Spam  Virus

SANS
4.9.20

September 2020 Patch Tuesday forecast: Back to school?

Vulnerebility

Net-security

4.9.20Hackers are backdooring QNAP NAS devices with 3-year old RCE bugVulnerebility

Bleepingcomputer

4.9.20Robinhood, Vanguard, TD Ameritrade affected by stock trading outagesIT

Bleepingcomputer

4.9.20You have two days left to purchase 2-year TLS/SSL certificatesCrypto

Bleepingcomputer

4.9.20CenturyLink routing issue led to outages on Hulu, Steam, Discord, moreIT

Bleepingcomputer

4.9.20Slack pays stingy $1,750 reward for a desktop hijack vulnerabilityVulnerebility

Bleepingcomputer

4.9.20Namecheap hosting and email DOWN in prolonged outageSecurity

Bleepingcomputer

4.9.20Windows 10 21H1: The exciting features in next year's major updateOS

Bleepingcomputer

4.9.20Emotet malware's new 'Red Dawn' attachment is just as dangerousVirus

Bleepingcomputer

4.9.20Why streaming a video could freeze Microsoft IIS serversOS

Bleepingcomputer

4.9.20How to run Linux programs from a Windows 10 command promptOS

Bleepingcomputer

4.9.20Single & penniless: FBI warns of $475M lost to romance scamsBigBrothers

Bleepingcomputer

4.9.20Cisco engineer resigns then nukes 16k WebEx accounts, 456 VMsSecurity

Bleepingcomputer

4.9.20UltraRank hackers steal credit cards from hundreds of storesCyberCrime

Bleepingcomputer

4.9.20Microsoft to remove insecure TLS support on its Linux Software RepositoryOS

Bleepingcomputer

4.9.20Elon Musk confirmed Russian's plans to extort TeslaBigBrothers

Bleepingcomputer

4.9.20US wants to seize cryptocurrency stolen by North Korean hackersCryptocurrency

Bleepingcomputer

4.9.20Qbot steals your email threads again to infect other victimsBotNet

Bleepingcomputer

4.9.20Lemon_Duck cryptominer malware now targets Linux devicesCryptocurrency

Bleepingcomputer

4.9.20Windows Terminal adds advanced tab switcher, command paletteOS

Bleepingcomputer

4.9.20Microsoft delays Windows 10 1803 end of service due to pandemicOS

Bleepingcomputer

4.9.20

Python-based Spy RAT Emerges to Target FinTech

Virus

Threatpost
4.9.20

NSA Mass Surveillance Program Illegal, U.S. Court Rules

BigBrothers

Threatpost

4.9.20

Google Ups Product-Abuse Bug Bounties

Vulnerebility

Threatpost
4.9.20

Attackers Can Exploit Critical Cisco Jabber Flaw With One Message

Vulnerebility

Threatpost

4.9.20

India Blocks High-Profile Chinese Apps on Political, Privacy Concerns

BigBrothers

Threatpost
4.9.20The Twitter account of Indian Prime Minister Modi was hackedIncindent  SocialSecurityaffairs
4.9.20Online marketing company exposes 38+ million US citizen recordsIncindentSecurityaffairs
4.9.20Apple Delays Change Likely to Stymie Mobile Ad TargetingAppleSecurityweek
4.9.20Moderator of AlphaBay Dark Web Marketplace Gets 11 Years in PrisonCrimeSecurityweek
4.9.20

Mobile voting: Hype or reality?

Mobil

Net-security
4.9.20

Why data is the missing link in your cybersecurity strategy

Cyber

Net-security
4.9.20

Cryptomining activity could be a sign your servers are under attack

Cryptocurrency

Net-security
4.9.20

2020 trends in SOX compliance

Security

Net-security
4.9.20

Recommendations to enhance subscriber privacy in 5G

Mobil

Net-security
4.9.20

Which cybersecurity failures cost companies the most and which defenses have the highest ROI?

Cyber

Net-security
3.9.20IT threat evolution Q2 2020AnalysisSecurelist
3.9.20IT threat evolution Q2 2020. PC statisticsAnalysisSecurelist
3.9.20IT threat evolution Q2 2020. Mobile statisticsAnalysisSecurelist
3.9.20Is the Belarusian government behind the surveillance Android app banned by Google?BigBrothersSecurityaffairs
3.9.20AlphaBay dark web marketplace moderator was sentenced to 11 years of prison timeCyberCrimeSecurityaffairs
3.9.20WordPress 'File Manager' Plugin Patches Critical Zero-Day Exploited in AttacksExploitSecurityweek
3.9.20Cisco Jabber Bug Could Let Hackers Target Windows Systems RemotelyHackingThehackernews
3.9.20

Sandbox Evasion Using NTP

Security

SANS
3.9.20

Cisco patches critical, wormable RCE flaw in Cisco Jabber

Vulnerebility

Net-security

3.9.20

Cisco Warns of Active Exploitation of Flaw in Carrier-Grade Routers

Exploit

Threatpost
3.9.20

Joker Spyware Plagues More Google Play Apps

Android  Virus

Threatpost

3.9.20

China-based APT Debuts Sepulcher Malware in Spear-Phishing Attacks

APT

Threatpost
3.9.20

U.S. Agencies Must Adopt Vulnerability-Disclosure Policies by March 2021

BigBrothers

Threatpost

3.9.20

BEC Wire Transfers Average $80K Per Attack

Attack

Threatpost
3.9.20

Triple-Threat Cryptocurrency RAT Mines, Steals and Harvests

Virus

Threatpost
3.9.20

Operation PowerFall: CVE-2020-0986 and variants

Vulnerebility

Securelist
3.9.20

Cisco addresses critical code execution flaw in Cisco Jabber for Windows

Vulnerebility

Securityaffairs
3.9.20

Hackers are actively exploiting critical RCE in WordPress sites using File Manager plugin

Vulnerebility

Securityaffairs
3.9.20

Hackers use e-skimmer that exfiltrates payment data via Telegram

Social

Securityaffairs
3.9.20

New KryptoCibule Windows Trojan spreads via malicious torrents

Virus

Securityaffairs
3.9.20

MAGMI Magento plugin flaw allows remote code execution on a vulnerable site

Vulnerebility

Securityaffairs
3.9.20

Chinese Hackers Target Europe, Tibetans With 'Sepulcher' Malware

BigBrothers

Securityweek
3.9.20

Google Increases Bug Bounty Payouts for Abuse Risk Flaws

Security

Securityweek
3.9.20

Government Backed 'MDBR' Service Blocks Connections to Malicious Domains

BigBrothers

Securityweek
3.9.20

Hackers Are Targeting a Three-Year Old Vulnerability in QNAP NAS Devices

Vulnerebility

Securityweek
3.9.20

macOS Adware Delivers Notarized Payloads

Apple

Securityweek
3.9.20

Minister: New Zealand Enduring Wave of Cyberattacks

BigBrothers

Securityweek
3.9.20

New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data

Hacking  Social

Thehackernews
3.9.20

Python and Risky Windows API Calls

Security

SANS
3.9.20

Private, unlicensed 5G mobile network adoption may intensify NetOps and SecOps challenges

Mobil

Net-security

3.9.20

The cost of an insider attack is as much as $2 million

Attack

Net-security

3.9.20

Financial impact of cyber-physical system attacks expected to grow

Attack

Net-security

3.9.20

RedCommander: Open source tool for red teaming exercises

Security

Net-security

3.9.20

Most security leaders feel their programs are mature, but data reveals otherwise

Security

Net-security

3.9.20

Data center ethernet switches deployment increasing 12% year-over-year

Security

Net-security

3.9.20

Microsoft builds deepfakes detection tool to combat election disinformation

Security

Net-security

2.9.20AA20-245A : Technical Approaches to Uncovering and Remediating Malicious ActivityCERTCERT
2.9.20

FBI: Ring Smart Doorbells Could Sabotage Cops

BigBrothers

Threatpost
2.9.20

Pioneer Kitten APT Sells Corporate Network Access

APT

Threatpost

2.9.20

Magecart Credit-Card Skimmer Adds Telegram as C2 Channel

CyberCrime

Threatpost
2.9.20

U.S. Voter Databases Offered for Free on Dark Web, Report

Incindent

Threatpost

2.9.20

Magento Sites Vulnerable to RCE Stemming From Magmi Plugin Flaws

Vulnerebility

Threatpost
2.9.20

Norway ‘s Parliament, Stortinget, discloses a security breach

BigBrothers

Securityaffairs
2.9.20

Details of millions of U.S. Voters leaked to Russia’s Dark Web forum

BigBrothers

Securityaffairs
2.9.20

Tor launches Tor Project Membership Program to financially support its work

Security

Securityaffairs
2.9.20

Cisco Says Hackers Targeting Zero-Days in Carrier-Grade Routers

Vulnerebility

Securityweek
2.9.20

Facebook Nabs Russia-Linked Campaign to Fuel US Chaos

BigBrothers  Social

Securityweek
2.9.20

Hackers Attack Norway's Parliament

BigBrothers

Securityweek
2.9.20

American Payroll Association User Data Stolen in Skimmer Attack

Attack

Securityweek
2.9.20

FireMon Secures $40 Million Debt Financing

IT

Securityweek
2.9.20

Essential features of security automation for the AWS platform

Security

Net-security

2.9.20

Surging CMS attacks keep SQL injections on the radar during the next normal

Attack

Net-security

2.9.20

Companies continue to expose unsafe network services to the internet

Security

Net-security

2.9.20

Organizations facing surge in phishing attacks since the start of the pandemic

Phishing

Net-security

2.9.20

Multi-access edge computing market to reach $7.23 billion by 2024

IT

Net-security

2.9.20

Reduced lifespan of TLS certificates could cause increase in outages

Safety

Net-security

2.9.20

Tor Project launches program to secure funding for software development

Security

Net-security

2.9.20

Apple-notarized malware foils macOS defenses

Apple

Net-security

2.9.20

Attackers are exploiting two zero-day flaws in Cisco enterprise-grade routers

Attack

Net-security

2.9.20

(ISC)² research: Why cybersecurity is a great choice for an exciting career

Security

Net-security

2.9.20

Exposed Windows Domain Controllers Used in CLDAP DDoS Attacks

Attack

SANS
1.9.20Iran-linked APT group Pioneer Kitten sells access to hacked networksAPTSecurityaffairs
1.9.20France will not ban Huawei from its upcoming 5G networksBigBrothersSecurityaffairs
1.9.20Iranian Hackers Target Critical Vulnerability in F5's BIG-IPBigBrothersSecurityweek
1.9.20Maximum Lifespan of SSL/TLS Certificates is 398 Days Starting TodaySecurityThehackernews
1.9.20Cisco Issues Warning Over IOS XR Zero-Day Flaw Being Targeted in the WildAttackThehackernews
1.9.20

Stolen Fortnite Accounts Earn Hackers Millions Per Year

Hacking

Threatpost
1.9.20

Critical Slack Bug Allows Access to Private Channels, Conversations

Vulnerebility

Threatpost

1.9.20

Apple Accidentally Notarizes Shlayer Malware Used in Adware Campaign

Apple

Threatpost
1.9.20

Researchers warn of QNAP NAS attacks in the wild

Attack

Securityaffairs
1.9.20

Hackers are trying to exploit DoS flaw in Cisco IOS XR software running in carrier-grade routers

Exploit

Securityaffairs
1.9.20

Qbot uses a new email collector module in the latest campaign

BotNet

Securityaffairs
1.9.20

Google removed malicious Terracotta apps from the Play Store

Android

Securityaffairs
1.9.20

Slack Pays Bounty for Critical Vulnerability in Desktop App

Vulnerebility

Securityweek
1.9.20

Chinese Researcher Arrested for Destroying Evidence of Data Transfer to China

BigBrothers

Securityweek
1.9.20

France Won't Ban Huawei But Favors European 5G Systems

BigBrothers

Securityweek
1.9.20

Attackers Actively Targeting Cisco IOS XR Vulnerability

Attack

Securityweek
1.9.20

Security teams stretched to breaking point trying to secure new remote working regimes

Security

Net-security

1.9.20

Safe domain: How to protect your enterprise from DNS hijacking

Hacking

Net-security

1.9.20

Phishing gangs mounting high-ticket BEC attacks, average loss now $80,000

Phishing

Net-security

1.9.20

Bring your own PC and SASE security to transform global businesses

Security

Net-security