Calendar April- Home  2020  2019  2018  2017  2016  1  2  3  4  5  6  7  8  Articles

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2019 - January  February  March  April  May  June  July  August  September  October  November  December


Calendar April

30.4.19

$1.75 Million Stolen by Crooks in Church BEC Attack

Spam

Bleepingcomputer

30.4.19

Crooks Build Fake Hack Tools and Game Cheats for Profit

Hacking

Bleepingcomputer

30.4.19

Botnet of Over 100K Devices Used to DDoS Electrum Servers

BotNet

Bleepingcomputer

30.4.19

Exposed Database Leaks Addresses, Income Info of Millions of Americans

Incindent

Bleepingcomputer

30.4.19

Windows 10 Users Avoiding October 2018 Update Shows Report

IT

Bleepingcomputer

30.4.19

Tech Support Scammers Freeze Browsers Using Iframes

Spam

Bleepingcomputer

30.4.19

Google Chrome 74 Now Synchronizes with Windows 10 Dark Mode

IT

Bleepingcomputer

30.4.19

Breaches, ID Theft & Malware: Schools At Risk From Vulnerabilities

Virus

Bleepingcomputer

30.4.19

Windows Security Update Caused Recent Antivirus Conflicts and Freezes

Security

Bleepingcomputer

30.4.19

Microsoft Asks Users to Call Windows 10 Devs About Taskbar Experience

IT

Bleepingcomputer

30.4.19

Europeans Hit with Multi-Stage Malware Loader via Signed Malspam

Virus

Bleepingcomputer

30.4.19

Fake Windows PC Cleaner Drops AZORult Info-Stealing Trojan

Virus

Bleepingcomputer

30.4.19

know what you did last summer, MuddyWater blending in the crowd

APT

Securelist

30.4.19

Docker Hub Hack Affects 190K Accounts

Incindent

Threatpost

30.4.19

2 Million IoT Devices Vulnerable to Complete Takeover

IoT

Threatpost

30.4.19

Apple Defends Parental Control App Removal Amid Backlash

Apple

Threatpost

30.4.19

MuddyWater APT Hones an Arsenal of Custom Tools

APT

Threatpost

30.4.19

Malware Infests Popular Pirate Streaming Hardware

Virus

Threatpost

30.4.19

Facebook funds research on the impact of social media on elections

Social

Securityaffairs

30.4.19

ElectrumDoSMiner botnet reached 152,000 hosts

BotNet

Securityaffairs

30.4.19

United Airlines covers up seat cameras to respond to privacy concerns

Privacy

Securityaffairs

30.4.19

Unprotected Database Stored Information on 80 Million U.S. Households

Incindent

Securityweek

30.4.19

ImmuniWeb Launches Free Testing Tool for Website Security and PCI Compliance

Safety

Securityweek

30.4.19

Facebook to Fund Research on Social Media Impact on Elections

Social

Securityweek

30.4.19

Making the most of threat intelligence with threat intelligence gateways

Security

Net-security

30.4.19

Hacking our way into cybersecurity for medical devices

Hacking

Net-security

30.4.19

SEC demands better disclosure for cybersecurity incidents and threats

Cyber

Net-security

30.4.19

Most adults are concerned about malware and phishing on social media

Phishing

Net-security

30.4.19

Companies face regulatory fines and cybersecurity threats, still fail to protect sensitive data

Cyber

Net-security

29.4.19

New Emotet variant uses connected devices as proxy C2 servers

Virus

Securityaffairs

29.4.19

Report: Unknown Data Breach Exposes 80 Million US Households

Incindent

Securityaffairs

29.4.19

Over 23 million breached accounts were using ‘123456’ as password

Incindent

Securityaffairs

29.4.19

Amnesty International Hong Kong Office hit by state-sponsored attack

Attack

Securityaffairs

29.4.19

Microsoft removes Password-Expiration Policy in security baseline for Windows 10

Security

Securityaffairs

29.4.19

GDPR Conformance Does Not Excuse Companies from Vicarious Liability

Privacy

Securityweek

29.4.19

Docker Hub Breach Hits 190,000 Accounts

Incindent

Securityweek

29.4.19

Oracle Patches WebLogic Zero-Day Exploited in Attacks

Exploit

Securityweek

29.4.19

Slack Lists Cybersecurity Risks Ahead of Going Public

Cyber

Securityweek

29.4.19

Attackers breached Docker Hub, grabbed keys and tokens

Attack

Net-security

29.4.19

Slack warns investors it might be targeted by organized crime, nation-state hackers

CyberCrime

Net-security

29.4.19

Critical flaw in Qualcomm chips exposes sensitive data for Android Devices

Android

Securityaffairs

29.4.19

Signed Malspam campaigns hit Europeans with Multi-Stage JasperLoader

Spam

Securityaffairs

29.4.19

AESDDoS bot exploits CVE-2019-3396 flaw to hit Atlassian Confluence Server

Vulnerebility

Securityaffairs

29.4.19

Slack Lists Cybersecurity Risks Ahead of Going Public

Cyber

Securityweek

29.4.19

Update about Weblogic CVE-2019-2725 (Exploits Used in the Wild, Patch Status)

Vulnerebility

SANS

29.4.19

GE trade secret theft case demonstrates need for document behavior monitoring

Security

Net-security

29.4.19

The leading sources of stress for cybersecurity leaders? Regulation, threats, skills shortage

Cyber

Net-security

29.4.19

Researchers develop new technique to identify malware in embedded systems

Virus

Net-security

29.4.19

Most SMBs would pay a ransom in order to recover stolen data

Incindent

Net-security

29.4.19

A surprising number of used drives sold on eBay hold sensitive data

Incindent

Net-security

28.4.19

NIST ACTS Toolkit could find Finds bugs safety-critical systems

Safety

Securityaffairs

28.4.19

Magecart skimmer scripts hosted on GitHub infected 200+ e-commerce sites

CyberCrime

Securityaffairs

28.4.19

Docker Hub Database hacked, 190,000 users impacted

CyberCrime

Securityaffairs

28.4.19

Experts release PoC exploit for unpatched flaw in WordPress WooCommerce Extension

Exploit

Securityaffairs

28.4.19

Cisco discovered several flaws in Sierra Wireless AirLink ES450 devices

Vulnerebility

Securityaffairs

28.4.19

AESDDoS Botnet Targets Vulnerability in Atlassian’s Confluence Server

BotNet

Securityweek

28.4.19

Docker Hub Suffers a Data Breach, Asks Users to Reset Password

Incindent

Thehackernews

28.4.19

New York, Canada, Ireland Launch New Investigations Into Facebook Privacy Breaches

Social

Thehackernews

27.4.19

Quick Tip for Dissecting CVE-2017-11882 Exploits

Exploit

SANS

27.4.19

Ransom

Ransom

Ransom

27.4.19

Docker Hub Database Hack Exposes Sensitive Data of 190K Users

Incindent

Bleepingcomputer

27.4.19

GitHub-Hosted Magecart Card Skimmer Found on Hundreds of Stores

CyberCrime

Bleepingcomputer

27.4.19

Old Vulnerabilities Are Still Good Tricks for Today's Attacks

Vulnerebility

Bleepingcomputer

27.4.19

Custom Start Menus in Roaming Profiles Reset After Windows 10 Upgrades

Vulnerebility

Bleepingcomputer

27.4.19

Windows 10 and Windows 7 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

27.4.19

Windows 10 Insider Build 18885 Fixes USB Drive Letter Reassignments

Vulnerebility

Bleepingcomputer

27.4.19

A Closer Look at the RobbinHood Ransomware

Ransomware

Bleepingcomputer

27.4.19

Vulnerable Confluence Servers Get Infected with Ransomware, Trojans

Ransomware

Bleepingcomputer

27.4.19

News Wrap: Amazon Echo Privacy, Facebook FTC Fines and Biometrics Regulation

Security

Threatpost

27.4.19

GoDaddy Shutters 14,000 Subdomains Tied to ‘Snake Oil’ Scams

Spam

Threatpost

27.4.19

Facial Recognition ‘Consent’ Doesn’t Exist, Threatpost Poll Finds

Security

Threatpost

27.4.19

Critical Flaws in Sierra Wireless 5G Gateway Allow RCE, Command Injection

Vulnerebility

Threatpost

27.4.19

Users Urged to Disable WordPress Plugin After Unpatched Flaw Disclosed

Vulnerebility

Threatpost

27.4.19

Millions of IoT Devices exposed to remote hacks due to iLnkP2P flaws

IoT

Securityaffairs

27.4.19

Beapy Cryptojacking campaign leverages EternalBlue exploit to spread

Cryptocurrency

Securityaffairs

27.4.19

P2P Flaws Expose Millions of IoT Devices to Remote Attacks

IoT

Securityweek

27.4.19

Cyptojacking Attacks Target Enterprises With NSA-Linked Exploits

Cryptocurrency

Securityweek

27.4.19

Cisco Finds Serious Flaws in Sierra Wireless AirLink Devices

Vulnerebility

Securityweek

27.4.19

Microsoft Removes Password-Expiration Policy in Windows 10

Security

Securityweek

27.4.19

Irish Regulator Investigates Facebook Over Exposed Passwords

Social

Securityweek

26.4.19

Microsoft Rolls Out Android Notification Syncing for Windows 10

IT

Bleepingcomputer

26.4.19

Hundreds of GoDaddy Accounts Used for "Miracle" Product Scams

Spam

Bleepingcomputer

26.4.19

Atlanta Hawks Online Shop Hit with Credit Card Stealing Attack

Attack

Bleepingcomputer

26.4.19

The Anatomy of Highly Profitable Credential Stuffing Attacks

Attack

Bleepingcomputer

26.4.19

Devious Chase Bank Phishing Scam Asks For Selfies

Phishing

Bleepingcomputer

26.4.19

Emotet Uses Compromised Devices as Proxy Command Servers

Virus

Bleepingcomputer

26.4.19

Over 500% Increase in Ransomware Attacks Against Businesses

Ransomware

Bleepingcomputer

26.4.19

EternalBlue Exploit Serves Beapy Cryptojacking Campaign

Cryptocurrency

Bleepingcomputer

26.4.19

TA505 Spear Phishing Campaign Uses LOLBins to Avoid Detection

Phishing

Bleepingcomputer

26.4.19

French Users of Microsoft Games and Sites Hit With Scam Ads

BigBrothers

Bleepingcomputer

26.4.19

GitHub Service Abused by Attackers to Host Phishing Kits

Phishing

Bleepingcomputer

26.4.19

Apple Updates XProtect to Block 'Windows' Malware on Macs

Apple

Bleepingcomputer

26.4.19

Windows 10 Version 1903 Drops Password Expiration Policies

Vulnerebility

Bleepingcomputer

26.4.19

NIST Tool Finds Errors in Complex Safety-Critical Software

Security

Securityweek

26.4.19

Canada Privacy Watchdog Taking Facebook to Court

Privacy

Securityweek

26.4.19

Reports Huawei to Supply UK Networks Draw Criticism

BigBrothers

Securityweek

26.4.19

Cybercriminals Using GitHub to Host Phishing Kits

Phishing

Securityweek

26.4.19

Leaked Carbanak Source Code Reveals No New Exploits

Exploit

Securityweek

26.4.19

Special-Purpose Vehicle Maker Aebi Schmidt Hit by Malware

Virus

Securityweek

26.4.19

Oracle, Gemalto Downplay Java Card Vulnerabilities

Vulnerebility

Securityweek

26.4.19

Amnesty Says Hong Kong Office Hit by China-linked Cyber Attack

Attack

Securityweek

26.4.19

The strengths and weaknesses of different VPN protocols

Security

Securityaffairs

26.4.19

Special-Purpose Vehicle Maker Aebi Schmidt Hit by Malware

Virus

Securityaffairs

26.4.19

Crooks abuse GitHub platform to host phishing kits

Phishing

Securityaffairs

26.4.19

Flaws in Social Warfare plugin actively exploited in the wild

Vulnerebility

Securityaffairs

26.4.19

Britain ‘Approves’ Huawei role in building ‘non-core’ parts for 5G Network

BigBrothers

Securityaffairs

26.4.19

A flaw in Rockwell Controller allows attackers to redirect users to malicious Sites

Vulnerebility

Securityaffairs

26.4.19

Critical Unpatched Flaw Disclosed in WordPress WooCommerce Extension

Vulnerebility

Thehackernews

26.4.19

'Highly Critical' Unpatched Zero-Day Flaw Discovered In Oracle WebLogic

Vulnerebility

Thehackernews

26.4.19

Qualcomm Critical Flaw Exposes Private Keys For Android Devices

Android

Threatpost

26.4.19

Android-Based Sony Smart-TVs Open to Image Pilfering

Android

Threatpost

26.4.19

Service Accounts Redux - Collecting Service Accounts with PowerShell

Security

SANS

26.4.19

Best practices when implementing SD-WAN

Security

Net-security

26.4.19

Too fast, too insecure: Securing Mongo Express web administrative interfaces

Security

Net-security

26.4.19

Consumers trust banks most with their personal data, 68% still fear identity theft

Incindent

Net-security

26.4.19

Global spending on digital transformation to reach $1.18 trillion in 2019

Security

Net-security

26.4.19

Cybercriminals are becoming more methodical and adaptive

CyberCrime

Net-security

26.4.19

Established companies leveraging fintech capabilities for growth

Security

Net-security

25.4.19

Researchers flag new Oracle WebLogic zero-day RCE flaw

Vulnerebility

Net-security

25.4.19

Another European manufacturer crippled by ransomware

Ransomware

Net-security

25.4.19

Qualcomm chips leak crypto data from secure execution environment

Crypto

Net-security

25.4.19

Unpatched Vulnerability Alert - WebLogic Zero Day

Vulnerebility

SANS

25.4.19

Point Blank Gamers Targeted with Backdoor Malware

Virus

Threatpost

25.4.19

Facebook May Face $5 Billion FTC Fine for Data Misuse

Social

Threatpost

25.4.19

Facial Recognition is Here: But Are We Ready?

Security

Threatpost

25.4.19

Adware-Ridden Apps in Google Play Infect 30 Million Android Users

Android

Threatpost

25.4.19

Poll: Are You Creeped Out by Facial Recognition?

Security

Threatpost

25.4.19

Latest Qbot Variant Evades Detection, Infects Thousands

Virus

Threatpost

25.4.19

Zero-day vulnerability in Oracle WebLogic

Vulnerebility

Securityaffairs

25.4.19

Facebook Could Be Fined Up To $5 Billion Over Privacy Violations

Social

Thehackernews

25.4.19

Congress Asks Google 10 Questions On Its Location Tracking Database

Privacy

Thehackernews

25.4.19

IoT Security Firm VDOO Raises $32 Million

IoT

Securityweek

25.4.19

Facebook Anticipates an FTC Privacy Fine of up to $5 Billion

Social

Securityweek

25.4.19

Former DHS Head Took up Cyber Despite White House Aversion

BigBrothers

Securityweek

25.4.19

Digital Guardian Announces $30 Million Financing Round

IT

Securityweek

25.4.19

Government Officials Targeted With Trojanized TeamViewer

Virus

Securityweek

25.4.19

BEC Fraud Losses Grew to $1.3 Billion in 2018: FBI

Spam

Securityweek

25.4.19

DNSpionage Hackers Use New Malware in Recent Attacks

Virus

Securityweek

25.4.19

Serious Vulnerabilities Found in Fujifilm X-Ray Devices

Vulnerebility

Securityweek

25.4.19

The latest DDoS attacks are mostly multi-vector and morph over time

Attack

Net-security

25.4.19

You can’t fix what you can’t see: A new way of looking at network performance

Security

Net-security

25.4.19

Employers should develop cybersecurity protocols and invest more in employee training programs

Cyber

Net-security

25.4.19

Researchers develop new tool for safety-critical software testing

Security

Net-security

25.4.19

Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

Security

Net-security

25.4.19

Where data privacy executives plan to focus their strategies and budgets

Privacy

Net-security

24.4.19

If I Had to Do It Over Again, Part 3

Security blog

F5 Labs

24.4.19

Ramnit Returns to its Banking Roots, Just in Time for Italian Tax Season

Malware blog

F5 Labs

24.4.19

Regional Threat Perspectives: Europe

Cyber blog

F5 Labs

24.4.19

CARBANAK Week Part One: A Rare Occurrence

Malware blog

FireEye

24.4.19

Spear Phishing Campaign Targets Ukraine Government and Military; Infrastructure Reveals Potential Link to So-Called Luhansk People's Republic

Phishing blog

FireEye

24.4.19

FLASHMINGO: The FireEye Open Source Automatic Analysis Tool for Flash

Exploit blog

FireEye

24.4.19

CARBANAK Week Part Two: Continuing the CARBANAK Source Code Analysis

Malware blog

FireEye

24.4.19

FINTEAM: Trojanized TeamViewer Against Government Targets

Malware blog

Checkpoint

24.4.19

PreAMo: A Clicker Campaign found on Google Play

Malware blog

Checkpoint

24.4.19

Vulnerability Spotlight: Symantec Endpoint Protection kernel memory information disclosure vulnerability

Vulnerebility blog

Cisco Talos

24.4.19

DNSpionage brings out the Karkoff

Hacking blog

Cisco Talos

24.4.19

DNS Hijacking Abuses Trust In Core Internet Service

Hacking blog

Cisco Talos

24.4.19

New HawkEye Reborn Variant Emerges Following Ownership Change

Malware blog

Cisco Talos

24.4.19

Vulnerability Spotlight: Denial of service in VMWare Workstation 15

Vulnerebility blog

Cisco Talos

24.4.19

Vulnerability Spotlight: Multiple vulnerabilities in Shimo VPN's helper tool

Vulnerebility blog

Cisco Talos

24.4.19

WannaCryptor ‘accidental hero’ pleads guilty to malware charges

Ransomware blog

Eset

24.4.19

Embracing creativity to improve cyber-readiness

Cyber blog

Eset

24.4.19

Bug in EA’s Origin client left gamers open to attacks

Attack blog

Eset

24.4.19

Your Android phone can now double as a security key

OS Blog

Eset

24.4.19

Microsoft reveals breach affecting webmail users

Incident blog

Eset

24.4.19

Qbot Malware Dropped via Context-Aware Phishing Campaign

Virus

Bleepingcomputer

24.4.19

Stuart City is the new victim of the Ryuk Ransomware

Ransomware

Securityaffairs

24.4.19

The Russian Shadow in Eastern Europe: Gamaredon ‘s Ukrainian MOD Campaign

BigBrothers

Securityaffairs

24.4.19

OilRig APT uses Karkoff malware along with DNSpionage in recent attacks

APT

Securityaffairs

24.4.19

Chrome 74 Patches 39 Vulnerabilities

Vulnerebility

Securityweek

24.4.19

Rockwell Controller Flaw Allows Hackers to Redirect Users to Malicious Sites

Virus

Securityweek

24.4.19

Britain 'Approves' Huawei Role in 5G Network

BigBrothers

Securityweek

24.4.19

Where have all the Domain Admins gone? Rooting out Unwanted Domain Administrators

Security

SANS

24.4.19

Oops. 228K Danish Passports Have Swapped Fingerprint Data

Incindent

Bleepingcomputer

24.4.19

Chrome 74 Released with 39 Security Fixes and New Features

Vulnerebility

Bleepingcomputer

24.4.19

Windows 10 May 2019 Update to Be Blocked If Using USB Drives

IT

Bleepingcomputer

24.4.19

NSpionage Drops New Karkoff Malware, Cherry-Picks Its Victims

Virus

Bleepingcomputer

24.4.19

Microsoft Not Giving Up on Classic Windows Paint Yet

IT

Bleepingcomputer

24.4.19

Cybercrime's Total Earnings Skyrocketed to $2.7 Billion Says the FBI

CyberCrime

Bleepingcomputer

24.4.19

Malware Hosted in Google Sites Sends Data to MySQL Server

Virus

Bleepingcomputer

24.4.19

Source Code for pCarbanak Backdoor Shared with Larger Infosec Community

Virus

Bleepingcomputer

24.4.19

ShadowHammer Targets Multiple Companies, ASUS Just One of Them

CyberCrime

Bleeingcomputer

24.4.19

Kaspersky speculates the involvement of ShadowPad attackers in Operation ShadowHammer

CyberCrime

Securityaffairs

24.4.19

odybuilding.com forces password reset after a security breach

Incindent

Securityaffairs

24.4.19

FireEye experts found source code for CARBANAK malware on VirusTotal

Virus

Securityaffairs

24.4.19

Targeted Attacks hit multiple embassies with Trojanized TeamViewer

Attack

Securityaffairs

24.4.19

Kaspersky Links ShadowHammer Supply-Chain Attack to ShadowPad Hackers

Attack

Securityweek

24.4.19

Banking Trojan Drive-by Download Leverages Trust in Google Sites

Virus

Securityweek

24.4.19

Bodybuilding.com Discloses Data Breach

Incindent

Securityweek

24.4.19

UK's NCSC Suggests Automatic Blocking of Common Passwords

BigBrothers

Securityweek

24.4.19

Carbanak Source Code Discovered on VirusTotal

CyberCrime

Securityweek

24.4.19

Vietnam-Linked Hackers Use Atypical Executables to Avoid Detection

APT

Securityweek

24.4.19

'Karkoff' Is the New 'DNSpionage' With Selective Targeting Strategy

CyberSpy

Thehackernews

24.4.19

Hackers Actively Exploiting Widely-Used Social Share Plugin for WordPress

Exploit

Thehackernews

24.4.19

Exploits for Social Warfare WordPress Plugin Reach Critical Mass

Exploit

Threatpost

24.4.19

Carbanak Source Code Unveils a Startlingly Complex Malware

Virus

Threatpost

24.4.19

Malicious VBA Office Document Without Source Code

Virus

SANS

24.4.19

Which employees receive the most highly targeted email-borne threats?

Spam

Net-security

24.4.19

Latest numbers show why BEC/EAC scams are here to stay

Spam

Net-security

24.4.19

Nearly half of firms suffer data breaches at hands of vendors

Incindent

Net-security

24.4.19

What you can expect at HITBSecConf2019 Amsterdam

Congress

Net-security

24.4.19

A casual approach to workplace communications presents major security risks

Security

Net-security

24.4.19

Research on private key generation reveals theft of ETH funds from accounts with discoverable keys

Crypto

Net-security

23.4.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in March 2019

Cyber blog

F5 Labs

23.4.19

Application Protection Report 2019, Episode 2: 2018 Breach Trends

Security blog

F5 Labs

23.4.19

4 Areas Where Infosec Facts and Fiction Clash: Mind the Gap Pt. 2

Security blog

F5 Labs

23.4.19

Trust and Reputation in the Digital Era

Security blog

F5 Labs

23.4.19

TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping

ICS blog

FireEye

23.4.19

Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware

APT blog

FireEye

23.4.19

Finding Weaknesses Before the Attackers Do

Cyber blog

FireEye

23.4.19

Churning Out Machine Learning Models: Handling Changes in Model Predictions

Security blog

FireEye

23.4.19

Is Privacy Really iPhone? Researchers Weigh in on Apple’s Targeted Ad Tracking

Apple

Threatpost

23.4.19

FBI: BEC Scam Losses Almost Double To Reach $1.2 Billion

Spam

Threatpost

23.4.19

Whitepaper: Third-Party Risk to the Nth Degree

Security

Net-security

23.4.19

Are your passwords among the 100,000 most breached ones?

Incindent

Net-security

23.4.19

Operation ShadowHammer: a high-profile supply chain attack

Attack

Securelist

23.4.19

Iran-linked APT34: Analyzing the webmask project

APT

Securityaffairs

23.4.19

EmCare reveals patient and employee data were hacked

Incindent

Securityaffairs

23.4.19

Source Code for CARBANAK Banking Malware Found On VirusTotal

Virus

Thehackernews

23.4.19

Windows April Updates Also Have Problems with McAfee Software

Security

Bleepingcomputer

23.4.19

Microsoft Windows Defender ATP APIs Now Generally Available

Security

Bleepingcomputer

23.4.19

Windows 7 Now Showing End of Support Warnings

Security

Bleepingcomputer

23.4.19

Bodybuilding.com Security Breach, All Customer Passwords Reset

Incindent

Bleepingcomputer

23.4.19

Medical Information of Almost 150K Rehab Patients Exposed

Incindent

Bleepingcomputer

23.4.19

Office 365 Custom Rules to Block Azure Blob Storage Phishing Attacks

Phishing

Bleepingcomputer

23.4.19

Microsoft Discontinues Windows 10 Sets Tabbed Window Feature

IT

Bleepingcomputer

23.4.19

Google Chrome is Testing a New Extension Menu

IT

Bleepingcomputer

23.4.19

The foundation: Quantifying risk with focused security measurement

Security

Net-security

23.4.19

Attackers are weaponizing more vulnerabilities than ever before

Vulnerebility

Net-security

23.4.19

PDF: The vehicle of choice for malware and fraud

Virus

Net-security

23.4.19

Scientists may have identified a new way to improve network security

Security

Net-security

23.4.19

As bad bots grow more sophisticated, so does the number of industries impacted by them

ICS

Net-security

23.4.19

Underserved populations unaware of cybersecurity risks

 

Net-security

22.4.19

Millions of Medical Documents for Addiction and Recovery Patients Leaked

Incindent

Threatpost

22.4.19

Evil TeamViewer Attacks Under the Guise of the U.S. State Department

Attack

Threatpost

22.4.19

France’s ‘Secure’ Telegram Replacement Hacked in an Hour

BigBrothers

Threatpost

22.4.19

WannaCry Hero Pleads Guilty to Kronos Malware Charges

Crime

Threatpost

22.4.19

jQuery JavaScript library flaw opens the doors for attacks on hundreds of millions of websites

Vulnerebility

Securityaffairs

22.4.19

Russian Twitter bot activity increased in the wake Mueller report release

BotNet

Securityaffairs

22.4.19

Campaign leverages Bit.ly, BlogSpot, and Pastebin to distribute RevengeRAT

Virus

Securityaffairs

22.4.19

A flaw in Shopify API flaw exposed revenue and traffic data of thousands of stores

Vulnerebility

Securityaffairs

22.4.19

Ride-Hailing Company operating in Iran exposes data of Iranian Drivers

APT

Securityaffairs

22.4.19

60 Million records of LinkedIn users exposed online

Incindent

Securityaffairs

22.4.19

INPIVX hidden service, a new way to organize ransomware attacks

Ransomware

Securityaffairs

22.4.19

Healthcare Firm EmCare Says 60,000 Employees and Patients Exposed in Breach

Incindent

Securityweek

22.4.19

Source Code of Iran-Linked Hacking Tools Posted Online

APT

Securityweek

22.4.19

WannaCry 'Hero' Marcus Hutchins Pleads Guilty to Creating Malware

Crime

Securityweek

22.4.19

.rar Files and ACE Exploit CVE-2018-20250

Exploit

SANS

20.4.19

Security Researcher Pleads Guilty To Malware Writing Charges

Crime

Bleepingcomputer

20.4.19

Windows 10 Start Menu Gets Its Own Process in Build 1903

IT

Bleepingcomputer

20.4.19

Nintendo Super Mario Bros. Now Playable on Commodore 64

IT

Bleepingcomputer

20.4.19

Marcus Hutchins pleads guilty to two counts of banking malware creation

Crime

Securityaffairs

20.4.19

Avast, Avira, Sophos and other antivirus solutions show problems after

Security

Securityaffairs

20.4.19

Google is going to block logins from embedded browsers against MitM phishing attacks

Phishing

Securityaffairs

20.4.19

Google to Block Logins From Embedded Browsers to Prevent Phishing

Phishing

Securityweek

20.4.19

Ransom News

Ransom

Ransom

20.4.19

New INPIVX Service May Change the Ransomware Game

Ransomware

Bleepingcomputer

20.4.19

Mozilla Firefox to Enable Hyperlink Ping Tracking By Default

Security

Bleepingcomputer

20.4.19

The New Microsoft Edge Sometimes Impersonates Other Browsers

Security

Bleepingcomputer

20.4.19

Google to Block Logins from Embedded Browser Frameworks

Security

Bleepingcomputer

20.4.19

The HotList is The Latest Instagram Phishing Scam Attack

Phishing

Bleepingcomputer

20.4.19

Cyber Attack Forces The Weather Channel Off the Air

Attack

Bleepingcomputer

20.4.19

Unsecured Databases Leak 60 Million Records of Scraped LinkedIn Data

Incindent

Bleepingcomputer

20.4.19

Ride-Hailing Company Exposes Sensitive Info of Iranian Drivers

Incindent

Bleepingcomputer

20.4.19

Windows 10 Application Guard Added to the New Microsoft Edge

Security

Bleepingcomputer

20.4.19

RevengeRAT Distributed via Bit.ly, BlogSpot, and Pastebin C2 Infrastructure

Virus

Bleepingcomputer

20.4.19

Easter Attack Affects Half a Billion Apple iOS Users via Chrome Bug

iOS

Threatpost

20.4.19

Three-Fourths of Consumers Don’t Trust Facebook, Threatpost Poll Finds

Social

Threatpost

20.4.19

Shopify Flaw Exposed Thousands of Merchants’ Revenue, Traffic Numbers

Incindent

Threatpost

20.4.19

Insecure Ride App Database Leaks Data of 300K Iranian Drivers

Incindent

Threatpost

20.4.19

Microsoft’s Latest Patch Hoses Some Antivirus Software

Vulnerebility

Threatpost

20.4.19

Weather Channel Knocked Off-Air in Dangerous Precedent

Cyber

Threatpost

20.4.19

Poll: Facebook Harvests Email Contacts for 1.5M Users – Is Enough, Enough?

Social

Threatpost

20.4.19

Cisco Patches Critical Flaw In ASR 9000 Routers

Vulnerebility

Threatpost

20.4.19

Hacker broke into super secure French Government’s Messaging App Tchap hours after release

BigBrothers

Securityaffairs

20.4.19

Facebook admitted to have stored millions of Instagram users’ passwords in plaintext

Social

Securityaffairs

20.4.19

Operator of Codeshop Cybercrime Marketplace Sentenced to 90 months in prison

CyberCrime

Securityaffairs

20.4.19

Source code of tools used by OilRig APT leaked on Telegram

APT

Securityaffairs

20.4.19

Ransomware attack knocks Weather Channel off the Air

Ransomware

Securityaffairs

20.4.19

Broadcom WiFi Driver bugs expose devices to hack

Hacking

Securityaffairs

20.4.19

Google to Block Logins From Embedded Browsers to Prevent Phishing

Phishing

Securityaffairs

20.4.19

Facebook Collected Email Contacts of 1.5 Million Users Without Consent

Social

Securityweek

20.4.19

Operator of Codeshop Cybercrime Marketplace Sentenced to Prison

CyberCrime

Securityweek

20.4.19

Facebook Stored Millions of Instagram Users' Passwords in Plaintext

Social

Thehackernews

20.4.19

Hacker Breaks Into French Government's New Secure Messaging App

BigBrothers

Thehackernews

19.4.19

Hacker Group Exposes Iranian APT Operations and Members

APT

Bleepingcomputer

19.4.19

DLL Cryptomix Ransomware Variant Installed Via Remote Desktop

Ransomware

Bleepingcomputer

19.4.19

'Sea Turtle' Campaign Focuses on DNS Hijacking to Compromise Targets

Cyber

Bleepingcomputer

19.4.19

Broadcom WiFi Driver Flaws Expose Computers, Phones, IoT to RCE Attacks

Attack

Bleepingcomputer

19.4.19

Instagram Only Showing a Blank White Screen for Many Users

Social

Bleepingcomputer

19.4.19

Microsoft Edge File Permissions Clash with IE, Allow XXE Attacks

Attack

Bleepingcomputer

19.4.19

Evernote Fixes Remote Code Execution Vulnerability in macOS App

Apple

Bleepingcomputer

19.4.19

Malicious AutoHotkey Scripts Used to Steal Info, Remotely Access Systems

Virus

Bleepingcomputer

19.4.19

Navicent Health Data Breach Exposes Patient's Personal Info

Incindent

Bleepingcomputer

19.4.19

UK Announces Introduction of Online Pornography Age Checks in July

Security

Bleepingcomputer

19.4.19

Analyzing OilRig’s malware that uses DNS Tunneling

Virus

Securityaffairs

19.4.19

Drupal patched security vulnerabilities in Symfony, jQuery

Vulnerebility

Securityaffairs

19.4.19

Facebook ‘unintentionally’ collected contacts from 1.5 Million email accounts without permission

Social

Securityaffairs

19.4.19

APT28 and Upcoming Elections: evidence of possible interference (Part II)

APT

Securityaffairs

19.4.19

State-Sponsored Hackers Use Sophisticated DNS Hijacking in Ongoing Attacks

Attack

Securityweek

19.4.19

Russian Hackers Use RATs to Target Financial Entities

Virus

Securityweek

19.4.19

Symfony, jQuery Vulnerabilities Patched in Drupal

Vulnerebility

Securityweek

19.4.19

Network DoS Attack on PLCs Can Disrupt Physical Processes

Attack

Securityweek

19.4.19

Cisco Patches Critical Flaw in ASR 9000 Routers

Vulnerebility

Securityweek

19.4.19

Mysterious Operative Haunted Kaspersky Critics

Security

Securityweek

19.4.19

Bad Bots Steal Accounts, Content and Skew the Web Ecosystem

BotNet

Securityweek

19.4.19

Fortinet Settles Whistleblower Case for $545,000

Security

Securityweek

19.4.19

Facebook Stored Millions of Instagram Users' Passwords in Plaintext

Social

Thehackernews

19.4.19

Facebook Collected Contacts from 1.5 Million Email Accounts Without Users' Permission

Social

Thehackernews

19.4.19

DevSecOps: Fast development without sacrificing safety

Security

Net-security

19.4.19

Google will check apps by new developers more thoroughly

Security

Net-security

19.4.19

Building a modern data registry: Go beyond data classification

Security

Net-security

19.4.19

Worldwide IT spending to grow just 1.1% in 2019

IT

Net-security

19.4.19

The biggest hurdles to digital transformation initiatives? Budget and top-down support

Security

Net-security

18.4.19

Researchers: Facebook’s Data-Leveraging Scandal Puts Users on Notice

Social

Threatpost

18.4.19

ThreatList: Bad Bots Account for a Fifth of All Web Traffic, FinServ Hit the Worst

BotNet

Threatpost

18.4.19

State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally

Hacking

Threatpost

18.4.19

Ubiquitous Bug Allows HIPAA-Protected Malware to Hide Behind Medical Images

Virus

Threatpost

18.4.19

Russian TA505 threat actor target financial entities worldwide

APT

Securityaffairs

18.4.19

Cisco addresses a critical bug in ASR 9000 series Routers

Vulnerebility

Securityaffairs

18.4.19

RCE flaw in Electronic Arts Origin client exposes gamers to hack

Incindent

Securityaffairs

18.4.19

Code execution – Evernote

Hacking

Securityaffairs

18.4.19

Drupal Releases Core CMS Updates to Patch Several Vulnerabilities

Vulnerebility

Thehackernews

18.4.19

Researcher Hijacks a Microsoft Service Using Loophole in Azure Cloud Platform

Hacking

Thehackernews

18.4.19

Over 100 Million JustDial Users' Personal Data Found Exposed On the Internet

Incindent

Thehackernews

18.4.19

Microsoft 365 security: Protecting users from an ever-evolving threat landscape

Security

Net-security

18.4.19

Broadcom WiFi chipset drivers contain multiple vulnerabilities

Vulnerebility

Alert

18.4.19

Malware Sample Delivered Through UDF Image

Virus

SANS

18.4.19

One hundred percent of endpoint security tools eventually fail

Security

Net-security

18.4.19

The perimeter is vanishing, how will you secure your network?

Security

Net-security

18.4.19

Consumers willing to adopt smart payments but companies need to guarantee security

Security

Net-security

18.4.19

Which organizations place a premium on security and privacy?

Privacy

Net-security

18.4.19

HITB Haxpo 2019: Celebrating the culture of hacking through the years

Congress

Net-security

18.4.19

Attention CISOs: Five steps to get the security funding you need

Security

Net-security

17.4.19

Wipro Confirms Hack and Supply Chain Attacks on Customers

Attack

Threatpost

17.4.19

Windows Zero-Day Emerges in Active Exploits

Exploit

Threatpost

17.4.19

Authentication Bypass Bug Hits Top Enterprise VPNs

Vulnerebility

Threatpost

17.4.19

Malspam Campaigns Distribute HawkEye Keylogger, Post Ownership Change

Spam

Threatpost

17.4.19

Oracle Squashes 53 Critical Bugs in April Security Update

Vulnerebility

Threatpost

17.4.19

Justdial is leaking personal details of all customers real-time

Incindent

Securityaffairs

17.4.19

Russian Hackers Scrambled to Erase Digital Footprints After Triton Attribution Report

Hacking

Securityweek

17.4.19

Brazilian Hackers Described as Adaptable Pirates

Hacking

Securityweek

17.4.19

Researcher Took Control of Microsoft's Live Tile Service, Defacement PoC Demoed

Exploit

Bleepingcomputer

17.4.19

Script Kiddies Do What They Do Best: Infect Themselves

Virus

Bleepingcomputer

17.4.19

Over 80% of All Phishing Attacks Targeted U.S. Organizations

BigBrothers

Bleepingcomputer

17.4.19

'NamPoHyu Virus' Ransomware Targets Remote Samba Servers

Ransomware

Bleepingcomputer

17.4.19

Twitter Announces 'Hide Replies' Feature, Less Reliance on User Reports

Social

Bleepingcomputer

17.4.19

Malvertising Campaign Abused Chrome to Hijack 500 Million iOS User Sessions

iOS

Bleepingcomputer

17.4.19

New Microsoft Edge to Warn Users When in Administrator Mode

IT

Bleepingcomputer

17.4.19

Hacker Group Uses RATVERMIN Backdoor to Target Ukrainian Military

BigBrothers

Bleepingcomputer

17.4.19

Scranos Operation Uses Signed Rootkit to Steal Login and Payment Info

Virus

Bleepingcomputer

17.4.19

European Commission is not in possession of evidence of issues with Kaspersky products

BigBrothers

Securityaffairs

17.4.19

A new variant of HawkEye stealer emerges in the threat landscape

Virus

Securityaffairs

17.4.19

eGobbler hackers used Chrome bug to deliver 500Million+ ads to iOS users

iOS

Securityaffairs

17.4.19

Iranian Hackers Heavily Reliant on DNS Tunneling

BigBrothers

Securityweek

17.4.19

European Commission: No Evidence of Issues With Kaspersky Products

BigBrothers

Securityweek

17.4.19

Blue Cross of Idaho data breach, 5,600 customers affected

Virus

Securityaffairs

17.4.19

FireEye releases FLASHMINGO tool to analyze Adobe Flash files

Security

Securityaffairs

17.4.19

Oracle Releases 297 Fixes in April 2019 Critical Patch Update

Vulnerebility

Securityweek

17.4.19

State Launches Online Data Survey as Part of Facebook Probe

Social

Securityweek

17.4.19

Cyber Espionage Campaign Against Ukrainian Government Continues

CyberSpy

Securityweek

17.4.19

Cross-Platform Rootkit and Spyware Hits Targets Worldwide

Virus

Securityweek

17.4.19

Blue Cross of Idaho Hacked, Some Member Information Accessed

Hacking

Securityweek

17.4.19

A few Ghidra tips for IDA users, part 2 - strings and parameters

Virus

SANS

17.4.19

What’s in a cybersecurity question? Getting to the root of cyber insights

Cyber

Net-security

17.4.19

Banks continue to prioritize risk management over customer convenience

Security

Net-security

17.4.19

What you can expect at Cyber Week 2019

Congress

Net-security

17.4.19

Cyber espionage and sabotage attacks pose an increasing threat to the energy industry

CyberSpy

Net-security

16.4.19

Adblock Plus filter can be exploited to execute arbitrary code in web pages

Exploit

Securityaffairs

16.4.19

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Virus

Securityaffairs

16.4.19

Ecuador suffered 40 Million Cyber attacks after the Julian Assange arrest

BigBrothers

Securityaffairs

16.4.19

CVE-2019-0803 Windows flaw exploited to deliver PowerShell Backdoor

Exploit

Securityaffairs

16.4.19

New Variant of HawkEye Stealer Emerges

Virus

Securityweek

16.4.19

Norsk Hydro Delays Financial Report Due to Cyberattack

Attack

Securityweek

16.4.19

Open Source Tool From FireEye Automates Analysis of Flash Files

Security

Securityweek

16.4.19

Intel Adds Hardware Shield to New 8th Gen Intel Core vPro Mobile CPUs

IT

Securityweek

16.4.19

Google Makes it Tough for Rogue App Developers Get Back on Android Play Store

Android

Thehackernews

16.4.19

Scranos: New Rapidly Evolving Rootkit-Enabled Spyware Discovered

Virus

Thehackernews

16.4.19

Hackers used credentials of a Microsoft Support worker to access users’ webmail

Incindent

Net-security

16.4.19

Employee cybersecurity essentials part 2: Lost devices and unsafe connections

Cyber

Net-security

16.4.19

Fake Instagram Apps on Google Play Harvest User Logins

Android

Threatpost

16.4.19

TicTocTrack Smartwatch Flaws Can Be Abused to Track Kids

Vulnerebility

Threatpost

16.4.19

Authentication Bypass Bug Hits Top Enterprise VPNs

Vulnerebility

Threatpost

16.4.19

Adblock Plus Filters Can Be Exploited to Run Malicious Code

Virus

Bleepingcomputer

16.4.19

New Malicious Medical DICOM Image Files Cause HIPAA Headache

Virus

Bleepingcomputer

16.4.19

Mobile VPNs Promoted by 'You Are Infected' or 'Hacked' Ads

Virus

Bleepingcomputer

16.4.19

Gnosticplayers round 5 – 65 Million+ fresh accounts from 6 security breaches available for sale

Incindent

Securityaffairs

16.4.19

Hackers Access Microsoft Email Services Accounts

Hacking

Securityweek

16.4.19

Ecuador Says Hit by 40 Million Cyber Attacks Since Assange Arrest

Cyber

Securityweek

16.4.19

Odd DNS Requests that are Normal

Security

SANS

16.4.19

Bad security hygiene still a major risk for enterprise IT networks

Security

Net-security

16.4.19

As IT security automation increases, so does the need for highly skilled staff

Security

Net-security

16.4.19

What is driving organizations’ cloud adoption?

Security

Net-security

15.4.19

Hackers Publish AAF Member Data, Claim It's 'FBI Watchlist'

BigBrothers

Bleepingcomputer

15.4.19

Important Severity Remote Code Execution Vulnerability Patched in Tomcat

Vulnerebility

Bleepingcomputer

15.4.19

Patched Windows Zero-Day Provided Full Control Over Vulnerable Systems

Vulnerebility

Bleepingcomputer

15.4.19

A new DDoS technique abuses HTML5 Hyperlink Audit Ping in massive attacks

Attack

Securityaffairs

15.4.19

Utah County Struck by Ransomware

Ransomware

Securityweek

15.4.19

Microsoft Outlook Breach Widens in Scope, Impacting MSN And Hotmail – Report

Incindent

Threatpost

15.4.19

Authentication Bypass Bug Hits Top Enterprise VPNs

Vulnerebility

Threatpost

15.4.19

Rogue Waves: Preparing the Internet for the Next Mega DDoS Attack

Attack

Threatpost

15.4.19

New zero-day vulnerability CVE-2019-0859 in win32k.sys

Vulnerebility

Securelist

15.4.19

Google introduces many G Suite security enhancements

Security

Net-security

15.4.19

Healthcare orgs have to achieve true cybersecurity, not only compliance

Cyber

Net-security

15.4.19

The Apache Software Foundation has released

Vulnerebility

Securityaffairs

15.4.19

Locked Shields 2019 – Chapeau, France wins Cyber Defence Exercise

BigBrothers

Securityaffairs

15.4.19

Windows Flaw Exploited to Deliver PowerShell Backdoor

Exploit

Securityweek

15.4.19

Large-scale DDoS Attack Abuses HTML's Hyperlink Audit Ping Facility

Attack

Securityweek

15.4.19

Google Helps Police Identify Devices Close to Crime Scenes Using Location Data

BigBrothers

Thehackernews

15.4.19

Apache Tomcat Patches Important Remote Code Execution Flaw

Vulnerebility

Thehackernews

15.4.19

Multiple Enterprise VPN Apps Allow Attackers to Bypass Authentication

Attack

Bleepingcomputer

15.4.19

Yellow Pencil WordPress Plugin flaw expose tens of thousands of sites

Vulnerebility

Securityaffairs

15.4.19

Romanian duo convicted of fraud Scheme infecting 400,000 computers

Virus

Securityaffairs

15.4.19

Major coordinated disinformation campaign hit the Lithuanian Defense

BigBrothers

Securityaffairs

15.4.19

Whatsapp, Instagram, Facebook down worldwide

Social

Securityaffairs

15.4.19

Attackers hacked support agent to access Microsoft Outlook email accounts

Attack

Securityaffairs

15.4.19

Manufacturing sector most vulnerable to insider threats

Vulnerebility

Net-security

15.4.19

The top emerging risks organizations are facing

Security

Net-security

15.4.19

The correlation between DDoS attacks and cryptomining

Cryptocurrency

Net-security

14.4.19

The Muddy Waters of APT Attacks

APT blog

Checkpoint

14.4.19

Two in Three Hotel Websites Leak Guest Booking Details and Allow Access to Personal Data

Incident blog

Symantec

14.4.19

Microsoft Patch Tuesday – April 2019

Vulnerebility blog

Symantec

14.4.19

Virtually Unlimited Memory: Escaping the Chrome Sandbox

Vulnerebility blog

Project Zero

14.4.19

Sextortion profits decline despite higher volume, new techniques

Spam blog

Cisco Talos

14.4.19

Vulnerability Spotlight: Adobe Acrobat Reader remote code execution

Vulnerebility blog

Cisco Talos

14.4.19

Gustuff banking botnet targets Australia

BotNet blog

Cisco Talos

14.4.19

Microsoft Patch Tuesday — April 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

14.4.19

Hackers crack university defenses in just two hours

Hacking blog

Eset

14.4.19

WPA3 flaws may let attackers steal Wi-Fi passwords

Attack blog

Eset

14.4.19

Credential-stuffing attacks behind 30 billion login attempts in 2018

Incident blog

Eset

14.4.19

OceanLotus: macOS malware update

Malware blog

Eset

14.4.19

The Nasty List Phishing Scam is Sweeping Through Instagram

Phishing

Bleepingcomputer

14.4.19

RobbinHood Ransomware Claims It's Protecting Your Privacy

Ransomware

Bleepingcomputer

14.4.19

These hackers have breached FBI-affiliated websites and leaked data online

BigBrothers

Securityaffairs

14.4.19

Microsoft's Work with Chinese Military University Raises Eyebrows

BigBrothers

Securityweek

14.4.19

Hackers Compromise Microsoft Support Agent to Access Outlook Email Accounts

Hacking

Thehackernews

14.4.19

Configuring MTA-STS and TLS Reporting For Your Domain

Crypto

SANS

13.4.19

Windows is Slower After April 2019 Updates According to Users

Vulnerebility

Bleepingcomputer

13.4.19

Bill Introduced to Protect the Privacy Rights of Americans

Security

Bleepingcomputer

13.4.19

Malware Creates Cryptominer Botnet Using EternalBlue and Mimikatz

Cryptocurrency

Bleepingcomputer

13.4.19

Thousands of WordPress Sites Exposed by Yellow Pencil Plugin Flaw

Vulnerebility

Bleepingcomputer

13.4.19

Sextortion Scammers Change Tactics to Bypass Spam Protection

Spam

Bleepingcomputer

13.4.19

The hacker behind Matrix.org hack offers advice to improve security

Hacking

Securityaffairs

13.4.19

Malware campaign uses multiple propagation methods, including EternalBlue

Virus

Securityaffairs

13.4.19

Siemens addressed several DoS flaws in many products

ICS

Securityaffairs

13.4.19

Russia Fines Facebook $47 Over Citizens' Data Privacy Dispute

Social

Thehackernews

13.4.19

Encrypted Messaging Project "Matrix" Suffers Extensive Cyber Attack

Attack

Thehackernews

13.4.19

WPA3 design issues and implementation vulnerabilities in hostapd and wpa_supplicant

Alert

Alert

12.4.19

APT28 and Upcoming Elections: evidence of possible interference

APT

Securityaffairs

12.4.19

Emsisoft released a free decryptor for CryptoPokemon ransomware

Ransomware

Securityaffairs

12.4.19

VPN apps insecurely store session cookies in memory and log files

Security

Securityaffairs

12.4.19

Zero-day in popular Yuzo Related Posts WordPress Plugin exploited in the wild

Exploit

Securityaffairs

12.4.19

Microsoft Introduces Security Configuration Framework

Security

Securityweek

12.4.19

Attacker Offers Advice to Matrix.org After Hacking Its Systems

Attack

Securityweek

12.4.19

UK Government Proposes Digital Harms Legislation to Regulate Online Content

BigBrothers

Securityweek

12.4.19

Facebook Pays $120,000 in Bounties at BountyCon

Social

Securityweek

12.4.19

Industry Reactions to New Triton Attacks on Critical Infrastructure

ICS

Securityweek

12.4.19

Bayrob Malware Operators Convicted in the U.S.

Virus

Securityweek

12.4.19

SAS 2019: Joe FitzPatrick Warns of the ‘$5 Supply Chain Attack’

Congress

Threatpost

12.4.19

North Korea’s Hidden Cobra Strikes U.S. Targets with HOPLIGHT

APT

Threatpost

12.4.19

WordPress Yellow Pencil Plugin Flaws Actively Exploited

Exploit

Threatpost

12.4.19

ThreatList: Tax Scammers Launch a Raft of Fake Mobile Apps

Spam

Threatpost

12.4.19

Romanian Duo Convicted of Malware Scheme Infecting 400,000 Computers

Virus

Threatpost

12.4.19

WordPress Urges Users to Uninstall Yuzo Plugin After Flaw Exploited

Exploit

Threatpost

12.4.19

SAS 2019: Fake News Peddlers Adopt Clever New Trick to Fool Facebook, Twitter

Congress

Threatpost

12.4.19

Amazon Auditors Listen to Echo Recordings, Report Says

Security

Threatpost

12.4.19

When Windows 10 Comes to Live: The First Few Minutes in the Live of a Windows 10 System

IT

SANS

12.4.19

Enterprise VPN apps store authentication and session cookies insecurely

Security

Net-security

12.4.19

A quarter of phishing emails bypass Office 365 security

Phishing

Net-security

12.4.19

77% of orgs lack a cybersecurity incident response plan

Incindent

Net-security

12.4.19

CryptoPokemon

Anti-Ramson Tool

Anti-Ramson Tool

12.4.19

Hacked Uniden Commercial Site Serves Emotet Trojan

Virus

Bleepingcomputer

12.4.19

Mozilla Firefox For ARM64 Beta Now Available

IT

Bleepingcomputer

12.4.19

Home Office Leaks the Emails of Hundreds of EU Citizens

Incindent

Bleepingcomputer

12.4.19

Tax Fraud and ID Theft Services Getting Cheaper on the Dark Web

Incindent

Bleepingcomputer

12.4.19

Hyperlink Auditing Pings Being Used to Perform DDoS Attacks

Attack

Bleepingcomputer

12.4.19

Microsoft's April 2019 Updates are Causing Windows to Freeze

Vulnerebility

Bleepingcomputer

12.4.19

VSDC Site Hacked Again to Spread Password Stealing Malware

Virus

Bleepingcomputer

12.4.19

Office 365 Team Discovers Phishing Email Pushing WinRAR Exploit

Exploit

Bleepingcomputer

12.4.19

Popular Yuzo WordPress Plugin Exploited to Redirect Users to Scams

Exploit

Bleepingcomputer

12.4.19

WPA3 Wi-Fi Standard Affected by New Dragonblood Vulnerabilities

Attack

Bleepingcomputer

12.4.19

Threat Group Uses Pastebin, GitHub In SneakyPastes Operation

Security

Bleepingcomputer

12.4.19

Windows 10 Insider Build 18875 Released, Merges Fast and Skip Ahead Rings

Vulnerebility

Bleepingcomputer

12.4.19

DHS and FBI Issue Advisory on North Korean HOPLIGHT Malware

BigBrothers

Bleepingcomputer

12.4.19

Google Wants To Block Potentially Risky Non-Secure Downloads

Security

Bleepingcomputer

12.4.19

New Extortion Email Threatens to Install WannaCry and DDoS Your Network

Attack

Bleepingcomputer

12.4.19

New TajMahal Cyberespionage Kit Includes 80 Malicious Modules

Virus

Bleepingcomputer

12.4.19

25% of Phishing Emails Bypass Office 365 Default Security

Phishing

Bleepingcomputer

12.4.19

Two Thirds of Hotel Sites Leak Guest Booking Info to Third-Parties

Incindent

Bleepingcomputer

12.4.19

Chrome Saying It's Managed by Your Organization May Indicate Malware

Virus

Bleepingcomputer

12.4.19

VSDC video editing software website hacked again

Hacking

Securityaffairs

12.4.19

FBI/DHS MAR report details HOPLIGHT Trojan used by Hidden Cobra APT

APT

Securityaffairs

12.4.19

VMware Patches DoS, Information Disclosure Flaws in Graphics Components

Vulnerebility

Securityweek

12.4.19

WikiLeaks Set 21st Century Model for Cyber-Leak Journalism

Security

Securityweek

12.4.19

Many New Security Features, Services Added to Google Cloud

Security

Securityweek

12.4.19

Julian Assange: A Decade of Stunning Leaks of U.S. Secrets

BigBrothers

Securityweek

12.4.19

Russian MPs Approve Controversial Bill Restricting Internet

BigBrothers

Securityweek

12.4.19

Enterprise IoT Security Firm Armis Raises $65 Million

IoT

Securityweek

12.4.19

Hamas-Linked Threat Actor's Infrastructure Disrupted

APT

Securityweek

12.4.19

The surveillance economy has set its sights on smartphone sensors

Mobil

Net-security

12.4.19

How password-less security benefits helpdesks

Security

Net-security

12.4.19

Who are the biggest targets of credential stuffing attacks?

Attack

Net-security

11.4.19

Large-scale SIM swap fraud

Mobil

Securelist

11.4.19

WikiLeaks Founder Julian Assange arrested and charged in US with computer hacking conspiracy

Crime

Securityaffairs

11.4.19

Assange Charged in US With Computer Hacking Conspiracy

Crime

Securityweek

11.4.19

U.S. Attributes New Trojan to North Korean Hackers

BigBrothers

Securityweek

11.4.19

Siemens Patches Serious DoS Flaws in Many Industrial Products

Vulnerebility

Securityweek

11.4.19

Assange Arrested in London After Ecuador Withdraws Asylum

Crime

Securityweek

11.4.19

Amazon Auditors Listen to Echo Recordings, Report Says

Security

Threatpost

11.4.19

SAS 2019: Fake News Peddlers Adopt Clever New Trick to Fool Facebook, Twitter

Congress

Threatpost

11.4.19

Popular Video Editing Software Website Hacked to Spread Banking Trojan

Virus

Thehackernews

11.4.19

WikiLeaks Founder Julian Assange Arrested After Ecuador Withdraws Asylum

Crime

Thehackernews

11.4.19

Security Flaws in WPA3 Protocol Let Attackers Hack WiFi Password

Attack

Thehackernews

11.4.19

How to Find Hidden Cameras in your AirBNB

Privacy

SANS

11.4.19

WPA3 design flaws affect security of new Wi-Fi standard

Vulnerebility

Net-security

11.4.19

WikiLeaks’ Julian Assange arrested in London

Crime

Net-security

11.4.19

TRITON attackers detected at another critical infrastructure facility

ICS

Net-security

11.4.19

WPA3 attacks allow hackers to hack Wi-Fi password

Attack

Securityaffairs

11.4.19

SAP April 2019 Security Patch Day addresses High severity flaws in Crystal Reports, NetWeaver

Vulnerebility

Securityaffairs

11.4.19

Genesis Store black marketplace offers more than 60k+ stolen bot profiles

CyberCrime

Securityaffairs

11.4.19

'Dragonblood' Flaws in WPA3 Allow Recovery of Wi-Fi Passwords

Attack

Securityweek

11.4.19

Cars Exposed to Hacker Attacks by Hardcoded Credentials in MyCar Apps

Hacking

Securityweek

11.4.19

Cloud Security Firm Bitglass Raises $70 Million

IT

Securityweek

11.4.19

Baldr Stealer Malware Active in the Wild With Ongoing Updates

Virus

Securityweek

11.4.19

TajMahal APT Can Steal Data From CDs, Printer Queues

APT

Securityweek

11.4.19

Over 60,000 Stolen Profiles Sold on Underground Marketplace

Incindent

Securityweek

11.4.19

SAS 2019: Triton ICS Malware Hits A Second Victim

Congress

Threatpost

11.4.19

SAS 2019: Joe FitzPatrick Warns of the ‘$5 Supply Chain Attack’

Congress

Threatpost

11.4.19

The Anatomy of Threat Hunting: What You Need to Know and Why

Security

Threatpost

11.4.19

Vendor risk management programs are running harder just to stay in place

Security

Net-security

11.4.19

Regulating the IoT: Impact and new considerations for cybersecurity and new government regulations

IoT

Net-security

11.4.19

Finance knocks business and professional services off top spot in four most attacked industries

Security

Net-security

11.4.19

Mainframe security is top priority for 85% of IT pros yet few are adequately protecting their systems

Security

Net-security

10.4.19

Yahoo Offers $117.5M Settlement in Data Breach Lawsuit

Incindent

Threatpost

10.4.19

The Anatomy of Threat Hunting: What You Need to Know and Why

Security

Threatpost

10.4.19

SAS 2019: Triton ICS Malware Hits A Second Victim

Congress

Threatpost

10.4.19

[SI-LAB] EMOTET spread in Chile impacted hundreds of users and targeted financial and banking services

Virus

Securityaffairs

10.4.19

Minnesota Department of Human Services suffered a security breach

Securityaffairs

10.4.19

Microsoft April 2019 Patch Tuesday fixes Windows 0days under attack

Vulnerebility

Securityaffairs

10.4.19

Sophisticated TajMahal APT Framework remained under the radar for 5 years

APT

Securityaffairs

10.4.19

Yoroi Welcomes “Yomi: The Malware Hunter”

Virus

Securityaffairs

10.4.19

Experts spotted a new Mirai variant that targets new processors

BotNet

Securityaffairs

10.4.19

Czech Court: Rights of Alleged Russian Hacker Violated

Security

Securityweek

10.4.19

SAP Patches High Severity Flaws in Crystal Reports, NetWeaver

Vulnerebility

Securityweek

10.4.19

Reservation Systems Used by Many Hotels Expose User Data

Incindent

Securityweek

10.4.19

Hackers Behind Triton ICS Malware Found in 2nd Critical Infrastructure Facility

ICS

Securityweek

10.4.19

Sophisticated 'TajMahal APT Framework' Remained Undetected for 5 Years

APT

Thehackernews

10.4.19

Demo Exploit Code Available for Privilege Escalation Bug in Windows

Exploit

Bleepingcomputer

10.4.19

Windows Server 2008 Requires KB4493730 to Get Future Updates

Vulnerebility

Bleepingcomputer

10.4.19

Criminal Market Sells Over 60K Digital Identities For $5-$200

CyberCrime

Bleepingcomputer

10.4.19

Microsoft's April 2019 Patch Tuesday Fixes 74 Vulnerabilities

Vulnerebility

Bleepingcomputer

10.4.19

Windows 10 April 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

10.4.19

Adobe Releases April 2019 Security Updates for Flash, Shockwave, and More

Vulnerebility

Bleepingcomputer

10.4.19

Cryptominers Still Top Threat In March Despite Coinhive Demise

Cryptocurrency

Bleepingcomputer

10.4.19

April 2019 Patch Tuesday: Microsoft fixes two actively exploited bugs

Vulnerebility

Net-security

10.4.19

Adobe Patch Tuesday updates for April 2019 address 43 flaws in its products

Vulnerebility

Securityaffairs

10.4.19

Yahoo proposes $117.5 million for the settlement of data breach

Incindent

Securityaffairs

10.4.19

Experts spotted the iOS version of the Exodus surveillance app

Apple

Securityaffairs

10.4.19

LimeRAT spreads in the wild

Virus

Securityaffairs

10.4.19

Minnesota State Agency Breach May Have Put Thousands at Risk

BigBrothers

Securityweek

10.4.19

Microsoft Patches Windows Privilege Escalation Flaws Exploited in Attacks

Exploit

Securityweek

10.4.19

New Mirai Variant Targets More Processor Architectures

BotNet

Securityweek

10.4.19

Adobe Patches 43 Flaws Across Eight Products

Vulnerebility

Securityweek

10.4.19

Microsoft Releases April 2019 Security Updates — Two Flaws Under Active Attack

Vulnerebility

Thehackernews

10.4.19

Adobe Releases Security Patches for Flash, Acrobat Reader, Other Products

Vulnerebility

Thehackernews

10.4.19

Gaza Cybergang Group1, operation SneakyPastes

APT

Securelist

10.4.19

Project TajMahal – a sophisticated new APT framework

APT

Securelist

10.4.19

SAS 2019: Meet ‘TajMahal,’ A New and Highly Advanced APT Framework

Congress

Threatpost

10.4.19

SAS 2019: Genesis Marketplace Peddles 60K Stolen Digital Identities

Congress

Threatpost

10.4.19

SAS 2019: Gaza Cybergang Blends Sophistication Levels in Highly Effective Spy Effort

Congress

Threatpost

10.4.19

Intel Patches High-Severity Flaws in Media SDK, Mini PC

Vulnerebility

Threatpost

10.4.19

Adobe Fixes 24 Critical Flaws in Acrobat Reader, Flash, Shockwave Player

Vulnerebility

Threatpost

10.4.19

Blue + Red: An Infosec Purple Pyramid

Hacking

SANS

10.4.19

Hacking healthcare: A call for infosec researchers to probe biomedical devices

Hacking

Net-security

10.4.19

What hackers inside your company are after: Convenience

Hacking

Net-security

10.4.19

Windows 10: New update controls for end users, automatic removal of broken updates

Vulnerebility

Net-security

10.4.19

Coinhive stops digging, but cryptomining still dominates

Cryptocurrency

Net-security

9.4.19

Distributor of the Reveton Police Ransomware Jailed by UK's NCA

Ransomware

Bleepingcomputer

9.4.19

New Info-stealer Baldr Emerges As a Reliable, Long-Term Player

Virus

Bleepingcomputer

9.4.19

Verizon Fixes Bugs Allowing Full Control of Fios Quantum Router

Vulnerebility

Bleepingcomputer

9.4.19

Mirai Botnet Variants Targeting New Processors and Architectures

BotNet

Bleepingcomputer

9.4.19

Phishing Scheme Uses Legit Signup Forms to Steal Payment Card Data

Phishing

Bleepingcomputer

9.4.19

Microsoft’s Chromium-Based Edge Coming to Windows 10 ARM PCs

IT

Bleepingcomputer

9.4.19

Xiaomi Browsers Still Vulnerable After Failed Patches

Vulnerebility

Bleepingcomputer

9.4.19

Windows 10 Microsoft Edge Installer Also Works on Windows 7

IT

Bleepingcomputer

9.4.19

Microsoft Released the Windows 10 May 2019 Update to Insiders

Vulnerebility

Bleepingcomputer

9.4.19

Anubis Android Trojan Spotted with Almost Functional Ransomware Module

Ransomware

Bleepingcomputer

9.4.19

The Chromium-Based Microsoft Edge Browser Is Now Available

IT

Bleepingcomputer

9.4.19

UK Investigating Microsoft, Nintendo and Sony for Billing Practices

BigBrothers

Bleepingcomputer

9.4.19

Cyber Attack Shuts Down Hoya Corp's Thailand Plant for Three Days

Cyber

Bleepingcomputer

9.4.19

Students Hack High School WiFi to Get Out of Tests

Hacking

Bleepingcomputer

9.4.19

UK Wants to Hold Companies Liable for Harmful Online Behavior

BigBrothers

Bleepingcomputer

9.4.19

Hacker's Claims of Breaching Israeli Voter Registry Under Investigation

BigBrothers

Bleepingcomputer

9.4.19

Digital Doppelgangers

Virus

Securelist

9.4.19

Researcher Reveals Multiple Flaws in Verizon Fios Routers — PoC Released

Vulnerebility

Thehackernews

9.4.19

iOS Version of Exodus Spyware Discovered in an Escalating Italian Spy Scandal

Apple

Securityweek

9.4.19

New Version of Flame Malware Platform Discovered

Virus

Securityweek

9.4.19

Duqu Remained Active After Operations Were Exposed in 2011

Virus

Securityweek

9.4.19

Verizon Patches Vulnerabilities Affecting Millions of Routers

Vulnerebility

Securityweek

9.4.19

Verizon Router Command Injection Flaw Impacts Millions

Exploit

Threatpost

9.4.19

Samsung Galaxy S10 Fingerprint Sensor Duped With 3D Print

Mobil

Threatpost

9.4.19

'Exodus' Surveillance Malware Found Targeting Apple iOS Users

Apple

Thehackernews

9.4.19

New Module Suggests Fourth Team Involved in Stuxnet Development

Virus

Securityweek

9.4.19

TP-Link Routers Vulnerable to Zero-Day Buffer Overflow Attack

Attack

Threatpost

9.4.19

SAS 2019: Genesis Marketplace Peddles 60K Stolen Digital Identities

Congress

Threatpost

9.4.19

SAS 2019: 4 Stuxnet-Related APTs Form Gossip Girl, an ‘Apex Threat Actor’

Congress

Threatpost

9.4.19

Gain immediate visibility into your actual cyber risk for free

Cyber

Net-security

9.4.19

PoC exploit for Carpe Diem Apache bug released

Exploit

Net-security

9.4.19

Gulf countries came under hackers’ spotlight in 2018, with more than 130 000 payment cards compromised

Incindent

Securityaffairs

9.4.19

AeroGrow suffered a payment card data breach

Incindent

Securityaffairs

9.4.19

Attorney: Mar-a-Lago Infiltrator Had Hidden-Camera Detector

Virus

Securityweek

9.4.19

Leap in Cyber Attacks Against Elections in OECD Countries: Canada

Attack

Securityweek

9.4.19

SEC Allows Shareholder Votes on Amazon Facial "Rekognition"

Spam

Securityweek

9.4.19

Apple Device Management Firm Fleetsmith Raises $30 Million

Apple

Securityweek

9.4.19

A few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code

Virus

SANS

9.4.19

Is your organization getting physical security right?

Security

Net-security

9.4.19

Adhering to the mobility requirements of NIST 800-171 does not have to keep you awake at night

Security

Net-security

9.4.19

Framing supply chain attacks

Attack

Net-security

9.4.19

90% of OT organizations are cyberattack victims, yet visibility into OT systems is still limited

Cyber

Net-security

8.4.19

SAS 2019: Exodus Spyware Found Targeting Apple iOS Users

Congress

Threatpost

8.4.19

Spam Campaigns Spread TrickBot Malware with Tax Lure

Spam

Threatpost

8.4.19

Victims of Planetary Ransomware can decrypt their files for free

Ransomware

Securityaffairs

8.4.19

Recent Roaming Mantis campaign hit hundreds of users worldwide

Cyber

Securityaffairs

8.4.19

Cyber Risk Company RiskLens Raises $20 Million

IT

Securityweek

8.4.19

With $600 Million Cybersecurity Budget, JPMorgan Chief Endorses AI and Cloud

Cyber

Securityweek

8.4.19

Cost of Data Breach in UK Increases More Than 41% in Two Years

Incindent

Securityweek

8.4.19

NSA Releases Reverse Engineering Tool’s Source Code

BigBrothers

Securityweek

8.4.19

Most OT Organizations Hit by Damaging Cyberattacks: Survey

Cyber

Securityweek

8.4.19

FileTSAR: Free digital forensic investigations toolkit for law enforcement

Forensics

Net-security

8.4.19

Magento sites under attack through easily exploitable SQLi flaw

Exploit

Net-security

8.4.19

Decrypter for Planetary

Anti-Ramson Tool

Anti-Ramson Tool

8.4.19

Sextortion Scams Now Using Password Protected Evidence Files

Spam

Bleepingcomputer

8.4.19

Planetary Ransomware Decryptor Gets Your Files Back For Free

Ransomware

Bleepingcomputer

8.4.19

Major Browsers to Prevent Disabling of Click Tracking Privacy Risk

Privacy

Bleepingcomputer

8.4.19

AI Chatbot Helps People Find Info on Scams and Frauds

Spam

Bleepingcomputer

8.4.19

Unofficial patches released for Java flaws disclosed by Google Project Zero

Vulnerebility

Securityaffairs

8.4.19

Rockwell Automation fixes multiple DoS flaws in Stratix Switch introduced by Cisco Software

Vulnerebility

Securityaffairs

8.4.19

Payment Card Data Stolen From AeroGrow Website

Incindent

Securityweek

8.4.19

Fake Office 365 Payment Information Update

Phishing

SANS

8.4.19

Perimeter solutions: Do layers of security make a difference?

Security

Net-security

8.4.19

CIOs and CISOs hold off on crucial updates due to potential impact on business operations

Security

Net-security

8.4.19

Securing your app and driving down call center fraud

Mobil

Net-security

8.4.19

Insights gained from working on more than 750 cybersecurity incidents

Cyber

Net-security

8.4.19

The unique business-critical threats facing converged IT-OT systems

Security

Net-security

8.4.19

Scaling innovation is critical for digital transformation success, but clearly presents a challenge

Security

Net-security

7.4.19

DNS hijacking campaigns target Gmail, Netflix, and PayPal users

Hacking

Securityaffairs

7.4.19

FIN6 group starts using LockerGoga and Ryuk Ransomware

Ransomware

Securityaffairs

7.4.19

DoS flaw in several MikroTik Routers exploited in attacks

Exploit

Securityaffairs

7.4.19

Magento Attacked Through Card Skimming Exploit

Exploit

Securityaffairs

6.4.19

Genesee County, Michigan Recovering from Ransomware Attack

Ransomware

Bleepingcomputer

6.4.19

FIN6 Group Diversifies Activity, Uses LockerGoga and Ryuk Ransomware

Ransomware

Bleepingcomputer

6.4.19

Google Adding Chrome Admin Policy to Uninstall Blacklisted Extensions

Security

Bleepingcomputer

6.4.19

Qt5-Based GUI Apps Susceptible to Remote Code Execution

Exploit

Bleepingcomputer

6.4.19

Year-Old DoS Vulnerability Allows Attacks on Some MikroTik Routers

Vulnerebility

Bleepingcomputer

6.4.19

EU States Test and Strengthen Readiness for Election Cyber Threats

Cyber

Bleepingcomputer

6.4.19

Cybercrime Market with Roughly 385,000 Members Found on Facebook

Social

Bleepingcomputer

6.4.19

Ransom

Anti-Ramson Tool

Anti-Ramson Tool

6.4.19

Hackers can add, remove cancer and other illnesses from Computer Tomography scans

Hacking

Securityaffairs

6.4.19

Hackers Can Add, Remove Cancer From CT Scans: Researchers

Hacking

Securityweek

6.4.19

Ongoing DNS Hijacking Campaign Targets Gmail, PayPal, Netflix Users

Phishing

Securityweek

6.4.19

Beagle: Graph transforms for DFIR data & logs

Security

SANS

5.4.19

ICO Fines London Council for Gangs Matrix Data Leak Exposing 203 People

Incindent

Bleepingcomputer

5.4.19

Study Shows Screen Time Before Bed Is Not Bad For Teenagers

Security

Bleepingcomputer

5.4.19

Beware of Calls Saying Your Social Security Number is Suspended

Social

Bleepingcomputer

5.4.19

Xwo Malware scans the Internet for Exposed Services, Default Passwords

Virus

Securityaffairs

5.4.19

Ursnif: The Latest Evolution of the Most Popular Banking Malware

Virus

Securityaffairs

5.4.19

Flaws in Pre-Installed security App on Xiaomi Phones open to hack them

Vulnerebility

Securityaffairs

5.4.19

Step By Step Office Dropper Dissection

Virus

Securityaffairs

5.4.19

More than 2 million Apache HTTP servers still affected by CVE-2019-0211 flaw

Vulnerebility

Securityaffairs

5.4.19

Foreign Interference in Canadian Election 'Very Likely', Says Minister

BigBrothers

Securityweek

5.4.19

Unofficial Patch Released for Java Flaws Found by Google Researcher

Vulnerebility

Securityweek

5.4.19

Rockwell Patches Stratix Switch Flaws Introduced by Cisco Software

Vulnerebility

Securityweek

5.4.19

Unpatched Flaw in Xiaomi's Built-in Browser App Lets Hackers Spoof URLs

Vulnerebility

Thehackernews

5.4.19

Hackers Abuse Google Cloud Platform to Attack D-Link Routers

Attack

Threatpost

5.4.19

LokiBot Trojan Spotted Hitching a Ride Inside .PNG Files

Virus

Threatpost

5.4.19

Consumer routers targeted by DNS hijacking attackers

Attack

Net-security

5.4.19

April Patch Tuesday Forecast: Be aware of end-of-service issues and browser exploits

Exploit

Net-security

5.4.19

Hundreds of millions of UC Browser users for Android are threatened

OS Blog

Dr Web

5.4.19

Doctor Web: Android banker Flexnet uses computer games to steal money from users

Cryptocurrency blog

Dr Web

5.4.19

Study of the Belonard Trojan, exploiting zero-day vulnerabilities in Counter-Strike 1.6

Vulnerebility blog

Dr Web

5.4.19

Doctor Web’s experts reveal a Trojan exploiting zero-day vulnerabilities of the official Counter Strike client

Malware blog

Dr Web

5.4.19

Doctor Web warns: Cybercriminals spread Android Trojans via Instagram

Malware blog

Dr Web

5.4.19

Doctor Web has detected malicious activity in a cryptocurrency monitoring tool 

Cryptocurrency blog

Dr Web

5.4.19

Reverse Engineering the April Fools Snake Game For Fun (and No Profit)

OS Blog

Checkpoint

5.4.19

Vulnerability in Xiaomi Pre-Installed Security App

Vulnerebility blog

Checkpoint

5.4.19

Dozens of Apps on Microsoft Store Displaying Adult, Gambling Content

Malware blog

Symantec

5.4.19

540 million records on Facebook users exposed by third-party apps

Social blog

Eset

5.4.19

NIST cybersecurity resources for smaller businesses

Security blog

Eset

5.4.19

Windows 10 Insider Build 18362.30 Released to Fix Boot Breaking Bug

Vulnerebility

Bleepingcomputer

5.4.19

Researchers Hack Google Maps Snake Game to Add God Mode, AI Auto-Play

Hacking

Bleepingcomputer

5.4.19

Microsoft Is Redesigning the Windows 10 Update Experience

Vulnerebility

Bleepingcomputer

5.4.19

Windows 10 May 2019 Update Announced, Insiders Get it First

Vulnerebility

Bleepingcomputer

5.4.19

Xiaomi Pre-Installed Security App Vulnerable to MiTM Attacks

Attack

Bleepingcomputer

5.4.19

Samsung Galaxy S10 Fingerprint Scanner Tricked with 3D Print

Mobil

Bleepingcomputer

5.4.19

Windows 10 1809 Changed the Default Removal Policy for External Drives

Vulnerebility

Bleepingcomputer

5.4.19

London Blue Scammers Extend Operation, Attack Targets in Asia

Spam

Bleepingcomputer

5.4.19

CIA Exortion Scams Using SatoshiBox to Sell Alleged Proof for $500

BigBrothers

Bleepingcomputer

5.4.19

New Xwo Web Scanner Helps MongoLock Ransomware Find Victims

Ransomware

Bleepingcomputer

5.4.19

Windows 10 News App Blunder Made Users Think They're Infected

IT

Bleepingcomputer

5.4.19

Financial Mobile Apps Fail to Follow Proper Security Standards

Mobil

Bleepingcomputer

5.4.19

Windows 10 1809 Cumulative Update Released with Huge List of Fixes

Vulnerebility

Bleepingcomputer

5.4.19

540 Mllion Facebook Records Leaked by Public Amazon S3 Buckets

Social

Bleepingcomputer

5.4.19

Realistic Phishing Attacks Take Advantage of U.S. Tax Season

Phishing

Bleepingcomputer

5.4.19

NVIDIA Fixes Flaws in Linux4Tegra Driver for Jetson AI Supercomputers

Vulnerebility

Bleepingcomputer

5.4.19

This Preinstalled Mobile Security App Delivered Vulnerabilities, Not Protection

Mobil

Threatpost

5.4.19

Facebook and Amazon are Locked in a Blame Game Over Leaked Data: Who’s Really To Blame?

Privacy

Threatpost

5.4.19

Hackers Could Turn Pre-Installed Antivirus App on Xiaomi Phones Into Malware

Virus

Thehackernews

5.4.19

Cisco fixes flaws RV320 and RV325 routers targeted in attacks

Attack

Securityaffairs

5.4.19

NSA releases the source code of the GHIDRA reverse engineering framework

BigBrothers

Securityaffairs

5.4.19

US Colleges Halt Work With Huawei Following Federal Charges

BigBrothers

Securityweek

5.4.19

NVIDIA Patches High Severity Flaws in Tegra Drivers

Vulnerebility

Securityweek

5.4.19

New 'Xwo' Malware Looks for Exposed Services, Default Passwords

Virus

Securityweek

5.4.19

Hundreds Targeted in Recent Roaming Mantis Campaign

Cyber

Securityweek

5.4.19

Cisco Patches Router Vulnerabilities Targeted in Attacks

Vulnerebility

Securityweek

5.4.19

WHOIS after GDPR: A quick recap for CISOs

Privacy

Net-security

5.4.19

Only 12% of enterprises are consistently able to detect insider threats

Security

Net-security

5.4.19

What is shadow mining and why is it a security threat?

Security

Net-security

5.4.19

85% of organizations fail to meet even basic PAM security hygiene

Security

Net-security

5.4.19

Vendor revenue from IT infrastructure products for cloud environments grew 28% year over year

Security

Net-security

4.4.19

SAS 2019 to Tackle APTs, Supply Chains and More

APT

Threatpost

4.4.19

BEC Scam Gang London Blue Evolves Tactics, Targets

Spam

Threatpost

4.4.19

Nvidia Fixes 8 High-Severity Flaws Allowing DoS, Code Execution

Vulnerebility

Threatpost

4.4.19

Free Cynet Threat Assessment for Mid-sized and Large Organizations

Security

Threatpost

4.4.19

How to Maximize the Value of Your Cybersecurity Investment

Cyber

Threatpost

4.4.19

BasBanke: Trend-setting Brazilian banking Trojan

Virus

Securelist

4.4.19

The German chemicals giant Bayer hit by a cyber attack

Attack

Securityaffairs

4.4.19

New XLoader variant leverage Twitter to hide C2 addresses

Virus

Securityaffairs

4.4.19

Advantech addressed code execution and DoS flaws in WebAccess software

Vulnerebility

Securityaffairs

4.4.19

TXOne Networks Unveils First Industrial Cybersecurity Product

Cyber

Securityweek

4.4.19

Microsoft Not Concerned About Disclosed Edge, IE Flaws

Vulnerebility

Securityweek

4.4.19

Facebook Demanded User Email Passwords

Social

Securityweek

4.4.19

Bayer Confirms Cyber Attack But Says No Data Stolen

Attack

Securityweek

4.4.19

NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

Security

Thehackernews

4.4.19

New Waves of Scans Detected by an Old Rule

Security

SANS

4.4.19

Vulnerability found in Guard Provider, Xiaomi’s pre-installed security app

Vulnerebility

Net-security

4.4.19

Microsoft rolls out new security capabilities for Azure customers

Security

Net-security

4.4.19

Roaming Mantis, part IV

Virus

Securelist

4.4.19

Experts found 540 Million Facebook user records on unprotected Amazon S3 buckets

Social

Securityaffairs

4.4.19

OceanLotus APT group leverages a steganography-based loader to deliver backdoors

APT

Securityaffairs

4.4.19

AWS S3 Buckets Exposed Millions of Facebook Records

Social

Securityweek

4.4.19

XLoader Trojan Poses as Security App for Android

Android

Securityweek

4.4.19

Canadian Authorities Raid RAT Developer

Virus

Securityweek

4.4.19

Microsoft Paid $2,000,000 in Bounty Rewards in 2018

Security

Securityweek

4.4.19

Long Equipment Life Cycles Expose Manufacturing Industry to Attacks: Study

Attack

Securityweek

4.4.19

540 Million Facebook User Records Found On Unprotected Amazon Servers

Social

Thehackernews

4.4.19

WordPress iOS App Bug Leaked Secret Access Tokens to Third-Party Sites

Apple

Thehackernews

4.4.19

The security challenges that come with serverless computing

Security

Net-security

4.4.19

Attackers fighting back against security teams while also targeting supply chains

Attack

Net-security

4.4.19

79% of organizations want a federal privacy law amid lack of compliance

Privacy

Net-security

4.4.19

As fraud attacks grow more sophisticated, a need for contextual detection strategies increases

Attack

Net-security

4.4.19

Organizations still use low levels or no automation of key security and incident response tasks

Incindent

Net-security

4.4.19

Backdoors inevitably create vulnerabilities that can be exploited by malicious actors

Virus

Net-security

3.4.19

Splitting atoms in XNU

Vulnerebility blog

Project Zero

3.4.19

Look who’s stalking

Cyber blog

Eset

3.4.19

Cryptocurrency exchange loses millions in heist

Cryptocurrency blog

Eset

3.4.19

Insider Attacks More Common, Harder to Detect After Cloud Migration

Attack

Bleepingcomputer

3.4.19

Georgia Tech Data Breach Exposes Info for 1.3 Million People

Incindent

Bleepingcomputer

3.4.19

Dozens of Credit Card Info Skimming Scripts Infect Thousands of Sites

Virus

Bleepingcomputer

3.4.19

CIA Porn Extortion Scams Now Use Password Protected PDFs

BigBrothers

Bleepingcomputer

3.4.19

Verizon Customers Targeted in Mobile-Focused Phishing Campaigns

Phishing

Bleepingcomputer

3.4.19

Azure AD Password Protection Available, Lowers Spray Attack Risks

Attack

Bleepingcomputer

3.4.19

Cryptojacking Still a Foreign Concept for Many Security Pros

Cryptocurrency

Bleepingcomputer

3.4.19

Chromium Microsoft Edge Can Play 4K Netflix Video, Unlike Chrome

IT

Bleepingcomputer

3.4.19

OceanLotus APT Uses Steganography to Load Backdoors

APT

Bleepingcomputer

3.4.19

Mozilla Aims to Reduce Web Site Notification Spam in Firefox

Spam

Bleepingcomputer

3.4.19

Apache Bug Lets Normal Users Gain Root Access Via Scripts

Vulnerebility

Bleepingcomputer

3.4.19

Chromium-Based Microsoft Edge Added to Windows 10 Sandbox

Security

Bleepingcomputer

3.4.19

Google Fixes Two Critical Android Code Execution Vulnerabilities

Vulnerebility

Bleepingcomputer

3.4.19

U.S. Airlines Cancel, Delay Flights Because of Aerodata Outage

Security

Bleepingcomputer

3.4.19

Notepad++ Adds GPG Signature to Verify Authenticity

IT

Bleepingcomputer

3.4.19

New York Albany Capital Hit by Ransomware Attack

Ransomware

Bleepingcomputer

3.4.19

Torrent Malware Goes Down as Pirated Streaming Usage Increases

Virus

Bleepingcomputer

3.4.19

vxCrypter Is the First Ransomware to Delete Duplicate Files

Ransomware

Bleepingcomputer

3.4.19

Researchers Trick Tesla to Drive into Oncoming Traffic

Security

Bleepingcomputer

3.4.19

Mobile-First Phishing Kit Targets Verizon Customers

Phishing

Threatpost

3.4.19

ThreatList: Half of All Attacks Aim at Supply Chain

Attack

Threatpost

3.4.19

Researchers Trick Tesla to Drive into Oncoming Traffic

IT

Bleepingcomputer

3.4.19

Chrome May Soon Allow Custom Avatars for Browser Profiles

IT

Bleepingcomputer

3.4.19

Beware of stalkerware

Cyber

Securelist

3.4.19

Group-IB report: JS-sniffers infected 2440 websites around the world

Virus

Securityaffairs

3.4.19

Georgia Tech security breach exposed up to 1.3 million individuals

Incindent

Securityaffairs

3.4.19

Code Execution, DoS Flaws Patched in Advantech WebAccess

Vulnerebility

Securityweek

3.4.19

Container Security Firm Aqua Raises $62 Million

IT

Securityweek

3.4.19

Georgia Tech Data Breach Exposes 1.3 Million Users' Personal Data

Incindent

Thehackernews

3.4.19

In-Depth Analysis of JS Sniffers Uncovers New Families of Credit Card-Skimming Code

Virus

Thehackernews

3.4.19

A few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters

Virus

SANS

3.4.19

Patched Apache flaw is a serious threat for web hosting providers

Vulnerebility

Net-security

3.4.19

Facebook Caught Asking Some Users Passwords for Their Email Accounts

Social

Thehackernews

3.4.19

New Apache Web Server Bug Threatens Security of Shared Web Hosts

Vulnerebility

Thehackernews

3.4.19

Georgia Tech data breach: 1.3M students and staff potentially affected

Incindent

Net-security

3.4.19

Crooks use hidden directories of compromised HTTPS sites to deliver malware

Virus

Securityaffairs

3.4.19

CVE-2019-0211 Apache flaw allows getting root access via script

Vulnerebility

Securityaffairs

3.4.19

Georgia Tech Breach Hits Up to 1.3 Million People

Incindent

Securityweek

3.4.19

Chinese Woman Carrying Malware Allegedly Got Into Mar-a-Lago

Virus

Securityweek

3.4.19

Google Patches Critical Vulnerabilities in Android's Media Framework

Android

Securityweek

3.4.19

To DevSecOps or not to DevSecOps?

Security

Net-security

3.4.19

Digital transformation goes hand-in-hand with Zero Trust security

Security

Net-security

3.4.19

Women are increasingly climbing the cybersecurity leadership ladder

Cyber

Net-security

3.4.19

Securing your home increasingly means securing all of your IoT devices

IoT

Net-security

3.4.19

Current and emerging third-party cyber risk management approaches and challenges

Cyber

Net-security

3.4.19

Consumers concerned about privacy but willing to take risks for convenience

Privacy

Net-security

2.4.19

Financial Apps are Ripe for Exploit via Reverse Engineering

Exploit

Threatpost

2.4.19

Mobile-First Phishing Kit Targets Verizon Customers

Phishing

Threatpost

2.4.19

Google’s April Android Security Bulletin Warns of 3 Critical Bugs

Android

Threatpost

2.4.19

26k+ Kibana Instances exposed Elasticsearch databases online

Incindent

Securityaffairs

2.4.19

ACROS Security Launches 0patch PRO

Vulnerebility

Securityweek

2.4.19

PoC Exploits Released for Unpatched Edge, IE Vulnerabilities

Vulnerebility

Securityweek

2.4.19

A LockerGoga primer and decrypters for Mira and Aurora ransomwares

Ransomware

Net-security

2.4.19

Game of Threats

Security

Securelist

2.4.19

Analyzing AZORult malware using NSA Ghidra suite

Virus

Securityaffairs

2.4.19

Closure JavaScript Library introduced XSS issue in Google Search and potentially other services

Vulnerebility

Securityaffairs

2.4.19

BREAKING: new update about DDoS’er Linux/DDoSMan ELF malware based on Elknot

Virus

Securityaffairs

2.4.19

Israeli Watchdog Finds Online Manipulation Ahead of Vote

BigBrothers

Securityweek

2.4.19

Application Security Management Firm Sqreen Raises $14 Million

IT

Securityweek

2.4.19

Mira and Aurora Decryptor

Anti-Ramson Tool

Anti-Ramson Tool

2.4.19

Computer systems in the City of Albany hit in Ransomware Attack

Ransomware

Securityaffairs

2.4.19

Security Policy Management Firm Tufin Sets Terms for IPO

Security

Securityweek

2.4.19

Facebook's Call for Global Internet Regulation Sparks Debate

Social

Securityweek

2.4.19

Preview: SecurityWeek's 2019 Singapore ICS Cyber Security Conference – Apr. 16-18

Congress

Securityweek

2.4.19

Head of Money Mule Operation Extradited to the United States

BigBrothers

Securityweek

2.4.19

JavaScript Library Introduced XSS Flaw in Google Search

Vulnerebility

Securityweek

2.4.19

Google Warns of Growing Android Attack Vector: Backdoored SDKs and Pre-Installed Apps

Android

Threatpost

2.4.19

March Madness Scams Give Attackers Fast Break

Spam

Threatpost

2.4.19

Fake AV is Back: LaCie Network Drives Used to Spread Malware

Virus

SANS

2.4.19

The CIO’s greatest roadblock to Agile development: Security governance

Security

Net-security

2.4.19

Encryption deployment increases as organizations struggle to address compliance requirements

Crypto

Net-security

2.4.19

90% of companies interested in crowdsourced security programs

Security

Net-security

2.4.19

Financial sector recognizes the benefits of hybrid cloud but still struggles to enable IT transformation

Security

Net-security

2.4.19

45% of taxpayers do not securely store tax documents

Security

Net-security

1.4.19

Attackers Store Malware in Hidden Directories of Compromised HTTPS Sites

Virus

Securityweek

1.4.19

Exodus Android Spyware With Possible Links to Italian Government Analyzed

Android

Securityweek

1.4.19

Magento Patches Critical Vulnerabilities

Vulnerebility

Securityweek

1.4.19

Serious Path Traversal Flaw Found in Kubernetes

Vulnerebility

Securityweek

1.4.19

Buca di Beppo, Planet Hollywood Restaurants Hit by Card Breach

Incindent

Securityweek

1.4.19

0-Day in TP-Link SR20 Routers Allows Command Execution

Vulnerebility

Securityweek

1.4.19

Investigator Says Amazon Chief's Phone Hacked by Saudis

Hacking

Securityweek

1.4.19

Thousands of Unprotected Kibana Instances Exposing Elasticsearch Databases

Incindent

Thehackernews

1.4.19

Investigator told Saudis hacked into Amazon CEO Jeff Bezos’ phone

Cyber

Securityaffairs

1.4.19

Buca di Beppo, Planet Hollywood and other restaurants owned by Earl Enterprises hit by card breach

Incindent

Securityaffairs

1.4.19

New Linux/DDosMan threat emerged from an evolution of the older Elknot

Virus

Securityaffairs

1.4.19

VMware addressed vulnerabilities disclosed at Pwn2Own 2019

Congress

Securityaffairs

1.4.19

Intel VISA Tech Can Be Abused, Researchers Allege

Security

Threatpost

1.4.19

Medical Weed Dispensary Exposes Health Data for Thousands

Incindent

Threatpost

1.4.19

ThreatList: Game of Thrones, a Top Malware Conduit for Cybercriminals

Cyber

Threatpost

1.4.19

Google Play Boots Italian Spyware Apps That Infected Hundreds

Android

Threatpost

1.4.19

Analysis of PDFs Created with OpenOffice/LibreOffice

Security

SANS

1.4.19

Microsoft adds tamper protection to Microsoft Defender ATP

Safety

Net-security

1.4.19

3.1 million customer records possibly stolen in Toyota hack

Incindent

Net-security

1.4.19

How to Marie Kondo your data

Security

Net-security

1.4.19

Nearly all consumers are backing up their computers, but data loss is here to stay

Security

Net-security

1.4.19

Main threat source to industrial computers? Mass-distributed malware

Virus

Net-security

1.4.19

Organizations investing in security analytics and machine learning to tackle cyberthreats

Cyber

Net-security

1.4.19

Security and privacy still the top inhibitors of cloud adoption

Privacy

Net-security

1.4.19

Automatically and invisibly encrypt email as soon as it is received on any trusted device

Crypto

Net-security