Calendar August- Home  2020  2019  2018  2017  2016  1  2  3  4  5  6  7  8  Articles

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2019 - January  February  March  April  May  June  July  August  September  October  November  December


Calendar August

Date

Name

Category

Web

1.9.19Foxit PDF Software Company Suffers Data Breach—Asks Users to Reset PasswordIncindentThehackernews
1.9.19iOS Vulnerabilities Allowed Attackers to Remotely Hack iPhones for YearsAppleSecurityweek
1.9.19Expert found Russia’s SORM surveillance equipment leaking user dataBigBrothersSecurityaffairs
1.9.19Foxit Software discloses a data breach that exposed user passwordsIncindentSecurityaffairs
1.9.19Ransomware attack hits DDS Safe backup service used by hundreds of dental officesRansomwareSecurityaffairs
1.9.19

iPhone Zero-Days Anchored Watering-Hole Attacks

Apple

Threatpost

1.9.19

Six Hackers Have Now Pocketed $1M From Bug Bounty Programs

Security

Threatpost

30.8.19

Google revealed how watering hole attacks compromised iPhone devices earlier this year

Apple

Securityaffairs

30.8.19

BRATA, the Android RAT that infected only Brazilian users

Android

Securityaffairs

30.8.19

Ransomware Hits Dental Data Backup Service Offering Ransomware Protection

Ransomware

Thehackernews

30.8.19

Google discovers websites exploiting iPhones, pushing spying implants en masse

Apple

Net-security

30.8.19

Malware Dropping a Local Node.js Instance

Virus

SANS

30.8.19

Google will pay for data abuse reports related to popular Android apps, Chrome extensions

Security

Net-security

30.8.19

CISO priorities: Implementing security from the get-go

Security

Net-security

30.8.19

Capital One Hacker indicted on federal charges for Wire Fraud and Computer Data Theft

Hacking

Securityaffairs

30.8.19

Google Offers Big Bounties for Data Abuse Reports

Security

Securityweek

30.8.19

Google Uncovers How Just Visiting Some Sites Were Secretly Hacking iPhones For Years

Apple

Thehackernews

30.8.19

Google Will Now Pay Anyone Who Reports Apps Abusing Users' Data

Privacy

Thehackernews

30.8.19

A very deep dive into iOS Exploit chains found in the wildExploit blogProject Zero
30.8.19In-the-wild iOS Exploit Chain 1Exploit blogProject Zero
30.8.19In-the-wild iOS Exploit Chain 2Exploit blogProject Zero

30.8.19

In-the-wild iOS Exploit Chain 3Exploit blogProject Zero
30.8.19In-the-wild iOS Exploit Chain 4Exploit blogProject Zero
30.8.19In-the-wild iOS Exploit Chain 5Exploit blogProject Zero
30.8.19Implant TeardownVulnerebility blogProject Zero
30.8.19JSC ExploitsExploit blogProject Zero

30.8.19

The Fully Remote Attack Surface of the iPhoneVulnerebility blogProject Zero
30.8.19Trashing the Flow of DataVulnerebility blogProject Zero
30.8.19Windows Exploitation Tricks: Abusing the User-Mode DebuggerExploit blogProject Zero

30.8.19

Windows Kernel Logic Bug Class: Access Mode Mismatch in IO ManagerVulnerebility blogProject Zero
30.8.19Android Messaging: A Few Bugs Short of a ChainVulnerebility blogProject Zero
30.8.19The Curious Case of Convexity ConfusionVulnerebility blogProject Zero
30.8.19Examining Pointer Authentication on the iPhone XSVulnerebility blogProject Zero
30.8.19voucher_swap: Exploiting MIG reference counting in iOS 12Exploit blogProject Zero
30.8.19Taking a page from the kernel's book: A TLB issue in mremap()Vulnerebility blogProject Zero

30.8.19

TGI Fridays Delivers Customer Indigestion Over Data Exposure

Incindent  Privacy

Threatpost

30.8.19

FIN6 Switches Up PoS Tactics to Target E-Commerce

CyberCrime

Threatpost

30.8.19

Google Targets Data-Abusing Apps with Bug Bounty Launch

Security

Threatpost

30.8.19

Venmo’s Public Transactions Policy Stirs Privacy Concerns

Privacy

Threatpost

30.8.19

Critical Cisco VM Bug Allows Remote Takeover of Routers

Vulnerebility

Threatpost
30.8.19

CISO priorities: Implementing security from the get-go

Security

Net-security
30.8.19

Cybersecurity in the age of the remote workforce

Cyber

Net-security
30.8.19

Fileless attacks designed to disguise malicious activity up 265%

Virus

Net-security

29.8.19

Fully equipped Spying Android RAT from Brazil: BRATAAndroidSecurelist
29.8.19A total of six hackers already become millionaires on HackerOneIncindentSecurityaffairs

29.8.19

US Waged Cyberattack on Database Used by Iran to Target Tankers: NY TimesBigBrothersSecurityweek

29.8.19

Alleged Capital One Hacker Indicted on Wire Fraud, Computer Data Theft ChargesIncindentSecurityweek
29.8.19Capital One Hacker Also Accused of Hacking 30 More Companies and CryptoJackingCryptocurrencySecurityweek

29.8.19

Incident Response report 2018Analysis  IncindentSecurelist
29.8.19Lumber Liquidators hit by malware attack that took down its networkVirusSecurityaffairs

29.8.19

A new variant of Trickbot banking Trojan targets Verizon, T-Mobile, and Sprint usersVirusSecurityaffairs

29.8.19

Expert releases Metasploit modules for Cisco UCS flawsVulnerebilitySecurityaffairs
29.8.19Pulse Secure Says Majority of Customers Patched Exploited VulnerabilityVulnerebilitySecurityweek

29.8.19

Bug Hunters Invited to Hack Facebook Devices at Pwn2Own Tokyo 2019CongressSecurityweek
29.8.19Apple Changes the Way It Listens to Your Siri Recordings Following Privacy ConcernsAppleThehackernews

29.8.19

Microsoft Wants exFAT in Linux Kernel, Opens File System SpecsOS

Bleepingcomputer

29.8.19Microsoft Lifts Update Block On Windows 7 With Symantec AVSecurity  Vulnerebility

Bleepingcomputer

29.8.19

Attackers Target Govt and Financial Orgs With Orcus, Revenge RATsVirus

Bleepingcomputer

29.8.19

Malware Operation Making Millions Defeated by Design FlawVirus

Bleepingcomputer

29.8.19New TrickBot Variant Targets Verizon, T-Mobile, and Sprint UsersVirus

Bleepingcomputer

29.8.19

Android Trojan Infects Tens of Thousands of Devices in 4 MonthsAndroid

Bleepingcomputer

29.8.19Check Point Patches Privilege Escalation Flaw in Endpoint ClientVulnerebility

Bleepingcomputer

29.8.19

Cybersecurity Firm Suffers Security Breach, Client Info ExposedIncindent

Bleepingcomputer

29.8.19

Malware Samples Compiling Their Next Stage on Premise

Virus

SANS
29.8.19

Knowing what’s on your hybrid-IT environment is fundamental to security

Security

Net-security

29.8.19

What can be done about the rising click interception threat?

Security

Net-security

29.8.19

Magecart hackers compromise another 80 eCommerce sitesCyberCrimeSecurityaffairs
29.8.19Apple Apologizes for Listening to Siri Talk, Sets New RulesAppleSecurityweek

29.8.19

Malware Found in Google Play App With 100 Million DownloadsVirusSecurityweek
29.8.19Malware Takes Down Lumber Liquidators’ NetworkVirusSecurityweek

29.8.19

Dangerous Cryptomining Worm Racks Up 850K Infections, Self-Destructs

Cryptocurrency

Threatpost

29.8.19

Magecart Hits 80 Major eCommerce Sites in Card-Skimming Bonanza

CyberCrime

Threatpost

29.8.19

Google Squashes High-Severity Blink Browser Engine Flaw

Vulnerebility

Threatpost

29.8.19

Elderly China Chopper Tool Still Going Strong in Multiple Campaigns

CyberCrime

Threatpost

29.8.19

TrickBot Targets Verizon, T-Mobile, Sprint Users to Siphon PINs

BotNet

Threatpost
29.8.19

New ransomware grows 118% as cybercriminals adopt fresh tactics and code innovations

Ransomware

Net-security
29.8.19

SOCs still overwhelmed by alert overload, struggle with false-positives

Security

Net-security

28.8.19

French Police remotely disinfected 850,000 PCs from RETADUP botVirusSecurityaffairs
28.8.19Cisco UCS Vulnerabilities Allow Complete Takeover of Affected SystemsVulnerebilitySecurityweek

28.8.19

Researchers Analyze Tools Used by 'Hexane' Attackers Against Industrial FirmsAttackSecurityweek
28.8.19DLL Hijacking Flaw Patched in Check Point Endpoint SecurityVulnerebilitySecurityweek
28.8.19Avast, French Police Remove Retadup Malware From 850,000 PCsVirusSecurityweek
28.8.19Magecart Hackers Compromise 80 More eCommerce Sites to Steal Credit CardCyberCrimeThehackernews

28.8.19

Imperva discloses security incident affecting Cloud WAF customers

Incindent

Net-security
28.8.19

[Guest Diary] Open Redirect: A Small But Very Common Vulnerability

Vulnerebility

SANS

28.8.19

Trojan Dropper Malware Found in Android App With 100M DownloadsAndroid 

Bleepingcomputer

28.8.19Lyceum/Hexane Threat Group Uses Common Hacking TacticsCyberCrime

Bleepingcomputer

28.8.19Microsoft Starts Testing Throttled Rollout of Windows 10 19H2OS

Bleepingcomputer

28.8.19Google Chrome is Losing the 'Close Other Tabs' OptionSecurity

Bleepingcomputer

28.8.19

Microsoft's Your Phone Is Down, Users Getting Connection ErrorsSecurity

Bleepingcomputer

28.8.19Apple Releases iOS 12.4.1 to Patch Security Flaw Behind JailbreakApple

Bleepingcomputer

28.8.19Phishing Campaign Delivers Quasar RAT Payloads via Fake ResumesPhishing  Virus

Bleepingcomputer

28.8.19Microsoft Warns of Windows 10 1703 End of Life for EnterpriseOS

Bleepingcomputer

28.8.19

New Nemty Ransomware May Spread via Compromised RDP ConnectionsRansomware

Bleepingcomputer

28.8.19Hostinger Data Breach Affects Almost 14 Million CustomersIncindentBleepingcomputer

28.8.19

Spam and phishing in Q2 2019Analysis  Phishing  SpamSecurelist
28.8.19TA505 group updates tactics and expands the list of targetsCyberCrimeSecurityaffairs
28.8.19Australia Tries to Curb Foreign Interference at UniversitiesCyberSecurityweek
28.8.19French Police Remotely Removed RETADUP Malware from 850,000 Infected PCsVirusThehackernews

28.8.19

Imperva Firewall Breach Exposes Customer API Keys, SSL CertificatesIncindent

Threatpost

28.8.19Oil and Gas Firms Targeted By New LYCEUM Threat GroupCyberCrime

Threatpost

28.8.19Malicious App on Google Play Tallies 100 Million DownloadsAndroid

Threatpost

28.8.19Employers Beware: Microsoft Word ‘Resume’ Phish Delivers Quasar RATVirus

Threatpost

28.8.19

Imperva data Breach: WAF customers’ data exposedIncindentSecurityaffairs
28.8.19Kaspersky found malware in popular CamScanner app. Remove it now from your phone!AndroidSecurityaffairs
28.8.19Lyceum APT made the headlines with attacks in Middle EastAPTSecurityaffairs
28.8.19Low Budgets, Limited Expertise Plague SMB CybersecurityCyberSecurityweek

28.8.19

Imperva Notifies Cloud WAF Customers of Security IncidentIncindentSecurityweek
28.8.19Imperva Breach Exposes WAF Customers' Data, Including SSL Certs, API KeysIncindentThehackernews
28.8.19

What the education industry must do to protect itself from cyber attacks

Cyber

Net-security

28.8.19

How passwords paved the way for new technology

Safety

Net-security

28.8.19

Cost of data breaches to surpass $5 trillion in 2024

Incindent

Net-security

28.8.19

1 in 4 employees would steal company information to secure their next job

Security

Net-security

27.8.19

Code Execution and DoS flaw addressed in QEMUVulnerebilitySecurityaffairs
27.8.19Dridex Operator Updates Tactics and TargetsVirusSecurityweek
27.8.19Bug Bounty Program Launched for Facebook's Libra CryptocurrencyCryptocurrency  SocialSecurityweek
27.8.19VMware Unveils Security Enhancements in Virtual Cloud Network OfferingSecuritySecurityweek

27.8.19

WARNING — Malware Found in CamScanner Android App With 100+ Million UsersAndroidThehackernews

27.8.19

An advertising dropper in Google PlayAndroidSecurelist
27.8.19Experts uncovered an advanced phishing campaign delivering the Quasar RATVirusSecurityaffairs
27.8.19Nearly Half of SMBs, Enterprises Still Using Windows 7: KasperskySecuritySecurityweek
27.8.19Apple Patches Re-Introduced Jailbreak VulnerabilityAppleSecurityweek

27.8.19

Free Windows 7 Extended Security Updates for Some Microsoft CustomersVulnerebilitySecurityweek

27.8.19

ThreatList: Half of All Social Media Logins Are FraudSecurity

Threatpost

27.8.19Hostinger Data Breach: 14M Customer Passwords, Personal Data at RiskIncindent

Threatpost

27.8.19Apple Fixes iOS Flaw That Opened iPhones to JailbreaksApple

Threatpost

27.8.19IRS Impersonation Attacks Spread Malware NationwideVirus

Threatpost

27.8.19

White hat hacker demonstrated how to hack a million Instagram accountsSocialSecurityaffairs
27.8.19Apple released an emergency patch to address CVE-2019-8605 iOS flawAppleSecurityaffairs
27.8.19Nemty Ransomware, a new malware appears in the threat landscapeRansomwareSecurityaffairs
27.8.19Code Execution Flaw in QEMU Mostly Impacts Development, Test VMsVulnerebilitySecurityweek
27.8.19Senators Question NHTSA on Risks of Connected VehiclesBigBrothersSecurityweek
27.8.19Hacker Finds Instagram Account Takeover Flaw Worth $10,000SocialSecurityweek
27.8.19Apple Releases iOS 12.4.1 Emergency Update to Patch 'Jailbreak' FlawAppleThehackernews
27.8.19

Is it Safe to Require TLS 1.2 for E-Mail

Crypto

SANS

27.8.19

Worried about cyber pirates hijacking autonomous ships? Focus on port cybersecurity first

Hacking

Net-security

27.8.19

Growing cloud adoption introduces visibility gaps and security complications

Security

Net-security

27.8.19

Attackers use large-scale bots to launch attacks on social media platforms

Social

Net-security

27.8.19

A look at the global network access control market

Security

Net-security

26.8.19

Hostinger Resets User Passwords Following System BreachIncindentSecurityweek

26.8.19

Company Sues Black Hat Conference Over Mocked PresentationCongressSecurityweek

26.8.19

The Growing Threat of Deepfake VideosSecuritySecurityweek

26.8.19

Judge ordered Capital One hacker Paige Thompson to remain in prison

Crime

Securityaffairs

26.8.19

Airlines That Manage Booking Systems Themselves Expose Customer Data

Incindent

Securityweek

26.8.19

Hostinger Suffers Data Breach – Resets Password For 14 Million Users

Incindent

Thehackernews
26.8.19

Binance Confirms Hacker Obtained Its Users' KYC Data from 3rd-Party Vendor

Hacking

Thehackernews

26.8.19

GitHub announces wider array of 2FA options, including security keys and biometrics

Safety

Net-security

26.8.19

Attackers are targeting vulnerable Fortigate and Pulse Secure SSL VPNs

Vulnerebility

Net-security

26.8.19

UK National Cyber Security Centre urge to drop Python 2Cyber

Securityaffairs

26.8.19Hostinger disclosed a data breach that affects 14 Million customersIncindent

Securityaffairs

26.8.19Bad Packets warns of over 14,500 Pulse secure VPN endpoints vulnerable to CVE-2019-11510Vulnerebility

Securityaffairs

26.8.19

Judge Orders Woman in Capital One Case to Remain in CustodyIncindentSecurityweek

26.8.19

Are there any Advantages of Buying Cyber Security Insurance?

Cyber

SANS

26.8.19

How to evaluate a password management solution for business

Security

Net-security

26.8.19

Thinking network-first to protect against security threats

Security

Net-security

26.8.19

Using deep learning and natural language understanding to protect enterprise communication

Security

Net-security

26.8.19

Five vendors accounted for 24.1% of vulnerabilities in 2019 so far

Vulnerebility

Net-security

26.8.19

Enterprises are unable to effectively use data to drive decision-making

Security

Net-security

25.8.19

80 defendants charged with participating in massive BEC and romance scamsSpam

Securityaffairs

25.8.19

Internal Revenue Service warns taxpayers of a malware campaignVirus

Securityaffairs

25.8.19

Experts uncovered a hacking campaign targeting several WordPress PluginsHacking

Securityaffairs

25.8.19

Microsoft Blocks Windows 10 1903 Update on Zebra Rugged Tablets

Vulnerebility

Bleepingcomputer

25.8.19

IRS Warns Taxpayers of New Scam Campaign Distributing Malware

Spam

Bleepingcomputer

25.8.19

Windows 10 KB4505903 Update Breaks Bluetooth Speakers Connectivity

Vulnerebility

Bleepingcomputer

25.8.19

Mastercard Reports Data Breach to German and Belgian DPAs

Incindent

Bleepingcomputer

25.8.19

Instagram Phishing Emails Use Fake Login Warning Baits

Phishing  Social

Bleepingcomputer

25.8.19

Emotet Botnet Is Back, Servers Active Across the World

BotNet  Virus

Bleepingcomputer

25.8.19

Google Chrome to Warn If Logins Are Found in a Data Breach

Incindent  Safety

Bleepingcomputer

25.8.19

Microsoft Forms to Add Enterprise Automatic Phishing Detection

Phishing  Safety

Bleepingcomputer

25.8.19

Steam Patches LPE Vulnerabilities in Beta Version Update

Vulnerebility

Bleepingcomputer

25.8.19

Cisco Warns of Public Exploit Code for Critical Switch Flaws

Vulnerebility

Bleepingcomputer

25.8.19

Unpatched Squid Servers Exposed to DoS, Code Execution Attacks

Attack  Vulnerebility

Bleepingcomputer

25.8.19

Google Twice Misses Android App with Open-Source Spyware Code

Virus

Bleepingcomputer

25.8.19

GitHub Experienced Widespread Major Services Outage

Security

Bleepingcomputer

25.8.19

Portland Public Schools Recovers $2.9 Million Lost in BEC Scam

Spam

Bleepingcomputer

25.8.19

Bitdefender Fixes Privilege Escalation Bug in Free Antivirus 2020

Vulnerebility

Bleepingcomputer

25.8.19

npm Pulls Malicious Package that Stole Login Passwords

Virus

Bleepingcomputer

25.8.19

Cisco released 4CAN hardware tool to find flaws in automotive computers

Vulnerebility

Securityaffairs

25.8.19

Hacker will compensate victims with $1.1 million Bitcoin illegally earned

Cryptocurrency  Hacking

Securityaffairs

25.8.19

Buffer overflow exposes unpatched Squid servers to RCE and DoS attacks

Attack  Exploit

Securityaffairs

25.8.19

Vulnerability Found in SimpleMDM Apple Device Management Solution

Apple  Vulnerebility

Securityweek

24.8.19

Collision Course: Keeping Up With Digital Complexity in an App-Enabled World

Security blog

F5 Labs

24.8.19

What Are Security Controls?

Security blog

F5 Labs

24.8.19

Cloud Security: Citadel or Straw House, It's Your Call

Security blog

F5 Labs

24.8.19

ChatOps is Your Bridge to a True DevSecOps Environment

Security blog

F5 Labs

24.8.19

Banking Trojans: A Reference Guide to the Malware Family Tree

Malware blog

F5 Labs

24.8.19

The Hunt for IoT: So Easy To Compromise, Children Are Doing It

IoT blog

F5 Labs

24.8.19

GAME OVER: Detecting and Stopping an APT41 Operation

APT blog

FireEye

24.8.19

Healthcare: Research Data and PII Continuously Targeted by Multiple Threat Actors

Cyber blog

FireEye

24.8.19

Targeted Ransomware: Proliferating Menace Threatens Organizations

Ransomware blog

Symantec

24.8.19

Microsoft Patch Tuesday – August 2019

Vulnerebility blog

Symantec

24.8.19

The Many Possibilities of CVE-2019-8646

Vulnerebility blog

Project Zero

24.8.19

New 4CAN tool helps identify vulnerabilities in on-board car computers

Cyber blog

Cisco Talos

24.8.19

Talos DEFCON badge build instructions and use

Cyber blog

Cisco Talos

24.8.19

What you — and your company — should know about cyber insurance

Cyber blog

Cisco Talos

24.8.19

Vulnerability Spotlight: Multiple vulnerabilities in Aspose APIs

Vulnerebility blog

Cisco Talos

24.8.19

Vulnerability Spotlight: Multiple bugs in OpenWeave and Nest Labs Nest Cam IQ indoor camera

Vulnerebility blog

Cisco Talos

24.8.19

Cyberbullying: What schools and teachers can do

Cyber blog

Eset

24.8.19

First‑of‑its‑kind spyware sneaks into Google Play

OS Blog  Malware blog

Eset

24.8.19

Education and privacy legislation at ChannelCon

Cyber blog

Eset

24.8.19

Ransomware wave hits 23 towns in Texas

Ransomware blog

Eset

24.8.19

Lenovo High-Severity Bug Found in Pre-Installed Software

Vulnerebility

Threatpost

24.8.19

WordPress Plugins Exploited in Ongoing Attack, Researchers Warn

Exploit

Threatpost

24.8.19

Mastercard data breach affected Priceless Specials loyalty program

Incindent

Securityaffairs

24.8.19

Lenovo Solution Centre flaw allows hacking Windows laptop in 10 minutes

Vulnerebility

Securityaffairs

24.8.19

Cyberattacks on Texas Cities Put Other Governments on Guard

Attack

Securityweek

24.8.19

Hacker Ordered to Pay Back Nearly £1 Million to Phishing Victims

Crime

Thehackernews

23.8.19

A new variant of Asruex Trojan exploits very old Office, Adobe flawsExploit  VirusSecurityaffairs

23.8.19

Hackers are scanning the web for vulnerable Fortinet, Pulse Secure Products installsVulnerebilitySecurityaffairs

23.8.19

Kubernetes Patches Recent HTTP/2 VulnerabilitiesVulnerebilitySecurityweek

23.8.19

US Wants Woman Accused in Capital One Hack to Stay Locked UpBigBrothersSecurityweek

23.8.19

Asruex Malware Exploits Old vulnerabilities to Infect PDF, Word DocsExploit  VirusSecurityweek

23.8.19

New Tool From Cisco Hunts Flaws in Automotive ComputersVulnerebilitySecurityweek

23.8.19

U.S. Charges 80 in Massive Online Fraud SchemeIncindentSecurityweek

23.8.19

Classification Concerns Over FISMA Report on Improving Agency CybersecurityCyberSecurityweek

23.8.19

VMWare to Acquire Endpoint Security Firm Carbon BlackSafetySecurityweek

23.8.19

Second Steam Zero-Day Impacts Over 96 Million Windows UsersVulnerebility

Bleepingcomputer

23.8.19

Windows 10 Insider Build 18965 Adds Restart Apps Sign-In OptionOS

Bleepingcomputer

23.8.19

Phishing Attacks Scrape Branded Microsoft 365 Login PagesPhishing

Bleepingcomputer

23.8.19

Hackers Want $2.5 Million Ransom for Texas Ransomware AttacksRansomware

Bleepingcomputer

23.8.19

PokerTracker.com Hacked to Inject Payment Card Stealing ScriptHacking

Bleepingcomputer

23.8.19

Silence Advanced Hackers Attack Banks All Over the WorldHacking

Bleepingcomputer

23.8.19

Visa Adds New Threat Detection to Prevent Payment FraudSafety

Bleepingcomputer

23.8.19

Microsoft Fixes Corrupted Windows Defender Files When Using SFCVulnerebility

Bleepingcomputer

23.8.19

Microsoft Releases First Chromium-Based Microsoft Edge BetaIT

Bleepingcomputer

23.8.19

Microsoft Patches Vulnerable Android Remote Desktop AppVulnerebility

Bleepingcomputer

23.8.19

Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrencyCryptocurrencySecurityaffairs

23.8.19

Illegal Cryptocurrency Mining at Ukraine Nuclear Plant Exposed Sensitive DataCryptocurrencySecurityweek

23.8.19

Microsoft Offers Up to $30,000 for Flaws in Chromium-Based EdgeITSecurityweek

23.8.19

Claroty Releases Free Diagnostic Tool for Urgent/11 VulnerabilitiesVulnerebilitySecurityweek

23.8.19

Google Proposes 'Privacy Sandbox' to Develop Privacy-Focused AdsPrivacyThehackernews

23.8.19

Spyware App on Google Play Gets Boot, Returns Days LaterVirus

Threatpost

23.8.19

Google Launches Open-Source Browser Extension for Ad TransparencySecurity

Threatpost

23.8.19

Cisco warns of the availability of public exploit code for critical flaws in Cisco Small Business switches

Vulnerebility

Securityaffairs

23.8.19

Cisco addressed several vulnerabilities in UCS products

Vulnerebility

Securityaffairs

23.8.19

Hackers Target Vulnerabilities in Fortinet, Pulse Secure Products

Vulnerebility

Securityweek

23.8.19

Majority of Malicious Job Attacks on Microsoft SQL Server Target Asia

Virus

Securityweek

23.8.19

Remote Code Execution Flaws Impact Aspose APIs

Exploit

Securityweek

23.8.19

Simple Mimikatz & RDPWrapper Dropper

Virus

SANS

23.8.19

Quantum computing: The new moonshot in the cyber space race

Cyber

Net-security

23.8.19

Facebook phishing surges, Microsoft still most impersonated brand

Phishing  Social

Net-security

23.8.19

Should you block newly registered domains? Researchers say yes

Security

Net-security

23.8.19

New cross-industry consortium aims to accelerate confidential computing adoption

Security

Net-security

22.8.19

Exposed Sphinx Servers Are No Challenge for HackersHacking

Bleepingcomputer

22.8.19

Severe Flaws in Kubernetes Expose All Servers to DoS AttacksAttack  Vulnerebility

Bleepingcomputer

22.8.19

Scammer Tricks City Into $1 Million Wire TransferSpam

Bleepingcomputer

22.8.19

Adwind Remote Access Trojan Hits Utilities SectorVirus

Bleepingcomputer

22.8.19

Gmail Is Down, Displays "Something Went Wrong" ErrorsVulnerebility

Bleepingcomputer

22.8.19

iOS 12.4 Jailbreak Released After Apple Unpatches Older BugiOS

Bleepingcomputer

22.8.19

Windows 10 Notepad Added to Microsoft Store, Only for InsidersOS

Bleepingcomputer

22.8.19

VLC Media Player 3.0.8 Released with 13 Security FixesVulnerebility

Bleepingcomputer

22.8.19

$11M Email Scam at Caterpillar Pinned to Nigerian BusinessmanSpam

Bleepingcomputer

22.8.19

Hackers Use Fake NordVPN Website to Deliver Banking TrojanVirus

Bleepingcomputer

22.8.19

App tainted with Ahmyst Open-source spyware appeared on Google Play Store twice

Android

Securityaffairs

22.8.19

The Dangers of Using Unsecured Wi-Fi Networks

Hacking

Securityaffairs

22.8.19

DLL Hijacking Flaw Found in Bitdefender Antivirus Free 2020

Vulnerebility

Securityweek

22.8.19

Texas attackers demand $2.5 million to allow towns to access encrypted dataRansomwareSecurityaffairs

22.8.19

Privileged Access Management Provider Remediant Raises $15 MillionITSecurityweek

22.8.19

Attackers Demand Millions in Texas Ransomware IncidentRansomwareSecurityweek

22.8.19

Tech Giants Join Forces on Confidential ComputingSecuritySecurityweek

22.8.19

Agent 1433: remote attack on Microsoft SQL ServerVirusSecurelist

22.8.19

A new Zero-Day in Steam client impacts over 96 million Windows usersVulnerebilitySecurityaffairs

22.8.19

Cisco Patches Many Serious Vulnerabilities in Unified Computing ProductsVulnerebilitySecurityweek

22.8.19

Cybersecurity salary, skills, and stress survey

Cyber

Net-security

22.8.19

Cisco warns about public exploit code for critical flaws in its 220 Series smart switches

Exploit

Net-security

22.8.19

Backdoor Found in Utility for Linux, Unix ServersVirus

Threatpost

22.8.19

Adult Content Site Exposed Personal Data of 1M UsersIncindent

Threatpost

22.8.19

Researcher Discloses Second Steam Zero-Day After Valve Bug Bounty BanVulnerebility

Threatpost

22.8.19

The Texas Ransomware Attacks: A Gamechanger for CybercriminalsRansomwareThreatpost

22.8.19

DoS attacks against most used default Tor bridges could be very cheap

Attack

Securityaffairs

22.8.19

Romania is going to exclude Huawei from its 5G Network

BigBrothers  Mobil

Securityaffairs

22.8.19

China-linked APT41 group targets US-Based Research University

APT

Securityaffairs

22.8.19

Amazon, Microsoft, May be Putting World at Risk of Killer AI, Says Report

Security

Securityweek

22.8.19

Russian APT 'Silence' Steals $3.5 Million in One Year

APT

Securityweek

22.8.19

Visa Tackles Payment Fraud with New Security Services

Incindent

Securityweek

22.8.19

Unlocking the future of blockchain innovation with privacy-preserving technologies

Cryptocurrency

Net-security

22.8.19

From SmarterChild to Siri: Why AI is the competitive advantage securing businesses

Security

Net-security

22.8.19

Identifying vulnerable IoT devices by the companion app they use

IoT

Net-security

22.8.19

Identifying evasive threats hiding inside the network

Security

Net-security

21.8.19

The Cost of Dealing With a Cybersecurity Attack in These 4 IndustriesAttackSecurityaffairs

21.8.19

Chinese Cyberspies Continue Targeting Medical Research OrganizationsBigBrothers  CyberSpySecurityweek

21.8.19

Suspect in Huge Capital One Breach Seeks Release From JailCrimeSecurityweek

21.8.19

Backdoor Found in 'rest-client' Ruby GemVirusSecurityweek

21.8.19

Apple, Google, Mozilla Respond to Kazakhstan Surveillance EffortsBigBrothers  CyberSpySecurityweek

21.8.19

Internet-Exposed Sphinx Servers at Risk of AttacksAttackSecurityweek

21.8.19

Attacking Tor: What it Takes to Disrupt the Popular Onion Routing NetworkAttackSecurityweek

21.8.19

Romania Mulls Excluding Huawei From its 5G NetworkBigBrothers  MobilSecurityweek

21.8.19

Google, Mozilla, Apple Block Kazakhstan's Root CA Certificate to Prevent SpyingBigBrothers  CyberSpyThehackernews

21.8.19

Apple iOS Patch Blunder Opens Updated iPhones to JailbreaksApple  iOS

Threatpost

21.8.19

Microsoft Offers $30K Rewards For Chromium Edge Beta FlawsVulnerebility

Threatpost

21.8.19

Adwind Spyware-as-a-Service Attacks Utility Grid OperatorsVirus

Threatpost

21.8.19

Fortnite Ransomware Masquerades as an Aimbot Game HackRansomwareThreatpost

21.8.19

Adult Content Site Exposed Personal Data of 1M UsersIncindentThreatpost

21.8.19

How to Prepare for Misconfigurations Clouding the Corporate SkiesSecurityThreatpost

21.8.19

Backdoored Ruby gems stole credentials, injected cryptomining code

CryptocurrencyNet-security

21.8.19

Thousands credit card numbers of MoviePass customers were exposed onlineCyberCrimeSecurityaffairs

21.8.19

Damage from Silence APT operations increases fivefold. The gang deploys new tools on its “worldwide tour”APTSecurityaffairs

21.8.19

A backdoor mechanism found in tens of Ruby librariesVirusSecurityaffairs

21.8.19

Flaw in New Facebook Design Allowed Removal of Profile PhotosSocialSecurityaffairs

21.8.19

5 Ways to Protect Yourself from IP Address HackingSafetySecurityaffairs

21.8.19

Russian Hacking Group Targeting Banks Worldwide With Evolving TacticsCyberCrimeThehackernews

21.8.19

Use This Privacy Tool to View and Clear Your 'Off-Facebook Activity' DataSocialThehackernews

21.8.19

KAPE: Kroll Artifact Parser and Extractor

Social

SANS

21.8.19

New tool enables users to disconnect their off-Facebook activity from their account

Social

Net-security

21.8.19

Facebook Announces 2019 Internet Defense Prize WinnersSocialSecurityweek

21.8.19

Chinese Cyber-Spies Target US-Based Research UniversityBigBrothers  CyberSpySecurityweek

21.8.19

Facebook Launches Tool to Let Users Control Data FlowSocialSecurityweek

21.8.19

New YubiKey 5Ci Has Both USB-C and Lightning ConnectorsSecuritySecurityweek

21.8.19

Three essential elements of a successful Zero Trust cybersecurity program

Security

Net-security

21.8.19

When will the GDPR pot boil over? It’s sooner (and different) than you think

Privacy

Net-security

21.8.19

Securing the cloud: Visibility, compliance and vulnerability management

Security

Net-security

21.8.19

Cybersecurity challenges for smart cities: Key issues and top threats

Security

Net-security

20.8.19

iOS 12.4 jailbreak released after Apple ‘accidentally un-patches’ an old flawiOSThehackernews

20.8.19

How Activity Logs Help WordPress Admins Better Manage Website SecurityHackingThehackernews

20.8.19

Hackers Planted Backdoor in Webmin, Popular Utility for Linux/Unix ServersHackingThehackernews

20.8.19

Twitter Shuts Chinese Accounts Targeting Hong Kong ProtestsBigBrothers  SocialSecurityweek

20.8.19

Twitter Flexing its Muscles Against State MisinformationSocialSecurityweek

20.8.19

VideoLAN Patches Dozen Vulnerabilities in VLCVulnerebilitySecurityweek

20.8.19

Open Source-Based Ransomware Targets Fortnite PlayersRansomwareSecurityweek

20.8.19

Flaw in New Facebook Design Allowed Removal of Profile PhotosSocial  VirusSecurityweek

20.8.19

GitHub Now Scans Commits for Atlassian, Dropbox, Discord TokensSpamSecurityweek

20.8.19

Guildma malware is now accessing Facebook and�YouTube to keep up-to-date

Social  Virus

SANS

20.8.19

VLC users urged to implement latest security update

Vulnerebility

Net-security

20.8.19

Twitter bans 936 accounts that attempted to sow political discord in Hong KongSocialSecurityaffairs

20.8.19

Backdoored Webmin versions were available for download for over a yearVirusSecurityaffairs

20.8.19

Hacker publicly releases Jailbreak for iOS version 12.4iOSSecurityaffairs

20.8.19

Watch out! Malware Analysis Sandboxes could expose sensitive data of your organizationVirusSecurityaffairs

20.8.19

Facebook Offers Rewards for Instagram Data Abuse ReportsSocialSecurityweek

20.8.19

Webmin Backdoored for Over a YearVirusSecurityweek

20.8.19

Google Nest Security Cam Bugs Allow Device Takeover

Vulnerebility

Threatpost

20.8.19

Coordinated Ransomware Attack Hits 23 Texas Government Agencies

Ransomware

Threatpost

20.8.19

VLC Media Player Allows Desktop Takeover Via Malicious Video Files

Virus

Threatpost

20.8.19

Apple Sues Corellium Over iOS ‘Replica’ Security Testing Software

Apple  iOS

Threatpost

20.8.19

Post GandCrab, Cybercriminals Scouring the Dark Web for the Next Top Ransomware

Ransomware

Threatpost

20.8.19

Compressed ISO Files (ISZ)

Virus

SANS

20.8.19

With shadow IT running rampant, how can IT keep pace?

Security

Net-security

20.8.19

Automating CCPA compliance: Organize your data and manage requests

Security

Net-security

20.8.19

Protecting iOS and Android applications in a fully automated way

Android  iOS

Net-security

20.8.19

A point-in-time approach to risk management is no longer effective

Security

Net-security

20.8.19

Most IT pros find red team exercises more effective than blue team testing

Security

Net-security

20.8.19

Adoption of NAS solutions projected to rise steadily in the near future

Security

Net-security

19.8.19

AWS: No Significant Issues at Other Alleged Targets of Capital One HackerSecuritySecurityweek

19.8.19

Data Protection and Privacy: Think 360, Demand 360SafetySecurityweek

19.8.19

UK Hacker Sentenced to 20 Months in PrisonCrimeSecurityweek
19.8.19Organizations Expose Sensitive Data via Malware Analysis SandboxesVirusSecurityweek
19.8.19Ransomware Hits Texas Local GovernmentsRansomwareSecurityweek

19.8.19

Router Network Isolation Broken By Covert Data ExfiltrationHacking

Bleepingcomputer

19.8.19

Steam Accounts Being Stolen Through Elaborate Free Game ScamSpam

Bleepingcomputer

19.8.19

Windows 10 v1809 KB4512534 Update Released With VB Fix and MoreVulnerebility

Bleepingcomputer

19.8.19'Coordinated Ransomware Attack' in Texas Hits 23 Local GovernmentsRansomware

Bleepingcomputer

19.8.19Microsoft Confirms Windows 10 1903 Update Error 0x80073701, Working on FixVulnerebility

Bleepingcomputer

19.8.19

IT threat evolution Q2 2019AnalysisSecurelist

19.8.19

European Central Bank shuts down website following hack, data theft

BigBrothers

Net-security

19.8.19

5 Common Phishing Attacks and How to Avoid Them?PhishingSecurityaffairs
19.8.19Galaxy S10 is the first 5G phone that can be used by US DoDMobilSecurityaffairs
19.8.19At least 23 Texas local governments targeted by coordinated ransomware attacksRansomwareSecurityaffairs
19.8.19Bluetana App allows detecting Bluetooth card skimmers in just 3 secondsCyberCrimeSecurityaffairs

19.8.19

Intel addresses High-Severity flaws in NUC Firmware and other toolsVulnerebilitySecurityaffairs
19.8.19Uganda, Zambia Deny Huawei Helped Spy on Political OpponentsBigBrothersSecurityweek

19.8.19

Red teaming: Why a forward offense is the best defense

Security

Net-security

19.8.19

Ransomware attacks hit 1 in 5 Americans

Ransomware

Net-security

19.8.19

Researchers were able to detect what is typed using just a smartphone

Mobil

Net-security

19.8.19

Deception technology shifts power back to the defender

Security

Net-security

19.8.19

Routers from well-known manufacturers vulnerable to cross-router data leaks

Hacking  Vulnerebility

Net-security

19.8.19

Total global shipments of secure embedded hardware to double by 2023

IT

Net-security

19.8.19

Critical Bluetooth flaw opens millions of devices to eavesdropping attacks

Vulnerebility

Net-security

18.8.19

Windows Updates Start Rolling Out to Fix Visual Basic IssuesVulnerebility

Bleepingcomputer

18.8.19

Windows 10 Notepad To Get Faster Updates via the Microsoft StoreOS

Bleepingcomputer

18.8.19

Steam Security Saga Continues with Vulnerability Fix BypassVulnerebility

Bleepingcomputer

18.8.19

Windows 10 Insider Build 18963 Adds GPU Temperature MonitoringOS

Bleepingcomputer

18.8.19

Mozilla Firefox Bug Let Third-Parties Access Saved PasswordsVulnerebility

Bleepingcomputer

18.8.19

Decade-Long Bank Account Hacking Scheme Gets Fraudster 57 MonthsHacking

Bleepingcomputer

18.8.19

Phone Numbers Exposed By Inconsistent Password Reset ProcessesMobil

Bleepingcomputer

18.8.19

Microsoft Warns of Phishing Attacks Using Custom 404 PagesPhishing

Bleepingcomputer

18.8.19

Google Has Started Removing FTP Support From ChromeSecurity

Bleepingcomputer

18.8.19

Windows 10 1903 Users Report Errors Installing KB4512508 UpdateVulnerebility

Bleepingcomputer

18.8.19

Windows 10 Updates Cause Visual Basic Apps to Stop RespondingVulnerebility

Bleepingcomputer

18.8.19

Google Estimates 1.5% of Web Logins Exposed in Data BreachesIncindent

Bleepingcomputer

18.8.19

Capital One hacker suspected to have breached other 30 companiesCyberSecurityaffairs

18.8.19

New DanaBot banking Trojan campaign targets GermanyVirusSecurityaffairs

18.8.19

Trend Micro addressed two DLL Hijacking flaws in Trend Micro Password ManagerVulnerebilitySecurityaffairs

18.8.19

Expert shows how to bypass a fix for a recently discovered Steam flawVulnerebilitySecurityaffairs

17.8.19

The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?

Hacking blog

Mcafee blog

17.8.19

McAfee AMSI Integration Protects Against Malicious Scripts

Malware blog

Mcafee blog

17.8.19

Showing Vulnerability to a Machine: Automated Prioritization of Software Vulnerabilities

Vulnerebility blog

FireEye

17.8.19

Say Cheese: Ransomware-ing a DSLR Camera

Ransomware blog

Checkpoint

17.8.19

SELECT code_execution FROM * USING SQLite;

Hacking blog

Checkpoint

17.8.19

Black Hat 2019 – WhatsApp Protocol Decryption for Chat Manipulation and More

Cyber blog

Checkpoint

17.8.19

Down the Rabbit-Hole...

Vulnerebility blog

Project Zero

17.8.19

Talos Black Hat 2019 flash talk roundup

Security blog

Cisco Talos

17.8.19

Microsoft Patch Tuesday — Aug. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

17.8.19

AI: Artificial Ignorance

Cyber blog

Eset

17.8.19

Microsoft warns of new BlueKeep‑like flaws

Vulnerebility blog

Eset

17.8.19

In the Balkans, businesses are under fire from a double‑barreled weapon

Security blog

Eset

17.8.19

Hacking my airplane – BlackHat edition

Hacking blog

Eset

17.8.19Ransom NewsRansom NewsRansom News
17.8.19

USBSamurai — A Remotely Controlled Malicious USB HID Injecting Cable for less than 10$

Virus

Securityaffairs
17.8.19

700,000 records belonging to Choice Hotels customer leaked online. Crooks demanded ransom

Ransomware

Securityaffairs
17.8.19

Hurry Up! Update your LibreOffice because 2 patches have been bypassed

Vulnerebility

Securityaffairs
17.8.19

Iowa Grocery Chain Investigating Possible Hack of Payment Processing Systems

Hacking

Securityweek
17.8.19

Apple Sues Corellium Over Security Research Tool

Apple

Securityweek
17.8.19

Breached Passwords Still in Use By Hundreds of Thousands

Incindent

Threatpost

17.8.19

ThreatList: 4.1B Records Exposed in Breaches in First Half of 2019

Incindent

Threatpost

17.8.19

News Wrap: DejaBlue Bugs and Biometrics Data Breaches

Privacy  Security

Threatpost

17.8.19

Fake News and Influence: Information Warfare in the Digital Age

Security

Threatpost

17.8.19

The DAA File Format

Virus

SANS

17.8.19

Critical Bluetooth flaw opens millions of devices to eavesdropping attacks

Attack  Vulnerebility

Net-security

16.8.19Apple Plans to Block All Covert, Cross-Site Tracking in SafariApple

Bleepingcomputer

16.8.19Unique Kaspersky AV User ID Allowed 3rd-Party Web TrackingSecurity

Bleepingcomputer

16.8.19Microsoft Edge Now Reads Web Pages in 24 Different VoicesOS

Bleepingcomputer

16.8.19Microsoft Voicemail Notifications Used As Bait in Phishing CampaignPhishing

Bleepingcomputer

16.8.19Trend Micro Fixes Privilege Escalation Bug in Password ManagerVulnerebility

Bleepingcomputer

16.8.19Lateral Phishing Attacks: A Growing Threat to the EnterprisePhishing

Bleepingcomputer

16.8.19Chrome and Firefox Changes Spark the End of EV CertificatesSafety

Bleepingcomputer

16.8.19Microsoft Releases the August 2019 Security Updates for OfficeVulnerebility

Bleepingcomputer

16.8.19Windows CTF Flaws Enable Attackers to Fully Compromise SystemsVulnerebility

Bleepingcomputer

16.8.19Attackers Use Backdoor and RAT Cocktail to Target the BalkansVirus

Bleepingcomputer

16.8.19Windows 7 SHA-2 Updates Blocked If Symantec, Norton AVs InstalledSafety

Bleepingcomputer

16.8.19Phishing Campaign Uses Google Drive to Bypass Email GatewaysPhishing

Bleepingcomputer

16.8.19New Norman Cryptominer Uses Dynamic DNS for C2 CommunicationCryptocurrency

Bleepingcomputer

16.8.19Intel Updates NUC Firmware to Patch High Severity BugVulnerebilityBleepingcomputer
16.8.19European Central Bank (ECB) discloses data breach in BIRD NewsletterBigBrothersSecurityaffairs
16.8.19Uganda Slams Report Huawei Helped Spy on Opposition LeaderBigBrothers

Securityweek

16.8.19Many Users Don't Change Unsafe Passwords After Being Warned: GoogleSecuritySecurityweek
16.8.19Cybersecurity Has Become a Political Issue for Americans, Survey ShowsCyber

Securityweek

16.8.19European Central Bank Shuts Down 'BIRD Portal' After Getting HackedBigBrothers  HackingThehackernews
16.8.19Patches for 2 Severe LibreOffice Flaws Bypassed — Update to Patch AgainVulnerebilityThehackernews
16.8.19Bluetana App Quickly Detects Hidden Bluetooth Card Skimmers at Gas PumpsCyberCrimeThehackernews
16.8.19

Apache Security Advisories Red Flag Wrong Versions in Patching Gaffe

Vulnerebility

Threatpost

16.8.19

HTTP Bugs Open Websites to DoS Attacks

Attack  Vulnerebility

Threatpost

16.8.19

Choice Hotels Breach Showcases Need for Shared Responsibility Model

Incindent

Threatpost

16.8.19

Energy Sector Phish Swims Past Microsoft Email Security via Google Drive

Phishing

Threatpost

16.8.19

Clickjacking Evolves to Hook Millions of Top-Site Visitors

Hacking

Threatpost

16.8.19

Mozilla addresses “master password” security bypass flaw in Firefox

Vulnerebility

Securityaffairs
16.8.19

Biometric data of 1M leaked via an unsecured Suprema owned database

Privacy  Security

Securityaffairs
16.8.19

A flaw in Kaspersky Antivirus allowed tracking its users online

Vulnerebility

Securityaffairs
16.8.19

Many Apache Struts Security Advisories Updated Following Review

Vulnerebility

Securityweek

16.8.19

ECB Uncovers Data Breach in Bank Newsletter

Incindent

Securityweek
16.8.19

Vulnerability Patched in Firefox Password Manager

Vulnerebility

Securityweek

16.8.19

Intel Patches High-Severity Flaws in Tools, NUC Firmware

Vulnerebility

Securityweek
16.8.19

Millions of Unencrypted Fingerprint and Facial Biometrics Found on Unsecured Database

Privacy  Security

Securityweek

16.8.19

Kaspersky Makes Changes After Products Raise Privacy Concerns

Vulnerebility

Securityweek
16.8.19

Analysis of a Spearphishing Maldoc

Spam  Virus

SANS

16.8.19

Closing the cyber skills gap: What to do next

Cyber

Net-security

16.8.19

Researchers reveal the latest lateral phishing tactics

Phishing

Net-security

16.8.19

3,813 breaches were reported through June 30, exposing over 4.1 billion records

Incindent

Net-security

16.8.19

Threat actors are adapting and switching their operations strategically and technically

Security

Net-security

16.8.19

Digital transformation helps companies work smarter yet makes them vulnerable to breaches

Vulnerebility

Net-security

15.8.19Threat actors use a Backdoor and RAT combo to target the BalkansVirusSecurityaffairs
15.8.19DLL Hijacking Flaws Patched in Trend Micro Password ManagerVulnerebility

Securityweek

15.8.19Owners of Fake Tech Company Plead Guilty to Fraud ChargesSecuritySecurityweek
15.8.19Kaspersky Antivirus Flaw Exposed Users to Cross-Site Tracking OnlineVulnerebilityThehackernews
15.8.19New HTTP/2 Flaws Expose Unpatched Web Servers to DoS AttacksVulnerebility

Bleepingcomputer

15.8.19New Bluetooth KNOB Flaw Lets Attackers Manipulate TrafficVulnerebility

Bleepingcomputer

15.8.19New Cerberus Android Banker Uses Pedometer to Avoid AnalysisAndroid  Virus

Bleepingcomputer

15.8.19Microsoft's August 2019 Patch Tuesday Fixes 95 VulnerabilitiesVulnerebility

Bleepingcomputer

15.8.19Windows 10 Cumulative Update KB4512508 & KB4511553 ReleasedVulnerebility

Bleepingcomputer

15.8.19Microsoft Fixes Critical Windows 10 Wormable Remote Desktop FlawsVulnerebility

Bleepingcomputer

15.8.19Hackers Target the North American Hotel Industry With a RATVirus

Bleepingcomputer

15.8.19Adobe Releases Security Updates for Reader, Photoshop, and MoreVulnerebility

Bleepingcomputer

15.8.19Curious Orca BEC Scammers Use Email Probes to Validate TargetsSpam

Bleepingcomputer

15.8.19HVACking: Remotely Exploiting Bugs in Building Control SystemsHacking

Bleepingcomputer

15.8.19Android Security: A Peek Behind the ScenesAndroid

Bleepingcomputer

15.8.19Steam Security Vulnerability Fixed, Researchers Don't AgreeVulnerebility

Bleepingcomputer

15.8.194G Router Vulnerabilities Let Attackers Take Full ControlMobil  Vulnerebility

Bleepingcomputer

15.8.19Nmap 7.80 DEF CON Release: First Stable Version in Over a YearSafety

Bleepingcomputer

15.8.19Cloud Atlas Hackers Add Polymorphic Malware to Their ToolkitCyberSpy  Virus

Bleepingcomputer

15.8.19Apple Issues Solutions for Macs Unable to Access Windows SharesAppleBleepingcomputer
15.8.19

DEF CON and Feds Partner on Anonymous Bug Submission Program

Congress

Threatpost

15.8.19

20-Year-Old Bug in Legacy Microsoft Code Plagues All Windows Users

Vulnerebility

Threatpost

15.8.19

Fingerprints of 1M Exposed in Public Biometrics Database

Incindent  Privacy

Threatpost

15.8.19

Windows Users at Risk From High-Severity Intel Software Flaw

Vulnerebility

Threatpost

15.8.19

Lenovo Warns of ThinkPad Bugs, One Unpatched

Vulnerebility

Threatpost

15.8.19

Facebook Records User Audio, Sparking Privacy Questions

Social

Threatpost

15.8.19

Norman Cryptominer Employs Sophisticated Obfuscation Tactics

Cryptocurrency

Threatpost

15.8.19

TikTok Scammers Cash In On Adult Dating, Impersonation Tricks

Spam

Threatpost

15.8.19KNOB attack threatens over a billion Bluetooth-enabled devicesAttackSecurityaffairs
15.8.19Security Patch Day for August includes the most critical Note released by SAP in 2019VulnerebilitySecurityaffairs
15.8.19Flaws in HTTP/2 implementations expose servers to DoS attacksAttack  VulnerebilitySecurityaffairs
15.8.19Feds: Capital One Suspect May Have Hacked 30-Plus CompaniesBigBrothers

Securityweek

15.8.19New Bluetooth Vulnerability Allows Attackers to Intercept TrafficVulnerebilitySecurityweek
15.8.19SAP Patches Highest Number of Critical Flaws Since 2014VulnerebilitySecurityweek
15.8.19British Airways Criticized for Exposing Passenger Flight DetailsIncindent  Privacy

Securityweek

15.8.19Myers-Briggs Study Examines Employee Personality Traits and Cyber BehaviorsCyber

Securityweek

15.8.19Microsoft Warns of New BlueKeep-Like, Wormable RDS VulnerabilitiesVulnerebility

Securityweek

15.8.19New Bluetooth Vulnerability Lets Attackers Spy On Encrypted ConnectionsAttack  VulnerebilityThehackernews
15.8.19

Extending security to fourth parties your business needs, but doesn’t control

Security

Net-security

15.8.19

AI vs. AI: Cybersecurity battle royale

Cyber

Net-security

15.8.19

A compendium of container escapes

Security

Net-security

15.8.19

Organizations that scan applications in production have a reduced risk of being breached

Security

Net-security

15.8.19

Thefts from cryptocurrency exchanges continue despite increased security

Cryptocurrency

Net-security

15.8.19

Huge database found leaking biometric, personal info of millions

Privacy

Net-security

14.8.19Czech Republic ‘s committee blames foreign state for Foreign Ministry CyberattackBigBrothersSecurityaffairs
14.8.19HTTP/2 Implementation Vulnerabilities Expose Servers to DoS AttacksAttack  VulnerebilitySecurityweek
14.8.19Facebook Listened to Users' Conversations: ReportSocialSecurityweek
14.8.19Siemens SCALANCE X Switches Vulnerable to DoS AttacksAttackSecurityweek
14.8.198 New HTTP/2 Implementation Flaws Expose Websites to DoS AttacksAttackThehackernews
14.8.19

August 2019 Patch Tuesday: Microsoft plugs critical wormable RDP holes

Vulnerebility

Net-security

14.8.19

The changing face of DDoS attacks: Degraded performance instead of total takedown

Attack

Net-security

14.8.19

Cerberus Enters the Android Malware Rental Scene

Android  Virus

Threatpost

14.8.19

British Airways E-Ticketing Flaw Exposes Passenger Flight, Personal Data

Incindent

Threatpost

14.8.19

Shades of BlueKeep: Wormable Remote Desktop Bugs Top August Patch Tuesday List

Vulnerebility

Threatpost

14.8.19

22 Critical Flaws Patched in Adobe Photoshop

Vulnerebility

Threatpost

14.8.19HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustionAlertAlert
14.8.19Microsoft Patch Tuesday for August 2019 patch 93 bugs, including 2 dangerous wormable issuesVulnerebilitySecurityaffairs
14.8.19Google hacker discloses 20-year-old Windows flaw still unpatchedVulnerebilitySecurityaffairs
14.8.19Adobe Patch Tuesday for August 2019 fixed 119 flaws in 8 productsVulnerebilitySecurityaffairs
14.8.19Cerberus, a new banking Trojan available as malware-as-a-service in the undergroundVirusSecurityaffairs
14.8.19Czechs Blame Foreign State for Foreign Ministry CyberattackBigBrothersSecurityweek
14.8.19Microsoft Patches Over 90 Vulnerabilities With August 2019 UpdatesVulnerebilitySecurityweek
14.8.19Adobe Patches 118 Vulnerabilities Across Eight ProductsVulnerebilitySecurityweek
14.8.19Free MANRS Tool Helps Improve Routing SecuritySecuritySecurityweek
14.8.194 New BlueKeep-like 'Wormable' Windows Remote Desktop Flaws DiscoveredVulnerebilityThehackernews
14.8.19Google Discloses 20-Year-Old Unpatched Flaw Affecting All Versions of WindowsVulnerebilityThehackernews
14.8.19Cerberus: A New Android 'Banking Malware For Rent' EmergesVirusThehackernews
14.8.19

Recent example of MedusaHTTP malware

Virus

SANS

14.8.19

Optimizing the patch management process

Vulnerebility

Net-security

14.8.19

Link between personality type and vulnerabilities to cybercrime

CyberCrime  Vulnerebility

Net-security

14.8.19

Help Net Security report: SecBI’s automated threat detection, response and hunting

Security

Net-security

13.8.19Flaws in 4G Routers of various vendors put millions of users at riskMobil  VulnerebilitySecurityaffairs
13.8.19SQLite Vulnerabilities Demoed With Hacking of iPhone, Malware C&CVulnerebility  VirusSecurityweek
13.8.19UN Probing 35 North Korean Cyberattacks in 17 CountriesAttack  BigBrothersSecurityweek
13.8.19Epic Games Hit With Class Action Lawsuit Over Hacked 'Fortnite' AccountsHackingThehackernews
13.8.19

Researchers discover 40+ insecure drivers for Windows

Vulnerebility

Net-security
13.8.19

AT&T, T-Mobile, Sprint, Verizon Blasted For Data Privacy Policies

Privacy

Threatpost
13.8.19

4 Dating Apps Pinpoint Users’ Precise Locations – and Leak the Data

Incindent

Threatpost
13.8.19

Recently Cloud Atlas used a new piece of polymorphic malware

CyberSpy  Virus

Securityaffairs

13.8.19

FBI is searching for contractors to monitor social media

BigBrothers

Securityaffairs
13.8.19

'Cloud Atlas' Cyberspies Use Polymorphic Malware in Government Attacks

CyberSpy  Virus

Securityweek
13.8.19

Android Users Can Now Log in to Google Services Using Fingerprint

Android

Thehackernews
13.8.19

Malicious .DAA Attachments

Virus

SANS
13.8.19

SOC-as-a-Service promises threat protection in a world of scarce resources

Safety

Net-security
13.8.19

Anomali discovers phishing campaign targeting Chinese government agencies

Phishing

Net-security
13.8.19

Nmap 7.80 released: A mature Npcap Windows packet capturing driver, 11 new NSE scripts

Safety

Net-security
12.8.19

Gamers Beware: Zero-Day in Steam Client Affects All Windows Users

Vulnerebility

Threatpost

12.8.19

DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR

Congress

Threatpost

12.8.19

Recent Cloud Atlas activity

APT

Securelist
12.8.19

Watch out, your StockX account details may be available in crime forums

Crime

Securityaffairs

12.8.19

Infecting Canon EOS DSLR camera with ransomware over the air

Ransomware

Securityaffairs
12.8.19

FBI, Facebook Could Clash Over Privacy vs. Monitoring

BigBrothers

Securityweek
12.8.19

Researchers Demonstrate Ransomware Attack on DSLR Camera

Ransomware

Securityweek
12.8.19

McAfee Strengthens Container Security Capabilities With NanoSec Acquisition

Security

Securityweek
12.8.19

Apple Offers Up to $1 Million in Public Bug Bounty Program

Apple

Securityweek
12.8.19

'Saefko' Multi-Layered RAT Can Spread via USB Drives

Virus

Securityweek
12.8.19

Canon DSLR Cameras Can Be Hacked With Ransomware Remotely

Ransomware

Thehackernews

12.8.19Beware of Fake Microsoft Account Unusual Sign-in Activity EmailsSecurity

Bleepingcomputer

12.8.19Database from StockX Hack Sold Online, Check If You're IncludedHacking

Bleepingcomputer

12.8.19Canon DSLR Camera Infected with Ransomware Over the AirRansomware

Bleepingcomputer

12.8.19Windows 10 Security Alert: Vulnerabilties Found in Over 40 DriversVulnerebility

Bleepingcomputer

12.8.19Google Chrome Incognito Mode Can Still Be Detected by These MethodsSecurity

Bleepingcomputer

12.8.19Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoorVulnerebility

Securityaffairs

12.8.19Gaining remote code execution using a tainted SQLite databaseExploitSecurityaffairs
12.8.19Vulnerabilities in Device Drivers From 20 Vendors Expose PCs to Persistent MalwareVulnerebility  VirusSecurityweek
12.8.19Over 40 Drivers Could Let Hackers Install Persistent Backdoor On Windows PCsVirusThehackernews
12.8.19Recon Montreal 2019Conference PressConference Press
12.8.19DefCon27Conference PressConference Press
12.8.19BlackHat 2019 USAConference PressConference Press
12.8.19

Nmap Defcon Release: 7.80

SecurityNet-security
12.8.19

Moving away from spreadsheets: How to automate your third-party risk management process

SecurityNet-security
12.8.19

Pitfalls to avoid when improving your software development skills

SecurityNet-security
12.8.19

Kubernetes security matures: Inside the project’s first audit

SecurityNet-security

11.8.19

DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo

Congress

Threatpost

11.8.19

DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack

Congress

Threatpost

11.8.19

Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster

Security

Threatpost

11.8.19

Ransom NewsRansom NewsRansom News

11.8.19

Boffins hacked Siemens Simatic S7, most secure controllers in the industryICS

Securityaffairs

11.8.1910-year-old vulnerability in Avaya VoIP Phones finally fixedVulnerebility

Securityaffairs

11.8.19City of Naples, Florida, lost $700K after a cyberattackAttack

Securityaffairs

11.8.19Varenyky Spambot Trojan targets French users in alleged sextortion campaignSpam  Virus

Securityaffairs

11.8.19Android Apps containing Clicker Trojan installed on over 100M devicesAndroidSecurityaffairs

10.8.19

Facebook hits two app developers with lawsuit

Social blog

Eset

10.8.19

Varenyky: Spambot à la Française

Spam blog

Eset

10.8.19

FBI warns of romance scams using online daters as money mules

BigBrother blog

Eset

10.8.19

Sharpening the Machete

Cyber blog

Eset

10.8.19

Vulnerability Spotlight: Multiple vulnerabilities in NVIDIA Windows GPU Display Driver, VMware ESXi, Workstation and Fusion

Vulnerebility blog

Cisco Talos

10.8.19

Malvertising: Online advertising's darker side

Malware blog

Cisco Talos

10.8.19

The Fully Remote Attack Surface of the iPhone

Hardware blog  OS Blog

Project Zero

10.8.19

Reverse RDP Attack: The Hyper-V Connection

Hacking blog

Checkpoint

10.8.19

Black Hat 2019 – WhatsApp Protocol Decryption for Chat Manipulation and More

Hacking blog

Checkpoint

10.8.19

Finding Evil in Windows 10 Compressed Memory, Part Three: Automating Undocumented Structure Extraction

Hacking blog

FireEye

10.8.19

APT41: A Dual Espionage and Cyber Crime Operation

APT blog

FireEye

10.8.19

Commando VM 2.0: Customization, Containers, and Kali, Oh My!

Safety blog

FireEye

10.8.19

Finding Evil in Windows 10 Compressed Memory, Part Two: Virtual Store Deep Dive

Hacking blog

FireEye

10.8.19

From Building Control to Damage Control: A Case Study in Industrial Security Featuring Delta’s enteliBUS Manager

ICS blog

Mcafee blog

10.8.19

HVACking: Understanding the Delta Between Security and Reality

Hacking blog

Mcafee blog

10.8.19

Avaya Deskphone: Decade-Old Vulnerability Found in Phone’s Firmware

Hardware blog

Mcafee blog

10.8.19

MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play

Malware blog

Mcafee blog

10.8.19

The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land

Hacking blog

Mcafee blog

10.8.19

SODINOKIBI: THE CROWN PRINCE OF RANSOMWARE

Ransomware blog

Cybereason

10.8.19

KDE Vulnerability Fixed By Removing Shell Command SupportVulnerebility

Bleepingcomputer

10.8.19

Microsoft Office Phishers Move to Enterprise AWS Landing PagesPhishing

Bleepingcomputer

10.8.19

Android Apps With Over 100M Installs Contain a Clicker TrojanAndroid

Bleepingcomputer

10.8.19

Customer Information Exposed In Air New Zealand Phishing AttackPhishing

Bleepingcomputer

10.8.19

Apple Opens Its Invite-Only Bug Bounty Program to All ResearchersApple

Bleepingcomputer

10.8.19

Microsoft 365 to Get Enhanced Suspicious Content SubmissionSecurity

Bleepingcomputer

10.8.19

3Fun Dating App Exposes Exact Location of Users and Personal InfoPrivacy

Bleepingcomputer

10.8.19

DEF CON 2019: Researchers Demo Hacking Google Home for RCE

Congress

Threatpost

10.8.19

Hack of High-End Hotel Smart Locks Shows IoT Security Fail

IoT

Threatpost

10.8.19

DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover

Congress

Threatpost

10.8.19

Election Security Threats: From Misinformation to Voting Machine Flaws

Vulnerebility

Threatpost

10.8.19

Decryptor JSWorm 4.0

Anti-Ransom Tool

Anti-Ransom Tool

10.8.19

Emsisoft released a free decryptor for JSWorm 4.0

Ransomware

Securityaffairs

10.8.19

3Fun Dating App leaked members’ location and personal details

Incindent

Securityaffairs

9.8.19

Steam Zero-Day Vulnerability Affects Over 100 Million Users

Vulnerebility

Bleepingcomputer

9.8.19

Avaya VoIP Phones Harbored 10-year Old Vulnerability

Vulnerebility

Bleepingcomputer

9.8.19

Two New Windows 10 19H2 Builds Released to Test CFR

OS

Bleepingcomputer

9.8.19

US Accounts for More than Half of World's Ransomware Attacks

Ransomware

Bleepingcomputer

9.8.19

New Trojan Records Your Screen When on Sex Related Sites

Virus

Bleepingcomputer

9.8.19

Google News Bug Preventing New Stories from Being Indexed

Vulnerebility

Bleepingcomputer

9.8.19

Microsoft Edge Dev Updated Released With Improvements

IT

Bleepingcomputer

9.8.19

State Farm Accounts Compromised in Credential Stuffing Attack

Attack  Incindent

Bleepingcomputer

9.8.19

National Baseball Hall of Fame Hit By Payment Card Stealing Attack

Attack  Incindent

Bleepingcomputer

9.8.19

Microsoft Ignored RDP Vulnerability Until it Affected Hyper-V

Vulnerebility

Bleepingcomputer

9.8.19

Microsoft Releases August 2019 Office Updates With Fixes, Improvements

Vulnerebility

Bleepingcomputer

9.8.19

Windows 10 Insider Build 18956 Brings the Always on Top Calculator

OS

Bleepingcomputer

9.8.19

Apple announces major changes to its bug bounty program, including higher rewardsAppleSecurityaffairs

9.8.19

Vulnerability Has Been Lurking in Avaya Phones for 10 YearsVulnerebility

Securityweek

9.8.19

Hidden Injection Flaws Found in BIG-IP Load BalancersHacking

Securityweek

9.8.19

Repurposing Mac Malware Not Difficult, Researcher ShowsAppleSecurityweek

9.8.19

Google Chrome Tests Feature That Gives Any Site a Dark Mode

Security

Bleepingcomputer

9.8.19

Google's Cloud IAP Now Generally Available for Cloud VM Clients

Security

Bleepingcomputer

9.8.19

New ISOs of Windows 10 20H1 Update Released

OS

Bleepingcomputer

9.8.19

Leapfrog Children’s Tablet Owners Should Remove Pet Chat Now

Security

Bleepingcomputer

9.8.19

Lokibot Uses Image Files to Hide Code for Unpacking Routine

BotNet

Bleepingcomputer

9.8.19

Fraudster Unlocks Over 2 Million AT&T Phones, Pays $1 Million

Incindent  Mobil

Bleepingcomputer

9.8.19

SWAPGS Vulnerability in Modern CPUs Fixed in Windows, Linux, ChromeOS

Vulnerebility

Bleepingcomputer

9.8.19

New Echobot Botnet Variant Uses Over 50 Exploits to Propagate

BotNet

Bleepingcomputer

9.8.19

Zero-Day Bug in KDE 4/5 Executes Commands by Opening a Folder

Vulnerebility

Bleepingcomputer

9.8.19

AT&T Launches Public Bug Bounty Program on HackerOne

Security

Bleepingcomputer

9.8.19

Clever Amazon Phishing Scam Creates Login Prompts in PDF Docs

Phishing

Bleepingcomputer

9.8.19

FBI Warns of Romance Scams Turning Victims into Money Mules

BigBrothers  Spam

Bleepingcomputer

9.8.19

New Windows 10 Cloud Reset Feature Spotted in Insider Builds

OS

Bleepingcomputer

9.8.19

Microsoft To Disable VBScript by Default on August 13th

Security

Bleepingcomputer

9.8.19

New Lord Exploit Kit Pushes njRAT and ERIS Ransomware

Exploit  Ransomware

Bleepingcomputer

9.8.19

CafePress Data Breach Exposes Personal Info of 23 Million Users

Incindent

Bleepingcomputer

9.8.19

Apple expands bug bounty program, opens it to all researchers, raises rewards

Apple

Net-security

9.8.19

Apple will now pay hackers up to $1 million for reporting vulnerabilities

Apple

Thehackernews

9.8.19

Critical RCE Bug Found Lurking in Avaya VoIP Phones

Vulnerebility

Threatpost

9.8.19

Researchers Bypass Apple FaceID Using Biometrics ‘Achilles Heel’

Apple

Threatpost

9.8.19

Black Hat 2019: Addressing Supply-Chain Risk Starts with People, Microsoft Says

Congress

Threatpost

9.8.19

Apple Upgrades Bug Bounty Program: Adds Macs, $1M Reward

Apple

Threatpost

9.8.19

State Farm Falls Victim to Credential-Stuffing Attack

Attack  Incindent

Threatpost

9.8.19

Phishing Attacks Enlist Amazon AWS, Microsoft Azure in Ploys

Phishing

Threatpost

9.8.19

Vulnerabilities in Siemens’ most secure industrial PLCs can lead to industrial havoc

ICS

Net-security

9.8.19

A Zero-Day in Steam client for Windows affects over 100 Million usersVulnerebilitySecurityaffairs

9.8.19

WhatsApp flaws allow the attackers to manipulate conversationsSocialSecurityaffairs

9.8.19

New strain of Clipsa malware launches brute-force attacks on WordPress sitesVirusSecurityaffairs

9.8.19

Broadcom to Buy Symantec Enterprise Unit for $10.7 BillionITSecurityweek

9.8.19

Hackers Can Use Rogue Engineering Stations to Target Siemens PLCsICSSecurityweek

9.8.19

New Windows Process Injection Can Be Useful for Stealthy MalwareVirusSecurityweek

9.8.19

Privacy Platform Provider Securiti.ai Emerges From Stealth With $31 Million FundingITSecurityweek

9.8.19

GM Cruise Releases Automated Firmware Security Analyzer to Open SourceSecuritySecurityweek

9.8.19

Researchers Find Vulnerabilities in Boeing 787 FirmwareVulnerebilitySecurityweek

9.8.19

100% JavaScript Phishing Page

Phishing

SANS

9.8.19

Security flaw could turn load balancers into beachheads for cyber attacks

Vulnerebility

Net-security

9.8.19

August 2019 Patch Tuesday forecast: Expect updates from Adobe, stay current on other updates

Vulnerebility

Net-security

9.8.19

Six critical areas to focus on when integrating DevSecOps into an organization

Security

Net-security

8.8.19

[Guest Diary] The good, the bad and the non-functional, or "how not to do an attack campaign"

CyberCrime

SANS

8.8.19

Photo gallery: Black Hat USA 2019, part two

Congress

Net-security

8.8.19

AttackSurfaceMapper automates the reconnaissance process

Security

Net-security

8.8.19

Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack

Congress

Threatpost

8.8.19

DEF CON 2019: 35 Bugs in Office Printers Offer Hackers an Open Door

Congress

Threatpost

8.8.19

New SWAPGS Side-Channel Attack Bypasses Spectre and Meltdown Defenses

Attack

Threatpost

8.8.19

Black Hat 2019: WhatsApp Users Still Open to Message Manipulation

Congress

Threatpost

8.8.19

Researchers Bypass Apple FaceID Using Biometrics ‘Achilles Heel’

Apple

Threatpost

8.8.19

Ransomware Sees Triple-Digit Spike in Corporate Detections

Ransomware

Threatpost

8.8.19

Phishing Attacks Enlist Amazon AWS, Microsoft Azure in Ploys

Phishing

Threatpost

8.8.19

Black Hat 2019: 5G Security Flaw Allows MiTM, Targeted Attacks

Congress

Threatpost

8.8.19

Black Hat 2019: Ethical Hackers Must Protect Digital Human Rights

Congress

Threatpost

8.8.19

Black Hat 2019: Security’s Powerful Cultural Transformation

Congress

Threatpost

8.8.19

Smominru Cryptominer Scrapes Credentials for Half-Million Machines

Cryptocurrency

Threatpost

8.8.19

Security Vulnerabilities Are Increasingly Putting Kids at Risk

Vulnerebility

Threatpost

8.8.19

Black Hat: LeapFrog Tablet Flaws Let Attackers Track, Message Kids

Congress

Threatpost

8.8.19

Vulnerability in Kubernetes Allows Access to Custom Resources

Vulnerebility

Securityweek
8.8.19

Facebook Sues Two Android App Developers for Click Injection Fraud

Android  Social

Thehackernews
8.8.19

Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises

Security

Net-security
8.8.19

Researchers uncover over 35 vulnerabilities in six leading enterprise printers

Vulnerebility

Net-security

8.8.19

American Insurance firm State Farm victim of credential stuffing attacksIncindent

Securityaffairs

8.8.19Cisco addressed critical flaws in Cisco Small Business 220 Series Smart SwitchesVulnerebility

Securityaffairs

8.8.19Microsoft Says It 'Listens' to Conversations Only With PermissionSecurity

Securityweek

8.8.19

US Formalizes Ban on Government Contracts to China's Huawei, OthersBigBrothers

Securityweek

8.8.19Network Shares Are a Primary Target for RansomwareRansomware

Securityweek

8.8.19Cisco Patches Critical Flaws in Network SwitchesVulnerebility

Securityweek

8.8.19

Twitter Again Admits Sharing User Data Without PermissionSocial

Securityweek

8.8.19The Fundamentals of Developing Effective DevSecOpsSecurity

Securityweek

8.8.19Reverse RDP Attack Also Enables Guest-to-Host Escape in Microsoft Hyper-VAttackThehackernews
8.8.19

Which are the most capable breach prevention systems?

Incindent

Net-security
8.8.19

Automation, visibility remain biggest issues for cybersecurity teams

Cyber

Net-security
8.8.19

What’s cybercriminals’ most effective weapon in a ransomware attack?

Ransomware

Net-security

7.8.19

OilRig APT group: the evolution of attack techniques over time

APT

Securityaffairs

7.8.19

The number of exploits in the Echobot botnet reached 59

BotNet  Exploit

Securityaffairs

7.8.19

SQL Injection Vulnerability Exposed Starbucks Financial Records

Hacking  Vulnerebility

Securityweek

7.8.19

Millions of Devices With Intel CPUs Exposed to SWAPGS Attack

Attack

Securityweek

7.8.19

Binance KYC Data Leak — Crypto Exchange Sets $290,000 Bounty On Blackmailer

Cryptocurrency

Thehackernews

7.8.19

Warshipping: Attackers can access corporate networks through the mailroom

Attack

Net-security

7.8.19

Verifying SSL/TLS configuration (part 2)

Crypto

SANS

7.8.19

49% of all risky online transactions come from mobile devices

Mobil

Net-security

7.8.19

Critical holes plugged in Cisco 220 Series smart switches

Vulnerebility

Net-security

7.8.19

SWAPGS Attack – A new Spectre-V1 attack affects modern chips

Attack

Securityaffairs

7.8.19

New Lord Exploit Kit appears in the threat landscape

Exploit

Securityaffairs

7.8.19

Expert publicly disclosed a zero-day vulnerability in KDE

Vulnerebility

Securityaffairs

7.8.19

Crooks turn victims into money mules via confidence/romance scams

Spam

Securityaffairs

7.8.19

Developer Bypasses Chrome's Anti-Incognito Detection

Security

Securityweek

7.8.19

Baldr Malware: A Short-Lived Star or Info Stealer That Will Return?

Virus

Securityweek

7.8.19

New 'Lord' Exploit Kit Emerges

Exploit

Securityweek

7.8.19

Slack Unveils New Enterprise Security Tools

Security

Securityweek

7.8.19

Pakistani Man Bribed AT&T Employees to Unlock Phones, Plant Malware

Virus

Securityweek

7.8.19

Cloud Providers Improving Security, But Users Need to Up Their Game

Security

Securityweek

7.8.19

Russian Hackers Leverage IoT Devices to Access Corporate Networks

Hacking  IoT

Securityweek

7.8.19

KDE Linux Desktops Could Get Hacked Without Even Opening Malicious Files

Virus

Thehackernews

7.8.19

SWAPGS Attack — New Speculative Execution Flaw Affects All Modern Intel CPUs

Attack

Thehackernews

7.8.19

Pakistani Man Bribed AT&T Insiders to Plant Malware and Unlock 2 Million Phones

Virus

Thehackernews

7.8.19

Organizations are employing cyber-resilient strategies in new ways

Cyber

Net-security

7.8.19

Qualys bringing new prescription for security to Black Hat and DEF CON 2019

Congress

Net-security

7.8.19

SWAPGS Attack: A new Spectre haunts machines with Intel CPUs

Attack

Net-security

6.8.19

ECH0RAIX DECODERAnti-Ramson ToolAnti-Ramson Tool

6.8.19

QualPwn Bugs In Snapdragon SoC Can Attack Android Over the AirAndroid

Bleepingcomputer

6.8.19

ECh0raix Ransomware Decryptor Restores QNAP Files For FreeRansomware

Bleepingcomputer

6.8.19

Microsoft Releases Windows Terminal v0.3 With Major ImprovementsOS

Bleepingcomputer

6.8.19

Monzo Asks Clients to Reset PINs After Exposure to EmployeesIncindent

Bleepingcomputer

6.8.19

StockX Hack Exposes Personal Information of CustomersHacking  Incindent

Bleepingcomputer

6.8.19

Russian APT Abuses IoT Devices to Infiltrate Corporate TargetsAPT

Bleepingcomputer

6.8.19

Microsoft Invites Researchers to Hack Their Azure Security LabSecurity

Bleepingcomputer

6.8.19

How to Uninstall Windows 10 Updates ManuallyOS

Bleepingcomputer

6.8.19

Is Your Email One of 200 Million Targeted by Extortion Scams?Spam

Bleepingcomputer

6.8.19

GermanWiper Ransomware Erases Data, Still Asks for RansomRansomware

Bleepingcomputer

6.8.19

Beware of Emails Asking You to "Confirm Your Unsubscribe" RequestSpam

Bleepingcomputer

6.8.19

Extortion Emails on the Rise: A Look at The Different TypesSpam

Bleepingcomputer

6.8.19

CafePress Data Breach exposes technical details of 23 Million users

Incindent

Securityaffairs

6.8.19

The Evolution of Aggah: From Roma225 to the RG Campaign

APT

Securityaffairs

6.8.19

Microsoft Offers Up to $300,000 in New Azure Security Lab

Security

Securityweek

6.8.19

Cybereason Raises an Additional $200 Million in Funding

IT

Securityweek

6.8.19

Digital bank Monzo urges customers to change PINs following security breach

CyberCrime

Net-security

6.8.19

Microsoft sets up isolated environment for bug hunters to test attacks against Azure

Vulnerebility

Net-security

6.8.19

UN Report: North Korea Cyber Experts Raised Up to $2 Billion

BigBrothers

Securityweek

6.8.19

Privacy Watchdogs Warn Facebook Over Libra Currency

Privacy  Social

Securityweek

6.8.19

Recovering Wi-Fi Password via Dragonblood Attack Costs $1 of Computing Power

Attack

Securityweek

6.8.19

QualPwn Bugs in Qualcomm chips could allow hacking Android Over the Air

Android

Securityaffairs

6.8.19

New Flaws in Qualcomm Chips Expose Millions of Android Devices to Hacking

Android

Thehackernews

6.8.19

Microsoft Lab Offers $300K For Working Azure Exploits

Exploit

Threatpost

6.8.19

Puzzling Gwmndy Botnet Focuses on Low-Volume Proxy Connections

BotNet

Threatpost

6.8.19

E3 Website Leaks Private Addresses for Thousands of Journalists

Incindent

Threatpost

6.8.19

Russia-linked STRONTIUM APT targets IoT devices to hack corporate networks

APT

Securityaffairs

6.8.19

StockX hacked, customers’ data offered for sale on the dark web

Incindent

Securityaffairs

6.8.19

Embracing the cloud and meeting its security demands

Security

Net-security

6.8.19

Prevent lateral attacks inside the data center with a defense-in-depth hardware layer

Security

Net-security

6.8.19

Online skimming: An emerging threat that requires urgent awareness and attention

Security

Net-security

6.8.19

Only 32% of government organizations consider a cloud-first strategy

Security

Net-security

5.8.19

GermanWiper, a data-wiping malware that is targeting GermanyVirusSecurityaffairs

5.8.19

ID Theft Stings, But it's Hard to Pin on Specific Data HacksHackingSecurityweek

5.8.19

Industrial Giants Respond to 'Urgent/11' VulnerabilitiesVulnerebilitySecurityweek

5.8.19

JIRA Misconfiguration Leaks Data of Fortune 500 CompaniesSecuritySecurityweek

5.8.19

Connected Cars Could be a Threat to National Security, Group ClaimsSecuritySecurityweek

5.8.19

MegaCortex Ransomware Revamps for Mass Distribution

Ransomware

Threatpost

5.8.19

Google and ARM Tackle Android Bugs with Memory-Tagging

Android

Threatpost

5.8.19

Organizations Lack Confidence in Securing IoT, Survey Shows

IoT

Securityweek

5.8.19

Google, ARM Boost Android Security With Memory Tagging Extension

Android

Securityweek

5.8.19

DDoS attacks in Q2 2019AttackSecurelist

5.8.19

Machete cyber-espionage group targets Latin America militaryCyberSpySecurityaffairs

5.8.19

'Machete' Cyberspies Target Military in Venezuela, EcuadorCyberSpySecurityweek

5.8.19

Hacking Radio Blasting Systems for Fun & ExplosionsHacking

Securityaffairs

5.8.19

Fraudster stole $870,000 from 2 US universities with spear-phishing mailsPhishing

Securityaffairs

5.8.19

VMware Patches Potentially Serious Pixel Shader VulnerabilitiesVulnerebilitySecurityweek

5.8.19

There is widespread business confusion and ignorance about the upcoming CCPA regulation

Security

Net-security

5.8.19

The US Gov is testing high-altitude balloons for surveillance

BigBrothers

Securityaffairs

5.8.19

Poshmark, the social commerce marketplace, discloses a data breach

Incindent

Securityaffairs

5.8.19

Houston County Schools in Alabama delayed the school year’s opening due to a malware attack

Virus

Securityaffairs

5.8.19

DealPly adware abuses reputation services to remain under the radar

Virus

Securityaffairs

5.8.19

Sextortion: Follow the Money - The Final Chapter

Security

SANS

5.8.19

Security orchestration and automation checklist: How to choose the right vendor

Security

Net-security

5.8.19

DNS security is no longer optional

Security

Net-security

5.8.19

FSI organizations are failing to assess their software for security vulnerabilities before release

Security

Net-security

5.8.19

The persistent struggle to improve SOC productivity reveals the need for newer SIEM technologies

Security

Net-security

5.8.19

As attackers get more creative, mobile threats and attacks increase in both quantity and impact

Security

Net-security

5.8.19

Public cloud data continues to grow, headed toward $500 billion by 2023

Security

Net-security

5.8.19

Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial

Security

Net-security

4.8.19

Ransom NewsRansomRansom

4.8.19

Misconfigured JIRA Servers Leak Info on Users and Projects

Incindent

Bleepingcomputer

4.8.19

Windows 10 WSL2 Now Allows You to Configure Global Options

OS

Bleepingcomputer

4.8.19

NVIDIA Patches High Severity Flaws in Windows GPU Display Driver

Vulnerebility

Bleepingcomputer

4.8.19

Windows 10 1903 Blocked for Kerberos Domain Connected Devices

OS

Bleepingcomputer

4.8.19

Ransom Note Replaces 2.1M Customer Records on Open MongoDB

Ransomware

Bleepingcomputer

4.8.19

Scammer Arrested After Defrauding US Universities of Over $870K

Spam

Bleepingcomputer

4.8.19

Phishing Attacks Target US Utilities with Remote Access Trojan

Phishing  Virus

Bleepingcomputer

4.8.19

Malware Attack Delays Alabama District's School Year Twice

Attack  Virus

Bleepingcomputer

4.8.19

1M+ Payment Card Details from South Korea Sold on the Dark Web

CyberCrime

Bleepingcomputer

4.8.19

Gerry - A Font of Gerrymandered Districts to Troll Congress

IT

Bleepingcomputer

4.8.19

DRAGONBLOOD flaws allow hacking WPA3 protected WiFi passwords

Vulnerebility

Securityaffairs

4.8.19

SystemBC, a new proxy malware is being distributed via Fallout and RIG EK

Exploit

Securityaffairs

3.8.19

DHCP Client Remote Code Execution Vulnerability Demystified

Vulnerebility blog

Mcafee blog

3.8.19

Clop Ransomware

Ransomware blog

Mcafee blog

3.8.19

The Twin Journey, Part 1

Hacking blog

Mcafee blog

3.8.19

Cobalt Group Returns To Kazakhstan

Cyber blog

Checkpoint

3.8.19

BEC Scams Remain a Billion-Dollar Enterprise, Targeting 6K Businesses Monthly

Spam blog

Symantec

3.8.19

The Revival and Rise of Email Extortion Scams

Spam blog

Symantec

3.8.19

Smart TVs: Yet another way for attackers to break into your home?

Attack blog

Eset

3.8.19

From Carnaval to Cinco de Mayo – The journey of Amavaldo

Exploit blog  Vulnerebility blog

Eset

3.8.19

Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords

Hacking

Thehackernews

3.8.19

90% of Enterprise iPhone Users Open to iMessage Spy Attack

Apple

Threatpost

3.8.19

Apple Suspends Siri Program After Privacy Backlash

Apple  Privacy

Threatpost

3.8.19

Nation-State APTs Target U.S. Utilities With Dangerous Malware

APT  BigBrothers

Threatpost

3.8.19

Critical Bug in Android Antivirus Exposes Address Books

Android

Threatpost

3.8.19

Nation-state actor uses new LookBack RAT to target US utilities

Virus

Securityaffairs

3.8.19

How to Reverse Engineer, Sniff & Bruteforce Vulnerable RF Adult Toys with WHID Elite

Vulnerebility

Securityaffairs

3.8.19

New Mirai Variant Hides C&C Server on Tor Network

BotNet

Securityweek

3.8.19

Nine Distinct Threat Groups Targeting Industrial Systems: Dragos

ICS

Securityweek

3.8.19

New "LookBack" Malware Used in Attacks Against U.S. Utilities Sector

Virus

Securityweek

2.8.19

Microsoft Boosts Compromised Account Detection in Azure AD by 100%

Security

Bleepingcomputer

2.8.19

StockX Password Reset Emails Are Legit, Not a Phishing Attack

Phishing

Bleepingcomputer

2.8.19

DealPly Adware Abuses Microsoft Smartscreen to Boost AV Evasion

Virus

Bleepingcomputer

2.8.19

New SystemBC Malware Uses Your PC to Hide Malicious Traffic

Virus

Bleepingcomputer

2.8.19

PowerShell Empire Framework Is No Longer Maintained

Security

Bleepingcomputer

2.8.19

New Hexane Group Targets Oil and Gas, Telco Providers

CyberCrime

Bleepingcomputer

2.8.19

Google Chrome Hides WWW and HTTPS:// in the Address Bar Again

Security

Bleepingcomputer

2.8.19

FTC Tells Equifax Victims to Opt for Credit Monitoring Over $125

CyberCrime

Bleepingcomputer

2.8.19

Combining Low Tech Scams: SMS + SET + Credit Card Harvesting

Spam

SANS

2.8.19

US utilities targeted with spear-phishing emails impersonating engineering licensing board

Phishing

Net-security

2.8.19

Over 1 Million payment cards from South Korea sold on the Dark WebCyberCrimeSecurityaffairs

2.8.19

Lotsy group targets Italian and Spanish-speaking usersCyberCrimeSecurityaffairs

2.8.19

Facebook dismantled influence campaigns focused on Middle East and Northern AfricaSocialSecurityaffairs

2.8.19

Recently discovered Hexane group targets the oil and gas industryICSSecurityaffairs

2.8.19

New Mirai botnet hides C2 server in the Tor network to prevent takedownsBotNetSecurityaffairs

2.8.19

Unprotected Database Exposes Details of Honda's Internal NetworkIncindent

Securityweek

2.8.19

Congress Wants Capital One, Amazon to Explain Data BreachBigBrothers  Incindent

Securityweek

2.8.19

Faked Facebook Accounts Linked to Saudi Arabia, Mideast Region

Social

Securityweek

2.8.19

Scammers Grab $2.5 Million From North Carolina County in BEC Scam

Spam

Securityweek

2.8.19

Google Releases Beta of Anomaly Detection for G Suite Customers

Security

Securityweek

2.8.19

For $8.6M, Cisco Settles Suit Over Bug-Riddled Video Surveillance Software

Vulnerebility

Threatpost

2.8.19

Brand-New SystemBC Proxy Malware Spotted Using SOCKS5 for Stealth

Virus

Threatpost

2.8.19

Unpatched Flaws in IoT Smart Deadbolt Open Homes to Danger

IoT  Vulnerebility

Threatpost

2.8.19

Cylance Antivirus Products Susceptible to Concatenation Bypass

Alert

Alert

2.8.19

Five examples of user-centered bank fraud

CyberCrime

Net-security

2.8.19

Research shows that devices banned by US government lack basic security practices

BigBrothers

Net-security

2.8.19

Most interesting trends on cloud service and web usage

Security

Net-security

2.8.19

Many companies don’t know the depth of their IoT-related risk exposure

IoT

Net-security

1.8.19

What is Listening On Port 9527/TCP?

Security

SANS

1.8.19

MICROCHIPS Act aims at improving tech supply chain

Attack

Securityaffairs

1.8.19

FTC Warns Cash Option May beChrome to Add HTTP Cache Partitioning to Block Attacks, Tracking Small for Equifax Settlement

BigBrothers

Securityweek

1.8.19

Former NSA Contractor Edward Snowden Publishing Memoir

BigBrothers

Securityweek

1.8.19

'Hexane' Threat Actor Targeting Industrial Organizations

ICS

Securityweek

1.8.19

Alleged Capital One Hacker Barely Bothered to Hide

Hacking

Securityweek

1.8.19

Cisco ‘Knowingly’ Sold Hackable Video Surveillance System to U.S. Government

BigBrothers

Thehackernews

1.8.19

94% of attacks hitting financial services use one of four methods

Attack

Net-security

1.8.19

G Suite news: Anomalous alert activity for Google Drive, Advanced Protection for enterprise users

Safety

Net-security

1.8.19

Chrome to Add HTTP Cache Partitioning to Block Attacks, Tracking

Attack

Bleepingcomputer

1.8.19

Windows 10 Insider Build 18950 Released With Snip & Sketch Improvements

OS

Bleepingcomputer

1.8.19

Windows 10 Calculator Getting Always on Top Mode, Compact Version

OS

Bleepingcomputer

1.8.19

Unsecured Database Exposes Security Risks in Honda's Network

Incindent

Bleepingcomputer

1.8.19

Logins Stolen From Admin-Backdoored Club Penguin Rewritten Site

Virus

Bleepingcomputer

1.8.19

Enterprise Software May Transmit Data Without Your Knowledge

Security

Bleepingcomputer

1.8.19

Trivial Bugs in Western Digital SSD Utility Puts Owners at Risk

Vulnerebility

Bleepingcomputer

1.8.19

North Carolina County Lost $1.7 Million in BEC Scam

Spam

Bleepingcomputer

1.8.19

Outlook Is Down, Users Are Experiencing Sign-in Failures

Security

Bleepingcomputer

1.8.19

Chrome 76 Released With Blocked Flash, Incognito Detection Fix

Security

Bleepingcomputer

1.8.19

Russia Bans Connection to OneWeb Global Internet Satellites

BigBrothers

Bleepingcomputer

1.8.19

WSL2 Now Supports Localhost Connections From Windows 10 Apps

OS

Bleepingcomputer

1.8.19

US Govt, NGOs Ask Cyber Community to Boost Ransomware Defenses

BigBrothers  Ransomware

Bleepingcomputer

1.8.19

OXID eShop Used by Mercedes Fixes Remote Takeover Security Bug

Vulnerebility

Bleepingcomputer

1.8.19

APT trends report Q2 2019Analysis  APTSecurelist

1.8.19

Researchers Replace IP Camera Feed With Fake FootageSecuritySecurityweek

1.8.19

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US GovBigBrothersSecurityaffairs

1.8.19

CISA warns of critical flaws in Prima FlexAir access control systemVulnerebilitySecurityaffairs

1.8.19

Cyber attacks hit Louisiana schools ahead of year’s beginningBigBrothersSecurityaffairs

1.8.19

DHS warns of cyber attacks against small airplanesBigBrothersSecurityaffairs

1.8.19

DefCon CHINA

Conference

Conference

1.8.19

Trivial Bug Turns Home Security Cameras Into Listening Posts

Vulnerebility

Threatpost

1.8.19

Black Hat USA 2019 Preview

Congress

Threatpost

1.8.19

Chrome 76 Dumps Default Adobe Flash Player Support

Security

Threatpost

1.8.19

Malvertising Campaigns Skirt Ad Blockers, Serve Up Mac Malware

Apple  Virus

Threatpost

1.8.19

Honda’s Security ‘Soft Spots’ Exposed in Unsecured Database

Incindent

Threatpost

1.8.19

Passion, ingenuity and hard work: The cybersecurity startup story of Israel

Cyber

Net-security

1.8.19

Microsoft is right, mandatory password changes are obsolete

Crypto

Net-security

1.8.19

The probability that an EV SSL certificate is associated with a bad domain is 0.013%

Crypto

Net-security

1.8.19

Companies struggle with the slow, unpredictable nature of AI projects

Security

Net-security