Calendar December - Home  2020  2019  2018  2017  2016  1  2  3  4  5  6  7  8  Articles

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2019 - January  February  March  April  May  June  July  August  September  October  November  December


Calendar December

Date

Name

Category

Web

31.12.19

DHS report – Voting systems in North Carolina county in 2016 were not hackedBigBrothersSecurityaffairs

31.12.19

Nonprofit organization Special Olympics New York hacked and its server used to send phishing emailsBigBrothersSecurityaffairs

31.12.19

Some Thoughts About the Critical Citrix ADC/Gateway Vulnerability (CVE-2019-19781)

Vulnerebility

SANS

31.12.19

IoT Company Wyze Leaks Emails, Device Data of 2.4

Incindent  IoT

Threatpost

31.12.19

Top Mobile Security Stories of 2019

Mobil

Threatpost

31.12.19

Mean Time to Hardening: The Next-Gen Security Metric

Safety

Threatpost

31.12.19

Microsoft sued North Korea-linked Thallium group

APT

Securityaffairs

31.12.19

Wawa faces several lawsuits following a massive payment card breach

Incindent

Securityaffairs

30.12.19

Vladimir Putin ‘s computers still run Windows XP, Media reportsBigBrothersSecurityaffairs
30.12.19UN approves Russia-Cina sponsored resolution on new cybercrime conventionBigBrothersSecurityaffairs

30.12.19

UAE government denies using ToTok for mass surveillanceBigBrothersSecurityaffairs
30.12.19Security experts disclosed Wyze data leakIncindentSecurityaffairs

30.12.19

Planning for 2020? Here are 3 cybersecurity trends to look out for

Cyber

Net-security
30.12.19

Miscellaneous Updates to our "Threatfeed" API

Security

SANS

29.12.19

Microsoft Outlook for the Web to Support Sending Email As AliasITBleepingcomputer
29.12.19Criminals Pull Hard Before Xmas, Attack U.S. Health IndustryAttack

Bleepingcomputer

29.12.19

U.S. Coast Guard Says Ryuk Ransomware Took Down Maritime FacilityRansomware

Bleepingcomputer

29.12.19Ransomware Hits Maastricht University, All Systems Taken DownRansomware

Bleepingcomputer

29.12.19

FIN7 Hackers' BIOLOAD Malware Drops Fresher Carbanak BackdoorCyberCrime  Virus

Bleepingcomputer

29.12.19How to Run Classic and Chromium Microsoft Edge Side-by-SideSecurity

Bleepingcomputer

29.12.19

A new trojan Lampion targets PortugalVirusSecurityaffairs
29.12.19 previously undetected FIN7 BIOLOAD loader drops new Carbanak BackdoorCyberCrime  VirusSecurityaffairs

29.12.19

US Navy calls TikTok a cybersecurity threatCyber blog

Avast blog

29.12.19The 12 weirdest cybersecurity stories of 2019Cyber blog

Avast blog

29.12.19

Wireshark Tutorial: Examining Ursnif InfectionsMalware blogPalo Alto Unity42
29.12.19Palo Alto Networks Cybersecurity Trends: Expert and Customer Insights, Visionary ProductsCyber blog

Palo Alto

29.12.19

Cybersecurity Canon Candidate Book Review: Understanding Cyber Security: Em...Cyber blog

Palo Alto

29.12.19A Look Back at Some of Unit 42’s Greatest Contributions to Threat Intellige...Cyber blog

Palo Alto

29.12.19Cybersecurity Canon Candidate Book Review: Threat VectorCyber blogPalo Alto

29.12.19

A Ryuk Ransomware attack took down a US maritime facilityRansomwareSecurityaffairs
29.12.19173 Million Zynga accounts were impacted in the September hackIncindentSecurityaffairs

28.12.19

Mozilla Adds Additional DNS-Over-HTTPS Provider to FirefoxSecurityBleepingcomputer

28.12.19

Ryuk Ransomware Stops Encrypting Linux FoldersRansomware

Bleepingcomputer

28.12.19

New Magellan 2.0 SQLite Vulnerabilities Affect Many ProgramsVulnerebility

Bleepingcomputer

28.12.19

Windows 10 2004 Under Development, Here Are the New FeaturesOS

Bleepingcomputer

28.12.19

Windows 10 File Explorer Bugs to be Fixed After HolidaysOS

Bleepingcomputer

28.12.19

Microsoft Edge Starts Testing a Taskbar Pinning WizardIT

Bleepingcomputer

28.12.19

Maze Ransomware Releases Files Stolen from City of PensacolaRansomware

Bleepingcomputer

28.12.19

Entercom Radio Network Hit By Second Cyber Attack This YearAttack

Bleepingcomputer

28.12.19

Emotet Reigns in Sandbox's Top Malware Threats of 2019Virus

Bleepingcomputer

28.12.19

Make Your Own Google Chrome Extension to Show WWW AgainIT

Bleepingcomputer

28.12.19

Gafgyt Targeting Huawei and Asus Routers and Killing Off Rival IoT BotnetsBotNet blog  IoT blog

F5 Labs

28.12.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in November 2019Cyber blog

F5 Labs

28.12.19

Regional Threat Perspectives, Fall 2019: RussiaBigBrother blog

F5 Labs

28.12.19

Canadian banks targeted in a massive phishing campaign

Phishing blog

Checkpoint

28.12.19

Living off the land: Attackers leverage legitimate tools for malicious ends

Malware blog

Checkpoint

28.12.19

Prison surveillance footage posted on YouTube

Security blog

Eset

28.12.19

How to get rid of your old devices safely

Safety blog

Eset

28.12.19

How to secure your digital Christmas presents

Cyber blog

Eset

28.12.19

Podcast: The Roadblocks and Opportunities For Women in Cybersecurity

Cyber

Threatpost

28.12.19

Facebook Security Debacles: 2019 Year in Review

Social

Threatpost

28.12.19

Google Chrome Affected By Magellan 2.0 Flaws

Vulnerebility

Threatpost

28.12.19

Windows systems at Maastricht University were infected with a ransomware

Ransomware

Securityaffairs
28.12.19

Enumerating office365 users

Security

SANS

27.12.19

More than 100 Chinese nationals arrested in Nepal over suspected cyber scamCrime  SpamSecurityaffairs

27.12.19

NVIDIA patches CVE-2019-5702 high-severity flaw in GeForce ExperienceVulnerebilitySecurityaffairs

27.12.19

Thai Officials confirmed the hack of prison surveillance cameras and the video broadcastBigBrothersSecurityaffairs

27.12.19

Top cybersecurity Predictions for 2020CyberSecurityaffairs

27.12.19

Only 54% of security pros have a written policy on length and randomness for keys for machine identities

Security

Net-security

27.12.19

Top 10 Breaches and Leaky Server Screw Ups of 2019

Incindent

Threatpost

27.12.19

Critical Citrix Bug Puts 80,000 Corporate LANs at Risk

Vulnerebility

Threatpost

27.12.19

Combining AI and Playbooks to Predict Cyberattacks

Cyber

Threatpost

27.12.19

Ryuk Ransomware evolution avoid encrypting Linux folders

Ransomware

Securityaffairs
27.12.19

Experts warn of 5 new flaws in Google Chrome dubbed Magellan 2.0

Vulnerebility

Securityaffairs

26.12.19

The Case for Cyber-Risk Prospectuses

Cyber

Threatpost

26.12.19

Biggest Malware Threats of 2019

Virus

Threatpost

26.12.19

A flaw in Twitter App for Android could have been exploited to take over the account

Android  Exploit  Social

Securityaffairs

26.12.19

New Mozi P2P Botnet targets Netgear, D-Link, Huawei routers

BotNet

Securityaffairs
26.12.19

Entercom Radio Network hit by a second cyber attack in a few months

Attack

Securityaffairs
26.12.19

How Organizations Can Defend Against Advanced Persistent Threats

APT

Thehackernews

26.12.19

Bypassing UAC to Install a Cryptominer

Cryptocurrency

SANS

25.12.19Actors behind Maze ransomware release files stolen from City of PensacolaRansomwareSecurityaffairs
25.12.19NYT report states that ToTok app is a government spy tool.BigBrothersSecurityaffairs
25.12.19FBI flash alert warns of LockerGoga and MegaCortex Ransomware attacksBigBrothers  RansomwareSecurityaffairs
25.12.19RuNet – Russia successfully concluded tests on its Internet infrastructureBigBrothersSecurityaffairs
25.12.19

Malspam with links to Word docs pushes IcedID (Bokbot)

Spam

SANS

24.12.19Resurrected PowerShell Empire Framework Converted to Python 3ITBleepingcomputer

24.12.19

NVIDIA Patches High Severity Vulnerability in GeForce ExperienceVulnerebility

Bleepingcomputer

24.12.19Critical Citrix Flaw May Expose Thousands of Firms to AttacksAttack  Vulnerebility

Bleepingcomputer

24.12.19

FBI Issues Alert For LockerGoga and MegaCortex RansomwareBigBrothers  Ransomware

Bleepingcomputer

24.12.19Uptick Seen in ISO Email Attachments Delivering MalwareSpam  Virus

Bleepingcomputer

24.12.19

New Mozi P2P Botnet Takes Over Netgear, D-Link, Huawei RoutersBotNet

Bleepingcomputer

24.12.19Two-Year Long Phishing Campaign Impersonates Canadian BanksPhishing

Bleepingcomputer

24.12.19

One Day, Three Credit Card Data Breach NotificationsIncindent

Bleepingcomputer

24.12.19Avast and AVG Firefox Extensions Added Back to Mozilla Addons SiteSecurity

Bleepingcomputer

24.12.19

Cisco Security Appliances Targeted for DoS Attacks via Old BugAttack  Vulnerebility

Bleepingcomputer

24.12.19

Twitter Fixes Bug that Enabled Takeover of Android App Accounts

Social  Vulnerebility

Threatpost

24.12.19

Top 10 IoT Disasters of 2019

IoT

Threatpost

24.12.19

Podcast: What We’ve Learned from the Year of the Breach

Incindent

Threatpost

24.12.19

CVE-2019-19781 Citrix flaw exposes 80,000 companies at risk

Vulnerebility

Securityaffairs
24.12.19

Op Wocao – China-linked APT20 was able to bypass 2FA

APT

Securityaffairs

24.12.19

New oledump.py plugin: plugin_version_vba

Virus

SANS

23.12.19

Cyber Attack Forces Airline to Cancel Flights in AlaskaAttack

Securityweek

23.12.19British Hacker Sentenced for Blackmailing AppleAttack

Securityweek

23.12.19Citrix Vulnerability Leaves 80,000 Companies at RiskVulnerebility

Securityweek

23.12.19Three GozNym Malware Operators SentencedVirus

Securityweek

23.12.19Twitter, Facebook Target State-Linked Accounts Made to ManipulateSocialSecurityweek
23.12.19As US Congress Delays on Privacy, California Law in FocusBigBrothers

Securityweek

23.12.19Over 50 Islands Restaurants Hit by Payment Card BreachIncindent

Securityweek

23.12.19Data of Honda Owners in North America Exposed OnlineIncindentSecurityweek
23.12.19Vulnerability in Twitter App Enabled Hackers to Obtain Information, Control AccountsSocial  VulnerebilitySecurityweek

23.12.19

RavnAir Alaska airline canceled some flights following a cyber attackAttackSecurityaffairs
23.12.19Lithuanian man sentenced to 5 years in prison for stealing $120 Million From Google, FacebookCrime  SocialSecurityaffairs
23.12.19Members of GozNym gang sentenced for stealing $100 MillionCyberCrimeSecurityaffairs
23.12.19Champagne Bakery Cafe and Islands burger chain disclose payment card breachesIncindentSecurityaffairs
23.12.19Experts warn of Greta Thunberg-themed Emotet malware campaignVirusSecurityaffairs
23.12.19Former contractor sentenced to 10 months in prison for hacking airline Jet2VirusSecurityaffairs
23.12.19UK authorities sentenced hacker who blackmailed Apple for $100,000AppleSecurityaffairs

22.12.19

Extracting VBA Macros From .DWG Files

Virus

SANS

22.12.19

Dropbox Zero-Day Vulnerability Gets Temporary FixVulnerebilityBleepingcomputer
22.12.19PayPal Phishing Attack Promises to Secure Accounts, Steals EverythingPhishing

Bleepingcomputer

22.12.19How to Place Calls From Windows 10 Using the Your Phone AppApple

Bleepingcomputer

22.12.19

Apple Blackmailed for $100K in iTunes Cards to Avoid 'Data Leak'Apple

Bleepingcomputer

22.12.19GozNym Gang Members Behind $100 Million Damages SentencedCyberCrime

Bleepingcomputer

22.12.19Tokyo 2020 Staff Warns of Phishing Disguised As Official EmailsPhishing

Bleepingcomputer

22.12.19Windows Remote Desktop Services Used for Fileless Malware AttacksVirus

Bleepingcomputer

22.12.19Former IT Employee Jailed for Taking Down Airline SystemsCrime

Bleepingcomputer

22.12.19

Ransom NewsRansomRansom
22.12.19ChernoLocker DecryptorAnti-ransom ToolAnti-ransom Tool
22.12.19Mapo DecryptorAnti-ransom ToolAnti-ransom Tool

22.12.19

Ransomware hits 4 US cities in less than a month

Ransomware blog

Avast blog

22.12.19

Maze Ransomware hits more organizations, including Florida city one day after air base shooting

Ransomware blog

Avast blog

22.12.19

Unit 42 Discovers 13 New Vulnerabilities Across Microsoft and Adobe Products

Vulnerebility blog

Palo Alto Unity42

22.12.19

Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia

Malware blog

Palo Alto Unity42

22.12.19

Recent Vulnerabilities in Envoy Explained, Including Impact to Istio

Vulnerebility blog

Palo Alto

22.12.19

Cybersecurity Canon Candidate Book Review: Threat Vector

Cyber blog

Palo Alto

22.12.19

And the Survey Says… Upcoming Trends That Will Transform the Data Center

Security blog

Palo Alto

22.12.19

Watch out, hackers are targeting CVE-2018-0296 Cisco fixed in 2018VulnerebilitySecurityaffairs
22.12.19Greece to extradite Alexander Vinnik to France to face a charge of money launderingCrimeSecurityaffairs
22.12.19Hackers Continue to Exploit Cisco ASA Vulnerability Patched Last YearExploit  Vulnerebility

Securityweek

22.12.19Hacker Who Tried to Blackmail Apple for $100,000 Sentenced in LondonAppleThehackernews
22.12.19Hackers Behind GozNym Malware Sentenced for Stealing $100 MillionVirusThehackernews

21.12.19

Wireshark 3.2.0 Released

Safety

SANS

21.12.19

AdwCleaner 8.0.1 Fixes DLL Hijacking VulnerabilityVulnerebilityBleepingcomputer

21.12.19

Fake Star Wars Streaming Sites Steal Fans’ Credit CardsCyberCrime

Bleepingcomputer

21.12.19

Lithuanian Jailed for Stealing $120 Million From Google, FacebookCrime  Social

Bleepingcomputer

21.12.19

Exploit Kit Starts Pushing Malware Via Fake Adult SitesExploit  Virus

Bleepingcomputer

21.12.19

Emotet Malware Uses Greta Thunberg Demonstration Invites as LureVirus

Bleepingcomputer

21.12.19

Nexus Mods Game Modding Site Discloses Data BreachIncindent

Bleepingcomputer

21.12.19

Emotet Gang Changes Tactics Ahead of the Winter HolidaysVirus

Bleepingcomputer

21.12.19

Vivaldi Now Impersonates Google Chrome to Avoid Being BlockedSecurity

Bleepingcomputer

21.12.19

Canadian Insurance Firm Hit By Maze Ransomware, Denies Data TheftRansomware

Bleepingcomputer

21.12.19

Siemens Contractor Jailed for Sabotage With Logic BombsHacking

Bleepingcomputer

21.12.19

Honda Exposes 26,000 Records of North American CustomersIncindent

Bleepingcomputer

21.12.19

Microsoft Security Essentials To Get Updates After Windows 7 EoSOS

Bleepingcomputer

21.12.19

ELECTION HACKING

BigBrother blog

Cybereason

21.12.19

HOW TO PREVENT THE NEXT BIG POS BREACH

Incident blog

Cybereason

21.12.19

HOW GEOPOLITICAL EVENTS WILL CHANGE CYBERSECURITY IN 2020

BigBrother blog

Cybereason

21.12.19

Echobot Malware Now up to 71 Exploits, Targeting SCADA

IoT blog

F5 Labs

21.12.19

Regional Threat Perspectives, Fall 2019: AsiaCyber blogF5 Labs

21.12.19

Regional Threat Perspectives, Fall 2019: EuropeCyber blogF5 Labs

21.12.19

BreakingApp – WhatsApp Crash & Data Loss Bug

Social blog

Checkpoint

21.12.19

Cisco ASA DoS bug attacked in wild

Vulnerebility blog

Cisco Talos

21.12.19

2019: The year in malware

Malware blog

Cisco Talos

21.12.19

New Talos Takes podcast puts Talos' spin on the latest cyber news

Cyber blog

Cisco Talos

21.12.19

Incident Response lessons from recent Maze ransomware attacks

Incident blog  Ransomware blog

Cisco Talos

21.12.19

Vulnerability Spotlight: Multiple vulnerabilities in WAGO PFC200

Vulnerebility blog

Cisco Talos

21.12.19

Ambitious scam wants far more than just PayPal logins

Spam blog

Eset

21.12.19

38,000 people forced to pick up email passwords in person

Incident blog

Eset

21.12.19

It’s time to disconnect RDP from the internet

Vulnerebility blog

Eset

21.12.19

The worst passwords of 2019: Did yours make the list?

Security blog

Eset

21.12.19

Top Zero Days, Data Breaches and Security Stories of 2019: News Wrap

Incindent

Threatpost

21.12.19

Apple’s Bug Bounty Opens for Business, $1M Payout Included

Apple

Threatpost

21.12.19

Wawa Data Breach: Malware Stole Customer Payment Card Info

Incindent  Virus

Threatpost

21.12.19

Greta Thunberg: Emotet’s Person of the Year

Virus

Threatpost

21.12.19

It’s Time for Your SOC to Level Up

Security

Threatpost

21.12.19

Apple opens its bug bounty program to all white hat hackers

Apple

Securityaffairs

21.12.19

Hackers Continue to Exploit Cisco ASA Vulnerability Patched Last Year

Vulnerebility

Securityweek

20.12.19

How we developed our simple Harbour decompilerSecuritySecurelist

20.12.19

Unveiling JsOutProx: A New Enterprise Grade ImplantSecuritySecurityaffairs

20.12.19

Negative opinion of Italy security committee Copasir on Huawei, ZTE 5G solutionsMobilSecurityaffairs

20.12.19

Greece to Extradite Russian Bitcoin Suspect to FranceBigBrothers

Securityweek

20.12.19

Apple Kicks Off Public Bug Bounty ProgramApple

Securityweek

20.12.19

267 Million Facebook Users Exposed in Accessible DatabaseSocial

Securityweek

20.12.19

Massive Errors Found in Facial Recognition Tech: US StudySecurity

Securityweek

20.12.19

Former Contractor Sentenced to Prison for Hacking British Airline Jet2CrimeSecurityweek

20.12.19

Apple Opens Its Invite-Only Bug Bounty Program to All ResearchersAppleThehackernews

20.12.19

Verizon Fios Internet is Having an Outage, Change DNS to FixVulnerebilityBleepingcomputer

20.12.19

Attackers Posing as German Authorities Distribute Emotet MalwareBigBrothers  Virus

Bleepingcomputer

20.12.19

ScreenConnect MSP Software Used to Install Zeppelin RansomwareRansomware

Bleepingcomputer

20.12.19

FBI Warns of Risks Behind Using Free WiFi While TravelingBigBrothers

Bleepingcomputer

20.12.19

New BlueKeep Scanner Lets You Find Vulnerable Windows PCsSafety

Bleepingcomputer

20.12.19

Industrial Cyber-Espionage Campaign Targets Hundreds of CompaniesCyberSpy

Bleepingcomputer

20.12.19

Ransomware Hit Over 1,000 U.S. Schools in 2019Ransomware

Bleepingcomputer

20.12.19

LifeLabs Data Breach Exposes Personal Info of 15 Million CustomersIncindent

Bleepingcomputer

20.12.19

Windows 10's Fast Ring Becomes a Microsoft Dev PlaygroundOS

Bleepingcomputer

20.12.19

Chinese Rancor APT Refreshes Malware Kit for Espionage AttacksAPT

Bleepingcomputer

20.12.19

Lazarus Hackers Target Linux, Windows With New Dacls MalwareAPT  Virus

Bleepingcomputer

20.12.19

How to Block Windows 10 Update Force Installing the New Edge BrowserOS

Bleepingcomputer

20.12.19

Payment card breach potentially impacts all locations of Wawa convenience storeIncindent

Securityaffairs

20.12.19

Google Promises Upfront Financial Help for Securing Open Source ProjectsSecurity

Securityweek

20.12.19

Wawa Says Data Breach Affected Thousands Over 10 MonthsIncindent

Securityweek

20.12.19

Hackers Stole Customers' Payment Card Details From Over 700 Wawa StoresIncindentThehackernews

20.12.19

Telos Automated Message Handling System contains multiple vulnerabilitiesAlertAlert

20.12.19

Apple devices vulnerable to arbitrary code execution via SecureROMAlertAlert

20.12.19

The Scammer Force is Strong with Star Wars: The Rise of Skywalker

Spam

Threatpost

20.12.19

Honda Leaks Data of 26K North American Customers

Incindent

Threatpost

20.12.19

267M Facebook Users’ Phone Numbers Exposed Online

Incindent  Social

Threatpost

20.12.19

More than 267 millions of Facebook user phone numbers exposed onlineIncindent  Social

Securityaffairs

20.12.19

Drupal addressed several issues, including a critical file processing bugVulnerebility

Securityaffairs

20.12.19

F5 to Acquire Shape Security for $1 Billion in CashIT

Securityweek

20.12.19

Lithuanian Man Sentenced to Prison Over BEC Scheme Targeting Facebook, GoogleCrime  Social  Spam

Securityweek

20.12.19

More DNS over HTTPS: Become One With the Packet. Be the Query. See the Query

Security

SANS

20.12.19

7 signs your cybersecurity is doomed to fail in 2020

Cyber

Net-security

20.12.19

What are CISOs’ most pressing cybersecurity challenges?

Cyber

Net-security

20.12.19

Challenges of using firewall tech to do segmentation

Safety

Net-security

20.12.19

Spam over phone and email is changing consumer communication preferences

Mobil  Spam

Net-security

19.12.19

Member of the Dark Overlord hacker Group extradited to the US

Crime

Securityaffairs

19.12.19

FBI warns travelers against using untrusted and free WiFi networks

BigBrothers

Securityaffairs

19.12.19

Maze Ransomware operators threaten victims to publish their data online

Ransomware

Securityaffairs

19.12.19

Microsoft issues an out-of-band update to address SharePoint information disclosure flaw

Vulnerebility

Securityaffairs

19.12.19

Cyprus Arrests Three in 'Israeli Spy Van' Probe

CyberSpy

Securityweek

19.12.19

Alleged Member of 'Dark Overlord' Hacker Group Extradited From UK to US

Crime

Securityweek

19.12.19

Vulnerability Related to Processing of Archive Files Patched in Drupal

Vulnerebility

Securityweek

19.12.19

New Legislation Aims to Strengthen Cybersecurity of K-12 Schools

Cyber

Securityweek

19.12.19

New Legion Loader Delivers a Variety of Malware

Virus

Securityweek

19.12.19

Maze Ransomware Operators Publish Victim Data Online

Ransomware

Securityweek

19.12.19

Drupal Warns Web Admins to Update CMS Sites to Patch a Critical Flaw

Vulnerebility

Thehackernews

19.12.19

British Hacker Accused of Blackmailing healthcare Firms Extradited to U.S.

Crime

Thehackernews

19.12.19

Know your enemy: Mapping adversary infrastructure quickly and accurately

Safety

Net-security

19.12.19

Calling Local Windows RPC Servers from .NET

Exploit blog

Project Zero

19.12.19

TP-Link Routers Give Cyberattackers an Open Door to Business Networks

Incindent

Threatpost

19.12.19

LifeLabs Pays Hackers Who Accessed 15M Customers’ Lab Test Results

Incindent

Threatpost

19.12.19

Microsoft Issues Out-of-Band Update for SharePoint Bug

Vulnerebility

Threatpost

19.12.19

Ring Plagued by Security Issues, Flood of Hacks

Hacking

Threatpost

19.12.19

Why Cloud, Collaboration Breed Insider Threats

Security

Threatpost

19.12.19

Emotet distributed with emails posing as German authorities, BSI warnsVirusSecurityaffairs
19.12.19Trend Micro observed notable malware activity associated with the Momentum BotnetBotNet  VirusSecurityaffairs
19.12.19Judge Rules in Favor of U.S. Effort to Take Snowden Book MoneyCrimeSecurityweek

19.12.19

Facebook, Google Announce 2020 Asia-Pacific Bug Hunting ConferenceSocialSecurityweek
19.12.19Identifying DNS-Over-HTTPS Traffic Without Decryption Possible: ResearcherSafetySecurityweek
19.12.19Google Offers Financial Support to Open Source Projects for CybersecuritySecurityThehackernews

19.12.19

Reach the next frontier of security automation while maintaining visibility and control

Security

Net-security
19.12.19

Hardware hacks: The next generation of cybercrime

CyberCrime

Net-security
19.12.19

Cybersecurity industry predictions for 2020 and beyond

Cyber

Net-security

19.12.19

DNSSEC still fueling DNS amplification attacks, TCP SYN flood attacks rise

Attack

Net-security
19.12.19

5G connections to grow from 10 million in 2019 to 1.01 billion in 2023

Mobil

Net-security
19.12.19

Download: Cybersecurity Job Posting Templates

Cyber

Net-security

18.12.19

Flaws in Acer and ASUS pre-installed software could lead to arbitrary code executionVulnerebilitySecurityaffairs
18.12.19Lab test provider LifeLabs disclose a data breach that exposed personal info of 15M customersIncindentSecurityaffairs
18.12.19Gangnam Industrial Style APT campaign targets industrial firms worldwideAPTSecurityaffairs

18.12.19

Former Palo Alto Networks Employee Charged With Insider TradingPrivacySecurityweek
18.12.19Fifth Fired Google Worker Files Federal Labor ComplaintSecuritySecurityweek
18.12.19Former Siemens Contractor Sentenced to Prison for Planting Logic BombsCrime  HackingSecurityweek
18.12.19Hunting for Magecart With URLscan.ioCyberCrimeSecurityweek
18.12.19Cyberspies Target Hundreds of Industrial Firms in South Korea, Other CountriesCyberSpySecurityweek

18.12.19

Privilege Escalation Flaws Found in Preinstalled Acer, ASUS SoftwareVulnerebilitySecurityweek
18.12.19LifeLabs Paid Hackers to Recover Stolen Medical Data of 15 Million CanadiansIncindentThehackernews
18.12.1914 Ways to Evade Botnet Malware Attacks On Your ComputersVirusThehackernews

18.12.19

Rooster Teeth Attack Showcases New Magecart Approach

CyberCrime

Threatpost
18.12.19

Epilepsy Foundation Bombarded with Seizure-Triggering Twitter Posts

Social

Threatpost

18.12.19

Alexa, Google Home Eavesdropping Hack Not Yet Fixed

Hacking

Threatpost

18.12.19

The Best Templates for Posting Cybersecurity Jobs

Cyber

Threatpost
18.12.19

Dacls RAT, the first Lazarus malware that targets Linux devices

CyberCrime  Virus

Securityaffairs
18.12.19

Canadian Lab Test Provider Pays Ransom to Secure Hacked Data

Ransomware

Securityweek
18.12.19

Lab Results of 15 Million Canadians Hacked

Ransomware

Securityweek
18.12.19

NextDNS to Provide Encrypted DNS Services to Firefox

Crypto

Securityweek

18.12.19

Emotet infection with spambot activity

Virus

SANS
18.12.19

Data collection balancing act: Privacy, trust and consumer convenience

Privacy

Net-security
18.12.19

Hackers go phishing for the holidays

Phishing

Net-security

18.12.19

CISOs are skeptical about claims made by cybersecurity vendors

Cyber

Net-security
18.12.19

Worst passwords of 2019: Are you using one of them?

Security

Net-security
18.12.19

What is the actual role of a threat hunter?

Security

Net-security
18.12.19

Download: The Risk Mitigation Handbook for Connected Medical Devices

Security

Net-security

17.12.19

Bug Sent WhatsApp Into Crash Loop, Caused Chat History LossSocial

Bleepingcomputer

17.12.19

Facebook's Tor Site Down for Over a Week Due to Expired TLS CertSocial

Bleepingcomputer

17.12.19Credit Card Data Exposed Online Is Tested Within 2 HoursIncindent

Bleepingcomputer

17.12.19Update Intel's Rapid Storage App to Fix Bug Letting Malware Evade AVVulnerebility  Virus

Bleepingcomputer

17.12.19Windows 10 Build 19536 Out for Insiders With Optional DriversOS

Bleepingcomputer

17.12.19

Google to Force OAuth in G Suite to Increase SecuritySecurity

Bleepingcomputer

17.12.19

TP-Link Router Bug Lets Attackers Login Without PasswordsVulnerebility

Bleepingcomputer

17.12.19

Emotet Trojan is Inviting You To A Malicious Christmas PartyVirus

Bleepingcomputer

17.12.19

Over 435K Security Certs Can Be Compromised With Less Than $3,000Incindent

Bleepingcomputer

17.12.19High-School Students Find Spy Cams in Their Hotel RoomsCyberCrimeBleepingcomputer
17.12.19A WhatsApp bug could have allowed crashing of all group membersSocialBleepingcomputer
17.12.19Intel Patches Privilege Escalation Flaw in Rapid Storage TechnologyVulnerebilitySecurityweek

17.12.19

Satori Cyber Emerges From Stealth With Data Protection, Governance PlatformBigBrothersSecurityweek

17.12.19

Men Get Probation for Trying to Access Trump's Tax ReturnsBigBrothersSecurityweek

17.12.19

OilRig’s Poison Frog – old samples, same trickAPTSecurelist

17.12.19

TP-Link Archer routers allow remote takeover without passwordsHackingSecurityaffairs
17.12.19Online Retailer LightInTheBox exposes unsecured DB containing 1.3TB of web server logsIncindentSecurityaffairs
17.12.19Vulnerability in WhatsApp Allows Attackers to Crash Group ChatsSocialSecurityweek
17.12.19Google to Ban Less Secure Apps in G SuiteSecuritySecurityweek

17.12.19

Several Critical Vulnerabilities Found in WAGO ControllersICSSecurityweek

17.12.19

This Bug Could Have Let Anyone Crash WhatsApp Of All Group MembersSocialThehackernews

17.12.19

How Google applies Europe’s Right to Be Forgotten

Security

Net-security

17.12.19

Echobot IoT Botnet Casts a Wide Net with Raft of Exploit AdditionsBotNet  IoT  ExploitThreatpost
17.12.19N.J.’s Largest Hospital System Pays Up in Ransomware AttackRansomware

Threatpost

17.12.19Understanding the Risk of Zero-Day ExploitsExploit

Threatpost

17.12.19A study reveals the list of worst passwords of 2019SecuritySecurityaffairs

17.12.19

A thief stole hard drives containing Facebook payroll data from a carIncindent  SocialSecurityaffairs

17.12.19

Is it Possible to Identify DNS over HTTPs Without Decrypting TLS?

Crypto

SANS
17.12.19

Things to keep in mind when raising capital for your cybersecurity venture

Cyber

Net-security
17.12.19

The holiday season: A cybercriminal’s winter wonderland

Cyber

Net-security
17.12.19

Hacking and malware cause 75% of all data breaches in the financial services industry

Cyber

Net-security

17.12.19

Major vulnerabilities found in popular wireless presentation system

Vulnerebility

Net-security

17.12.19

Top enterprise analytics trends for 2020

Security

Net-security

16.12.19

Web Hosting Firm Slapped With $10 Million GDPR FineITSecurityweek
16.12.19Npm Patches Vulnerability Allowing Access to User FilesVulnerebilitySecurityweek
16.12.19Auditor: Massachusetts Department of Revenue Needs to Better Protect DataCyberSecurityweek
16.12.19Visa: North American Gas Stations Targeted in PoS AttacksAttackSecurityweek

16.12.19

Louisiana Sheriff's Offices Targeted in Cyberattack AttemptAttackSecurityweek

16.12.19

Schneider Electric fixes DoS flaws in Modicon, EcoStruxure productsICSSecurityaffairs
16.12.19Many Vulnerabilities Found in Barco Wireless Presentation SystemsVulnerebilitySecurityweek
16.12.19Facebook Worker Payroll Data Stolen From CarSocialSecurityweek
16.12.19Firm Analyzes China, Russia-based Supply Chain Risks of Electronic Voting MachinesBigBrothersSecurityweek

16.12.19

GitLab Paid Half a Million Dollars in Bug Bounties in One YearSecuritySecurityweek

16.12.19

Experts found binary planting and arbitrary file overwrite flaws in NPMVulnerebilitySecurityaffairs
16.12.19Ryuk Ransomware is suspected to be involved in the New Orleans cyberattackRansomwareSecurityaffairs
16.12.19From iPhone to NT AUTHORITY\SYSTEM – exploit ‘Printconfig’ dll with a real-world exampleAppleSecurityaffairs
16.12.19Schneider Electric Patches Vulnerabilities in Modicon, EcoStruxure ProductsICSSecurityweek

16.12.19

Windows 7 is reaching end-of-extended-support, what to do?

Safety

Net-security

16.12.19Ryuk Ransomware Likely Behind New Orleans CyberattackRansomware

Bleepingcomputer

16.12.19Microsoft Pushes Windows 10 Autopilot Update by Mistake, How to RemoveOS

Bleepingcomputer

16.12.19New Orleans Suffers Ransomware Attack, Emergency Services IntactRansomware

Bleepingcomputer

16.12.19Attackers Terrify Homeowners After Hacking Ring DevicesAttack

Bleepingcomputer

16.12.19Attackers Steal Credit Cards in Rooster Teeth Data BreachIncindent

Bleepingcomputer

16.12.19Apple to Fix Bug That Bypasses Communication Controls for KidsApple

Bleepingcomputer

16.12.19Google Now Bans Some Linux Web Browsers From Their ServicesSecurity

Bleepingcomputer

16.12.19VISA Warns of Ongoing Cyber Attacks on Gas Pump PoS SystemsAttack

Bleepingcomputer

16.12.19New Echobot Variant Exploits 77 Remote Code Execution FlawsBotNet  Exploit

Bleepingcomputer

16.12.19Microsoft Office 365 to Add Message Recall in Exchange OnlineOS

Bleepingcomputer

16.12.19

Malicious .DWG Files?

Virus

SANS
16.12.19

Oil and gas industry risks escalate, cybersecurity should be prioritized

Cyber

Net-security
16.12.19

New account fraud has more than doubled since 2014

Incindent

Net-security
16.12.19

Most DevOps pros feel proper certificate issuance policies slow them down

Security

Net-security
16.12.19

Most security pros admit to accidental internal breaches at their organization

Security

Net-security
16.12.19

The privacy and security trends that will shape 2020

Cyber

Net-security
16.12.19

The cybersecurity labor crunch highlights gaps in threat intelligence practices

Cyber

Net-security
15.12.19Iran announced to have foiled a second cyber-attack in a weekBigBrothersSecurityaffairs
15.12.19Largest hospital system in New Jersey was hit by ransomware attackRansomwareSecurityaffairs
15.12.19Cyberattack on New Orleans City Computers Called 'Minimal'AttackSecurityweek
15.12.19Iran Says It's Defused 2nd Cyberattack in Less Than a WeekBigBrothersSecurityweek
15.12.19Ransom NewsRansomRansom
15.12.19Smarter Cybersecurity: How SecOps Can Simplify Security Management, Oversight & Real-Time Decision-MakingCyber blogSonicwall
15.12.19E-rate Funding 2020: Use It or Lose It?Cyber blogSonicwall
15.12.1910 Reasons to Upgrade to the Latest SonicWall NSa FirewallSafety blogSonicwall
15.12.19Black Friday Cyberattacks: Businesses Face Surge of Malware, Ransomware on U.S. Shopping HolidayCyber blogSonicwall
15.12.19My Workspace: Streamlining Asset Management for MSSPsSecurity blogSonicwall

15.12.19

U.S. offers $5 million reward for info about Russian malware mastermindsBigBrother blog  Malware blogAvast blog
15.12.19Maze Ransomware hits more organizations, including Florida city one day after air base shootingRansomware blogAvast blog
15.12.19Mirai Variant ECHOBOT Resurfaces with 13 Previously Unexploited VulnerabilitiesBotNet blog  Vulnerebility blogPalo Alto Unity42
15.12.19Unit 42 Presents New Research at BlueHat Seattle on Three new Windows RDP Vulnerability Exploit MethodsExploit blog  Vulnerebility blogPalo Alto Unity42

15.12.19

What I Learned from Reverse Engineering Windows ContainersSecurity blogPalo Alto Unity42
15.12.19TrickBot Campaign Uses Fake Payroll Emails to Conduct Phishing AttacksPhishing blogPalo Alto Unity42
15.12.19Cloud-Connected Branch Security with SASESecurity blogPalo Alto
15.12.19Why the Age of the Cloud Native Security Platform Is Here to StaySecurity blogPalo Alto
15.12.19Busted by Cortex: AI Catches Employee Using Backdoor Four Years After His T...Security blogPalo Alto
15.12.19New Cortex XDR 2.0 Features Increase FlexibilitySecurity blogPalo Alto
15.12.19Another Ransomware Will Now Publish Victims' Data If Not PaidRansomware

Bleepingcomputer

15.12.19Google Achieves Its Goal of Erasing the WWW Subdomain From ChromeSecurity

Bleepingcomputer

15.12.19Microsoft Warns of GALLIUM Threat Group Attacking Global TelcosCyberCrime

Bleepingcomputer

15.12.19

Maze Ransomware Demands $6 Million Ransom From SouthwireRansomware

Bleepingcomputer

15.12.19Hundreds of Counterfeit Sneaker Sites Hacked to Steal Credit CardsHacking

Bleepingcomputer

15.12.19Microsoft Office 365 to Add Reply-All Mail Storm ProtectionSafety

Bleepingcomputer

15.12.19Ransomware Hits Florida PRIDE On Saturday, Systems Still DownRansomware

Bleepingcomputer

15.12.19

Gmail Now Lets You Forward Emails as AttachmentsSecurity

Bleepingcomputer

15.12.19Maze Ransomware Behind Pensacola Cyberattack, $1M Ransom DemandRansomware

Bleepingcomputer

15.12.19Microsoft Threat Protection Released in Public PreviewSafety

Bleepingcomputer

15.12.19“Aw Snap!” Crash Makes a Comeback in Chrome 79Security

Bleepingcomputer

15.12.19

Zeppelin Ransomware Targets Healthcare and IT CompaniesRansomware

Bleepingcomputer

15.12.19A malvertising campaign targets iPhone users with Krampus-3PCAppleSecurityaffairs
15.12.19Large Hospital System Hit by Ransomware AttackRansomwareSecurityweek
15.12.19Cyberattack, Ransomware Hobbles New Orleans City GovernmentRansomwareSecurityweek

15.12.19

(Lazy) Sunday Maldoc Analysis: A Bit More ...

Spam

SANS

14.12.19

Microsoft Pulls December 10 Office 365 Client Updates From CatalogOS

Bleepingcomputer

14.12.19Lazarus Hackers Use TrickBot to Infect High-End VictimsCyberCrime

Bleepingcomputer

14.12.19

Domain Takeover at Gunpoint Gets Influencer 14 Years in JailCrime

Bleepingcomputer

14.12.19Microsoft Office December Security Updates Fix Remote Execution BugsVulnerebility

Bleepingcomputer

14.12.19Batch of 460,000+ Payment Cards Sold on Black Market ForumCyberCrime

Bleepingcomputer

14.12.19

Windows 7 to Show Full-Screen Windows 10 Upgrade AlertsOS

Bleepingcomputer

14.12.19Chrome 79 Released With Security Improvements, Proactive Tab Freeze, and MoreVulnerebility

Bleepingcomputer

14.12.19

Windows, Chrome Zero-Days Chained in Operation WizardOpium AttacksVulnerebility

Bleepingcomputer

14.12.19Intel Patches Plundervolt, High Severity Issues in Platform UpdateVulnerebility

Bleepingcomputer

14.12.19Microsoft's December 2019 Patch Tuesday Fixes Win32k Zero-day, 36 FlawsVulnerebility

Bleepingcomputer

14.12.19

Windows 10 KB4530684 & KB4530715 Cumulative Updates ReleasedVulnerebility

Bleepingcomputer

14.12.19Adobe Releases Their December 2019 Security UpdatesVulnerebility

Bleepingcomputer

14.12.19

DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE

Malware blog

Cybereason
14.12.19

750K Birth Certificate Applications Exposed Online: 5 Tips to Help You Stay Secure

Incident blog

Mcafee blog

14.12.19

Top Tips to Spot Tech Support Scams

Spam blog

Mcafee blog

14.12.19

DOTGOV Online Trust in Government Legislation is Critical to Improving Election Security

BigBrother blog  ICS blog

Mcafee blog

14.12.19

Independent Research Firm Ranks CWS Vendors in Report: McAfee a Leader

Security blog

Mcafee blog

14.12.19

Cybersecurity & Artificial Intelligence (AI) – a view from the EU Rear Window, Part II

Cyber blog

Mcafee blog

14.12.19

7 Tips to Make Sure Your Smartphone Use Doesn’t Ruin Holiday Gatherings

Hardware blog

Mcafee blog

14.12.19

Regional Threat Perspectives, Fall 2019: Australia

Cyber blog

F5 Labs

14.12.19

Is the Cloud Safe? Part 1: Models and Misadventures

Safety blog

F5 Labs

14.12.19

DanaBot’s New Tactics and Targets Arrive in Time for Peak Phishing and Fraud Season

Phishing blog

F5 Labs

14.12.19

The FireEye Approach to Operational Technology Security

Safety blog

F5 Labs
14.12.19

DeCypherIT – All eggs in one basket

Cyber blog

Checkpoint

14.12.19

Talos Vulnerability Discovery Year in Review — 2019

Vulnerebility blog

Cisco Talos
14.12.19

Vulnerability Spotlight: Apple Safari SVG marker element baseVal remote code execution vulnerability

Vulnerebility blog

Cisco Talos

14.12.19

Vulnerability Spotlight: Kakadu Software SDK ATK marker code execution vulnerability

Vulnerebility blog

Cisco Talos
14.12.19

Vulnerability Spotlight: Denial-of-service vulnerabilities in Linux kernel, W1.fi

Vulnerebility blog

Cisco Talos
14.12.19

Vulnerability Spotlight: Information leak vulnerability in Adobe Acrobat Reader

Vulnerebility blog

Cisco Talos

14.12.19

Vulnerability Spotlight: Two vulnerabilities in RDP for Windows 7, XP

Vulnerebility blog

Cisco Talos
14.12.19

Microsoft Patch Tuesday — Dec. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

14.12.19

Vulnerability Spotlight: Multiple vulnerabilities in LEADTOOLS software

Vulnerebility blog

Cisco Talos
14.12.19

2FA: Double down on your security

Safety blog

Eset

14.12.19

Chrome now warns you if your password has been stolen

Safety blog

Eset

14.12.19

Data leak exposes 750,000 birth certificate applications

Incident blog

Eset

14.12.19

Cybersecurity Trends 2020: Technology is getting smarter – are we?

Cyber blog

Eset

14.12.19

5 scam prevention tips for seniors

Spam blog

Eset

14.12.19

Rooster Teeth Productions suffered a payment card breachIncindentSecurityaffairs
14.12.19New Orleans hit by ransomware, US cities continues to be under attackRansomwareSecurityaffairs

14.12.19

Elegant sLoad Carries Out Spying, Payload Delivery in BITSSecurityThreatpost
14.12.19FIN8 Targets Card Data at Fuel PumpsCyberCrime

Threatpost

14.12.19Critical Bug in WordPress Plugins Open Sites to Hacker TakeoversVulnerebility

Threatpost

14.12.19

GitLab Doles Out Half a Million Bucks to White HatsSecurityThreatpost
14.12.19Pairing Privacy and Security with Digital Identities in RetailPrivacyThreatpost

14.12.19

Flaws in Siemens SPPA-T3000 control system expose power plants to hackICSSecurityaffairs
14.12.19Suspected Cyberattack Hobbles New Orleans City GovernmentAttack  BigBrothersSecurityweek
14.12.19Microsoft Releases Integrated Threat Protection in Public PreviewSafetySecurityweek

14.12.19

Fortinet Acquires SOAR Platform Provider CyberSponseSafetySecurityweek
14.12.19Credential Harvesting Campaign Targets Government Procurement ServicesBigBrothersSecurityweek
14.12.19OPSWAT Acquires Network Access Control Provider ImpulseSafetySecurityweek
14.12.19FireEye Launches New OT Threat Intelligence ServiceSafetySecurityweek

13.12.19

Google Chrome Uses Safe Browsing to Improve Phishing ProtectionPhishing

Bleepingcomputer

13.12.19

Phishing Attack Hijacks Office 365 Accounts Using OAuth AppsPhishing

Bleepingcomputer

13.12.19

FTC Advises Checking Smart Toy Features Before BuyingBigBrothers

Bleepingcomputer

13.12.19

Pensacola, Florida Hit by Cyber Attack, City Services ImpactedBigBrothers

Bleepingcomputer

13.12.19

Snatch Ransomware Reboots to Windows Safe Mode to Bypass AV ToolsRansomware

Bleepingcomputer

13.12.19

Ryuk Ransomware Decryptor Is Broken, Could Lead to Data LossRansomware

Bleepingcomputer

13.12.19

'Government Imposter' Scammers Pay $1.2 Million in FTC SettlementBigBrothers

Bleepingcomputer

13.12.19

Cybercriminals Lend Tactics and Skills to Political MeddlersCyberCrime

Bleepingcomputer

13.12.19

Microsoft Office 365 ATP Now Helps Analyze Phishing AttacksPhishing

Bleepingcomputer

13.12.19

Tool Illegally Enables Windows 7 Extended Security UpdatesOS

Bleepingcomputer

13.12.19

TrickBot Trojan Abuses Google Suite, Baits With Annual BonusesVirus

Bleepingcomputer

13.12.19

How to Use Twitter With Keyboard ShortcutsSocial

Bleepingcomputer

13.12.19

SEC Charges Shopin Founder with fraud over unregistered $42M ICOSpamSecurityaffairs

13.12.19

WhatsApp Will Take Legal Action Against Automated or Bulk MessagingSocialSecurityweek

13.12.19

Twitter Funding New Blockchain-Based Social Media PlatformSocialSecurityweek

13.12.19

Bill to Protect U.S. Energy Grid From Cyberattacks Passes With NDAABigBrothersSecurityweek

13.12.19

Hospital Boosts Security, Issues Notifications After BreachIncindentSecurityweek

13.12.19

A flaw in outdated versions of Beaver Builder and Elementor plugins allows hacking WordPress sitesVulnerebilitySecurityaffairs

13.12.19

VISA warns of cyber attacks on PoS systems of fuel dispenser merchantsAttackSecurityaffairs

13.12.19

Hackers Can Exploit Siemens Control System Flaws in Attacks on Power PlantsICSSecurityweek

13.12.19

Flaw in Elementor and Beaver Addons Let Anyone Hack WordPress SitesVulnerebilityThehackernews

13.12.19

Retail Cyberattacks Set to Soar 20% in 2019 Holiday SeasonAttackThreatpost

13.12.19

Your Smart Christmas Lights Are Safer Than They Were Last YearSecurity

Threatpost

13.12.19

Critical Remote Code-Execution Bugs Threaten Global Power PlantsICS

Threatpost

13.12.19

All in the (Ransomware) Family: 10 Ways to Take ActionRansomwareThreatpost
13.12.19Maze Ransomware Behind Pensacola Attack, Data Breach LoomsRansomwareThreatpost

13.12.19

GALLIUM Threat Group targets global telcos, Microsoft warnsCyberCrimeSecurityaffairs

13.12.19

'Waterbear' Employs API Hooking to Hide Malicious BehaviorSecuritySecurityweek

13.12.19

Highly Targeted 'Zeppelin' Ransomware Hits Tech, Healthcare FirmsRansomwareSecurityweek

13.12.19

Facebook Says Ready for New California Privacy LawSocialSecurityweek
13.12.19

Internet banking sites and their use of TLS... and SSLv3... and SSLv2?!

Crypto

SANS

13.12.19

The importance of proactive patch management

Security

Net-security

13.12.19

Will quantum computing overwhelm existing security tech in the near future?

Security

Net-security

13.12.19

As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections

Security

Net-security

13.12.19

SaaS security fears: Is your data exposed to potential risk?

Security

Net-security
12.12.19AirDoS attack could make iPhones, iPads unusable via AirDrop attackApple  AttackSecurityaffairs

12.12.19

Massive Magecart campaign targets sites offering counterfeit sneakersCyberCrimeSecurityaffairs

12.12.19

Targeted Attacks Deliver New "Anchor" Malware to High-Profile CompaniesAttack  VirusSecurityweek

12.12.19

StrongSalt Eases Pain of Searching Encrypted Data in the CloudCryptoSecurityweek

12.12.19

AirDoS: Hackers Can Block iPhones, iPads Via AirDrop AttackApple  AttackSecurityweek
12.12.19Russian Police Raided NGINX Moscow Office, Detained Co-FoundersBigBrothersThehackernews
12.12.19Kaspersky Security Bulletin 2019. StatisticsAnalysisSecurelist

12.12.19

Trickbot gang and Lazarus APT, the hidden link behind an epochal phenomenaAPTSecurityaffairs

12.12.19

Pentagon Wants Contractors to Meet Cybersecurity RequirementsBigBrothersSecurityweek

12.12.19

Twitter Backs Overhaul of Social Media to Stem DisinformationSocialSecurityweek

12.12.19

FBI: No Link Found Between Cyberattack and Navy Base AttackBigBrothersSecurityweek
12.12.19Microsoft Security Essentials Will Not Protect Windows 7 PCs After January 14, 2020SecuritySecurityweek

12.12.19

Acronis Acquires 5nine for Its Cloud Management, Security SolutionsSecuritySecurityweek

12.12.19

Zeppelin Ransomware targets Tech and Health CompaniesRansomwareSecurityaffairs

12.12.19

Code & Data Reuse in the Malware Ecosystem

Virus

SANS

12.12.19

Modern Intel CPUs Plagued By Plundervolt AttackAttackThreatpost
12.12.19Signal Tests Upgraded Cryptography for Groups FunctionCrypto

Threatpost

12.12.19Apple Fixes ‘AirDoS’ Bug That Cripples Nearby iPhones, iPadsApple

Threatpost

12.12.19Smart Krampus-3PC Malware Targets iPhone UsersAppleThreatpost
12.12.19Serious Security Flaws Found in Children’s Connected ToysVulnerebility

Threatpost

12.12.19Lazarus APT Collaborates with Trickbot’s Anchor ProjectAPTThreatpost

12.12.19

Iran announced it foiled ‘really massive’ foreign cyber attack

Attack  BigBrothers

Securityaffairs
12.12.19

SAP Releases 5 Security Notes on December 2019 Patch Day

Vulnerebility

Securityweek
12.12.19

Plundervolt Attack Uses Voltage to Steal Data From Intel Chips

Attack

Securityweek
12.12.19

Apple Patches Over 50 Vulnerabilities in macOS Catalina

Apple  Vulnerebility

Securityweek
12.12.19

Chrome 79 Patches Critical Vulnerabilities

Vulnerebility

Securityweek
12.12.19

2020 is prime for a global building cybersecurity standard

Cyber

Net-security
12.12.19

Active Directory password reset best practices

Security

Net-security
12.12.19

What decentralized IT spending means for the CIO role

Security

Net-security
12.12.19

Consumers not willing to compromise when it comes to IoT security

IoT

Net-security
12.12.19

How identity is addressed by enterprise IT security teams

Security

Net-security

11.12.19

PlunderVolt attack hijacks Intel SGX Enclaves by tweaking CPU VoltageAttackSecurityaffairs
11.12.19Iran Says Repelled a 'Highly Organized Cyber Attack'BigBrothersSecurityweek
11.12.19Cyber Risk Management Firm CyberGRX Raises $40 MillionITSecurityweek
11.12.19New Zeppelin Ransomware Targeting Tech and Health CompaniesRansomwareThehackernews

11.12.19

Unsecured AWS bucket exposes over 750,000 birth certificate applicationsIncindentSecurityaffairs
11.12.19More than 460,000 payment card details offered for sale on a black marketCyberCrimeSecurityaffairs
11.12.19Microsoft fixes CVE-2019-1458 Windows Zero-Day exploited in NK-Linked attacksVulnerebilitySecurityaffairs
11.12.19Seniors Targeted in Penny Stock ScamSpamSecurityaffairs

11.12.19

Vulnerability Allows Hackers to Unlock Smart Home Door LocksVulnerebilitySecurityweek
11.12.19New PlunderVolt Attack Targets Intel SGX Enclaves by Tweaking CPU VoltageAttackThehackernews

11.12.19

Story of the year 2019: Cities under ransomware siegeRansomwareSecurelist

11.12.19

Amazon’s Blink Smart Security Cameras Open to HijackHackingThreatpost
11.12.19Adobe Fixes 17 Critical Acrobat, Photoshop and Brackets FlawsVulnerebility

Threatpost

11.12.19DHS Rolls Back Facial-Recognition Expansion PlanBigBrothers

Threatpost

11.12.19Snatch Team Steals Data and Hammers Orgs with RansomwareRansomwareThreatpost

11.12.19

Microsoft Zaps Actively Exploited Zero-Day BugExploit

Threatpost

11.12.19

Cyberattack Downs Pensacola’s City SystemsAttackThreatpost

11.12.19

Download: The 2020 Cybersecurity Salary Survey ResultsCyberThreatpost

11.12.19

Unpatchable KeyWe smart lock can be easily picked

Security

Net-security

11.12.19SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4OS BlogProject Zero
11.12.19Adobe Patches Critical Flaws in Acrobat, Brackets, PhotoshopVulnerebilitySecurityweek
11.12.19Microsoft Patches Windows Zero-Day Exploited in Korea-Linked AttacksBigBrothers  Exploit  VulnerebilitySecurityweek

11.12.19

Mississippi City Works to Resolve Thanksgiving Cyber AttackAttackSecurityweek

11.12.19

Facebook Firm on Message Encryption Despite PressureSocialSecurityweek

11.12.19

Ryuk Ransomware Damages Large Files Following UpdateRansomwareSecurityweek

11.12.19

Thousands of iPR Software Users Exposed on Amazon S3 BucketIncindentSecurityweek

11.12.19

Government Withdraws Cash Prize From President's Cup Cybersecurity CompetitionBigBrothersSecurityweek

11.12.19

The Case for Cyber InsuranceCyberSecurityweek

11.12.19

New Office 365 Feature Provides Detailed Information on Email Attack CampaignsSpamSecurityweek
11.12.19Windows 0-day exploit CVE-2019-1458 used in Operation WizardOpiumExploitSecurelist
11.12.19PlundervoltAttackAttack

11.12.19

More than 44 million Microsoft user accounts are exposed to hackHackingSecurityaffairs

11.12.19

Adobe Patch Tuesday addresses critical flaws in four productsVulnerebilitySecurityaffairs

11.12.19

NordVPN announced the launch of a bug bounty programSecuritySecurityaffairs

11.12.19

Latest Microsoft Update Patches New Windows 0-Day Under Active AttackVulnerebilityThehackernews

11.12.19

Adobe Releases Patches for 'Likely Exploitable' Critical VulnerabilitiesVulnerebilityThehackernews

11.12.19

German language malspam pushes yet another wave of Trickbot

Spam

SANS

11.12.19

How to test employee cyber competence through pen-testing

Cyber

Net-security

11.12.19

78% of people forgot a password in the past 90 days

Security

Net-security

11.12.19

Enterprises reaching a security tool tipping point

Security

Net-security

11.12.19

How enterprise risk management programs operate in organizations today

Security

Net-security

11.12.19

December 2019 Patch Tuesday: Microsoft fixes one actively exploited zero-day

Vulnerebility

Net-security

11.12.19

Download: 2020 cybersecurity salary survey

Security

Net-security

10.12.19

Snatch Ransomware force systems to Windows Safe Mode to bypass security solutionsRansomwareSecurityaffairs

10.12.19

City of Pensacola hit by a cyberattack few days after military base shootingBigBrothersSecurityaffairs
10.12.19Nigerian Extradited to U.S. Over Role in Major Cybercrime SchemeBigBrothersSecurityweek
10.12.19Snatch Ransomware Reboots Windows in Safe Mode to Bypass AntivirusRansomwareThehackernews

10.12.19

Microsoft demystifies email attack campaigns targeting organizations

Spam

Net-security

10.12.19

GE, Dunkin’, Forever 21 Caught Up in Broad Internal Document LeakIncindentThreatpost
10.12.19Reddit Says Influence Campaign is Behind Leaked U.S.-U.K. Trade DocumentsBigBrothers

Threatpost

10.12.19Elder Scrolls Online Targeted by Cybercrooks Hunting In-Game LootCyber

Threatpost

10.12.19Birth Certificate Data Laid Bare on the Web in Multiple StatesSecurityThreatpost

10.12.19

Romanian Duo Receives Jailtime For Infecting 400,000 With MalwareCrime  Virus

Threatpost

10.12.19

A bug in the decryptor for the Ryuk ransomware could cause data lossRansomwareSecurityaffairs
10.12.19Google released PathAuditor to detect unsafe path access patternsVulnerebilitySecurityaffairs
10.12.19U.S. City Hit by Cyberattack Days After Military Base ShootingBigBrothersSecurityweek
10.12.19Hardware-based Password Managers Store Credentials in PlaintextCryptoSecurityweek

10.12.19

The 7 most dangerous digital technology trends

Cyber

Net-security

10.12.19

It’s the most vulnerable time of the year

Vulnerebility

Net-security

10.12.19

What are the qualities of a good digital identity management program?

Security

Net-security

10.12.19

BYOD security challenges leave companies at risk

Security

Net-security

10.12.19

Server market revenue declines 6.7% year over year

Security

Net-security

9.12.19

New ‘PyXie’ Python RAT targets multiple industriesVirusSecurityaffairs

9.12.19

NordVPN Launches Bug Bounty ProgramSecuritySecurityweek
9.12.19Geopolitics Will Drive Aggressive Cyber Activity Throughout 2020CyberSecurityweek
9.12.19Google Releases Open Source Tool for Finding File Access VulnerabilitiesVulnerebilitySecurityweek
9.12.19US Probe Finds Cambridge Analytica Misled Facebook Users on DataSocialSecurityweek

9.12.19

China 3-5-2 directive orders state offices to remove foreign hardware and softwareBigBrothersSecurityaffairs

9.12.19

Google fixes a critical DoS flaw tracked as CVE-2019-2232 in AndroidAndroidSecurityaffairs
9.12.19Dridex Operators Continue to Target Financial Services, DHS WarnsBigBrothers  VirusSecurityweek
9.12.19Cyberhaven Raises $13 Million in Series A FundingITSecurityweek
9.12.19Bayrob Malware Operators Get Lengthy Prison SentencesVirusSecurityweek
9.12.19BMW, Hyundai Targeted by Vietnamese Cyberspies: ReportCyberSpySecurityweek

9.12.19

Compromised passwords used on 44 million Microsoft accounts

Incindent

Net-security

9.12.19

(IN)SECURE Magazine issue 64 released

Security

Net-security

9.12.19Fake Elder Scrolls Online Devs Run PlayStation Phishing ScamPhishing

Bleepingcomputer

9.12.19Moscow Cops Sell Access to City CCTV, Facial Recognition DataBigBrothers

Bleepingcomputer

9.12.19Clever Microsoft Phishing Scam Creates a Local Login FormPhishing

Bleepingcomputer

9.12.19FBI Recommends Securing Your Smart TVs and IoT DevicesSafety

Bleepingcomputer

9.12.19Microsoft to Make Office 365 Encrypted Emails Look Less SpammySafety

Bleepingcomputer

9.12.19Fake VPN Site Pushes CryptBot and Vidar Info-Stealing TrojansVirus

Bleepingcomputer

9.12.19NVIDIA Patches Severe Flaws in Mercedes Infotainment System ChipsVulnerebility

Bleepingcomputer

9.12.19BMW Infiltrated by Hackers Hunting for Automotive Trade SecretsCyberSpy

Bleepingcomputer

9.12.19The StrandHogg vulnerabilityThreatsThreats
9.12.19SEC Xtractor – Experts released an open-source hardware analysis toolSecuritySecurityaffairs
9.12.19DHS Retreats on Possible Facial Screening of US CitizensBigBrothersSecurityweek
9.12.19

(Lazy) Sunday Maldoc Analysis

Virus

SANS

9.12.19

Top 5 cybersecurity predictions for 2020

Cyber

Net-security

9.12.19

DNS over HTTPS’ threat to enterprise security

Security

Net-security

9.12.19

Key security priorities for financial services: Preventing fraud and data leaks

Security

Net-security

9.12.19

Most enterprises hit cloud migration problems, still run apps on legacy operating systems

Security

Net-security

9.12.19

Enterprise WLAN market revenue declines year over year

Security

Net-security
8.12.19Some Hardware-based Password Managers Have Poor SecurityCrypto

Bleepingcomputer

8.12.19Some Hardware-based Password Managers Have Poor SecurityCrypto

Bleepingcomputer

8.12.19U.S. Data Center Provider Hit by Ransomware AttackRansomware

Bleepingcomputer

8.12.19Ransomware Writes Drama at Shakespeare TheatreRansomware

Bleepingcomputer

8.12.19Facebook Sues Company For Hijacking Accounts to Run Bad AdsSocial

Bleepingcomputer

8.12.19Microsoft Starts Forced Feature Updates on Windows 10 1809OS

Bleepingcomputer

8.12.19Disney+ Now Works in Linux After DRM TweakSecurity

Bleepingcomputer

8.12.19New Linux Vulnerability Lets Attackers Hijack VPN ConnectionsVulnerebility

Bleepingcomputer

8.12.19Evil Corp Hackers Charged For Stealing Over $100 MillionIncindent

Bleepingcomputer

8.12.19US Govt Alerts Financial Services of Ongoing Dridex Malware AttacksBigBrothers

Bleepingcomputer

8.12.19CrackQ Tool Adds Analysis and Reports to Password CrackingCryptoBleepingcomputer
8.12.19Microsoft Remote Desktop Client for iOS is Back After Bug FixesApple

Bleepingcomputer

8.12.19Windows 10 Notepad on Microsoft Store is No Longer SupportedOSBleepingcomputer
8.12.19Ransom NewsRansomRansom
8.12.19SonicWall Simplifies Day-to-Day Operations for MSSPsSecurity blogSonicwall
8.12.19My Workspace: Streamlining Asset Management for MSSPsSecurity blogSonicwall
8.12.19U.S. offers $5 million reward for info about Russian malware mastermindsBigBrother blogSonicwall
8.12.19xHunt Actor’s Cheat SheetCyber blogAvast blog
8.12.19APAC’s Compromised Domains Fuel Emotet CampaignMalware blogPalo Alto Unity42
8.12.19Imminent Monitor – a RAT Down UnderMalware blogPalo Alto Unity42
8.12.19What Is XDR?Security blogCisco Talos
8.12.19How Cloud Native Security Platforms Can Rescue Cloud NativeSecurity blogCisco Talos
8.12.19New Innovations in PAN-OS 9.1: SD-WAN and MoreSecurity blogCisco Talos
8.12.19Perimeter Is Where Your Workload Is: Creating Policy Abstracted from IP Add...Security blogCisco Talos
8.12.19Palo Alto Networks to Integrate VM-Series and Prisma Cloud With AWS Outpost...Security blogCisco Talos
8.12.19Twistlock Is Now Prisma Cloud Compute EditionSecurity blogCisco Talos
8.12.19

US authorities charged Dridex gang members for stealing over $100 Million

BigBrothers  CyberCrime

Securityaffairs
8.12.19

Vietnam-linked Ocean Lotus hacked BMW and Hyundai networks

APT

Securityaffairs
8.12.19

Russia-linked Gamaredon group targets Ukraine officials

BigBrothers

Securityaffairs
8.12.19

Integrating Pi-hole Logs in ELK with Logstash

Security

SANS
7.12.19Salesforce’s Heroku Used to Host Magecart Skimmers, Stolen CardsCyberCrime

Bleepingcomputer

7.12.19Ubuntu Linux Gets Intel Microcode Update to Fix CPU HangsVulnerebility

Bleepingcomputer

7.12.19UK Retailer Sweaty Betty Hacked to Steal Customer Payment InfoHacking

Bleepingcomputer

7.12.19New Iranian ZeroCleare Data Wiper Malware Used in Targeted AttacksBigBrothers  Virus

Bleepingcomputer

7.12.19Malicious Python Package Available in PyPI Repo for a YearVirus

Bleepingcomputer

7.12.19Microsoft Warns of Windows Hello for Business Orphaned Key RisksOS

Bleepingcomputer

7.12.19The Great Cannon DDoS Tool Used Against Hong Kong Protestors’ ForumBigBrothers

Bleepingcomputer

7.12.19New macOS Threat Served from Cryptocurrency Trading PlatformApple  Cryptocurrency

Bleepingcomputer

7.12.19Microsoft Releases December 2019 Office Updates With Auth Issue FixOS

Bleepingcomputer

7.12.19Firefox 71 Released with Picture-in-Picture Support and MoreSecurityBleepingcomputer
7.12.19Microsoft Enhances Tracking Prevention in Microsoft Edge 79Security

Bleepingcomputer

7.12.19Ryuk Ransomware Is Making Victims Left and RightRansomwareBleepingcomputer
7.12.19Attention Android Users: Is CallerSpy Malware Spying on You?OS Blog

Mcafee blog

7.12.19Cloud Security and Artificial Intelligence in the Financial SectorSafety blog

Mcafee blog

7.12.19Analysis of LooCipher, a New Ransomware Family Observed This YearRansomware blog

Mcafee blog

7.12.19Here’s What You Need to Know About Your Data Privacy in 2020Security blog

Mcafee blog

7.12.19McAfee Labs 2020 Threats Predictions ReportSecurity blog

Mcafee blog

7.12.19Endpoint Security 301: When Products, Policies, and People Break Down the Lines of CommunicationSecurity blog

Mcafee blog

7.12.19McAfee Up Levels Insights for CustomersSecurity blog

Mcafee blog

7.12.19Are All Phishing Scams Easy to Spot?Phishing blog  Spam blog

Mcafee blog

7.12.19Cybersecurity & Artificial Intelligence (AI) – a view from the EU Rear Window, Part ISecurity blog

Mcafee blog

7.12.19How to Ensure You Don’t Fall Victim to a Holiday Scam this Festive SeasonSpam blog

Mcafee blog

7.12.197 Ways to Wreck a Cybercrook’s HolidaysCyber blog

Mcafee blog

7.12.19Beat Black Friday Scammers: Secure Your Online Purchases From Fake Payment ProcessorsSpam blog

Mcafee blog

7.12.19Response Required: Why Identifying Threats With Your EDR Isn’t EnoughSafety blog

Mcafee blog

7.12.19Could Your Child be Sexting? Signs to Look for and Ways to RespondSecurity blog

Mcafee blog

7.12.192.2 Million Users Affected By Latest Data Exposure: 4 Tips to Stay SecureIncident blog

Mcafee blog

7.12.19The AI (R)evolution: Why Humans Will Always Have a Place in the SOCCyber blog

Mcafee blog

7.12.19Are Smart Padlocks Secure Enough to Protect Your Packages?Cyber blog

Mcafee blog

7.12.19This Holiday Season, Watch Out for These Cyber-Grinch TricksCyber blog

Mcafee blog

7.12.19Tis the Season for Cybersecurity: Stay Protected This Holiday SeasonCyber blog

Mcafee blog

7.12.19Threat Hunting or Efficiency: Pick Your EDR Path?Safety blog

Mcafee blog

7.12.19It’s Beginning to Look a Lot Like Holiday Shopping: Secure Your Black Friday & Cyber Monday PurchasesCyber blog

Mcafee blog

7.12.19Sadfishing, Deepfakes & TikTok: Headlines You May Have MissedCyber blog

Mcafee blog

7.12.19CISOs Share Their Wisdom, Advice, and StrategiesCyber blog

F5 Labs

7.12.19Regional Threat Perspectives, Fall 2019: Latin AmericaCyber blog

F5 Labs

7.12.19Regional Threat Perspectives, Fall 2019: CanadaCyber blog

F5 Labs

7.12.19Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774)Vulnerebility blogFireEye
7.12.19Excelerating Analysis – Tips and Tricks to Analyze Data with Microsoft ExcelMalware blogFireEye
7.12.19Incident Response Casefile – A successful BEC leveraging lookalike domainsIncident blog  Spam blogCheckpoint
7.12.19Vulnerability Spotlight: AMD ATI Radeon ATIDXX64.DLL shader functionality sincos denial-of-service vulnerabilityVulnerebility blogCisco Talos
7.12.19ClamAV team shows off new Mussels dependency build automation toolSecurity blogCisco Talos
7.12.19Vulnerability Spotlight: SQL injection vulnerabilities in Forma Learning Management SystemVulnerebility blogCisco Talos
7.12.19Vulnerability Spotlight: Accusoft ImageGear PNG IHDR width code execution vulnerabilityVulnerebility blogCisco Talos
7.12.19Vulnerability Spotlight: Two vulnerabilities in EmbedThis GoAheadVulnerebility blogCisco Talos
7.12.19How to spot if your child is a victim of cyberbullyingCyber blog

Eset

7.12.1980% of all Android apps encrypt traffic by defaultOS Blog

Eset

7.12.19Face scanning – privacy concern or identity protection?Cyber blog

Eset

7.12.19Notorious spy tool taken down in global operationCyber blog

Eset

7.12.195 personal (and cheap) data privacy tools that scale for businessSecurity blog

Eset

7.12.19Facebook Alleges Company Infiltrated Thousands for Ad FraudBigBrothers  SocialThreatpost
7.12.19Email Voted a Weak Link for Election Security, with DMARC LaggingSpam

Threatpost

7.12.19Feds Crack Down on Money Mules, Warn of BEC ScamsBigBrothers  Spam

Threatpost

7.12.19News Wrap: Authorities Target Evil Corp., Imminent Monitor, Money MulesSecurityThreatpost
7.12.19Linux Bug Opens Most VPNs to HijackingHacking

Threatpost

7.12.19Stealthy MacOS Malware Tied to Lazarus APTApple  APTThreatpost
7.12.19Russian 'Gamaredon' Hackers Back at Targeting Ukraine OfficialsBigBrothersSecurityweek
7.12.19Vulnerabilities Found in Aviatrix Enterprise VPNVulnerebilitySecurityweek
7.12.19Facebook Sues Chinese Company Over Ad FraudBigBrothers  SocialSecurityweek
6.12.19VMware addresses ESXi issue disclosed at the Tianfu Cup hacking competitionHackingSecurityaffairs
6.12.19Panorays Raises $15 Million in Series A Funding RoundITSecurityweek
6.12.19Weidmueller Patches Critical Vulnerabilities in Industrial SwitchesICSSecurityweek
6.12.19OpenBSD Hit with Authentication, LPE BugsVulnerebilityThreatpost
6.12.19‘Ultimate’ MiTM Attack Steals $1M from Israeli StartupAttack

Threatpost

6.12.19HackerOne Breach Leads to $20,000 Bounty RewardIncindent

Threatpost

6.12.19Ransomware Attack Hits Data Center Provider CyrusOne: ReportRansomwareThreatpost
6.12.19AT&T, Verizon Subscribers Exposed as Mobile Bills Turn Up on the Open WebIncindentThreatpost
6.12.19Feds Offer $5M Reward to Nab ‘Evil Corp’ Dridex HackerHackingThreatpost
6.12.19CVE-2019-14899 flaw allows hijacking VPN connections on Linux, Unix systemsVulnerebilitySecurityaffairs
6.12.19OpenBSD addresses authentication bypass, privilege escalation issuesVulnerebilitySecurityaffairs
6.12.19U.S. Authorities Take Action Against 600 Money MulesBigBrothersSecurityweek
6.12.19VMware Patches ESXi Vulnerability That Earned Hacker $200,000VulnerebilitySecurityweek
6.12.19North Korean MacOS Malware Adopts In-Memory ExecutionApple  BigBrothersSecurityweek
6.12.19VPN Connection Hijacking Vulnerability Affects Linux, Unix SystemsVulnerebilitySecurityweek
6.12.19US Indicts 'Evil Corp' Hackers With Alleged Russian Intelligence TiesBigBrothersSecurityweek
6.12.19Microsoft Warns of Persistent Windows Hello for Business Orphaned KeysOSSecurityweek
6.12.19Huawei Asks Court to Throw Out US Telecom Funds BanBigBrothersSecurityweek
6.12.19New Linux Bug Lets Attackers Hijack Encrypted VPN ConnectionsVulnerebilityThehackernews
6.12.19Facebook Sued Hong Kong Firm for Hacking Users and Ad Fraud SchemeSocialThehackernews
6.12.19FBI Puts $5 Million Bounty On Russian Hackers Behind Dridex Banking MalwareBigBrothersThehackernews
6.12.19AA19-339A : Dridex MalwareCERTCERT
6.12.19

Phishing with a self-contained credentials-stealing webpage

Phishing

SANS

6.12.19

December 2019 Patch Tuesday forecast: Make sure to deploy year-end updates

Vulnerebility

Net-security

6.12.19

The hidden risks of cryptojacking attacks

Cryptocurrency

Net-security

6.12.19

Review: Cyber Smart

Security

Net-security

6.12.19

Nearly half of consumers worry about being tricked by fraudsters this holiday season

Security

Net-security

6.12.19

Top compliance and risk management challenges for financial organizations

Security

Net-security

6.12.19

Exploring the proper use of pseudonymisation related to personal data

Security

Net-security

5.12.19Cisco Talos Releases Open Source Dependency Build Automation ToolSecuritySecurityweek
5.12.19Moxa Addresses Industrial AP Vulnerabilities Several Months After DisclosureVulnerebilitySecurityweek
5.12.19

G Suite admins get restricted security code option

Security

Net-security
5.12.19China used the Great Cannon DDoS Tool against forum used by Hong Kong protestorsBigBrothersSecurityaffairs
5.12.19Severe Auth Bypass and Priv-Esc Vulnerabilities Disclosed in OpenBSDVulnerebilityThehackernews

5.12.19

ZeroCleare: New Iranian Data Wiper Malware Targeting Energy SectorBigBrothers  VirusThehackernews
5.12.19EFF Talks the Corporate Surveillance of ConsumersSecurityThreatpost
5.12.19Iran Targets Mideast Oil with ZeroCleare Wiper MalwareBigBrothers  Virus

Threatpost

5.12.19

‘Highly Competitive’ Buer Loader Emerges in Underground MarketsSecurity

Threatpost

5.12.19Dutch Politician Could Get Three Years in Prison for Hacking iCloud AccountsBigBrothersThreatpost
5.12.19ThreatList: 1 in 9 SMBs Believe Nation-State Actors Are Targeting ThemSecurityThreatpost

5.12.19

Nebraska Medicine Breached By Rogue EmployeeIncindentThreatpost
5.12.19CyrusOne, one of the major US data center provider, hit by ransomware attackRansomwareSecurityaffairs
5.12.19The evolutions of APT28 attacksAPTSecurityaffairs

5.12.19

Iran-Linked APT groups target energy, industrial sectors with ZeroCleare WiperAPTSecurityaffairs
5.12.19AWS Unveils New Security Services and CapabilitiesSecuritySecurityweek
5.12.19Hacker Accessed Private Reports on HackerOneSecuritySecurityweek
5.12.19Intel Announces Compute Lifecycle Assurance to Protect Platform Supply ChainsSecuritySecurityweek
5.12.19SEC Consult Open Sources Hardware Analysis ToolSecuritySecurityweek

5.12.19

E-mail from Agent Tesla

Spam

SANS

5.12.19

Avoiding the next breach: Four tips for securing your apps

Incindent

Net-security

5.12.19

The rise of continuous crowdsourced security testing for compliance

Security

Net-security

5.12.19

2020 predictions: Rising complexity of managing digital risk

Security

Net-security

5.12.19

CPoC: New data security standard for contactless payments

Security

Net-security

5.12.19

How do SMBs plan to improve their security posture in 2020?

Security

Net-security

4.12.19

Two malicious Python libraries were stealing SSH and GPG keysCrypto  VirusSecurityaffairs

4.12.19

Researcher Unveils CrackQ, a New Password Cracking ManagerHackingSecurityweek
4.12.19Magecart Skimmers Found on Salesforce's Heroku PlatformCyberCrimeSecurityweek

4.12.19

Google Patches Critical DoS Flaw in Android 10AndroidSecurityweek
4.12.19New 'PyXie' RAT Used Against Multiple IndustriesICS  VirusSecurityweek

4.12.19

DHS May Require US Citizens Be Photographed at AirportsBigBrothersSecurityweek
4.12.19Iran-Linked ZeroCleare Wiper Targets Energy, Industrial Sectors in Middle EastAPTSecurityweek

4.12.19

Critical Flaw in GoAhead Web Server Could Affect Wide Range of IoT DevicesVulnerebilityThehackernews

4.12.19

80% of All Android Apps Now Use Encrypted Network TrafficAndroid

Bleepingcomputer

4.12.19

FTC Warns of Ongoing Scam Spreading Scary Terrorism AllegationsSpam

Bleepingcomputer

4.12.19Microsoft Forms Now Automatically Blocks Confirmed PhishingPhishing

Bleepingcomputer

4.12.19

Avast and AVG Firefox Extensions Pulled from Mozilla Addons SitePrivacy

Bleepingcomputer

4.12.19Smith & Wesson Web Site Hacked to Steal Customer Payment InfoHacking  Incindent

Bleepingcomputer

4.12.19

Facebook Ads Manager Targeted by New Info-Stealing TrojanSocial  Virus

Bleepingcomputer

4.12.19Microsoft Warns of Spear Phishing Attacks, Shares Tips to Dodge ThemPhishing

Bleepingcomputer

4.12.19

Actively Exploited StrandHogg Vulnerability Affects Android OSAndroid  Exploit

Bleepingcomputer

4.12.19Office 365 To Get Microsoft Recommended Security ProfilesSecurity

Bleepingcomputer

4.12.19

Over 30,500 Online Piracy Sites Shut Down in Global OperationBigBrothersBleepingcomputer

4.12.19

CrackQ: Efficient password cracking for pentesters and red teamers

Crypto

Net-security

4.12.19

APT review: what the world’s threat actors got up to in 2019APTSecurelist
4.12.19Europol Shuts Down Over 30,500 Piracy Websites in Global OperationBigBrothers  CyberCrimeThehackernews

4.12.19

‘StrandHogg’ Vulnerability Allows Malware to Pose as Legitimate Android AppsAndroidThreatpost
4.12.19DHS Plans to Expand Facial Recognition Border ChecksBigBrothers

Threatpost

4.12.19

ThreatList: A Third of Biometric Systems Targeted by Malware in Q3Virus

Threatpost

4.12.19Android Ups the Mobile Security Ante with Default TLS EncryptionAndroidThreatpost

4.12.19

Critical Android Flaw Leads to ‘Permanent DoS’AndroidThreatpost
4.12.19Supply Chain Account Takeover: How Criminals Exploit Third-Party AccessCyberCrime  ExploitThreatpost

4.12.19

Mozilla removed 4 Avast and AVG extensions for spying on Firefox usersPrivacySecurityaffairs
4.12.19Talos experts found a critical RCE in GoAhead Web ServerVulnerebilitySecurityaffairs

4.12.19

A flaw in Microsoft OAuth authentication could lead Azure account takeoverVulnerebilitySecurityaffairs
4.12.19TikTok Sued in US Over Alleged China Data TransferBigBrothersSecurityweek

4.12.19

Google: 80% of Android Apps Encrypt Traffic by DefaultAndroidSecurityweek
4.12.19Code Execution Vulnerabilities Patched in Accusoft ImageGearVulnerebilitySecurityweek

4.12.19

Inside Mastercard's Push for Continuous SecuritySecuritySecurityweek
4.12.19Avast and AVG Browser Extensions Spying On Chrome and Firefox UsersPrivacyThehackernews

4.12.19

Analysis of a strangely poetic malware

Virus

SANS

4.12.19

How DNS filtering works and why businesses need it

Security

Net-security

4.12.19

Despite potential fines, GDPR compliance rate remains low

Privacy

Net-security

4.12.19

What do cybercriminals have in store for 2020?

Cyber

Net-security

4.12.19

What steps should agencies take to better prepare for a multi-cloud future?

Cyber

Net-security

4.12.19

Cybersecurity regulation is not one-size-fits-all

Cyber

Net-security

3.12.19

Website of gunmaker Smith & Wesson hit by a Magecart attackCyberCrimeSecurityaffairs

3.12.19

HelpSystems Acquires UK-based Content Protection Firm ClearswiftSecuritySecurityweek

3.12.19

EU to Relaunch Push to Regulate WhatsApp, Skype on PrivacyBigBrothers  PrivacySecurityweek

3.12.19

Microsoft Patches Vulnerability Leading to Azure Account TakeoverVulnerebilitySecurityweek
3.12.19Critical Code Execution Vulnerability Found in GoAhead Web ServerVulnerebilitySecurityweek
3.12.19Twitter Promises Increased Transparency With New Privacy CenterSocialSecurityweek
3.12.19Website of Gunmaker Smith & Wesson Hacked in Magecart AttackCyberCrimeSecurityweek

3.12.19

Crooks are exploiting unpatched Android flaw to drain users’ bank accounts

Android

Net-security

3.12.19

How are enterprises coping with the security challenges brought on by digital transformation initiatives?

Security

Net-security

3.12.19

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020SecuritySecurelist

3.12.19

Cybersecurity of connected healthcare 2020: Overview and predictionsSecuritySecurelist
3.12.19Cyberthreats to financial institutions 2020: Overview and predictionsSecuritySecurelist
3.12.195G technology predictions 2020SecuritySecurelist
3.12.19Corporate security prediction 2020SecuritySecurelist

3.12.19

Smart TVs: The Cyberthreat Lurking in Your Living Room, Feds WarnSecurityThreatpost

3.12.19

Insecure Database Exposes Millions of Private SMS MessagesIncindent  Mobil

Threatpost

3.12.19CISA Pushing U.S. Agencies to Adopt Vulnerability Disclosure PoliciesBigBrothers  Vulnerebility

Threatpost

3.12.19Microsoft OAuth Flaw Opens Azure Accounts to TakeoverVulnerebilityThreatpost
3.12.19Authorities Break Up Imminent Monitor Spyware OrganizationVirusThreatpost

3.12.19

Biometric data processing and storage system threatsICS  VirusSecurelist

3.12.19

Experts discovered DLL hijacking issues in Kaspersky and Trend Micro solutionsHackingSecurityaffairs
3.12.19Ohio Election Day cyber attack attempt traced Russian-Owned CompanyAttack  BigBrothersSecurityaffairs
3.12.19StrandHogg Vulnerability exploited by tens of rogue Android AppsAndroid  Exploit  VulnerebilitySecurityaffairs
3.12.19Europol seized 30,506 Internet domain names for IP InfringementBigBrothers  CrimeSecurityaffairs
3.12.19Clop Ransomware attempts to disable Windows Defender and MalwarebytesRansomwareSecurityaffairs

3.12.19

EU to Check How Facebook, Google Use Data: SpokeswomanBigBrothers  SocialSecurityweek
3.12.19Tenable Acquires OT Security Firm Indegy for $78 MillionITSecurityweek
3.12.19Vulnerabilities Disclosed in Kaspersky, Trend Micro ProductsVulnerebilitySecurityweek
3.12.19'StrandHogg' Vulnerability Exploited by Malicious Android AppsAndroid  Exploit  Vulnerebility

Securityweek

3.12.19Official: Russian-Owned Company Attempted Ohio Election HackBigBrothersSecurityweek
3.12.19Cybercrime Campaign Targeting Hospitality Sector IntensifiesCyberSecurityweek
3.12.19Unpatched Strandhogg Android Vulnerability Actively Exploited in the WildAndroid  ExploitThehackernews

3.12.19

Ursnif infection with Dridex

Spam  Virus

SANS

3.12.19

Supply chain examination: Planning for vulnerabilities you can’t control

Vulnerebility

Net-security

3.12.19

Prevent credential stuffing and account takeover attacks with these expert tips

Safety

Net-security

3.12.19

European cybersecurity market to exceed $65 billion by 2025

Cyber

Net-security

3.12.19

Webinar: Multi-cloud security

Security

Net-security

2.12.19

Cybercrime Campaign Targeting Hospitality Sector Intensifies

CyberCrime

Securityweek

2.12.19International Law Enforcement Operation Targets IM-RAT MalwareVirusSecurityweek
2.12.19Vulnerability Allows Hackers to Take Control of ABB Substation Protection DevicesVulnerebilitySecurityweek
2.12.19New Facebook Tool Let Users Transfer Their Photos and Videos to GoogleSocialThehackernews

2.12.19

Fake Steam Skin Giveaway Site Steals your Login CredentialsHacking

Bleepingcomputer

2.12.19You Can Still Upgrade to Windows 10 For Free, Here's HowOS

Bleepingcomputer

2.12.19Microsoft Remote Desktop 10.0 for iOS Released, Then Quietly PulledApple

Bleepingcomputer

2.12.19TrueDialog database leaked online tens of millions of SMS text messagesIncindentSecurityaffairs
2.12.19Data of 21 million Mixcloud users available for sale on the dark webIncindentSecurityaffairs

2.12.19

5G IoT security: Opportunity comes with risks

IoT  Mobil

Net-security

2.12.19

Cybersecurity company benefits should reduce stress but don’t

Cyber

Net-security

2.12.19

Insight into NIS Directive sectoral incident response capabilities

Security

Net-security

2.12.19

2019 experienced massive spate of crypto crimes, $4.4 billion to date

Crypto

Net-security

2.12.19

Hacking robotic vehicles is easier than you might think

Hacking

Net-security

1.12.19

Twitter account of Huawei Mobile Brazil hackedSocialSecurityaffairs
1.12.19Google warned 12K+ users targeted by state-sponsored hackersHackingSecurityaffairs
1.12.19The latest variant of the new Ginp Android Trojan borrows code from AnubisAndroidSecurityaffairs

1.12.19

New malware Dexphot uses advanced stealth tactics like polymorphism to avoid detectionMalware blogAvast blog
1.12.19Amazon tells senator there are few restrictions on how police may use Ring doorbell footageBigBrother blogAvast blog
1.12.19Server-Side Request Forgery Exposes Data of Technology, Industrial and Media OrganizationsIncident blogPalo Alto Unity42
1.12.19Complete Cloud Native Security Is HereSecurity blog

Palo Alto

1.12.19Twistlock Is Now Prisma Cloud Compute EditionSecurity blog

Palo Alto

1.12.193 Tips for Women Aspiring to Succeed in TechnologySecurity blog

Palo Alto