Calendar February- Home  2020  2019  2018  2017  2016  1  2  3  4  5  6  7  8  Articles

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2019 - January  February  March  April  May  June  July  August  September  October  November  December


Calendar February

28.2.19

Topps.com Sports Collectible Site Exposes Payment Info in MageCart Attack

Attack

Bleepingcomputer

28.2.19

Coinhive In-Browser Cryptomining Service Shuts Down on March 8

Cryptocurrency

Bleepingcomputer

28.2.19

Outlook and Microsoft Account Phishing Emails Utilize Azure Blob Storage

Phishing

Bleepingcomputer

28.2.19

Social Media Attacks Generate $3.25 Billion for Crooks Each Year

Attack

Bleepingcomputer

28.2.19

Icons and Screenshots of Microsoft's Chromium-based Edge Browser Leaked Online

Security

Bleepingcomputer

28.2.19

New Elevation of Privilege Vulnerability Found in Cisco WebEx Meetings

Vulnerebility

Bleepingcomputer

28.2.19

AltFS Fileless File System Aims to Evade Detection by Security Software

Security

Bleepingcomputer

28.2.19

TLS 1.3 Support Coming to iOS 12.2, Enabled System-Wide in Beta Releases

Crypto

Bleepingcomputer

28.2.19

Cyber-Espionage Group Customizes Old, Public Tools

CyberSpy

Bleepingcomputer

28.2.19

Web Site for a Bangladesh Embassy Compromised with Malicious Docs

Virus

Bleepingcomputer

28.2.19

28 Billion Credential Stuffing Attempts During Second Half of 2018

Incindent

Bleepingcomputer

28.2.19

Google Enhances Google Play Protect on Android, but Is It Enough?

Android

Bleepingcomputer

28.2.19

Thunderclap Vulnerabilities Allow Attacks Using Thunderbolt Peripherals

Vulnerebility

Bleepingcomputer

28.2.19

Windows 10 Insider Preview Build 18346 Released With Bug Fixes

Vulnerebility

Bleepingcomputer

28.2.19

Adobe Sends Emails About Retirement of Shockwave on April 9th

Security

Bleepingcomputer

28.2.19

Malvertising Attack Sneaks JavaScript Payload in Polyglot Images

Virus

Bleepingcomputer

28.2.19

Intel SGX Card Extends Memory Protections to Existing Cloud Servers

Safety

Securityweek

28.2.19

Cisco WebEx Meetings affected by a new elevation of privilege flaw

Vulnerebility

Securityaffairs

28.2.19

PDF zero-day samples harvest user data when opened in Chrome

Vulnerebility

Securityaffairs

28.2.19

Multiple threat actors are targeting Elasticsearch Clusters

Security

Securityaffairs

28.2.19

Thunderclap vulnerabilities allows to hack most of moder computers

Vulnerebility

Securityaffairs

28.2.19

U.S. Cyber Command disrupted blocked Russian troll factory during 2018 midterms

BigBrothers

Securityaffairs

28.2.19

Experts devised 3 attacks Show Signed PDF Documents Cannot Be Trusted

Attack

Securityaffairs

28.2.19

Phishing impersonations

Phishing

SANS

28.2.19

Fighting credential stuffing attacks is an uphill battle

Attack

Net-security

28.2.19

Cloud business initiatives accelerating faster than security teams’ ability to secure them

Security

Net-security

28.2.19

Attackers continue to enhance their performance, apply smart business techniques

Attack

Net-security

28.2.19

Privileged credential abuse is involved in 74% of data breaches

Incindent

Net-security

28.2.19

Researchers and businesses need to work together to expose IoT vulnerabilities

IoT

Net-security

27.2.19

Facebook Says 'Clear History' Feature Ready This Year

Social

Securityweek

27.2.19

Identity Protection Firm Obsidian Security Raises $20 Million

IT

Securityweek

27.2.19

Swedish Police Arrest Russia Spy Suspect

BigBrothers

Securityweek

27.2.19

Elasticsearch Clusters Under Attack From Multiple Hacking Groups

Attack

Securityweek

27.2.19

US Lawmakers Kick Off Debate Over Online Privacy

BigBrothers

Securityweek

27.2.19

Chrome Zero-Day Exploited to Harvest User Data via PDF Files

Exploit

Securityweek

27.2.19

'Farseer' Backdoor Targets Users in South East Asia

Virus

Securityweek

27.2.19

Severe Flaws in SHAREit Android App Let Hackers Steal Your Files

Android

Thehackernews

27.2.19

Ring Doorbell Flaw Opens Door to Spying

Vulnerebility

Threatpost

27.2.19

Thunderclap Flaws Shatter Peripheral Security

Vulnerebility

Threatpost

27.2.19

Cisco Patches High-Severity Webex Vulnerability For Third Time

Vulnerebility

Threatpost

27.2.19

Card-Skimming Scripts Hide Behind Google Analytics, Angular

Hacking

Threatpost

27.2.19

Bronze Union APT Updates Remote Access Trojans in Fresh Wave of Attacks

APT

Threatpost

27.2.19

Modern browser APIs can be abused for hijacking device resources

Hacking

Net-security

27.2.19

Sessions and events to check out at RSA Conference 2019

Congress

Net-security

27.2.19

Recently disclosed Drupal CVE-2019-6340 RCE flaw exploited in the wild

Vulnerebility

Securityaffairs

27.2.19

The Arsenal Behind the Australian Parliament Hack

BigBrothers

Securityaffairs

27.2.19

Author of NeverQuest botnet pleads guilty to bank fraud

BotNet

Securityaffairs

27.2.19

'Thunderclap' Flaws Expose Computers to Attacks via Peripheral Devices

Vulnerebility

Securityweek

27.2.19

Neverquest Trojan Operator Pleads Guilty

Virus

Securityweek

27.2.19

Russia's Ex-Cybersecurity Chief Gets 22-Year Sentence in Jail

BigBrothers

Securityweek

27.2.19

New Attacks Show Signed PDF Documents Cannot Be Trusted

Attack

Securityweek

27.2.19

NVIDIA Patches High Risk Vulnerabilities in GPU Display Drivers

Vulnerebility

Securityweek

27.2.19

New Attack Runs Code After Closing Browser Tab

Attack

Securityweek

27.2.19

Hackers Exploit WinRAR Vulnerability to Deliver Malware

Vulnerebility

Securityweek

27.2.19

High-Severity SHAREit App Flaws Open Files for the Taking

Vulnerebility

Threatpost

27.2.19

‘Cloudborne’ IaaS Attack Allows Persistent Backdoors in the Cloud

Attack

Threatpost

27.2.19

How WebAuthn aims to solve the password problem

Security

Net-security

27.2.19

Social media-enabled cybercrime is generating $3.25 billion a year

CyberCrime

Net-security

27.2.19

Increasing security measures are driving cybercriminals to alter their techniques

Hacking

Net-security

27.2.19

Researchers eavesdrop on DNA synthesizer to steal genetic blueprint

IT

Net-security

27.2.19

Consumer attitudes towards security breaches are changing significantly

Incindent

Net-security

26.2.19

Hackers Backdoor Cloud Servers to Attack Future Customers

Attack

Bleepingcomputer

26.2.19

Apex Legends Fans Targeted with Malware and Scam Campaigns

Spam

Bleepingcomputer

26.2.19

Malspam Exploits WinRAR ACE Vulnerability to Install a Backdoor

Virus

Bleepingcomputer

26.2.19

Smart Homes at Risk Due to Unpatched Vulnerabilities, Weak Credentials

Vulnerebility

Bleepingcomputer

26.2.19

NVIDIA Patches Security Issues in GPU Display Driver for Windows, Linux

Vulnerebility

Bleepingcomputer

26.2.19

CyberSecurity Firm Darkmatter Request to be Trusted Root CA Raises Concerns

IT

Bleepingcomputer

26.2.19

B0r0nt0K Ransomware Wants $75,000 Ransom, Infects Linux Servers

Ransomware

Bleepingcomputer

26.2.19

LinkedIn Messaging Abused to Target US Companies With Backdoors

Virus

Bleepingcomputer

26.2.19

How to Attack and Defend a Prosthetic Arm

Hacking

Securelist

26.2.19

Huawei Says US Has 'No Evidence' of 5G Spying Allegations

BigBrothers

Securityweek

26.2.19

Backdoor Targets U.S. Companies via LinkedIn

Virus

Securityweek

26.2.19

Latest WinRAR Flaw Being Exploited in the Wild to Hack Windows Computers

Exploit

Thehackernews

26.2.19

Critical WinRAR Flaw Found Actively Being Exploited

Exploit

Threatpost

26.2.19

PDF viewers, online validation services vulnerable to digital signature spoofing attacks

Attack

Net-security

26.2.19

Latest WinRAR, Drupal flaws under active exploitation

Exploit

Net-security

26.2.19

The Dark Sides of Modern Cars: Hacking and Data Collection

Security

Threatpost

26.2.19

OSSPatcher: Automated mobile application patching for bugs in open source libraries

Mobil

Net-security

26.2.19

Many computers are vulnerable to hacking through common plug-in devices

Vulnerebility

Net-security

26.2.19

Malware spam campaign exploits WinRAR flaw to deliver Backdoor

Spam

Securityaffairs

26.2.19

ToRPEDO attack allows intercepting calls and track locations on 4G/5G

Attack

Securityaffairs

26.2.19

Drupal RCE Flaw Exploited in Attacks Days After Patch

Vulnerebility

Securityweek

26.2.19

Hackers Can Plant Backdoors on Bare Metal Cloud Servers: Researchers

Virus

Securityweek

26.2.19

China's Telecom Dominance a Security Challenge: UK's GCHQ

BigBrothers

Securityweek

26.2.19

Mozilla May Reject UAE Firm's Root Inclusion Request

Security

Securityweek

26.2.19

Serious Flaws in WibuKey DRM Impact Siemens Products

Vulnerebility

Securityweek

26.2.19

Android Gets FIDO2 Certification—Now Supports Secure Passwordless Logins

Android

Thehackernews

26.2.19

Ad Blocking With Pi Hole

Security

SANS

26.2.19

Threatpost Data: Password Managers Are Worth the Risk, Readers Say

Crypto

Threatpost

26.2.19

Most IoT devices are being compromised by exploiting rudimentary vulnerabilities

IoT

Net-security

26.2.19

Healthcare industry: Key trends and cybersecurity challenges

Cyber

Net-security

25.2.19

ToRPEDO Privacy Attack on 4G/5G Networks Affects All U.S. Carrier

Attack

Threatpost

25.2.19

Google Ditches Passwords in Latest Android Device

Android

Threatpost

25.2.19

New privacy-breaking attacks against phones on 4G and 5G cellular networks

Attack

Net-security

25.2.19

ICANN calls for wholesale DNSSEC deployment

Security

Net-security

25.2.19

Prosecutors ask 3-Year Sentence in ‘Fappening’ Case for ex-teacher

Security

Securityaffairs

25.2.19

Expert awarded $10,000 for a new XSS flaw in Yahoo Mail

Vulnerebility

Securityaffairs

25.2.19

European Telecommunications Standards Institute Publishes New IoT Security Standard

IoT

Securityweek

25.2.19

Support for FIDO2 Passwordless Authentication Added to Android

Android

Securityweek

25.2.19

Consumer Groups Protest Being Left Out of Senate Privacy Hearing

BigBrothers

Securityweek

25.2.19

California Introduces New Data Breach Notification Law

Incindent

Securityweek

25.2.19

Prosecutors Seek 3-Year Sentence in 'Celebgate' Hacking Case

Hacking

Securityweek

25.2.19

New Service From Cisco's Duo Labs Analyzes Chrome Extensions

Security

Securityweek

25.2.19

Report: Apps Give Facebook Sensitive Health and Other Data

Social

Securityweek

25.2.19

New Attacks Against 4G, 5G Mobile Networks Re-Enable IMSI Catchers

Mobil

Thehackernews

25.2.19

B0r0nt0K ransomware demands $75,000 ransom to the victims

Ransomware

Securityaffairs

25.2.19

ICANN warns of large-scale attacks on Internet infrastructure

Attack

Securityaffairs

25.2.19

CVE-2019-9019 affects British Airways Entertainment System on Boeing 777-36N(ER)

Vulnerebility

Securityaffairs

25.2.19

Duo Labs presents CRXcavator Service that analyzes Chrome Extensions

Security

Securityaffairs

25.2.19

70000 Pakistani banks’ cards with PINs go on sale on the dark web.

Incindent

Securityaffairs

25.2.19

Fbot malware targets HiSilicon DVR/NVR Soc devices

Virus

Securityaffairs

25.2.19

Crooks offer millions to skilled black hats to help them in

Security

Securityaffairs

25.2.19

Data Breaches of the Week: Tales of PoS Malware, Latrine Status

Virus

Threatpost

25.2.19

Reddit Gold: Alice and Bob, Caught in a Web of Lies

Crypto

Threatpost

25.2.19

Phishing Scam Cloaks Malware With Fake Google reCAPTCHA

Phishing

Threatpost

25.2.19

Video: HackerOne CEO on the Evolving Bug Bounty Landscape

Security

Threatpost

25.2.19

How to combat delivery ramifications after a data breach

Incindent

Net-security

25.2.19

Businesses believe they should be patching their Android devices more frequently

Android

Net-security

25.2.19

Blocking compromised passwords from the Collection leak

Cryptocurrency

Net-security

25.2.19

Accidental data breaches are often compounded by a failure to encrypt

Crypto

Net-security

25.2.19

Don’t miss these keynotes at RSAC 2019

Congress

Net-security

23.2.19

Campaigns through LinkedIn ’s DM deliver More_eggs backdoor via fake job offers

Social

Securityaffairs

23.2.19

Cr1ptT0r Ransomware targets D-Link NAS Devices and embedded systems

Ransomware

Securityaffairs

23.2.19

WhatsApp fixes Face ID and Touch ID authentication bypass

Apple

Securityaffairs

23.2.19

Google forgot to tell customers that Nest Hub has a microphone

IT

Securityaffairs

23.2.19

NY Governor Cuomo Calls For Investigation on Facebook Health Data Collection

Social

Bleepingcomputer

23.2.19

Tax Returns Exposed in TurboTax Credential Stuffing Attacks

Attack

Bleepingcomputer

23.2.19

Windows 10 Build 18343 Released to Insiders with Windows Sandbox Improvements

Vulnerebility

Bleepingcomputer

23.2.19

Office 365 Phishing Page Comes with Live Chat Support

Phishing

Bleepingcomputer

23.2.19

Windows 10 20H1 Build 18841 Released to Skip Ahead Insiders

IT

Bleepingcomputer

23.2.19

DDoS Attacks Ranked As Highest Threat by Enterprises

Attack

Bleepingcomputer

23.2.19

19-Year Old WinRAR RCE Vulnerability Gets Micropatch Which Keeps ACE Support

Vulnerebility

Bleepingcomputer

23.2.19

Cr1ptT0r Ransomware Infects D-Link NAS Devices, Targets Embedded Systems

Ransomware

Bleepingcomputer

23.2.19

Apple Adds Better Cross-Site Tracking Prevention in iOS 12.2 Beta and Safari 12.1

Apple

Bleepingcomputer

23.2.19

Malware Campaigns Target Users of PornHub, XVideos, Other Adult Websites

Virus

Bleepingcomputer

23.2.19

Warning Issued Over Attacks on Internet Infrastructure

Attack

Securityweek

23.2.19

Bug Allows Bypass of WhatsApp Face ID, Touch ID Protection

Apple

Securityweek

23.2.19

Entrust to Acquire Hardware Security Module Maker nCipher

Crypto

Securityweek

23.2.19

Cybercriminals Promise Millions to Skilled Black Hats: Report

CyberCrime

Securityweek

23.2.19

DrainerBot SKD Sucks Data and Battery From Android Devices

Android

Securityweek

23.2.19

Pulse Secure Unveils Software Defined Perimeter Solution

Security

Securityweek

23.2.19

Researcher Earns $10,000 for Another XSS Flaw in Yahoo Mail

Vulnerebility

Securityweek

23.2.19

How to Stop Facebook App From Tracking Your Location In the Background

Social

Thehackernews

23.2.19

Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App

Hacking

Thehackernews

22.2.19

Adobe Patches Critical Information Disclosure Flaw in Reader, Again

Vulnerebility

Bleepingcomputer

22.2.19

Windows Servers Vulnerable to IIS Resource Exhaustion DoS Attacks

Vulnerebility

Bleepingcomputer

22.2.19

Drupal Fixes “Highly Critical” Vulnerability

Vulnerebility

Bleepingcomputer

22.2.19

GandCrab Ransomware Affiliates Continue to Push Decryptable Versions

Ransomware

Bleepingcomputer

22.2.19

Mozilla Firefox 67 to Warn About Breached Sites Using New Add-On

Security

Bleepingcomputer

22.2.19

Microsoft Edge Secret Whitelist Allows Facebook to Autorun Flash

Security

Bleepingcomputer

22.2.19

New Attack Kit Combines Trojans and Tools to Spread Miners, Steal Data

Virus

Bleepingcomputer

22.2.19

Windows 10 Insider Preview Build 18342 Released With Numerous Improvements

Vulnerebility

Bleepingcomputer

22.2.19

New AI-Powered Site Generates Horrific Images of Cats

IT

Bleepingcomputer

22.2.19

JD Finance Android App Caught Storing Screenshots With Banking Info

Android

Bleepingcomputer

22.2.19

Should you trust that Chrome extension? Use CRXcavator to decide

Security

Bleepingcomputer

22.2.19

Researcher Earns $10,000 for Another XSS Flaw in Yahoo Mail

Vulnerebility

Bleepingcomputer

22.2.19

Mexican Privacy Watchdog Criticizes Government Over Spyware

Virus

Securityweek

22.2.19

Cisco addresses flaws in HyperFlex and Prime Infrastructure

Vulnerebility

Securityaffairs

22.2.19

Expert found a DoS flaw in Windows Servers running IIS

Vulnerebility

Securityaffairs

22.2.19

Adobe released second fix for the same Adobe Reader flaw

Vulnerebility

Securityaffairs

22.2.19

Security experts released new GandCrab Decryptor for free

Ransomware

Securityaffairs

22.2.19

Criminal groups promising salaries averaging $360,000 per year to accomplices

CyberCrime

Net-security

22.2.19

Exposure of sensitive data via cloud applications and services increases 20%

Security

Net-security

22.2.19

92% of organizations rank users as their primary security concern

Security

Net-security

22.2.19

Almost Half A Million Delhi Citizens' Personal Data Exposed Online

Incindent

Thehackernews

22.2.19

Highly Critical Drupal RCE Flaw Affects Millions of Websites

Vulnerebility

Threatpost

22.2.19

19-Year-Old WinRAR Flaw Plagues 500 Million Users

Vulnerebility

Threatpost

22.2.19

Adobe Re-Patches Critical Acrobat Reader Flaw

Vulnerebility

Threatpost

22.2.19

ThreatList: Porn-Focused Malware Triples, Dark Web Loves It

Virus

Threatpost

22.2.19

Tech companies fret over data privacy, but ready to bet on IPO market

Privacy

Net-security

22.2.19

The risks associated with the influx of unauthorized collaboration tools

Security

Net-security

22.2.19

K2 Cyber Security releases new platform protecting hybrid clouds against sophisticated attacks

Safety

Net-security

22.2.19

Cisco fixes risky flaws in HyperFlex and Prime infrastructure

Vulnerebility

Net-security

21.2.19

Google's Nest Hub Has a Microphone It Forgot to Mention

Security

Securityweek

21.2.19

Cisco Patches High Severity Flaws in HyperFlex, Prime Infrastructure

Vulnerebility

Securityweek

21.2.19

Adobe Releases Second Patch for Data Leakage Flaw in Reader

Vulnerebility

Securityweek

21.2.19

Windows Servers Vulnerable to DoS Attacks, Microsoft Warns

Vulnerebility

Securityweek

21.2.19

Roger Stone Allegedly Communicated With Mysterious Hacker Guccifer 2.0

Crime

Securityweek

21.2.19

Threats to users of adult websites in 2018

Cyber

Securelist

21.2.19

Another Critical Flaw in Drupal Discovered — Update Your Site ASAP!

Vulnerebility

Thehackernews

21.2.19

Critical bug in WINRAR affects all versions released in the last 19 years

Vulnerebility

Securityaffairs

21.2.19

CVE-2019-6340 Critical flaw in Drupal allows Remote Code Execution

Vulnerebility

Securityaffairs

21.2.19

The interface of WinPot ATM Malware looks like a slot machine

Virus

Securityaffairs

21.2.19

Microsoft says Russian APT28 espionage group hit Democratic Institutions in Europe

APT

Securityaffairs

21.2.19

Expert released a PoC for a remote code execution flaw in mIRC App

Exploit

Securityaffairs

21.2.19

North Korea’s Lazarus APT targets Russian Entities

APT

Securityaffairs

21.2.19

Highly critical Drupal RCE flaw could lead to new Drupalgeddon, patch now!

Vulnerebility

Net-security

21.2.19

500,000+ WinRAR users open to compromise via a 19-year-old flaw

Vulnerebility

Net-security

21.2.19

Extracting a 19 Year Old Code Execution from WinRAR

Vulnerebility blog

Checkpoint

21.2.19

North Korea Turns Against New Targets?!

APT blog

Checkpoint

21.2.19

Vol.3 – 2019 Security Report

Cyber blog

Checkpoint

21.2.19

Combing Through Brushaloader Amid Massive Detection Uptick

Malware blog

Cisco Talos

21.2.19

JavaScript bridge makes malware analysis with WinDbg easier

Malware blog

Cisco Talos

21.2.19

Siegeware: When criminals take over your smart building

Cyber blog

Eset

21.2.19

Switzerland offers cash for finding security holes in its e-voting system

BigBrother blog

Eset

21.2.19

Criminal hacking hits Managed Service Providers: Reasons and responses

Hacking blog

Eset

21.2.19

Google – “Here’s how we cracked down on bad apps last year”

OS Blog

Eset

21.2.19

Smoke damage and hard drives

Hardware blog

Eset

21.2.19

Warning: Critical WinRAR Flaw Affects All Versions Released In Last 19 Years

Vulnerebility

Thehackernews

21.2.19

As US Pushes to Ban Huawei, UK Considers Softer Approach

BigBrothers

Securityweek

21.2.19

Online ATM-style Scam Puts Shoppers at Risk: Symantec

Spam

Securityweek

21.2.19

Blockchain Security Startup CipherTrace Emerges With $15M in Funding

Cryptocurrency

Securityweek

21.2.19

New GandCrab Ransomware Decryptor Released

Ransomware

Securityweek

21.2.19

Firms Moving Sensitive Data to Cloud, But Security Still a Problem: Oracle

Security

Securityweek

21.2.19

WinPot ATM Malware Resembles a Slot Machine

Virus

Securityweek

21.2.19

Canada Helping Australia Determine 'Full Extent' of Hack

BigBrothers

Securityweek

21.2.19

Critical Drupal Vulnerability Allows Remote Code Execution

Vulnerebility

Securityweek

21.2.19

Apple’s Shazam App Boots Facebook Ads and Other Third-Party SDKs

Apple

Threatpost

21.2.19

GitHub Increases Rewards, Scope For Bug-Bounty Program

Security

Threatpost

21.2.19

Separ Malware Plucks Hundreds of Companies’ Credentials in Ongoing Phish

Phishing

Threatpost

21.2.19

Password Manager Firms Blast Back at ‘Leaky Password’ Revelations

Security

Threatpost

21.2.19

Researcher: Not Hard for a Hacker to Capsize a Ship at Sea

Cyber

Threatpost

21.2.19

Microsoft: Russia’s Fancy Bear Working to Influence EU Elections

APT

Threatpost

21.2.19

Simple Powershell Keyloggers are Back

Virus

SANS

21.2.19

How are businesses facing the cybersecurity challenges of increasing cloud adoption?

Cyber

Net-security

21.2.19

(ISC)² Secure Summit EMEA will welcome hundreds of the best minds in cybersecurity

ICS

Net-security

21.2.19

Formjacking is the new get rich quick scheme for cybercriminals

Cryptocurrency

Net-security

21.2.19

Prevent shadow IT: Companies need security covering multiple communication vectors

Security

Net-security

21.2.19

Global mobile networks to support 12.3 billion devices and IoT connections by 2022

IoT

Net-security

20.2.19

GandCrabDecryptor v5.2

Anti-Ramson Tool

Ransom

20.2.19

Formjacking Surpasses Ransomware and Cryptojacking as Top Threat of 2018

Cryptocurrency

Bleepingcomputer

20.2.19

Windows 10 Cumulative Update Build 17134.619 Released With Fixes

Vulnerebility

Bleepingcomputer

20.2.19

Flaw in mIRC App Allows Attackers to Execute Commands Remotely

Vulnerebility

Bleepingcomputer

20.2.19

Cards Used at 137 Restaurants Exposed by Point-of-Sale Breach

Incindent

Bleepingcomputer

20.2.19

GitHub Updates Bug Bounty Program with Expanded Scope, Higher Rewards

Security

Bleepingcomputer

20.2.19

Ukraine Announces Joint Exercises with EU to Fend Off Russian Cyber Threats

BigBrothers

Bleepingcomputer

20.2.19

North Korean APT Lazarus Targets Russian Entities with KEYMARBLE Backdoor

APT

Bleepingcomputer

20.2.19

GandCrab Decrypter Available for v5.1, New 5.2 Variant Already Out

Ransomware

Bleepingcomputer

20.2.19

Linux Subsystem Files Accessible via Explorer in Future Windows 10 Releases

IT

Bleepingcomputer

20.2.19

Hackers Use Compromised Banks as Starting Points for Phishing Attacks

Phishing

Bleepingcomputer

20.2.19

Windows 7 and Server 2008 Updates to Require SHA-2 Support Starting July

Security

Bleepingcomputer

20.2.19

Multi-Stage Rietspoof Malware Drops Multiple Malicious Payloads

Virus

Bleepingcomputer

20.2.19

State Actor Behind Parliament Breach Says Australian Prime Minister

BigBrothers

Bleepingcomputer

20.2.19

2.7 Million Health-Related Calls, Sensitive Info Exposed for Six Years

Incindent

Bleepingcomputer

20.2.19

Kaspersky Lab Launches New Threat Intelligence Tool

Safety

Securityweek

20.2.19

Armorblox Emerges From Stealth With Natural Language Understanding Platform

Security

Securityweek

20.2.19

Microsoft Says Russian Hackers Targeted Democratic Institutions in Europe

BigBrothers

Securityweek

20.2.19

Cyber and Physical Convergence Opens Doors for Attackers: Report

Attack

Securityweek

20.2.19

Rockwell Automation to Patch Publicly Disclosed Power Monitor Flaws

Vulnerebility

Securityweek

20.2.19

Supply Chain Attacks Nearly Doubled in 2018: Symantec

Attack

Securityweek

20.2.19

Potential Privacy Lapse Found in Americans' 2010 Census Data

Privacy

Securityweek

20.2.19

Breach at PoS Firm Hits Hundreds of U.S. Restaurants, Hotels

Incindent

Securityweek

20.2.19

18,000 Android Apps Violate Google's Ad ID Policies: Analysis

Android

Securityweek

20.2.19

GitHub Increases Bug Bounty Program Rewards, Expands Scope

Security

Securityweek

20.2.19

New Multi-Stage Malware Updated Daily

Virus

Securityweek

20.2.19

Phishers’ new trick for bypassing email URL filters

Phishing

Net-security

20.2.19

Rockwell Automation industrial energy meter vulnerable to public exploits

Vulnerebility

Net-security

20.2.19

New GandCrab Decryptor Unlocks Files of Updated Ransomware

Ransomware

Threatpost

20.2.19

ATM Jackpotting Malware Hones Its Heist Tools

Cyber

Threatpost

20.2.19

When Cyberattacks Pack a Physical Punch

Cyber

Threatpost

20.2.19

Microsoft to Kill Updates for Legacy OS Using SHA-1

Security

Threatpost

20.2.19

ThreatList: APT Adversaries Up the Ante on Speed, Target Telecom

APT

Threatpost

20.2.19

ATM robber WinPot: a slot machine instead of cutlets

Cyber

Securelist

20.2.19

Security breach at North Country PoS firm hits hundreds of US restaurants and Hotels

Incindent

Securityaffairs

20.2.19

Experts found a Remote Code Execution flaw in WordPress 5.0.0

Vulnerebility

Securityaffairs

20.2.19

Exposed MongoDB revealed facial recognition abuse for tracking the Uyghur Muslim minority in China.

Exploit

Securityaffairs

20.2.19

The Muncy malware is on the rise

Virus

Securityaffairs

20.2.19

These Are the Countries With the Best and Worst Cybersecurity

Cyber

Securityaffairs

20.2.19

The Long Run of Shade Ransomware

Ransomware

Securityaffairs

20.2.19

Palo Alto Networks to Acquire Security Automation Firm Demisto for $560 Million

IT

Securityweek

20.2.19

Micro Focus Acquires Cyber-Threat Protection Firm Interset

IT

Securityweek

20.2.19

North Korea's Lazarus Hackers Found Targeting Russian Entities

APT

Securityweek

20.2.19

Russian State-Sponsored Hackers Are Fastest: CrowdStrike

BigBrothers

Securityweek

20.2.19

Fintech Security Firm nsKnox Raises $15 Million

IT

Securityweek

20.2.19

Offensive Security Releases Kali Linux 2019.1

Security

Securityweek

20.2.19

'Digital Gangsters': UK Wants Tougher Rules for Facebook

Social

Securityweek

20.2.19

Privilege Escalation Vulnerability Found in LG Device Manager

Vulnerebility

Securityweek

20.2.19

British Intelligence Says Huawei Risk Manageable: FT

BigBrothers

Securityweek

20.2.19

Wendy's Reaches $50 Million Settlement With Banks Over Data Breach

Incindent

Securityweek

20.2.19

Exploit Code Published for Recent Container Escape Vulnerability

Exploit

Securityweek

20.2.19

Storage Maker QNAP Warns of Malware Targeting Its NAS Devices

Virus

Securityweek

20.2.19

Legislation Would Stiffen Penalties for Ransomware Attacks

Ransomware

Securityweek

20.2.19

US Facebook Fine Over Privacy Could Be in Billions: Reports

Social

Securityweek

20.2.19

Critical Flaw Uncovered In WordPress That Remained Unpatched for 6 Years

Vulnerebility

Thehackernews

20.2.19

More Russian language malspam pushing Shade (Troldesh) ransomware

Ransomware

SANS

20.2.19

Ryuk: What does the helpdesk tell us?

Ransomware

Net-security

20.2.19

Insights on modern adversaries and their tactics, techniques, and procedures

Hacking

Net-security

20.2.19

European standards org releases consumer IoT cybersecurity standard

IoT

Net-security

20.2.19

Free decryption tool could save victims millions in ransomware payments

Ransomware

Net-security

19.2.19

Detecting Trojan attacks against deep neural networks

Virus

Net-security

19.2.19

Webinar: Defending account takeovers at Remitly

Congress

Net-security

19.2.19

IT security incidents affecting German critical infrastructure are on the rise

BigBrothers

Net-security

19.2.19

How RSA Conference 2019 brings diverse security professionals together

Congress

Net-security

19.2.19

Offensive Security announced the release of Kali Linux 2019.1

Security

Securityaffairs

19.2.19

Group-IB: More than 70% of Russian banks are not ready for cyberattacks

Cyber

Securityaffairs

19.2.19

Learn How XDR Can Take Breach Protection Beyond Endpoint Security

Security

Thehackernews

19.2.19

LPG Gas Company Leaked Details, Aadhaar Numbers of 6.7 Million Indian Customers

Incindent

Thehackernews

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers

Security

Thehackernews

19.2.19

When Cyberattacks Pack a Physical Punch

Cyber

Threatpost

19.2.19

Gnosticplayers round 3 – 92 Million fresh accounts from 8 unreported security breaches available for sale

Incindent

Securityaffairs

19.2.19

Expert found privilege escalation issue in LG Device Manager

Vulnerebility

Securityaffairs

19.2.19

PoC Exploit Code for recent container escape flaw in runc published online

Exploit

Securityaffairs

19.2.19

ATT&CKized Splunk – Threat Hunting with MITRE’s ATT&CK using Splunk

Security

Securityaffairs

19.2.19

Australia Says 'State Actor' Hacked Parties, Parliament

BigBrothers

Securityweek

19.2.19

Offensive Security Releases Kali Linux 2019.1

Security

Securityweek

19.2.19

'Digital Gangsters': UK Wants Tougher Rules for Facebook

Social

Securityweek

19.2.19

Privilege Escalation Vulnerability Found in LG Device Manager

Vulnerebility

Securityweek

19.2.19

British Intelligence Says Huawei Risk Manageable: FT

BigBrothers

Securityweek

19.2.19

Kali Linux 2019.1 Released — Operating System For Hackers

Security

Thehackernews

19.2.19

Building security into cloud native apps with NGINX

Security

Net-security

19.2.19

Indicators of poor password hygiene exposed

Security

Net-security

19.2.19

74% of organizations face outages due to expired certificates

Security

Net-security

18.2.19

New Trickbot module implements Remote App Credential-Grabbing features

Virus

Securityaffairs

18.2.19

Free Tool: Honey Feed

IT

Securityaffairs

18.2.19

Wendy's Reaches $50 Million Settlement With Banks Over Data Breach

Incindent

Securityweek

18.2.19

Exploit Code Published for Recent Container Escape Vulnerability

Vulnerebility

Securityweek

18.2.19

Storage Maker QNAP Warns of Malware Targeting Its NAS Devices

Virus

Securityweek

18.2.19

Legislation Would Stiffen Penalties for Ransomware Attacks

Ransomware

Securityweek

18.2.19

Popular Torrent Uploader 'CracksNow' Caught Spreading Ransomware

Ransomware

Thehackernews

18.2.19

How to Hack Facebook Accounts? Just Ask Your Targets to Open a Link

Social

Thehackernews

18.2.19

Mozilla Adding a Picture-in-Picture Mode to Firefox

IT

Bleepingcomputer

18.2.19

Google to Let you Link Directly to a Word or Phrase in Chrome

IT

Bleepingcomputer

18.2.19

Toyota PASTA Car-Hacking Tool will be soon on GitHub

Hacking

Securityaffairs

18.2.19

Windows App runs on Mac to download MacOS malware

Apple

Securityaffairs

18.2.19

Facebook login phishing campaign can deceive tech-savvy users

Social

Securityaffairs

18.2.19

Facebook paid $25,000 for CSRF exploit that leads to Account Takeover

Social

Securityaffairs

18.2.19

US Facebook Fine Over Privacy Could Be in Billions: Reports

BigBrothers

Securityweek

18.2.19

Australia Says 'State Actor' Hacked Parties, Parliament

BigBrothers

Securityweek

18.2.19

Over 92 Million New Accounts Up for Sale from More Unreported Breaches

Incindent

Thehackernews

18.2.19

Know What You Are Logging

Security

SANS

18.2.19

The importance of consumer trust in the second-hand mobile market

Security

Net-security

18.2.19

2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

Incindent

Net-security

17.2.19

Several Cryptojacking Apps Found on Microsoft Store

Malware blog

Symantec

17.2.19

Microsoft Patch Tuesday – February 2019

Vulnerebility blog

Symantec

17.2.19

Microsoft Patch Tuesday — February 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

17.2.19

Vulnerability Spotlight: Adobe Acrobat Reader DC text field remote code execution vulnerability

Vulnerebility blog

Cisco Talos

17.2.19

What you can learn from Cisco Talos’ new oil pumpjack workshop

ICS blog

Cisco Talos

17.2.19

Malta’s leading bank resumes operations after cyberheist-induced shutdown

Attack blog

Eset

17.2.19

Navigating the murky waters of Android banking malware

Malware blog

Eset

17.2.19

Attack at email provider wipes out almost two decades’ worth of data

Spam blog

Eset

17.2.19

When love becomes a nightmare: Online dating scams

Spam blog

Eset

17.2.19

Why you should choose a pseudonym at Starbucks

Social blog

Eset

17.2.19

Apple to pay teenager who uncovered FaceTime bug

OS Blog

Eset

17.2.19

First clipper malware discovered on Google Play

Cryptocurrency blog

Eset

17.2.19

Russia is going to disconnect from the internet as part of a planned test

BigBrothers

Securityaffairs

17.2.19

A new batch of 127 million records appears in the dark web

Incindent

Securityaffairs

17.2.19

Astaroth Trojan relies on legitimate os and antivirus processes to steal data

Virus

Securityaffairs

17.2.19

Finding Property Values in Office Documents

Virus

SANS

16.2.19

Apple Requiring 2-Factor Authentication on Developer Account Holders

Apple

Bleepingcomputer

16.2.19

Google Fixing Chrome API to Prevent Incognito Mode Detection

Vulnerebility

Bleepingcomputer

16.2.19

Brokerage Firms Warned by FINRA Regulator of New Phishing Attack

Phishing

Bleepingcomputer

16.2.19

Ai-Powered Website Generates Realistic Human Faces On the Spot

IT

Bleepingcomputer

16.2.19

18,000 Android Apps Track Users by Violating Advertising ID Policies

Android

Bleepingcomputer

16.2.19

Cryptojacking Coinhive Miners Land on the Microsoft Store For the First Time

Cryptocurrency

Bleepingcomputer

16.2.19

Collection of 127 Million Stolen Accounts Up for Sale on the Dark Web

Incindent

Bleepingcomputer

16.2.19

Google Rejected Roughly 55% More Android Apps in 2018, Still Not Enough

Android

Bleepingcomputer

16.2.19

Coffee Meets Bagel Dating App Discloses Data Breach on Valentine's Day

Incindent

Bleepingcomputer

16.2.19

Emotet Uses Camouflaged Malicious Macros to Avoid Antivirus Detection

Virus

Bleepingcomputer

16.2.19

Microsoft Releases First Windows 10 20H1 Build 18836 To Skip Ahead Users

IT

Bleepingcomputer

16.2.19

Ransomware Attacks Target MSPs to Mass-Infect Customers

Ransomware

Bleepingcomputer

16.2.19

Mozilla Adds Persistent Private Browsing to Firefox for iOS

Privacy

Bleepingcomputer

16.2.19

South Korea is Censoring the Internet by Snooping on SNI Traffic

BigBrothers

Bleepingcomputer

16.2.19

Shlayer Malware Disables macOS Gatekeeper to Run Unsigned Payloads

Apple

Bleepingcomputer

16.2.19

OpenOffice Zero-Day Code Execution Flaw Gets Free Micropatch

Vulnerebility

Bleepingcomputer

16.2.19

Ransom News

Ransom

Ransom News

16.2.19

Data Breach Bonanza: Dating Apps, Equifax, Mass Credential Dumps

Incindent

Threatpost

16.2.19

Trickbot Malware Goes After Remote Desktop Credentials

Virus

Threatpost

16.2.19

Eight Cryptojacking Apps Booted From Microsoft Store

Cryptocurrency

Threatpost

16.2.19

Ultra-Sneaky Phishing Scam Swipes Facebook Credentials

Social

Threatpost

16.2.19

Where’s the Equifax Data? Does It Matter?

Incindent

Threatpost

16.2.19

Tips on How to Fight Back Against DNS Spoofing Attacks

Attack

Threatpost

16.2.19

Ever-Changing Emotet Evolves Again with Fresh Evasion Tactic

Virus

Threatpost

16.2.19

Threatpost Poll: Over Half of Firms Asked Struggle with Mobile Security

Mobil

Threatpost

16.2.19

Coffee Meets Bagel Dating App Warns Users of Breach

Incindent

Threatpost

16.2.19

Google Play Cracks Down on Malicious Apps

Android

Threatpost

16.2.19

Critical OkCupid Flaw Exposes Daters to App Takeovers

Vulnerebility

Threatpost

16.2.19

Lenovo Watch X Riddled with Security Vulnerabilities

Vulnerebility

Threatpost

16.2.19

Cryptojacking Applications Land in Microsoft Store

Cryptocurrency

Securityweek

15.2.19

US Says Ex-intel Official Defected to Iran, Revealed Secrets

BigBrothers

Securityweek

15.2.19

DHS Cyber Leader Says 2020 Security Preparations Underway

BigBrothers

Securityweek

15.2.19

CSRF Vulnerability in Facebook Earns Researcher $25,000

Vulnerebility

Securityweek

15.2.19

Mozilla, Others Want Big Retailers to Pledge Minimum IoT Security

IoT

Securityweek

15.2.19

Facebook Taps User Data to Defend Workers From Threats

Social

Securityweek

15.2.19

Hackers Target WordPress Sites via WP Cost Estimation Plugin

Hacking

Securityweek

15.2.19

New Variant of Shlayer macOS Malware Discovered

Apple

Securityweek

15.2.19

Germany to Let NATO Use its Cyber Skills

BigBrothers

Securityweek

15.2.19

Google Paid Out $3.4 Million for Vulnerabilities Reported in 2018

Vulnerebility

Securityweek

15.2.19

6,500 Publicly Disclosed Data Breaches in 2018: Report

Incindent

Securityweek

15.2.19

IT Asset Management Firm Axonius Raises $13 Million

IT

Securityweek

15.2.19

Former U.S. Air Force Officer Indicted for Aiding Iranian Cyber Attacks

BigBrothers

Securityweek

15.2.19

Increasing Involvement of Nation-states in Ransomware Attacks

Ransomware

Securityweek

15.2.19

Many ICS Vulnerability Advisories Contain Errors: Report

ICS

Securityweek

15.2.19

Cryptojacking Coinhive Miners for the first time found on the Microsoft Store

Cryptocurrency

Securityaffairs

15.2.19

Group-IB helped to arrest phone scammers profiting off the backs of the Russian elderly

Spam

Securityaffairs

15.2.19

Coffee Meets Bagel dating app confirms data breach

Incindent

Securityaffairs

15.2.19

Germany makes its cyber capabilities available for NATO alliance

BigBrothers

Securityaffairs

15.2.19

Experts spotted a new strain of Shlayer macOS Malware

Apple

Securityaffairs

15.2.19

SAP security fixes address Critical flaw in SAP HANA XSA

Vulnerebility

Securityaffairs

15.2.19

Bank of Valletta shut down its operations after a cyber attack

Attack

Securityaffairs

15.2.19

0patch released micropatch for code execution flaw in OpenOffice

Vulnerebility

Securityaffairs

15.2.19

Ubuntu snapd flaw allows getting root access to the system.

Vulnerebility

Securityaffairs

15.2.19

WARNING – New Phishing Attack That Even Most Vigilant Users Could Fall For

Phishing

Thehackernews

15.2.19

Hacker Breaches Dozens of Sites, Puts 127 Million New Records Up for Sale

Hacking

Thehackernews

15.2.19

Ex-US Intelligence Agent Charged With Spying and Helping Iranian Hackers

BigBrothers

Thehackernews

15.2.19

Bank of Valletta suspended all operations in wake of cyber attack

Attack

Net-security

15.2.19

How organizations handle disruptive data sources

Security

Net-security

15.2.19

SaaS spending increasing by 78 percent year-over-year

Security

Net-security

15.2.19

Increased appetite for biometrics fueled by speed, security and convenience

Security

Net-security

15.2.19

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

Security

Net-security

15.2.19

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Security

Net-security

15.2.19

Machine learning fundamentals: What cybersecurity professionals need to know

IT

Net-security

15.2.19

Three reasons employee monitoring software is making a comeback

Privacy

Net-security

15.2.19

Old H-Worm Delivered Through GitHub

Virus

SANS

14.2.19

Cyber Attack on Malta's Bank of Valletta

Cyber

Securityweek

14.2.19

Third-Party Patch Released for Code Execution Flaw in OpenOffice

Vulnerebility

Securityweek

14.2.19

Windows App Caught Running on Mac, Installing Malware

Virus

Securityweek

14.2.19

China Calls US Concerns Over Huawei 'Groundless'

BigBrothers

Securityweek

14.2.19

U.S. Senators Announce Federal Cybersecurity Workforce Bills

BigBrothers

Securityweek

14.2.19

South Korea is Censoring the Internet by Snooping on SNI Traffic

BigBrothers

Bleepingcomputer

14.2.19

Shlayer Malware Disables macOS Gatekeeper to Run Unsigned Payloads

Apple

Bleepingcomputer

14.2.19

OpenOffice Zero-Day Code Execution Flaw Gets Free Micropatch

Vulnerebility

Bleepingcomputer

14.2.19

DNS Manipulation in Venezuela in regards to the Humanitarian Aid Campaign

Safety

Securelist

14.2.19

0patch released micropatch for code execution flaw in OpenOffice

Vulnerebility

Securityaffairs

14.2.19

Ubuntu snapd flaw allows getting root access to the system.

Vulnerebility

Securityaffairs

14.2.19

Snapd Flaw Lets Attackers Gain Root Access On Linux Systems

Vulnerebility

Thehackernews

14.2.19

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure

Hacking

Threatpost

14.2.19

Lenovo Watch X Riddled with Security Vulnerabilities

Vulnerebility

Threatpost

14.2.19

ThreatList: Banking Trojans Are Still The Top Big Bad for Email

Virus

Threatpost

14.2.19

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

Virus

Net-security

14.2.19

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Security

Net-security

14.2.19

Most wanted malware in January 2019: A new threat speaks up

Virus

Net-security

14.2.19

NIST Cybersecurity Framework: Five years later

Cyber

Net-security

13.2.19

Cisco Network Assurance Engine Bug Allows Login with Old Passwords

Vulnerebility

Bleepingcomputer

13.2.19

New Astaroth Trojan Variant Exploits Anti-Malware Software to Steal Info

Virus

Bleepingcomputer

13.2.19

Canonical Snapd Vulnerability Gives Root Access in Linux

Vulnerebility

Bleepingcomputer

13.2.19

The Scarlet Widow Gang Entraps Victims Using Romance Scams

Spam

Bleepingcomputer

13.2.19

Microsoft Releases the February 2019 Updates for Office

Vulnerebility

Bleepingcomputer

13.2.19

Weird Phishing Campaign Uses Links With Almost 1,000 Characters

Phishing

Bleepingcomputer

13.2.19

Windows 7 KB4486563 and Windows 8.1 KB4487000 Released

Vulnerebility

Bleepingcomputer

13.2.19

Microsoft February 2019 Patch Tuesday Includes Fixes for 70 Vulnerabilities

Vulnerebility

Bleepingcomputer

13.2.19

Microsoft Patches PrivExchange Vulnerability in February Quarterly Updates

Vulnerebility

Bleepingcomputer

13.2.19

Windows 10 February 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

13.2.19

Experts found a way to create a super-malware implanted in SGX-enclaves

Virus

Securityaffairs

13.2.19

Malicious PDF Analysis

Virus

Securityaffairs

13.2.19

Hacker deleted all data from VFEmail Servers, including backups

Hacking

Securityaffairs

13.2.19

SAP Patches Critical Vulnerability in HANA XSA

Vulnerebility

Securityweek

13.2.19

Extensive 'Living Off the Land' Hides Stealthy Malware Campaign

Virus

Securityweek

13.2.19

Indictment: Hackers Charged With Making Threats to Schools

Hacking

Securityweek

13.2.19

UK Data Intelligence Firm to Acquire IDology for $300 Million

BigBrothers

Securityweek

13.2.19

Intel SGX Can Be Abused to Hide Advanced Malware: Researchers

Virus

Securityweek

13.2.19

Hackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups

Hacking

Thehackernews

13.2.19

Researchers Implant "Protected" Malware On Intel SGX Enclaves

Virus

Thehackernews

13.2.19

Snapd flaw gives attackers root access on Linux systems

Vulnerebility

Net-security

13.2.19

February 2019 Patch Tuesday: PrivExchange hole plugged

Vulnerebility

Net-security

13.2.19

Critical WordPress Plugin Flaw Allows Complete Website Takeover

Vulnerebility

Threatpost

13.2.19

‘Dirty Sock’ Flaw in snapd Allows Root Access to Linux Servers

Vulnerebility

Threatpost

13.2.19

Unpatched Apple macOS Hole Exposes Safari Browsing History

Apple

Threatpost

13.2.19

Microsoft Patch Tuesday updates for February 2019 fixes IE Zero-Day

Vulnerebility

Securityaffairs

13.2.19

Microsoft Patches Internet Explorer Zero-Day Reported by Google

Vulnerebility

Securityweek

13.2.19

Hacker Erases Email Provider's Servers, Backups

Hacking

Securityweek

13.2.19

Microsoft Patch Tuesday — February 2019 Update Fixes 77 Flaws

Vulnerebility

Thehackernews

13.2.19

New Unpatched macOS Flaw Lets Apps Spy On Your Safari Browsing History

Apple

Thehackernews

13.2.19

Fake Updates campaign still active in 2019

Cyber

SANS

13.2.19

Microsoft Patches Zero-Day Browser Bug Under Active Attack

Vulnerebility

Threatpost

13.2.19

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure

Attack

Threatpost

13.2.19

Siemens Warns of Critical Remote-Code Execution ICS Flaw

ICS

Threatpost

13.2.19

SMBs spending a day each week dealing with cybersecurity issues

Cyber

Net-security

13.2.19

Healthcare email fraud: Attack attempts jump 473% over two years

Attack

Net-security

13.2.19

Nearly two-thirds of organizations say tech skills gap is impacting IT audits

IT

Net-security

13.2.19

Impersonation, sender forgery and corporate email spoofing top the charts

Spam

Net-security

12.2.19

TrickBot Banking Trojan Now Steals RDP, VNC, and PuTTY Credentials

BotNet

Bleepingcomputer

12.2.19

Dunkin' Donuts Issues Alert for Credential Stuffing Attack, Passwords Reset

Attack  Incindent

Bleepingcomputer

12.2.19

Windows Malware Runs on Macs, Bypasses Gatekeeper to Target Software Pirates

Apple

Bleepingcomputer

12.2.19

Adobe Releases Security Fixes for Flash Player, ColdFusion, and More

Vulnerebility

Bleepingcomputer

12.2.19

Hackers Wipe VFEmail Servers, May Shut Down After Catastrophic Data Loss

Incindent

Bleepingcomputer

12.2.19

Coalition of State Attorney Generals Urge FTC to Update Identity Theft Rules

Safety

Bleepingcomputer

12.2.19

Adobe Releases February 2019 Patch Updates For 75 Vulnerabilities

Vulnerebility

Thehackernews

12.2.19

Gootkit: Unveiling the Hidden Link with AZORult

Virus

Securityaffairs

12.2.19

Symantec Acquires Zero Trust Cloud Security Startup Luminate Security

IT

Securityweek

12.2.19

Application Security Firm ShiftLeft Raises $20 Million

IT

Securityweek

12.2.19

Adobe Patches Disclosed Data Leakage Flaw in Reader

Vulnerebility

Securityweek

12.2.19

Unofficial Patch Released for Adobe Reader Zero-Day

Vulnerebility

Securityweek

12.2.19

Lawmakers Back Bill to Isolate Russian Internet

BigBrothers

Securityweek

12.2.19

macOS Vulnerability Leaks Safari Data

Apple

Securityweek

12.2.19

Container Escape Flaw Hits AWS, Google Cloud, Linux Distros

Vulnerebility

Securityweek

12.2.19

Bot Protection Firm PerimeterX Raises $43 Million

IT

Securityweek

12.2.19

Hackers hit VFEmail, wipe US servers and backups

Hacking

Net-security

12.2.19

Adobe Fixes 43 Critical Acrobat and Reader Flaws

Vulnerebility

Threatpost

12.2.19

Major Container Security Flaw Threatens Cascading Attacks

Vulnerebility

Threatpost

12.2.19

Xiaomi M365 Electric Scooter Hacked and Remotely Controlled

Mobil

Threatpost

12.2.19

Micropatch prevents malicious PDFs from Calling Home

Virus

Securityaffairs

12.2.19

620 million accounts stolen from 16 hacked websites available for sale on the dark web

Incindent

Securityaffairs

12.2.19

Docker runc flaw opens the door to a ‘Doomsday scenario’

Vulnerebility

Securityaffairs

12.2.19

Xiaomi Electric Scooters Vulnerable to Life-Threatening Remote Hacks

Vulnerebility

Thehackernews

12.2.19

RunC Flaw Lets Attackers Escape Linux Containers to Gain Root on Hosts

Vulnerebility

Thehackernews

12.2.19

Beware!! New Windows .exe Malware Found Targeting macOS Computers

Virus

Thehackernews

12.2.19

RunC container escape flaw enables root access to host system

Vulnerebility

Net-security

12.2.19

OkCupid account hijackings highlight website account management issues

Hacking

Net-security

12.2.19

Temporary Patch Released For Adobe Reader Zero-Day

Vulnerebility

Threatpost

12.2.19

Privacy Protection Bypass Flaw in macOS Gives Access to Browsing History

Vulnerebility

Bleepingcomputer

12.2.19

Microsoft States Windows Update DNS Issues are Finally Fixed

Vulnerebility

Bleepingcomputer

12.2.19

RunC Vulnerability Gives Attackers Root Access on Docker, Kubernetes Hosts

Vulnerebility

Bleepingcomputer

12.2.19

Adobe Reader Zero-Day Micropatch Stops Malicious PDFs from Calling Home

Vulnerebility

Bleepingcomputer

12.2.19

New Offensive USB Cable Allows Remote Attacks over WiFi

Attack

Bleepingcomputer

12.2.19

First CryptoCurrency Clipboard Hijacker Found on Google Play Store

Cryptocurrency

Bleepingcomputer

12.2.19

MetaMask app on Google Play was a Clipboard Hijacker

Android

Securityaffairs

12.2.19

Chrome OS Network Manager Sandboxed, Stripped of Root Privileges

OS

Securityweek

12.2.19

U.S. Senators Urge VPN Ban for Federal Workers Over Spying

BigBrothers

Threatpost

12.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

12.2.19

Security wellness takes more than a fad diet

Security

Net-security

12.2.19

Is 2019 the year national privacy law is established in the US?

Privacy

Net-security

12.2.19

88% of UK businesses breached during the last 12 months

Incindent

Net-security

12.2.19

People still shocked by how easy it is to track someone online

Security

Net-security

11.2.19

Have You Seen an Email Virus Recently?

Virus

SANS

11.2.19

Exposed: Instagram, OKCupid, Mumsnet All Face Data Concerns

Social

Threatpost

11.2.19

First ‘Clipper’ Malware Discovered on Google Play

Android

Threatpost

11.2.19

Managing Enterprise Security After the Data Supernova

Security

Threatpost

11.2.19

First CryptoCurrency Clipboard Hijacker Found on Google Play Store

Cryptocurrency

Bleepingcomputer

11.2.19

A mysterious code prevents QNAP NAS devices to be updated

Vulnerebility

Securityaffairs

11.2.19

Clipper Malware Slips Into Google Play

Android

Securityweek

11.2.19

China Police Get Power to Remotely 'Inspect' Company Networks in China

BigBrothers

Securityweek

11.2.19

Password Checkup Chrome extension warns users about compromised logins

Safety

Securityaffairs

11.2.19

Tenable Adds 'Predictive Prioritization' to Vulnerability Management Offering

Vulnerebility

Securityweek

11.2.19

Senators Concerned Over DHS Employees Using Foreign VPNs

BigBrothers

Securityweek

11.2.19

Linux Miner Removes Competing Malware From Infected Systems

Cryptocurrency

Securityweek

11.2.19

Switzerland Launches Bug Bounty Program for E-Voting Systems

BigBrothers

Securityweek

11.2.19

First Android Clipboard Hijacking Crypto Malware Found On Google Play Store

Android

Thehackernews

11.2.19

BEC-style attacks exploded in Q4 2018

Spam

Net-security

11.2.19

Facebook, Twitter Trackers Whitelisted by Brave Browser

Social

Bleepingcomputer

11.2.19

Windows95 v2.0 Let's You Play DOOM, Wolfenstein 3D, and More

IT

Bleepingcomputer

11.2.19

Thousands of RDM refrigeration systems exposed online are at risk

Incindent

Securityaffairs

11.2.19

Adiantum will bring encryption on Android devices without cryptographic acceleration

Android

Securityaffairs

11.2.19

Google open sourced the ClusterFuzz fuzzing platform

IT

Securityaffairs

11.2.19

Undercover Spy Exposed in NYC Was 1 of Many

CyberSpy

Securityweek

11.2.19

Bezos Case Exposes Billionaires' Vulnerability to Hackers

Security

Securityweek

11.2.19

Product showcase: Veriato Cerebral user & entity behavior analytics software

Privacy

Net-security

11.2.19

Zero trust browsing: Protect your organization from its own users

Privacy

Net-security

11.2.19

There’s a growing disconnect between data privacy expectations and reality

Privacy

Net-security

11.2.19

Average DDoS attack volumes grew by 194% in 12 months

Attack

Net-security

10.2.19

Decompiled Undertale RPG Source Code Released on GitHub

IT

Bleepingcomputer

10.2.19

New Linux coin miner kills competing malware to maximize profits

Cryptocurrency

Securityaffairs

10.2.19

Maldoc Analysis of the Weekend

Virus

SANS

9.2.19

Windows 10 Insider Preview Build 18334 Released With Gaming Improvements

IT

Bleepingcomputer

9.2.19

Mail Attachment Builds Ransomware Downloader from Super Mario Image

Ransomware

Bleepingcomputer

9.2.19

Coinminer Targets Linux, Kills Competition to Maximize Profits

Cryptocurrency

Bleepingcomputer

9.2.19

Apple Patched Two Actively Exploited Zero-Days in iOS 12.1.4

Apple

Bleepingcomputer

9.2.19

Like Microsoft Edge, Chrome is Getting Tab Hover Card Images

IT

Bleepingcomputer

9.2.19

GandCrab ransomware campaign targets Italy using steganography

Ransomware

Securityaffairs

9.2.19

Exclusive – MalwareMustDie Team analyzed the Cayosin Botnet and its criminal ecosystem

BotNet

Securityaffairs

9.2.19

Ransom News

Ransom

Ransom

9.2.19

Refrigeration Systems Used by Supermarkets, Hospitals Left Exposed Online

Incindent

Securityweek

9.2.19

Merkel Opens Spy Agency's Massive New Berlin HQ

BigBrothers

Securityweek

9.2.19

Google Improves Android Encryption with Adiantum

Android

Securityweek

9.2.19

Study Analyzes Challenges, Concerns for IT/OT Convergence

Analysis

Securityweek

9.2.19

Site Isolation is Coming to Firefox

Safety

Securityweek

9.2.19

Carbonite to Acquire Webroot for $618 Million in Cash

IT

Securityweek

9.2.19

Google Open Sources Fuzzing Platform

IT

Securityweek

9.2.19

NATO Opens Defense Innovation Challenge Seeking C4ISR Solutions

BigBrothers

Securityweek

9.2.19

FireOS Flaw Allowed Limited Content Injection in Amazon Tablets

OS

Threatpost

9.2.19

Google Boosts Encryption For Low-End Android Devices

Android

Threatpost

8.2.19

Adiantum: A new encryption scheme for low-end Android devices

Android

Net-security

8.2.19

Apple fixes FaceTime eavesdropping bug, two iOS zero-days

Apple

Net-security

8.2.19

TWOSENSE.AI Awarded $2.42M Behavioral Biometrics Security Contract by DoD

Security

Bleepingcomputer

8.2.19

New Phishing Attack Uses Google Translate as Camouflage

Phishing

Bleepingcomputer

8.2.19

Wells Fargo Hit By Nationwide Outage, ATMs and Online Banking Down

Security

Bleepingcomputer

8.2.19

Microsoft Provides Mitigations, Workarounds for PrivExchange Vulnerability

Vulnerebility

Bleepingcomputer

8.2.19

Microsoft Now Allows Skype Users to Blur the Background on Video Calls

IT

Bleepingcomputer

8.2.19

Google Introduces Adiantum Storage Encryption to Low-End Android Devices

Crypto

Bleepingcomputer

8.2.19

Apple Releases Fix for Group FaceTime Snooping Bug in iOS and macOS

Apple

Bleepingcomputer

8.2.19

Business Email Compromise Attacks See Almost 500% Increase

Spam

Bleepingcomputer

8.2.19

Netography to Make Network Security Autonomous, Funded by Andreessen Horowitz

Security

Bleepingcomputer

8.2.19

Three out of the four flaws fixed with iOS 12.1.4 were exploited in the wild

Apple

Securityaffairs

8.2.19

Hackers broke into Australia’s Parliament Computer Network

BigBrothers

Securityaffairs

8.2.19

Huawei 'Shocked, Amused' by Espionage Accusations

BigBrothers

Securityweek

8.2.19

Google Spots Attacks Exploiting iOS Zero-Day Flaws

Apple

Securityweek

8.2.19

Google Created Faster Storage Encryption for All Low-End Devices

Crypto

Thehackernews

8.2.19

Latest iOS 12.1.4 Update Patches 2 Zero-Day and FaceTime Bugs

Apple

Thehackernews

8.2.19

Apple Patches FaceTime Spying Vulnerability

Apple

Securityweek

8.2.19

Australia Wields Vast Decryption Powers Before Planned Review

BigBrothers

Securityweek

8.2.19

20 Indicted in Multimillion-Dollar Online Fraud Scheme

CyberCrime

Securityweek

8.2.19

Australian Parliament Computer Network Breached

BigBrothers

Securityweek

8.2.19

Phishers Serve Fake Login Pages via Google Translate

Phishing

Securityweek

8.2.19

Vulnerabilities in Kunbus Industrial Gateway allows to control the devices

ICS

Securityaffairs

8.2.19

ThreatList: Latest DDoS Trends by the Numbers

Attack

Threatpost

8.2.19

Apple Fixes Pesky FaceTime Bug in iOS 12.1.4 Update

Apple

Threatpost

8.2.19

Flaw in Multiple Airline Systems Exposes Passenger Data

Vulnerebility

Threatpost

8.2.19

Phishing Kit with JavaScript Keylogger

Phishing

SANS

8.2.19

Mild to medium volume expected for February 2019 Patch Tuesday

Vulnerebility

Net-security

8.2.19

DevOps and DevSecOps developments to watch in 2019

Security

Net-security

8.2.19

Infosec pros believe data isn’t secure in the cloud, despite desire for mass adoption

Security

Net-security

8.2.19

ETSI releases TS 103 457 to secure functions in a virtualized environment

Security

Net-security

8.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

Expert publicly disclosed the existence of 0day flaw in macOS Mojave

Apple

Securityaffairs

7.2.19

Zero-day Vulnerability Highlights the Responsible Disclosure Dilemma

Vulnerebility

Securityweek

7.2.19

Micro-segmentation Security Firm Illumio Raises $65 Million

IT

Securityweek

7.2.19

Critical Flaws Allow Hackers to Take Control of Kunbus Industrial Gateway

Vulnerebility

Securityweek

7.2.19

Fortinet Introduces New Next-Generation Firewalls

Safety

Securityweek

7.2.19

German Competition Watchdog Demands More Control for Facebook Users

Social

Securityweek

7.2.19

Network Security Firm Netography Emerges From Stealth

Security

Securityweek

7.2.19

France to Tighten 5G Security: Minister

BigBrothers

Securityweek

7.2.19

2018 in Snort Rules

Safety blog

Cisco Talos

7.2.19

Reverse RDP Attack: Code Execution on RDP Clients

Attack blog

Checkpoint

7.2.19

Report: Under the Hood of Cyber Crime

Cyber blog

Checkpoint

7.2.19

The Curious Case of Convexity Confusion

Security blog

Project Zero

7.2.19

Tech Support Scams Now Get Users to Install Potentially Unwanted Apps

Spam blog

Symantec

7.2.19

DanaBot updated with new C&C communication

BotNet blog

Eset

7.2.19

Google rolls out Chrome extension to warn you about compromised logins

Safety blog

Eset

7.2.19

European Commission orders recall of children’s smartwatch over privacy concerns

BigBrother blog

Eset

7.2.19

59,000 Breaches Disclosed in First Eight Months of GDPR

Privacy

Securityweek

7.2.19

Ursnif: Long Live the Steganography and AtomBombing!

Virus

Securityaffairs

7.2.19

DDoS Attacks in Q4 2018

Analysis  Attack

Securelist

7.2.19

How today’s workforce stays secure and what apps it prefers

Security

Net-security

7.2.19

New Docs Show Pricing for Windows 7 Extended Security Updates

Security

Bleepingcomputer

7.2.19

"Lucky Draw" Smishing Campaign Asks Money to Deliver Car Prize

Android

Bleepingcomputer

7.2.19

59K Data Breaches Reported, 91 Fines Imposed Since GDPR Enactment

Incindent

Bleepingcomputer

7.2.19

Researcher Declines to Share Zero-Day macOS Keychain Exploit with Apple

Apple

Bleepingcomputer

7.2.19

Mozilla's Site Isolation Coming to Firefox, First Milestone in February

Security

Bleepingcomputer

7.2.19

What do successful pentesting attacks have in common?

Attack

Net-security

7.2.19

8 months of GDPR: 59,000+ reported breaches, 91 fines

Privacy

Net-security

7.2.19

Android devices could be hacked by viewing a malicious PNG Image

Android

Securityaffairs

7.2.19

Lawmakers Concerned About Apple's Handling of FaceTime Spying Bug

Apple

Securityweek

7.2.19

Chinese Hackers Spy on U.S. Law Firm, Major Norwegian MSP

BigBrothers

Securityweek

7.2.19

macOS Mojave Zero-Day Allows Theft of Keychain Passwords

Apple

Securityweek

7.2.19

Webinar Today: Merging OT/ICS Threat Detection Into Your SOC

ICS

Securityweek

7.2.19

Scammers Abuse Gmail Address Feature in Fraud Attacks

Spam

Securityweek

7.2.19

MacOS Zero-Day Exposes Apple Keychain Passwords

Apple

Threatpost

7.2.19

Clever Phishing Attack Enlists Google Translate to Spoof Login Page

Phishing

Threatpost

7.2.19

Lookalike domains: Artificial intelligence may come to the rescue

Security

Net-security

7.2.19

Malicious macros can trigger RCE in LibreOffice, OpenOffice

Virus

Net-security

7.2.19

The problem with vulnerable IoT companion apps

IoT

Net-security

6.2.19

30% of Automotive Companies Lacking a Dedicated Cybersecurity Team

Cyber

Bleepingcomputer

6.2.19

Power Company Has Security Breach Due to Downloaded Game

Incindent

Bleepingcomputer

6.2.19

Cryptojacking Overtakes Ransomware, Malware-as-a-Service on the Rise

Ransomware

Bleepingcomputer

6.2.19

GandCrab Ransomware Helps Shady Data Recovery Firms Hide Ransom Costs

Ransomware

Bleepingcomputer

6.2.19

Microsoft Released the February 2019 Non-Security Office Updates

Security

Bleepingcomputer

6.2.19

Microsoft Confirms Windows Update Problems Were Caused by DNS Issues

Security

Bleepingcomputer

6.2.19

Google Launches Password Checkup Extension to Alert Users of Data Breaches

Safety

Bleepingcomputer

6.2.19

OpenOffice Vulnerable to Remote Code Execution, LibreOffice Patched

Vulnerebility

Bleepingcomputer

6.2.19

Microsoft Confirms Serious ‘PrivExchange’ Vulnerability

Vulnerebility

Threatpost

6.2.19

Modern Cybercrime: It Takes a Village

CyberCrime

Threatpost

6.2.19

What are Data Manipulation Attacks, and How to Mitigate Against Them

Attack

Threatpost

6.2.19

Security expert Marco Ramilli released for free the Malware Hunter tool

Security

Securityaffairs

6.2.19

A critical couterfeiting vulnerability addressed in Zcash

Cryptocurrency

Securityaffairs

6.2.19

With No Unifying U.S. Federal Privacy Law, States Are Implementing Their Own

BigBrothers

Securityweek

6.2.19

Check-in Links Sent by Several Airlines Expose Passenger Data

Incindent

Securityweek

6.2.19

Android Phones Can Get Hacked Just by Looking at a PNG Image

Android

Thehackernews

6.2.19

Marvell Avastar wireless SoCs have multiple vulnerabilities

Alert News

Alert

6.2.19

New ExileRAT backdoor used in attacks aimed at users in Tibet

Virus

Securityaffairs

6.2.19

Reverse RDP Attack – Rogue RDP Server can be used to hack RDP clients

Attack

Securityaffairs

6.2.19

SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM.

Virus

Securityaffairs

6.2.19

Critical Zcash Bug Could Have Allowed 'Infinite Counterfeit' Cryptocurrency

Cryptocurrency

Thehackernews

6.2.19

How to Delete Accidentally Sent Messages, Photos on Facebook Messenger

Social

Thehackernews

6.2.19

Web App Security Firm Signal Sciences Raises $35 Million

IT

Securityweek

6.2.19

New LuckyCat-Linked RAT Targets Users in Tibet

Virus

Securityweek

6.2.19

Don't Let Huawei Help Set Up 5G, US Warns EU Nations

BigBrothers

Securityweek

6.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

6.2.19

'No Material Impact' From Foreign Meddling in 2018 US Vote: Report

BigBrothers

Securityweek

6.2.19

Smart Watch Recalled in Europe Over Privacy Risks

BigBrothers

Securityweek

6.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

6.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

6.2.19

Hancitor malspam and infection traffic from Tuesday 2019-02-05

Spam

SANS

6.2.19

IoT Scale Flaws Enable Denial of Service, Privacy Issues

IoT

Threatpost

6.2.19

The impact of cyber-enabled economic warfare escalation

Cyber

Net-security

6.2.19

5 reasons why asset management is a hot topic in 2019

Cyber

Net-security

6.2.19

70 real-life hackers and cybersecurity practitioners share their personal insights

Hacking

Net-security

5.2.19

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Hacking

Thehackernews

5.2.19

Google's New Tool Alerts When You Use Compromised Credentials On Any Site

Security

Thehackernews

5.2.19

Code Execution Flaw Found in LibreOffice, OpenOffice

Vulnerebility

Securityweek

5.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

5.2.19

Smart Watch Recalled in Europe Over Privacy Risks

Privacy

Securityweek

5.2.19

'No Material Impact' From Foreign Meddling in 2018 US Vote: Report

BigBrothers

Securityweek

5.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

5.2.19

Mitigations against Mimikatz Style Attacks

Attack

SANS

5.2.19

Remote Desktop Protocol Clients Rife with Remote Code-Execution Flaws

Vulnerebility

Threatpost

5.2.19

EU Recalls Children’s Smartwatch That Leaks Location Data

BigBrothers

Threatpost

5.2.19

Google Patches Critical .PNG Image Bug

Vulnerebility

Threatpost

5.2.19

Severe RCE Flaw Disclosed in Popular LibreOffice and OpenOffice Software

Vulnerebility

Thehackernews

5.2.19

Huddle House Suffers Payment Card Breach

Incindent

Securityweek

5.2.19

Code Execution Flaw Found in LibreOffice, OpenOffice

Vulnerebility

Securityweek

5.2.19

Password Practices Still Poor, Google Says

Security

Securityweek

5.2.19

Microsoft Brings Security Notifications to Authenticator App

Security

Securityweek

5.2.19

Mozilla Resumes Firefox 65 Rollout After AVs Disable HTTPS Scanning

Safety

Bleepingcomputer

5.2.19

RDP Clients Exposed to Reverse RDP Attacks by Major Protocol Issues

Attack

Bleepingcomputer

5.2.19

Severe bug in LibreOffice and OpenOffice suites allows remote code execution

Vulnerebility

Securityaffairs

5.2.19

Huddle House Fast Food Chain Suffers Data Breach in POS System

Incindent

Bleepingcomputer

5.2.19

Mozilla Adding CryptoMining and Fingerprint Blocking to Firefox

Cryptocurrency

Bleepingcomputer

5.2.19

Windows 10 Update Continues Having Issues After DNS Fixes

Safety

Bleepingcomputer

5.2.19

ExileRat Targeting Tibetan Supporters via Malicious PowerPoint Docs

Virus

Bleepingcomputer

5.2.19

Mozilla to Automatically Block Auto-Playing Audio in Firefox 66

Security

Bleepingcomputer

5.2.19

Microsoft Authenticator App Now Delivers Security Notifications

Security

Bleepingcomputer

5.2.19

Windows 3.0 File Manager Reborn in All Its Nostalgic Glory

IT

Bleepingcomputer

5.2.19

Google Working on Chrome Never-Slow Mode for Faster Browsing

Security

Bleepingcomputer

5.2.19

The APT Name Game: How Grim Threat Actors Get Goofy Monikers

APT

Threatpost

5.2.19

‘Collection #1’ Data Dump Hacker Identified

Incindent

Threatpost

5.2.19

ExileRAT shares C2 with LuckyCat, targets Tibet

Malware blog

Cisco Talos

5.2.19

SpeakUp: A New Undetected Backdoor Linux Trojan

Malware blog

Checkpoint

5.2.19

Houzz discloses data breach, asks some users to reset passwords

Incident blog

Eset

5.2.19

Roughly 500,000 Ubiquity devices may be affected by flaw already exploited in the wild

Exploit

Securityaffairs

5.2.19

Experts found popular beauty apps in the Play Store including malicious code

Virus

Securityaffairs

5.2.19

New Backdoor Targets Linux Servers

Virus

Securityweek

5.2.19

Researchers Identify Hacker Behind Massive Data Breach Collection

Incindent

Securityweek

5.2.19

New Canon Printers Bring SIEM Integration, Other Security Features

Safety

Securityweek

5.2.19

Wikipedia Articles as part of Tech Support Scamming Campaigns?

Spam

SANS

5.2.19

Spy Campaign Spams Pro-Tibet Group With ExileRAT

Virus

Net-security

5.2.19

Why vaporworms might be the scourge of 2019

Cyber

Net-security

5.2.19

AI won’t solve all of our cybersecurity problems

Cyber

Net-security

4.2.19

New SpeakUp Backdoor Infects Linux and macOS with Miners

Apple

Bleepingcomputer

4.2.19

QuadrigaCX exchange lost access to $145 Million funds after founder dies

CyberCrime

Bleepingcomputer

4.2.19

Young hacker gets 10 years jail sentence for SIM Swapping attacks

Crime

Bleepingcomputer

4.2.19

Flaw Possibly Affecting 500,000 Ubiquity Devices Exploited in the Wild

Exploit

Securityweek

4.2.19

Extreme Networks Launches IoT Defense Solution For Enterprises

IoT

Securityweek

4.2.19

Attackers Use CoAP for DDoS Amplification

Attack

Securityweek

4.2.19

Senators Reintroduce DHS Cyber Hunt and Incident Response Teams Act

BigBrothers

Securityweek

4.2.19

Cryptocurrency Firm Losses $145 Million After CEO Dies With Only Password

Cryptocurrency

Thehackernews

4.2.19

Struts Vulnerability CVE-2017-5638 on VMware vCenter - the Gift that Keeps on Giving

Vulnerebility

SANS

4.2.19

SpeakUp Linux Backdoor Sets Up for Major Attack

Virus

Threatpost

4.2.19

Metro Bank is the first bank that disclosed SS7 attacks against its customers

Attack

Securityaffairs

4.2.19

U.S. Energy Firm Fined $10 Million for Security Failures

ICS

Securityweek

4.2.19

Several Popular Beauty Camera Apps Caught Stealing Users' Photos

Android

Thehackernews

4.2.19

First Hacker Convicted of 'SIM Swapping' Attack Gets 10 Years in Prison

Mobil

Thehackernews

4.2.19

Houzz Break-In: Data Breach Announced

Incindent

Bleepingcomputer

4.2.19

New Malware Siphons Cryptocurrency Wallets and Credentials, Credit Cards

Cryptocurrency

Bleepingcomputer

4.2.19

Security firm Recorded Future discovered the hacker behind Collection #1

Incindent

Securityaffairs

4.2.19

Chrome to Display Warnings About Similar or Lookalike URLs

Security

Bleepingcomputer

4.2.19

Can Enterprises execute a GRC Movement?

Security

Securityaffairs

4.2.19

Four differences between the GDPR and the CCPA

Privacy

Net-security

4.2.19

CISOs: Change your mindset or lose your job

Security

Net-security

4.2.19

Evaluating the biggest cyber threats to the electric power sector

ICS

Net-security

4.2.19

Email authentication use growing steadily in every industry sector

Cyber

Net-security

4.2.19

RSA Conference 2019 USA: What you can expect at this year’s event

Congress

Net-security

4.2.19

Video: Analyzing a Simple HTML Phishing Attachment

Phishing

SANS

3.2.19

Sextortion Scam Stating Xvideos Was Hacked to Record You Through Webcam

Spam

Bleepingcomputer

3.2.19

New Scam Holds YouTube Channels for Ransom

Spam

Bleepingcomputer

3.2.19

Experts observed a new sextortion scam Xvideos-themed

Spam

Securityaffairs

3.2.19

Hacker who reported a flaw in Hungarian Magyar Telekom faces up to 8-years in jail

Crime

Securityaffairs

3.2.19

Operators of the TheMoon botnet offer it as a service

BotNet

Securityaffairs

3.2.19

IBM experts warn of malicious abuses of Apple Siri Shortcuts

Apple

Securityaffairs

3.2.19

Scanning for WebDAV PROPFIND Exploiting CVE-2017-7269

Exploit

SANS

2.2.19

Cyber Security Week in Review (Feb. 1)

Cyber blog

Cisco Talos

2.2.19

Fake Cisco Job Posting Targets Korean Candidates

BigBrother blog

Cisco Talos

2.2.19

Vulnerability Spotlight: Multiple vulnerabilities in ACD Systems Canvas Draw 5

Vulnerebility blog

Cisco Talos

2.2.19

Examining Pointer Authentication on the iPhone XS

Exploit blog

Project Zero

2.2.19

Four new caches of stolen logins put Collection #1 in the shade

Incident blog

Eset

2.2.19

Japan to probe citizens’ IoT devices in the name of security

BigBrother blog

Eset

2.2.19

Cybercrime black markets: Dark web services and their prices

Cyber blog

Eset

2.2.19

‘We’re coming for you’, global police warn DDoS attack buyers

Attack blog

Eset

2.2.19

“Love you” malspam gets a makeover for massive Japan-targeted campaign

Spam blog

Eset

2.2.19

DHS Cyber Hunt Teams to Be Authorized by Reintroduced Bipartisan Bill

BigBrothers

Bleepingcomputer

2.2.19

Windows 10 Insider Preview Build 18329 Released with Mixed Reality Win32 Apps

Vulnerebility

Bleepingcomputer

2.2.19

New Site Monitors Censorship on Apple's Chinese App Store

BigBrothers

Bleepingcomputer

2.2.19

DHS Security Tech Innovation Program Means Big Money for SMBs

BigBrothers

Bleepingcomputer

2.2.19

Mozilla Halts Firefox 65 Rollout Due to Insecure Certificate Errors

Safety

Bleepingcomputer

2.2.19

Google Outage Causing Google Charts and Other APIs to Not Work

IT

Bleepingcomputer

2.2.19

Basecamp Successfully Defends Against Credential Stuffing Attack

Attack

Bleepingcomputer

2.2.19

Microsoft Forcing Skype Classic Users to Upgrade to Version 8

IT

Bleepingcomputer

2.2.19

Ethical Hacker Exposes Magyar Telekom Vulnerabilities, Faces 8 Years in Jail

Crime

Bleepingcomputer

2.2.19

Linux Kernel Spectre Protection Changes to Boost App Performance

Attack

Bleepingcomputer

2.2.19

Many Windows 10 Users Unable to Connect to Windows Update Service

Security

Bleepingcomputer

2.2.19

Dell Introduces Dell SafeGuard and Response Solutions To Fight Evolving Threats

Safety

Bleepingcomputer

2.2.19

Microsoft Announces Earnings for Second Fiscal Quarter of 2019

IT

Bleepingcomputer

2.2.19

Android Apps With Millions of Installs Collect Selfies, Push Porn Ads

Android

Bleepingcomputer

2.2.19

Airbus Data Breach Exposes Employee Credentials, Professional Contact Details

Incindent

Bleepingcomputer

2.2.19

Home Design website Houzz suffered a data breach

Incindent

Securityaffairs

2.2.19

Apple issued a partial fix for recent FaceTime spying bug

Apple

Securityaffairs

2.2.19

Ransom News

Ransom News

Ransom

2.2.19

US authorities aim to dismantle North Korea’s Joanap Botnet

BotNet

Securityaffairs

2.2.19

The return of the AdvisorsBot malware

Virus

Securityaffairs

2.2.19

State Bank of India left archive with millions of Customer messages exposed

Incindent

Securityaffairs

2.2.19

Malicious Hackers Can Abuse Siri Shortcuts: IBM

Virus

Securityweek

2.2.19

Industrial Internet Consortium and OpenFog Consortium Merge

ICS

Securityweek

2.2.19

UK Data Watchdog Fines Leave.EU, Eldon Insurance

BigBrothers

Securityweek

2.2.19

Apple Partially Fixes FaceTime Spying Bug

Apple

Securityweek

2.2.19

Israel Seeks to Beat Election Cyber Bots

BigBrothers

Securityweek

2.2.19

Home Design Website Houzz Alerts Users of Data Breach

Incindent

Securityweek

2.2.19

Hacker who reported flaw in Hungarian Telekom faces up to 8-years in prison

Vulnerebility

Thehackernews

2.2.19

New Mac Malware Targets Cookies to Steal From Cryptocurrency Wallets

Apple

Thehackernews

2.2.19

Most Magento shops get compromised via vulnerable extensions

Vulnerebility

Net-security

2.2.19

Chafer APT Takes Aim at Diplomats in Iran with Improved Custom Malware

APT

Threatpost

2.2.19

Houzz Urges Password Resets After Data Breach

Incindent

Threatpost

2.2.19

Cybercriminals Aim for the Super Bowl Goal Posts

CyberCrime

Threatpost

1.2.19

Microsoft Opens Up Skip Ahead Ring As It Prepares First Windows 10 19H2 Build

IT

Bleepingcomputer

1.2.19

Mozilla Finally Nixing Extensions In Firefox Private Windows

Privacy

Bleepingcomputer

1.2.19

Love Letter Malspam Serves Cocktail of Malware, Heavily Targets Japan

Spam

Bleepingcomputer

1.2.19

Chrome 72 Released with 58 Security Fixes, Deprecates TLS 1.0 and 1.1

Vulnerebility

Bleepingcomputer

1.2.19

Fake Survey Scammers on YouTube Have Terrible OpSec Skills

Spam

Bleepingcomputer

1.2.19

Police Forces Team Up To Hunt Down Users of DDoS Services

BigBrothers

Bleepingcomputer

1.2.19

New LockerGoga Ransomware Allegedly Used in Altran Attack

Ransomware

Bleepingcomputer

1.2.19

Theoretical Ransomware Attack Could Lead to Global Damages Says Report

Ransomware

Bleepingcomputer

1.2.19

Apple Disabled Group FaceTime While Working on Bug Fix

Apple

Bleepingcomputer

1.2.19

Microsoft Adds New Privacy and Compliance Features to Microsoft 365

Privacy

Bleepingcomputer

1.2.19

Firefox 65 Released with Updated Content Blocking, MSI Installers, and More

Security

Bleepingcomputer

1.2.19

Microsoft 365 Experiencing Issues, Users Unable to Access URLs From Emails

Security

Bleepingcomputer

1.2.19

Hackers Stole $1.7 Billion in Cryptocurrency Last Year

Cryptocurrency

Bleepingcomputer

1.2.19

Brave Browser Taunts Chrome, Edge, and Firefox in New Privacy Ad

Privacy

Bleepingcomputer

1.2.19

Disable FaceTime Now! Bug Lets Callers Snoop On You Without Permission

Apple

Bleepingcomputer

1.2.19

Discover Card Users Affected by Data Breach, New Credit Cards Issued

Incindent

Bleepingcomputer

1.2.19

DNS DDoS Attack Protections to be Forcefully Enabled for Non-Compliant Sites

Attack

Bleepingcomputer

1.2.19

Windows System Guard Launch Causing Blank Boot Screens in UEFI PCs

Safety

Bleepingcomputer

1.2.19

TamperMonkey May Be the Next Victim of Google's Chrome Manifest V3 Changes

IT

Bleepingcomputer

1.2.19

Spam Campaign Follows the White Rabbit to NSFW Phishing Scams

Spam

Bleepingcomputer

1.2.19

Azorult Trojan Steals Passwords While Hiding as Google Update

Virus

Bleepingcomputer

1.2.19

Researchers reveal new privacy attack against 3G, 4G, and 5G mobile users

Mobil

Net-security

1.2.19

Facebook dismantled a vast manipulation campaign tied to Iran

Social

Securityaffairs

1.2.19

CookieMiner Mac Malware steals browser cookies and sensitive Data

Apple

Securityaffairs

1.2.19

New York Investigating Apple's Response to FaceTime Spying Bug

Apple

Securityweek

1.2.19

Minnesota Department of Human Services Reports Data Breach

Incindent

Securityweek

1.2.19

Facebook Takes Down Vast Iran-led Manipulation Campaign

Social

Securityweek

1.2.19

GitHub Helps Developers Keep Dependencies Secure via Dependabot

Security

Securityweek

1.2.19

Firms That Sold Fake Social Media Activity Settle With New York State

Social

Securityweek

1.2.19

Dell Teams With CrowdStrike, Secureworks for New Endpoint Security Offering

Security

Securityweek

1.2.19

Airbus Data Takes Flight; and Billions of Credentials Dumped on Dark Web

Incindent

Threatpost

1.2.19

Facebook Boots Hundreds of Iran-Linked Accounts For Spreading Misinformation

Social

Threatpost

1.2.19

TheMoon Rises Again, With a Botnet-as-a-Service Threat

BotNet

Threatpost

1.2.19

Prepare to Defend Your Network Against Swarm-as-a-Service

Security

Threatpost

1.2.19

2019 Already Marred By Slew of Data Breach Incidents

Incindent

Threatpost

1.2.19

Safeguarding your data from human error and phishing attacks with the cloud

Phishing

Net-security

1.2.19

Is your organization ready for the data explosion?

Incindent

Net-security

1.2.19

Employees report 23,000 phishing incidents annually, costing $4.3 million to investigate

Phishing

Net-security

1.2.19

Companies getting serious about AI and analytics, 58% are evaluating data science platforms

IT

Net-security

1.2.19

Sextortion: Follow the Money Part 3 - The cashout begins!

Security

SANS