Calendar November - Home  2020  2019  2018  2017  2016  1  2  3  4  5  6  7  8  Articles

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2019 - January  February  March  April  May  June  July  August  September  October  November  December


Calendar November

Date

Name

Category

Web

30.11.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in October 2019Cyber blogF5 Labs
30.11.19Regional Threat Perspectives, Fall 2019: United StatesCyber blogF5 Labs
30.11.19FIDL: FLARE’s IDA Decompiler LibrarySecurity blogFireEye

30.11.19

Best practices for staying safe online during the holiday shopping season

Cyber blogCisco Talos
30.11.19Smartwatch exposes locations and other data on thousands of childrenCyber blog

Eset

30.11.195 scams to watch out for this shopping seasonSecurity blog

Eset

30.11.19

Cryptocurrency exchange loses US$50 million in apparent hackCryptocurrency blog

Eset

30.11.19Stantinko botnet adds cryptomining to its pool of criminal activitiesBotNet blog  Cryptocurrency blog

Eset

30.11.19CyberwarCon – the future of nation‑state nastinessCyber blog

Eset

30.11.19

New Chrome Password Stealer Sends Stolen Data to a MongoDB DatabaseHacking

Bleepingcomputer

30.11.19Kali Linux Adds 'Undercover' Mode to Impersonate Windows 10OS

Bleepingcomputer

30.11.19Law Enforcement Shuts Down Imminent Monitor Malware, Makes ArrestsVirus

Bleepingcomputer

30.11.19

Amazon Plans Ring Facial Recognition-Based ‘Watch List’, Report

Security

Threatpost
30.11.19

International law enforcement operation shuts down Imminent Monitor RAT operations

Virus

Securityaffairs
30.11.19

Great Plains center hit by ransomware attack

Ransomware

Securityaffairs

29.11.19

Europol Shuts Down 'Imminent Monitor' RAT Operations With 13 ArrestsVirusThehackernews

29.11.19

Adobe Notifies Magento Marketplace Users of Security BreachIncindent

Bleepingcomputer

29.11.19

Advanced Hacking Groups Keep Showing Up, Old Ones EvolveHacking

Bleepingcomputer

29.11.19

Beware of Thanksgiving eCard Emails Distributing MalwareVirus

Bleepingcomputer

29.11.19

Dutch Govt Warns of 3 Ransomware Infecting 1,800 BusinessesRansomwareBleepingcomputer
29.11.19Group-IB presents its annual report on global threats to stability in cyberspaceCyberCrimeSecurityaffairs

29.11.19

IT threat evolution Q3 2019AnalysisSecurelist

29.11.19

IT threat evolution Q3 2019. StatisticsAnalysisSecurelist

29.11.19

Dutch National Cyber Security Centre warns ransomware infected thousands of businesses

BigBrothers

Securityaffairs

29.11.19

RevengeHotels campaign – crooks target the hospitality industry

Virus

Securityaffairs
29.11.19

Bytedance: The Chinese Company Behind Global TikTok Craze

BigBrothers

Securityweek

29.11.19

ISC Snapshot: Search with SauronEye

Security

SANS

29.11.19

Pain points for CTOs: A primer of the most stressful aspects of the job

Security

Net-security

28.11.19

Twitter Rolls Back Decision to Delete Inactive AccountsSocial

Bleepingcomputer

28.11.19

Ryuk Ransomware Forces Prosegur Security Firm to Shut Down NetworkRansomware

Bleepingcomputer

28.11.19

Microsoft Warns of Uncommon Windows 10 Thunderbolt IssueOS

Bleepingcomputer

28.11.19

A Ransomware infected the network of the cybersecurity firm ProsegurRansomwareSecurityaffairs

28.11.19

RevengeHotels: cybercrime targeting hotel front desks worldwideAPTSecurelist

28.11.19

Dexphot Malware Hijacked 80K+ Devices to Mine Cryptocurrency

Cryptocurrency  Hacking

Threatpost

28.11.19

IoT Smartwatch Exposes Kids’ Personal, GPS Data

IoT  Privacy

Threatpost

28.11.19

NSO Group President Defends Controversial Tactics

CyberCrime

Threatpost

28.11.19

SDKs Misused to Scrape Twitter, Facebook Account Info

Social  Virus

Threatpost

28.11.19

Adobe revealed that the Magento Marketplace was hackedHackingSecurityaffairs

28.11.19

Law enforcement agencies arrested 79 people involved in fraudulent online purchases of flight ticketsCyberCrimeSecurityaffairs

28.11.19

Dexphot Malware Uses Randomization, Encryption, and Polymorphism to Evade DetectionVirusSecurityweek

28.11.19

German Court Backs Murderer's 'Right to be Forgotten'CrimeSecurityweek

28.11.19

Magento Marketplace Suffers Data Breach Exposing Users' Account InfoIncindentThehackernews

28.11.19

Five cybersecurity certifications that provide value to employers

Cyber

Net-security

28.11.19

How can financial institutions prevent shopping season fraud?

Security

Net-security

28.11.19

There’s no way to fill the data skills gap, what now?

Security

Net-security

27.11.19

Ransomware Locks Medical Records at Great Plains HealthRansomware

Bleepingcomputer

27.11.19

Microsoft Adds Split Panes Feature to Windows Terminal v0.7OS

Bleepingcomputer

27.11.19

Windows 10 2004 is the Next Feature Update, Preps for TestsOS

Bleepingcomputer

27.11.19

Top 25 Most Dangerous Vulnerabilities Refreshed After 8 YearsVulnerebility

Bleepingcomputer

27.11.19

Windows 10 1909 KB4517245 Update Causes File Explorer IssuesOS

Bleepingcomputer

27.11.19

HP Warns That Some SSD Drives Will Fail at 32,768 Hours of UseSecurity

Bleepingcomputer

27.11.19

Almost 60% Of Malicious Ads Come from Three Ad ProvidersVirus

Bleepingcomputer

27.11.19

Dexphot Polymorphic Malware Shows Complexity of Everyday ThreatsVirus

Bleepingcomputer

27.11.19

New DeathRansom Ransomware Begins to Make a Name for ItselfRansomware

Bleepingcomputer

27.11.19Holiday Scam Season Is Here for All ShoppersSpam

Bleepingcomputer

27.11.19

Upbit cryptocurrency exchange hacked, crooks stole $48.5 million worth of ETHCryptocurrencySecurityaffairs

27.11.19

Meet Kilos, a New Search Engine for the Dark WebSecuritySecurityweek

27.11.19

Google Shares Data on State-Sponsored Hacking AttemptsHackingSecurityweek

27.11.19

Hackers Steal $49 Million in Ethereum From Cryptocurrency Exchange UpbitCryptocurrencySecurityweek

27.11.19

Malware Found on Payment System Used by On The Border RestaurantsVirusSecurityweek

27.11.19

Over 12,000 Google Users Hit by Government Hackers in 3rd Quarter of 2019BigBrothersThehackernews

27.11.19

Microsoft warns of Dexphot miner, an interesting polymorphic threatCryptocurrencySecurityaffairs

27.11.19

Full(z) House Magecart group mix phishing and MiTM in its attacksAttack  CyberCrime  PhishingSecurityaffairs

27.11.19

Twitter, Facebook User Data Improperly Accessed via Malicious SDKsSocial   VirusSecurityweek
27.11.19Latest Kali Linux OS Added Windows-Style Undercover Theme for HackersOSThehackernews

27.11.19

Magecart Group Switches Up Tactics with MiTM, Phishing

CyberCrime  Phishing

Threatpost

27.11.19

Black Friday Shoppers Targeted By Scams and Fake Domains

Spam

Threatpost

27.11.19

Austin Man Indicted for Stealing Unreleased Music from Artists

Virus

Threatpost

27.11.19

Managing the Human Security Factor in the Age of Ransomware

Ransomware

Threatpost

27.11.19

Kaspersky addressed multiple issues in online protection solutions

Vulnerebility

Securityaffairs

27.11.19

Finding an Agent Tesla malware sample

Virus

SANS

27.11.19

Most businesses have yet to allocate a CCPA compliance budget

Security

Net-security

27.11.19

Port cybersecurity: Safeguarding operations against cyber attacks

Cyber

Net-security

27.11.19

SoniTalk: A new method for near-field communication

Security

Net-security

27.11.19

As the online shopping season begins, consumers worry about cybercrime

CyberCrime

Net-security

26.11.19

Czech intelligence report warns of Russian and Chinese activity in the countryBigBrothersSecurityaffairs

26.11.19

Experts discovered control systems for aircraft warning lights open onlineBigBrothersSecurityaffairs

26.11.19

Kaspersky Patches Several Vulnerabilities in Web Protection FeaturesVulnerebilitySecurityweek
26.11.19The Hidden Danger in Berners-Lee's Contract for the WebSecuritySecurityweek

26.11.19

Detectify Raises $23.7 Million in Series B Funding RoundITSecurityweek

26.11.19

Attack Simulation Firm Cymulate Raises $15 MillionITSecurityweek

26.11.19

Malicious Android SDKs Caught Accessing Facebook and Twitter Users DataAndroidThehackernews

26.11.19

RIPlace Evasion Technique PapersPapers

26.11.19

Phishers Create Fake Sites as Bait for Holiday Shopping DealsPhishing

Bleepingcomputer

26.11.19

Over 38 Million Healthcare Records Exposed in Breaches Over 2019Incindent

Bleepingcomputer

26.11.19Splunk Faces Y2K Bug-Like Problem Unless PatchedVulnerebility

Bleepingcomputer

26.11.19

Mozilla to Block Fingerprinters by Default in Firefox 72Safety

Bleepingcomputer

26.11.19

FortiGuard Used Hardcoded Key, XOR to Encrypt CommunicationsSafety

Bleepingcomputer

26.11.19

Scam Browser Notification Prompts Increased by 69% in 2019Spam

Bleepingcomputer

26.11.19

Ginp Android Banker Sets as Default SMS App, Steals All TextAndroid

Bleepingcomputer

26.11.19

Microsoft Fixes Windows 10 Qualcomm Wi-Fi Driver Update BlockOS

Bleepingcomputer

26.11.19

Livingston School District in New Jersey Hit With RansomwareRansomware

Bleepingcomputer

26.11.19Silly Phishing Spotlight: Login to Unblock Microsoft ExcelPhishing

Bleepingcomputer

26.11.19

Spam and phishing in Q3 2019Analysis  Spam  PhishingSecurelist

26.11.19

Facebook and Twitter warn of malicious SDK harvesting personal data from its accountsSocial  VirusSecurityaffairs
26.11.19Some Fortinet products used hardcoded keys and weak encryption for communicationsCryptoSecurityaffairs

26.11.19

Czech Intel Report Highlights Russian, Chinese SpyingBigBrothersSecurityweek

26.11.19

New 'Ginp' Android Trojan Targets Credentials, Payment Card DataVirusSecurityweek

26.11.19

Palo Alto Networks to Acquire Aporeto for $150 MillionITSecurityweek

26.11.19

Many Apps Impacted by GIF Processing Flaw Patched Recently in WhatsAppSocial  VulnerebilitySecurityweek

26.11.19

NYPD Fingerprint Database Taken Offline to Thwart RansomwareRansomware

Threatpost

26.11.19

PoS Malware Exposes Customer Data of Catch RestaurantsVirus

Threatpost

26.11.19TrickBot Evolves to Go After SSH KeysVirus

Threatpost

26.11.19

Lessons learned from playing a willing phish

Phishing

SANS

26.11.19

PoC exploit code for Apache Solr RCE flaw is available onlineExploit  VulnerebilitySecurityaffairs
26.11.19Chinese Woman Sentenced to 8 Months for Trespass at Trump Resort: ReportCrimeSecurityweek

26.11.19

New Technique Allows Ransomware to Operate UndetectedRansomwareSecurityweek
26.11.19Catch Restaurants Hit by Point-of-Sale MalwareVirusSecurityweek

26.11.19

The overlooked part of an infosec strategy: Cyber insurance underwriting

Cyber

Net-security

26.11.19

CVE gap widens: 16,738 vulnerabilities disclosed during the first nine months of 2019

Vulnerebility

Net-security

26.11.19

Free download: Botnet and IoT Security Guide 2020

Safety

Net-security

26.11.19

Merchants must find ways to balance security with a seamless customer experience

Security

Net-security

26.11.19

Smart car security: Good practices to improve car safety

Safety

Net-security

25.11.19

Hitbsecconf2019 Abu DhabiConference PressConference Press

25.11.19

Hitbsecconf2018DXBConference PressConference Press

25.11.19

Hitbsecconf2018sgConference PressConference Press

25.11.19

Federal Cyber Experts Christen Satellite Office in GeorgiaBigBrothersSecurityweek

25.11.19

Church's Chicken Restaurants Hit by Payment Card BreachIncindentSecurityweek

25.11.19

Data on 1.2 Billion Users Found in Exposed Elasticsearch ServerIncindentSecurityweek

25.11.19

Unwanted notifications in browserCyberCrimeSecurelist

25.11.19

After 1 Million of malware samples analyzedVirusSecurityaffairs

25.11.19

Federal Communications Commission has cut off government funding for equipment from Chinese firmsBigBrothers

Securityaffairs

25.11.19

Cyberattack Hit 10% of Louisiana's State Government ServersBigBrothersSecurityweek

25.11.19

Order Information of OnePlus Customers Exposed in Data BreachIncindentSecurityweek

25.11.19

Apache Solr RCEs with public PoCs could soon be exploited

Exploit

Net-security

25.11.19

My Little DoH Setup

Security

SANS

25.11.19

Raccoon Stealer campaign circumvents Microsoft and Symantec anti-spam messaging gatewaysCyberCrime

Securityaffairs

25.11.19Twitter allows users to use 2FA without a phone numberSocial

Securityaffairs

25.11.19Iran – Government blocks Internet access in response to the protestsBigBrothers

Securityaffairs

25.11.19US Regulators Bar Govt Telecom Funds for Huawei, ZTEBigBrothers  MobilSecurityweek

25.11.19

Preventing insider threats, data loss and damage through zero trust

Security

Net-security

25.11.19

Growing complexity is driving operational changes to privacy programs

Privacy

Net-security

25.11.19

Developers worry about security, still half of teams lack an expert

Security

Net-security

25.11.19

Cybercriminals targeting e-commerce website vulnerabilities this holiday season

Cyber

Net-security

25.11.19

Data security and automation top IT projects for 2020, AI not a priority

Security

Net-security

24.11.19

SONICWALL LEADS SERIES A ROUND FUNDING IN ZERO TRUST SECURITY PROVIDER PERIMETER 81

Security blog

Sonicwall

24.11.19

Protect your webcam from hackers with these 5 tips

Safety blog

Avast blog

24.11.19

Amazon tells senator there are few restrictions on how police may use Ring doorbell footage

BigBrother blog

Avast blog

24.11.19

Trickbot Updates Password Grabber Module

Malware blog

Palo Alto Unity42

24.11.19

Docker Patched the Most Severe Copy Vulnerability to Date With CVE-2019-14271

Vulnerebility blog

Palo Alto Unity42

24.11.19

Better Together: Security + SD-WAN by Palo Alto Networks

Cyber blog

Palo Alto

24.11.19

3 Tips for Women Aspiring to Succeed in Technology

Cyber blog

Palo Alto

24.11.19

Securing Google Cloud Run with Prisma Cloud

Cyber blog

Palo Alto

24.11.19

Elasticity of Scale: Can Your Cloud Security Keep Up?

Cyber blog

Palo Alto

24.11.19

Cybersecurity Canon Candidate Book Review: Blackout: Tomorrow Will Be Too L...

Cyber blog

Palo Alto

24.11.19

Ransom News

Ransom

Ransom

24.11.19

GalactiCrypter  Decryptor

Anti-ransom Tool

Anti-ransom Tool

24.11.19

Hakbit  Decryptor

Anti-ransom Tool

Anti-ransom Tool

24.11.19

TurkStatik Decryptor

Anti-ransom Tool

Anti-ransom Tool

24.11.19

Windows 10 Upgrades Blocked if Using Old Versions of AVG, Avast

Safety

Bleepingcomputer

24.11.19

Catch Restaurants Disclose Credit Card Stealing Malware Incident

Virus

Bleepingcomputer

24.11.19

TrickBot Trojan Getting Ready to Steal OpenSSH and OpenVPN Keys

Virus

Bleepingcomputer

24.11.19

OnePlus Exposed Customer Order Information in Data Breach

Incindent

Bleepingcomputer

24.11.19

Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions

Vulnerebility

Bleepingcomputer

24.11.19

Clop Ransomware Tries to Disable Windows Defender, Malwarebytes

Ransomware

Bleepingcomputer

24.11.19

FBI Warns of Cyber Attacks Targeting US Automotive Industry

BigBrothers

Bleepingcomputer

24.11.19

Allied Universal Breached by Maze Ransomware, Stolen Data Leaked

Ransomware

Bleepingcomputer

24.11.19

Edenred Payment Solutions Giant Announces Malware Incident

Incindent

Bleepingcomputer

24.11.19

T-Mobile Discloses Data Breach Impacting Prepaid Customers

Incindent

Bleepingcomputer

24.11.19

Local Malware Analysis with Malice

Virus

SANS

24.11.19

Catch Hospitality Group discloses PoS malware infection at its restaurants

Virus

Securityaffairs

23.11.19

Kaspersky found dozens of flaws in 4 open-source VNC software

Vulnerebility

Securityaffairs

23.11.19

Chinese smartphone vendor OnePlus discloses a new data breach

BigBrothers

Securityaffairs

23.11.19

Dozens of Severe Flaws Found in 4 Popular Open Source VNC Software

Vulnerebility

Thehackernews

23.11.19

Windows 10 1909 Drops Exploit Protection From Security BaselineOS

Bleepingcomputer

23.11.19

Microsoft 365 Experiencing OneDrive and SharePoint OutagesSecurity

Bleepingcomputer

23.11.19

Card Skimmer Group Replaces Checkout Page to Steal Payment InfoCyberCrime

Bleepingcomputer

23.11.19

Microsoft Outlook for Android Gets Spoofing Vulnerability FixAndroid

Bleepingcomputer

23.11.19

Google Adds $1.5 Million Top Reward to Android Bug Bounty ProgramAndroid

Bleepingcomputer

23.11.19

DePriMon Malware Registers Itself as a Windows Print MonitorVirus

Bleepingcomputer

23.11.19

New RIPlace Bypass Evades Windows 10, AV Ransomware ProtectionRansomware

Bleepingcomputer

23.11.19

Microsoft Warns Customers of DoppelPaymer Ransomware ThreatRansomware

Bleepingcomputer

23.11.19

Linux Webmin Servers Being Attacked by New P2P Roboto BotnetBotNet

Bleepingcomputer

23.11.19

Intel Posts Letter Apologizing for Continued CPU ShortagesSecurity

Bleepingcomputer

23.11.19

THE HIGHER-ED SECURITY CHALLENGE: HOW TO KEEP AN OPEN NETWORK AND REMAIN FULLY PROTECTED

Hacking blog

Cybereason

23.11.19

PHOENIX: THE TALE OF THE RESURRECTED KEYLOGGER

Malware blog

Cybereason

23.11.19

Regional Threat Perspectives, Fall 2019: Middle East

Cyber blog

F5 Labs

23.11.19

Long-known Vulnerabilities in High-Profile Android Applications

OS Blog

Checkpoint

23.11.19

Phorpiex Breakdown

Spam blog

Checkpoint

23.11.19

Bad Binder: Android In-The-Wild Exploit

OS Blog  Exploit blog

Project Zero

23.11.19

Vulnerability Spotlight: Tenda AC9 /goform/WanParameterSetting command injection vulnerability

Vulnerebility blog

Cisco Talos

23.11.19

Vulnerability Spotlight: Two remote code execution vulnerabilities in Xcftools

Vulnerebility blog

Cisco Talos

23.11.19

Cryptominers, ransomware among top malware in IR engagements in Q4

Security blog

Cisco Talos

23.11.19

How the new Talos IR Cyber Range can prepare your employees for a cyber attack

Cyber blog

Cisco Talos

23.11.19

Should cybersecurity be taught in schools?

Cyber blog

Eset

23.11.19

Registers as “Default Print Monitor”, but is a malicious downloader. Meet DePriMon

Malware blog

Eset

23.11.19

What does it take to attract top cybersecurity talent?

Cyber blog

Eset

23.11.19

Mispadu: Advertisement for a discounted Unhappy Meal

Malware blog

Eset

23.11.19

Disney+ accounts hacked – How to protect yourself

Hacking blog

Eset

23.11.19

Raccoon Stealer Malware Scurries Past Microsoft Messaging Gateways

Virus

Threatpost

23.11.19

Data-Enriched Profiles on 1.2B People Exposed in Gigantic Leak

Incindent

Threatpost

23.11.19

Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip

Security

Threatpost

23.11.19

News Wrap: Amazon Ring Risks, Stalkerware, and D-Link Router Flaws

Security

Threatpost

23.11.19

ID Thieves Turn to Snail Mail as Juicy Target for Financial Crimes

CyberCrime

Threatpost

23.11.19

Three Areas to Consider, to Focus Your Cyber-Plan

Cyber

Threatpost

23.11.19

Critical Flaws in VNC Threaten Industrial Environments

Vulnerebility

Threatpost

23.11.19

Personal and social information of 1.2B people exposed on an open Elasticsearch install

Incindent

Securityaffairs

23.11.19

Twitter Users Can Now Use 2FA Without a Phone Number

Social

Securityweek

23.11.19

OnePlus Suffers New Data Breach Impacting Its Online Store Customers

Incindent

Thehackernews

22.11.19

French Rouen hospital hit by a ransomware attackRansomwareSecurityaffairs

22.11.19

Dozens of Vulnerabilities Found in Open Source VNC SystemsVulnerebilitySecurityweek

22.11.19

Cloudflare Open-Sources Network Vulnerability ScannerSafetySecurityweek

22.11.19

Geopolitical Tensions Fuel Worsening Cyberattack ScenarioCyberSecurityweek

22.11.19

Lithuanian Extradited to U.S. Over Hacking, Fraud ChargesCrimeSecurityweek

22.11.19

Payment solutions giant Edenred announces malware infection

Virus

Securityaffairs

22.11.19

CISA Announces Open Source Post-Election Auditing Tool

Safety

Securityweek

22.11.19

Russian Man Sentenced to Prison for Using Neverquest Trojan to Steal Money

Crime

Securityweek

22.11.19

Google offers up to $1.5 million bounty for remotely hacking Titan M chip

Security

Thehackernews

22.11.19

Arlo: An open source post-election auditing tool

Security

Net-security

22.11.19

Google ups bug bounties for Android flaws, exploits

Android

Net-security

22.11.19

Twitter finally allows users to delete their phone number without disabling 2FA

Social

Net-security

22.11.19

Cyber threats continue to evolve, but security teams remain confident

Cyber

Net-security

22.11.19

Black Friday Alert 2019: Net Shopping Bag of ThreatsSecuritySecurelist

22.11.19

5G security and privacy for smart citiesMobil  PrivacySecurelist

22.11.19

Russian author of NeverQuest banking malware gets 4 Years in U.S. PrisonCrimeSecurityaffairs

22.11.19

T-Mobile discloses data breach affecting prepaid wireless customersIncindentSecurityaffairs

22.11.19

AccorHotels subsidiary Gekko Group exposes hotels and travelers data in massive data leakIncindentSecurityaffairs

22.11.19

Hackers Accessed Information of T-Mobile Prepaid CustomersIncindentSecurityweek

22.11.19

Russian Hacker Behind NeverQuest Banking Malware Gets 4 Years in U.S. PrisonCrimeThehackernews

22.11.19

Linux Webmin Servers Under Attack by Roboto P2P BotnetBotNet

Threatpost

22.11.19

Popular Apps on Google Play Store Remain UnpatchedAndroid

Threatpost

22.11.19

Gnip Banking Trojan Shows Ongoing, Aggressive DevelopmentVirus

Threatpost

22.11.19

Senators Demand Amazon Disclose Ring Privacy PoliciesBigBrothers

Threatpost

22.11.19

Microsoft Outlook for Android Bug Opens Door to XSSAndroid

Threatpost

22.11.19

Download: 2019 Security Team Assessment TemplateSecurityThreatpost

22.11.19

ENISA publishes a Threat Landscape for 5G Networks

Mobil

Securityaffairs

22.11.19

Google will pay up to $1.5m for full chain RCE for Android on Titan M chips

Android

Securityaffairs

22.11.19

DePriMon downloader uses a never seen installation technique

Virus

Securityaffairs

22.11.19

Threat Intelligence Firm IntSights Raises $30 Million

IT

Securityweek

22.11.19

Google Offering Up to $1.5 Million for Pixel Titan M Exploits

IT

Securityweek

22.11.19

Critical Bug Patched in Popular Jetpack WordPress Plugin

Vulnerebility

Securityweek

22.11.19

'DePriMon' Malware First to Use Port Monitor for Persistence

Virus

Securityweek

22.11.19

Ongoing Research Project Examines Application of AI to Cybersecurity

Cyber

Securityweek

22.11.19

Long-Patched Vulnerabilities Still Present in Many Popular Android Apps

Android

Securityweek

22.11.19

T-Mobile Suffers Data Breach Affecting Prepaid Wireless Customers

Incindent

Thehackernews

22.11.19

Abusing Web Filters Misconfiguration for Reconnaissance

Safety

SANS

22.11.19

Risky behavior exposes consumers to seasonal security scares

Security

Net-security

22.11.19

Create secure IoT products: Enable security by design

IoT

Net-security

21.11.19

Millions of Sites Exposed by Flaw in Jetpack WordPress PluginVulnerebility

Bleepingcomputer

21.11.19

uBlock Origin Now Blocks Sneaky First-Party Trackers in FirefoxSecurity

Bleepingcomputer

21.11.19

New Banking Trojan Infects Victims via McDonald’s MalvertisingVirus

Bleepingcomputer

21.11.19

Ransomware Gangs Adopt APT Tactics in Targeted AttacksAPT  Ransomware

Bleepingcomputer

21.11.19

Thousands of Enterprises At Risk Due to Oracle EBS Critical FlawsVulnerebility

Bleepingcomputer

21.11.19

NSA Publishes Advisory Addressing Encrypted Traffic Inspection RisksBigBrothers

Bleepingcomputer

21.11.19

Microsoft Fixes Office 2016 Access Query Error, More Fixes ComingVulnerebility

Bleepingcomputer

21.11.19

Critical Windows Update Spam Fails at Delivering RansomwareRansomware

Bleepingcomputer

21.11.19

Coin Stealer Found in Monero Linux Binaries From Official SiteCryptocurrency

Bleepingcomputer

21.11.19

Android Camera App Bug Lets Apps Record Video Without PermissionAndroid

Bleepingcomputer

21.11.19

The cybercrime ecosystem: attacking blogsCyberCrimeSecurelist

21.11.19

A critical flaw in Jetpack exposes millions of WordPress sitesVulnerebilitySecurityaffairs

21.11.19

Microsoft warns of growing DoppelPaymer Ransomware threatRansomwareSecurityaffairs

21.11.19

Roboto, a new P2P botnet targets Linux Webmin serversBotNetSecurityaffairs

21.11.19

Clumio Completes $135 Million Series C Funding RoundITSecurityweek

21.11.19

DopplePaymer Ransomware Spreads via Compromised Credentials: MicrosoftRansomwareSecurityweek

21.11.19

New IBM Cloud Security Solution Combines Data From Existing ToolsSecuritySecurityweek

21.11.19

High-Severity Windows UAC Flaw Enables Privilege EscalationVulnerebility

Threatpost

21.11.19

Hackers Dump 2.2M Gaming, Cryptocurrency Passwords OnlineSecurity

Threatpost

21.11.19

ThreatList: Admin Rights for Third Parties is the NormSecurity

Threatpost

21.11.19

Security Firms, Nonprofits Team to Fight StalkerwareSecurity

Threatpost

21.11.19

Mozilla Bug Bounty Program Doubles Payouts, Adds Firefox MonitorVulnerebility

Threatpost

21.11.19

Apache Solr Bug Gets Bumped Up to High SeverityVulnerebilityThreatpost

21.11.19

Chicago student charged with writing code to spread ISIS propaganda

Cyber

Securityaffairs

21.11.19

Amnesty International Calls Facebook, Google Rights Abusers

BigBrothers

Securityweek

21.11.19

Senators Press Amazon Over Doorbell Camera Security Concerns

BigBrothers

Securityweek

21.11.19

Security Automation Firm ZecOps Raises $10 Million in Seed Funding

IT

Securityweek

21.11.19

New Legislation Would Block US Firms From Storing Personal Data in China, Russia

BigBrothers

Securityweek

21.11.19

Do third-party users follow security best practices and policies?

Security

Net-security

21.11.19

Driving collaboration between security and IT ops teams is a major challenge

Security

Net-security

21.11.19

Inadequate data sanitization puts enterprises at risk of breaches and compliance failures

Incindent

Net-security

21.11.19

Cyber risk increases at all layers of the corporate network

Security

Net-security

21.11.19

Podcast – Malcolm, a new tool for network visibility

Security

Net-security

21.11.19

Google introduces new G Suite security options

Security

Net-security

20.11.19

U.S. Senators Seek Answers on Facebook’s Handling of User InformationBigBrothers

Securityweek

20.11.19

Disney Plus Blames Past Hacks for User Accounts Sold OnlineHacking

Securityweek

20.11.19

Meet Phoenix Keylogger, a New Malware-as-a-Service Product Gaining TractionVirus

Securityweek

20.11.19

Email Security Firm Abnormal Security Exits Stealth Mode With $24M in FundingIT

Securityweek

20.11.19

NSA Issues Advisory on Mitigation of Risks Associated With TLSIBigBrothers

Securityweek

20.11.19

Army's Use of TikTok App Raises Concerns on Capitol HillBigBrothers

Securityweek

20.11.19

XSS Flaw in Gmail's Dynamic Email Feature Earns Researcher $5,000VulnerebilitySecurityweek

20.11.19

Shade Ransomware Is the Most Actively Distributed Malware via EmailRansomware

Bleepingcomputer

20.11.19

Louisiana Government Suffers Outage Due to Ransomware AttackRansomware

Bleepingcomputer

20.11.19

Macy's Customer Payment Info Stolen in Magecart Data BreachIncindent

Bleepingcomputer

20.11.19

Microsoft Is Adding DNS-Over-HTTPS (DoH) to Windows 10OS

Bleepingcomputer

20.11.19

Google Chrome's 'Close Other Tabs' Option Is Back!Security

Bleepingcomputer

20.11.19

IRS Publishes Guidance to Help Taxpayers Fight Identity TheftCyber

Bleepingcomputer

20.11.19

Buran Ransomware Infects PCs via Microsoft Excel Web QueriesRansomware

Bleepingcomputer

20.11.19

Linux, Windows Users Targeted With New ACBackdoor MalwareVirus

Bleepingcomputer

20.11.19

Intel is Removing End of Life Drivers and BIOS DownloadsSecurity

Bleepingcomputer

20.11.19

Microsoft to Stop Supporting Cortana on Android and iOSAndroid

Bleepingcomputer

20.11.19

Monero Project site compromised, served malware-infected binaries

Cryptocurrency

Net-security

20.11.19

The cake is a lie! Uncovering the secret world of malware-like cheats in video gamesVirusSecurelist

20.11.19

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020SecuritySecurelist

20.11.19

Monero Project website has been compromised to deliver a coin stealerCryptocurrencySecurityaffairs

20.11.19

Hackers leak 2TB of Data From Cayman National Bank stolen by Phineas FisherIncindentSecurityaffairs

20.11.19

Cryptocurrency Stealer Delivered From Official Monero WebsiteCryptocurrencySecurityweek

20.11.19

Official Monero Site Hacked to Distribute Cryptocurrency Stealing MalwareCryptocurrencyThehackernews

20.11.19

McDonalds-Themed Facebook Ads Serve Up Banking TrojansVirus

Threatpost

20.11.19

Google Discloses Android Camera Hijack HackAndroid

Threatpost

20.11.19

Macy’s Suffers Data Breach by Magecart CybercriminalsCyberCrime

Threatpost

20.11.19

‘Windows Update’ Installs Cyborg RansomwareRansomware

Threatpost

20.11.19

400 Vet Locations Nipped by Ryuk RansomwareRansomware

Threatpost

20.11.19

D-Link Adds More Buggy Router Models to ‘Won’t Fix’ ListVulnerebilityThreatpost

20.11.19

Ransomware Revival: Troldesh becomes a leader by the number of attacksRansomwareSecurityaffairs

20.11.19

CTHoW v2.0 – Cyber Threat Hunting on Windows

Cyber

Securityaffairs

20.11.19

CVE-2019-2234 flaws in Android Camera Apps exposed millions of users surveillance

Vulnerebility

Securityaffairs

20.11.19

Bigger Rewards, New Targets Announced for Mozilla Bug Bounty Program

Security

Securityweek

20.11.19

Trend Micro Unveils New Cloud Security Platform

Safety

Securityweek

20.11.19

New Flaw Lets Rogue Android Apps Access Camera Without Permission

Android

Thehackernews

20.11.19

Hancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike

Virus

SANS

20.11.19

Women in cybersecurity can benefit from taking inventory of their personal apps

Cyber

Net-security

20.11.19

California IoT security law: What it means and why it matters

IoT

Net-security

20.11.19

1.19 billion confidential medical images available on the internet

Incindent

Net-security

20.11.19

Only 11% of organizations can detect intruders in under one minute

Security

Net-security

20.11.19

Attackers increasingly embrace small-scale DDoS attacks to evade detection

Attack

Net-security

20.11.19

Template: Assess the performance of your security team

Security

Net-security

19.11.19

Alleged Magecart hackers planted a software skimmer into Macy’s WebsiteCyberCrimeSecurityaffairs

19.11.19

Adobe announces end of support for Acrobat 2015 and Adobe Reader 2015SecuritySecurityaffairs

19.11.19

Ransomware infected systems at state government of LouisianaRansomwareSecurityaffairs

19.11.19

Belorussian authorities blocked ProtonMail following a wave of bomb threatsBigBrothersSecurityaffairs

19.11.19

Fake Windows Update Delivers Cyborg RansomwareRansomware

Securityweek

19.11.19

Cyber Risk Analytics Firm CyberCube Raises $35 MillionIT

Securityweek

19.11.19

US, Montenegro Plot Cyber Warfare Ahead of 2020 ElectionsBigBrothers

Securityweek

19.11.19

Microsoft Will Bring DNS Over HTTPS (DoH) to WindowsSafety

Securityweek

19.11.19

Technology Firms and Victim Advocacy Groups Launch Coalition Against StalkerwareSecurity

Securityweek

19.11.19

Vulnerabilities in Android Camera Apps Exposed Millions of Users to SpyingAndroid

Securityweek

19.11.19

Support for Adobe Acrobat, Reader 2015 Will End on April 7, 2020Security

Securityweek

19.11.19

Ransomware Attack Hits Louisiana State ServersRansomware

Securityweek

19.11.19

Payment Card Skimmer Found on Macy's WebsiteCyberCrimeSecurityweek

19.11.19

Louisiana State Government Hit by Ransomware Attack Forcing Server ShutdownsRansomwareThehackernews

19.11.19

Cheap Chinese JAWS of DVR Exploitability on Port 60001

Exploit

SANS

19.11.19

Android camera apps could be hijacked to spy on users

Android

Net-security

19.11.19

Macy’s online store compromised in Magecart-style attack

CyberCrime

Net-security

19.11.19

WhatsApp Remote Code Execution Triggered by Videos

Social

Threatpost

19.11.19

The Unhappiest Subscribers on Earth? Disney+ Accounts Hacked & Hijacked

Hacking

Threatpost

19.11.19

‘Wildly Different’ Privacy Regulations Causing Compliancy Chaos

Privacy

Threatpost

19.11.19

Office 365 Admins Targeted in Ongoing Phishing Scam

Phishing

Threatpost

19.11.19

Americans Concerned, Confused Over Privacy, Survey Reveals

Privacy

Threatpost

19.11.19

Pipka Card Skimmer Removes Itself After Infecting eCommerce Sites

CyberCrime

Threatpost

19.11.19

Tianfu Cup Round-Up: Safari, Chrome, D-Link Routers and Office 365 Successfully Hacked

Congress

Threatpost

19.11.19

Tianfu Cup 2019 – 11 teams earned a total of 545,000 for their Zero-Day ExploitsCongressSecurityaffairs

19.11.19

Google addressed an XSS flaw in GmailVulnerebilitySecurityaffairs

19.11.19

Google Healthcare Project Targeted by Congress CommitteeBigBrothers

Securityweek

19.11.19

Vulnerability in ABB Plant Historian Disclosed 5 Years After DiscoveryVulnerebility

Securityweek

19.11.19

1Password Raises $200 Million in Series A FundingIT

Securityweek

19.11.19

First Cypriot to Be Extradited to US, on Hacking ChargesBigBrothers

Securityweek

19.11.19

DDoS-for-Hire Service Admin Gets 13 Months in PrisonCrime

Securityweek

19.11.19

Security of North American Energy Grid Tested in GridEx ExerciseSecurity

Securityweek

19.11.19

Want to build a successful SOC? Here’s what you need to know

Security

Net-security

19.11.19

Redefining security KPIs for 5G service providers

Mobil

Net-security

19.11.19

Review: Foundations of Information Security

Security

Net-security

19.11.19

The way Bluetooth devices ‘talk’ to apps leaves them vulnerable

Mobil  Vulnerebility

Net-security

19.11.19

Managed detection and response: Separating the players from the pretenders

Security

Net-security

19.11.19

WhatsApp RCE flaw can be exploited by sending malicious MP4 files

Social

Net-security

18.11.19

Experts report a rampant growth in the number of malicious, lookalike domains

Virus

Securityaffairs
18.11.19

WhatsApp Vulnerability Allows Code Execution Via Malicious MP4 File

Social   Virus

Securityweek

18.11.19

Zero-Day Exploits Earn Hackers Over $500K at Chinese Competition

Congress

Securityweek

18.11.19

Most Americans feel powerless to prevent data collection, online tracking

Cyber

Net-security

18.11.19

New NextCry Ransomware targets Nextcloud instances on Linux serversRansomwareSecurityaffairs
18.11.19Crooks use carding bots to check stolen card data ahead of the holiday seasonIncindentSecurityaffairs

18.11.19

SMS and 2FA: Another Reason to Move away from It.

Spam

SANS

18.11.19

Hackers helping communities: Leveraging OSINT to find missing persons

Security

Net-security

18.11.19

Study on public cloud performance: AWS, GCP, Azure, Alibaba and IBM Cloud

Security

Net-security

18.11.19

Trusted certificates make phishing websites appear valid

Phishing

Net-security

18.11.19

Healthcare spikes data breach fever, endpoint threat detections grow 60%

Incindent

Net-security

18.11.19

Do your infosec habits make you vulnerable to fraud?

Vulnerebility

Net-security

17.11.19

How to Download the Windows 10 1909 ISO From Microsoft

OS

Bleepingcomputer

17.11.19

Microsoft Removes Windows 10 1909 Realtek Driver Update Block

OS

Bleepingcomputer

17.11.19

Microsoft Office 365 Admins Targeted by Ongoing Phishing Campaign

Phishing

Bleepingcomputer

17.11.19

Windows 10 Build 19025 With Throttled Search Indexer Out for Insiders

OS

Bleepingcomputer

17.11.19

US Govt Recommends Vendor System Configs To Block Malware Attacks

BigBrothers  Virus

Bleepingcomputer

17.11.19

New NextCry Ransomware Encrypts Data on NextCloud Linux Servers

Ransomware

Bleepingcomputer

17.11.19

Tianfu Cup 2019 Day 1 – Chinese experts hacked Chrome, Edge, Safari, Office365

Congress

Securityaffairs

17.11.19

Experts found undocumented access feature in Siemens SIMATIC PLCs

ICS

Securityaffairs

17.11.19

Ransom NewsRansomRansom

17.11.19

Meeting a Russian Ransomware CellRansomware blogSonicwall

17.11.19

DDoS attack targets UK Labour Party websiteAttack blogAvast blog

17.11.19

Palo Alto Networks Delivers the Industry’s Most Comprehensive Secure Access Service EdgeSecurity blog

Palo Alto

17.11.19

Cyber Canon Candidate Book Review: The Internet of Risky Things: Trusting t...Security blog

Palo Alto

17.11.19

When Will Threat Intelligence Deliver on Its Promise?Security blog

Palo Alto

17.11.19

Introducing Cortex XDR 2.0Security blog

Palo Alto

17.11.19

Google Cloud at Ignite Europe ‘19Security blog

Palo Alto

17.11.19

New and Enhanced Palo Alto Networks Support Offerings Elevate the Customer ...Security blog

Palo Alto

17.11.19

Container Security: Vulnerability Management from Build to RunVulnerebility blog

Palo Alto

17.11.19

Is CASB Alone Enough? Long Live SASESecurity blog

Palo Alto

17.11.19

Second Watch: An Initiative to Help Veterans Find a New Mission in Cybersec...Security blog

Palo Alto

17.11.19

Cyber Canon Candidate Book Review: A Sustainable Digital Economy: Not Fear,...Security blog

Palo Alto

17.11.19

Protecting Data Center Interconnect LinksSecurity blog

Palo Alto

17.11.19

DDoS-for-Hire Services Owner Sentenced to 13 Months in PrisonCrime

Bleepingcomputer

17.11.19

Google Fixes White Screen Problem in Chrome, Admins FuriousVulnerebility

Bleepingcomputer

17.11.19

Silly Phishing Scam Warns That Your Password Will be ChangedPhishing

Bleepingcomputer

17.11.19

Two Charged Over Crypto Theft via SIM Swapping, Death ThreatsCryptocurrency  Mobil

Bleepingcomputer

17.11.19

Intel Patched 77 Vulnerabilities in November 2019 Platform UpdateVulnerebility

Bleepingcomputer

17.11.19

ProtonMail Thanks Paid Accounts by Giving 5GB Extra StorageIT

Bleepingcomputer

17.11.19

US Health Network, Supplier Expose PII, PHI Data in BreachesBigBrothers

Bleepingcomputer

17.11.19

Brave Urges Congress to Require Ad Blocking Browsers for Govt EmployeesSecurity

Bleepingcomputer

17.11.19

Qualcomm Bug Exposes Critical Data on Samsung, LG PhonesVulnerebility

Bleepingcomputer

17.11.19

Symantec Fixes Privilege Escalation Flaw in Endpoint ProtectionVulnerebility

Bleepingcomputer

17.11.19

WhatsApp flaw CVE-2019-11931 could be exploited to install spywareVulnerebilitySecurityaffairs

16.11.19

New Threat Actor Impersonates Govt Agencies to Deliver MalwareVirus

Bleepingcomputer

16.11.19

Carding Bots Testing Payment Info Ahead of Big Shopping EventsBotNet

Bleepingcomputer

16.11.19

Microsoft Issues Guidance for Intel CPU Driver Security FlawsVulnerebility

Bleepingcomputer

16.11.19

Strange AnteFrigus Ransomware Only Targets Specific DrivesRansomware

Bleepingcomputer

16.11.19

Microsoft Auto-Updating Windows 10 1803 Devices to May 2019 UpdateOS

Bleepingcomputer

16.11.19

Microsoft Fixes Windows 10 1809 Issue That Broke Defender ATPOS

Bleepingcomputer

16.11.19

TPM-FAIL Security Flaws Impact Modern Devices With Intel CPUsVulnerebility

Bleepingcomputer

16.11.19

Microsoft Releases the November 2019 Security Updates for OfficeVulnerebility

Bleepingcomputer

16.11.19

PureLocker Ransomware Can Lock Files on Windows, Linux, and macOSRansomware

Bleepingcomputer

16.11.19

Latest Intel CPUs Affected by New TSX Speculative AttackAttack

Bleepingcomputer

16.11.19

Checkra1n, a working iPhone Jailbreak, was releasedAppleSecurityaffairs

16.11.19

New WhatsApp Bug Could Have Let Hackers Secretly Install Spyware On Your DevicesSocialThehackernews

16.11.19

Attention is All They Need: Combatting Social Media Information Operations With Neural Language Models

Social blog

FireEye

16.11.19

The One Thing You Can't Outsource: Risk

Security blog

F5 Labs

16.11.19

The Road to Qualcomm TrustZone Apps Fuzzing

Cyber blog

Checkpoint

16.11.19

Custom dropper hide and seek

Cyber blog

Cisco Talos

16.11.19

Hunting for LoLBins

Security blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Command injection bug in Exhibitor UI

Vulnerebility blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Denial-of-service vulnerability in Intel IGC64 graphics driver

Vulnerebility blog

Cisco Talos

16.11.19

Microsoft Patch Tuesday — Nov. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Remote code execution vulnerability in Microsoft Media Foundation

Vulnerebility blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Remote code execution vulnerability in Microsoft Excel

Vulnerebility blog

Cisco Talos

16.11.19

New partnership brings together Talos’ visibility with IR’s unmatched response capabilities

Security blog

Cisco Talos

16.11.19

Microsoft issues patch for Internet Explorer zero‑day

Vulnerebility blog

Eset

16.11.19

Getting into cybersecurity: Self‑taught vs. university‑educated?

Cyber blog

Eset

16.11.19

Facebook bug turns on iPhone camera in the background

Social blog

Eset

16.11.19

Can regulations improve cybersecurity? In APAC, opinions vary

Cyber blog

Eset

16.11.19

First BlueKeep attacks prompt fresh warnings

Attack blog

Eset

16.11.19

Stealthy Malware Flies Under AV Radar with Advanced Obfuscation

Virus

Threatpost

16.11.19

Lizard Squad Threatens UK’s Labour Leader with Cyberattacks Against His Family

BigBrothers  CyberCrime

Threatpost

16.11.19

Holiday Shoppers Beware: 100K Malicious Sites Found Posing as Well-Known Retailers

Virus

Threatpost

16.11.19

James Clapper: Lessons Learned in a Post-Snowden World

Security

Threatpost

16.11.19

Podcast: Managing an Out-Of-Control Security Tech Stack

Security

Threatpost

16.11.19

DDoS-for-Hire Services operator sentenced to 13 months in prisonAttack  CrimeSecurityaffairs
16.11.19Two men arrested for stealing $550,000 in cryptocurrency with Sim SwappingCryptocurrencySecurityaffairs
16.11.19Fears Grow on Digital Surveillance: US SurveyPrivacySecurityweek

16.11.19

New GitHub Security Lab Aims to Secure Open Source SoftwareSecuritySecurityweek
16.11.19Two Massachusetts Men Arrested and Charged in SIM Swapping SchemeMobilSecurityweek
16.11.19Undocumented Access Feature Exposes Siemens PLCs to AttacksICSSecurityweek

15.11.19

The Australian Parliament was hacked earlier this yearBigBrothersSecurityaffairs
15.11.19New TA2101 threat actor poses as government agencies to distribute malwareCyberCrime  VirusSecurityaffairs

15.11.19

A new sophisticated JavaScript Skimmer dubbed Pipka used in the wildCyberCrimeSecurityaffairs
15.11.19InfoTrax Settles With FTC Over Data BreachIncindentSecurityweek

15.11.19

Over 100,000 Fake Domains With Valid TLS Certificates Target Major RetailersCryptoSecurityweek
15.11.19Two Arrested for Stealing $550,000 in Cryptocurrency Using Sim SwappingCryptocurrencyThehackernews

15.11.19

GitHub Security Lab aims to make open source software more secure

Security

Net-security

15.11.19

Attack tools and techniques used by major ransomware families

Ransomware

Net-security

15.11.19

Threat Actor Impersonates USPS to Deliver Backdoor Malware

Virus

Threatpost

15.11.19

Just-Released Checkra1n iPhone Jailbreak Stirs Security Concerns

Apple

Threatpost

15.11.19

ENFUSE 2019: Security Regulations, Insider Threats, and IoT Privacy Risks

Congress

Threatpost

15.11.19

Innovative PureLocker Ransomware Emerges in Targeted Attacks

Ransomware

Threatpost

15.11.19

Double Vision: Stealthy Malware Dropper Delivers Dual RATs

Virus

Threatpost

15.11.19

California’s Domino Effect on U.S. Privacy Regulation

BigBrothers  Privacy

Threatpost

15.11.19

Website, Know Thyself: What Code Are You Serving?

Security

Threatpost

15.11.19

APT33 Mounts Focused, Highly Targeted Botnet Attacks Against U.S. Victims

APT

Threatpost

15.11.19

Download: The Comprehensive Compliance Guide

Security

Threatpost

15.11.19

Experts found privilege escalation issue in Symantec Endpoint ProtectionVulnerebilitySecurityaffairs
15.11.19Flaws in Qualcomm chips allows stealing private from devicesVulnerebilitySecurityaffairs

15.11.19

LINE Launches Public Bug Bounty Program on HackerOneSecuritySecurityweek
15.11.19Corellium: Apple Sued Us After Failed Acquisition AttemptAppleSecurityweek
15.11.19DLL Hijacking Flaw Impacts Symantec Endpoint ProtectionVulnerebilitySecurityweek

15.11.19

Online Retailers Ill-Prepared for Holiday SeasonSecuritySecurityweek
15.11.19Visa Warns of New JavaScript Skimmer 'Pipka'CyberCrimeSecurityweek

15.11.19

Iranian APT33 Hackers Use Special Botnets for High-Value Targets in U.S.APTSecurityweek
15.11.19New MITRE Foundation Aims to Boost Critical InfrastructureSafetySecurityweek
15.11.19New Group of Hackers Targeting Businesses with Financially Motivated Cyber AttacksCyberCrimeThehackernews

15.11.19

Some packet-fu with Zeek (previously known as bro)

Security

SANS

15.11.19

To improve incident response, you need to consider 3rd party solutions

Security

Net-security

15.11.19

IT professionals deem hybrid cloud as most secure

Security

Net-security

15.11.19

Evaluating cyber risk during the holiday season

Cyber

Net-security

15.11.19

Disruptive technology predictions: 2020 will see the creation of completely connected environments

Security

Net-security

14.11.19

Tracking Iran-linked APT33 group via its own VPN networksAPTSecurityaffairs

14.11.19

Canadian intelligence agencies CSE and CSIS are divided on Huawei 5G banBigBrothers  MobilSecurityaffairs

14.11.19

CVE-2019-3648 flaw in all McAfee AV allows DLL HijackingVulnerebilitySecurityaffairs

14.11.19

Australian Universities Adopt Foreign Interference GuidelinesBigBrothersSecurityweek

14.11.19

Qualcomm Chip Flaws Let Hackers Steal Private Data From Android DevicesAndroid  VulnerebilityThehackernews

14.11.19

Company Detected Years-Long Breach Only After Hacker Maxed Out Servers' StorageIncindentThehackernews

14.11.19

Google’s Plan to Crunch Health Data on Millions of Patients Draws Fire

Privacy

Threatpost

14.11.19

IoT Security Woes Plague Healthcare Industry

IoT

Threatpost

14.11.19

Federal Court: Suspicionless Search of Traveler Devices by Border Agents Is Unconstitutional

BigBrothers

Threatpost

14.11.19

Consumer Data Privacy Rights: Emerging Tech Blurs Lines

Privacy

Threatpost

14.11.19

A flaw in PMx Driver can give hackers full access to a device

Vulnerebility

Securityaffairs

14.11.19

Facebook Nixes Billions of Fake Accounts

Social

Securityweek

14.11.19

Vulnerability in McAfee Antivirus Products Allows DLL Hijacking

Vulnerebility

Securityweek

14.11.19

Automated Penetration Testing Startup Pcysys Raises $10 Million

IT

Securityweek

14.11.19

Canada Spy Agencies Split Over Proposed Huawei 5G Ban: Media

BigBrothers

Securityweek

14.11.19

Automated systems: Flag smarter, not everything

ICS

Net-security

14.11.19

5,183 breaches from the first nine months of 2019 exposed 7.9 billion records

Incindent

Net-security

14.11.19

Network complexity and lack of visibility contribute to misconfigurations and increased risk

Security

Net-security

14.11.19

Fraud rates increasing as criminals become more sophisticated

CyberCrime

Net-security

14.11.19

Should free internet access be considered as a human right?

Security

Net-security

14.11.19

Download: Internal compliance assessment templates

Security

Net-security

13.11.19

Windows 10 Insider Build 19023 Released With Optional Updates TestOS

Bleepingcomputer

13.11.19

Microsoft Fixes Windows 10 Update and Intel Driver Battery DrainOS

Bleepingcomputer

13.11.19

Windows 10 Cumulative Update KB4524570 & KB4523205 ReleasedOS

Bleepingcomputer

13.11.19

Microsoft's November 2019 Patch Tuesday Fixes IE Zero-day, 74 FlawsOS

Bleepingcomputer

13.11.19

Windows 10 November 2019 Update Is Now AvailableOS

Bleepingcomputer

13.11.19

Telegram MTProxy Servers Used to DDoS Iranian Cloud ProviderAttack  BigBrothers

Bleepingcomputer

13.11.19

Mexico's Pemex Oil Suffers Ransomware Attack, $4.9 Million DemandedRansomware

Bleepingcomputer

13.11.19

Adobe Patches Critical Remote Code Execution Bugs in IllustratorVulnerebility

Bleepingcomputer

13.11.19

McAfee Patches Privilege Escalation Flaw in Antivirus SoftwareVulnerebility

Bleepingcomputer

13.11.19

YouTube BitCoin Videos Pushing Predator Info-Stealing TrojanVirus

Bleepingcomputer

13.11.19

New TSX Speculative Attack allows stealing sensitive data from latest Intel CPUsAttack  VulnerebilitySecurityaffairs

13.11.19

Value and Limitations of Vendor Telemetry and Reported IncidentsIncindentSecurityweek

13.11.19

Intel Driver Vulnerability Can Give Attackers Deep Access to a DeviceVulnerebilitySecurityweek

13.11.19

Trend Micro Launches New ICS Security SolutionsICSSecurityweek

13.11.19

New ZombieLoad v2 Attack Affects Intel's Latest Cascade Lake CPUsAttack  VulnerebilityThehackernews

13.11.19

Microsoft to honor California’s digital privacy law all through the U.S.

BigBrothers  Privacy

Net-security

13.11.19

Intel releases updates to plug TPM-FAIL flaws, foil ZombieLoad v2 attacks

Vulnerebility

Net-security

13.11.19

Adobe patch Tuesday updates addressed critical flaws in Media Encoder and Illustrator productsVulnerebilitySecurityaffairs

13.11.19

'State of the Firewall' Report: Automation Key to Preventing Costly MisconfigurationsSecuritySecurityweek

13.11.19

SAP Updates Four Hot News Notes on November 2019 Patch DayVulnerebilitySecurityweek
13.11.19Newer Intel CPUs Vulnerable to Variant 2 of ZombieLoad AttackVulnerebilitySecurityweek

13.11.19

Russian man Aleksei Burkov extradited for running online criminal marketplaceCrimeSecurityaffairs

13.11.19

Microsoft Patch Tuesday updates fix CVE-2019-1429 flaw exploited in the wildVulnerebilitySecurityaffairs

13.11.19

Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of DevicesVulnerebilityThehackernews
13.11.19

Tuesday: Actively exploited IE zero-day fixed

Vulnerebility

Net-security

13.11.19

TPM—FailAttackAttack

13.11.19

TSX Speculative AttackAttackAttack
13.11.19MDS AttackAttackAttack

13.11.19

Adobe Patches Critical Bugs in Illustrator, Media EncoderVulnerebility

Threatpost

13.11.19

Microsoft Patches RCE Bug Actively Under AttackAttack  Vulnerebility

Threatpost

13.11.19Intel Warns of Critical Info-Disclosure Bug in Security EngineVulnerebility

Threatpost

13.11.19Magento Warns E-Commerce Sites to Upgrade ASAP to Prevent AttacksAttack

Threatpost

13.11.19Insider Threats, a Cybercriminal Favorite, Not Easy to MitigateSecurity

Threatpost

13.11.19Plugging the Data Leak in ManufacturingIncindent

Threatpost

13.11.19Microsoft to Apply California’s Privacy Law to All U.S. UsersPrivacy

Threatpost

13.11.19

Mexican state-owned oil company Pemex hit by ransomwareRansomwareSecurityaffairs

13.11.19

Google Healthcare Data Move Makes Some QueasyPrivacySecurityweek
13.11.19Russian Accused of $20M Credit Card Fraud Extradited to USCyberCrimeSecurityweek
13.11.19New PureLocker Ransomware Linked to MaaS Provider for Cobalt Gang, FIN6RansomwareSecurityweek
13.11.19Call for Papers: SecurityWeek's 2020 Singapore ICS Cyber Security ConferenceICSSecurityweek
13.11.19U.S. Customs Officers Need 'Reasonable Suspicion' for Searches: JudgeSecuritySecurityweek
13.11.19Microsoft Patches Another Internet Explorer Flaw Exploited in AttacksAttack  ExploitSecurityweek

13.11.19

Mexican Oil Company Pemex Hit by RansomwareRansomwareSecurityweek

13.11.19

An example of malspam pushing Lokibot malware, November 2019

BotNet  Virus

SANS

13.11.19

Lateral phishing makes for dangerous waters, here’s how you can avoid getting caught in the net

Phishing

Net-security

13.11.19

Product showcase: SpyCloud Active Directory Guardian

Safety

Net-security

13.11.19

Researchers discover massive increase in Emotet activity

Virus

Net-security

13.11.19

Enterprise cybersecurity in the Asia-Pacific region

Cyber

Net-security

13.11.19

The leading challenge facing cloud migration projects is security

Social

Net-security

12.11.19

Facebook is secretly using iPhone’s camera as users scroll their feed

Social

Securityaffairs
12.11.19PCI DSS Compliance Between Audits is Declining: VerizonSafetySecurityweek
12.11.19Magento Users Warned of Remote Code Execution VulnerabilityVulnerebilitySecurityweek

12.11.19

Is Facebook Secretly Accessing Your iPhone's Camera? Some Users ClaimedSocialThehackernews

12.11.19

TA505 Cybercrime targets system integrator companiesCyberCrimeSecurityaffairs
12.11.19Buran ransomware-as-a-service continues to improveRansomwareSecurityaffairs
12.11.19Adobe Patches Vulnerabilities in Design, Web ProductsVulnerebilitySecurityweek

12.11.19

OpenText to Acquire Data Protection Firm CarboniteSafetySecurityweek

12.11.19

Tech Support Scammers Exploiting Unpatched Firefox BugExploit  VulnerebilitySecurityweek
12.11.19Hosting Provider SmarterASP.NET Recovering From Ransomware AttackRansomwareSecurityweek

12.11.19

New Update Lets Windows Users Test Extended Security UpdatesOS

Bleepingcomputer

12.11.19Magento Urges Users to Apply Security Update for RCE BugVulnerebility

Bleepingcomputer

12.11.19No, YouTube Won't Cancel Accounts That Don't Generate RevenueIT

Bleepingcomputer

12.11.19

Free Cybersecurity Training Now Available for U.S. VeteransCyber

Bleepingcomputer

12.11.19

Microsoft Fixes Windows 10 Missing Deferred Update Settings BugOS

Bleepingcomputer

12.11.19TrickBot Malware Uses Fake Sexual Harassment Complaints as BaitVirus

Bleepingcomputer

12.11.19Windows 10 Bug Causes USB Drives to Show the Wrong IconOS

Bleepingcomputer

12.11.19

Sodinokibi Ransomware Targeting Asia via the RIG Exploit KitRansomware

Bleepingcomputer

12.11.19

checkra1n iOS Jailbreak Gets Public Beta Update With FixesApple

Bleepingcomputer

12.11.19Windows 10 Insider Program: What You Need to Get StartedOS

Bleepingcomputer

12.11.19

Ransomware Attack Downs Hosting Service SmarterASP.NETRansomware

Threatpost

12.11.19Encrypted Emails on macOS Found Stored in Unprotected WayApple

Threatpost

12.11.19DDoS Attacks Target Amazon, SoftLayer and Telecom InfrastructurAttack

Threatpost

12.11.19

ThreatList: Data Breaches Batter Stock Prices at Public Companies, For MonthsSecurity

Threatpost

12.11.19

Experts warn of spike in TCP DDoS reflection attacks targeting Amazon, SoftLayer and telco infrastructure

Attack

Securityaffairs
12.11.19

Bugcrowd paid over $500,000 in bug bounty rewards in one week

Security

Securityaffairs
12.11.19

ZoneAlarm forum site hack exposed data of thousands of users

Incindent

Securityaffairs

12.11.19

Data of ZoneAlarm Forum Users Leaked Following Breach

Incindent

Securityweek

12.11.19

Are We Going Back to TheMoon (and How is Liquor Involved)?

Vulnerebility

SANS

12.11.19

Your supplier’s BEC problem is your BEC problem

Spam

Net-security

12.11.19

The FBI multi-factor authentication notification that should have never been

BigBrothers

Net-security

12.11.19

The password reuse problem is a ticking time bomb

Crypto

Net-security

12.11.19

Top concerns for audit executives? Cyber risks and data governance

Cyber

Net-security

12.11.19

Enterprise expectations of managed service providers and public cloud providers are shifting

Security

Net-security

12.11.19

Whitepaper: Cybersecurity is improving, but is it enough?

Security

Net-security

11.11.19

CERTrating a new Tool to evaluate CERT/CSIRT maturity levelSafetySecurityaffairs
11.11.19Hackers Receive $500,000 in One Week via BugcrowdSecuritySecurityweek

11.11.19

Zurich Announces New Cyber Insurance for Manufacturing IndustryICSSecurityweek
11.11.19Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to BlameIncindentThehackernews

11.11.19

Platinum Cyberspies Use Sophisticated Backdoor in AttacksAPTSecurityweek
11.11.19BlueKeep Attacks Crash Systems Due to Meltdown PatchVulnerebilitySecurityweek

11.11.19

DDoS attacks in Q3 2019AttackSecurelist
11.11.19Australian Govt agency ACSC warns of Emotet and BlueKeep attacksBigBrothersSecurityaffairs

11.11.19

Apple Mail stores parts of encrypted emails in plaintext DBApple

Securityaffairs

11.11.19Major ASP.NET hosting provider SmarterASP hit by ransomware attackRansomware

Securityaffairs

11.11.19Twitter Spy Case Highlights Risks for Big Tech PlatformsSocialSecurityweek

11.11.19

Did the recent malicious BlueKeep campaign have any positive impact when it comes to patching?

Vulnerebility  Virus

SANS

11.11.19

When is the right time to red team?

Security

Net-security

11.11.19

Believe the hype, but control the threat: Reducing the risk of ransomware

Ransomware

Net-security

11.11.19

Speeding MTTR when a third-party cloud service is attacked

Attack

Net-security

11.11.19

PayPal becomes phisher’s favorite brand, Office 365 phishing techniques evolve

Phishing

Net-security

11.11.19

Attackers continue to leverage greater levels of social engineering and sophistication

Security

Net-security

11.11.19

Do you think you can recognize fake news on Facebook?

Social

Net-security

10.11.19

Malware Meets Politics With Trump and Clinton Themed InfectionsVirus

Bleepingcomputer

10.11.19

US Govt Asks Users to Be Wary of Holiday Scams and MalwareBigBrothers  Virus

Bleepingcomputer

10.11.19

QuikSilver and Billabong Affected by Ransomware AttackRansomware

Bleepingcomputer

10.11.19

New Stealthy Backdoor Used by Platinum APT in Recent AttacksAPT

Bleepingcomputer

10.11.19

Clever WebEx Spam Use Cisco Redirect to Deliver RAT MalwareSpam  Virus

Bleepingcomputer

10.11.19

Bugcrowd Paid Over $500K in Bug Bounties in One WeekSecurity

Bleepingcomputer

10.11.19

Ransom NewsRansomRansom

10.11.19

Bad News: AI and 5G Are Expected to Worsen Cybersecurity RisksCyber

Securityaffairs

10.11.19

Boardriders and its subsidiarities QuikSilver and Billabong infected with ransomwareRansomware

Securityaffairs

10.11.19

Phishing scam issues fake court summons

Phishing blog

Avast blog

10.11.19

Facebook removes Russian propaganda networks

BigBrother blog  Social blog

Avast blog

10.11.19

A look inside the hack of a nuclear reactor’s computer network

BigBrother blog

Avast blog

10.11.19

Wireshark Tutorial: Examining Trickbot Infections

Malware blog

Palo Alto Unity42

10.11.19

Web-Based Threats: First Half 2019

Cyber blog

Palo Alto Unity42

10.11.19

Home & Small Office Wireless Routers Exploited to Attack Gaming Servers

Exploit blog

Palo Alto Unity42

10.11.19

The Next Generation of Network Security Is Cloud-Delivered

Safety blog

Palo Alto

10.11.19

New and Enhanced Palo Alto Networks Support Offerings Elevate the Customer ...

Safety blog

Palo Alto

10.11.19

Container Security: Vulnerability Management from Build to Run

Safety blog

Palo Alto

10.11.19

A Firewall Admin’s Introduction to Serverless Security

Safety blog

Palo Alto

10.11.19

Cyber Canon Candidate Book Review: A Sustainable Digital Economy: Not Fear,...

Safety blog

Palo Alto

10.11.19

Protecting Data Center Interconnect Links

Safety blog

Palo Alto

10.11.19

Palo Alto Networks Named a Leader in The Forrester ZTX Wave™

Safety blog

Palo Alto

10.11.19

Fake Netflix Update Request by Text

Mobil  Spam

SANS

10.11.19

The Platinum APT group adds the Titanium backdoor to its arsenal

APT

Securityaffairs

10.11.19

DHS CISA warns of Critical issues in Medtronic Medical equipment

BigBrothers

Securityaffairs

9.11.19

Spanish MSSP Targeted by BitPaymer Ransomware

Ransomware blog

Mcafee blog

9.11.19

Buran Ransomware; the Evolution of VegaLocker

Ransomware blog

Mcafee blog

9.11.19

Application Protection Research Series—Executive Summary

Security blog

F5 Labs

9.11.19

Make Sure You Keep an Eye on Your APIs

Security blog

F5 Labs

9.11.19

Adopt Insertion Point Security for a Microservices World

Security blog

F5 Labs

9.11.19

Xhelper: Persistent Android Dropper App Infects 45K Devices in Past 6 Months

OS Blog

Symantec

9.11.19

Nemty Ransomware Expands Its Reach, Also Delivered by Trik Botnet

Ransomware blog

Symantec

9.11.19

Vulnerability Spotlight: Code execution vulnerabilities in LEADTOOLS

Vulnerebility blog

Cisco Talos

9.11.19

Talos, Cisco Incident Response team up to offer more protection than ever

Safety blog

Cisco Talos

9.11.19

How adversaries use politics for compromise

BigBrother blog

Cisco Talos

9.11.19

C2 With It All: From Ransomware To Carding

Ransomware blog

Cisco Talos

9.11.19

The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to defend against encrypted DejaBlue

Vulnerebility blog

Cisco Talos

9.11.19

Vulnerability Spotlight: Two remote code execution vulnerabilities in Investintech Able2Extract

Vulnerebility blog

Cisco Talos

9.11.19

CISO Advisory: Security Architecture

Security blog

Cisco Talos

9.11.19

How much do data breaches affect stock prices?

Incident blog

Eset

9.11.19

Android keyboard app caught red‑handed trying to make sneaky purchases

OS Blog

Eset

9.11.19

Five ways to strengthen employee cybersecurity awareness

Cyber blog

Eset

9.11.19

Antimalware Day 2019: Building a culture of cybersecurity awareness

Malware blog

Eset

9.11.19

Microsoft Warns of More Harmful Windows BlueKeep Attacks, Patch NowOS  Vulnerebility

Bleepingcomputer

9.11.19

Australian Govt Warns of Active Emotet and BlueKeep ThreatsBigBrothers  Virus

Bleepingcomputer

9.11.19

QNAP Warns Users to Secure Devices Against QSnatch MalwareVirus

Bleepingcomputer

9.11.19

Microsoft to Remove Downloads Folder from Disk CleanupOS

Bleepingcomputer

9.11.19

Legitimate TDS Platform Abused to Push Malware via Exploit KitsExploit

Bleepingcomputer

9.11.19

Specially Crafted ZIP Files Used to Bypass Secure Email GatewaysVulnerebility

Bleepingcomputer

9.11.19

NVIDIA Fixes Security Flaws in GPU Driver, GeForce ExperienceVulnerebility

Bleepingcomputer

9.11.19

Google Allies With Security Companies to Boost Play Store SafetyAndroid

Bleepingcomputer

9.11.19

Facebook Discloses Privacy Breach Caused by Groups API BugSocial

Bleepingcomputer

9.11.19Subpoena Phishing Emails Serve Nasty Predator Thief InfectionPhishing

Bleepingcomputer

9.11.19

News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine FailsSecurity

Threatpost

9.11.19

Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten EveryoneIncindent

Threatpost

9.11.19

Pwn2Own Tokyo Roundup: Amazon Echo, Routers, Smart TVs Fall to HackersCongress

Threatpost

9.11.19

Amazon Fixes Ring Video Doorbell Flaw That Leaked Wi-Fi CredentialsVulnerebility

Threatpost

9.11.19

Platinum APT Shines Up New Titanium BackdoorAPT

Threatpost

9.11.19

Art Imitates Life: Lessons from the Final Season of Mr. RobotIT

Threatpost

9.11.19

Cisco Talos discovered multiple flaws in the LEADTOOLS toolkitsVulnerebilitySecurityaffairs

9.11.19

DHS Warns of Critical Flaws in Medtronic Medical DevicesBigBrothersSecurityweek

9.11.19

Cybersecurity Workforce Gap: 145% Growth Needed to Meet Global DemandCyberSecurityweek

8.11.19

Italian police shut down darkweb Berlusconi market and arrested adminsBigBrothersSecurityaffairs

8.11.19

Microsoft warns of more disruptive BlueKeep attacks and urges patch installationAttackSecurityaffairs
8.11.19Microsoft: BlueKeep Exploit Will Likely Deliver More Damaging PayloadsExploitSecurityweek

8.11.19

Hackers Can Target LEADTOOLS Users With Malicious Image FilesVirusSecurityweek
8.11.19Accenture Launches Cyber Ranges for Industrial CompaniesITSecurityweek
8.11.19Sepio Systems Raises $6.5 Million to Defend Against Rogue HardwareITSecurityweek

8.11.19

Tech Firms React to Netizens' Digital Privacy ConcernsPrivacySecurityweek

8.11.19

Cisco fixes small business routers, kills eavesdropping vulnerability in conferencing devices

Vulnerebility

Net-security

8.11.19

Titanium: the Platinum group strikes againAPTSecurelist
8.11.19Capesand is a new Exploit Kit that appeared in the threat landscapeExploitSecurityaffairs

8.11.19

Amazon Kindle, Embedded Devices Open to Code-Execution

Vulnerebility

Threatpost

8.11.19

Why Big Breach Fines Don’t Equal Fewer Breaches

Incindent

Threatpost

8.11.19

Gamers Hit with Nvidia GPU Driver, GeForce Flaws

Vulnerebility

Threatpost

8.11.19

Google Enlists Help to Fight Bad Android Apps

Android

Threatpost

8.11.19

Ex-Twitter Employees Spied on Saudi Dissidents: DoJ

Social

Threatpost

8.11.19

How to Secure Critical Infrastructure When Patching Isn’t Possible

Vulnerebility

Threatpost

8.11.19

Pwn2Own Tokyo 2019 -Day2: experts hacked Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers

Congress

Securityaffairs
8.11.19DNA-testing startup Veritas Genetics disclosed a security breachIncindentSecurityaffairs
8.11.19Amazon’s Ring Video Doorbell could open the door of your home to hackersHackingSecurityaffairs

8.11.19

Actively Developed Capesand Exploit Kit Emerges in AttacksExploitSecurityweek
8.11.19Charges: Chinese Surveillance Goods Illegally Sold to USBigBrothersSecurityweek
8.11.19Bug Hunters Hack Samsung Galaxy S10, Xiaomi Mi9 at Pwn2OwnCongressSecurityweek
8.11.19Cisco Patches Vulnerabilities in Small Business Routers, RoomOS SoftwareVulnerebilitySecurityweek

8.11.19

Microsoft Apps Diverted from Their Main Use

Security

SANS

8.11.19

Cybersecurity workforce skills gap rises to over 4 million

Cyber

Net-security

8.11.19

November 2019 Patch Tuesday Forecast: Out with the old, in with the new

Vulnerebility

Net-security

8.11.19

SIEM complexity and cloud visibility put companies at risk

Security

Net-security

8.11.19

Global internet freedom declines for the ninth consecutive year

Security

Net-security

8.11.19

Only 47% of cybersecurity pros are prepared to deal with attacks on their IoT devices

Security

Net-security

8.11.19

What financial records do companies need to keep, and for how long?

Security

Net-security

8.11.19

Mobile security firms will help protect Google Play

Safety

Net-security

7.11.19

TrendMicro Employee Sold Customer Info to Tech Support ScammersSpam

Bleepingcomputer

7.11.19

DarkUniverse APT Stayed Hidden for 8 Years, Updated RegularlyAPT

Bleepingcomputer

7.11.19

Microsoft Defender ATP Gets Advanced Hunting Capabilities, MoreSafety

Bleepingcomputer

7.11.19Windows 10 Insider Build 19018 Released With New Quick Web SearchesOS

Bleepingcomputer

7.11.19

Microsoft Issues November 2019 Office Updates With Memory Leak FixOS

Bleepingcomputer

7.11.19

New Megacortex Ransomware Changes Windows Passwords, Threatens to Publish DataRansomware

Bleepingcomputer

7.11.19

Tech Support Scammers Are Abusing a New Firefox Browser Lock BugVulnerebility

Bleepingcomputer

7.11.19WordPress Admins Infect Their Sites With WP-VCD via Pirated PluginsVirus

Bleepingcomputer

7.11.19

Brooklyn Hospital Loses Patient Data In Ransomware AttackRansomware

Bleepingcomputer

7.11.19

Using Light Beams to Control Google, Apple, Amazon AssistantsSecurity

Bleepingcomputer

7.11.19

Chrome, Firefox to Hide Those Annoying Site Notification PromptsSecurity

Bleepingcomputer

7.11.19Malwarebytes 4.0 Released With New UI and Scanning EngineSafety

Bleepingcomputer

7.11.19Nemty Ransomware Now Spreads via Trik BotnetRansomware

Bleepingcomputer

7.11.19Ransomware Attacks Hit Everis and Spain's Largest Radio NetworkRansomware

Bleepingcomputer

7.11.19

Specially Crafted ZIP archives allow bypassing secure email gatewaysVulnerebilitySecurityaffairs

7.11.19

Two former Twitter employees charged of spying on Users for Saudi Arabian GovernmentSocialSecurityaffairs

7.11.19

Saudi King Hosts CIA Chief for TalksBigBrothersSecurityweek
7.11.19eCommerce Fraud Prevention Firm Riskified Raises $165 MillionITSecurityweek

7.11.19

Google Teams Up With Security Firms to Fight Bad Android AppsAndroidSecurityweek

7.11.19

California Says Facebook Impeding Privacy ProbePrivacy  SocialSecurityweek

7.11.19

NVIDIA Patches Flaws in GPU Display Driver, GeForce ExperienceVulnerebilitySecurityweek
7.11.19Amazon's Ring Video Doorbell Lets Attackers Steal Your Wi-Fi PasswordAttackThehackernews
7.11.19Gartner Says the Future of Network Security Lies with SASESecurityThehackernews
7.11.19Rogue TrendMicro Employee Sold Customer Data to Tech Support ScammersSpamThehackernews

7.11.19

Trend Micro rogue employee sold customer data to tech support scammersSpamSecurityaffairs

7.11.19

Bug Hunters Earn $195,000 for Hacking TVs, Routers, Phones at Pwn2Own Tokyo 2019CongressSecurityaffairs

7.11.19

GUI Now Available for Kamerka ICS/IoT Reconnaissance ToolICS  IoTSecurityweek
7.11.19Two Former Twitter Employees Caught Spying On Users For Saudi ArabiaCyberSpy  SocialThehackernews

7.11.19

Apple details new Safari, Location Services, Sign in with Apple privacy features

Apple

Net-security

7.11.19

Facebook Privacy Breach: 100 Developers Improperly Accessed DataSocial

Threatpost

7.11.19

Google Analytics Emerges as a Phishing ToolPhishing

Threatpost

7.11.19Emotet Resurgence Continues With New Tactics, Techniques and ProceduresVirus

Threatpost

7.11.19DarkUniverse APT Emerges to Deliver Sophisticated, Targeted Spy AttacksAPT

Threatpost

7.11.19Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust SecuritySecurityThreatpost
7.11.19You’ve Been Served…with Subpoena-Themed Phishing EmailsPhishing

Threatpost

7.11.19Rogue Trend Micro Employee Sold Customer Data for 68K AccountsIncindent  VirusThreatpost
7.11.19

Getting the best value out of security assessments

Security

SANS

7.11.19

A flaw in the Libarchive library impacts major Linux distros

Vulnerebility

Securityaffairs
7.11.19

‘Camgirl’ sites expose millions of members and users

Incindent

Securityaffairs
7.11.19

Facebook discloses a new leak that exposes group members’ data

Social

Securityaffairs
7.11.19

Documents Show Facebook Controlling Competitors With User Data: Report

Social

Securityweek
7.11.19

Three Charged in US With Spying on Twitter Users for Saudi Arabia

BigBrothers

Securityweek
7.11.19

More malspam pushing Formbook

Spam

SANS

7.11.19

5 factors to consider when choosing an encryption key management system

Crypto

Net-security

7.11.19

The promise and peril of post quantum computing

Security

Net-security

7.11.19

Cybercriminals are testing exposed credentials for future account takeover attacks

CyberCrime

Net-security

7.11.19

Phishing attacks at highest level in three years

Phishing

Net-security

7.11.19

Security and risk compliance: Still the most important part of IT strategy

Security

Net-security

6.11.19

Brooklyn Hospital lost patient records after a ransomware infectionRansomwareSecurityaffairs

6.11.19

Libarchive Vulnerability Impacts Multiple Linux DistributionsVulnerebilitySecurityweek

6.11.19

Bug Hunters Earn $195,000 for Hacking TVs, Routers, Phones at Pwn2OwnCongressSecurityweek

6.11.19

Immersive Labs Raises $40 Million for Cyber Skills PlatformITSecurityweek

6.11.19

Google Announces Open Source Silicon Root-of-Trust ProjectITSecurityweek

6.11.19

The Future of Cyber Through the Eyes of an Intelligence FirmITSecurityweek

6.11.19

Trend Micro Employee Sold Customer Data to ScammersSpamSecurityweek

6.11.19

Facebook: Third-Party App Developers Improperly Accessed User InformationSocialSecurityweek

6.11.19

Google Patches Critical Flaws in Android's System ComponentAndroidSecurityweek

6.11.19

Facebook Reveals New Data Leak Incident Affecting Groups' MembersSocialThehackernews

6.11.19

Explained: How New 'Delegated Credentials' Boosts TLS Protocol SecurityCrypto  HackingThehackernews

6.11.19

Detecting and tracking phishing campaigns through web analytics identifiers

Phishing

Net-security

6.11.19

New, improved Microsoft 365 security and compliance features

Security

Net-security

6.11.19

Anonymous and LulzSecITA hacked professional orders and telephone operator Lyca MobileAPTSecurityaffairs

6.11.19

Mysterious DarkUniverse APT remained undetected for 8 yearsAPTSecurityaffairs

6.11.19

Ransomware attack impacted government services in the territory of Nunavut, CanadaRansomwareSecurityaffairs

6.11.19

VMware Unveils New Security Features, Enhancements for NSX, SD-WAN, Secure StateSafetySecurityweek

6.11.19

DarkUniverse APT Uses Just-in-Time Malware CreationAPTSecurityweek

6.11.19

Microsoft Announces New Security Capabilities Across PlatformsSecuritySecurityweek

6.11.19

Hackers Can Use Lasers to Send Voice Commands to Phones, Smart SpeakersHacking  MobilSecurityweek

6.11.19

IBM: Face Recognition Tech Should be Regulated, Not BannedSecuritySecurityweek

6.11.19

Sumo Logic Acquires JASK to Expand Cloud-Native PlatformITSecurityweek

6.11.19

Snowden Warns of Web Giants' 'Irresistible Power'BigBrothersSecurityweek

6.11.19

Broadcom Completes Acquisition of Symantec Enterprise Unit for $10.7 BillionITSecurityweek

6.11.19

More malspam pushing Formbook

Spam

SANS

6.11.19

Defining risk controls that actually work

Security

Net-security

6.11.19

Who is responsible for Active Directory security within your organization?

Security

Net-security

6.11.19

Most organizations plan to increase their cybersecurity budgets in 2020

Cyber

Net-security

6.11.19

As more companies deploy cloud apps, they must also implement security tools

Security

Net-security

6.11.19

Key predictions that will impact CIOs and IT pros over the next five years

Security

Net-security

6.11.19

Nikkei hit by BEC scammers, loses $29 million

Spam

Net-security

5.11.19

DarkUniverse – the mysterious APT framework #27APTSecurelist

5.11.19

‘Light commands’ attack: hacking Alexa, Siri, and other voice assistants via Laser BeamHackingSecurityaffairs

5.11.19

PoC Exploits Published for Unpatched RCE Bugs in rConfigExploitSecurityweek

5.11.19

Hackers Can Silently Control Your Google Home, Alexa, Siri With Laser LightHackingThehackernews

5.11.19

Critical Remote Code Execution Flaw Found in Open Source rConfig UtilityVulnerebility

Threatpost

5.11.19

Alexa, Siri, Google Smart Speakers Hacked Via Laser BeamHacking

Threatpost

5.11.19

BlueKeep Attacks Have Arrived, Are Initially UnderwhelmingAttack

Threatpost

5.11.19

Magecart Groups Attack Simultaneous Sites in Card-Theft FrenzyCyberCrime

Threatpost

5.11.19

Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANsRansomwareThreatpost

5.11.19

BEC Scam Costs Media Giant Nikkei $29 MillionSpamThreatpost

5.11.19

Flaws in Able2Extract Professional tool allow hacking targeted machine with malicious image files

Virus

Securityaffairs

5.11.19

Everis and Spain’s radio network Cadena SER hit by ransomware

Ransomware

Securityaffairs

5.11.19

Microsoft Unveils New Security Tools for Azure

Security

Securityweek

5.11.19

Vendor Email Compromise is Latest Identity Deception Attack

Attack

Securityweek

5.11.19

Europol on Methodology Behind Successful Spear Phishing Attacks

Phishing

Securityweek

5.11.19

Proofpoint Acquires Insider Threat Management Firm ObserveIT for $225 Million

IT

Securityweek

5.11.19

Hackers Can Target Able2Extract Users With Malicious Image Files

Virus

Securityweek

5.11.19

Targeted Ransomware Attacks Hit Several Spanish Companies

Ransomware

Thehackernews

5.11.19

Bluekeep exploitation causing Bluekeep vulnerability scan to fail

Exploit

SANS

5.11.19

IoT is an ecosystem, as secure as its weakest link

IoT

Net-security

5.11.19

How can security teams effectively monitor OT and ICS networks?

ICS

Net-security

5.11.19

A continuous problem: Tackling the cybersecurity skills shortage

Cyber

Net-security

5.11.19

Researchers develop machine learning-based detector that stops lateral phishing attacks

Phishing

Net-security

5.11.19

50% of apps will not be migrated to the cloud

Security

Net-security

5.11.19

Employees know vulnerabilities exist, but they can’t resolve them quickly enough

Security

Net-security

5.11.19

The digital economy is approaching a critical tipping point

Security

Net-security

5.11.19

Europol: Spear phishing the most prevalent cyber threat affecting orgs across the EU

Phishing

Net-security

4.11.19Office 365 to Prevent Malicious Docs From Infecting WindowsSecurity

Bleepingcomputer

4.11.19

Microsoft 365 Helps Improve Orgs’ Security and Compliance PostureSecurity

Bleepingcomputer

4.11.19Microsoft 365 Now Helps Find and Review Insider Security ThreatsSecurity

Bleepingcomputer

4.11.19

Office 365 Breach Detection Capabilities Now in Public PreviewSecurity

Bleepingcomputer

4.11.19First Microsoft Edge Stable Release Candidate Now AvailableSecurity

Bleepingcomputer

4.11.19BEC Fraudsters Divert $742,000 from Ocala City in FloridaSpam

Bleepingcomputer

4.11.19

GitLab plans to ban hires in China and Russia due to espionage concernsBigBrothers  CyberSpySecurityaffairs
4.11.19Ocala City in Florida lost $742,000 following BEC attackSpamSecurityaffairs

4.11.19

Cybersecurity Executives Say Cost of Security Reasonable: SurveyCyberSecurityweek
4.11.19Microsoft Office for Mac Users Exposed to Macro-Based AttacksAppleSecurityweek
4.11.19Two unpatched RCE flaws in rConfig software expose servers to hackVulnerebilitySecurityaffairs

4.11.19

QSnatch malware already infected thousands of QNAP NAS devicesVirusSecurityaffairs
4.11.19Mueller Documents: Manafort Pushed Ukraine Hack TheoryBigBrothers  HackingSecurityweek

4.11.19

Midwest's 1st Cyber Battalion to Be Based in IndianaBigBrothersSecurityweek
4.11.19BlueKeep Vulnerability Exploited to Deliver Cryptocurrency MinerCryptocurrencySecurityweek
4.11.19

Exclusive – Analysis of the sample that hit the Kudankulam Nuclear Power Plant

BigBrothers

Securityaffairs

4.11.19

New Gafgyt botnet targets Gaming Servers

BotNet

Securityaffairs
4.11.19

rConfig Install Directory Remote Code Execution Vulnerability Exploited

Exploit  Vulnerebility

SANS

4.11.19

People are the very first element in a pragmatic cybersecurity strategy

Cyber

Net-security

4.11.19

Organizations fail to maximize use of Microsoft 365 security features

Security

Net-security

4.11.19

Companies should disclose cybersecurity risk management efforts

Cyber

Net-security

4.11.19

Risky transactions on mobile devices increase 138% since 2017

Mobil

Net-security

4.11.19

Together, AI and the IoT are having a bigger-than-expected impact

Security

Net-security

4.11.19

Whitepaper: SIEM + Threat Intelligence

Security

Net-security

3.11.19

First Cyber Attack ‘Mass Exploiting’ BlueKeep RDP Flaw Spotted in the WildAttack  ExploitSecurityaffairs

3.11.19

Controversial law entered into effect in Russia this weekBigBrothersSecurityaffairs

3.11.19

Watch Out IT Admins! Two Unpatched Critical RCE Flaws Disclosed in rConfigVulnerebilityThehackernews

3.11.19

First Cyber Attack 'Mass Exploiting' BlueKeep RDP Flaw Spotted in the WildExploitThehackernews

3.11.19

BlueKeep Remote Code Execution Bug in RDP Exploited En MasseExploit

Bleepingcomputer

3.11.19

Windows 10 1903 Affected by New Setup Bug, Workaround ReadyOS

Bleepingcomputer

3.11.19

Google Begins Testing Extension Manifest V3 in Chrome CanaryIT

Bleepingcomputer

3.11.19

Office 365 Phishing Campaign Baits Employees with Pay RaisesPhishing

Bleepingcomputer

3.11.19

US MS-ISAC Releases the October List of End of Support SoftwareBigBrothers

Bleepingcomputer

3.11.19

Media Giant Nikkei Loses $29 Million to BEC ScammersSpam

Bleepingcomputer

3.11.19

Google Chrome is Getting the 'Close other tabs' Option BackIT

Bleepingcomputer

3.11.19

GandCrab RaaS Was a Training Ground for Malware DistributorsRansomware

Bleepingcomputer

3.11.19

Chrome Zero-Day Bug with Exploit in the Wild Gets A PatchExploit  Vulnerebility

Bleepingcomputer

3.11.19

20 Companies Pledge Support for the Hack_Right ProgramHacking

Bleepingcomputer

3.11.19

Ransom NewsRansomRansom

3.11.19

Ouroboros Decryptor Anti-Ransomware Tool  Anti-Ransomware Tool 

3.11.19

CVE-2019-2114 flaw allows hackers to plant malware on Android devices via NFC beamingVulnerebility  VirusSecurityaffairs

3.11.19

Proton Technologies makes the code of ProtonMail iOS App open sourceAppleSecurityaffairs

3.11.19

Desjardins credit union data breach bigger than initially thoughtIncindentSecurityaffairs

3.11.19

Remark on EML Attachments

Security

SANS

2.11.19Marriott Reports Exposure of Associates' Social Security NumbersIncindent

Bleepingcomputer

2.11.19Emotet Trojan Brings a Malware Scare with Halloween EmailsSpam  Virus

Bleepingcomputer

2.11.19Active Duty U.S. Military Now Gets Free Credit MonitoringBigBrothers

Bleepingcomputer

2.11.19Microsoft Shares Solutions for Windows TLS Failures, TimeoutsOS

Bleepingcomputer

2.11.19Discord Abused to Spread Malware and Harvest Stolen DataVirus

Bleepingcomputer

2.11.19Chinese Hackers Steal SMS Messages from Linux Routing ServersBigBrothers  Mobil

Bleepingcomputer

2.11.19Microsoft Warns of Windows Slow Startup Due to Persistent MemoryOS

Bleepingcomputer

2.11.19QSnatch Malware Infects Thousands of NAS Devices, Steals CredentialsVirus

Bleepingcomputer

2.11.19New Gafgyt Variant Recruits Routers to DDoS Servers for Valve GamesAttack

Bleepingcomputer

2.11.19Phishing Campaign Targets Precision Engineering CompanyPhishing

Bleepingcomputer

2.11.19Office 365 Users Targeted by Voicemail Scam PagesSpam blogMcafee blog
2.11.19Did You Check Your Quarantine?!Malware blogMcafee blog
2.11.19Using Expert Rules in ENS to Prevent Malicious ExploitsExploit blog  Malware blogMcafee blog
2.11.19Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in September 2019Security blogF5 Labs
2.11.19Three Ways to Hack the U.S. ElectionBigBrother blogF5 Labs
2.11.192019 Application Protection Report Podcast SeriesSecurity blogF5 Labs
2.11.19MESSAGETAP: Who’s Reading Your Text Messages?Social blogFireEye
2.11.19CertUtil Qualms: They Came to Drop FOMBsSecurity blogFireEye
2.11.19The commoditization of mobile espionage softwareBigBrother blog

Cisco Talos

2.11.19Vulnerability Spotlight: Denial-of-service in VMWare Fusion 11Vulnerebility blog

Cisco Talos

2.11.19Cisco Talos helps CISOs get back to basics with advisory seriesSecurity blog

Cisco Talos

2.11.19Safe downloading habits: What to teach your kidsSecurity blog

Eset

2.11.19Deepfakes: When seeing isn’t believingSecurity blog

Eset

2.11.19Facebook builds tool to confound facial recognitionSocial blog

Eset

2.11.19What you may be getting wrong about cybersecurityCyber blogEset
2.11.19Microsoft Office for Mac cannot properly disable XLM macrosAlertAlert
2.11.19

News Wrap: APTs, Office 365 Voicemail Phish and Bed Bath & Beyond Breach

Security

Threatpost

2.11.19

Android Keyboard App Could Swindle 40M Users Out of Millions

Android

Threatpost

2.11.19

Stubborn Malware Targets QNAP NAS Hardware Specifically

Virus

Threatpost

2.11.19

Google Discloses Chrome Flaw Exploited in the Wild

Vulnerebility

Threatpost

2.11.19

Office for Mac Users Warned of Malicious SYLK Files

Apple

Threatpost

2.11.19

Solar, Wind Power Utility Disrupted in Rare Cyberattack

Attack

Threatpost

2.11.19

Global Crime Ring Bilks U.S. Military Members, Vets Out of Millions

BigBrothers

Threatpost

2.11.19

CVE-2019-13720 flaw in Chrome exploited in Operation WizardOpium attacks

Exploit

Securityaffairs
2.11.19

Canada Credit Union Data Breach Bigger Than First Thought: Desjardins

Incindent

Securityweek

2.11.19

Tip: Password Managers and 2FA

Safety

SANS

1.11.19

Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpiumExploit  VulnerebilitySecurelist
1.11.19Chrome Zero-Day Vulnerability Exploited in Korea-Linked AttacksExploit  VulnerebilitySecurityweek

1.11.19

Source Code of ProtonMail iOS App Made PublicAppleSecurityweek

1.11.19

sPower it the first renewable energy provider hit by a cyber attack that caused communications outagesBigBrothersSecurityaffairs
1.11.19Facebook agrees to pay a fine of $643,000 in Cambridge Analytica scandalSocialSecurityaffairs

1.11.19

Cyberbalkanization and the Future of the InternetCyber

Securityweek

1.11.19

Cisco Firewall Vulnerability Exploited in Attack on U.S. Renewable Energy ProviderICS  VulnerebilitySecurityweek
1.11.19Controversial Russian Law to Control Internet Enters ForceBigBrothersSecurityweek

1.11.19

New Office 365 Phishing Scams Using Audio Voicemail RecordingsPhishing

Bleepingcomputer

1.11.19Fraudster Admits Role In Theft of Millions From Thousands of Army MembersIncindent

Bleepingcomputer

1.11.19

Bed Bath & Beyond Discloses Customer Login Credentials BreachIncindent

Bleepingcomputer

1.11.19

Microsoft Issues Workaround for Windows 10 User Creation IME BugVulnerebility

Bleepingcomputer

1.11.19Paradise Ransomware Decryptor Gets Your Files Back for FreeRansomware

Bleepingcomputer

1.11.19

Microsoft Users Hit with Phishing Kits Hosted on Thousands of DomainsPhishing

Bleepingcomputer

1.11.1921 Million Logins for Top 500 Firms Offered on the Dark WebIncindent

Bleepingcomputer

1.11.19

World's First Domain Registrar Network Solutions Discloses BreachIncindent

Bleepingcomputer

1.11.19Chrome 78 Disables Code Integrity Check to Mitigate "Aw Snap!" CrashesVulnerebility

Bleepingcomputer

1.11.19

Ransomware Attack Causes School 'District-Wide Shutdown'Ransomware

Bleepingcomputer

1.11.19

The cake is a lie! Uncovering the secret world of malware-like cheats in video gamesVirusSecurelist
1.11.19Kaspersky researchers found a Chrome 0-day exploited in attacks in the wildExploit  VulnerebilitySecurityaffairs

1.11.19

New Chrome 0-day Bug Under Active Attacks – Update Your Browser Now!Exploit  VulnerebilityThehackernews

1.11.19

ICS Attackers Set To Inflict More Damage With Evolving Tactics

ICS

Threatpost

1.11.19

China-Linked Hackers Spy on Texts With MessageTap Malware

CyberCrime  Virus

Threatpost

1.11.19

Fake Voicemail/Office 365 Attack Targets Enterprise Execs

Attack

Threatpost

1.11.19

Valve Source Engine, Fortnite Servers Crippled By Gafgyt Variant

Security

Threatpost

1.11.19

Calypso APT Emerges from the Shadows to Target Governments

APT

Threatpost

1.11.19

Watchdog Sues FBI Over Facial Recognition Secrecy

BigBrothers

Securityweek

1.11.19

Bed Bath & Beyond Blames Password Reuse for Hacked Accounts

Hacking

Securityweek
1.11.19

India Seeks Answers From WhatsApp After Cyberespionage

CyberSpy  Social

Securityweek

1.11.19

Keeping up with the evolving ransomware security landscape

Ransomware

Net-security

1.11.19

Security services and network security still top spending priorities for CISOs in MENA

Security

Net-security

1.11.19

How has your organization’s risk level changed in the past 12 months?

Security

Net-security

1.11.19

IT teams are embracing intent-based networking, investing in AI technologies

Security

Net-security