Calendar October- Home  2020  2019  2018  2017  2016  1  2  3  4  5  6  7  8  Articles

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2019 - January  February  March  April  May  June  July  August  September  October  November  December


Calendar January

Date

Name

Category

Web

31.10.19

China-linked APT41 group targets telecommunications companies with new backdoorAPT

Securityaffairs

31.10.19

21 Million stolen credentials from Fortune 500 companies available on the dark webIncindentSecurityaffairs

31.10.19

Chinese Cyberspies Use New Malware to Intercept SMS Traffic at Mobile OperatorsBigBrothers  CyberSpy

Securityweek

31.10.19

Facebook Agrees to Pay Fine in Cambridge Analytica ScandalSocialSecurityweek

31.10.19

Norsk Hydro Receives First Insurance Payout Following CyberattackAttackSecurityweek

31.10.19

Chinese Hackers Compromise Telecom Servers to Spy on SMS MessagesBigBrothersThehackernews

31.10.19

EML attachments in O365 - a recipe for phishing

Phishing

SANS

31.10.19

Leading domain name registrars suffered data breach

Incindent

Net-security

31.10.19

Apple releases fresh security updates for macOS, iOS

Apple

Net-security

31.10.19

Windows 10 Build 19013 Out With New DirectX 12 Features for InsidersOS

Bleepingcomputer

31.10.19

Maze Ransomware Attacks Italy in New Email CampaignRansomware

Bleepingcomputer

31.10.19

Microsoft Updates Windows 10 PowerToys with Batch Renamer ToolOS

Bleepingcomputer

31.10.19

xHelper Trojan Variant Reinstalls Itself After Removal, Infects 45KVirus

Bleepingcomputer

31.10.19

Europe's Electronic ID System Fixed Against Impersonation RiskVulnerebility

Bleepingcomputer

31.10.19

NordVPN Plans Security and Privacy Upgrades After HackPrivacy  Security

Bleepingcomputer

31.10.19

Google Adds New Ways For IT Admins to Keep Enterprises SecureSecurity

Bleepingcomputer

31.10.19

Mozilla Provides Workaround for Firefox 70 Not Loading SitesSecurity

Bleepingcomputer

31.10.19

Ransomware Actor Starting Young Makes Big Money, Gets ArrestedRansomware

Bleepingcomputer

31.10.19

Blogger and WordPress Sites Hacked to Show Sextortion ScamsSocial

Bleepingcomputer

31.10.19

Israel is going to extradite to US the Russian hacker Alexei BourkovBigBrothers

Securityaffairs

31.10.19

Hackers behind Uber and Lynda hacks plead guilty in data breachesIncindentSecurityaffairs

31.10.19

eIDAS flaws allowed attackers to impersonate any EU citizen or businessBigBrothersSecurityaffairs

31.10.19

Israel Approves Extradition to US of Russian 'Hacker'BigBrothers

Securityweek

31.10.19

Corellium Responds to Apple's Copyright Infringement LawsuitAppleSecurityweek

31.10.19

Leading Web Domain Name Registrars Disclose Data BreachIncindentThehackernews

31.10.19

Two Hackers Who Extorted Money From Uber and LinkedIn Plead GuiltySocialThehackernews

31.10.19

City of Johannesburg, on Second Hit, Refuses to Pay Ransom

Ransomware

Threatpost

31.10.19

WhatsApp Spyware Attack: Uncovering NSO Group Activity

CyberSpy

Threatpost

31.10.19

U.S. Universities Get Failing Grades for DMARC Adoption

BigBrothers  Spam

Threatpost

31.10.19

Android Malware Plaguing 45K Devices Remains a Mystery

Android

Threatpost

31.10.19

Insurance Pays Out a Sliver of Norsk Hydro’s Cyberattack Damages

Attack

Threatpost

31.10.19

Murky Details Surround Bed, Bath and Beyond Breach

Incindent

Threatpost

31.10.19

KTRW: The journey to build a debuggable iPhone

Vulnerebility blog

Project Zero

31.10.19

Network Solutions data breach – hacker accessed data of more 22 Million accountsIncindent

Securityaffairs

31.10.19

Emsisoft released a free decryption tool for Paradise ransomwareRansomwareSecurityaffairs

31.10.19

It’s official, administrative network at Kudankulam Nuclear Power Plant was infected with DTrackBigBrothersSecurityaffairs

31.10.19

Hackers Plead Guilty in Data Breach that Uber Covered UpIncindent

Securityweek

31.10.19

Data Breach Hits 22 Million Web.com, Register.com, Network Solutions AccountsIncindent

Securityweek

31.10.19

Florida Elections Chief: State Systems Prepared for HackersBigBrothers

Securityweek

31.10.1921 Million Stolen Fortune 500 Credentials For Sale on Dark WebIncindent

Securityweek

31.10.19

Apple Patches Tens of Vulnerabilities in macOS Catalina, iOS 13AppleSecurityweek
31.10.19Hackers Target Indian Nuclear Power Plant – Everything We Know So FarBigBrothers  HackingThehackernews

31.10.19

Office 365 users targeted with fake voicemail alerts in suspected whaling campaign

Phishing

Net-security

31.10.19

Container usage has grown in complexity, specific security controls are needed

Security

Net-security

31.10.19

Cybercriminals using custom phishing tools to target the world’s largest tech brands

CyberCrime  Phishing

Net-security

31.10.19

Most IT pros still haven’t migrated all their users to Windows 10

OS

Net-security

31.10.19

As the eSports industry grows, it becomes attractive for financially motivated cybercriminals

CyberCrime

Net-security

31.10.19

Whitepaper: Busting the myth that more threat intel feeds lead to better security

Security

Net-security

31.10.19

G Suite admins get context-aware access controls, rule-based automated actions and alerts

Security

Net-security

30.10.19

Paradise DecryptorAnti-ransom ToolAnti-ransom Tool

30.10.19

Xhelper, a new piece of Android malware that is infecting 2K+ devices each monthAndroid

Securityaffairs

30.10.19

WhatsApp sued Israeli surveillance firm NSO Group and its parent Q Cyber TechnologiesBigBrothers  SocialSecurityaffairs

30.10.19

Thousands of Xiaomi FURRYTAIL pet feeders exposed to hackMobilSecurityaffairs

30.10.19

Can You Trust Security Vendor Surveys?Security

Securityweek

30.10.19

Nuclear Power Plant in India Hit by North Korean Malware: ReportBigBrothers

Securityweek

30.10.19

Threat to US Elections Not Limited to Russia in 2020BigBrothers

Securityweek

30.10.19

Austrian Post Fined Over Customer Data MisuseBigBrothers

Securityweek

30.10.19

NSO Group: Israeli Firm Accused of CyberespionageBigBrothers  CyberSpySecurityweek

30.10.19

New Adwind Variant Targets Windows, Chromium Credentials

Virus

Threatpost

30.10.19

Facebook Sues NSO Group Over Alleged WhatsApp Hack

Social

Threatpost

30.10.19

Fancy Bear Targets Sporting, Anti-Doping Orgs As 2020 Olympics Loom

APT

Threatpost

30.10.19

Joker’s Stash Drops Largest-Ever Credit Card Cache on Dark Web

CyberCrime

Threatpost

30.10.19

Australia Proposes Facial Recognition for Adult Sites

BigBrothers

Threatpost

30.10.19

Country of Georgia Suffers Widespread Cyberattack

Attack

Threatpost

30.10.19

ThreatList: Most Retail Hardware Bug Bounty Flaws Are Critical

Vulnerebility

Threatpost

30.10.19

WhatsApp Sues Israeli Firm NSO Over CyberespionageCyberSpy  Social

Securityweek

30.10.19

Critical Vulnerabilities Found in Rittal Cooling SystemVulnerebility

Securityweek

30.10.19

Facebook Sues Israeli NSO Spyware Firm For Hacking WhatsApp UsersSocialThehackernews

30.10.19

Mysterious malware that re-installs itself infected over 45,000 Android PhonesAndroidThehackernews

30.10.19

The Pirate Bay was recently down for over a week due to a DDoS attackAttackThehackernews

30.10.19

The nastiest ransomware, phishing and botnets of 2019

Analysis

Net-security

30.10.19

Majority of 2019 breaches were the result of unapplied security patches

Incindent

Net-security

30.10.19

Examining security process maturity in 400 organizations

Security

Net-security

30.10.19

Global DX tech investments to total $7.4 trillion over the next four years

IT

Net-security

29.10.19

Users online claim Kudankulam nuclear power plant was hit by a cyber attack

BigBrothers

Securityaffairs

29.10.19

Details for 1.3 million Indian payment cards available on the dark web, its the biggest single card database everIncindentSecurityaffairs

29.10.19

MikroTik Router Vulnerabilities Can Lead to Backdoor CreationVulnerebility

Securityweek

29.10.19

Slack Offers Bigger Rewards for Serious VulnerabilitiesVulnerebility

Securityweek

29.10.19

Aussie Consumer Watchdog Sues Google Over Location Data UsePrivacy

Securityweek

29.10.19

China Slams US for 'Economic Bullying' of Huawei, ZTEBigBrothers

Securityweek

29.10.19

Russian Cyberspies Again Target Sporting, Anti-Doping OrganizationsBigBrothers  CyberSpy

Securityweek

29.10.19

U.S. Fast-Food Chain Krystal Investigating Payment Card BreachIncindent

Securityweek

29.10.19

Windows 10X Leak Reveals New Launcher, Taskbar, and Lock ScreenOS

Bleepingcomputer

29.10.19

Sixth June Fashion Site Hacked to Steal Credit CardsCyberCrime

Bleepingcomputer

29.10.19

U.S. Food Chain Alerts Customers of Payment Card IncidentCyberCrime

Bleepingcomputer

29.10.19

Microsoft Removes Windows 10 1903 Update Block After Bluetooth FixOS

Bleepingcomputer

29.10.19

Pwn2Own Hacking Event Expands to Industrial Control SystemsCongress

Bleepingcomputer

29.10.19

US Govt Grants Adobe a License to Continue Venezuela BusinessBigBrothers

Bleepingcomputer

29.10.19

How to Perform Windows Defender Offline Scan in Windows 10OS

Bleepingcomputer

29.10.19

Windows 10 Start Menu, Search Issues Continue After KB4522355 UpdateOS

Bleepingcomputer

29.10.19

TrialWorks Ransomware Attack Disrupts Court Cases and DeadlinesRansomware

Bleepingcomputer

29.10.19

How to Get the Windows 10 November 2019 Update NowOS

Bleepingcomputer

29.10.19

Magecart Gang Targets Skin Care Site Visitors For 5+ Months

CyberCrime

Threatpost

29.10.19

Cybercriminals Impersonate Russian APT ‘Fancy Bear’ to Launch DDoS Attacks

APT

Threatpost

29.10.19

PHP Bug Allows Remote Code-Execution on NGINX Servers

Vulnerebility

Threatpost

29.10.19

Pwn2Own Expands Into Industrial Control Systems Hacking

Congress

Threatpost

29.10.19

UniCredit Suffers Third Breach Despite Investing Billions in Cybersecurity

Incindent

Threatpost

29.10.19

US Federal Communications Commission proposes cutting off funds for Chinese telecom equipmentBigBrothers

Securityaffairs

29.10.19

Fancy Bear continues to target sporting and anti-doping organizationsAPTSecurityaffairs

29.10.19

U.S. fast-food restaurant chain Krystal suffered a payment card incidentIncindentSecurityaffairs

29.10.19

Up to 2,000 Georgia websites have been hit by cyber attacksBigBrothersSecurityaffairs

29.10.19

U.S. Proposes Cutting Off Funds for Chinese Telecom EquipmentBigBrothers

Securityweek

29.10.19

Fortinet Acquires Endpoint Security Firm enSiloIT

Securityweek

29.10.19

Cloud Networking and Security Firm Aviatrix Raises $40 MillionIT

Securityweek

29.10.19

City of Johannesburg Refuses to Pay Ransom to HackersRansomware

Securityweek

29.10.19

Russian Hackers Targeting Anti-Doping Agencies Ahead of 2020 Tokyo OlympicsCyberCrimeThehackernews

29.10.19

UniCredit Bank Suffers 'Data Incident' Exposing 3 Million Italian Customer RecordsIncindentThehackernews

29.10.19

Generating PCAP Files from YAML

Security

SANS

29.10.19

Is the enterprise on the brink of a global web supply chain attack?

Attack

Net-security

29.10.19

Exploring the benefits of cybersecurity certification

Cyber

Net-security

29.10.19

Companies unprepared to deal with mobile attacks, synthetic identity fraud, CCPA compliance

Security

Net-security

29.10.19

Investigations are an unfortunate fact of life for most corporations

Security

Net-security

29.10.19

Most decision makers expect AI and 5G to impact their cybersecurity strategy

Cyber

Net-security

28.10.19

UniCredit says personal data of 3 million customers was compromised

Incindent

Net-security

28.10.19

Steam-powered scammersSpamSecurelist

28.10.19

New FuxSocy Ransomware borrows code from defunct CerberRansomware

Securityaffairs

28.10.19

UniCredit bank discloses a data breach that impacted 3 million of Italian clientsIncindentSecurityaffairs

28.10.19

SWEED targets precision engineering companies in ItalyBigBrothersSecurityaffairs

28.10.19

Raccoon info stealer already infected 100,000+ worldwideVirusSecurityaffairs

28.10.19

2,000 Georgia Websites Hit by Cyber AttacksAttack

Securityweek

28.10.19

Millions Download Adware-Carrying Apps From Google PlayAndroid

Securityweek

28.10.19

Data Breach at St. Louis Health Center Impacts up to 152,000Incindent

Securityweek

28.10.19

New Jersey Man Pleads Guilty to Hacker Attack Involving Hardware KeyloggersHacking

Securityweek

28.10.19

US Senators Call for Security Probe of TikTokBigBrothers

Securityweek

28.10.19

Adobe Exposed Creative Cloud Customer InformationIncindent

Securityweek

28.10.19

PHP RCE flaw actively exploited to pop NGINX servers

Exploit

Net-security

28.10.19

Using scdbg to Find Shellcode

Exploit

SANS

28.10.19

Ransomware hit TrialWorks, law firms and lawyers were not able to access court documentsRansomware

Securityaffairs

28.10.19

Experts found 17 apps in the Apple App Store infected with clicker TrojanAndroidSecurityaffairs

28.10.19

NCSC Report: U.K. neutralized over 600 cyber attacks this yearBigBrothersSecurityaffairs

28.10.19

Unusual Activity with Double Base64 Encoding

Security

SANS

28.10.19

DevOps firewall: How pre-configuring your cloud deployment can ensure compliance

Security

Net-security

28.10.19

New protocol extends Wi-Fi range, can be used with existing hardware

Security

Net-security

28.10.19

IaaS cloud vulnerabilities expected to increase 50% over 2018 figures

Vulnerebility

Net-security

28.10.19

Integrating security into IoT projects is not easy, but it’s increasingly urgent

IoT

Net-security

28.10.19

Despite enthusiasm for AI adoption, governments are experiencing challenges

Security

Net-security

28.10.19

Whitepaper: Building a Threat Intelligence Programme

Security

Net-security

27.10.19

Ransom NewsRansomRansom

27.10.19

SonicWall: Encrypted Attacks, IoT Malware Surge as Global Malware Volume Dips

Security blog

Sonicwall

27.10.19

MedusaLocker ransomware freezes files around the world

Ransomware blog

Avast blog

27.10.19

Practical Behavioral Profiling of PowerShell Scripts through Static Analysis (Part 3)

Malware blog

Palo Alto Unity42

27.10.19

Practical Behavioral Profiling of PowerShell Scripts through Static Analysis (Part 2)

Malware blog

Palo Alto Unity42

27.10.19

Practical Behavioral Profiling of PowerShell Scripts through Static Analysis (Part 1)

Malware blog

Palo Alto Unity42

27.10.19

A Year of Wins for the Palo Alto Networks LGBTQIA+ Employee Network

Security blog

Palo Alto

27.10.19

Cyber Canon Candidate Book Review: A Data-Driven Computer Security Defense:...

Security blog

Palo Alto

27.10.19

Palo Alto Networks Statement Regarding Tariffs

Security blog

Palo Alto

27.10.19

Introducing Cloud Managed Prisma Access!

Security blog

Palo Alto

27.10.19

New FuxSocy Ransomware Impersonates the Notorious Cerber

Ransomware

Bleepingcomputer

27.10.19

7.5 Million Records of Adobe Creative Cloud User Data Exposed

Incindent

Bleepingcomputer

27.10.19

Office 365 Enables ARC for Enhanced Anti-Spoofing Detection

Security

Bleepingcomputer

27.10.19

P&G Online Beauty Store Hacked to Steal Payment Info

Incindent

Bleepingcomputer

27.10.19

Microsoft Fixes Windows 10 1903 Network Issue, Update Block Stays

OS

Bleepingcomputer

27.10.19

Ransomware Attack Shuts Down City of Johannesburg's Systems

Ransomware

Bleepingcomputer

27.10.19

How To Fix "Aw Snap!" Crash in Google Chrome 78

Security

Bleepingcomputer

27.10.19

GitLab Backtracks on Forced Tracking After Negative Feedback

Security

Bleepingcomputer

27.10.19

CVE-2019-11043 exposes Web servers using nginx and PHP-FPM to hack

Vulnerebility

Securityaffairs

27.10.19

Unsecured ElasticSearch DB exposed data for 7.5M Adobe Creative Cloud Users

Incindent

Securityaffairs

27.10.19

New PHP Flaw Could Let Attackers Hack Sites Running On Nginx Servers

Vulnerebility

Thehackernews

26.10.19

P&G online beauty store First Aid Beauty hit by Magecart attack

CyberCrime

Securityaffairs

26.10.19

Encryption – A Feasible Savior against Prevalent Privacy Issues in Business Communication

Crypto  Privacy

Securityaffairs

26.10.19

HUNTING RACCOON: THE NEW MASKED BANDIT ON THE BLOCK

Malware blog

Cybereason

26.10.19

Using Expert Rules in ENS 10.5.3 to Prevent Malicious Exploits

Malware blog

Mcafee blog

26.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Crescendo

Malware blog

Mcafee blog

26.10.19

Shikata Ga Nai Encoder Still Going Strong

Cyber blog

FireEye

26.10.19

Inside the Hacking Community Market – Reselling RIG EK Services

Exploit blog

Checkpoint

26.10.19

TCP SACK Security Issue in OpenBSD – CVE-2019-8460

OS Blog

Checkpoint

26.10.19

Pony’s C&C servers hidden inside the Bitcoin blockchain

Cryptocurrency blog

Checkpoint

26.10.19

CISO Advisory: Governance & Risk Management

Security blog

Cisco Talos

26.10.19

Cisco Talos helps CISOs get back to basics with advisory series

Security blog

Cisco Talos

26.10.19

Gustuff return, new features for victims

Cyber blog

Cisco Talos

26.10.19

Your smart doorbell may be collecting more data than you think, study finds

Cyber blog

Eset

26.10.19

Facebook lays out plan to protect elections

Social blog

Eset

26.10.19

Tracking down the developer of Android adware affecting millions of users

OS Blog

Eset

26.10.19

Smart cities must be cyber‑smart cities

Cyber blog

Eset

26.10.19

NordVPN reveals breach at datacenter provider

Incident blog

Eset

26.10.19

Winnti Group’s skip‑2.0: A Microsoft SQL Server backdoor

Malware blog

Eset

26.10.19

News Wrap: Hotel Robot Hacks, FTC Stalkerware Crackdown

Security

Threatpost

26.10.19

Is AWS Liable in Capital One Breach?

Incindent

Threatpost

26.10.19

U.N., UNICEF, Red Cross Under Ongoing Mobile Attack

BigBrothers

Threatpost

26.10.19

Ransomware, Mobile Malware Attacks to Surge in 2020

Security

Threatpost

26.10.19

7M Adobe Creative Cloud Users Exposed to Hackers

Incindent

Threatpost

26.10.19

DDoS Attack on Amazon Web Services caused intermittently outage

Attack

Securityaffairs

25.10.19

VMware Patch Alert!

Vulnerebility

SANS

25.10.19

More on DNS Archeology (with PowerShell)

Security

SANS

25.10.19

Tortuga Crisis: Moonwalk, one of the biggest pirate CDNs eliminated dragging other big CDN-providers downVirusSecurityaffairs

25.10.19

Palo Alto Networks Blames Tariffs for Firewall Price HikesSecuritySecurityweek
25.10.19Major Florida Health System Fined $2M for HIPPA BreachIncindentSecurityweek
25.10.19The Threat to SoHo IoT Devices is Growing RapidlyIoTSecurityweek
25.10.19Raccoon Malware-as-a-Service Gains MomentumVirusSecurityweek

25.10.19

Ransomware attack hit the City of Johannesburg municipality

Ransomware

Securityaffairs

25.10.19

Spear-phishing attacks target United Nations and NGOs

Phishing

Securityaffairs
25.10.19

Google addresses High-Severity sandbox escape issues in Chrome

Vulnerebility

Securityaffairs
25.10.19

Experts attribute NukeSped RAT to North Korea-Linked hackers

APT  Virus

Securityaffairs
25.10.19

United Nations Organizations Targeted in Ongoing Phishing Campaign

BigBrothers  Phishing

Securityweek

25.10.19

Verizon, AT&T, Sprint and T-Mobile to replace SMS with RCS Messaging in 2020

Mobil

Thehackernews
25.10.19

Phishers have been targeting UN, UNICEF, Red Cross officials for months – and still do

Phishing

Net-security

25.10.19

Windows 10 1903 KB4522355 Update Released with Start Menu FixesOS

Bleepingcomputer

25.10.19Microsoft Phishing Attacks Target United Nations and CharitiesPhishing

Bleepingcomputer

25.10.19Cash App Scammers Deal Their Cons on Twitter, Instagram, YouTubeSocial

Bleepingcomputer

25.10.19iOS Clicker Trojan Malware Found in 17 Apps in Apple's App StoreApple

Bleepingcomputer

25.10.19

Malicious Android Apps Hide Ads From Google EmployeesAndroid

Bleepingcomputer

25.10.19Hacker Plants Keylogger Devices on Company Systems Faces 12yr in JailCrime

Bleepingcomputer

25.10.19FTC Issues Guidance On Protecting Against SIM Swap AttacksAttack  BigBrothers

Bleepingcomputer

25.10.19Discord Turned Into an Info-Stealing Backdoor by New MalwareVirus

Bleepingcomputer

25.10.19FBI Updates Initiative to Protect U.S. Elections from CyberattacksBigBrothers

Bleepingcomputer

25.10.19FBI Warns Govt Agencies, SMBs to Defend Against E-Skimming ThreatsBigBrothers

Bleepingcomputer

25.10.19

ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones

Mobil

Threatpost
25.10.19

Samsung Rolls Out Fix For Galaxy S10 Fingerprint Sensor Glitch

Mobil

Threatpost
25.10.19

Apple Removes 17 Malicious iOS Apps From App Store

Apple

Threatpost
25.10.19

Religious Website Data Exposed for Months

Incindent

Threatpost

25.10.19

Raccoon Malware Scavenges 100,000+ Devices to Steal Data

Virus

Threatpost
25.10.19

Cash App Twitter Giveaway a Haven for Stealing Money

Social

Threatpost
25.10.19

Researchers Warn of New Cache-Poisoned DoS Attack Method

Attack

Securityweek

25.10.19

Micron Launches Silicon-Based Security-as-a-Service Platform

IT

Securityweek

25.10.19

Google Patches More High-Value Chrome Sandbox Escape Vulnerabilities

Vulnerebility

Securityweek
25.10.19

Security pros like their job, yet many struggle with burnout and work-life balance

Security

Net-security
25.10.19

Could lighting your home open up your personal information to hackers?

Security

Net-security
25.10.19

Blacklisted apps increase 20%, attackers focus on tax-branded key terms

Mobil

Net-security
25.10.19

CIO role remains critical in leading enterprises through crises and transformations

Security

Net-security

24.10.19

Office 365 Adds Malware ZAP Toggle to Security & Compliance CenterSecurity

Bleepingcomputer

24.10.19

New CPDoS Web Cache Poisoning Attacks Impact Sites Using Popular CDNsAttack

Bleepingcomputer

24.10.19

Windows 10 Insider Build 19008 Released With FixesOS

Bleepingcomputer

24.10.19

Chrome 78 Released With DoH Trial, Tab Hover Cards, and MoreSecurity

Bleepingcomputer

24.10.19

U.S. Superior Court Systems Hacked to Spread Phishing EmailsPhishing

Bleepingcomputer

24.10.19

MedusaLocker Ransomware Wants Its Share of Your MoneyRansomware

Bleepingcomputer

24.10.19

Scammers Behind €10 Million BEC Fraud Arrested in SpainSpam

Bleepingcomputer

24.10.19

Billing Provider Billtrust Suffers Outage After Malware AttackVirus

Bleepingcomputer

24.10.19

Firefox 70 Released with In-Browser Data Breach NotificationsSecurity

Bleepingcomputer

24.10.19

Retina-X Banned by FTC From Selling Their ‘Stalking’ AppsMobil

Bleepingcomputer

24.10.19

Researchers Analyze North Korea-Linked NukeSped RATVirus

Securityweek

24.10.19

Click-Fraud Trojan Found in Apple App StoreApple

Securityweek

24.10.19

18 iOS apps with stealthy ad clicking code removed from App Store

Apple

Net-security

24.10.19

Swedish Government grants police the use of spyware against violent crime suspectsBigBrothersSecurityaffairs

24.10.19

Some ICS Security Incidents Resulted in Injury, Loss of Life: SurveyICS

Securityweek

24.10.19

Data Security Firm Very Good Security (VGS) Raises $35 MillionIT

Securityweek

24.10.19

DDoS Attack Hits Amazon Web ServicesAttackSecurityweek

24.10.19

42 Adware Apps with 8 Million Downloads Traced Back to Vietnamese StudentAndroidThehackernews

24.10.19

Samsung Galaxy S10 Banned by Banks Due to Buggy Fingerprint ReaderMobil

Bleepingcomputer

24.10.19

Malicious Apps on Alexa or Google Home Can Spy or Steal PasswordsAndroid

Bleepingcomputer

24.10.19

Russian Hackers Use Iranian Threat Group's Tools, Servers as CoverCyberCrime

Bleepingcomputer

24.10.19

Hacker Breached Servers Belonging to Multiple VPN ProvidersIncindent

Bleepingcomputer

24.10.19

Office 365 Now Warns About Suspicious Emails with Unverified SendersSpam

Bleepingcomputer

24.10.19

New Windows 10 Secured-Core PCs Block Firmware-Level AttacksOS

Bleepingcomputer

24.10.19

Chinese Hackers Use New Malware to Backdoor Microsoft SQL ServersBigBrothers  Virus

Bleepingcomputer

24.10.19

Hackers Breach Avast Antivirus Network Through Insecure VPN ProfileIncindent

Bleepingcomputer

24.10.19

Tools and Tactics of the Sodinokibi Ransomware DistributorsRansomware

Bleepingcomputer

24.10.19

How to Update Windows 10 Drivers ManuallyOS

Bleepingcomputer

24.10.19

Firefox, Chrome Bugs Allow Arbitrary Code-Execution

Vulnerebility

Threatpost

24.10.19

No ‘Silver Bullet’ Fix for Alexa, Google Smart Speaker Hacks

Hacking

Threatpost

24.10.19

Fujitsu Wireless Keyboard Plagued By Unpatched Flaws

Vulnerebility

Threatpost

24.10.19

Survey Finds People are Privacy Hypocrites

Privacy

Threatpost

24.10.19

Bedside Hotel Robot Hacked to Stream In-Room Video

Hacking

Threatpost

24.10.19

ThreatList: Google’s Advertising Network Dominates Global Data Collection

IT

Threatpost

24.10.19

15 Years Later, Metasploit Still Manages to be a Menace

Hacking

Threatpost

24.10.19

FTC Cracks Down on Stalkerware With Retina-X App Bans

BigBrothers

Threatpost

24.10.19

Open Redirect Bug in Bridge Theme Plugin Opens Admins to Spearphishing

Phishing

Threatpost

24.10.19

Magecart 5 Linked to Carbanak Gang

CyberCrime

Threatpost

24.10.19

FBI and DHS CISA issue alerts on e-skimming attacks

BigBrothers

Securityaffairs

24.10.19

Phishing attacks are a complex problem that requires layered solutions

Phishing

Net-security

24.10.19

Data collectors

Security

Securelist

24.10.19

Texas man sentenced to 145 months in federal prison for hacking Los Angeles Superior Court

Crime

Securityaffairs

24.10.19

Trend Micro Patches Code Execution Vulnerability in Anti-Threat Toolkit

Vulnerebility

Securityweek

24.10.19

Cyberattack Causes Serious Disruptions at German Automation Firm Pilz

CyberCrime

Securityweek

24.10.19

Multiple D-Link routers vulnerable to remote command execution

Alert

Alert

24.10.19

Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?

Security

SANS

24.10.19

VisibleV8: Stealthy open source tool for monitoring JavaScript in the wild

Security

Net-security

24.10.19

Top five tips for building smarter enterprise security

Security

Net-security

24.10.19

Rapid SaaS adoption compounds visibility concerns

Security

Net-security

24.10.19

5G adoption is expected to rapidly gather pace in North America

Mobil

Net-security

23.10.19

Experts found DLL Hijacking issues in Avast, AVG, and Avira solutions

Hacking

Securityaffairs

23.10.19

Robots at HIS Group are vulnerable to hack

Vulnerebility

Securityaffairs

23.10.19

Exploring the CPDoS attack on CDNs: Cache Poisoned Denial of Service

Attack  Exploit

Securityaffairs

23.10.19

Texas Man Gets 145 Months in Prison for Hacking LA Superior Court

Crime

Securityweek

23.10.19

Chrome 78 Released With DoH, 37 Security Patches

Security

Securityweek

23.10.19

Maxthon Browser Vulnerability Can Help Attackers in Post-Exploitation Phase

Exploit  Vulnerebility

Securityweek

23.10.19

Avast, Avira Products Vulnerable to DLL HijackingHackingSecurityweek

23.10.19

Tech, Security Firms Launch Operational Technology Cyber Security AllianceSecuritySecurityweek

23.10.19

New Cache Poisoning Attack Lets Attackers Target CDN Protected SitesAttackThehackernews

23.10.19

Experts believe the Magecart Group 5 could be linked to the Carbanak APTAPTSecurityaffairs

23.10.19

Autoclerk travel reservations platform data leak also impacts US Government and militaryBigBrothers  IncindentSecurityaffairs

23.10.19

pilz-ransomware-attackRansomwareSecurityaffairs

23.10.19

Trend Micro Anti-Threat Toolkit could be used to run malware on Win PCsSafetySecurityaffairs

23.10.19

New Variant of Gustuff Android Banking Trojan EmergesVirusSecurityweek

23.10.19

Microsoft Invests in Securing Device FirmwareSecuritySecurityweek

23.10.19

New Winnti Backdoor Targets Microsoft SQLVirusSecurityweek

23.10.19

Historical Breadcrumbs Link Magecart 5 to Carbanak GroupCyberCrimeSecurityweek

23.10.19

Microsoft Launches ElectionGuard Bug Bounty ProgramSecuritySecurityweek

23.10.19

New Azure AD Feature Detects Unauthorized Access AttemptsSecuritySecurityweek

23.10.19

Testing TLSv1.3 and supported ciphers

Crypto

SANS

23.10.19

How to remove human error from the cyber risk equation

Security

Net-security

23.10.19

Firefox 70 lets users track online trackers

Security

Net-security

23.10.19

How to reduce the risk posed by vulnerabilities in IoT/ICS networks?

ICS  IoT  Vulnerebility

Net-security

23.10.19

A data breach could be game over for a brand

Incindent

Net-security

23.10.19

Chance that flaws will ever be dealt with diminishes the longer they stick around

Security

Net-security

23.10.19

Analysts explore the top strategic technology trends for 2020

Security

Net-security

22.10.19

Microsoft debuts hardware-rooted security for foiling firmware attacks

Attack

Net-security

22.10.19

NordVPN, TorGuard, and VikingVPN VPN providers disclose security breachesIncindent

Securityaffairs

22.10.19

Outdated OSs Still Present in Many Industrial Organizations: ReportICSSecurityweek

22.10.19

Stealthy Microsoft SQL Server Backdoor Malware Spotted in the WildVirusThehackernews

22.10.19

NordVPN Breach FAQ – What Happened and What's At Stake?IncindentThehackernews

22.10.19

Turla Compromises, Infiltrates Iranian APT InfrastructureAPTThreatpost

22.10.19

New Way Found to Use Alexa, Google to ‘Voice Phish’ and Eavesdrop on UsersPhishingThreatpost

22.10.19

Avast Network Breached As Hackers Target CCleaner AgainIncindentThreatpost

22.10.19

Gustuff Android Banker Switches Up Technical ApproachAndroidThreatpost

22.10.19

U.S. Government, Military Personnel Data Leaked By AutoclerkBigBrothersThreatpost

22.10.19

Czech Police and Intelligence agency dismantled Russian Spy ring on its soilBigBrothers

Securityaffairs

22.10.19

Winnti APT group uses skip-2.0 malware to control Microsoft SQL ServersAPT

Securityaffairs

22.10.19

Facebook Steps Up Security Amid Fresh Signs of Russia MeddlingSocialSecurityweek

22.10.19

TorGuard, NordVPN Respond to Breach ReportsIncindentSecurityweek

22.10.19

Google Boosts Site Isolation in ChromeSecuritySecurityweek

22.10.19

New Cybersecurity Bills Promote CISOs and PrivacyCyberSecurityweek
22.10.19Trend Micro Acquires Cloud Security Firm Cloud ConformityITSecurityweek

22.10.19

What's up with TCP 853 (DNS over TLS)?

Security

SANS

22.10.19

Why organizations must arm their SOCs for the future

Security

Net-security

22.10.19

Perceptions on the impact of data breaches and identity protection

Incindent

Net-security

22.10.19

How the under 30s expect new approaches to cybersecurity

Cyber

Net-security

22.10.19

How much organizations are investing in analytics and why

Security

Net-security

22.10.19

Targeted online messaging dissuading young gamers from getting involved in cybercrime

Security

Net-security
22.10.19

Whitepaper: Make smarter decisions by using orchestration with intelligence

Security

Net-security

21.10.19

Avast breached by hackers who wanted to compromise CCleaner again

Incindent

Net-security

21.10.19

Avast internal network breached for the second time by sophisticated hackersIncindent

Securityaffairs

21.10.19

UK/US investigation revealed that Russian Turla APT masqueraded as Iranian hackersAPT  BigBrothers

Securityaffairs

21.10.19

Georgia County's Experience Shows Perils of RansomwareRansomwareSecurityweek

21.10.19

Czech Police, Intelligence Bust Russian Spy NetworkIncindentSecurityweek

21.10.19

Avast Discloses New Supply-Chain Attack AttemptIncindentSecurityweek

21.10.19

US, UK: Russian Hackers Hijacked Iranian Malware, InfrastructureBigBrothersSecurityweek

21.10.19

Public, Election Officials May Be Kept in the Dark on HacksCyberSecurityweek

21.10.19

Hackers stole card details from BriansClub carding siteHacking

Securityaffairs

21.10.19

TA505 cybercrime group use SDBbot RAT in recent campaignsCyberCrime

Securityaffairs

21.10.19

US Army stopped using floppy disks as storage for SACCS system that manages nuclear weapons arsenalBigBrothers

Securityaffairs

21.10.19

Scanning Activity for NVMS-9000 Digital Video Recorder

Hacking

SANS

21.10.19

How cybersecurity accelerates business growth

Cyber

Net-security

21.10.19

Deepfakes and voice as the next data breach

Incindent

Net-security

21.10.19

AI and ML will become important for how organizations run their digital systems

Security

Net-security

21.10.19

Spending on security hardware, software, and services continues to increase

Security

Net-security

21.10.19

Webinar: Application Protection and Performance Monitoring Using Datadog + Signal Sciences

Security

Net-security

20.10.19

Hackers Backdoor Sites by Hiding Fake WordPress Plugins

Hacking

Bleepingcomputer

20.10.19

Maze Ransomware Now Delivered by Spelevo Exploit Kit

Ransomware

Bleepingcomputer

20.10.19

Microsoft 365 Authentication Outage, Users Unable to Login

Security

Bleepingcomputer

20.10.19

STOP Ransomware Decryptor Released for 148 Variants

Ransomware

Bleepingcomputer

20.10.19

REvil Ransomware Affiliates Partner with Corporate Intruders

Ransomware

Bleepingcomputer

20.10.19

Graboid: First-Ever Cryptojacking Worm Found in Images on Docker Hub

Cryptocurrency blog

Palo Alto Unity42

20.10.19

Blackremote: Money Money Money – A Swedish Actor Peddles an Expensive New RAT

Malware blog

Palo Alto Unity42

20.10.19

More xHunt – New PowerShell Backdoor Blocked Through DNS Tunnel Detection

Malware blog

Palo Alto Unity42

20.10.19

Exploits in the Wild for vBulletin Pre-Auth RCE Vulnerability CVE-2019-16759

Exploit blog

Palo Alto Unity42

20.10.19

PKPLUG: Chinese Cyber Espionage Group Attacking Asia

BigBrother blog

Palo Alto Unity42

20.10.19

Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)

Vulnerebility blog

Palo Alto Unity42

20.10.19

The Legend of Adwind: A Commodity RAT Saga in Eight Parts

Malware blog

Palo Alto Unity42

20.10.19

CCPA: What You Need to Know for Public Cloud

Security blog

Palo Alto

20.10.19

Analysis of Two Newly Patched Kubernetes Vulnerabilities

Vulnerebility blog

Palo Alto

20.10.19

Zingbox IoT Guardian: The Only IoT Cyber Insurance Winner Recognized in the...

IoT blog

Palo Alto

20.10.19

How to Protect Organizations, Customers and National Security: Federal Igni...

Security blog

Palo Alto

20.10.19

Cyber Canon Book Review: Avogadro Corp: The Singularity Is Closer than It A...

Security blog

Palo Alto

20.10.19

Introducing Demisto v5.0: SOAR Just Got Better

Security blog

Palo Alto

20.10.19

The Top 5 Mobile Security Threats and How to Mitigate Them

Hardware blog

Palo Alto

20.10.19

SSL/TLS Decryption Can Help with GDPR Compliance

Security blog

Palo Alto

20.10.19

Upgrade Notice for Customers Using PAN-OS 9.0 and VM-Series on Azure

Safety blog

Palo Alto

20.10.19

Fake iPhone jailbreaking scam sends users to click-fraud site

OS Blog

Avast blog

20.10.19

Iranian hackers host malicious ‘Hire Military Heroes’ site

BigBrother blog

Avast blog

20.10.19

Russian hacker pleads guilty in ‘massive’ stock market cyberattack

Cyber blog

Avast blog

20.10.19

Some medical devices could be hacked, FDA warns

Hacking blog

Avast blog

20.10.19

German ransomware victim hacks back

Ransomware blog

Avast blog

20.10.19

The good, the bad, and the ugly of Cybersecurity Awareness Month

Security blog

Avast blog

20.10.19

How to Protect Multi-Cloud Environments with a Virtual Firewall

Security blog

Sonicwall

20.10.19

What Assumptions Are You Making?

Cyber

SANS

20.10.19

Fake updraftplus wordpress plugins

Vulnerebility

Securityaffairs

20.10.19

A critical Linux Wi-Fi bug could be exploited to fully compromise systems

Vulnerebility

Securityaffairs

20.10.19

Hundreds of millions of UC Browser Android Users Exposed to MiTM Attacks. Again.

Android

Securityaffairs

20.10.19

Emsisoft released a free decryption tool for the STOP (Djvu) ransomware

Ransomware

Securityaffairs

19.10.19

STOP Djvu Decryptor

Anti-Ransom Tool

Anti-Ransom Tool

19.10.19

Windows 10 KB4520062 Update May Break Microsoft Defender ATP

OS

Bleepingcomputer

19.10.19

Malicious Tor Browser Steals Cryptocurrency from Darknet Market Users

Cryptocurrency

Bleepingcomputer

19.10.19

Fake WordPress Plugin Comes with Cryptocurrency Mining Function

Cryptocurrency

Bleepingcomputer

19.10.19

500+ Million UC Browser Android Users Exposed to MiTM Attacks. Again.

Android

Bleepingcomputer

19.10.19

Microsoft Adds Azure AD Sign-In History to Detect Unusual Activity

Security

Bleepingcomputer

19.10.19

Samsung to Patch Fingerprint Scanner Against Silicone Case Unlock Bug

Mobil

Bleepingcomputer

19.10.19

Google Chrome 77 Added New Site Isolation Security Features

Safety

Bleepingcomputer

19.10.19

European Airport Systems Infected With Monero-Mining Malware

Cryptocurrency

Bleepingcomputer

19.10.19

Cozy Bear Russian Hackers Spotted After Staying Undetected for Years

APT

Bleepingcomputer

19.10.19

Stripe Users Targeted in Phishing Attack That Steals Banking Info

Phishing

Bleepingcomputer

19.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Follow The MoneyRansomware blogMcafee blog

19.10.19

Definitive Dossier of Devilish Debug Details – Part Deux: A Didactic Deep Dive into Data Driven DeductionsSecurity blog

FireEye

19.10.19

LOWKEY: Hunting for the Missing Volume Serial IDSecurity blog

FireEye

19.10.19

In the Footsteps of a Sextortion CampaignCyber blogCheckpoint

19.10.19

Pony’s C&C servers hidden inside the Bitcoin blockchainCryptocurrency blogCheckpoint

19.10.19

Vulnerability Spotlight: Multiple vulnerabilities in YouPHPTubeVulnerebility blog

Cisco Talos

19.10.19

Vulnerability Spotlight: Another fix for Adobe Acrobat Reader DC text field value remote code executionVulnerebility blog

Cisco Talos

19.10.19

Checkrain fake iOS jailbreak leads to click fraudOS Blog

Cisco Talos

19.10.19Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor BrowserMalware blog

Eset

19.10.19

What was wrong with Alexa? How Amazon Echo and Kindle got KRACKedHacking blog

Eset

19.10.19

Operation Ghost: The Dukes aren’t back – they never leftHacking blog

Eset

19.10.19

Streaming devices track viewing habits, study findsSecurity blogEset
19.10.19Connecting the dots: Exposing the arsenal and methods of the Winnti Group

Hacking blog

Eset

19.10.19

Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise

Vulnerebility

Threatpost

19.10.19

Zappos Offers Users 10% Discount in 2012 Breach Settlement

Incindent

Threatpost

19.10.19

Major Airport Malware Attack Shines a Light on OT Security

Virus

Threatpost

19.10.19

Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent

Attack

Threatpost

19.10.19

Microsoft Tackles Election Security with Bug Bounties

Vulnerebility

Threatpost

19.10.19

Execs Could Face Jail Time For Privacy Violations

Privacy

Threatpost

19.10.19

Systems at Ingredients provider Ingredion infected with a Malware

Virus

Securityaffairs

19.10.19

Trojanized Tor Browser targets shoppers of Darknet black marketplaces

Virus

Securityaffairs
19.10.19

Microsoft to Reward Hackers for Finding Bugs in Open Source Election Software

Vulnerebility

Thehackernews

18.10.19

China-linked cyberspies Turbine PANDA targeted aerospace firms for yearsBigBrothersSecurityaffairs

18.10.19

Pitney Bowes revealed that its systems were infected with Ryuk RansomwareRansomwareSecurityaffairs
18.10.19Ingredients Giant Ingredion Hit by MalwareVirusSecurityweek
18.10.19Hackers Could Have Hijacked Trump Campaign Email ServerBigBrothersSecurityweek
18.10.19Threat Intelligence Firm Flashpoint Raises $34 MillionITSecurityweek

18.10.19

Cryptojacking worm compromised over 2,000 Docker hosts

Cryptocurrency

Net-security

18.10.19

Millions of Amazon Echo and Kindle Devices Affected by WiFi BugVulnerebility

Bleepingcomputer

18.10.19Firefox 70 Address Bar Gets New Security Indicators, Shames Insecure SitesSecurity

Bleepingcomputer

18.10.19Windows 10 1909 Is Almost Ready, What Developers Need to KnowOS

Bleepingcomputer

18.10.19Google News Is Experiencing Indexing Issues With New ContentSecurity

Bleepingcomputer

18.10.19

Attackers Hide Backdoors and Cryptominers in WAV Audio FilesCryptocurrency

Bleepingcomputer

18.10.19Security Health Analytics Helps Secure Google Cloud, Hits BetaSecurity

Bleepingcomputer

18.10.19Unsecured Docker Hosts Attacked by New Graboid Cryptojacking WormCryptocurrency

Bleepingcomputer

18.10.19Malware Uses Your PC to Send 30K Sextortion Emails Per HourSpam  Virus

Bleepingcomputer

18.10.19New SDBot Remote Access Trojan Used in TA505 Malspam CampaignsSpam  Virus

Bleepingcomputer

18.10.19Domain Typosquatters Target the 2020 Presidential ElectionBigBrothers

Bleepingcomputer

18.10.19

Researcher released PoC exploit code for CVE-2019-2215 Android zero-day flawAndroidSecurityaffairs
18.10.19Chinese Hackers Targeted International Aerospace Firms for YearsBigBrothersSecurityweek
18.10.19Massachusetts Governor Announces New Cybersecurity ProgramBigBrothersSecurityweek
18.10.19Researcher Publishes PoC Exploit for Recent Android Zero-DayAndroid  ExploitSecurityweek

18.10.19

Quick Malicious VBS Analysis

Virus

SANS

18.10.19

Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS

Attack  Vulnerebility

Threatpost
18.10.19

Trump Campaign Website Left Open to Email Server Hijack

BigBrothers  Hacking

Threatpost
18.10.19

Cisco Aironet Access Points Plagued By Critical, High-Severity Flaws

Vulnerebility

Threatpost
18.10.19

Phorpiex Botnet Shifts Gears From Ransomware to Sextortion

BotNet

Threatpost
18.10.19

Hacking Back? BriansClub Dark Web Attack a Boon for Banks

Hacking

Threatpost
18.10.19Microsoft Ending Support for Windows 7 and Windows Server 2008 R2CERTCERT
18.10.19Cryptocurrency miners infected more than 50% of the European airport workstationsCryptocurrencySecurityaffairs
18.10.19Critical and high-severity flaws addressed in Cisco Aironet APsVulnerebilitySecurityaffairs
18.10.19Under New Ownership, DigiCert Expands into Verified Mark CertificatesSecuritySecurityweek
18.10.19Pitney Bowes Says Disruptions Caused by Ryuk RansomwareRansomwareSecurityweek
18.10.19Indiana Hospital System Notifying Patients After Data BreachIncindentSecurityweek
18.10.19Russia's Security Service Says Rebuilding Ties With U.S.BigBrothersSecurityweek
18.10.19Chrome for Android Enables Site Isolation Security Feature for All Sites with LoginBigBrothersThehackernews
18.10.19

Six steps for implementing zero trust access

Security

Net-security
18.10.19

Security still top priority as more enterprises scale IoT solutions company-wide

IoT

Net-security
18.10.19

As car manufacturers focus on connectivity, hackers begin to exploit flaws

Exploit  Vulnerebility

Net-security
18.10.19

Review: The Great Hack

Security

Net-security
18.10.19

Companies are shifting spending to support their critical IT initiatives

SecurityNet-security
17.10.19Facebook Encourages Bug Hunting in Third-Party ServicesSocial

Bleepingcomputer

17.10.19OnionShare Lets Anyone Host Anonymous Sites on the Dark WebCyber

Bleepingcomputer

17.10.19Symantec Fixes Bad IPS Definitions That Cause a Windows BSODVulnerebility

Bleepingcomputer

17.10.19Windows 10 1809 Update KB4520062 Fixes a Startup Black Screen IssueOS

Bleepingcomputer

17.10.19cammers Use Fake Checkra1n iOS Jailbreak in Click Fraud CampaignApple

Bleepingcomputer

17.10.19

Adobe Fixes 45 Critical Vulnerabilities in Acrobat and ReaderVulnerebility

Bleepingcomputer

17.10.19What Your Personal Information is Worth to CybercriminalsCyberCrime

Bleepingcomputer

17.10.19Chinese Hackers Use New Cryptojacking Tactics to Evade DetectionCryptocurrency

Bleepingcomputer

17.10.19Samsung Galaxy S10 Fingerprint Reader Defeated by Silicone CaseMobil  Privacy

Bleepingcomputer

17.10.19Linux SUDO Bug Lets You Run Commands as Root, Most Installs UnaffectedHacking

Bleepingcomputer

17.10.19Researcher releases PoC rooting app that exploits recent Android zero-daAndroidNet-security
17.10.19International operation dismantled largest Dark Web Child abuse siteCyberSecurityaffairs
17.10.19Instagram Unveils New Security Controls for Third-Party AppsSocialSecurityweek
17.10.19Dridex Operators Use SDBbot RAT in Recent AttacksVirusSecurityweek
17.10.19Baltimore to Buy $20M in Cyber Insurance Months After AttackAttackSecurityweek

17.10.19

Russian Hackers Silently Hit Government Targets for YearsBigBrothersSecurityweek
17.10.19

Phishing e-mail spoofing SPF-enabled domain

Phishing

SANS
17.10.19

Cisco fixes serious flaws in enterprise-grade Catalyst and Aironet access points

Vulnerebility

Net-security
17.10.19Graboid the first-ever Cryptojacking worm that targets Docker HubCryptocurrencySecurityaffairs
17.10.19M6 Group, largest France private multimedia group, hit by ransomware attackCyberCrime RansomwareSecurityaffairs

17.10.19

Critical Flaw Allows Unauthorized Access to Cisco Aironet APsVulnerebilitySecurityweek

17.10.19

Feds Shut Down Largest Dark Web Child Abuse Site; South Korean Admin ArrestedBigBrothersThehackernews
17.10.19

When MacOS Catalina Comes to Life: The First Few Minutes of Network Traffic From MacOS 10.15.

Apple

SANS

17.10.19Multiple vulnerabilities in Pulse Secure VPNAlertAlert

17.10.19

.WAVs Hide Malware in Their Depths in Innovative Campaign

Virus

Threatpost

17.10.19

Podcast: Departing Employees Could Mean Departing Data

Security

Threatpost

17.10.19

Cybercrime Tool Prices Bump Up in Dark Web Markets

CyberCrime

Threatpost

17.10.19

10 Steps for Ransomware Protection

Ransomware

Threatpost

17.10.19

Silent Librarian Retools Phishing Emails to Hook Student Credentials

Phishing

Threatpost

17.10.19

Docker Containers Riddled with Graboid Crypto-Worm

Cryptocurrency

Threatpost

17.10.19

Huawei Lashes Out at Estonia for 'Unfounded' Security Claims

BigBrothers

Securityweek

17.10.19

German 5G Rules Avoid Huawei Ban; US Warns on Intel Sharing

BigBrothers

Securityweek

17.10.19

'Graboid' Crypto-Jacking Worm Targets Docker Hosts

Cryptocurrency

Securityweek

17.10.19

Oracle's October 2019 Critical Patch Update Includes 219 Fixes

Vulnerebility

Securityweek

17.10.19

Huawei Says Nine-Month Revenue Up Despite US Pressure

BigBrothers

Securityweek

17.10.19

Key challenges impacting IT audit pros navigating an evolving risk landscape

Security

Net-security

17.10.19

MSPs face increased risks and opportunities to rethink cybersecurity

Cyber

Net-security

17.10.19

1 in 5 SMBs have fallen victim to a ransomware attack

Ransomware

Net-security

17.10.19

Executives are not actively engaged in ensuring the effectiveness of cybersecurity strategy

Security

Net-security

17.10.19

Do digital architects have the tools to make the most of transformative technologies?

Security

Net-security

17.10.19

WAV files spotted delivering malicious code

Virus

Net-security

16.10.19

Signature update for Symantec Endpoint protection crashed many deviceVulnerebilitySecurityaffairs

16.10.19

Approaching the Reverse Engineering of a RFID/NFC Vending MachineSecuritySecurityaffairs

16.10.19

WordPress 5.2.4 Patches Six VulnerabilitiesVulnerebilitySecurityweek

16.10.19

Facebook Expands, Enhances Bug Bounty ProgramsSocialSecurityweek

16.10.19

Symantec Endpoint Protection Update Causes Many Devices to CrashSafetySecurityweek

16.10.19

Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked ComputersBotNetThehackernews

16.10.19

Security Monitoring: At Network or Host Level?

Security

SANS

16.10.19

Adobe splats bucketful of bugs in Acrobat and Reader

Vulnerebility

Net-security

16.10.19

APT trends report Q3 2019APTSecurelist

16.10.19

Hundreds of Fake Election Domains Target Democrats, RepublicansBigBrothersSecurityweek

16.10.19

Apple: Safari Does Not Send User Browsing History to China's TencentAppleSecurityweek

16.10.19

Facebook Now Pays Hackers for Reporting Security Bugs in 3rd-Party AppsSocialThehackernews

16.10.19

Fake iOS Jailbreak Site Lures in Apple Users

Apple

Threatpost

16.10.19

A Deepfake Deep Dive into the Murky World of Digital Imitation

Security

Threatpost

16.10.19

Sudo Bug Opens Root Access on Linux Systems

Vulnerebility

Threatpost

16.10.19

Pitney Bowes Hit with Ransomware Attack

Ransomware

Threatpost

16.10.19

Unencrypted Mobile Traffic on Tor Network Leaks PII

Crypto  Safety

Threatpost

16.10.19

On-Board ‘Mystery Boxes’ Threaten Global Shipping Vessels

Security

Threatpost

16.10.19

Chinese-speaking cybercrime gang Rocke changes tactics

BigBrothers  CyberSpy

Securityaffairs

16.10.19

Adobe out-of-band security updates address 82 flaws in 3 products

Vulnerebility

Securityaffairs

16.10.19

Click2Mail suffered a data breach that potentially impacts 200,000 registrants

Incindent

Securityaffairs

16.10.19

YARA's XOR Modifier

Security

SANS

16.10.19

Code dependency mapping’s role in securing enterprise software

Security

Net-security

16.10.19

Microsegmentation for refining safety systems

Safety

Net-security

16.10.19

Fake mobile app fraud tripled in first half of 2019

Mobil

Net-security

16.10.19

When properly managed, shadow IT can benefit your organization

Security

Net-security

16.10.19

How seriously are businesses taking their PKI security?

Security

Net-security

16.10.19

Consumer spending on technology forecast to reach $1.69 trillion in 2019

IT

Net-security

16.10.19

Download: IR Reporting for Management PPT template

Security

Net-security

16.10.19

Tamper Protection prevents malware from disabling Microsoft Defender AV

Safety  Virus

Net-security

16.10.19

“Smart city” governments should also be smart about security

BigBrothers

Net-security

15.10.19

Global Shipping and mailing services firm Pitney Bowes hit by ransomware attack

Ransomware

Securityaffairs

15.10.19

Adobe Patches Over 80 Vulnerabilities in Three Products

Vulnerebility

Securityweek

15.10.19

Fake 'checkra1n' iOS Jailbreak Offered in Click Fraud Scheme

Apple

Securityweek

15.10.19

Researchers Find New Backdoor Used by Winnti Hackers

Virus

Securityweek

15.10.19

Shadow IT Has Benefits Not Yet Fully Utilized by Business

Security

Securityweek

15.10.19

Microsoft Makes Tamper Protection in Defender ATP Generally Available

Security

Securityweek

15.10.19

Google's USB-C Titan Security Key Arrives in the U.S.

Security

Securityweek

15.10.19

Adobe Releases Out-of-Band Security Patches for 82 Flaws in Various Products

Vulnerebility

Thehackernews

15.10.19

Mozilla Rolls Out Code Injection Attack Protection in FirefoxHacking

Bleepingcomputer

15.10.19

Global Shipping Firm Pitney Bowes Affected by Ransomware AttackRansomware

Bleepingcomputer

15.10.19

Facebook Users Being Locked Out After Reporting Fake AccountsSocial

Bleepingcomputer

15.10.19

Microsoft Office 2010 to Reach End of Support in One YearSecurity

Bleepingcomputer

15.10.19

Winnti Group Uses New PortReuse Malware Against Asian ManufacturerCyberCrime  Virus

Bleepingcomputer

15.10.19

Microsoft Now Enables Windows 10 Tamper Protection By DefaultOS

Bleepingcomputer

14.10.19

Iranian Hackers Create Credible Phishing to Steal Library AccessBigBrothers  Phishing

Bleepingcomputer

14.10.19

Sodinokibi Ransomware: Following the Affiliate Money TrailRansomware

Bleepingcomputer

14.10.19

How to Make Windows 10 Pause Updates for a Period of TimeOS

Bleepingcomputer

14.10.19

Creating Custom Windows Sandbox Configurations in Windows 10OS

Bleepingcomputer

14.10.19

Alleged Hacker Arraigned on $1.4 Million Cryptocurrency Fraud ChargesCryptocurrencySecurityweek

14.10.19

Majority of Simjacker Attacks Aimed at Mobile Phones in MexicoAttack  MobilSecurityweek

14.10.19

Thoma Bravo to Acquire Sophos for $3.9 BillionITSecurityweek

14.10.19

Analysis reveals the most common causes behind mis-issued SSL/TLS certificates

Crypto

Net-security

14.10.19

A glimpse into the present state of security in robotics

Security

Securelist

14.10.19

Imperva explains how hackers stole AWS API Key and accessed to customer data

Incindent

Securityaffairs

14.10.19

Talos experts found 11 flaws in Schneider Electric Modicon Controllers

ICS

Securityaffairs

14.10.19

Compromised AWS API Key Allowed Access to Imperva Customer Data

Incindent

Securityweek

14.10.19

Apple Under Fire Over Sending Some Users Browsing Data to China's Tencent

Apple

Thehackernews

14.10.19

Charming Kitten Campaign involved new impersonation methodsCyberCrime

Securityaffairs

14.10.19

Alabama Hospital chain paid ransom to resume operations after ransomware attackRansomware

Securityaffairs

14.10.19

A new Mac malware dubbed Tarmac has been distributed via malvertising campaignsAppleSecurityaffairs

14.10.19

Amazon Calls for Government Regulation of Facial Recognition TechSecuritySecurityweek

14.10.19

5 things security executives need to know about insider threat

Security

Net-security

14.10.19

New data analysis approach could strengthen the security of IoT devices

IoT

Net-security

14.10.19

Researchers may have found a way to trace serial IP hijackers

Security

Net-security

14.10.19

70% of presidential campaigns fail to provide adequate online privacy and security protections

Security

Net-security

14.10.19

Consumers concerned about connected home privacy, still few implement safety practices

Privacy

Net-security

14.10.19

Webinar: Securing Web Layer Assets with Cloud WAF

Security

Net-security

13.10.19

Nitro PDF Pro to Get Micropatches for 7 Potential RCE Bugs

Vulnerebility

Bleepingcomputer

13.10.19

Attackers Create Elaborate Crypto Trading Scheme to Install Malware

Cryptocurrency

Bleepingcomputer

13.10.19

Windows 10 1903: Known Problems in the KB4517389 Update

OS

Bleepingcomputer

13.10.19

FIN7 Hackers Load New RAT Malware Into ATM Maker's Software

CyberCrime  Virus

Bleepingcomputer

13.10.19

Nemty 1.6 Ransomware Released and Pushed via RIG Exploit Kit

Ransomware

Bleepingcomputer

13.10.19

Windows 10 1909 is Getting "Ready for Release", Named November 2019 Update

OS

Bleepingcomputer

13.10.19

Ransom NewsRansomRansom

13.10.19

Leafly Cannabis information platform suffered a data leakIncindent

Securityaffairs

13.10.19

FIN7 Hackers group is back with a new loader and a new RATCyberCrime  Virus

Securityaffairs

13.10.19

SIM cards used in 29 countries are vulnerable to Simjacker attackAttack  MobilSecurityaffairs

13.10.19

SIM Cards in 29 Countries Vulnerable to Remote Simjacker AttacksAttack  MobilThehackernews

13.10.19

YARA v3.11.0 released

Security

SANS

12.10.19

Attackers Use New, Sophisticated Ways to Install Cryptominers

Cryptocurrency blog

F5 Labs

12.10.19

Staying Hidden on the Endpoint: Evading Detection with Shellcode

Malware blog

FireEye

12.10.19

IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software

Security blog

FireEye

12.10.19

Living off the Orchard: Leveraging Apple Remote Desktop for Good and Evil

OS Blog

FireEye

12.10.19

Mahalo FIN7: Responding to the Criminal Operators’ New Tools and Techniques

Hacking blog

FireEye

12.10.19

7th October – Threat Intelligence Bulletin

Cyber blog

Checkpoint

12.10.19

The story of Adobe Reader symbols

Vulnerebility blog

Project Zero

12.10.19

New IDA Pro plugin provides TileGX support

Security blog

Cisco Talos

12.10.19

Talos takes home top research honors at Virus Bulletin conference

Security blog

Cisco Talos

12.10.19

Vulnerability Spotlight: Multiple remote code execution bugs in NitroPDF

Vulnerebility blog

Cisco Talos

12.10.19

Vulnerability spotlight: Multiple vulnerabilities in Schneider Electric Modicon M580

Vulnerebility blog

Cisco Talos

12.10.19

Microsoft Patch Tuesday — Oct. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

12.10.19

EU warns of cyber‑risks as 5G looms

BigBrother blog

Eset

12.10.19

ESET discovers Attor, a spy platform with curious GSM fingerprinting

Cyber blog  Malware blog

Eset

12.10.19

How concerned are you about the privacy challenges of your IoT devices?

IoT blog

Eset

12.10.19

Internet pioneer Dr. Paul Vixie on global internet security

Security blog

Eset

12.10.19

Inside consumer perceptions of security and privacy in the connected home

Security blog

Eset

12.10.19

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

Attack blog

Eset

12.10.19

Windows 10 Update Assistant Vulnerability Needs Manual Fix, Here's How

OS

Bleepingcomputer

12.10.19

Leafly Cannabis Website Leaked User Info via Exposed Database

Incindent

Bleepingcomputer

12.10.19

Windows 10 1703 is Now End of Service, No More Security Updates

OS

Bleepingcomputer

12.10.19

Microsoft Improves Azure Active Directory Security with New Roles

Security

Bleepingcomputer

12.10.19

Almost 50% of Company Network Traffic Comes From Bots, Report Says

BotNet

Bleepingcomputer

12.10.19

Oracle Cancels Venezuela Partner Contracts Citing US Sanctions

BigBrothers

Bleepingcomputer

12.10.19

Nemty Ransomware Decryptor Released, Recover Files for Free

Ransomware

Bleepingcomputer

12.10.19

New Malware Spies on Diplomats, High-Profile Government Targets

CyberSpy  Virus

Bleepingcomputer

12.10.19

Hacker Selling User Info Stolen From Prostitution Forums

Hacking

Bleepingcomputer

12.10.19

Apple Software Update Zero-Day Used by BitPaymer Ransomware

Apple  Ransomware

Bleepingcomputer

12.10.19

Iran-Linked ‘Charming Kitten’ Touts New Spearphishing Tactics

BigBrothers

Threatpost

12.10.19

China’s Sway Over Tech Companies Tested with Apple, Blizzard

BigBrothers

Threatpost

12.10.19

Software, Supply-Chain Dangers Top List of 5G Cyber Risks

Mobil

Threatpost

12.10.19

Imperva: Data Breach Caused by Cloud Misconfiguration

Incindent

Threatpost

12.10.19

Fin7 Cybergang Retools With New Malicious Code

CyberCrime

Threatpost

12.10.19

Tens of million PCs potentially impacted by a flaw in HP Touchpoint Analytics

Vulnerebility

Securityaffairs

12.10.19

'Attor' Cyber-Espionage Platform Used in Attacks Aimed at Russia

BigBrothers  CyberSpy

Securityweek

12.10.19

Google Patches 8 Vulnerabilities in Chrome 77

Vulnerebility

Securityweek

11.10.19

Iran-Linked ‘Charming Kitten’ Touts New Spearphishing Tactics

BigBrothers

Threatpost

11.10.19

China’s Sway Over Tech Companies Tested with Apple, Blizzard

BigBrothers

Threatpost

11.10.19

Software, Supply-Chain Dangers Top List of 5G Cyber Risks

Mobil

Threatpost

11.10.19

Imperva: Data Breach Caused by Cloud Misconfiguration

Incindent

Threatpost

11.10.19

Fin7 Cybergang Retools With New Malicious Code

CyberCrime

Threatpost

11.10.19

Tens of million PCs potentially impacted by a flaw in HP Touchpoint Analytics

Vulnerebility

Securityaffairs

11.10.19

'Attor' Cyber-Espionage Platform Used in Attacks Aimed at Russia

BigBrothers  CyberSpy

Securityweek

11.10.19

Google Patches 8 Vulnerabilities in Chrome 77

Vulnerebility

Securityweek

11.10.19

Researchers released a free decryptor for the Nemty Ransomware

Ransomware

Securityaffairs

11.10.19

Top cybersecurity certifications to consider for your IT career

Cyber

Securityaffairs

11.10.19

Hospitals Resume Accepting Patients After Malware Attack

Virus

Securityweek

11.10.19

NIST and Microsoft Partner to Improve Enterprise Patching Strategies

Safety

Securityweek

11.10.19

New Blockchain Solution for IIoT Aims to Solve Scaling Problem

Cryptocurrency

Securityweek

11.10.19

UNIX Co-Founder Ken Thompson's BSD Password Has Finally Been Cracked

Hacking

Thehackernews

11.10.19

HP Touchpoint Analytics LPE Vulnerability Affects Most HP PCs

Vulnerebility

Bleepingcomputer

11.10.19

iTerm2 Patches Critical Vulnerability Active for 7 Years

Apple

Bleepingcomputer

11.10.19

Singapore Man Faces 34 Years for Amazon AWS Cryptomining Fraud

Crime  Cryptocurrency

Bleepingcomputer

11.10.19

Phishing Incident Exposes Medical, Personal Info of 60K Patients

Phishing

Bleepingcomputer

11.10.19

EU Member States Publish Joint Report on 5G Networks Security

BigBrothers  Mobil

Bleepingcomputer

11.10.19

Games and Utility Apps in Play Store Hide Bankers and Spyware

Android

Bleepingcomputer

11.10.19

New Microsoft NTLM Flaws May Allow Full Domain Compromise

Vulnerebility

Bleepingcomputer

11.10.19

Beware of Fake Amazon AWS Suspension Emails for Unpaid Bills

Spam

Bleepingcomputer

11.10.19

C is for Credit Card: MageCart Hits Volusion E-Commerce Sites

CyberCrime

Bleepingcomputer

11.10.19

Windows 10 Insider Build 18999 Gives all Insiders a Resizable Cortana

OS

Bleepingcomputer

11.10.19

Imperva explains how their recent security incident happened

Security

Net-security

11.10.19

Hacker breached escort forums in Italy and the Netherlands and is selling user dataHacking  IncindentSecurityaffairs

11.10.19

Sophos fixed a critical vulnerability in Cyberoam firewallsVulnerebilitySecurityaffairs

11.10.19

Magecart Attack on eCommerce Platform Hits Thousands of Online ShopsCyberCrimeSecurityweek

11.10.19

vBulletin Flaw Exploited in Dutch Sex-Work Forum Breach

Vulnerebility

Threatpost

11.10.19

Cryptomining Crook Steals Game Developer’s Identity to Carry Out Dirty Work

Cryptocurrency

Threatpost

11.10.19

Sophisticated Spy Kit Targets Russians with Rare GSM Plugin

BigBrothers  CyberSpy  Mobil

Threatpost

11.10.19

DevSecOps role expansion has changed how companies address their security posture

Security

Net-security

11.10.19

11 steps organizations should take to improve their incident response strategy

Incindent

Net-security

11.10.19

iTunes Zero-Day flaw exploited by the gang behind BitPaymer ransomware

Apple  Ransomware

Securityaffairs

11.10.19

Attor malware was developed by one of the most sophisticated espionage groups

CyberSpy  Virus

Securityaffairs

11.10.19

Flaw in HP Touchpoint Analytics Could Impact Many PCs

Vulnerebility

Securityweek

11.10.19

Apple iTunes and iCloud for Windows 0-Day Exploited in Ransomware Attacks

Apple  Exploit  RansomwareThehackernews

11.10.19

ICS cybersecurity investment should be a priority in protecting operations from disruption

ICS

Net-security

11.10.19

New method validates the integrity of computer chips using x-rays

IT

Net-security

11.10.19

5G is here, now what?

Mobil

Net-security

11.10.19

Microsoft NTLM vulnerabilities could lead to full domain compromise

Vulnerebility

Net-security

10.10.19

iTerm2 with tmux integration is vulnerable to remote command executionAlertAlert

10.10.19

SAP October 2019 Security Patch Day fixes 2 critical flawsVulnerebilitySecurityaffairs

10.10.19

Tor Project is going to remove End-Of-Life relays from the networkSecuritySecurityaffairs

10.10.19

Amnesty claims that 2 Morocco rights advocates were targeted by NSO Group spywareBigBrothersSecurityaffairs

10.10.19

Ops, popular iTerm2 macOS Terminal App is affected by a critical RCE since 2012Apple  VulnerebilitySecurityaffairs

10.10.19

iTunes Zero-Day Vulnerability Exploited by BitPaymer RansomwareRansomware  VulnerebilitySecurityweek

10.10.19

Singaporean Indicted in U.S. for Illegal Crypto-MiningBigBrothers  CryptocurrencySecurityweek

10.10.19

Tor to Reject End-of-Life Relays by DefaultSecuritySecurityweek

10.10.19

Spanish Court Probes Alleged Spying of Assange at Ecuadorian EmbassyBigBrothersSecurityweek

10.10.19

Cisco Finds 11 Vulnerabilities in Schneider Electric Modicon ControllersVulnerebilitySecurityweek

10.10.19

Morocco Rights Advocates Targeted by Spyware: AmnestyBigBrothersSecurityweek

10.10.19

China’s Sway Over Tech Companies Tested with Apple, Blizzard

Apple  BigBrothers

Threatpost

10.10.19

Apple iTunes Bug Actively Exploited in BitPaymer/iEncrypt Campaign

Apple

Threatpost

10.10.19

HP Touchpoint Analytics Opens PCs to Code Execution Attack

Attack  Exploit

Threatpost

10.10.19

Most Americans Fail Cybersecurity Quiz

Cyber

Threatpost

10.10.19

Gamers Warned of High-Severity Intel, Nvidia Flaws

Vulnerebility

Threatpost

10.10.19

Privacy Groups: Ring’s Police Partnerships Can Lead to Sinister Ends

BigBrothers  Privacy

Threatpost

10.10.19

Twitter Uses Phone Numbers, Emails to Sell Ads

Social

Threatpost

10.10.19

Mining Live Networks for OUI Data Oddness

Cryptocurrency

SANS

10.10.19

Microsoft NTLM vulnerabilities could lead to full domain compromise

Vulnerebility

Net-security

10.10.19

2FA, HTTPS and private browsing still a mystery to most Americans

Security

Net-security

10.10.19

Critical command execution vulnerability in iTerm2 patched, upgrade ASAP!

Vulnerebility

Net-security

10.10.19

Multiple APT groups are exploiting VPN vulnerabilities, NSA warns

APT

Securityaffairs

10.10.19

vBulletin addresses three new high-severity vulnerabilities

Vulnerebility

Securityaffairs

10.10.19

Hackers compromised Volusion infrastructure to siphon card details from thousands of sites

CyberCrime  Hacking

Securityaffairs

10.10.19

Twitter inadvertently used Phone Numbers collected for security for Ads

Social

Securityaffairs

10.10.19

Researchers discovered a code execution flaw in NSA GHIDRA

Vulnerebility

Securityaffairs

10.10.19

SAP Patches Critical Vulnerabilities With October 2019 Security Updates

Vulnerebility

Securityweek

10.10.19

Ransomware Attacks 'Getting Bolder': Europol

Ransomware

Securityweek

10.10.19

EU Hints at Huawei Risk in 5G Security Assessment

BigBrothers  Mobil

Securityweek

10.10.19

Iranian Hackers Update Spear-Phishing Techniques in Recent Campaign

BigBrothers  Phishing

Securityweek

10.10.19

Audit Finds Critical Vulnerability in iTerm2 macOS Terminal Emulator

Apple

Securityweek

10.10.19

Many in Utilities Sector Expect Attacks on Critical Infrastructure: Survey

ICS

Securityweek

10.10.19

Pass the Hash Remains a Poorly Defended Threat Vector

Security

Securityweek

10.10.19

Cybersecurity Firms Partner on Open Source Security Technology Development

Security

Securityweek

10.10.19

NSA: Multiple State-Sponsored APTs Exploiting Enterprise VPN Flaws

BigBrothers

Securityweek

10.10.19

Apple Patches 16 Vulnerabilities With macOS Catalina 10.15

Apple

Securityweek

10.10.19

No Patch for Critical Code Execution Flaw Affecting D-Link Routers

Vulnerebility

Securityweek

10.10.19

7-Year-Old Critical RCE Flaw Found in Popular iTerm2 macOS Terminal App

Apple

Thehackernews

10.10.19

Breaches are now commonplace, but Reason Cybersecurity lets users guard their privacy

Safety

Thehackernews

10.10.19

Build or buy: What to consider when deploying on-premise or cloud-based PKI

Crypto

Net-security

10.10.19

Cybercrime is maturing, shifting its focus to larger and more profitable targets

CyberCrime

Net-security

10.10.19

Only 32% of organizations employ a security-first approach to cloud data storage

Security

Net-security

10.10.19

Does poor password hygiene still hamper your ability to achieve high security standards?

Cyber

Net-security

10.10.19

Impact and prevalence of cyberattacks that use stolen hashed administrator credentials

Cyber

Net-security

9.10.19

Twitter Apologizes for Using Your Phone Number for AdvertisingSocial

Bleepingcomputer

9.10.19

Windows 10 Servicing Stack Updates Fix Secure Boot IssuesOS

Bleepingcomputer

9.10.19

Windows 10 Cumulative Update KB4517389 & KB4519338 ReleasedOS

Bleepingcomputer

9.10.19

Microsoft Releases the October 2019 Security Updates for OfficeOS

Bleepingcomputer

9.10.19

Microsoft's October 2019 Patch Tuesday Fixes 59 VulnerabilitiesOS

Bleepingcomputer

9.10.19

Microsoft Blocks Credential Theft Attack Targeting Dozens of OrgsCyberCrime

Bleepingcomputer

9.10.19

Researcher Adds $100,000 Worth of Credit to Voi E-Scooter AppSecurity

Bleepingcomputer

9.10.19

57% of Businesses Use Multi-Factor Auth (MFA), Says LastPassCrypto  Safety

Bleepingcomputer

9.10.19

Windows 10 1803 Users Warned to Update Before End of SupportOS

Bleepingcomputer

9.10.19

Hackers Patch Web Browsers to Track Encrypted TrafficHacking  Crypto  Vulnerebility

Bleepingcomputer

9.10.19

Multiple vulnerabilities found in the Cobham EXPLORER 710 satcom terminalAlert

Bleepingcomputer

9.10.19

Twitter 2FA phone numbers “inadvertently” used for advertising purposes

Social

Bleepingcomputer

9.10.19

Twitter inadvertently used Phone Numbers collected for security for Ads

Social

Bleepingcomputer

9.10.19

Researchers discovered a code execution flaw in NSA GHIDRA

Vulnerebility

Bleepingcomputer

9.10.19

Apple Patches 16 Vulnerabilities With macOS Catalina 10.15

Apple

Bleepingcomputer

9.10.19

No Patch for Critical Code Execution Flaw Affecting D-Link Routers

Vulnerebility

Bleepingcomputer

9.10.19

You Gave Your Phone Number to Twitter for Security and Twitter Used it for Ads

Mobil  Social

Thehackernews

9.10.19

October 2019 Patch Tuesday: A small batch of updates from Microsoft, none from Adobe

Vulnerebility

Net-security

9.10.19

Winning the security fight: Tips for organizations and CISOs

Security

Net-security

9.10.19

APT Groups Exploiting Flaws in Unpatched VPNs, Officials Warn

APT

Threatpost

9.10.19

Intimate Details on Healthcare Workers Exposed as Cloud Security Lags

Security

Threatpost

9.10.19

Critical Microsoft Remote Desktop Flaw Fixed in Security Update

Vulnerebility

Threatpost

9.10.19

Apple Tackles Over a Dozen Bugs in its Catalina 10.15 Update

Apple

Threatpost

9.10.19

Sextortionists Get Past Defenses with Cryptocurrency Shift

Cryptocurrency

Threatpost

9.10.19

Google October Android Security Update Fixes Critical RCE Flaws

Android  Vulnerebility

Threatpost

9.10.19

MS October 2019 Patch Tuesday updates address 59 flaws

Vulnerebility

Securityaffairs

9.10.19

New US-UK Agreement Speeds Law Enforcement's Access to User Data

BigBrothers

Securityweek

9.10.19

Twitter Admits Phone Numbers Meant for Security Used for Ads

Mobil  Social

Securityweek

9.10.19

VMware Completes $2.1 Billion Acquisition of Carbon Black

IT

Securityweek

9.10.19

Vulnerabilities Expose TwinCAT Industrial Systems to DoS Attacks

Attack  Vulnerebility

Securityweek

9.10.19

Email Attacks Using Cloud Services are Increasing

Spam

Securityweek

9.10.19

Microsoft Patches 60 Flaws With October 2019 Security Updates

Vulnerebility

Securityweek

9.10.19

Microsoft Releases October 2019 Patch Tuesday Updates

Vulnerebility

Thehackernews

9.10.19

What data does Vidar malware steal from an infected host?

Virus

SANS

9.10.19

Digital transformation requires an aggressive approach to security

Security

Net-security

9.10.19

Phishing attempts increase 400%, many malicious URLs found on trusted domains

Phishing  Virus

Net-security

9.10.19

Majority of IT departments leave major holes in their USB drive security

Security

Net-security

9.10.19

BEC explodes as attackers exploit email’s identity crisis

Spam

Net-security

8.10.19

Experts found a link between a Magecart group and Cobalt GroupCyberCrimeSecurityaffairs

8.10.19

2020 Presidential Candidate Campaign Websites Fail On User PrivacyBigBrothers  PrivacySecurityweek

8.10.19

Google Patches Remote Code Execution Bugs in Android 10AndroidSecurityweek

8.10.19

Code Execution Vulnerability Impacts NSA Reverse Engineering ToolVulnerebilitySecurityweek

8.10.19

Managed Detection and Response analytics report, H1 2019AnalysisSecurelist

8.10.19

Developer hacked back Muhstik ransomware crew and released keysRansomwareSecurityaffairs

8.10.19

Preview: SecurityWeek's 2019 ICS Cyber Security Conference (Oct. 21-24 | Atlanta)CongressSecurityweek

8.10.19

vBulletin Releases Patch Update for New RCE and SQLi VulnerabilitiesVulnerebilityThehackernews

8.10.19

Adobe Suspends Accounts for All Venezuela Users Citing U.S. SanctionsVulnerebilityThehackernews

8.10.19

macOS Catalina: Security and privacy improvements

Apple

Net-security

8.10.19

Muhstik DecryptorAnti-Ramson ToolAnti-Ramson Tool

8.10.19

Credit Info Exposed in TransUnion Credential Stuffing AttackAttack  Incindent

Bleepingcomputer

8.10.19

Adobe To Ban Users From Venezuela Due to U.S. Executive OrderBigBrothers

Bleepingcomputer

8.10.19

1 Million People Had Their Medical Data Exposed in Tū Ora BreachIncindent

Bleepingcomputer

8.10.19

RobbinHood Ransomware Using Street Cred to Make Victims PayRansomware

Bleepingcomputer

8.10.19

Muhstik Ransomware Victim Hacks Back, Releases Decryption KeysRansomware

Bleepingcomputer

8.10.19

Some Windows 10 Users Can't Use Firefox for DownloadsOS

Bleepingcomputer

8.10.19

DCH Hospital Pays Ryuk Ransomware for Decryption KeyRansomware

Bleepingcomputer

8.10.19

Check If You Are in the Sephora and StreetEasy Data BreachesIncindent

Bleepingcomputer

8.10.19

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Apple  Vulnerebility

Threatpost

8.10.19

Alabama Hospitals Pay Up in Ransomware Attack

Ransomware

Threatpost

8.10.19

D-Link Home Routers Open to Remote Takeover Will Remain Unpatched

Vulnerebility

Threatpost

8.10.19

Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says

APT  BigBrothers

Threatpost

8.10.19

Users reported problems with patches for CVE-2019-1367 IE zero-day

Vulnerebility

Securityaffairs

8.10.19

Hackers continue to exploit the Drupalgeddon2 flaw in attacks in the wild

Exploit  Hacking

Securityaffairs

8.10.19

Magecart Group Tied to Cobalt Hackers

CyberCrime

Securityweek

8.10.19

Unmask cybercriminals through identity attribution

CyberCrime

Net-security

8.10.19

Product showcase: Awake Security Network Traffic Analysis Platform

Security

Net-security

8.10.19

Organizations need tools that support DevOps security

Security

Net-security

8.10.19

Internal user mistakes create large percentage of cybersecurity incidents

Incindent

Net-security

8.10.19

Report: 2019 eSentire Threat Intelligence Spotlight

Security

Net-security

7.10.19

D-Link router models affected by remote code execution issue that will not be fixedVulnerebilitySecurityaffairs

7.10.19

Patches for Internet Explorer Zero-Day Causing Problems for Many UsersVulnerebilitySecurityweek

7.10.19

NIST's Zero Trust Taxonomy Introduces Components, Threats and Migration RoutesBigBrothers  SafetySecurityweek

7.10.19

US will help Baltic states to secure baltic energy gridBigBrothersSecurityaffairs

7.10.19

New Campaign Targets Drupalgeddon2 Flaw to Install MalwareVirusSecurityweek

7.10.19

Signal Rushes to Patch Serious Eavesdropping VulnerabilityVulnerebilitySecurityweek

7.10.19

Cisco closes high-impact vulnerabilities in its security offerings

Vulnerebility

Net-security

7.10.19

Data from Sephora and StreetEasy data breaches added to HIBPIncindentSecurityaffairs

7.10.19

Hitbsecconf2019 ConferenceConference PressConference Press

7.10.19

Virus Bulletin 2019 ConferenceConference PressConference Press

7.10.19

PoS malware infections impacted four restaurant chains in the U.S.VirusSecurityaffairs

7.10.19

U.S. to Help Secure Baltic Energy Grid Against Cyber AttacksBigBrothersSecurityweek

7.10.19

Iranian Hackers Said to Target Presidential CampaignAPT  BigBrothersSecurityweek

7.10.19

Cloud-native applications need a unified continuous security approach

Security

Net-security

7.10.19

Insider threats are security’s new reality: Prevention solutions aren’t working

Security

Net-security

7.10.19

Consumers have concerns about cybersecurity, value education on best practices

Cyber

Net-security

7.10.19

The top 10 strategic government technology trends CIOs should plan for

Security

Net-security

7.10.19

64% of IT decision makers have reported a breach in their ERP systems in the past 24 months

Incindent

Net-security

7.10.19

Whitepaper: Identifying Web Attack Indicators

Attack

Net-security

6.10.19

HildaCrypt DecryptorAnti-Ramson ToolAnti-Ramson Tool

6.10.19

Ransom NewsRansomRansom

6.10.19

HildaCrypt Ransomware Developer Releases Decryption KeysRansomware

Bleepingcomputer

6.10.19

Windows 10 KB4524147 Update May Cause Boot and Printing IssuesOS

Bleepingcomputer

6.10.19

Iran-linked Phosphorus group hit a 2020 presidential campaignAPT

Securityaffairs

6.10.19

UK NCSC agency warns of APTs exploiting Enterprise VPN vulnerabilitiesAPT  BigBrothers

Securityaffairs

6.10.19

Hacker is auctioning a database containing details of 92 million BraziliansIncindent

Securityaffairs

6.10.19

visNetwork for Network Data

Security

SANS

6.10.19

A bug in Signal for Android could be exploited to spy on users

Android  Exploit

Securityaffairs

6.10.19

Magecart hackers are expanding their operations

CyberCrime

Securityaffairs

6.10.19

NSA Launches New Cybersecurity Directorate

BigBrothers

Securityaffairs

6.10.19

Signal Messenger Bug Lets Callers Auto-Connect Calls Without Receivers' Interaction

Social

Thehackernews

5.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – The All-Stars

Ransomware blog

Mcafee blog

5.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us

Ransomware blog

Mcafee blog

5.10.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in August 2019

Security blog

F5 Labs

5.10.19

Tricky Trickbot Runs Campaigns Without Redirection 

Malware blog

F5 Labs

5.10.19

Head Fake: Tackling Disruptive Ransomware Attacks

Ransomware blog

FireEye

5.10.19

IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software

Security blog

FireEye

5.10.19

The Eye on the Nile

Phishing blog

Checkpoint

5.10.19

More Hidden App Malware Found on Google Play with over 2.1 Million Downloads

OS Blog  Malware blog

Symantec

5.10.19

Open Document format creates twist in maldoc landscape

Malware blog

Cisco Talos

5.10.19

Vulnerability Spotlight: Foxit PDF Reader JavaScript Array.includes remote code execution vulnerability

Vulnerebility blog

Cisco Talos

5.10.19

Hospitals in US, Australia hobbled by ransomware

Ransomware blog

Eset

5.10.19

Casbaneiro: Dangerous cooking with a secret ingredient

Cyber blog

Eset

5.10.19

Do apps need all the permissions?

Security blog

Eset

5.10.19

Cyber Security Awareness Month starts today!

Cyber blog

Eset

5.10.19

Dutch Govt Explains the Risks Behind DNS-Over-HTTPS Move

BigBrothers

Bleepingcomputer

5.10.19

UAB Medicine Data Breach Exposes Patient Info in Phishing Attack

Incindent  Phishing

Bleepingcomputer

5.10.19

Microsoft Discovers Iranian Hacking Campaign Targeting U.S. Politics

BigBrothers

Bleepingcomputer

5.10.19

Windows 10 KB4524147 Cumulative Update Breaks the Start Menu

OS

Bleepingcomputer

5.10.19

Actively Exploited Android Zero-Day Impacts Google, Samsung Devices

Android  Vulnerebility

Bleepingcomputer

5.10.19

Magecart Impacts Hundreds of Thousands of Websites, Still Growing

CyberCrime

Bleepingcomputer

5.10.19

Novter Trojan Sets its Sights on Microsoft Windows Defender

Virus

Bleepingcomputer

5.10.19

Details of 92 Million Brazilians Auctioned on Underground Forums

Incindent

Bleepingcomputer

5.10.19

Australian Govt Issues Android and iOS Security Hardening Guides

Android  BigBrothers

Bleepingcomputer

5.10.19

Four U.S. Food Chains Disclose Payment Card Theft via PoS Malware

Virus

Bleepingcomputer

5.10.19

Virus Bulletin 2019: VoIP Espionage Campaign Hits U.S. Utilities Supplier

Congress

Threatpost

5.10.19

AG Barr, Officials to Facebook: Don’t Encrypt Messaging

Crypto  Social

Threatpost

5.10.19

Google Warns of Android Zero-Day Bug Under Active Attack

Android  Attack

Threatpost

5.10.19

Virus Bulletin 2019: Magecart Infestations Saturate the Web

Congress

Threatpost

5.10.19

APTs Exploiting Enterprise VPN Vulnerabilities, UK Govt Warns

APT  BigBrothers  Vulnerebility

Securityweek

4.10.19

Microsoft: Any form of MFA takes users out of reach of most attacks

Attack

Net-security

4.10.19

The sLoad Threat: Ten Months Later

Virus

Securityaffairs

4.10.19

Project Zero researcher found unpatched Android zero-day likely exploited by NSO group

Android  Vulnerebility

Securityaffairs

4.10.19

Egypt regularly spies on opponents and activists with mobile apps

BigBrothers  CyberSpy  Mobil

Securityaffairs

4.10.19

Zero-Day Used in the Wild Impacts Pixel 2, Other Android Phones

Android

Securityweek

4.10.19

Moe's, McAlister's, Schlotzsky's Restaurants Hit by Payment Card Breach

Incindent

Securityweek

4.10.19

WhatsApp Flaw Allows Remote Code Execution via Malicious GIF File

Social  Virus

Securityweek

4.10.19

New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild

Android  Exploit

Thehackernews

4.10.19

Unpatched Android flaw exploited by attackers, impacts Pixel, Samsung, Xiaomi devices

Vulnerebility

Net-security

4.10.19

'Lost Files' Data Wiper Poses as a Windows Security ScannerSecurity

Bleepingcomputer

4.10.19

Google Chrome to Gradually Start Blocking Mixed Content by DefaultSecurity

Bleepingcomputer

4.10.19

Windows 10 Insider Build 18995 Adds PIN Sign-ins to Safe ModeOS

Bleepingcomputer

4.10.19

Microsoft Releases Windows Security Updates to Fix Printing IssueOS

Bleepingcomputer

4.10.19

Office 365 Admins Can Now Block Malicious Microsoft Query IQY FilesOS

Bleepingcomputer

4.10.19

Cyber-Spy Group Active Since 2013 Now Tied to Chinese State ActorAPT  CyberSpy

Bleepingcomputer

4.10.19

Windows Activator Bundles Banker with C2 in YouTube DescriptionSecurity

Bleepingcomputer

4.10.19

Police Seize Bot Farm Behind Potentially Fatal Scam MessagesBigBrothers  BotNet

Bleepingcomputer

4.10.19

FTCode PowerShell Ransomware Resurfaces in Spam CampaignRansomware

Bleepingcomputer

4.10.19

FBI Warns U.S. Organizations About High Impact RansomwareBigBrothers  Ransomware

Bleepingcomputer

4.10.19

6 cyber-espionage campaigns since 2013 attributed to PKPLUG China-linked group

APT  CyberSpy

Securityaffairs

4.10.19

FBI warns about high-impact Ransomware attacks on U.S. Organizations

BigBrothers  Ransomware

Securityaffairs

4.10.19

Ukrainian police dismantled a bot farm involved in multiple spam campaigns

BigBrothers  Spam

Securityaffairs

4.10.19

Turkey Fines Facebook for Breach of Data Protection Laws

Incindent  Social

Securityweek

4.10.19

Officials Push Facebook for Way to Peek at Encrypted Messages

Crypto  Social

Securityweek

4.10.19

Researcher Shows How Adversaries Can Gather Intel on U.S. Critical Infrastructure

ICS

Securityweek

4.10.19

Adwind Malware Used in Attacks Against U.S. Petroleum Firms

Virus

Securityweek

4.10.19

Alabama Hospital System Halts Admissions Amid Malware Attack

Virus

Securityweek

4.10.19

WhatsApp Flaw Opens Android Devices to Remote Code Execution

Vulnerebility

Threatpost

4.10.19

New Reductor Malware Hijacks HTTPS Traffic

Virus

Threatpost

4.10.19

Foxit PDF Reader Vulnerable to 8 High-Severity Flaws

Vulnerebility

Threatpost

4.10.19

Buffer overflows found in libpcap and tcpdump

Vulnerebility

SANS

4.10.19

Enterprises leaving themselves vulnerable to cyberattacks by failing to prioritize PKI security

Crypto  Safety  Vulnerebility

Net-security

4.10.19

Educational organizations massively vulnerable to cyber attacks

Cyber  Vulnerebility

Net-security

4.10.19

Being compliant with laws and regulations is not a guarantee against data breaches

Incindent

Net-security

3.10.19

Microsoft 365 To Get Tenant-Wide Feature Preventing Info ExposureOS

Bleepingcomputer

3.10.19

Microsoft Launches New Dual-Screen Surface DevicesOS

Bleepingcomputer

3.10.19

Windows 10X: Microsoft's New Windows OS for Dual-Screen PCsOS

Bleepingcomputer

3.10.19

Zendesk Security Breach May Impact Orgs Like Uber, Slack, and FCCIncindent

Bleepingcomputer

3.10.19

Sodinokibi Ransomware Builds An All-Star Team of AffiliatesRansomware

Bleepingcomputer

3.10.19

Threat Group Uses Bit.ly, BlogSpot, Pastebin to Deliver Trojans, RATsVirus

Bleepingcomputer

3.10.19

American Express Customer Info Accessed by Employee for Possible FraudIncindent

Bleepingcomputer

3.10.19

New Silent Starling Gang Targets 500+ Vendors in BEC Scam TwistSocial

Bleepingcomputer

3.10.19

Google Expands Privacy Controls Across Youtube, Maps, and AssistantPrivacy

Bleepingcomputer

3.10.19

Google's Password Manager Now Warns About Compromised AccountsSafety

Bleepingcomputer

3.10.19

Of All State-Backed Hackers, the Chinese Hit Most IndustriesBigBrothers

Bleepingcomputer

3.10.19

Fake Browser Updates Infect Enterprises with Ransomware, BankersRansomware

Bleepingcomputer

3.10.19

COMpfun successor Reductor infects files on the fly to compromise TLS trafficCryptoSecurelist

3.10.19

Dutch police shut down bulletproof service hosting tens of DDoS botnetsAttack  BigBrothersSecurityaffairs

3.10.19

Zendesk Discloses Old Data Breach Affecting 10,000 AccountsIncindentSecurityweek

3.10.19

Just a GIF Image Could Have Hacked Your Android Phone Using WhatsAppAndroid  SocialThehackernews

3.10.19

Microsoft will continue providing Windows 7 security updates for SMBs

OS

Net-security

3.10.19

Virus Bulletin 2019: Japanese Attacks Highlight Savvy APT Strategy

Congress

Threatpost

3.10.19

Virus Bulletin 2019: Geost Android Botnet Goes After Millions of Euros

Congress

Threatpost

3.10.19

Hack Breaks PDF Encryption, Opens Content to Attackers

Crypto

Threatpost

3.10.19

Zendesk Exposes 10,000 Accounts to Unknown Third Party

Incindent

Threatpost

3.10.19

Why This New Cybergang is Heralding a New Age For BEC

CyberCrime  Spam

Threatpost

3.10.19

Google Adds Password Checkup Feature to Chrome Browser

Safety

Threatpost

3.10.19

HQWar: the higher it flies, the harder it drops

Virus

Securelist

3.10.19

US Secretary of State Mike Pompeo warns Italy over 5G Chinese equipment supply

BigBrothers

Securityaffairs

3.10.19

Zendesk 2016 security breach may impact Uber, Slack, and other organizations

Incindent

Securityaffairs

3.10.19

Expert disclosed details of remote code execution flaw in Whatsapp for Android

Android  Social

Securityaffairs

3.10.19

Former American Express employee under investigation for customers’ data abuse

Incindent

Securityaffairs

3.10.19

U.S. to Collect DNA of All Undocumented Migrants

BigBrothers

Securityweek

3.10.19

MasterMana Campaign Combines Stealth, Free Services and Old Malware

Virus

Securityweek

3.10.19

Google Expands Use of Password Checkup Tool, Unveils New Privacy Features

Safety

Securityweek

3.10.19

US Warns Italy Over China and 5G

Mobil

Securityweek

3.10.19

"Lost_Files" Ransomware

Ransomware

SANS

3.10.19

Good cybersecurity comes from focusing on the right things, but what are they?

Security

Net-security

3.10.19

How security programs and breach history influence company valuations

Security

Net-security

3.10.19

Executives have to make cybersecurity a priority in order to secure their business

Security

Net-security

3.10.19

Security and compliance gaps of ineffective employee onboarding and offboarding

Security

Net-security

3.10.19

PDFex attacks can exfiltrate content from encrypted PDF documents

Crypto

Net-security

2.10.19

Microsoft Edge Dev Channel Updated With Media Autoplay BlockingOS

Bleepingcomputer

2.10.19

WhatsApp to Soon Let you Send Self-Destructing MessagesSocial

Bleepingcomputer

2.10.19

Microsoft Releases October 2019 Office Updates With Fixes, ImprovementsOS

Bleepingcomputer

2.10.19

Microsoft To Offer Windows 7 Extended Security Updates to SMBsOS

Bleepingcomputer

2.10.19

Singapore's GovTech Launches Vulnerability Disclosure ProgramBigBrothers  Vulnerebility

Bleepingcomputer

2.10.19

Fake Office Activation Wizard Docs Used to Spread Emotet TrojanVirus

Bleepingcomputer

2.10.19

U.S. and Australian Hospitals Targeted by New Ransomware AttacksBigBrothers  Ransomware

Bleepingcomputer

2.10.19

Highway Advertisement Billboard Hacked to Play Porn VideoHacking

Bleepingcomputer

2.10.19

Windows 10 1903 KB4522016 Cumulative Update Breaks PrintingOS

Bleepingcomputer

2.10.19

New Adwind RAT Variant Used Against the US Petroleum SectorVirus

Bleepingcomputer

2.10.19

The State of Stalkerware in 2019CyberCrimeSecurelist

2.10.19

Asics apologizes after pornography ran on screens at central store in Auckland for hoursCrimeSecurityaffairs

2.10.19

Ten hospitals in Alabama and Australia have been hit with ransomware attacksRansomwareSecurityaffairs

2.10.19

Urgent/11 Flaws Impact More RTOS Used by Medical, Industrial DevicesICSSecurityweek

2.10.19

Advanced ICS/SCADA Hacking Training Offered at SecurityWeek's 2019 ICS Cyber Security ConferenceICSSecurityweek

2.10.19

Ransomware Hits Hundreds of US Schools, Local Governments: StudyRansomwareSecurityweek

2.10.19

Singapore Lays Out Plans for Operational Technology CybersecurityBigBrothersSecurityweek

2.10.19

A Look Into Continuous Efforts By Chinese Hackers to Target Foreign GovernmentsBigBrothersThehackernews

2.10.19

How SMBs Can Mitigate the Growing Risk of File-based AttacksAttackThehackernews

2.10.19

Former Yahoo Employee Admits Hacking into 6000 Accounts for Sexual ContentIncindentThehackernews

2.10.19

Google adds Password Checkup feature to Google Accounts, Chrome

Safety

Net-security

2.10.19

Urgent11 flaws affect more medical, industrial devices than previously thought

Vulnerebility

Net-security

2.10.19

Malvertising Attack Hijacks 1B+ Sessions With Webkit Exploit

Exploit  Virus

Threatpost

2.10.19

Ransomware Attacks Leave U.S. Hospitals Turning Away Patients

Ransomware

Threatpost

2.10.19

Hackers Turn to OpenDocument Format to Avoid AV Detection

Hacking  Virus

Threatpost

2.10.19

Google Play Malicious Apps Racked Up 335M+ Installs in September

Android

Threatpost

2.10.19

Experts found 20 Million tax records for Russian citizens exposed online

BigBrothers  Incindent

Securityaffairs

2.10.19

Teheran: U.S. has started ‘Cyber War’ against Iran

BigBrothers

Securityaffairs

2.10.19

Singapore presented the Operational Technology (OT) Cybersecurity Masterplan

BigBrothers

Securityaffairs

2.10.19

Iranian Official Denies Plans to Interfere With US Election

BigBrothers

Securityweek

2.10.19

NZ Sports Store Apologises Over Porn Played on Big Screens

Hacking

Securityweek

2.10.19

Researchers Find New Hack to Read Content Of Password Protected PDF Files

Hacking

Thehackernews

2.10.19

A recent example of Emotet malspam

Spam  Virus

SANS

2.10.19

The 5 biggest examples of executive threats and how to prevent them

Cyber

Net-security

2.10.19

49% of infosec pros are awake at night worrying about their organization’s cybersecurity

Cyber

Net-security

2.10.19

Massive uptick in eCrime campaigns, retail among top targeted industries

CyberCrime

Net-security

2.10.19

Cyber risks are the top concern among businesses of all sizes

Cyber

Net-security

2.10.19

What’s next for 5G?

Mobil

Net-security

2.10.19

Sophos Managed Threat Response: An evolved approach to proactive security protection

Safety

Net-security

1.10.19

A new Adwind variant involved in attacks on US petroleum industryVirusSecurityaffairs

1.10.19

Hackers breached one of Comodo Forums, 245,000 users impactedIncindentSecurityaffairs

1.10.19

Organizations Prefer Quick Technological Fix Over Deep-Rooted Cyber Resiliency: ReportVulnerebilitySecurityweek

1.10.19

Medical Practice Closing Permanently After Ransomware AttackRansomwareSecurityweek

1.10.19

WebEx, Zoom Meetings Exposed to Snooping via Enumeration AttacksAttackSecurityweek

1.10.19

Former Yahoo Programmer Pleads Guilty to Hacking User AccountsHackingSecurityweek

1.10.19

Danish company Demant expects to incur losses of up to $95 after cyber attackAttackSecurityaffairs

1.10.19

Frequent VBA Macros used in Office MalwareVirusSecurityaffairs

1.10.19

Comodo Forums Hacked via Recently Disclosed vBulletin VulnerabilityIncindent  VulnerebilitySecurityweek

1.10.19

Users Need to Consent to Online Tracking Cookies: EU CourtPrivacySecurityweek

1.10.19

BlackBerry Launches New Cybersecurity R&D UnitSecuritySecurityweek

1.10.19

Singapore Ministry of Defence Launches New Bug Bounty ProgramBigBrothersSecurityweek

1.10.19

Senate Passes DHS Cyber Hunt and Incident Response Teams ActBigBrothersSecurityweek

1.10.19

Comodo Forums Hack Exposes 245,000 Users' Data — Recent vBulletin 0-day UsedIncindentThehackernews

1.10.19

Over A Billion Malicious Ad Impressions Exploit WebKit Flaw to Target Apple UsersExploit  VirusThehackernews

1.10.19

Danish company Demant expects to suffer huge losses due to cyber attack

Attack

Net-security

1.10.19

Vulnerability in Cisco Webex and Zoom may expose online meetings to snooping

Vulnerebility

Net-security

1.10.19

Guess what? You should patch Exim again!

Vulnerebility

Net-security

1.10.19

Zprava-o-stavu-kyberneticke-bezpecnosti-cr-2018-czReportReport

1.10.19

Comodo Forums Breached, Data of Over 170,000 Users Up for GrabsIncindent

Bleepingcomputer

1.10.19

Under-Detected ODT Files Deliver Common Remote Access TrojansVirus

Bleepingcomputer

1.10.19

Free Ouroboros Ransomware (Zeropadypt NextGen) Decryption AvailableRansomware

Bleepingcomputer

1.10.19

Microsoft Adds 'Disable Legacy TLS' Feature to Windows Server 2019OS

Bleepingcomputer

1.10.19

New Exim Vulnerability Exposes Servers to DoS Attacks, RCE RisksVulnerebility

Bleepingcomputer

1.10.19

eGobbler Malvertiser Uses WebKit Exploit to Infect Over 1 Billion AdsExploit  Virus

Bleepingcomputer

1.10.19

Bulletproof Hosting Service in Former NATO Bunker Goes DownCyberCrime

Bleepingcomputer

1.10.19

Windows 10 1903 on ARM Gets a Virtualization-based Security FeatureOS

Bleepingcomputer

1.10.19

Critical Exim Flaw Opens Servers to Remote Code Execution

Vulnerebility

Threatpost

1.10.19

Senate Passes Bill Aimed At Combating Ransomware Attacks

Ransomware

Threatpost

1.10.19

New Bug Found in NSA’s Ghidra Tool

Vulnerebility

Threatpost

1.10.19

Gucci IOT Bot Discovered Targeting European RegionBotNet  IoTSecurityaffairs

1.10.19

Tridium Niagara framework affected by 2 flaws in BlackBerry QNX OS Mobil  VulnerebilitySecurityaffairs

1.10.19

eGobbler ‘s malvertising campaign hijacked over 1 billion ad impressionsVirusSecurityaffairs

1.10.19

A new critical flaw in Exim exposes email servers to remote attacksAttack  VulnerebilitySecurityaffairs

1.10.19

American Man Jailed in US Over Singapore HIV Data LeakCrime  IncindentSecurityweek

1.10.19

Critical Remote Code Execution Vulnerability Patched in Exim Email ServerVulnerebilitySecurityweek

1.10.19

'Masad Stealer' Uses Telegram to Exfiltrate DataIncindent  Social  VirusSecurityweek

1.10.19

Vulnerability Management Firm Kenna Security Raises $48 MillionITSecurityweek

1.10.19

Tridium Niagara Affected by BlackBerry QNX Vulnerabilities Mobil  VulnerebilitySecurityweek

1.10.19

'WhiteShadow' Downloader Employs Microsoft SQL for Malware DeliveryVirusSecurityweek

1.10.19

New Anomali Tool Finds Threat Data in News, Blogs, Social NetworksSocialSecurityweek

1.10.19

Spain Security Firm Probed 'for Spying on Assange for CIA'BigBrothersSecurityweek

1.10.19

Maldoc, PowerShell & BITS

Spam  Virus

SANS

1.10.19

Assessing risk: Measuring the health of your infosec environment

Security

Net-security

1.10.19

Managing and monitoring privileged access to cloud ecosystems

Security

Net-security

1.10.19

38% of the Fortune 500 do not have a CISO

Security

Net-security

1.10.19

Email is an open door for malicious actors looking to exploit businesses

Virus

Net-security

1.10.19

Employee negligence can be a leading contributor to data breaches

Incindent

Net-security

1.10.19

Tolly report: Evaluating the evolution of network traffic analysis technology

Security

Net-security