Calendar September- Home  2020  2019  2018  2017  2016  1  2  3  4  5  6  7  8  Articles

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2019 - January  February  March  April  May  June  July  August  September  October  November  December


Calendar September

Date

Name

Category

Web

30.9.19

Ransomware attacks against small towns require collective defense

Ransomware

Net-security

30.9.19

Microsoft to block 40+ additional file extensions in Outlook on the web

Security

Net-security

30.9.19

Exclusive: MalwareMustDie analyzes a new IoT malware dubbed Linux/ AirDropBotVirus

Securityaffairs

30.9.19Iran’s oil minister orders ‘Full Alert’ for oil sector on against attacksBigBrothers

Securityaffairs

30.9.19

New 'Gucci' IoT Botnet Targets EuropeBotNet   IoTSecurityweek
30.9.19New Critical Exim Flaw Exposes Email Servers to Remote Attacks — Patch ReleasedVulnerebilityThehackernews

30.9.19

Arcane Stealer V, a threat for lower-skilled adversaries that scares experts

Security

Securityaffairs

30.9.19

Microsoft will add new file types to the list of blocked ones in Outlook on the Web

Security

Securityaffairs

30.9.19

Phishers continue to abuse Adobe and Google Open RedirectsPhishing

Securityaffairs

30.9.19Hacker claims to have stolen over 218M Zynga ‘Words with Friends’ Gamers recordsHacking

Securityaffairs

30.9.19Iran's Oil Sector on 'Full Alert' Against AttacksAttackSecurityweek

30.9.19

Encrypted Maldoc, Wrong Password

Crypto

SANS

30.9.19

How long before quantum computers break encryption?

Crypto

Net-security

30.9.19

A proactive approach to cybersecurity requires the right tools, not more tools

Cyber

Net-security

30.9.19

Companies vastly overestimating their GDPR readiness, only 28% achieving compliance

Privacy

Net-security

30.9.19

DevSecOps is emerging as the main methodology for securing cloud-native applications

Security

Net-security

30.9.19

ThreatConnect Platform: Security insight for sound decision-making

Security

Net-security

30.9.19

eBook: The DevOps Roadmap for Security

Security

Net-security

29.9.19

Cloudflare Now Blocks the vBulletin RCE CVE-2019-16759 ExploitExploit

Bleepingcomputer

29.9.19

Windows 10 1909 Coming Soon, Here Are the New FeaturesOS

Bleepingcomputer

29.9.19

Cyber-Attacks Hit Defense Contractors in Europe and North AmericaBigBrothers

Bleepingcomputer

29.9.19

US Senate Passes Bill in Response to Rampant Ransomware, CyberAttacksBigBrothers  Ransomware

Bleepingcomputer

29.9.19

New Masad Stealer Malware Exfiltrates Crypto Wallets via TelegramCryptocurrency  Virus

Bleepingcomputer

29.9.19

Microsoft Wants Your Feedback on the Edge Browser for LinuxOS

Bleepingcomputer

29.9.19

Office 365 to Get Automated Incident Response for Hacked AccountsHacking

Bleepingcomputer

29.9.19

Windows 10 Version 1903 Now in Broad Deployment, Available to EveryoneOS

Bleepingcomputer

29.9.19

Fake Apps Sneak Gambling Into iOS and Android App StoresAndroid  Apple

Bleepingcomputer

29.9.19

Adobe and Google Open Redirects Abused by Phishing CampaignsPhishing

Bleepingcomputer

29.9.19

Microsoft Removes CCleaner Ban From Their Community ForumsSecurity

Bleepingcomputer

29.9.19

New WhiteShadow Downloader Uses MSSQL Servers for Malware DeliveryVirus

Bleepingcomputer

29.9.19

WhiteShadow downloader leverages Microsoft SQL to retrieve multiple malware

Virus

Securityaffairs

29.9.19

Masad Stealer Malware exfiltrates data via Telegram

Social  Virus

Securityaffairs

29.9.19

Exclusive — Hacker Steals Over 218 Million Zynga 'Words with Friends' Gamers Data

Incindent

Thehackernews

29.9.19

Ransom News

Ransom

Ransom

29.9.19

Nodersok malware delivery campaign relies on advanced techniquesCyberCrime

Securityaffairs

29.9.19

German police arrest suspects in raid network hosting Darknet marketplacesBigBrothers

Securityaffairs

29.9.19

Malware-based attacks disrupted operations of Rheinmetall AG and Defence Construction CanadaVirus

Securityaffairs

29.9.19

After SIMJacker, WIBattack hacking technique disclosed. Billions of users at riskHacking  Mobil

Securityaffairs

29.9.19

Driver's License Thefts Spur ADOT to Boost Online SafeguardsSecurity

Securityweek

29.9.19

Germany Cracks 'Cyber Bunker' Hosting Darknet SitesBigBrothers

Securityweek

29.9.19

Microsoft Expands List of Blocked File Types in Outlook on the WebSecurity

Securityweek

29.9.19

Apple Patches iOS 13 Bug Allowing Third-Party Keyboards "Full Access"AppleSecurityweek

28.9.19

Windows 10 1903 Cumulative Update KB4517211 Fixes Game Audio Issues

OS

Bleepingcomputer

28.9.19

DoorDash Data Breach Exposes Info of Roughly 5 Million Users

Incindent

Bleepingcomputer

28.9.19

Microsoft Explains Why Signed PowerShell Cmdlets May Run Slow

Virus

Bleepingcomputer

28.9.19

Microsoft Spots Nodersok Malware Campaign That Zombifies PCs

Virus

Bleepingcomputer

28.9.19

REvil (Sodinokibi) Ransomware Targets Chinese Users with DHL Spam

Ransomware

Bleepingcomputer

28.9.19

Cisco Fixes Critical IOx Flaw Allowing Root Access to Guest OS

Vulnerebility

Bleepingcomputer

28.9.19

Microsoft Enables Tracking Prevention by Default in New Edge Beta

Privacy

Bleepingcomputer

28.9.19

Outlook on the Web to Block File Extensions for PowerShell, Python, and More

Virus

Bleepingcomputer

28.9.19

Vodafone's Mobile App Briefly Exposed Customer Information

Incindent  Privacy

Bleepingcomputer

28.9.19

Botnet Uses Recent vBulletin Exploit to Block Other Hackers

BotNet  Exploit

Bleepingcomputer

28.9.19

Arcane Stealer V Takes Aim at the Low End of the Dark Web

Security

Threatpost

28.9.19

Masad Spyware Uses Telegram Bots for Command-and-Control

BotNet

Threatpost

28.9.19

Microsoft Blacklists Dozens of New File Extensions in Outlook

Safety

Threatpost

28.9.19

Dunkin’ Donuts Gets Hit with Lawsuit Over 2015 Attack

Attack

Threatpost

28.9.19

iOS Exploit ‘Checkm8’ Could Allow Permanent iPhone Jailbreaks

Apple

Threatpost

28.9.19

News Wrap: GandCrab Operators Resurface, Utilities Firms Hit By LookBack Malware

Security

Threatpost

28.9.19

Thousands of PCs Affected by Nodersok/Divergent Malware

Virus

Threatpost

28.9.19

Malware Delivery Campaign Employs Advanced Fileless TechniquesVirus

Securityweek

28.9.19

Dunkin' Donuts Sued by New York's State Attorney General Over Data BreachesIncindent

Securityweek

28.9.19

'Unpatchable' iOS Bootrom Exploit Allows Jailbreaking of Many iPhonesApple

Securityweek

28.9.19

More SIM Cards Vulnerable to Simjacker Attack Than Previously DisclosedHacking  Mobil

Thehackernews

27.9.19

Checkm8: unpatchable iOS exploit could lead to permanent jailbreak for iOS devices running A5 to A11 chipsAppleSecurityaffairs

27.9.19

China Rejects 'Smear' After Airbus Hacking ReportBigBrothers

Securityweek

27.9.19

Airbus Says Taking 'Appropriate Measures' Against HackersHacking

Securityweek

27.9.19

GAO Says Electric Grid Cybersecurity Risks Only Partially AssessedCyber

Securityweek

27.9.19

German Auto and Defense Firm Rheinmetall Says Malware Hit Several PlantsVirus

Securityweek

27.9.19

Researchers Disclose Another SIM Card Attack Possibly Impacting MillionsAttack  Mobil

Securityweek

27.9.19

Hacker Releases 'Unpatchable' Jailbreak For All iOS Devices, iPhone 4s to iPhone XApple

Thehackernews

27.9.19

Microsoft Warns of a New Rare Fileless Malware Hijacking Windows ComputersVirusThehackernews

27.9.19

Emsisoft released a new free decryption tool for the Avest ransomwareRansomwareSecurityaffairs

27.9.19

DoorDash Data Breach exposes data of approximately 5 million usersIncindentSecurityaffairs

27.9.19

FBI Reviewed Cybersecurity Firm's Evidence in 2016 DNC Election HackBigBrothers

Securityweek

27.9.19

Magecart Hackers Target L7 RoutersHacking

Securityweek

27.9.19

DoorDash Breach Exposes Data of Nearly 5 Mn UsersIncindent

Securityweek

27.9.19

DoorDash Breach Exposes 4.9 Million Users' Personal DataIncindentThehackernews

27.9.19

Microsoft to Extend Office 365 ATP Safe Links to Office OnlineSafety

Bleepingcomputer

27.9.19

Buggy Google Chrome Update Behind Recent Unbootable MacsApple Vulnerebility

Bleepingcomputer

27.9.19

Ransomware Decryptors Released for Yatron, WannaCryFake, & FortuneCryptRansomware

Bleepingcomputer

27.9.19

Microsoft Phishing Attack Uses Google Redirects to Evade DetectionPhishing

Bleepingcomputer

27.9.19

Hackers Replace Windows Narrator to Get SYSTEM Level AccessHacking

Bleepingcomputer

27.9.19

Cloudflare's WARP Secures iOS and Android Web Traffic for FreeApple

Bleepingcomputer

27.9.19

vBulletin Zero-Day Exploited for Years, Gets Unofficial PatchVulnerebility

Bleepingcomputer

27.9.19

Adobe Fixes Critical Security Vulnerabilities in ColdfusionVulnerebility

Bleepingcomputer

27.9.19

Hackers Exploit Unpatched Bug in Rich Reviews WordPress PluginVulnerebility

Bleepingcomputer

27.9.19

Hackers Exploit Unpatched Bug in Rich Reviews WordPress PluginVulnerebilityBleepingcomputer

27.9.19

New Scans for Polycom Autoconfiguration Files

Security

SANS

27.9.19

How to start achieving visibility in the cloud

Security

Net-security

27.9.19

Should the National Security Council restore the cybersecurity coordinator role?

Cyber

Net-security

27.9.19

Windows‌ ‌Exploitation‌ ‌Tricks:‌ ‌Spoofing‌ ‌Named‌ ‌Pipe‌ ‌Client‌ ‌PID‌

Exploit blog

Project Zero

27.9.19

Chrome Bug, Not Avid Software, Causes Damage to MacOS File Systems

Apple  Vulnerebility

Threatpost

27.9.19

Vimeo Slapped With Lawsuit Over Biometrics Privacy Policy

Privacy  Security

Threatpost

27.9.19

Phish Uses Google’s URL Decoding to Swim Past Defenses

Phishing

Threatpost

27.9.19

DoorDash Data Breach Impacts Personal Data of Almost 5M Users

Incindent

Threatpost

27.9.19

Rash of Exploits Targets Critical vBulletin RCE Bug

Exploit

Threatpost

27.9.19

5G and IoT: How to Approach the Security Implications

IoT  Mobil

Threatpost

27.9.19

Cisco Patches 13 High-Severity Router and Switch Bugs

Vulnerebility

Threatpost

27.9.19

Botnet exploits recent vBulletin flaw to protect its botsBotNetSecurityaffairs

27.9.19

iOS 13 Bug Gives Third-Party Keyboards “Full Access” PermissionsAppleSecurityaffairs

27.9.19

Chinese Hackers Hit Technology Firms in Southeast Asia With PcShare BackdoorHacking  CyberSpy

Securityweek

27.9.19

'Chameleon' Spam Campaign Employs Randomized Email HeadersSpam

Securityweek

27.9.19

There Is Life for the CISO After a BreachIncindent

Securityweek

27.9.19

Hackers Target Airbus Suppliers in Quest for Commercial SecretsHacking

Securityweek

27.9.19

Outlook for Web Bans 38 More File Extensions in Email AttachmentsSpamThehackernews

27.9.19

Vulnerability on specific Cisco Industrial / Grid router models

Vulnerebility

SANS

27.9.19

Mining MAC Address and OUI Information

Cryptocurrency

SANS

27.9.19

Year-over-year malware volume increased by 64%

Virus

Net-security

27.9.19

As consumers engage with insurance companies online, new types of digital fraud emerge

Security

Net-security

27.9.19

The Standoff: Attackers and defenders to face off in digital metropolis security challenge

Security

Net-security

27.9.19

Podcast: Potential problems with the software supply chain for industrial sites

Security

Net-security

26.9.19

Airbus suppliers were hit by four major attack in the last 12 months

Attack

Securityaffairs

26.9.19

Study shows connections between 2000 malware samples used by Russian APT groups

APT

Securityaffairs

26.9.19

Cylance Founder Stuart McClure Leaves BlackBerry

IT

Securityweek

26.9.19

VMware Patches Critical Harbor Vulnerability

Vulnerebility

Securityweek

26.9.19

Airbus Hit by Series of Cyber Attacks on Suppliers: Security Sources

Cyber

Securityweek

26.9.19

iOS 13 Bug Lets 3rd-Party Keyboards Gain 'Full Access' — Even When You Deny

Apple

Thehackernews

26.9.19

Decryptor for WannaCryFake

Anti-Ransom Tool

Anti-Ransom Tool

26.9.19

USBsamurai for Dummies: How To Make a Malicious USB Implant & Bypass Air-Gapped Environments for 10$. The Dumb-Proof Guide.

Virus

Securityaffairs

26.9.19

Emsisoft releases a free decryptor for the WannaCryFake ransomware

Ransomware

Securityaffairs
26.9.19

iOS 13 Bug Gives Third-Party Keyboards "Full Access" Permissions

Apple

Securityweek

26.9.19

vBulletin Patches Vulnerability Exploited in the Wild

Vulnerebility

Securityweek

26.9.19

Magecart Group Targets Routers Behind Public Wi-Fi Networks

CyberCrime

Threatpost

26.9.19

‘Narrator’ Windows Utility Trojanized to Gain Full System Control

Virus

Threatpost

26.9.19

Unpatched Bug Under Active Attack Threatens WordPress Sites with XSS

Vulnerebility

Threatpost

26.9.19

Cybercriminals plan to make L7 routers serve card stealing code

CyberCrime

Net-security

26.9.19

Windows 10 Insider Build 18990 Released With UWP App AutostartOS

Bleepingcomputer

26.9.19Apple to Fix iOS Bug Granting Full Access to 3rd Party KeyboardsApple

Bleepingcomputer

26.9.19

Windows 10 to Boost Performance via Favored CPU Core OptimizationOS

Bleepingcomputer

26.9.19

Microsoft Rolls Out Windows Terminal 1909 With Long List of Fixes  OS

Bleepingcomputer

26.9.19Shared Code Links Sodinokibi to GandCrab, Minus the Fun & GamesRansomware

Bleepingcomputer

26.9.19

Windows 10 1809 Cumulative Update KB4516077 Released With FixesVulnerebility  OS

Bleepingcomputer

26.9.19Instagram Phishing Attack Baits With Copyright Infringement NotePhishing  Social

Bleepingcomputer

26.9.19

Fake Employment Site Created to Target Veterans With MalwareVirus

Bleepingcomputer

26.9.19State-Backed Attackers Target US Entities with LookBack MalwareVirus

Bleepingcomputer

26.9.19

Gmail for Android and iOS Gets a Dark ThemeAndroid  AppleBleepingcomputer
26.9.19Czech Intelligence ‘s report attributes major cyber attack to ChinaBigBrothers

Securityaffairs

26.9.19Czech Intelligence Blames China for Major Cyber AttackBigBrothers

Securityweek

26.9.19

POISON CARP Threat Actor Targets Tibetan GroupsCyberCrime

Securityweek

26.9.19

How can we thwart email-based social engineering attacks?

Attack

Net-security
26.9.19

Tackling biometric breaches, the decentralized dilemma

Incindent

Net-security

26.9.19

Cybersecurity breach experience strengthens CVs

Cyber

Net-security
26.9.19

Employees are mistakenly confident that they can spot phishing emails

Phishing

Net-security

26.9.19

Adopting DevOps practices leads to improved security posture

Security

Net-security
26.9.19

Enterprises report IT teams’ cloud skill gaps have nearly doubled

Security

Net-security

25.9.19

Ransomware: two pieces of good newsRansomwareSecurelist

25.9.19

What You Need to Know About Next Gen EDRSecurity

Threatpost

25.9.19GandCrab Operators Resurface with REvil MalwareRansomware

Threatpost

25.9.19Apple to Patch Bug Granting Full Access to 3rd-Party KeyboardsApple

Threatpost

25.9.19

Dtrack RAT is Behind Virulent ATM-Espionage CampaignVirus

Threatpost

25.9.19Adobe Unscheduled Update Fixes Critical ColdFusion FlawsVulnerebility

Threatpost

25.9.19Cybercrooks Target U.S. Veterans with Fake Hiring WebsiteBigBrothers

Threatpost

25.9.19Zebrocy Retools for New Political AttacksVirusThreatpost

25.9.19

Heyyo dating app left its users’ data exposed online

Incindent

Securityaffairs

25.9.19

US Utilities Targeted with LookBack RAT in a new phishing campaign

Phishing  Virus

Securityaffairs

25.9.19

Honeywell Launches 'Forge' Industrial Cybersecurity Platform

Cyber

Securityweek

25.9.19

Organizations Warned of Dual Threat Posed by RDP and Disruptive Ransomware

Ransomware

Securityweek

25.9.19

60% of Major US Firms Have Been Hacked in Cloud: Study

Security

Securityweek

25.9.19

Tortoiseshell Targets U.S. Military Veterans in New Campaign

BigBrothers

Securityweek

25.9.19

Microsoft Makes Azure Sentinel Generally Available

Security

Securityweek

25.9.19

Dell Unveils New Data Protection Appliances

Safety

Securityweek

25.9.19

Hacker Releases Exploit for vBulletin Zero-Day Vulnerability

Vulnerebility

Securityweek

25.9.19

'xHunt' Campaign Targets Kuwait Transportation and Shipping Sector

CyberCrime

Securityweek

25.9.19

vBulletin zero-day exploited in the wild in wake of exploit release

Vulnerebility

Net-security
25.9.19

Cybersecurity automation? Yes, wherever possible

Cyber

Net-security
25.9.19

How can small companies with limited budgets win at security?

Security

Net-security

25.9.19

Adobe Patches two critical vulnerabilities in ColdFusionVulnerebility

Securityaffairs

25.9.19Hacker discloses details and PoC exploit code for unpatched 0Day in vBulletinExploit  Vulnerebility

Securityaffairs

25.9.19A new Fancy Bear backdoor used to target political targetsVirusSecurityaffairs
25.9.19North Korean-Linked Dtrack RAT DiscoveredBigBrothers  Virus

Securityweek

25.9.19Adobe Patches Critical Command Injection, Path Traversal Flaws in ColdFusionVulnerebility

Securityweek

25.9.19[Unpatched] Critical 0-Day RCE Exploit for vBulletin Forum Disclosed PubliclyVulnerebilityThehackernews

25.9.19

Malspam pushing Quasar RAT

Spam  Virus

SANS

25.9.19

Rise of RDP as a target vector

Security

Net-security
25.9.19

99% of misconfiguration incidents in the cloud go unnoticed

Security

Net-security
25.9.19

Older vulnerabilities and those with lower severity scores still being exploited by ransomware

Exploit Ransomware Vulnerebility

Net-security
25.9.19

Security capabilities are lagging behind cloud adoption

Security

Net-security
25.9.19

Whitepaper: The self-fulfilling prophecy of the cybersecurity skills shortage

Cyber

Net-security

24.9.19

APT or not APT? What’s Behind the Aggah CampaignAPT

Securityaffairs

24.9.19

Microsoft released an out-of-band patch to fix Zero-day flaw exploited in the wildVulnerebility

Securityaffairs

24.9.19

Russian Pleads Guilty to Hacking U.S. Financial FirmsBigBrothers

Securityweek

24.9.19

Additional U.S. Utilities Targeted With LookBack MalwareVirus

Securityweek

24.9.19

Source Code Security Firm Cycode Launches With $4.6 Million in FundingIT

Securityweek

24.9.19

Cyber Insurance Firm Cowbell Emerges From Stealth With $3.3 Million Seed FundingIT

Securityweek

24.9.19

1-Click iPhone and Android Exploits Target Tibetan Users via WhatsAppApple  ExploitThehackernews

24.9.19

Russian APT Map Reveals 22,000 Connections Between 2000 Malware SamplesAPTThehackernews

24.9.19

Avid Users Are Suddenly Finding That Their Macs Won’t BootApple

Bleepingcomputer

24.9.19

Zebrocy Infects Targets with New Golang-Based Backdoor via DropboxVirus

Bleepingcomputer

24.9.19

Emotet Tries to Infect You By Claiming It's Snowden's BookVirus

Bleepingcomputer

24.9.19

Beware of Google Alert Links Leading to Malware and ScamsVirus

Bleepingcomputer

24.9.19

Finnish Govt. Releases Guide on Securing Microsoft Office 365BigBrothers

Bleepingcomputer

24.9.19

Microsoft Issues Windows Security Update for 0Day VulnerabilityOS

Bleepingcomputer

24.9.19

Windows 10 Task Manager Lets You Copy Performance Data as TextOS

Bleepingcomputer

24.9.19

Microsoft to Force Modern Auth in Exchange Online to Enhance SecurityOS

Bleepingcomputer

24.9.19

Malicious Android Apps Evade Google Play Protect via Remote CommandsAndroid

Bleepingcomputer

24.9.19

Microsoft Edge's Collection Feature Helps You Stay OrganizedOSBleepingcomputer

24.9.19

Lion Air Data Leak Came From Contractor's Ex-Staff, Airline SaysIncindent

Securityweek

24.9.19

Google Wins EU Fight Against Worldwide 'Right to be Forgotten'BigBrothers

Securityweek

24.9.19

Microsoft Patches Internet Explorer Vulnerability Exploited in AttacksExploit  Vulnerebility

Securityweek

24.9.19

Microsoft Releases Emergency Patches for IE 0-Day and Windows Defender FlawVulnerebilityThehackernews

24.9.19

Huge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs

Security

SANS

24.9.19

Microsoft drops emergency Internet Explorer fix for actively exploited zero-day

Vulnerebility

Net-security

24.9.19

Google Assistant Audio Privacy Controls Updated After Outcry

Privacy

Threatpost

24.9.19

200K Sign Petition Against Equifax Data Breach Settlement

Incindent

Threatpost

24.9.19

More U.S. Utility Firms Targeted in Evolving LookBack Spearphishing Campaign

Attack  CyberCrime

Threatpost

24.9.19

Microsoft Internet Explorer Zero-Day Flaw Addressed in Out-of-Band Security Update

Vulnerebility

Threatpost

24.9.19

North Korea-linked malware ATMDtrack infected ATMs in India

BigBrothers

Securityaffairs

24.9.19

Campbell County Memorial Hospital in Wyoming hit by ransomware attack

Ransomware

Securityaffairs

24.9.19

Portuguese hacker faces hundreds of Charges in Football Leaks case

Hacking

Securityaffairs

24.9.19

Critical Vulnerability Addressed in Jira Service Desk

Vulnerebility

Securityweek

24.9.19

Microsoft to Provide Free Security Updates for Voting Systems Running Windows 7

Vulnerebility

Securityweek

24.9.19

0patch Promises Support for Windows 7 Beyond January 2020

Vulnerebility

Securityweek

24.9.19

Being CISO Is No Longer a Dead-End Job

Security

Securityweek

24.9.19

Could audio warnings augment your ability to fight off cyber attacks?

Cyber

Net-security

24.9.19

CISO role grows in stature, but challenges remain

Security

Net-security

24.9.19

Passwordless authentication is here ​now​, and it is vastly superior to using a password

Security

Net-security

24.9.19

$5 trillion threat of cyber attacks spurs investments in solutions, talent and tech

Cyber

Net-security

24.9.19

From science to business: High-end quantum computer market will almost double by 2025

IT

Net-security

24.9.19

What security and privacy enhancements has iOS 13 brought?

Apple  Privacy

Net-security

23.9.19

Hello! My name is Dtrack

Virus

Securelist

23.9.19

Wyoming Hospital's Services Disrupted by RansomwareRansomware

Securityweek

23.9.19

Flaw Gives Hackers Remote Access to Files Stored on D-Link DNS-320 DevicesHacking

Securityweek

23.9.19

Digital Threats Multiply Ahead of 2020 US ElectionsSecurity

Securityweek

23.9.19

Google Awards $40,000 for Chrome Sandbox Escape VulnerabilitiesVulnerebility

Securityweek

23.9.19

IT vs OT: Challenges and opportunities – podcast

Security

Net-security

23.9.19

Postřehy z bezpečnosti: nepřítel státu - Root.cz 

Bezpečnost

Root.cz

23.9.19

V Česku ubylo virů a útoků, na Slovensku naopak přibylo - Novinky.cz 

Viry

Novinky.cz

23.9.19

Thinkful forces a password reset for all users after a data breach

Incindent

Securityaffairs

23.9.19

Privilege Escalation flaw found in Forcepoint VPN Client for Windows

Vulnerebility

Securityaffairs

23.9.19

TortoiseShell Group targets IT Providers in supply chain attacks

Attack

Securityaffairs

23.9.19

Mac Malware Poses as Trading App

Apple

Securityweek

23.9.19

Alleged Hacker Faces 154 Charges in Football Leaks Case

Hacking

Securityweek

23.9.19

YARA XOR Strings: an Update

Security

SANS

23.9.19

How data breaches forced Amazon to update S3 bucket security

Incindent

Net-security

23.9.19

Microsoft Edge to Let You Block Potentially Unwanted ProgramsOS

Bleepingcomputer

23.9.19

Jira Server and Service Desk Fix Critical Security BugsVulnerebility

Bleepingcomputer

23.9.19

Microsoft Marks Two Windows 10 1903 Issues as ResolvedOS

Bleepingcomputer

23.9.19

Video: Encrypted Sextortion PDFs

Crypto

SANS

23.9.19

Disclosing vulnerabilities to improve software security is good for everyone

Vulnerebility

Net-security

23.9.19

How SMBs can bring their security testing on par with larger enterprises

Security

Net-security

23.9.19

How important is packet capture for cyber defense?

Cyber

Net-security

23.9.19

Product showcase: NetLib Security Encryptionizer

Security

Net-security

23.9.19

Top challenges for CIOs in a multi-cloud world

Security

Net-security

22.9.19

Critical flaws affect Jira Service Desk and Jira Service Desk Data CenterVulnerebilitySecurityaffairs
22.9.190patch will provide micropatches for Windows 7 and Server 2008 after EoSVulnerebilitySecurityaffairs
22.9.19Facebook suspends tens of thousands of apps from hundreds of developersSocialSecurityaffairs

22.9.19

Iran denies successful cyber attacks hit infrastructures of its oil sector

BigBrothers

Securityaffairs
22.9.19

MMD-0063-2019 – Summarize report of three years MalwareMustDie research (Sept 2016-Sept 2019)

Virus

Securityaffairs
22.9.19

One of the hackers behind EtherDelta hack also involved in TalkTalk hack

Hacking

Securityaffairs

22.9.19

5 Cybersecurity Trends in the Professional Services Sector

Cyber

Securityaffairs
22.9.19

Payouts From Insurance Policies May Fuel Ransomware Attacks

Ransomware

Securityweek
22.9.19

Iran Denies Successful Cyber Attacks on Oil Sector

BigBrothers

Securityweek
22.9.19

Wireshark 3.0.5 Release: Potential Windows Crash when Updating

Security

SANS

21.9.19

Ransom NewsRansomRansom

21.9.19

EXPLAINING FILELESS MALWARE SUCCINCTLY WITH EXAMPLES FROM OUR RESEARCHMalware blogCybereason

21.9.19

FILELESS MALWARE 101: UNDERSTANDING NON-MALWARE ATTACKSMalware blogCybereason

21.9.19

Tortoiseshell Group Targets IT ProvidersCyber blogSymantec

21.9.19

Emotet is back after a summer breakMalware blog

Cisco Talos

21.9.19

Cryptocurrency miners aren’t dead yet: Documenting the voracious but simple “Panda”Cryptocurrency blog

Cisco Talos

21.9.19

Vulnerability Spotlight: Multiple vulnerabilities in Aspose PDF APIVulnerebility blog

Cisco Talos

21.9.19

Vulnerability Spotlight: AMD ATI Radeon ATIDXX64.DLL shader functionality remote code execution vulnerabilityVulnerebility blog

Cisco Talos

21.9.19

Vulnerability Spotlight: Multiple vulnerabilities in Atlassian JiraVulnerebility blog

Cisco Talos

21.9.19

Universities warned to brace for cyberattacksAttack blog

Eset

21.9.19

Remote access flaws found in popular routers, NAS devicesVulnerebility blog

Eset

21.9.19

Nearly all of Ecuador’s citizens caught up in data leakIncident blog

Eset

21.9.19

Meet Stop Ransomware: The Most Active Ransomware Nobody Talks AboutRansomware

Bleepingcomputer

21.9.19

Windows 7 Voting Systems to Get Free Security Updates Through 2020 ElectionsOS

Bleepingcomputer

21.9.19

Windows 7 and Server 2008 Get 0patch Security Fixes After EoSOS

Bleepingcomputer

21.9.19

Twitter Removes State-backed Actors Conducting Information CampaignsSocial

Bleepingcomputer

21.9.19

Forcepoint Fixes Privilege Escalation Bug in Windows VPN ClientVulnerebility

Bleepingcomputer

21.9.19

Windows 10 is Getting a New Optional Update ExperienceOS

Bleepingcomputer

21.9.19

Selfie Android Apps with 1.5M+ Installs Push Ads, Can Record AudioAndroid

Bleepingcomputer

21.9.19

Windows 10 Insider Build 18985 Released With Improved Bluetooth PairingOS

Bleepingcomputer

21.9.19

Thinkful Resets All User Passwords After Security BreachIncindent

Bleepingcomputer

21.9.19

Emotet Trojan Evolves Since Being Reawakend, Here is What We KnowVirusBleepingcomputer

21.9.19

News Wrap: Emotet’s Return, U.S. Vs. Snowden, Physical Pen Testers ArrestedSecurity

Threatpost

21.9.19

Facebook Removed Tens of Thousands of Apps Post-Cambridge AnalyticaPrivacy  Social

Threatpost

21.9.19

Mattress Company Leaks Data Records of 387K CustomersIncindent

Threatpost

21.9.19

Forcepoint VPN Client is Vulnerable to Privilege Escalation AttacksAttack  Vulnerebility

Threatpost

21.9.19

Facebook Suspends 'Tens of Thousands' of Apps in Privacy ReviewPrivacy  SocialSecurityweek

21.9.19

Eight U.S. Cities Impacted in New Series of Click2Gov BreachesIncindentSecurityweek

21.9.19

200,000 Sign Petition Against Equifax Data Breach SettlementIncindentSecurityweek

21.9.19

Indonesia, Malaysia Probe Lion Air Customer Data LeakIncindentSecurityweek

21.9.19

Twitter Closes Thousands of Fake News Accounts WorldwideSocialSecurityweek

21.9.19

Vulnerability Patched in Forcepoint VPN Client for WindowsVulnerebilitySecurityweek

21.9.19

France Has 'Not Changed Mind' on Rejecting Snowden AsylumBigBrothersSecurityweek

21.9.19

Two Indicted in $10 Million Tech Support Fraud SchemeCyberCrimeSecurityweek

21.9.19

Two selfie Android adware apps with 1.5M+ downloads removed from Play StoreAndroidSecurityaffairs

21.9.19

U.S. taxpayers hit by a phishing campaign delivering the Amadey botBotNet  PhishingSecurityaffairs

20.9.19

Celebrity Instagram Accounts Being Hacked to Push ScamsSocial

Bleepingcomputer

20.9.19

Critical Bug In Harbor Container Registry Gives Admin AccessVulnerebility

Bleepingcomputer

20.9.19

Microsoft Acquires Semmle, GitHub Now a CVE Numbering AuthoritySecurity

Bleepingcomputer

20.9.19Windows Defender Antivirus Scans Broken After New UpdateVulnerebility

Bleepingcomputer

20.9.19Microsoft Phishing Page Sends Stolen Logins Using JavaScriptPhishing

Bleepingcomputer

20.9.19Amadey Botnet Targets U.S. Taxpayers with Tax Refund NoticeBotNet

Bleepingcomputer

20.9.19

Smominru Mining Botnet In Cyber Turf War With Rival MalwareBotNet  Virus

Bleepingcomputer

20.9.19

New TortoiseShell Group Hacks 11 IT Providers to Reach Their CustomersHacking

Bleepingcomputer

20.9.19

400 Million Medical Radiological Images Exposed on the InternetIncindent

Bleepingcomputer

20.9.19Windows 10 With Chinese IME Installed Causing High CPU UsageOSBleepingcomputer

20.9.19

Commodity Malware Reborn: The AgentTesla “Total Oil” themed CampaignVirusSecurityaffairs

20.9.19

Crooks hacked other celebrity Instagram accounts to push scamsSocialSecurityaffairs

20.9.19

Magecart attackers target mobile users of hotel chain booking websitesCyberCrime  MobilSecurityaffairs
20.9.19VMware Patches Six Vulnerabilities in Various ProductsVulnerebilitySecurityweek
20.9.19HP Acquires Endpoint Security Company BromiumSecuritySecurityweek
20.9.19Two Widely Used Ad Blocker Extensions for Chrome Caught in Ad Fraud SchemeHackingThehackernews

20.9.19

Should you trust your smart TV or streaming device?

Security

Net-security

20.9.19

Blacklisting or Whitelisting in the Right Way

Security

SANS

20.9.19

Microsoft Silent Update Torpedoes Windows DefenderVulnerebility

Threatpost

20.9.19These Hacks Require Literally Sneaking in the BackdoorVirus

Threatpost

20.9.19Smart TVs, Subscription Services Leak Data to Facebook, GoogleSecurity

Threatpost

20.9.19Payment Card Breach Hits 8 Cities Using Vulnerable Bill PortalVulnerebility

Threatpost

20.9.19

At least 1,300 Harbor cloud registry installs open to attack

Attack  Hacking

Securityaffairs
20.9.19

Emotet is back, it spreads reusing stolen email content

Virus

Securityaffairs
20.9.19

Key Senate Panel Approves $250 Million for Election Security

BigBrothers

Securityweek
20.9.19

Don't Take the Bait: A Look at the Latest Phishing Trends

Phishing

Securityweek
20.9.19

Phishing Emails Deliver Amadey Malware to U.S. Taxpayers

Phishing  Virus

Securityweek

20.9.19

MITRE Publishes New List of Most Dangerous Software Weaknesses

Safety  Vulnerebility

Securityweek
20.9.19

Dataswift Raises $2 Million in Seed Funding to Revolutionize Personal Data Sharing

IT

Securityweek
20.9.19

Kaspersky Unveils ICS Vulnerabilities Database

ICS  Vulnerebility

Securityweek
20.9.19

Critical Vulnerability Exposes Harbor Registries to Attacks

Vulnerebility

Securityweek
20.9.19

Magecart Hackers Target Mobile Users of Hotel Websites

CyberCrime  Mobil

Securityweek
20.9.19

Microsoft Rushes to Fix Bug That Broke Windows Defender Scans

Vulnerebility

Securityweek
20.9.19

Update Google Chrome Browser to Patch New Critical Security Flaws

Vulnerebility

Thehackernews

20.9.19

Organizations continue to struggle with privacy regulations

Security

Net-security
20.9.19

Key threats and trends SMB IT teams deal with

Security

Net-security
20.9.19

Old Magecart domains are finding new life in fresh threat campaigns

CyberCrime

Net-security
20.9.19

Researchers analyzed 16.4 billion requests to see how bots affect e-commerce

Security

Net-security
20.9.19

Some IT teams move to the cloud without business oversight or direction

Security

Net-security

19.9.19

How organizations view and manage cyber risk

Cyber

Net-security

19.9.19

Threat landscape for smart buildingsIoTSecurelist

19.9.19

Smominru Botnet continues to rapidly spread worldwideBotNetSecurityaffairs

19.9.19

Ping Identity IPO Shares Priced at $15ITSecurityweek

19.9.19

Smominru Botnet Infects Thousands of Hosts DailyBotNetSecurityweek

19.9.19

A bug made some Windows Defender antivirus scans fail

Vulnerebility

Net-security

19.9.19

Agent Tesla Trojan Abusing Corporate Email Accounts

Virus

SANS

19.9.19

More than 737 million medical radiological images found on open PACS serversPrivacy  VulnerebilitySecurityaffairs

19.9.19

Edward Snowden Sued by U.S. Over New MemoirBigBrothers

Threatpost

19.9.19Massive Gaming DDoS Exploits Widespread TechnologyAttack  Exploit

Threatpost

19.9.19Emotet Returns from Summer Vacation, Ramps Up Stolen Email TacticVirus

Threatpost

19.9.19Malware Moves: The Rise of LookBack – And Return of EmotetVirus

Threatpost

19.9.19

Marc Rogers: Success of Anonymous Bug Submission Program ‘Takes A Village’VulnerebilityThreatpost
19.9.19IRS Emails Promise a Refund But Deliver Botnet RecruitmentBotNet  Spam

Threatpost

19.9.19

Rethinking Responsibilities and Remedies in Social-Engineering AttacksAttackThreatpost

19.9.19

Zuckerberg Sets Talks in Washington on 'Future Regulation'SocialSecurityweek
19.9.19Acronis Worth Over $1 Billion After Raising $147 MillionITSecurityweek
19.9.19GitHub Becomes CVE Numbering Authority, Acquires SemmleSecuritySecurityweek
19.9.19300 More Chinese Arrested in Philippines CrackdownCrimeSecurityweek

19.9.19

Emotet Returns, Spreads via Hijacked Email ConversationsVirusSecurityweek
19.9.19IT Firm Manager Arrested in the Biggest Data Breach Case of Ecuador’s HistoryCrimeThehackernews
19.9.19

SLAs: What your cybersecurity vendor isn’t telling you

Cyber

Net-security

19.9.19

Businesses need to treat cybersecurity as something that crosses organizational boundaries

Cyber

Net-security

19.9.19

The use of open source software in DevOps has become strategic for organizations of all sizes

Security

Net-security

19.9.19

Improving the security, privacy and safety of future connected vehicles

Security

Net-security

19.9.19

World’s top 25 CTF teams to battle for $100,000 at HITB PRO CTF

Congress

Net-security

18.9.19

Beware of Venmo Scams Targeting Users via Text MessagesSpam

Bleepingcomputer

18.9.19

TFlower Ransomware - The Latest Attack Targeting BusinessesRansomware

Bleepingcomputer

18.9.19

Misconfigured Google Calendars Share Events With the WorldIncindent

Bleepingcomputer

18.9.19

Millions of Lion Air Passenger Records Exposed and Exchanged on ForumsIncindent

Bleepingcomputer

18.9.19

Most Cyber Attacks Focus on Just Three TCP PortsAttack

Bleepingcomputer

18.9.19

Emotet Revived with Large Spam Campaigns Around the WorldSpam  Virus

Bleepingcomputer

18.9.19

Windows 10 1903 is Now Having Problems with Network AdaptersOS

Bleepingcomputer

18.9.19

Microsoft Exchange Server 2010 Support Gets a Life ExtensionSafety

Bleepingcomputer

18.9.19

Phishing Attack Targets The Guardian's Whistleblowing SitePhishing

Bleepingcomputer

18.9.19

Password-Revealing Bug Quickly Fixed in LastPass ExtensionsVulnerebilityBleepingcomputer

18.9.19

Memory corruption flaw in AMD Radeon driver allows VM escapeVulnerebilitySecurityaffairs

18.9.19

Skidmap Linux miner leverages kernel-mode rootkits to evade detectionVirusSecurityaffairs

18.9.19

U.S. Could Launch Cyberattack on Iran in Response to Saudi Oil AttackBigBrothersSecurityweek

18.9.19

Facebook Takes Down Misleading Campaigns From Iraq, UkraineSocialSecurityweek

18.9.19

Code Execution Vulnerabilities Found in Aspose PDF Processing ProductVulnerebilitySecurityweek

18.9.19

Supply Chain Likely Target in Attacks by Tortoiseshell Group on Saudi IT FirmsCyberCrimeSecurityweek

18.9.19

'Panda' Group Makes Thousands of Dollars Using RATs, Crypto-MinersCryptocurrency  CyberCrimeSecurityweek

18.9.19

Smominru Botnet Indiscriminately Hacked Over 90,000 Computers Just Last MonthBotNetThehackernews

18.9.19

Warning: Researcher Drops phpMyAdmin Zero-Day Affecting All VersionsVulnerebilityThehackernews

18.9.19

LastPass Fixes Bug That Leaks Credentials

Vulnerebility

Threatpost

18.9.19

Google Calendar Settings Gaffes Exposes Users’ Meetings, Company Details

Incindent

Threatpost

18.9.19

AMD Radeon Graphics Cards Open VMware Workstations to Attack

Attack

Threatpost

18.9.19

Panda Threat Group Mines for Monero With Updated Payload, Targets

CyberCrime

Threatpost

18.9.19

Cisco Extends Patch for IPv6 DoS Vulnerability

Vulnerebility

Threatpost

18.9.19

United States government files civil lawsuit against Edward Snowden

BigBrothers

Securityaffairs

18.9.19

Australia is confident that China was behind attack on parliament, political parties

BigBrothers

Securityaffairs

18.9.19

US Justice Department Sues Snowden Over New Book

BigBrothers

Securityweek

18.9.19

Industry Reactions to Massive Ecuador Data Leak

Incindent

Securityweek

18.9.19

Malware Sandboxing Firm VMRay Raises $10 Million

IT

Securityweek

18.9.19

United States Sues Edward Snowden and You'd be Surprised to Know Why

BigBrothers

Thehackernews

18.9.19

Emotet malspam is back

Spam

SANS

18.9.19

Security is slowly becoming essential to doing business

Security

Net-security

18.9.19

DNSSEC fueling new wave of DNS amplification attacks

Attack

Net-security

18.9.19

Confidential data of 24.3 million patients discovered online

Incindent

Net-security

18.9.19

Businesses facing post breach financial fallout by losing customer trust

Incindent

Net-security

18.9.19

What are the most connected countries around the world?

Security

Net-security

18.9.19

Download: RFP templates for EDR/EPP and APT protection

Safety

Net-security

17.9.19

Experts warn of the exposure of thousands of Google Calendars online

Incindent

Securityaffairs
17.9.19

Backup files for Lion Air and parent airlines exposed and exchanged on forums

Incindent

Securityaffairs
17.9.19

Linux Crypto-Miner Uses Kernel-Mode Rootkits for Evasion

Cryptocurrency

Securityweek
17.9.19

AMD Radeon Driver Flaw Leads to VM Escape

Vulnerebility

Securityweek

17.9.19

Exclusive: Thousands of Google Calendars Leaking Private Information Online

Incindent

Thehackernews

17.9.19

U.S. Sanctions North Korean Group Behind WannaCry, Sony Hacks

BigBrothers

Threatpost

17.9.19

New Threat Actor Fraudulently Buys Digital Certificates to Spread Malware

Virus

Threatpost

17.9.19

Marketing Analytics Company Leaks Deep Profiles of Entire Ecuador Population

Privacy

Threatpost

17.9.19

Asus, Lenovo and Other Routers Riddled with Remotely Exploitable Bugs

Vulnerebility

Threatpost

17.9.19

Assessing the impact of protection from web miners

Cryptocurrency

Securelist
17.9.19

Experts found 125 new flaws in SOHO routers and NAS devices from multiple vendors

Vulnerebility

Securityaffairs
17.9.19

Oracle Launches New Services to Secure the Cloud

Safety

Securityweek
17.9.19

Australia Knows China Hacked Its Parliament: Report

BigBrothers

Securityweek

17.9.19

Fraudulent purchases of digitals certificates through executive impersonation

CyberCrime  Safety

Securityaffairs
17.9.19

MobiHok RAT, a new Android malware based on old SpyNote RAT

Virus

Securityaffairs

17.9.19

SOHOpelessly Broken 2.0: 125 Vulnerabilities Found in Routers, NAS Devices

Vulnerebility

Securityweek
17.9.19

Security Firm: Data Breach Exposes Millions of Ecuadorians

Incindent

Securityweek
17.9.19

InnfiRAT Targets Personal Data, Cryptocurrency Wallets

Virus

Securityweek
17.9.19

Snowden Says He Would Return to US If He Can Get a Fair Trial

BigBrothers

Securityweek
17.9.19

125 New Flaws Found in Routers and NAS Devices from Popular Brands

Vulnerebility

Thehackernews

17.9.19

Encrypted Sextortion PDFs

Crypto

SANS

17.9.19

Five ways to manage authorization in the cloud

Security

Net-security

17.9.19

Targeted threat intelligence and what your organization might be missing

Security

Net-security

17.9.19

Researchers uncover 125 vulnerabilities across 13 routers and NAS devices

Vulnerebility

Net-security

17.9.19

BotSlayer tool can detect coordinated disinformation campaigns in real time

BotNet

Net-security

17.9.19

Phishing attacks up, especially against SaaS and webmail services

Phishing

Net-security

17.9.19

Only 15% of organizations can recover from a severe data loss within an hour

Security

Net-security

16.9.19

Data leak exposes sensitive data of all Ecuador ‘citizensIncindentSecurityaffairs
16.9.19Saudi Attacks Expose Threat to Critical InfrastructureBigBrothersSecurityweek
16.9.19LastPass Patches Bug Leaking Last-Used CredentialsVulnerebilitySecurityweek

16.9.19

Serious Flaws in CODESYS Products Expose Industrial Systems to Remote AttacksVulnerebilitySecurityweek

16.9.19

Securing the 2020 Elections From Multifarious ThreatsSecuritySecurityweek

16.9.19

A flaw in LastPass password manager leaks credentials from previous siteVulnerebilitySecurityaffairs
16.9.19Recycled Source Code Used to Create New MobiHok Android RATAndroid  VirusSecurityweek
16.9.19Tor Raises $86K to Smash BugsSecuritySecurityweek

16.9.19

WhatsApp 'Delete for Everyone' Doesn't Delete Media Files Sent to iPhone UsersApple  SocialThehackernews

16.9.19

How to Enable Ransomware Protection in Windows 10Ransomware

Bleepingcomputer

16.9.19Microsoft Edge Gets a new Extensions Menu, Here's How to Enable ItOS

Bleepingcomputer

16.9.19Tor's Bug Bash Fund Raises $86K to Fix Critical IssuesSecurity

Bleepingcomputer

16.9.19

France and Germany will block Facebook’s Libra cryptocurrencyCryptocurrencySecurityaffairs
16.9.19Hundreds Laid Off by Symantec as Part of Restructuring PlanITSecurityweek
16.9.19Snowden Says Would Like French AsylumBigBrothersSecurityweek

16.9.19

Tor Project’s Bug Smash Fund raises $86K in August

Security

Securityaffairs
16.9.19

Astaroth Trojan leverages Facebook and YouTube to avoid detection

Virus

Securityaffairs
16.9.19

UK Teen Arrested in US-Led Music Hacking Probe

Crime

Securityweek

16.9.19

CISO do’s and don’ts: Lessons learned

Security

Net-security

16.9.19

Threat visibility is imperative, but it’s even more essential to act

Security

Net-security

16.9.19

Four in five businesses need ways to better secure data without slowing innovation

Security

Net-security

16.9.19

Exploitation of IoT devices and Windows SMB attacks continue to escalate

Exploit  IoT

Net-security

16.9.19

Only one quarter of retail banks have adopted an integrated approach to financial crime systems

CyberCrime

Net-security

16.9.19

Cyber Battle of the Emirates: Training the next generation of cyber security pros

BigBrothers

Net-security

15.9.19

Drone attacks hit two Saudi Arabia Aramco oil plants

BigBrothers

Securityaffairs

15.9.19

Delaler Leads, a car dealer marketing firm exposed 198 Million records online

Incindent

Securityaffairs

15.9.19

A bug in Instagram exposed user accounts and phone numbers

Social

Securityaffairs

15.9.19

Ransom NewsRansomRansom

15.9.19

Window 10 1903 OOB Update Released to to Fix USB MicrophonesOS

Bleepingcomputer

15.9.19

Nemty Ransomware Update Lets It Kill Processes and ServicesRansomware

Bleepingcomputer

15.9.19

Microsoft Releases Workaround for Windows 10 Audio Issues in GamesOS

Bleepingcomputer

15.9.19

iOS 13 Passcode Bypass Lets You View Contacts on Locked DevicesApple

Bleepingcomputer

15.9.19

InnfiRAT Malware Steals Litecoin And Bitcoin Wallet InformationVirus

Bleepingcomputer

15.9.19

Destructive Ordinypt Malware Hitting Germany in New Spam CampaignSpam  Virus

Bleepingcomputer

15.9.19

North Korean Hackers Behind WannaCry and Sony Hack Sanctioned by USABigBrothers

Bleepingcomputer

15.9.19

Suspected Hacker Arrested for Stealing and Selling Unreleased MusicHacking

Bleepingcomputer

15.9.19

'N1ghTm4r3' Scam Threatens to Expose Victims Watching Illegal PornSpam

Bleepingcomputer

15.9.19

Windows 10 1903 KB4515384 Update Affects Audio Quality in GamesOS

Bleepingcomputer

15.9.19

Giant Entercom Radio Network Deals with Ransomware-Like IncidentRansomware

Bleepingcomputer

15.9.19

Garmin SA Shopping Portal Breach Leads to Theft of Payment DataIncindent

Bleepingcomputer

15.9.19

Expert disclosed passcode bypass bug in iOS 13 a week before its release

Apple

Securityaffairs

15.9.19

InnfiRAT Trojan steals funds from Bitcoin and Litecoin wallets

Virus

Securityaffairs

14.9.19

Hackers stole payment data from Garmin South Africa shopping portal

Hacking

Securityaffairs

14.9.19

Ohio Gamer Sentenced to 15 Months Prison in 'Swatting' Case

Crime

Securityweek

14.9.19

US Sanctions 3 North Korean Hacking Groups Accused for Global Cyber Attacks

BigBrothers

Thehackernews

14.9.19

GLUPTEBA EXPANDS OPERATION AND TOOLKIT WITH LOLBINS AND CRYPTOMINER

Cryptocurrency blog

Cybereason

14.9.19

How Visiting a Trusted Site Could Infect Your Employees

Hacking blog

Mcafee blog

14.9.19

Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study

Malware blog

Mcafee blog

14.9.19

How To Survive the Rash of Ransomware

Ransomware blog

F5 Labs

14.9.19

Cryptocurrency Hacks 2019

Cryptocurrency blog

F5 Labs

14.9.19

Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and Containment

Ransomware blog

FireEye

14.9.19

Open Sourcing StringSifter

Security blog

FireEye

14.9.19

New Stealthy Ad Clicking Tactics Found in Popular Apps on Google Play

OS Blog

Symantec

14.9.19

Thrip: Ambitious Attacks Against High Level Targets Continue

Attack blog

Symantec

14.9.19

Watchbog and the Importance of Patching

Vulnerebility blog

Cisco Talos

14.9.19

Microsoft Patch Tuesday — Sept. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

14.9.19

Vulnerability Spotlight: Denial-of-service vulnerabilities in some NETGEAR routers

Vulnerebility blog

Cisco Talos

14.9.19

A vulnerability in Instagram exposes personal information of users

Vulnerebility blog

Eset

14.9.19

Selfies for kids – A guide for parents

Safety blog

Eset

14.9.19

ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group

Malware blog

Eset

14.9.19

Car Dealer Marketing Firm Exposed 198 Million Data RecordsIncindentSecurityweek
14.9.19US Puts Sanctions on N.Korea Hacking Groups Behind Major TheftsBigBrothers  CyberCrimeSecurityweek
14.9.19Arizona Schools Provide Model for Managing RansomwareRansomwareSecurityweek
14.9.19Shape Security Raises $51 Million at $1 Billion ValuationITSecurityweek
14.9.19WiryJMPer Dropper Employs Heavy Obfuscation to Deliver NetwireVirusSecurityweek
14.9.19Sophos Makes Sandboxie Free in Transition to Open SourceSafetySecurityweek
14.9.19IBM Launches z15 Mainframe With New Data Protection CapabilitiesSafetySecurityweek
14.9.19Netanyahu, Trump Deny Report of Israeli Spying Near White HouseBigBrothersSecurityweek

14.9.19

Astaroth Spy Trojan Uses Facebook, YouTube Profiles to Cover Tracks

Social  Virus

Threatpost

14.9.19

iPhone iOS 13 Lockscreen Bypass Flaw Exposes Contacts

Apple

Threatpost

14.9.19

North Korean Spear-Phishing Attack Targets U.S. Firms

APT  Phishing

Threatpost

14.9.19

WordPress XSS Bug Allows Drive-By Code Execution

Vulnerebility

Threatpost
14.9.19

Cybercriminals Adding Sophistication to BEC Threats

CyberCrime  Spam

Threatpost
14.9.19

The US Treasury placed sanctions on North Korea linked APT Groups

APT

Securityaffairs
14.9.19

WatchBog cryptomining botnet now uses Pastebin for C2

Cryptocurrency

Securityaffairs
14.9.19

Yikes! iOS 13 Coming Next Week With iPhone LockScreen Bypass Bug

Apple

Thehackernews

13.9.19

Ukrainian Man Pleads Guilty to Hacking, Wire Fraud Charges

BigBrothers

Securityweek

13.9.19

Israeli Spyware Firm Adopts 'Human Rights Policy'

BigBrothers

Securityweek

13.9.19

Android Flashlight Apps Request up to 77 Permissions

Android

Securityweek

13.9.19

DoS Vulnerabilities Patched in NETGEAR N300 Routers

Vulnerebility

Securityweek

13.9.19

Russian Hackers Behind Ukraine Power Outage May Have Sought More Damage

BigBrothers

Securityweek

13.9.19

Sandboxie becomes freeware, soon-to-be open source

Security

Net-security

13.9.19

Windows 10 1903 Orange Tint Screenshot Issue Addressed by LenovoOS

Bleepingcomputer

13.9.19

New WiryJMPer Dropper Hides Netwire RAT Payloads in Plain SightVirus

Bleepingcomputer

13.9.19

Microsoft Publishes Solutions for Windows 10 Search IssuesOS

Bleepingcomputer

13.9.19

Iranian Hackers Hit Over 60 Universities to Get Library AccessBigBrothers

Bleepingcomputer

13.9.19Windows 10 Build 18980 Released for All Insiders With New Cortana AppOS

Bleepingcomputer

13.9.19

Ryuk Related Malware Steals Confidential Military, Financial FilesVirus

Bleepingcomputer

13.9.19

Google Chrome May Let Sites Block Your Screen from Powering DownSecurity

Bleepingcomputer

13.9.19

Virtual Disk Attachments Can Bypass Gmail and Chrome SecuritySecurity

Bleepingcomputer

13.9.19

Microsoft to Improve Office 365 Phishing Email NotificationsPhishing

Bleepingcomputer

13.9.19Intel Patches Privilege Escalation Flaw in Easy Streaming WizardVulnerebility

Bleepingcomputer

13.9.19

California Passes Bill to Ban Police Use of Facial Recognition

BigBrothers

Threatpost

13.9.19

1B Mobile Users Vulnerable to Ongoing ‘SimJacker’ Surveillance Attack

Attack  Mobil

Threatpost

13.9.19

Strangest Phishing Lures of 2019: From Divorce Papers to Real Estate Decoys

Phishing

Threatpost

13.9.19

UNICEF Leaks Personal Data of 8,000 Users via Email Blunder

Incindent

Threatpost
13.9.19

Library-Themed University Phishing Attack Expands to Massive Scale

Phishing

Threatpost

13.9.19

SimJacker attack allows hacking any phone with just an SMS

Mobil

Securityaffairs

13.9.19

Attack Traffic Caught by Honeypots Triples Over Six Months

Security

Securityweek

13.9.19

Wikimedia Gets $2.5 Million in Funding to Secure Wikipedia

Safety

Securityweek

13.9.19

Poland to Launch Cyberspace Defense Force

BigBrothers

Securityweek
13.9.19

WatchBog Crypto-Mining Botnet Relies on Pastebin for C&C

Cryptocurrency

Securityweek

13.9.19

Simjacker: SIM Card Attack Used to Spy on Mobile Phone Users

Mobil

Securityweek
13.9.19

Rig Exploit Kit Delivering VBScript

Exploit

SANS

13.9.19

The rise of modern applications, DevSecOps and the intelligence economy

Security

Net-security

13.9.19

Security leaders lack confidence in the supply chain, fear third-party attacks

SecurityNet-security

13.9.19

Interacting with governments in the digital age: What do citizens think?

Security

Net-security
13.9.19

Cyber risk assessment of U.S. election commissions finds critical areas for improvement

BigBrothers

Net-security

12.9.19

SAP September 2019 Security Patch Day addresses four Security Notes rated as Hot NewsVulnerebilitySecurityaffairs
12.9.19Iran-linked group Cobalt Dickens hit over 60 universities worldwideBigBrothersSecurityaffairs

12.9.19

Iran-Linked Hackers Again Target UniversitiesBigBrothersSecurityweek
12.9.19Cloud Security Firm Lacework Raises $42 MillionITSecurityweek

12.9.19

North Korean Hackers Use New Tricks in Attacks on U.S.BigBrothersSecurityweek

12.9.19

Microsoft Makes Automated Incident Response in Office 365 ATP Generally AvailableSafetySecurityweek
12.9.19New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMSHacking  MobilThehackernews

12.9.19

Chrome 77 Released With Removed EV Certificate IndicatorSecurity

Bleepingcomputer

12.9.19New NetCAT Attack Can Leak Sensitive Data From Intel CPUsAttack

Bleepingcomputer

12.9.19

Microsoft Releases Servicing Stack Updates for All Windows 10 VersionsOS

Bleepingcomputer

12.9.19Google Unveils DNS-over-HTTPS (DoH) Plan, Mozilla's Faces CriticismSecurity

Bleepingcomputer

12.9.19

281 Arrested in Worldwide Business Email Compromise CrackdownSpam

Bleepingcomputer

12.9.19

Microsoft Fixes Windows 10 High CPU Usage in CortanaVulnerebility

Bleepingcomputer

12.9.19LokiBot Info-Stealer Used in Spear Phishing Attack on US CompanyBotNet  Phishing

Bleepingcomputer

12.9.19

Windows 10 KB4515384 and KB4512578 Released With FixesOS  Vulnerebility

Bleepingcomputer

12.9.19Microsoft's September 2019 Patch Tuesday Fixes 79 VulnerabilitiesOS  Vulnerebility

Bleepingcomputer

12.9.19Microsoft Releases the September 2019 Security Updates for OfficeVulnerebility

Bleepingcomputer

12.9.19

Blocking Firefox DoH with Bind

Security

SANS
12.9.19

Simjacker vulnerability actively exploited to track, spy on mobile phone owners

Mobil

Net-security

12.9.19

Credential Leaking Vulnerabilities Impact Comba, D-Link RoutersVulnerebilitySecurityweek
12.9.19Chinese Woman Guilty of Trespassing at Trump's Mar-a-LagoBigBrothersSecurityweek

12.9.19

Popular Period Tracking Apps Share Your Sexual Health Data With FacebookSocialThehackernews

12.9.19

LokiBot info stealer involved in a targeted attack on a US Company

BotNet

Securityaffairs
12.9.19

NetCAT attack allows hackers to steal sensitive data from Intel CPUs

Attack

Securityaffairs

12.9.19

How to navigate critical data security and privacy policy challenges

Privacy

Net-security

12.9.19

IIoT security challenges: Dealing with cutting edge technologies

IoT

Net-security

12.9.19

More than a year after GDPR implementation, half of UK businesses are not fully compliant

Privacy

Net-security

12.9.19

Security holding back employers from meeting employees’ remote working expectations

Security

Net-security

11.9.19

NetCAT: New Attack Lets Hackers Remotely Steal Data From Intel CPUsAttackThehackernews

11.9.19

CISO Kit — Breach Protection in the Palm of Your HandSafetyThehackernews

11.9.19

Google to Experiment 'DNS over HTTPS' (DoH) Feature in Chrome 78SecurityThehackernews

11.9.19

Mozilla Launches 'Firefox Private Network' VPN Service as a Browser ExtensionSecurityThehackernews

11.9.19

Hundreds of BEC Scammers Arrested in Nigeria and U.S. — $3.7 Million RecoveredSpamThehackernews

11.9.19

Threats to macOS usersAppleSecurelist

11.9.19

Intel CPUs Vulnerable to Sensitive Data Leakage in NetCAT Attack

Attack

Threatpost

11.9.19

Feds Indict 281 People for Involvement in Massive Email Fraud Scheme

CyberCrime

Threatpost

11.9.19

198 Million Car-Buyer Records Exposed Online for All to See

Incindent

Threatpost

11.9.19

Microsoft Addresses Two Zero-Days Under Active Attack

Vulnerebility

Threatpost

11.9.19

CISO/CIO: Get an iPad and Apple Watch with an App Monitoring your Security 24/7

Apple

Threatpost

11.9.19

Strangest Phishing Lures of 2019: From Divorce Papers to Real Estate Decoys

Phishing

Threatpost

11.9.19

The Wolcott school district suffered a second ransomware attack in 4 monthsRansomwareSecurityaffairs

11.9.19

Dissecting the 10k Lines of the new TrickBot DropperBotNetSecurityaffairs

11.9.19

Some models of Comba and D-Link WiFi routers leak admin credentialsHackingSecurityaffairs

11.9.19

DNS-over-HTTPS Coming to Chrome 78SecuritySecurityweek

11.9.19

Loss to BEC Fraud Now Claimed to be $26 BillionSpamSecurityweek

11.9.19

Telegram Failed to Delete Removed Images From Local StorageSocialSecurityweek
11.9.19SAP Patches Critical Vulnerability in NetWeaverVulnerebilitySecurityweek

11.9.19

Chrome 77 Released with 52 Security Fixes

VulnerebilitySecurityweek

11.9.19

18 Years later, America Vows to 'Never Forget' 9/11SecuritySecurityweek
11.9.19Siemens Issues Advisories for DejaBlue, SACK Panic VulnerabilitiesICSSecurityweek

11.9.19

NetCAT Attack: Hackers Can Remotely Steal Data From Servers With Intel CPUsAttackSecurityweek

11.9.19

281 BEC scammers arrested in worldwide law enforcement action

Spam

Net-security

11.9.19

September 2019 Patch Tuesday: Microsoft plugs two actively exploited zero-days

Vulnerebility

Net-security

11.9.19

Adobe September 2019 Patch Tuesday updates fix 2 code execution flaws in Flash PlayerVulnerebilitySecurityaffairs

11.9.19

Microsoft Patch Tuesday updates for September 2019 fix 2 privilege escalation flaws exploited in attacksVulnerebilitySecurityaffairs

11.9.19

Million of Telestar Digital GmbH IoT radio devices can be remotely hackedIoTSecurityaffairs

11.9.19

Hundreds Arrested in Joint US-Nigeria Crackdown on Cyber ScamsBigBrothersSecurityweek
11.9.19Ransomware Attack Hits School District Twice in 4 MonthsRansomwareSecurityweek

11.9.19

SD-WAN: Disruptive Technology That Requires Careful Security ConsiderationSecuritySecurityweek

11.9.19

Microsoft Patches Two Privilege Escalation Flaws Exploited in AttacksVulnerebilitySecurityweek
11.9.19Latest Microsoft Updates Patch 4 Critical Flaws In Windows RDP ClientVulnerebilitySecurityweek

11.9.19

Microsoft September 2019 Patch Tuesday

Vulnerebility

SANS

11.9.19

Regulations are driving innovation toward an identity layer on the Internet

Security

Net-security

11.9.19

Fraudsters no longer operate in silos, they are attacking across industries and organizations

Security

Net-security

11.9.19

IoT attacks increasing in the cyber underground

IoT

Net-security

11.9.19

Download PPT template: Security for Management

Security

Net-security

10.9.19

Million of Telestar Digital GmbH IoT radio devices can be remotely hacked

Hacking  IoT

Securityaffairs

10.9.19

New Stealth Falcon Backdoor Discovered

Virus

Securityweek

10.9.19

Adobe Patches Two Code Execution Vulnerabilities in Flash Player

Vulnerebility

Securityweek

10.9.19

Some D-Link and Comba WiFi Routers Leak Their Passwords in Plaintext

Crypto

Thehackernews

10.9.19

Adobe Releases Security Patches For Critical Flash Player Vulnerabilities

Vulnerebility

Thehackernews

10.9.19

Adobe Releases Security Updates for Flash Player and Application ManagerVulnerebility

Bleepingcomputer

10.9.19

Business Email Compromise Is a $26 Billion Scam Says the FBISpam

Bleepingcomputer

10.9.19

Bugs in D-Link and Comba Networking Gear Disclose PasswordsVulnerebility

Bleepingcomputer

10.9.19

Microsoft Teams Can Be Used To Execute Arbitrary PayloadsSecurity

Bleepingcomputer

10.9.19

Microsoft Phishing Page Uses Captcha to Bypass Automated DetectionPhishing

Bleepingcomputer

10.9.19

Office 365 ATP Automated Incident Response Now Generally AvailableSecurity

Bleepingcomputer

10.9.19

Exploit Kits Target Windows Users with Ransomware and TrojansExploit  Ransomware

Bleepingcomputer

10.9.19

PsiXBot Modular Malware Gets New Sextortion, Google DoH UpgradesBotNet  Virus

Bleepingcomputer

10.9.19Telegram Fixes Privacy Bug Caused by Improperly Deleted MessagesSocial

Bleepingcomputer

10.9.19

Wikipedia DDoS Attacks Prompt NCSC to Remind of DoS MitigationAttack

Bleepingcomputer

10.9.19Microsoft Removes Two Windows 10 1903 Upgrade BlocksOS

Bleepingcomputer

10.9.19Hacked Instagram Account of Robert Downey Jr. Pushes iPhone GivewayApple  Social

Bleepingcomputer

10.9.19

Police dismantled Europe’s second-largest counterfeit currency network on the dark web

BigBrothers

Securityaffairs

10.9.19

Vulnerabilities Exposed 2 Million Verizon Customer Contracts

Vulnerebility

Securityweek

10.9.19

Cyber Fusion Center-in-a-Box Firm Cyware Raises $3 Million in Seed Funding

IT

Securityweek

10.9.19

Office 365 security: Automated incident response based on playbooks

Security

Net-security

10.9.19

ML, AI enthusiasts to showcase cyber solutions at HITB+ CyberWeek’s AI Challenge

Congress

Net-security

10.9.19

Robert Downey Jr’s Instagram account has been hackedHackingSecurityaffairs
10.9.19HackerOne Raises $36.4 Million in Series D Funding RoundIT

Securityweek

10.9.19

Telnet Backdoor Opens More Than 1M IoT Radios to Hijack

IoT  Virus

Threatpost

10.9.19

Apple Claims Google is Spreading FUD Over Patched iPhone Bugs

Apple

Threatpost

10.9.19

Stealth Falcon Targets Middle East with Windows BITS Feature

Virus

Threatpost

10.9.19

Critical Exim Flaw Opens Millions of Servers to Takeover

Vulnerebility

Threatpost

10.9.19

PsiXBot Adds PornModule, Google DNS Service to Its Arsenal

BotNet

Threatpost

10.9.19

Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks

Attack

Threatpost
10.9.19

DoS attack the caused disruption at US power utility exploited a known flaw

Attack

Securityaffairs
10.9.19

Stealth Falcon’s undocumented backdoor uses Windows BITS to exfiltrate data

Virus

Securityaffairs
10.9.19

DNS-over-HTTPS Coming to Firefox

Safety

Securityweek

10.9.19

More than 99% of cyberattacks rely on human interaction

Security

Net-security

10.9.19

Shine a light on shadow IT to improve organizational resilience

Security

Net-security

10.9.19

70% of educational orgs don’t have an appropriate cloud security budget

Security

Net-security

10.9.19

The use of SOX-specific solutions has more than doubled since last year

Security

Net-security

10.9.19

eBook: A new gold standard for OT security monitoring

Security

Net-security

9.9.19

Telegram Privacy Fails AgainSocialSecurityaffairs

9.9.19

Symantec uncovered the link between China-Linked Thrip and Billbug groupsAPTSecurityaffairs

9.9.19

Swedish GDPR Fine Highlights Legal Challenges in Use of BiometricsPrivacy

Securityweek

9.9.19

Cyberattack Disrupted Firewalls at U.S. Power UtilityAttackSecurityweek
9.9.19U.S. Cyber Command Adds North Korean Malware Samples to VirusTotalBigBrothers

Securityweek

9.9.19

BlueKeep Exploit Added to MetasploitExploitSecurityweek

9.9.19

Man Pleads Guilty for Trying to Access Trump's Tax ReturnsBigBrothers

Securityweek

9.9.19

Private Equity Firms Interested in Buying Symantec for $16 Billion: ReportITSecurityweek

9.9.19

Several Vulnerabilities Found in Red Lion HMI SoftwareVulnerebilitySecurityweek

9.9.19

New Malware Uses Windows BITS Service to Stealthy Exfiltrate DataVirusThehackernews
9.9.19

Is your smartphone secretly listening to you?

Mobil

Net-security

9.9.19

This is what our summer’s like

Security

Securelist

9.9.19

Wikipedia suffered intermittent outages as a result of a malicious attack

Virus

Securityaffairs

9.9.19

China-Linked 'Thrip' Cyberspies Continue Attacks on Southeast Asia

APT

Securityweek

9.9.19

Cisco Releases GhIDA and Ghidraaas Tools for IDA ProSecuritySecurityweek

9.9.19

Facebook Patches "Memory Disclosure Using JPEG Images" Flaws in HHVM ServersSocialThehackernews

9.9.19

China-linked APT3 was able to modify stolen NSA cyberweapons

APT

Securityaffairs

9.9.19

Belarusian authorities seized XakFor, one of the largest Russian-speaking hacker sites

CyberCrime

Securityaffairs

9.9.19

Parts of Wikipedia Offline After 'Malicious' Attack

Virus

Securityweek

9.9.19

Cybersecurity issues can’t be solved by simply buying a product

Cyber

Net-security

9.9.19

SMBs show no improvement in IT maturity levels, security remains top concern

Security

Net-security

9.9.19

Should social media organizations be subject to strict privacy regulation?

Privacy

Net-security

9.9.19

Bots evolving to better mimic humans during elections

BotNet

Net-security

9.9.19

The global impact of 5G technologies

Mobil

Net-security

9.9.19

Mini eBook: CISSP Practice Tests

Security

Net-security

8.9.19

Ransom News

Ransom

Ransom

8.9.19

Fake PayPal Site Spreads Nemty Ransomware

Ransomware

Bleepingcomputer

8.9.19

Windows 10 to Let You Rename Virtual Desktops, Here's How

OS

Bleepingcomputer

8.9.19

Google Calendar Spam Got You Down? A Fix Is on The Way

Spam

Bleepingcomputer

8.9.19

Windows 10 Insider Build 18975 Released With Movable Cortana and Bug Fixes

OS

Bleepingcomputer

8.9.19

Public BlueKeep Exploit Module Released by MetaSploit

Exploit

Bleepingcomputer

8.9.19

Over $37 Million Lost by Toyota Boshoku Subsidiary in BEC Scam

Spam

Bleepingcomputer

8.9.19

WordPress 5.2.3 fixes multiple issues, including some severe XSS flaws

Vulnerebility

Securityaffairs

8.9.19

Toyota Boshoku Corporation lost over $37 Million following BEC attack

Spam

Securityaffairs

8.9.19

University, Professional Certification or Direct Experience?

Security

Securityaffairs

8.9.19

Experts found Joker Spyware in 24 apps in the Google Play store

Android

Securityaffairs

8.9.19

Google report on iPhone hack created ‘False Impression,’ states Apple

Apple

Securityaffairs

8.9.19

Experts add a BlueKeep exploit module to MetaSploit

Exploit

Securityaffairs

8.9.19

Thousands of servers infected with the Lilocked Ransomware

Ransomware

Securityaffairs

8.9.19

Apple: Security Report on iPhone Hack Created 'False Impression'

Apple

Securityweek

8.9.19

Unidentified Scanning Activity

Security

SANS

7.9.19

Lilocked Ransomware Actively Targeting Servers and Web Sites

Ransomware

Bleepingcomputer

7.9.19

GootKit Malware Bypasses Windows Defender by Setting Path Exclusions

Virus

Bleepingcomputer

7.9.19

Critical Exim TLS Flaw Lets Attackers Remotely Execute Commands as Root

Crypto  Vulnerebility

Bleepingcomputer

7.9.19

Windows and AV Software Ignore Malware in Virtual Disk Files

Virus

Bleepingcomputer

7.9.19

FBI Warns Students to Think Before They Post Online Threats

BigBrothers

Bleepingcomputer

7.9.19

Microsoft Announces First PowerToys Preview Release for Windows 10

OS

Bleepingcomputer

7.9.19

Students Rejoice: School District Closed by Ransomware Attack

Ransomware

Bleepingcomputer

7.9.19

Amazon AWS Outage Shows Data in the Cloud is Not Always Safe

Safety

Bleepingcomputer

7.9.19

Buggy GPS Trackers Expose Childrens’ Real-Time Location

Privacy

Bleepingcomputer

7.9.19

WordPress 5.2.3 Released with Security and Bug Fixes

Vulnerebility

Bleepingcomputer

7.9.19

Twitter Suspends SMS-Based Tweeting After High-Profile Account Hacks

Social

Bleepingcomputer

7.9.19

Ransomware Adopts DoppelPaymer Name Given by Researchers

Ransomware

Bleepingcomputer

7.9.19

Hackers Ask for $5.3 Million Ransom, Turn Down $400k, Get Nothing

Ransomware

Bleepingcomputer

7.9.19

Android Zero-Day Bug Does Not Make It on Google’s 'Fix' List

Android

Bleepingcomputer

7.9.19

Facebook and Instagram Start Fighting Vaccine Misinformation

Social

Bleepingcomputer

7.9.19

Stealthy Android Trojan Spy Signs You Up For Premium Subscriptions

Virus

Bleepingcomputer

7.9.19

Year-Old Samba Bug Allows Access to Forbidden Root Share Paths

Vulnerebility

Bleepingcomputer

7.9.19

Glupteba Malware Uses Bitcoin Blockchain to Update C2 Domains

Cryptocurrency

Bleepingcomputer

7.9.19

Google Chrome Starts Testing Third-Party Cookie Blocking

Privacy

Bleepingcomputer

7.9.19

Android SMS Phishing Can Stealthily Enable Malicious Settings

Android  Phishing

Bleepingcomputer

7.9.19

Apple iOS Attack Underscores Importance of Threat Research

OS Blog

Mcafee blog
7.9.19

De-icing IcedID: Decompression and Decryption Methods Explained in an IcedID Attack

Attack blog

F5 Labs

7.9.19

5 Questions to Ask to See If Your Security Team is Cloud Incident Ready

Incident blog

F5 Labs

7.9.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in July 2019

Security blog

F5 Labs

7.9.19SharPersist: Windows Persistence Toolkit in C#Security blogFireEye

7.9.19

Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and ContainmentRansomware blogFireEye

7.9.19

UPSynergy: Chinese-American Spy vs. Spy StoryBigBrother blogCheckpoint
7.9.19GhIDA: Ghidra decompiler for IDA ProSecurity blog

Cisco Talos

7.9.19Vulnerability Spotlight: Information disclosure vulnerability in Blynk-LibraryVulnerebility blog

Cisco Talos

7.9.19The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to defend against encrypted DejaBlueVulnerebility blog

Cisco Talos

7.9.19Vulnerability Spotlight: Two vulnerabilities in Epignosis eFrontVulnerebility blog

Cisco Talos

7.9.19

Firefox 69: Third‑Party Tracking Cookies and Cryptomining Now Blocked by DefaultCryptocurrency blog

Eset

7.9.19Semi‑annual balance of mobile security 2019Hardware blog

Eset

7.9.19

What is MITRE ATT&CK and how is it useful?Security blog

Eset

7.9.19

Exim fails to properly handle peer DN and SNI in TLS handshakesAlertAlert

7.9.19

"Splintering" Makes Hacking Passwords 14 Million Percent HarderHackingSecurityweek
7.9.19Industrial Manufacturing Firm DK-LOK Exposes Emails, Customer DataICSSecurityweek
7.9.19Oklahoma Pension Fund Reports $4.2 Million Cyber TheftCyberCrimeSecurityweek
7.9.19Industry Reactions to Iranian Mole Planting Stuxnet: Feedback FridayBigBrothersSecurityweek
7.9.19Exim Vulnerability Allows Remote Code Execution as RootVulnerebilitySecurityweek

7.9.19

CVE-2019-15846 Exim mail server flaw allows Remote Code ExecutionVulnerebilitySecurityaffairs

6.9.19

Facebook, Microsoft Challenge Industry to Detect, Prevent ‘Deepfakes’

Social

Threatpost

6.9.19

China’s APT3 Pilfers Cyberweapons from the NSA

APT

Threatpost

6.9.19

Back-to-School Scams Target Students with Library-Themed Emails

Spam

Threatpost

6.9.19

Joker Spyware Found in 24 Google Play Apps

Android  Virus

Threatpost

6.9.19

FunkyBot Malware Intercepts Android Texts, 2FA Codes

Android  Virus

Threatpost

6.9.19

PHP new versions fix multiple code execution issues

Vulnerebility

Securityaffairs
6.9.19

Over 600k GPS trackers left exposed online with a default password of ‘123456’

Mobil

Securityaffairs
6.9.19

Zero-day vulnerability in Android OS yet to be patched

Android

Securityaffairs
6.9.19

Hundreds of millions of Facebook users’ phone numbers exposed online

Social

Securityaffairs
6.9.19

Cisco Patches Remote Command Execution in Webex Teams Client

Vulnerebility

Securityweek
6.9.19

Unpatched Privilege Escalation Vulnerability Impacts Android

Android

Securityweek
6.9.19

PerimeterX Raises Another $14 Million in Series C Round

IT

Securityweek

6.9.19

Firefox 69 Patches Critical Code Execution Flaw

Vulnerebility

Securityweek
6.9.19

No Ransom Paid in Recent Attack, Texas Says

Ransomware

Securityweek
6.9.19

Data Protection Firm BigID Raises $50 Million

IT

Securityweek
6.9.19

Ransomware Attack Locks Out New Bedford City Data

Ransomware

Securityweek
6.9.19

A Summer of Discontent: The Hottest Malware Hits

Virus

Thehackernews
6.9.19

Exim TLS Flaw Opens Email Servers to Remote 'Root' Code Execution Attacks

Crypto  Vulnerebility

Thehackernews
6.9.19

Multiple Code Execution Flaws Found In PHP Programming Language

Vulnerebility

Thehackernews
6.9.19

Flaws in Over Half a Million GPS Trackers Expose Children Location Data

Mobil

Thehackernews
6.9.19

Google Fined $170 Million For Violating Kids' Privacy On YouTube

Privacy

Thehackernews
6.9.19

PowerShell Script with a builtin DLL

Virus

SANS
6.9.19

Google’s differential privacy library can now be used by anyone

Privacy

Net-security
6.9.19

September 2019 Patch Tuesday forecast: Microsoft security update will be complete

Vulnerebility

Net-security
6.9.19

Most citizens are against local governments paying ransomware attackers

Ransomware

Net-security
6.9.19

Business demands have outpaced the ability of IT to deliver services

Security

Net-security
6.9.19

Global security screening systems market to reach $12.2 billion by 2024

IT

Net-security
6.9.19

Google to pay $170 million for violating children’s privacy on YouTube

Privacy

Net-security

5.9.19

Year-Old Samba flaw allows escaping from the share path definitionVulnerebilitySecurityaffairs

5.9.19

New Bedford city infected with Ryuk ransomware, but did not pay $5.3M ransomRansomwareSecurityaffairs

5.9.19

Twitter temporarily disables feature to tweet via SMS after CEO hackSocialSecurityaffairs

5.9.19

Palo Alto Networks Acquires IoT Security Firm Zingbox for $75 MillionITSecurityweek

5.9.19

CircleCI Customer Data Exposed Through Third-Party VendorIncindentSecurityweek

5.9.19

WordPress 5.2.3 Patches Several XSS VulnerabilitiesVulnerebilitySecurityweek

5.9.19

400 Mn Facebook Users' Phone Numbers Exposed in Privacy Lapse: ReportsSocialSecurityweek

5.9.19

Crimeware Risk Underestimated, Chronicle FindsCyberCrimeSecurityweek

5.9.19

$5.3M Ransomware Demand: Massachusetts City Says No Thanks

Ransomware

Threatpost

5.9.19

Leaky Server Exposes 419M Phone Numbers of Facebook Users

Social

Threatpost

5.9.19

Mozilla Will Support Existing Ad Blockers in Extensions Manifest v3Security

Bleepingcomputer

5.9.19

Hackers Get $1.9M in Bug Bounties at Live Hacking SessionsHacking

Bleepingcomputer

5.9.19

Microsoft Investigating Windows 10 Cortana High CPU IssuesOS

Bleepingcomputer

5.9.19

Microsoft Releases September 2019 Office Updates With Fixes, ImprovementsOS

Bleepingcomputer

5.9.19

Hacked SharePoint Sites Used to Bypass Secure Email GatewaysHacking

Bleepingcomputer

5.9.19

Firefox 69 Released with Enhanced Tracking Protection and Flash DisabledPrivacy

Bleepingcomputer

5.9.19

Microsoft Uses Deep Learning For Malicious PowerShell DetectionVirus

Bleepingcomputer

5.9.19

XKCD Forum Breach Exposes Emails, Passwords of 562,000 UsersIncindent

Bleepingcomputer

5.9.19

Zerodium Makes Android Zero Days More Expensive Than iOSAndroid

Bleepingcomputer

5.9.19

New Toolkit Pushes Malware via Fake Program Update Alerts in 30 LanguagesVirus

Bleepingcomputer

5.9.19

Tech Firms, US Officials Talk Election Protection at FacebookSocialSecurityweek

5.9.19

Twitter Temporarily Disables Tweeting via SMS After CEO HackSocialSecurityweek

5.9.19

Twitter temporarily disables 'Tweeting via SMS' after CEO gets hackedSocialThehackernews

5.9.19

Supply chain security: Five IT strategies for choosing vendors wisely

Security

Net-security

5.9.19

Private IP Addresses in Malware Samples?

Virus

SANS

5.9.19

Creator of multiple IoT botnets, including Satori, pleaded guiltyBotNet  IoTSecurityaffairs

5.9.19

Google to Pay $170 mn Fine for Collecting YouTube Data From KidsPrivacy

Securityweek

5.9.19

TrickBot Makes Heavy Use of Evasion in Recent AttacksBotNetSecurityweek

5.9.19

Android's September 2019 Patches Fix Nearly 50 VulnerabilitiesAndroidSecurityweek

5.9.19

Vulnerability in Network Provisioning Affects Majority of All Android PhonesAndroidSecurityweek

5.9.19

Supply chain security: Five IT strategies for choosing vendors wisely

Security

Net-security

5.9.19

Digital transformation success at risk as CIOs struggle to deliver digital projects

Security

Net-security

5.9.19

Critical vulnerabilities uncovered in Danfoss SCADA product, patch now!

ICS

Net-security

5.9.19

Organizations focus on fine-tuning systems to ensure compliance while reducing risk

Security

Net-security

4.9.19

CEO ‘Deep Fake’ Swindles Company Out of $243K

Social

Threatpost

4.9.19

How to Get a Handle on Patch Management

Vulnerebility

Threatpost

4.9.19

Android Zero-Days Now Worth More Than iPhone Exploits

Android

Threatpost

4.9.19

Half of Android Handsets Susceptible to Clever SMS Phishing Attack

Android

Threatpost

4.9.19

BRATA Android RAT Steals Banking Info in Real Time

Android

Threatpost

4.9.19

Facebook Drops Default Facial Recognition Tag Suggestions

Social

Threatpost

4.9.19

IoT Security Challenges in a 5G Era: Expert Advice

IoT

Threatpost

4.9.19

Firefox 69 Release Kills Default Tracking Cookies, Flash Support

Privacy

Threatpost

4.9.19

WordPress Plugins Anchor Widespread Malvertising, Rogue Backdoor Campaign

Virus

Threatpost

4.9.19

Data Leak Impacts Millions of Yves Rocher Cosmetics Company Customers

Incindent

Threatpost

4.9.19

‘USBAnywhere’ Bugs Open Supermicro Servers to Remote Attackers

Attack

Threatpost

4.9.19

Experts devised advanced SMS phishing attacks against modern Android-based phones

Android  Mobil  Phishing

Securityaffairs

4.9.19

JSWorm: The 4th Version of the Infamous Ransomware

Ransomware

Securityaffairs

4.9.19

Some Zyxel devices can be hacked via DNS requests

Hacking

Securityaffairs

4.9.19

Android Zero-Day exploits are the most expensive in the new Zerodium price list

Android

Securityaffairs

4.9.19

FireEye Releases Open Source Persistence Toolkit 'SharPersist'

Security

Securityweek

4.9.19

Twitter CEO Hack Highlights Dangers of 'SIM Swap' Fraud

Mobil  Social

Securityweek

4.9.19

MITRE ATT&CK Used for Cybersecurity Skills Development

Cyber

Securityweek

4.9.19

Code Execution Flaws Found in EZAutomation PLC, HMI Software

ICS

Securityweek

4.9.19

Huawei Accuses US of Cyberattacks, Coercing Employees

BigBrothers

Securityweek

4.9.19

Just An SMS Could Let Remote Attackers Access All Your Emails, Experts Warn

Mobil

Thehackernews

4.9.19

Firefox 69 Now Blocks 3rd-Party Tracking Cookies and Cryptominers By Default

Cryptocurrency

Thehackernews

4.9.19

Exploit Reseller Offering Up To $2.5 Million For Android Zero-Days

Exploit

Thehackernews

4.9.19

Security hole opens a billion Android users to advanced SMS phishing attacks

Android  Phishing

Net-security

4.9.19

USBAnywhere BMC flaws expose Supermicro servers to hackVulnerebilitySecurityaffairs

4.9.19

XKCD forum data breach impacted 562,000 subscribersIncindentSecurityaffairs

4.9.19

Over 328,000 Users Hit by Foxit Data BreachIncindent

Securityweek

4.9.19

Zerodium Offers Up to $2.5 Million for Android ExploitsExploit  SecuritySecurityweek

4.9.19

Facial Recognition Becomes Opt-in Feature at FacebookSocialSecurityweek

4.9.19

XKCD Forum Hacked – Over 562,000 Users’ Account Details LeakedIncindentThehackernews

4.9.19

Malspam using password-protected Word docs to push Remcos RAT

Spam

SANS

4.9.19

Security pros need more and better visibility into their cloud networks

Security

Net-security

4.9.19

What prevents companies from achieving effective security performance management?

Security

Net-security

4.9.19

Firefox now blocks third-party tracking cookies, cryptomining scripts by default

Cryptocurrency

Net-security

4.9.19

A look into the frequency and success of phishing attacks on SMEs

Phishing

Net-security

4.9.19

How fraud prevention tech can save banks €10M a year

Security

Net-security

4.9.19

Free offering enables any MSP and security integrator to add incident response to their services portfolio

Security

Net-security

4.9.19

BMC vulnerabilities in Supermicro servers allow remote takeover, data exfiltration attacks

Vulnerebility

Net-security

3.9.19

Writing Your First Bootloader for Better AnalysesSecuritySecurityaffairs

3.9.19

Crooks stole €1.5 million from German bank OLB cloning EMV cardsCyberCrimeSecurityaffairs

3.9.19

Zyxel Devices Can Be Hacked via DNS Requests, Hardcoded CredentialsHacking

Securityweek

3.9.19

Meet Domen, a New and Sophisticated Social Engineering ToolkitHackingSecurityweek

3.9.19

562,000 Impacted in XKCD Forum Data BreachIncindent

Securityweek

3.9.19

Cisco Releases Guides for Analyzing Compromised DevicesSecuritySecurityweek

3.9.19

'Heatstroke' Phishing Campaign Takes Multi-Stage ApproachPhishingSecurityweek

3.9.19

USBAnywhere Bugs in Supermicro Servers Allow Remote USB Access

Vulnerebility

Bleepingcomputer

3.9.19

Nemty Ransomware Gets Distribution from RIG Exploit Kit

Ransomware

Bleepingcomputer

3.9.19

Fake BleachBit Website Built to Distribute AZORult Info Stealer

Virus

Bleepingcomputer

3.9.19

Windows 10 1903 May Cause Microsoft Visio to Stall or Hang

OS

Bleepingcomputer

3.9.19

Windows 10 Gets a Cloud Reset Feature, Here’s How it Works

OS

Bleepingcomputer

3.9.19

Data of 90K Mastercard Priceless Specials Members Shared Online

Incindent

Bleepingcomputer

3.9.19

Astaroth Trojan Uses Cloudflare Workers to Bypass AV Software

Virus

Bleepingcomputer

3.9.19

Back to School? Be Careful of Malware Hiding As Textbooks

Virus

Bleepingcomputer

3.9.19

Cracked Passwords for Poshmark Accounts Being Sold Online

Hacking

Bleepingcomputer

3.9.19

Sodinokibi Ransomware Spreads via Fake Forums on Hacked Sites

Ransomware

Bleepingcomputer

3.9.19

Zao app went viral but raised serious privacy concerns

Privacy

Securityaffairs

3.9.19

USBAnywhere: BMC Flaws Expose Supermicro Servers to Remote Attacks

Vulnerebility

Securityweek

3.9.19

SIM Swapping Blamed for Hacking of Twitter CEO's Account

Mobil  Social

Securityweek

3.9.19

BMC Vulnerabilities Expose Supermicro Servers to Remote USB-Attacks

Vulnerebility

Thehackernews

3.9.19

Chinese Face-Swapping App ZAO Sparks Privacy Concerns After Going Crazily Viral

BigBrothers

Thehackernews

3.9.19

Attackers are exploiting vulnerable WP plugins to backdoor sites

Vulnerebility  Virus

Net-security

3.9.19

[Guest Diary] Tricky LNK points to TrickBot

BotNet

SANS

3.9.19One million cracked Poshmark accounts being sold onlineHackingSecurityaffairs
3.9.19The role of a secret Dutch mole in the US-Israeli Stuxnet attack on IranBigBrothersSecurityaffairs
3.9.19Flight booking platform Option Way exposes customer and internal dataIncindentSecurityaffairs
3.9.19TrickBot Tricks U.S. Users into Sharing their PIN CodesBotNetSecurityweek
3.9.19

How to reduce the attack surface associated with medical devices

Security

Net-security

3.9.19

Cardholders still dropping the ball when it comes to basic ID theft prevention

Security

Net-security

3.9.19

Researchers develop cheaper, more efficient Internet connectivity for IoT devices

IoT

Net-security

3.9.19

Quantum computing market revenue to reach $9.1 billion annually by 2030

Security

Net-security

3.9.19

Whitepaper: Security Orchestration with Threat Intelligence

Security

Net-security

2.9.19US cyberattack temporarily paralyzed the ability of Iran to target oil tankers in the GulfBigBrothersSecurityaffairs
2.9.19Viral Chinese App Loses Face, But Not Fans, Over Privacy ConcernsBigBrothers  PrivacySecurityweek
2.9.19Operation Indiscriminately Infects iPhones With SpywareAppleSecurityweek
2.9.19v02.16NewsNews
2.9.19The Different Types of Windows 10 UpdatesOS  Vulnerebility

Bleepingcomputer

2.9.19Windows 10 KB4512941 Update Causing High CPU Usage in CortanaOS  Vulnerebility

Bleepingcomputer

2.9.19New Microsoft Edge to Retire Flash Using Chrome's RoadmapOS

Bleepingcomputer

2.9.19

XMR crypto miner switches from arm IoT devices to X86/I686 Intel serversCryptocurrencySecurityaffairs

1.9.19

Cisco addresses CVE-2019-12643 critical flaw in virtual Service Container for IOS XEVulnerebilitySecurityaffairs
1.9.19Malspam campaign bypasses secure email gateway using Google DocsSpam

Securityaffairs

1.9.19

New Google bug bounty allows reporting the abuses of Google API, Chrome, and Android user dataAndroid

Securityaffairs

1.9.19

Latest Sextortion Email Scheme Sent by ChaosCC Hacker GroupSpam

Bleepingcomputer

1.9.19Reddit Experiencing Outage Due to Amazon AWS IssueSecurity

Bleepingcomputer

1.9.19

Microsoft Resolves Six Windows 10 1903 Issues, Update Blocks Stay OnVulnerebility

Bleepingcomputer

1.9.19Microsoft Says Windows 10 1809 Users Can Dismiss 1903 Update AlertsVulnerebility

Bleepingcomputer

1.9.19

TrickBot Bypasses Secure Email Gateway Using Google Docs PhishingPhishing  Virus

Bleepingcomputer

1.9.19Windows 10 v1903 Update KB4512941 Released With Sandbox Fix & MoreOS

Bleepingcomputer

1.9.19

Google Warns iPhone Users of Data-Stealing Malware AttacksApple

Bleepingcomputer

1.9.19Foxit Software Discloses Data Breach Exposing User PasswordsIncindentBleepingcomputer
1.9.19New IoT botnet named Ares that is targeting Android-based devicesIoTSecurityaffairs