Home  2019  2018  2017  2016  1  2  3  4  5  6

Date

Name

Category

Web

28.9.19

Windows 10 1903 Cumulative Update KB4517211 Fixes Game Audio Issues

OS

Bleepingcomputer

28.9.19

DoorDash Data Breach Exposes Info of Roughly 5 Million Users

Incindent

Bleepingcomputer

28.9.19

Microsoft Explains Why Signed PowerShell Cmdlets May Run Slow

Virus

Bleepingcomputer

28.9.19

Microsoft Spots Nodersok Malware Campaign That Zombifies PCs

Virus

Bleepingcomputer

28.9.19

REvil (Sodinokibi) Ransomware Targets Chinese Users with DHL Spam

Ransomware

Bleepingcomputer

28.9.19

Cisco Fixes Critical IOx Flaw Allowing Root Access to Guest OS

Vulnerebility

Bleepingcomputer

28.9.19

Microsoft Enables Tracking Prevention by Default in New Edge Beta

Privacy

Bleepingcomputer

28.9.19

Outlook on the Web to Block File Extensions for PowerShell, Python, and More

Virus

Bleepingcomputer

28.9.19

Vodafone's Mobile App Briefly Exposed Customer Information

Incindent  Privacy

Bleepingcomputer

28.9.19

Botnet Uses Recent vBulletin Exploit to Block Other Hackers

BotNet  Exploit

Bleepingcomputer

28.9.19

Arcane Stealer V Takes Aim at the Low End of the Dark Web

Security

Threatpost

28.9.19

Masad Spyware Uses Telegram Bots for Command-and-Control

BotNet

Threatpost

28.9.19

Microsoft Blacklists Dozens of New File Extensions in Outlook

Safety

Threatpost

28.9.19

Dunkin’ Donuts Gets Hit with Lawsuit Over 2015 Attack

Attack

Threatpost

28.9.19

iOS Exploit ‘Checkm8’ Could Allow Permanent iPhone Jailbreaks

Apple

Threatpost

28.9.19

News Wrap: GandCrab Operators Resurface, Utilities Firms Hit By LookBack Malware

Security

Threatpost

28.9.19

Thousands of PCs Affected by Nodersok/Divergent Malware

Virus

Threatpost

28.9.19

Malware Delivery Campaign Employs Advanced Fileless Techniques

Virus

Securityweek

28.9.19

Dunkin' Donuts Sued by New York's State Attorney General Over Data Breaches

Incindent

Securityweek

28.9.19

'Unpatchable' iOS Bootrom Exploit Allows Jailbreaking of Many iPhones

Apple

Securityweek

28.9.19

More SIM Cards Vulnerable to Simjacker Attack Than Previously Disclosed

Hacking  Mobil

Thehackernews

27.9.19

Checkm8: unpatchable iOS exploit could lead to permanent
jailbreak for iOS devices running A5 to A11 chips

Apple

Securityaffairs

27.9.19

China Rejects 'Smear' After Airbus Hacking Report

BigBrothers

Securityweek

27.9.19

Airbus Says Taking 'Appropriate Measures' Against Hackers

Hacking

Securityweek

27.9.19

GAO Says Electric Grid Cybersecurity Risks Only Partially Assessed

Cyber

Securityweek

27.9.19

German Auto and Defense Firm Rheinmetall Says Malware Hit Several Plants

Virus

Securityweek

27.9.19

Researchers Disclose Another SIM Card Attack Possibly Impacting Millions

Attack  Mobil

Securityweek

27.9.19

Hacker Releases 'Unpatchable' Jailbreak For All iOS Devices, iPhone 4s to iPhone X

Apple

Thehackernews

27.9.19

Microsoft Warns of a New Rare Fileless Malware Hijacking Windows Computers

Virus

Thehackernews

27.9.19

Emsisoft released a new free decryption tool for the Avest ransomware

Ransomware

Securityaffairs

27.9.19

DoorDash Data Breach exposes data of approximately 5 million users

Incindent

Securityaffairs

27.9.19

FBI Reviewed Cybersecurity Firm's Evidence in 2016 DNC Election Hack

BigBrothers

Securityweek

27.9.19

Magecart Hackers Target L7 Routers

Hacking

Securityweek

27.9.19

DoorDash Breach Exposes Data of Nearly 5 Mn Users

Incindent

Securityweek

27.9.19

DoorDash Breach Exposes 4.9 Million Users' Personal Data

Incindent

Thehackernews

27.9.19

Microsoft to Extend Office 365 ATP Safe Links to Office Online

Safety

Bleepingcomputer

27.9.19

Buggy Google Chrome Update Behind Recent Unbootable Macs

Apple Vulnerebility

Bleepingcomputer

27.9.19

Ransomware Decryptors Released for Yatron, WannaCryFake, & FortuneCrypt

Ransomware

Bleepingcomputer

27.9.19

Microsoft Phishing Attack Uses Google Redirects to Evade Detection

Phishing

Bleepingcomputer

27.9.19

Hackers Replace Windows Narrator to Get SYSTEM Level Access

Hacking

Bleepingcomputer

27.9.19

Cloudflare's WARP Secures iOS and Android Web Traffic for Free

Apple

Bleepingcomputer

27.9.19

vBulletin Zero-Day Exploited for Years, Gets Unofficial Patch

Vulnerebility

Bleepingcomputer

27.9.19

Adobe Fixes Critical Security Vulnerabilities in Coldfusion

Vulnerebility

Bleepingcomputer

27.9.19

Hackers Exploit Unpatched Bug in Rich Reviews WordPress Plugin

Vulnerebility

Bleepingcomputer

27.9.19

Hackers Exploit Unpatched Bug in Rich Reviews WordPress Plugin

Vulnerebility

Bleepingcomputer

27.9.19

New Scans for Polycom Autoconfiguration Files

Security

SANS

27.9.19

How to start achieving visibility in the cloud

Security

Net-security

27.9.19

Should the National Security Council restore the cybersecurity coordinator role?

Cyber

Net-security

27.9.19

Windows‌ ‌Exploitation‌ ‌Tricks:‌ ‌Spoofing‌ ‌Named‌ ‌Pipe‌ ‌Client‌ ‌PID‌

Exploit blog

Project Zero

27.9.19

Chrome Bug, Not Avid Software, Causes Damage to MacOS File Systems

Apple  Vulnerebility

Threatpost

27.9.19

Vimeo Slapped With Lawsuit Over Biometrics Privacy Policy

Privacy  Security

Threatpost

27.9.19

Phish Uses Google’s URL Decoding to Swim Past Defenses

Phishing

Threatpost

27.9.19

DoorDash Data Breach Impacts Personal Data of Almost 5M Users

Incindent

Threatpost

27.9.19

Rash of Exploits Targets Critical vBulletin RCE Bug

Exploit

Threatpost

27.9.19

5G and IoT: How to Approach the Security Implications

IoT  Mobil

Threatpost

27.9.19

Cisco Patches 13 High-Severity Router and Switch Bugs

Vulnerebility

Threatpost

27.9.19

Botnet exploits recent vBulletin flaw to protect its bots

BotNet

Securityaffairs

27.9.19

iOS 13 Bug Gives Third-Party Keyboards “Full Access” Permissions

Apple

Securityaffairs

27.9.19

Chinese Hackers Hit Technology Firms in Southeast Asia With PcShare Backdoor

Hacking  CyberSpy

Securityweek

27.9.19

'Chameleon' Spam Campaign Employs Randomized Email Headers

Spam

Securityweek

27.9.19

There Is Life for the CISO After a Breach

Incindent

Securityweek

27.9.19

Hackers Target Airbus Suppliers in Quest for Commercial Secrets

Hacking

Securityweek

27.9.19

Outlook for Web Bans 38 More File Extensions in Email Attachments

Spam

Thehackernews

27.9.19

Vulnerability on specific Cisco Industrial / Grid router models

Vulnerebility

SANS

27.9.19

Mining MAC Address and OUI Information

Cryptocurrency

SANS

27.9.19

Year-over-year malware volume increased by 64%

Virus

Net-security

27.9.19

As consumers engage with insurance companies online, new types of digital fraud emerge

Security

Net-security

27.9.19

The Standoff: Attackers and defenders to face off in digital metropolis security challenge

Security

Net-security

27.9.19

Podcast: Potential problems with the software supply chain for industrial sites

Security

Net-security

26.9.19

Airbus suppliers were hit by four major attack in the last 12 months

Attack

Securityaffairs

26.9.19

Study shows connections between 2000 malware samples used by Russian APT groups

APT

Securityaffairs

26.9.19

Cylance Founder Stuart McClure Leaves BlackBerry

IT

Securityweek

26.9.19

VMware Patches Critical Harbor Vulnerability

Vulnerebility

Securityweek

26.9.19

Airbus Hit by Series of Cyber Attacks on Suppliers: Security Sources

Cyber

Securityweek

26.9.19

iOS 13 Bug Lets 3rd-Party Keyboards Gain 'Full Access' — Even When You Deny

Apple

Thehackernews

26.9.19

Decryptor for WannaCryFake

Anti-Ransom Tool

Anti-Ransom Tool

26.9.19

USBsamurai for Dummies: How To Make a Malicious USB Implant & Bypass Air-Gapped Environments for 10$. The Dumb-Proof Guide.

Virus

Securityaffairs

26.9.19

Emsisoft releases a free decryptor for the WannaCryFake ransomware

Ransomware

Securityaffairs

26.9.19

iOS 13 Bug Gives Third-Party Keyboards "Full Access" Permissions

Apple

Securityweek

26.9.19

vBulletin Patches Vulnerability Exploited in the Wild

Vulnerebility

Securityweek

26.9.19

Magecart Group Targets Routers Behind Public Wi-Fi Networks

CyberCrime

Threatpost

26.9.19

‘Narrator’ Windows Utility Trojanized to Gain Full System Control

Virus

Threatpost

26.9.19

Unpatched Bug Under Active Attack Threatens WordPress Sites with XSS

Vulnerebility

Threatpost

26.9.19

Cybercriminals plan to make L7 routers serve card stealing code

CyberCrime

Net-security

26.9.19

Windows 10 Insider Build 18990 Released With UWP App Autostart

OS

Bleepingcomputer

26.9.19

Apple to Fix iOS Bug Granting Full Access to 3rd Party Keyboards

Apple

Bleepingcomputer

26.9.19

Windows 10 to Boost Performance via Favored CPU Core Optimization

OS

Bleepingcomputer

26.9.19

Microsoft Rolls Out Windows Terminal 1909 With Long List of Fixes

OS

Bleepingcomputer

26.9.19

Shared Code Links Sodinokibi to GandCrab, Minus the Fun & Games

Ransomware

Bleepingcomputer

26.9.19

Windows 10 1809 Cumulative Update KB4516077 Released With Fixes

Vulnerebility  OS

Bleepingcomputer

26.9.19

Instagram Phishing Attack Baits With Copyright Infringement Note

Phishing  Social

Bleepingcomputer

26.9.19

Fake Employment Site Created to Target Veterans With Malware

Virus

Bleepingcomputer

26.9.19

State-Backed Attackers Target US Entities with LookBack Malware

Virus

Bleepingcomputer

26.9.19

Gmail for Android and iOS Gets a Dark Theme

Android  Apple

Bleepingcomputer

26.9.19

Czech Intelligence ‘s report attributes major cyber attack to China

BigBrothers

Securityaffairs

26.9.19

Czech Intelligence Blames China for Major Cyber Attack

BigBrothers

Securityweek

26.9.19

POISON CARP Threat Actor Targets Tibetan Groups

CyberCrime

Securityweek

26.9.19

How can we thwart email-based social engineering attacks?

Attack

Net-security

26.9.19

Tackling biometric breaches, the decentralized dilemma

Incindent

Net-security

26.9.19

Cybersecurity breach experience strengthens CVs

Cyber

Net-security

26.9.19

Employees are mistakenly confident that they can spot phishing emails

Phishing

Net-security

26.9.19

Adopting DevOps practices leads to improved security posture

Security

Net-security

26.9.19

Enterprises report IT teams’ cloud skill gaps have nearly doubled

Security

Net-security

25.9.19

Ransomware: two pieces of good news

Ransomware

Securelist

25.9.19

What You Need to Know About Next Gen EDR

Security

Threatpost

25.9.19

GandCrab Operators Resurface with REvil Malware

Ransomware

Threatpost

25.9.19

Apple to Patch Bug Granting Full Access to 3rd-Party Keyboards

Apple

Threatpost

25.9.19

Dtrack RAT is Behind Virulent ATM-Espionage Campaign

Virus

Threatpost

25.9.19

Adobe Unscheduled Update Fixes Critical ColdFusion Flaws

Vulnerebility

Threatpost

25.9.19

Cybercrooks Target U.S. Veterans with Fake Hiring Website

BigBrothers

Threatpost

25.9.19

Zebrocy Retools for New Political Attacks

Virus

Threatpost

25.9.19

Heyyo dating app left its users’ data exposed online

Incindent

Securityaffairs

25.9.19

US Utilities Targeted with LookBack RAT in a new phishing campaign

Phishing  Virus

Securityaffairs

25.9.19

Honeywell Launches 'Forge' Industrial Cybersecurity Platform

Cyber

Securityweek

25.9.19

Organizations Warned of Dual Threat Posed by RDP and Disruptive Ransomware

Ransomware

Securityweek

25.9.19

60% of Major US Firms Have Been Hacked in Cloud: Study

Security

Securityweek

25.9.19

Tortoiseshell Targets U.S. Military Veterans in New Campaign

BigBrothers

Securityweek

25.9.19

Microsoft Makes Azure Sentinel Generally Available

Security

Securityweek

25.9.19

Dell Unveils New Data Protection Appliances

Safety

Securityweek

25.9.19

Hacker Releases Exploit for vBulletin Zero-Day Vulnerability

Vulnerebility

Securityweek

25.9.19

'xHunt' Campaign Targets Kuwait Transportation and Shipping Sector

CyberCrime

Securityweek

25.9.19

vBulletin zero-day exploited in the wild in wake of exploit release

Vulnerebility

Net-security

25.9.19

Cybersecurity automation? Yes, wherever possible

Cyber

Net-security

25.9.19

How can small companies with limited budgets win at security?

Security

Net-security

25.9.19

Adobe Patches two critical vulnerabilities in ColdFusion

Vulnerebility

Securityaffairs

25.9.19

Hacker discloses details and PoC exploit code for unpatched 0Day in vBulletin

Exploit  Vulnerebility

Securityaffairs

25.9.19

A new Fancy Bear backdoor used to target political targets

Virus

Securityaffairs

25.9.19

North Korean-Linked Dtrack RAT Discovered

BigBrothers  Virus

Securityweek

25.9.19

Adobe Patches Critical Command Injection, Path Traversal Flaws in ColdFusion

Vulnerebility

Securityweek

25.9.19

[Unpatched] Critical 0-Day RCE Exploit for vBulletin Forum Disclosed Publicly

Vulnerebility

Thehackernews

25.9.19

Malspam pushing Quasar RAT

Spam  Virus

SANS

25.9.19

Rise of RDP as a target vector

Security

Net-security

25.9.19

99% of misconfiguration incidents in the cloud go unnoticed

Security

Net-security

25.9.19

Older vulnerabilities and those with lower severity scores still being exploited by ransomware

Exploit Ransomware Vulnerebility

Net-security

25.9.19

Security capabilities are lagging behind cloud adoption

Security

Net-security

25.9.19

Whitepaper: The self-fulfilling prophecy of the cybersecurity skills shortage

Cyber

Net-security

24.9.19

APT or not APT? What’s Behind the Aggah Campaign

APT

Securityaffairs

24.9.19

Microsoft released an out-of-band patch to fix Zero-day flaw exploited in the wild

Vulnerebility

Securityaffairs

24.9.19

Russian Pleads Guilty to Hacking U.S. Financial Firms

BigBrothers

Securityweek

24.9.19

Additional U.S. Utilities Targeted With LookBack Malware

Virus

Securityweek

24.9.19

Source Code Security Firm Cycode Launches With $4.6 Million in Funding

IT

Securityweek

24.9.19

Cyber Insurance Firm Cowbell Emerges From Stealth With $3.3 Million Seed Funding

IT

Securityweek

24.9.19

1-Click iPhone and Android Exploits Target Tibetan Users via WhatsApp

Apple  Exploit

Thehackernews

24.9.19

Russian APT Map Reveals 22,000 Connections Between 2000 Malware Samples

APT

Thehackernews

24.9.19

Avid Users Are Suddenly Finding That Their Macs Won’t Boot

Apple

Bleepingcomputer

24.9.19

Zebrocy Infects Targets with New Golang-Based Backdoor via Dropbox

Virus

Bleepingcomputer

24.9.19

Emotet Tries to Infect You By Claiming It's Snowden's Book

Virus

Bleepingcomputer

24.9.19

Beware of Google Alert Links Leading to Malware and Scams

Virus

Bleepingcomputer

24.9.19

Finnish Govt. Releases Guide on Securing Microsoft Office 365

BigBrothers

Bleepingcomputer

24.9.19

Microsoft Issues Windows Security Update for 0Day Vulnerability

OS

Bleepingcomputer

24.9.19

Windows 10 Task Manager Lets You Copy Performance Data as Text

OS

Bleepingcomputer

24.9.19

Microsoft to Force Modern Auth in Exchange Online to Enhance Security

OS

Bleepingcomputer

24.9.19

Malicious Android Apps Evade Google Play Protect via Remote Commands

Android

Bleepingcomputer

24.9.19

Microsoft Edge's Collection Feature Helps You Stay Organized

OS

Bleepingcomputer

24.9.19

Lion Air Data Leak Came From Contractor's Ex-Staff, Airline Says

Incindent

Securityweek

24.9.19

Google Wins EU Fight Against Worldwide 'Right to be Forgotten'

BigBrothers

Securityweek

24.9.19

Microsoft Patches Internet Explorer Vulnerability Exploited in Attacks

Exploit  Vulnerebility

Securityweek

24.9.19

Microsoft Releases Emergency Patches for IE 0-Day and Windows Defender Flaw

Vulnerebility

Thehackernews

24.9.19

Huge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs

Security

SANS

24.9.19

Microsoft drops emergency Internet Explorer fix for actively exploited zero-day

Vulnerebility

Net-security

24.9.19

Google Assistant Audio Privacy Controls Updated After Outcry

Privacy

Threatpost

24.9.19

200K Sign Petition Against Equifax Data Breach Settlement

Incindent

Threatpost

24.9.19

More U.S. Utility Firms Targeted in Evolving LookBack Spearphishing Campaign

Attack  CyberCrime

Threatpost

24.9.19

Microsoft Internet Explorer Zero-Day Flaw Addressed in Out-of-Band Security Update

Vulnerebility

Threatpost

24.9.19

North Korea-linked malware ATMDtrack infected ATMs in India

BigBrothers

Securityaffairs

24.9.19

Campbell County Memorial Hospital in Wyoming hit by ransomware attack

Ransomware

Securityaffairs

24.9.19

Portuguese hacker faces hundreds of Charges in Football Leaks case

Hacking

Securityaffairs

24.9.19

Critical Vulnerability Addressed in Jira Service Desk

Vulnerebility

Securityweek

24.9.19

Microsoft to Provide Free Security Updates for Voting Systems Running Windows 7

Vulnerebility

Securityweek

24.9.19

0patch Promises Support for Windows 7 Beyond January 2020

Vulnerebility

Securityweek

24.9.19

Being CISO Is No Longer a Dead-End Job

Security

Securityweek

24.9.19

Could audio warnings augment your ability to fight off cyber attacks?

Cyber

Net-security

24.9.19

CISO role grows in stature, but challenges remain

Security

Net-security

24.9.19

Passwordless authentication is here ​now​, and it is vastly superior to using a password

Security

Net-security

24.9.19

$5 trillion threat of cyber attacks spurs investments in solutions, talent and tech

Cyber

Net-security

24.9.19

From science to business: High-end quantum computer market will almost double by 2025

IT

Net-security

24.9.19

What security and privacy enhancements has iOS 13 brought?

Apple  Privacy

Net-security

23.9.19

Hello! My name is Dtrack

Virus

Securelist

23.9.19

Wyoming Hospital's Services Disrupted by Ransomware

Ransomware

Securityweek

23.9.19

Flaw Gives Hackers Remote Access to Files Stored on D-Link DNS-320 Devices

Hacking

Securityweek

23.9.19

Digital Threats Multiply Ahead of 2020 US Elections

Security

Securityweek

23.9.19

Google Awards $40,000 for Chrome Sandbox Escape Vulnerabilities

Vulnerebility

Securityweek

23.9.19

IT vs OT: Challenges and opportunities – podcast

Security

Net-security

23.9.19

Postřehy z bezpečnosti: nepřítel státu - Root.cz 

Bezpečnost

Root.cz

23.9.19

V Česku ubylo virů a útoků, na Slovensku naopak přibylo - Novinky.cz 

Viry

Novinky.cz

23.9.19

Thinkful forces a password reset for all users after a data breach

Incindent

Securityaffairs

23.9.19

Privilege Escalation flaw found in Forcepoint VPN Client for Windows

Vulnerebility

Securityaffairs

23.9.19

TortoiseShell Group targets IT Providers in supply chain attacks

Attack

Securityaffairs

23.9.19

Mac Malware Poses as Trading App

Apple

Securityweek

23.9.19

Alleged Hacker Faces 154 Charges in Football Leaks Case

Hacking

Securityweek

23.9.19

YARA XOR Strings: an Update

Security

SANS

23.9.19

How data breaches forced Amazon to update S3 bucket security

Incindent

Net-security

23.9.19

Microsoft Edge to Let You Block Potentially Unwanted Programs

OS

Bleepingcomputer

23.9.19

Jira Server and Service Desk Fix Critical Security Bugs

Vulnerebility

Bleepingcomputer

23.9.19

Microsoft Marks Two Windows 10 1903 Issues as Resolved

OS

Bleepingcomputer

23.9.19

Video: Encrypted Sextortion PDFs

Crypto

SANS

23.9.19

Disclosing vulnerabilities to improve software security is good for everyone

Vulnerebility

Net-security

23.9.19

How SMBs can bring their security testing on par with larger enterprises

Security

Net-security

23.9.19

How important is packet capture for cyber defense?

Cyber

Net-security

23.9.19

Product showcase: NetLib Security Encryptionizer

Security

Net-security

23.9.19

Top challenges for CIOs in a multi-cloud world

Security

Net-security

22.9.19

Critical flaws affect Jira Service Desk and Jira Service Desk Data Center

Vulnerebility

Securityaffairs

22.9.19

0patch will provide micropatches for Windows 7 and Server 2008 after EoS

Vulnerebility

Securityaffairs

22.9.19

Facebook suspends tens of thousands of apps from hundreds of developers

Social

Securityaffairs

22.9.19

Iran denies successful cyber attacks hit infrastructures of its oil sector

BigBrothers

Securityaffairs

22.9.19

MMD-0063-2019 – Summarize report of three years MalwareMustDie research (Sept 2016-Sept 2019)

Virus

Securityaffairs

22.9.19

One of the hackers behind EtherDelta hack also involved in TalkTalk hack

Hacking

Securityaffairs

22.9.19

5 Cybersecurity Trends in the Professional Services Sector

Cyber

Securityaffairs

22.9.19

Payouts From Insurance Policies May Fuel Ransomware Attacks

Ransomware

Securityweek

22.9.19

Iran Denies Successful Cyber Attacks on Oil Sector

BigBrothers

Securityweek

22.9.19

Wireshark 3.0.5 Release: Potential Windows Crash when Updating

Security

SANS

21.9.19

Ransom News

Ransom

Ransom

21.9.19

EXPLAINING FILELESS MALWARE SUCCINCTLY WITH EXAMPLES FROM OUR RESEARCH

Malware blog

Cybereason

21.9.19

FILELESS MALWARE 101: UNDERSTANDING NON-MALWARE ATTACKS

Malware blog

Cybereason

21.9.19

Tortoiseshell Group Targets IT Providers

Cyber blog

Symantec

21.9.19

Emotet is back after a summer break

Malware blog

Cisco Talos

21.9.19

Cryptocurrency miners aren’t dead yet: Documenting the voracious but simple “Panda”

Cryptocurrency blog

Cisco Talos

21.9.19

Vulnerability Spotlight: Multiple vulnerabilities in Aspose PDF API

Vulnerebility blog

Cisco Talos

21.9.19

Vulnerability Spotlight: AMD ATI Radeon ATIDXX64.DLL shader functionality remote code execution vulnerability

Vulnerebility blog

Cisco Talos

21.9.19

Vulnerability Spotlight: Multiple vulnerabilities in Atlassian Jira

Vulnerebility blog

Cisco Talos

21.9.19

Universities warned to brace for cyberattacks

Attack blog

Eset

21.9.19

Remote access flaws found in popular routers, NAS devices

Vulnerebility blog

Eset

21.9.19

Nearly all of Ecuador’s citizens caught up in data leak

Incident blog

Eset

21.9.19

Meet Stop Ransomware: The Most Active Ransomware Nobody Talks About

Ransomware

Bleepingcomputer

21.9.19

Windows 7 Voting Systems to Get Free Security Updates Through 2020 Elections

OS

Bleepingcomputer

21.9.19

Windows 7 and Server 2008 Get 0patch Security Fixes After EoS

OS

Bleepingcomputer

21.9.19

Twitter Removes State-backed Actors Conducting Information Campaigns

Social

Bleepingcomputer

21.9.19

Forcepoint Fixes Privilege Escalation Bug in Windows VPN Client

Vulnerebility

Bleepingcomputer

21.9.19

Windows 10 is Getting a New Optional Update Experience

OS

Bleepingcomputer

21.9.19

Selfie Android Apps with 1.5M+ Installs Push Ads, Can Record Audio

Android

Bleepingcomputer

21.9.19

Windows 10 Insider Build 18985 Released With Improved Bluetooth Pairing

OS

Bleepingcomputer

21.9.19

Thinkful Resets All User Passwords After Security Breach

Incindent

Bleepingcomputer

21.9.19

Emotet Trojan Evolves Since Being Reawakend, Here is What We Know

Virus

Bleepingcomputer

21.9.19

News Wrap: Emotet’s Return, U.S. Vs. Snowden, Physical Pen Testers Arrested

Security

Threatpost

21.9.19

Facebook Removed Tens of Thousands of Apps Post-Cambridge Analytica

Privacy  Social

Threatpost

21.9.19

Mattress Company Leaks Data Records of 387K Customers

Incindent

Threatpost

21.9.19

Forcepoint VPN Client is Vulnerable to Privilege Escalation Attacks

Attack  Vulnerebility

Threatpost

21.9.19

Facebook Suspends 'Tens of Thousands' of Apps in Privacy Review

Privacy  Social

Securityweek

21.9.19

Eight U.S. Cities Impacted in New Series of Click2Gov Breaches

Incindent

Securityweek

21.9.19

200,000 Sign Petition Against Equifax Data Breach Settlement

Incindent

Securityweek

21.9.19

Indonesia, Malaysia Probe Lion Air Customer Data Leak

Incindent

Securityweek

21.9.19

Twitter Closes Thousands of Fake News Accounts Worldwide

Social

Securityweek

21.9.19

Vulnerability Patched in Forcepoint VPN Client for Windows

Vulnerebility

Securityweek

21.9.19

France Has 'Not Changed Mind' on Rejecting Snowden Asylum

BigBrothers

Securityweek

21.9.19

Two Indicted in $10 Million Tech Support Fraud Scheme

CyberCrime

Securityweek

21.9.19

Two selfie Android adware apps with 1.5M+ downloads removed from Play Store

Android

Securityaffairs

21.9.19

U.S. taxpayers hit by a phishing campaign delivering the Amadey bot

BotNet  Phishing

Securityaffairs

20.9.19

Celebrity Instagram Accounts Being Hacked to Push Scams

Social

Bleepingcomputer

20.9.19

Critical Bug In Harbor Container Registry Gives Admin Access

Vulnerebility

Bleepingcomputer

20.9.19

Microsoft Acquires Semmle, GitHub Now a CVE Numbering Authority

Security

Bleepingcomputer

20.9.19

Windows Defender Antivirus Scans Broken After New Update

Vulnerebility

Bleepingcomputer

20.9.19

Microsoft Phishing Page Sends Stolen Logins Using JavaScript

Phishing

Bleepingcomputer

20.9.19

Amadey Botnet Targets U.S. Taxpayers with Tax Refund Notice

BotNet

Bleepingcomputer

20.9.19

Smominru Mining Botnet In Cyber Turf War With Rival Malware

BotNet  Virus

Bleepingcomputer

20.9.19

New TortoiseShell Group Hacks 11 IT Providers to Reach Their Customers

Hacking

Bleepingcomputer

20.9.19

400 Million Medical Radiological Images Exposed on the Internet

Incindent

Bleepingcomputer

20.9.19

Windows 10 With Chinese IME Installed Causing High CPU Usage

OS

Bleepingcomputer

20.9.19

Commodity Malware Reborn: The AgentTesla “Total Oil” themed Campaign

Virus

Securityaffairs

20.9.19

Crooks hacked other celebrity Instagram accounts to push scams

Social

Securityaffairs

20.9.19

Magecart attackers target mobile users of hotel chain booking websites

CyberCrime  Mobil

Securityaffairs

20.9.19

VMware Patches Six Vulnerabilities in Various Products

Vulnerebility

Securityweek

20.9.19

HP Acquires Endpoint Security Company Bromium

Security

Securityweek

20.9.19

Two Widely Used Ad Blocker Extensions for Chrome Caught in Ad Fraud Scheme

Hacking

Thehackernews

20.9.19

Should you trust your smart TV or streaming device?

Security

Net-security

20.9.19

Blacklisting or Whitelisting in the Right Way

Security

SANS

20.9.19

Microsoft Silent Update Torpedoes Windows Defender

Vulnerebility

Threatpost

20.9.19

These Hacks Require Literally Sneaking in the Backdoor

Virus

Threatpost

20.9.19

Smart TVs, Subscription Services Leak Data to Facebook, Google

Security

Threatpost

20.9.19

Payment Card Breach Hits 8 Cities Using Vulnerable Bill Portal

Vulnerebility

Threatpost

20.9.19

At least 1,300 Harbor cloud registry installs open to attack

Attack  Hacking

Securityaffairs

20.9.19

Emotet is back, it spreads reusing stolen email content

Virus

Securityaffairs

20.9.19

Key Senate Panel Approves $250 Million for Election Security

BigBrothers

Securityweek

20.9.19

Don't Take the Bait: A Look at the Latest Phishing Trends

Phishing

Securityweek

20.9.19

Phishing Emails Deliver Amadey Malware to U.S. Taxpayers

Phishing  Virus

Securityweek

20.9.19

MITRE Publishes New List of Most Dangerous Software Weaknesses

Safety  Vulnerebility

Securityweek

20.9.19

Dataswift Raises $2 Million in Seed Funding to Revolutionize Personal Data Sharing

IT

Securityweek

20.9.19

Kaspersky Unveils ICS Vulnerabilities Database

ICS  Vulnerebility

Securityweek

20.9.19

Critical Vulnerability Exposes Harbor Registries to Attacks

Vulnerebility

Securityweek

20.9.19

Magecart Hackers Target Mobile Users of Hotel Websites

CyberCrime  Mobil

Securityweek

20.9.19

Microsoft Rushes to Fix Bug That Broke Windows Defender Scans

Vulnerebility

Securityweek

20.9.19

Update Google Chrome Browser to Patch New Critical Security Flaws

Vulnerebility

Thehackernews

20.9.19

Organizations continue to struggle with privacy regulations

Security

Net-security

20.9.19

Key threats and trends SMB IT teams deal with

Security

Net-security

20.9.19

Old Magecart domains are finding new life in fresh threat campaigns

CyberCrime

Net-security

20.9.19

Researchers analyzed 16.4 billion requests to see how bots affect e-commerce

Security

Net-security

20.9.19

Some IT teams move to the cloud without business oversight or direction

Security

Net-security

19.9.19

How organizations view and manage cyber risk

Cyber

Net-security

19.9.19

Threat landscape for smart buildings

IoT

Securelist

19.9.19

Smominru Botnet continues to rapidly spread worldwide

BotNet

Securityaffairs

19.9.19

Ping Identity IPO Shares Priced at $15

IT

Securityweek

19.9.19

Smominru Botnet Infects Thousands of Hosts Daily

BotNet

Securityweek

19.9.19

A bug made some Windows Defender antivirus scans fail

Vulnerebility

Net-security

19.9.19

Agent Tesla Trojan Abusing Corporate Email Accounts

Virus

SANS

19.9.19

More than 737 million medical radiological images found on open PACS servers

Privacy  Vulnerebility

Securityaffairs

19.9.19

Edward Snowden Sued by U.S. Over New Memoir

BigBrothers

Threatpost

19.9.19

Massive Gaming DDoS Exploits Widespread Technology

Attack  Exploit

Threatpost

19.9.19

Emotet Returns from Summer Vacation, Ramps Up Stolen Email Tactic

Virus

Threatpost

19.9.19

Malware Moves: The Rise of LookBack – And Return of Emotet

Virus

Threatpost

19.9.19

Marc Rogers: Success of Anonymous Bug Submission Program ‘Takes A Village’

Vulnerebility

Threatpost

19.9.19

IRS Emails Promise a Refund But Deliver Botnet Recruitment

BotNet  Spam

Threatpost

19.9.19

Rethinking Responsibilities and Remedies in Social-Engineering Attacks

Attack

Threatpost

19.9.19

Zuckerberg Sets Talks in Washington on 'Future Regulation'

Social

Securityweek

19.9.19

Acronis Worth Over $1 Billion After Raising $147 Million

IT

Securityweek

19.9.19

GitHub Becomes CVE Numbering Authority, Acquires Semmle

Security

Securityweek

19.9.19

300 More Chinese Arrested in Philippines Crackdown

Crime

Securityweek

19.9.19

Emotet Returns, Spreads via Hijacked Email Conversations

Virus

Securityweek

19.9.19

IT Firm Manager Arrested in the Biggest Data Breach Case of Ecuador’s History

Crime

Thehackernews

19.9.19

SLAs: What your cybersecurity vendor isn’t telling you

Cyber

Net-security

19.9.19

Businesses need to treat cybersecurity as something that crosses organizational boundaries

Cyber

Net-security

19.9.19

The use of open source software in DevOps has become strategic for organizations of all sizes

Security

Net-security

19.9.19

Improving the security, privacy and safety of future connected vehicles

Security

Net-security

19.9.19

World’s top 25 CTF teams to battle for $100,000 at HITB PRO CTF

Congress

Net-security

18.9.19

Beware of Venmo Scams Targeting Users via Text Messages

Spam

Bleepingcomputer

18.9.19

TFlower Ransomware - The Latest Attack Targeting Businesses

Ransomware

Bleepingcomputer

18.9.19

Misconfigured Google Calendars Share Events With the World

Incindent

Bleepingcomputer

18.9.19

Millions of Lion Air Passenger Records Exposed and Exchanged on Forums

Incindent

Bleepingcomputer

18.9.19

Most Cyber Attacks Focus on Just Three TCP Ports

Attack

Bleepingcomputer

18.9.19

Emotet Revived with Large Spam Campaigns Around the World

Spam  Virus

Bleepingcomputer

18.9.19

Windows 10 1903 is Now Having Problems with Network Adapters

OS

Bleepingcomputer

18.9.19

Microsoft Exchange Server 2010 Support Gets a Life Extension

Safety

Bleepingcomputer

18.9.19

Phishing Attack Targets The Guardian's Whistleblowing Site

Phishing

Bleepingcomputer

18.9.19

Password-Revealing Bug Quickly Fixed in LastPass Extensions

Vulnerebility

Bleepingcomputer

18.9.19

Memory corruption flaw in AMD Radeon driver allows VM escape

Vulnerebility

Securityaffairs

18.9.19

Skidmap Linux miner leverages kernel-mode rootkits to evade detection

Virus

Securityaffairs

18.9.19

U.S. Could Launch Cyberattack on Iran in Response to Saudi Oil Attack

BigBrothers

Securityweek

18.9.19

Facebook Takes Down Misleading Campaigns From Iraq, Ukraine

Social

Securityweek

18.9.19

Code Execution Vulnerabilities Found in Aspose PDF Processing Product

Vulnerebility

Securityweek

18.9.19

Supply Chain Likely Target in Attacks by Tortoiseshell Group on Saudi IT Firms

CyberCrime

Securityweek

18.9.19

'Panda' Group Makes Thousands of Dollars Using RATs, Crypto-Miners

Cryptocurrency  CyberCrime

Securityweek

18.9.19

Smominru Botnet Indiscriminately Hacked Over 90,000 Computers Just Last Month

BotNet

Thehackernews

18.9.19

Warning: Researcher Drops phpMyAdmin Zero-Day Affecting All Versions

Vulnerebility

Thehackernews

18.9.19

LastPass Fixes Bug That Leaks Credentials

Vulnerebility

Threatpost

18.9.19

Google Calendar Settings Gaffes Exposes Users’ Meetings, Company Details

Incindent

Threatpost

18.9.19

AMD Radeon Graphics Cards Open VMware Workstations to Attack

Attack

Threatpost

18.9.19

Panda Threat Group Mines for Monero With Updated Payload, Targets

CyberCrime

Threatpost

18.9.19

Cisco Extends Patch for IPv6 DoS Vulnerability

Vulnerebility

Threatpost

18.9.19

United States government files civil lawsuit against Edward Snowden

BigBrothers

Securityaffairs

18.9.19

Australia is confident that China was behind attack on parliament, political parties

BigBrothers

Securityaffairs

18.9.19

US Justice Department Sues Snowden Over New Book

BigBrothers

Securityweek

18.9.19

Industry Reactions to Massive Ecuador Data Leak

Incindent

Securityweek

18.9.19

Malware Sandboxing Firm VMRay Raises $10 Million

IT

Securityweek

18.9.19

United States Sues Edward Snowden and You'd be Surprised to Know Why

BigBrothers

Thehackernews

18.9.19

Emotet malspam is back

Spam

SANS

18.9.19

Security is slowly becoming essential to doing business

Security

Net-security

18.9.19

DNSSEC fueling new wave of DNS amplification attacks

Attack

Net-security

18.9.19

Confidential data of 24.3 million patients discovered online

Incindent

Net-security

18.9.19

Businesses facing post breach financial fallout by losing customer trust

Incindent

Net-security

18.9.19

What are the most connected countries around the world?

Security

Net-security

18.9.19

Download: RFP templates for EDR/EPP and APT protection

Safety

Net-security

17.9.19

Experts warn of the exposure of thousands of Google Calendars online

Incindent

Securityaffairs

17.9.19

Backup files for Lion Air and parent airlines exposed and exchanged on forums

Incindent

Securityaffairs

17.9.19

Linux Crypto-Miner Uses Kernel-Mode Rootkits for Evasion

Cryptocurrency

Securityweek

17.9.19

AMD Radeon Driver Flaw Leads to VM Escape

Vulnerebility

Securityweek

17.9.19

Exclusive: Thousands of Google Calendars Leaking Private Information Online

Incindent

Thehackernews

17.9.19

U.S. Sanctions North Korean Group Behind WannaCry, Sony Hacks

BigBrothers

Threatpost

17.9.19

New Threat Actor Fraudulently Buys Digital Certificates to Spread Malware

Virus

Threatpost

17.9.19

Marketing Analytics Company Leaks Deep Profiles of Entire Ecuador Population

Privacy

Threatpost

17.9.19

Asus, Lenovo and Other Routers Riddled with Remotely Exploitable Bugs

Vulnerebility

Threatpost

17.9.19

Assessing the impact of protection from web miners

Cryptocurrency

Securelist

17.9.19

Experts found 125 new flaws in SOHO routers and NAS devices from multiple vendors

Vulnerebility

Securityaffairs

17.9.19

Oracle Launches New Services to Secure the Cloud

Safety

Securityweek

17.9.19

Australia Knows China Hacked Its Parliament: Report

BigBrothers

Securityweek

17.9.19

Fraudulent purchases of digitals certificates through executive impersonation

CyberCrime  Safety

Securityaffairs

17.9.19

MobiHok RAT, a new Android malware based on old SpyNote RAT

Virus

Securityaffairs

17.9.19

SOHOpelessly Broken 2.0: 125 Vulnerabilities Found in Routers, NAS Devices

Vulnerebility

Securityweek

17.9.19

Security Firm: Data Breach Exposes Millions of Ecuadorians

Incindent

Securityweek

17.9.19

InnfiRAT Targets Personal Data, Cryptocurrency Wallets

Virus

Securityweek

17.9.19

Snowden Says He Would Return to US If He Can Get a Fair Trial

BigBrothers

Securityweek

17.9.19

125 New Flaws Found in Routers and NAS Devices from Popular Brands

Vulnerebility

Thehackernews

17.9.19

Encrypted Sextortion PDFs

Crypto

SANS

17.9.19

Five ways to manage authorization in the cloud

Security

Net-security

17.9.19

Targeted threat intelligence and what your organization might be missing

Security

Net-security

17.9.19

Researchers uncover 125 vulnerabilities across 13 routers and NAS devices

Vulnerebility

Net-security

17.9.19

BotSlayer tool can detect coordinated disinformation campaigns in real time

BotNet

Net-security

17.9.19

Phishing attacks up, especially against SaaS and webmail services

Phishing

Net-security

17.9.19

Only 15% of organizations can recover from a severe data loss within an hour

Security

Net-security

16.9.19

Data leak exposes sensitive data of all Ecuador ‘citizens

Incindent

Securityaffairs

16.9.19

Saudi Attacks Expose Threat to Critical Infrastructure

BigBrothers

Securityweek

16.9.19

LastPass Patches Bug Leaking Last-Used Credentials

Vulnerebility

Securityweek

16.9.19

Serious Flaws in CODESYS Products Expose Industrial Systems to Remote Attacks

Vulnerebility

Securityweek

16.9.19

Securing the 2020 Elections From Multifarious Threats

Security

Securityweek

16.9.19

A flaw in LastPass password manager leaks credentials from previous site

Vulnerebility

Securityaffairs

16.9.19

Recycled Source Code Used to Create New MobiHok Android RAT

Android  Virus

Securityweek

16.9.19

Tor Raises $86K to Smash Bugs

Security

Securityweek

16.9.19

WhatsApp 'Delete for Everyone' Doesn't Delete Media Files Sent to iPhone Users

Apple  Social

Thehackernews

16.9.19

How to Enable Ransomware Protection in Windows 10

Ransomware

Bleepingcomputer

16.9.19

Microsoft Edge Gets a new Extensions Menu, Here's How to Enable It

OS

Bleepingcomputer

16.9.19

Tor's Bug Bash Fund Raises $86K to Fix Critical Issues

Security

Bleepingcomputer

16.9.19

France and Germany will block Facebook’s Libra cryptocurrency

Cryptocurrency

Securityaffairs

16.9.19

Hundreds Laid Off by Symantec as Part of Restructuring Plan

IT

Securityweek

16.9.19

Snowden Says Would Like French Asylum

BigBrothers

Securityweek

16.9.19

Tor Project’s Bug Smash Fund raises $86K in August

Security

Securityaffairs

16.9.19

Astaroth Trojan leverages Facebook and YouTube to avoid detection

Virus

Securityaffairs

16.9.19

UK Teen Arrested in US-Led Music Hacking Probe

Crime

Securityweek

16.9.19

CISO do’s and don’ts: Lessons learned

Security

Net-security

16.9.19

Threat visibility is imperative, but it’s even more essential to act

Security

Net-security

16.9.19

Four in five businesses need ways to better secure data without slowing innovation

Security

Net-security

16.9.19

Exploitation of IoT devices and Windows SMB attacks continue to escalate

Exploit  IoT

Net-security

16.9.19

Only one quarter of retail banks have adopted an integrated approach to financial crime systems

CyberCrime

Net-security

16.9.19

Cyber Battle of the Emirates: Training the next generation of cyber security pros

BigBrothers

Net-security

15.9.19

Drone attacks hit two Saudi Arabia Aramco oil plants

BigBrothers

Securityaffairs

15.9.19

Delaler Leads, a car dealer marketing firm exposed 198 Million records online

Incindent

Securityaffairs

15.9.19

A bug in Instagram exposed user accounts and phone numbers

Social

Securityaffairs

15.9.19

Ransom News

Ransom

Ransom

15.9.19

Window 10 1903 OOB Update Released to to Fix USB Microphones

OS

Bleepingcomputer

15.9.19

Nemty Ransomware Update Lets It Kill Processes and Services

Ransomware

Bleepingcomputer

15.9.19

Microsoft Releases Workaround for Windows 10 Audio Issues in Games

OS

Bleepingcomputer

15.9.19

iOS 13 Passcode Bypass Lets You View Contacts on Locked Devices

Apple

Bleepingcomputer

15.9.19

InnfiRAT Malware Steals Litecoin And Bitcoin Wallet Information

Virus

Bleepingcomputer

15.9.19

Destructive Ordinypt Malware Hitting Germany in New Spam Campaign

Spam  Virus

Bleepingcomputer

15.9.19

North Korean Hackers Behind WannaCry and Sony Hack Sanctioned by USA

BigBrothers

Bleepingcomputer

15.9.19

Suspected Hacker Arrested for Stealing and Selling Unreleased Music

Hacking

Bleepingcomputer

15.9.19

'N1ghTm4r3' Scam Threatens to Expose Victims Watching Illegal Porn

Spam

Bleepingcomputer

15.9.19

Windows 10 1903 KB4515384 Update Affects Audio Quality in Games

OS

Bleepingcomputer

15.9.19

Giant Entercom Radio Network Deals with Ransomware-Like Incident

Ransomware

Bleepingcomputer

15.9.19

Garmin SA Shopping Portal Breach Leads to Theft of Payment Data

Incindent

Bleepingcomputer

15.9.19

Expert disclosed passcode bypass bug in iOS 13 a week before its release

Apple

Securityaffairs

15.9.19

InnfiRAT Trojan steals funds from Bitcoin and Litecoin wallets

Virus

Securityaffairs

14.9.19

Hackers stole payment data from Garmin South Africa shopping portal

Hacking

Securityaffairs

14.9.19

Ohio Gamer Sentenced to 15 Months Prison in 'Swatting' Case

Crime

Securityweek

14.9.19

US Sanctions 3 North Korean Hacking Groups Accused for Global Cyber Attacks

BigBrothers

Thehackernews

14.9.19

GLUPTEBA EXPANDS OPERATION AND TOOLKIT WITH LOLBINS AND CRYPTOMINER

Cryptocurrency blog

Cybereason

14.9.19

How Visiting a Trusted Site Could Infect Your Employees

Hacking blog

Mcafee blog

14.9.19

Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study

Malware blog

Mcafee blog

14.9.19

How To Survive the Rash of Ransomware

Ransomware blog

F5 Labs

14.9.19

Cryptocurrency Hacks 2019

Cryptocurrency blog

F5 Labs

14.9.19

Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and Containment

Ransomware blog

FireEye

14.9.19

Open Sourcing StringSifter

Security blog

FireEye

14.9.19

New Stealthy Ad Clicking Tactics Found in Popular Apps on Google Play

OS Blog

Symantec

14.9.19

Thrip: Ambitious Attacks Against High Level Targets Continue

Attack blog

Symantec

14.9.19

Watchbog and the Importance of Patching

Vulnerebility blog

Cisco Talos

14.9.19

Microsoft Patch Tuesday — Sept. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

14.9.19

Vulnerability Spotlight: Denial-of-service vulnerabilities in some NETGEAR routers

Vulnerebility blog

Cisco Talos

14.9.19

A vulnerability in Instagram exposes personal information of users

Vulnerebility blog

Eset

14.9.19

Selfies for kids – A guide for parents

Safety blog

Eset

14.9.19

ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group

Malware blog

Eset

14.9.19

Car Dealer Marketing Firm Exposed 198 Million Data Records

Incindent

Securityweek

14.9.19

US Puts Sanctions on N.Korea Hacking Groups Behind Major Thefts

BigBrothers  CyberCrime

Securityweek

14.9.19

Arizona Schools Provide Model for Managing Ransomware

Ransomware

Securityweek

14.9.19

Shape Security Raises $51 Million at $1 Billion Valuation

IT

Securityweek

14.9.19

WiryJMPer Dropper Employs Heavy Obfuscation to Deliver Netwire

Virus

Securityweek

14.9.19

Sophos Makes Sandboxie Free in Transition to Open Source

Safety

Securityweek

14.9.19

IBM Launches z15 Mainframe With New Data Protection Capabilities

Safety

Securityweek

14.9.19

Netanyahu, Trump Deny Report of Israeli Spying Near White House

BigBrothers

Securityweek

14.9.19

Astaroth Spy Trojan Uses Facebook, YouTube Profiles to Cover Tracks

Social  Virus

Threatpost

14.9.19

iPhone iOS 13 Lockscreen Bypass Flaw Exposes Contacts

Apple

Threatpost

14.9.19

North Korean Spear-Phishing Attack Targets U.S. Firms

APT  Phishing

Threatpost

14.9.19

WordPress XSS Bug Allows Drive-By Code Execution

Vulnerebility

Threatpost

14.9.19

Cybercriminals Adding Sophistication to BEC Threats

CyberCrime  Spam

Threatpost

14.9.19

The US Treasury placed sanctions on North Korea linked APT Groups

APT

Securityaffairs

14.9.19

WatchBog cryptomining botnet now uses Pastebin for C2

Cryptocurrency

Securityaffairs

14.9.19

Yikes! iOS 13 Coming Next Week With iPhone LockScreen Bypass Bug

Apple

Thehackernews

13.9.19

Ukrainian Man Pleads Guilty to Hacking, Wire Fraud Charges

BigBrothers

Securityweek

13.9.19

Israeli Spyware Firm Adopts 'Human Rights Policy'

BigBrothers

Securityweek

13.9.19

Android Flashlight Apps Request up to 77 Permissions

Android

Securityweek

13.9.19

DoS Vulnerabilities Patched in NETGEAR N300 Routers

Vulnerebility

Securityweek

13.9.19

Russian Hackers Behind Ukraine Power Outage May Have Sought More Damage

BigBrothers

Securityweek

13.9.19

Sandboxie becomes freeware, soon-to-be open source

Security

Net-security

13.9.19

Windows 10 1903 Orange Tint Screenshot Issue Addressed by Lenovo

OS

Bleepingcomputer

13.9.19

New WiryJMPer Dropper Hides Netwire RAT Payloads in Plain Sight

Virus

Bleepingcomputer

13.9.19

Microsoft Publishes Solutions for Windows 10 Search Issues

OS

Bleepingcomputer

13.9.19

Iranian Hackers Hit Over 60 Universities to Get Library Access

BigBrothers

Bleepingcomputer

13.9.19

Windows 10 Build 18980 Released for All Insiders With New Cortana App

OS

Bleepingcomputer

13.9.19

Ryuk Related Malware Steals Confidential Military, Financial Files

Virus

Bleepingcomputer

13.9.19

Google Chrome May Let Sites Block Your Screen from Powering Down

Security

Bleepingcomputer

13.9.19

Virtual Disk Attachments Can Bypass Gmail and Chrome Security

Security

Bleepingcomputer

13.9.19

Microsoft to Improve Office 365 Phishing Email Notifications

Phishing

Bleepingcomputer

13.9.19

Intel Patches Privilege Escalation Flaw in Easy Streaming Wizard

Vulnerebility

Bleepingcomputer

13.9.19

California Passes Bill to Ban Police Use of Facial Recognition

BigBrothers

Threatpost

13.9.19

1B Mobile Users Vulnerable to Ongoing ‘SimJacker’ Surveillance Attack

Attack  Mobil

Threatpost

13.9.19

Strangest Phishing Lures of 2019: From Divorce Papers to Real Estate Decoys

Phishing

Threatpost

13.9.19

UNICEF Leaks Personal Data of 8,000 Users via Email Blunder

Incindent

Threatpost

13.9.19

Library-Themed University Phishing Attack Expands to Massive Scale

Phishing

Threatpost

13.9.19

SimJacker attack allows hacking any phone with just an SMS

Mobil

Securityaffairs

13.9.19

Attack Traffic Caught by Honeypots Triples Over Six Months

Security

Securityweek

13.9.19

Wikimedia Gets $2.5 Million in Funding to Secure Wikipedia

Safety

Securityweek

13.9.19

Poland to Launch Cyberspace Defense Force

BigBrothers

Securityweek

13.9.19

WatchBog Crypto-Mining Botnet Relies on Pastebin for C&C

Cryptocurrency

Securityweek

13.9.19

Simjacker: SIM Card Attack Used to Spy on Mobile Phone Users

Mobil

Securityweek

13.9.19

Rig Exploit Kit Delivering VBScript

Exploit

SANS

13.9.19

The rise of modern applications, DevSecOps and the intelligence economy

Security

Net-security

13.9.19

Security leaders lack confidence in the supply chain, fear third-party attacks

Security

Net-security

13.9.19

Interacting with governments in the digital age: What do citizens think?

Security

Net-security

13.9.19

Cyber risk assessment of U.S. election commissions finds critical areas for improvement

BigBrothers

Net-security

12.9.19

SAP September 2019 Security Patch Day addresses four Security Notes rated as Hot News

Vulnerebility

Securityaffairs

12.9.19

Iran-linked group Cobalt Dickens hit over 60 universities worldwide

BigBrothers

Securityaffairs

12.9.19

Iran-Linked Hackers Again Target Universities

BigBrothers

Securityweek

12.9.19

Cloud Security Firm Lacework Raises $42 Million

IT

Securityweek

12.9.19

North Korean Hackers Use New Tricks in Attacks on U.S.

BigBrothers

Securityweek

12.9.19

Microsoft Makes Automated Incident Response in Office 365 ATP Generally Available

Safety

Securityweek

12.9.19

New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS

Hacking  Mobil

Thehackernews

12.9.19

Chrome 77 Released With Removed EV Certificate Indicator

Security

Bleepingcomputer

12.9.19

New NetCAT Attack Can Leak Sensitive Data From Intel CPUs

Attack

Bleepingcomputer

12.9.19

Microsoft Releases Servicing Stack Updates for All Windows 10 Versions

OS

Bleepingcomputer

12.9.19

Google Unveils DNS-over-HTTPS (DoH) Plan, Mozilla's Faces Criticism

Security

Bleepingcomputer

12.9.19

281 Arrested in Worldwide Business Email Compromise Crackdown

Spam

Bleepingcomputer

12.9.19

Microsoft Fixes Windows 10 High CPU Usage in Cortana

Vulnerebility

Bleepingcomputer

12.9.19

LokiBot Info-Stealer Used in Spear Phishing Attack on US Company

BotNet  Phishing

Bleepingcomputer

12.9.19

Windows 10 KB4515384 and KB4512578 Released With Fixes

OS  Vulnerebility

Bleepingcomputer

12.9.19

Microsoft's September 2019 Patch Tuesday Fixes 79 Vulnerabilities

OS  Vulnerebility

Bleepingcomputer

12.9.19

Microsoft Releases the September 2019 Security Updates for Office

Vulnerebility

Bleepingcomputer

12.9.19

Blocking Firefox DoH with Bind

Security

SANS

12.9.19

Simjacker vulnerability actively exploited to track, spy on mobile phone owners

Mobil

Net-security

12.9.19

Credential Leaking Vulnerabilities Impact Comba, D-Link Routers

Vulnerebility

Securityweek

12.9.19

Chinese Woman Guilty of Trespassing at Trump's Mar-a-Lago

BigBrothers

Securityweek

12.9.19

Popular Period Tracking Apps Share Your Sexual Health Data With Facebook

Social

Thehackernews

12.9.19

LokiBot info stealer involved in a targeted attack on a US Company

BotNet

Securityaffairs

12.9.19

NetCAT attack allows hackers to steal sensitive data from Intel CPUs

Attack

Securityaffairs

12.9.19

How to navigate critical data security and privacy policy challenges

Privacy

Net-security

12.9.19

IIoT security challenges: Dealing with cutting edge technologies

IoT

Net-security

12.9.19

More than a year after GDPR implementation, half of UK businesses are not fully compliant

Privacy

Net-security

12.9.19

Security holding back employers from meeting employees’ remote working expectations

Security

Net-security

11.9.19

NetCAT: New Attack Lets Hackers Remotely Steal Data From Intel CPUs

Attack

Thehackernews

11.9.19

CISO Kit — Breach Protection in the Palm of Your Hand

Safety

Thehackernews

11.9.19

Google to Experiment 'DNS over HTTPS' (DoH) Feature in Chrome 78

Security

Thehackernews

11.9.19

Mozilla Launches 'Firefox Private Network' VPN Service as a Browser Extension

Security

Thehackernews

11.9.19

Hundreds of BEC Scammers Arrested in Nigeria and U.S. — $3.7 Million Recovered

Spam

Thehackernews

11.9.19

Threats to macOS users

Apple

Securelist

11.9.19

Intel CPUs Vulnerable to Sensitive Data Leakage in NetCAT Attack

Attack

Threatpost

11.9.19

Feds Indict 281 People for Involvement in Massive Email Fraud Scheme

CyberCrime

Threatpost

11.9.19

198 Million Car-Buyer Records Exposed Online for All to See

Incindent

Threatpost

11.9.19

Microsoft Addresses Two Zero-Days Under Active Attack

Vulnerebility

Threatpost

11.9.19

CISO/CIO: Get an iPad and Apple Watch with an App Monitoring your Security 24/7

Apple

Threatpost

11.9.19

Strangest Phishing Lures of 2019: From Divorce Papers to Real Estate Decoys

Phishing

Threatpost

11.9.19

The Wolcott school district suffered a second ransomware attack in 4 months

Ransomware

Securityaffairs

11.9.19

Dissecting the 10k Lines of the new TrickBot Dropper

BotNet

Securityaffairs

11.9.19

Some models of Comba and D-Link WiFi routers leak admin credentials

Hacking

Securityaffairs

11.9.19

DNS-over-HTTPS Coming to Chrome 78

Security

Securityweek

11.9.19

Loss to BEC Fraud Now Claimed to be $26 Billion

Spam

Securityweek

11.9.19

Telegram Failed to Delete Removed Images From Local Storage

Social

Securityweek

11.9.19

SAP Patches Critical Vulnerability in NetWeaver

Vulnerebility

Securityweek

11.9.19

Chrome 77 Released with 52 Security Fixes

Vulnerebility

Securityweek

11.9.19

18 Years later, America Vows to 'Never Forget' 9/11

Security

Securityweek

11.9.19

Siemens Issues Advisories for DejaBlue, SACK Panic Vulnerabilities

ICS

Securityweek

11.9.19

NetCAT Attack: Hackers Can Remotely Steal Data From Servers With Intel CPUs

Attack

Securityweek

11.9.19

281 BEC scammers arrested in worldwide law enforcement action

Spam

Net-security

11.9.19

September 2019 Patch Tuesday: Microsoft plugs two actively exploited zero-days

Vulnerebility

Net-security

11.9.19

Adobe September 2019 Patch Tuesday updates fix 2 code execution flaws in Flash Player

Vulnerebility

Securityaffairs

11.9.19

Microsoft Patch Tuesday updates for September 2019 fix 2 privilege escalation flaws exploited in attacks

Vulnerebility

Securityaffairs

11.9.19

Million of Telestar Digital GmbH IoT radio devices can be remotely hacked

IoT

Securityaffairs

11.9.19

Hundreds Arrested in Joint US-Nigeria Crackdown on Cyber Scams

BigBrothers

Securityweek

11.9.19

Ransomware Attack Hits School District Twice in 4 Months

Ransomware

Securityweek

11.9.19

SD-WAN: Disruptive Technology That Requires Careful Security Consideration

Security

Securityweek

11.9.19

Microsoft Patches Two Privilege Escalation Flaws Exploited in Attacks

Vulnerebility

Securityweek

11.9.19

Latest Microsoft Updates Patch 4 Critical Flaws In Windows RDP Client

Vulnerebility

Securityweek

11.9.19

Microsoft September 2019 Patch Tuesday

Vulnerebility

SANS

11.9.19

Regulations are driving innovation toward an identity layer on the Internet

Security

Net-security

11.9.19

Fraudsters no longer operate in silos, they are attacking across industries and organizations

Security

Net-security

11.9.19

IoT attacks increasing in the cyber underground

IoT

Net-security

11.9.19

Download PPT template: Security for Management

Security

Net-security

10.9.19

Million of Telestar Digital GmbH IoT radio devices can be remotely hacked

Hacking  IoT

Securityaffairs

10.9.19

New Stealth Falcon Backdoor Discovered

Virus

Securityweek

10.9.19

Adobe Patches Two Code Execution Vulnerabilities in Flash Player

Vulnerebility

Securityweek

10.9.19

Some D-Link and Comba WiFi Routers Leak Their Passwords in Plaintext

Crypto

Thehackernews

10.9.19

Adobe Releases Security Patches For Critical Flash Player Vulnerabilities

Vulnerebility

Thehackernews

10.9.19

Adobe Releases Security Updates for Flash Player and Application Manager

Vulnerebility

Bleepingcomputer

10.9.19

Business Email Compromise Is a $26 Billion Scam Says the FBI

Spam

Bleepingcomputer

10.9.19

Bugs in D-Link and Comba Networking Gear Disclose Passwords

Vulnerebility

Bleepingcomputer

10.9.19

Microsoft Teams Can Be Used To Execute Arbitrary Payloads

Security

Bleepingcomputer

10.9.19

Microsoft Phishing Page Uses Captcha to Bypass Automated Detection

Phishing

Bleepingcomputer

10.9.19

Office 365 ATP Automated Incident Response Now Generally Available

Security

Bleepingcomputer

10.9.19

Exploit Kits Target Windows Users with Ransomware and Trojans

Exploit  Ransomware

Bleepingcomputer

10.9.19

PsiXBot Modular Malware Gets New Sextortion, Google DoH Upgrades

BotNet  Virus

Bleepingcomputer

10.9.19

Telegram Fixes Privacy Bug Caused by Improperly Deleted Messages

Social

Bleepingcomputer

10.9.19

Wikipedia DDoS Attacks Prompt NCSC to Remind of DoS Mitigation

Attack

Bleepingcomputer

10.9.19

Microsoft Removes Two Windows 10 1903 Upgrade Blocks

OS

Bleepingcomputer

10.9.19

Hacked Instagram Account of Robert Downey Jr. Pushes iPhone Giveway

Apple  Social

Bleepingcomputer

10.9.19

Police dismantled Europe’s second-largest counterfeit currency network on the dark web

BigBrothers

Securityaffairs

10.9.19

Vulnerabilities Exposed 2 Million Verizon Customer Contracts

Vulnerebility

Securityweek

10.9.19

Cyber Fusion Center-in-a-Box Firm Cyware Raises $3 Million in Seed Funding

IT

Securityweek

10.9.19

Office 365 security: Automated incident response based on playbooks

Security

Net-security

10.9.19

ML, AI enthusiasts to showcase cyber solutions at HITB+ CyberWeek’s AI Challenge

Congress

Net-security

10.9.19

Robert Downey Jr’s Instagram account has been hacked

Hacking

Securityaffairs

10.9.19

HackerOne Raises $36.4 Million in Series D Funding Round

IT

Securityweek

10.9.19

Telnet Backdoor Opens More Than 1M IoT Radios to Hijack

IoT  Virus

Threatpost

10.9.19

Apple Claims Google is Spreading FUD Over Patched iPhone Bugs

Apple

Threatpost

10.9.19

Stealth Falcon Targets Middle East with Windows BITS Feature

Virus

Threatpost

10.9.19

Critical Exim Flaw Opens Millions of Servers to Takeover

Vulnerebility

Threatpost

10.9.19

PsiXBot Adds PornModule, Google DNS Service to Its Arsenal

BotNet

Threatpost

10.9.19

Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks

Attack

Threatpost

10.9.19

DoS attack the caused disruption at US power utility exploited a known flaw

Attack

Securityaffairs

10.9.19

Stealth Falcon’s undocumented backdoor uses Windows BITS to exfiltrate data

Virus

Securityaffairs

10.9.19

DNS-over-HTTPS Coming to Firefox

Safety

Securityweek

10.9.19

More than 99% of cyberattacks rely on human interaction

Security

Net-security

10.9.19

Shine a light on shadow IT to improve organizational resilience

Security

Net-security

10.9.19

70% of educational orgs don’t have an appropriate cloud security budget

Security

Net-security

10.9.19

The use of SOX-specific solutions has more than doubled since last year

Security

Net-security

10.9.19

eBook: A new gold standard for OT security monitoring

Security

Net-security

9.9.19

Telegram Privacy Fails Again

Social

Securityaffairs

9.9.19

Symantec uncovered the link between China-Linked Thrip and Billbug groups

APT

Securityaffairs

9.9.19

Swedish GDPR Fine Highlights Legal Challenges in Use of Biometrics

Privacy

Securityweek

9.9.19

Cyberattack Disrupted Firewalls at U.S. Power Utility

Attack

Securityweek

9.9.19

U.S. Cyber Command Adds North Korean Malware Samples to VirusTotal

BigBrothers

Securityweek

9.9.19

BlueKeep Exploit Added to Metasploit

Exploit

Securityweek

9.9.19

Man Pleads Guilty for Trying to Access Trump's Tax Returns

BigBrothers

Securityweek

9.9.19

Private Equity Firms Interested in Buying Symantec for $16 Billion: Report

IT

Securityweek

9.9.19

Several Vulnerabilities Found in Red Lion HMI Software

Vulnerebility

Securityweek

9.9.19

New Malware Uses Windows BITS Service to Stealthy Exfiltrate Data

Virus

Thehackernews

9.9.19

Is your smartphone secretly listening to you?

Mobil

Net-security

9.9.19

This is what our summer’s like

Security

Securelist

9.9.19

Wikipedia suffered intermittent outages as a result of a malicious attack

Virus

Securityaffairs

9.9.19

China-Linked 'Thrip' Cyberspies Continue Attacks on Southeast Asia

APT

Securityweek

9.9.19

Cisco Releases GhIDA and Ghidraaas Tools for IDA Pro

Security

Securityweek

9.9.19

Facebook Patches "Memory Disclosure Using JPEG Images" Flaws in HHVM Servers

Social

Thehackernews

9.9.19

China-linked APT3 was able to modify stolen NSA cyberweapons

APT

Securityaffairs

9.9.19

Belarusian authorities seized XakFor, one of the largest Russian-speaking hacker sites

CyberCrime

Securityaffairs

9.9.19

Parts of Wikipedia Offline After 'Malicious' Attack

Virus

Securityweek

9.9.19

Cybersecurity issues can’t be solved by simply buying a product

Cyber

Net-security

9.9.19

SMBs show no improvement in IT maturity levels, security remains top concern

Security

Net-security

9.9.19

Should social media organizations be subject to strict privacy regulation?

Privacy

Net-security

9.9.19

Bots evolving to better mimic humans during elections

BotNet

Net-security

9.9.19

The global impact of 5G technologies

Mobil

Net-security

9.9.19

Mini eBook: CISSP Practice Tests

Security

Net-security

8.9.19

Ransom News

Ransom

Ransom

8.9.19

Fake PayPal Site Spreads Nemty Ransomware

Ransomware

Bleepingcomputer

8.9.19

Windows 10 to Let You Rename Virtual Desktops, Here's How

OS

Bleepingcomputer

8.9.19

Google Calendar Spam Got You Down? A Fix Is on The Way

Spam

Bleepingcomputer

8.9.19

Windows 10 Insider Build 18975 Released With Movable Cortana and Bug Fixes

OS

Bleepingcomputer

8.9.19

Public BlueKeep Exploit Module Released by MetaSploit

Exploit

Bleepingcomputer

8.9.19

Over $37 Million Lost by Toyota Boshoku Subsidiary in BEC Scam

Spam

Bleepingcomputer

8.9.19

WordPress 5.2.3 fixes multiple issues, including some severe XSS flaws

Vulnerebility

Securityaffairs

8.9.19

Toyota Boshoku Corporation lost over $37 Million following BEC attack

Spam

Securityaffairs

8.9.19

University, Professional Certification or Direct Experience?

Security

Securityaffairs

8.9.19

Experts found Joker Spyware in 24 apps in the Google Play store

Android

Securityaffairs

8.9.19

Google report on iPhone hack created ‘False Impression,’ states Apple

Apple

Securityaffairs

8.9.19

Experts add a BlueKeep exploit module to MetaSploit

Exploit

Securityaffairs

8.9.19

Thousands of servers infected with the Lilocked Ransomware

Ransomware

Securityaffairs

8.9.19

Apple: Security Report on iPhone Hack Created 'False Impression'

Apple

Securityweek

8.9.19

Unidentified Scanning Activity

Security

SANS

7.9.19

Lilocked Ransomware Actively Targeting Servers and Web Sites

Ransomware

Bleepingcomputer

7.9.19

GootKit Malware Bypasses Windows Defender by Setting Path Exclusions

Virus

Bleepingcomputer

7.9.19

Critical Exim TLS Flaw Lets Attackers Remotely Execute Commands as Root

Crypto  Vulnerebility

Bleepingcomputer

7.9.19

Windows and AV Software Ignore Malware in Virtual Disk Files

Virus

Bleepingcomputer

7.9.19

FBI Warns Students to Think Before They Post Online Threats

BigBrothers

Bleepingcomputer

7.9.19

Microsoft Announces First PowerToys Preview Release for Windows 10

OS

Bleepingcomputer

7.9.19

Students Rejoice: School District Closed by Ransomware Attack

Ransomware

Bleepingcomputer

7.9.19

Amazon AWS Outage Shows Data in the Cloud is Not Always Safe

Safety

Bleepingcomputer

7.9.19

Buggy GPS Trackers Expose Childrens’ Real-Time Location

Privacy

Bleepingcomputer

7.9.19

WordPress 5.2.3 Released with Security and Bug Fixes

Vulnerebility

Bleepingcomputer

7.9.19

Twitter Suspends SMS-Based Tweeting After High-Profile Account Hacks

Social

Bleepingcomputer

7.9.19

Ransomware Adopts DoppelPaymer Name Given by Researchers

Ransomware

Bleepingcomputer

7.9.19

Hackers Ask for $5.3 Million Ransom, Turn Down $400k, Get Nothing

Ransomware

Bleepingcomputer

7.9.19

Android Zero-Day Bug Does Not Make It on Google’s 'Fix' List

Android

Bleepingcomputer

7.9.19

Facebook and Instagram Start Fighting Vaccine Misinformation

Social

Bleepingcomputer

7.9.19

Stealthy Android Trojan Spy Signs You Up For Premium Subscriptions

Virus

Bleepingcomputer

7.9.19

Year-Old Samba Bug Allows Access to Forbidden Root Share Paths

Vulnerebility

Bleepingcomputer

7.9.19

Glupteba Malware Uses Bitcoin Blockchain to Update C2 Domains

Cryptocurrency

Bleepingcomputer

7.9.19

Google Chrome Starts Testing Third-Party Cookie Blocking

Privacy

Bleepingcomputer

7.9.19

Android SMS Phishing Can Stealthily Enable Malicious Settings

Android  Phishing

Bleepingcomputer

7.9.19

Apple iOS Attack Underscores Importance of Threat Research

OS Blog

Mcafee blog

7.9.19

De-icing IcedID: Decompression and Decryption Methods Explained in an IcedID Attack

Attack blog

F5 Labs

7.9.19

5 Questions to Ask to See If Your Security Team is Cloud Incident Ready

Incident blog

F5 Labs

7.9.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in July 2019

Security blog

F5 Labs

7.9.19

SharPersist: Windows Persistence Toolkit in C#

Security blog

FireEye

7.9.19

Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and Containment

Ransomware blog

FireEye

7.9.19

UPSynergy: Chinese-American Spy vs. Spy Story

BigBrother blog

Checkpoint

7.9.19

GhIDA: Ghidra decompiler for IDA Pro

Security blog

Cisco Talos

7.9.19

Vulnerability Spotlight: Information disclosure vulnerability in Blynk-Library

Vulnerebility blog

Cisco Talos

7.9.19

The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to defend against encrypted DejaBlue

Vulnerebility blog

Cisco Talos

7.9.19

Vulnerability Spotlight: Two vulnerabilities in Epignosis eFront

Vulnerebility blog

Cisco Talos

7.9.19

Firefox 69: Third‑Party Tracking Cookies and Cryptomining Now Blocked by Default

Cryptocurrency blog

Eset

7.9.19

Semi‑annual balance of mobile security 2019

Hardware blog

Eset

7.9.19

What is MITRE ATT&CK and how is it useful?

Security blog

Eset

7.9.19

Exim fails to properly handle peer DN and SNI in TLS handshakes

Alert

Alert

7.9.19

"Splintering" Makes Hacking Passwords 14 Million Percent Harder

Hacking

Securityweek

7.9.19

Industrial Manufacturing Firm DK-LOK Exposes Emails, Customer Data

ICS

Securityweek

7.9.19

Oklahoma Pension Fund Reports $4.2 Million Cyber Theft

CyberCrime

Securityweek

7.9.19

Industry Reactions to Iranian Mole Planting Stuxnet: Feedback Friday

BigBrothers

Securityweek

7.9.19

Exim Vulnerability Allows Remote Code Execution as Root

Vulnerebility

Securityweek

7.9.19

CVE-2019-15846 Exim mail server flaw allows Remote Code Execution

Vulnerebility

Securityaffairs

6.9.19

Facebook, Microsoft Challenge Industry to Detect, Prevent ‘Deepfakes’

Social

Threatpost

6.9.19

China’s APT3 Pilfers Cyberweapons from the NSA

APT

Threatpost

6.9.19

Back-to-School Scams Target Students with Library-Themed Emails

Spam

Threatpost

6.9.19

Joker Spyware Found in 24 Google Play Apps

Android  Virus

Threatpost

6.9.19

FunkyBot Malware Intercepts Android Texts, 2FA Codes

Android  Virus

Threatpost

6.9.19

PHP new versions fix multiple code execution issues

Vulnerebility

Securityaffairs

6.9.19

Over 600k GPS trackers left exposed online with a default password of ‘123456’

Mobil

Securityaffairs

6.9.19

Zero-day vulnerability in Android OS yet to be patched

Android

Securityaffairs

6.9.19

Hundreds of millions of Facebook users’ phone numbers exposed online

Social

Securityaffairs

6.9.19

Cisco Patches Remote Command Execution in Webex Teams Client

Vulnerebility

Securityweek

6.9.19

Unpatched Privilege Escalation Vulnerability Impacts Android

Android

Securityweek

6.9.19

PerimeterX Raises Another $14 Million in Series C Round

IT

Securityweek

6.9.19

Firefox 69 Patches Critical Code Execution Flaw

Vulnerebility

Securityweek

6.9.19

No Ransom Paid in Recent Attack, Texas Says

Ransomware

Securityweek

6.9.19

Data Protection Firm BigID Raises $50 Million

IT

Securityweek

6.9.19

Ransomware Attack Locks Out New Bedford City Data

Ransomware

Securityweek

6.9.19

A Summer of Discontent: The Hottest Malware Hits

Virus

Thehackernews

6.9.19

Exim TLS Flaw Opens Email Servers to Remote 'Root' Code Execution Attacks

Crypto  Vulnerebility

Thehackernews

6.9.19

Multiple Code Execution Flaws Found In PHP Programming Language

Vulnerebility

Thehackernews

6.9.19

Flaws in Over Half a Million GPS Trackers Expose Children Location Data

Mobil

Thehackernews

6.9.19

Google Fined $170 Million For Violating Kids' Privacy On YouTube

Privacy

Thehackernews

6.9.19

PowerShell Script with a builtin DLL

Virus

SANS

6.9.19

Google’s differential privacy library can now be used by anyone

Privacy

Net-security

6.9.19

September 2019 Patch Tuesday forecast: Microsoft security update will be complete

Vulnerebility

Net-security

6.9.19

Most citizens are against local governments paying ransomware attackers

Ransomware

Net-security

6.9.19

Business demands have outpaced the ability of IT to deliver services

Security

Net-security

6.9.19

Global security screening systems market to reach $12.2 billion by 2024

IT

Net-security

6.9.19

Google to pay $170 million for violating children’s privacy on YouTube

Privacy

Net-security

5.9.19

Year-Old Samba flaw allows escaping from the share path definition

Vulnerebility

Securityaffairs

5.9.19

New Bedford city infected with Ryuk ransomware, but did not pay $5.3M ransom

Ransomware

Securityaffairs

5.9.19

Twitter temporarily disables feature to tweet via SMS after CEO hack

Social

Securityaffairs

5.9.19

Palo Alto Networks Acquires IoT Security Firm Zingbox for $75 Million

IT

Securityweek

5.9.19

CircleCI Customer Data Exposed Through Third-Party Vendor

Incindent

Securityweek

5.9.19

WordPress 5.2.3 Patches Several XSS Vulnerabilities

Vulnerebility

Securityweek

5.9.19

400 Mn Facebook Users' Phone Numbers Exposed in Privacy Lapse: Reports

Social

Securityweek

5.9.19

Crimeware Risk Underestimated, Chronicle Finds

CyberCrime

Securityweek

5.9.19

$5.3M Ransomware Demand: Massachusetts City Says No Thanks

Ransomware

Threatpost

5.9.19

Leaky Server Exposes 419M Phone Numbers of Facebook Users

Social

Threatpost

5.9.19

Mozilla Will Support Existing Ad Blockers in Extensions Manifest v3

Security

Bleepingcomputer

5.9.19

Hackers Get $1.9M in Bug Bounties at Live Hacking Sessions

Hacking

Bleepingcomputer

5.9.19

Microsoft Investigating Windows 10 Cortana High CPU Issues

OS

Bleepingcomputer

5.9.19

Microsoft Releases September 2019 Office Updates With Fixes, Improvements

OS

Bleepingcomputer

5.9.19

Hacked SharePoint Sites Used to Bypass Secure Email Gateways

Hacking

Bleepingcomputer

5.9.19

Firefox 69 Released with Enhanced Tracking Protection and Flash Disabled

Privacy

Bleepingcomputer

5.9.19

Microsoft Uses Deep Learning For Malicious PowerShell Detection

Virus

Bleepingcomputer

5.9.19

XKCD Forum Breach Exposes Emails, Passwords of 562,000 Users

Incindent

Bleepingcomputer

5.9.19

Zerodium Makes Android Zero Days More Expensive Than iOS

Android

Bleepingcomputer

5.9.19

New Toolkit Pushes Malware via Fake Program Update Alerts in 30 Languages

Virus

Bleepingcomputer

5.9.19

Tech Firms, US Officials Talk Election Protection at Facebook

Social

Securityweek

5.9.19

Twitter Temporarily Disables Tweeting via SMS After CEO Hack

Social

Securityweek

5.9.19

Twitter temporarily disables 'Tweeting via SMS' after CEO gets hacked

Social

Thehackernews

5.9.19

Supply chain security: Five IT strategies for choosing vendors wisely

Security

Net-security

5.9.19

Private IP Addresses in Malware Samples?

Virus

SANS

5.9.19

Creator of multiple IoT botnets, including Satori, pleaded guilty

BotNet  IoT

Securityaffairs

5.9.19

Google to Pay $170 mn Fine for Collecting YouTube Data From Kids

Privacy

Securityweek

5.9.19

TrickBot Makes Heavy Use of Evasion in Recent Attacks

BotNet

Securityweek

5.9.19

Android's September 2019 Patches Fix Nearly 50 Vulnerabilities

Android

Securityweek

5.9.19

Vulnerability in Network Provisioning Affects Majority of All Android Phones

Android

Securityweek

5.9.19

Supply chain security: Five IT strategies for choosing vendors wisely

Security

Net-security

5.9.19

Digital transformation success at risk as CIOs struggle to deliver digital projects

Security

Net-security

5.9.19

Critical vulnerabilities uncovered in Danfoss SCADA product, patch now!

ICS

Net-security

5.9.19

Organizations focus on fine-tuning systems to ensure compliance while reducing risk

Security

Net-security

4.9.19

CEO ‘Deep Fake’ Swindles Company Out of $243K

Social

Threatpost

4.9.19

How to Get a Handle on Patch Management

Vulnerebility

Threatpost

4.9.19

Android Zero-Days Now Worth More Than iPhone Exploits

Android

Threatpost

4.9.19

Half of Android Handsets Susceptible to Clever SMS Phishing Attack

Android

Threatpost

4.9.19

BRATA Android RAT Steals Banking Info in Real Time

Android

Threatpost

4.9.19

Facebook Drops Default Facial Recognition Tag Suggestions

Social

Threatpost

4.9.19

IoT Security Challenges in a 5G Era: Expert Advice

IoT

Threatpost

4.9.19

Firefox 69 Release Kills Default Tracking Cookies, Flash Support

Privacy

Threatpost

4.9.19

WordPress Plugins Anchor Widespread Malvertising, Rogue Backdoor Campaign

Virus

Threatpost

4.9.19

Data Leak Impacts Millions of Yves Rocher Cosmetics Company Customers

Incindent

Threatpost

4.9.19

‘USBAnywhere’ Bugs Open Supermicro Servers to Remote Attackers

Attack

Threatpost

4.9.19

Experts devised advanced SMS phishing attacks against modern Android-based phones

Android  Mobil  Phishing

Securityaffairs

4.9.19

JSWorm: The 4th Version of the Infamous Ransomware

Ransomware

Securityaffairs

4.9.19

Some Zyxel devices can be hacked via DNS requests

Hacking

Securityaffairs

4.9.19

Android Zero-Day exploits are the most expensive in the new Zerodium price list

Android

Securityaffairs

4.9.19

FireEye Releases Open Source Persistence Toolkit 'SharPersist'

Security

Securityweek

4.9.19

Twitter CEO Hack Highlights Dangers of 'SIM Swap' Fraud

Mobil  Social

Securityweek

4.9.19

MITRE ATT&CK Used for Cybersecurity Skills Development

Cyber

Securityweek

4.9.19

Code Execution Flaws Found in EZAutomation PLC, HMI Software

ICS

Securityweek

4.9.19

Huawei Accuses US of Cyberattacks, Coercing Employees

BigBrothers

Securityweek

4.9.19

Just An SMS Could Let Remote Attackers Access All Your Emails, Experts Warn

Mobil

Thehackernews

4.9.19

Firefox 69 Now Blocks 3rd-Party Tracking Cookies and Cryptominers By Default

Cryptocurrency

Thehackernews

4.9.19

Exploit Reseller Offering Up To $2.5 Million For Android Zero-Days

Exploit

Thehackernews

4.9.19

Security hole opens a billion Android users to advanced SMS phishing attacks

Android  Phishing

Net-security

4.9.19

USBAnywhere BMC flaws expose Supermicro servers to hack

Vulnerebility

Securityaffairs

4.9.19

XKCD forum data breach impacted 562,000 subscribers

Incindent

Securityaffairs

4.9.19

Over 328,000 Users Hit by Foxit Data Breach

Incindent

Securityweek

4.9.19

Zerodium Offers Up to $2.5 Million for Android Exploits

Exploit  Security

Securityweek

4.9.19

Facial Recognition Becomes Opt-in Feature at Facebook

Social

Securityweek

4.9.19

XKCD Forum Hacked – Over 562,000 Users’ Account Details Leaked

Incindent

Thehackernews

4.9.19

Malspam using password-protected Word docs to push Remcos RAT

Spam

SANS

4.9.19

Security pros need more and better visibility into their cloud networks

Security

Net-security

4.9.19

What prevents companies from achieving effective security performance management?

Security

Net-security

4.9.19

Firefox now blocks third-party tracking cookies, cryptomining scripts by default

Cryptocurrency

Net-security

4.9.19

A look into the frequency and success of phishing attacks on SMEs

Phishing

Net-security

4.9.19

How fraud prevention tech can save banks €10M a year

Security

Net-security

4.9.19

Free offering enables any MSP and security integrator to add incident response to their services portfolio

Security

Net-security

4.9.19

BMC vulnerabilities in Supermicro servers allow remote takeover, data exfiltration attacks

Vulnerebility

Net-security

3.9.19

Writing Your First Bootloader for Better Analyses

Security

Securityaffairs

3.9.19

Crooks stole €1.5 million from German bank OLB cloning EMV cards

CyberCrime

Securityaffairs

3.9.19

Zyxel Devices Can Be Hacked via DNS Requests, Hardcoded Credentials

Hacking

Securityweek

3.9.19

Meet Domen, a New and Sophisticated Social Engineering Toolkit

Hacking

Securityweek

3.9.19

562,000 Impacted in XKCD Forum Data Breach

Incindent

Securityweek

3.9.19

Cisco Releases Guides for Analyzing Compromised Devices

Security

Securityweek

3.9.19

'Heatstroke' Phishing Campaign Takes Multi-Stage Approach

Phishing

Securityweek

3.9.19

USBAnywhere Bugs in Supermicro Servers Allow Remote USB Access

Vulnerebility

Bleepingcomputer

3.9.19

Nemty Ransomware Gets Distribution from RIG Exploit Kit

Ransomware

Bleepingcomputer

3.9.19

Fake BleachBit Website Built to Distribute AZORult Info Stealer

Virus

Bleepingcomputer

3.9.19

Windows 10 1903 May Cause Microsoft Visio to Stall or Hang

OS

Bleepingcomputer

3.9.19

Windows 10 Gets a Cloud Reset Feature, Here’s How it Works

OS

Bleepingcomputer

3.9.19

Data of 90K Mastercard Priceless Specials Members Shared Online

Incindent

Bleepingcomputer

3.9.19

Astaroth Trojan Uses Cloudflare Workers to Bypass AV Software

Virus

Bleepingcomputer

3.9.19

Back to School? Be Careful of Malware Hiding As Textbooks

Virus

Bleepingcomputer

3.9.19

Cracked Passwords for Poshmark Accounts Being Sold Online

Hacking

Bleepingcomputer

3.9.19

Sodinokibi Ransomware Spreads via Fake Forums on Hacked Sites

Ransomware

Bleepingcomputer

3.9.19

Zao app went viral but raised serious privacy concerns

Privacy

Securityaffairs

3.9.19

USBAnywhere: BMC Flaws Expose Supermicro Servers to Remote Attacks

Vulnerebility

Securityweek

3.9.19

SIM Swapping Blamed for Hacking of Twitter CEO's Account

Mobil  Social

Securityweek

3.9.19

BMC Vulnerabilities Expose Supermicro Servers to Remote USB-Attacks

Vulnerebility

Thehackernews

3.9.19

Chinese Face-Swapping App ZAO Sparks Privacy Concerns After Going Crazily Viral

BigBrothers

Thehackernews

3.9.19

Attackers are exploiting vulnerable WP plugins to backdoor sites

Vulnerebility  Virus

Net-security

3.9.19

[Guest Diary] Tricky LNK points to TrickBot

BotNet

SANS

3.9.19

One million cracked Poshmark accounts being sold online

Hacking

Securityaffairs

3.9.19

The role of a secret Dutch mole in the US-Israeli Stuxnet attack on Iran

BigBrothers

Securityaffairs

3.9.19

Flight booking platform Option Way exposes customer and internal data

Incindent

Securityaffairs

3.9.19

TrickBot Tricks U.S. Users into Sharing their PIN Codes

BotNet

Securityweek

3.9.19

How to reduce the attack surface associated with medical devices

Security

Net-security

3.9.19

Cardholders still dropping the ball when it comes to basic ID theft prevention

Security

Net-security

3.9.19

Researchers develop cheaper, more efficient Internet connectivity for IoT devices

IoT

Net-security

3.9.19

Quantum computing market revenue to reach $9.1 billion annually by 2030

Security

Net-security

3.9.19

Whitepaper: Security Orchestration with Threat Intelligence

Security

Net-security

2.9.19

US cyerattack temporarily paralyzed the ability of Iran to target oil tankers in the Gulf

BigBrothers

Securityaffairs

2.9.19

Viral Chinese App Loses Face, But Not Fans, Over Privacy Concerns

BigBrothers  Privacy

Securityweek

2.9.19

Operation Indiscriminately Infects iPhones With Spyware

Apple

Securityweek

2.9.19

v02.16

News

News

2.9.19

The Different Types of Windows 10 Updates

OS  Vulnerebility

Bleepingcomputer

2.9.19

Windows 10 KB4512941 Update Causing High CPU Usage in Cortana

OS  Vulnerebility

Bleepingcomputer

2.9.19

New Microsoft Edge to Retire Flash Using Chrome's Roadmap

OS

Bleepingcomputer

2.9.19

XMR crypto miner switches from arm IoT devices to X86/I686 Intel servers

Cryptocurrency

Securityaffairs

1.9.19

Cisco addresses CVE-2019-12643 critical flaw in virtual Service Container for IOS XE

Vulnerebility

Securityaffairs

1.9.19

Malspam campaign bypasses secure email gateway using Google Docs

Spam

Securityaffairs

1.9.19

New Google bug bounty allows reporting the abuses of Google API, Chrome, and Android user data

Android

Securityaffairs

1.9.19

Latest Sextortion Email Scheme Sent by ChaosCC Hacker Group

Spam

Bleepingcomputer

1.9.19

Reddit Experiencing Outage Due to Amazon AWS Issue

Security

Bleepingcomputer

1.9.19

Microsoft Resolves Six Windows 10 1903 Issues, Update Blocks Stay On

Vulnerebility

Bleepingcomputer

1.9.19

Microsoft Says Windows 10 1809 Users Can Dismiss 1903 Update Alerts

Vulnerebility

Bleepingcomputer

1.9.19

TrickBot Bypasses Secure Email Gateway Using Google Docs Phishing

Phishing  Virus

Bleepingcomputer

1.9.19

Windows 10 v1903 Update KB4512941 Released With Sandbox Fix & More

OS

Bleepingcomputer

1.9.19

Google Warns iPhone Users of Data-Stealing Malware Attacks

Apple

Bleepingcomputer

1.9.19

Foxit Software Discloses Data Breach Exposing User Passwords

Incindent

Bleepingcomputer

1.9.19

New IoT botnet named Ares that is targeting Android-based devices

IoT

Securityaffairs

31.8.19

FIN6 recently expanded operations to target eCommerce sites

CyberCrime

Securityaffairs

31.8.19

Twitter account of Jack Dorsey, Twitter CEO and co-founder, has been hacked

Social

Securityaffairs

31.8.19

Twitter CEO Account Hacked, Offensive Tweets Posted

Social

Securityweek

31.8.19

Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423

Vulnerebility blog

Mcafee blog

31.8.19

Definitive Dossier of Devilish Debug Details – Part One: PDB Paths and Malware

Malware blog

FireEye

31.8.19

RAT Ratatouille: Backdooring PCs with leaked RATs

Malware blog

Cisco Talos

31.8.19

China Chopper still active 9 years later

Security blog

Cisco Talos

31.9.19

A Look Inside the Highly Profitable Sodinokibi Ransomware Business

Ransomware

Bleepingcomputer

31.9.19

Windows 10 Insider Build 18970 Comes With New 2-in-1 Tablet PC Experience

OS

Bleepingcomputer

31.9.19

Windows 7 Still Used in Almost 50% of Surveyed Businesses

OS

Bleepingcomputer

31.9.19

Microsoft Edge Dev Update Released With New Features

Security

Bleepingcomputer

31.9.19

Sodinokibi Ransomware Encrypts Records of Hundreds of Dental Practices

Ransomware

Bleepingcomputer

31.9.19

BRATA Android RAT Used to Infect and Spy on Brazilian Users

Android

Bleepingcomputer

31.9.19

Google Rewards Bugs Found in All Android Apps with 100M+ Installs

Android

Bleepingcomputer

31.9.19

Fake Windows Game Booster Spreads Password Stealing Malware

Virus

Bleepingcomputer

31.9.19

Five More Hackers Become Millionaires on HackerOne

Hacking

Bleepingcomputer

31.9.19

Android Apps with 1.5M+ Installs Boost Ad Revenue with Ghost Clicks

Android

Bleepingcomputer

31.9.19

Starbucks Abandons Azure Site, Exposed Subdomain to Hijacking

Hacking

Bleepingcomputer

31.9.19

Cisco Fixes Critical Bug in Virtual Service Container for IOS XE

Vulnerebility

Bleepingcomputer

31.9.19

Foxit PDF Software Company Suffers Data Breach—Asks Users to Reset Password

Incindent

Thehackernews

31.9.19

iOS Vulnerabilities Allowed Attackers to Remotely Hack iPhones for Years

Apple

Securityweek

31.9.19

Expert found Russia’s SORM surveillance equipment leaking user data

BigBrothers

Securityaffairs

31.9.19

Foxit Software discloses a data breach that exposed user passwords

Incindent

Securityaffairs

31.9.19

Ransomware attack hits DDS Safe backup service used by hundreds of dental offices

Ransomware

Securityaffairs

31.9.19

iPhone Zero-Days Anchored Watering-Hole Attacks

Apple

Threatpost

31.9.19

Six Hackers Have Now Pocketed $1M From Bug Bounty Programs

Security

Threatpost

30.8.19

Google revealed how watering hole attacks compromised iPhone devices earlier this year

Apple

Securityaffairs

30.8.19

BRATA, the Android RAT that infected only Brazilian users

Android

Securityaffairs

30.8.19

Ransomware Hits Dental Data Backup Service Offering Ransomware Protection

Ransomware

Thehackernews

30.8.19

Google discovers websites exploiting iPhones, pushing spying implants en masse

Apple

Net-security

30.8.19

Malware Dropping a Local Node.js Instance

Virus

SANS

30.8.19

Google will pay for data abuse reports related to popular Android apps, Chrome extensions

Security

Net-security

30.8.19

CISO priorities: Implementing security from the get-go

Security

Net-security

30.8.19

Capital One Hacker indicted on federal charges for Wire Fraud and Computer Data Theft

Hacking

Securityaffairs

30.8.19

Google Offers Big Bounties for Data Abuse Reports

Security

Securityweek

30.8.19

Google Uncovers How Just Visiting Some Sites Were Secretly Hacking iPhones For Years

Apple

Thehackernews

30.8.19

Google Will Now Pay Anyone Who Reports Apps Abusing Users' Data

Privacy

Thehackernews

30.8.19

A very deep dive into iOS Exploit chains found in the wild

Exploit blog

Project Zero

30.8.19

In-the-wild iOS Exploit Chain 1

Exploit blog

Project Zero

30.8.19

In-the-wild iOS Exploit Chain 2

Exploit blog

Project Zero

30.8.19

In-the-wild iOS Exploit Chain 3

Exploit blog

Project Zero

30.8.19

In-the-wild iOS Exploit Chain 4

Exploit blog

Project Zero

30.8.19

In-the-wild iOS Exploit Chain 5

Exploit blog

Project Zero

30.8.19

Implant Teardown

Vulnerebility blog

Project Zero

30.8.19

JSC Exploits

Exploit blog

Project Zero

30.8.19

The Fully Remote Attack Surface of the iPhone

Vulnerebility blog

Project Zero

30.8.19

Trashing the Flow of Data

Vulnerebility blog

Project Zero

30.8.19

Windows Exploitation Tricks: Abusing the User-Mode Debugger

Exploit blog

Project Zero

30.8.19

Windows Kernel Logic Bug Class: Access Mode Mismatch in IO Manager

Vulnerebility blog

Project Zero

30.8.19

Android Messaging: A Few Bugs Short of a Chain

Vulnerebility blog

Project Zero

30.8.19

The Curious Case of Convexity Confusion

Vulnerebility blog

Project Zero

30.8.19

Examining Pointer Authentication on the iPhone XS

Vulnerebility blog

Project Zero

30.8.19

voucher_swap: Exploiting MIG reference counting in iOS 12

Exploit blog

Project Zero

30.8.19

Taking a page from the kernel's book: A TLB issue in mremap()

Vulnerebility blog

Project Zero

30.8.19

TGI Fridays Delivers Customer Indigestion Over Data Exposure

Incindent  Privacy

Threatpost

30.8.19

FIN6 Switches Up PoS Tactics to Target E-Commerce

CyberCrime

Threatpost

30.8.19

Google Targets Data-Abusing Apps with Bug Bounty Launch

Security

Threatpost

30.8.19

Venmo’s Public Transactions Policy Stirs Privacy Concerns

Privacy

Threatpost

30.8.19

Critical Cisco VM Bug Allows Remote Takeover of Routers

Vulnerebility

Threatpost

30.8.19

CISO priorities: Implementing security from the get-go

Security

Net-security

30.8.19

Cybersecurity in the age of the remote workforce

Cyber

Net-security

30.8.19

Fileless attacks designed to disguise malicious activity up 265%

Virus

Net-security

29.8.19

Fully equipped Spying Android RAT from Brazil: BRATA

Android

Securelist

29.8.19

A total of six hackers already become millionaires on HackerOne

Incindent

Securityaffairs

29.8.19

US Waged Cyberattack on Database Used by Iran to Target Tankers: NY Times

BigBrothers

Securityweek

29.8.19

Alleged Capital One Hacker Indicted on Wire Fraud, Computer Data Theft Charges

Incindent

Securityweek

29.8.19

Capital One Hacker Also Accused of Hacking 30 More Companies and CryptoJacking

Cryptocurrency

Securityweek

29.8.19

Incident Response report 2018

Analysis  Incindent

Securelist

29.8.19

Lumber Liquidators hit by malware attack that took down its network

Virus

Securityaffairs

29.8.19

A new variant of Trickbot banking Trojan targets Verizon, T-Mobile, and Sprint users

Virus

Securityaffairs

29.8.19

Expert releases Metasploit modules for Cisco UCS flaws

Vulnerebility

Securityaffairs

29.8.19

Pulse Secure Says Majority of Customers Patched Exploited Vulnerability

Vulnerebility

Securityweek

29.8.19

Bug Hunters Invited to Hack Facebook Devices at Pwn2Own Tokyo 2019

Congress

Securityweek

29.8.19

Apple Changes the Way It Listens to Your Siri Recordings Following Privacy Concerns

Apple

Thehackernews

29.8.19

Microsoft Wants exFAT in Linux Kernel, Opens File System Specs

OS

Bleepingcomputer

29.8.19

Microsoft Lifts Update Block On Windows 7 With Symantec AV

Security  Vulnerebility

Bleepingcomputer

29.8.19

Attackers Target Govt and Financial Orgs With Orcus, Revenge RATs

Virus

Bleepingcomputer

29.8.19

Malware Operation Making Millions Defeated by Design Flaw

Virus

Bleepingcomputer

29.8.19

New TrickBot Variant Targets Verizon, T-Mobile, and Sprint Users

Virus

Bleepingcomputer

29.8.19

Android Trojan Infects Tens of Thousands of Devices in 4 Months

Android

Bleepingcomputer

29.8.19

Check Point Patches Privilege Escalation Flaw in Endpoint Client

Vulnerebility

Bleepingcomputer

29.8.19

Cybersecurity Firm Suffers Security Breach, Client Info Exposed

Incindent

Bleepingcomputer

29.8.19

Malware Samples Compiling Their Next Stage on Premise

Virus

SANS

29.8.19

Knowing what’s on your hybrid-IT environment is fundamental to security

Security

Net-security

29.8.19

What can be done about the rising click interception threat?

Security

Net-security

29.8.19

Magecart hackers compromise another 80 eCommerce sites

CyberCrime

Securityaffairs

29.8.19

Apple Apologizes for Listening to Siri Talk, Sets New Rules

Apple

Securityweek

29.8.19

Malware Found in Google Play App With 100 Million Downloads

Virus

Securityweek

29.8.19

Malware Takes Down Lumber Liquidators’ Network

Virus

Securityweek

29.8.19

Dangerous Cryptomining Worm Racks Up 850K Infections, Self-Destructs

Cryptocurrency

Threatpost

29.8.19

Magecart Hits 80 Major eCommerce Sites in Card-Skimming Bonanza

CyberCrime

Threatpost

29.8.19

Google Squashes High-Severity Blink Browser Engine Flaw

Vulnerebility

Threatpost

29.8.19

Elderly China Chopper Tool Still Going Strong in Multiple Campaigns

CyberCrime

Threatpost

29.8.19

TrickBot Targets Verizon, T-Mobile, Sprint Users to Siphon PINs

BotNet

Threatpost

29.8.19

New ransomware grows 118% as cybercriminals adopt fresh tactics and code innovations

Ransomware

Net-security

29.8.19

SOCs still overwhelmed by alert overload, struggle with false-positives

Security

Net-security

28.8.19

French Police remotely disinfected 850,000 PCs from RETADUP bot

Virus

Securityaffairs

28.8.19

Cisco UCS Vulnerabilities Allow Complete Takeover of Affected Systems

Vulnerebility

Securityweek

28.8.19

Researchers Analyze Tools Used by 'Hexane' Attackers Against Industrial Firms

Attack

Securityweek

28.8.19

DLL Hijacking Flaw Patched in Check Point Endpoint Security

Vulnerebility

Securityweek

28.8.19

Avast, French Police Remove Retadup Malware From 850,000 PCs

Virus

Securityweek

28.8.19

Magecart Hackers Compromise 80 More eCommerce Sites to Steal Credit Card

CyberCrime

Thehackernews

28.8.19

French Police Remotely Removed RETADUP Malware from 850,000 Infected PCs

Virus

Thehackernews

28.8.19

Imperva discloses security incident affecting Cloud WAF customers

Incindent

Net-security

28.8.19

[Guest Diary] Open Redirect: A Small But Very Common Vulnerability

Vulnerebility

SANS

28.8.19

Trojan Dropper Malware Found in Android App With 100M Downloads

Android 

Bleepingcomputer

28.8.19

Lyceum/Hexane Threat Group Uses Common Hacking Tactics

CyberCrime

Bleepingcomputer

28.8.19

Microsoft Starts Testing Throttled Rollout of Windows 10 19H2

OS

Bleepingcomputer

28.8.19

Google Chrome is Losing the 'Close Other Tabs' Option

Security

Bleepingcomputer

28.8.19

Microsoft's Your Phone Is Down, Users Getting Connection Errors

Security

Bleepingcomputer

28.8.19

Apple Releases iOS 12.4.1 to Patch Security Flaw Behind Jailbreak

Apple

Bleepingcomputer

28.8.19

Phishing Campaign Delivers Quasar RAT Payloads via Fake Resumes

Phishing  Virus

Bleepingcomputer

28.8.19

Microsoft Warns of Windows 10 1703 End of Life for Enterprise

OS

Bleepingcomputer

28.8.19

New Nemty Ransomware May Spread via Compromised RDP Connections

Ransomware

Bleepingcomputer

28.8.19

Hostinger Data Breach Affects Almost 14 Million Customers

Incindent

Bleepingcomputer

28.8.19

Spam and phishing in Q2 2019

Analysis  Phishing  Spam

Securelist

28.8.19

TA505 group updates tactics and expands the list of targets

CyberCrime

Securityaffairs

28.8.19

Australia Tries to Curb Foreign Interference at Universities

Cyber

Securityweek

28.8.19

French Police Remotely Removed RETADUP Malware from 850,000 Infected PCs

Virus

Thehackernews

28.8.19

Imperva Firewall Breach Exposes Customer API Keys, SSL Certificates

Incindent

Threatpost

28.8.19

Oil and Gas Firms Targeted By New LYCEUM Threat Group

CyberCrime

Threatpost

28.8.19

Malicious App on Google Play Tallies 100 Million Downloads

Android

Threatpost

28.8.19

Employers Beware: Microsoft Word ‘Resume’ Phish Delivers Quasar RAT

Virus

Threatpost

28.8.19

Imperva data Breach: WAF customers’ data exposed

Incindent

Securityaffairs

28.8.19

Kaspersky found malware in popular CamScanner app. Remove it now from your phone!

Android

Securityaffairs

28.8.19

Lyceum APT made the headlines with attacks in Middle East

APT

Securityaffairs

28.8.19

Low Budgets, Limited Expertise Plague SMB Cybersecurity

Cyber

Securityweek

28.8.19

Imperva Notifies Cloud WAF Customers of Security Incident

Incindent

Securityweek

28.8.19

Imperva Breach Exposes WAF Customers' Data, Including SSL Certs, API Keys

Incindent

Thehackernews

28.8.19

What the education industry must do to protect itself from cyber attacks

Cyber

Net-security

28.8.19

How passwords paved the way for new technology

Safety

Net-security

28.8.19

Cost of data breaches to surpass $5 trillion in 2024

Incindent

Net-security

28.8.19

1 in 4 employees would steal company information to secure their next job

Security

Net-security

27.8.19

Code Execution and DoS flaw addressed in QEMU

Vulnerebility

Securityaffairs

27.8.19

Dridex Operator Updates Tactics and Targets

Virus

Securityweek

27.8.19

Bug Bounty Program Launched for Facebook's Libra Cryptocurrency

Cryptocurrency  Social

Securityweek

27.8.19

VMware Unveils Security Enhancements in Virtual Cloud Network Offering

Security

Securityweek

27.8.19

WARNING — Malware Found in CamScanner Android App With 100+ Million Users

Android

Thehackernews

27.8.19

An advertising dropper in Google Play

Android

Securelist

27.8.19

Experts uncovered an advanced phishing campaign delivering the Quasar RAT

Virus

Securityaffairs

27.8.19

Nearly Half of SMBs, Enterprises Still Using Windows 7: Kaspersky

Security

Securityweek

27.8.19

Apple Patches Re-Introduced Jailbreak Vulnerability

Apple

Securityweek

27.8.19

Free Windows 7 Extended Security Updates for Some Microsoft Customers

Vulnerebility

Securityweek

27.8.19

ThreatList: Half of All Social Media Logins Are Fraud

Security

Threatpost

27.8.19

Hostinger Data Breach: 14M Customer Passwords, Personal Data at Risk

Incindent

Threatpost

27.8.19

Apple Fixes iOS Flaw That Opened iPhones to Jailbreaks

Apple

Threatpost

27.8.19

IRS Impersonation Attacks Spread Malware Nationwide

Virus

Threatpost

27.8.19

White hat hacker demonstrated how to hack a million Instagram accounts

Social

Securityaffairs

27.8.19

Apple released an emergency patch to address CVE-2019-8605 iOS flaw

Apple

Securityaffairs

27.8.19

Nemty Ransomware, a new malware appears in the threat landscape

Ransomware

Securityaffairs

27.8.19

Code Execution Flaw in QEMU Mostly Impacts Development, Test VMs

Vulnerebility

Securityweek

27.8.19

Senators Question NHTSA on Risks of Connected Vehicles

BigBrothers

Securityweek

27.8.19

Hacker Finds Instagram Account Takeover Flaw Worth $10,000

Social

Securityweek

27.8.19

Apple Releases iOS 12.4.1 Emergency Update to Patch 'Jailbreak' Flaw

Apple

Thehackernews

27.8.19

Is it Safe to Require TLS 1.2 for E-Mail

Crypto

SANS

27.8.19

Worried about cyber pirates hijacking autonomous ships? Focus on port cybersecurity first

Hacking

Net-security

27.8.19

Growing cloud adoption introduces visibility gaps and security complications

Security

Net-security

27.8.19

Attackers use large-scale bots to launch attacks on social media platforms

Social

Net-security

27.8.19

A look at the global network access control market

Security

Net-security

26.8.19

Hostinger Resets User Passwords Following System Breach

Incindent

Securityweek

26.8.19

Company Sues Black Hat Conference Over Mocked Presentation

Congress

Securityweek

26.8.19

The Growing Threat of Deepfake Videos

Security

Securityweek

26.8.19

Judge ordered Capital One hacker Paige Thompson to remain in prison

Crime

Securityaffairs

26.8.19

Airlines That Manage Booking Systems Themselves Expose Customer Data

Incindent

Securityweek

26.8.19

Hostinger Suffers Data Breach – Resets Password For 14 Million Users

Incindent

Thehackernews

26.8.19

Binance Confirms Hacker Obtained Its Users' KYC Data from 3rd-Party Vendor

Hacking

Thehackernews

26.8.19

GitHub announces wider array of 2FA options, including security keys and biometrics

Safety

Net-security

26.8.19

Attackers are targeting vulnerable Fortigate and Pulse Secure SSL VPNs

Vulnerebility

Net-security

26.8.19

UK National Cyber Security Centre urge to drop Python 2

Cyber

Securityaffairs

26.8.19

Hostinger disclosed a data breach that affects 14 Million customers

Incindent

Securityaffairs

26.8.19

Bad Packets warns of over 14,500 Pulse secure VPN endpoints vulnerable to CVE-2019-11510

Vulnerebility

Securityaffairs

26.8.19

Judge Orders Woman in Capital One Case to Remain in Custody

Incindent

Securityweek

26.8.19

Are there any Advantages of Buying Cyber Security Insurance?

Cyber

SANS

26.8.19

How to evaluate a password management solution for business

Security

Net-security

26.8.19

Thinking network-first to protect against security threats

Security

Net-security

26.8.19

Using deep learning and natural language understanding to protect enterprise communication

Security

Net-security

26.8.19

Five vendors accounted for 24.1% of vulnerabilities in 2019 so far

Vulnerebility

Net-security

26.8.19

Enterprises are unable to effectively use data to drive decision-making

Security

Net-security