30.7.20 | | | Net-security |
30.7.20 | | | Net-security |
30.7.20 | | | Net-security |
30.7.20 | | | Net-security |
30.7.20 | | | Net-security |
30.7.20 | | | Net-security |
29.7.20 | APT trends report Q2 2020 | APT | Securelist |
29.7.20 | Doki, an undetectable Linux backdoor targets Docker Servers | Virus | Securityaffairs |
29.7.20 | AWS Fraud Detection Service Becomes Generally Available | Security | Securityweek |
29.7.20 | Vatican Allegedly Hacked by China Ahead of Key Talks | Hacking | Securityweek |
29.7.20 | Video Creation Service Promo.com Discloses Data Breach | Incindent | Securityweek |
29.7.20 | US Officials: Russia Behind Spread of Virus Disinformation | BigBrothers | Securityweek |
29.7.20 | North Korean Hackers Operate VHD Ransomware, Kaspersky Says | Ransomware | Securityweek |
29.7.20 | Cybersecurity Training Company RangeForce Raises $16 Million | IT | Securityweek |
29.7.20 | ZDI Announces Rules, Prizes for Pwn2Own Tokyo 2020 | Congress | Securityweek |
29.7.20 | Industrial VPN Flaws Could Let Attackers Target Critical Infrastructures | Vulnerebility | Thehackernews |
29.7.20 | OkCupid Dating App Flaws Could've Let Hackers Read Your Private Messages | Mobil | Thehackernews |
29.7.20 | | Vulnerebility | Threatpost |
29.7.20 | | APT | Threatpost |
29.7.20 | North Korea-Linked Lazarus APT is behind the VHD ransomware | APT | Securityaffairs |
29.7.20 | ShinyHunters leaked over 386 million user records from 18 companies | Incindent | Securityaffairs |
29.7.20 | Pirate Ship Sailing to Developing World: Group-IB Uncovers Real Captains of Online Piracy Crew | CyberCrime | Securityaffairs |
29.7.20 | Nefilim ransomware operators leaked data alleged stolen from the Dussmann group | Ransomware | Securityaffairs |
29.7.20 | Industrial Systems Can Be Hacked Remotely via VPN Vulnerabilities | ICS | Securityweek |
29.7.20 | U.S. Election Administrators Failed to Implement Phishing Protections: Study | Phishing | Securityweek |
29.7.20 | | Security | SANS |
29.7.20 | | Security | Net-security |
29.7.20 | | Exploit | Net-security |
29.7.20 | | Security | Net-security |
29.7.20 | | Security | Net-security |
29.7.20 | | IT | Net-security |
29.7.20 | | Vulnerebility | Net-security |
28.7.20 | Lazarus on the hunt for big game | APT | Securelist |
28.7.20 | Hacking IoT & RF Devices with BürtleinaBoard | IoT | Securityaffairs |
28.7.20 | QSnatch malware infected over 62,000 QNAP NAS Devices | Virus | Securityaffairs |
28.7.20 | FBI warns US companies on the use of Chinese Tax Software | BigBrothers | Securityaffairs |
28.7.20 | Several New Mac Malware Families Attributed to North Korean Hackers | Apple BigBrothers | Securityweek |
28.7.20 | Source Code From Major Firms Leaked via Unprotected DevOps Infrastructure | Incindent | Securityweek |
28.7.20 | US, UK Warn of Malware Targeting QNAP NAS Devices | Virus | Securityweek |
28.7.20 | Facebook Says EU Antitrust Probe Invades Employee Privacy | BigBrothers Social | Securityweek |
28.7.20 | Undetectable Linux Malware Targeting Docker Servers With Exposed APIs | Virus | Thehackernews |
28.7.20 | QSnatch Data-Stealing Malware Infected Over 62,000 QNAP NAS Devices | Virus | Thehackernews |
28.7.20 | | Security | Net-security |
28.7.20 | | Virus | Net-security |
28.7.20 | | BigBrothers Crypto | Threatpost |
28.7.20 | | Exploit Vulnerebility | Threatpost |
28.7.20 | | OS | Threatpost |
28.7.20 | Garmin says many of the systems are returning to operation | Ransomware | Securityaffairs |
28.7.20 | Source code of Cerberus Android Trojan offered for sale for $100,000 | Android | Securityaffairs |
28.7.20 | FBI warns cyber actors abusing protocols as new DDoS attack vectors | BigBrothers | Securityaffairs |
28.7.20 | Hacker Replaced Emotet Payloads With GIF Images | Virus | Securityweek |
28.7.20 | Garmin Says Systems Back Online After Cyber Attack | Ransomware | Securityweek |
28.7.20 | Bluetooth-Enabled 'Mooltipass' Hardware Password Manager Unveiled | Security | Securityweek |
28.7.20 | Digital Banking Service Dave Says Data Stolen in Third-Party Breach | Incindent | Securityweek |
28.7.20 | AA20-209A : Potential Legacy Risk from Malware Targeting QNAP NAS Devices | CERT | CERT |
28.7.20 | | Security | SANS |
28.7.20 | | Cyber | Net-security |
28.7.20 | | Security | Net-security |
28.7.20 | | Privacy | Net-security |
28.7.20 | | Security | Net-security |
28.7.20 | | Security | Net-security |
27.7.20 | Cerberus Android malware source code offered for sale for $100,000 | Android | Bleepingcomputer |
27.7.20 | Source code from dozens of companies leaked online | Incindent | Bleepingcomputer |
27.7.20 | No More Ransom turns 4: Saves $632 million in ransomware payments | Ransomware | Bleepingcomputer |
27.7.20 | Dave data breach affects 7.5 million users, leaked on hacker forum | Incindent | Bleepingcomputer |
27.7.20 | Microsoft's PowerToys 0.20 adds a built-in Windows 10 Color Picker | OS | Bleepingcomputer |
27.7.20 | Samsung is reportedly building an Exynos CPU for Windows 10 PCs | IT | Bleepingcomputer |
27.7.20 | FBI Issues Alert on Use of Chinese Tax Software | BigBrothers | Securityweek |
27.7.20 | Australian Watchdog Accuses Google of Privacy Breaches | BigBrothers | Securityweek |
27.7.20 | CISA Says Hackers Exploited BIG-IP Vulnerability in Attacks on U.S. Government | BigBrothers | Securityweek |
27.7.20 | Microsoft Adds Scenario-Based Rewards to Windows Insider Preview Bounty Program | OS | Securityweek |
27.7.20 | | Exploit | Net-security |
27.7.20 | NSA/CISA joint report warns on attacks on critical industrial systems | ICS | Securityaffairs |
27.7.20 | Shadow attacks allow replacing content in signed PDF files | Attack | Securityaffairs |
27.7.20 | REMnux 7, a Linux toolkit for malware analysts released | Security | Securityaffairs |
27.7.20 | Records for 7.5 million users of the digital banking app Dave leaked online | Incindent | Securityaffairs |
27.7.20 | | Exploit | SANS |
27.7.20 | | Cyber | Net-security |
27.7.20 | | Attack | Net-security |
27.7.20 | | Exploit | Net-security |
27.7.20 | | Security | Net-security |
27.7.20 | | Security | Net-security |
26.7.20 | Evolution of Valak, from Its Beginnings to Mass Distribution | Malware blog | Palo Alto Unity42 |
26.7.20 | OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory | APT blog | Palo Alto Unity42 |
26.7.20 | Threat Brief: Microsoft DNS Server Wormable Vulnerability CVE-2020-1350 | Vulnerebility blog | Palo Alto Unity42 |
26.7.20 | WHAT IS A VPN, AND HOW CAN IT HELP ENTERPRISES WITH REMOTE WORKERS? | Security blog | Cybereason |
26.7.20 | ENSURING DATA PRIVACY: UPDATE ON EU COURT OF JUSTICE RULING | Security blog | Cybereason |
26.7.20 | NEED A BOOST? STRETCH YOUR SKILLS WITH THE CYBEREASON SUMMER CTF! | Security blog | Cybereason |
26.7.20 | Hunting for Blues – the WSL Plan 9 Protocol BSOD | Security blog | Mcafee blog |
26.7.20 | McAfee COVID-19 Report Reveals Pandemic Threat Evolution | Cyber blog | Mcafee blog |
26.7.20 | Unique Threats to Operational Technology and Cyber Physical Systems | Cyber blog | FireEye |
26.7.20 | Making the Most of a Security Incident | Incident blog | F5 Labs |
26.7.20 | Steering a Cyber-Course Through Covid-19’s Troubled Waters | Cyber blog | F5 Labs |
26.7.20 | CYBER ATTACK TRENDS: 2020 MID-YEAR REPORT | Attack blog | Checkpoint |
26.7.20 | MMS Exploit Part 2: Effective Fuzzing of the Qmage Codec | Exploit blog | Checkpoint |
26.7.20 | Prometei botnet and its quest for Monero | BotNet blog | Cisco Talos |
26.7.20 | Premier League team narrowly avoids losing £1 million to scammers | Spam blog | Eset |
26.7.20 | Google adds security enhancements to Gmail, Meet and Chat | Security blog | Eset |
26.7.20 | Privacy watchdogs urge videoconferencing services to boost privacy protections | Security blog | Eset |
26.7.20 | Argentine telecom company hit by major ransomware attack | Ransomware blog | Eset |
26.7.20 | 7 VPN services leaked data of over 20 million users, says report | Incident blog | Eset |
26.7.20 | Data breach reports down by one‑third in first half of 2020 | Incident blog | Eset |
26.7.20 | Cracking Maldoc VBA Project Passwords | Virus | SANS |
26.7.20 | ndisasm Update 2.15 | Security | SANS |
26.7.20 | New ‘Meow’ attack has deleted almost 4,000 unsecured databases | Attack | Bleepingcomputer |
26.7.20 | Linux-based malware analysis toolkit REMnux 7 released | Security | Bleepingcomputer |
26.7.20 | Microsoft Edge now blocks abusive notifications to reduce web spam | OS | Bleepingcomputer |
26.7.20 | US govt confirms active exploitation of F5 BIG-IP RCE flaw | Exploit | Bleepingcomputer |
26.7.20 | Microsoft working on a fix for Windows 10 Sandbox failing to open | OS | Bleepingcomputer |
26.7.20 | Garmin outage caused by confirmed WastedLocker ransomware attack | Ransomware | Bleepingcomputer |
26.7.20 | Emotet malware operation hacked to show memes to victims | Virus | Bleepingcomputer |
26.7.20 | Cisco patches ASA/FTD firewall flaw actively exploited by hackers | Vulnerebility | Bleepingcomputer |
26.7.20 | 5 severe D-Link router vulnerabilities disclosed, patch now | Vulnerebility | Bleepingcomputer |
26.7.20 | UK govt warns of ransomware, BEC attacks against sports sector | Ransomware | Bleepingcomputer |
26.7.20 | How to stop Microsoft Edge launching automatically on login | OS | Bleepingcomputer |
26.7.20 | D-Link addressed 5 flaws on some router models, some of them reached EoL | Vulnerebility | Securityaffairs |
26.7.20 | US CISA warns of attacks exploiting CVE-2020-5902 flaw in F5 BIG-IP | Attack Exploit | Securityaffairs |
26.7.20 | Threat actors are hijacking the infamous Emotet botnet | BotNet Virus | Securityaffairs |
25.7.20 | AA20-206A : Threat Actor Exploitation of F5 BIG-IP CVE-2020-5902 | CERT | CERT |
25.7.20 | | Android | Threatpost |
25.7.20 | | BigBrothers | Threatpost |
25.7.20 | | Vulnerebility | Threatpost |
25.7.20 | | Security | Threatpost |
25.7.20 | Quantum Loop: US Unveils Blueprint for 'Virtually Unhackable' Internet | Security | Securityweek |
25.7.20 | Garmin Outage Raises Fear of Ransomware Attack | Ransomware | Securityweek |
25.7.20 | AI Cybersecurity Company CalypsoAI Raises $13 Million | IT | Securityweek |
25.7.20 | Twitter Says Hackers Accessed Dutch Politician's Inbox | Social | Securityweek |
25.7.20 | NSA, CISA Urge Critical Infrastructure Operators to Secure OT Assets | BigBrothers | Securityweek |
24.7.20 | CVE-2020-3452 flaw in Cisco ASA/FTD exploited within hours after the disclosure | Exploit | Securityaffairs |
24.7.20 | Spanish state-owned railway infrastructure manager ADIF infected with ransomware | Ransomware | Securityaffairs |
24.7.20 | Twitter revealed that hackers accessed DM Inboxes in July attack | Social | Securityaffairs |
24.7.20 | Chinese Drone Giant DJI Responds to Disclosure of Android App Security Issues | Android | Securityweek |
24.7.20 | Website Security Breach Exposes 1 Million DNA Profiles | Incindent | Securityweek |
24.7.20 | Vulnerability in Cisco Firewalls Exploited Shortly After Disclosure | Vulnerebility | Securityweek |
24.7.20 | Exposed Twilio SDK Abused for Malvertising Attack | Attack | Securityweek |
24.7.20 | Researchers Reveal New Security Flaw Affecting China's DJI Drones | Vulnerebility | Thehackernews |
24.7.20 | Smartwatch Maker Garmin Shuts Down Services After Ransomware Attack | Ransomware | Thehackernews |
24.7.20 | | Attack | Threatpost |
24.7.20 | | Ransomware | Threatpost |
24.7.20 | | Privacy | Threatpost |
24.7.20 | | Ransomware | Threatpost |
24.7.20 | | Vulnerebility | Threatpost |
24.7.20 | | Social | Threatpost |
24.7.20 | Garmin shut down its services after an alleged ransomware attack | Ransomware | Securityaffairs |
24.7.20 | PoC Released for Critical CVE-2020-1147 flaw, SharePoint servers exposed to hack | Vulnerebility | Securityaffairs |
24.7.20 | Exposed Twilio SDK Abused for Malvertising Attack | Attack | Securityweek |
24.7.20 | Risk Assessment Company CyCognito Raises $30 Million | IT | Securityweek |
24.7.20 | Apple Offers Hackable iPhones to Security Researchers | Apple | Securityweek |
24.7.20 | Facebook Unveils New Privacy, Security Features for Messenger | Social | Securityweek |
24.7.20 | AA20-205A : NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems | CERT | CERT |
24.7.20 | | Security | SANS |
24.7.20 | | Ransomware | Net-security |
24.7.20 | | IoT | Net-security |
24.7.20 | | Security | Net-security |
24.7.20 | | Phishing | Net-security |
24.7.20 | | Security | Net-security |
23.7.20 | Remove unwanted Windows 10 apps with this new open source tool | OS | Bleepingcomputer |
23.7.20 | Twitter hackers read private messages of 36 high-profile accounts | Social | Bleepingcomputer |
23.7.20 | New cryptojacking botnet uses SMB exploit to spread to Windows systems | Cryptocurrency | Bleepingcomputer |
23.7.20 | Twilio exposes SDK, attackers inject it with malvertising code | Virus | Bleepingcomputer |
23.7.20 | Lazarus hackers deploy ransomware, steal data using MATA malware | APT | Bleepingcomputer |
23.7.20 | Microsoft Outlook crashes, deletes mails for some POP accounts | OS | Bleepingcomputer |
23.7.20 | D-Link blunder: Firmware encryption key exposed in unencrypted image | Crypto | Bleepingcomputer |
23.7.20 | Critical SharePoint flaw dissected, RCE details now available | Vulnerebility | Bleepingcomputer |
23.7.20 | US offers $2 million for info on Ukrainians charged for SEC hack | Crime | Bleepingcomputer |
23.7.20 | New ‘Meow’ attack has wiped over 1,800 unsecured databases | Attack | Bleepingcomputer |
23.7.20 | Windows 10 KB4559004 cumulative update fixes File Explorer, LTE issues | OS | Bleepingcomputer |
23.7.20 | Microsoft 365 adds endpoint data leak protection in public preview | OS | Bleepingcomputer |
23.7.20 | Microsoft Edge gets new features on desktop and mobile | OS | Bleepingcomputer |
23.7.20 | Emotet botnet is now heavily spreading QakBot malware | Virus | Bleepingcomputer |
23.7.20 | Malwarebytes fixes bug causing Windows 10 2004 performance issues | OS | Bleepingcomputer |
23.7.20 | US indicts hackers working with China's Ministry of State Security | BigBrothers | Bleepingcomputer |
23.7.20 | Outlook affected by one-minute startup delays on Windows 10 | OS | Bleepingcomputer |
23.7.20 | DeepSource resets logins after employee falls for Sawfish phishing | Phishing | Bleepingcomputer |
23.7.20 | Adobe Photoshop gets fixes for critical security vulnerabilities | Vulnerebility | Bleepingcomputer |
23.7.20 | Phishing campaign uses Google Cloud Services to steal Office 365 logins | Phishing | Bleepingcomputer |
23.7.20 | Lorien Health Services discloses ransomware attack affecting nearly 50,000 | Ransomware | Bleepingcomputer |
23.7.20 | Microsoft will disable insecure TLS in Office 365 on Oct 15 | OS | Bleepingcomputer |
23.7.20 | Emotet-TrickBot malware duo is back infecting Windows machines | Virus | Bleepingcomputer |
23.7.20 | Coinbase blocked Twitter hackers from stealing an extra $280K | Social | Bleepingcomputer |
23.7.20 | Office 365 adds new security configuration analysis feature | OS | Bleepingcomputer |
23.7.20 | Microsoft investigating Windows 10 2004 'No Internet' bug, how to fix | OS | Bleepingcomputer |
23.7.20 | Windows 10 Store 'wsreset' tool lets attackers bypass antivirus | OS | Bleepingcomputer |
23.7.20 | | Exploit | Net-security |
23.7.20 | New MATA Multi-platform malware framework linked to NK Lazarus APT | APT | Securityaffairs |
23.7.20 | Multi-Platform Malware Framework Linked to North Korean Hackers | APT | Securityweek |
23.7.20 | Researchers Disclose New Methods for Replacing Content in Signed PDF Files | Virus | Securityweek |
23.7.20 | Twitter Says Hackers Accessed DM Inboxes in Recent Attack | Social | Securityweek |
23.7.20 | Regulators Urge Video Conferencing Companies to Improve Security, Privacy | Privacy | Securityweek |
23.7.20 | North Korean Hackers Spotted Using New Multi-Platform Malware Framework | APT | Thehackernews |
23.7.20 | | Incindent | Threatpost |
23.7.20 | | Virus | Threatpost |
23.7.20 | | APT | Threatpost |
23.7.20 | | APT | Threatpost |
23.7.20 | | Apple | Threatpost |
23.7.20 | Prometei, a new modular crypto-mining botnet exploits Windows SMB | Cryptocurrency | Securityaffairs |
23.7.20 | US agencies offer $2M in reward for Ukrainian hackers that breached the SEC | BigBrothers | Securityaffairs |
23.7.20 | Dozens of unsecured databases wiped by mysterious Meow attack | Attack | Securityaffairs |
23.7.20 | Open Source Tool Checks SAP Systems for RECON Attack IOCs | Attack | Securityweek |
23.7.20 | PoC Released for Critical Vulnerability Exposing SharePoint Servers to Attacks | Vulnerebility | Securityweek |
23.7.20 | US Offers $2mn Bounty for Ukrainian SEC Hackers | Crime | Securityweek |
23.7.20 | Chinese Threat Actor Uses New MgBot Variant in Attacks on India, Hong Kong | BotNet | Securityweek |
23.7.20 | Polymer Launches Solution to Avoid Data Leaks via Collaboration Tools | Incindent | Securityweek |
23.7.20 | | Safety | SANS |
23.7.20 | | Virus | Net-security |
23.7.20 | | Cyber | Net-security |
23.7.20 | | Cyber | Net-security |
23.7.20 | | Incindent | Net-security |
23.7.20 | | Cyber | Net-security |
23.7.20 | | Security | Net-security |
23.7.20 | | Security | Net-security |
22.7.20 | MATA: Multi-platform targeted malware framework | APT | Securelist |
22.7.20 | Citrix Workspace flaw can allow remote hack of devices running vulnerable app | Vulnerebility | Securityaffairs |
22.7.20 | US DoJ charged two Chinese hackers working with MSS | BigBrothers | Securityaffairs |
22.7.20 | French Trial Sought for Alleged Russian Bitcoin Criminal | BigBrothers | Securityweek |
22.7.20 | China Accuses US of 'Slander' Over Coronavirus Research Hacking Claims | BigBrothers | Securityweek |
22.7.20 | DeepSource Says Hackers Compromised Its GitHub Application | Hacking | Securityweek |
22.7.20 | Vulnerability Allows Remote Hacking of Devices Running Citrix Workspace App | Vulnerebility | Securityweek |
22.7.20 | US Charges 2 Chinese Hackers for Targeting COVID-19 Research and Trade Secrets | BigBrothers | Thehackernews |
22.7.20 | | Crypto | Net-security |
22.7.20 | | Incindent | Threatpost |
22.7.20 | | Virus | Threatpost |
22.7.20 | | Vulnerebility | Threatpost |
22.7.20 | Adobe fixed critical code execution flaws in Bridge, Photoshop and Prelude products | Vulnerebility | Securityaffairs |
22.7.20 | US DoJ charges Chinese hackers for targeting COVID-19 research | BigBrothers | Securityaffairs |
22.7.20 | U.S. Indicts Two Chinese Nationals for Hacking Hundreds of Organizations | BigBrothers | Securityweek |
22.7.20 | US Accuses Chinese Hackers in Targeting of COVID-19 Research | BigBrothers | Securityweek |
22.7.20 | Adobe Patches Critical Code Execution Flaws in Bridge, Photoshop, Prelude | Vulnerebility | Securityweek |
22.7.20 | New Security Capabilities Announced for Microsoft 365, Azure | Security | Securityweek |
22.7.20 | Chinese Hackers Escalate Attacks Against India and Hong Kong Amid Tensions | BigBrothers | Thehackernews |
22.7.20 | | Vulnerebility | SANS |
22.7.20 | | Spam | Net-security |
22.7.20 | | Cyber | Net-security |
22.7.20 | | Security | Net-security |
22.7.20 | | Vulnerebility | Net-security |
22.7.20 | | Security | Net-security |
21.7.20 | | Security | SANS |
21.7.20 | | Vulnerebility | Net-security |
21.7.20 | GReAT thoughts: Awesome IDA Pro plugins | Virus | Securelist |
21.7.20 | Phishing campaign aimed at stealing Office 365 logins abuses Google Cloud Services | Phishing | Securityaffairs |
21.7.20 | 7 VPN services left data of millions of users exposed online | Incindent | Securityaffairs |
21.7.20 | Cloud computing provider Blackbaud paid a ransom after data breach | Incindent | Securityaffairs |
21.7.20 | BadPower attack could burn your device through fast charging | Attack | Securityaffairs |
21.7.20 | Microsoft to Retire TLS 1.0/1.1 in Office 365 Starting October 15 | Crypto | Securityweek |
21.7.20 | Fortinet Acquires SASE Cloud Provider OPAQ Networks | IT | Securityweek |
21.7.20 | Democrats 'Gravely Concerned' Over Foreign Interference in US Vote | BigBrothers | Securityweek |
21.7.20 | Vulnerable Cellular Routers Targeted in Latest Attacks on Israel Water Facilities | BigBrothers | Securityweek |
21.7.20 | Emotet Resumes Activity After Five Months of Silence | Virus | Securityweek |
21.7.20 | | Cryptocurrency | Threatpost |
21.7.20 | | Social | Threatpost |
21.7.20 | REVil ransomware infected 18,000 computers at Telecom Argentina | Ransomware | Securityaffairs |
21.7.20 | Two more cyber attacks hit Israel’s water facilities in June | Attack | Securityaffairs |
21.7.20 | Yaniv Vardi Appointed CEO of Industrial Cybersecurity Firm Claroty | ICS | Securityweek |
21.7.20 | Alleged Ripoff Report Hacker Extradited to United States | Crime | Securityweek |
21.7.20 | Cloud Company Blackbaud Pays Ransomware Operators to Avoid Data Leak | Ransomware | Securityweek |
21.7.20 | | Security | SANS |
21.7.20 | | Attack | Net-security |
21.7.20 | | Security | Net-security |
21.7.20 | | Privacy | Net-security |
21.7.20 | | Security | Net-security |
21.7.20 | | Security | Net-security |
21.7.20 | | Mobil | Net-security |
21.7.20 | | Security | Net-security |
20.7.20 | 21-Year-Old Cypriot Hacker Extradited to U.S. Over Fraud and Extortion Charges | Crime | Thehackernews |
20.7.20 | Critical SIGred Windows DNS bug gets micropatch after PoCs released | Vulnerebility | Bleepingcomputer |
20.7.20 | How to use Windows 10 File History to make secure backups | OS | Bleepingcomputer |
20.7.20 | Microsoft Edge 84 introduces Storage Access API to improve privacy | OS | Bleepingcomputer |
20.7.20 | Windows 10 2004: List of compatibility issues blocking updates | OS | Bleepingcomputer |
20.7.20 | New phishing campaign abuses a trio of enterprise cloud services | Phishing | Bleepingcomputer |
20.7.20 | Tedrade banking malware families target users worldwide | Virus | Securityaffairs |
20.7.20 | UK 'Confident' Moscow Helped Hackers Target Virus Vaccine | BigBrothers | Securityweek |
20.7.20 | Ransomware Functionality Removed From ThiefQuest Mac Malware | Ransomware | Securityweek |
20.7.20 | Hackers Accessed, Downloaded Twitter User Data in Recent Attack | Attack Social | Securityweek |
20.7.20 | More Fake Cryptocurrency Apps Deliver GMERA Malware to Mac Users | Cryptocurrency | Securityweek |
20.7.20 | Germany's Top Court Reins in State Access to Online Data | BigBrothers | Securityweek |
20.7.20 | Twitter Attack Was Work of Young Hacker Pals: NYT | Social | Securityweek |
20.7.20 | A flaw in Zoom’s Vanity URL feature could have been exploited in phishing attacks | Vulnerebility | Securityaffairs |
20.7.20 | Ghost Squad Hackers defaced a second European Space Agency (ESA) site in a week | BigBrothers | Securityaffairs |
20.7.20 | Twitter reveals that hackers also downloaded data from eight compromised accounts | Social | Securityaffairs |
20.7.20 | Diebold Nixdorf warns of a wave of ATM black box attacks across Europe | Attack | Securityaffairs |
20.7.20 | | Virus | SANS |
20.7.20 | | Security | Net-security |
20.7.20 | | Security | Net-security |
20.7.20 | | Security | Net-security |
20.7.20 | | Attack | Net-security |
19.7.20 | Introducing the Cryptonice HTTPS Scanner | Security blog | F5 Labs |
19.7.20 | How Credential Stuffing Is Evolving | Security blog | F5 Labs |
19.7.20 | What APIs Are and Why They Matter | Security blog | F5 Labs |
19.7.20 | The Five Cybersecurity Practices Every Organization Should Adopt | Cyber blog | F5 Labs |
19.7.20 | Cybersecurity Myths That Are Harming Your Business | Cyber blog | F5 Labs |
19.7.20 | Technical Controls for a Secure Open Banking Initiative | Security blog | F5 Labs |
19.7.20 | How to Guard Against Identity Theft in Times of Increasing Online Fraud | Security blog | F5 Labs |
19.7.20 | Coronavirus, Data Privacy & the New Online Social Contract | Cyber blog | F5 Labs |
19.7.20 | Getting Audited for DoD CMMC | Security blog | F5 Labs |
19.7.20 | Qbot Banking Trojan Still Up to Its Old Tricks | Malware blog | F5 Labs |
19.7.20 | Will gRPC Be the Next Protocol to Slip by Your Defenses? | Security blog | F5 Labs |
19.7.20 | Windows Server Containers Are Open, and Here’s How You Can Break Out | Security blog | Palo Alto Unity42 |
19.7.20 | 3 Vulnerabilities Found on AvertX IP Cameras | Vulnerebility blog | Palo Alto Unity42 |
19.7.20 | CERTIFIED BUSINESS SECURITY! | Security blog | Cybereason |
19.7.20 | A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES | Malware blog | Cybereason |
19.7.20 | Ripple20 Vulnerability Mitigation Best Practices | Vulnerebility blog | Mcafee blog |
19.7.20 | My Adventures Hacking the iParcelBox | Hacking blog | Mcafee blog |
19.7.20 | What’s in the Box? Part II: Hacking the iParcelBox | Hacking blog | Mcafee blog |
19.7.20 | RagnarLocker Ransomware Threatens to Release Confidential Information | Ransomware blog | Mcafee blog |
19.7.20 | OneDrive Phishing Awareness | Phishing blog | Mcafee blog |
19.7.20 | MMS Exploit Part 1: Introduction to the Samsung Qmage Codec and Remote Attack Surface | Exploit blog | Project Zero |
19.7.20 | What to expect when you’re electing: Talos’ 2020 election security primer | BigBrother blog | Cisco Talos |
19.7.20 | Vulnerability Spotlight: Multiple vulnerabilities in RemoteFX affects, AMD, Intel chips | Vulnerebility blog | Cisco Talos |
19.7.20 | Ransom News | Ransom | Ransom |
19.7.20 | | Security | SANS |
19.7.20 | Emotet botnet surges back after months of absence | Virus | Securityaffairs |
19.7.20 | Experts warn of massive internet scans for SAP systems affected by RECON Vulnerability | Vulnerebility | Securityaffairs |
18.7.20 | Cloudflare outage takes down Discord, BleepingComputer, and other sites | Security | Bleepingcomputer |
18.7.20 | Twitter: Hackers targeted 130 accounts, no passwords accessed | Social | Bleepingcomputer |
18.7.20 | Emotet spam trojan surges back to life after 5 months of silence | Virus | Bleepingcomputer |
18.7.20 | Magento adds 2FA to protect against card skimming attacks | Attack | Bleepingcomputer |
18.7.20 | Microsoft releases open-source Linux version of Procmon tool | OS | Bleepingcomputer |
18.7.20 | Twitter starts rolling out new LinkedIn-style DMs interface | Social | Bleepingcomputer |
18.7.20 | Microsoft fixes Windows 10 2004 boot fails caused by Disk Cleanup | OS | Bleepingcomputer |
18.7.20 | Federal agencies told to patch wormable Windows DNS bug in 24 hours | Vulnerebility | Bleepingcomputer |
18.7.20 | T-Mobile announces free Scam Shield robocall and scam protection | Spam | Bleepingcomputer |
18.7.20 | Orange confirms ransomware attack exposing business customers' data | Ransomware | Bleepingcomputer |
18.7.20 | New Android malware steals your dating and social accounts | Android | Bleepingcomputer |
18.7.20 | Russian hackers target COVID-19 vaccine research with custom malware | BigBrothers | Bleepingcomputer |
18.7.20 | Scammers hacked Twitter and hijacked accounts using admin tool | Social | Bleepingcomputer |
18.7.20 | PoC exploits released for SAP Recon vulnerabilities, patch now! | Exploit | Bleepingcomputer |
18.7.20 | | Vulnerebility | Threatpost |
18.7.20 | | Social | Threatpost |
18.7.20 | | Vulnerebility | Threatpost |
18.7.20 | Orange Business Services hit by Nefilim ransomware operators | Ransomware | Securityaffairs |
18.7.20 | U.S. Government Agencies Instructed to Patch Wormable Windows Server Flaw | BigBrothers | Securityweek |
17.7.20 | Operation In(ter)ception | Operation | Operation |
17.7.20 | Iran-linked APT35 accidentally exposed 40 GB associated with their operations | APT | Securityaffairs |
17.7.20 | Introducing the PhishingKitTracker | Phishing | Securityaffairs |
17.7.20 | DHS CISA urges government agencies to fix SIGRed Windows Server DNS bug within 24h | BigBrothers | Securityaffairs |
17.7.20 | ExpressVPN Announces Bug Bounty Program on Bugcrowd | Vulnerebility | Securityweek |
17.7.20 | Apple Patches Multiple Code Execution Flaws in Audio Components | Apple | Securityweek |
17.7.20 | Industry Reactions to Twitter Hack: Feedback Friday | Social | Securityweek |
17.7.20 | Internet Scanned for SAP Systems Affected by RECON Vulnerability | Vulnerebility | Securityweek |
17.7.20 | Twitter Says Hackers Targeted 130 Accounts in Recent Attack | Attack Social | Securityweek |
17.7.20 | Kremlin Denies UK Claims of Vote Meddling, Vaccine Hacking | BigBrothers | Securityweek |
17.7.20 | Zoom's Vanity URLs Could Have Been Abused for Phishing Attacks | Phishing | Securityweek |
17.7.20 | Iranian Hackers Accidentally Exposed Their Training Videos (40 GB) Online | BigBrothers | Thehackernews |
17.7.20 | | BigBrothers | Net-security |
17.7.20 | | Security | Net-security |
17.7.20 | AA20-198A : Malicious Cyber Actor Use of Network Tunneling and Spoofing to Obfuscate Geolocation | CERT | CERT |
17.7.20 | | Hacking | Threatpost |
17.7.20 | | Vulnerebility | Threatpost |
17.7.20 | | Phishing | Threatpost |
17.7.20 | | BigBrothers | Threatpost |
17.7.20 | | Android | Threatpost |
17.7.20 | New Android BlackRock malware targets hundreds of apps | Android | Securityaffairs |
17.7.20 | Group-IB helps to detain fraudsters that used cloned SIM cards to steal money from banks’ VIP customers | Hacking | Securityaffairs |
17.7.20 | UK, US, Canada Accuse Russia of Hacking Virus Vaccine Trials | BigBrothers | Securityweek |
17.7.20 | Iran-Linked Hackers Accidentally Exposed 40 GB of Their Files | APT | Securityweek |
17.7.20 | | Exploit | SANS |
17.7.20 | | Vulnerebility | Net-security |
17.7.20 | | IoT | Net-security |
17.7.20 | | Security | Net-security |
17.7.20 | | Security | Net-security |
17.7.20 | | Security | Net-security |
17.7.20 | | Cyber | Net-security |
17.7.20 | | Social | Net-security |
16.7.20 | The Streaming Wars: A Cybercriminal’s Perspective | CyberCrime | Securelist |
16.7.20 | UK NCSC blames Russia-linked APT29 for attacks on COVID-19 vaccine research | APT BigBrothers | Securityaffairs |
16.7.20 | Cisco fixes 5 critical flaws that could allow router firewall takeover | Vulnerebility | Securityaffairs |
16.7.20 | Several High-Profile Twitter accounts hacked in a Bitcoin scam | Hacking | Securityaffairs |
16.7.20 | Critical Vulnerabilities Can Be Exploited to Hack Cisco Small Business Routers | Vulnerebility | Securityweek |
16.7.20 | UK Says Russian Hackers Trying to Steal Virus Vaccine Research | BigBrothers | Securityweek |
16.7.20 | Google Cloud Unveils New Service for Government Workloads | BigBrothers | Securityweek |
16.7.20 | Top Court Scraps EU-US Data Pact in New Blow to Brussels | BigBrothers | Securityweek |
16.7.20 | Experts Say Twitter Breach Troubling, Undermines Trust | Incindent Social | Securityweek |
16.7.20 | Seven Ransomware Families Target Industrial Software | Ransomware | Securityweek |
16.7.20 | Data Governance and Security Provider Privacera Raises $13.5 Million | IT | Securityweek |
16.7.20 | Hackers Used Internal Twitter Tools to Hijack High-Profile Accounts | Social | Securityweek |
16.7.20 | More Countries Waking up to Huawei Threats, US Say | BigBrothers | Securityweek |
16.7.20 | Why Can Application Security Be Considered A Enabler For Business? | Security | Thehackernews |
16.7.20 | New Android Malware Now Steals Passwords For Non-Banking Apps Too | Android | Thehackernews |
16.7.20 | A New Flaw In Zoom Could Have Let Fraudsters Mimic Organisations | Vulnerebility | Thehackernews |
16.7.20 | Apple, Kanye, Gates, Bezos, more hacked in Twitter account crypto scam | Social | Bleepingcomputer |
16.7.20 | Citrix: No breach, hacker stole business info from third party | Vulnerebility | Bleepingcomputer |
16.7.20 | Cisco fixes critical pre-auth flaws allowing router takeover | Vulnerebility | Bleepingcomputer |
16.7.20 | Microsoft Outlook is crashing worldwide with 0xc0000005 errors, how to fix | OS | Bleepingcomputer |
16.7.20 | Microsoft removes Windows 10 2004 Thunderbolt dock update block | OS | Bleepingcomputer |
16.7.20 | Google Chrome ends Windows 10 memory optimization test after CPU hit | Security | Bleepingcomputer |
16.7.20 | Microsoft Office July security updates patch critical RCE bugs | OS | Bleepingcomputer |
16.7.20 | WhatsApp is down, users reporting worldwide outage | Social | Bleepingcomputer |
16.7.20 | Microsoft fixes Windows 10 issue causing reboots, LSASS crashes | OS | Bleepingcomputer |
16.7.20 | Chrome 84 released with important security enhancements | Security | Bleepingcomputer |
16.7.20 | Windows 10 2004 servicing stack update fixes privilege escalation bug | OS | Bleepingcomputer |
16.7.20 | Microsoft July 2020 Patch Tuesday: 123 vulnerabilities, 18 Critical! | OS | Bleepingcomputer |
16.7.20 | Microsoft patches critical wormable SigRed bug in Windows DNS Server | OS | Bleepingcomputer |
16.7.20 | Windows 10 Cumulative Updates KB4565503 & KB4565483 Released | OS | Bleepingcomputer |
16.7.20 | Wattpad data breach exposes account info for millions of users | Incindent | Bleepingcomputer |
16.7.20 | Adobe fixes critical bugs in Creative Cloud, Media Encoder | Vulnerebility | Bleepingcomputer |
16.7.20 | New GoldenHelper malware found in official Chinese tax software | Virus | Bleepingcomputer |
16.7.20 | Android chat app uses public code to spy, exposes user data | Android | Bleepingcomputer |
16.7.20 | Critical SAP Recon flaw exposes thousands of customers to attacks | Vulnerebility | Bleepingcomputer |
16.7.20 | New AgeLocker Ransomware uses Googler's utility to encrypt files | Ransomware | Bleepingcomputer |
16.7.20 | LiveAuctioneers reports data breach after user records sold online | Incindent | Bleepingcomputer |
16.7.20 | Microsoft extends security for Azure Storage file shares, data lakes | OS | Bleepingcomputer |
16.7.20 | Microsoft Office 365 will add support for disposable emails | OS | Bleepingcomputer |
16.7.20 | Windows 10's Feedback Hub: A forum for political trolls, spammers | OS | Bleepingcomputer |
16.7.20 | Malware adds online sandbox detection to evade analysis | Virus | Bleepingcomputer |
16.7.20 | How to use Windows 10’s Storage Sense to free up Disk Space | OS | Bleepingcomputer |
16.7.20 | | Virus | Threatpost |
16.7.20 | | Cryptocurrency Social | Threatpost |
16.7.20 | | Virus | Threatpost |
16.7.20 | CIA covert operations likely behind attacks against APT34 and FSB | APT BigBrothers | Securityaffairs |
16.7.20 | New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data | Incindent | Securityaffairs |
16.7.20 | Industrial Cybersecurity Firm Claroty Releases Open Source Database Parser | ICS | Securityweek |
16.7.20 | Twitter Confirms 'Security Incident' Involving Hacked Accounts | Social | Securityweek |
16.7.20 | Twitter Accounts of Apple, Musk, Gates, Others Hit in Major Hack | Social | Securityweek |
16.7.20 | Several High-Profile Accounts Hacked in the Biggest Twitter Hack of All Time | Vulnerebility | Thehackernews |
16.7.20 | | Privacy | Net-security |
16.7.20 | | Security | Net-security |
16.7.20 | | Attack | Net-security |
16.7.20 | | Security | Net-security |
16.7.20 | | Security | Net-security |
15.7.20 | GReAT Ideas follow-up | Virus | Securelist |
15.7.20 | How to Extend Security Across Your Kubernetes Infrastructure | Security | Securityaffairs |
15.7.20 | US applauds British ban on China’s Huawei for 5G networks | BigBrothers | Securityaffairs |
15.7.20 | Exclusive, Ghost Squad Hackers defaced European Space Agency (ESA) site | BigBrothers | Securityaffairs |
15.7.20 | GoldenHelper, a new malware delivered via Chinese tax software | Virus | Securityaffairs |
15.7.20 | Chrome 84 Brings 38 Security Patches, Resumes CSRF Protection Rollout | Vulnerebility | Securityweek |
15.7.20 | Citrix Says Data Sold on Dark Web Comes From Third Party | CyberCrime | Securityweek |
15.7.20 | 'Tetrade' Brazilian Banking Trojans Go International | Virus | Securityweek |
15.7.20 | Vulnerabilities Impact Multiple Rittal Products Due to Use of Same Firmware | Vulnerebility | Securityweek |
15.7.20 | Cisco Investigating Report of Vulnerability Found in Counterfeit Switches | Vulnerebility | Securityweek |
15.7.20 | US Hails British Ban on China's Huawei | BigBrothers | Securityweek |
15.7.20 | Oracle's July 2020 CPU Includes 443 New Patches | Vulnerebility | Securityweek |
15.7.20 | Catalan Leader Demands Investigation Into Spain Spying Claim | BigBrothers | Securityweek |
15.7.20 | Critical, Wormable Bug in Windows DNS Servers Could Allow Full Infrastructure Compromise | Vulnerebility | Securityweek |
15.7.20 | 4 Dangerous Brazilian Banking Trojans Now Trying to Rob Users Worldwide | Virus | Thehackernews |
15.7.20 | | Vulnerebility | Net-security |
15.7.20 | PATCH NOW - SIGRed - CVE-2020-1350 - Microsoft DNS Server Vulnerability | Vulnerebility | SANS |
15.7.20 | Critical SAP Bug Allows Full Enterprise System Takeover | Vulnerebility | Threatpost |
15.7.20 | Microsoft Tackles 123 Fixes for July Patch Tuesday | Vulnerebility | Threatpost |
15.7.20 | Adobe Discloses Critical Code-Execution Bugs in July Update | Vulnerebility | Threatpost |
15.7.20 | Critical DNS Bug Opens Windows Servers to Infrastructure Hijacking | Vulnerebility | Threatpost |
15.7.20 | DMARC Adoption Spikes, Higher Ed Remains Behind | Spam | Threatpost |
15.7.20 | Leaked Details of 142 Million MGM Hotel Guests Found for Sale on Dark Web | Incindent | Threatpost |
15.7.20 | The Tetrade: Brazilian banking malware goes global | Virus | Securelist |
15.7.20 | Microsoft July 2020 Security Updates address 123 vulnerabilities | Vulnerebility | Securityaffairs |
15.7.20 | Microsoft fixes critical wormable RCE SigRed in Windows DNS servers | Vulnerebility | Securityaffairs |
15.7.20 | Adobe fixes over a dozen flaws in Media Encoder, Download Manager | Vulnerebility | Securityaffairs |
15.7.20 | Critical, Wormable Bug in Windows DNS Servers Could Allow Full Infrastructure Compromise | Vulnerebility | Securityaffairs |
15.7.20 | SAP Releases 10 Security Notes on July 2020 Patch Day | Vulnerebility | Securityweek |
15.7.20 | Microsoft Patches 123 Vulnerabilities With July 2020 Security Updates | Vulnerebility | Securityweek |
15.7.20 | Researchers Find More Malware Delivered via Chinese Tax Software | Virus | Securityweek |
15.7.20 | Adobe Patches Critical Vulnerabilities in Media Encoder, Download Manager | Vulnerebility | Securityweek |
15.7.20 | 17-Year-Old Critical 'Wormable' RCE Vulnerability Impacts Windows DNS Servers | Vulnerebility | Thehackernews |
15.7.20 | Adobe Issues July 2020 Critical Security Patches for Multiple Software | Vulnerebility | Thehackernews |
15.7.20 | | Virus | SANS |
15.7.20 | | Security | Net-security |
15.7.20 | | Security | Net-security |
15.7.20 | | Security | Net-security |
15.7.20 | | Attack | Net-security |
15.7.20 | | Vulnerebility | Net-security |
15.7.20 | | Vulnerebility | Net-security |
14.7.20 | The Tetrade: Brazilian banking malware goes global | Virus | Securelist |
14.7.20 | 3.4 Million user records from LiveAuctioneers hack available for sale | IT | Securityaffairs |
14.7.20 | NightLion hacker is selling details of 142 million MGM Resorts hotel guests | Incindent | Securityaffairs |
14.7.20 | Critical SAP Recon vulnerability exposes thousands of system to full take over | Vulnerebility | Securityaffairs |
14.7.20 | UK to Exclude Huawei From Role in High-Speed Phone Network | BigBrothers | Securityweek |
14.7.20 | Blockchain Security Startup Valid Network Raises $8 Million in Seed Round | Cryptocurrency | Securityweek |
14.7.20 | Cloud Application Security Firm Traceable Emerges From Stealth Mode | Safety | Securityweek |
14.7.20 | Google Cloud Unveils Confidential VMs Powered by AMD EPYC Processors | IT | Securityweek |
14.7.20 | Top Trump Aide Warns of 'Strong Actions' on TikTok, Angering China | BigBrothers | Securityweek |
14.7.20 | 'RECON' Vulnerability Exposes Thousands of SAP Systems to Attacks | Vulnerebility | Securityweek |
14.7.20 | LiveAuctioneers Data Breach Impacts 3.4 Million Users | Incindent | Securityweek |
14.7.20 | The Enemy Within: How Insider Threats Are Changing | Security | Threatpost |
14.7.20 | A ‘New Age’ of Sophisticated Business Email Compromise is Coming | Spam | Threatpost |
14.7.20 | Secret Service Creates Cyber Fraud Task Forces | BigBrothers | Threatpost |
14.7.20 | Critical SAP Bug Allows Full Enterprise System Takeover | Vulnerebility | Threatpost |
14.7.20 | TrickBot Sample Accidentally Warns Victims They’re Infected | Virus | Threatpost |
14.7.20 | New Mirai variant includes exploit for a flaw in Comtrend Routers | BotNet | Securityaffairs |
14.7.20 | Trump admits to have authorized a cyber attack on Russian troll farm in 2018 | BigBrothers | Securityaffairs |
14.7.20 | Mozilla Joins Apple, Google in Reducing TLS Certificate Lifespans | Crypto | Securityweek |
14.7.20 | New Mirai Variant Targets Vulnerability in Comtrend Routers | BotNet | Securityweek |
14.7.20 | New Highly-Critical SAP Bug Could Let Attackers Take Over Corporate Servers | Vulnerebility | Thehackernews |
14.7.20 | AA20-195A : Critical Vulnerability in SAP NetWeaver AS Java | CERT | CERT |
14.7.20 | | Security | Net-security |
14.7.20 | | Ransomware | Net-security |
14.7.20 | | Hacking | Net-security |
14.7.20 | | Safety | Net-security |
14.7.20 | | Congress | Net-security |
13.7.20 | Personal details and SSNs of 40,000 US citizens available for sale | Incindent | Securityaffairs |
13.7.20 | Malware campaign attempts to evade analysis with Any.Run sandbox | Virus | Securityaffairs |
13.7.20 | Hacker claims to have breached Night Lion security firm | Incindent | Securityaffairs |
13.7.20 | Israel Court Rejects Amnesty Petition Against Spyware Firm NSO | BigBrothers | Securityweek |
13.7.20 | U.S. Secret Service Creates Cyber Fraud Task Force | BigBrothers | Securityweek |
13.7.20 | Russian Found Guilty of Hacking LinkedIn, Formspring, Dropbox | BigBrothers | Securityweek |
13.7.20 | Trump Confirms U.S. Launched Cyberattack on Russian Troll Farm in 2018 | BigBrothers | Securityweek |
13.7.20 | Amazon Says Email to Employees Banning TikTok Was a Mistake | Spam | Securityweek |
13.7.20 | Backdoors Identified in Tens of C-Data Fiber Broadband Devices | Virus | Securityweek |
13.7.20 | POST-INCIDENT REVIEW AND THE BIG DATA PROBLEM | Incident blog | Cybereason |
13.7.20 | WHAT MODERN RANSOMWARE LOOKS LIKE | Ransomware blog | Cybereason |
13.7.20 | FAKESPY MASQUERADES AS POSTAL SERVICE APPS AROUND THE WORLD | Malware blog | Cybereason |
13.7.20 | RANSOMWARE: WEAPONS OF MASS DISRUPTION | Ransomware blog | Cybereason |
13.7.20 | HOW TO DESIGN A PREVENTION STACK TO STOP RANSOMWARE | Ransomware blog | Cybereason |
13.7.20 | NEXT-GENERATION ANTIVIRUS 101: LAYERS OF PREVENTION | Malware blog | Cybereason |
13.7.20 | 308% ROI BY USING CYBEREASON, ACCORDING TO FORRESTER TOTAL ECONOMIC IMPACT STUDY | Cyber blog | Cybereason |
13.7.20 | UBU: CHAMPIONING DIVERSITY, EQUITY, AND INCLUSION AT CYBEREASON | Security blog | Cybereason |
13.7.20 | CYBEREASON’S NEWEST HONEYPOT SHOWS HOW MULTISTAGE RANSOMWARE ATTACKS SHOULD HAVE CRITICAL INFRASTRUCTURE PROVIDERS ON HIGH ALERT | Ransomware blog | Cybereason |
13.7.20 | HOW I MADE MY COMPANY’S OFFICE INTO A FANCY INTERNET CAFE AND WHY SHOULD YOU TOO | Cyber blog | Cybereason |
13.7.20 | WHAT ARE ADVERSARY EMULATION PLANS? | Security blog | Cybereason |
13.7.20 | WHY NOT DETECT EVERY TTP IN THE MITRE ATT&CK FRAMEWORK? | Hacking blog | Cybereason |
13.7.20 | VALAK: MORE THAN MEETS THE EYE | Malware blog | Cybereason |
13.7.20 | LOVE YOUR ENEMIES BEFORE YOU DESTROY THEM — HACKING FOR GOOD | Hacking blog | Cybereason |
13.7.20 | Records of 45 million+ travelers to Thailand and Malaysia surfaced in the darkweb | CyberCrime | Securityaffairs |
13.7.20 | Google updates policies to ban any ads for surveillance solutions and services | Security | Securityaffairs |
13.7.20 | | Spam | SANS |
13.7.20 | | Cyber | Net-security |
13.7.20 | | Security | Net-security |
12.7.20 | Threat Assessment: EKANS Ransomware | Ransomware blog | Palo Alto Unity42 |
12.7.20 | Attackers Cryptojacking Docker Images to Mine for Monero | Cryptocurrency blog | Palo Alto Unity42 |
12.7.20 | Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices | Cryptocurrency blog | Palo Alto Unity42 |
12.7.20 | An Overview of GPS Tracking and Future Application for IoT | IoT blog | Palo Alto Unity42 |
12.7.20 | AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations | Malware blog | Palo Alto Unity42 |
12.7.20 | Threat Assessment: Hangover Threat Group | Cyber blog | Palo Alto Unity42 |
12.7.20 | 6 New Vulnerabilities Found on D-Link Home Routers | Vulnerebility blog | Palo Alto Unity42 |
12.7.20 | Goodbye Mworm, Hello Nworm: TrickBot Updates Propagation Module | Malware blog | Palo Alto Unity42 |
12.7.20 | Rootless Containers: The Next Trend in Container Security | Security blog | Palo Alto Unity42 |
12.7.20 | Vulnerability Spotlight: SQL injection vulnerability in Glacies IceHRM | Vulnerebility blog | Cisco Talos |
12.7.20 | New Snort rule addresses critical vulnerability in F5 BIG-IP | Vulnerebility blog | Cisco Talos |
12.7.20 | WastedLocker Goes "Big-Game Hunting" in 2020 | Security blog | Cisco Talos |
12.7.20 | Vulnerability Spotlight: Google Chrome PDFium memory corruption vulnerability | Vulnerebility blog | Cisco Talos |
12.7.20 | Vulnerability Spotlight: Information disclosure vulnerability in Mozilla Firefox | Vulnerebility blog | Cisco Talos |
12.7.20 | Vulnerability Spotlight: Remote code execution vulnerabilities in LEADTOOLS 20 | Vulnerebility blog | Cisco Talos |
12.7.20 | Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks | Malware blog | Cisco Talos |
12.7.20 | PROMETHIUM extends global reach with StrongPity3 APT | APT blog | Cisco Talos |
12.7.20 | Vulnerability Spotlight: Denial-of-service vulnerability in NVIDIA driver | Vulnerebility blog | Cisco Talos |
12.7.20 | Cisco Talos replacing all mentions of 'blacklist,' 'whitelist' | Security blog | Cisco Talos |
12.7.20 | IndigoDrop spreads via military-themed lures to deliver Cobalt Strike | BigBrother blog | Cisco Talos |
12.7.20 | Quarterly report: Incident Response trends in Summer 2020 | Incident blog | Cisco Talos |
12.7.20 | Tor2Mine is up to their old tricks — and adds a few new ones | Cryptocurrency blog | Cisco Talos |
12.7.20 | Vulnerability Spotlight: Two code execution vulnerabilities in Microsoft Excel | Vulnerebility blog | Cisco Talos |
12.7.20 | Vulnerability Spotlight: Remote code execution vulnerability in Firefox’s SharedWorkerService function | Vulnerebility blog | Cisco Talos |
12.7.20 | Microsoft Patch Tuesday for June 2020 — Snort rules and prominent vulnerabilities | Vulnerebility blog | Cisco Talos |
12.7.20 | Vulnerability Spotlight: Multiple vulnerabilities in Siemens LOGO! PLC | Vulnerebility blog | Cisco Talos |
12.7.20 | Vulnerability Spotlight: Two vulnerabilities in Zoom could lead to code execution | Vulnerebility blog | Cisco Talos |
12.7.20 | Vulnerability Spotlight: VMware Workstation 15 denial-of-service vulnerability | Vulnerebility blog | Cisco Talos |
12.7.20 | How to unc0ver a 0-day in 4 hours or less | Exploit blog | Project Zero |
12.7.20 | FF Sandbox Escape (CVE-2020-12388) | Exploit blog | Project Zero |
12.7.20 | A survey of recent iOS kernel exploits | Exploit blog | Project Zero |
12.7.20 | VALAK: MORE THAN MEETS THE EYE | Malware blog | Cybereason |
12.7.20 | LOVE YOUR ENEMIES BEFORE YOU DESTROY THEM — HACKING FOR GOOD | Hacking blog | Cybereason |
12.7.20 | Turing in His Grave: What Human CAPTCHA Solvers Reveal About Control Design | Security blog | FireEye |
12.7.20 | As Healthcare Industry Transforms Overnight, Tech Community Must Act | Cyber blog | FireEye |
12.7.20 | Fraudulent Unemployment Claims Signal Consumers to Step Up Personal Identity Protection | Incident blog | FireEye |
12.7.20 | Bringing VandaTheGod down to Earth: Exposing the person behind a 7-year hacktivism campaign | Hacking blog | Checkpoint |
12.7.20 | Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta | Security blog | Cisco Talos |
12.7.20 | People know reusing passwords is risky – then do it anyway | Security blog | Eset |
12.7.20 | Critical Android flaw lets attackers hijack almost any app, steal data | OS Blog | Eset |
12.7.20 | Crooks threaten to leak customer data stolen from e‑commerce sites | Incident blog | Eset |
12.7.20 | From Agent.BTZ to ComRAT v4: A ten‑year journey | Malware blog | Eset |
12.7.20 | Two years later, has GDPR fulfilled its promise? | Security blog | Eset |
12.7.20 | Zoom fixes zero-day RCE bug affecting Windows 7, more updates soon | Vulnerebility | Bleepingcomputer |
12.7.20 | TrickBot malware mistakenly warns victims that they are infected | Virus | Bleepingcomputer |
12.7.20 | How to enable Windows 10's hidden features using Mach2 | OS | Bleepingcomputer |
12.7.20 | Apple: Closing MacBooks with camera covers leads to display damage | Apple | Bleepingcomputer |
12.7.20 | Microsoft will not support PHP 8.0 for Windows in 'any capacity' | Security | Bleepingcomputer |
12.7.20 | How to protect your Verizon number from SIM swapping attacks | Attack Mobil | Bleepingcomputer |
12.7.20 | Uber Eats outage in multiple countries, 'Internal Server Error" reports | Security | Bleepingcomputer |
12.7.20 | eToro accounts peddled by the thousands on cybercrime forums | CyberCrime | Bleepingcomputer |
12.7.20 | US Secret Service creates new Cyber Fraud Task Force | BigBrothers | Bleepingcomputer |
12.7.20 | Mozilla reduces TLS certificate lifespan to 1 year in September | Crypto | Bleepingcomputer |
12.7.20 | Over 1,300 phishing kits for sale on hacker forum | Phishing | Bleepingcomputer |
12.7.20 | How to import and backup saved passwords in Google Chrome | Safety | Bleepingcomputer |
12.7.20 | Conti ransomware shows signs of being Ryuk's successor | Ransomware | Bleepingcomputer |
12.7.20 | Google will ban ads for stalkerware starting August 11 | Hacking | Bleepingcomputer |
12.7.20 | Microsoft testing new Windows 10 KDP anti-malware protection | OS | Bleepingcomputer |
12.7.20 | Persuasive Office 365 phishing uses fake Zoom suspension alerts | Phishing | Bleepingcomputer |
12.7.20 | Evilnum hackers use the same malware supplier as FIN6, Cobalt | Hacking | Bleepingcomputer |
12.7.20 | Joker Android malware keeps evading Google Play Store defenses | Android | Bleepingcomputer |
12.7.20 | Over 15 billion credentials in circulation on hacker forums | Hacking | Bleepingcomputer |
12.7.20 | Palo Alto Networks fixes another severe flaw in PAN-OS devices | Vulnerebility | Bleepingcomputer |
12.7.20 | Microsoft warns of Office 365 phishing via malicious OAuth apps | Phishing | Bleepingcomputer |
12.7.20 | First look: Microsoft's Project Freta detects Linux malware for free | Virus | Bleepingcomputer |
12.7.20 | NVIDIA fixes code execution bug in GeForce Experience software | Vulnerebility | Bleepingcomputer |
12.7.20 | Microsoft fixes Word, Skype hangs in July Office 2020 updates | OS | Bleepingcomputer |
12.7.20 | Risky blogspot.in domain for sale after Google fails to renew it | Security | Bleepingcomputer |
12.7.20 | DOJ indict Fxmsp hacker for selling access to hacked orgs, AV firms | BigBrothers | Bleepingcomputer |
12.7.20 | ThiefQuest info-stealing Mac wiper gets free decryptor | Apple | Bleepingcomputer |
12.7.20 | Mitigating critical F5 BIG-IP RCE flaw not enough, bypass found | Vulnerebility | Bleepingcomputer |
12.7.20 | How to uninstall Microsoft Edge forced-installed via Windows Update | OS | Bleepingcomputer |
12.7.20 | Microsoft takes down domains used in COVID-19-related cybercrime | CyberCrime | Bleepingcomputer |
12.7.20 | Windows 10: The beginning of the end for Control Panel | OS | Bleepingcomputer |
12.7.20 | US Treasury shares tips on spotting money mule and imposter scams | Spam | Bleepingcomputer |
12.7.20 | First reported Russian BEC scam gang targets Fortune 500 firms | Spam | Bleepingcomputer |
12.7.20 | Citrix fixes 11 flaws in ADC, Gateway, and SD-WAN WANOP appliances | Vulnerebility | Bleepingcomputer |
12.7.20 | Microsoft Defender ATP web content filtering is now free | Safety | Bleepingcomputer |
12.7.20 | EDP energy giant confirms Ragnar Locker ransomware attack | Ransomware | Bleepingcomputer |
12.7.20 | Ransomware attack on insurance MSP Xchanging affects clients | Ransomware | Bleepingcomputer |
12.7.20 | New Google Chrome feature to drastically reduce battery usage | Security | Bleepingcomputer |
12.7.20 | Microsoft's new Windows 10 Alt+Tab plan looks like a mess | OS | Bleepingcomputer |
12.7.20 | Windows 10 2004 upgrades blocked by useless "What needs your attention" alerts | OS | Bleepingcomputer |
12.7.20 | North Korean hackers linked to credit card stealing attacks on US stores | BigBrothers | Bleepingcomputer |
12.7.20 | PoC exploits released for F5 BIG-IP vulnerabilities, patch now! | Exploit | Bleepingcomputer |
12.7.20 | Windows 10's Microsoft Store Codecs patches are confusing users | OS | Bleepingcomputer |
12.7.20 | .NET Core vulnerability lets attackers evade malware detection | Attack | Bleepingcomputer |
12.7.20 | New Behave! extension warns of website port scans, local attacks | Attack | Bleepingcomputer |
12.7.20 | Companies start reporting ransomware attacks as data breaches | Ransomware | Bleepingcomputer |
12.7.20 | Try2Cry ransomware tries to worm its way to other Windows systems | Ransomware | Bleepingcomputer |
12.7.20 | US Cyber Command urges F5 customers to patch critical BIG-IP flaw | Vulnerebility | Bleepingcomputer |
12.7.20 | Avaddon ransomware shows that Excel 4.0 macros are still effective | Ransomware | Bleepingcomputer |
12.7.20 | Windows 10 2004 breaks OneDrive connectivity for some users | OS | Bleepingcomputer |
12.7.20 | Microsoft Defender ATP now helps secure network devices | Safety | Bleepingcomputer |
12.7.20 | Malwarebytes AdwCleaner now removes malware from the command line | Virus | Bleepingcomputer |
12.7.20 | Surge of MongoDB ransom attacks use GDPR as extortion leverage | Ransomware | Bleepingcomputer |
12.7.20 | Windows 10 background image tool can be abused to download malware | OS | Bleepingcomputer |
12.7.20 | NSA releases guidance on securing IPsec Virtual Private Networks | BigBrothers | Bleepingcomputer |
12.7.20 | Microsoft shares Windows 10 2004 workaround for Storage Spaces issue | OS | Bleepingcomputer |
12.7.20 | Researchers link APT15 hackers to Chinese military company | APT | Bleepingcomputer |
12.7.20 | Hundreds arrested after encrypted messaging network takeover | Crypto | Bleepingcomputer |
12.7.20 | GoldenSpy backdoor installed by tax software gets remotely removed | Virus | Bleepingcomputer |
12.7.20 | Microsoft unveils new Windows 10 Start Menu with theme-aware tiles | OS | Bleepingcomputer |
12.7.20 | Federal Reserve shares tips on mitigating synthetic identity fraud | CyberCrime | Bleepingcomputer |
12.7.20 | TrickBot malware now checks screen resolution to evade analysis | Virus | Bleepingcomputer |
12.7.20 | Windows POS malware uses DNS to smuggle stolen credit cards | Virus | Bleepingcomputer |
12.7.20 | US Govt shares tips on defending against cyberattacks via Tor | BigBrothers | Bleepingcomputer |
12.7.20 | Windows 10 PowerToys 0.19 released in huge stability bug fix | OS | Bleepingcomputer |
12.7.20 | Dozens of US news sites hacked in WastedLocker ransomware attacks | Ransomware | Bleepingcomputer |
12.7.20 | Mozilla rolls out emergency Firefox update to fix search issues | Vulnerebility | Bleepingcomputer |
12.7.20 | Microsoft lifts Windows 10 2004 update block on Surface devices | OS | Bleepingcomputer |
12.7.20 | | Exploit | SANS |
12.7.20 | Yevgeniy Nikulin, Russian hacker behind Dropbox and LinkedIn hacks found guilty | Crime | Securityaffairs |
12.7.20 | Exclusive: Any Chingari App (Indian TikTok Clone) Account Can Be Hacked Easily | Social | Thehackernews |
11.7.20 | SpartCrypt Decryptor | Anti-Ramson Tool | Anti-Ramson Tool |
11.7.20 | Facebook Offering Big Rewards for Vulnerabilities in Hermes, Spark AR | Social | Securityweek |
11.7.20 | Google Updates Policies to Reject Ads for Spyware | Virus | Securityweek |
11.7.20 | Zoom Working on Patch for Code Execution Vulnerability in Windows Client | Vulnerebility | Securityweek |
11.7.20 | Hackers are scanning the web for vulnerable Citrix systems | Vulnerebility | Securityaffairs |
11.7.20 | Evilnum Group targets European and British fintech companies | Hacking | Securityaffairs |
11.7.20 | Juniper Networks addressed many issues in its products | Vulnerebility | Securityaffairs |
11.7.20 | Report: Most Popular Home Routers Have ‘Critical’ Flaws | Vulnerebility | Threatpost |
11.7.20 | Popular TP-Link Family of Kasa Security Cams Vulnerable to Attack | Vulnerebility | Threatpost |
11.7.20 | Google Bans Stalkerware Ads – With a Loophole | Security | Threatpost |
11.7.20 | Smartwatch Hack Could Trick Dementia Patients into Overdosing | Hacking | Threatpost |
10.7.20 | Researchers found allegedly intentional backdoors in FTTH devices from Chinese vendor C-Data | Virus | Securityaffairs |
10.7.20 | KingComposer fixes a reflected XSS impacting 100,000 WordPress sites | Vulnerebility | Securityaffairs |
10.7.20 | Pre-Installed malware spotted on other Android phones sold in US | Android | Securityaffairs |
10.7.20 | Juniper Networks Patches Critical Vulnerabilities in Firewalls | Vulnerebility | Securityweek |
10.7.20 | Evilnum Group Targets Fintech Companies in Europe | Hacking | Securityweek |
10.7.20 | UK, Australia Investigate Clearview Facial Recognition Firm | BigBrothers | Securityweek |
10.7.20 | | Vulnerebility | Net-security |
10.7.20 | Zoom Zero-Day Allows RCE, Patch on the Way | Vulnerebility | Threatpost |
10.7.20 | Joker Android Malware Dupes Its Way Back Onto Google Play | Android | Threatpost |
10.7.20 | BlueLeaks Server Seized By German Police: Report | BigBrothers | Threatpost |
10.7.20 | Microsoft Warns on OAuth Attacks Against Cloud App Users | Attack | Threatpost |
10.7.20 | ‘Undeletable’ Malware Shows Up in Yet Another Android Device | Android | Threatpost |
10.7.20 | Zoom is working on a patch for a zero-day in Windows client | Vulnerebility | Securityaffairs |
10.7.20 | Joker malware apps bypassed Google’s Play Store security checks | Android | Securityaffairs |
10.7.20 | 15 billion credentials available in the cybercrime marketplaces | CyberCrime | Securityaffairs |
10.7.20 | Palo Alto Networks addresses another high severity issue in PAN-OS devices | Vulnerebility | Securityaffairs |
10.7.20 | Google Tsunami vulnerability scanner is now open-source | Vulnerebility | Securityaffairs |
10.7.20 | Vulnerabilities in Popular Open Source Management Tool Expose Hospitals to Attacks | Vulnerebility | Securityweek |
10.7.20 | Honeywell Sees Rise in USB-Borne Malware That Can Cause Major ICS Disruption | ICS Virus | Securityweek |
10.7.20 | Researchers Find Pre-Installed Malware on More Android Phones in U.S. | Android | Securityweek |
10.7.20 | Germany Seizes Server Hosting Pilfered U.S. Police Files | BigBrothers | Securityweek |
10.7.20 | Microsoft Adds New Data Corruption Preventions to Windows | Safety | Securityweek |
10.7.20 | Powerful Conti Ransomware Emerges | Ransomware | Securityweek |
10.7.20 | Cyberattack Simulation Company XM Cyber Raises $17 Million | IT | Securityweek |
10.7.20 | Joker Malware Apps Once Again Bypass Google's Security to Spread via Play Store | Android | Thehackernews |
10.7.20 | | Spam | SANS |
10.7.20 | | Vulnerebility | Net-security |
10.7.20 | | Security | Net-security |
10.7.20 | | Security | Net-security |
10.7.20 | | Security | Net-security |
10.7.20 | | Vulnerebility | Net-security |
10.7.20 | | Cyber | Net-security |
9.7.20 | Notorious Hacker ‘Fxmsp’ Outed After Widespread Access-Dealing | Hacking | Threatpost |
9.7.20 | Microsoft Seizes Malicious Domains Used in Mass Office 365 Attacks | Virus | Threatpost |
9.7.20 | 15 Billion Credentials Currently Up for Grabs on Hacker Forums | Hacking | Threatpost |
9.7.20 | Advertising Plugin for WordPress Threatens Full Site Takeovers | Security | Threatpost |
9.7.20 | DOJ indicts Fxmsp hacker for selling access to hacked businesses | BigBrothers | Securityaffairs |
9.7.20 | Google Patches Critical Android Vulnerabilities With July 2020 Updates | Android | Securityweek |
9.7.20 | Over 5 Billion Unique Credentials Offered on Cybercrime Marketplaces | CyberCrime | Securityweek |
9.7.20 | Huawei Urges UK Not to Rush Into 5G Decision | BigBrothers | Securityweek |
9.7.20 | F5 BIG-IP contains multiple vulnerabilities including unauthenticated remote command execution | Alert | Alert |
9.7.20 | | Cyber | Net-security |
9.7.20 | | Security | Net-security |
9.7.20 | | Security | Net-security |
9.7.20 | | Security | Net-security |
9.7.20 | | IT | Net-security |
8.7.20 | Redirect auction | Hacking | Securelist |
8.7.20 | Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw | Vulnerebility | Securityaffairs |
8.7.20 | Magecart Group Hits 570 Websites in Three Years | CyberCrime | Securityweek |
8.7.20 | Russian BEC Ring Targets Many Multinational Organizations | BigBrothers | Securityweek |
8.7.20 | Free Tool Enables Recovery of Files Encrypted by ThiefQuest Mac Malware | Apple | Securityweek |
8.7.20 | Federal Judge Upholds Maine's Strict Internet Privacy Law | Privacy | Securityweek |
8.7.20 | Hackers Find Way to Bypass Mitigation for Exploited BIG-IP Vulnerability | Vulnerebility | Securityweek |
8.7.20 | | CyberCrime | Net-security |
8.7.20 | Credit-Card Skimmer Has Unlikely Target: Microsoft ASP.NET Sites | CyberCrime | Threatpost |
8.7.20 | Citrix Bugs Allow Unauthenticated Code Injection, Data Theft | Vulnerebility | Threatpost |
8.7.20 | Cerberus Banking Trojan Unleashed on Google Play | Android | Threatpost |
8.7.20 | Keeper Threat Group Rakes in $7M from Hundreds of Compromised E-Commerce Sites | Hacking | Threatpost |
8.7.20 | BEC Hotshot with Opulent Social Media Presence to Face U.S. Charges | Spam | Threatpost |
8.7.20 | First-Ever Russian BEC Gang, Cosmic Lynx, Uncovered | Spam | Threatpost |
8.7.20 | Malicious app in Google Play used to deliver Cerberus Banking Trojan | Android | Securityaffairs |
8.7.20 | SentinelOne released free decryptor for ThiefQuest ransomware | Ransomware | Securityaffairs |
8.7.20 | New release of Lampion trojan spreads in Portugal with some improvements on the VBS downloader | Virus | Securityaffairs |
8.7.20 | Project Freta, a free service that allows finding malware in OS memory snapshots | Security | Securityaffairs |
8.7.20 | Cerberus Banking Trojan Delivered via App Hosted on Google Play | Android | Securityweek |
8.7.20 | Feds Unseal 2018 Indictment Charging Kazakh Man in Hacks | BigBrothers | Securityweek |
8.7.20 | Citrix Patches 11 Vulnerabilities in Networking Products | Vulnerebility | Securityweek |
8.7.20 | Microsoft Files Lawsuit to Seize Fake Domains Used in COVID-19-Themed BEC Attacks | Spam | Securityweek |
8.7.20 | Citrix Issues Critical Patches for 11 New Flaws Affecting Multiple Products | Vulnerebility | Thehackernews |
8.7.20 | | Attack | Net-security |
8.7.20 | | Virus | SANS |
8.7.20 | | Security | Net-security |
8.7.20 | | Security | Net-security |
8.7.20 | | Attack | Net-security |
8.7.20 | | Privacy | Net-security |
7.7.20 | Authors of Purple Fox EK adds 2 Microsoft exploits | Exploit | Securityaffairs |
7.7.20 | EDP Renewables North America Discloses Data Breach | Safety | Securityweek |
7.7.20 | Purple Fox Exploit Kit Targets Vulnerabilities Linked to DarkHotel Group | Exploit | Securityweek |
7.7.20 | Free Microsoft Service Looks at OS Memory Snapshots to Find Malware | Security | Securityweek |
7.7.20 | Britain Set to Axe Huawei 5G Involvement: Report | BigBrothers | Securityweek |
7.7.20 | Nigerian Instagram Star Extradited to U.S. Over Role in Cybercrime Schemes | Crime | Securityweek |
7.7.20 | BIG-IP Vulnerability Exploited to Deliver DDoS Malware | Exploit Virus Vulnerebility | Securityweek |
7.7.20 | China Urges 'Fair' Treatment After France Restricts Huawei | BigBrothers | Securityweek |
7.7.20 | Microsoft Launches Free Linux Forensics and Rootkit Malware Detection Service | Security | Thehackernews |
7.7.20 | RedRum Decryptor | Anti-Ramson Tool | Anti-Ramson Tool |
7.7.20 | | Attack | Threatpost |
7.7.20 | | Exploit | Threatpost |
7.7.20 | | APT | Threatpost |
7.7.20 | | Android | Threatpost |
7.7.20 | Ransomware infected systems at Xchanging, a DXC subsidiary | Ransomware | Securityaffairs |
7.7.20 | Unsecured Chinese companies leak users’ sensitive personal and business data | BigBrothers | Securityaffairs |
7.7.20 | Former Yahoo! employee who accessed 6K accounts avoids jail | Crime | Securityaffairs |
7.7.20 | Facebook, Others, Block Govt Requests on Hong Kong User Data | Social | Securityweek |
7.7.20 | Try2Cry Ransomware Spreads via USB Drives | Ransomware | Securityweek |
7.7.20 | | Exploit Vulnerebility | SANS |
7.7.20 | | Cyber | Net-security |
7.7.20 | | Security | Net-security |
7.7.20 | | Security | Net-security |
7.7.20 | | Virus | Net-security |
7.7.20 | | Security | Net-security |
6.7.20 | North Korean Lazarus APT stole credit card data from US and EU stores | APT | Securityaffairs |
6.7.20 | Threat actors are attempting to exploit recently fixed F5 BIG-IP flaw | Exploit | Securityaffairs |
6.7.20 | Former Yahoo! Employee Avoids Jail After Hacking User Accounts | Crime | Securityweek |
6.7.20 | NSA Publishes Recommendations on Securing IPsec VPNs | BigBrothers | Securityweek |
6.7.20 | Magecart Attacks on Claire's and Other U.S. Stores Linked to North Korea | BigBrothers | Securityweek |
6.7.20 | Nigerian Man Charged With Cyber Fraud Against US Companies | Crime | Securityweek |
6.7.20 | Cato MDR: Managed Threat Detection and Response Made Easy | Safety | Thehackernews |
6.7.20 | Pig in a poke: smartphone adware | Android | Securelist |
6.7.20 | Hackers Start Exploiting Recently Patched BIG-IP Vulnerability | Exploit Vulnerebility | Securityweek |
6.7.20 | Huawei Not Totally Banned From France, Says Watchdog: Report | BigBrothers | Securityweek |
6.7.20 | | Vulnerebility | SANS |
6.7.20 | | Security | Net-security |
6.7.20 | | Cyber | Net-security |
6.7.20 | | Cyber | Net-security |
6.7.20 | | Security | Net-security |
5.7.20 | Critical RCE Flaw (CVSS 10) Affects F5 BIG-IP Application Security Servers | Vulnerebility | Thehackernews |
5.7.20 | US Cyber Command urges F5 customers to fix critical flaw in BIG-IP product | BigBrothers Vulnerebility | Securityaffairs |
5.7.20 | European police infiltrate and dismantled EncroChat chat network | CyberCrime | Securityaffairs |
5.7.20 | Try2Cry ransomware implements wormable capability to infect other Windows systems | Ransomware | Securityaffairs |
4.7.20 | Police Arrested Hundreds of Criminals After Hacking Into Encrypted Chat Network | CyberCrime | Thehackernews |
4.7.20 | Critical Apache Guacamole Flaws Put Remote Desktops at Risk of Hacking | Vulnerebility | Thehackernews |
4.7.20 | Microsoft Releases Urgent Windows Update to Patch Two Critical Flaws | Vulnerebility | Thehackernews |
4.7.20 | A New Ransomware Targeting Apple macOS Users Through Pirated Apps | Ransomware | Thehackernews |
4.7.20 | US Senate Panel OKs Online Child Protection Bill Amid Privacy Fears | BigBrothers Privacy | Securityweek |
4.7.20 | Cyberattacks Possibly Involved in Explosions at Iranian Nuclear, Military Facilities | BigBrothers | Securityweek |
4.7.20 | Apache Guacamole Vulnerabilities Facilitate Attacks on Enterprises | Vulnerebility | Securityweek |
4.7.20 | ICS-Targeting Snake Ransomware Isolates Infected Systems Before Encryption | Ransomware | Securityweek |
4.7.20 | CISA Warns Enterprises of Risks Associated With Tor | Safety | Securityweek |
4.7.20 | Cisco Discloses Details of Chrome, Firefox Vulnerabilities | Vulnerebility | Securityweek |
4.7.20 | Alleged cyber attacks caused fire and explosions at nuclear and military facilities in Iran | Attack | Securityaffairs |
4.7.20 | Hackers are targeting unsecured MongoDB database | Hacking | Securityaffairs |
4.7.20 | Sodinokibi Ransomware Operators hit electrical energy company Light S.A. | Ransomware | Securityaffairs |
4.7.20 | Maze Ransomware operators hacked Highways Authority Of India (Nhai) | Ransomware | Securityaffairs |
4.7.20 | Cisco addresses flaws in Small Business Routers and Switches | Vulnerebility | Securityaffairs |
4.7.20 | Critical Apache Guacamole flaws expose organizations at risk of hack | Vulnerebility | Securityaffairs |
4.7.20 | Netgear is releasing fixes for ten issues affecting 79 products | Vulnerebility | Securityaffairs |
4.7.20 | The U.S. FCC considers Huawei and ZTE as national security threats | BigBrothers | Securityaffairs |
4.7.20 | New EvilQuest ransomware targets macOS users | Ransomware | Securityaffairs |
4.7.20 | Microsoft releases emergency security updates to fix Windows codecs | Vulnerebility | Securityaffairs |
4.7.20 | Maze Ransomware operators hacked the Xerox Corporation | Ransomware | Securityaffairs |
4.7.20 | Morocco Asks Amnesty for Proof It Used Spyware on Journalist | Virus | Securityweek |
4.7.20 | Enterprises in Americas, Europe Targeted With Valak Information Stealer | Virus | Securityweek |
4.7.20 | Ransomware Operators Demand $14 Million From Power Company | Ransomware | Securityweek |
4.7.20 | Serious Vulnerabilities in F5's BIG-IP Allow Full System Compromise | Vulnerebility | Securityweek |
4.7.20 | Chinese Hackers Target Uyghurs With Multiple Android Surveillance Tools | Android BigBrothers | Securityweek |
4.7.20 | Cisco Patches Vulnerabilities in Small Business Routers, Switches | Vulnerebility | Securityweek |
4.7.20 | European Police Shut Criminal Phone Network Used to Plan Murders | CyberCrime | Securityweek |
4.7.20 | ThiefQuest Mac Malware Includes Ransomware, Data Theft Capabilities | Ransomware | Securityweek |
4.7.20 | Zoom Got Big Fast. Then Videobombers Made It Rework Security | Security | Securityweek |
6.20 | Advanced StrongPity Hackers Target Syria and Turkey with Retooled Spyware | BigBrothers | Thehackernews |
6.20 | Russian Hacker Gets 9-Year Jail for Running Online Shop of Stolen Credit Cards | CyberCrime | Thehackernews |
6.20 | e-Commerce Site Hackers Now Hiding Credit Card Stealer Inside Image Metadata | CyberCrime | Thehackernews |
6.20 | 'Satori' IoT DDoS Botnet Operator Sentenced to 13 Months in Prison | BotNet Crime | Thehackernews |
6.20 | WikiLeaks Founder Charged With Conspiring With LulzSec & Anonymous Hackers | Hacking | Thehackernews |
6.20 | Docker Images Containing Cryptojacking Malware Distributed via Docker Hub | Cryptocurrency | Thehackernews |
6.20 | Critical Bugs and Backdoor Found in GeoVision's Fingerprint and Card Scanners | Vulnerebility | Thehackernews |
6.20 | New Privacy Features Added to the Upcoming Apple iOS 14 and macOS Big Sur | Apple | Thehackernews |
6.20 | Hackers Using Google Analytics to Bypass Web Security and Steal Credit Cards | Hacking | Thehackernews |
6.20 | Hackers Leaked 269 GB of U.S. Police and Fusion Centers Data Online | BigBrothers Incindent | Thehackernews |
6.20 | Over 100 New Chrome Browser Extensions Caught Spying On Users | Virus | Thehackernews |
6.20 | InvisiMole Hackers Target High-Profile Military and Diplomatic Entities | BigBrothers | Thehackernews |
6.20 | Hackers Target Military and Aerospace Staff by Posing as HRs Offering Jobs | BigBrothers | Thehackernews |
6.20 | New Ripple20 Flaws Put Billions of Internet-Connected Devices at Risk of Hacking | Vulnerebility | Thehackernews |
6.20 | Oracle E-Business Suite Flaws Let Hackers Hijack Business Operations | Vulnerebility | Thehackernews |
6.20 | New Mobile Internet Protocol Vulnerabilities Let Hackers Target 4G/5G Users | Mobil | Thehackernews |
6.20 | Spies Can Listen to Your Conversations by Watching a Light Bulb in the Room | BigBrothers | Thehackernews |
6.20 | A Bug in Facebook Messenger for Windows Could've Helped Malware Gain Persistence | Social | Thehackernews |
6.20 | Intel CPUs Vulnerable to New 'SGAxe' and 'CrossTalk' Side-Channel Attacks | Attack | Thehackernews |
6.20 | Indian IT Company Was Hired to Hack Politicians, Investors, Journalists Worldwide | Hacking | Thehackernews |
6.20 | SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol | Attack | Thehackernews |
6.20 | Microsoft Releases June 2020 Security Patches For 129 Vulnerabilities | Vulnerebility | Thehackernews |
6.20 | Magecart Targets Emergency Services-related Sites via Insecure S3 Buckets | CyberCrime | Thehackernews |
6.20 | Any Indian DigiLocker Account Could've Been Accessed Without Password | Hacking | Thehackernews |
6.20 | New USBCulprit Espionage Tool Steals Data From Air-Gapped Computers | Attack | Thehackernews |
6.20 | Two Critical Flaws in Zoom Could've Let Attackers Hack Systems via Chat | Vulnerebility | Thehackernews |
6.20 | Newly Patched SAP ASE Flaws Could Let Attackers Hack Database Servers | Vulnerebility | Thehackernews |
6.20 | Critical VMware Cloud Director Flaw Lets Hackers Take Over Corporate Servers | Vulnerebility | Thehackernews |
6.20 | How to Create a Culture of Kick-Ass DevSecOps Engineers | IT | Thehackernews |
6.20 | Joomla Resources Directory (JRD) Portal Suffers Data Breach | Incindent | Thehackernews |
6.20 | Critical 'Sign in with Apple' Bug Could Have Let Attackers Hijack Anyone's Account | Hacking | Thehackernews |
6.20 | New Noise-Resilient Attack On Intel and AMD CPUs Makes Flush-based Attacks Effective | Attack | Thehackernews |
6.20 | Exclusive – Any Mitron (Viral TikTok Clone) Profile Can Be Hacked in Seconds | Hacking | Thehackernews |
6.20 | Magnitude exploit kit – evolution | Exploit | Securelist |
6.20 | Oh, what a boot-iful mornin’ | Virus | Securelist |
6.20 | Web skimming with Google Analytics | CyberCrime | Securelist |
6.20 | Microcin is here | APT | Securelist |
6.20 | Do cybercriminals play cyber games during quarantine? | CyberCrime | Securelist |
6.20 | Explicit content and cyberthreats: 2019 report | Cyber | Securelist |
6.20 | Looking at Big Threats Using Code Similarity. Part 1 | Security | Securelist |
6.20 | Cycldek: Bridging the (air) gap | APT Attack | Securelist |
6.20 | Kids on the Web in 2020 | Safety | Securelist |