2020 - January  February  March  April  May  June  July  August  September  October  November  December


Date

Name

Category

Web

30.7.20

Bug in widely used bootloader opens Windows, Linux devices to persistent compromise

 

Net-security

30.7.20

The average total cost of a data breach declined, but costs increased for many organizations

 

Net-security

30.7.20

Delivering and maintaining security at the speed of digital transformation

 

Net-security

30.7.20

Things to consider when selecting enterprise SSDs for critical workloads

 

Net-security

30.7.20

Most consumers believe government regulation should help address privacy risks

 

Net-security

30.7.20

Businesses are preparing for a cloud-based approach to applications

 

Net-security

29.7.20

APT trends report Q2 2020APTSecurelist

29.7.20

Doki, an undetectable Linux backdoor targets Docker ServersVirusSecurityaffairs

29.7.20

AWS Fraud Detection Service Becomes Generally AvailableSecurity

Securityweek

29.7.20

Vatican Allegedly Hacked by China Ahead of Key TalksHackingSecurityweek

29.7.20

Video Creation Service Promo.com Discloses Data BreachIncindent

Securityweek

29.7.20

US Officials: Russia Behind Spread of Virus DisinformationBigBrothersSecurityweek

29.7.20

North Korean Hackers Operate VHD Ransomware, Kaspersky SaysRansomware

Securityweek

29.7.20

Cybersecurity Training Company RangeForce Raises $16 MillionITSecurityweek

29.7.20

ZDI Announces Rules, Prizes for Pwn2Own Tokyo 2020CongressSecurityweek

29.7.20

Industrial VPN Flaws Could Let Attackers Target Critical InfrastructuresVulnerebilityThehackernews

29.7.20

OkCupid Dating App Flaws Could've Let Hackers Read Your Private MessagesMobilThehackernews

29.7.20

Researchers Warn of High-Severity Dell PowerEdge Server Flaw

Vulnerebility

Threatpost

29.7.20

Lazarus Group Brings APT Tactics to Ransomware

APT

Threatpost

29.7.20

North Korea-Linked Lazarus APT is behind the VHD ransomware

APT

Securityaffairs

29.7.20

ShinyHunters leaked over 386 million user records from 18 companies

Incindent

Securityaffairs

29.7.20

Pirate Ship Sailing to Developing World: Group-IB Uncovers Real Captains of Online Piracy Crew

CyberCrime

Securityaffairs

29.7.20

Nefilim ransomware operators leaked data alleged stolen from the Dussmann group

Ransomware

Securityaffairs

29.7.20

Industrial Systems Can Be Hacked Remotely via VPN Vulnerabilities

ICS

Securityweek

29.7.20

U.S. Election Administrators Failed to Implement Phishing Protections: Study

Phishing

Securityweek

29.7.20

All I want this Tuesday: More Data

Security

SANS

29.7.20

Security teams increasingly stressed due to lack of proper tools, executive support

Security

Net-security

29.7.20

Public cloud environments leave numerous paths open for exploitation

Exploit

Net-security

29.7.20

Assessing the email security controls used by 10,000 U.S. state and local election administrators

Security

Net-security

29.7.20

Building a quantum internet: Fast data exchange, difficult to eavesdrop

Security

Net-security

29.7.20

UCaaS market to reach $24.3 billion by 2026

IT

Net-security

29.7.20

Researchers find critical RCE vulnerabilities in industrial VPN solutions

Vulnerebility

Net-security

28.7.20

Lazarus on the hunt for big gameAPTSecurelist

28.7.20

Hacking IoT & RF Devices with BürtleinaBoardIoT

Securityaffairs

28.7.20

QSnatch malware infected over 62,000 QNAP NAS DevicesVirusSecurityaffairs

28.7.20

FBI warns US companies on the use of Chinese Tax SoftwareBigBrothersSecurityaffairs

28.7.20

Several New Mac Malware Families Attributed to North Korean HackersApple  BigBrothers

Securityweek

28.7.20

Source Code From Major Firms Leaked via Unprotected DevOps InfrastructureIncindentSecurityweek

28.7.20

US, UK Warn of Malware Targeting QNAP NAS DevicesVirus 

Securityweek

28.7.20

Facebook Says EU Antitrust Probe Invades Employee PrivacyBigBrothers  SocialSecurityweek

28.7.20

Undetectable Linux Malware Targeting Docker Servers With Exposed APIsVirusThehackernews

28.7.20

QSnatch Data-Stealing Malware Infected Over 62,000 QNAP NAS DevicesVirusThehackernews

28.7.20

How well do face recognition algorithms identify people wearing masks?

Security

Net-security

28.7.20

62,000 QNAP NAS devices infected with persistent QSnatch malware

Virus

Net-security

28.7.20

Encryption Under ‘Full-Frontal Nuclear Assault’ By U.S. Bills

BigBrothers  Crypto

Threatpost

28.7.20

Attackers Exploiting High-Severity Network Security Flaw, Cisco Warns

Exploit  Vulnerebility

Threatpost

28.7.20

Microsoft Revamps Windows Insider Preview Bug Bounty Program

OS

Threatpost

28.7.20

Garmin says many of the systems are returning to operation

Ransomware

Securityaffairs

28.7.20

Source code of Cerberus Android Trojan offered for sale for $100,000

Android

Securityaffairs

28.7.20

FBI warns cyber actors abusing protocols as new DDoS attack vectors

BigBrothers

Securityaffairs

28.7.20

Hacker Replaced Emotet Payloads With GIF Images

Virus

Securityweek

28.7.20

Garmin Says Systems Back Online After Cyber Attack

Ransomware

Securityweek

28.7.20

Bluetooth-Enabled 'Mooltipass' Hardware Password Manager Unveiled

Security

Securityweek

28.7.20

Digital Banking Service Dave Says Data Stolen in Third-Party Breach

Incindent

Securityweek

28.7.20

AA20-209A : Potential Legacy Risk from Malware Targeting QNAP NAS DevicesCERTCERT

28.7.20

In Memory of Donald Smith

Security

SANS

28.7.20

Review: Cyber Warfare – Truth, Tactics, and Strategies

Cyber

Net-security

28.7.20

The distinction between human and bot behavior is becoming increasingly blurred

Security

Net-security

28.7.20

What is privacy and why does it matter?

Privacy

Net-security

28.7.20

NIST selects algorithms to form a post-quantum cryptography standard

Security

Net-security

28.7.20

75% of cardholders prefer contactless cards to other payment methods

Security

Net-security

27.7.20

Cerberus Android malware source code offered for sale for $100,000

Android

Bleepingcomputer

27.7.20

Source code from dozens of companies leaked online

Incindent

Bleepingcomputer

27.7.20

No More Ransom turns 4: Saves $632 million in ransomware payments

Ransomware

Bleepingcomputer

27.7.20

Dave data breach affects 7.5 million users, leaked on hacker forum

Incindent

Bleepingcomputer

27.7.20

Microsoft's PowerToys 0.20 adds a built-in Windows 10 Color Picker

OS

Bleepingcomputer

27.7.20

Samsung is reportedly building an Exynos CPU for Windows 10 PCs

IT

Bleepingcomputer

27.7.20

FBI Issues Alert on Use of Chinese Tax Software

BigBrothers

Securityweek

27.7.20

Australian Watchdog Accuses Google of Privacy Breaches

BigBrothers

Securityweek

27.7.20

CISA Says Hackers Exploited BIG-IP Vulnerability in Attacks on U.S. Government

BigBrothers

Securityweek

27.7.20

Microsoft Adds Scenario-Based Rewards to Windows Insider Preview Bounty Program

OS

Securityweek

27.7.20

Attackers are exploiting Cisco ASA/FTD flaw in search for sensitive data

Exploit

Net-security

27.7.20

NSA/CISA joint report warns on attacks on critical industrial systems

ICS

Securityaffairs

27.7.20

Shadow attacks allow replacing content in signed PDF files

Attack

Securityaffairs

27.7.20

REMnux 7, a Linux toolkit for malware analysts released

Security

Securityaffairs

27.7.20

Records for 7.5 million users of the digital banking app Dave leaked online

Incindent

Securityaffairs

27.7.20

Analyzing Metasploit ASP .NET Payloads

Exploit

SANS

27.7.20

It’s time to tap the next generation of cyber defenders

Cyber

Net-security

27.7.20

Attackers have created a specialized economy around email account takeover

Attack

Net-security

27.7.20

DeimosC2: Open source tool to manage post-exploitation issues

Exploit

Net-security

27.7.20

Integrated cloud-native security platforms can overcome limitations of traditional security products

Security

Net-security

27.7.20

Data crisis: Companies pivot from disruption to transformation

Security

Net-security

26.7.20

Evolution of Valak, from Its Beginnings to Mass DistributionMalware blog

Palo Alto Unity42

26.7.20

OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its InventoryAPT blog

Palo Alto Unity42

26.7.20Threat Brief: Microsoft DNS Server Wormable Vulnerability CVE-2020-1350Vulnerebility blogPalo Alto Unity42

26.7.20

WHAT IS A VPN, AND HOW CAN IT HELP ENTERPRISES WITH REMOTE WORKERS?Security blog

Cybereason

26.7.20ENSURING DATA PRIVACY: UPDATE ON EU COURT OF JUSTICE RULINGSecurity blog

Cybereason

26.7.20NEED A BOOST? STRETCH YOUR SKILLS WITH THE CYBEREASON SUMMER CTF!Security blogCybereason

26.7.20

Hunting for Blues – the WSL Plan 9 Protocol BSODSecurity blog

Mcafee blog

26.7.20McAfee COVID-19 Report Reveals Pandemic Threat EvolutionCyber blog

Mcafee blog

26.7.20Unique Threats to Operational Technology and Cyber Physical SystemsCyber blogFireEye

26.7.20

Making the Most of a Security IncidentIncident blogF5 Labs
26.7.20Steering a Cyber-Course Through Covid-19’s Troubled WatersCyber blogF5 Labs

26.7.20

CYBER ATTACK TRENDS: 2020 MID-YEAR REPORTAttack blogCheckpoint
26.7.20MMS Exploit Part 2: Effective Fuzzing of the Qmage CodecExploit blogCheckpoint

26.7.20

Prometei botnet and its quest for MoneroBotNet blogCisco Talos
26.7.20Premier League team narrowly avoids losing £1 million to scammersSpam blog

Eset

26.7.20Google adds security enhancements to Gmail, Meet and ChatSecurity blog

Eset

26.7.20

Privacy watchdogs urge videoconferencing services to boost privacy protectionsSecurity blog

Eset

26.7.20Argentine telecom company hit by major ransomware attackRansomware blog

Eset

26.7.207 VPN services leaked data of over 20 million users, says reportIncident blog

Eset

26.7.20

Data breach reports down by one‑third in first half of 2020Incident blogEset

26.7.20

Cracking Maldoc VBA Project PasswordsVirusSANS
26.7.20ndisasm Update 2.15SecuritySANS

26.7.20

New ‘Meow’ attack has deleted almost 4,000 unsecured databasesAttack

Bleepingcomputer

26.7.20Linux-based malware analysis toolkit REMnux 7 releasedSecurity

Bleepingcomputer

26.7.20Microsoft Edge now blocks abusive notifications to reduce web spamOS

Bleepingcomputer

26.7.20

US govt confirms active exploitation of F5 BIG-IP RCE flawExploit

Bleepingcomputer

26.7.20Microsoft working on a fix for Windows 10 Sandbox failing to openOS

Bleepingcomputer

26.7.20Garmin outage caused by confirmed WastedLocker ransomware attackRansomware

Bleepingcomputer

26.7.20

Emotet malware operation hacked to show memes to victimsVirus

Bleepingcomputer

26.7.20Cisco patches ASA/FTD firewall flaw actively exploited by hackersVulnerebility

Bleepingcomputer

26.7.205 severe D-Link router vulnerabilities disclosed, patch nowVulnerebility

Bleepingcomputer

26.7.20UK govt warns of ransomware, BEC attacks against sports sectorRansomware

Bleepingcomputer

26.7.20How to stop Microsoft Edge launching automatically on loginOS

Bleepingcomputer

26.7.20

D-Link addressed 5 flaws on some router models, some of them reached EoL

Vulnerebility

Securityaffairs

26.7.20

US CISA warns of attacks exploiting CVE-2020-5902 flaw in F5 BIG-IP

Attack  Exploit

Securityaffairs
26.7.20

Threat actors are hijacking the infamous Emotet botnet

BotNet  Virus

Securityaffairs

25.7.20

AA20-206A : Threat Actor Exploitation of F5 BIG-IP CVE-2020-5902CERTCERT

25.7.20

Malicious ‘Blur’ Photo App Campaign Discovered on Google Play

Android

Threatpost

25.7.20

NSA Urgently Warns on Industrial Cyberattacks, Triconex Critical Bug

BigBrothers

Threatpost

25.7.20

DJI Drone App Riddled With Privacy Issues, Researchers Allege

Vulnerebility

Threatpost

25.7.20

News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags

Security

Threatpost

25.7.20

Quantum Loop: US Unveils Blueprint for 'Virtually Unhackable' Internet

Security

Securityweek

25.7.20

Garmin Outage Raises Fear of Ransomware Attack

Ransomware

Securityweek

25.7.20

AI Cybersecurity Company CalypsoAI Raises $13 Million

IT

Securityweek

25.7.20

Twitter Says Hackers Accessed Dutch Politician's Inbox

Social

Securityweek
25.7.20

NSA, CISA Urge Critical Infrastructure Operators to Secure OT Assets

BigBrothers

Securityweek

24.7.20

CVE-2020-3452 flaw in Cisco ASA/FTD exploited within hours after the disclosureExploitSecurityaffairs

24.7.20

Spanish state-owned railway infrastructure manager ADIF infected with ransomwareRansomwareSecurityaffairs
24.7.20Twitter revealed that hackers accessed DM Inboxes in July attackSocial

Securityaffairs

24.7.20Chinese Drone Giant DJI Responds to Disclosure of Android App Security IssuesAndroid

Securityweek

24.7.20Website Security Breach Exposes 1 Million DNA ProfilesIncindentSecurityweek
24.7.20Vulnerability in Cisco Firewalls Exploited Shortly After DisclosureVulnerebilitySecurityweek
24.7.20Exposed Twilio SDK Abused for Malvertising AttackAttackSecurityweek

24.7.20

Researchers Reveal New Security Flaw Affecting China's DJI DronesVulnerebilityThehackernews

24.7.20

Smartwatch Maker Garmin Shuts Down Services After Ransomware AttackRansomwareThehackernews

24.7.20

ASUS Home Router Bugs Open Consumers to Snooping Attacks

Attack

Threatpost

24.7.20

Garmin Suffers Reported Ransomware Attack

Ransomware

Threatpost

24.7.20

Cisco, Zoom and Others Must Bolster Security, Say Privacy Chiefs

Privacy

Threatpost

24.7.20

Sharp Spike in Ransomware in U.S. as Pandemic Inspires Attackers

Ransomware

Threatpost

24.7.20

Cisco Network Security Flaw Leaks Sensitive Data

Vulnerebility

Threatpost

24.7.20

Twitter: Hackers Accessed Private Messages for Elite Accounts

Social

Threatpost

24.7.20

Garmin shut down its services after an alleged ransomware attack

Ransomware

Securityaffairs

24.7.20

PoC Released for Critical CVE-2020-1147 flaw, SharePoint servers exposed to hack

Vulnerebility

Securityaffairs

24.7.20

Exposed Twilio SDK Abused for Malvertising Attack

Attack

Securityweek

24.7.20

Risk Assessment Company CyCognito Raises $30 Million

IT

Securityweek

24.7.20

Apple Offers Hackable iPhones to Security Researchers

Apple

Securityweek

24.7.20

Facebook Unveils New Privacy, Security Features for Messenger

Social

Securityweek

24.7.20AA20-205A : NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control SystemsCERTCERT
24.7.20

Compromized Desktop Applications by Web Technologies

Security

SANS

24.7.20

Ransomware recovery: Moving forward without backing up

Ransomware

Net-security

24.7.20

Threat highlight: Analysis of 5+ million unmanaged, IoT, and IoMT devices

IoT

Net-security

24.7.20

The future of work: 74% believe they will emerge stronger

Security

Net-security

24.7.20

27% of consumers hit with pandemic-themed phishing scams

Phishing

Net-security

24.7.20

IT teams failing to deliver a positive remote employee experience

Security

Net-security

23.7.20

Remove unwanted Windows 10 apps with this new open source toolOS

Bleepingcomputer

23.7.20

Twitter hackers read private messages of 36 high-profile accountsSocial

Bleepingcomputer

23.7.20

New cryptojacking botnet uses SMB exploit to spread to Windows systemsCryptocurrency

Bleepingcomputer

23.7.20

Twilio exposes SDK, attackers inject it with malvertising codeVirus

Bleepingcomputer

23.7.20

Lazarus hackers deploy ransomware, steal data using MATA malwareAPT

Bleepingcomputer

23.7.20

Microsoft Outlook crashes, deletes mails for some POP accountsOS

Bleepingcomputer

23.7.20

D-Link blunder: Firmware encryption key exposed in unencrypted imageCrypto

Bleepingcomputer

23.7.20

Critical SharePoint flaw dissected, RCE details now availableVulnerebility

Bleepingcomputer

23.7.20

US offers $2 million for info on Ukrainians charged for SEC hackCrime

Bleepingcomputer

23.7.20

New ‘Meow’ attack has wiped over 1,800 unsecured databasesAttack

Bleepingcomputer

23.7.20

Windows 10 KB4559004 cumulative update fixes File Explorer, LTE issuesOS

Bleepingcomputer

23.7.20

Microsoft 365 adds endpoint data leak protection in public previewOS

Bleepingcomputer

23.7.20

Microsoft Edge gets new features on desktop and mobileOS

Bleepingcomputer

23.7.20

Emotet botnet is now heavily spreading QakBot malwareVirus

Bleepingcomputer

23.7.20

Malwarebytes fixes bug causing Windows 10 2004 performance issuesOS

Bleepingcomputer

23.7.20

US indicts hackers working with China's Ministry of State SecurityBigBrothers

Bleepingcomputer

23.7.20

Outlook affected by one-minute startup delays on Windows 10OS

Bleepingcomputer

23.7.20

DeepSource resets logins after employee falls for Sawfish phishingPhishing

Bleepingcomputer

23.7.20

Adobe Photoshop gets fixes for critical security vulnerabilitiesVulnerebility

Bleepingcomputer

23.7.20

Phishing campaign uses Google Cloud Services to steal Office 365 loginsPhishing

Bleepingcomputer

23.7.20

Lorien Health Services discloses ransomware attack affecting nearly 50,000Ransomware

Bleepingcomputer

23.7.20

Microsoft will disable insecure TLS in Office 365 on Oct 15OS

Bleepingcomputer

23.7.20

Emotet-TrickBot malware duo is back infecting Windows machinesVirus

Bleepingcomputer

23.7.20

Coinbase blocked Twitter hackers from stealing an extra $280KSocial

Bleepingcomputer

23.7.20

Office 365 adds new security configuration analysis featureOS

Bleepingcomputer

23.7.20

Microsoft investigating Windows 10 2004 'No Internet' bug, how to fixOS

Bleepingcomputer

23.7.20

Windows 10 Store 'wsreset' tool lets attackers bypass antivirusOSBleepingcomputer

23.7.20

Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into SDK

Exploit

Net-security

23.7.20

New MATA Multi-platform malware framework linked to NK Lazarus APTAPT

Securityaffairs

23.7.20

Multi-Platform Malware Framework Linked to North Korean HackersAPT

Securityweek

23.7.20

Researchers Disclose New Methods for Replacing Content in Signed PDF FilesVirus

Securityweek

23.7.20

Twitter Says Hackers Accessed DM Inboxes in Recent AttackSocial

Securityweek

23.7.20

Regulators Urge Video Conferencing Companies to Improve Security, PrivacyPrivacy

Securityweek

23.7.20

North Korean Hackers Spotted Using New Multi-Platform Malware FrameworkAPTThehackernews

23.7.20

Leak Exposes Private Data of Genealogy Service Users

Incindent

Threatpost

23.7.20

Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware

Virus

Threatpost

23.7.20

Lazarus Group Surfaces with Advanced Malware Framework

APT

Threatpost

23.7.20

OilRig APT Drills into Malware Innovation with Unique Backdoor

APT

Threatpost

23.7.20

Apple Security Research Device Program Draws Mixed Reactions

Apple

Threatpost

23.7.20

Prometei, a new modular crypto-mining botnet exploits Windows SMB

Cryptocurrency

Securityaffairs

23.7.20

US agencies offer $2M in reward for Ukrainian hackers that breached the SEC

BigBrothers

Securityaffairs

23.7.20

Dozens of unsecured databases wiped by mysterious Meow attack

Attack

Securityaffairs

23.7.20

Open Source Tool Checks SAP Systems for RECON Attack IOCs

Attack

Securityweek

23.7.20

PoC Released for Critical Vulnerability Exposing SharePoint Servers to Attacks

Vulnerebility

Securityweek

23.7.20

US Offers $2mn Bounty for Ukrainian SEC Hackers

Crime

Securityweek

23.7.20

Chinese Threat Actor Uses New MgBot Variant in Attacks on India, Hong Kong

BotNet

Securityweek

23.7.20

Polymer Launches Solution to Avoid Data Leaks via Collaboration Tools

Incindent

Securityweek

23.7.20

Simple Blacklisting with MISP & pfSense

Safety

SANS

23.7.20

REMnux toolkit for malware analysis version 7 released

Virus

Net-security

23.7.20

How do cybercriminals secure cybercrime?

Cyber

Net-security

23.7.20

Closing the skills gap can minimize the business impact of cyberattacks

Cyber

Net-security

23.7.20

Organizations with poor privacy practices 80% more likely to suffer data breach

Incindent

Net-security

23.7.20

Human error: Understand the mistakes that weaken cybersecurity

Cyber

Net-security

23.7.20

Deep Packet Inspection challenges for telecom and security vendors

Security

Net-security

23.7.20

There’s CISSP training, then there’s official CISSP training

Security

Net-security

22.7.20

MATA: Multi-platform targeted malware framework

APT

Securelist
22.7.20Citrix Workspace flaw can allow remote hack of devices running vulnerable appVulnerebilitySecurityaffairs

22.7.20

US DoJ charged two Chinese hackers working with MSS

BigBrothers

Securityaffairs

22.7.20

French Trial Sought for Alleged Russian Bitcoin Criminal

BigBrothers

Securityweek

22.7.20

China Accuses US of 'Slander' Over Coronavirus Research Hacking Claims

BigBrothers

Securityweek

22.7.20

DeepSource Says Hackers Compromised Its GitHub Application

Hacking

Securityweek

22.7.20

Vulnerability Allows Remote Hacking of Devices Running Citrix Workspace App

Vulnerebility

Securityweek

22.7.20

US Charges 2 Chinese Hackers for Targeting COVID-19 Research and Trade Secrets

BigBrothers

Thehackernews

22.7.20

Microsoft releases new encryption, data security enterprise tools

Crypto

Net-security

22.7.20

Chris Vickery: AI Will Drive Tomorrow’s Data Breaches

Incindent

Threatpost

22.7.20

Diebold ATM Terminals Jackpotted Using Machine’s Own Software

Virus

Threatpost

22.7.20

Critical Adobe Photoshop Flaws Patched in Emergency Update

Vulnerebility

Threatpost

22.7.20

Adobe fixed critical code execution flaws in Bridge, Photoshop and Prelude products

Vulnerebility

Securityaffairs

22.7.20

US DoJ charges Chinese hackers for targeting COVID-19 research

BigBrothers

Securityaffairs

22.7.20

U.S. Indicts Two Chinese Nationals for Hacking Hundreds of Organizations

BigBrothers

Securityweek

22.7.20

US Accuses Chinese Hackers in Targeting of COVID-19 Research

BigBrothers

Securityweek

22.7.20

Adobe Patches Critical Code Execution Flaws in Bridge, Photoshop, Prelude

Vulnerebility

Securityweek

22.7.20

New Security Capabilities Announced for Microsoft 365, Azure

Security

Securityweek

22.7.20

Chinese Hackers Escalate Attacks Against India and Hong Kong Amid Tensions

BigBrothers

Thehackernews

22.7.20

A few IoCs related to CVE-2020-5092

Vulnerebility

SANS

22.7.20

How do I select a DMARC solution for my business?

Spam

Net-security

22.7.20

Cybersecurity teams are struggling with a lack of visibility into key security controls

Cyber

Net-security

22.7.20

Researchers develop new learning algorithm to boost AI efficiency

Security

Net-security

22.7.20

20,000+ new vulnerability reports predicted for 2020, shattering previous records

Vulnerebility

Net-security

22.7.20

Emerging risk trends: Top risks to identify and address

Security

Net-security

21.7.20

Couple of interesting Covid-19 related stats

Security

SANS

21.7.20

Details and PoC for critical SharePoint RCE flaw released

Vulnerebility

Net-security

21.7.20

GReAT thoughts: Awesome IDA Pro plugins

Virus

Securelist

21.7.20

Phishing campaign aimed at stealing Office 365 logins abuses Google Cloud Services

Phishing

Securityaffairs

21.7.20

7 VPN services left data of millions of users exposed online

Incindent

Securityaffairs

21.7.20

Cloud computing provider Blackbaud paid a ransom after data breach

Incindent

Securityaffairs

21.7.20

BadPower attack could burn your device through fast charging

Attack

Securityaffairs

21.7.20

Microsoft to Retire TLS 1.0/1.1 in Office 365 Starting October 15

Crypto

Securityweek

21.7.20

Fortinet Acquires SASE Cloud Provider OPAQ Networks

IT

Securityweek

21.7.20

Democrats 'Gravely Concerned' Over Foreign Interference in US Vote

BigBrothers

Securityweek

21.7.20

Vulnerable Cellular Routers Targeted in Latest Attacks on Israel Water Facilities

BigBrothers

Securityweek

21.7.20

Emotet Resumes Activity After Five Months of Silence

Virus

Securityweek

21.7.20

Mac Cryptocurrency Traders Targeted by Trojanized Apps

Cryptocurrency

Threatpost

21.7.20

Facebook’s NSO Group Lawsuit Over WhatsApp Spying Set to Proceed

Social

Threatpost

21.7.20

REVil ransomware infected 18,000 computers at Telecom Argentina

Ransomware

Securityaffairs

21.7.20

Two more cyber attacks hit Israel’s water facilities in June

Attack

Securityaffairs

21.7.20

Yaniv Vardi Appointed CEO of Industrial Cybersecurity Firm Claroty

ICS

Securityweek

21.7.20

Alleged Ripoff Report Hacker Extradited to United States

Crime

Securityweek

21.7.20

Cloud Company Blackbaud Pays Ransomware Operators to Avoid Data Leak

Ransomware

Securityweek

21.7.20

Sextortion Update: The Final Final Chapter

Security

SANS

21.7.20

In addition to traditional DDoS attacks, researchers see various abnormal traffic patterns

Attack

Net-security

21.7.20

Internet security is improving, but exposures still run rampant

Security

Net-security

21.7.20

Digital privacy: A double-edged sword

Privacy

Net-security

21.7.20

Everyone’s talking about microservices, who’s actually doing it?

Security

Net-security

21.7.20

Digital transformation: Affected and accelerated by COVID-19

Security

Net-security

21.7.20

BadPower: Fast chargers can be modified to damage mobile devices

Mobil

Net-security

21.7.20

Infosec is a mindset as well as a job, but burnout can happen to anyone

Security

Net-security

20.7.20

21-Year-Old Cypriot Hacker Extradited to U.S. Over Fraud and Extortion Charges

Crime

Thehackernews

20.7.20

Critical SIGred Windows DNS bug gets micropatch after PoCs released

Vulnerebility

Bleepingcomputer

20.7.20

How to use Windows 10 File History to make secure backups

OS

Bleepingcomputer

20.7.20

Microsoft Edge 84 introduces Storage Access API to improve privacy

OS

Bleepingcomputer

20.7.20

Windows 10 2004: List of compatibility issues blocking updates

OS

Bleepingcomputer

20.7.20

New phishing campaign abuses a trio of enterprise cloud services

Phishing

Bleepingcomputer

20.7.20

Tedrade banking malware families target users worldwide

Virus

Securityaffairs

20.7.20

UK 'Confident' Moscow Helped Hackers Target Virus Vaccine

BigBrothers

Securityweek

20.7.20

Ransomware Functionality Removed From ThiefQuest Mac Malware

Ransomware

Securityweek

20.7.20

Hackers Accessed, Downloaded Twitter User Data in Recent Attack

Attack  Social

Securityweek

20.7.20

More Fake Cryptocurrency Apps Deliver GMERA Malware to Mac Users

Cryptocurrency

Securityweek

20.7.20

Germany's Top Court Reins in State Access to Online Data

BigBrothers

Securityweek

20.7.20

Twitter Attack Was Work of Young Hacker Pals: NYT

Social

Securityweek

20.7.20

A flaw in Zoom’s Vanity URL feature could have been exploited in phishing attacks

Vulnerebility

Securityaffairs

20.7.20

Ghost Squad Hackers defaced a second European Space Agency (ESA) site in a week

BigBrothers

Securityaffairs

20.7.20

Twitter reveals that hackers also downloaded data from eight compromised accounts

Social

Securityaffairs

20.7.20

Diebold Nixdorf warns of a wave of ATM black box attacks across Europe

Attack

Securityaffairs

20.7.20

Scanning Activity for ZeroShell Unauthenticated Access

Virus

SANS

20.7.20

People work more while at home, but worry about data security

Security

Net-security

20.7.20

Healthcare technology goals and CIO challenges

Security

Net-security

20.7.20

Cloud services help adapt and respond to COVID-19 challenges

Security

Net-security

20.7.20

Overconfident about their security, businesses are falling victims to bot attacks

Attack

Net-security

19.7.20

Introducing the Cryptonice HTTPS Scanner

Security blog

F5 Labs

19.7.20

How Credential Stuffing Is Evolving

Security blog

F5 Labs

19.7.20

What APIs Are and Why They Matter

Security blog

F5 Labs

19.7.20

The Five Cybersecurity Practices Every Organization Should Adopt

Cyber blog

F5 Labs

19.7.20

Cybersecurity Myths That Are Harming Your Business

Cyber blog

F5 Labs

19.7.20

Technical Controls for a Secure Open Banking Initiative

Security blog

F5 Labs

19.7.20

How to Guard Against Identity Theft in Times of Increasing Online Fraud

Security blog

F5 Labs

19.7.20

Coronavirus, Data Privacy & the New Online Social Contract

Cyber blog

F5 Labs

19.7.20

Getting Audited for DoD CMMC

Security blog

F5 Labs

19.7.20

Qbot Banking Trojan Still Up to Its Old Tricks

Malware blog

F5 Labs

19.7.20

Will gRPC Be the Next Protocol to Slip by Your Defenses?

Security blog

F5 Labs

19.7.20

Windows Server Containers Are Open, and Here’s How You Can Break Out

Security blog

Palo Alto Unity42

19.7.20

3 Vulnerabilities Found on AvertX IP Cameras

Vulnerebility blog

Palo Alto Unity42

19.7.20

CERTIFIED BUSINESS SECURITY!

Security blog

Cybereason

19.7.20

A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES

Malware blog

Cybereason

19.7.20

Ripple20 Vulnerability Mitigation Best Practices

Vulnerebility blog

Mcafee blog

19.7.20

My Adventures Hacking the iParcelBox

Hacking blog

Mcafee blog

19.7.20

What’s in the Box? Part II: Hacking the iParcelBox

Hacking blog

Mcafee blog

19.7.20

RagnarLocker Ransomware Threatens to Release Confidential Information

Ransomware blog

Mcafee blog

19.7.20

OneDrive Phishing Awareness

Phishing blog

Mcafee blog

19.7.20

MMS Exploit Part 1: Introduction to the Samsung Qmage Codec and Remote Attack Surface

Exploit blog

Project Zero

19.7.20

What to expect when you’re electing: Talos’ 2020 election security primer

BigBrother blog

Cisco Talos

19.7.20

Vulnerability Spotlight: Multiple vulnerabilities in RemoteFX affects, AMD, Intel chips

Vulnerebility blog

Cisco Talos

19.7.20

Ransom News

Ransom

Ransom

19.7.20

Zone.Identifier: A Coupe Of Observations

Security

SANS

19.7.20

Emotet botnet surges back after months of absence

Virus

Securityaffairs

19.7.20

Experts warn of massive internet scans for SAP systems affected by RECON Vulnerability

Vulnerebility

Securityaffairs

18.7.20

Cloudflare outage takes down Discord, BleepingComputer, and other sites

Security

Bleepingcomputer

18.7.20

Twitter: Hackers targeted 130 accounts, no passwords accessed

Social

Bleepingcomputer

18.7.20

Emotet spam trojan surges back to life after 5 months of silence

Virus

Bleepingcomputer

18.7.20

Magento adds 2FA to protect against card skimming attacks

Attack

Bleepingcomputer

18.7.20

Microsoft releases open-source Linux version of Procmon tool

OS

Bleepingcomputer

18.7.20

Twitter starts rolling out new LinkedIn-style DMs interface

Social

Bleepingcomputer

18.7.20

Microsoft fixes Windows 10 2004 boot fails caused by Disk Cleanup

OS

Bleepingcomputer

18.7.20

Federal agencies told to patch wormable Windows DNS bug in 24 hours

Vulnerebility

Bleepingcomputer

18.7.20

T-Mobile announces free Scam Shield robocall and scam protection

Spam

Bleepingcomputer

18.7.20

Orange confirms ransomware attack exposing business customers' data

Ransomware

Bleepingcomputer

18.7.20

New Android malware steals your dating and social accounts

Android

Bleepingcomputer

18.7.20

Russian hackers target COVID-19 vaccine research with custom malware

BigBrothers

Bleepingcomputer

18.7.20

Scammers hacked Twitter and hijacked accounts using admin tool

Social

Bleepingcomputer

18.7.20

PoC exploits released for SAP Recon vulnerabilities, patch now!

Exploit

Bleepingcomputer

18.7.20

CISA Emergency Directive Orders Immediate Fix of Windows DNS Server Bug

Vulnerebility

Threatpost

18.7.20

Twitter Hack Update: What We Know (and What We Don’t)

Social

Threatpost

18.7.20

Thousands of Vulnerable F5 BIG-IP Users Still Open to Takeover

Vulnerebility

Threatpost

18.7.20

Orange Business Services hit by Nefilim ransomware operators

Ransomware

Securityaffairs

18.7.20

U.S. Government Agencies Instructed to Patch Wormable Windows Server Flaw

BigBrothers

Securityweek

17.7.20

Operation In(ter)ception

Operation

Operation

17.7.20

Iran-linked APT35 accidentally exposed 40 GB associated with their operations

APT

Securityaffairs

17.7.20

Introducing the PhishingKitTracker

Phishing

Securityaffairs

17.7.20

DHS CISA urges government agencies to fix SIGRed Windows Server DNS bug within 24h

BigBrothers

Securityaffairs

17.7.20

ExpressVPN Announces Bug Bounty Program on Bugcrowd

Vulnerebility

Securityweek

17.7.20

Apple Patches Multiple Code Execution Flaws in Audio Components

Apple

Securityweek

17.7.20

Industry Reactions to Twitter Hack: Feedback Friday

Social

Securityweek

17.7.20

Internet Scanned for SAP Systems Affected by RECON Vulnerability

Vulnerebility

Securityweek

17.7.20

Twitter Says Hackers Targeted 130 Accounts in Recent Attack

Attack  Social

Securityweek

17.7.20

Kremlin Denies UK Claims of Vote Meddling, Vaccine Hacking

BigBrothers

Securityweek

17.7.20

Zoom's Vanity URLs Could Have Been Abused for Phishing Attacks

Phishing

Securityweek

17.7.20

Iranian Hackers Accidentally Exposed Their Training Videos (40 GB) Online

BigBrothers

Thehackernews

17.7.20

Biomedical orgs working on COVID-19 vaccines open to cyber attacks

BigBrothers

Net-security

17.7.20

A look at modern adversary behavior and the usage of open source tools in the enterprise

Security

Net-security

17.7.20

AA20-198A : Malicious Cyber Actor Use of Network Tunneling and Spoofing to Obfuscate Geolocation

CERT

CERT

17.7.20

Threat Actors Introduce Unique ‘Newbie’ Hacker Forum

Hacking

Threatpost

17.7.20

Zoom Addresses Vanity URL Zero-Day

Vulnerebility

Threatpost

17.7.20

Amazon-Themed Phishing Campaigns Swim Past Security Checks

Phishing

Threatpost

17.7.20

Hackers Look to Steal COVID-19 Vaccine Research

BigBrothers

Threatpost

17.7.20

LokiBot Redux Attacks Massive List of Common Android Apps

Android

Threatpost

17.7.20

New Android BlackRock malware targets hundreds of apps

Android

Securityaffairs

17.7.20

Group-IB helps to detain fraudsters that used cloned SIM cards to steal money from banks’ VIP customers

Hacking

Securityaffairs

17.7.20

UK, US, Canada Accuse Russia of Hacking Virus Vaccine Trials

BigBrothers

Securityweek

17.7.20

Iran-Linked Hackers Accidentally Exposed 40 GB of Their Files

APT

Securityweek

17.7.20

Hunting for SigRed Exploitation

Exploit

SANS

17.7.20

Cisco patches critical flaws in VPN routers and firewalls

Vulnerebility

Net-security

17.7.20

New wave of attacks aiming to rope home routers into IoT botnets

IoT

Net-security

17.7.20

Most global brands fail to implement security controls to prevent data leakage and theft

Security

Net-security

17.7.20

The effectiveness of using DNS as a foundational element in future network security best practices

Security

Net-security

17.7.20

Tech sector job interviews test performance anxiety rather than competence at coding

Security

Net-security

17.7.20

Cybersecurity concerns front and center as online voting expected to shape future elections

Cyber

Net-security

17.7.20

High-profile Twitter accounts hijacked to push Bitcoin scam. How did it happen?

Social

Net-security

16.7.20

The Streaming Wars: A Cybercriminal’s Perspective

CyberCrime

Securelist

16.7.20

UK NCSC blames Russia-linked APT29 for attacks on COVID-19 vaccine research

APT  BigBrothers

Securityaffairs

16.7.20

Cisco fixes 5 critical flaws that could allow router firewall takeover

Vulnerebility

Securityaffairs

16.7.20

Several High-Profile Twitter accounts hacked in a Bitcoin scam

Hacking

Securityaffairs

16.7.20

Critical Vulnerabilities Can Be Exploited to Hack Cisco Small Business Routers

Vulnerebility

Securityweek

16.7.20

UK Says Russian Hackers Trying to Steal Virus Vaccine Research

BigBrothers

Securityweek

16.7.20

Google Cloud Unveils New Service for Government Workloads

BigBrothers

Securityweek

16.7.20

Top Court Scraps EU-US Data Pact in New Blow to Brussels

BigBrothers

Securityweek

16.7.20

Experts Say Twitter Breach Troubling, Undermines Trust

Incindent  Social

Securityweek

16.7.20

Seven Ransomware Families Target Industrial Software

Ransomware

Securityweek

16.7.20

Data Governance and Security Provider Privacera Raises $13.5 Million

IT

Securityweek

16.7.20

Hackers Used Internal Twitter Tools to Hijack High-Profile Accounts

Social

Securityweek

16.7.20

More Countries Waking up to Huawei Threats, US Say

BigBrothers

Securityweek

16.7.20

Why Can Application Security Be Considered A Enabler For Business?

Security

Thehackernews

16.7.20

New Android Malware Now Steals Passwords For Non-Banking Apps Too

Android

Thehackernews

16.7.20

A New Flaw In Zoom Could Have Let Fraudsters Mimic Organisations

Vulnerebility

Thehackernews

16.7.20

Apple, Kanye, Gates, Bezos, more hacked in Twitter account crypto scam

Social

Bleepingcomputer

16.7.20

Citrix: No breach, hacker stole business info from third party

Vulnerebility

Bleepingcomputer

16.7.20

Cisco fixes critical pre-auth flaws allowing router takeover

Vulnerebility

Bleepingcomputer

16.7.20

Microsoft Outlook is crashing worldwide with 0xc0000005 errors, how to fix

OS

Bleepingcomputer

16.7.20

Microsoft removes Windows 10 2004 Thunderbolt dock update block

OS

Bleepingcomputer

16.7.20

Google Chrome ends Windows 10 memory optimization test after CPU hit

Security

Bleepingcomputer

16.7.20

Microsoft Office July security updates patch critical RCE bugs

OS

Bleepingcomputer

16.7.20

WhatsApp is down, users reporting worldwide outage

Social

Bleepingcomputer

16.7.20

Microsoft fixes Windows 10 issue causing reboots, LSASS crashes

OS

Bleepingcomputer

16.7.20

Chrome 84 released with important security enhancements

Security

Bleepingcomputer

16.7.20

Windows 10 2004 servicing stack update fixes privilege escalation bug

OS

Bleepingcomputer

16.7.20

Microsoft July 2020 Patch Tuesday: 123 vulnerabilities, 18 Critical!

OS

Bleepingcomputer

16.7.20

Microsoft patches critical wormable SigRed bug in Windows DNS Server

OS

Bleepingcomputer

16.7.20

Windows 10 Cumulative Updates KB4565503 & KB4565483 Released

OS

Bleepingcomputer

16.7.20

Wattpad data breach exposes account info for millions of users

Incindent

Bleepingcomputer

16.7.20

Adobe fixes critical bugs in Creative Cloud, Media Encoder

Vulnerebility

Bleepingcomputer

16.7.20

New GoldenHelper malware found in official Chinese tax software

Virus

Bleepingcomputer

16.7.20

Android chat app uses public code to spy, exposes user data

Android

Bleepingcomputer

16.7.20

Critical SAP Recon flaw exposes thousands of customers to attacks

Vulnerebility

Bleepingcomputer

16.7.20

New AgeLocker Ransomware uses Googler's utility to encrypt files

Ransomware

Bleepingcomputer

16.7.20

LiveAuctioneers reports data breach after user records sold online

Incindent

Bleepingcomputer

16.7.20

Microsoft extends security for Azure Storage file shares, data lakes

OS

Bleepingcomputer

16.7.20

Microsoft Office 365 will add support for disposable emails

OS

Bleepingcomputer

16.7.20

Windows 10's Feedback Hub: A forum for political trolls, spammers

OS

Bleepingcomputer

16.7.20

Malware adds online sandbox detection to evade analysis

Virus

Bleepingcomputer

16.7.20

How to use Windows 10’s Storage Sense to free up Disk Space

OS

Bleepingcomputer

16.7.20

Brazil’s Banking Trojans Go Global

Virus

Threatpost

16.7.20

Twitter Confirms it was Hacked in an Unprecedented Cryptocurrency Scam

Cryptocurrency  Social

Threatpost

16.7.20

LokiBot Redux Attacks Massive List of Common Android Apps

Virus

Threatpost

16.7.20

CIA covert operations likely behind attacks against APT34 and FSB

APT  BigBrothers

Securityaffairs

16.7.20

New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data

Incindent

Securityaffairs

16.7.20

Industrial Cybersecurity Firm Claroty Releases Open Source Database Parser

ICS

Securityweek

16.7.20

Twitter Confirms 'Security Incident' Involving Hacked Accounts

Social

Securityweek

16.7.20

Twitter Accounts of Apple, Musk, Gates, Others Hit in Major Hack

Social

Securityweek

16.7.20

Several High-Profile Accounts Hacked in the Biggest Twitter Hack of All Time

Vulnerebility

Thehackernews

16.7.20

340 GDPR fines for a total of €158,135,806 issued since May 2018

Privacy

Net-security

16.7.20

How secure is your web browser?

Security

Net-security

16.7.20

20% of credential stuffing attacks target media companies

Attack

Net-security

16.7.20

New threat environment elements and global attack trends

Security

Net-security

16.7.20

Data professionals: Job security and shifting career priorities in the wake of the pandemic

Security

Net-security

15.7.20

GReAT Ideas follow-up

Virus

Securelist

15.7.20

How to Extend Security Across Your Kubernetes Infrastructure

Security

Securityaffairs

15.7.20

US applauds British ban on China’s Huawei for 5G networks

BigBrothers

Securityaffairs

15.7.20

Exclusive, Ghost Squad Hackers defaced European Space Agency (ESA) site

BigBrothers

Securityaffairs

15.7.20

GoldenHelper, a new malware delivered via Chinese tax software

Virus

Securityaffairs

15.7.20

Chrome 84 Brings 38 Security Patches, Resumes CSRF Protection Rollout

Vulnerebility

Securityweek

15.7.20

Citrix Says Data Sold on Dark Web Comes From Third Party

CyberCrime

Securityweek

15.7.20

'Tetrade' Brazilian Banking Trojans Go International

Virus

Securityweek

15.7.20

Vulnerabilities Impact Multiple Rittal Products Due to Use of Same Firmware

Vulnerebility

Securityweek

15.7.20

Cisco Investigating Report of Vulnerability Found in Counterfeit Switches

Vulnerebility

Securityweek

15.7.20

US Hails British Ban on China's Huawei

BigBrothers

Securityweek

15.7.20

Oracle's July 2020 CPU Includes 443 New Patches

Vulnerebility

Securityweek

15.7.20

Catalan Leader Demands Investigation Into Spain Spying Claim

BigBrothers

Securityweek

15.7.20

Critical, Wormable Bug in Windows DNS Servers Could Allow Full Infrastructure Compromise

Vulnerebility

Securityweek

15.7.20

4 Dangerous Brazilian Banking Trojans Now Trying to Rob Users Worldwide

Virus

Thehackernews

15.7.20

Investigation highlights the dangers of using counterfeit Cisco switches

Vulnerebility

Net-security

15.7.20

PATCH NOW - SIGRed - CVE-2020-1350 - Microsoft DNS Server Vulnerability

Vulnerebility

SANS

15.7.20

Critical SAP Bug Allows Full Enterprise System Takeover

Vulnerebility

Threatpost

15.7.20

Microsoft Tackles 123 Fixes for July Patch Tuesday

Vulnerebility

Threatpost

15.7.20

Adobe Discloses Critical Code-Execution Bugs in July Update

Vulnerebility

Threatpost

15.7.20

Critical DNS Bug Opens Windows Servers to Infrastructure Hijacking

Vulnerebility

Threatpost

15.7.20

DMARC Adoption Spikes, Higher Ed Remains Behind

Spam

Threatpost

15.7.20

Leaked Details of 142 Million MGM Hotel Guests Found for Sale on Dark Web

Incindent

Threatpost

15.7.20

The Tetrade: Brazilian banking malware goes global

Virus

Securelist

15.7.20

Microsoft July 2020 Security Updates address 123 vulnerabilities

Vulnerebility

Securityaffairs

15.7.20

Microsoft fixes critical wormable RCE SigRed in Windows DNS servers

Vulnerebility

Securityaffairs

15.7.20

Adobe fixes over a dozen flaws in Media Encoder, Download Manager

Vulnerebility

Securityaffairs

15.7.20

Critical, Wormable Bug in Windows DNS Servers Could Allow Full Infrastructure Compromise

Vulnerebility

Securityaffairs

15.7.20

SAP Releases 10 Security Notes on July 2020 Patch Day

Vulnerebility

Securityweek

15.7.20

Microsoft Patches 123 Vulnerabilities With July 2020 Security Updates

Vulnerebility

Securityweek

15.7.20

Researchers Find More Malware Delivered via Chinese Tax Software

Virus

Securityweek

15.7.20

Adobe Patches Critical Vulnerabilities in Media Encoder, Download Manager

Vulnerebility

Securityweek

15.7.20

17-Year-Old Critical 'Wormable' RCE Vulnerability Impacts Windows DNS Servers

Vulnerebility

Thehackernews

15.7.20

Adobe Issues July 2020 Critical Security Patches for Multiple Software

Vulnerebility

Thehackernews

15.7.20

Word docs with macros for IcedID (Bokbot)

Virus

SANS

15.7.20

Email impersonations becoming pervasive, preying on a distracted and dispersed workforce

Security

Net-security

15.7.20

Businesses express concerns around ethical risks for their AI initiatives

Security

Net-security

15.7.20

Is DNS a vital component of your security strategy?

Security

Net-security

15.7.20

2020: The year of increased attack sophistication

Attack

Net-security

15.7.20

July 2020 Patch Tuesday: Microsoft plugs wormable Windows DNS Server RCE flaw

Vulnerebility

Net-security

15.7.20

Critical flaw gives attackers control of vulnerable SAP business applications

Vulnerebility

Net-security

14.7.20

The Tetrade: Brazilian banking malware goes global

Virus

Securelist

14.7.20

3.4 Million user records from LiveAuctioneers hack available for sale

IT

Securityaffairs

14.7.20

NightLion hacker is selling details of 142 million MGM Resorts hotel guests

Incindent

Securityaffairs

14.7.20

Critical SAP Recon vulnerability exposes thousands of system to full take over

Vulnerebility

Securityaffairs

14.7.20

UK to Exclude Huawei From Role in High-Speed Phone Network

BigBrothers

Securityweek

14.7.20

Blockchain Security Startup Valid Network Raises $8 Million in Seed Round

Cryptocurrency

Securityweek

14.7.20

Cloud Application Security Firm Traceable Emerges From Stealth Mode

Safety

Securityweek

14.7.20

Google Cloud Unveils Confidential VMs Powered by AMD EPYC Processors

IT

Securityweek

14.7.20

Top Trump Aide Warns of 'Strong Actions' on TikTok, Angering China

BigBrothers

Securityweek

14.7.20

'RECON' Vulnerability Exposes Thousands of SAP Systems to Attacks

Vulnerebility

Securityweek

14.7.20

LiveAuctioneers Data Breach Impacts 3.4 Million Users

Incindent

Securityweek

14.7.20

The Enemy Within: How Insider Threats Are Changing

Security

Threatpost

14.7.20

A ‘New Age’ of Sophisticated Business Email Compromise is Coming

Spam

Threatpost

14.7.20

Secret Service Creates Cyber Fraud Task Forces

BigBrothers

Threatpost

14.7.20

Critical SAP Bug Allows Full Enterprise System Takeover

Vulnerebility

Threatpost

14.7.20

TrickBot Sample Accidentally Warns Victims They’re Infected

Virus

Threatpost

14.7.20

New Mirai variant includes exploit for a flaw in Comtrend Routers

BotNet

Securityaffairs

14.7.20

Trump admits to have authorized a cyber attack on Russian troll farm in 2018

BigBrothers

Securityaffairs

14.7.20

Mozilla Joins Apple, Google in Reducing TLS Certificate Lifespans

Crypto

Securityweek

14.7.20

New Mirai Variant Targets Vulnerability in Comtrend Routers

BotNet

Securityweek

14.7.20

New Highly-Critical SAP Bug Could Let Attackers Take Over Corporate Servers

Vulnerebility

Thehackernews

14.7.20

AA20-195A : Critical Vulnerability in SAP NetWeaver AS Java

CERT

CERT

14.7.20

How do I select a network detection and response solution for my business?

Security

Net-security

14.7.20

Ransomware, then and now: The change in data theft behavior

Ransomware

Net-security

14.7.20

Researchers extract personal data from video conference screenshots

Hacking

Net-security

14.7.20

Remote working security challenges urge MFA implementation

Safety

Net-security

14.7.20

HITB Lockdown: Hands-on technical trainings coming next week!

Congress

Net-security

13.7.20

Personal details and SSNs of 40,000 US citizens available for sale

Incindent

Securityaffairs

13.7.20

Malware campaign attempts to evade analysis with Any.Run sandbox

Virus

Securityaffairs

13.7.20

Hacker claims to have breached Night Lion security firm

Incindent

Securityaffairs

13.7.20

Israel Court Rejects Amnesty Petition Against Spyware Firm NSO

BigBrothers

Securityweek

13.7.20

U.S. Secret Service Creates Cyber Fraud Task Force

BigBrothers

Securityweek

13.7.20

Russian Found Guilty of Hacking LinkedIn, Formspring, Dropbox

BigBrothers

Securityweek

13.7.20

Trump Confirms U.S. Launched Cyberattack on Russian Troll Farm in 2018

BigBrothers

Securityweek

13.7.20

Amazon Says Email to Employees Banning TikTok Was a Mistake

Spam

Securityweek

13.7.20

Backdoors Identified in Tens of C-Data Fiber Broadband Devices

Virus

Securityweek

13.7.20

POST-INCIDENT REVIEW AND THE BIG DATA PROBLEM

Incident blog

Cybereason

13.7.20

WHAT MODERN RANSOMWARE LOOKS LIKE

Ransomware blog

Cybereason

13.7.20

FAKESPY MASQUERADES AS POSTAL SERVICE APPS AROUND THE WORLD

Malware blog

Cybereason

13.7.20

RANSOMWARE: WEAPONS OF MASS DISRUPTION

Ransomware blog

Cybereason

13.7.20

HOW TO DESIGN A PREVENTION STACK TO STOP RANSOMWARE

Ransomware blog

Cybereason

13.7.20

NEXT-GENERATION ANTIVIRUS 101: LAYERS OF PREVENTION

Malware blog

Cybereason

13.7.20

308% ROI BY USING CYBEREASON, ACCORDING TO FORRESTER TOTAL ECONOMIC IMPACT STUDY

Cyber blog

Cybereason

13.7.20

UBU: CHAMPIONING DIVERSITY, EQUITY, AND INCLUSION AT CYBEREASON

Security blog

Cybereason

13.7.20

CYBEREASON’S NEWEST HONEYPOT SHOWS HOW MULTISTAGE RANSOMWARE ATTACKS SHOULD HAVE CRITICAL INFRASTRUCTURE PROVIDERS ON HIGH ALERT

Ransomware blog

Cybereason

13.7.20

HOW I MADE MY COMPANY’S OFFICE INTO A FANCY INTERNET CAFE AND WHY SHOULD YOU TOO

Cyber blog

Cybereason

13.7.20

WHAT ARE ADVERSARY EMULATION PLANS?

Security blog

Cybereason

13.7.20

WHY NOT DETECT EVERY TTP IN THE MITRE ATT&CK FRAMEWORK?

Hacking blog

Cybereason

13.7.20

VALAK: MORE THAN MEETS THE EYE

Malware blog

Cybereason

13.7.20

LOVE YOUR ENEMIES BEFORE YOU DESTROY THEM — HACKING FOR GOOD

Hacking blog

Cybereason

13.7.20

Records of 45 million+ travelers to Thailand and Malaysia surfaced in the darkweb

CyberCrime

Securityaffairs

13.7.20

Google updates policies to ban any ads for surveillance solutions and services

Security

Securityaffairs

13.7.20

Maldoc: VBA Purging Example

Spam

SANS

13.7.20

Cyberwarfare: The changing role of force

Cyber

Net-security

13.7.20

Security alerts more than doubled in the last 5 years, SecOps teams admit they can’t get to them all

Security

Net-security

12.7.20

Threat Assessment: EKANS Ransomware

Ransomware blog

Palo Alto Unity42

12.7.20

Attackers Cryptojacking Docker Images to Mine for Monero

Cryptocurrency blog

Palo Alto Unity42

12.7.20

Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices

Cryptocurrency blog

Palo Alto Unity42

12.7.20

An Overview of GPS Tracking and Future Application for IoT

IoT blog

Palo Alto Unity42

12.7.20

AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations

Malware blog

Palo Alto Unity42

12.7.20

Threat Assessment: Hangover Threat Group

Cyber blog

Palo Alto Unity42

12.7.20

6 New Vulnerabilities Found on D-Link Home Routers

Vulnerebility blog

Palo Alto Unity42

12.7.20

Goodbye Mworm, Hello Nworm: TrickBot Updates Propagation Module

Malware blog

Palo Alto Unity42

12.7.20

Rootless Containers: The Next Trend in Container Security

Security blog

Palo Alto Unity42

12.7.20

Vulnerability Spotlight: SQL injection vulnerability in Glacies IceHRM

Vulnerebility blog

Cisco Talos

12.7.20

New Snort rule addresses critical vulnerability in F5 BIG-IP

Vulnerebility blog

Cisco Talos

12.7.20

WastedLocker Goes "Big-Game Hunting" in 2020

Security blog

Cisco Talos

12.7.20

Vulnerability Spotlight: Google Chrome PDFium memory corruption vulnerability

Vulnerebility blog

Cisco Talos

12.7.20

Vulnerability Spotlight: Information disclosure vulnerability in Mozilla Firefox

Vulnerebility blog

Cisco Talos

12.7.20

Vulnerability Spotlight: Remote code execution vulnerabilities in LEADTOOLS 20

Vulnerebility blog

Cisco Talos

12.7.20

Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks

Malware blog

Cisco Talos

12.7.20

PROMETHIUM extends global reach with StrongPity3 APT

APT blog

Cisco Talos

12.7.20

Vulnerability Spotlight: Denial-of-service vulnerability in NVIDIA driver

Vulnerebility blog

Cisco Talos

12.7.20

Cisco Talos replacing all mentions of 'blacklist,' 'whitelist'

Security blog

Cisco Talos

12.7.20

IndigoDrop spreads via military-themed lures to deliver Cobalt Strike

BigBrother blog

Cisco Talos

12.7.20

Quarterly report: Incident Response trends in Summer 2020

Incident blog

Cisco Talos

12.7.20

Tor2Mine is up to their old tricks — and adds a few new ones

Cryptocurrency blog

Cisco Talos

12.7.20

Vulnerability Spotlight: Two code execution vulnerabilities in Microsoft Excel

Vulnerebility blog

Cisco Talos

12.7.20

Vulnerability Spotlight: Remote code execution vulnerability in Firefox’s SharedWorkerService function

Vulnerebility blog

Cisco Talos

12.7.20

Microsoft Patch Tuesday for June 2020 — Snort rules and prominent vulnerabilities

Vulnerebility blog

Cisco Talos

12.7.20

Vulnerability Spotlight: Multiple vulnerabilities in Siemens LOGO! PLC

Vulnerebility blog

Cisco Talos

12.7.20

Vulnerability Spotlight: Two vulnerabilities in Zoom could lead to code execution

Vulnerebility blog

Cisco Talos

12.7.20

Vulnerability Spotlight: VMware Workstation 15 denial-of-service vulnerability

Vulnerebility blog

Cisco Talos

12.7.20

How to unc0ver a 0-day in 4 hours or less

Exploit blog

Project Zero

12.7.20

FF Sandbox Escape (CVE-2020-12388)

Exploit blog

Project Zero

12.7.20

A survey of recent iOS kernel exploits

Exploit blog

Project Zero

12.7.20

VALAK: MORE THAN MEETS THE EYE

Malware blog

Cybereason

12.7.20

LOVE YOUR ENEMIES BEFORE YOU DESTROY THEM — HACKING FOR GOOD

Hacking blog

Cybereason

12.7.20

Turing in His Grave: What Human CAPTCHA Solvers Reveal About Control Design

Security blog

FireEye

12.7.20

As Healthcare Industry Transforms Overnight, Tech Community Must Act

Cyber blog

FireEye

12.7.20

Fraudulent Unemployment Claims Signal Consumers to Step Up Personal Identity Protection

Incident blog

FireEye

12.7.20

Bringing VandaTheGod down to Earth: Exposing the person behind a 7-year hacktivism campaign

Hacking blog

Checkpoint

12.7.20

Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta

Security blog

Cisco Talos

12.7.20

People know reusing passwords is risky – then do it anyway

Security blog

Eset

12.7.20

Critical Android flaw lets attackers hijack almost any app, steal data

OS Blog

Eset

12.7.20

Crooks threaten to leak customer data stolen from e‑commerce sites

Incident blog

Eset

12.7.20

From Agent.BTZ to ComRAT v4: A ten‑year journey

Malware blog

Eset

12.7.20

Two years later, has GDPR fulfilled its promise?

Security blog

Eset

12.7.20

Zoom fixes zero-day RCE bug affecting Windows 7, more updates soon

Vulnerebility

Bleepingcomputer

12.7.20

TrickBot malware mistakenly warns victims that they are infected

Virus

Bleepingcomputer

12.7.20

How to enable Windows 10's hidden features using Mach2

OS

Bleepingcomputer

12.7.20

Apple: Closing MacBooks with camera covers leads to display damage

Apple

Bleepingcomputer

12.7.20

Microsoft will not support PHP 8.0 for Windows in 'any capacity'

Security

Bleepingcomputer

12.7.20

How to protect your Verizon number from SIM swapping attacks

Attack  Mobil

Bleepingcomputer

12.7.20

Uber Eats outage in multiple countries, 'Internal Server Error" reports

Security

Bleepingcomputer

12.7.20

eToro accounts peddled by the thousands on cybercrime forums

CyberCrime

Bleepingcomputer

12.7.20

US Secret Service creates new Cyber Fraud Task Force

BigBrothers

Bleepingcomputer

12.7.20

Mozilla reduces TLS certificate lifespan to 1 year in September

Crypto

Bleepingcomputer

12.7.20

Over 1,300 phishing kits for sale on hacker forum

Phishing

Bleepingcomputer

12.7.20

How to import and backup saved passwords in Google Chrome

Safety

Bleepingcomputer

12.7.20

Conti ransomware shows signs of being Ryuk's successor

Ransomware

Bleepingcomputer

12.7.20

Google will ban ads for stalkerware starting August 11

Hacking

Bleepingcomputer

12.7.20

Microsoft testing new Windows 10 KDP anti-malware protection

OS

Bleepingcomputer

12.7.20

Persuasive Office 365 phishing uses fake Zoom suspension alerts

Phishing

Bleepingcomputer

12.7.20

Evilnum hackers use the same malware supplier as FIN6, Cobalt

Hacking

Bleepingcomputer

12.7.20

Joker Android malware keeps evading Google Play Store defenses

Android

Bleepingcomputer

12.7.20

Over 15 billion credentials in circulation on hacker forums

Hacking

Bleepingcomputer

12.7.20

Palo Alto Networks fixes another severe flaw in PAN-OS devices

Vulnerebility

Bleepingcomputer

12.7.20

Microsoft warns of Office 365 phishing via malicious OAuth apps

Phishing

Bleepingcomputer

12.7.20

First look: Microsoft's Project Freta detects Linux malware for free

Virus

Bleepingcomputer

12.7.20

NVIDIA fixes code execution bug in GeForce Experience software

Vulnerebility

Bleepingcomputer

12.7.20

Microsoft fixes Word, Skype hangs in July Office 2020 updates

OS

Bleepingcomputer

12.7.20

Risky blogspot.in domain for sale after Google fails to renew it

Security

Bleepingcomputer

12.7.20

DOJ indict Fxmsp hacker for selling access to hacked orgs, AV firms

BigBrothers

Bleepingcomputer

12.7.20

ThiefQuest info-stealing Mac wiper gets free decryptor

Apple

Bleepingcomputer

12.7.20

Mitigating critical F5 BIG-IP RCE flaw not enough, bypass found

Vulnerebility

Bleepingcomputer

12.7.20

How to uninstall Microsoft Edge forced-installed via Windows Update

OS

Bleepingcomputer

12.7.20

Microsoft takes down domains used in COVID-19-related cybercrime

CyberCrime

Bleepingcomputer

12.7.20

Windows 10: The beginning of the end for Control Panel

OS

Bleepingcomputer

12.7.20

US Treasury shares tips on spotting money mule and imposter scams

Spam

Bleepingcomputer

12.7.20

First reported Russian BEC scam gang targets Fortune 500 firms

Spam

Bleepingcomputer

12.7.20

Citrix fixes 11 flaws in ADC, Gateway, and SD-WAN WANOP appliances

Vulnerebility

Bleepingcomputer

12.7.20

Microsoft Defender ATP web content filtering is now free

Safety

Bleepingcomputer

12.7.20

EDP energy giant confirms Ragnar Locker ransomware attack

Ransomware

Bleepingcomputer

12.7.20

Ransomware attack on insurance MSP Xchanging affects clients

Ransomware

Bleepingcomputer

12.7.20

New Google Chrome feature to drastically reduce battery usage

Security

Bleepingcomputer

12.7.20

Microsoft's new Windows 10 Alt+Tab plan looks like a mess

OS

Bleepingcomputer

12.7.20

Windows 10 2004 upgrades blocked by useless "What needs your attention" alerts

OS

Bleepingcomputer

12.7.20

North Korean hackers linked to credit card stealing attacks on US stores

BigBrothers

Bleepingcomputer

12.7.20

PoC exploits released for F5 BIG-IP vulnerabilities, patch now!

Exploit

Bleepingcomputer

12.7.20

Windows 10's Microsoft Store Codecs patches are confusing users

OS

Bleepingcomputer

12.7.20

.NET Core vulnerability lets attackers evade malware detection

Attack

Bleepingcomputer

12.7.20

New Behave! extension warns of website port scans, local attacks

Attack

Bleepingcomputer

12.7.20

Companies start reporting ransomware attacks as data breaches

Ransomware

Bleepingcomputer

12.7.20

Try2Cry ransomware tries to worm its way to other Windows systems

Ransomware

Bleepingcomputer

12.7.20

US Cyber Command urges F5 customers to patch critical BIG-IP flaw

Vulnerebility

Bleepingcomputer

12.7.20

Avaddon ransomware shows that Excel 4.0 macros are still effective

Ransomware

Bleepingcomputer

12.7.20

Windows 10 2004 breaks OneDrive connectivity for some users

OS

Bleepingcomputer

12.7.20

Microsoft Defender ATP now helps secure network devices

Safety

Bleepingcomputer

12.7.20

Malwarebytes AdwCleaner now removes malware from the command line

Virus

Bleepingcomputer

12.7.20

Surge of MongoDB ransom attacks use GDPR as extortion leverage

Ransomware

Bleepingcomputer

12.7.20

Windows 10 background image tool can be abused to download malware

OS

Bleepingcomputer

12.7.20

NSA releases guidance on securing IPsec Virtual Private Networks

BigBrothers

Bleepingcomputer

12.7.20

Microsoft shares Windows 10 2004 workaround for Storage Spaces issue

OS

Bleepingcomputer

12.7.20

Researchers link APT15 hackers to Chinese military company

APT

Bleepingcomputer

12.7.20

Hundreds arrested after encrypted messaging network takeover

Crypto

Bleepingcomputer

12.7.20

GoldenSpy backdoor installed by tax software gets remotely removed

Virus

Bleepingcomputer

12.7.20

Microsoft unveils new Windows 10 Start Menu with theme-aware tiles

OS

Bleepingcomputer

12.7.20

Federal Reserve shares tips on mitigating synthetic identity fraud

CyberCrime

Bleepingcomputer

12.7.20

TrickBot malware now checks screen resolution to evade analysis

Virus

Bleepingcomputer

12.7.20

Windows POS malware uses DNS to smuggle stolen credit cards

Virus

Bleepingcomputer

12.7.20

US Govt shares tips on defending against cyberattacks via Tor

BigBrothers

Bleepingcomputer

12.7.20

Windows 10 PowerToys 0.19 released in huge stability bug fix

OS

Bleepingcomputer

12.7.20

Dozens of US news sites hacked in WastedLocker ransomware attacks

Ransomware

Bleepingcomputer

12.7.20

Mozilla rolls out emergency Firefox update to fix search issues

Vulnerebility

Bleepingcomputer

12.7.20

Microsoft lifts Windows 10 2004 update block on Surface devices

OS

Bleepingcomputer

12.7.20

Scanning Home Internet Facing Devices to Exploit

Exploit

SANS

12.7.20

Yevgeniy Nikulin, Russian hacker behind Dropbox and LinkedIn hacks found guilty

Crime

Securityaffairs

12.7.20

Exclusive: Any Chingari App (Indian TikTok Clone) Account Can Be Hacked Easily

Social

Thehackernews

11.7.20

SpartCrypt Decryptor

Anti-Ramson Tool

Anti-Ramson Tool

11.7.20

Facebook Offering Big Rewards for Vulnerabilities in Hermes, Spark AR

Social

Securityweek

11.7.20

Google Updates Policies to Reject Ads for Spyware

Virus

Securityweek

11.7.20

Zoom Working on Patch for Code Execution Vulnerability in Windows Client

Vulnerebility

Securityweek

11.7.20

Hackers are scanning the web for vulnerable Citrix systems

Vulnerebility

Securityaffairs

11.7.20

Evilnum Group targets European and British fintech companies

Hacking

Securityaffairs

11.7.20

Juniper Networks addressed many issues in its products

Vulnerebility

Securityaffairs

11.7.20

Report: Most Popular Home Routers Have ‘Critical’ Flaws

Vulnerebility

Threatpost

11.7.20

Popular TP-Link Family of Kasa Security Cams Vulnerable to Attack

Vulnerebility

Threatpost

11.7.20

Google Bans Stalkerware Ads – With a Loophole

Security

Threatpost

11.7.20

Smartwatch Hack Could Trick Dementia Patients into Overdosing

Hacking

Threatpost

10.7.20

Researchers found allegedly intentional backdoors in FTTH devices from Chinese vendor C-Data

Virus

Securityaffairs

10.7.20

KingComposer fixes a reflected XSS impacting 100,000 WordPress sites

Vulnerebility

Securityaffairs

10.7.20

Pre-Installed malware spotted on other Android phones sold in US

Android

Securityaffairs

10.7.20

Juniper Networks Patches Critical Vulnerabilities in Firewalls

Vulnerebility

Securityweek

10.7.20

Evilnum Group Targets Fintech Companies in Europe

Hacking

Securityweek

10.7.20

UK, Australia Investigate Clearview Facial Recognition Firm

BigBrothers

Securityweek

10.7.20

Attackers are probing Citrix controllers and gateways through recently patched flaws

Vulnerebility

Net-security

10.7.20

Zoom Zero-Day Allows RCE, Patch on the Way

Vulnerebility

Threatpost

10.7.20

Joker Android Malware Dupes Its Way Back Onto Google Play

Android

Threatpost

10.7.20

BlueLeaks Server Seized By German Police: Report

BigBrothers

Threatpost

10.7.20

Microsoft Warns on OAuth Attacks Against Cloud App Users

Attack

Threatpost

10.7.20

‘Undeletable’ Malware Shows Up in Yet Another Android Device

Android

Threatpost

10.7.20

Zoom is working on a patch for a zero-day in Windows client

Vulnerebility

Securityaffairs

10.7.20

Joker malware apps bypassed Google’s Play Store security checks

Android

Securityaffairs

10.7.20

15 billion credentials available in the cybercrime marketplaces

CyberCrime

Securityaffairs

10.7.20

Palo Alto Networks addresses another high severity issue in PAN-OS devices

Vulnerebility

Securityaffairs

10.7.20

Google Tsunami vulnerability scanner is now open-source

Vulnerebility

Securityaffairs

10.7.20

Vulnerabilities in Popular Open Source Management Tool Expose Hospitals to Attacks

Vulnerebility

Securityweek

10.7.20

Honeywell Sees Rise in USB-Borne Malware That Can Cause Major ICS Disruption

ICS  Virus

Securityweek

10.7.20

Researchers Find Pre-Installed Malware on More Android Phones in U.S.

Android

Securityweek

10.7.20

Germany Seizes Server Hosting Pilfered U.S. Police Files

BigBrothers

Securityweek

10.7.20

Microsoft Adds New Data Corruption Preventions to Windows

Safety

Securityweek

10.7.20

Powerful Conti Ransomware Emerges

Ransomware

Securityweek

10.7.20

Cyberattack Simulation Company XM Cyber Raises $17 Million

IT

Securityweek

10.7.20

Joker Malware Apps Once Again Bypass Google's Security to Spread via Play Store

Android

Thehackernews

10.7.20

Excel spreasheet macro kicks off Formbook infection

Spam

SANS

10.7.20

July 2020 Patch Tuesday forecast: Will the CVE trend continue?

Vulnerebility

Net-security

10.7.20

An effective cloud security posture begins with these three step

Security

Net-security

10.7.20

USB storage devices: Convenient security nightmares

Security

Net-security

10.7.20

Companies see the importance of integrated solutions to streamline business processes

Security

Net-security

10.7.20

Zoom zero-day flaw allows code execution on victim’s Windows machine

Vulnerebility

Net-security

10.7.20

Three major gaps in the Cyberspace Solarium Commission’s report that need to be addressed

Cyber

Net-security

9.7.20

Notorious Hacker ‘Fxmsp’ Outed After Widespread Access-Dealing

Hacking

Threatpost

9.7.20

Microsoft Seizes Malicious Domains Used in Mass Office 365 Attacks

Virus

Threatpost

9.7.20

15 Billion Credentials Currently Up for Grabs on Hacker Forums

Hacking

Threatpost

9.7.20

Advertising Plugin for WordPress Threatens Full Site Takeovers

Security

Threatpost

9.7.20

DOJ indicts Fxmsp hacker for selling access to hacked businesses

BigBrothers

Securityaffairs

9.7.20

Google Patches Critical Android Vulnerabilities With July 2020 Updates

Android

Securityweek

9.7.20

Over 5 Billion Unique Credentials Offered on Cybercrime Marketplaces

CyberCrime

Securityweek

9.7.20

Huawei Urges UK Not to Rush Into 5G Decision

BigBrothers

Securityweek

9.7.20

F5 BIG-IP contains multiple vulnerabilities including unauthenticated remote command execution

Alert

Alert

9.7.20

Three major gaps in the Cyberspace Solarium Commission’s report that need to be addressed

Cyber

Net-security

9.7.20

70% of organizations experienced a public cloud security incident in the last year

Security

Net-security

9.7.20

In the age of disruption, comprehensive network visibility is key

Security

Net-security

9.7.20

BYOD adoption is growing rapidly, but security is lagging

Security

Net-security

9.7.20

Western Digital expands family of data center HDD solutions

IT

Net-security

8.7.20

Redirect auction

Hacking

Securelist

8.7.20

Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw

Vulnerebility

Securityaffairs

8.7.20

Magecart Group Hits 570 Websites in Three Years

CyberCrime

Securityweek

8.7.20

Russian BEC Ring Targets Many Multinational Organizations

BigBrothers

Securityweek

8.7.20

Free Tool Enables Recovery of Files Encrypted by ThiefQuest Mac Malware

Apple

Securityweek

8.7.20

Federal Judge Upholds Maine's Strict Internet Privacy Law

Privacy

Securityweek

8.7.20

Hackers Find Way to Bypass Mitigation for Exploited BIG-IP Vulnerability

Vulnerebility

Securityweek

8.7.20

Magecart Group 8 skimmed card info from 570+ online shops

CyberCrime

Net-security

8.7.20

Credit-Card Skimmer Has Unlikely Target: Microsoft ASP.NET Sites

CyberCrime

Threatpost

8.7.20

Citrix Bugs Allow Unauthenticated Code Injection, Data Theft

Vulnerebility

Threatpost

8.7.20

Cerberus Banking Trojan Unleashed on Google Play

Android

Threatpost

8.7.20

Keeper Threat Group Rakes in $7M from Hundreds of Compromised E-Commerce Sites

Hacking

Threatpost

8.7.20

BEC Hotshot with Opulent Social Media Presence to Face U.S. Charges

Spam

Threatpost

8.7.20

First-Ever Russian BEC Gang, Cosmic Lynx, Uncovered

Spam

Threatpost

8.7.20

Malicious app in Google Play used to deliver Cerberus Banking Trojan

Android

Securityaffairs

8.7.20

SentinelOne released free decryptor for ThiefQuest ransomware

Ransomware

Securityaffairs

8.7.20

New release of Lampion trojan spreads in Portugal with some improvements on the VBS downloader

Virus

Securityaffairs

8.7.20

Project Freta, a free service that allows finding malware in OS memory snapshots

Security

Securityaffairs

8.7.20

Cerberus Banking Trojan Delivered via App Hosted on Google Play

Android

Securityweek

8.7.20

Feds Unseal 2018 Indictment Charging Kazakh Man in Hacks

BigBrothers

Securityweek

8.7.20

Citrix Patches 11 Vulnerabilities in Networking Products

Vulnerebility

Securityweek

8.7.20

Microsoft Files Lawsuit to Seize Fake Domains Used in COVID-19-Themed BEC Attacks

Spam

Securityweek

8.7.20

Citrix Issues Critical Patches for 11 New Flaws Affecting Multiple Products

Vulnerebility

Thehackernews

8.7.20

Attackers are bypassing F5 BIG-IP RCE mitigation – you might want to patch after all

Attack

Net-security

8.7.20

If You Want Something Done Right, You Have To Do It Yourself... Malware Too!

Virus

SANS

8.7.20

How do I select an application security testing solution for my business?

Security

Net-security

8.7.20

Tech businesses must rethink their IT infrastructure

Security

Net-security

8.7.20

MongoDB is subject to continual attacks when exposed to the internet

Attack

Net-security

8.7.20

Exposing the privacy risks of home security cameras

Privacy

Net-security

7.7.20

Authors of Purple Fox EK adds 2 Microsoft exploits

Exploit

Securityaffairs

7.7.20

EDP Renewables North America Discloses Data Breach

Safety

Securityweek

7.7.20

Purple Fox Exploit Kit Targets Vulnerabilities Linked to DarkHotel Group

Exploit

Securityweek

7.7.20

Free Microsoft Service Looks at OS Memory Snapshots to Find Malware

Security

Securityweek

7.7.20

Britain Set to Axe Huawei 5G Involvement: Report

BigBrothers

Securityweek

7.7.20

Nigerian Instagram Star Extradited to U.S. Over Role in Cybercrime Schemes

Crime

Securityweek

7.7.20

BIG-IP Vulnerability Exploited to Deliver DDoS Malware

Exploit  Virus  Vulnerebility

Securityweek

7.7.20

China Urges 'Fair' Treatment After France Restricts Huawei

BigBrothers

Securityweek

7.7.20

Microsoft Launches Free Linux Forensics and Rootkit Malware Detection Service

Security

Thehackernews

7.7.20

RedRum Decryptor

Anti-Ramson Tool

Anti-Ramson Tool

7.7.20

Admins Urged to Patch Critical F5 Flaw Under Active Attack

Attack

Threatpost

7.7.20

Purple Fox EK Adds Microsoft Exploits to Arsenal

Exploit

Threatpost

7.7.20

Lazarus Group Adds Magecart to the Mix

APT

Threatpost

7.7.20

Android Users Hit with ‘Undeletable’ Adware

Android

Threatpost

7.7.20

Ransomware infected systems at Xchanging, a DXC subsidiary

Ransomware

Securityaffairs

7.7.20

Unsecured Chinese companies leak users’ sensitive personal and business data

BigBrothers

Securityaffairs

7.7.20

Former Yahoo! employee who accessed 6K accounts avoids jail

Crime

Securityaffairs

7.7.20

Facebook, Others, Block Govt Requests on Hong Kong User Data

Social

Securityweek

7.7.20

Try2Cry Ransomware Spreads via USB Drives

Ransomware

Securityweek

7.7.20

Summary of CVE-2020-5902 F5 BIG-IP RCE Vulnerability Exploits

Exploit  Vulnerebility

SANS

7.7.20

Better cybersecurity hinges on understanding actual risks and addressing the right problems

Cyber

Net-security

7.7.20

Business efficiency metrics are more important than detection metrics

Security

Net-security

7.7.20

Elasticsearch security: Understand your options and apply best practices

Security

Net-security

7.7.20

Researchers discover how to pinpoint the location of a malicious drone operator

Virus

Net-security

7.7.20

Global data center networking market to reach $40.9 billion by 2025

Security

Net-security

6.7.20

North Korean Lazarus APT stole credit card data from US and EU stores

APT

Securityaffairs

6.7.20

Threat actors are attempting to exploit recently fixed F5 BIG-IP flaw

Exploit

Securityaffairs

6.7.20

Former Yahoo! Employee Avoids Jail After Hacking User Accounts

Crime

Securityweek

6.7.20

NSA Publishes Recommendations on Securing IPsec VPNs

BigBrothers

Securityweek

6.7.20

Magecart Attacks on Claire's and Other U.S. Stores Linked to North Korea

BigBrothers

Securityweek

6.7.20

Nigerian Man Charged With Cyber Fraud Against US Companies

Crime

Securityweek

6.7.20

Cato MDR: Managed Threat Detection and Response Made Easy

Safety

Thehackernews

6.7.20

Pig in a poke: smartphone adware

Android

Securelist

6.7.20

Hackers Start Exploiting Recently Patched BIG-IP Vulnerability

Exploit  Vulnerebility

Securityweek

6.7.20

Huawei Not Totally Banned From France, Says Watchdog: Report

BigBrothers

Securityweek

6.7.20

CVE-2020-5902 F5 BIG-IP Exploitation Attempt

Vulnerebility

SANS

6.7.20

Data exfiltration: The art of distancing

Security

Net-security

6.7.20

Cybersecurity software sales and training in a no-touch world

Cyber

Net-security

6.7.20

Review: Cybersecurity Threats, Malware Trends, and Strategies

Cyber

Net-security

6.7.20

Managers and employees support digital transformation, but see room for improvement

Security

Net-security

5.7.20

Critical RCE Flaw (CVSS 10) Affects F5 BIG-IP Application Security Servers

Vulnerebility

Thehackernews

5.7.20

US Cyber Command urges F5 customers to fix critical flaw in BIG-IP product

BigBrothers  Vulnerebility

Securityaffairs

5.7.20

European police infiltrate and dismantled EncroChat chat network

CyberCrime

Securityaffairs

5.7.20

Try2Cry ransomware implements wormable capability to infect other Windows systems

Ransomware

Securityaffairs

4.7.20

Police Arrested Hundreds of Criminals After Hacking Into Encrypted Chat Network

CyberCrime

Thehackernews

4.7.20

Critical Apache Guacamole Flaws Put Remote Desktops at Risk of Hacking

Vulnerebility

Thehackernews

4.7.20

Microsoft Releases Urgent Windows Update to Patch Two Critical Flaws

Vulnerebility

Thehackernews

4.7.20

A New Ransomware Targeting Apple macOS Users Through Pirated Apps

Ransomware

Thehackernews

4.7.20

US Senate Panel OKs Online Child Protection Bill Amid Privacy Fears

BigBrothers  Privacy

Securityweek

4.7.20

Cyberattacks Possibly Involved in Explosions at Iranian Nuclear, Military Facilities

BigBrothers

Securityweek

4.7.20

Apache Guacamole Vulnerabilities Facilitate Attacks on Enterprises

Vulnerebility

Securityweek

4.7.20

ICS-Targeting Snake Ransomware Isolates Infected Systems Before Encryption

Ransomware

Securityweek

4.7.20

CISA Warns Enterprises of Risks Associated With Tor

Safety

Securityweek

4.7.20

Cisco Discloses Details of Chrome, Firefox Vulnerabilities

Vulnerebility

Securityweek

4.7.20

Alleged cyber attacks caused fire and explosions at nuclear and military facilities in Iran

Attack

Securityaffairs

4.7.20

Hackers are targeting unsecured MongoDB database

Hacking

Securityaffairs

4.7.20

Sodinokibi Ransomware Operators hit electrical energy company Light S.A.

Ransomware

Securityaffairs

4.7.20

Maze Ransomware operators hacked Highways Authority Of India (Nhai)

Ransomware

Securityaffairs

4.7.20

Cisco addresses flaws in Small Business Routers and Switches

Vulnerebility

Securityaffairs

4.7.20

Critical Apache Guacamole flaws expose organizations at risk of hack

Vulnerebility

Securityaffairs

4.7.20

Netgear is releasing fixes for ten issues affecting 79 products

Vulnerebility

Securityaffairs

4.7.20

The U.S. FCC considers Huawei and ZTE as national security threats

BigBrothers

Securityaffairs

4.7.20

New EvilQuest ransomware targets macOS users

Ransomware

Securityaffairs

4.7.20

Microsoft releases emergency security updates to fix Windows codecs

Vulnerebility

Securityaffairs

4.7.20

Maze Ransomware operators hacked the Xerox Corporation

Ransomware

Securityaffairs

4.7.20

Morocco Asks Amnesty for Proof It Used Spyware on Journalist

Virus

Securityweek

4.7.20

Enterprises in Americas, Europe Targeted With Valak Information Stealer

Virus

Securityweek

4.7.20

Ransomware Operators Demand $14 Million From Power Company

Ransomware

Securityweek

4.7.20

Serious Vulnerabilities in F5's BIG-IP Allow Full System Compromise

Vulnerebility

Securityweek

4.7.20

Chinese Hackers Target Uyghurs With Multiple Android Surveillance Tools

Android  BigBrothers

Securityweek

4.7.20

Cisco Patches Vulnerabilities in Small Business Routers, Switches

Vulnerebility

Securityweek

4.7.20

European Police Shut Criminal Phone Network Used to Plan Murders

CyberCrime

Securityweek

4.7.20

ThiefQuest Mac Malware Includes Ransomware, Data Theft Capabilities

Ransomware

Securityweek

4.7.20

Zoom Got Big Fast. Then Videobombers Made It Rework Security

Security

Securityweek

6.20

Advanced StrongPity Hackers Target Syria and Turkey with Retooled Spyware

BigBrothers

Thehackernews

6.20

Russian Hacker Gets 9-Year Jail for Running Online Shop of Stolen Credit Cards

CyberCrime

Thehackernews

6.20

e-Commerce Site Hackers Now Hiding Credit Card Stealer Inside Image Metadata

CyberCrime

Thehackernews

6.20

'Satori' IoT DDoS Botnet Operator Sentenced to 13 Months in Prison

BotNet  Crime

Thehackernews

6.20

WikiLeaks Founder Charged With Conspiring With LulzSec & Anonymous Hackers

Hacking

Thehackernews

6.20

Docker Images Containing Cryptojacking Malware Distributed via Docker Hub

Cryptocurrency

Thehackernews

6.20

Critical Bugs and Backdoor Found in GeoVision's Fingerprint and Card Scanners

Vulnerebility

Thehackernews

6.20

New Privacy Features Added to the Upcoming Apple iOS 14 and macOS Big Sur

Apple

Thehackernews

6.20

Hackers Using Google Analytics to Bypass Web Security and Steal Credit Cards

Hacking

Thehackernews

6.20

Hackers Leaked 269 GB of U.S. Police and Fusion Centers Data Online

BigBrothers  Incindent

Thehackernews

6.20

Over 100 New Chrome Browser Extensions Caught Spying On Users

Virus

Thehackernews

6.20

InvisiMole Hackers Target High-Profile Military and Diplomatic Entities

BigBrothers

Thehackernews

6.20

Hackers Target Military and Aerospace Staff by Posing as HRs Offering Jobs

BigBrothers

Thehackernews

6.20

New Ripple20 Flaws Put Billions of Internet-Connected Devices at Risk of Hacking

Vulnerebility

Thehackernews

6.20

Oracle E-Business Suite Flaws Let Hackers Hijack Business Operations

Vulnerebility

Thehackernews

6.20

New Mobile Internet Protocol Vulnerabilities Let Hackers Target 4G/5G Users

Mobil

Thehackernews

6.20

Spies Can Listen to Your Conversations by Watching a Light Bulb in the Room

BigBrothers

Thehackernews

6.20

A Bug in Facebook Messenger for Windows Could've Helped Malware Gain Persistence

Social

Thehackernews

6.20

Intel CPUs Vulnerable to New 'SGAxe' and 'CrossTalk' Side-Channel Attacks

Attack

Thehackernews

6.20

Indian IT Company Was Hired to Hack Politicians, Investors, Journalists Worldwide

Hacking

Thehackernews

6.20

SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol

Attack

Thehackernews

6.20

Microsoft Releases June 2020 Security Patches For 129 Vulnerabilities

Vulnerebility

Thehackernews

6.20

Magecart Targets Emergency Services-related Sites via Insecure S3 Buckets

CyberCrime

Thehackernews

6.20

Any Indian DigiLocker Account Could've Been Accessed Without Password

Hacking

Thehackernews

6.20

New USBCulprit Espionage Tool Steals Data From Air-Gapped Computers

Attack

Thehackernews

6.20

Two Critical Flaws in Zoom Could've Let Attackers Hack Systems via Chat

Vulnerebility

Thehackernews

6.20

Newly Patched SAP ASE Flaws Could Let Attackers Hack Database Servers

Vulnerebility

Thehackernews

6.20

Critical VMware Cloud Director Flaw Lets Hackers Take Over Corporate Servers

Vulnerebility

Thehackernews

6.20

How to Create a Culture of Kick-Ass DevSecOps Engineers

IT

Thehackernews

6.20

Joomla Resources Directory (JRD) Portal Suffers Data Breach

Incindent

Thehackernews

6.20

Critical 'Sign in with Apple' Bug Could Have Let Attackers Hijack Anyone's Account

Hacking

Thehackernews

6.20

New Noise-Resilient Attack On Intel and AMD CPUs Makes Flush-based Attacks Effective

Attack

Thehackernews

6.20

Exclusive – Any Mitron (Viral TikTok Clone) Profile Can Be Hacked in Seconds

Hacking

Thehackernews

6.20

Magnitude exploit kit – evolution

Exploit

Securelist

6.20

Oh, what a boot-iful mornin’

Virus

Securelist

6.20

Web skimming with Google Analytics

CyberCrime

Securelist

6.20

Microcin is here

APT

Securelist

6.20

Do cybercriminals play cyber games during quarantine?

CyberCrime

Securelist

6.20

Explicit content and cyberthreats: 2019 report

Cyber

Securelist

6.20

Looking at Big Threats Using Code Similarity. Part 1

Security

Securelist

6.20

Cycldek: Bridging the (air) gap

APT  Attack

Securelist

6.20

Kids on the Web in 2020

Safety

Securelist

Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Virus  Vulnerebility