Home  2019  2018  2017  2016  1  2  3  4  5  6  7

Date

Name

Category

Web

24.10.19

Office 365 Adds Malware ZAP Toggle to Security & Compliance Center

Security

Bleepingcomputer

24.10.19

New CPDoS Web Cache Poisoning Attacks Impact Sites Using Popular CDNs

Attack

Bleepingcomputer

24.10.19

Windows 10 Insider Build 19008 Released With Fixes

OS

Bleepingcomputer

24.10.19

Chrome 78 Released With DoH Trial, Tab Hover Cards, and More

Security

Bleepingcomputer

24.10.19

U.S. Superior Court Systems Hacked to Spread Phishing Emails

Phishing

Bleepingcomputer

24.10.19

MedusaLocker Ransomware Wants Its Share of Your Money

Ransomware

Bleepingcomputer

24.10.19

Scammers Behind €10 Million BEC Fraud Arrested in Spain

Spam

Bleepingcomputer

24.10.19

Billing Provider Billtrust Suffers Outage After Malware Attack

Virus

Bleepingcomputer

24.10.19

Firefox 70 Released with In-Browser Data Breach Notifications

Security

Bleepingcomputer

24.10.19

Retina-X Banned by FTC From Selling Their ‘Stalking’ Apps

Mobil

Bleepingcomputer

24.10.19

Researchers Analyze North Korea-Linked NukeSped RAT

Virus

Securityweek

24.10.19

Click-Fraud Trojan Found in Apple App Store

Apple

Securityweek

24.10.19

18 iOS apps with stealthy ad clicking code removed from App Store

Apple

Net-security

24.10.19

Swedish Government grants police the use of spyware against violent crime suspects

BigBrothers

Securityaffairs

24.10.19

Some ICS Security Incidents Resulted in Injury, Loss of Life: Survey

ICS

Securityweek

24.10.19

Data Security Firm Very Good Security (VGS) Raises $35 Million

IT

Securityweek

24.10.19

DDoS Attack Hits Amazon Web Services

Attack

Securityweek

24.10.19

42 Adware Apps with 8 Million Downloads Traced Back to Vietnamese Student

Android

Thehackernews

24.10.19

Samsung Galaxy S10 Banned by Banks Due to Buggy Fingerprint Reader

Mobil

Bleepingcomputer

24.10.19

Malicious Apps on Alexa or Google Home Can Spy or Steal Passwords

Android

Bleepingcomputer

24.10.19

Russian Hackers Use Iranian Threat Group's Tools, Servers as Cover

CyberCrime

Bleepingcomputer

24.10.19

Hacker Breached Servers Belonging to Multiple VPN Providers

Incindent

Bleepingcomputer

24.10.19

Office 365 Now Warns About Suspicious Emails with Unverified Senders

Spam

Bleepingcomputer

24.10.19

New Windows 10 Secured-Core PCs Block Firmware-Level Attacks

OS

Bleepingcomputer

24.10.19

Chinese Hackers Use New Malware to Backdoor Microsoft SQL Servers

BigBrothers  Virus

Bleepingcomputer

24.10.19

Hackers Breach Avast Antivirus Network Through Insecure VPN Profile

Incindent

Bleepingcomputer

24.10.19

Tools and Tactics of the Sodinokibi Ransomware Distributors

Ransomware

Bleepingcomputer

24.10.19

How to Update Windows 10 Drivers Manually

OS

Bleepingcomputer

24.10.19

Firefox, Chrome Bugs Allow Arbitrary Code-Execution

Vulnerebility

Threatpost

24.10.19

No ‘Silver Bullet’ Fix for Alexa, Google Smart Speaker Hacks

Hacking

Threatpost

24.10.19

Fujitsu Wireless Keyboard Plagued By Unpatched Flaws

Vulnerebility

Threatpost

24.10.19

Survey Finds People are Privacy Hypocrites

Privacy

Threatpost

24.10.19

Bedside Hotel Robot Hacked to Stream In-Room Video

Hacking

Threatpost

24.10.19

ThreatList: Google’s Advertising Network Dominates Global Data Collection

IT

Threatpost

24.10.19

15 Years Later, Metasploit Still Manages to be a Menace

Hacking

Threatpost

24.10.19

FTC Cracks Down on Stalkerware With Retina-X App Bans

BigBrothers

Threatpost

24.10.19

Open Redirect Bug in Bridge Theme Plugin Opens Admins to Spearphishing

Phishing

Threatpost

24.10.19

Magecart 5 Linked to Carbanak Gang

CyberCrime

Threatpost

24.10.19

FBI and DHS CISA issue alerts on e-skimming attacks

BigBrothers

Securityaffairs

24.10.19

Phishing attacks are a complex problem that requires layered solutions

Phishing

Net-security

24.10.19

Data collectors

Security

Securelist

24.10.19

Texas man sentenced to 145 months in federal prison for hacking Los Angeles Superior Court

Crime

Securityaffairs

24.10.19

Trend Micro Patches Code Execution Vulnerability in Anti-Threat Toolkit

Vulnerebility

Securityweek

24.10.19

Cyberattack Causes Serious Disruptions at German Automation Firm Pilz

CyberCrime

Securityweek

24.10.19

Multiple D-Link routers vulnerable to remote command execution

Alert

Alert

24.10.19

Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?

Security

SANS

24.10.19

VisibleV8: Stealthy open source tool for monitoring JavaScript in the wild

Security

Net-security

24.10.19

Top five tips for building smarter enterprise security

Security

Net-security

24.10.19

Rapid SaaS adoption compounds visibility concerns

Security

Net-security

24.10.19

5G adoption is expected to rapidly gather pace in North America

Mobil

Net-security

23.10.19

Experts found DLL Hijacking issues in Avast, AVG, and Avira solutions

Hacking

Securityaffairs

23.10.19

Robots at HIS Group are vulnerable to hack

Vulnerebility

Securityaffairs

23.10.19

Exploring the CPDoS attack on CDNs: Cache Poisoned Denial of Service

Attack  Exploit

Securityaffairs

23.10.19

Texas Man Gets 145 Months in Prison for Hacking LA Superior Court

Crime

Securityweek

23.10.19

Chrome 78 Released With DoH, 37 Security Patches

Security

Securityweek

23.10.19

Maxthon Browser Vulnerability Can Help Attackers in Post-Exploitation Phase

Exploit  Vulnerebility

Securityweek

23.10.19

Avast, Avira Products Vulnerable to DLL Hijacking

Hacking

Securityweek

23.10.19

Tech, Security Firms Launch Operational Technology Cyber Security Alliance

Security

Securityweek

23.10.19

New Cache Poisoning Attack Lets Attackers Target CDN Protected Sites

Attack

Thehackernews

23.10.19

Experts believe the Magecart Group 5 could be linked to the Carbanak APT

APT

Securityaffairs

23.10.19

Autoclerk travel reservations platform data leak also impacts US Government and military

BigBrothers  Incindent

Securityaffairs

23.10.19

pilz-ransomware-attack

Ransomware

Securityaffairs

23.10.19

Trend Micro Anti-Threat Toolkit could be used to run malware on Win PCs

Safety

Securityaffairs

23.10.19

New Variant of Gustuff Android Banking Trojan Emerges

Virus

Securityweek

23.10.19

Microsoft Invests in Securing Device Firmware

Security

Securityweek

23.10.19

New Winnti Backdoor Targets Microsoft SQL

Virus

Securityweek

23.10.19

Historical Breadcrumbs Link Magecart 5 to Carbanak Group

CyberCrime

Securityweek

23.10.19

Microsoft Launches ElectionGuard Bug Bounty Program

Security

Securityweek

23.10.19

New Azure AD Feature Detects Unauthorized Access Attempts

Security

Securityweek

23.10.19

Testing TLSv1.3 and supported ciphers

Crypto

SANS

23.10.19

How to remove human error from the cyber risk equation

Security

Net-security

23.10.19

Firefox 70 lets users track online trackers

Security

Net-security

23.10.19

How to reduce the risk posed by vulnerabilities in IoT/ICS networks?

ICS  IoT  Vulnerebility

Net-security

23.10.19

A data breach could be game over for a brand

Incindent

Net-security

23.10.19

Chance that flaws will ever be dealt with diminishes the longer they stick around

Security

Net-security

23.10.19

Analysts explore the top strategic technology trends for 2020

Security

Net-security

22.10.19

Microsoft debuts hardware-rooted security for foiling firmware attacks

Attack

Net-security

22.10.19

NordVPN, TorGuard, and VikingVPN VPN providers disclose security breaches

Incindent

Securityaffairs

22.10.19

Outdated OSs Still Present in Many Industrial Organizations: Report

ICS

Securityweek

22.10.19

Stealthy Microsoft SQL Server Backdoor Malware Spotted in the Wild

Virus

Thehackernews

22.10.19

NordVPN Breach FAQ – What Happened and What's At Stake?

Incindent

Thehackernews

22.10.19

Turla Compromises, Infiltrates Iranian APT Infrastructure

APT

Threatpost

22.10.19

New Way Found to Use Alexa, Google to ‘Voice Phish’ and Eavesdrop on Users

Phishing

Threatpost

22.10.19

Avast Network Breached As Hackers Target CCleaner Again

Incindent

Threatpost

22.10.19

Gustuff Android Banker Switches Up Technical Approach

Android

Threatpost

22.10.19

U.S. Government, Military Personnel Data Leaked By Autoclerk

BigBrothers

Threatpost

22.10.19

Czech Police and Intelligence agency dismantled Russian Spy ring on its soil

BigBrothers

Securityaffairs

22.10.19

Winnti APT group uses skip-2.0 malware to control Microsoft SQL Servers

APT

Securityaffairs

22.10.19

Facebook Steps Up Security Amid Fresh Signs of Russia Meddling

Social

Securityweek

22.10.19

TorGuard, NordVPN Respond to Breach Reports

Incindent

Securityweek

22.10.19

Google Boosts Site Isolation in Chrome

Security

Securityweek

22.10.19

New Cybersecurity Bills Promote CISOs and Privacy

Cyber

Securityweek

22.10.19

Trend Micro Acquires Cloud Security Firm Cloud Conformity

IT

Securityweek

22.10.19

What's up with TCP 853 (DNS over TLS)?

Security

SANS

22.10.19

Why organizations must arm their SOCs for the future

Security

Net-security

22.10.19

Perceptions on the impact of data breaches and identity protection

Incindent

Net-security

22.10.19

How the under 30s expect new approaches to cybersecurity

Cyber

Net-security

22.10.19

How much organizations are investing in analytics and why

Security

Net-security

22.10.19

Targeted online messaging dissuading young gamers from getting involved in cybercrime

Security

Net-security

22.10.19

Whitepaper: Make smarter decisions by using orchestration with intelligence

Security

Net-security

21.10.19

Avast breached by hackers who wanted to compromise CCleaner again

Incindent

Net-security

21.10.19

Avast internal network breached for the second time by sophisticated hackers

Incindent

Securityaffairs

21.10.19

UK/US investigation revealed that Russian Turla APT masqueraded as Iranian hackers

APT  BigBrothers

Securityaffairs

21.10.19

Georgia County's Experience Shows Perils of Ransomware

Ransomware

Securityweek

21.10.19

Czech Police, Intelligence Bust Russian Spy Network

Incindent

Securityweek

21.10.19

Avast Discloses New Supply-Chain Attack Attempt

Incindent

Securityweek

21.10.19

US, UK: Russian Hackers Hijacked Iranian Malware, Infrastructure

BigBrothers

Securityweek

21.10.19

Public, Election Officials May Be Kept in the Dark on Hacks

Cyber

Securityweek

21.10.19

Hackers stole card details from BriansClub carding site

Hacking

Securityaffairs

21.10.19

TA505 cybercrime group use SDBbot RAT in recent campaigns

CyberCrime

Securityaffairs

21.10.19

US Army stopped using floppy disks as storage for SACCS system that manages nuclear weapons arsenal

BigBrothers

Securityaffairs

21.10.19

Scanning Activity for NVMS-9000 Digital Video Recorder

Hacking

SANS

21.10.19

How cybersecurity accelerates business growth

Cyber

Net-security

21.10.19

Deepfakes and voice as the next data breach

Incindent

Net-security

21.10.19

AI and ML will become important for how organizations run their digital systems

Security

Net-security

21.10.19

Spending on security hardware, software, and services continues to increase

Security

Net-security

21.10.19

Webinar: Application Protection and Performance Monitoring Using Datadog + Signal Sciences

Security

Net-security

20.10.19

Hackers Backdoor Sites by Hiding Fake WordPress Plugins

Hacking

Bleepingcomputer

20.10.19

Maze Ransomware Now Delivered by Spelevo Exploit Kit

Ransomware

Bleepingcomputer

20.10.19

Microsoft 365 Authentication Outage, Users Unable to Login

Security

Bleepingcomputer

20.10.19

STOP Ransomware Decryptor Released for 148 Variants

Ransomware

Bleepingcomputer

20.10.19

REvil Ransomware Affiliates Partner with Corporate Intruders

Ransomware

Bleepingcomputer

20.10.19

Graboid: First-Ever Cryptojacking Worm Found in Images on Docker Hub

Cryptocurrency blog

Palo Alto Unity42

20.10.19

Blackremote: Money Money Money – A Swedish Actor Peddles an Expensive New RAT

Malware blog

Palo Alto Unity42

20.10.19

More xHunt – New PowerShell Backdoor Blocked Through DNS Tunnel Detection

Malware blog

Palo Alto Unity42

20.10.19

Exploits in the Wild for vBulletin Pre-Auth RCE Vulnerability CVE-2019-16759

Exploit blog

Palo Alto Unity42

20.10.19

PKPLUG: Chinese Cyber Espionage Group Attacking Asia

BigBrother blog

Palo Alto Unity42

20.10.19

Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)

Vulnerebility blog

Palo Alto Unity42

20.10.19

The Legend of Adwind: A Commodity RAT Saga in Eight Parts

Malware blog

Palo Alto Unity42

20.10.19

CCPA: What You Need to Know for Public Cloud

Security blog

Palo Alto

20.10.19

Analysis of Two Newly Patched Kubernetes Vulnerabilities

Vulnerebility blog

Palo Alto

20.10.19

Zingbox IoT Guardian: The Only IoT Cyber Insurance Winner Recognized in the...

IoT blog

Palo Alto

20.10.19

How to Protect Organizations, Customers and National Security: Federal Igni...

Security blog

Palo Alto

20.10.19

Cyber Canon Book Review: Avogadro Corp: The Singularity Is Closer than It A...

Security blog

Palo Alto

20.10.19

Introducing Demisto v5.0: SOAR Just Got Better

Security blog

Palo Alto

20.10.19

The Top 5 Mobile Security Threats and How to Mitigate Them

Hardware blog

Palo Alto

20.10.19

SSL/TLS Decryption Can Help with GDPR Compliance

Security blog

Palo Alto

20.10.19

Upgrade Notice for Customers Using PAN-OS 9.0 and VM-Series on Azure

Safety blog

Palo Alto

20.10.19

Fake iPhone jailbreaking scam sends users to click-fraud site

OS Blog

Avast blog

20.10.19

Iranian hackers host malicious ‘Hire Military Heroes’ site

BigBrother blog

Avast blog

20.10.19

Russian hacker pleads guilty in ‘massive’ stock market cyberattack

Cyber blog

Avast blog

20.10.19

Some medical devices could be hacked, FDA warns

Hacking blog

Avast blog

20.10.19

German ransomware victim hacks back

Ransomware blog

Avast blog

20.10.19

The good, the bad, and the ugly of Cybersecurity Awareness Month

Security blog

Avast blog

20.10.19

How to Protect Multi-Cloud Environments with a Virtual Firewall

Security blog

Sonicwall

20.10.19

What Assumptions Are You Making?

Cyber

SANS

20.10.19

Fake updraftplus wordpress plugins

Vulnerebility

Securityaffairs

20.10.19

A critical Linux Wi-Fi bug could be exploited to fully compromise systems

Vulnerebility

Securityaffairs

20.10.19

Hundreds of millions of UC Browser Android Users Exposed to MiTM Attacks. Again.

Android

Securityaffairs

20.10.19

Emsisoft released a free decryption tool for the STOP (Djvu) ransomware

Ransomware

Securityaffairs

19.10.19

STOP Djvu Decryptor

Anti-Ransom Tool

Anti-Ransom Tool

19.10.19

Windows 10 KB4520062 Update May Break Microsoft Defender ATP

OS

Bleepingcomputer

19.10.19

Malicious Tor Browser Steals Cryptocurrency from Darknet Market Users

Cryptocurrency

Bleepingcomputer

19.10.19

Fake WordPress Plugin Comes with Cryptocurrency Mining Function

Cryptocurrency

Bleepingcomputer

19.10.19

500+ Million UC Browser Android Users Exposed to MiTM Attacks. Again.

Android

Bleepingcomputer

19.10.19

Microsoft Adds Azure AD Sign-In History to Detect Unusual Activity

Security

Bleepingcomputer

19.10.19

Samsung to Patch Fingerprint Scanner Against Silicone Case Unlock Bug

Mobil

Bleepingcomputer

19.10.19

Google Chrome 77 Added New Site Isolation Security Features

Safety

Bleepingcomputer

19.10.19

European Airport Systems Infected With Monero-Mining Malware

Cryptocurrency

Bleepingcomputer

19.10.19

Cozy Bear Russian Hackers Spotted After Staying Undetected for Years

APT

Bleepingcomputer

19.10.19

Stripe Users Targeted in Phishing Attack That Steals Banking Info

Phishing

Bleepingcomputer

19.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Follow The Money

Ransomware blog

Mcafee blog

19.10.19

Definitive Dossier of Devilish Debug Details – Part Deux: A Didactic Deep Dive into Data Driven Deductions

Security blog

FireEye

19.10.19

LOWKEY: Hunting for the Missing Volume Serial ID

Security blog

FireEye

19.10.19

In the Footsteps of a Sextortion Campaign

Cyber blog

Checkpoint

19.10.19

Pony’s C&C servers hidden inside the Bitcoin blockchain

Cryptocurrency blog

Checkpoint

19.10.19

Vulnerability Spotlight: Multiple vulnerabilities in YouPHPTube

Vulnerebility blog

Cisco Talos

19.10.19

Vulnerability Spotlight: Another fix for Adobe Acrobat Reader DC text field value remote code execution

Vulnerebility blog

Cisco Talos

19.10.19

Checkrain fake iOS jailbreak leads to click fraud

OS Blog

Cisco Talos

19.10.19

Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser

Malware blog

Eset

19.10.19

What was wrong with Alexa? How Amazon Echo and Kindle got KRACKed

Hacking blog

Eset

19.10.19

Operation Ghost: The Dukes aren’t back – they never left

Hacking blog

Eset

19.10.19

Streaming devices track viewing habits, study finds

Security blog

Eset

19.10.19

Connecting the dots: Exposing the arsenal and methods of the Winnti Group

Hacking blog

Eset

19.10.19

Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise

Vulnerebility

Threatpost

19.10.19

Zappos Offers Users 10% Discount in 2012 Breach Settlement

Incindent

Threatpost

19.10.19

Major Airport Malware Attack Shines a Light on OT Security

Virus

Threatpost

19.10.19

Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent

Attack

Threatpost

19.10.19

Microsoft Tackles Election Security with Bug Bounties

Vulnerebility

Threatpost

19.10.19

Execs Could Face Jail Time For Privacy Violations

Privacy

Threatpost

19.10.19

Systems at Ingredients provider Ingredion infected with a Malware

Virus

Securityaffairs

19.10.19

Trojanized Tor Browser targets shoppers of Darknet black marketplaces

Virus

Securityaffairs

19.10.19

Microsoft to Reward Hackers for Finding Bugs in Open Source Election Software

Vulnerebility

Thehackernews

18.10.19

China-linked cyberspies Turbine PANDA targeted aerospace firms for years

BigBrothers

Securityaffairs

18.10.19

Pitney Bowes revealed that its systems were infected with Ryuk Ransomware

Ransomware

Securityaffairs

18.10.19

Ingredients Giant Ingredion Hit by Malware

Virus

Securityweek

18.10.19

Hackers Could Have Hijacked Trump Campaign Email Server

BigBrothers

Securityweek

18.10.19

Threat Intelligence Firm Flashpoint Raises $34 Million

IT

Securityweek

18.10.19

Cryptojacking worm compromised over 2,000 Docker hosts

Cryptocurrency

Net-security

18.10.19

Millions of Amazon Echo and Kindle Devices Affected by WiFi Bug

Vulnerebility

Bleepingcomputer

18.10.19

Firefox 70 Address Bar Gets New Security Indicators, Shames Insecure Sites

Security

Bleepingcomputer

18.10.19

Windows 10 1909 Is Almost Ready, What Developers Need to Know

OS

Bleepingcomputer

18.10.19

Google News Is Experiencing Indexing Issues With New Content

Security

Bleepingcomputer

18.10.19

Attackers Hide Backdoors and Cryptominers in WAV Audio Files

Cryptocurrency

Bleepingcomputer

18.10.19

Security Health Analytics Helps Secure Google Cloud, Hits Beta

Security

Bleepingcomputer

18.10.19

Unsecured Docker Hosts Attacked by New Graboid Cryptojacking Worm

Cryptocurrency

Bleepingcomputer

18.10.19

Malware Uses Your PC to Send 30K Sextortion Emails Per Hour

Spam  Virus

Bleepingcomputer

18.10.19

New SDBot Remote Access Trojan Used in TA505 Malspam Campaigns

Spam  Virus

Bleepingcomputer

18.10.19

Domain Typosquatters Target the 2020 Presidential Election

BigBrothers

Bleepingcomputer

18.10.19

Researcher released PoC exploit code for CVE-2019-2215 Android zero-day flaw

Android

Securityaffairs

18.10.19

Chinese Hackers Targeted International Aerospace Firms for Years

BigBrothers

Securityweek

18.10.19

Massachusetts Governor Announces New Cybersecurity Program

BigBrothers

Securityweek

18.10.19

Researcher Publishes PoC Exploit for Recent Android Zero-Day

Android  Exploit

Securityweek

18.10.19

Quick Malicious VBS Analysis

Virus

SANS

18.10.19

Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS

Attack  Vulnerebility

Threatpost

18.10.19

Trump Campaign Website Left Open to Email Server Hijack

BigBrothers  Hacking

Threatpost

18.10.19

Cisco Aironet Access Points Plagued By Critical, High-Severity Flaws

Vulnerebility

Threatpost

18.10.19

Phorpiex Botnet Shifts Gears From Ransomware to Sextortion

BotNet

Threatpost

18.10.19

Hacking Back? BriansClub Dark Web Attack a Boon for Banks

Hacking

Threatpost

18.10.19

Microsoft Ending Support for Windows 7 and Windows Server 2008 R2

CERT

CERT

18.10.19

Cryptocurrency miners infected more than 50% of the European airport workstations

Cryptocurrency

Securityaffairs

18.10.19

Critical and high-severity flaws addressed in Cisco Aironet APs

Vulnerebility

Securityaffairs

18.10.19

Under New Ownership, DigiCert Expands into Verified Mark Certificates

Security

Securityweek

18.10.19

Pitney Bowes Says Disruptions Caused by Ryuk Ransomware

Ransomware

Securityweek

18.10.19

Indiana Hospital System Notifying Patients After Data Breach

Incindent

Securityweek

18.10.19

Russia's Security Service Says Rebuilding Ties With U.S.

BigBrothers

Securityweek

18.10.19

Chrome for Android Enables Site Isolation Security Feature for All Sites with Login

BigBrothers

Thehackernews

18.10.19

Six steps for implementing zero trust access

Security

Net-security

18.10.19

Security still top priority as more enterprises scale IoT solutions company-wide

IoT

Net-security

18.10.19

As car manufacturers focus on connectivity, hackers begin to exploit flaws

Exploit  Vulnerebility

Net-security

18.10.19

Review: The Great Hack

Security

Net-security

18.10.19

Companies are shifting spending to support their critical IT initiatives

Security

Net-security

17.10.19

Facebook Encourages Bug Hunting in Third-Party Services

Social

Bleepingcomputer

17.10.19

OnionShare Lets Anyone Host Anonymous Sites on the Dark Web

Cyber

Bleepingcomputer

17.10.19

Symantec Fixes Bad IPS Definitions That Cause a Windows BSOD

Vulnerebility

Bleepingcomputer

17.10.19

Windows 10 1809 Update KB4520062 Fixes a Startup Black Screen Issue

OS

Bleepingcomputer

17.10.19

cammers Use Fake Checkra1n iOS Jailbreak in Click Fraud Campaign

Apple

Bleepingcomputer

17.10.19

Adobe Fixes 45 Critical Vulnerabilities in Acrobat and Reader

Vulnerebility

Bleepingcomputer

17.10.19

What Your Personal Information is Worth to Cybercriminals

CyberCrime

Bleepingcomputer

17.10.19

Chinese Hackers Use New Cryptojacking Tactics to Evade Detection

Cryptocurrency

Bleepingcomputer

17.10.19

Samsung Galaxy S10 Fingerprint Reader Defeated by Silicone Case

Mobil  Privacy

Bleepingcomputer

17.10.19

Linux SUDO Bug Lets You Run Commands as Root, Most Installs Unaffected

Hacking

Bleepingcomputer

17.10.19

Researcher releases PoC rooting app that exploits recent Android zero-da

Android

Net-security

17.10.19

International operation dismantled largest Dark Web Child abuse site

Cyber

Securityaffairs

17.10.19

Instagram Unveils New Security Controls for Third-Party Apps

Social

Securityweek

17.10.19

Dridex Operators Use SDBbot RAT in Recent Attacks

Virus

Securityweek

17.10.19

Baltimore to Buy $20M in Cyber Insurance Months After Attack

Attack

Securityweek

17.10.19

Russian Hackers Silently Hit Government Targets for Years

BigBrothers

Securityweek

17.10.19

Phishing e-mail spoofing SPF-enabled domain

Phishing

SANS

17.10.19

Cisco fixes serious flaws in enterprise-grade Catalyst and Aironet access points

Vulnerebility

Net-security

17.10.19

Graboid the first-ever Cryptojacking worm that targets Docker Hub

Cryptocurrency

Securityaffairs

17.10.19

M6 Group, largest France private multimedia group, hit by ransomware attack

CyberCrime Ransomware

Securityaffairs

17.10.19

Critical Flaw Allows Unauthorized Access to Cisco Aironet APs

Vulnerebility

Securityweek

17.10.19

Feds Shut Down Largest Dark Web Child Abuse Site; South Korean Admin Arrested

BigBrothers

Thehackernews

17.10.19

When MacOS Catalina Comes to Life: The First Few Minutes of Network Traffic From MacOS 10.15.

Apple

SANS

17.10.19

Multiple vulnerabilities in Pulse Secure VPN

Alert

Alert

17.10.19

.WAVs Hide Malware in Their Depths in Innovative Campaign

Virus

Threatpost

17.10.19

Podcast: Departing Employees Could Mean Departing Data

Security

Threatpost

17.10.19

Cybercrime Tool Prices Bump Up in Dark Web Markets

CyberCrime

Threatpost

17.10.19

10 Steps for Ransomware Protection

Ransomware

Threatpost

17.10.19

Silent Librarian Retools Phishing Emails to Hook Student Credentials

Phishing

Threatpost

17.10.19

Docker Containers Riddled with Graboid Crypto-Worm

Cryptocurrency

Threatpost

17.10.19

Huawei Lashes Out at Estonia for 'Unfounded' Security Claims

BigBrothers

Securityweek

17.10.19

German 5G Rules Avoid Huawei Ban; US Warns on Intel Sharing

BigBrothers

Securityweek

17.10.19

'Graboid' Crypto-Jacking Worm Targets Docker Hosts

Cryptocurrency

Securityweek

17.10.19

Oracle's October 2019 Critical Patch Update Includes 219 Fixes

Vulnerebility

Securityweek

17.10.19

Huawei Says Nine-Month Revenue Up Despite US Pressure

BigBrothers

Securityweek

17.10.19

Key challenges impacting IT audit pros navigating an evolving risk landscape

Security

Net-security

17.10.19

MSPs face increased risks and opportunities to rethink cybersecurity

Cyber

Net-security

17.10.19

1 in 5 SMBs have fallen victim to a ransomware attack

Ransomware

Net-security

17.10.19

Executives are not actively engaged in ensuring the effectiveness of cybersecurity strategy

Security

Net-security

17.10.19

Do digital architects have the tools to make the most of transformative technologies?

Security

Net-security

17.10.19

WAV files spotted delivering malicious code

Virus

Net-security

16.10.19

Signature update for Symantec Endpoint protection crashed many device

Vulnerebility

Securityaffairs

16.10.19

Approaching the Reverse Engineering of a RFID/NFC Vending Machine

Security

Securityaffairs

16.10.19

WordPress 5.2.4 Patches Six Vulnerabilities

Vulnerebility

Securityweek

16.10.19

Facebook Expands, Enhances Bug Bounty Programs

Social

Securityweek

16.10.19

Symantec Endpoint Protection Update Causes Many Devices to Crash

Safety

Securityweek

16.10.19

Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers

BotNet

Thehackernews

16.10.19

Security Monitoring: At Network or Host Level?

Security

SANS

16.10.19

Adobe splats bucketful of bugs in Acrobat and Reader

Vulnerebility

Net-security

16.10.19

APT trends report Q3 2019

APT

Securelist

16.10.19

Hundreds of Fake Election Domains Target Democrats, Republicans

BigBrothers

Securityweek

16.10.19

Apple: Safari Does Not Send User Browsing History to China's Tencent

Apple

Securityweek

16.10.19

Facebook Now Pays Hackers for Reporting Security Bugs in 3rd-Party Apps

Social

Thehackernews

16.10.19

Fake iOS Jailbreak Site Lures in Apple Users

Apple

Threatpost

16.10.19

A Deepfake Deep Dive into the Murky World of Digital Imitation

Security

Threatpost

16.10.19

Sudo Bug Opens Root Access on Linux Systems

Vulnerebility

Threatpost

16.10.19

Pitney Bowes Hit with Ransomware Attack

Ransomware

Threatpost

16.10.19

Unencrypted Mobile Traffic on Tor Network Leaks PII

Crypto  Safety

Threatpost

16.10.19

On-Board ‘Mystery Boxes’ Threaten Global Shipping Vessels

Security

Threatpost

16.10.19

Chinese-speaking cybercrime gang Rocke changes tactics

BigBrothers  CyberSpy

Securityaffairs

16.10.19

Adobe out-of-band security updates address 82 flaws in 3 products

Vulnerebility

Securityaffairs

16.10.19

Click2Mail suffered a data breach that potentially impacts 200,000 registrants

Incindent

Securityaffairs

16.10.19

YARA's XOR Modifier

Security

SANS

16.10.19

Code dependency mapping’s role in securing enterprise software

Security

Net-security

16.10.19

Microsegmentation for refining safety systems

Safety

Net-security

16.10.19

Fake mobile app fraud tripled in first half of 2019

Mobil

Net-security

16.10.19

When properly managed, shadow IT can benefit your organization

Security

Net-security

16.10.19

How seriously are businesses taking their PKI security?

Security

Net-security

16.10.19

Consumer spending on technology forecast to reach $1.69 trillion in 2019

IT

Net-security

16.10.19

Download: IR Reporting for Management PPT template

Security

Net-security

16.10.19

Tamper Protection prevents malware from disabling Microsoft Defender AV

Safety  Virus

Net-security

16.10.19

“Smart city” governments should also be smart about security

BigBrothers

Net-security

15.10.19

Global Shipping and mailing services firm Pitney Bowes hit by ransomware attack

Ransomware

Securityaffairs

15.10.19

Adobe Patches Over 80 Vulnerabilities in Three Products

Vulnerebility

Securityweek

15.10.19

Fake 'checkra1n' iOS Jailbreak Offered in Click Fraud Scheme

Apple

Securityweek

15.10.19

Researchers Find New Backdoor Used by Winnti Hackers

Virus

Securityweek

15.10.19

Shadow IT Has Benefits Not Yet Fully Utilized by Business

Security

Securityweek

15.10.19

Microsoft Makes Tamper Protection in Defender ATP Generally Available

Security

Securityweek

15.10.19

Google's USB-C Titan Security Key Arrives in the U.S.

Security

Securityweek

15.10.19

Adobe Releases Out-of-Band Security Patches for 82 Flaws in Various Products

Vulnerebility

Thehackernews

15.10.19

Mozilla Rolls Out Code Injection Attack Protection in Firefox

Hacking

Bleepingcomputer

15.10.19

Global Shipping Firm Pitney Bowes Affected by Ransomware Attack

Ransomware

Bleepingcomputer

15.10.19

Facebook Users Being Locked Out After Reporting Fake Accounts

Social

Bleepingcomputer

15.10.19

Microsoft Office 2010 to Reach End of Support in One Year

Security

Bleepingcomputer

15.10.19

Winnti Group Uses New PortReuse Malware Against Asian Manufacturer

CyberCrime  Virus

Bleepingcomputer

15.10.19

Microsoft Now Enables Windows 10 Tamper Protection By Default

OS

Bleepingcomputer

15.10.19

Iranian Hackers Create Credible Phishing to Steal Library Access

BigBrothers

Bleepingcomputer

15.10.19

Sodinokibi Ransomware: Following the Affiliate Money Trail

Ransomware

Bleepingcomputer

15.10.19

How to Make Windows 10 Pause Updates for a Period of Time

OS

Bleepingcomputer

15.10.19

Creating Custom Windows Sandbox Configurations in Windows 10

OS

Bleepingcomputer

15.10.19

IoT: a malware story

IoT  Virus

Securelist

15.10.19

sudo flaw allows any users to run commands as Root on Linux

Vulnerebility

Securityaffairs

15.10.19

Winnti Group was planning a devastating supply-chain attack against Asian manufacturer

CyberCrime

Securityaffairs

15.10.19

Pitney Bowes Operations Disrupted by Ransomware Attack

Ransomware

Securityweek

15.10.19

Firefox Blocks Inline and Eval JavaScript on Internal Pages to Prevent Injection Attacks

Hacking

Thehackernews

15.10.19

Apple Shares Some Browsing History with Chinese Company

Apple

Threatpost

15.10.19

Is Emotet gang targeting companies with external SOC?

Virus

Securityaffairs

15.10.19

Privacy advocates criticize Apple for sharing some users browsing data with Tencent

Apple

Securityaffairs

15.10.19

Click2Mail Informs Users of Data Breach

Incindent

Securityweek

15.10.19

Mozilla Hardens Firefox Against Injection Attacks

Attack  Hacking

Securityweek

15.10.19

California Attorney General Outlines How State Will Enforce Upcoming Privacy Law

Privacy

Securityweek

15.10.19

Critical Flaw in Sophos Cyberoam Appliances Allows Remote Code Execution

Vulnerebility

Securityweek

15.10.19

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

Hacking

Thehackernews

15.10.19

Viewing cybersecurity incidents as normal accidents

Cyber  Incindent

Net-security

15.10.19

Product showcase: Alsid for AD

Security

Net-security

15.10.19

AI development has major security, privacy and ethical blind spots

Security

Net-security

15.10.19

Most expect the risk of privileged user abuse to increase

Security

Net-security

15.10.19

Free SOAR Platforms eBook

IT

Net-security

14.10.19

Iranian Hackers Create Credible Phishing to Steal Library Access

BigBrothers  Phishing

Bleepingcomputer

14.10.19

Sodinokibi Ransomware: Following the Affiliate Money Trail

Ransomware

Bleepingcomputer

14.10.19

How to Make Windows 10 Pause Updates for a Period of Time

OS

Bleepingcomputer

14.10.19

Creating Custom Windows Sandbox Configurations in Windows 10

OS

Bleepingcomputer

14.10.19

Alleged Hacker Arraigned on $1.4 Million Cryptocurrency Fraud Charges

Cryptocurrency

Securityweek

14.10.19

Majority of Simjacker Attacks Aimed at Mobile Phones in Mexico

Attack  Mobil

Securityweek

14.10.19

Thoma Bravo to Acquire Sophos for $3.9 Billion

IT

Securityweek

14.10.19

Analysis reveals the most common causes behind mis-issued SSL/TLS certificates

Crypto

Net-security

14.10.19

A glimpse into the present state of security in robotics

Security

Securelist

14.10.19

Imperva explains how hackers stole AWS API Key and accessed to customer data

Incindent

Securityaffairs

14.10.19

Talos experts found 11 flaws in Schneider Electric Modicon Controllers

ICS

Securityaffairs

14.10.19

Compromised AWS API Key Allowed Access to Imperva Customer Data

Incindent

Securityweek

14.10.19

Apple Under Fire Over Sending Some Users Browsing Data to China's Tencent

Apple

Thehackernews

14.10.19

Charming Kitten Campaign involved new impersonation methods

CyberCrime

Securityaffairs

14.10.19

Alabama Hospital chain paid ransom to resume operations after ransomware attack

Ransomware

Securityaffairs

14.10.19

A new Mac malware dubbed Tarmac has been distributed via malvertising campaigns

Apple

Securityaffairs

14.10.19

Amazon Calls for Government Regulation of Facial Recognition Tech

Security

Securityweek

14.10.19

5 things security executives need to know about insider threat

Security

Net-security

14.10.19

New data analysis approach could strengthen the security of IoT devices

IoT

Net-security

14.10.19

Researchers may have found a way to trace serial IP hijackers

Security

Net-security

14.10.19

70% of presidential campaigns fail to provide adequate online privacy and security protections

Security

Net-security

14.10.19

Consumers concerned about connected home privacy, still few implement safety practices

Privacy

Net-security

14.10.19

Webinar: Securing Web Layer Assets with Cloud WAF

Security

Net-security

13.10.19

Nitro PDF Pro to Get Micropatches for 7 Potential RCE Bugs

Vulnerebility

Bleepingcomputer

13.10.19

Attackers Create Elaborate Crypto Trading Scheme to Install Malware

Cryptocurrency

Bleepingcomputer

13.10.19

Windows 10 1903: Known Problems in the KB4517389 Update

OS

Bleepingcomputer

13.10.19

FIN7 Hackers Load New RAT Malware Into ATM Maker's Software

CyberCrime  Virus

Bleepingcomputer

13.10.19

Nemty 1.6 Ransomware Released and Pushed via RIG Exploit Kit

Ransomware

Bleepingcomputer

13.10.19

Windows 10 1909 is Getting "Ready for Release", Named November 2019 Update

OS

Bleepingcomputer

13.10.19

Ransom News

Ransom

Ransom

13.10.19

Leafly Cannabis information platform suffered a data leak

Incindent

Securityaffairs

13.10.19

FIN7 Hackers group is back with a new loader and a new RAT

CyberCrime  Virus

Securityaffairs

13.10.19

SIM cards used in 29 countries are vulnerable to Simjacker attack

Attack  Mobil

Securityaffairs

13.10.19

SIM Cards in 29 Countries Vulnerable to Remote Simjacker Attacks

Attack  Mobil

Thehackernews

13.10.19

YARA v3.11.0 released

Security

SANS

12.10.19

Attackers Use New, Sophisticated Ways to Install Cryptominers

Cryptocurrency blog

F5 Labs

12.10.19

Staying Hidden on the Endpoint: Evading Detection with Shellcode

Malware blog

FireEye

12.10.19

IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software

Security blog

FireEye

12.10.19

Living off the Orchard: Leveraging Apple Remote Desktop for Good and Evil

OS Blog

FireEye

12.10.19

Mahalo FIN7: Responding to the Criminal Operators’ New Tools and Techniques

Hacking blog

FireEye

12.10.19

7th October – Threat Intelligence Bulletin

Cyber blog

Checkpoint

12.10.19

The story of Adobe Reader symbols

Vulnerebility blog

Project Zero

12.10.19

New IDA Pro plugin provides TileGX support

Security blog

Cisco Talos

12.10.19

Talos takes home top research honors at Virus Bulletin conference

Security blog

Cisco Talos

12.10.19

Vulnerability Spotlight: Multiple remote code execution bugs in NitroPDF

Vulnerebility blog

Cisco Talos

12.10.19

Vulnerability spotlight: Multiple vulnerabilities in Schneider Electric Modicon M580

Vulnerebility blog

Cisco Talos

12.10.19

Microsoft Patch Tuesday — Oct. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

12.10.19

EU warns of cyber‑risks as 5G looms

BigBrother blog

Eset

12.10.19

ESET discovers Attor, a spy platform with curious GSM fingerprinting

Cyber blog  Malware blog

Eset

12.10.19

How concerned are you about the privacy challenges of your IoT devices?

IoT blog

Eset

12.10.19

Internet pioneer Dr. Paul Vixie on global internet security

Security blog

Eset

12.10.19

Inside consumer perceptions of security and privacy in the connected home

Security blog

Eset

12.10.19

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

Attack blog

Eset

12.10.19

Windows 10 Update Assistant Vulnerability Needs Manual Fix, Here's How

OS

Bleepingcomputer

12.10.19

Leafly Cannabis Website Leaked User Info via Exposed Database

Incindent

Bleepingcomputer

12.10.19

Windows 10 1703 is Now End of Service, No More Security Updates

OS

Bleepingcomputer

12.10.19

Microsoft Improves Azure Active Directory Security with New Roles

Security

Bleepingcomputer

12.10.19

Almost 50% of Company Network Traffic Comes From Bots, Report Says

BotNet

Bleepingcomputer

12.10.19

Oracle Cancels Venezuela Partner Contracts Citing US Sanctions

BigBrothers

Bleepingcomputer

12.10.19

Nemty Ransomware Decryptor Released, Recover Files for Free

Ransomware

Bleepingcomputer

12.10.19

New Malware Spies on Diplomats, High-Profile Government Targets

CyberSpy  Virus

Bleepingcomputer

12.10.19

Hacker Selling User Info Stolen From Prostitution Forums

Hacking

Bleepingcomputer

12.10.19

Apple Software Update Zero-Day Used by BitPaymer Ransomware

Apple  Ransomware

Bleepingcomputer

12.10.19

Iran-Linked ‘Charming Kitten’ Touts New Spearphishing Tactics

BigBrothers

Threatpost

12.10.19

China’s Sway Over Tech Companies Tested with Apple, Blizzard

BigBrothers

Threatpost

12.10.19

Software, Supply-Chain Dangers Top List of 5G Cyber Risks

Mobil

Threatpost

12.10.19

Imperva: Data Breach Caused by Cloud Misconfiguration

Incindent

Threatpost

12.10.19

Fin7 Cybergang Retools With New Malicious Code

CyberCrime

Threatpost

12.10.19

Tens of million PCs potentially impacted by a flaw in HP Touchpoint Analytics

Vulnerebility

Securityaffairs

12.10.19

'Attor' Cyber-Espionage Platform Used in Attacks Aimed at Russia

BigBrothers  CyberSpy

Securityweek

12.10.19

Google Patches 8 Vulnerabilities in Chrome 77

Vulnerebility

Securityweek

11.10.19

Researchers released a free decryptor for the Nemty Ransomware

Ransomware

Securityaffairs

11.10.19

Top cybersecurity certifications to consider for your IT career

Cyber

Securityaffairs

11.10.19

Hospitals Resume Accepting Patients After Malware Attack

Virus

Securityweek

11.10.19

NIST and Microsoft Partner to Improve Enterprise Patching Strategies

Safety

Securityweek

11.10.19

New Blockchain Solution for IIoT Aims to Solve Scaling Problem

Cryptocurrency

Securityweek

11.10.19

UNIX Co-Founder Ken Thompson's BSD Password Has Finally Been Cracked

Hacking

Thehackernews

11.10.19

HP Touchpoint Analytics LPE Vulnerability Affects Most HP PCs

Vulnerebility

Bleepingcomputer

11.10.19

iTerm2 Patches Critical Vulnerability Active for 7 Years

Apple

Bleepingcomputer

11.10.19

Singapore Man Faces 34 Years for Amazon AWS Cryptomining Fraud

Crime  Cryptocurrency

Bleepingcomputer

11.10.19

Phishing Incident Exposes Medical, Personal Info of 60K Patients

Phishing

Bleepingcomputer

11.10.19

EU Member States Publish Joint Report on 5G Networks Security

BigBrothers  Mobil

Bleepingcomputer

11.10.19

Games and Utility Apps in Play Store Hide Bankers and Spyware

Android

Bleepingcomputer

11.10.19

New Microsoft NTLM Flaws May Allow Full Domain Compromise

Vulnerebility

Bleepingcomputer

11.10.19

Beware of Fake Amazon AWS Suspension Emails for Unpaid Bills

Spam

Bleepingcomputer

11.10.19

C is for Credit Card: MageCart Hits Volusion E-Commerce Sites

CyberCrime

Bleepingcomputer

11.10.19

Windows 10 Insider Build 18999 Gives all Insiders a Resizable Cortana

OS

Bleepingcomputer

11.10.19

Imperva explains how their recent security incident happened

Security

Net-security

11.10.19

Hacker breached escort forums in Italy and the Netherlands and is selling user data

Hacking  Incindent

Securityaffairs

11.10.19

Sophos fixed a critical vulnerability in Cyberoam firewalls

Vulnerebility

Securityaffairs

11.10.19

Magecart Attack on eCommerce Platform Hits Thousands of Online Shops

CyberCrime

Securityweek

11.10.19

vBulletin Flaw Exploited in Dutch Sex-Work Forum Breach

Vulnerebility

Threatpost

11.10.19

Cryptomining Crook Steals Game Developer’s Identity to Carry Out Dirty Work

Cryptocurrency

Threatpost

11.10.19

Sophisticated Spy Kit Targets Russians with Rare GSM Plugin

BigBrothers  CyberSpy  Mobil

Threatpost

11.10.19

DevSecOps role expansion has changed how companies address their security posture

Security

Net-security

11.10.19

11 steps organizations should take to improve their incident response strategy

Incindent

Net-security

11.10.19

iTunes Zero-Day flaw exploited by the gang behind BitPaymer ransomware

Apple  Ransomware

Securityaffairs

11.10.19

Attor malware was developed by one of the most sophisticated espionage groups

CyberSpy  Virus

Securityaffairs

11.10.19

Flaw in HP Touchpoint Analytics Could Impact Many PCs

Vulnerebility

Securityweek

11.10.19

Apple iTunes and iCloud for Windows 0-Day Exploited in Ransomware Attacks

Apple  Exploit  Ransomware

Thehackernews

11.10.19

ICS cybersecurity investment should be a priority in protecting operations from disruption

ICS

Net-security

11.10.19

New method validates the integrity of computer chips using x-rays

IT

Net-security

11.10.19

5G is here, now what?

Mobil

Net-security

11.10.19

Microsoft NTLM vulnerabilities could lead to full domain compromise

Vulnerebility

Net-security

10.10.19

iTerm2 with tmux integration is vulnerable to remote command execution

Alert

Alert

10.10.19

SAP October 2019 Security Patch Day fixes 2 critical flaws

Vulnerebility

Securityaffairs

10.10.19

Tor Project is going to remove End-Of-Life relays from the network

Security

Securityaffairs

10.10.19

Amnesty claims that 2 Morocco rights advocates were targeted by NSO Group spyware

BigBrothers

Securityaffairs

10.10.19

Ops, popular iTerm2 macOS Terminal App is affected by a critical RCE since 2012

Apple  Vulnerebility

Securityaffairs

10.10.19

iTunes Zero-Day Vulnerability Exploited by BitPaymer Ransomware

Ransomware  Vulnerebility

Securityweek

10.10.19

Singaporean Indicted in U.S. for Illegal Crypto-Mining

BigBrothers  Cryptocurrency

Securityweek

10.10.19

Tor to Reject End-of-Life Relays by Default

Security

Securityweek

10.10.19

Spanish Court Probes Alleged Spying of Assange at Ecuadorian Embassy

BigBrothers

Securityweek

10.10.19

Cisco Finds 11 Vulnerabilities in Schneider Electric Modicon Controllers

Vulnerebility

Securityweek

10.10.19

Morocco Rights Advocates Targeted by Spyware: Amnesty

BigBrothers

Securityweek

10.10.19

China’s Sway Over Tech Companies Tested with Apple, Blizzard

Apple  BigBrothers

Threatpost

10.10.19

Apple iTunes Bug Actively Exploited in BitPaymer/iEncrypt Campaign

Apple

Threatpost

10.10.19

HP Touchpoint Analytics Opens PCs to Code Execution Attack

Attack  Exploit

Threatpost

10.10.19

Most Americans Fail Cybersecurity Quiz

Cyber

Threatpost

10.10.19

Gamers Warned of High-Severity Intel, Nvidia Flaws

Vulnerebility

Threatpost

10.10.19

Privacy Groups: Ring’s Police Partnerships Can Lead to Sinister Ends

BigBrothers  Privacy

Threatpost

10.10.19

Twitter Uses Phone Numbers, Emails to Sell Ads

Social

Threatpost

10.10.19

Mining Live Networks for OUI Data Oddness

Cryptocurrency

SANS

10.10.19

Microsoft NTLM vulnerabilities could lead to full domain compromise

Vulnerebility

Net-security

10.10.19

2FA, HTTPS and private browsing still a mystery to most Americans

Security

Net-security

10.10.19

Critical command execution vulnerability in iTerm2 patched, upgrade ASAP!

Vulnerebility

Net-security

10.10.19

Multiple APT groups are exploiting VPN vulnerabilities, NSA warns

APT

Securityaffairs

10.10.19

vBulletin addresses three new high-severity vulnerabilities

Vulnerebility

Securityaffairs

10.10.19

Hackers compromised Volusion infrastructure to siphon card details from thousands of sites

CyberCrime  Hacking

Securityaffairs

10.10.19

Twitter inadvertently used Phone Numbers collected for security for Ads

Social

Securityaffairs

10.10.19

Researchers discovered a code execution flaw in NSA GHIDRA

Vulnerebility

Securityaffairs

10.10.19

SAP Patches Critical Vulnerabilities With October 2019 Security Updates

Vulnerebility

Securityweek

10.10.19

Ransomware Attacks 'Getting Bolder': Europol

Ransomware

Securityweek

10.10.19

EU Hints at Huawei Risk in 5G Security Assessment

BigBrothers  Mobil

Securityweek

10.10.19

Iranian Hackers Update Spear-Phishing Techniques in Recent Campaign

BigBrothers  Phishing

Securityweek

10.10.19

Audit Finds Critical Vulnerability in iTerm2 macOS Terminal Emulator

Apple

Securityweek

10.10.19

Many in Utilities Sector Expect Attacks on Critical Infrastructure: Survey

ICS

Securityweek

10.10.19

Pass the Hash Remains a Poorly Defended Threat Vector

Security

Securityweek

10.10.19

Cybersecurity Firms Partner on Open Source Security Technology Development

Security

Securityweek

10.10.19

NSA: Multiple State-Sponsored APTs Exploiting Enterprise VPN Flaws

BigBrothers

Securityweek

10.10.19

Apple Patches 16 Vulnerabilities With macOS Catalina 10.15

Apple

Securityweek

10.10.19

No Patch for Critical Code Execution Flaw Affecting D-Link Routers

Vulnerebility

Securityweek

10.10.19

7-Year-Old Critical RCE Flaw Found in Popular iTerm2 macOS Terminal App

Apple

Thehackernews

10.10.19

Breaches are now commonplace, but Reason Cybersecurity lets users guard their privacy

Safety

Thehackernews

10.10.19

Build or buy: What to consider when deploying on-premise or cloud-based PKI

Crypto

Net-security

10.10.19

Cybercrime is maturing, shifting its focus to larger and more profitable targets

CyberCrime

Net-security

10.10.19

Only 32% of organizations employ a security-first approach to cloud data storage

Security

Net-security

10.10.19

Does poor password hygiene still hamper your ability to achieve high security standards?

Cyber

Net-security

10.10.19

Impact and prevalence of cyberattacks that use stolen hashed administrator credentials

Cyber

Net-security

9.10.19

Twitter Apologizes for Using Your Phone Number for Advertising

Social

Bleepingcomputer

9.10.19

Windows 10 Servicing Stack Updates Fix Secure Boot Issues

OS

Bleepingcomputer

9.10.19

Windows 10 Cumulative Update KB4517389 & KB4519338 Released

OS

Bleepingcomputer

9.10.19

Microsoft Releases the October 2019 Security Updates for Office

OS

Bleepingcomputer

9.10.19

Microsoft's October 2019 Patch Tuesday Fixes 59 Vulnerabilities

OS

Bleepingcomputer

9.10.19

Microsoft Blocks Credential Theft Attack Targeting Dozens of Orgs

CyberCrime

Bleepingcomputer

9.10.19

Researcher Adds $100,000 Worth of Credit to Voi E-Scooter App

Security

Bleepingcomputer

9.10.19

57% of Businesses Use Multi-Factor Auth (MFA), Says LastPass

Crypto  Safety

Bleepingcomputer

9.10.19

Windows 10 1803 Users Warned to Update Before End of Support

OS

Bleepingcomputer

9.10.19

Hackers Patch Web Browsers to Track Encrypted Traffic

Hacking  Crypto  Vulnerebility

Bleepingcomputer

9.10.19

Multiple vulnerabilities found in the Cobham EXPLORER 710 satcom terminal

Alert

Bleepingcomputer

9.10.19

Twitter 2FA phone numbers “inadvertently” used for advertising purposes

Social

Bleepingcomputer

9.10.19

Twitter inadvertently used Phone Numbers collected for security for Ads

Social

Bleepingcomputer

9.10.19

Researchers discovered a code execution flaw in NSA GHIDRA

Vulnerebility

Bleepingcomputer

9.10.19

Apple Patches 16 Vulnerabilities With macOS Catalina 10.15

Apple

Bleepingcomputer

9.10.19

No Patch for Critical Code Execution Flaw Affecting D-Link Routers

Vulnerebility

Bleepingcomputer

9.10.19

You Gave Your Phone Number to Twitter for Security and Twitter Used it for Ads

Mobil  Social

Thehackernews

9.10.19

October 2019 Patch Tuesday: A small batch of updates from Microsoft, none from Adobe

Vulnerebility

Net-security

9.10.19

Winning the security fight: Tips for organizations and CISOs

Security

Net-security

9.10.19

APT Groups Exploiting Flaws in Unpatched VPNs, Officials Warn

APT

Threatpost

9.10.19

Intimate Details on Healthcare Workers Exposed as Cloud Security Lags

Security

Threatpost

9.10.19

Critical Microsoft Remote Desktop Flaw Fixed in Security Update

Vulnerebility

Threatpost

9.10.19

Apple Tackles Over a Dozen Bugs in its Catalina 10.15 Update

Apple

Threatpost

9.10.19

Sextortionists Get Past Defenses with Cryptocurrency Shift

Cryptocurrency

Threatpost

9.10.19

Google October Android Security Update Fixes Critical RCE Flaws

Android  Vulnerebility

Threatpost

9.10.19

MS October 2019 Patch Tuesday updates address 59 flaws

Vulnerebility

Securityaffairs

9.10.19

New US-UK Agreement Speeds Law Enforcement's Access to User Data

BigBrothers

Securityweek

9.10.19

Twitter Admits Phone Numbers Meant for Security Used for Ads

Mobil  Social

Securityweek

9.10.19

VMware Completes $2.1 Billion Acquisition of Carbon Black

IT

Securityweek

9.10.19

Vulnerabilities Expose TwinCAT Industrial Systems to DoS Attacks

Attack  Vulnerebility

Securityweek

9.10.19

Email Attacks Using Cloud Services are Increasing

Spam

Securityweek

9.10.19

Microsoft Patches 60 Flaws With October 2019 Security Updates

Vulnerebility

Securityweek

9.10.19

Microsoft Releases October 2019 Patch Tuesday Updates

Vulnerebility

Thehackernews

9.10.19

What data does Vidar malware steal from an infected host?

Virus

SANS

9.10.19

Digital transformation requires an aggressive approach to security

Security

Net-security

9.10.19

Phishing attempts increase 400%, many malicious URLs found on trusted domains

Phishing  Virus

Net-security

9.10.19

Majority of IT departments leave major holes in their USB drive security

Security

Net-security

9.10.19

BEC explodes as attackers exploit email’s identity crisis

Spam

Net-security

8.10.19

Experts found a link between a Magecart group and Cobalt Group

CyberCrime

Securityaffairs

8.10.19

2020 Presidential Candidate Campaign Websites Fail On User Privacy

BigBrothers  Privacy

Securityweek

8.10.19

Google Patches Remote Code Execution Bugs in Android 10

Android

Securityweek

8.10.19

Code Execution Vulnerability Impacts NSA Reverse Engineering Tool

Vulnerebility

Securityweek

8.10.19

Managed Detection and Response analytics report, H1 2019

Analysis

Securelist

8.10.19

Developer hacked back Muhstik ransomware crew and released keys

Ransomware

Securityaffairs

8.10.19

Preview: SecurityWeek's 2019 ICS Cyber Security Conference (Oct. 21-24 | Atlanta)

Congress

Securityweek

8.10.19

vBulletin Releases Patch Update for New RCE and SQLi Vulnerabilities

Vulnerebility

Thehackernews

8.10.19

Adobe Suspends Accounts for All Venezuela Users Citing U.S. Sanctions

Vulnerebility

Thehackernews

8.10.19

macOS Catalina: Security and privacy improvements

Apple

Net-security

8.10.19

Muhstik Decryptor

Anti-Ramson Tool

Anti-Ramson Tool

8.10.19

Credit Info Exposed in TransUnion Credential Stuffing Attack

Attack  Incindent

Bleepingcomputer

8.10.19

Adobe To Ban Users From Venezuela Due to U.S. Executive Order

BigBrothers

Bleepingcomputer

8.10.19

1 Million People Had Their Medical Data Exposed in Tū Ora Breach

Incindent

Bleepingcomputer

8.10.19

RobbinHood Ransomware Using Street Cred to Make Victims Pay

Ransomware

Bleepingcomputer

8.10.19

Muhstik Ransomware Victim Hacks Back, Releases Decryption Keys

Ransomware

Bleepingcomputer

8.10.19

Some Windows 10 Users Can't Use Firefox for Downloads

OS

Bleepingcomputer

8.10.19

DCH Hospital Pays Ryuk Ransomware for Decryption Key

Ransomware

Bleepingcomputer

8.10.19

Check If You Are in the Sephora and StreetEasy Data Breaches

Incindent

Bleepingcomputer

8.10.19

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Apple  Vulnerebility

Threatpost

8.10.19

Alabama Hospitals Pay Up in Ransomware Attack

Ransomware

Threatpost

8.10.19

D-Link Home Routers Open to Remote Takeover Will Remain Unpatched

Vulnerebility

Threatpost

8.10.19

Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says

APT  BigBrothers

Threatpost

8.10.19

Users reported problems with patches for CVE-2019-1367 IE zero-day

Vulnerebility

Securityaffairs

8.10.19

Hackers continue to exploit the Drupalgeddon2 flaw in attacks in the wild

Exploit  Hacking

Securityaffairs

8.10.19

Magecart Group Tied to Cobalt Hackers

CyberCrime

Securityweek

8.10.19

Unmask cybercriminals through identity attribution

CyberCrime

Net-security

8.10.19

Product showcase: Awake Security Network Traffic Analysis Platform

Security

Net-security

8.10.19

Organizations need tools that support DevOps security

Security

Net-security

8.10.19

Internal user mistakes create large percentage of cybersecurity incidents

Incindent

Net-security

8.10.19

Report: 2019 eSentire Threat Intelligence Spotlight

Security

Net-security

7.10.19

D-Link router models affected by remote code execution issue that will not be fixed

Vulnerebility

Securityaffairs

7.10.19

Patches for Internet Explorer Zero-Day Causing Problems for Many Users

Vulnerebility

Securityweek

7.10.19

NIST's Zero Trust Taxonomy Introduces Components, Threats and Migration Routes

BigBrothers  Safety

Securityweek

7.10.19

US will help Baltic states to secure baltic energy grid

BigBrothers

Securityaffairs

7.10.19

New Campaign Targets Drupalgeddon2 Flaw to Install Malware

Virus

Securityweek

7.10.19

Signal Rushes to Patch Serious Eavesdropping Vulnerability

Vulnerebility

Securityweek

7.10.19

Cisco closes high-impact vulnerabilities in its security offerings

Vulnerebility

Net-security

7.10.19

Data from Sephora and StreetEasy data breaches added to HIBP

Incindent

Securityaffairs

7.10.19

Hitbsecconf2019 Conference

Conference Press

Conference Press

7.10.19

Virus Bulletin 2019 Conference

Conference Press

Conference Press

7.10.19

PoS malware infections impacted four restaurant chains in the U.S.

Virus

Securityaffairs

7.10.19

U.S. to Help Secure Baltic Energy Grid Against Cyber Attacks

BigBrothers

Securityweek

7.10.19

Iranian Hackers Said to Target Presidential Campaign

APT  BigBrothers

Securityweek

7.10.19

Cloud-native applications need a unified continuous security approach

Security

Net-security

7.10.19

Insider threats are security’s new reality: Prevention solutions aren’t working

Security

Net-security

7.10.19

Consumers have concerns about cybersecurity, value education on best practices

Cyber

Net-security

7.10.19

The top 10 strategic government technology trends CIOs should plan for

Security

Net-security

7.10.19

64% of IT decision makers have reported a breach in their ERP systems in the past 24 months

Incindent

Net-security

7.10.19

Whitepaper: Identifying Web Attack Indicators

Attack

Net-security

6.10.19

HildaCrypt Decryptor

Anti-Ramson Tool

Anti-Ramson Tool

6.10.19

Ransom News

Ransom

Ransom

6.10.19

HildaCrypt Ransomware Developer Releases Decryption Keys

Ransomware

Bleepingcomputer

6.10.19

Windows 10 KB4524147 Update May Cause Boot and Printing Issues

OS

Bleepingcomputer

6.10.19

Iran-linked Phosphorus group hit a 2020 presidential campaign

APT

Securityaffairs

6.10.19

UK NCSC agency warns of APTs exploiting Enterprise VPN vulnerabilities

APT  BigBrothers

Securityaffairs

6.10.19

Hacker is auctioning a database containing details of 92 million Brazilians

Incindent

Securityaffairs

6.10.19

visNetwork for Network Data

Security

SANS

6.10.19

A bug in Signal for Android could be exploited to spy on users

Android  Exploit

Securityaffairs

6.10.19

Magecart hackers are expanding their operations

CyberCrime

Securityaffairs

6.10.19

NSA Launches New Cybersecurity Directorate

BigBrothers

Securityaffairs

6.10.19

Signal Messenger Bug Lets Callers Auto-Connect Calls Without Receivers' Interaction

Social

Thehackernews

5.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – The All-Stars

Ransomware blog

Mcafee blog

5.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us

Ransomware blog

Mcafee blog

5.10.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in August 2019

Security blog

F5 Labs

5.10.19

Tricky Trickbot Runs Campaigns Without Redirection 

Malware blog

F5 Labs

5.10.19

Head Fake: Tackling Disruptive Ransomware Attacks

Ransomware blog

FireEye

5.10.19

IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software

Security blog

FireEye

5.10.19

The Eye on the Nile

Phishing blog

Checkpoint

5.10.19

More Hidden App Malware Found on Google Play with over 2.1 Million Downloads

OS Blog  Malware blog

Symantec

5.10.19

Open Document format creates twist in maldoc landscape

Malware blog

Cisco Talos

5.10.19

Vulnerability Spotlight: Foxit PDF Reader JavaScript Array.includes remote code execution vulnerability

Vulnerebility blog

Cisco Talos

5.10.19

Hospitals in US, Australia hobbled by ransomware

Ransomware blog

Eset

5.10.19

Casbaneiro: Dangerous cooking with a secret ingredient

Cyber blog

Eset

5.10.19

Do apps need all the permissions?

Security blog

Eset

5.10.19

Cyber Security Awareness Month starts today!

Cyber blog

Eset

5.10.19

Dutch Govt Explains the Risks Behind DNS-Over-HTTPS Move

BigBrothers

Bleepingcomputer

5.10.19

UAB Medicine Data Breach Exposes Patient Info in Phishing Attack

Incindent  Phishing

Bleepingcomputer

5.10.19

Microsoft Discovers Iranian Hacking Campaign Targeting U.S. Politics

BigBrothers

Bleepingcomputer

5.10.19

Windows 10 KB4524147 Cumulative Update Breaks the Start Menu

OS

Bleepingcomputer

5.10.19

Actively Exploited Android Zero-Day Impacts Google, Samsung Devices

Android  Vulnerebility

Bleepingcomputer

5.10.19

Magecart Impacts Hundreds of Thousands of Websites, Still Growing

CyberCrime

Bleepingcomputer

5.10.19

Novter Trojan Sets its Sights on Microsoft Windows Defender

Virus

Bleepingcomputer

5.10.19

Details of 92 Million Brazilians Auctioned on Underground Forums

Incindent

Bleepingcomputer

5.10.19

Australian Govt Issues Android and iOS Security Hardening Guides

Android  BigBrothers

Bleepingcomputer

5.10.19

Four U.S. Food Chains Disclose Payment Card Theft via PoS Malware

Virus

Bleepingcomputer

5.10.19

Virus Bulletin 2019: VoIP Espionage Campaign Hits U.S. Utilities Supplier

Congress

Threatpost

5.10.19

AG Barr, Officials to Facebook: Don’t Encrypt Messaging

Crypto  Social

Threatpost

5.10.19

Google Warns of Android Zero-Day Bug Under Active Attack

Android  Attack

Threatpost

5.10.19

Virus Bulletin 2019: Magecart Infestations Saturate the Web

Congress

Threatpost

5.10.19

APTs Exploiting Enterprise VPN Vulnerabilities, UK Govt Warns

APT  BigBrothers  Vulnerebility

Securityweek

4.10.19

Microsoft: Any form of MFA takes users out of reach of most attacks

Attack

Net-security

4.10.19

The sLoad Threat: Ten Months Later

Virus

Securityaffairs

4.10.19

Project Zero researcher found unpatched Android zero-day likely exploited by NSO group

Android  Vulnerebility

Securityaffairs

4.10.19

Egypt regularly spies on opponents and activists with mobile apps

BigBrothers  CyberSpy  Mobil

Securityaffairs

4.10.19

Zero-Day Used in the Wild Impacts Pixel 2, Other Android Phones

Android

Securityweek

4.10.19

Moe's, McAlister's, Schlotzsky's Restaurants Hit by Payment Card Breach

Incindent

Securityweek

4.10.19

WhatsApp Flaw Allows Remote Code Execution via Malicious GIF File

Social  Virus

Securityweek

4.10.19

New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild

Android  Exploit

Thehackernews

4.10.19

Unpatched Android flaw exploited by attackers, impacts Pixel, Samsung, Xiaomi devices

Vulnerebility

Net-security

4.10.19

'Lost Files' Data Wiper Poses as a Windows Security Scanner Security

Bleepingcomputer

4.10.19

Google Chrome to Gradually Start Blocking Mixed Content by Default Security

Bleepingcomputer

4.10.19

Windows 10 Insider Build 18995 Adds PIN Sign-ins to Safe Mode OS

Bleepingcomputer

4.10.19

Microsoft Releases Windows Security Updates to Fix Printing Issue OS

Bleepingcomputer

4.10.19

Office 365 Admins Can Now Block Malicious Microsoft Query IQY Files OS

Bleepingcomputer

4.10.19

Cyber-Spy Group Active Since 2013 Now Tied to Chinese State Actor APT  CyberSpy

Bleepingcomputer

4.10.19

Windows Activator Bundles Banker with C2 in YouTube Description Security

Bleepingcomputer

4.10.19

Police Seize Bot Farm Behind Potentially Fatal Scam Messages BigBrothers  BotNet

Bleepingcomputer

4.10.19

FTCode PowerShell Ransomware Resurfaces in Spam Campaign Ransomware

Bleepingcomputer

4.10.19

FBI Warns U.S. Organizations About High Impact Ransomware BigBrothers  Ransomware

Bleepingcomputer

4.10.19

6 cyber-espionage campaigns since 2013 attributed to PKPLUG China-linked group

APT  CyberSpy

Securityaffairs

4.10.19

FBI warns about high-impact Ransomware attacks on U.S. Organizations

BigBrothers  Ransomware

Securityaffairs

4.10.19

Ukrainian police dismantled a bot farm involved in multiple spam campaigns

BigBrothers  Spam

Securityaffairs

4.10.19

Turkey Fines Facebook for Breach of Data Protection Laws

Incindent  Social

Securityweek

4.10.19

Officials Push Facebook for Way to Peek at Encrypted Messages

Crypto  Social

Securityweek

4.10.19

Researcher Shows How Adversaries Can Gather Intel on U.S. Critical Infrastructure

ICS

Securityweek

4.10.19

Adwind Malware Used in Attacks Against U.S. Petroleum Firms

Virus

Securityweek

4.10.19

Alabama Hospital System Halts Admissions Amid Malware Attack

Virus

Securityweek

4.10.19

WhatsApp Flaw Opens Android Devices to Remote Code Execution

Vulnerebility

Threatpost

4.10.19

New Reductor Malware Hijacks HTTPS Traffic

Virus

Threatpost

4.10.19

Foxit PDF Reader Vulnerable to 8 High-Severity Flaws

Vulnerebility

Threatpost

4.10.19

Buffer overflows found in libpcap and tcpdump

Vulnerebility

SANS

4.10.19

Enterprises leaving themselves vulnerable to cyberattacks by failing to prioritize PKI security

Crypto  Safety  Vulnerebility

Net-security

4.10.19

Educational organizations massively vulnerable to cyber attacks

Cyber  Vulnerebility

Net-security

4.10.19

Being compliant with laws and regulations is not a guarantee against data breaches

Incindent

Net-security

3.10.19

Microsoft 365 To Get Tenant-Wide Feature Preventing Info Exposure OS

Bleepingcomputer

3.10.19

Microsoft Launches New Dual-Screen Surface Devices OS

Bleepingcomputer

3.10.19

Windows 10X: Microsoft's New Windows OS for Dual-Screen PCs OS

Bleepingcomputer

3.10.19

Zendesk Security Breach May Impact Orgs Like Uber, Slack, and FCC Incindent

Bleepingcomputer

3.10.19

Sodinokibi Ransomware Builds An All-Star Team of Affiliates Ransomware

Bleepingcomputer

3.10.19

Threat Group Uses Bit.ly, BlogSpot, Pastebin to Deliver Trojans, RATs Virus

Bleepingcomputer

3.10.19

American Express Customer Info Accessed by Employee for Possible Fraud Incindent

Bleepingcomputer

3.10.19

New Silent Starling Gang Targets 500+ Vendors in BEC Scam Twist Social

Bleepingcomputer

3.10.19

Google Expands Privacy Controls Across Youtube, Maps, and Assistant Privacy

Bleepingcomputer

3.10.19

Google's Password Manager Now Warns About Compromised Accounts Safety

Bleepingcomputer

3.10.19

Of All State-Backed Hackers, the Chinese Hit Most Industries BigBrothers

Bleepingcomputer

3.10.19

Fake Browser Updates Infect Enterprises with Ransomware, Bankers Ransomware

Bleepingcomputer

3.10.19

COMpfun successor Reductor infects files on the fly to compromise TLS traffic Crypto Securelist

3.10.19

Dutch police shut down bulletproof service hosting tens of DDoS botnets Attack  BigBrothers Securityaffairs

3.10.19

Zendesk Discloses Old Data Breach Affecting 10,000 Accounts Incindent Securityweek

3.10.19

Just a GIF Image Could Have Hacked Your Android Phone Using WhatsApp Android  Social Thehackernews

3.10.19

Microsoft will continue providing Windows 7 security updates for SMBs

OS

Net-security

3.10.19

Virus Bulletin 2019: Japanese Attacks Highlight Savvy APT Strategy

Congress

Threatpost

3.10.19

Virus Bulletin 2019: Geost Android Botnet Goes After Millions of Euros

Congress

Threatpost

3.10.19

Hack Breaks PDF Encryption, Opens Content to Attackers

Crypto

Threatpost

3.10.19

Zendesk Exposes 10,000 Accounts to Unknown Third Party

Incindent

Threatpost

3.10.19

Why This New Cybergang is Heralding a New Age For BEC

CyberCrime  Spam

Threatpost

3.10.19

Google Adds Password Checkup Feature to Chrome Browser

Safety

Threatpost

3.10.19

HQWar: the higher it flies, the harder it drops

Virus

Securelist

3.10.19

US Secretary of State Mike Pompeo warns Italy over 5G Chinese equipment supply

BigBrothers

Securityaffairs

3.10.19

Zendesk 2016 security breach may impact Uber, Slack, and other organizations

Incindent

Securityaffairs

3.10.19

Expert disclosed details of remote code execution flaw in Whatsapp for Android

Android  Social

Securityaffairs

3.10.19

Former American Express employee under investigation for customers’ data abuse

Incindent

Securityaffairs

3.10.19

U.S. to Collect DNA of All Undocumented Migrants

BigBrothers

Securityweek

3.10.19

MasterMana Campaign Combines Stealth, Free Services and Old Malware

Virus

Securityweek

3.10.19

Google Expands Use of Password Checkup Tool, Unveils New Privacy Features

Safety

Securityweek

3.10.19

US Warns Italy Over China and 5G

Mobil

Securityweek

3.10.19

"Lost_Files" Ransomware

Ransomware

SANS

3.10.19

Good cybersecurity comes from focusing on the right things, but what are they?

Security

Net-security

3.10.19

How security programs and breach history influence company valuations

Security

Net-security

3.10.19

Executives have to make cybersecurity a priority in order to secure their business

Security

Net-security

3.10.19

Security and compliance gaps of ineffective employee onboarding and offboarding

Security

Net-security

3.10.19

PDFex attacks can exfiltrate content from encrypted PDF documents

Crypto

Net-security

2.10.19

Microsoft Edge Dev Channel Updated With Media Autoplay Blocking OS

Bleepingcomputer

2.10.19

WhatsApp to Soon Let you Send Self-Destructing Messages Social

Bleepingcomputer

2.10.19

Microsoft Releases October 2019 Office Updates With Fixes, Improvements OS

Bleepingcomputer

2.10.19

Microsoft To Offer Windows 7 Extended Security Updates to SMBs OS

Bleepingcomputer

2.10.19

Singapore's GovTech Launches Vulnerability Disclosure Program BigBrothers  Vulnerebility

Bleepingcomputer

2.10.19

Fake Office Activation Wizard Docs Used to Spread Emotet Trojan Virus

Bleepingcomputer

2.10.19

U.S. and Australian Hospitals Targeted by New Ransomware Attacks BigBrothers  Ransomware

Bleepingcomputer

2.10.19

Highway Advertisement Billboard Hacked to Play Porn Video Hacking

Bleepingcomputer

2.10.19

Windows 10 1903 KB4522016 Cumulative Update Breaks Printing OS

Bleepingcomputer

2.10.19

New Adwind RAT Variant Used Against the US Petroleum Sector Virus

Bleepingcomputer

2.10.19

The State of Stalkerware in 2019 CyberCrime Securelist

2.10.19

Asics apologizes after pornography ran on screens at central store in Auckland for hours Crime Securityaffairs

2.10.19

Ten hospitals in Alabama and Australia have been hit with ransomware attacks Ransomware Securityaffairs

2.10.19

Urgent/11 Flaws Impact More RTOS Used by Medical, Industrial Devices ICS Securityweek

2.10.19

Advanced ICS/SCADA Hacking Training Offered at SecurityWeek's 2019 ICS Cyber Security Conference ICS Securityweek

2.10.19

Ransomware Hits Hundreds of US Schools, Local Governments: Study Ransomware Securityweek

2.10.19

Singapore Lays Out Plans for Operational Technology Cybersecurity BigBrothers Securityweek

2.10.19

A Look Into Continuous Efforts By Chinese Hackers to Target Foreign Governments BigBrothers Thehackernews

2.10.19

How SMBs Can Mitigate the Growing Risk of File-based Attacks Attack Thehackernews

2.10.19

Former Yahoo Employee Admits Hacking into 6000 Accounts for Sexual Content Incindent Thehackernews

2.10.19

Google adds Password Checkup feature to Google Accounts, Chrome

Safety

Net-security

2.10.19

Urgent11 flaws affect more medical, industrial devices than previously thought

Vulnerebility

Net-security

2.10.19

Malvertising Attack Hijacks 1B+ Sessions With Webkit Exploit

Exploit  Virus

Threatpost

2.10.19

Ransomware Attacks Leave U.S. Hospitals Turning Away Patients

Ransomware

Threatpost

2.10.19

Hackers Turn to OpenDocument Format to Avoid AV Detection

Hacking  Virus

Threatpost

2.10.19

Google Play Malicious Apps Racked Up 335M+ Installs in September

Android

Threatpost

2.10.19

Experts found 20 Million tax records for Russian citizens exposed online

BigBrothers  Incindent

Securityaffairs

2.10.19

Teheran: U.S. has started ‘Cyber War’ against Iran

BigBrothers

Securityaffairs

2.10.19

Singapore presented the Operational Technology (OT) Cybersecurity Masterplan

BigBrothers

Securityaffairs

2.10.19

Iranian Official Denies Plans to Interfere With US Election

BigBrothers

Securityweek

2.10.19

NZ Sports Store Apologises Over Porn Played on Big Screens

Hacking

Securityweek

2.10.19

Researchers Find New Hack to Read Content Of Password Protected PDF Files

Hacking

Thehackernews

2.10.19

A recent example of Emotet malspam

Spam  Virus

SANS

2.10.19

The 5 biggest examples of executive threats and how to prevent them

Cyber

Net-security

2.10.19

49% of infosec pros are awake at night worrying about their organization’s cybersecurity

Cyber

Net-security

2.10.19

Massive uptick in eCrime campaigns, retail among top targeted industries

CyberCrime

Net-security

2.10.19

Cyber risks are the top concern among businesses of all sizes

Cyber

Net-security

2.10.19

What’s next for 5G?

Mobil

Net-security

2.10.19

Sophos Managed Threat Response: An evolved approach to proactive security protection

Safety

Net-security

1.10.19

A new Adwind variant involved in attacks on US petroleum industry Virus Securityaffairs

1.10.19

Hackers breached one of Comodo Forums, 245,000 users impacted Incindent Securityaffairs

1.10.19

Organizations Prefer Quick Technological Fix Over Deep-Rooted Cyber Resiliency: Report Vulnerebility Securityweek

1.10.19

Medical Practice Closing Permanently After Ransomware Attack Ransomware Securityweek

1.10.19

WebEx, Zoom Meetings Exposed to Snooping via Enumeration Attacks Attack Securityweek

1.10.19

Former Yahoo Programmer Pleads Guilty to Hacking User Accounts Hacking Securityweek

1.10.19

Danish company Demant expects to incur losses of up to $95 after cyber attack Attack Securityaffairs

1.10.19

Frequent VBA Macros used in Office Malware Virus Securityaffairs

1.10.19

Comodo Forums Hacked via Recently Disclosed vBulletin Vulnerability Incindent  Vulnerebility Securityweek

1.10.19

Users Need to Consent to Online Tracking Cookies: EU Court Privacy Securityweek

1.10.19

BlackBerry Launches New Cybersecurity R&D Unit Security Securityweek

1.10.19

Singapore Ministry of Defence Launches New Bug Bounty Program BigBrothers Securityweek

1.10.19

Senate Passes DHS Cyber Hunt and Incident Response Teams Act BigBrothers Securityweek

1.10.19

Comodo Forums Hack Exposes 245,000 Users' Data — Recent vBulletin 0-day Used Incindent Thehackernews

1.10.19

Over A Billion Malicious Ad Impressions Exploit WebKit Flaw to Target Apple Users Exploit  Virus Thehackernews

1.10.19

Danish company Demant expects to suffer huge losses due to cyber attack

Attack

Net-security

1.10.19

Vulnerability in Cisco Webex and Zoom may expose online meetings to snooping

Vulnerebility

Net-security

1.10.19

Guess what? You should patch Exim again!

Vulnerebility

Net-security

1.10.19

Zprava-o-stavu-kyberneticke-bezpecnosti-cr-2018-cz Report Report

1.10.19

Comodo Forums Breached, Data of Over 170,000 Users Up for Grabs Incindent

Bleepingcomputer

1.10.19

Under-Detected ODT Files Deliver Common Remote Access Trojans Virus

Bleepingcomputer

1.10.19

Free Ouroboros Ransomware (Zeropadypt NextGen) Decryption Available Ransomware

Bleepingcomputer

1.10.19

Microsoft Adds 'Disable Legacy TLS' Feature to Windows Server 2019 OS

Bleepingcomputer

1.10.19

New Exim Vulnerability Exposes Servers to DoS Attacks, RCE Risks Vulnerebility

Bleepingcomputer

1.10.19

eGobbler Malvertiser Uses WebKit Exploit to Infect Over 1 Billion Ads Exploit  Virus

Bleepingcomputer

1.10.19

Bulletproof Hosting Service in Former NATO Bunker Goes Down CyberCrime

Bleepingcomputer

1.10.19

Windows 10 1903 on ARM Gets a Virtualization-based Security Feature OS

Bleepingcomputer

1.10.19

Critical Exim Flaw Opens Servers to Remote Code Execution

Vulnerebility

Threatpost

1.10.19

Senate Passes Bill Aimed At Combating Ransomware Attacks

Ransomware

Threatpost

1.10.19

New Bug Found in NSA’s Ghidra Tool

Vulnerebility

Threatpost

1.10.19

Gucci IOT Bot Discovered Targeting European Region BotNet  IoT Securityaffairs

1.10.19

Tridium Niagara framework affected by 2 flaws in BlackBerry QNX OS  Mobil  Vulnerebility Securityaffairs

1.10.19

eGobbler ‘s malvertising campaign hijacked over 1 billion ad impressions Virus Securityaffairs

1.10.19

A new critical flaw in Exim exposes email servers to remote attacks Attack  Vulnerebility Securityaffairs

1.10.19

American Man Jailed in US Over Singapore HIV Data Leak Crime  Incindent Securityweek

1.10.19

Critical Remote Code Execution Vulnerability Patched in Exim Email Server Vulnerebility Securityweek

1.10.19

'Masad Stealer' Uses Telegram to Exfiltrate Data Incindent  Social  Virus Securityweek

1.10.19

Vulnerability Management Firm Kenna Security Raises $48 Million IT Securityweek

1.10.19

Tridium Niagara Affected by BlackBerry QNX Vulnerabilities  Mobil  Vulnerebility Securityweek

1.10.19

'WhiteShadow' Downloader Employs Microsoft SQL for Malware Delivery Virus Securityweek

1.10.19

New Anomali Tool Finds Threat Data in News, Blogs, Social Networks Social Securityweek

1.10.19

Spain Security Firm Probed 'for Spying on Assange for CIA' BigBrothers Securityweek

1.10.19

Maldoc, PowerShell & BITS

Spam  Virus

SANS

1.10.19

Assessing risk: Measuring the health of your infosec environment

Security

Net-security

1.10.19

Managing and monitoring privileged access to cloud ecosystems

Security

Net-security

1.10.19

38% of the Fortune 500 do not have a CISO