List  Articles  Page  2019  2018  2017  2016  1  2  3  4  5  6  7  8

Date

Name

Category

Web

30.11.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in October 2019

Cyber blog

F5 Labs

30.11.19

Regional Threat Perspectives, Fall 2019: United States

Cyber blog

F5 Labs

30.11.19

FIDL: FLARE’s IDA Decompiler Library

Security blog

FireEye

30.11.19

Best practices for staying safe online during the holiday shopping season

Cyber blog

Cisco Talos

30.11.19

Smartwatch exposes locations and other data on thousands of children

Cyber blog

Eset

30.11.19

5 scams to watch out for this shopping season

Security blog

Eset

30.11.19

Cryptocurrency exchange loses US$50 million in apparent hack

Cryptocurrency blog

Eset

30.11.19

Stantinko botnet adds cryptomining to its pool of criminal activities

BotNet blog  Cryptocurrency blog

Eset

30.11.19

CyberwarCon – the future of nation‑state nastiness

Cyber blog

Eset

30.11.19

New Chrome Password Stealer Sends Stolen Data to a MongoDB Database

Hacking

Bleepingcomputer

30.11.19

Kali Linux Adds 'Undercover' Mode to Impersonate Windows 10

OS

Bleepingcomputer

30.11.19

Law Enforcement Shuts Down Imminent Monitor Malware, Makes Arrests

Virus

Bleepingcomputer

30.11.19

Amazon Plans Ring Facial Recognition-Based ‘Watch List’, Report

Security

Threatpost

30.11.19

International law enforcement operation shuts down Imminent Monitor RAT operations

Virus

Securityaffairs

30.11.19

Great Plains center hit by ransomware attack

Ransomware

Securityaffairs

29.11.19

Europol Shuts Down 'Imminent Monitor' RAT Operations With 13 Arrests

Virus

Thehackernews

29.11.19

Adobe Notifies Magento Marketplace Users of Security Breach

Incindent

Bleepingcomputer

29.11.19

Advanced Hacking Groups Keep Showing Up, Old Ones Evolve

Hacking

Bleepingcomputer

29.11.19

Beware of Thanksgiving eCard Emails Distributing Malware

Virus

Bleepingcomputer

29.11.19

Dutch Govt Warns of 3 Ransomware Infecting 1,800 Businesses

Ransomware

Bleepingcomputer

29.11.19

Group-IB presents its annual report on global threats to stability in cyberspace

CyberCrime

Securityaffairs

29.11.19

IT threat evolution Q3 2019

Analysis

Securelist

29.11.19

IT threat evolution Q3 2019. Statistics

Analysis

Securelist

29.11.19

Dutch National Cyber Security Centre warns ransomware infected thousands of businesses

BigBrothers

Securityaffairs

29.11.19

RevengeHotels campaign – crooks target the hospitality industry

Virus

Securityaffairs

29.11.19

Bytedance: The Chinese Company Behind Global TikTok Craze

BigBrothers

Securityweek

29.11.19

ISC Snapshot: Search with SauronEye

Security

SANS

29.11.19

Pain points for CTOs: A primer of the most stressful aspects of the job

Security

Net-security

28.11.19

Twitter Rolls Back Decision to Delete Inactive Accounts

Social

Bleepingcomputer

28.11.19

Ryuk Ransomware Forces Prosegur Security Firm to Shut Down Network

Ransomware

Bleepingcomputer

28.11.19

Microsoft Warns of Uncommon Windows 10 Thunderbolt Issue

OS

Bleepingcomputer

28.11.19

A Ransomware infected the network of the cybersecurity firm Prosegur

Ransomware

Securityaffairs

28.11.19

RevengeHotels: cybercrime targeting hotel front desks worldwide

APT

Securelist

28.11.19

Dexphot Malware Hijacked 80K+ Devices to Mine Cryptocurrency

Cryptocurrency  Hacking

Threatpost

28.11.19

IoT Smartwatch Exposes Kids’ Personal, GPS Data

IoT  Privacy

Threatpost

28.11.19

NSO Group President Defends Controversial Tactics

CyberCrime

Threatpost

28.11.19

SDKs Misused to Scrape Twitter, Facebook Account Info

Social  Virus

Threatpost

28.11.19

Adobe revealed that the Magento Marketplace was hacked

Hacking

Securityaffairs

28.11.19

Law enforcement agencies arrested 79 people involved in fraudulent online purchases of flight tickets

CyberCrime

Securityaffairs

28.11.19

Dexphot Malware Uses Randomization, Encryption, and Polymorphism to Evade Detection

Virus

Securityweek

28.11.19

German Court Backs Murderer's 'Right to be Forgotten'

Crime

Securityweek

28.11.19

Magento Marketplace Suffers Data Breach Exposing Users' Account Info

Incindent

Thehackernews

28.11.19

Five cybersecurity certifications that provide value to employers

Cyber

Net-security

28.11.19

How can financial institutions prevent shopping season fraud?

Security

Net-security

28.11.19

There’s no way to fill the data skills gap, what now?

Security

Net-security

27.11.19

Ransomware Locks Medical Records at Great Plains Health

Ransomware

Bleepingcomputer

27.11.19

Microsoft Adds Split Panes Feature to Windows Terminal v0.7

OS

Bleepingcomputer

27.11.19

Windows 10 2004 is the Next Feature Update, Preps for Tests

OS

Bleepingcomputer

27.11.19

Top 25 Most Dangerous Vulnerabilities Refreshed After 8 Years

Vulnerebility

Bleepingcomputer

27.11.19

Windows 10 1909 KB4517245 Update Causes File Explorer Issues

OS

Bleepingcomputer

27.11.19

HP Warns That Some SSD Drives Will Fail at 32,768 Hours of Use

Security

Bleepingcomputer

27.11.19

Almost 60% Of Malicious Ads Come from Three Ad Providers

Virus

Bleepingcomputer

27.11.19

Dexphot Polymorphic Malware Shows Complexity of Everyday Threats

Virus

Bleepingcomputer

27.11.19

New DeathRansom Ransomware Begins to Make a Name for Itself

Ransomware

Bleepingcomputer

27.11.19

Holiday Scam Season Is Here for All Shoppers

Spam

Bleepingcomputer

27.11.19

Upbit cryptocurrency exchange hacked, crooks stole $48.5 million worth of ETH

Cryptocurrency

Securityaffairs

27.11.19

Meet Kilos, a New Search Engine for the Dark Web

Security

Securityweek

27.11.19

Google Shares Data on State-Sponsored Hacking Attempts

Hacking

Securityweek

27.11.19

Hackers Steal $49 Million in Ethereum From Cryptocurrency Exchange Upbit

Cryptocurrency

Securityweek

27.11.19

Malware Found on Payment System Used by On The Border Restaurants

Virus

Securityweek

27.11.19

Over 12,000 Google Users Hit by Government Hackers in 3rd Quarter of 2019

BigBrothers

Thehackernews

27.11.19

Microsoft warns of Dexphot miner, an interesting polymorphic threat

Cryptocurrency

Securityaffairs

27.11.19

Full(z) House Magecart group mix phishing and MiTM in its attacks

Attack  CyberCrime  Phishing

Securityaffairs

27.11.19

Twitter, Facebook User Data Improperly Accessed via Malicious SDKs

Social   Virus

Securityweek

27.11.19

Latest Kali Linux OS Added Windows-Style Undercover Theme for Hackers

OS

Thehackernews

27.11.19

Magecart Group Switches Up Tactics with MiTM, Phishing

CyberCrime  Phishing

Threatpost

27.11.19

Black Friday Shoppers Targeted By Scams and Fake Domains

Spam

Threatpost

27.11.19

Austin Man Indicted for Stealing Unreleased Music from Artists

Virus

Threatpost

27.11.19

Managing the Human Security Factor in the Age of Ransomware

Ransomware

Threatpost

27.11.19

Kaspersky addressed multiple issues in online protection solutions

Vulnerebility

Securityaffairs

27.11.19

Finding an Agent Tesla malware sample

Virus

SANS

27.11.19

Most businesses have yet to allocate a CCPA compliance budget

Security

Net-security

27.11.19

Port cybersecurity: Safeguarding operations against cyber attacks

Cyber

Net-security

27.11.19

SoniTalk: A new method for near-field communication

Security

Net-security

27.11.19

As the online shopping season begins, consumers worry about cybercrime

CyberCrime

Net-security

26.11.19

Czech intelligence report warns of Russian and Chinese activity in the country

BigBrothers

Securityaffairs

26.11.19

Experts discovered control systems for aircraft warning lights open online

BigBrothers

Securityaffairs

26.11.19

Kaspersky Patches Several Vulnerabilities in Web Protection Features

Vulnerebility

Securityweek

26.11.19

The Hidden Danger in Berners-Lee's Contract for the Web

Security

Securityweek

26.11.19

Detectify Raises $23.7 Million in Series B Funding Round

IT

Securityweek

26.11.19

Attack Simulation Firm Cymulate Raises $15 Million

IT

Securityweek

26.11.19

Malicious Android SDKs Caught Accessing Facebook and Twitter Users Data

Android

Thehackernews

26.11.19

RIPlace Evasion Technique

Papers

Papers

26.11.19

Phishers Create Fake Sites as Bait for Holiday Shopping Deals

Phishing

Bleepingcomputer

26.11.19

Over 38 Million Healthcare Records Exposed in Breaches Over 2019

Incindent

Bleepingcomputer

26.11.19

Splunk Faces Y2K Bug-Like Problem Unless Patched

Vulnerebility

Bleepingcomputer

26.11.19

Mozilla to Block Fingerprinters by Default in Firefox 72

Safety

Bleepingcomputer

26.11.19

FortiGuard Used Hardcoded Key, XOR to Encrypt Communications

Safety

Bleepingcomputer

26.11.19

Scam Browser Notification Prompts Increased by 69% in 2019

Spam

Bleepingcomputer

26.11.19

Ginp Android Banker Sets as Default SMS App, Steals All Text

Android

Bleepingcomputer

26.11.19

Microsoft Fixes Windows 10 Qualcomm Wi-Fi Driver Update Block

OS

Bleepingcomputer

26.11.19

Livingston School District in New Jersey Hit With Ransomware

Ransomware

Bleepingcomputer

26.11.19

Silly Phishing Spotlight: Login to Unblock Microsoft Excel

Phishing

Bleepingcomputer

26.11.19

Spam and phishing in Q3 2019

Analysis  Spam  Phishing

Securelist

26.11.19

Facebook and Twitter warn of malicious SDK harvesting personal data from its accounts

Social  Virus

Securityaffairs

26.11.19

Some Fortinet products used hardcoded keys and weak encryption for communications

Crypto

Securityaffairs

26.11.19

Czech Intel Report Highlights Russian, Chinese Spying

BigBrothers

Securityweek

26.11.19

New 'Ginp' Android Trojan Targets Credentials, Payment Card Data

Virus

Securityweek

26.11.19

Palo Alto Networks to Acquire Aporeto for $150 Million

IT

Securityweek

26.11.19

Many Apps Impacted by GIF Processing Flaw Patched Recently in WhatsApp

Social  Vulnerebility

Securityweek

26.11.19

NYPD Fingerprint Database Taken Offline to Thwart Ransomware

Ransomware

Threatpost

26.11.19

PoS Malware Exposes Customer Data of Catch Restaurants

Virus

Threatpost

26.11.19

TrickBot Evolves to Go After SSH Keys

Virus

Threatpost

26.11.19

Lessons learned from playing a willing phish

Phishing

SANS

26.11.19

PoC exploit code for Apache Solr RCE flaw is available online

Exploit  Vulnerebility

Securityaffairs

26.11.19

Chinese Woman Sentenced to 8 Months for Trespass at Trump Resort: Report

Crime

Securityweek

26.11.19

New Technique Allows Ransomware to Operate Undetected

Ransomware

Securityweek

26.11.19

Catch Restaurants Hit by Point-of-Sale Malware

Virus

Securityweek

26.11.19

The overlooked part of an infosec strategy: Cyber insurance underwriting

Cyber

Net-security

26.11.19

CVE gap widens: 16,738 vulnerabilities disclosed during the first nine months of 2019

Vulnerebility

Net-security

26.11.19

Free download: Botnet and IoT Security Guide 2020

Safety

Net-security

26.11.19

Merchants must find ways to balance security with a seamless customer experience

Security

Net-security

26.11.19

Smart car security: Good practices to improve car safety

Safety

Net-security

25.11.19

Hitbsecconf2019 Abu Dhabi

Conference Press

Conference Press

25.11.19

Hitbsecconf2018DXB

Conference Press

Conference Press

25.11.19

Hitbsecconf2018sg

Conference Press

Conference Press

25.11.19

Federal Cyber Experts Christen Satellite Office in Georgia

BigBrothers

Securityweek

25.11.19

Church's Chicken Restaurants Hit by Payment Card Breach

Incindent

Securityweek

25.11.19

Data on 1.2 Billion Users Found in Exposed Elasticsearch Server

Incindent

Securityweek

25.11.19

Unwanted notifications in browser

CyberCrime

Securelist

25.11.19

After 1 Million of malware samples analyzed

Virus

Securityaffairs

25.11.19

Federal Communications Commission has cut off government funding for equipment from Chinese firms

BigBrothers

Securityaffairs

25.11.19

Cyberattack Hit 10% of Louisiana's State Government Servers

BigBrothers

Securityweek

25.11.19

Order Information of OnePlus Customers Exposed in Data Breach

Incindent

Securityweek

25.11.19

Apache Solr RCEs with public PoCs could soon be exploited

Exploit

Net-security

25.11.19

My Little DoH Setup

Security

SANS

25.11.19

Raccoon Stealer campaign circumvents Microsoft and Symantec anti-spam messaging gateways

CyberCrime

Securityaffairs

25.11.19

Twitter allows users to use 2FA without a phone number

Social

Securityaffairs

25.11.19

Iran – Government blocks Internet access in response to the protests

BigBrothers

Securityaffairs

25.11.19

US Regulators Bar Govt Telecom Funds for Huawei, ZTE

BigBrothers  Mobil

Securityweek

25.11.19

Preventing insider threats, data loss and damage through zero trust

Security

Net-security

25.11.19

Growing complexity is driving operational changes to privacy programs

Privacy

Net-security

25.11.19

Developers worry about security, still half of teams lack an expert

Security

Net-security

25.11.19

Cybercriminals targeting e-commerce website vulnerabilities this holiday season

Cyber

Net-security

25.11.19

Data security and automation top IT projects for 2020, AI not a priority

Security

Net-security

24.11.19

SONICWALL LEADS SERIES A ROUND FUNDING IN ZERO TRUST SECURITY PROVIDER PERIMETER 81

Security blog

Sonicwall

24.11.19

Protect your webcam from hackers with these 5 tips

Safety blog

Avast blog

24.11.19

Amazon tells senator there are few restrictions on how police may use Ring doorbell footage

BigBrother blog

Avast blog

24.11.19

Trickbot Updates Password Grabber Module

Malware blog

Palo Alto Unity42

24.11.19

Docker Patched the Most Severe Copy Vulnerability to Date With CVE-2019-14271

Vulnerebility blog

Palo Alto Unity42

24.11.19

Better Together: Security + SD-WAN by Palo Alto Networks

Cyber blog

Palo Alto

24.11.19

3 Tips for Women Aspiring to Succeed in Technology

Cyber blog

Palo Alto

24.11.19

Securing Google Cloud Run with Prisma Cloud

Cyber blog

Palo Alto

24.11.19

Elasticity of Scale: Can Your Cloud Security Keep Up?

Cyber blog

Palo Alto

24.11.19

Cybersecurity Canon Candidate Book Review: Blackout: Tomorrow Will Be Too L...

Cyber blog

Palo Alto

24.11.19

Ransom News

Ransom

Ransom

24.11.19

GalactiCrypter  Decryptor

Anti-ransom Tool

Anti-ransom Tool

24.11.19

Hakbit  Decryptor

Anti-ransom Tool

Anti-ransom Tool

24.11.19

TurkStatik Decryptor

Anti-ransom Tool

Anti-ransom Tool

24.11.19

Windows 10 Upgrades Blocked if Using Old Versions of AVG, Avast

Safety

Bleepingcomputer

24.11.19

Catch Restaurants Disclose Credit Card Stealing Malware Incident

Virus

Bleepingcomputer

24.11.19

TrickBot Trojan Getting Ready to Steal OpenSSH and OpenVPN Keys

Virus

Bleepingcomputer

24.11.19

OnePlus Exposed Customer Order Information in Data Breach

Incindent

Bleepingcomputer

24.11.19

Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions

Vulnerebility

Bleepingcomputer

24.11.19

Clop Ransomware Tries to Disable Windows Defender, Malwarebytes

Ransomware

Bleepingcomputer

24.11.19

FBI Warns of Cyber Attacks Targeting US Automotive Industry

BigBrothers

Bleepingcomputer

24.11.19

Allied Universal Breached by Maze Ransomware, Stolen Data Leaked

Ransomware

Bleepingcomputer

24.11.19

Edenred Payment Solutions Giant Announces Malware Incident

Incindent

Bleepingcomputer

24.11.19

T-Mobile Discloses Data Breach Impacting Prepaid Customers

Incindent

Bleepingcomputer

24.11.19

Local Malware Analysis with Malice

Virus

SANS

24.11.19

Catch Hospitality Group discloses PoS malware infection at its restaurants

Virus

Securityaffairs

23.11.19

Kaspersky found dozens of flaws in 4 open-source VNC software

Vulnerebility

Securityaffairs

23.11.19

Chinese smartphone vendor OnePlus discloses a new data breach

BigBrothers

Securityaffairs

23.11.19

Dozens of Severe Flaws Found in 4 Popular Open Source VNC Software

Vulnerebility

Thehackernews

23.11.19

Windows 10 1909 Drops Exploit Protection From Security Baseline

OS

Bleepingcomputer

23.11.19

Microsoft 365 Experiencing OneDrive and SharePoint Outages

Security

Bleepingcomputer

23.11.19

Card Skimmer Group Replaces Checkout Page to Steal Payment Info

CyberCrime

Bleepingcomputer

23.11.19

Microsoft Outlook for Android Gets Spoofing Vulnerability Fix

Android

Bleepingcomputer

23.11.19

Google Adds $1.5 Million Top Reward to Android Bug Bounty Program

Android

Bleepingcomputer

23.11.19

DePriMon Malware Registers Itself as a Windows Print Monitor

Virus

Bleepingcomputer

23.11.19

New RIPlace Bypass Evades Windows 10, AV Ransomware Protection

Ransomware

Bleepingcomputer

23.11.19

Microsoft Warns Customers of DoppelPaymer Ransomware Threat

Ransomware

Bleepingcomputer

23.11.19

Linux Webmin Servers Being Attacked by New P2P Roboto Botnet

BotNet

Bleepingcomputer

23.11.19

Intel Posts Letter Apologizing for Continued CPU Shortages

Security

Bleepingcomputer

23.11.19

THE HIGHER-ED SECURITY CHALLENGE: HOW TO KEEP AN OPEN NETWORK AND REMAIN FULLY PROTECTED

Hacking blog

Cybereason

23.11.19

PHOENIX: THE TALE OF THE RESURRECTED KEYLOGGER

Malware blog

Cybereason

23.11.19

Regional Threat Perspectives, Fall 2019: Middle East

Cyber blog

F5 Labs

23.11.19

Long-known Vulnerabilities in High-Profile Android Applications

OS Blog

Checkpoint

23.11.19

Phorpiex Breakdown

Spam blog

Checkpoint

23.11.19

Bad Binder: Android In-The-Wild Exploit

OS Blog  Exploit blog

Project Zero

23.11.19

Vulnerability Spotlight: Tenda AC9 /goform/WanParameterSetting command injection vulnerability

Vulnerebility blog

Cisco Talos

23.11.19

Vulnerability Spotlight: Two remote code execution vulnerabilities in Xcftools

Vulnerebility blog

Cisco Talos

23.11.19

Cryptominers, ransomware among top malware in IR engagements in Q4

Security blog

Cisco Talos

23.11.19

How the new Talos IR Cyber Range can prepare your employees for a cyber attack

Cyber blog

Cisco Talos

23.11.19

Should cybersecurity be taught in schools?

Cyber blog

Eset

23.11.19

Registers as “Default Print Monitor”, but is a malicious downloader. Meet DePriMon

Malware blog

Eset

23.11.19

What does it take to attract top cybersecurity talent?

Cyber blog

Eset

23.11.19

Mispadu: Advertisement for a discounted Unhappy Meal

Malware blog

Eset

23.11.19

Disney+ accounts hacked – How to protect yourself

Hacking blog

Eset

23.11.19

Raccoon Stealer Malware Scurries Past Microsoft Messaging Gateways

Virus

Threatpost

23.11.19

Data-Enriched Profiles on 1.2B People Exposed in Gigantic Leak

Incindent

Threatpost

23.11.19

Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip

Security

Threatpost

23.11.19

News Wrap: Amazon Ring Risks, Stalkerware, and D-Link Router Flaws

Security

Threatpost

23.11.19

ID Thieves Turn to Snail Mail as Juicy Target for Financial Crimes

CyberCrime

Threatpost

23.11.19

Three Areas to Consider, to Focus Your Cyber-Plan

Cyber

Threatpost

23.11.19

Critical Flaws in VNC Threaten Industrial Environments

Vulnerebility

Threatpost

23.11.19

Personal and social information of 1.2B people exposed on an open Elasticsearch install

Incindent

Securityaffairs

23.11.19

Twitter Users Can Now Use 2FA Without a Phone Number

Social

Securityweek

23.11.19

OnePlus Suffers New Data Breach Impacting Its Online Store Customers

Incindent

Thehackernews

22.11.19

French Rouen hospital hit by a ransomware attack

Ransomware

Securityaffairs

22.11.19

Dozens of Vulnerabilities Found in Open Source VNC Systems

Vulnerebility

Securityweek

22.11.19

Cloudflare Open-Sources Network Vulnerability Scanner

Safety

Securityweek

22.11.19

Geopolitical Tensions Fuel Worsening Cyberattack Scenario

Cyber

Securityweek

22.11.19

Lithuanian Extradited to U.S. Over Hacking, Fraud Charges

Crime

Securityweek

22.11.19

Payment solutions giant Edenred announces malware infection

Virus

Securityaffairs

22.11.19

CISA Announces Open Source Post-Election Auditing Tool

Safety

Securityweek

22.11.19

Russian Man Sentenced to Prison for Using Neverquest Trojan to Steal Money

Crime

Securityweek

22.11.19

Google offers up to $1.5 million bounty for remotely hacking Titan M chip

Security

Thehackernews

22.11.19

Arlo: An open source post-election auditing tool

Security

Net-security

22.11.19

Google ups bug bounties for Android flaws, exploits

Android

Net-security

22.11.19

Twitter finally allows users to delete their phone number without disabling 2FA

Social

Net-security

22.11.19

Cyber threats continue to evolve, but security teams remain confident

Cyber

Net-security

22.11.19

Black Friday Alert 2019: Net Shopping Bag of Threats

Security

Securelist

22.11.19

5G security and privacy for smart cities

Mobil  Privacy

Securelist

22.11.19

Russian author of NeverQuest banking malware gets 4 Years in U.S. Prison

Crime

Securityaffairs

22.11.19

T-Mobile discloses data breach affecting prepaid wireless customers

Incindent

Securityaffairs

22.11.19

AccorHotels subsidiary Gekko Group exposes hotels and travelers data in massive data leak

Incindent

Securityaffairs

22.11.19

Hackers Accessed Information of T-Mobile Prepaid Customers

Incindent

Securityweek

22.11.19

Russian Hacker Behind NeverQuest Banking Malware Gets 4 Years in U.S. Prison

Crime

Thehackernews

22.11.19

Linux Webmin Servers Under Attack by Roboto P2P Botnet

BotNet

Threatpost

22.11.19

Popular Apps on Google Play Store Remain Unpatched

Android

Threatpost

22.11.19

Gnip Banking Trojan Shows Ongoing, Aggressive Development

Virus

Threatpost

22.11.19

Senators Demand Amazon Disclose Ring Privacy Policies

BigBrothers

Threatpost

22.11.19

Microsoft Outlook for Android Bug Opens Door to XSS

Android

Threatpost

22.11.19

Download: 2019 Security Team Assessment Template

Security

Threatpost

22.11.19

ENISA publishes a Threat Landscape for 5G Networks

Mobil

Securityaffairs

22.11.19

Google will pay up to $1.5m for full chain RCE for Android on Titan M chips

Android

Securityaffairs

22.11.19

DePriMon downloader uses a never seen installation technique

Virus

Securityaffairs

22.11.19

Threat Intelligence Firm IntSights Raises $30 Million

IT

Securityweek

22.11.19

Google Offering Up to $1.5 Million for Pixel Titan M Exploits

IT

Securityweek

22.11.19

Critical Bug Patched in Popular Jetpack WordPress Plugin

Vulnerebility

Securityweek

22.11.19

'DePriMon' Malware First to Use Port Monitor for Persistence

Virus

Securityweek

22.11.19

Ongoing Research Project Examines Application of AI to Cybersecurity

Cyber

Securityweek

22.11.19

Long-Patched Vulnerabilities Still Present in Many Popular Android Apps

Android

Securityweek

22.11.19

T-Mobile Suffers Data Breach Affecting Prepaid Wireless Customers

Incindent

Thehackernews

22.11.19

Abusing Web Filters Misconfiguration for Reconnaissance

Safety

SANS

22.11.19

Risky behavior exposes consumers to seasonal security scares

Security

Net-security

22.11.19

Create secure IoT products: Enable security by design

IoT

Net-security

21.11.19

Millions of Sites Exposed by Flaw in Jetpack WordPress Plugin

Vulnerebility

Bleepingcomputer

21.11.19

uBlock Origin Now Blocks Sneaky First-Party Trackers in Firefox

Security

Bleepingcomputer

21.11.19

New Banking Trojan Infects Victims via McDonald’s Malvertising

Virus

Bleepingcomputer

21.11.19

Ransomware Gangs Adopt APT Tactics in Targeted Attacks

APT  Ransomware

Bleepingcomputer

21.11.19

Thousands of Enterprises At Risk Due to Oracle EBS Critical Flaws

Vulnerebility

Bleepingcomputer

21.11.19

NSA Publishes Advisory Addressing Encrypted Traffic Inspection Risks

BigBrothers

Bleepingcomputer

21.11.19

Microsoft Fixes Office 2016 Access Query Error, More Fixes Coming

Vulnerebility

Bleepingcomputer

21.11.19

Critical Windows Update Spam Fails at Delivering Ransomware

Ransomware

Bleepingcomputer

21.11.19

Coin Stealer Found in Monero Linux Binaries From Official Site

Cryptocurrency

Bleepingcomputer

21.11.19

Android Camera App Bug Lets Apps Record Video Without Permission

Android

Bleepingcomputer

21.11.19

The cybercrime ecosystem: attacking blogs

CyberCrime

Securelist

21.11.19

A critical flaw in Jetpack exposes millions of WordPress sites

Vulnerebility

Securityaffairs

21.11.19

Microsoft warns of growing DoppelPaymer Ransomware threat

Ransomware

Securityaffairs

21.11.19

Roboto, a new P2P botnet targets Linux Webmin servers

BotNet

Securityaffairs

21.11.19

Clumio Completes $135 Million Series C Funding Round

IT

Securityweek

21.11.19

DopplePaymer Ransomware Spreads via Compromised Credentials: Microsoft

Ransomware

Securityweek

21.11.19

New IBM Cloud Security Solution Combines Data From Existing Tools

Security

Securityweek

21.11.19

High-Severity Windows UAC Flaw Enables Privilege Escalation

Vulnerebility

Threatpost

21.11.19

Hackers Dump 2.2M Gaming, Cryptocurrency Passwords Online

Security

Threatpost

21.11.19

ThreatList: Admin Rights for Third Parties is the Norm

Security

Threatpost

21.11.19

Security Firms, Nonprofits Team to Fight Stalkerware

Security

Threatpost

21.11.19

Mozilla Bug Bounty Program Doubles Payouts, Adds Firefox Monitor

Vulnerebility

Threatpost

21.11.19

Apache Solr Bug Gets Bumped Up to High Severity

Vulnerebility

Threatpost

21.11.19

Chicago student charged with writing code to spread ISIS propaganda

Cyber

Securityaffairs

21.11.19

Amnesty International Calls Facebook, Google Rights Abusers

BigBrothers

Securityweek

21.11.19

Senators Press Amazon Over Doorbell Camera Security Concerns

BigBrothers

Securityweek

21.11.19

Security Automation Firm ZecOps Raises $10 Million in Seed Funding

IT

Securityweek

21.11.19

New Legislation Would Block US Firms From Storing Personal Data in China, Russia

BigBrothers

Securityweek

21.11.19

Do third-party users follow security best practices and policies?

Security

Net-security

21.11.19

Driving collaboration between security and IT ops teams is a major challenge

Security

Net-security

21.11.19

Inadequate data sanitization puts enterprises at risk of breaches and compliance failures

Incindent

Net-security

21.11.19

Cyber risk increases at all layers of the corporate network

Security

Net-security

21.11.19

Podcast – Malcolm, a new tool for network visibility

Security

Net-security

21.11.19

Google introduces new G Suite security options

Security

Net-security

20.11.19

U.S. Senators Seek Answers on Facebook’s Handling of User Information

BigBrothers

Securityweek

20.11.19

Disney Plus Blames Past Hacks for User Accounts Sold Online

Hacking

Securityweek

20.11.19

Meet Phoenix Keylogger, a New Malware-as-a-Service Product Gaining Traction

Virus

Securityweek

20.11.19

Email Security Firm Abnormal Security Exits Stealth Mode With $24M in Funding

IT

Securityweek

20.11.19

NSA Issues Advisory on Mitigation of Risks Associated With TLSI

BigBrothers

Securityweek

20.11.19

Army's Use of TikTok App Raises Concerns on Capitol Hill

BigBrothers

Securityweek

20.11.19

XSS Flaw in Gmail's Dynamic Email Feature Earns Researcher $5,000

Vulnerebility

Securityweek

20.11.19

Shade Ransomware Is the Most Actively Distributed Malware via Email

Ransomware

Bleepingcomputer

20.11.19

Louisiana Government Suffers Outage Due to Ransomware Attack

Ransomware

Bleepingcomputer

20.11.19

Macy's Customer Payment Info Stolen in Magecart Data Breach

Incindent

Bleepingcomputer

20.11.19

Microsoft Is Adding DNS-Over-HTTPS (DoH) to Windows 10

OS

Bleepingcomputer

20.11.19

Google Chrome's 'Close Other Tabs' Option Is Back!

Security

Bleepingcomputer

20.11.19

IRS Publishes Guidance to Help Taxpayers Fight Identity Theft

Cyber

Bleepingcomputer

20.11.19

Buran Ransomware Infects PCs via Microsoft Excel Web Queries

Ransomware

Bleepingcomputer

20.11.19

Linux, Windows Users Targeted With New ACBackdoor Malware

Virus

Bleepingcomputer

20.11.19

Intel is Removing End of Life Drivers and BIOS Downloads

Security

Bleepingcomputer

20.11.19

Microsoft to Stop Supporting Cortana on Android and iOS

Android

Bleepingcomputer

20.11.19

Monero Project site compromised, served malware-infected binaries

Cryptocurrency

Net-security

20.11.19

The cake is a lie! Uncovering the secret world of malware-like cheats in video games

Virus

Securelist

20.11.19

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020

Security

Securelist

20.11.19

Monero Project website has been compromised to deliver a coin stealer

Cryptocurrency

Securityaffairs

20.11.19

Hackers leak 2TB of Data From Cayman National Bank stolen by Phineas Fisher

Incindent

Securityaffairs

20.11.19

Cryptocurrency Stealer Delivered From Official Monero Website

Cryptocurrency

Securityweek

20.11.19

Official Monero Site Hacked to Distribute Cryptocurrency Stealing Malware

Cryptocurrency

Thehackernews

20.11.19

McDonalds-Themed Facebook Ads Serve Up Banking Trojans

Virus

Threatpost

20.11.19

Google Discloses Android Camera Hijack Hack

Android

Threatpost

20.11.19

Macy’s Suffers Data Breach by Magecart Cybercriminals

CyberCrime

Threatpost

20.11.19

‘Windows Update’ Installs Cyborg Ransomware

Ransomware

Threatpost

20.11.19

400 Vet Locations Nipped by Ryuk Ransomware

Ransomware

Threatpost

20.11.19

D-Link Adds More Buggy Router Models to ‘Won’t Fix’ List

Vulnerebility

Threatpost

20.11.19

Ransomware Revival: Troldesh becomes a leader by the number of attacks

Ransomware

Securityaffairs

20.11.19

CTHoW v2.0 – Cyber Threat Hunting on Windows

Cyber

Securityaffairs

20.11.19

CVE-2019-2234 flaws in Android Camera Apps exposed millions of users surveillance

Vulnerebility

Securityaffairs

20.11.19

Bigger Rewards, New Targets Announced for Mozilla Bug Bounty Program

Security

Securityweek

20.11.19

Trend Micro Unveils New Cloud Security Platform

Safety

Securityweek

20.11.19

New Flaw Lets Rogue Android Apps Access Camera Without Permission

Android

Thehackernews

20.11.19

Hancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike

Virus

SANS

20.11.19

Women in cybersecurity can benefit from taking inventory of their personal apps

Cyber

Net-security

20.11.19

California IoT security law: What it means and why it matters

IoT

Net-security

20.11.19

1.19 billion confidential medical images available on the internet

Incindent

Net-security

20.11.19

Only 11% of organizations can detect intruders in under one minute

Security

Net-security

20.11.19

Attackers increasingly embrace small-scale DDoS attacks to evade detection

Attack

Net-security

20.11.19

Template: Assess the performance of your security team

Security

Net-security

19.11.19

Alleged Magecart hackers planted a software skimmer into Macy’s Website

CyberCrime

Securityaffairs

19.11.19

Adobe announces end of support for Acrobat 2015 and Adobe Reader 2015

Security

Securityaffairs

19.11.19

Ransomware infected systems at state government of Louisiana

Ransomware

Securityaffairs

19.11.19

Belorussian authorities blocked ProtonMail following a wave of bomb threats

BigBrothers

Securityaffairs

19.11.19

Fake Windows Update Delivers Cyborg Ransomware

Ransomware

Securityweek

19.11.19

Cyber Risk Analytics Firm CyberCube Raises $35 Million

IT

Securityweek

19.11.19

US, Montenegro Plot Cyber Warfare Ahead of 2020 Elections

BigBrothers

Securityweek

19.11.19

Microsoft Will Bring DNS Over HTTPS (DoH) to Windows

Safety

Securityweek

19.11.19

Technology Firms and Victim Advocacy Groups Launch Coalition Against Stalkerware

Security

Securityweek

19.11.19

Vulnerabilities in Android Camera Apps Exposed Millions of Users to Spying

Android

Securityweek

19.11.19

Support for Adobe Acrobat, Reader 2015 Will End on April 7, 2020

Security

Securityweek

19.11.19

Ransomware Attack Hits Louisiana State Servers

Ransomware

Securityweek

19.11.19

Payment Card Skimmer Found on Macy's Website

CyberCrime

Securityweek

19.11.19

Louisiana State Government Hit by Ransomware Attack Forcing Server Shutdowns

Ransomware

Thehackernews

19.11.19

Cheap Chinese JAWS of DVR Exploitability on Port 60001

Exploit

SANS

19.11.19

Android camera apps could be hijacked to spy on users

Android

Net-security

19.11.19

Macy’s online store compromised in Magecart-style attack

CyberCrime

Net-security

19.11.19

WhatsApp Remote Code Execution Triggered by Videos

Social

Threatpost

19.11.19

The Unhappiest Subscribers on Earth? Disney+ Accounts Hacked & Hijacked

Hacking

Threatpost

19.11.19

‘Wildly Different’ Privacy Regulations Causing Compliancy Chaos

Privacy

Threatpost

19.11.19

Office 365 Admins Targeted in Ongoing Phishing Scam

Phishing

Threatpost

19.11.19

Americans Concerned, Confused Over Privacy, Survey Reveals

Privacy

Threatpost

19.11.19

Pipka Card Skimmer Removes Itself After Infecting eCommerce Sites

CyberCrime

Threatpost

19.11.19

Tianfu Cup Round-Up: Safari, Chrome, D-Link Routers and Office 365 Successfully Hacked

Congress

Threatpost

19.11.19

Tianfu Cup 2019 – 11 teams earned a total of 545,000 for their Zero-Day Exploits

Congress

Securityaffairs

19.11.19

Google addressed an XSS flaw in Gmail

Vulnerebility

Securityaffairs

19.11.19

Google Healthcare Project Targeted by Congress Committee

BigBrothers

Securityweek

19.11.19

Vulnerability in ABB Plant Historian Disclosed 5 Years After Discovery

Vulnerebility

Securityweek

19.11.19

1Password Raises $200 Million in Series A Funding

IT

Securityweek

19.11.19

First Cypriot to Be Extradited to US, on Hacking Charges

BigBrothers

Securityweek

19.11.19

DDoS-for-Hire Service Admin Gets 13 Months in Prison

Crime

Securityweek

19.11.19

Security of North American Energy Grid Tested in GridEx Exercise

Security

Securityweek

19.11.19

Want to build a successful SOC? Here’s what you need to know

Security

Net-security

19.11.19

Redefining security KPIs for 5G service providers

Mobil

Net-security

19.11.19

Review: Foundations of Information Security

Security

Net-security

19.11.19

The way Bluetooth devices ‘talk’ to apps leaves them vulnerable

Mobil  Vulnerebility

Net-security

19.11.19

Managed detection and response: Separating the players from the pretenders

Security

Net-security

19.11.19

WhatsApp RCE flaw can be exploited by sending malicious MP4 files

Social

Net-security

18.11.19

Experts report a rampant growth in the number of malicious, lookalike domains

Virus

Securityaffairs

18.11.19

WhatsApp Vulnerability Allows Code Execution Via Malicious MP4 File

Social   Virus

Securityweek

18.11.19

Zero-Day Exploits Earn Hackers Over $500K at Chinese Competition

Congress

Securityweek

18.11.19

Most Americans feel powerless to prevent data collection, online tracking

Cyber

Net-security

18.11.19

New NextCry Ransomware targets Nextcloud instances on Linux servers

Ransomware

Securityaffairs

18.11.19

Crooks use carding bots to check stolen card data ahead of the holiday season

Incindent

Securityaffairs

18.11.19

SMS and 2FA: Another Reason to Move away from It.

Spam

SANS

18.11.19

Hackers helping communities: Leveraging OSINT to find missing persons

Security

Net-security

18.11.19

Study on public cloud performance: AWS, GCP, Azure, Alibaba and IBM Cloud

Security

Net-security

18.11.19

Trusted certificates make phishing websites appear valid

Phishing

Net-security

18.11.19

Healthcare spikes data breach fever, endpoint threat detections grow 60%

Incindent

Net-security

18.11.19

Do your infosec habits make you vulnerable to fraud?

Vulnerebility

Net-security

17.11.19

How to Download the Windows 10 1909 ISO From Microsoft

OS

Bleepingcomputer

17.11.19

Microsoft Removes Windows 10 1909 Realtek Driver Update Block

OS

Bleepingcomputer

17.11.19

Microsoft Office 365 Admins Targeted by Ongoing Phishing Campaign

Phishing

Bleepingcomputer

17.11.19

Windows 10 Build 19025 With Throttled Search Indexer Out for Insiders

OS

Bleepingcomputer

17.11.19

US Govt Recommends Vendor System Configs To Block Malware Attacks

BigBrothers  Virus

Bleepingcomputer

17.11.19

New NextCry Ransomware Encrypts Data on NextCloud Linux Servers

Ransomware

Bleepingcomputer

17.11.19

Tianfu Cup 2019 Day 1 – Chinese experts hacked Chrome, Edge, Safari, Office365

Congress

Securityaffairs

17.11.19

Experts found undocumented access feature in Siemens SIMATIC PLCs

ICS

Securityaffairs

17.11.19

Ransom News

Ransom

Ransom

17.11.19

Meeting a Russian Ransomware Cell

Ransomware blog

Sonicwall

17.11.19

DDoS attack targets UK Labour Party website

Attack blog

Avast blog

17.11.19

Palo Alto Networks Delivers the Industry’s Most Comprehensive Secure Access Service Edge

Security blog

Palo Alto

17.11.19

Cyber Canon Candidate Book Review: The Internet of Risky Things: Trusting t...

Security blog

Palo Alto

17.11.19

When Will Threat Intelligence Deliver on Its Promise?

Security blog

Palo Alto

17.11.19

Introducing Cortex XDR 2.0

Security blog

Palo Alto

17.11.19

Google Cloud at Ignite Europe ‘19

Security blog

Palo Alto

17.11.19

New and Enhanced Palo Alto Networks Support Offerings Elevate the Customer ...

Security blog

Palo Alto

17.11.19

Container Security: Vulnerability Management from Build to Run

Vulnerebility blog

Palo Alto

17.11.19

Is CASB Alone Enough? Long Live SASE

Security blog

Palo Alto

17.11.19

Second Watch: An Initiative to Help Veterans Find a New Mission in Cybersec...

Security blog

Palo Alto

17.11.19

Cyber Canon Candidate Book Review: A Sustainable Digital Economy: Not Fear,...

Security blog

Palo Alto

17.11.19

Protecting Data Center Interconnect Links

Security blog

Palo Alto

17.11.19

DDoS-for-Hire Services Owner Sentenced to 13 Months in Prison

Crime

Bleepingcomputer

17.11.19

Google Fixes White Screen Problem in Chrome, Admins Furious

Vulnerebility

Bleepingcomputer

17.11.19

Silly Phishing Scam Warns That Your Password Will be Changed

Phishing

Bleepingcomputer

17.11.19

Two Charged Over Crypto Theft via SIM Swapping, Death Threats

Cryptocurrency  Mobil

Bleepingcomputer

17.11.19

Intel Patched 77 Vulnerabilities in November 2019 Platform Update

Vulnerebility

Bleepingcomputer

17.11.19

ProtonMail Thanks Paid Accounts by Giving 5GB Extra Storage

IT

Bleepingcomputer

17.11.19

US Health Network, Supplier Expose PII, PHI Data in Breaches

BigBrothers

Bleepingcomputer

17.11.19

Brave Urges Congress to Require Ad Blocking Browsers for Govt Employees

Security

Bleepingcomputer

17.11.19

Qualcomm Bug Exposes Critical Data on Samsung, LG Phones

Vulnerebility

Bleepingcomputer

17.11.19

Symantec Fixes Privilege Escalation Flaw in Endpoint Protection

Vulnerebility

Bleepingcomputer

17.11.19

WhatsApp flaw CVE-2019-11931 could be exploited to install spyware

Vulnerebility

Securityaffairs

16.11.19

New Threat Actor Impersonates Govt Agencies to Deliver Malware

Virus

Bleepingcomputer

16.11.19

Carding Bots Testing Payment Info Ahead of Big Shopping Events

BotNet

Bleepingcomputer

16.11.19

Microsoft Issues Guidance for Intel CPU Driver Security Flaws

Vulnerebility

Bleepingcomputer

16.11.19

Strange AnteFrigus Ransomware Only Targets Specific Drives

Ransomware

Bleepingcomputer

16.11.19

Microsoft Auto-Updating Windows 10 1803 Devices to May 2019 Update

OS

Bleepingcomputer

16.11.19

Microsoft Fixes Windows 10 1809 Issue That Broke Defender ATP

OS

Bleepingcomputer

16.11.19

TPM-FAIL Security Flaws Impact Modern Devices With Intel CPUs

Vulnerebility

Bleepingcomputer

16.11.19

Microsoft Releases the November 2019 Security Updates for Office

Vulnerebility

Bleepingcomputer

16.11.19

PureLocker Ransomware Can Lock Files on Windows, Linux, and macOS

Ransomware

Bleepingcomputer

16.11.19

Latest Intel CPUs Affected by New TSX Speculative Attack

Attack

Bleepingcomputer

16.11.19

Checkra1n, a working iPhone Jailbreak, was released

Apple

Securityaffairs

16.11.19

New WhatsApp Bug Could Have Let Hackers Secretly Install Spyware On Your Devices

Social

Thehackernews

16.11.19

Attention is All They Need: Combatting Social Media Information Operations With Neural Language Models

Social blog

FireEye

16.11.19

The One Thing You Can't Outsource: Risk

Security blog

F5 Labs

16.11.19

The Road to Qualcomm TrustZone Apps Fuzzing

Cyber blog

Checkpoint

16.11.19

Custom dropper hide and seek

Cyber blog

Cisco Talos

16.11.19

Hunting for LoLBins

Security blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Command injection bug in Exhibitor UI

Vulnerebility blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Denial-of-service vulnerability in Intel IGC64 graphics driver

Vulnerebility blog

Cisco Talos

16.11.19

Microsoft Patch Tuesday — Nov. 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Remote code execution vulnerability in Microsoft Media Foundation

Vulnerebility blog

Cisco Talos

16.11.19

Vulnerability Spotlight: Remote code execution vulnerability in Microsoft Excel

Vulnerebility blog

Cisco Talos

16.11.19

New partnership brings together Talos’ visibility with IR’s unmatched response capabilities

Security blog

Cisco Talos

16.11.19

Microsoft issues patch for Internet Explorer zero‑day

Vulnerebility blog

Eset

16.11.19

Getting into cybersecurity: Self‑taught vs. university‑educated?

Cyber blog

Eset

16.11.19

Facebook bug turns on iPhone camera in the background

Social blog

Eset

16.11.19

Can regulations improve cybersecurity? In APAC, opinions vary

Cyber blog

Eset

16.11.19

First BlueKeep attacks prompt fresh warnings

Attack blog

Eset

16.11.19

Stealthy Malware Flies Under AV Radar with Advanced Obfuscation

Virus

Threatpost

16.11.19

Lizard Squad Threatens UK’s Labour Leader with Cyberattacks Against His Family

BigBrothers  CyberCrime

Threatpost

16.11.19

Holiday Shoppers Beware: 100K Malicious Sites Found Posing as Well-Known Retailers

Virus

Threatpost

16.11.19

James Clapper: Lessons Learned in a Post-Snowden World

Security

Threatpost

16.11.19

Podcast: Managing an Out-Of-Control Security Tech Stack

Security

Threatpost

16.11.19

DDoS-for-Hire Services operator sentenced to 13 months in prison

Attack  Crime

Securityaffairs

16.11.19

Two men arrested for stealing $550,000 in cryptocurrency with Sim Swapping

Cryptocurrency

Securityaffairs

16.11.19

Fears Grow on Digital Surveillance: US Survey

Privacy

Securityweek

16.11.19

New GitHub Security Lab Aims to Secure Open Source Software

Security

Securityweek

16.11.19

Two Massachusetts Men Arrested and Charged in SIM Swapping Scheme

Mobil

Securityweek

16.11.19

Undocumented Access Feature Exposes Siemens PLCs to Attacks

ICS

Securityweek

15.11.19

The Australian Parliament was hacked earlier this year

BigBrothers

Securityaffairs

15.11.19

New TA2101 threat actor poses as government agencies to distribute malware

CyberCrime  Virus

Securityaffairs

15.11.19

A new sophisticated JavaScript Skimmer dubbed Pipka used in the wild

CyberCrime

Securityaffairs

15.11.19

InfoTrax Settles With FTC Over Data Breach

Incindent

Securityweek

15.11.19

Over 100,000 Fake Domains With Valid TLS Certificates Target Major Retailers

Crypto

Securityweek

15.11.19

Two Arrested for Stealing $550,000 in Cryptocurrency Using Sim Swapping

Cryptocurrency

Thehackernews

15.11.19

GitHub Security Lab aims to make open source software more secure

Security

Net-security

15.11.19

Attack tools and techniques used by major ransomware families

Ransomware

Net-security

15.11.19

Threat Actor Impersonates USPS to Deliver Backdoor Malware

Virus

Threatpost

15.11.19

Just-Released Checkra1n iPhone Jailbreak Stirs Security Concerns

Apple

Threatpost

15.11.19

ENFUSE 2019: Security Regulations, Insider Threats, and IoT Privacy Risks

Congress

Threatpost

15.11.19

Innovative PureLocker Ransomware Emerges in Targeted Attacks

Ransomware

Threatpost

15.11.19

Double Vision: Stealthy Malware Dropper Delivers Dual RATs

Virus

Threatpost

15.11.19

California’s Domino Effect on U.S. Privacy Regulation

BigBrothers  Privacy

Threatpost

15.11.19

Website, Know Thyself: What Code Are You Serving?

Security

Threatpost

15.11.19

APT33 Mounts Focused, Highly Targeted Botnet Attacks Against U.S. Victims

APT

Threatpost

15.11.19

Download: The Comprehensive Compliance Guide

Security

Threatpost

15.11.19

Experts found privilege escalation issue in Symantec Endpoint Protection

Vulnerebility

Securityaffairs

15.11.19

Flaws in Qualcomm chips allows stealing private from devices

Vulnerebility

Securityaffairs

15.11.19

LINE Launches Public Bug Bounty Program on HackerOne

Security

Securityweek

15.11.19

Corellium: Apple Sued Us After Failed Acquisition Attempt

Apple

Securityweek

15.11.19

DLL Hijacking Flaw Impacts Symantec Endpoint Protection

Vulnerebility

Securityweek

15.11.19

Online Retailers Ill-Prepared for Holiday Season

Security

Securityweek

15.11.19

Visa Warns of New JavaScript Skimmer 'Pipka'

CyberCrime

Securityweek

15.11.19

Iranian APT33 Hackers Use Special Botnets for High-Value Targets in U.S.

APT

Securityweek

15.11.19

New MITRE Foundation Aims to Boost Critical Infrastructure

Safety

Securityweek

15.11.19

New Group of Hackers Targeting Businesses with Financially Motivated Cyber Attacks

CyberCrime

Thehackernews

15.11.19

Some packet-fu with Zeek (previously known as bro)

Security

SANS

15.11.19

To improve incident response, you need to consider 3rd party solutions

Security

Net-security

15.11.19

IT professionals deem hybrid cloud as most secure

Security

Net-security

15.11.19

Evaluating cyber risk during the holiday season

Cyber

Net-security

15.11.19

Disruptive technology predictions: 2020 will see the creation of completely connected environments

Security

Net-security

14.11.19

Tracking Iran-linked APT33 group via its own VPN networks

APT

Securityaffairs

14.11.19

Canadian intelligence agencies CSE and CSIS are divided on Huawei 5G ban

BigBrothers  Mobil

Securityaffairs

14.11.19

CVE-2019-3648 flaw in all McAfee AV allows DLL Hijacking

Vulnerebility

Securityaffairs

14.11.19

Australian Universities Adopt Foreign Interference Guidelines

BigBrothers

Securityweek

14.11.19

Qualcomm Chip Flaws Let Hackers Steal Private Data From Android Devices

Android  Vulnerebility

Thehackernews

14.11.19

Company Detected Years-Long Breach Only After Hacker Maxed Out Servers' Storage

Incindent

Thehackernews

14.11.19

Google’s Plan to Crunch Health Data on Millions of Patients Draws Fire

Privacy

Threatpost

14.11.19

IoT Security Woes Plague Healthcare Industry

IoT

Threatpost

14.11.19

Federal Court: Suspicionless Search of Traveler Devices by Border Agents Is Unconstitutional

BigBrothers

Threatpost

14.11.19

Consumer Data Privacy Rights: Emerging Tech Blurs Lines

Privacy

Threatpost

14.11.19

A flaw in PMx Driver can give hackers full access to a device

Vulnerebility

Securityaffairs

14.11.19

Facebook Nixes Billions of Fake Accounts

Social

Securityweek

14.11.19

Vulnerability in McAfee Antivirus Products Allows DLL Hijacking

Vulnerebility

Securityweek

14.11.19

Automated Penetration Testing Startup Pcysys Raises $10 Million

IT

Securityweek

14.11.19

Canada Spy Agencies Split Over Proposed Huawei 5G Ban: Media

BigBrothers

Securityweek

14.11.19

Automated systems: Flag smarter, not everything

ICS

Net-security

14.11.19

5,183 breaches from the first nine months of 2019 exposed 7.9 billion records

Incindent

Net-security

14.11.19

Network complexity and lack of visibility contribute to misconfigurations and increased risk

Security

Net-security

14.11.19

Fraud rates increasing as criminals become more sophisticated

CyberCrime

Net-security

14.11.19

Should free internet access be considered as a human right?

Security

Net-security

14.11.19

Download: Internal compliance assessment templates

Security

Net-security

13.11.19

Windows 10 Insider Build 19023 Released With Optional Updates Test

OS

Bleepingcomputer

13.11.19

Microsoft Fixes Windows 10 Update and Intel Driver Battery Drain

OS

Bleepingcomputer

13.11.19

Windows 10 Cumulative Update KB4524570 & KB4523205 Released

OS

Bleepingcomputer

13.11.19

Microsoft's November 2019 Patch Tuesday Fixes IE Zero-day, 74 Flaws

OS

Bleepingcomputer

13.11.19

Windows 10 November 2019 Update Is Now Available

OS

Bleepingcomputer

13.11.19

Telegram MTProxy Servers Used to DDoS Iranian Cloud Provider

Attack  BigBrothers

Bleepingcomputer

13.11.19

Mexico's Pemex Oil Suffers Ransomware Attack, $4.9 Million Demanded

Ransomware

Bleepingcomputer

13.11.19

Adobe Patches Critical Remote Code Execution Bugs in Illustrator

Vulnerebility

Bleepingcomputer

13.11.19

McAfee Patches Privilege Escalation Flaw in Antivirus Software

Vulnerebility

Bleepingcomputer

13.11.19

YouTube BitCoin Videos Pushing Predator Info-Stealing Trojan

Virus

Bleepingcomputer

13.11.19

New TSX Speculative Attack allows stealing sensitive data from latest Intel CPUs

Attack  Vulnerebility

Securityaffairs

13.11.19

Value and Limitations of Vendor Telemetry and Reported Incidents

Incindent

Securityweek

13.11.19

Intel Driver Vulnerability Can Give Attackers Deep Access to a Device

Vulnerebility

Securityweek

13.11.19

Trend Micro Launches New ICS Security Solutions

ICS

Securityweek

13.11.19

New ZombieLoad v2 Attack Affects Intel's Latest Cascade Lake CPUs

Attack  Vulnerebility

Thehackernews

13.11.19

Microsoft to honor California’s digital privacy law all through the U.S.

BigBrothers  Privacy

Net-security

13.11.19

Intel releases updates to plug TPM-FAIL flaws, foil ZombieLoad v2 attacks

Vulnerebility

Net-security

13.11.19

Adobe patch Tuesday updates addressed critical flaws in Media Encoder and Illustrator products

Vulnerebility

Securityaffairs

13.11.19

'State of the Firewall' Report: Automation Key to Preventing Costly Misconfigurations

Security

Securityweek

13.11.19

SAP Updates Four Hot News Notes on November 2019 Patch Day

Vulnerebility

Securityweek

13.11.19

Newer Intel CPUs Vulnerable to Variant 2 of ZombieLoad Attack

Vulnerebility

Securityweek

13.11.19

Russian man Aleksei Burkov extradited for running online criminal marketplace

Crime

Securityaffairs

13.11.19

Microsoft Patch Tuesday updates fix CVE-2019-1429 flaw exploited in the wild

Vulnerebility

Securityaffairs

13.11.19

Researchers Discover TPM-Fail Vulnerabilities Affecting Billions of Devices

Vulnerebility

Thehackernews

13.11.19

Tuesday: Actively exploited IE zero-day fixed

Vulnerebility

Net-security

13.11.19

TPM—Fail

Attack

Attack

13.11.19

TSX Speculative Attack

Attack

Attack

13.11.19

MDS Attack

Attack

Attack

13.11.19

Adobe Patches Critical Bugs in Illustrator, Media Encoder

Vulnerebility

Threatpost

13.11.19

Microsoft Patches RCE Bug Actively Under Attack

Attack  Vulnerebility

Threatpost

13.11.19

Intel Warns of Critical Info-Disclosure Bug in Security Engine

Vulnerebility

Threatpost

13.11.19

Magento Warns E-Commerce Sites to Upgrade ASAP to Prevent Attacks

Attack

Threatpost

13.11.19

Insider Threats, a Cybercriminal Favorite, Not Easy to Mitigate

Security

Threatpost

13.11.19

Plugging the Data Leak in Manufacturing

Incindent

Threatpost

13.11.19

Microsoft to Apply California’s Privacy Law to All U.S. Users

Privacy

Threatpost

13.11.19

Mexican state-owned oil company Pemex hit by ransomware

Ransomware

Securityaffairs

13.11.19

Google Healthcare Data Move Makes Some Queasy

Privacy

Securityweek

13.11.19

Russian Accused of $20M Credit Card Fraud Extradited to US

CyberCrime

Securityweek

13.11.19

New PureLocker Ransomware Linked to MaaS Provider for Cobalt Gang, FIN6

Ransomware

Securityweek

13.11.19

Call for Papers: SecurityWeek's 2020 Singapore ICS Cyber Security Conference

ICS

Securityweek

13.11.19

U.S. Customs Officers Need 'Reasonable Suspicion' for Searches: Judge

Security

Securityweek

13.11.19

Microsoft Patches Another Internet Explorer Flaw Exploited in Attacks

Attack  Exploit

Securityweek

13.11.19

Mexican Oil Company Pemex Hit by Ransomware

Ransomware

Securityweek

13.11.19

An example of malspam pushing Lokibot malware, November 2019

BotNet  Virus

SANS

13.11.19

Lateral phishing makes for dangerous waters, here’s how you can avoid getting caught in the net

Phishing

Net-security

13.11.19

Product showcase: SpyCloud Active Directory Guardian

Safety

Net-security

13.11.19

Researchers discover massive increase in Emotet activity

Virus

Net-security

13.11.19

Enterprise cybersecurity in the Asia-Pacific region

Cyber

Net-security

13.11.19

The leading challenge facing cloud migration projects is security

Social

Net-security

12.11.19

Facebook is secretly using iPhone’s camera as users scroll their feed

Social

Securityaffairs

12.11.19

PCI DSS Compliance Between Audits is Declining: Verizon

Safety

Securityweek

12.11.19

Magento Users Warned of Remote Code Execution Vulnerability

Vulnerebility

Securityweek

12.11.19

Is Facebook Secretly Accessing Your iPhone's Camera? Some Users Claimed

Social

Thehackernews

12.11.19

TA505 Cybercrime targets system integrator companies

CyberCrime

Securityaffairs

12.11.19

Buran ransomware-as-a-service continues to improve

Ransomware

Securityaffairs

12.11.19

Adobe Patches Vulnerabilities in Design, Web Products

Vulnerebility

Securityweek

12.11.19

OpenText to Acquire Data Protection Firm Carbonite

Safety

Securityweek

12.11.19

Tech Support Scammers Exploiting Unpatched Firefox Bug

Exploit  Vulnerebility

Securityweek

12.11.19

Hosting Provider SmarterASP.NET Recovering From Ransomware Attack

Ransomware

Securityweek

12.11.19

New Update Lets Windows Users Test Extended Security Updates

OS

Bleepingcomputer

12.11.19

Magento Urges Users to Apply Security Update for RCE Bug

Vulnerebility

Bleepingcomputer

12.11.19

No, YouTube Won't Cancel Accounts That Don't Generate Revenue

IT

Bleepingcomputer

12.11.19

Free Cybersecurity Training Now Available for U.S. Veterans

Cyber

Bleepingcomputer

12.11.19

Microsoft Fixes Windows 10 Missing Deferred Update Settings Bug

OS

Bleepingcomputer

12.11.19

TrickBot Malware Uses Fake Sexual Harassment Complaints as Bait

Virus

Bleepingcomputer

12.11.19

Windows 10 Bug Causes USB Drives to Show the Wrong Icon

OS

Bleepingcomputer

12.11.19

Sodinokibi Ransomware Targeting Asia via the RIG Exploit Kit

Ransomware

Bleepingcomputer

12.11.19

checkra1n iOS Jailbreak Gets Public Beta Update With Fixes

Apple

Bleepingcomputer

12.11.19

Windows 10 Insider Program: What You Need to Get Started

OS

Bleepingcomputer

12.11.19

Ransomware Attack Downs Hosting Service SmarterASP.NET

Ransomware

Threatpost

12.11.19

Encrypted Emails on macOS Found Stored in Unprotected Way

Apple

Threatpost

12.11.19

DDoS Attacks Target Amazon, SoftLayer and Telecom Infrastructur

Attack

Threatpost

12.11.19

ThreatList: Data Breaches Batter Stock Prices at Public Companies, For Months

Security

Threatpost

12.11.19

Experts warn of spike in TCP DDoS reflection attacks targeting Amazon, SoftLayer and telco infrastructure

Attack

Securityaffairs

12.11.19

Bugcrowd paid over $500,000 in bug bounty rewards in one week

Security

Securityaffairs

12.11.19

ZoneAlarm forum site hack exposed data of thousands of users

Incindent

Securityaffairs

12.11.19

Data of ZoneAlarm Forum Users Leaked Following Breach

Incindent

Securityweek

12.11.19

Are We Going Back to TheMoon (and How is Liquor Involved)?

Vulnerebility

SANS

12.11.19

Your supplier’s BEC problem is your BEC problem

Spam

Net-security

12.11.19

The FBI multi-factor authentication notification that should have never been

BigBrothers

Net-security

12.11.19

The password reuse problem is a ticking time bomb

Crypto

Net-security

12.11.19

Top concerns for audit executives? Cyber risks and data governance

Cyber

Net-security

12.11.19

Enterprise expectations of managed service providers and public cloud providers are shifting

Security

Net-security

12.11.19

Whitepaper: Cybersecurity is improving, but is it enough?

Security

Net-security

11.11.19

CERTrating a new Tool to evaluate CERT/CSIRT maturity level

Safety

Securityaffairs

11.11.19

Hackers Receive $500,000 in One Week via Bugcrowd

Security

Securityweek

11.11.19

Zurich Announces New Cyber Insurance for Manufacturing Industry

ICS

Securityweek

11.11.19

Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame

Incindent

Thehackernews

11.11.19

Platinum Cyberspies Use Sophisticated Backdoor in Attacks

APT

Securityweek

11.11.19

BlueKeep Attacks Crash Systems Due to Meltdown Patch

Vulnerebility

Securityweek

11.11.19

DDoS attacks in Q3 2019

Attack

Securelist

11.11.19

Australian Govt agency ACSC warns of Emotet and BlueKeep attacks

BigBrothers

Securityaffairs

11.11.19

Apple Mail stores parts of encrypted emails in plaintext DB

Apple

Securityaffairs

11.11.19

Major ASP.NET hosting provider SmarterASP hit by ransomware attack

Ransomware

Securityaffairs

11.11.19

Twitter Spy Case Highlights Risks for Big Tech Platforms

Social

Securityweek

11.11.19

Did the recent malicious BlueKeep campaign have any positive impact when it comes to patching?

Vulnerebility  Virus

SANS

11.11.19

When is the right time to red team?

Security

Net-security

11.11.19

Believe the hype, but control the threat: Reducing the risk of ransomware

Ransomware

Net-security

11.11.19

Speeding MTTR when a third-party cloud service is attacked

Attack

Net-security

11.11.19

PayPal becomes phisher’s favorite brand, Office 365 phishing techniques evolve

Phishing

Net-security

11.11.19

Attackers continue to leverage greater levels of social engineering and sophistication

Security

Net-security

11.11.19

Do you think you can recognize fake news on Facebook?

Social

Net-security

10.11.19

Malware Meets Politics With Trump and Clinton Themed Infections

Virus

Bleepingcomputer

10.11.19

US Govt Asks Users to Be Wary of Holiday Scams and Malware

BigBrothers  Virus

Bleepingcomputer

10.11.19

QuikSilver and Billabong Affected by Ransomware Attack

Ransomware

Bleepingcomputer

10.11.19

New Stealthy Backdoor Used by Platinum APT in Recent Attacks

APT

Bleepingcomputer

10.11.19

Clever WebEx Spam Use Cisco Redirect to Deliver RAT Malware

Spam  Virus

Bleepingcomputer

10.11.19

Bugcrowd Paid Over $500K in Bug Bounties in One Week

Security

Bleepingcomputer

10.11.19

Ransom News

Ransom

Ransom

10.11.19

Bad News: AI and 5G Are Expected to Worsen Cybersecurity Risks

Cyber

Securityaffairs

10.11.19

Boardriders and its subsidiarities QuikSilver and Billabong infected with ransomware

Ransomware

Securityaffairs

10.11.19

Phishing scam issues fake court summons

Phishing blog

Avast blog

10.11.19

Facebook removes Russian propaganda networks

BigBrother blog  Social blog

Avast blog

10.11.19

A look inside the hack of a nuclear reactor’s computer network

BigBrother blog

Avast blog

10.11.19

Wireshark Tutorial: Examining Trickbot Infections

Malware blog

Palo Alto Unity42

10.11.19

Web-Based Threats: First Half 2019

Cyber blog

Palo Alto Unity42

10.11.19

Home & Small Office Wireless Routers Exploited to Attack Gaming Servers

Exploit blog

Palo Alto Unity42

10.11.19

The Next Generation of Network Security Is Cloud-Delivered

Safety blog

Palo Alto

10.11.19

New and Enhanced Palo Alto Networks Support Offerings Elevate the Customer ...

Safety blog

Palo Alto

10.11.19

Container Security: Vulnerability Management from Build to Run

Safety blog

Palo Alto

10.11.19

A Firewall Admin’s Introduction to Serverless Security

Safety blog

Palo Alto

10.11.19

Cyber Canon Candidate Book Review: A Sustainable Digital Economy: Not Fear,...

Safety blog

Palo Alto

10.11.19

Protecting Data Center Interconnect Links

Safety blog

Palo Alto

10.11.19

Palo Alto Networks Named a Leader in The Forrester ZTX Wave™

Safety blog

Palo Alto

10.11.19

Fake Netflix Update Request by Text

Mobil  Spam

SANS

10.11.19

The Platinum APT group adds the Titanium backdoor to its arsenal

APT

Securityaffairs

10.11.19

DHS CISA warns of Critical issues in Medtronic Medical equipment

BigBrothers

Securityaffairs

9.11.19

Spanish MSSP Targeted by BitPaymer Ransomware

Ransomware blog

Mcafee blog

9.11.19

Buran Ransomware; the Evolution of VegaLocker

Ransomware blog

Mcafee blog

9.11.19

Application Protection Research Series—Executive Summary

Security blog

F5 Labs

9.11.19

Make Sure You Keep an Eye on Your APIs

Security blog

F5 Labs

9.11.19

Adopt Insertion Point Security for a Microservices World

Security blog

F5 Labs

9.11.19

Xhelper: Persistent Android Dropper App Infects 45K Devices in Past 6 Months

OS Blog

Symantec

9.11.19

Nemty Ransomware Expands Its Reach, Also Delivered by Trik Botnet

Ransomware blog

Symantec

9.11.19

Vulnerability Spotlight: Code execution vulnerabilities in LEADTOOLS

Vulnerebility blog

Cisco Talos

9.11.19

Talos, Cisco Incident Response team up to offer more protection than ever

Safety blog

Cisco Talos

9.11.19

How adversaries use politics for compromise

BigBrother blog

Cisco Talos

9.11.19

C2 With It All: From Ransomware To Carding

Ransomware blog

Cisco Talos

9.11.19

The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to defend against encrypted DejaBlue

Vulnerebility blog

Cisco Talos

9.11.19

Vulnerability Spotlight: Two remote code execution vulnerabilities in Investintech Able2Extract

Vulnerebility blog

Cisco Talos

9.11.19

CISO Advisory: Security Architecture

Security blog

Cisco Talos

9.11.19

How much do data breaches affect stock prices?

Incident blog

Eset

9.11.19

Android keyboard app caught red‑handed trying to make sneaky purchases

OS Blog

Eset

9.11.19

Five ways to strengthen employee cybersecurity awareness

Cyber blog

Eset

9.11.19

Antimalware Day 2019: Building a culture of cybersecurity awareness

Malware blog

Eset

9.11.19

Microsoft Warns of More Harmful Windows BlueKeep Attacks, Patch Now

OS  Vulnerebility

Bleepingcomputer

9.11.19

Australian Govt Warns of Active Emotet and BlueKeep Threats

BigBrothers  Virus

Bleepingcomputer

9.11.19

QNAP Warns Users to Secure Devices Against QSnatch Malware

Virus

Bleepingcomputer

9.11.19

Microsoft to Remove Downloads Folder from Disk Cleanup

OS

Bleepingcomputer

9.11.19

Legitimate TDS Platform Abused to Push Malware via Exploit Kits

Exploit

Bleepingcomputer

9.11.19

Specially Crafted ZIP Files Used to Bypass Secure Email Gateways

Vulnerebility

Bleepingcomputer

9.11.19

NVIDIA Fixes Security Flaws in GPU Driver, GeForce Experience

Vulnerebility

Bleepingcomputer

9.11.19

Google Allies With Security Companies to Boost Play Store Safety

Android

Bleepingcomputer

9.11.19

Facebook Discloses Privacy Breach Caused by Groups API Bug

Social

Bleepingcomputer

9.11.19

Subpoena Phishing Emails Serve Nasty Predator Thief Infection

Phishing

Bleepingcomputer

9.11.19

News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine Fails

Security

Threatpost

9.11.19

Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone

Incindent

Threatpost

9.11.19

Pwn2Own Tokyo Roundup: Amazon Echo, Routers, Smart TVs Fall to Hackers

Congress

Threatpost

9.11.19

Amazon Fixes Ring Video Doorbell Flaw That Leaked Wi-Fi Credentials

Vulnerebility

Threatpost

9.11.19

Platinum APT Shines Up New Titanium Backdoor

APT

Threatpost

9.11.19

Art Imitates Life: Lessons from the Final Season of Mr. Robot

IT

Threatpost

9.11.19

Cisco Talos discovered multiple flaws in the LEADTOOLS toolkits

Vulnerebility

Securityaffairs

9.11.19

DHS Warns of Critical Flaws in Medtronic Medical Devices

BigBrothers

Securityweek

9.11.19

Cybersecurity Workforce Gap: 145% Growth Needed to Meet Global Demand

Cyber

Securityweek

8.11.19

Italian police shut down darkweb Berlusconi market and arrested admins

BigBrothers

Securityaffairs

8.11.19

Microsoft warns of more disruptive BlueKeep attacks and urges patch installation

Attack

Securityaffairs

8.11.19

Microsoft: BlueKeep Exploit Will Likely Deliver More Damaging Payloads

Exploit

Securityweek

8.11.19

Hackers Can Target LEADTOOLS Users With Malicious Image Files

Virus

Securityweek

8.11.19

Accenture Launches Cyber Ranges for Industrial Companies

IT

Securityweek

8.11.19

Sepio Systems Raises $6.5 Million to Defend Against Rogue Hardware

IT

Securityweek

8.11.19

Tech Firms React to Netizens' Digital Privacy Concerns

Privacy

Securityweek

8.11.19

Cisco fixes small business routers, kills eavesdropping vulnerability in conferencing devices

Vulnerebility

Net-security

8.11.19

Titanium: the Platinum group strikes again

APT

Securelist

8.11.19

Capesand is a new Exploit Kit that appeared in the threat landscape

Exploit

Securityaffairs

8.11.19

Amazon Kindle, Embedded Devices Open to Code-Execution

Vulnerebility

Threatpost

8.11.19

Why Big Breach Fines Don’t Equal Fewer Breaches

Incindent

Threatpost

8.11.19

Gamers Hit with Nvidia GPU Driver, GeForce Flaws

Vulnerebility

Threatpost

8.11.19

Google Enlists Help to Fight Bad Android Apps

Android

Threatpost

8.11.19

Ex-Twitter Employees Spied on Saudi Dissidents: DoJ

Social

Threatpost

8.11.19

How to Secure Critical Infrastructure When Patching Isn’t Possible

Vulnerebility

Threatpost

8.11.19

Pwn2Own Tokyo 2019 -Day2: experts hacked Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers

Congress

Securityaffairs

8.11.19

DNA-testing startup Veritas Genetics disclosed a security breach

Incindent

Securityaffairs

8.11.19

Amazon’s Ring Video Doorbell could open the door of your home to hackers

Hacking

Securityaffairs

8.11.19

Actively Developed Capesand Exploit Kit Emerges in Attacks

Exploit

Securityweek

8.11.19

Charges: Chinese Surveillance Goods Illegally Sold to US

BigBrothers

Securityweek

8.11.19

Bug Hunters Hack Samsung Galaxy S10, Xiaomi Mi9 at Pwn2Own

Congress

Securityweek

8.11.19

Cisco Patches Vulnerabilities in Small Business Routers, RoomOS Software

Vulnerebility

Securityweek

8.11.19

Microsoft Apps Diverted from Their Main Use

Security

SANS

8.11.19

Cybersecurity workforce skills gap rises to over 4 million

Cyber

Net-security

8.11.19

November 2019 Patch Tuesday Forecast: Out with the old, in with the new

Vulnerebility

Net-security

8.11.19

SIEM complexity and cloud visibility put companies at risk

Security

Net-security

8.11.19

Global internet freedom declines for the ninth consecutive year

Security

Net-security

8.11.19

Only 47% of cybersecurity pros are prepared to deal with attacks on their IoT devices

Security

Net-security

8.11.19

What financial records do companies need to keep, and for how long?

Security

Net-security

8.11.19

Mobile security firms will help protect Google Play

Safety

Net-security

7.11.19

TrendMicro Employee Sold Customer Info to Tech Support Scammers

Spam

Bleepingcomputer

7.11.19

DarkUniverse APT Stayed Hidden for 8 Years, Updated Regularly

APT

Bleepingcomputer

7.11.19

Microsoft Defender ATP Gets Advanced Hunting Capabilities, More

Safety

Bleepingcomputer

7.11.19

Windows 10 Insider Build 19018 Released With New Quick Web Searches

OS

Bleepingcomputer

7.11.19

Microsoft Issues November 2019 Office Updates With Memory Leak Fix

OS

Bleepingcomputer

7.11.19

New Megacortex Ransomware Changes Windows Passwords, Threatens to Publish Data

Ransomware

Bleepingcomputer

7.11.19

Tech Support Scammers Are Abusing a New Firefox Browser Lock Bug

Vulnerebility

Bleepingcomputer

7.11.19

WordPress Admins Infect Their Sites With WP-VCD via Pirated Plugins

Virus

Bleepingcomputer

7.11.19

Brooklyn Hospital Loses Patient Data In Ransomware Attack

Ransomware

Bleepingcomputer

7.11.19

Using Light Beams to Control Google, Apple, Amazon Assistants

Security

Bleepingcomputer

7.11.19

Chrome, Firefox to Hide Those Annoying Site Notification Prompts

Security

Bleepingcomputer

7.11.19

Malwarebytes 4.0 Released With New UI and Scanning Engine

Safety

Bleepingcomputer

7.11.19

Nemty Ransomware Now Spreads via Trik Botnet

Ransomware

Bleepingcomputer

7.11.19

Ransomware Attacks Hit Everis and Spain's Largest Radio Network

Ransomware

Bleepingcomputer

7.11.19

Specially Crafted ZIP archives allow bypassing secure email gateways

Vulnerebility

Securityaffairs

7.11.19

Two former Twitter employees charged of spying on Users for Saudi Arabian Government

Social

Securityaffairs

7.11.19

Saudi King Hosts CIA Chief for Talks

BigBrothers

Securityweek

7.11.19

eCommerce Fraud Prevention Firm Riskified Raises $165 Million

IT

Securityweek

7.11.19

Google Teams Up With Security Firms to Fight Bad Android Apps

Android

Securityweek

7.11.19

California Says Facebook Impeding Privacy Probe

Privacy  Social

Securityweek

7.11.19

NVIDIA Patches Flaws in GPU Display Driver, GeForce Experience

Vulnerebility

Securityweek

7.11.19

Amazon's Ring Video Doorbell Lets Attackers Steal Your Wi-Fi Password

Attack

Thehackernews

7.11.19

Gartner Says the Future of Network Security Lies with SASE

Security

Thehackernews

7.11.19

Rogue TrendMicro Employee Sold Customer Data to Tech Support Scammers

Spam

Thehackernews

7.11.19

Trend Micro rogue employee sold customer data to tech support scammers

Spam

Securityaffairs

7.11.19

Bug Hunters Earn $195,000 for Hacking TVs, Routers, Phones at Pwn2Own Tokyo 2019

Congress

Securityaffairs

7.11.19

GUI Now Available for Kamerka ICS/IoT Reconnaissance Tool

ICS  IoT

Securityweek

7.11.19

Two Former Twitter Employees Caught Spying On Users For Saudi Arabia

CyberSpy  Social

Thehackernews

7.11.19

Apple details new Safari, Location Services, Sign in with Apple privacy features

Apple

Net-security

7.11.19

Facebook Privacy Breach: 100 Developers Improperly Accessed Data

Social

Threatpost

7.11.19

Google Analytics Emerges as a Phishing Tool

Phishing

Threatpost

7.11.19

Emotet Resurgence Continues With New Tactics, Techniques and Procedures

Virus

Threatpost

7.11.19

DarkUniverse APT Emerges to Deliver Sophisticated, Targeted Spy Attacks

APT

Threatpost

7.11.19

Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security

Security

Threatpost

7.11.19

You’ve Been Served…with Subpoena-Themed Phishing Emails

Phishing

Threatpost

7.11.19

Rogue Trend Micro Employee Sold Customer Data for 68K Accounts

Incindent  Virus

Threatpost

7.11.19

Getting the best value out of security assessments

Security

SANS

7.11.19

A flaw in the Libarchive library impacts major Linux distros

Vulnerebility

Securityaffairs

7.11.19

‘Camgirl’ sites expose millions of members and users

Incindent

Securityaffairs

7.11.19

Facebook discloses a new leak that exposes group members’ data

Social

Securityaffairs

7.11.19

Documents Show Facebook Controlling Competitors With User Data: Report

Social

Securityweek

7.11.19

Three Charged in US With Spying on Twitter Users for Saudi Arabia

BigBrothers

Securityweek

7.11.19

More malspam pushing Formbook

Spam

SANS

7.11.19

5 factors to consider when choosing an encryption key management system

Crypto

Net-security

7.11.19

The promise and peril of post quantum computing

Security

Net-security

7.11.19

Cybercriminals are testing exposed credentials for future account takeover attacks

CyberCrime

Net-security

7.11.19

Phishing attacks at highest level in three years

Phishing

Net-security

7.11.19

Security and risk compliance: Still the most important part of IT strategy

Security

Net-security

6.11.19

Brooklyn Hospital lost patient records after a ransomware infection

Ransomware

Securityaffairs

6.11.19

Libarchive Vulnerability Impacts Multiple Linux Distributions

Vulnerebility

Securityweek

6.11.19

Bug Hunters Earn $195,000 for Hacking TVs, Routers, Phones at Pwn2Own

Congress

Securityweek

6.11.19

Immersive Labs Raises $40 Million for Cyber Skills Platform

IT

Securityweek

6.11.19

Google Announces Open Source Silicon Root-of-Trust Project

IT

Securityweek

6.11.19

The Future of Cyber Through the Eyes of an Intelligence Firm

IT

Securityweek

6.11.19

Trend Micro Employee Sold Customer Data to Scammers

Spam

Securityweek

6.11.19

Facebook: Third-Party App Developers Improperly Accessed User Information

Social

Securityweek

6.11.19

Google Patches Critical Flaws in Android's System Component

Android

Securityweek

6.11.19

Facebook Reveals New Data Leak Incident Affecting Groups' Members

Social

Thehackernews

6.11.19

Explained: How New 'Delegated Credentials' Boosts TLS Protocol Security

Crypto  Hacking

Thehackernews

6.11.19

Detecting and tracking phishing campaigns through web analytics identifiers

Phishing

Net-security

6.11.19

New, improved Microsoft 365 security and compliance features

Security

Net-security

6.11.19

Anonymous and LulzSecITA hacked professional orders and telephone operator Lyca Mobile

APT

Securityaffairs

6.11.19

Mysterious DarkUniverse APT remained undetected for 8 years

APT

Securityaffairs

6.11.19

Ransomware attack impacted government services in the territory of Nunavut, Canada

Ransomware

Securityaffairs

6.11.19

VMware Unveils New Security Features, Enhancements for NSX, SD-WAN, Secure State

Safety

Securityweek

6.11.19

DarkUniverse APT Uses Just-in-Time Malware Creation

APT

Securityweek

6.11.19

Microsoft Announces New Security Capabilities Across Platforms

Security

Securityweek

6.11.19

Hackers Can Use Lasers to Send Voice Commands to Phones, Smart Speakers

Hacking  Mobil

Securityweek

6.11.19

IBM: Face Recognition Tech Should be Regulated, Not Banned

Security

Securityweek

6.11.19

Sumo Logic Acquires JASK to Expand Cloud-Native Platform

IT

Securityweek

6.11.19

Snowden Warns of Web Giants' 'Irresistible Power'

BigBrothers

Securityweek

6.11.19

Broadcom Completes Acquisition of Symantec Enterprise Unit for $10.7 Billion

IT

Securityweek

6.11.19

More malspam pushing Formbook

Spam

SANS

6.11.19

Defining risk controls that actually work

Security

Net-security

6.11.19

Who is responsible for Active Directory security within your organization?

Security

Net-security

6.11.19