0  1  2  3  4  5

Date

Name

Categorie

Web

31.5.19

Researcher Exploits Microsoft’s Notepad to ‘Pop a Shell’

Exploit

Threatpost

31.5.19

Gen Z Interns and Social Media: A Perfect Security Storm

Security

Threatpost

31.5.19

Microsoft warns for the second time of applying BlueKeep patch

Vulnerebility

Securityaffairs

31.5.19

Security expert shows how to bypass macOS Gatekeeper

Apple

Securityaffairs

31.5.19

HiddenWasp, a sophisticated Linux malware borroes from Mirai and Azazel

Virus

Securityaffairs

31.5.19

The Pyramid Hotel Group data leak exposes 85GB of security logs of major hotel chains

Incindent

Securityaffairs

31.5.19

Nvidia Fixes High-Severity Flaws in GeForce Experience for Gamer

Vulnerebility

Threatpost

31.5.19

Retrieving Second Stage Payload with Ncat

Security

SANS

31.5.19

Amazon Digital Assistant Alexa Gets New Skill: Amnesia

Security

Securityweek

31.5.19

macOS Gatekeeper Bypass Exploits Trust on Network Shares

Apple

Securityweek

31.5.19

Sophisticated HiddenWasp Malware Targets Linux

Virus

Securityweek

31.5.19

High-Risk Flaws Found in Process Control Systems From B&R Automation

ICS

Securityweek

31.5.19

Malware Found on PoS Systems at Checkers and Rally's Restaurants

Virus

Securityweek

31.5.19

Industry is Not Prepared for the IIoT Attacks that Have Already Begun

IoT

Securityweek

31.5.19

Analysis Shows Poor GDPR Compliance in European Websites

Privacy

Securityweek

31.5.19

Apple Patches SQLite, WebKit Bugs in iTunes and iCloud for Windows

Apple

Securityweek

31.5.19

ProtonMail Accused of Voluntarily Helping Police Spy on Users

CyberSpy

Securityweek

31.5.19

Threat Intelligence Firm Recorded Future Acquired for $780 Million

IT

Securityweek

31.5.19

New Zealand Says Budget Leak Was Bungled, Not Hacked

Hacking

Securityweek

31.5.19

Siemens LOGO!, a PLC for small automation projects, open to attack

ICS

Net-security

31.5.19

Researchers fight ransomware attacks by leveraging properties of flash-based storage

Ransomware

Net-security

31.5.19

Checkers double drive-thru restaurants chain discloses card breach

Incindent

Securityaffairs

31.5.19

Convert Plus WordPress plugin flaw allows hackers to create Admin accounts

Vulnerebility

Securityaffairs

31.5.19

VPNpro research: this Chinese-linked company secretly owns 10 VPNs with 86 million installs

BigBrothers

Securityaffairs

31.5.19

Emissary Panda APT group hit Government Organizations in the Middle East

APT

Securityaffairs

31.5.19

AI, the Mandatory Element of 5G Mobile Security

Mobil

Threatpost

31.5.19

POS Malware Found at 102 Checkers Restaurant Locations

Virus

Threatpost

31.5.19

New Linux Malware ‘HiddenWasp’ Borrows from Mirai, Azazel

Virus

Threatpost

31.5.19

Analyzing First Stage Shellcode

Virus

SANS

31.5.19

What mechanisms can help address today’s biggest cybersecurity challenges?

Cyber

Net-security

31.5.19

Researchers spot manipulated photos and video using AI-driven imaging system

IT

Net-security

30.5.19

2.3B Files Exposed in a Year: A New Record for Misconfigs

Incindent

Threatpost

30.5.19

200k Personal Records Exposed by Events Planning Firm

Incindent

Threatpost

30.5.19

Palo Alto Networks Acquires Cloud Security Startups Twistlock and PureSec

IT

Securityweek

30.5.19

Cyberattack Hits New Zealand Budget

Cyber

Securityweek

30.5.19

Docker Vulnerability Gives Arbitrary File Access to Host

Vulnerebility

Securityweek

30.5.19

Chinese Cyber-Spies Target Government Organizations in Middle East

BigBrothers

Securityweek

30.5.19

Google Researcher Finds Code Execution Vulnerability in Notepad

Vulnerebility

Securityweek

30.5.19

AttackIQ Raises $17.6 Million in Series B Funding Round

IT

Securityweek

30.5.19

Iran-based Social Media Scheme Impersonated Press

BigBrothers

Securityweek

30.5.19

Huawei Asks US Court to Throw Out Federal Ban

BigBrothers

Securityweek

30.5.19

Attackers are exploiting WordPress plugin flaw to inject malicious scripts

Virus

Net-security

30.5.19

G Suite to get Gmail confidential mode, on by default

Security

Net-security

30.5.19

Nansh0u campaign already infected 50,000 MS-SQL and PHPMyAdmin Servers

Virus

Securityaffairs

30.5.19

Google white hat hacker found code execution flaw in Notepad

Vulnerebility

Securityaffairs

30.5.19

Using Public Wi-Fi? Your data can be hacked easily! Here’s How…

Security

Securityaffairs

30.5.19

All Docker versions affected by an unpatched race condition issue

Vulnerebility

Securityaffairs

30.5.19

TA505 is expanding its operations

CyberCrime

Securityaffairs

30.5.19

News aggregator Flipboard disclosed a data breach

Incindent

Securityaffairs

30.5.19

HawkEye Keylogger is involved in attacks against business users

Virus

Securityaffairs

30.5.19

50k Servers Infected with Cryptomining Malware in Nansh0u Campaign

Cryptocurrency

Threatpost

30.5.19

‘5G is Coming,’ But Can the Security Industry Keep Up?

Mobil

Threatpost

30.5.19

5G IoT: Literally a Matter of Life or Death

IoT

Threatpost

30.5.19

WordPress Plugin Has Unpatched Privilege Escalation Flaw, Warn Researchers

Vulnerebility

Threatpost

30.5.19

Top UK Official Derides Huawei Claiming it has ‘Bad Security’

BigBrothers

Threatpost

30.5.19

A veteran’s look at the cybersecurity industry and the problems that need solving

Cyber

Net-security

30.5.19

Majority of CISOs plan to ask for an increase in cybersecurity investment

Security

Net-security

30.5.19

Security overconfidence and immaturity continue to endanger organizations

Security

Net-security

30.5.19

Hackes Infect 50,000 MS-SQL and PHPMyAdmin Servers with Rootkit Malware

Virus

Thehackernews

30.5.19

Flipboard Database Hacked — Users' Account Information Exposed

Incindent

Thehackernews

30.5.19

New initiative aims to strengthen IoT security, interoperability and reliability

IoT

Net-security

30.5.19

Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Security

Net-security

30.5.19

Many are seeing the damage of cybercrime and identity theft firsthand

CyberCrime

Net-security

30.5.19

When it comes to email-based threats, Emotet dominates

BotNet

Net-security

29.5.19

Emotet Botnet Behind Most Email-Based Threats in Q1 2019

BotNet

Bleepingcomputer

29.5.19

Unpatched Flaw Affects All Docker Versions, Exploits Ready

Exploit

Bleepingcomputer

29.5.19

Flipboard Databases Hacked and User Information Exposed

Incindent

Bleepingcomputer

29.5.19

Google Says They Are Committed To Supporting YouTube on Edge

IT

Bleepingcomputer

29.5.19

Phishing Emails Pretend to be Office 365 'File Deletion' Alerts

Phishing

Bleepingcomputer

29.5.19

DuckDuckGo Android Browser Vulnerable to URL Spoofing Attacks

Android

Bleepingcomputer

29.5.19

Windows 10 May 2019 Update Blocked by Old Bluetooth Drivers

Vulnerebility

Bleepingcomputer

29.5.19

Ireland Gets About Double the Average Breach Reports Under GDPR

Privacy

Bleepingcomputer

29.5.19

Tech-Support Scammers Cheat Elder of $136,000, Risk Decades in Jail

Spam

Bleepingcomputer

29.5.19

Windows 10 Losing Connectivity From Outdated Wi-Fi Drivers

IT

Bleepingcomputer

29.5.19

U.S. Navy Creating a 350 Billion Record Social Media Archive

BigBrothers

Bleepingcomputer

29.5.19

Malspam Campaigns Use HawkEye Keylogger to Target Businesses

Spam

Bleepingcomputer

29.5.19

Windows Update KB4497936 for Insiders Breaks Windows Sandbox

Vulnerebility

Bleepingcomputer

29.5.19

All The Latest Features of the Windows 10 May 2019 Update

Vulnerebility

Bleepingcomputer

29.5.19

New Bitcoin Scam Leads to Ransomware and Info-Stealing Trojans

Cryptocurrency

Bleepingcomputer

29.5.19

Microsoft Says Windows 10 Your Phone App Can't Be Uninstalled

IT

Bleepingcomputer

29.5.19

BlueKeep RDP flaw: Nearly a million Internet-facing systems are vulnerable

Vulnerebility

Net-security

29.5.19

IoT cyberattacks are the new normal, the security mindset isn’t

IoT

Net-security

29.5.19

Equifax stripped of ‘stable’ outlook over 2017 breach

Incident blog

Eset

29.5.19

Fake cryptocurrency apps crop up on Google Play as bitcoin price rises

Cryptocurrency blog

Eset

29.5.19

Patch now! Why the BlueKeep vulnerability is a big deal

Ransomware blog

Eset

29.5.19

A journey to Zebrocy land

Cyber blog

Eset

29.5.19

Cybersecurity training and awareness: Helpful resources for educators

Cyber blog

Eset

29.5.19

What the ban on facial recognition tech will – and will not – do

Cyber blog

Eset

29.5.19

One year later: The VPNFilter catastrophe that wasn't

Malware blog

Cisco Talos

29.5.19

Sorpresa! JasperLoader targets Italy with a new bag of tricks

Malware blog

Cisco Talos

29.5.19

Talos releases coverage for 'wormable' Microsoft vulnerability

Vulnerebility blog

Cisco Talos

29.5.19

Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques

Hacking blog

Cisco Talos

29.5.19

Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak

Exploit blog

Symantec

29.5.19

Beapy: Cryptojacking Worm Hits Enterprises in China

Cryptocurrency blog

Symantec

29.5.19

Dispelling Myths Around SGX Malware

Malware blog

Symantec

29.5.19

Microsoft Patch Tuesday – May 2019

Vulnerebility blog

Symantec

29.5.19

Malware Against the C Monoculture

Malware blog

Checkpoint

29.5.19

Behavioural Malware Analysis with Microsoft ASA

Safety

SANS

29.5.19

DuckDuckGo Address Bar Spoofing

Hacking

Securityaffairs

29.5.19

Internet scans found nearly one million systems vulnerable to BlueKeep

Vulnerebility

Securityaffairs

29.5.19

Flipboard Resets User Passwords in Response to Data Breach

Incindent

Securityweek

29.5.19

FireEye Acquires Security Effectiveness Testing Firm Verodin for $250 Million

IT

Securityweek

29.5.19

Baltimore Says It Will Not Pay Ransom After Cyberattack

Ransomware

Securityweek

29.5.19

Business Users Targeted by HawkEye Keylogger Malware

Virus

Securityweek

29.5.19

New APT10 Activity Detected in Southeast Asia

APT

Securityweek

29.5.19

Research Shows Twitter Manipulation in Weeks Before EU Elections

BigBrothers

Securityweek

29.5.19

HP Adds New Malware Protection Solution to Latest Laptops

Virus

Securityweek

29.5.19

One Million Devices Open to Wormable Microsoft BlueKeep Flaw

Vulnerebility

Threatpost

29.5.19

200k Personal Records Exposed by Events Planning Firm

Incindent

Threatpost

29.5.19

Gatekeeper Bug in MacOS Mojave Allows Malware to Execute

Apple

Threatpost

29.5.19

Office Document & BASE64? PowerShell!

Virus

SANS

29.5.19

Structural integrity: Quantifying risk with security measurement

Security

Net-security

29.5.19

SD-WAN alone cannot address the networking challenges of digital business

Security

Net-security

29.5.19

Network automation market expected to grow to $16.9 billion by 2022

IT

Net-security

28.5.19

Shade Ransomware is very active outside of Russia and targets more English-speaking victims

Ransomware

Securityaffairs

28.5.19

Siemens Healthineers medical products vulnerable to Windows BlueKeep flaw

Vulnerebility

Securityaffairs

28.5.19

One Million Devices Vulnerable to BlueKeep as Hackers Scan for Targets

Vulnerebility

Securityweek

28.5.19

Sectigo Revokes Certificates Used to Sign Malware Following Recent Report

Virus

Securityweek

28.5.19

Siemens Medical Products Affected by Wormable Windows Flaw

Vulnerebility

Securityweek

28.5.19

Nearly 1 Million Computers Still Vulnerable to "Wormable" BlueKeep RDP Flaw

Vulnerebility

Thehackernews

28.5.19

GitHub introduces Dependabot-powered automated security fixes

Security

Net-security

28.5.19

APT10 is back with two new loaders and new versions of known payloads

APT

Securityaffairs

28.5.19

BlueKeep scans observed from exclusively Tor exit nodes

Hacking

Securityaffairs

28.5.19

Crooks leverages .htaccess injector on Joomla and WordPress sites for malicious redirects

Hacking

Securityaffairs

28.5.19

First American Financial exposed 16 years’ worth of personal and financial documents

Incindent

Securityaffairs

28.5.19

nmap Service Fingerprint

Security

SANS

28.5.19

Handle personal data: What we forget is as important as what we remember

Security

Net-security

28.5.19

How to diminish the great threat of legacy apps

Security

Net-security

28.5.19

Most global workers noticed stricter policies at work as a result of GDPR

Privacy

Net-security

28.5.19

Volume and quality of training data are the largest barriers to applying machine learning

Security

Net-security

28.5.19

How many adults trust companies with their personal data?

Privacy

Net-security

27.5.19

Chinese Spy Group Mixes Up Its Malware Arsenal with Brand-New Loaders

BigBrothers

Threatpost

27.5.19

ThreatList: Top 8 Threat Actors Targeting Canada in 2019

Cyber

Threatpost

27.5.19

Hacker breached Perceptics, a US maker of license plate readers

BigBrothers

Securityaffairs

27.5.19

Sectigo says that most of certificates reported by Chronicle analysis were already revoked

Security

Securityaffairs

27.5.19

Remarks on NATO and its approach to the cyber offensive

BigBrothers

Securityaffairs

27.5.19

Police seized Bestmixer, the mixing service washed at least $200 million in a year

CyberCrime

Securityaffairs

27.5.19

First American Financial Exposed Millions of Sensitive Documents

Incindent

Securityweek

27.5.19

Video: nmap Service Detection Customization

Security

SANS

26.5.19

A Closer Look at the New Windows 10 Light Theme

IT

Bleepingcomputer

26.5.19

Sectigo Responds to Chronicle's Report About Malware Signed by Their Certs

Virus

Bleepingcomputer

26.5.19

Windows 10 1903 Being Blocked If Using Older BattlEye Software

Security

Bleepingcomputer

26.5.19

New unpatched macOS Gatekeeper Bypass Published Online

Apple

Bleepingcomputer

26.5.19

Firefox 67 Switching to Empty Profiles Causing Data Loss Fears

Security

Bleepingcomputer

26.5.19

Windows 10 1903 Insiders Test Fix For USB Drives Blocking Upgrades

Vulnerebility

Bleepingcomputer

26.5.19

BlueKeep RCE Flaw Gets Micropatch for Always-On Servers

Vulnerebility

Bleepingcomputer

26.5.19

German Minister Wants Secure Messengers To Decrypt Chats

BigBrothers

Bleepingcomputer

26.5.19

Windows 10 May 2019 Update Not Installing on Some AMD Systems

Security

Bleepingcomputer

26.5.19

Microsoft Pulls Edge Dev Update After Browser Launch Issues

Security

Bleepingcomputer

26.5.19

Using the Windows Sandbox to Stay Safe Online

Safety

Bleepingcomputer

26.5.19

Android Users Being Spammed Using Fake Missed Call Alerts

Android

Bleepingcomputer

26.5.19

Upgraded JasperLoader Malware Adds Anti-Analysis Mechanisms

Virus

Bleepingcomputer

26.5.19

Two More Windows 10 Zero-Day PoC Exploits Released, Brings Total to 4

Exploit

Bleepingcomputer

26.5.19

Microsoft Releases Windows 10 Version 1903 Security Baseline

Vulnerebility

Bleepingcomputer

26.5.19

Carders Prefer Audio Skimmers over Less Efficient Flash Skimmers

CyberCrime

Bleepingcomputer

26.5.19

Microsoft Defender ATP is Now Publicly Available for Macs

Apple

Bleepingcomputer

26.5.19

Google Under GDPR Probe After Ad Exchange Privacy Complaint

Privacy

Bleepingcomputer

26.5.19

PoC Exploits Released for Two More Windows Vulnerabilities

Exploit

Bleepingcomputer

26.5.19

Google Tracks Purchases For Paying G Suite Users, Doesn’t Show It

Security

Bleepingcomputer

26.5.19

GetCrypt Ransomware Brute Forces Credentials, Decryptor Released

Ransomware

Bleepingcomputer

26.5.19

You're Not At Fault, Google Search Tripped and Broke Its Index

Security

Bleepingcomputer

26.5.19

BestMixer.io Service Shut Down For Laundering $200 Million+

Hacking

Bleepingcomputer

26.5.19

Volume of Signed Malware Increases, CAs Need Better Vetting

Virus

Bleepingcomputer

26.5.19

Researchers Demo PoC For Remote Desktop BlueKeep RCE Exploit

Exploit

Bleepingcomputer

26.5.19

Zebrocy Operators Also Look for Browser and Email Databases

Hacking

Bleepingcomputer

26.5.19

Hackers target MySQL databases to deliver the GandCrab ransomware

Ransomware

Securityaffairs

26.5.19

Do You Remember the SUBST Command?

Hacking

SANS

25.5.19

0patch issued a micropatch to address the BlueKeep flaw in always-on servers

Vulnerebility

Securityaffairs

25.5.19

GitHub introduces new tools and security features to secure code

Security

Securityaffairs

25.5.19

Snapchat staff used internal tools to spy on users

Social

Securityaffairs

25.5.19

How Hackers Access Direct Deposit Paycheck — And What to Do About It

Hacking

Securityaffairs

25.5.19

US DoJ’s superseding indictment charges Assange with violating Espionage Act

BigBrothers

Securityaffairs

25.5.19

Georgia Supreme Court Rules that State Has No Obligation to Protect Personal Information

Privacy

Securityweek

25.5.19

GitHub Adds New Tools to Help Developers Secure Code

Security

Securityweek

25.5.19

Microsoft Defender ATP for Mac Now in Public Preview

Safety

Securityweek

25.5.19

One Year on, EU's GDPR Sets Global Standard for Data Protection

Privacy

Securityweek

25.5.19

New York Department of Financial Services Launches Cybersecurity Unit

BigBrothers

Securityweek

25.5.19

Microsoft Brings Hardware-Based Isolation to Chrome, Firefox

Safety

Securityweek

25.5.19

IT threat evolution Q1 2019. Statistics

Analysis

Securelist

25.5.19

IT threat evolution Q1 2019

Analysis

Securelist

25.5.19

News Wrap: Which Companies Are Doing Privacy Right and Which Aren’t?

Privacy

Threatpost

25.5.19

Microsoft Beefs Up Wi-Fi Protection

Safety

Threatpost

25.5.19

Goodbye Passwords: Hello Identity Management

Security

Threatpost

25.5.19

Joomla and WordPress Found Harboring Malicious Redirect Code

Virus

Threatpost

25.5.19

Snapchat Privacy Blunder Piques Concerns About Insider Threats

Social

Threatpost

25.5.19

Shade Ransomware Expands to U.S. Targets

Ransomware

Threatpost

25.5.19

Calibration Attack Drills Down on iPhone, Pixel Users

Apple

Threatpost

25.5.19

SandboxEscaper Drops Three More Windows Exploits, IE Zero-Day

Exploit

Threatpost

25.5.19

Soaring Cryptocurrency Prices Draw Malicious New Onslaught of Apps, Malware

Cryptocurrency

Threatpost

25.5.19

WannaCry-Infested Laptop Starts at $1.13M in Art Auction

Ransomware

Threatpost

24.5.19

Assange Charged With 17 New Counts Under Espionage Act

BigBrothers

Securityweek

24.5.19

Facebook Figures Five Percent of Accounts Are Fake

Social

Securityweek

24.5.19

US Officials Say Foreign Election Hacking Is Inevitable

BigBrothers

Securityweek

24.5.19

Researcher Drops 3 Separate 0-Day Windows Exploits in 24 Hours

Exploit

Securityweek

24.5.19

Instagram Says Not Source of Contact Info for Influential Users

Social

Securityweek

24.5.19

Siemens Teams With Chronicle on Cybersecurity Solutions for Energy Industry

ICS

Securityweek

24.5.19

NATO Warns Russia of 'Full Range' of Responses to Cyberattack

BigBrothers

Securityweek

24.5.19

Comodo Issued Most Certificates for Signed Malware on VirusTotal

Virus

Securityweek

24.5.19

Authorities Take Down Cryptocurrency Mixing Service Bestmixer.io

Cryptocurrency

Securityweek

24.5.19

PoC Exploits Created for Wormable Windows RDS Flaw

Exploit

Securityweek

24.5.19

Moody's Downgrades Equifax Outlook to Negative Over 2017 Data Breach

Incindent

Securityweek

24.5.19

UK Has Warned 16 NATO Allies of Russia Hacking Attempts: Foreign Minister

BigBrothers

Securityweek

24.5.19

Amazon Shareholders Support Selling Face Recognition Tech to Police

Security

Securityweek

24.5.19

Attackers Could Use Mobile Device Sensors to Generate Unique Device Fingerprint: Research

Mobil

Securityweek

24.5.19

Critical Vulnerabilities Plague South Korean ActiveX Controls

Attack

Securityweek

24.5.19

LinkedIn Allowed TLS Certificate to Expire—Again

Social

Securityweek

24.5.19

Magecart Skimmer Poses as Payment Service Provider

CyberCrime

Securityweek

24.5.19

One Year On, EU Has 145,000 Data Law Complaints

BigBrothers

Securityweek

24.5.19

No Root Password for 20% of Popular Docker Containers

Crypto

Securityweek

24.5.19

Flaw Exposes Mitsubishi PLCs to Remote DoS Attacks

Attack  ICS

Securityweek

24.5.19

Hunters.AI Emerges From Stealth With $5.4M in Seed Funding

IT

Securityweek

24.5.19

EU Adopts Powers to Respond to Cyberattacks

BigBrothers

Securityweek

24.5.19

Researcher Drops Windows 10 Zero-Day Exploit

Exploit

Securityweek

24.5.19

Chronicle’s study reveals CAs that issued most certificates to sign malware samples on VirusTotal

Virus

Securityaffairs

24.5.19

Facebook says it took down 2.19 billion accounts in Q1 2019

Social

Securityaffairs

24.5.19

PoC Exploits for CVE-2019-0708 wormable Windows flaw released online

Vulnerebility

Securityaffairs

24.5.19

UK provided evidence to 16 NATO allies of Russia hacking campaigns

BigBrothers

Securityaffairs

24.5.19

Tor Browser for Android is available through the Play Store

Android

Securityaffairs

24.5.19

Anonymous and LulzSec target the Italian Police and doctors

Hacking

Securityaffairs

24.5.19

Playing Cat and Mouse: Three Techniques Abused to Avoid Detection

Hacking

Securityaffairs

24.5.19

SandboxEscaper disclosed 3 Microsoft zero-day flaws in 24 hours

Vulnerebility

Securityaffairs

24.5.19

Emsisoft released a free Decrypter for the GetCrypt ransomware

Ransomware

Securityaffairs

24.5.19

ActiveX Controls in South Korean websites are affected by critical flaws

Vulnerebility

Securityaffairs

24.5.19

G Suite users’ passwords stored in plain-text for more than 14 years

Crypto

Securityaffairs

24.5.19

SandboxEscaper is back with a new Windows Zero-Day in Task Scheduler

Vulnerebility

Securityaffairs

24.5.19

U.S. Charges WikiLeaks' Julian Assange With Violating Espionage Act

BigBrothers

Thehackernews

24.5.19

Update: Hacker Disclosed 4 New Microsoft Zero-Day Exploits in Last 24 Hours

Exploit

Thehackernews

24.5.19

Investigating an Odd DNS Query

Security

SANS

24.5.19

US charges Assange with 17 counts under Espionage Act

BigBrothers

Net-security

24.5.19

How mainstream media coverage affects vulnerability management

Safety

Net-security

24.5.19

Solving the network visibility problem with NaaS

Security

Net-security

24.5.19

Enterprises: Analyze your IoT footprint to address security, privacy concerns

IoT

Net-security

24.5.19

A closer look at mobile permissions one year into GDPR

Privacy

Net-security

24.5.19

Most security pros have considered quitting due to a lack of resources

Security

Net-security

24.5.19

High-risk behaviors expose most travelers to cyber risks

Cyber

Net-security

24.5.19

If you haven’t yet patched the BlueKeep RDP vulnerability, do so now

Vulnerebility

Net-security

24.5.19

How to write an effective data breach notification?

Incindent

Net-security

24.5.19

Data privacy: A hot-button issue for Americans one year after GDPR

Privacy

Net-security

24.5.19

Cybercriminals continue to evolve the sophistication of their attack methods

Attack

Net-security

24.5.19

Companies increasingly investing in container adoption, security remains an issue

Security

Net-security

24.5.19

Number of connected devices reached 22 billion, where is the revenue?

Incindent

Net-security

24.5.19

How small businesses can keep their data secure

Security

Net-security

22.5.19

Official Tor Browser for Android available on Google Play

Android

Net-security

22.5.19

Google has been storing unhashed G Suite customer passwords

Security

Net-security

22.5.19

Google Warns G Suite Customers of Passwords Stored Unhashed Since 2005

Security

Securityweek

22.5.19

Firefox Now Has Fingerprinting and Crypto-mining Protection

Cryptocurrency

Securityweek

22.5.19

Attack Combines Phishing, Steganography, PowerShell to Deliver Malware

Phishing

Securityweek

22.5.19

Guardicore Raises $60 Million in Series C Funding

IT

Securityweek

22.5.19

Satan Ransomware Expands Portfolio of Exploits

Ransomware

Securityweek

22.5.19

Poor Security Hygiene Found Across Almost All Political Parties in US, Europe

Security

Securityweek

22.5.19

Microsoft Adds Live Response Capabilities to Defender ATP

Safety

Securityweek

22.5.19

Identity Management Firm Auth0 Raises $103 Million

IT

Securityweek

22.5.19

US Warns Chinese Drones May Steal Data: Report

BigBrothers

Securityweek

22.5.19

Awareness Training Firm KnowBe4 Acquires Awareness Measurement Firm CLTRe

Security

Securityweek

22.5.19

New Zero-Day Exploit for Bug in Windows 10 Task Scheduler

Exploit

Bleepingcomputer

22.5.19

Google Stored Unhashed G Suite Passwords for Over a Decade

Security

Bleepingcomputer

22.5.19

Tor Browser 8.5 for Android Released On The Google Play Store

Android

Bleepingcomputer

22.5.19

JSWorm 2.0 Ransomware Decryptor Gets Your Files Back For Free

Ransomware

Bleepingcomputer

22.5.19

Hackers Steal Payment Card Data Using Rogue Iframe Phishing

Phishing

Bleepingcomputer

22.5.19

New Cumulative Updates for Windows 10 1809 and 1803 Released

Vulnerebility

Bleepingcomputer

22.5.19

Cracked Phishing Kit 16Shop Lets One Thief Steal From Another

Phishing

Bleepingcomputer

22.5.19

Microsoft Releases Windows 10 Version 1903 - May 2019 Update

Security

Bleepingcomputer

22.5.19

Forbes Global 2000 Firm Leaked Plain Text Passwords and Data

Incindent

Bleepingcomputer

22.5.19

Contractor Faces Jail for Using Govt Servers for CryptoMining

Cryptocurrency

Bleepingcomputer

22.5.19

Firefox 67 Released With Cryptominer Blocking, Performance Boost

Safety

Bleepingcomputer

22.5.19

194 of The Top 1000 Docker Containers Don’t Have Root Passwords

Incindent

Bleepingcomputer

22.5.19

Decrypter for JSWorm 2.0

Anti-Ransom Tool

Anti-Ransom Tool

22.5.19

The Satan Ransomware adds new exploits to its arsenal

Ransomware

Securityaffairs

22.5.19

Emsisoft released a free Decrypter for JSWorm 2.0

Ransomware

Securityaffairs

22.5.19

Group-IB blocked more than 180,000 links to pirated copies of Game of Thrones

CyberCrime

Securityaffairs

22.5.19

After latest Microsoft Windows updates some PCs running Sophos AV not boot

Vulnerebility

Securityaffairs

22.5.19

Millions of Golfers Land in Privacy Hazard After Cloud Misconfig

Privacy

Threatpost

22.5.19

Cisco Starts Patching Firmware Bug; Millions of Devices Still Vulnerable

Vulnerebility

Threatpost

22.5.19

HCL Exposes Customer, Personnel Info in Wide-Ranging Data Leak

Incindent

Threatpost

22.5.19

Mozilla Tackles Two Critical Flaws with Firefox 67 Release

Vulnerebility

Threatpost

22.5.19

Intel Fixes Critical, High-Severity Flaws Across Several Products

Vulnerebility

Threatpost

22.5.19

Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter

Safety

Threatpost

22.5.19

DDoS attacks in Q1 2019

Attack

Securelist

22.5.19

PoC Exploit For Unpatched Windows 10 Zero-Day Flaw Published Online

Exploit

Thehackernews

22.5.19

Core Elastic Stack Security Features Now Available For Free Users As Well

Security

Thehackernews

22.5.19

Getting ready for digital transformation: The biggest cybersecurity challenges

Cyber

Net-security

22.5.19

The security challenges of managing complex cloud environments

Security

Net-security

22.5.19

Organizations face operational deficiencies as they deal with hybrid IT complexities

Security

Net-security

22.5.19

Is your perimeter inventory leaving you exposed? Why it’s time to switch from IP to DNS

Exploit

Net-security

22.5.19

Global secure email gateway market growth driven by data loss prevention capabilities

Spam

Net-security

21.5.19

Core Elastic Stack security features now available to all users

Vulnerebility

Net-security

21.5.19

Microsoft updates break AV software, again!

Vulnerebility

Net-security

21.5.19

LeakedSource Operator Pleads Guilty in Canada

Incindent

Securityweek

21.5.19

US Delays Huawei Ban for 90 Days

BigBrothers

Securityweek

21.5.19

DHS Highlights Common Security Oversights by Office 365 Customers

BigBrothers

Securityweek

21.5.19

Siemplify Raises $30 Million in Series C Funding

IT

Securityweek

21.5.19

Linux Kernel Privilege Escalation Vulnerability Found in RDS Over TCP

Vulnerebility

Securityweek

21.5.19

Faulty Database Script Exposed Salesforce Data to Wrong Users

Exploit

Securityweek

21.5.19

Windows 10 Could Break If Capability SIDs Are Removed From Permissions

IT

Bleepingcomputer

21.5.19

BlueKeep Remote Desktop Exploits Are Coming, Patch Now!

Exploit

Bleepingcomputer

21.5.19

Firefox Lockwise Aims to Revamp Browser Password Management

Safety

Bleepingcomputer

21.5.19

Microsoft Defender ATP Adds Live Response for SecOps

Safety

Bleepingcomputer

21.5.19

MuddyWater Hacking Group Upgrades Arsenal to Avoid Detection

APT

Bleepingcomputer

21.5.19

Microsoft Officially Releases Microsoft Edge for Mac

IT

Bleepingcomputer

21.5.19

Microsoft Rolls Out Syncing Over Mobile Data for Your Phone

IT

Bleepingcomputer

21.5.19

Ubuntu 19.04 Now Available in the Hyper-V Quick Create Gallery

IT

Bleepingcomputer

21.5.19

MuddyWater BlackWater campaign used new anti-detection techniques

APT

Securityaffairs

21.5.19

US Commerce Department delays Huawei ban for 90 Days

BigBrothers

Securityaffairs

21.5.19

Data belonging to Instagram influencers and celebrities exposed online

Social

Securityaffairs

21.5.19

Linux kernel privilege escalation flaw CVE-2019-11815 affects RDS

Vulnerebility

Securityaffairs

21.5.19

Defiant Tech firm who operated LeakedSource pleads guilty

Security

Securityaffairs

21.5.19

ZombieLoad: How Intel’s Latest Side Channel Bug Was Discovered and Disclosed

Vulnerebility

Threatpost

21.5.19

Slack Bug Allows Remote File Hijacking, Malware Injection

Virus

Threatpost

21.5.19

Windows 10 Update Bricks PCs, Microsoft Offers Workarounds

Vulnerebility

Threatpost

21.5.19

Salesforce Woes Linger as Admins Clean Up After Service Outage

Security

Threatpost

21.5.19

Behind the Naming of ZombieLoad and Other Intel Spectre-Like Flaws

Vulnerebility

Threatpost

21.5.19

Using Shodan Monitoring

Security

SANS

21.5.19

Five ways automating IAM saves you money

Security

Net-security

21.5.19

How effective are login challenges at preventing Google account takeovers?

Security

Net-security

21.5.19

Traditional approach to data security hindering digital transformation initiatives

Security

Net-security

21.5.19

SD-WAN adoption growing as enterprises embrace app-centric architecture transition

Security

Net-security

21.5.19

Engineering teams are struggling because they’re missing the right automation

Security

Net-security

21.5.19

ThreatQ adds support for mobile and PRE-ATT&CK in response to rapid customer adoption

Security

Net-security

20.5.19

Huawei Vows to Deliver Android Security Updates After Google Cut-Off

Android

Securityweek

20.5.19

TeamViewer Confirms It Was Hacked in 2016

Hacking

Securityweek

20.5.19

User Data Exposed in Stack Overflow Hack

Incindent

Securityweek

20.5.19

Hacktivist Attacks Declined 95 Percent Since 2015: IBM

Hacking

Securityweek

20.5.19

Slack Flaw Allows Hackers to Steal, Manipulate Downloads

Hacking

Securityweek

20.5.19

Tenable Updates Free Vulnerability Assessment Solution

Safety

Securityweek

20.5.19

Wormable Windows RDS Vulnerability Poses Serious Risk to ICS

Virus

Securityweek

20.5.19

Stack Overflow Discloses Security Breach

Incindent

Securityweek

20.5.19

Authorities Takedown GozNym Cybercrime Group That Stole an Estimated $100 Million

CyberCrime

Securityweek

20.5.19

Cisco Patches Critical Vulnerabilities in Prime Infrastructure (PI) Software

Vulnerebility

Securityweek

20.5.19

Group Seeks Investigation of Deep Packet Inspection Use by ISPs

Security

Securityweek

20.5.19

Facebook Partially Restores Privacy Feature Abused in Massive Breach

Social

Securityweek

20.5.19

Dutch Probe China's Huawei for Possible Spying: Report

BigBrothers

Securityweek

20.5.19

Google Starts Tracking Zero-Days Exploited in the Wild

Exploit

Securityweek

20.5.19

Red Cross Website Hacked in Latest Singapore Cyber Attack

Attack

Securityweek

20.5.19

Microsoft Releases Attack Surface Analyzer 2.0

Safety

Securityweek

20.5.19

Chronicle experts spotted a Linux variant of the Winnti backdoor

Virus

Securityaffairs

20.5.19

Google will block Huawei from using Android and its services

BigBrothers

Securityaffairs

20.5.19

Amnesty International filed a lawsuit against Israeli surveillance firm NSO

BigBrothers

Securityaffairs

20.5.19

US Tech Giants Google, Intel, Qualcomm, Broadcom Break Up With Huawei

BigBrothers

Thehackernews

20.5.19

Microsoft Releases Windows Updates to Fix GOV.UK Connection Issues

Vulnerebility

Bleepingcomputer

20.5.19

Microsoft Edge to Make it Easier to Clear Your Browsing Data

Privacy

Bleepingcomputer

20.5.19

Google Wants Your Phone to Protect Against Account Takeover Attacks

Attack

Bleepingcomputer

20.5.19

Google is using Your Gmail Account to Track Your Purchases

Privacy

Bleepingcomputer

20.5.19

Unpatched Ethereum Clients expose the ecosystem to 51% Attack risk

Vulnerebility

Securityaffairs

20.5.19

Salesforce faced one of its biggest service disruption of ever

Security

Securityaffairs

20.5.19

Dutch intelligence investigate alleged Huawei ‘backdoor’

BigBrothers

Securityaffairs

20.5.19

CVE-2019-0604 Attack

Attack

SANS

20.5.19

On the path to Zero Trust security: Time to get started

Security

Net-security

20.5.19

Microsoft’s Attack Surface Analyzer now works on Macs and Linux, too

Safety

Net-security

20.5.19

Ransomware and malware attacks decline, attackers adopting covert tactics

Ransomware

Net-security

20.5.19

Over half of all reported vulnerabilities in Q1 2019 have a remote attack vector

Vulnerebility

Net-security

20.5.19

Phishing targeting SaaS and webmail services increased to 36% of all phishing attacks

Phishing

Net-security

20.5.19

Companies investing in advanced forensic capabilities to identify attackers in greater detail

Forensics

Net-security

19.5.19

The NSO WhatsApp Vulnerability – This is How It Happened

Vulnerebility blog

Checkpoint

19.5.19

Vulnerability Spotlight: Multiple vulnerabilities in Wacom Update Helper

Vulnerebility blog

Cisco Talos

19.5.19

Vulnerability Spotlight: Remote code execution bug in Antenna House Rainbow PDF Office document converter

Vulnerebility blog

Cisco Talos

19.5.19

Vulnerability Spotlight: Remote code execution vulnerabilities in Adobe Acrobat Reader

Vulnerebility blog

Cisco Talos

19.5.19

Microsoft Patch Tuesday — May 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

19.5.19

Vulnerability Spotlight: Multiple vulnerabilities in the Roav A1 Dashcam

Vulnerebility blog

Cisco Talos

19.5.19

EternalBlue reaching new heights since WannaCryptor outbreak

Ransomware blog

Eset

19.5.19

Survey: What should companies do to restore trust post-breach?

Cyber blog

Eset

19.5.19

Ice Hockey World Championship: The risks of free live streaming

Cyber blog

Eset

19.5.19

Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage

Malware blog

Eset

19.5.19

Verizon’s data breach report: What the numbers say

Incident blog

Eset

19.5.19

Ransom News

Ransom

Ransom

19.5.19

Number of hacktivist attacks declined by 95 percent since 2015

Hacking

Securityaffairs

19.5.19

Dozens of Linksys router models leak data useful for hackers

Incindent

Securityaffairs

19.5.19

Unistellar attackers already wiped over 12,000 MongoDB databases

Incindent

Securityaffairs

19.5.19

Facebook banned Archimedes Group, misinformation made in Israel

Social

Securityaffairs

18.5.19

Windows May Hang for Sophos Users After Installing May Updates

Vulnerebility

Bleepingcomputer

18.5.19

Windows 10 Won't Boot When Using System Restore After Updating

Vulnerebility

Bleepingcomputer

18.5.19

TeamViewer Confirms Undisclosed Breach From 2016

Incindent

Bleepingcomputer

18.5.19

Some GOV.UK Sites Unreachable Due to HSTS Changes in Windows Updates

Vulnerebility

Bleepingcomputer

18.5.19

Cisco Upgrades Remote Code Execution Flaws to Critical Severity

Vulnerebility

Bleepingcomputer

18.5.19

Over 12,000 MongoDB Databases Deleted by Unistellar Attackers

Incindent

Bleepingcomputer

18.5.19

Paterson Public Schools Notified of Breach, Threatens with Civil Case

Incindent

Bleepingcomputer

18.5.19

Chinese state-sponsored hackers breached TeamViewer in 2016

BigBrothers

Securityaffairs

18.5.19

A flaw in Slack could allow hackers to steal, manipulate downloaded files

Vulnerebility

Securityaffairs

18.5.19

Cisco addressed a critical flaw in networks management tool Prime Infrastructure

Vulnerebility

Securityaffairs

18.5.19

Stack Overflow Q&A platform announced a data breach

Incindent

Securityaffairs

18.5.19

XSS flaw in WordPress Live Chat Plugin lets attackers compromise WP sites

Vulnerebility

Securityaffairs

18.5.19

Hackers Accessed Stack Overflow's Production Systems

Hacking

Bleepingcomputer

18.5.19

Chrome Bug Causing Address Bar to Show Searches Over Site History

Vulnerebility

Bleepingcomputer

18.5.19

Unsecured Survey Database Exposes Info of 8 Million People

Incindent

Bleepingcomputer

18.5.19

Facebook Bans Israeli Entity For Creating Fake Accounts

Social

Bleepingcomputer

18.5.19

Bug in WordPress Live Chat Plugin Lets Hackers Inject Scripts

Vulnerebility

Bleepingcomputer

18.5.19

Windows 10 KB4494441 Update May Be Shown As Installed Twice

Vulnerebility

Bleepingcomputer

18.5.19

How Decoding Network Traffic Can Save Your Data Bacon

Privacy

Threatpost

18.5.19

Ransomware ‘Remediation’ Firm Exposed: Researchers Weigh in on Paying

Ransomware

Threatpost

18.5.19

WordPress WP Live Chat Support Plugin Fixes XSS Flaw

Vulnerebility

Threatpost

18.5.19

Report Reveals TeamViewer Was Breached By Chinese Hackers In 2016

BigBrothers

Thehackernews

18.5.19

Hackers Breach Stack Overflow Q&A Site, Some Users' Data Exposed

Incindent

Thehackernews

17.5.19

Past, present, and future of the Dark Web

Cyber

Securityaffairs

17.5.19

Google ‘0Day In the Wild’ project tracks zero-days exploited in the Wild

Exploit

Securityaffairs

17.5.19

A joint operation by international police dismantled GozNym gang

Virus

Securityaffairs

17.5.19

Cisco Service Provider, WebEx Bugs Offer Up Remote Code Execution

Vulnerebility

Threatpost

17.5.19

Mobile Risks Boom in a Post-Perimeter World

Mobil

Threatpost

17.5.19

Forbes Becomes Latest Victim of Magecart Payment Card Skimmer

Hacking

Threatpost

17.5.19

How can we give cybersecurity analysts a helping hand?

Cyber

Net-security

17.5.19

Memory analysis is the ground truth

Analysis

Net-security

17.5.19

The largest breaches over the past three years have caused massive and irreparable damage

Incindent

Net-security

17.5.19

Half of companies missed GDPR deadline, 70% admit systems won’t scale

Privacy

Net-security

17.5.19

Analysis of device data shines a light on cybersecurity risks in healthcare

Cyber

Net-security

17.5.19

Data will be processed by edge computing in 59% of IoT deployments by 2025

IoT

Net-security

16.5.19

GozNym Cybercrime Group Behind $100 Million Damages Dismantled

CyberCrime

Bleepingcomputer

16.5.19

Microsoft Tech Support Scams Invade Azure Cloud Services

Spam

Bleepingcomputer

16.5.19

Over 757K Fraudulently Obtained IPv4 Addresses Revoked by ARIN

Security

Bleepingcomputer

16.5.19

Windows 10 Insider Build 18898 Now Shows Drive Types in Task Manager

Vulnerebility

Bleepingcomputer

16.5.19

Azure Active Directory Now Supports 256 Character Passwords

Crypto

Bleepingcomputer

16.5.19

Google Discloses Bluetooth Flaw in Titan Security Key, Issues Recall

Vulnerebility

Bleepingcomputer

16.5.19

Attackers Evade Detection By Randomizing TLS Handshake Ciphers

Hacking

Bleepingcomputer

16.5.19

Google Payment Privacy Settings Hidden Behind Special URL

Hacking

Bleepingcomputer

16.5.19

Hackers Inject Magecart Card Skimmer in Forbes’ Subscription Site

Hacking

Bleepingcomputer

16.5.19

Windows 10 Spectre 2 Mitigation Now Uses Retpoline By Default

Vulnerebility

Bleepingcomputer

16.5.19

List of MDS Speculative Execution Vulnerability Advisories & Updates

Vulnerebility

Bleepingcomputer

16.5.19

Microsoft Releases Windows 7 & 8.1 Cumulative Updates KB4499164 & KB4499151

Vulnerebility

Bleepingcomputer

16.5.19

Microsoft's May 2019 Patch Tuesday Fixes 79 Vulnerabilities

Vulnerebility

Bleepingcomputer

16.5.19

Windows 10 May 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

16.5.19

Cybercrime Gang Behind GozNym Banking Malware Dismantled

Virus

Threatpost

16.5.19

Microsoft renewed its Attack Surface Analyzer, version 2.0 is online

Security

Securityaffairs

16.5.19

A flaw in Google Titan Security Keys expose users to Bluetooth Attacks

Vulnerebility

Securityaffairs

16.5.19

The stealthy email stealer in the TA505 hacker group’s arsenal

Hacking

Securityaffairs

16.5.19

Magecart hackers inject card Skimmer in Forbes Subscription Site

Hacking

Securityaffairs

16.5.19

'GozNym' Banking Malware Gang Dismantled by International Law Enforcement

Virus

Thehackernews

16.5.19

Bluetooth Flaw Found in Google Titan Security Keys; Get Free Replacement

Vulnerebility

Thehackernews

16.5.19

The Risk of Authenticated Vulnerability Scans

Vulnerebility

SANS

16.5.19

Intel MDS attack mitigation: An overview

Attack

Net-security

16.5.19

Google offers free replacement for buggy Titan Security Keys

Vulnerebility

Net-security

16.5.19

Intel MDS Vulnerabilities: What You Need to Know

Vulnerebility

Securityweek

16.5.19

Google's Titan Security Keys Vulnerable to Bluetooth Attacks

Vulnerebility

Securityweek

16.5.19

Trump Bars U.S. Companies From Foreign Telecoms Posing Security Risk

BigBrothers

Securityweek

16.5.19

Researchers Link Disparate Chinese Hacking Groups

CyberCrime

Securityweek

16.5.19

Hackers Exploit ASUS Update Process to Install Backdoor

Virus

Securityweek

16.5.19

UK Supreme Court Overturns Ultimate Authority of Investigatory Powers Tribunal

BigBrothers

Securityweek

16.5.19

Security Automation Firm Respond Raises $20 Million

IT

Securityweek

16.5.19

Picreel and Alpaca Forms Compromised by Magecart Attacks

Attack

Securityweek

16.5.19

SAP Patches Multiple Missing Authorization Checks

Vulnerebility

Securityweek

16.5.19

Israel Spyware Firm NSO Operates in Shadowy Cyber World

BigBrothers

Securityweek

16.5.19

Huawei Chairman Says Ready to Sign 'No-Spy' Deal With UK

BigBrothers

Securityweek

16.5.19

BlackTech espionage group exploited ASUS update process to deliver Plead Backdoor

CyberSpy

Securityaffairs

16.5.19

SAP Security Patch Day for May 2019 fixes many missing authorization checks

Vulnerebility

Securityaffairs

16.5.19

Twitter inadvertently collected and shared iOS location data

Apple

Securityaffairs

16.5.19

Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks

Vulnerebility

Securityaffairs

16.5.19

Intel ZombieLoad Side-Channel Attack: 10 Takeaways

Attack

Threatpost

16.5.19

Billions of Malicious Bot Attacks Take to Cipher-Stunting to Hide

BotNet

Threatpost

16.5.19

Google Titan Security Key Recalled After Bluetooth Pairing Bug

Vulnerebility

Threatpost

16.5.19

Spam and phishing in Q1 2019

Spam

Securelist

16.5.19

Identity theft victims could lead us to accept more security-improving friction

Security

Net-security

16.5.19

CISOs: What would you do over?

Security

Net-security

16.5.19

When all else fails, organizations realize they must share threat intel

Security

Net-security

16.5.19

CEOs and business leaders trust AI, but employees are more cautious

IT

Net-security

16.5.19

The six biggest cybersecurity risks facing the utilities industry

Cyber

Net-security

15.5.19

Microsoft Patches RDS Vulnerability Allowing WannaCry-Like Attacks

Vulnerebility

Securityweek

15.5.19

San Francisco Bans Facial Recognition Use by Police

Privacy

Securityweek

15.5.19

New Class of Vulnerabilities Leak Data From Intel Chips

Vulnerebility

Securityweek

15.5.19

Boost Mobile Detected Unauthorized Activity on Customer Accounts

Mobil

Securityweek

15.5.19

Twitter Collected and Shared iOS Location Data

Apple

Securityweek

15.5.19

Adobe Patches Over 80 Vulnerabilities in Acrobat Products

Vulnerebility

Securityweek

15.5.19

Facebook Launches Global CTF Competition

Social

Securityweek

15.5.19

Apple Patches 21 Vulnerabilities in WebKit

Vulnerebility

Securityweek

15.5.19

Remote Code Execution Vulnerability Impacts SQLite

Vulnerebility

Securityweek

15.5.19

Siemens Addresses Vulnerabilities in LOGO, SINAMICS Products

Vulnerebility

Securityweek

15.5.19

Microsoft plugs wormable RDP flaw, new speculative execution side channel vulnerabilities

Vulnerebility

Net-security

15.5.19

What does it take to be an infosec product strategist?

Security

Net-security

15.5.19

Microoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks

Vulnerebility

Securityaffairs

15.5.19

Adobe patches over 80 flaws in Flash, Acrobat Reader, and Media Encoder

Vulnerebility

Securityaffairs

15.5.19

Millions of computers powered by Intel chips are affected by MDS flaws

Vulnerebility

Securityaffairs

15.5.19

Thrangrycat flaw could allow compromising millions of Cisco devices

Vulnerebility

Securityaffairs

15.5.19

New Class of CPU Flaws Affect Almost Every Intel Processor Since 2011

Attack

Thehackernews

15.5.19

Microsoft Releases Patches For A Critical 'Wormable Flaw' and 78 Other Issues

Vulnerebility

Thehackernews

15.5.19

Adobe Releases Critical Patches for Flash, Acrobat Reader, and Media Encoder

Vulnerebility

Thehackernews

15.5.19

WhatsApp Zero-Day Exploited in Targeted Spyware Attacks

Attack

Threatpost

15.5.19

Intel CPUs Impacted By New Class of Spectre-Like Attacks

Attack

Threatpost

15.5.19

Microsoft Patches Zero-Day Bug Under Active Attack

Vulnerebility

Threatpost

15.5.19

Apple Patches Intel Side-Channel Bugs; Updates iOS, macOS and More

Vulnerebility

Threatpost

15.5.19

Adobe Addresses Critical Adobe Flash Player, Acrobat Reader Flaws

Vulnerebility

Threatpost

15.5.19

Linux Kernel Flaw Allows Remote Code-Execution

Vulnerebility

Threatpost

15.5.19

Cynet: An Autonomous Security Platform for Any Size Organization

Security

Threatpost

15.5.19

ZombieLoad: Cross-Privilege-Boundary Data Sampli

Papers

Papers

15.5.19

RIDL: Rogue In-Flight Data Load

Papers

Papers

15.5.19

Fallout: Reading Kernel Writes From User Space

Papers

Papers

15.5.19

Microsoft May 2019 Patch Tuesday

Vulnerebility

SANS

15.5.19

Security spring cleaning: 5 tips for tidying up network safeguards

Security

Net-security

15.5.19

Organizations dissatisfied with WAFs ineffective protection, time-consuming management, high cost

Security

Net-security

15.5.19

Cybersecurity, privacy and technologies still top challenges for IT audit teams and leaders

Security

Net-security

15.5.19

Employees are aware of USB drive security risks, but don’t follow best practices

Security

Net-security

15.5.19

Consumer spending on technology to reach $1.32 trillion in 2019

IT

Net-security

14.5.19

Microsoft Releases May 2019 Office Updates With Security Fixes

Vulnerebility

Bleepingcomputer

14.5.19

Security Updates Released for Adobe Flash Player and Media Encoder

Vulnerebility

Bleepingcomputer

14.5.19

New RIDL and Fallout Attacks Impact All Modern Intel CPUs

Vulnerebility

Bleepingcomputer

14.5.19

Microsoft Fixes Critical Remote Desktop Flaw, Blocks Worm Malware

Vulnerebility

Bleepingcomputer

14.5.19

Keyloggers Injected in Web Trust Seal Supply Chain Attack

Attack

Bleepingcomputer

14.5.19

Hackers Access Over 461,000 Accounts in Uniqlo Data Breach

Incindent

Bleepingcomputer

14.5.19

Google Chrome Offers a Glimpse of it's Upcoming Settings Screen

IT

Bleepingcomputer

14.5.19

Adobe Says Upgrade Creative Cloud Apps or Risk 3rd Party Claims

IT

Bleepingcomputer

14.5.19

Fxmsp Chat Logs Reveal the Hacked Antivirus Vendors, AVs Respond

Hacking

Bleepingcomputer

14.5.19

Linksys Smart Wi-Fi Routers Leak Info of Connected Devices

Security

Bleepingcomputer

14.5.19

U.S. Govt Issues Microsoft Office 365 Security Best Practices

BigBrothers

Bleepingcomputer

14.5.19

New Game Boy Emulator Has a Remote 'Cloud Gaming' Mode

IT

Bleepingcomputer

14.5.19

New Details Emerge of Fxmsp's Hacking of Antivirus Companies

Hacking

Bleepingcomputer

14.5.19

Sensitive Information of Millions of Panama Citizens Leaked

Incindent

Bleepingcomputer

14.5.19

Linux Kernel Prior to 5.0.8 Vulnerable to Remote Code Execution

Vulnerebility

Bleepingcomputer

14.5.19

North Korea-linked ScarCruft APT adds Bluetooth Harvester to its arsenal

APT

Securityaffairs

14.5.19

Malware Training Sets: FollowUP

Virus

Securityaffairs

14.5.19

Hackers Add Security Software Removal to Banload Banking Malware

Virus

Securityweek

14.5.19

Flaw Affecting Millions of Cisco Devices Let Attackers Implant Persistent Backdoor

Virus

Thehackernews

14.5.19

Cryptocurrency Hacks Still Growing — What Does That Mean for the Industry?

Cryptocurrency

Thehackernews

14.5.19

ScarCruft continues to evolve, introduces Bluetooth harvester

Hacking

Securelist

14.5.19

Apple May 2019 security updates fix numerous issues

Apple

Net-security

14.5.19

WhatsApp flaw used to install spyware by simply calling the target

Social

Net-security

14.5.19

WhatsApp zero-day exploited in targeted attacks to deliver NSO spyware

Social

Securityaffairs

14.5.19

Unprotected DB exposed PII belonging to nearly 90% of Panama citizens

Incindent

Securityaffairs

14.5.19

CVE-2019-11815 Remote Code Execution affects Linux Kernel prior to 5.0.8

Vulnerebility

Securityaffairs

14.5.19

Facebook sues data analytics firm Rankwave over alleged data misuse

Social

Securityaffairs

14.5.19

Reading the Yoroi Cyber Security Annual Report 2018

CyberCrime

Securityaffairs

14.5.19

Over 10k+ GPS trackers could be abused to spy on individuals in the UK

Mobil

Securityaffairs

14.5.19

Expert discovered how to brick all Samsung mobile phones

Mobil

Securityaffairs

14.5.19

Hackers Used WhatsApp 0-Day Flaw to Secretly Install Spyware On Phones

Vulnerebility

Thehackernews

14.5.19

Report Links Vast Online Disinformation Campaign to Iran

BigBrothers

Securityweek

14.5.19

Facebook Patches WhatsApp Flaw Exploited to Spy on Users

Social

Securityweek

14.5.19

US, EU Spar Over Sharing Electronic Evidence in Investigations

BigBrothers

Securityweek

14.5.19

Nine Charged in SIM Hijacking Scheme

Mobil

Securityweek

14.5.19

GAO Makes Recommendations to Improve Security of Taxpayer Data

Security

Securityweek

14.5.19

New Bill Proposes Cybersecurity Training for U.S. House Members

Cyber

Securityweek

14.5.19

Website Infections Holding Steady at 1%, But Attacks Becoming Stealthier: Report

Virus

Securityweek

14.5.19

Leak Reveals Activity of Iranian Hacking Group

CyberCrime

Securityweek

14.5.19

Sectigo Acquires IoT Security Firm Icon Labs

IoT

Securityweek

14.5.19

North Korea-Linked 'ScarCruft' Adds Bluetooth Harvester to Toolkit

APT

Securityweek

14.5.19

Remote Code Execution Flaw Found in Kaspersky Products

Vulnerebility

Securityweek

14.5.19

NVIDIA Patches High Severity Bugs in GPU Display Driver

Vulnerebility

Securityweek

14.5.19

Pair of Cisco Bugs, One Unpatched, Affect Millions of Devices

Vulnerebility

Threatpost

14.5.19

Twitter Leaks Apple iOS Users’ Location Data to Ad Partner

Social

Threatpost

14.5.19

ScarCruft APT Adds Bluetooth Harvester to its Malware Bag of Tricks

APT

Threatpost

14.5.19

ThreatList: Top 5 Most Dangerous Attachment Types

Spam

Threatpost

14.5.19

Prioritizing risks in a climate of geopolitical threats

Security

Net-security

14.5.19

The lurking danger of hacked email reply chains

Hacking

Net-security

14.5.19

Cybersecurity skills shortage still the root cause of rising security incidents

Cyber

Net-security

14.5.19

While data enables innovation, its vulnerability continues to cause anxiety among IT leaders

Vulnerebility

Net-security

14.5.19

High-risk vulnerability in Cisco’s secure boot process impacts millions of devices

Vulnerebility

Net-security

13.5.19

SharePoint servers under attack through CVE-2019-0604

Vulnerebility

Net-security

13.5.19

Blocking Hyperlink Auditing Tracking Pings with Extensions

Security

Bleepingcomputer

13.5.19

Arch Linux for WSL is now Available in the Microsoft Store

IT

Bleepingcomputer

13.5.19

Microsoft is Relaunching Power Toys For Windows 10 Users

IT

Bleepingcomputer

13.5.19

Pacha Group declares war to rival crypto mining hacking groups

Cryptocurrency

Securityaffairs

13.5.19

Microsoft SharePoint Vulnerability Exploited in the Wild

Vulnerebility

Securityweek

13.5.19

From Phishing To Ransomware?

Ransomware

SANS

13.5.19

What CISOs should focus on when deciding on a strategy

Security

Net-security

13.5.19

Tips to spring clean your company’s social media and stay protected

Social

Net-security

13.5.19

May 2019 Patch Tuesday forecast: Latest OS updates impact performance

Vulnerebility

Net-security

13.5.19

Despite warnings, most people still don’t change their passwords

Security

Net-security

13.5.19

As IT companies approach digital transformation, key issues remain a struggle

Security

Net-security

13.5.19

PII capturing websites still applying poor security measures one year after GDPR

Privacy

Net-security

12.5.19

Trashing the Flow of Data

Vulnerebility blog

Checkpoint

12.5.19

PlaNETWORK: Face to Face with Cyber Crime

Cyber blog

Project Zero

12.5.19

Vulnerability Spotlight: Remote code execution bug in SQLite

Vulnerebility blog

Cisco Talos

12.5.19

Vulnerability Spotlight: Multiple bugs in several Jenkins plugins

Vulnerebility blog

Cisco Talos

12.5.19

Types of backup and five backup mistakes to avoid

Security blog

Eset

12.5.19

Hackers steal US$41 million worth of Bitcoin from cryptocurrency exchange

Cryptocurrency blog

Eset

12.5.19

Turla LightNeuron: An email too far

Malware blog

Eset

12.5.19

Turkish Personal Data Protection Authority fined Facebook for Photo API bug

Social

Securityaffairs

12.5.19

Hacking the ‘Unhackable’ eyeDisk USB stick

Hacking

Securityaffairs

12.5.19

Security breach suffered by credit bureau Equifax has cost $1.4 Billion

Incindent

Securityaffairs

12.5.19

Experts found a remote-code execution flaw in SQLite

Vulnerebility

Securityaffairs

11.5.19

Ransom News

Ransom

Ransom

11.5.19

Over 100 flaws in management and access control systems expose buildings to hack

Vulnerebility

Securityaffairs

11.5.19

U.S. DoJ charges 9 individuals that stole $2.5M through SIM swapping

CyberCrime

Securityaffairs

11.5.19

Microsoft SharePoint CVE-2019-0604 flaw exploited in the wild

Vulnerebility

Securityaffairs

11.5.19

Facebook Sues South Korea Data Analytics Firm

Social

Securityweek

11.5.19

U.S. Charges 9 'SIM Swapping' Attackers For Stealing $2.5 Million

Attack

Thehackernews

11.5.19

Nigerian BEC Scammers Shifting to RATs As Tool of Choice

Spam

Bleepingcomputer

11.5.19

Google Considers Removing Android ADB Backup and Restore

Android

Bleepingcomputer

11.5.19

NVIDIA Patches High Severity Windows GPU Display Driver Flaws

Vulnerebility

Bleepingcomputer

11.5.19

Windows 10 Insider Build 18895 Fixes the Your Phone App

Vulnerebility

Bleepingcomputer

11.5.19

Microsoft Office Asking Users to Send More Usage Data

Privacy

Bleepingcomputer

11.5.19

Crypto-Mining Hacking Groups Wage War in the Cloud

Cryptocurrency

Bleepingcomputer

11.5.19

The 2019 DBIR is out

Incindent

Securelist

11.5.19

Heap Buffer Overflow Vulnerability found in Kaspersky Antivirus Engine

Vulnerebility

Securityaffairs

11.5.19

Over 100 Flaws Expose Buildings to Hacker Attacks

Vulnerebility

Securityweek

11.5.19

Android Q Enables TLS 1.3 Support by Default

Android

Securityweek

11.5.19

FIN7 Linked to Escalating Active Exploits for Microsoft SharePoint Bug

Exploit

Threatpost

11.5.19

The WannaCry Security Legacy and What’s to Come

Ransomware

Threatpost

11.5.19

Nvidia Warns Windows Gamers on GPU Driver Flaws

Vulnerebility

Threatpost

11.5.19

ThreatList: Nigerian Cybercrime Surged 54 Percent in 2018

CyberCrime

Threatpost

10.5.19

DHS and FBI published a Malware Analysis Report on North Korea-linked tool ELECTRICFISH

BigBrothers

Securityaffairs

10.5.19

Top-Tier Russian Hacking group Fxmsp claims hack of major AntiVirus Companies

Hacking

Securityaffairs

10.5.19

Nigerian Cybercrime 'Group' Has 400 Malicious Actors

CyberCrime

Securityweek

10.5.19

Symantec CEO Quits Unexpectedly, Stock Sinks After Missing Estimates

Security

Securityweek

10.5.19

U.S. Charges Chinese Hackers Over Massive 2015 Anthem Breach

BigBrothers

Securityweek

10.5.19

Russian Hackers Claim Breach of Three U.S. Anti-Virus Companies

Hacking

Securityweek

10.5.19

North Korean Hackers Using ELECTRICFISH Tunnels to Exfiltrate Data

BigBrothers

Thehackernews

10.5.19

Six Men Accused of Stealing Over $2.4M in SIM Swapping Attacks

Attack

Bleepingcomputer

10.5.19

Fake Pirate Chick VPN Pushed AZORult Info Stealing Trojan

Virus

Bleepingcomputer

10.5.19

U.S Indicts Chinese Hackers for Anthem Data Breach

Incindent

Bleepingcomputer

10.5.19

Mozilla to Delete Usage Data Collected From Firefox Addon Fix

Security

Bleepingcomputer

10.5.19

North Korean Hackers Use ELECTRICFISH Malware to Steal Data

Virus

Bleepingcomputer

10.5.19

Site Promoting KeePass Password Manager Pushes Malware

Virus

Bleepingcomputer

10.5.19

Android Q Hardens Security, Adds Better Encryption

Android

Bleepingcomputer

10.5.19

Jokeroo Ransomware as a Service Pulls an Exit Scam

Ransomware

Bleepingcomputer

10.5.19

Firefox May Add Some Tor Features for Super Private Browsing Mode

Security

Bleepingcomputer

10.5.19

Hackers Selling Access and Source Code From Antivirus Companies

Hacking

Bleepingcomputer

10.5.19

Developer Creates a Two-Way Chat Using Only CSS and HTML

IT

Bleepingcomputer

10.5.19

Android Q: Enhanced security for consumers and enterprises

Android

Net-security

10.5.19

‘Unhackable’ Biometric USB Offers Up Passwords in Plain Text

Crypto

Threatpost

10.5.19

Chinese Hackers Behind 2015 Anthem Data Breach Indicted

Incindent

Threatpost

10.5.19

Hackers Take Over IoT Devices to ‘Click’ on Ads

IoT

Threatpost

10.5.19

Alpine Linux Docker Images Shipped for 3 Years with Root Accounts Unlocked

Incindent

Threatpost

10.5.19

Serious Phar Flaw Allows Arbitrary Code Execution on Drupal

Vulnerebility

Threatpost

10.5.19

Researchers in the Dark on Powerful LightNeuron Malware, for Years

Virus

Threatpost

10.5.19

DoJ indicted a member of China-based hacking group behind Anthem hack

BigBrothers

Securityaffairs

10.5.19

Freedom Mobile data breach impacts at least 15,000 customers

Incindent

Securityaffairs

10.5.19

U.S. Government Details ELECTRICFISH Malware Used by North Korea

BigBrothers

Securityweek

10.5.19

Whistleblower Says Facebook Generating Terror Content

Social

Securityweek

10.5.19

U.S. Blocks China Mobile, Citing National Security

BigBrothers

Securityweek

10.5.19

U.S. Charges Chinese Hacker For 2015 Anthem Data Breach

BigBrothers

Thehackernews

10.5.19

DSSuite - A Docker Container with Didier's Tools

Hacking

SANS

10.5.19

A deeper look: How the 281 data breaches in Q1 2019 will impact companies

Incindent

Net-security

10.5.19

Three ways GDPR benefits US companies

Privacy

Net-security

10.5.19

Healthcare IT pros now confident in their cyber attack response ability

Cyber

Net-security

10.5.19

Only 14% of organizations have completed migration to Windows 10

IT

Net-security

10.5.19

AI-optimized chipsets entering a new era as they become more specialized

IT

Net-security

10.5.19

Orange signs an agreement for the acquisition of 100% of SecureLink

Security

Net-security

9.5.19

Cisco Talos warns of hardcoded credentials in Alpine Linux Docker Images

Hacking

Securityaffairs

9.5.19

5 Factors Growing the Cyberthreat Management Industry

Cyber

Securityaffairs

9.5.19

Information Services Giant Wolters Kluwer hit by ransomware attack

Ransomware

Securityaffairs

9.5.19

Vulnerability in UC Browser Apps exposes to phishing attacks

Phishing

Securityaffairs

9.5.19

Identity Verification Firm Evident Raises $20 Million

IT

Securityweek

9.5.19

Ex-Intelligence Analyst Charged With Leaks to Reporter

BigBrothers

Securityweek

9.5.19

New Samsung Exynos Chip Secures IoT Devices With Short-Range Comms

IoT

Securityweek

9.5.19

Authorities Arrest Administrators of Portal to Dark Web Marketplaces

Crime

Securityweek

9.5.19

Phar Vulnerabilities Patched in Drupal, TYPO3

Vulnerebility

Securityweek

9.5.19

Hard-Coded Credentials Found in Alpine Linux Docker Images

Hacking

Securityweek

9.5.19

IT Specialist Convicted on Cyber Hacking Charges Sentenced

Security

Securityweek

9.5.19

Bug in Alpine Linux Docker Image Leaves Root Account Unlocked

Vulnerebility

Bleepingcomputer

9.5.19

Over 275 Million Records Exposed by Unsecured MongoDB Database

Incindent

Bleepingcomputer

9.5.19

Facebook Removed Pre-Approval for Some Cryptocurrency-Related Ads

Cryptocurrency

Bleepingcomputer

9.5.19

Microsoft Pulls Office Update KB4462238 Due to Freezing Bug

Vulnerebility

Bleepingcomputer

9.5.19

Windows 10 Insider Build 18894 Enhances Search in File Explorer

Vulnerebility

Bleepingcomputer

9.5.19

Nation State Actors Regularly Breach Public Sector Systems

BigBrothers

Bleepingcomputer

9.5.19

Microsoft Edge Beta Downloads Leaked, Based on Chromium 75

Security

Bleepingcomputer

9.5.19

Dharma Ransomware Uses Legit Antivirus Tool To Distract Victims

Ransomware

Bleepingcomputer

9.5.19

Microsoft Announces Enhanced Enterprise BitLocker Management

Security

Bleepingcomputer

9.5.19

UC Browser for Android Vulnerable to URL Spoofing Attacks

Android

Bleepingcomputer

9.5.19

Scammers Try to Trick YouTubers Into Giving Up Password

Spam

Bleepingcomputer

9.5.19

FIN7.5: the infamous cybercrime rig “FIN7” continues its activities

APT

Securelist

9.5.19

Verizon Data Breach Report: Espionage, C-Suite and Cloud Attacks on the Rise

Incindent

Threatpost

9.5.19

Google Touts Android Q’s New Security Update Process and Better Privacy Controls for Apps

Privacy

Threatpost

9.5.19

Airbnb Superhost Secretly Recorded Guests with Hidden Bedroom Camera

Security

Threatpost

9.5.19

Google Patches Critical Remote Code-Execution Flaws in Android

Android

Threatpost

9.5.19

Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware

Virus

Securityaffairs

9.5.19

Google May 2019 Patches address 4 RCE flaws in Android

Android

Securityaffairs

9.5.19

Information Services Giant Wolters Kluwer Hit by Malware Attack

Virus

Securityweek

9.5.19

Machine Data Analytics Firm Sumo Logic Raises $110 Million

IT

Securityweek

9.5.19

Cybercriminals Unleash MegaCortex Ransomware in Global Attack Campaign

Ransomware

Securityweek

9.5.19

Canadian Telecom Firm Freedom Mobile Exposed Customer Details

Incindent

Securityweek

9.5.19

WordPress 5.2 Brings New Security Features

Security

Securityweek

9.5.19

Ongoing Attack Stealing Credit Cards From Over A Hundred Shopping Sites

Attack

Thehackernews

9.5.19

TURLA LIGHTNEURON

Report

Report

9.5.19

Securing satellites: The new space race

Security

Net-security

9.5.19

C-level executives increasingly and proactively targeted by social breaches

Incindent

Net-security

9.5.19

3 months, 1900 reported breaches, 1.9 billion records exposed

Incindent

Net-security

9.5.19

The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors

IoT

Net-security

9.5.19

Whose (usage) data is it, anyway?

Security

Net-security

9.5.19

How institutions, advisors, and investors think about digital assets

Security

Net-security

8.5.19

Yomi Hunter Joined the VirusTotal Sandbox Program!

Virus

Securityaffairs

8.5.19

International Police operation seized DeepDotWeb and arrested its administrators

BigBrothers

Securityaffairs

8.5.19

Most of the servers at City of Baltimore shut down after ransomware attack

Ransomware

Securityaffairs

8.5.19

Hackers Steal $41 Million worth of Bitcoin from Binance Exchange

Hacking

Securityaffairs

8.5.19

Google Patches Remotely Exploitable Vulnerabilities in Android

Android

Securityweek

8.5.19

Jenkins Vulnerability Exploited to Deliver 'Kerberods' Malware

Virus

Securityweek

8.5.19

New Product Protects SMBs From Credential Stuffing Attacks

Attack

Securityweek

8.5.19

Orange Acquires Cybersecurity Firm SecureLink

Cyber

Securityweek

8.5.19

Unpatched Flaw in UC Browser Apps Could Let Hackers Launch Phishing Attacks

Phishing

Thehackernews

8.5.19

Google Chrome to Introduce Improved Cookie Controls Against Online Tracking

Security

Thehackernews

8.5.19

Baltimore City Shuts Down Most of Its Servers After Ransomware Attack

Ransomware

Thehackernews

8.5.19

Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak

BigBrothers

Threatpost

8.5.19

Critical Flaw in Cisco Elastic Services Controller Allows Full System Takeover

Vulnerebility

Threatpost

8.5.19

Ukrainian Charged With Launching 100 Million Malicious Ads

Virus

Threatpost

8.5.19

Amid Bug Bounty Hype, Sometimes Security is Left in the Dust

Security

Threatpost

8.5.19

Top 5 Configuration Mistakes That Create Field Days for Hackers

Security

Threatpost

8.5.19

Cynet Free IR tool offering empowers responders to know and act against active attacks

Attack

Net-security

8.5.19

WordPress updates are digitally signed at last!

Security

Net-security

8.5.19

Local Authorities in Texas and Maryland Hit by Ransomware

Ransomware

Bleepingcomputer

8.5.19

Researcher Finds CSS-Only Method to Track Mouse Movements

Security

Bleepingcomputer

8.5.19

Cisco Fixes Critical Vulnerability in Elastic Services Controller

Vulnerebility

Bleepingcomputer

8.5.19

Google Chrome To Stop Sites From Messing with the Back Button

Security

Bleepingcomputer

8.5.19

FBI Seize DeepDotWeb For Taking Commissions From Illegal Sites

BigBrothers

Bleepingcomputer

8.5.19

Burger King's Online Store for Kids Exposes Customers’ Info

Incindent

Bleepingcomputer

8.5.19

Microsoft Edge for Mac Leaked, Includes Browser Protection

Incindent

Bleepingcomputer

8.5.19

Confluence Servers Hacked to Install Miners and Rootkits

Cryptocurrency

Bleepingcomputer

8.5.19

NSA Hacking Tools Used by Chinese Hackers One Year Before Leak

BigBrothers

Bleepingcomputer

8.5.19

Tor Browser 8.0.9 Released to Fix Disabled NoScript Addon

Security

Bleepingcomputer

8.5.19

LulZSec and Anonymous Ita hackers published sensitive data from 30,000 Roman lawyers

APT

Securityaffairs

8.5.19

Cisco addresses a critical flaw in Elastic Services Controller

Vulnerebility

Securityaffairs

8.5.19

LightNeuron, a Turla’s backdoor used to compromise exchange mail servers

APT

Securityaffairs

8.5.19

Hackers Steal $40 Million in Bitcoin From Cryptocurrency Exchange Binance

Cryptocurrency

Securityweek

8.5.19

Cyberattack Cripples Baltimore's Government Computer Servers

Attack

Securityweek

8.5.19

Verizon Publishes 2019 Data Breach Investigations Report (DBIR)

Analysis

Securityweek

8.5.19

NIST Working on Industrial IoT Security Guide for Energy Companies

BigBrothers

Securityweek

8.5.19

Microsoft Launches New Solutions to Protect Elections From Hacking

Security

Securityweek

8.5.19

Binance Hacked — Hackers Stole Over $40 Million Worth Of Bitcoin

Hacking

Thehackernews

8.5.19

Critical flaw allows attackers to take over Cisco Elastic Services Controllers

Vulnerebility

Net-security

8.5.19

Email roulette, May 2019

Security

SANS

8.5.19

Executing a multi-cloud strategy: Crawl, walk, run

Security

Net-security

8.5.19

Is curiosity killing patient privacy?

Privacy

Net-security

8.5.19

Open banking establishes new access to banks’ networks, creating additional security issues

Security

Net-security

8.5.19

Mobile carriers believe security and reliability concerns will increase with 5G

Mobil

Net-security

8.5.19

Senior payment executives’ thoughts on SME PCI compliance and security

Security

Net-security

7.5.19

Microsoft Windows 10 will get a full built-in Linux Kernel for WSL 2

IT

Thehackernews

7.5.19

Chinese Hackers Used NSA Hacking Tools Before Shadow Brokers Leaked Them

Hacking

Thehackernews

7.5.19

ATMitch: New Evidence Spotted In The Wild

Security

Securityaffairs

7.5.19

Buckeye APT group used Equation Group tools prior to ShadowBrokers leak

APT

Securityaffairs

7.5.19

New MegaCortex Ransomware targets enterprise networks

Ransomware

Securityaffairs

7.5.19

Privileged Access Management Solutions Are Shifting to the Cloud: Survey

Security

Securityweek

7.5.19

Turla Uses Sophisticated Backdoor to Hijack Exchange Mail Servers

APT

Securityweek

7.5.19

SIEM Solutions Firm Exabeam Raises $75 Million

IT

Securityweek

7.5.19

Proofpoint to Acquire Meta Networks for $120 Million

IT

Securityweek

7.5.19

GandCrab Ransomware Detected Targeting Manufacturing Firm

Ransomware

Securityweek

7.5.19

Researchers discover highly stealthy Microsoft Exchange backdoor

Virus

Net-security

7.5.19

Turla Backdoor Deployed in Attacks Against Worldwide Targets

APT

Bleepingcomputer

7.5.19

WordPress 5.2 to Come with Supply-Chain Attack Protection

Attack

Bleepingcomputer

7.5.19

App Stores Pull Meet24 and Meet4U Dating Apps For FTC Violations

Mobil

Bleepingcomputer

7.5.19

Evil Clippy Makes Malicious Office Docs that Dodge Detection

Virus

Bleepingcomputer

7.5.19

Amazon to Disable S3 Path-Style Access Used to Bypass Censorship

Security

Bleepingcomputer

7.5.19

Microsoft to Ship a True Linux Kernel With Windows 10 WSL

IT

Bleepingcomputer

7.5.19

Microsoft Launches Multi-Shell Windows Terminal Console App

Security

Bleepingcomputer

7.5.19

Upcoming Microsoft Edge Features Announced at Build 2019

Security

Bleepingcomputer

7.5.19

Chrome for Android to Allow In-App Browser Updates

Android

Bleepingcomputer

7.5.19

Israel Bombs Building as Retaliation for Hamas Cyber Attack

BigBrothers

Bleepingcomputer

7.5.19

ICS-CERT warns of several flaws in the GE Communicator software

Vulnerebility

Securityaffairs

7.5.19

A bug in Mirai code allows crashing C2 servers

Vulnerebility

Securityaffairs

7.5.19

Other Sierra AirLink router models affected by critical flaws

Vulnerebility

Securityaffairs

7.5.19

Chinese Hackers Used NSA Tool a Year Before Shadow Brokers Leak

BigBrothers

Securityweek

7.5.19

PrinterLogic Vulnerability Allows Remote Code Execution

Vulnerebility

Securityweek

7.5.19

Several Vulnerabilities Found in GE Power Meter Software

Vulnerebility

Securityweek

7.5.19

U.S. Charges Ukrainian for Malvertising

Virus

Securityweek

7.5.19

Industry Reactions to Cybersecurity Workforce Executive Order

Cyber

Securityweek

7.5.19

5G Conference Warns on Security as Huawei Controversy Rages

Mobil

Securityweek

7.5.19

Israel Bombs Hamas Cyber HQ in Response to Cyberattack

BigBrothers

Securityweek

7.5.19

Google Announces Fourth-Annual Capture the Flag Event

Security

Securityweek

7.5.19

Popular Online Tutoring Marketplace 'Wyzant' Suffers Data Breach

Incindent

Thehackernews

7.5.19

Researchers Weigh in on Trump’s Cyber Workforce Executive Order

Cyber

Threatpost

7.5.19

Amid Bug Bounty Hype, Sometimes Security is Left in the Dust

Vulnerebility

Threatpost

7.5.19

Extinguishing the IoT Insecurity Dumpster Fire

IoT

Threatpost

7.5.19

Tor Security Add-On Abruptly Killed by Mozilla Bug

Security

Threatpost

7.5.19

WP Live Chat WordPress Plugin Re-Patches File Upload Flaw

Vulnerebility

Threatpost

7.5.19

Oracle WebLogic Exploit-fest Continues with GandCrab Ransomware, XMRig

Ransomware

Threatpost

7.5.19

High-Severity Bug Leaves Cisco TelePresence Gear Open to Attack

Vulnerebility

Threatpost

7.5.19

Avengers: Endgame Sites Promise Digital Downloads, Deliver Info-Harvesting

Security

Threatpost

7.5.19

High-Severity PrinterLogic Flaws Enable Remote Code Execution

Vulnerebility

Threatpost

7.5.19

Text and Text

Security

SANS

7.5.19

Unhackable? New chip makes the computer an unsolvable puzzle

Security

Net-security

7.5.19

C-Suite execs and policy makers find cybersecurity technology investments essential

Cyber

Net-security

7.5.19

Flaws in the design of IoT devices prevent them from notifying homeowners about problems

IoT

Net-security

7.5.19

Cryptographic breakthrough allows using handshake-style encryption for time-delayed communications

Crypto

Net-security

7.5.19

Network as a Service market to exceed $50bn by 2025

IT

Net-security

6.5.19

Other Sierra AirLink router models affected by critical flaws

Vulnerebility

Securityaffairs

6.5.19

IDF hit Hamas, it is the first time a state launched an immediate physical attack in response to a cyber attack

Attack

Securityaffairs

6.5.19

Magecart Skimming Attack Hits Hundreds of Campus e-Commerce Sites

Attack

Securityweek

6.5.19

European, US Investigators Make Major Darknet Bust

BigBrothers

Securityweek

6.5.19

Hundreds of Git Repositories Held for Ransom

Ransomware

Securityweek

6.5.19

Israel Neutralizes Cyber Attack by Blowing Up A Building With Hackers

BigBrothers

Thehackernews

6.5.19

Panda Malware: It’s Not Just About Cryptocurrencies Anymore

Malware blog

F5 Labs

6.5.19

Regional Threat Perspectives: United States

Security blog

F5 Labs

6.5.19

Gozi Banking Trojan Pivots Towards Italian Banks in February and March

Malware blog

F5 Labs

6.5.19

Denial of Service Vulnerabilities Discovered in HTTP/2

Vulnerebility blog

F5 Labs

6.5.19

Regional Threat Perspectives: Australia

Security blog

F5 Labs

6.5.19

Ramnit Returns to its Banking Roots, Just in Time for Italian Tax Season

Malware blog

F5 Labs

6.5.19

CARBANAK Week Part Four: The CARBANAK Desktop Video Player

Malware blog

FireEye

6.5.19

CARBANAK Week Part Two: Continuing the CARBANAK Source Code Analysis

Malware blog

FireEye

6.5.19

CARBANAK Week Part Three: Behind the CARBANAK Backdoor

Malware blog

FireEye

6.5.19

Vulnerabilities in ISPsystem

Vulnerebility blog

Checkpoint

6.5.19

Deobfuscating APT32 Flow Graphs with Cutter and Radare2

APT blog

Checkpoint

6.5.19

Beapy: Cryptojacking Worm Hits Enterprises in China

Cryptocurrency blog

Symantec

6.5.19

Dispelling Myths Around SGX Malware

Malware blog

Symantec

6.5.19

Qakbot levels up with new obfuscation techniques

Malware blog

Cisco Talos

6.5.19

Sodinokibi ransomware exploits WebLogic Server vulnerability

Ransomware blog

Cisco Talos

6.5.19

Vulnerability Spotlight: Multiple vulnerabilities in Sierra Wireless AirLink ES450

Vulnerebility blog

Cisco Talos

6.5.19

JasperLoader Emerges, Targets Italy with Gootkit Banking Trojan

Malware blog

Cisco Talos

6.5.19

The UK plans to legislate to secure IoT, but is it really the answer?

IoT blog

Eset

6.5.19

World Password Day: A day to review your defenses

Security blog

Eset

6.5.19

D-Link camera vulnerability allows attackers to tap into the video stream

Vulnerebility blog

Eset

6.5.19

Buhtrap backdoor and ransomware distributed via major advertising platform

Ransomware blog

Eset

6.5.19

BEC fraud losses almost doubled last year

Spam blog

Eset

6.5.19

Over 23 million breached accounts used ‘123456’ as password

Incident blog

Eset

6.5.19

What will phishers do once push-based MFA becomes widely used?

Phishing

Net-security

6.5.19

Flaw in pre-installed software opens Dell computers to remote hijack

Hacking

Net-security

6.5.19

Firefox 66.0.4 Released With Fix for Disabled Addons

Security

Bleepingcomputer

6.5.19

New Extortion Email Scam Threatens to Release Your Sex Tape

Spam

Bleepingcomputer

6.5.19

Fix for Tor Browser NoScript Addon Being Disabled

Vulnerebility

Bleepingcomputer

6.5.19

Alleged Ukrainian Malvertiser Extradited, Faces Hacking Charges

Hacking

Bleepingcomputer

6.5.19

Retefe Banking Trojan resurfaces in the threat landscape with innovations

Virus

Securityaffairs

6.5.19

NoScript temporarily disabled in Tor Browser … how to fix it?

Security

Securityaffairs

6.5.19

Ukrainian national Oleksii Petrovich Ivanov extradited to US facing hacking charges

BigBrothers

Securityaffairs

6.5.19

A hacker has taken over at least 29 IoT botnets

BotNet  IoT

Securityaffairs

6.5.19

2020 Campaign Staffers Being Trained to Handle Cyber Threats

Cyber

Securityweek

6.5.19

PSD2 and strong customer authentication: Are all elements equal?

Security

Net-security

6.5.19

Researchers working on tools that aim to eliminate computer bugs

Vulnerebility

Net-security

6.5.19

What differentiates the strongest cybersecurity programs from the rest

Cyber

Net-security

6.5.19

Trust is at a tipping point: Consumers will react strongly if they feel their privacy is compromised

Privacy

Net-security

6.5.19

Government embracing digital transformation but struggling to implement data security

BigBrothers

Net-security

5.5.19

Hackers stole card data from 201 campus online stores in US and Canada, is it the Magecart group?

CyberCrime

Securityaffairs

5.5.19

Japan will develop its first-ever malware as a defense measure against cyber attacks

Virus

Securityaffairs

5.5.19

Mysterious attacks wipe Git repositories and ask a ransom to rescue code

Ransomware

Securityaffairs

5.5.19

Mozilla plans to ban Firefox Extensions containing obfuscated code

Security

Securityaffairs

5.5.19

Expert found hundred of vulnerable Jenkins Plugins

Vulnerebility

Securityaffairs

4.5.19

Dark Web’s Wall Street Market & Valhalla Seized, Six Arrested

CyberCrime

Bleepingcomputer

4.5.19

New MegaCortex Ransomware Found Targeting Business Networks

Ransomware

Bleepingcomputer

4.5.19

Firefox Addons Being Disabled Due to an Expired Certificate

Security

Bleepingcomputer

4.5.19

Attackers Wiping GitHub and GitLab Repos, Leave Ransom Notes

Ransomware

Bleepingcomputer

4.5.19

Windows 10 1809 Cumulative Update KB4495667 Released With Fixes

Vulnerebility

Bleepingcomputer

4.5.19

Microsoft Now Lets You Reply to Android Texts in Windows 10

Android

Bleepingcomputer

4.5.19

Over 200 College Campus Stores Infected with Card Stealing Scripts

Virus

Bleepingcomputer

4.5.19

Microsoft Ports Process Explorer and Monitor to Windows ARM64

IT

Bleepingcomputer

4.5.19

Ransom

Ransom

Ransom

4.5.19

Europol Shuts Down Two Major Illegal 'Dark Web' Trading Platforms

BigBrothers

Thehackernews

4.5.19

Using the Human Factor in Cyber Attacks

Attack

Securityaffairs

4.5.19

Authorities shut down major darknet marketplaces: the Wall Street Market and Valhalla

CyberCrime

Securityaffairs

4.5.19

Cisco addresses a critical flaw in Nexus 9000 switches

Vulnerebility

Securityaffairs

4.5.19

Mozilla Bans Firefox Extensions Containing Obfuscated Code

Security

Securityweek

4.5.19

CrowdStrike Endpoint Security Platform Now Detects Firmware Attacks

Attack

Securityweek

4.5.19

New Strain of Android Malware Found on Third-Party App Store

Android

Securityweek

4.5.19

UK Publishes Proposed Regulation for IoT Device Security

IoT

Securityweek

4.5.19

Vulnerabilities Found in Over 100 Jenkins Plugins

Vulnerebility

Securityweek

4.5.19

German Police Shut Down Major 'Darknet' Illegal Trading Site

BigBrothers

Securityweek

4.5.19

News Wrap: Cartoon Network Hack, the Catholic Church and Jason Statham Scams

Spam

Threatpost

4.5.19

Multiple Sierra Wireless AirLink Routers Open to Remote Code Execution

Vulnerebility

Threatpost

4.5.19

Retefe Banking Trojan Resurfaces, Says Goodbye to Tor

Virus

Threatpost

4.5.19

Researchers Weigh in on Trump’s Cyber Workforce Executive Order

Cyber

Threatpost

4.5.19

PrinterLogic Print Management Software fails to validate SSL certificates or the integrity of software updates.

Alert

Alert

3.5.19

MEGALOCKER DECRYPTOR

Ransomware

Anti-Ramson Tool

3.5.19

Chrome Will Allow Sites to Check Your OS Dark Mode Settings

Security

Bleepingcomputer

3.5.19

Mozilla To Disable Firefox Add-Ons with Obfuscated Code

Security

Bleepingcomputer

3.5.19

Microsoft PM Explains Why Chromium Edge Can’t Run Google Earth

IT

Bleepingcomputer

3.5.19

Decryptor for MegaLocker and NamPoHyu Virus Ransomware Released

Ransomware

Bleepingcomputer

3.5.19

Windows 10 1903 Rolling Out Improved Windows Update Controls

Vulnerebility

Bleepingcomputer

3.5.19

Qakbot Assembles Itself from Encrypted Halves to Evade Detection

BotNet

Bleepingcomputer

3.5.19

Coinhive Dead but Browser-Based Cryptomining Still a Threat

Cryptocurrency

Bleepingcomputer

3.5.19

Public 10KBLAZE Exploits May Impact 90% of SAP Production Systems

Exploit

Bleepingcomputer

3.5.19

Scammers Create Google Search Ads to Lure PayPal, Amazon Clients

Spam

Bleepingcomputer

3.5.19

Mozilla will block Firefox add-ons that contain obfuscated code

Security

Net-security

3.5.19

Dell Security Support Tool Harbors High-Severity Flaws

Vulnerebility

Threatpost

3.5.19

Cisco Warns of Critical Nexus 9000 Data Center Flaw

Vulnerebility

Threatpost

3.5.19

D-Link Cloud Camera Flaw Gives Hackers Access to Video Stream

Vulnerebility

Threatpost

3.5.19

Critical Flaws Found in Eight Wireless Presentation Systems

Vulnerebility

Threatpost

3.5.19

Ladders, SkyMed Leak Employment, Medical Data for Millions

Security

Threatpost

3.5.19

AA19-122A : New Exploits for Unsecure SAP Systems

Exploit

CERT

3.5.19

10KBLAZE exploits could affect 9 out of 10 SAP installs of more than 50k customers

Exploit

Securityaffairs

3.5.19

Ladders Database Exposed 13M User Records

Incindent

Securityaffairs

3.5.19

Russian national Anton Bogdanov indicted for $1.5M cyber tax fraud scheme

BigBrothers

Securityaffairs

3.5.19

APT34: Glimpse project

APT

Securityaffairs

3.5.19

Trump Signs Executive Order to Bolster Cybersecurity Workforce

Cyber

Securityweek

3.5.19

TSA Lacks Cybersecurity Expertise to Manage Pipeline Security Program: Report

Cyber

Securityweek

3.5.19

DoS Attack Blamed for U.S. Grid Disruptions: Report

Attack

Securityweek

3.5.19

Dell Patches Remote Code Execution Vulnerability in SupportAssist Client

Vulnerebility

Securityweek

3.5.19

PoC Exploits for Old SAP Configuration Flaws Increase Risk of Attacks

Exploit

Securityweek

3.5.19

A few Ghidra tips for IDA users, part 3 - conversion, labels, and comments

Forensics

SANS

3.5.19

Google offers auto-delete option for location, web tracking history

Privacy

Net-security

3.5.19

Consumers care deeply about their privacy, security, and how their personal information is handled

Security

Net-security

3.5.19

Cybercriminals targeting social media: Facebook and Instagram are becoming phishers’ favorites

CyberCrime

Net-security

3.5.19

Cybercriminals thriving on companies overlooking fundamental security requirements

CyberCrime

Net-security

3.5.19

60% of businesses have experienced a serious security breach in the last two years

Incindent

Net-security

3.5.19

A wave of regulation is coming to the cryptocurrency economy

Cryptocurrency

Net-security

2.5.19

Magecart Group 12 also targets Opencart-based online stores

CyberCrime

Securityaffairs

2.5.19

A ‘Cyber Event’ disrupted power grid operations in three US states

BigBrothers

Securityaffairs

2.5.19

Assange Refuses Extradition to US; Long Legal Fight Expected

BigBrothers

Securityweek

2.5.19

Russian Charged With Stealing $1.5 Million From IRS

BigBrothers

Securityweek

2.5.19

Cisco Patches Critical Vulnerability in Data Center Switches

Vulnerebility

Securityweek

2.5.19

US Calls for Cautious EU Policy on 5G Networks

Mobil

Securityweek

2.5.19

Xinjiang Surveillance App Targets Legal, Everyday Behaviour: Rights Group

Mobil

Securityweek

2.5.19

50,000 companies running SAP installations open to attack via publicly released exploits

Exploit

Net-security

2.5.19

Magecart Group 12 Targets OpenCart Websites

CyberCrime

Bleepingcomputer

2.5.19

Office 365 Accounts Compromised via ATO Attacks Used in BEC Scams

Spam

Bleepingcomputer

2.5.19

Dell Computers Exposed to RCE Attacks by SupportAssist Flaws

Vulnerebility

Bleepingcomputer

2.5.19

Windows 10 1809 Cumulative Update KB4501835 Released With Fixes

Vulnerebility

Bleepingcomputer

2.5.19

Database Exposes Medical Info, PII Data of 137k People in U.S.

Incindent

Bleepingcomputer

2.5.19

Windows 10 Friendly Dates Not Included in the May 2019 Update

Vulnerebility

Bleepingcomputer

2.5.19

Windows 10 Insider Build 18890 Released With Bug Fixes

Vulnerebility

Bleepingcomputer

2.5.19

Windows 10 Security Feature Slows Launching of Large Programs

Security

Bleepingcomputer

2.5.19

Citrix Confirms Hackers Stole Sensitive Employee Personal Information

Hacking

Bleepingcomputer

2.5.19

Polymorphic Magecart Skimmer Uses Over Fifty Payment Gateways

CyberCrime

Bleepingcomputer

2.5.19

Sophos UTM 9.602 Released That Fixes 3 Vulnerabilities

Vulnerebility

Bleepingcomputer

2.5.19

Sodinokibi Ransomware Being Installed on Exploited WebLogic Servers

Ransomware

Bleepingcomputer

2.5.19

DHS Says Federal Agencies Have 15 Days to Fix Critical Flaws

BigBrothers

Bleepingcomputer

2.5.19

GitHub-Hosted Malware Targets Accountants With Ransomware

Ransomware

Bleepingcomputer

2.5.19

Microsoft 365 Adds More Control Over Encrypted Emails, Increases Privacy

Crypto

Bleepingcomputer

2.5.19

Emotet Trojan Is the Most Prevalent Threat in Healthcare Systems

Virus

Bleepingcomputer

2.5.19

Google Docs Says Chromium-Based Microsoft Edge Is Not Supported

IT

Bleepingcomputer

2.5.19

New Phishing Campaign From 'FBI Director Wray' is Hysterical

Phishing

Bleepingcomputer

2.5.19

Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws

Vulnerebility

Net-security

2.5.19

Cartoon Network Hacked Worldwide to Show Brazilian Stripper Videos

Hacking

Threatpost

2.5.19

Muhstik Botnet Variant Targets Just-Patched Oracle WebLogic Flaw

BotNet

Threatpost

2.5.19

Ad Server Patched to Stop Possible Malware Distribution

Virus

Threatpost

2.5.19

Wipro Attackers Have Operated Under the Radar for Years

Attack

Threatpost

2.5.19

DHS Shortens Deadline For Gov Agencies to Fix Critical Flaws

Vulnerebility

Threatpost

2.5.19

How to Hack Dell computers exploiting a flaw in pre-installed Dell SupportAssist

Vulnerebility

Securityaffairs

2.5.19

Tenable experts found 15 flaws in wireless presentation systems

Vulnerebility

Securityaffairs

2.5.19

Pre-Installed Software Flaw Exposes Most Dell Computers to Remote Hacking

Vulnerebility

Thehackernews

2.5.19

Google Adds New Option to 'Auto-Delete' Your Location History and Activity Data

Privacy

Thehackernews

2.5.19

Microsoft 365 updates for better enterprise data privacy

Privacy

Net-security

2.5.19

APT trends report Q1 2019

APT

Securelist

2.5.19

Decrypter pro ZQ

Anti-Ransom Tool

Anti-Ransom Tool

2.5.19

Citrix confirmed hackers had access to its network for five months

Hacking

Securityaffairs

2.5.19

Victims of ZQ Ransomware can decrypt their files for free

Ransomware

Securityaffairs

2.5.19

Many Vulnerabilities Found in Wireless Presentation Devices

Vulnerebility

Securityweek

2.5.19

Putin Signs Controversial Internet Law

BigBrothers

Securityweek

2.5.19

Electrum DDoS Botnet Builds Army of 150,000 Hosts

BotNet

Securityweek

2.5.19

Hackers Had Access to Citrix Network for Five Months

Hacking

Securityweek

2.5.19

Majority of Encrypted Email Clients Vulnerable to Signature Spoofing

Vulnerebility

Securityweek

2.5.19

Cloud Security Firm DivvyCloud Raises $19 Million