Home  2019  2018  2017  2016  1  2  3  4  5  6  7

Date

Name

Category

Web

30.6.19

Update v.02.15

News

News

30.6.19

Android Horror Game Steals Google, Facebook Credentials and Data

Android

Bleepingcomputer

30.6.19

Microsoft Teams Can Be Used to Download and Run Malicious Packages

Virus

Bleepingcomputer

30.6.19

Phishing Security Controls Fully Bypassed Using QR Codes

Phishing

Bleepingcomputer

30.6.19

Netflix, Ford, TD Bank Data Exposed by Open Amazon S3 Buckets

Incindent

Bleepingcomputer

30.6.19

Cortana Beta App for Windows 10 Appears on Microsoft Store

IT

Bleepingcomputer

30.6.19

Slack Is Experiencing Worldwide Outage, Degraded Performance

Security

Bleepingcomputer

30.6.19

Open Marketing Database Exposes 5 Million Personal Records

Incindent

Bleepingcomputer

30.6.19

Attunity data leak: Netflix, Ford, TD Bank data exposed by Open AWS Buckets

Incindent

Securityaffairs

29.6.19

EA Games Vulnerability

Vulnerebility blog

Checkpoint

29.6.19

Thumbs Up: Using Machine Learning to Improve IDA’s Analysis

Security blog

Checkpoint

29.6.19

Over 150 Fake Jio Android Apps Offer Free Data but Deliver Only Ads

OS Blog

Symantec

29.6.19

Cryptojacking Extensions Found on Google Chrome Web Store

Cryptocurrency blog

Symantec

29.6.19

Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments

BigBrother blog

Symantec

29.6.19

Welcome Spelevo: New exploit kit full of old tricks

Exploit blog

Cisco Talos

29.6.19

Vulnerability Spotlight: Two bugs in KCodes NetUSB affect some NETGEAR routers

Vulnerebility blog

Cisco Talos

29.6.19

Microsoft enhances OneDrive to secure your sensitive files

Security blog

Eset

29.6.19

Two US cities opt to pay $1m to ransomware operators

Ransomware blog

Eset

29.6.19

Stopping stalkerware: What needs to change?

Security blog

Eset

29.6.19

Hackers breach NASA, steal Mars mission data

BigBrother blog

Eset

29.6.19

New Exploit Kit Spelevo Carries Bag of Old Tricks

Exploit

Bleepingcomputer

29.6.19

Windows 10 1903 Cumulative Update KB4501375 Released With Fixes

Vulnerebility

Bleepingcomputer

29.6.19

Fraudsters Spoof Blockchain.com to Steal $27M in Cryptocurrency

Cryptocurrency

Bleepingcomputer

29.6.19

Track This Demonstrates How Advertisers Track You On The Web

Security

Bleepingcomputer

29.6.19

Microsoft Edge Dev Build Now Available for Windows 7, 8, and 8.1

IT

Bleepingcomputer

29.6.19

Cisco Patches Critical Flaws in Data Center Network Manager

Vulnerebility

Bleepingcomputer

29.6.19

Hacked Ad Server Pushes SEON Ransomware, Trojans Via Malvertising

Ransomware

Bleepingcomputer

29.6.19

Windows 10 1809 Cumulative Update KB4509479 Released With Fixes

Vulnerebility

Bleepingcomputer

29.6.19

New Silex Malware Trashes IoT Devices Using Default Passwords

Virus

Bleepingcomputer

29.6.19

New Microsoft Edge Dev Update Adds Dark Mode Improvements

IT

Bleepingcomputer

29.6.19

Instagram Like Counts May Go Private, Already Being Tested

Social

Bleepingcomputer

29.6.19

Google Chrome OS 75 Released with ZombieLoad MDS Mitigations

Security

Bleepingcomputer

29.6.19

Google Warns of Microsoft SwiftKey Losing Access to Gmail on July 15

IT

Bleepingcomputer

29.6.19

Attackers Earn Over $1 Million in Florida Ransomware Attacks

Ransomware

Bleepingcomputer

29.6.19

Talos discovered Spelevo EK, an exploit kit spreading via B2B Website

BigBrothers

Securityaffairs

29.6.19

FDA Warns of Potentially Fatal Flaws in Medtronic Insulin Pumps

Vulnerebility

Threatpost

29.6.19

New Dridex Variant Slips By Anti-Virus Detection

Virus

Threatpost

29.6.19

MongoDB Leak Exposed Millions of Medical Insurance Records

Incindent

Threatpost

28.6.19

Italian data protection watchdog fines Facebook over Cambridge Analytica scandal

Social

Securityaffairs

28.6.19

Regin spyware involved in attack against the Russian tech giant Yandex

Virus

Securityaffairs

28.6.19

Some Medtronic Insulin Pumps Vulnerable to Hacker Attacks

Vulnerebility

Securityweek

28.6.19

Italy Fines Facebook Over Cambridge Analytica Case

Social

Securityweek

28.6.19

"Silexbot" Malware Bricks IoT Devices

IoT

Securityweek

28.6.19

Provider of Data Integration Services for Fortune 100 Firms Exposed Sensitive Files

Security

Securityweek

28.6.19

New Spelevo Exploit Kit Spreads via B2B Website

Exploit

Securityweek

28.6.19

Industry Reactions to Nation-State Hacking of Global Telcos

Hacking

Securityweek

28.6.19

Baltimore Approves $10M in Funding for Cyber Attack Relief

Attack

Securityweek

28.6.19

Verifying Running Processes against VirusTotal - Domain-Wide

Virus

SANS

28.6.19

Medtronic recalls vulnerable MiniMed insulin pumps

Vulnerebility

Net-security

28.6.19

Smart Lock Turns Out to be Not So Smart, or Secure

Security

Threatpost

28.6.19

Scammers Prey on Instagram Vanity and ‘Verified Account’ Status

Spam

Threatpost

28.6.19

Death of the VPN: Enterprise Security Needs New Foundations

Security

Threatpost

28.6.19

Cloud Hopper operation hit 8 of the world’s biggest IT service providers

Security

Securityaffairs

28.6.19

US-based Cloud Solution Provider PCM Inc. hacked

Incindent

Securityaffairs

28.6.19

Cisco addressed critical flaws in Cisco Data Center Network Manager

Vulnerebility

Securityaffairs

28.6.19

Crooks stole millions from Bitrue Cryptocurrency Exchange

Cryptocurrency

Securityaffairs

28.6.19

Russian Tech Giant Yandex Targeted With 'Regin' Malware: Report

Virus

Securityweek

28.6.19

Former Equifax Executive Gets 4 Months for Insider Trading

Crime

Securityweek

28.6.19

US Cyber Attack on Iran: Search to Exploit Flaw

BigBrothers

Securityweek

28.6.19

Many Potential Backdoors Found in Huawei Equipment: Study

Virus

Securityweek

28.6.19

YouTube Bitcoin Scams Pushing the njRAT Backdoor InfoStealer

Virus

Bleepingcomputer

28.6.19

EA Fixes Origin Game Platform To Prevent Account Takeovers

Vulnerebility

Bleepingcomputer

28.6.19

Dominion National Discovers Breach 9 Years After it Happened

Incindent

Bleepingcomputer

28.6.19

Riltok Android Banker Takes Over SMS App, Spawns Phishing Screens

Android

Bleepingcomputer

28.6.19

Phishing Scam Says You Won $2.5M For Using Google's Services

Phishing

Bleepingcomputer

28.6.19

Tech Support Scammers Target Search Ads on ISP Start Pages

Spam

Bleepingcomputer

28.6.19

Microsoft OneDrive Gets a New Encrypted 'Personal Vault'

Crypto

Bleepingcomputer

28.6.19

BlueStacks Flaw Lets Attackers Remotely Control Android Emulator

Android

Bleepingcomputer

28.6.19

Windows 10 1903 Insiders Test Fix For Event Viewer Custom Views

Vulnerebility

Bleepingcomputer

28.6.19

Malspam Campaigns Hide Infostealers in ISO Image Files

Spam

Bleepingcomputer

28.6.19

Thousands of IoT Devices Bricked By Silex Malware

IoT

Threatpost

28.6.19

New Microsoft Excel Attack Vector Surfaces

Attack

Threatpost

28.6.19

Smart Lock Turns Out to be Not So Smart, or Secure

Security

Threatpost

28.6.19

Leaky Amazon S3 Buckets Expose Data of Netflix, TD Bank

Incindent

Threatpost

28.6.19

Scammers Prey on Instagram Vanity and ‘Verified Account’ Status

Social

Threatpost

28.6.19

The biggest SecOps burdens hindering progress for enterprises and MSSPs

Security

Net-security

28.6.19

Cybersecurity professionals are outgunned and burned out

Cyber

Net-security

28.6.19

Consumers believe privacy is not possible, leading to a change in online behavior

Privacy

Net-security

28.6.19

Over reliance on public cloud vendor security puts data and companies at risk of breach

Incindent

Net-security

28.6.19

Interoperability and security remain critical factors in any smart city deployment

Security

Net-security

27.6.19

Criminals, ATMs and a cup of coffee

CyberCrime

Securelist

27.6.19

Flaws in the BlueStacks Android emulator allows remote code execution and more

Android

Securityaffairs

27.6.19

Iranian Cyberspies Update Infrastructure Following Recent Report

BigBrothers

Securityweek

27.6.19

ENISA Transforms to European Union Agency for Cybersecurity

BigBrothers

Securityweek

27.6.19

Google Makes DNS Over HTTPS Generally Available

Security

Securityweek

27.6.19

2nd Florida City Pays Hackers, as 3rd City Faces Breach

Hacking

Securityweek

27.6.19

Hackers Steal Millions from Cryptocurrency Exchange Bitrue

Cryptocurrency

Securityweek

27.6.19

Chrome OS 75 Adds More Mitigations for Intel MDS Flaws

Vulnerebility

Securityweek

27.6.19

Exclusive: German Police Raid OmniRAT Developer and Seize Digital Assets

Virus

Thehackernews

27.6.19

Two Florida Cities Paid $1.1 Million to Ransomware Hackers This Month

Ransomware

Thehackernews

27.6.19

Account Takeover Vulnerability Found in Popular EA Games Origin Platform

Vulnerebility

Thehackernews

27.6.19

EA Games Patches Account-Hijacking Bug

Vulnerebility

Threatpost

27.6.19

Cisco Warns of Critical Flaws in Data Center Network Manager

Vulnerebility

Threatpost

27.6.19

Second Florida City Pays Hackers $500k Post-Ransomware Attack

Ransomware

Threatpost

27.6.19

Iran-linked APT33 Shakes Up Cyberespionage Tactics

APT

Threatpost

27.6.19

Google Announces DNS over HTTPS ‘General Availability’

Security

Threatpost

27.6.19

Cisco plugs critical security holes in Data Center Network Manager

Vulnerebility

Net-security

27.6.19

Similarities and differences between MuddyWater and APT34

APT

Securityaffairs

27.6.19

Flaws in EA Games Login exposed accounts of 300 Million Gamers to hack

Hacking

Securityaffairs

27.6.19

European law enforcement agencies arrested 6 individuals involved in $27M cryptocurrency theft

Cryptocurrency

Securityaffairs

27.6.19

Lake City agreed to pay $500,000 in ransom, is the second case in Florida in a week

Ransomware

Securityaffairs

27.6.19

Critical Flaws Found in Cisco Data Center Network Manager

Vulnerebility

Securityweek

27.6.19

French Consumer Group Launches Class Action Against Google

BigBrothers

Securityweek

27.6.19

US Cyber Attack on Iran Shrouded in Digital 'Fog of War'

BigBrothers

Securityweek

27.6.19

Email Security Firm GreatHorn Raises $13 Million

IT

Securityweek

27.6.19

Vulnerability Remediation Firm Vulcan Cyber Raises $10 Million

IT

Securityweek

27.6.19

Presidential Phone Alerts Can Be Spoofed, Researchers Say

Mobil

Securityweek

27.6.19

Six Arrested in $27 Million Cryptocurrency Theft

Cryptocurrency

Securityweek

27.6.19

Google Allows G Suite Users to Log In With Security Codes

Security

Securityweek

27.6.19

EA Games Login Flaw Exposed Accounts of 300 Million Gamers

Hacking

Securityweek

27.6.19

The Other Side of CIS Critical Control 2 - Inventorying *Unwanted* Software

Security

SANS

27.6.19

When it comes to cybersecurity, perfection is the enemy of progress

Cyber

Net-security

27.6.19

Where are organizations stalling with cybersecurity best practices?

Cyber

Net-security

27.6.19

Threat actors are doing their homework, researchers identify new impersonation techniques

Security

Net-security

27.6.19

Anatomy of a ransomware attack: How attackers gain access to unstructured data

Ransomware

Net-security

27.6.19

Organizations need greater visibility into network activity

Security

Net-security

27.6.19

Finding skilled pros remains a challenge, cloud and security in high demand

Security

Net-security

26.6.19

ViceLeaker Operation: mobile espionage targeting Middle East

CyberSpy

Securelist

26.6.19

Platinum is back

APT

Securelist

26.6.19

Malspam campaign spreads LokiBot & NanoCore via ISO image files

Spam

Securityaffairs

26.6.19

Silex malware bricks thousands of IoT devices in a few hours

IoT  Virus

Securityaffairs

26.6.19

AWS Launches Mirroring Feature for Inspecting Network Traffic

Security

Securityweek

26.6.19

'Legit Apps Turned into Spyware' Targeting Android Users in Middle East

Virus

Thehackernews

26.6.19

Microsoft Adds 2FA-Protected "Personal Vault" Within OneDrive Cloud Storage

Security

Thehackernews

26.6.19

Microsoft OneDrive users get an even more secure Personal Vault

Security

Net-security

26.6.19

Google delivers new G Suite security tools

Security

Net-security

26.6.19

Microsoft OneDrive Has 60% Jump in Hosting of Malicious Files

Virus

Bleepingcomputer

26.6.19

Tesco Hacked on Twitter Spoofs Bil l Gates and Pushes BTC Scam

Spam

Bleepingcomputer

26.6.19

Windows 10 USB-C Bug Can Cause OS Shutdowns to be Slower

OS

Bleepingcomputer

26.6.19

Sodinokibi Ransomware Now Pushed by Exploit Kits and Malvertising

Ransomware

Bleepingcomputer

26.6.19

Business Decision Makers Focus on the Wrong Security Issues

Security

Bleepingcomputer

26.6.19

Firefox to Use Windows BITS Service for Background Updates

Security

Bleepingcomputer

26.6.19

Social Engineering Forum Hacked, Data Shared on Leak Sites

Hacking

Bleepingcomputer

26.6.19

BGP Route Leak Causes Cloudflare and Amazon AWS Problems

Security

Bleepingcomputer

26.6.19

Beware of Fake John McAfee and Tesla Cryptocurrency Giveaways

Cryptocurrency

Bleepingcomputer

26.6.19

U.S. Sen. Wyden Asks NIST to Create Secure File Sharing Guide

BigBrothers

Bleepingcomputer

26.6.19

Malspam Emails Blanket LokiBot, NanoCore Malware With ISO Files

Virus

Threatpost

26.6.19

Newly-Discovered Malware Targets Unpatched MacOS Flaw

Apple

Threatpost

26.6.19

SEMrush Plugs Remote Code Execution Bug in Its SaaS Platform

Vulnerebility

Threatpost

26.6.19

Operation Soft Cell – Multiple telco firms hacked by nation-state actor

CyberCrime

Securityaffairs

26.6.19

Senate Report Shows Decade-Long Failure of Gov Agencies to Protect Personal Data

BigBrothers

Securityweek

26.6.19

Instagram Chief Insists It Doesn't Spy on Users

Social

Securityweek

26.6.19

AWS Announces General Availability of Security Hub

Security

Securityweek

26.6.19

Review: Specops uReset

Security

Net-security

26.6.19

Why simplifying cybersecurity is essential for mutual fund boards of directors

Cyber

Net-security

26.6.19

Cybercriminals leverage malicious Office docs, Mac malware, web app exploits

CyberCrime

Net-security

26.6.19

Cloud security exacerbated by immature security practices

Security

Net-security

26.6.19

1 in 10 open source components downloaded in 2018 had a known security vulnerability

Vulnerebility

Net-security

26.6.19

Every year, millions of web domains are registered to defraud businesses

Security

Net-security

25.6.19

OSX/Linker, a new piece of Mac malware that exploits Gatekeeper bypass

Apple

Securityaffairs

25.6.19

Hackers Favoring Shimmers Over Skimmers for ATM Attacks

Attack

Securityweek

25.6.19

Telcos Pwned: Multi-Wave Attacks Stealing 'Obscene Amount of Data' From Providers

Attack

Securityweek

25.6.19

Zebrocy’s Multilanguage Malware Salad

APT

Securelist

25.6.19

Riltok mobile Trojan: A banker with global reach

Virus

Securelist

25.6.19

Anonymous Belgium hacker identified after dropping USB drive while throwing Molotov cocktail

Hacking

Securityaffairs

25.6.19

Iran denies attack against its infrastructure has ever succeeded

Attack

Securityaffairs

25.6.19

ABB Patches Many Vulnerabilities in HMI Products

Vulnerebility

Securityweek

25.6.19

LokiBot and NanoCore Malware Distributed in ISO Image Files

Virus

Securityweek

25.6.19

New Mac Malware Exploits GateKeeper Bypass Bug that Apple Left Unpatched

Apple

Thehackernews

25.6.19

Iran Targeting U.S. With Destructive Wipers, Warns DHS

BigBrothers

Threatpost

25.6.19

Facebook Faces Lawsuit Over Massive 2018 Data Breach

Social

Threatpost

25.6.19

The Modern-Day Heist: IP Theft Techniques That Enable Attackers

Security

Threatpost

25.6.19

SocialEngineered forum hacked and data leaked online

Incindent

Securityaffairs

25.6.19

Microsoft warns of attacks delivering FlawedAmmyy RAT directly in memory

Virus

Securityaffairs

25.6.19

Flaws in Phoenix Contact Automationworx Allow Code Execution via Malicious Files

Vulnerebility

Securityweek

25.6.19

VideoLAN Patches Critical Vulnerability in VLC Media Player

Vulnerebility

Securityweek

25.6.19

Rig Exploit Kit sends Pitou.B Trojan

Exploit

SANS

25.6.19

Why businesses need IAM to push their zero trust frameworks forward

Security

Net-security

25.6.19

Emergency Presidential Alerts can be spoofed, researchers warn

Security

Net-security

25.6.19

You don’t just acquire a company, but also its cybersecurity posture

Security

Net-security

25.6.19

How much risk small businesses really pose to supply chain cybersecurity?

Security

Net-security

25.6.19

Most widely adopted digital solutions? Big data, cloud and CRM

Security

Net-security

24.6.19

Free proxy service runs on top of Linux Ngioweb Botnet

BotNet

Securityaffairs

24.6.19

Flaw in Outlook for Android Allows for Data Theft

Android

Securityweek

24.6.19

Protection Against Side-Channel Attacks Added to OpenSSH

Safety

Securityweek

24.6.19

TrueFort Secures $13.7 Million in Series A Funding

IT

Securityweek

24.6.19

New Attack Delivers FlawedAmmyy RAT Directly in Memory

Virus

Securityweek

24.6.19

Extensive BGP Issues Affecting Cloudflare and possibly others

Safety

SANS

24.6.19

OpenSSH adds protection against Spectre, Meltdown, RAMBleed

Safety

Net-security

24.6.19

Eurofins ransomware attack affected UK police work

Ransomware

Net-security

24.6.19

CVE-2019-10149: “Return of the WiZard” Vulnerability: Crooks Start Hitting

Vulnerebility

Securityaffairs

24.6.19

WeTransfer incident: file transfer emails were sent to unintended email addresses

Security

Securityaffairs

24.6.19

OpenSSH introduces a security feature to prevent Side-Channel Attacks

Attack

Securityaffairs

24.6.19

US DHS CISA warns of Iran-linked hackers using data wipers in cyberattacks

BigBrothers

Securityaffairs

24.6.19

Iran Denies Being Hit by US Cyber Attack

BigBrothers

Securityweek

24.6.19

Mac Malware Delivered via Firefox Exploits Analyzed

Apple

Securityweek

24.6.19

Hundreds of million computers potentially exposed to hack due to a flaw in PC-Doctor component

Vulnerebility

Securityaffairs

24.6.19

Trump secretly ordered cyber attacks against Iran missile systems

BigBrothers

Securityaffairs

24.6.19

NASA hacked! An unauthorized Raspberry Pi connected to its network was the entry point

Hacking

Securityaffairs

24.6.19

Expert released PoC for Outlook for Android flaw addressed by Microsoft

Android

Securityaffairs

24.6.19

WeTransfer Security Incident: File Transfer Emails Sent to Wrong People

Security

Securityweek

24.6.19

Ex-Senate Aide Sentenced to 4 Years in Prison for Data Leak

BigBrothers

Securityweek

24.6.19

U.S. Struck Iranian Military Computers This Week: AP Sources

BigBrothers

Securityweek

24.6.19

How past threats and technical developments influence the evolution of malware

Virus

Net-security

24.6.19

Beating biometrics: Why biometric authentication alone is not a panacea

Security

Net-security

24.6.19

Researchers develop a technique to vaccinate algorithms against adversarial attacks

Attack

Net-security

24.6.19

Which SD-WAN products offer a notable return on investment?

Security

Net-security

24.6.19

Why poor visibility is hampering cybersecurity

Security

Net-security

24.6.19

Only 12% of banks appear to be fully committed to digital transformation

Security

Net-security

23.6.19

U.S. Government Warns of Data Wipers Used in Iranian Cyberattacks

BigBrothers

Bleepingcomputer

23.6.19

TripAdvisor Invalidates Member Passwords Found in Data Breaches

Incindent

Bleepingcomputer

23.6.19

OpenSSH to Keep Private Keys Encrypted at Rest in RAM

Crypto

Bleepingcomputer

23.6.19

Tor Browser 8.5.3 Fixes a Sandbox Escape Vulnerability in Firefox

Vulnerebility

Bleepingcomputer

23.6.19

Windows Terminal Is Here in It's Multi-Tabbed Console Glory

Security

Bleepingcomputer

23.6.19

WeTransfer Security Incident Sent Files to the Wrong People

Security

Bleepingcomputer

23.6.19

Google Says the Address Bar Suggestion Bug is Fixed - Is It?

Vulnerebility

Bleepingcomputer

23.6.19

Steam Phishing Campaign Steals Credentials, Hijacks Accounts

Phishing

Bleepingcomputer

23.6.19

Report: Jet Propulsion Laboratory Hacked for 10 Months

Hacking

Securityweek

23.6.19

U.S. Launched Cyber Attacks on Iran After Drone Shootdown: Reports

BigBrothers

Securityweek

22.6.19

New LooCipher Ransomware Spreads Its Evil Through Spam

Ransomware

Bleepingcomputer

22.6.19

BlueKeep Warnings Pay Off, Boost Patching in Enterprise Networks

Vulnerebility

Bleepingcomputer

22.6.19

Microsoft Warns of Campaign Dropping Flawedammyy RAT in Memory

Virus

Bleepingcomputer

22.6.19

Sodinokibi Ransomware Spreads Wide via Hacked MSPs, Sites, and Spam

Ransomware

Bleepingcomputer

22.6.19

Windows 10 May 2019 Cumulative Updates Break iSCSI SAN Connectivity

Vulnerebility

Bleepingcomputer

22.6.19

Phishing Websites Increase Adoption of HTTPS

Phishing

Bleepingcomputer

22.6.19

Botnet Uses SSH and ADB to Create Android Cryptomining Army

Android  Cryptocurrency

Bleepingcomputer

22.6.19

Windows 10 May Soon Let You Rename Virtual Desktops

OS

Bleepingcomputer

22.6.19

Epic Games Sues YouTuber CBV for Selling Fortnite Cheats

IT

Bleepingcomputer

22.6.19

Desjardins Group Data Leak Exposes Info of 2.9 Million Members

Incindent

Bleepingcomputer

22.6.19

Ransom News

Ransom

Ransom

22.6.19

Android Botnet leverages ADB ports and SSH to spread

Android  BotNet

Securityaffairs

22.6.19

Flaws allow hacking a system playing untrusted videos on VLC Player

Vulnerebility

Securityaffairs

22.6.19

OpenSSH Now Encrypts Secret Keys in Memory Against Side-Channel Attacks

Attack

Thehackernews

22.6.19

Windows 10 Will Now Notify Users When Version 1903 is Blocked

OS

Bleepingcomputer

22.6.19

Mozilla Firefox 67.0.4 Fixes Second Actively Exploited Zero-Day

Vulnerebility

Bleepingcomputer

22.6.19

DanaBot Banking Trojan Upgraded with ‘Non Ransomware’ Module

Ransomware

Bleepingcomputer

22.6.19

Turla Espionage Group Hacks OilRig APT Infrastructure

APT

Bleepingcomputer

22.6.19

Firefox 0-day Used in Targeted Attacks Against Cryptocurrency Firms

Cryptocurrency

Bleepingcomputer

22.6.19

Linux Cryptominer Uses Virtual Machines to Attack Windows, macOS

Cryptocurrency

Bleepingcomputer

22.6.19

The U.S. Loses Over $1.5 Trillion in a Decade of Data Breaches

Incindent

Bleepingcomputer

22.6.19

Samba Vulnerability Can Crash Active Directory Components

Vulnerebility

Bleepingcomputer

22.6.19

New Standalone Cortana Beta App Coming to Windows 10 Insiders

OS

Bleepingcomputer

22.6.19

Tor Browser 8.5.2 Released to Fix Critical Vulnerability

Vulnerebility

Bleepingcomputer

22.6.19

Microsoft Edge Chromium Released for Windows 7, 8, and 8.1

OS

Bleepingcomputer

22.6.19

Windows 10 Insider Build 18922 Released With Updated Feedback Hub

Vulnerebility

Bleepingcomputer

22.6.19

Cryptominer Uses Cron To Reinfect Linux Host After Removal

Cryptocurrency

Bleepingcomputer

22.6.19

Modular Plurox Malware Is a Wormable Backdoor Cryptominer

Cryptocurrency

Bleepingcomputer

22.6.19

Google Pushes Confidential Android Security Update to Pixel User

Android

Bleepingcomputer

22.6.19

Phishing Attack Exposes Data of 645,000 Oregon DHS Clients

Phishing

Bleepingcomputer

22.6.19

New Botnet Exploits Android Debug Bridge and SSH

Android

Securityweek

22.6.19

PoC Released for Outlook Flaw that Microsoft Patched 6 Month After Discovery

Exploit

Thehackernews

22.6.19

Bird Miner, a macOS miner that runs by emulating Linux

Cryptocurrency

Securityaffairs

22.6.19

Credit Union Giant Desjardins suffered a massive data breach

Incindent

Securityaffairs

22.6.19

New Botnet Exploits Android Debug Bridge and SSH

BotNet

Securityweek

22.6.19

Data on Patients Taking Vascepa Prescription Medication Exposed

Incindent

Securityweek

22.6.19

Beware! Playing Untrusted Videos On VLC Player Could Hack Your Computer

Hacking

Thehackernews

21.6.19

CPR-Zero: The Check Point Research Vulnerability Repository

Vulnerebility blog

Checkpoint

21.6.19

DanaBot Demands a Ransom Payment

Ransomware blog

Checkpoint

21.6.19

Microsoft Management Console (MMC) Vulnerabilities

Vulnerebility blog

Checkpoint

21.6.19

Privacy legislation may soon affect smaller businesses

Security blog

Eset

21.6.19

LoudMiner: Cross-platform mining in cracked VST software

Cryptocurrency blog

Eset

21.6.19

You’d better change your birthday – hackers may know your PIN

Security blog

Eset

21.6.19

Instagram tests new ways to recover hacked accounts

Social blog

Eset

21.6.19

Malware sidesteps Google permissions policy with new 2FA bypass technique

Malware blog

Eset

21.6.19

macOS Crypto-Miner Emulates Linux

Cryptocurrency

Securityweek

21.6.19

Millions of Devices Exposed to Attacks Due to Flaw in PC-Doctor Software

Vulnerebility

Securityweek

21.6.19

This Cryptomining Malware Launches Linux VMs On Windows and macOS

Cryptocurrency

Thehackernews

21.6.19

Russia-Linked Turla APT group Hijacked C2 of the Iranian OilRig

APT

Securityaffairs

21.6.19

Massive Data Breach at Canada Credit Union Giant Desjardins

Incindent

Securityweek

21.6.19

UK Regulator Calls Out Compliance Failures in Targeted Advertising Industry

BigBrothers

Securityweek

21.6.19

Phishing Campaign Impersonates DHS Alerts

Phishing

Securityweek

21.6.19

Cloud Data Protection Firm Druva Raises $130 Million

IT

Securityweek

21.6.19

Mozilla Patches Second Firefox Zero-Day Used in Cryptocurrency Attacks

Vulnerebility

Securityweek

21.6.19

Firefox 67.0.4 Released — Mozilla Patches Second 0-Day Flaw This Week

Vulnerebility

Thehackernews

21.6.19

Security Flaw in Pre-Installed Dell Support Software Affects Million of Computers

Vulnerebility

Thehackernews

21.6.19

Millions of Dell PCs Vulnerable to Flaw in Third-Party Component

Vulnerebility

Threatpost

21.6.19

Match, Tinder Swipe Right For Privacy Red Flags, Say Experts

Social

Threatpost

21.6.19

Post-Ransomware Attack, Florida City Pays $600K

Ransomware

Threatpost

21.6.19

Cisco DNA Center Critical Flaw Opens Access to Internal Services

Vulnerebility

Threatpost

21.6.19

LoudMiner Cryptominer Uses Linux Image and Virtual Machines

Cryptocurrency

Threatpost

21.6.19

DanaBot Adds Ransomware to its Arsenal

Ransomware

Threatpost

21.6.19

Tor Browser Issues Update for Critical System Takeover Flaw

Vulnerebility

Threatpost

21.6.19

Feds: Cyberattack on NASA’s JPL Threatened Mission-Control Data

BigBrothers

Threatpost

21.6.19

Dell fixes high-risk vulnerability in pre-installed SupportAssist software

Vulnerebility

Net-security

21.6.19

Microsoft fixed CVE-2019-1105 flaw in Outlook for Android

Android

Securityaffairs

21.6.19

CVE-2019-11707 Firefox Zero-Day exploited to infect employees at cryptocurrency exchanges

Cryptocurrency

Securityaffairs

21.6.19

Google Open-Sources Cryptographic Protocol

Crypto

Securityweek

21.6.19

Important Flaw in Outlook App for Android Affects Over 100 Millions Users

Android

Thehackernews

21.6.19

MongoDB 4.2 Introduces End-to-End Field Level Encryption for Databases

Safety

Thehackernews

21.6.19

Netstat Local and Remote -new and improved, now with more PowerShell!

Virus

SANS

21.6.19

Countering industrial cyberthreats with secure, standards-based, licensed wireless networks

Cyber

Net-security

21.6.19

High-risk vulnerabilities found in 1/3 of iOS apps, nearly half of Android apps

Android

Net-security

21.6.19

Insured losses from a cyber catastrophe could reach billions

Incindent

Net-security

21.6.19

41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025

IoT

Net-security

21.6.19

Webinar: Inside a Docker cryptojacking exploit

Cryptocurrency

Net-security

20.6.19

Not-so-dear subscribers

Security

Securelist

20.6.19

The Riviera Beach City pays $600,000 in ransom

Ransomware

Securityaffairs

20.6.19

Oregon Department of Human Services data breach impacted 645,000 clients

Incindent

Securityaffairs

20.6.19

Russia-Linked Hackers Hijack Infrastructure of Iranian Threat Group

APT

Securityweek

20.6.19

Firefox Zero-Day Exploited to Deliver Malware to Cryptocurrency Exchanges

Cryptocurrency

Securityweek

20.6.19

Indegy Launches Industrial Cybersecurity-as-a-Service Offering

Cyber

Securityweek

20.6.19

Critical Vulnerabilities Patched in Cisco SD-WAN, DNA Center Products

Vulnerebility

Securityweek

20.6.19

MongoDB Introduces Client-Side Field Level Encryption to Aid Compliance

Safety

Securityweek

20.6.19

Senator Asks NIST to Propose Secure Data Sharing Methods

BigBrothers

Securityweek

20.6.19

Tor Browser 8.5.2 Released — Update to Fix Critical Firefox Vulnerability

Vulnerebility

Thehackernews

20.6.19

Using a Travel Packing App for Infosec Purpose

Mobil

SANS

20.6.19

Cisco fixes critical vulnerabilities in its SD-WAN, DNA Center solutions

Vulnerebility

Net-security

20.6.19

Tor Browser 8.5.2 fixes Firefox zero-day. Update it now!

Vulnerebility

Securityaffairs

20.6.19

Bouncing Golf cyberespionage campaign targets Android users in Middle East

Android

Securityaffairs

20.6.19

Florida City Pays $600,000 Ransom to Save Computer Records

Ransomware

Securityweek

20.6.19

Are Artificial Intelligence and Machine Learning Just a Temporary Advantage to Defenders?

Security

Securityweek

20.6.19

Cyberespionage Campaign Targets Android Users in Middle East

CyberSpy

Securityweek

20.6.19

New Critical Oracle WebLogic Flaw Under Active Attack — Patch Now

Vulnerebility

Thehackernews

20.6.19

Hackers Disguise New JavaScript-Based Trojan as Game Cheat

Virus

Bleepingcomputer

20.6.19

Microsoft Edge Group Policies Preview Released for Testing

OS

Bleepingcomputer

20.6.19

Microsoft Prepares to Autoupdate Windows 10 v1803 and Earlier Devices

Vulnerebility

Bleepingcomputer

20.6.19

Oracle Fixes Critical Bug in WebLogic Server Web Services

Vulnerebility

Bleepingcomputer

20.6.19

Ryuk Ransomware Adds IP and Computer Name Blacklisting

Ransomware

Bleepingcomputer

20.6.19

Microsoft Releases Windows 10 Update to Fix Privacy Settings Bug

Vulnerebility

Bleepingcomputer

20.6.19

Windows 10 1809 Cumulative Update KB4501371 Released With Fixes

Vulnerebility

Bleepingcomputer

20.6.19

Mozilla Firefox 67.0.3 Patches Actively Exploited Zero-Day

Vulnerebility

Bleepingcomputer

20.6.19

Open Source Clones Unofficially Sold on the Microsoft Store

Security

Bleepingcomputer

20.6.19

Google Adds Deceptive URL Alerts To Chrome, Unsafe URL Report Add-on

Security

Bleepingcomputer

20.6.19

Microsoft Azure Bastion Preview: Remote VM Access via Azure Portal

Security

Bleepingcomputer

20.6.19

Threat Actors Use Older Cobalt Strike Versions to Blend In

Cyber

Bleepingcomputer

20.6.19

Hacker Steals Customer Payment Info in EatStreet Data Breach

Incindent

Bleepingcomputer

20.6.19

Docker Desktop for Windows 10 Will Soon Switch to WSL 2

Security

Bleepingcomputer

20.6.19

Accidental Cat Filter Makes Politician's Live Stream Hilarious

Security

Bleepingcomputer

20.6.19

Multiple Linux and FreeBSD DoS Vulnerabilities Found by Netflix

Vulnerebility

Bleepingcomputer

20.6.19

How To Secure Your Network: Five Modern Alternatives to VPN

Security

Bleepingcomputer

20.6.19

Android Malware Bypasses 2FA by Stealing One-Time Passwords

Android

Bleepingcomputer

20.6.19

U.S. Govt Achieves BlueKeep Remote Code Execution, Issues Alert

BigBrothers

Bleepingcomputer

20.6.19

Samsung's Smart TV Malware Scan Reminder Met by User Criticism

Virus

Bleepingcomputer

20.6.19

IoT explodes worldwide, researchers investigate security issues present in the devices real users own

IoT

Net-security

20.6.19

How to add security to digital transformation processes

Security

Net-security

20.6.19

Botnets shift from Windows towards Linux and IoT platforms

BotNet  IoT

Net-security

20.6.19

How can organizations leverage AI technologies to achieve project success?

Security

Net-security

19.6.19

AMCA files for bankruptcy following the recently disclosed security breach

Incindent

Securityaffairs

19.6.19

Another Remote Code Execution flaw in WebLogic exploited in the wild

Vulnerebility

Securityaffairs

19.6.19

Mozilla fixed a Firefox Zero-Day flaw exploited in targeted attacks

Vulnerebility

Securityaffairs

19.6.19

Eatstreet, the online food ordering service disclosed a security breach

Incindent

Securityaffairs

19.6.19

Cloud Security Firm Valtix Emerges From Stealth With $14 Million in Funding

IT

Securityweek

19.6.19

Google Boosts Chrome Protection Against Deceptive Sites

Security

Securityweek

19.6.19

645,000 Clients Affected in Oregon Department of Human Services Data Breach

Incindent

Securityweek

19.6.19

Facebook's Currency Libra Faces Financial, Privacy Pushback

Social

Securityweek

19.6.19

Accenture Acquires Research and Consulting Firm Deja vu Security

Security

Securityweek

19.6.19

AMCA Files for Bankruptcy Following Data Breach

Incindent

Securityweek

19.6.19

Oracle Patches Another Remote Code Execution Flaw in WebLogic

Vulnerebility

Securityweek

19.6.19

Firefox Zero-Day Vulnerability Exploited in Targeted Attacks

Exploit

Securityweek

19.6.19

Cloudflare Joins the League of Entropy

Security

Securityweek

19.6.19

Linux Kernel Bug Knocks PCs, IoT Gadgets and More Offline

Vulnerebility

Threatpost

19.6.19

Mozilla Patches Firefox Critical Flaw Under Active Attack

Vulnerebility

Threatpost

19.6.19

Microsoft Management Console Bugs Allow Windows Takeover

Vulnerebility

Threatpost

19.6.19

Consumers Urged to Junk Insecure IoT Devices

IoT

Threatpost

19.6.19

Oracle Warns of New Actively-Exploited WebLogic Flaw

Exploit

Threatpost

19.6.19

Working BlueKeep Exploit Developed by DHS

BigBrothers

Threatpost

19.6.19

What You Need To Know About TCP "SACK Panic"

Security

SANS

19.6.19

Download: eSentire Q1 2019 Quarterly Threat Report

Analysis

Net-security

19.6.19

Google launches Chrome extension for reporting suspicious sites

Security

Net-security

19.6.19

Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks

Attack

Net-security

19.6.19

Mozilla plugs critical Firefox zero-day used in targeted attacks

Attack

Net-security

19.6.19

Another Oracle WebLogic Server RCE under active exploitation

Exploit

Net-security

19.6.19

Plurox: Modular backdoor

Virus

Securelist

19.6.19

Modular Plurox backdoor can spread over local network

Virus

Securityaffairs

19.6.19

Yana Peel, chief executive of London’s Galleries, resigned after discovery of her links with NSO group

Virus

Securityaffairs

19.6.19

Firefox Zero-Day Vulnerability Exploited in Targeted Attacks

Attack

Securityaffairs

19.6.19

France Seeks Hacker for Trial Over Death Following Prank

BigBrothers

Securityweek

19.6.19

New Variant of the Houdini Worm Emerges

Virus

Securityweek

19.6.19

London Gallery Chief Quits After Israel Spyware Report

Virus

Securityweek

19.6.19

Free Cloudflare Tool Helps CAs Securely Issue Certificates

Security

Securityweek

19.6.19

Firefox Releases Critical Patch Update to Stop Ongoing Zero-Day Attacks

Attack

Thehackernews

19.6.19

Regulation readiness: Embracing the privacy legislation wave ahead

Privacy

Net-security

19.6.19

Executives now recognize cybersecurity as a key business driver

Cyber

Net-security

19.6.19

Slack + Snapchat = AppSec? Breaking down the complexity of messaging apps

Security

Net-security

19.6.19

Insecure password memory aids: A passwordless future could be the solution

Security

Net-security

19.6.19

Organizations more likely to accelerate business when protecting their cloud data

Security

Net-security

19.6.19

GSMA disproves false claims 5G systems will harm other services

Mobil

Net-security

18.6.19

Android Apps uses a novel technique to by-pass 2FA and steal Bitcoin

Android

Securityaffairs

18.6.19

Expert found a critical RCE zero-day in TP-Link Wi-Fi Extenders

Vulnerebility

Securityaffairs

18.6.19

Researcher leaked a dataset of over 7,000,000 transactions scraped from the Venmo public API

Incindent

Securityaffairs

18.6.19

DHS also issued an alert for the Windows BlueKeep flaw

BigBrothers

Securityaffairs

18.6.19

Multiple DoS vulnerabilities affect Linux and FreeBSD

Vulnerebility

Securityaffairs

18.6.19

Modular Backdoor Can Spread Over Local Network

Virus

Securityweek

18.6.19

Critical Flaw Exposes TP-Link Wi-Fi Extenders to Remote Attacks

Vulnerebility

Securityweek

18.6.19

Aptible Raises $12 Million to Launch Compliance Platform

IT

Securityweek

18.6.19

Russia Says Victim of US Cyberattacks 'for Years'

BigBrothers

Securityweek

18.6.19

Facebook Open Sources CTF 2019 Challenges

Social

Securityweek

18.6.19

Serious Vulnerabilities in Linux Kernel Allow Remote DoS Attacks

Vulnerebility

Securityweek

18.6.19

SACK TCP flaws can crash, slow down Linux-based systems

Vulnerebility

Net-security

18.6.19

Vulnerable TP-Link Wi-Fi extenders open to attack, patch now!

Vulnerebility

Net-security

18.6.19

AA19-168A : Microsoft Operating Systems BlueKeep Vulnerability

CERT

CERT

18.6.19

A free Decryptor tool for GandCrab Ransomware released

Ransomware

Securityaffairs

18.6.19

Florida Effort to Block Election Hacking Gets Extra $2M

Hacking

Securityweek

18.6.19

Mirai Offspring "Echobot" Uses 26 Different Exploits

Exploit

Securityweek

18.6.19

Android Apps Target Bitcoin, By-Passing 2FA

Android

Securityweek

18.6.19

Researcher Scrapes and Posts 7 Million Venmo Transactions

Security

Securityweek

18.6.19

DHS Issues Alert for Windows 'BlueKeep' Vulnerability

Vulnerebility

Securityweek

18.6.19

Microsoft Pushes Azure Users to Patch Linux Systems

Vulnerebility

Threatpost

18.6.19

Irked Researcher Discloses Facebook WordPress Plugin Flaws

Social

Threatpost

18.6.19

5,000 Twitter Accounts Linked to Disinformation Campaigns

Social

Threatpost

18.6.19

A Spate of University Breaches Highlight Email Threats in Higher Ed

Incindent

Threatpost

18.6.19

Malspam with password-protected Word docs pushing Dridex

Spam

SANS

18.6.19

Why phishing education has never been more critical to your business

Phishing

Net-security

18.6.19

One year of GDPR application: Europeans well aware of their digital rights

Privacy

Net-security

18.6.19

Researchers develop app to detect Twitter bots in any language

Social

Net-security

18.6.19

How employees and their organizations are prioritizing data privacy

Privacy

Net-security

18.6.19

Economic cycles and disruption are where top CFOs set their firms apart from the competition

Security

Net-security

17.6.19

NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid

Virus

Securityaffairs

17.6.19

New phishing campaign targets bank customers with WSH RAT

Phishing

Securityaffairs

17.6.19

From Targeted Attack to Untargeted Attack

Attack

Securityaffairs

17.6.19

Decryptor Released for Latest GandCrab Ransomware Variants

Ransomware

Securityweek

17.6.19

Push Technology Used in Mobile Attacks

Mobil

Securityweek

17.6.19

Federal Agencies Still Using Knowledge-Based Identity Verification

BigBrothers

Securityweek

17.6.19

U.S. Planted Powerful Malware in Russia's Power Grid: Report

Virus

Securityweek

17.6.19

Hackers Target Recent Vulnerability in Exim Mail Server

Vulnerebility

Securityweek

17.6.19

Release of GandCrab 5.2 Decryptor Ends a Bad Ransomware Story

Ransomware

Bleepingcomputer

17.6.19

Microsoft Warns about Worm Attacking Exim Servers on Azure

Attack

Bleepingcomputer

17.6.19

Phishing Scam Asks You to Login to Read Encrypted Message

Phishing

Bleepingcomputer

17.6.19

Bella Thorne Tweets Her Nude Photos After Threats From Hacker

Hacking

Bleepingcomputer

17.6.19

Windows 10: The Upcoming Features and Improvements in 20H1

OS

Bleepingcomputer

17.6.19

Google Chrome Canary Flag Makes The Browser a Colorful Mess

Security

Bleepingcomputer

17.6.19

Three U.S. Universities Disclose Data Breaches Over Two-Day Span

Incindent

Bleepingcomputer

17.6.19

Web-based DNA sequencers getting compromised through old, unpatched flaw

Vulnerebility

Net-security

17.6.19

Hacker is targeting DNA sequencer applications from Iranian IP address

Hacking

Securityaffairs

17.6.19

Bella Thorne published her private nude photos before a hacker that was threatening her

Security

Securityaffairs

17.6.19

New Echobot Botnet targets Oracle, VMware Apps and includes 26 Exploits

BotNet

Securityaffairs

17.6.19

Linux worm spreading via Exim servers hit Azure customers

Virus

Securityaffairs

17.6.19

An infection from Rig exploit kit

Exploit

SANS

17.6.19

What does runtime container security really mean?

Security

Net-security

17.6.19

Are U.S. companies overpaying to attract new talent?

Security

Net-security

17.6.19

Appliance upgrades and excessive network latency delaying Office 365 deployments

Security

Net-security

17.6.19

New EU-funded project aims to disrupt wildlife cybercrime

CyberCrime

Net-security

17.6.19

Human error still the cause of many data breaches

Incindent

Net-security

17.6.19

Worldwide IoT spending forecast to reach $726 billion this year

IoT

Net-security

16.6.19

PYLOCKY DECRYPTOR

Anti-Ransom Tool

Anti-Ransom Tool

16.6.19

New Android Trojan Leads Users to Scam Sites via Notifications

Android

Bleepingcomputer

16.6.19

New WSH RAT Malware Targets Bank Customers with Keyloggers

Virus

Bleepingcomputer

16.6.19

Echobot Botnet Spreads via 26 Exploits, Targets Oracle, VMware Apps

BotNet

Bleepingcomputer

16.6.19

Exposed Docker APIs Abused by DDoS, Cryptojacking Botnet Malware

Cryptocurrency

Bleepingcomputer

16.6.19

AVG Password Protection Blocked Firefox's Access to Saved Passwords

Safety

Bleepingcomputer

16.6.19

Chrome 76 Beta Allows Sites to Use Your OS Dark Mode Settings

OS

Bleepingcomputer

16.6.19

Hackers Infect Businesses with CryptoMiners Using NSA Leaked Tools

Cryptocurrency

Bleepingcomputer

16.6.19

Twitter URLs Can Be Manipulated to Spread Fake News and Scams

Social

Bleepingcomputer

16.6.19

pyLocky Decryptor Released by French Authorities

Ransomware

Bleepingcomputer

16.6.19

Critical Bug in Infusion System Allows Changing Drug Dose in Medical Pumps

Vulnerebility

Bleepingcomputer

16.6.19

Millions of Exim Mail Servers Are Currently Being Attacked

Attack

Bleepingcomputer

16.6.19

Some YubiKey FIPS Keys Allow Attackers to Reconstruct Private Keys

Attack

Bleepingcomputer

16.6.19

Cisco IOS XE Software Receives Fix Against High-Severity Flaw

Vulnerebility

Bleepingcomputer

16.6.19

Windows Subsystem for Linux 2 (WSL 2) Released to Insiders

OS

Bleepingcomputer

16.6.19

Ramson News

Ransom

Ransom

16.6.19

XSS flaw would have allowed hackers access to Google’s network and impersonate its employees

Hacking

Securityaffairs

16.6.19

Crooks exploit exposed Docker APIs to build AESDDoS botnet

BotNet

Securityaffairs

15.6.19

Application Protection Report 2019, Episode 3: Web

Security blog

F5 Labs

15.6.19

Injection Attacks Get Meaner

Hacking blog

F5 Labs

15.6.19

What Are Security Controls?

Security blog

F5 Labs

15.6.19

What To Do When Your Company Tells You They're Making a Mobile App, Part 2

Security blog

F5 Labs

15.6.19

What To Do When Your Company Tells You They're Making a Mobile App, Part 1

Security blog

F5 Labs

15.6.19

Welcome to CISO to CISO 2.0

Security blog

F5 Labs

15.6.19

What is a DDoS Attack?

Attack blog

F5 Labs

15.6.19

Permission to Intrude: Hiring Hackers to Bolster Cyber Defenses

Cyber blog

F5 Labs

15.6.19

Regional Threat Perspectives: Canada

Cyber blog

F5 Labs

15.6.19

Shifting to DevSecOps Is as Much About Culture as Technology and Methodology

Security blog

F5 Labs

15.6.19

4 Areas Where Infosec Facts and Fiction Clash: Mind the Gap Pt. 3

Security blog

F5 Labs

15.6.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in April 2019

Security blog

F5 Labs

15.6.19

Putting Application Threat Intelligence Into Action

Security blog

F5 Labs

15.6.19

Regional Threat Perspectives: United States

Cyber blog

F5 Labs

15.6.19

Gozi Banking Trojan Pivots Towards Italian Banks in February and March

Malware blog

F5 Labs

15.6.19

Denial of Service Vulnerabilities Discovered in HTTP/2

Vulnerebility blog

F5 Labs

15.6.19

Hunting COM Objects (Part Two)

Security blog

FireEye

15.6.19

Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities

Vulnerebility blog

FireEye

15.6.19

Hunting COM Objects

Security blog

FireEye

15.6.19

Framing the Problem: Cyber Threats and Elections

Cyber blog

FireEye

15.6.19

Learning to Rank Strings Output for Speedier Malware Analysis

Malware blog

FireEye

15.6.19

Network of Social Media Accounts Impersonates U.S. Political Candidates, Leverages U.S. and Israeli Media in Support of Iranian Interests

Social blog

FireEye

15.6.19

Twitterbots: Anatomy of a Propaganda Campaign

Social blog

Symantec

15.6.19

Microsoft Patch Tuesday — June 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

15.6.19

How Cisco Talos helped Howard County recover from a call center attack

Attack blog

Cisco Talos

15.6.19

Vulnerability Spotlight: Multiple vulnerabilities in Schneider Electric Modicon M580

Vulnerebility blog

Cisco Talos

15.6.19

It's alive: Threat actors cobble together open-source pieces into monstrous Frankenstein campaign

Cyber blog

Cisco Talos

15.6.19

Using Firepower to defend against encrypted RDP attacks like BlueKeep

Attack blog

Cisco Talos

15.6.19

10 years of virtual dynamite: A high-level retrospective of ATM malware

Malware blog

Cisco Talos

15.6.19

GDPR one year on: Most Europeans know at least some of their rights

Security blog

Eset

15.6.19

Spain’s top soccer league fined over its app’s ‘tactics’

Security blog

Eset

15.6.19

We Decide What You See: Remote Code Execution on a Major IPTV Platform

Vulnerebility blog

Checkpoint

15.6.19

French Authorities Release Free Decryptor for PyLocky Ransomware

Ransomware

Securityweek

15.6.19

Vulnerabilities Expose BD Infusion Therapy Devices to Attacks

Vulnerebility

Securityweek

15.6.19

Vulnerabilities in Thunderbird Email Client Allow Code Execution

Vulnerebility

Securityweek

15.6.19

Canadian City Loses $500,000 to Phishing Attack

Phishing

Securityweek

15.6.19

Hackers Behind 'Triton' Malware Target Electric Utilities in US, APAC

Virus

Securityweek

15.6.19

New API Changes How Ad Blockers Work in Chrome

Security

Securityweek

15.6.19

Amid Privacy Firestorm, Facebook Curbs Research Tool

Social

Securityweek

15.6.19

Ransomware: A Persistent Scourge Requiring Corporate Action Now

Ransomware

Threatpost

15.6.19

ThreatList: Ransomware Trojans Picking Up Steam in 2019

Ransomware

Threatpost

15.6.19

News Wrap: Amazon Privacy and Telegram DDoS Attack

Social

Threatpost

15.6.19

TRISIS Group, Known for Physical Destruction, Targets U.S. Electric Companies

BigBrothers

Threatpost

15.6.19

Xenotime threat actor now is targeting Electric Utilities in US and APAC

Security

Securityaffairs

14.6.19

Mozilla addressed flaws in Thunderbird that allow code execution

Vulnerebility

Securityaffairs

14.6.19

French authorities released the PyLocky decryptor for versions 1 and 2

Ransomware

Securityaffairs

14.6.19

Dissecting NanoCore Crimeware Attack Chain

Attack

Securityaffairs

14.6.19

High-Severity Cisco Flaw in IOS XE Enables Device Takeover

Vulnerebility

Threatpost

14.6.19

Telegram CEO Fingers China State Actors for DDoS Attack

Attack

Threatpost

14.6.19

Hackers Favor Weekdays for Attacks, Share Resources Often

Attack

Threatpost

14.6.19

Evernote Critical Flaw Opened Personal Data of Millions to Attack

Vulnerebility

Threatpost

14.6.19

Max-Severity Bug in Infusion Pump Gateway Puts Lives at Risk

Vulnerebility

Threatpost

14.6.19

Linux servers under attack via latest Exim flaw

Vulnerebility

Net-security

14.6.19

Vulnerabilities allow attackers to take over infusion pumps

Vulnerebility

Net-security

14.6.19

Windows 10 Insider Build 18917 Tests New Download Throttling Settings

OS

Bleepingcomputer

14.6.19

DDoS Attack on Telegram Messenger Leaves Users Hanging

Attack

Bleepingcomputer

14.6.19

Microsoft 365 Business Adds Granular Controls to Company Assets

IT

Bleepingcomputer

14.6.19

Windows 10 v1903, v1809 Updates Break Event Viewer Custom Views

Vulnerebility

Bleepingcomputer

14.6.19

Android’s Security Key Now Verifies Sign-Ins on iOS Devices

Android

Bleepingcomputer

14.6.19

Critical Flaw in Evernote Add-On Exposed Sensitive Data of Millions

Vulnerebility

Bleepingcomputer

14.6.19

Windows 10 v1903 Upgrade Blocked by USB Drives Partially Fixed

Vulnerebility

Bleepingcomputer

14.6.19

Intel Updates NUC BIOS, Raid Soft To Patch High Severity Bugs

Vulnerebility

Bleepingcomputer

14.6.19

Microsoft Releases Sysmon 10 With DNS Query Logging Feature

Vulnerebility

Bleepingcomputer

14.6.19

Bad Cert Vulnerability Can Bring Down Any Windows Server

Vulnerebility

Bleepingcomputer

14.6.19

MyBB Forum Patches Vulnerabilities That Allow Site Takeover

Vulnerebility

Bleepingcomputer

14.6.19

Apple’s New Windows 10 iCloud App Now Available in MS Store

Apple

Bleepingcomputer

14.6.19

The Official ISOs for Windows 10 20H1 Now Available

OS

Bleepingcomputer

14.6.19

Windows 10 April 2018 Update Support Ending in November 2019

Vulnerebility

Bleepingcomputer

14.6.19

Yubico is replacing for free YubiKey FIPS devices due to security weakness

Hacking

Securityaffairs

14.6.19

Millions of Exim mail servers are currently under attack

Attack

Securityaffairs

14.6.19

WAGO Industrial Switches affected by multiple flaws

ICS

Securityaffairs

14.6.19

Ransomware paralyzed production for at least a week at ASCO factories

Ransomware

Securityaffairs

14.6.19

Yubico Replacing YubiKey FIPS Devices Due to Security Issue

Virus

Securityweek

14.6.19

New Malware Lays P2P Network on Top of IPFS’

Virus

Securityweek

14.6.19

The Active Cyber Defense Bill is Back on the Table

Cyber

Securityweek

14.6.19

Surveillance-Savvy Hong Kong Protesters Go Digitally Dark

BigBrothers

Securityweek

14.6.19

Aircraft Parts Maker ASCO Severely Hit by Ransomware

Ransomware

Securityweek

14.6.19

Android’s Security Key Now Works with iOS Devices

Android

Securityweek

14.6.19

Critical Vulnerabilities Found in WAGO Industrial Switches

Vulnerebility

Securityweek

14.6.19

XSS Vulnerability Exposed Google Employees to Attacks

Vulnerebility

Securityweek

14.6.19

Blockchain Security Startup Fireblocks Emerges From Stealth With $16 Million in Funding

Cryptocurrency

Securityweek

14.6.19

Critical Flaw Reported in Popular Evernote Extension for Chrome Users

Vulnerebility

Thehackernews

14.6.19

Telegram Suffers 'Powerful DDoS Attack' From China During Hong Kong Protests

Attack

Thehackernews

14.6.19

A few Ghidra tips for IDA users, part 4 - function call graphs

Security

SANS

14.6.19

Organizations are advancing their efforts, investing in OT cybersecurity programs

Cyber

Net-security

14.6.19

Organizations need capabilities and practices to generate value from AI

Security

Net-security

14.6.19

The gaming community is a rising target for credential stuffing attacks

Attack

Net-security

14.6.19

5G subscriptions to reach 1.9 billion in 2024, critical IoT connections on the rise

IoT

Net-security

14.6.19

Significant trends are beginning to develop in the Government ID market

BigBrothers

Net-security

13.6.19

Microsoft Releases June 2019 Office Updates With Security Fixes

Vulnerebility

Bleepingcomputer

13.6.19

Microsoft Releases Windows 7 & 8.1 Cumulative Updates KB4503292 & KB4503276

Vulnerebility

Bleepingcomputer

13.6.19

Windows 10 June 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

13.6.19

VIP WordPress Sites Currently Experiencing Availability Issues

Security

Bleepingcomputer

13.6.19

Microsoft's June 2019 Patch Tuesday Fixes 88 Vulnerabilities

Vulnerebility

Bleepingcomputer

13.6.19

Microsoft Blocks Some Bluetooth Devices Due to Security Risks

Security

Bleepingcomputer

13.6.19

Microsoft NTLM Flaws Expose All Windows Machines to RCE Attacks

Attack

Bleepingcomputer

13.6.19

RAMBleed Attack Can Steal Sensitive Data From Computer Memory

Attack

Bleepingcomputer

13.6.19

Adobe Releases Security Updates for Flash Player, ColdFusion, and Campaign

Vulnerebility

Bleepingcomputer

13.6.19

Radiohead Releases OK Computer Sessions After Hack, Won't Pay Ransom

Ransomware

Bleepingcomputer

13.6.19

Mozilla Makes Firefox its Own Brand Name, Releases New Logos

Security

Bleepingcomputer

13.6.19

Finding Windows Systems Affected by BlueKeep Remote Desktop Bug

Vulnerebility

Bleepingcomputer

13.6.19

Food Bank Hit By Ransomware, Needs Your Charity to Rebuild

Ransomware

Bleepingcomputer

13.6.19

WordPress Chat Plugin Bug Lets Hackers Inject Text, Steal Logs

Incindent

Bleepingcomputer

13.6.19

New Spam Campaign Controlled by Attackers via DNS TXT Records

Spam

Bleepingcomputer

13.6.19

Microsoft is Bringing Predictive Typing to All Windows 10 Apps

OS

Bleepingcomputer

13.6.19

FBI Issues Warning on ‘Secure’ Websites Used For Phishing

BigBrothers

Bleepingcomputer

13.6.19

'jesushelpme' Password Sums Up CyberSec Agency Security State

BigBrothers

Bleepingcomputer

13.6.19

MuddyWater Updates POWERSTATS Backdoor For Multi-Stage Attacks

APT

Bleepingcomputer

13.6.19

Gaming Site Emuparadise Suffered Data Breach of 1.1M Accounts

Incindent

Bleepingcomputer

13.6.19

RAMBleed Side-Channel Attack Exposes Privileged Memory

Attack

Threatpost

13.6.19

Linux Command-Line Editors Vulnerable to High-Severity Bug

Vulnerebility

Threatpost

13.6.19

New FormBook Dropper Harbors Obfuscation, Persistence

Security

Threatpost

13.6.19

Intel NUC Firmware Open to Privilege Escalation, DoS and Information Disclosure

Vulnerebility

Threatpost

13.6.19

Fishwrap Campaign Sways Social Media Users with Old News

Social

Threatpost

13.6.19

Data Breach Disclosed by Online Invitation Firm Evite

Incindent

Threatpost

13.6.19

Microsoft Patches Four Publicly-Known Vulnerabilities

Vulnerebility

Threatpost

13.6.19

Google Calendar Attacks Target Unwitting Mobile Users

Attack

Threatpost

13.6.19

Near-Ubiquitous Microsoft RCE Bugs Affect All Versions of Windows

Vulnerebility

Threatpost

13.6.19

Critical Adobe Flash, ColdFusion Vulnerabilities Patched

Vulnerebility

Threatpost

13.6.19

Troy Hunt Looks to Sell Have I Been Pwned

Incindent

Threatpost

13.6.19

Data Breach Exposes 100K U.S. Traveler Photos, License Plates

Incindent

Threatpost

13.6.19

Ransomware disrupts worldwide production for Belgian aircraft parts maker

Ransomware

Net-security

13.6.19

Evernote Chrome extension flaw could have allowed access to personal info

Vulnerebility

Net-security

13.6.19

Android's Built-in Security Key Now Works With iOS Devices For Secure Login

Android

Thehackernews

13.6.19

Massive DDos attack hit Telegram, company says most of junk traffic is from China

Attack

Securityaffairs

13.6.19

Flaw in Evernote Web Clipper for Chrome extension allows stealing data

Vulnerebility

Securityaffairs

13.6.19

Google expert disclosed details of an unpatched flaw in SymCrypt library

Vulnerebility

Securityaffairs

13.6.19

Majority of FTSE 250 Companies Expose Multiple Weaknesses to Internet: Analysis

Analysis

Securityweek

13.6.19

Cloud Visibility Firm Orca Security Emerges From Stealth Mode

Security

Securityweek

13.6.19

Senators Question FBI on Russian Hack of Voting Firm

BigBrothers

Securityweek

13.6.19

Telegram Hit by Cyber-attack, CEO Points to HK Protests, China

BigBrothers

Securityweek

13.6.19

What is "THAT" Address Doing on my Network

Security

SANS

13.6.19

GDPR implementation lessons can help with CCPA compliance

Privacy

Net-security

13.6.19

CISO do’s and don’ts for board reporting

Security

Net-security

13.6.19

Healthcare executives need to make cybersecurity a business priority

Security

Net-security

13.6.19

Code signing keys and certificates are crucial security assets, are you protecting them?

Security

Net-security

13.6.19

Personal security and national security concerns are back on the rise

Security

Net-security

13.6.19

Smart home security devices most at risk in IoT-targeted cyber attacks

IoT

Net-security

13.6.19

Whitepaper: Maturing a Threat Intelligence Program

Security

Net-security

12.6.19

Why cybercriminals are eyeing smart buildings

Cyber blog

Eset

12.6.19

Cyberattack exposes travelers’ photos, says US border agency

BigBrother blog

Eset

12.6.19

Critical bug found in popular mail server software

Vulnerebility blog

Eset

12.6.19

NSA joins chorus urging Windows users to patch ‘BlueKeep’

BigBrother blog

Eset

12.6.19

Wajam: From start-up to massively-spread adware

Malware blog

Eset

12.6.19

Hackers steal 19 years’ worth of data from a top Australian university

Incident blog

Eset

12.6.19

Over 2.3 billion files exposed online

Incident blog

Eset

12.6.19

The aftermath of a data breach: A personal story

Incident blog

Eset

12.6.19

A dive into Turla PowerShell usage

Malware blog

Eset

12.6.19

Microsoft Patches Critical Vulnerabilities in NTLM

Vulnerebility

Securityweek

12.6.19

Email Security Firm Vade Secure Raises $80 Million

IT

Securityweek

12.6.19

Awareness Training Firm CybeReady Opens U.S. Office With $5 Million Funding

IT

Securityweek

12.6.19

Flaw in Evernote Extension Allows Hackers to Steal Data

Vulnerebility

Securityweek

12.6.19

Security Awareness Training Firm KnowBe4 Raises $300 Million

IT

Securityweek

12.6.19

Malware Can Be Hidden in DICOM Medical Imaging Files, DHS Warns

Virus

Securityweek

12.6.19

Organizations Investing More in ICS Cyber Security: SANS Study

ICS

Securityweek

12.6.19

Microsoft Patches Privilege Escalation Flaws Disclosed by 'SandboxEscaper'

Vulnerebility

Securityweek

12.6.19

Facebook Launching App That Pays Users for Data on App Usage

Social

Securityweek

12.6.19

Radiohead Defies Hackers, Releases Trove of Stolen Music

Hacking

Securityweek

12.6.19

New RAMBleed Attack Allows Access to Sensitive Data in Memory

Attack

Securityweek

12.6.19

Microsegmentation Firm Edgewise Networks Raises $11 Million

IT

Securityweek

12.6.19

New Version of ShellTea Backdoor Used by FIN8 Hacking Group

Virus

Securityweek

12.6.19

RAMBleed attack

Papers

Papers

12.6.19

DDoS attacks in Q1 2019

Attack

Securelist

12.6.19

What kids get up to online

Security

Securelist

12.6.19

FIN8 Hacking Group is back with an improved version of the ShellTea Backdoor

CyberCrime

Securityaffairs

12.6.19

Radiohead releases a trove of stolen music in response to the hack

Hacking

Securityaffairs

12.6.19

RAMBleed, a new Side-Channel Attack that allows stealing sensitive data

Attack

Securityaffairs

12.6.19

Microsoft Patch Tuesday security updates for June 2019 fix 88 flaws

Vulnerebility

Securityaffairs

12.6.19

Adobe Patch Tuesday updates fix code execution issues in Campaign, ColdFusion, and Flash

Vulnerebility

Securityaffairs

12.6.19

Vulnerability in WordPress Live Chat Plugin allows to steal and hijack sessions

Vulnerebility

Securityaffairs

12.6.19

RAMBleed Attack – Flip Bits to Steal Sensitive Data from Computer Memory

Attack

Thehackernews

12.6.19

Microsoft Releases June 2019 Security Updates to Patch 88 Vulnerabilities

Vulnerebility

Thehackernews

12.6.19

The Cynet Free Visibility experience: Unmatched insight into IT assets and activities

Security

Net-security

12.6.19

Researchers devise RAMBleed attack to grab secret data from memory

Attack

Net-security

12.6.19

June 2019 Patch Tuesday: A little something for everybody

Vulnerebility

Net-security

12.6.19

First framework to score the agility of cyber attackers and defenders

Cyber

Net-security

12.6.19

MSFT June 2019 Patch Tuesday

Vulnerebility

SANS

12.6.19

Will self-driving cars represent a new mode for surveillance?

Security

Net-security

12.6.19

3.4 billion fake emails are sent around the world every day

Spam

Net-security

12.6.19

Vendor revenue in the worldwide server market increased to $19.8 billion in Q1 2019

IT

Net-security

12.6.19

Critical Microsoft NTLM vulnerabilities allow remote code execution on any Windows machine

Vulnerebility

Net-security

12.6.19

US border agency contractor breached, license plate and travelers’ photos stolen

BigBrothers

Net-security

11.6.19

Customs and Border Protection (CBP) confirms hack of a subcontractor

BigBrothers

Securityaffairs

11.6.19

How Ursnif Evolves to Keep Threatening Italy

Virus

Securityaffairs

11.6.19

FBI Warns of HTTPS Abuse in Phishing Campaigns

Phishing

Securityweek

11.6.19

Microsoft Pushing for a Passwordless Windows 10

OS

Securityweek

11.6.19

Adobe Patches Code Execution Flaws in Flash, ColdFusion, Campaign

Vulnerebility

Securityweek

11.6.19

Tool Links Internet-Exposed ICS to Google Street View

ICS

Securityweek

11.6.19

Artificial Intelligence Threat Detection Firm Vectra Raises $100 Million

Security

Securityweek

11.6.19

Critical Vulnerability Exposes Oil Tank Monitoring Devices to Attacks

Vulnerebility

Securityweek

11.6.19

Adobe Issues Critical Patches for ColdFusion, Flash Player, Campaign Software

Vulnerebility

Thehackernews

11.6.19

New Flaw in WordPress Live Chat Plugin Lets Hackers Steal and Hijack Sessions

Vulnerebility

Thehackernews

11.6.19

VLC Player Gets Patched for Two High-Severity Bugs

Vulnerebility

Threatpost

11.6.19

Mozilla Confirms Premium Firefox Browser With Security Features

Security

Threatpost

11.6.19

WordPress Sites Worldwide Hit with ‘Call-Girl’ Search-Engine Pollution

Security

Threatpost

11.6.19

How to Model Risk in an Apex Predator Cyber-World

Cyber

Threatpost

11.6.19

Microsoft Warns of Email Attacks Executing Code Using an Old Bug

Vulnerebility

Threatpost

11.6.19

MuddyWater APT group updated its multi-stage PowerShell backdoor Powerstats

APT

Securityaffairs

11.6.19

CVE-2019-2725 Oracle WebLogic flaw exploited in cryptojacking campaign

Vulnerebility

Securityaffairs

11.6.19

CVE-2019-12735 – opening a specially crafted file in Vim or Neovim Editor could compromise your Linux system

Vulnerebility

Securityaffairs

11.6.19

Your Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor

Hacking

Thehackernews

11.6.19

Huawei Denies Being Bound by Chinese Spy Laws

BigBrothers

Securityweek

11.6.19

Customs Says Hack Exposed Traveler, License Plate Images

Hacking

Securityweek

11.6.19

"MuddyWater" Cyberspies Update PowerShell Backdoor

CyberSpy

Securityweek

11.6.19

Europe’s online economy risks losing €57 billion as SCA is enforced

Security

Net-security

11.6.19

Hackproofing smart meters and boosting smart grid security

Security

Net-security

11.6.19

Analytics and automation solutions to help contact center IT staff ensure compliance

Security

Net-security

11.6.19

Lack of visibility and IT staff availability: The main challenges of enterprise decentralization

Security

Net-security

10.6.19

Shanghai Jiao Tong University data leak – 8.4TB in email metadata exposed

Incindent

Securityaffairs

10.6.19

CIA sextortion campaign, analysis of a well-organized scam

BigBrothers

Securityaffairs

10.6.19

Retro video game website Emuparadise suffered a data breach

Incindent

Securityaffairs

10.6.19

Spain extradites 94 Taiwanese to China phone and online fraud charges

CyberCrime

Securityaffairs

10.6.19

Critical Oracle WebLogic Vulnerability Exploited in Attacks

Vulnerebility

Securityweek

10.6.19

GoldBrute Botnet Brute-Force Attacking RDP Servers

BotNet

Securityweek

10.6.19

The Dark Net, a Major Threat but Also a Resource

Security

Securityweek

10.6.19

China Telecom Routes European Traffic to Its Network for Two Hours

BigBrothers

Securityweek

10.6.19

Interesting JavaScript Obfuscation Example

Virus

SANS

10.6.19

How human bias impacts cybersecurity decision making

Cyber

Net-security

10.6.19

Malware peddlers hit Office users with old but reliable exploit

Virus

Net-security

10.6.19

Sysmon Getting DNS Query Logging with Querying Process Name

Security

Bleepingcomputer

10.6.19

VLC 3.0.7 is Biggest Security Release Due to EU Bounty Program

Security

Bleepingcomputer

10.6.19

Google Chrome 75 Has a Working Tab Hover Card Feature

Security

Bleepingcomputer

10.6.19

New Extortion Scam Threatens to Ruin a Website's Reputation

Spam

Bleepingcomputer

10.6.19

China Routed Traffic from European Carriers for Two Hours

BigBrothers

Bleepingcomputer

10.6.19

Quest, LabCorp, AMCA Sued For Breach Impacting Over 19 Million

Incindent

Bleepingcomputer

10.6.19

Microsoft Issues Warning on Spam Campaign Using Office Exploits

Spam

Bleepingcomputer

10.6.19

Nine Major VPNs Could Get Blocked by Russia in 30 Days

Security

Bleepingcomputer

10.6.19

Google Search Ads Infiltrated Again by Tech Support Scams

Spam

Bleepingcomputer

10.6.19

Man Gets 51 Months in Prison for $10M BEC Fraud, Romance Scam

Spam

Bleepingcomputer

10.6.19

Microsoft warns of spam campaign exploiting CVE-2017-11882 flaw

Vulnerebility

Securityaffairs

10.6.19

Millions of Exim mail servers vulnerable to cyber attacks

Vulnerebility

Securityaffairs

10.6.19

Critical RCE affects older Diebold Nixdorf ATMs

Security

Securityaffairs

10.6.19

Facebook is going to stop Huawei pre-installing apps on mobile devices

Social

Securityaffairs

10.6.19

Hunting the ICEFOG APT group after years of silence

APT

Securityaffairs

10.6.19

Tip: Sysmon Will Log DNS Queries

Security

SANS

10.6.19

Is there a weak link in blockchain security?

Cryptocurrency

Net-security

10.6.19

New user keystroke impersonation attack uses AI to evade detection

Attack

Net-security

10.6.19

Most e-commerce websites running Magento at high risk of cybercrime

Security

Net-security

10.6.19

There’s a significant disconnect between DevOps capabilities and DevSecOps readiness

Security

Net-security

9.6.19

Ransom News

Ransom

Ransom

9.6.19

Google Chrome to Limit Referer Header Size to Block Attacks

Attack

Bleepingcomputer

9.6.19

New Windows 10 Zero-Day Bug Emerges From Bypassing Patched Flaw

Vulnerebility

Bleepingcomputer

9.6.19

Windows 10 1903 Now Available to Everyone Via Manual Update

Vulnerebility

Bleepingcomputer

9.6.19

Internet Explorer Mode Now Works in Microsoft Edge Dev Builds

Security

Bleepingcomputer

9.6.19

Google Chrome is Getting Closer to Working Tab Groups

Security

Bleepingcomputer

9.6.19

Tech Art Piece Delivers Quick Fix For Social Following Hoarders

Social

Bleepingcomputer

9.6.19

New GoldBrute Botnet is Trying to Hack 1.5 Million RDP Servers

BotNet

Bleepingcomputer

9.6.19

Three Hidden Features Found in Next Windows 10 Version

Vulnerebility

Bleepingcomputer

9.6.19

Phishing Email Warns: Add Recovery Number or Account Deleted

Phishing

Bleepingcomputer

9.6.19

Millions of Exim Mail Servers Exposed to Local, Remote Attacks

Incindent

Bleepingcomputer

9.6.19

Bug Breaks Internet Explorer 11 on Some Windows 10 Versions

Vulnerebility

Bleepingcomputer

9.6.19

Over 400,000 Opko Health Clients Impacted by AMCA Data Breach

Incindent

Bleepingcomputer

9.6.19

Microsoft Warns Against Bypassing Office 365 Spam Filters

Spam

Bleepingcomputer

9.6.19

Another Hacker Selling Access to Charity, Antivirus Firm Networks

IT

Bleepingcomputer

9.6.19

The MuddyWater APT Group Adds New Tools to Their Arsenal

APT

Bleepingcomputer

9.6.19

The RIG Exploit Kit is Now Pushing the Buran Ransomware

Ransomware

Bleepingcomputer

8.6.19

German intelligence agencies could hack servers

BigBrothers

Securityaffairs

8.6.19

Hunting the ICEFOG APT group after years of silence

APT

Securityaffairs

8.6.19

Recently a large chunk of European mobile traffic was rerouted through China Telecom

BigBrothers

Securityaffairs

8.6.19

Frankenstein campaign: threat actors put together open-source tools for highly-targeted attacks

CyberCrime

Securityaffairs

8.6.19

Critical Flaws in Amcrest HDSeries Camera Allow Complete Takeover

Vulnerebility

Threatpost

8.6.19

Forget BlueKeep: Beware the GoldBrute

Vulnerebility

Threatpost

8.6.19

SandboxEscaper Debuts ByeBear Windows Patch Bypass

Vulnerebility

Threatpost

8.6.19

News Wrap: Infosecurity Europe Highlights and BlueKeep Anxiety

Security

Threatpost

8.6.19

Threatlist: Targeted Espionage-as-a-Service Takes Hold on the Dark Web

CyberSpy

Threatpost

8.6.19

Troy Hunt: ‘Messy’ Password Problem Isn’t Getting Better

Security

Threatpost

8.6.19

Facebook to Cut off Huawei to Comply With U.S. Sanctions

Social

Securityweek

8.6.19

Spain Extradites 94 Taiwanese to China on Phone Scam Charges

CyberCrime

Securityweek

8.6.19

Attackers Piece Together Malicious Tools Used for Targeted Attacks

Virus

Securityweek

8.6.19

Hacker Discloses Second Zero-Day to Bypass Patch for Windows EoP Flaw

Vulnerebility

Thehackernews

8.6.19

New Brute-Force Botnet Targeting Over 1.5 Million RDP Servers Worldwide

BotNet

Thehackernews

8.6.19

Fort Worth IT Professionals Fired for Reporting Cybersecurity Issues: What We Know

Cyber

Securityaffairs

8.6.19

SandboxEscaper releases Byebear exploit to bypass patched EoP flaw

Exploit

Securityaffairs

8.6.19

Crooks stole about $10 million from GateHub cryptocurrency wallet service

Cryptocurrency

Securityaffairs

8.6.19

New GoldBrute Botnet is attempting to infect 1.5 Million RDP Servers

BotNet

Securityaffairs

8.6.19

Cryptocurrency startup Komodo hacks itself to protect its users’ funds from hackers

Cryptocurrency

Securityaffairs

8.6.19

Keep an Eye on Your WMI Logs

Safety

SANS

8.6.19

Two-thirds of iOS apps don’t use App Transport Security

Apple

Net-security

7.6.19

June Patch Tuesday forecast: Apply updates before BlueKeep hits the streets

Vulnerebility

Net-security

7.6.19

Critical Exim flaw exploitable locally and remotely, patch ASAP!

Vulnerebility

Net-security

7.6.19

Criminals are selling hacking services targeting world’s biggest companies

CyberCrime

Net-security

7.6.19

Global communications service providers struggling to fend off growing number of DDoS attacks

Attack

Net-security

7.6.19

Industrial cybersecurity strategies need a radical rethink and should be built from the ground up

Cyber

Net-security

7.6.19

Tor Browser 8.5.1 Released With WebGL Fingerprinting Fix

Vulnerebility

Bleepingcomputer

7.6.19

Cisco Fixes High Severity Flaws in Industrial, Enterprise Tools

Vulnerebility

Bleepingcomputer

7.6.19

LibreOffice Will No Longer Provide 32-bit Linux Binaries

IT

Bleepingcomputer

7.6.19

Windows 10 Insider Build 18912 Fixes win32k.sys GSOD Crashes

Vulnerebility

Bleepingcomputer

7.6.19

Fake Cryptocurrency Trading Site Pushes Crypto Stealing Malware

Cryptocurrency

Bleepingcomputer

7.6.19

Phishing Kits Add More Vulnerabilities to Hacked Servers

Phishing

Bleepingcomputer

7.6.19

Scattered Canary Evolves From One-Man Operation to BEC Giant

Spam

Bleepingcomputer

7.6.19

MetaSploit Module Created for BlueKeep Flaw, Private for Now

Vulnerebility

Bleepingcomputer

7.6.19

Microsoft Asking for Feedback on the Windows 10 Start Menu

OS

Bleepingcomputer

7.6.19

Chrome 75 Released with 42 Security Fixes and New Features

Security

Bleepingcomputer

7.6.19

New Privacy Features for Mozilla Firefox, Lockwise Is Live

Privacy

Bleepingcomputer

7.6.19

Attackers Stitch Together Frankenstein Campaign Using Free Tools

CyberCrime

Bleepingcomputer

7.6.19

Remote Desktop Zero-Day Bug Allows Attackers to Hijack Sessions

Vulnerebility

Bleepingcomputer

7.6.19

Private Info of Over 1.5M Donors Exposed by UChicago Medicine

Incindent

Bleepingcomputer

7.6.19

Romanian ATM Skimmer Gets Over 5 Years of Jail Time

CyberCrime

Bleepingcomputer

7.6.19

BlackSquid Uses 7 Exploits to Infect Web Servers with Miners

Exploit

Bleepingcomputer

7.6.19

AMCA Healthcare Hack Widens Again, Reaching 20.1M Victims

Incindent

Threatpost

7.6.19

High-Severity Bug in Cisco Industrial Enterprise Tool Allows RCE

Vulnerebility

Threatpost

7.6.19

Streaming Video Fans Open to TV Hijacking

Hacking

Threatpost

7.6.19

Help Keep Data and Systems Safe with Access Rights Manager (ARM)

Security

Threatpost

7.6.19

Tor Project released Tor Browser 8.5.1 for Windows, Mac, Linux, and Android

Security

Securityaffairs

7.6.19

VMware addressed flaws in its Workstation and Tools

Vulnerebility

Securityaffairs

7.6.19

Remote code execution flaw in Ministra IPTV Platform exposes user data and more

Vulnerebility

Securityaffairs

7.6.19

OMB Publishes Memorandum on U.S. Federal Data Strategy

BigBrothers

Securityweek

7.6.19

Rail System Cybersecurity Firm Cylus Raises $12 Million

IT

Securityweek

7.6.19

Many iOS Developers Don’t Use Encryption: Report

Apple

Securityweek

7.6.19

Cisco to Acquire OT Security Firm Sentryo

IT

Securityweek

7.6.19

VMware Patches Vulnerabilities in Tools, Workstation

Vulnerebility

Securityweek

7.6.19

GoldBrute Botnet Brute Forcing 1.5 Million RDP Servers

BotNet

SANS

7.6.19

Poor data management can cost organizations $20 million each year

Security

Net-security

7.6.19

Workforce diversity key to plugging the IT skills gap

Security

Net-security

6.6.19

IoT Security Regulation is on the Horizon

IoT

Threatpost

6.6.19

440 Million Android Users Plagued By Extremely Obnoxious Pop-Ups

Android

Threatpost

6.6.19

Streaming Video Fans Open to TV Hijacking

Hacking

Threatpost

6.6.19

Help Keep Data and Systems Safe with Access Rights Manager (ARM)

IT

Threatpost

6.6.19

Mozilla and Google Browsers Get Security, Anti-Tracking Boosts

Safety

Threatpost

6.6.19

Cisco disclosed several flaws in Cisco Industrial Network Director

Vulnerebility

Securityaffairs

6.6.19

Platinum APT and leverages steganography to hide C2 communications

APT

Securityaffairs

6.6.19

Analyzing the APT34’s Jason project

APT

Securityaffairs

6.6.19

0patch experts released unofficial Patch Available for Recent Windows 10 Task Scheduler Zero-Day

Vulnerebility

Securityaffairs

6.6.19

macOS Catalina Brings Several Security Improvements

Apple

Securityweek

6.6.19

Elastic to Acquire Endpoint Security Firm Endgame for $243 Million

IT

Securityweek

6.6.19

Cryptocurrency Firm Itself Hacked Its Customers to Protect Their Funds From Hackers

Cryptocurrency

Thehackernews

6.6.19

Critical Flaws Found in Widely Used IPTV Software for Online Streaming Services

Vulnerebility

Thehackernews

6.6.19

Several Vulnerabilities Found in Cisco Industrial Network Director

Vulnerebility

Securityweek

6.6.19

Platinum Hackers Use Steganography to Mask C&C Communications

CyberCrime

Securityweek

6.6.19

Critical Vulnerabilities Lead to Account Takeover in Major IPTV Streamer

Vulnerebility

Securityweek

6.6.19

Russia Effort in 2016 US Election Was 'Vast,' 'Professional'

BigBrothers

Securityweek

6.6.19

BlueKeep ‘Mega-Worm’ Looms as Fresh PoC Shows Full System Takeover

Virus

Threatpost

6.6.19

Newly-Identified BEC Cybergang Targets U.S. Enterprise Victims

BigBrothers

Threatpost

6.6.19

Why Election Trust is Dwindling in a Post-Cambridge Analytica World

Security

Threatpost

6.6.19

Buggy Phishing Kits Allow Criminals to Cannibalize Their Own

Phishing

Threatpost

6.6.19

Mozilla and Google Browsers Get Security, Anti-Tracking Boosts

Security

Threatpost

6.6.19

Infosecurity Europe: Easing the Clash Between IT and OT

Security

Threatpost

6.6.19

Getting (proper) value out of security assessments

Security

SANS

6.6.19

Trust nothing: A life in infosec is a life of suspicion

Security

Net-security

6.6.19

An intelligence-driven approach to cyber threats

Security

Net-security

6.6.19

How privileged insiders threaten the security of global organizations

Security

Net-security

6.6.19

Will biometrics replace passwords for online payment authentication?

Security

Net-security

6.6.19

How much do you know about your invisible workforce?

Security

Net-security

5.6.19

Older Windows 10 Versions Get Intel Microcode Updates for MDS Vulns

Vulnerebility

Bleepingcomputer

5.6.19

Windows 10 to Require 32GB of Storage Only on New OEM PCs

OS

Bleepingcomputer

5.6.19

New Email Hacking Tool from OilRig APT Group Leaked Online

Hacking

Bleepingcomputer

5.6.19

Headhunting Firm Leaks Millions of Resumes, Client Private Data

Incindent

Bleepingcomputer

5.6.19

Improper App Check Revives the Synthetic Clicks Issue in macOS Mojave

Apple

Bleepingcomputer

5.6.19

Windows 10 Apps Hit by Malicious Ads that Blockers Won't Stop

OS

Bleepingcomputer

5.6.19

Billing Details for 11.9M Quest Diagnostics Clients Exposed

Incindent

Bleepingcomputer

5.6.19

Microsoft Outlines Their Vision of a Modern Operating System

OS

Bleepingcomputer

5.6.19

Google Outage in Eastern U.S. Affecting Gmail, YouTube, and More

IT

Bleepingcomputer

5.6.19

How to Download a Windows 10 ISO By Impersonating Other Devices

OS

Bleepingcomputer

5.6.19

New Phishing Scam Asks You to Manage Your Undelivered Email

Phishing

Bleepingcomputer

5.6.19

Chrome Ad Blockers To Get Full API Access via Free Enterprise Policies

Safety

Bleepingcomputer

5.6.19

NSA urges Windows Users and admins to Patch BlueKeep flaw

Vulnerebility

Securityaffairs

5.6.19

Tens of Million patients impacted by the AMCA data breach

Incindent

Securityaffairs

5.6.19

Unofficial Patch Available for Recent Windows 10 Task Scheduler Zero-Day

Vulnerebility

Securityweek

5.6.19

Ransomware Attack Costs Norsk Hydro Tens of Millions of Dollars

Ransomware

Securityweek

5.6.19

Vietnam Cyber Threat: Government-Linked Hackers Ramping Up Attacks

Cyber

Securityweek

5.6.19

Endpoint Security Firm SentinelOne Raises $120 Million

IT

Securityweek

5.6.19

NSA Urges Windows Users to Patch 'BlueKeep' Vulnerability

Vulnerebility

Securityweek

5.6.19

Inside the Operations of a West African Cybercrime Group

CyberCrime

Securityweek

5.6.19

How Deception Technology Can Defend Networks and Disrupt Attackers

Safety

Securityweek

5.6.19

Spam and phishing in Q1 2019

Analysis  Spam

Securelist

5.6.19

Platinum is back

CyberCrime

Securelist

5.6.19

The Australian National University suffered a major, sophisticated attack

Attack

Securityaffairs

5.6.19

Expert developed a MetaSploit module for the BlueKeep flaw

Vulnerebility

Securityaffairs

5.6.19

BlackSquid malware uses multiple exploits to drop cryptocurrency miners

Cryptocurrency

Securityaffairs

5.6.19

CVE-2019-9510 flaw allows hackers to bypass Windows lock screen on RDP sessions

Vulnerebility

Securityaffairs

5.6.19

LabCorp Says 7.7 Million Patients Caught in AMCA Data Breach

Incindent

Securityweek

5.6.19

Source Code of New Iran-Linked Hacking Tool Posted Online

BigBrothers

Securityweek

5.6.19

NVIDIA Patches Command Execution Vulnerability in GeForce Experience

Vulnerebility

Securityweek

5.6.19

Hackers Can Bypass Windows Lockscreen on Remote Desktop Sessions

Hacking

Securityweek

5.6.19

Unpatched Bug Let Attackers Bypass Windows Lock Screen On RDP Sessions

Vulnerebility

Thehackernews

5.6.19

Firefox Web Browser Now Blocks Third-Party Tracking Cookies By Default

Security

Thehackernews

5.6.19

Is ‘Sign in with Apple’ Marketing Spin or Privacy Magic? Experts Weigh In

Privacy

Threatpost

5.6.19

Zero-Day No More: Windows Bug Gets a Fix

Vulnerebility

Threatpost

5.6.19

Zebrocy: A Russian APT Specializing in Victim Profiling, Access

APT

Threatpost

5.6.19

ISC snapshot: r-cyber with rud.is

Cyber

SANS

5.6.19

Advancing transparency and accountability in the cybersecurity industry

Cyber

Net-security

5.6.19

Embrace chaos to improve cloud infrastructure resilience

Security

Net-security

5.6.19

2018 in numbers: Data breaches cost $654 billion, expose 2.8 billion data records in the U.S.

Incindent

Net-security

5.6.19

Despite disclosure laws, cybercrime may be widely underreported

Cyber

Net-security

5.6.19

Unclassified data creates security blind spots for most companies

Security

Net-security

4.6.19

OilRig’s Jason email hacking tool leaked online

Hacking

Securityaffairs

4.6.19

A month later Gamaredon is still active in Eastern Europe

BigBrothers

Securityaffairs

4.6.19

macOS zero-day in Mojave could allow Synthetic Clicks attacks

Apple

Securityaffairs

4.6.19

Australian teenager hacked into Apple twice for a job

Apple

Securityaffairs

4.6.19

Apple Launches Privacy-Focused 'Sign in with Apple ID' Feature at WWDC 2019

Apple

Thehackernews

4.6.19

Top Russian Internet Firm Reportedly Under Pressure on Data

BigBrothers

Securityweek

4.6.19

Kaspersky Announces New Branding, Mission Statement

IT

Securityweek

4.6.19

Imperva to Buy Bot Detection Firm Distil Networks

IT

Securityweek

4.6.19

Aussie Police Raid Journalist's Home Over Secret Spying Report

BigBrothers

Securityweek

4.6.19

Privilege Escalation Vulnerability Found in Rapid7 InsightIDR

Vulnerebility

Securityweek

4.6.19

Apple Unveils Privacy-Focused Authentication System

Apple

Securityweek

4.6.19

Top Australian University Reports Vast, 'Sophisticated' Hack

BigBrothers

Securityweek

4.6.19

Inside GCHQ's Proposed Backdoor Into End-to-End Encryption

BigBrothers

Securityweek

4.6.19

Tap ‘n Ghost Attack Creatively Targets Android Devices

Android

Threatpost

4.6.19

AI Isn’t Good Enough When Lives Are on the Line, Experts Warn

Security

Threatpost

4.6.19

A New Approach for Combating Insider Threats

Cyber

Threatpost

4.6.19

Infosecurity Europe: Cryptojacking is Making a Comeback

Cryptocurrency

Threatpost

4.6.19

Smart-TV Bug Allows Rogue Broadcasts

Vulnerebility

Threatpost

4.6.19

GandCrab Ransomware Shutters Its Operations

Ransomware

Threatpost

4.6.19

Tip: BASE64 Encoded PowerShell Scripts are Recognizable by the Amount of Letter As

Virus

SANS

4.6.19

Apple debuts privacy-minded “Sign in with Apple” SSO

Apple

Net-security

4.6.19

Nearly 12 million Quest Diagnostics patients affected by data breach

Incindent

Net-security

4.6.19

Is your private equity firm exposed to these hidden IT risks?

Incindent

Net-security

4.6.19

Hack The Sea: Bridging the gap between hackers and the maritime sector

Hacking

Net-security

4.6.19

Is AI fundamental to the future of cybersecurity?

Cyber

Net-security

4.6.19

How organizations are managing vulnerability risks

Vulnerebility

Net-security

4.6.19

Qualys at Infosecurity Europe 2019: Hear best practices from industry leaders

Security

Net-security

3.6.19

AMCA Breach Hits 12 Million Quest Diagnostics Patients

Incindent

Securityweek

3.6.19

GandCrab Ransomware Authors Announce Shut Down

Ransomware

Securityweek

3.6.19

New Attack Targets the Touchscreen of Smartphones, Researchers Reveal

Mobil

Securityweek

3.6.19

Lab Testing Firm Eurofins Scientific Hit by Ransomware

Ransomware

Securityweek

3.6.19

macOS 0-Day Flaw Lets Hackers Bypass Security Features With Synthetic Clicks

Apple

Thehackernews

3.6.19

5G Security Challenges: A Vendor’s POV

Mobil

Threatpost

3.6.19

MacOS Zero-Day Allows Trusted Apps to Run Malicious Code

Apple

Threatpost

3.6.19

Zebrocy’s Multilanguage Malware Salad

Virus

Securelist

3.6.19

Gaining Root Access to Host through rkt Container hack

Hacking

Securityaffairs

3.6.19

Expert shows how to Hack a Supra Smart Cloud TV

Hacking

Securityaffairs

3.6.19

Google is taking action on deceptive installation tactics for Chrome Browser Extensions

Security

Securityaffairs

3.6.19

Google outages in Eastern US affected Gmail, G-Suite, YouTube, and more

Security

Securityaffairs

3.6.19

Serious Vulnerabilities Found in Kace K1000 Appliance

Vulnerebility

Securityweek

3.6.19

Hackers Can Bypass macOS Security Features With Synthetic Clicks

Apple

Securityweek

3.6.19

rkt Container Runtime Flaws Give Root Access to Host

Virus

Securityweek

3.6.19

SUPRA Smart TV Flaw Lets Attackers Hijack Screens With Any Video

Vulnerebility

Thehackernews

3.6.19

Hackers Stole Customers' Credit Cards from 103 Checkers and Rally's Restaurants

Incindent

Thehackernews

3.6.19

Threat actors abuse Microsoft Azure to Host Malware and C2 Servers

Virus

Securityaffairs

3.6.19

Leicester City Football Club disclosed a card breach

Incindent

Securityaffairs

3.6.19

ProtonMail denies that it spies on users for government agencies

CyberSpy

Securityaffairs

3.6.19

ESET analyzes Turla APT’s usage of weaponized PowerShell

APT

Securityaffairs

3.6.19

GandCrab operators are shutting down their operations

Ransomware

Securityaffairs

3.6.19

Apple updates address SQLite, WebKit issues in iTunes and iCloud for Windows

Apple

Securityaffairs

3.6.19

Cryptojacking campaign uses Shodan to scan for Docker hosts to hack

Cryptocurrency

Securityaffairs

3.6.19

How likely are weaponized cars?

Security

Net-security

3.6.19

Why zero trust is crucial to compliance

Security

Net-security

3.6.19

Growing reliance on open source libraries leaves many companies vulnerable

Vulnerebility

Net-security

3.6.19

Cloud migration journey is more complex than anticipated for innovation and efficiency

Security

Net-security

2.6.19

RansomNews

Ransom

Ransom

2.6.19

Microsoft Azure Being Used to Host Malware and C2 Servers

Virus

Bleepingcomputer

2.6.19

GandCrab Ransomware Shutting Down After Claiming to Earn $2.5 Billion

Ransomware

Bleepingcomputer

2.6.19

The Facebook CTF 2019 Event is Starting in 30 Minutes

Social

Bleepingcomputer

2.6.19

Maze Ransomware Says Computer Type Determines Ransom Amount

Ransomware

Bleepingcomputer

2.6.19

NVIDIA Fixes High Severity GeForce Experience Vulnerabilities

Vulnerebility

Bleepingcomputer

2.6.19

Sodinokibi Ransomware Pushed via Foreclosure Warning Spam

Ransomware

Bleepingcomputer

2.6.19

Citrix Sued For Not Securing Employee Info Before Data Breach

Incindent

Bleepingcomputer

2.6.19

Zero-Day Flaw in Windows 10 Task Scheduler Gets Micropatch

Vulnerebility

Bleepingcomputer

2.6.19

85.4GB Database Exposes Hotels' Internal Security Information

Incindent

Bleepingcomputer

2.6.19

Microsoft Warns Users Again to Patch Wormable BlueKeep Flaw

Vulnerebility

Bleepingcomputer

2.6.19

Phishing Email States Your Office 365 Account Will Be Deleted

Phishing

Bleepingcomputer

2.6.19

Windows 10 v1903 Upgrade Blocked Due to Some Intel Drivers

Vulnerebility

Bleepingcomputer

1.6.19

Compromised Docker Hosts Use Shodan to Infect More Victims

Incindent

Bleepingcomputer

1.6.19

Google Targeting Deceptive Install Tactics for Chrome Extensions

Security

Bleepingcomputer

1.6.19

WordPress Plugin Flaw Used for Malicious Redirects and Pop-Ups

Vulnerebility

Bleepingcomputer

1.6.19

Microsoft Windows Terminal YouTube Video Removed for Copyright Claim

IT

Bleepingcomputer

1.6.19

POS Malware Steals Payment Info From 103 Checkers Restaurants

Virus

Bleepingcomputer

1.6.19

Bitcoin Blender Exits Cryptocurrency Mixing On Its Own Terms

Cryptocurrency

Bleepingcomputer

1.6.19

Convert Plus Plugin Flaw Lets Attackers Become a Wordpress Admin

Vulnerebility

Bleepingcomputer

1.6.19

Windows 10 1903 Cumulative Update KB4497935 Released With Fixes

Vulnerebility

Bleepingcomputer

1.6.19

YouTube Cryptocurrency Videos Pushing Info-Stealing Trojan

Cryptocurrency

Bleepingcomputer

1.6.19

Gmail's Confidential Mode for G Suite Goes Live on June 25

Security

Bleepingcomputer

1.6.19

Google to Allow webRequest Ad Blocking for Enterprise Deployments

Security

Bleepingcomputer

1.6.19

Microsoft Boosts Shadow IT Discovery for Cloud Security