Calendar 2020 April- Home  2020  2019  2018  2017  2016

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2020 - January February March April May June July August September October November December


Date

Name

Category

Web

30.4.20

Passwordless Authentication Provider 'Secret Double Octopus' Raises $15 Million

Security

Securityweek

30.4.20

COVID-19 Lockdown Fuels Increase in RDP Attacks

Attack

Securityweek

30.4.20

Targeted Phishing Attacks Successfully Hacked Top Executives At 150+ Companies

Phishing

Thehackernews

30.4.20

Google announces cull of low-quality, misleading Chrome extensions

Security

Net-security

30.4.20

How to thwart human-operated ransomware campaigns?

Ransomware

Net-security

30.4.20

APT trends report Q1 2020

APT

Securelist

30.4.20

EventBot, a new Android mobile targets financial institutions across Europe

Android

Securityaffairs

30.4.20

RDP brute-force attacks rocketed since beginning of COVID-19

Attack

Securityaffairs

30.4.20

YARA 4.0.0 Released With Important New Features

Security

Securityweek

30.4.20

Android Ransomware Asks for Victim's Credit Card Info

Android

Securityweek

30.4.20

Google Steps Up Fight on Spam in Chrome Web Store

Spam

Securityweek

30.4.20

Critical Vulnerability in Salt Requires Immediate Patching

Vulnerebility

Securityweek

30.4.20

Hackers Knew How to Target PLCs in Israel Water Facility Attacks: Sources

ICS

Securityweek

30.4.20

New Android Malware Steals Banking Passwords, Private Data and Keystrokes

Android

Thehackernews

30.4.20

Cato SDP: Cloud-Scale and Global Remote Access Solution Review

Security

Thehackernews

30.4.20

Critical Bugs Found in 3 Popular e-Learning Plugins for WordPress Sites

Vulnerebility

Thehackernews

30.4.20

AA20-120A : Microsoft Office 365 Security Recommendations CERT CERT

30.4.20

Millions of Brute-Force Attacks Hit Remote Desktop Accounts Attack

Threatpost

30.4.20

EFF: Google, Apple’s Contact-Tracing System Open to Cyberattacks Security

Threatpost

30.4.20

High-Severity Cisco IOS XE Flaw Threatens SD-WAN Routers Vulnerebility

Threatpost

30.4.20

Critical GitLab Flaw Earns Bounty Hunter $20K Security Threatpost

30.4.20

ThreatList: Human-Mimicking Bots Spike, Targeting e-Commerce and Travel Security

Threatpost

30.4.20

Journalist Matthew Keys is now charged with an attack on a magazine Attack Securityaffairs

30.4.20

Estonian intelligence reports foreign hackers breached Mail.ee email provider BigBrothers Securityaffairs

30.4.20

Android Phone Makers Improve Patching Practices Android Securityweek

30.4.20

Researcher Earns $20,000 From GitLab for Critical Vulnerability Vulnerebility Securityweek

30.4.20

Collecting IOCs from IMAP Folder

Security

SANS

30.4.20

As companies rely on digital revenue, the need for web and mobile app security skyrockets

Mobil

Net-security

30.4.20

Keeping your app’s secrets secret

Mobil

Net-security

30.4.20

Suspicious business emails increase, imposters pretend to be executives

Security

Net-security

30.4.20

Organizations look to build resiliency with hybrid and multi-cloud architectures

Security

Net-security

30.4.20

Global NAC market estimated to reach $2.21 billion by 2024

IT

Net-security

29.4.20

Privacy Preserving Protocols to Trace Covid19 Exposure

Privacy

SANS

29.4.20

Google found zero-click vulnerabilities in Apple’s multimedia processing components Apple Securityaffairs

29.4.20

Adobe addresses several critical flaws in Illustrator, Bridge, and Magento Vulnerebility Securityaffairs
29.4.20 Google Researchers Find Multiple Vulnerabilities in Apple's ImageIO Framework Apple Securityweek
29.4.20 Convict in LA Times Hack Again Accused of Attacking Media Hacking Securityweek
29.4.20 Microsoft, Google Announce Wider Availability of Secure VMs Vulnerebility Securityweek
29.4.20 Six Critical Vulnerabilities Patched in Magento Vulnerebility Securityweek

29.4.20

Adobe fixes critical flaws in Magento, Adobe Illustrator and Bridge

Vulnerebility

Net-security

29.4.20

WordPress Plugin Bug Opens 100K Websites to Compromise Vulnerebility

Threatpost

29.4.20 Sophisticated Android Spyware Attack Spreads via Google Play Android

Threatpost

29.4.20 Troves of Zoom Credentials Shared on Hacker Forums Incindent

Threatpost

29.4.20 Enterprise Security Woes Explode with Home Networks in the Mix Exploit Threatpost
29.4.20 ‘Black Rose Lucy’ is Back, Now Pushing Ransomware Ransomware

Threatpost

29.4.20

Critical Adobe Illustrator, Bridge and Magento Flaws Patched Vulnerebility Threatpost
29.4.20 Hackers Leak Biopharmaceutical Firm’s Data Stolen in Ransomware Attack Ransomware Threatpost
29.4.20 Hiding in plain sight: PhantomLance walks into a market APT Securelist
29.4.20 PhantomLance, a four-year-long cyberespionage spying campaign CyberSpy Securityaffairs
29.4.20 SANDMAN AND FINEPROXY BEHIND THE DDOS ATTACKS AGAINST TIMETV.LIVE Attack Securityaffairs

29.4.20

Adobe Patches 22 Vulnerabilities in Bridge, Illustrator Vulnerebility Securityweek
29.4.20 Rapid7 to Acquire Cloud Security Firm DivvyCloud for $145 Million IT Securityweek
29.4.20 PhantomLance: Vietnamese Cyberspies Targeted Android Users for Years CyberSpy Securityweek
29.4.20 New Version of Infection Monkey Maps to MITRE ATT&CK Framework Hacking Securityweek
29.4.20 Critical Security Patches Released for Magento, Adobe Illustrator and Bridge Vulnerebility Thehackernews

29.4.20

Is the future of information security and tech conferences virtual?

Security

Net-security
29.4.20

Assessing the risks of ACH payments

Security

Net-security
29.4.20

Cybersecurity pros share insights into their current work situations

Cyber

Net-security
29.4.20

Would you trust Amazon Alexa more if given the option to adjust privacy settings?

Privacy

Net-security
29.4.20

445 million attacks detected since the beginning of 2020, COVID-19 wreaks havoc

Attack

Net-security

28.4.20

Experts warn of deliveries scams that use a COVID-19 theme Spam Securityaffairs

28.4.20

Outlaw is Back, a New Crypto-Botnet Targets European Organizations Cryptocurrency Securityaffairs
28.4.20 100k+ WordPress sites exposed to hack due to a bug in Real-Time Find and Replace plugin Hacking Securityaffairs
28.4.20 China Mandates Cybersecurity Reviews for Tech Product Acquisitions BigBrothers Securityweek
28.4.20 Cloud Security Company Accurics Emerges From Stealth Mode Security Securityweek
28.4.20 Code Injection Vulnerability Found in 'Real-Time Find and Replace' WordPress Plugin Vulnerebility Securityweek
28.4.20 Mozilla Says Many Popular Video Call Apps Meet Its Minimum Security Standards Security Securityweek
28.4.20 Researchers Uncover Novel Way to De-anonymize Device IDs to Users' Biometrics Security Thehackernews

28.4.20

Which video call apps should you use if you care about privacy?

Privacy

Net-security

28.4.20

Agent Tesla delivered by the same phishing campaign for over a year

Phishing  Virus

SANS

28.4.20 U.S. Universities Hit With ‘Adult Dating’ Spear-Phishing Attack BigBrothers  Phishing

Threatpost

28.4.20 Single Malicious GIF Opened Microsoft Teams to Nasty Attack Attack

Threatpost

28.4.20 Hackers Mount Zero-Day Attacks on Sophos Firewalls Vulnerebility

Threatpost

28.4.20 GDPR Compliance Site Leaks Git Data, Passwords Privacy Threatpost
28.4.20 Shade Ransomware gang shut down operations and releases 750K decryption keys Ransomware Securityaffairs
28.4.20 Group-IB helps to detain operators of scam-service issuing fake passes to move around Moscow amid COVID-19 virus lockdown CyberCrime Securityaffairs
28.4.20 Shade Ransomware Authors Release Decryption Keys Ransomware Securityweek
28.4.20 Iran Paper Accuses US of Stealing Its .Com BigBrothers Securityweek
28.4.20 Critical Ignition Gateway Vulnerability Can Lead to Disruption in Plants Vulnerebility Securityweek
28.4.20

The battle against ransomware: Lessons from the front lines

Ransomware

Net-security
28.4.20

The state of data quality: Too much, too wild and too skewed

Security

Net-security
28.4.20

How to formulate a suitable identity proofing strategy

Security

Net-security
28.4.20

Why people talk a good game about privacy, but fail to follow up in real life?

Privacy

Net-security
28.4.20 64% of workers say their quality of work has improved amid pandemic disruption Security Net-security
27.4.20 Hackers targeted ICS/SCADA systems at water facilities, Israeli government warns BigBrothers  ICS Securityaffairs
27.4.20 FCC Only Partially Improved Its Cybersecurity Posture, GAO Says BigBrothers Securityweek
27.4.20 Israel Says Hackers Targeted SCADA Systems at Water Facilities BigBrothers  ICS Securityweek
27.4.20 Collection of South Korean, U.S. Payment Cards Emerges on Underground Market BigBrothers Securityweek
27.4.20 Kaspersky and SecurityWeek Present SAS@home Virtual Event — April 28-30 Congress Securityweek
27.4.20 Hacking Microsoft Teams accounts with a GIF image Hacking Securityaffairs
27.4.20 Previously undetected VictoryGate Botnet already infected 35,000 devices BotNet Securityaffairs
27.4.20 Microsoft Teams Vulnerability Exposed Organizations to Attacks Attack  Vulnerebility Securityweek
27.4.20 How An Image Could've Let Attackers Hack Microsoft Teams Accounts Hacking Thehackernews
27.4.20

Attackers exploiting a zero-day in Sophos firewalls, have yours been hit?

Vulnerebility

Net-security
27.4.20 Hackers exploit SQL injection zero-day issue in Sophos firewall Hacking Securityaffairs
27.4.20 Coronavirus-themed attacks April 19 – April 25, 2020 Security Securityaffairs
27.4.20 Crooks target US universities with malware used by nation-state actors BigBrothers Securityaffairs
27.4.20 Malware Delivered to Sophos Firewalls via Zero-Day Vulnerability Virus  Vulnerebility Securityweek
27.4.20 Intelligence Agencies Share Web Shell Detection Techniques BigBrothers Securityweek
27.4.20

Powershell Payload Stored in a PSCredential Object

Security

SANS
27.4.20

Three firmware blind spots impacting securit

Security Net-security
27.4.20

Understanding the basics of API security

Security

Net-security
27.4.20

Third-party compliance risk could become a bigger problem

Security

Net-security
27.4.20

Most IT leaders believe remote workers are a security risk

Security

Net-security
27.4.20

Privacy pros expecting an increase in privacy rights requests as a result of COVID-19

Privacy

Net-security
27.4.20

Looking to break into cybersecurity without direct experience? Find out how

Cyber

Net-security
26.4.20

Video: Malformed .docm File

Virus

SANS
26.4.20 Ransom News Ransom Ransom
26.4.20 Ubuntu 20.04 LTS for Windows 10 Released on Microsoft Store OS

Bleepingcomputer

26.4.20 Microsoft Edge: New feature and improvements coming soon OS

Bleepingcomputer

26.4.20 Phishing uses lay-off Zoom meeting alerts to steal credentials Phishing Bleepingcomputer
26.4.20 Phishing attacks target US Payroll Protection Program Loans Phishing

Bleepingcomputer

26.4.20 Researchers: 30,000% increase in pandemic-related threats Security

Bleepingcomputer

26.4.20 BazarBackdoor: TrickBot gang’s new stealthy network-hacking malware Virus

Bleepingcomputer

26.4.20 US universities targeted with malware used by state-backed actors Virus

Bleepingcomputer

26.4.20 400.000 US, South Korean card records put up for sale online BigBrothers

Bleepingcomputer

26.4.20 Phishing spoofs US Federal Reserve to steal online bank accounts Phishing

Bleepingcomputer

26.4.20 Windows 10 KB4549951 update fails to install, causes BSODs OS

Bleepingcomputer

26.4.20 SeaChange video platform allegedly hit by Sodinokibi ransomware Ransomware

Bleepingcomputer

26.4.20 New GreyNoise free service alerts you when your devices get hacked Hacking

Bleepingcomputer

26.4.20 NSA: Hackers exploit these vulnerabilities to deploy backdoors BigBrothers

Bleepingcomputer

26.4.20 Creative Skype phishing campaign uses Google's .app gTLD Phishing

Bleepingcomputer

26.4.20 Malwarebytes releases new VPN service for Windows Safety Bleepingcomputer
26.4.20 Customer complaint phishing pushes network hacking malware Phishing  Virus

Bleepingcomputer

26.4.20 Valve reassures gamers after CS:GO and Team Fortress 2 leaks Incindent

Bleepingcomputer

26.4.20 State-backed phishing targets govt employees with fast food lures Phishing

Bleepingcomputer

26.4.20 New iOS zero-days actively used against high-profile targets Apple Bleepingcomputer
26.4.20

MALWARE Bazaar

Virus

SANS
26.4.20 ‘Boundless Cybersecurity’ Protects Organizations Mobilizing for the New Business Normal Safety blog Sonicwall
26.4.20 Securing Telecommuters with Expanded Endpoint Visibility and Control Safety blog Sonicwall
26.4.20 What you need to know about government contact tracing apps BigBrother blog Avast blog
26.4.20 Apple flaw puts iPhones & iPads at risk OS Blog Avast blog
26.4.20 Studying How Cybercriminals Prey on the COVID-19 Pandemic Cyber blog Palo Alto Unity42
26.4.20 XDR Listed as a Top Security and Risk Management Trend by Gartner Cyber blog

Palo Alto

26.4.20 3 Myths About Security in the Cloud Cyber blog

Palo Alto

26.4.20 Keep Adversaries at Bay with Managed Detection and Response Cyber blog

Palo Alto

26.4.20 MITRE Round 2 Results Solidify Cortex XDR as a Leader in EDR Cyber blog

Palo Alto

26.4.20 Cortex XDR Further Extends Network Visibility and Endpoint Control Cyber blog Palo Alto
26.4.20 The Industry’s Most Comprehensive SASE Just Got Better with CloudGenix Cyber blog

Palo Alto

26.4.20 Five Remote Access Security Risks And How To Protect Against Them Cyber blog Palo Alto
26.4.20 Bad actor sells Huiying Medical Technology’s source code for AI-assisted COVID-19 detection Virus Securityaffairs
26.4.20 Facebook vs NSO Group lawsuit: 1,400+ users were targeted with Pegasus spyware Social Securityaffairs
26.4.20 Zscaler saw 30,000% increase in Coronavirus-themed attacks Attack Securityaffairs
26.4.20 Experts found Symlink race issues in 28 antivirus products Security Securityaffairs
25.4.20 Window 10 update weakened Google Chrome's security OS

Bleepingcomputer

25.4.20 Revive ad servers being hacked to distribute malicious ads Virus

Bleepingcomputer

25.4.20 Microsoft releases OOB security updates for Microsoft Office OS Bleepingcomputer
25.4.20 DoppelPaymer Ransomware hits Los Angeles County city, leaks files Ransomware

Bleepingcomputer

25.4.20 FBI warns of COVID-19 phishing targeting US health providers Phishing

Bleepingcomputer

25.4.20 Windows 10 KB4550945 update released with Windows Update fixes OS

Bleepingcomputer

25.4.20 Researcher discloses four IBM zero-days after refusal to fix Vulnerebility

Bleepingcomputer

25.4.20 New Microsoft 365 Personal and Family released with AI editor OS

Bleepingcomputer

25.4.20 New Coronavirus screenlocker malware is extremely annoying Virus

Bleepingcomputer

25.4.20 Spearphishing campaigns target oil, gas companies with spyware Phishing

Bleepingcomputer

25.4.20 FBI says that sharing personal info online only helps scammers BigBrothers

Bleepingcomputer

25.4.20 How to download the Windows 10 2004 ISO from Microsoft now OS

Bleepingcomputer

25.4.20 Windows 10 SMBGhost RCE exploit demoed by researchers OS

Bleepingcomputer

25.4.20 267 million Facebook profiles sold for $600 on the dark web Social

Bleepingcomputer

25.4.20 FBI: Extortion scammers more active due to stay-at-home orders Spam Bleepingcomputer
25.4.20 Window 10 update weakened Google Chrome's security OS

Bleepingcomputer

25.4.20 Revive ad servers being hacked to distribute malicious ads Virus

Bleepingcomputer

25.4.20 Microsoft releases OOB security updates for Microsoft Office OS Bleepingcomputer
25.4.20 DoppelPaymer Ransomware hits Los Angeles County city, leaks files Ransomware

Bleepingcomputer

25.4.20 FBI warns of COVID-19 phishing targeting US health providers Phishing

Bleepingcomputer

25.4.20 Windows 10 KB4550945 update released with Windows Update fixes OS

Bleepingcomputer

25.4.20 Researcher discloses four IBM zero-days after refusal to fix Vulnerebility

Bleepingcomputer

25.4.20 New Microsoft 365 Personal and Family released with AI editor OS

Bleepingcomputer

25.4.20 New Coronavirus screenlocker malware is extremely annoying Virus

Bleepingcomputer

25.4.20 Spearphishing campaigns target oil, gas companies with spyware Phishing

Bleepingcomputer

25.4.20 FBI says that sharing personal info online only helps scammers BigBrothers

Bleepingcomputer

25.4.20 How to download the Windows 10 2004 ISO from Microsoft now OS

Bleepingcomputer

25.4.20 Windows 10 SMBGhost RCE exploit demoed by researchers OS

Bleepingcomputer

25.4.20 267 million Facebook profiles sold for $600 on the dark web Social

Bleepingcomputer

25.4.20 FBI: Extortion scammers more active due to stay-at-home orders Spam Bleepingcomputer
25.4.20 CYBEREASON MOBILE: ANOTHER STEP TOWARDS OUR VISION TO PROTECT IT ALL Safety blog Cybereason
25.4.20 MITRE ATT&CK EVALUATIONS SHOWCASE CYBEREASON’S DETAILED CONTEXT AND VISIBILITY Safety blog Cybereason
25.4.20 UNDERSTANDING THE MITRE ATT&CK APT29 (ROUND 2) PRODUCT EVALUATIONS APT blog Cybereason
25.4.20 Q&A: MAINTAINING SECURE BUSINESS CONTINUITY WITH LIOR DIV Security blog Cybereason
25.4.20 RECOMMENDED READING DURING A PANDEMIC Security blog Cybereason
25.4.20 Mirai “COVID” Variant Disregards Stay-at-Home Orders BotNet blog F5 Labs
25.4.20 Ransomware: Local Government in the Firing Line Ransomware blog F5 Labs
25.4.20 Separating the Signal from the Noise: How Mandiant Intelligence Rates Vulnerabilities — Intelligence for Vulnerability Management, Part Three Vulnerebility blog

FireEye

25.4.20 Think Fast: Time Between Disclosure, Patch Release and Vulnerability Exploitation — Intelligence for Vulnerability Management, Part Two Vulnerebility blog

FireEye

25.4.20 Vietnamese Threat Actors APT32 Targeting Wuhan Government and Chinese Ministry of Emergency Management in Latest Example of COVID-19 Related Espionage APT blog FireEye
25.4.20 IR Case: The Florentine Banker Group Malware blog Checkpoint
25.4.20 OptOut – Compiler Undefined Behavior Optimizations Security blog Checkpoint
25.4.20 You Won't Believe what this One Line Change Did to the Chrome Sandbox Security blog Cisco Talos
25.4.20 Threat Spotlight: MedusaLocker Security blog Cisco Talos
25.4.20 Talos Incident Response announces new, lower price through July 25 Incident blog Cisco Talos
25.4.20 Vulnerability Spotlight: Zoom Communications user enumeration Vulnerebility blog Cisco Talos
25.4.20 iOS Mail app flaws may have left iPhone users vulnerable for years OS Blog

Eset

25.4.20 Following ESET’s discovery, a Monero mining botnet is disrupted Cryptocurrency blog

Eset

25.4.20 Buying a secondhand device? Here’s what to keep in mind Hardware blog

Eset

25.4.20 Serious flaws found in multiple smart home hubs: Is your device among them? Vulnerebility blog Eset
25.4.20 How gamification can boost your cybersecurity training Cyber blog Eset
25.4.20 Work from home: Should your digital assistant be on or off? Security blog Eset
25.4.20 Hey there! Are you using WhatsApp? Your account may be hackable Social blog Eset
25.4.20

Nintendo Confirms Breach of 160,000 Accounts

Incindent

Threatpost

25.4.20

Apple Pushes Back Against Zero-Day Exploit Claims

Apple

Threatpost

25.4.20

SAS@home Virtual Summit Showcases New Threat Intel, Industry Changes

Congress

Threatpost

25.4.20

Latest Apple Text-Bomb Crashes iPhones via Message Notifications

Apple

Threatpost
25.4.20

News Wrap: Nintendo Account Hacks, Apple Zero Days, NFL Security

Security

Threatpost
25.4.20

Nintendo confirms that hackers might have hijacked 160,000 user accounts

Incindent

Securityaffairs
25.4.20

Hoaxcalls Botnet expands the target list and adds new DDoS capabilities

Attack  BotNet

Securityaffairs
25.4.20

Flaws in ABB DCS Allow Hackers to Cause Disruption in Industrial Environments

Vulnerebility

Securityweek
24.4.20 South Korean and US payment card details worth nearly $2M up for sale in the underground BigBrothers Securityaffairs
24.4.20 SeaChange video delivery software solutions provider hit by Sodinokibi ransomware Ransomware Securityaffairs
24.4.20 NSA and ASD issue a report warning of web shells deployments BigBrothers Securityaffairs
24.4.20 Mozilla offers bigger rewards for Firefox flaws under its bug bounty program Vulnerebility Securityaffairs
24.4.20 'VictoryGate' Botnet Infected 35,000 Devices via USB Drives BotNet Securityweek
24.4.20 Apple Finds No Evidence of Attacks Targeting iOS Mail App Vulnerabilities Apple Securityweek
24.4.20 New GreyNoise Service Alerts Organizations of Compromised Networks Security Securityweek
24.4.20 Hoaxcalls Botnet Expands Targets List, DDoS Capabilities BotNet Securityweek
24.4.20 Malicious USB Drives Infect 35,000 Computers With Crypto-Mining Botnet Cryptocurrency Thehackernews
24.4.20

Skype Phishing Attack Targets Remote Workers’ Passwords

Phishing

Threatpost

24.4.20

Valve Confirms CS:GO, Team Fortress 2 Source-Code Leak

Incindent

Threatpost

24.4.20

A Dozen Nation-Backed APTs Tap COVID-19 to Cover Spy Attacks

APT

Threatpost

24.4.20

WHO, CDC and Bill and Melinda Gates Foundation Victims of Credential Dump, Report

Security

Threatpost
24.4.20

Fake Skype, Signal Apps Used to Spread Surveillanceware

Security

Threatpost
24.4.20

Expert identifies new Nazar APT group referenced in 2017 Shadow Brokers leak

APT

Securityaffairs
24.4.20

Vietnam-linked APT32 group launches COVID-19-themed attacks against China

APT

Securityaffairs
24.4.20

Mozilla Offers Bigger Rewards for Firefox Vulnerabilities

Vulnerebility

Securityweek
24.4.20

Malwarebytes Unveils New Privacy VPN Service

Safety

Securityweek
24.4.20

Automated Red Teaming Firm Randori Raises $20 Million

IT

Securityweek
24.4.20

Nazar: Old Iran-Linked APT Operation Monitored by NSA

APT

Securityweek
24.4.20

Vietnamese Hackers Mount COVID-19 Espionage Campaigns Against China

APT

Securityweek
24.4.20

Malicious Excel With a Strong Obfuscation and Sandbox Evasion

Virus

SANS
24.4.20

Five best practices for achieving and maintaining SOC 2 compliance

Security

Net-security
24.4.20

Client-side web security

Security

Net-security
24.4.20

Work-from-home creates multitude of opportunities for leaks

Security

Net-security
24.4.20

The true costs incurred by businesses for technology downtime

Security

Net-security
23.4.20 A look at the ATM/PoS malware landscape from 2017-2019 Virus Securelist
23.4.20 Microsoft issued Out-of-Band advisory to address Autodesk FBX flaws Vulnerebility Securityaffairs
23.4.20 State-sponsored hackers are using COVID-19 lures, Google warns Virus Securityaffairs
23.4.20 Uptick in RPA Software Adoption Reveals Need for Anti-Hacking Training Hacking Securityaffairs
23.4.20 Cybereason Unveils New Mobile Device Security Offerings Security Securityweek
23.4.20 Zoom Announces Better Encryption, Other Security Improvements Crypto Securityweek
23.4.20 Chinese Threat Actor Targets Uyghurs With New iOS Exploit Apple Securityweek
23.4.20 Researchers Turn Antivirus Software Into Destructive Tools Security Securityweek
23.4.20 Zero-Day Vulnerabilities in iOS Mail App Exploited in Targeted Attacks Apple Securityweek
23.4.20 Hackers Trick 3 British Private Equity Firms Into Sending Them $1.3 Million CyberCrime Thehackernews
23.4.20

Web shell malware continues to evade many security tools

Virus

Net-security

23.4.20

Phishers exploiting employees’ layoff, payroll concerns

Exploit  Phishing

Net-security

23.4.20 LA County Hit with DoppelPaymer Ransomware Attack Ransomware

Threatpost

23.4.20 Apple Patches Two iOS Zero-Days Abused for Years Apple

Threatpost

23.4.20 Microsoft Issues Out-Of-Band Security Update For Office, Paint 3D Vulnerebility

Threatpost

23.4.20 Connected Home Hubs Open Houses to Full Remote Takeover Security Threatpost
23.4.20 Fast-Moving DDoS Botnet Exploits Unpatched ZyXel RCE Bug BotNet  Exploit  Vulnerebility

Threatpost

23.4.20 Small Businesses Tapping COVID-19 Loans Hit with Data Exposure Incindent Threatpost
23.4.20 Hacking Apple iPhones and iPads by sending emails to the victims Apple Securityaffairs
23.4.20 COVID-19 – Neo-Nazis spread a list of credentials for Gates Foundation, NIH, and WHO employees Cyber Securityaffairs
23.4.20 Microsoft Out-of-Band Advisory Addresses Autodesk FBX Vulnerabilities Vulnerebility Securityweek
23.4.20 Nation-backed Hackers Tune Attacks to COVID-19 Fears: Google Hacking Securityweek
23.4.20 Zero-Day Warning: It's Possible to Hack iPhones Just by Sending Emails Apple Thehackernews
23.4.20

Let’s be realistic about our expectations of AI

Cyber

Net-security

23.4.20

Massive work-from-home movement exposes cybersecurity weaknesses

Cyber

Net-security

23.4.20

Google unveils secure remote access service to unburden enterprise VPNs

Security

Net-security

23.4.20

With a transition to remote work, network visibility becomes more critical than ever

Security

Net-security

23.4.20

Bad bot traffic increases, comprising almost one quarter of all website traffic

Security

Net-security

23.4.20

Application performance becoming a key concern, influenced by increasing SD-WAN complexity

Security

Net-security

23.4.20

Try the (ISC)2 Utilizing Big Data course – a $200 value – for FREE!

Security

Net-security

22.4.20

What does it take to become a good reverse engineer?

Hacking

Securelist
22.4.20

SAS, sweet SAS

Congress

Securelist
22.4.20

DoppelPaymer Ransomware hits City of Torrance and demands a 680K+ ransom

Ransomware

Securityaffairs
22.4.20

A new Insomnia iOS exploit used to spy on China’s Uyghur minority

Exploit  iOS

Securityaffairs
22.4.20

China-linked Winnti APT targets South Korean Gaming firm

APT

Securityaffairs
22.4.20

SBA Reports Data Breach in Disaster Loan Application Website

Incindent

Securityweek
22.4.20

Flaw Could Have Allowed Hackers to Identify All Zoom Users in a Company

Vulnerebility

Securityweek
22.4.20

Hackers Can Exfiltrate Data From Air-Gapped Computers Via Fan Vibrations

Attack

Securityweek
22.4.20

FBI Official: Number of Coronavirus Cyber Complaints on Rise

BigBrothers

Securityweek
22.4.20

Chinese Hackers Using New iPhone Hack to Spy On Uyghur Muslims

Apple  BigBrothers

Thehackernews
22.4.20

Update MS Office, Paint 3D to plug RCE vulnerabilities

Vulnerebility

Net-security
22.4.20

Multiple vulnerabilities discovered in smart home devices

Vulnerebility

Net-security
22.4.20 NFL Tackles Cybersecurity Concerns Ahead of 2020 Draft Day Cyber

Threatpost

22.4.20 RCE Exploit Released for IBM Data Risk Manager, No Patch Available Exploit

Threatpost

22.4.20 Banking.BR Android Trojan Emerges in Credential-Stealing Attacks Android

Threatpost

22.4.20 Oil and Gas Firms Targeted With Agent Tesla Spyware Virus Threatpost
22.4.20 Cyberattackers Ramp Up to 1.5M COVID-19 Emails Per Day Cyber Threatpost
22.4.20 OpenSSL Project fixed high-severity CVE-2020-1967 DoS issue in OpenSSL Vulnerebility Securityaffairs
22.4.20 Oil and Gas Companies Targeted With Agent Tesla Malware Virus Securityweek
22.4.20 Tax Phishing Campaign Reminds of DMARC Limitations Phishing Securityweek
22.4.20 Spike in Company Compromises Correlates With Lockdowns Incindent Securityweek
22.4.20 ForgeRock Raises $93.5 Million Ahead of IPO IT Securityweek
22.4.20 IBM Tells Researcher It Will Not Patch Serious Data Risk Manager Flaws Vulnerebility Securityweek
22.4.20

Five contingency best practices for SOCs to handle uncertainty

Security

Net-security
22.4.20

Foiling content-borne attacks against a remote workforce

Attack

Net-security
22.4.20

Review: Cybersecurity – Attack and Defense Strategies

Cyber

Net-security
22.4.20

Are businesses prepared for a surge in cybercrime and fraud?

CyberCrime

Net-security
22.4.20

What is the impact of AI and ML tools on cybersecurity?

Cyber

Net-security
22.4.20

Odix is disarming the growing malware threat

Virus

Net-security
21.4.20 Expert discloses 4 zero-days in IBM Data Risk Manager Vulnerebility Securityaffairs
21.4.20 Spearphishing attacks hit the oil and gas industry sector Attack  ICS  Phishing Securityaffairs
21.4.20 How to Protect Against COVID-19 Email Scams Spam Securityaffairs
21.4.20 High-Severity Vulnerability in OpenSSL Allows DoS Attacks Vulnerebility Securityweek
21.4.20 Chinese Hackers Target South Korean Gaming Company BigBrothers Securityweek
21.4.20 High Court to Hear Case About Reach of Computer Hacking Law CyberCrime Securityweek

21.4.20

Microsoft Will Not Patch Security Bypass Flaw Abusing MSTSC Vulnerebility Securityweek
21.4.20 Google Launches Cloud-Based Remote Access Solution Security Securityweek

21.4.20

Google Creates COVID-19 Grant Fund to Boost Bug Hunting Security Securityweek
21.4.20 Researcher Discloses 4 Zero-Day Bugs in IBM's Enterprise Security Software Vulnerebility Thehackernews
21.4.20 Unpatchable 'Starbleed' Bug in FPGA Chips Exposes Critical Devices to Hackers Vulnerebility Thehackernews
21.4.20 Foxit PDF Reader, PhantomPDF Open to Remote Code Execution Vulnerebility

Threatpost

21.4.20 Bitcoin Stealers Hide in 700+ Ruby Developer Libraries Cryptocurrency

Threatpost

21.4.20 Mootbot Botnet Targets Fiber Routers with Dual Zero-Days BotNet

Threatpost

21.4.20 Maze Ransomware Attack Hits Cognizant Ransomware Threatpost
21.4.20 267 Million Facebook identities available for 500 euros on the dark web Incindent Securityaffairs
21.4.20 Threat Report Portugal Q1 2020 CyberCrime Securityaffairs

21.4.20

Law enforcement and Microsoft join forces to dismantle botnet using LED Light Control Console BotNet Securityaffairs
21.4.20 Starbleed: Flaw in FPGA Chips Exposes Safety-Critical Devices to Attacks Attack Securityweek

21.4.20

Coronavirus Crisis Forces Tor Project Layoffs Security Securityweek
21.4.20

SpectX: Log Parser for DFIR

Security

SANS
21.4.20

CISOs: Quantifying cybersecurity for the board of directors

Cyber

Net-security
21.4.20

Top threat detection trends and challenges for cybersecurity professionals

Cyber Net-security
21.4.20

46% of SMBs have been targeted by ransomware, 73% have paid the ransom

Ransomware

Net-security
21.4.20

Phishers exploit Zoom, WebEx brands to target businesses

Phishing

Net-security
21.4.20

COVID-19 affects web traffic and attack trends

Security

Net-security

21.4.20

How Hoxhunt minimizes cybersecurity risks from human error

Cyber

Net-security

20.4.20

US Government concerned by cyber attacks on Czech hospitals during COVID19 crisis BigBrothers Securityaffairs

20.4.20

Proposed government Coronavirus contact tracing app leaked data Incindent Securityaffairs

20.4.20

Uniswap and Lendf.me hacked, attacker stole $25 million worth of cryptocurrency Cryptocurrency Securityaffairs
20.4.20 Patching Pulse Secure VPN Not Enough to Keep Attackers Out, CISA Warns Vulnerebility Securityweek
20.4.20 Pompeo Concerned by Cyber Attacks on Czech Hospitals Attack Securityweek

20.4.20

Massachusetts, Indiana Settle With Equifax Over 2017 Data Breach Incindent Securityweek

20.4.20

LED Light Control Console Abused to Spew Malware Virus Securityweek
20.4.20 Twitter Fails to Obtain Permission to Disclose Surveillance Requests Social Securityweek
20.4.20 Maze Ransomware Caused Disruptions at Cognizant Ransomware Securityweek
20.4.20 COVID-Themed Lures Target SCADA Sectors With Data Stealing Malware ICS Thehackernews

20.4.20

Multi-cloud key management and BYOK

Security

Net-security

20.4.20

Windows 10: Manage Reserved Storage from the command line OS

Bleepingcomputer

20.4.20

Coronavirus Dark Web Scams: From infected blood to ventilators Spam

Bleepingcomputer

20.4.20 IT services giant Cognizant suffers Maze Ransomware cyber attack Ransomware Bleepingcomputer
20.4.20 Windows 10 making it easier to manage default file associations OS

Bleepingcomputer

20.4.20

Tor Project cut a third of its staff due to the Coronavirus Security Securityaffairs

20.4.20

Understanding web security solutions

Security

Net-security
20.4.20

Starbleed vulnerability: Attackers can gain control over FPGAs

Vulnerebility

Net-security
20.4.20

Average bandwidth of DDoS attacks increasing, APIs and applications under attack

Attack

Net-security
20.4.20

Does working remotely actually work?

Security

Net-security
20.4.20

Handbook: Cyber-Risk Oversight 2020

Cyber

Net-security

19.4.20

Ransom News Ransom Ransom

19.4.20

KPOT Analysis: Obtaining the Decrypted KPOT EXE

Virus

SANS
19.4.20 Popular Webkinz World online children’s game hacked, 23M credentials leaked Incindent Securityaffairs
19.4.20 Cyberattack reports quadrupled during Coronavirus outbreak, FBI warns BigBrothers Securityaffairs

19.4.20

Coronavirus-themed attacks April 12 – April 18, 2020 Security Securityaffairs
19.4.20 Are Maze operators behind the attack on the IT services giant Cognizant? Ransomware Securityaffairs
19.4.20

Maldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store

Apple

SANS
19.4.20

Hacker claims to have stolen 39 million Aptoide app store users

Android

Securityaffairs

19.4.20

Coronavirus-themed campaign targets energy sector with PoetRAT

Virus

Securityaffairs
19.4.20

Trickbot is the most prolific malware operation using COVID-19 themed lures

BotNet  Virus

Securityaffairs

19.4.20

The New Front in Hospitals’ Battle Against COVID-19: Ransomware Ransomware blog Sonicwall
19.4.20 ‘Boundless Cybersecurity’ Protects Organizations Mobilizing for the New Business Normal Cyber blog Sonicwall
19.4.20 US Consumers lose over $13M in COVID-19 scams Spam blog Avast blog

19.4.20

Malicious Attackers Target Government and Medical Organizations With COVID-19 Themed Phishing Campaigns Malware blog   Phishing blog Palo Alto Unity42
19.4.20 APT41 Using New Speculoos Backdoor to Target Organizations Globally APT blog Palo Alto Unity42
19.4.20 GuLoader: Malspam Campaign Installing NetWire RAT Malware blog Palo Alto Unity42
19.4.20 Manage A Remote SOC: Shift Management Tips Cyber blog

Palo Alto

19.4.20 Cloud Security 2021: 4 Key Trends You Shouldn’t Miss Cyber blog

Palo Alto

19.4.20

Working from Home During COVID-19: Secure Access for Remote Workers Cyber blog

Palo Alto

19.4.20 Book Review: “Black Box Thinking” Cyber blog

Palo Alto

19.4.20 The Rush to Video Conferencing – Are We Failing to Use Good Cyber Hygiene?... Cyber blog Palo Alto
19.4.20 Securing US Federal Agency Remote Workers and Branch Offices Cyber blog

Palo Alto

19.4.20

Book Review: “Black Box Thinking” Cyber blog Palo Alto
19.4.20 The Rush to Video Conferencing – Are We Failing to Use Good Cyber Hygiene?... Cyber blog

Palo Alto

19.4.20 Securing US Federal Agency Remote Workers and Branch Offices Cyber blog Palo Alto

19.4.20

US govt: Hacker used stolen AD credentials to ransom hospitals BigBrothers  Ransomware

Bleepingcomputer

19.4.20 Microsoft: Trickbot in hundreds of unique COVID-19 lures per week BotNet

Bleepingcomputer

19.4.20 Leading accounting firm MNP hit with cyberattack Attack Bleepingcomputer
19.4.20 Microsoft helped stop a botnet controlled via an LED light console BotNet

Bleepingcomputer

19.4.20 GitHub accounts stolen in ongoing phishing attacks Incindent  Phishing

Bleepingcomputer

19.4.20

Windows 10 2004 almost here, final build released to Insiders! OS

Bleepingcomputer

19.4.20 Fake Valorant beta key generators are stealing gamers' passwords Virus

Bleepingcomputer

19.4.20 Hackers steal WiFi passwords using upgraded Agent Tesla malware Virus

Bleepingcomputer

19.4.20 Gmail blocked 18M COVID-19-themed phishing emails in a week Phishing

Bleepingcomputer

19.4.20 Zoom to let you report Zoom-bombing attackers crashing meetings Attack

Bleepingcomputer

19.4.20

Windows Defender broken by recent updates, how to fix OS

Bleepingcomputer

19.4.20 Nemty Ransomware shuts down public RaaS operation, goes private Ransomware

Bleepingcomputer

19.4.20 US issues guidance on North Korean hackers, offers $5M reward BigBrothers

Bleepingcomputer

19.4.20 Exploit for Zoom Windows zero-day being sold for $500,000 Exploit

Bleepingcomputer

19.4.20 Cloudflare dashboard and APIs are down, some sites having issues Safety Bleepingcomputer

18.4.20

Microsoft Office security updates may break VBA programs, how to fix OS

Bleepingcomputer

18.4.20

Microsoft Office April security updates fix critical RCE bugs OS

Bleepingcomputer

18.4.20

Intel April Platform Update fixes high severity security issues Vulnerebility Bleepingcomputer

18.4.20

Microsoft April 2020 Patch Tuesday fixes 3 zero-days, 15 critical flaws OS

Bleepingcomputer

18.4.20

RagnarLocker ransomware hits EDP energy giant, asks for €10M Ransomware

Bleepingcomputer

18.4.20

Windows 10 Cumulative Updates KB4549951 & KB4549949 Released OS

Bleepingcomputer

18.4.20

Microsoft delays end of support for older Windows, software versions OS

Bleepingcomputer

18.4.20

FBI warns of ongoing COVID-19 scams targeting govt, health care BigBrothers

Bleepingcomputer

18.4.20

Russian hackers tried to steal San Francisco airport Windows accounts BigBrothers

Bleepingcomputer

18.4.20

Google reenables FTP support in Chrome due to pandemic Security

Bleepingcomputer

18.4.20

US consumers report $12M in COVID-19 scam losses since January Spam

Bleepingcomputer

18.4.20

Cloudflare drops Google's reCAPTCHA due to privacy concerns Safety

Bleepingcomputer

18.4.20

Over 500,000 Zoom accounts sold on hacker forums, the dark web Incindent

Bleepingcomputer

18.4.20

Microsoft Outlook outage affecting Australians since Saturday BigBrothers

Bleepingcomputer

18.4.20

Credit card thieves target WooCommerce sites with new skimmer CyberCrime Bleepingcomputer

18.4.20

INCIDENT RESPONSE: DON’T LET THAT DATA AGE-OUT Incident blog Cybereason

18.4.20

What is Cross-Site Scripting (XSS)? Hacking blog F5 Labs

18.4.20

Four Risks to Consider with Expanded VPN Deployments Cyber blog F5 Labs

18.4.20

Limited Shifts in the Cyber Threat Landscape Driven by COVID-19 Cyber blog

FireEye

18.4.20

Think Fast: Time Between Disclosure, Patch Release and Vulnerability Exploitation — Intelligence for Vulnerability Management, Part Two Vulnerebility blog

FireEye

18.4.20

Ransomware Evolved: Double Extortion Ransomware blog Checkpoint

18.4.20

Threat Actors Migrating to the Cloud Security blog Checkpoint

18.4.20

PoetRAT: Python RAT uses COVID-19 lures to target Azerbaijan public and private sectors Malware blog Cisco Talos

18.4.20

Vulnerability Spotlight: Information disclosure vulnerability in Microsoft Media Foundation Vulnerebility blog Cisco Talos

18.4.20

Microsoft Patch Tuesday — April 2020: Vulnerability disclosures and Snort coverage Vulnerebility blog Cisco Talos

18.4.20

Quarterly Report: Incident Response trends in Spring 2020 Incident blog Cisco Talos

18.4.20

Scams, lies, and coronavirus Spam blog

Eset

18.4.20

Apple releases mobility data to help combat COVID‑19 Cyber blog

Eset

18.4.20

Half a million Zoom accounts for sale on the dark web Incident blog

Eset

18.4.20

Americans report US$13 million in losses from coronavirus scams Spam blog Eset

18.4.20

Is “global privacy” an oxymoron? Cyber blog Eset

18.4.20

Attacks on Linksys Routers Trigger Mass Password Reset Attack

Threatpost

18.4.20

Hackers Update Age-Old Excel 4.0 Macro Attack Attack

Threatpost

18.4.20

Zoom Bombing Attack Hits U.S. Government Meeting BigBrothers

Threatpost

18.4.20

DHS Urges Pulse Secure VPN Users To Update Passwords BigBrothers Threatpost

18.4.20

Experts shed the light on the mysterious critical VMware vCenter Server issue Vulnerebility Securityaffairs

18.4.20

Cisco addresses critical issues in IP Phones and UCS Director Vulnerebility Securityaffairs

18.4.20

A Brand New Ursnif/ISFB Campaign Targets Italian Organizations Virus Securityaffairs

18.4.20

Hackers Targeting Azerbaijan Show Interest in SCADA Systems BigBrothers Securityweek

18.4.20

Several Botnets Using Zero-Day Vulnerability to Target Fiber Routers BotNet  Vulnerebility Securityweek

18.4.20

Google Sees Millions of COVID-19-Related Malicious Emails Daily Virus Securityweek

18.4.20

Ad Fraud Operation Accounted for Large Amount of Connected TV Traffic Incindent Securityweek

17.4.20

Gmail blocked 18 Million phishing and malware emails using COVID-19 lures in a week

Phishing

Securityaffairs

17.4.20

Mastering Communication in Cyber Intelligence Activities: A Concise User Guide

Cyber

Securityaffairs

17.4.20

Syria-linked APT group SEA targets Android users with COVID19 lures

APT

Securityaffairs

17.4.20

DHS Working on Cloud-based Root-of-Trust to Secure Agency Email on Mobile Devices

BigBrothers

Securityweek
17.4.20

GitHub Shares Details on Six Chrome Vulnerabilities

Vulnerebility

Securityweek
17.4.20

GitHub Warns Users of Sophisticated Phishing Campaign

Phishing

Securityweek
17.4.20

Financial Phishing Jumped to 51% of All Phishing in 2019: Kaspersky

Phishing

Securityweek
17.4.20

CISA Warns Patched Pulse Secure VPNs Could Still Expose Organizations to Hackers

Vulnerebility

Thehackernews

17.4.20

Weaponized RTF Document Generator & Mailer in PowerShell

Security

SANS

17.4.20

760+ malicious packages found typosquatting on RubyGems

Virus

Net-security

17.4.20

AA20-107A : Continued Threat Actor Exploitation Post Pulse Secure VPN Patching CERT CERT

17.4.20

Shipping giant MSC discloses a malware-based attack Attack  Virus Securityaffairs
17.4.20 Hunting the coronavirus in the dark web – A month later Cyber Securityaffairs
17.4.20 Cisco Patches Critical Flaws in IP Phones, UCS Director Vulnerebility Securityweek
17.4.20 Zoom Rolls Out New Measures as Security Fears Mount Security Securityweek
17.4.20 Details Released for Flaw Allowing Full Control Over VMware Deployments Vulnerebility Securityweek
17.4.20 'Not a Safe Platform': India Bans Zoom for Government Use BigBrothers Securityweek
17.4.20 Double Extortion: Ransomware's New Normal Combining Encryption with Data Theft Ransomware Securityweek
17.4.20 Zoom Revamps Bug Bounty Program Security Securityweek

17.4.20

Using AppLocker to Prevent Living off the Land Attacks

Attack

SANS
17.4.20

Office printers: The ticking IT time bomb hiding in plain sight

Security

Net-security
17.4.20

Surge in remote working reveals concerns around unprotected endpoints

Security

Net-security
17.4.20

What type of data is trending on the dark web?

Security

Net-security
17.4.20

Researchers develop self-healing and self-concealing PUF for hardware security

Security

Net-security
17.4.20

Using Cisco IP phones? Fix these critical vulnerabilities

Vulnerebility

Net-security

16.4.20

Financial Cyberthreats in 2019 CyberCrime Securelist
16.4.20 Linksys force password reset to prevent Router hijacking Hacking Securityaffairs
16.4.20 U.S. offers up to $5 Million rewards for info on North Korea-linked operations BigBrothers Securityaffairs
16.4.20 Pentagon Paid Out $290,000 for Vulnerabilities in Air Force Data Center BigBrothers Securityweek
16.4.20 Syrian Hackers Target Mobile Users With COVID-19 Lures Mobil Securityweek

16.4.20

Shipping Giant MSC Confirms Outage Caused by Malware Attack Virus Securityweek
16.4.20 Linksys Prompts Password Reset to Prevent Router Hacking Hacking Securityweek
16.4.20 Over 700 Malicious Typosquatted Libraries Found On RubyGems Repository Virus Thehackernews

16.4.20

Intel Fixes High-Severity Flaws in NUC, Discontinues Buggy Compute Module Vulnerebility

Threatpost

16.4.20 PPE, COVID-19 Medical Supplies Targeted by BEC Scams Spam

Threatpost

16.4.20 Malicious Google Web Extensions Harvest Cryptowallet Secrets Cryptocurrency

Threatpost

16.4.20 Taxpayers Targeted With Improved NetWire RAT Variant Virus Threatpost
16.4.20 Tencent Ups Top Bug-Bounty Award to $15K Security Threatpost

16.4.20

Hackers are again attacking Portuguese banking organizations via Android Trojan-Banker Android Securityaffairs
16.4.20 A zero-day exploit for Zoom Windows RCE offered for $500,000 Exploit Securityaffairs
16.4.20 Coronavirus-themed attack: Experts uncovered flight refund scam Spam Securityaffairs
16.4.20 SAP's April 2020 Security Updates Patch Five Critical Vulnerabilities Vulnerebility Securityweek
16.4.20 Digital.ai Launches With Software Development and Security Platform Security Securityweek

16.4.20

North Korean Threat Actors Acted as Hackers-for-Hire, Says U.S. Government BigBrothers Securityweek
16.4.20 Breach-and-Attack Simulation Firm SafeBreach Raises $19 Million IT Securityweek
16.4.20 How to transform your revolutionary idea into a reality: $100K Nokia Bell Labs Prize IT Thehackernews
16.4.20 U.S. Offers Rewards up to $5 Million for Information on North Korean Hackers BigBrothers Thehackernews
16.4.20

On my mind: Transitioning to third-party cloud services

Security

Net-security
16.4.20

Information security goes non-binary

Security Net-security
16.4.20

Phishing kits: The new bestsellers on the underground market

Phishing

Net-security
16.4.20

Challenges companies face when implementing digital transformation initiatives

Security

Net-security
16.4.20

US victims lose $13 million from COVID-19-related scams

Spam

Net-security

15.4.20

Guidance on the North Korean Cyber Threat CERT CERT

15.4.20

No IOCs? No Problem! Getting a Start Hunting for Malicious Office Files

Virus

SANS
15.4.20

Google removed 49 Chrome Extensions that were hijacking cryptocurrency wallets

Cryptocurrency

Securityaffairs
15.4.20

Meet AttackerKB, Rapid7's Crowdsourced Vulnerability Knowledge Base

Security

Securityweek
15.4.20

How to Steer Your Security Organization in a Toxic Environment

Security

Securityweek

15.4.20

Attack on San Francisco Airport Linked to Russian Hackers

APT

Securityweek
15.4.20

Network Traffic Analysis Firm Awake Security Raises $36 Million

IT

Securityweek
15.4.20

Oracle's April 2020 Critical Patch Update Brings 397 Security Fixes

Vulnerebility

Securityweek
15.4.20

GAO Criticizes Pentagon Over Cyber Hygiene Efforts

BigBrothers

Securityweek
15.4.20 How much is the phish? Underground market of phishing kits is booming – Group-IB Phishing Securityaffairs
15.4.20 Russia-linked Energetic Bear APT behind San Francisco airport attacks APT Securityaffairs
15.4.20 Identity Verification Provider Onfido Raises $100 Million IT Securityweek
15.4.20 49 New Google Chrome Extensions Caught Hijacking Cryptocurrency Wallets Cryptocurrency Thehackernews

15.4.20

Microsoft offers free threat notification service to healthcare, human rights organizations

Security

Net-security

15.4.20

Microsoft April 2020 Patch Tuesday

OS

SANS
15.4.20 Microsoft addresses three Windows issues actively exploited Exploit  Vulnerebility Securityaffairs
15.4.20 Adobe addresses five issues in ColdFusion, After Effects, Digital Editions Vulnerebility Securityaffairs
15.4.20 Crooks target Healthcare facilities involved in Coronavirus containment with Ransomware Ransomware Securityaffairs
15.4.20 Tencent Partners With HackerOne for Bug Bounty Program Security Securityweek
15.4.20 Windows Vulnerabilities Exploited for Code Execution, Privilege Escalation Vulnerebility Securityweek
15.4.20 Adobe Patches Flaws in ColdFusion, After Effects, Digital Editions Vulnerebility Securityweek
15.4.20 Google Keeps Support for FTP in Chrome Security Securityweek
15.4.20 Credentials of 4 Million Quidd Users Found on Dark Web Incindent Securityweek
15.4.20 Microsoft Issues Patches for 4 Bugs Exploited as Zero-Day in the Wild OS Thehackernews
15.4.20

Microsoft April 2020 Patch Tuesday

OS

SANS
15.4.20

Application security: Getting it right, from the start

Security

Net-security

15.4.20

Cybersecurity in a remote workplace: A joint effort

Cyber

Net-security

15.4.20

Are we doing enough to protect connected cars?

Safety

Net-security

15.4.20

Zoom in crisis: How to respond and manage product security incidents

Incindent

Net-security

15.4.20

April 2020 Patch Tuesday: Microsoft fixes four actively exploited vulnerabilities

Vulnerebility

Net-security

15.4.20

Will Zoom manage to retain security-conscious customers?

Security

Net-security

14.4.20

4 Million Quidd account details shared on hacking forums

Incindent

Securityaffairs
14.4.20

FTC says $12 million were lost due to Coronavirus-related scams

Spam

Securityaffairs
14.4.20

Siemens Industrial Devices Affected by 'SegmentSmack' Linux Kernel Flaw

ICS

Securityweek
14.4.20

Fingerprint-Exposing Flaw in OnePlus 7 Phone Highlights TEE Issues

Vulnerebility

Securityweek
14.4.20

Silicon Valley Legends Launch Beyond Identity in Quest to Eliminate Passwords

Security

Securityweek
14.4.20

Backup or Disaster Recovery for Protection Against Ransomware?

Ransomware

Securityweek
14.4.20

SCUF Gaming Exposes Data on 1.1 Million Customers

Incindent

Securityweek
14.4.20

Dell Releases A New Cybersecurity Utility To Detect BIOS Attacks

Safety

Thehackernews
14.4.20

Hackers Targeting Critical Healthcare Facilities With Ransomware During Coronavirus Pandemic

Ransomware

Thehackernews
14.4.20

VMware plugs critical flaw in vCenter Server, patch ASAP!

Vulnerebility

Net-security
14.4.20

Oracle Tackles a Massive 405 Bugs for Its April Quarterly Patch Update

Vulnerebility

Threatpost

14.4.20

Overlay Malware Leverages Chrome Browser, Targets Banks and Heads to Spain

Virus

Threatpost

14.4.20

500,000+ Zoom accounts available for sale on the Dark Web

Incindent

Securityaffairs
14.4.20

Apple and Google join forces to develop Contact Tracing app against Coronavirus

Apple

Securityaffairs
14.4.20

Zscaler to Acquire Cloudneeti to Solve Cloud Misconfiguration Problems

Security

Securityweek
14.4.20

The dangers of assumptions in security

Security

Net-security

14.4.20

GDPR, CCPA and beyond: How synthetic data can reduce the scope of stringent regulations

Privacy

Net-security

14.4.20

Shift to work-from-home: Most IT pros worried about cloud security

Security

Net-security

14.4.20

A worrisome increase in call traffic from fraudsters exploiting the pandemic

Exploit

Net-security

14.4.20

New lower pricing for CISSP, CCSP and SSCP online instructor-led training

Security

Net-security

13.4.20 The Dutch police took down 15 DDoS-for-hire services in a week Attack  BigBrothers Securityaffairs

13.4.20

Danish pump maker DESMI reveals cyber attack Attack Securityaffairs

13.4.20

San Francisco International Airport Discloses Data Breach Incindent Securityweek

13.4.20

Dutch Police Arrest Man Over DDoS Attack on Government Website BigBrothers  Crime Securityweek

13.4.20

SEC Settles With Two Traders Charged in EDGAR Hacking Case Hacking Securityweek
13.4.20

Look at the same phishing campaign 3 months apart

Phishing

SANS

13.4.20

Sodinokibi Ransomware crew chooses Monero for ransom payments Ransomware Securityaffairs

13.4.20

Thousands Zoom credentials available on a Dark Web forum CyberCrime Securityaffairs

13.4.20

Coronavirus-themed attacks April 05 – April 11, 2020 Security Securityaffairs

13.4.20

A new e-skimmer found on WordPress site using the WooCommerce plugin CyberCrime Securityaffairs

13.4.20

Apple and Google Team Up on Virus 'Contact Tracing' by Smartphone Apple Securityweek

13.4.20

Reader Analysis: "Dynamic analysis technique to get decrypted KPOT Malware."

Virus

SANS

13.4.20

When your laptop is your workspace, the real office never closes

Security

Net-security

13.4.20

Small businesses unprepared for remote working, most don’t provide cybersecurity training

Security

Net-security

13.4.20

You have to consider cybersecurity at all points of a cloud migration

Security

Net-security

12.4.20 New Wiper Malware impersonates security researchers as prank Virus

Bleepingcomputer

12.4.20 Sodinokibi Ransomware to stop taking Bitcoin to hide money trail Ransomware

Bleepingcomputer

12.4.20 Windows 10: The new hidden features found in preview builds OS Bleepingcomputer
12.4.20 Windows Defender incorrectly flagged Winaero Tweaker as HackTool OS

Bleepingcomputer

12.4.20 YouTube borked when users enable Firefox anti-fingerprinting Privacy

Bleepingcomputer

12.4.20 Windows 10X: Latest news and info on Microsoft's upcoming OS OS

Bleepingcomputer

12.4.20 VMWare releases fix for critical vCenter Server vulnerability Vulnerebility

Bleepingcomputer

12.4.20 San Francisco Intl Airport discloses data breach after hack Incindent

Bleepingcomputer

12.4.20 Dutch police arrests suspect behind DDoS attacks on government sites BigBrothers

Bleepingcomputer

12.4.20 Large email extortion campaign underway, DON'T PANIC! Spam

Bleepingcomputer

12.4.20 Ransom News Ransom Ransom
124.20 US wants to ban China Telecom over national cybersecurity risks BigBrothers

Bleepingcomputer

12.4.20 The Sandboxie Windows sandbox isolation tool is now open-source! OS

Bleepingcomputer

12.4.20 Over 3.6M users installed iOS fleeceware from Apple’s App Store Apple

Bleepingcomputer

12.4.20 Leak shows Windows 10 2004 could come as 'May 2020 Update' OS Bleepingcomputer
12.4.20 Visa urges merchants to migrate e-commerce sites to Magento 2.x CyberCrime

Bleepingcomputer

12.4.20 Travelex Reportedly Paid $2.3 Million Ransom to Restore Operations Ransomware

Bleepingcomputer

12.4.20 Phishing emails impersonate the White House and VP Mike Pence Phishing

Bleepingcomputer

12.4.20 New IoT botnet launches stealthy DDoS attacks, spreads malware BotNet  IoT

Bleepingcomputer

12.4.20 Hackers struggle morally and economically over Coronavirus Hacking

Bleepingcomputer

12.4.20 Windows 10 will list unused files and apps you can remove OS

Bleepingcomputer

12.4.20 Windows 10 is testing WSL Linux integration in File Explorer OS

Bleepingcomputer

12.4.20 Zoom removes meeting IDs from client title bar to boost security Security

Bleepingcomputer

12.4.20 Microsoft: No surge in malicious attacks, only more COVID-19 lures Virus

Bleepingcomputer

12.4.20 fox now tells Mozilla what your default browser is every day Security

Bleepingcomputer

12.4.20 Zoom creates council of CISOs to solve security, privacy issues Privacy

Bleepingcomputer

12.4.20

SonicWall Unveils Partner Program Designed for MSSPs

Safety blog

Sonicwall
12.4.20

The New Front in Hospitals’ Battle Against COVID-19: Ransomware

Ransomware blog

Sonicwall
12.4.20

Remote workers targeted for cyberattacks

Attack blog

Avast blog
12.4.20

Prisma Cloud Helps 3-GIS Secure AWS Workloads

Cyber blog

Palo Alto

12.4.20

Book Review: “Design for How People Think”

Cyber blog

Palo Alto

12.4.20

How DNS Security Helps Secure Your Remote Workforce

Cyber blog

Palo Alto

12.4.20

How to Protect Against Cyberattacks When Working from Home During COVID-19

Cyber blog

Palo Alto

12.4.20

Helping Companies Meet US Government Guidance on Securing Remote Workforces

Cyber blog

Palo Alto
12.4.20 SFO discloses data breach following the hack of 2 of its websites Incindent Securityaffairs
12.4.20 Hackers accessed staff mailboxes at Italian bank Monte dei Paschi Security Securityaffairs
12.4.20 Fake Cisco ‘Critical Update’ used in phishing campaign to steal WebEx credentials Phishing Securityaffairs
12.4.20 Google and Apple Plan to Turn Phones into COVID-19 Contact-Tracking Devices BigBrothers Thehackernews
12.4.20 Wireshark 3.2.3 Released: Mac Users Pay Attention Please Safety SANS
11.4.20 Microsoft releases April 2020 Office updates with crash fixes OS

Bleepingcomputer

11.4.20

Microsoft and Google postpone insecure authentication removal OS

Bleepingcomputer

11.4.20

Chrome 81 Released With 32 Security Fixes and Web NFC API Safety

Bleepingcomputer

11.4.20

NASA under 'significantly increasing' hacking, phishing attacks Hacking  Phishing Bleepingcomputer

11.4.20

Drug testing firm sends data breach alerts after ransomware attack Ransomware

Bleepingcomputer

11.4.20

Firefox 75 released with Windows 10 performance improvements Safety

Bleepingcomputer

11.4.20

Microsoft buys corp.com to prevent Windows account hijacking Hacking

Bleepingcomputer

11.4.20

BEC gift card scams switch to online stores due to pandemic Spam

Bleepingcomputer

11.4.20

Scammers target Australians financially affected by pandemic Spam

Bleepingcomputer

11.4.20

80% of all exposed Exchange servers still unpatched for critical flaw Vulnerebility

Bleepingcomputer

11.4.20

Microsoft script installs Folding@Home in Windows 10's Sandbox IT

Bleepingcomputer

11.4.20

FBI warns again of BEC scammers exploiting cloud email services Exploit  Spam

Bleepingcomputer

11.4.20

PSA: Fake Zoom installers being used to distribute malware Virus

Bleepingcomputer

11.4.20

Interpol: Ransomware attacks on hospitals are increasing Ransomware

Bleepingcomputer

11.4.20

New Microsoft Edge features will make you more productive OS

Bleepingcomputer

11.4.20

Microsoft Edge is now 2nd most popular desktop browser, beats Firefox OS

Bleepingcomputer

11.4.20

3 STRAIGHTFORWARD WAYS TO BUILD A SOC

Security blog

Cybereason

11.4.20

PERSPECTIVES ON MAINTAINING SECURE BUSINESS CONTINUITY: A GUIDE

Security blog

Cybereason

11.4.20

CORONAVIRUS PANIC, SECURITY, AND YOU

Security blog

Cybereason

11.4.20

INSIGHTS FROM A FIRESIDE CHAT ON RANSOMWARE, CLOUD ADOPTION, & CISOS

Ransomware blog

Cybereason

11.4.20

MalBus Actor Changed Market from Google Play to ONE Store

Malware blog

Mcafee blog

11.4.20

Transitioning to a Mass Remote Workforce – We Must Verify Before Trusting

Security blog

Mcafee blog

11.4.20

COVID-19 Threat Update – now includes Blood for Sale

Security blog

Mcafee blog

11.4.20

Thinking Outside the Bochs: Code Grafting to Unpack Malware in Emulation

Malware blog

FireEye

11.4.20

Zero-Day Exploitation Increasingly Demonstrates Access to Money, Rather than Skill — Intelligence for Vulnerability Management, Part One

Exploit blog

FireEye

11.4.20

COVID-19 goes mobile: Coronavirus malicious applications discovered

Malware blog

Checkpoint

11.4.20

Threat Actors Migrating to the Cloud

Security blog

Checkpoint

11.4.20

Fingerprint cloning: Myth or reality?

Security blog

Cisco Talos

11.4.20

Zoom security: Getting the settings right

Security blog

Eset

11.4.20

Ever needed a Zoom password? Probably not. But why not?

Security blog

Eset

11.4.20

Top tips for videoconferencing security

Security blog

Eset

11.4.20

600,000 people affected in email provider breach

Incident blog

Eset

11.4.20

What to do you if your phone is lost or stolen

Hardware blog

Eset

11.4.20

Critical Vuln in vCenter vmdir (CVE-2020-3952)

Vulnerebility

SANS

11.4.20

Apple, Google Team on Coronavirus Tracking – Sparking Privacy Fears

Apple

Threatpost

11.4.20

Critical VMware Bug Opens Up Corporate Treasure to Hackers

Vulnerebility

Threatpost

11.4.20

WooCommerce Falls to Fresh Card-Skimmer Malware

Virus

Threatpost

11.4.20

Compromised Zoom Credentials Swapped in Underground Forums

Incindent

Threatpost

11.4.20

SFO Websites Hacked: Airport Discloses Data Breach

Incindent

Threatpost

11.4.20

Apple App Store Riddled With Money-Sucking Fleeceware Apps

Apple

Threatpost

11.4.20

Travelex Pays $2.3M in Bitcoin to Hackers Who Hijacked Network in January

Cryptocurrency

Threatpost

10.4.20

Sophos Sandboxie is now available as an open-source tool Safety Securityaffairs
10.4.20 CVE2020-3952 flaw could allow attackers to hack VMware vCenter Server Vulnerebility Securityaffairs
10.4.20 Hacker stole $250K from decentralized Bitcoin exchange Bisq Cryptocurrency Securityaffairs
10.4.20 DoppelPaymer crew leaked internal confidential documents belonging to aerospace companies Incindent Securityaffairs
10.4.20 Tails OS version 4.5 supports the Secure Boot Safety Securityaffairs
10.4.20 SASE Firm Cato Networks Raises $77 Million IT Securityweek
10.4.20 Data Governance Startup Okera Raises $15 Million in Series B Funding IT Securityweek
10.4.20 Sophos Releases Sandboxie in Open Source Safety Securityweek
10.4.20 Zoom Credentials Database Available on Dark Web Incindent Securityweek
10.4.20 New Dell Utility Alerts Security Teams of BIOS Attacks Attack Securityweek
10.4.20 Drones Take Italians' Temperature and Issue Fines BigBrothers Securityweek
10.4.20 Hackers Can Compromise VMware vCenter Server Via Newly Patched Flaw Vulnerebility Securityweek
10.4.20 US Threatens to Block China Telecom From American Market BigBrothers Securityweek
10.4.20 RigUp Database Exposed 76,000 Files From U.S. Energy Sector Incindent Securityweek
10.4.20 Botnet Targets Critical Vulnerability in Grandstream Appliance BotNet  Vulnerebility Securityweek

10.4.20

Beware of fake COVID-19-themed emails from President Trump

BigBrothers

Net-security

10.4.20

PowerShell Sample Extracting Payload From SSL

Crypto

SANS
10.4.20

April 2020 Patch Tuesday forecast: Uncertainty reigns, but patching endures through pandemic

Vulnerebility

Net-security

10.4.20

Cisco ‘Critical Update’ Phishing Attack Steals Webex Credentials

Phishing

Threatpost

10.4.20

Zoom Taps Ex-Facebook CISO Amid Security Snafus, Lawsuit

Social

Threatpost

10.4.20

‘Unbreakable’ Smart Lock Draws FTC Ire for Deceptive Security Claims

BigBrothers

Threatpost

10.4.20

Cloudflare Axes Google reCAPTCHA Due to Privacy, Price

Privacy

Threatpost
10.4.20

Unique P2P Architecture Gives DDG Botnet ‘Unstoppable’ Status

BotNet

Threatpost

10.4.20

Copycat Site Serves Up Raccoon Stealer

Virus

Threatpost
10.4.20

Travelex paid $2.3 Million ransom to restore after a ransomware attack

Ransomware

Securityaffairs
10.4.20

Google and Mozilla address serious flaws in Firefox and Chrome browsers

Vulnerebility

Securityaffairs
10.4.20

Data Privacy Firm Privitar Raises $80 Million in Series C Funding Round

IT

Securityweek
10.4.20

COVID-19 Lures Only a Fraction of Daily Phishing Emails

Phishing

Securityweek
10.4.20

Bugcrowd Raises $30 Million in Series D Funding Round

IT

Securityweek
10.4.20

Performing deception to OS Fingerprint (Part 1: nmap)

Security

SANS
10.4.20

10 considerations in order to ensure business continuity for PKI

Crypto

Net-security

10.4.20

Enterprises regard the cloud as critical for innovation, but struggle with security

Security

Net-security

10.4.20

Cybercriminals capitalize on COVID-19 fears, push shady websites, pharmaceuticals

CyberCrime

Net-security
9.4.20

Phishers prefer Tesla, top 3 malware strains in Coronavirus phishing campaigns

Phishing

Securityaffairs
9.4.20

German foreign ministry limits the use of Zoom over security concerns

BigBrothers

Securityaffairs
9.4.20

Less than 2% of all daily malspam are Coronavirus-themed attacks, Microsoft reports

Attack

Securityaffairs
9.4.20

Avast Launches Security-Focused Browser for Android

Android

Securityweek
9.4.20

Zoom Working on Security Improvements Amid More Bans

Security

Securityweek
9.4.20

Potent 'dark_nexus' IoT Botnet Emerges

BigBrothers  IoT

Securityweek
9.4.20

US, Britain Warn That Hackers Increasingly Use Coronavirus Bait

BigBrothers

Securityweek
9.4.20

Serious Vulnerabilities Patched in Chrome, Firefox

Vulnerebility

Securityweek

9.4.20

7 Ways Hackers and Scammers Are Exploiting Coronavirus Panic

Exploit  Spam

Thehackernews
9.4.20

Video conferencing for teams and consumers: What is the right choice for you?

Security

Net-security
9.4.20

AA20-099A : COVID-19 Exploited by Malicious Cyber Actors

CERT

CERT
9.4.20

‘Fake Fingerprints’ Bypass Scanners with 3D Printing

Vulnerebility

Threatpost

9.4.20

PowerPoint ‘Weakness’ Opens Door to Malicious Mouse-Over Attack

Virus

Threatpost

9.4.20

WhatsApp Axes COVID-19 Mass Message Forwarding

Social

Threatpost

9.4.20

ThreatList: Skype-Themed Apps Hide a Raft of Malware

Security

Threatpost
9.4.20

Dark_Nexus Botnet Compromises Thousands of ASUS, D-Link Routers

BotNet

Threatpost
9.4.20

China-Linked Hackers Systematically Targeted Linux Servers for Years

APT

Securityweek
9.4.20

Accenture Acquires Critical Infrastructure Protection Firm Revolutionary Security

Safety

Securityweek
9.4.20

Vulnerabilities in B&R Automation Software Facilitate Attacks on ICS Networks

ICS

Securityweek
9.4.20

Know thy enemy: The evolving behaviors of today’s cybercriminals

CyberCrime

Net-security

9.4.20

What do CISOs want from cybersecurity vendors right now?

Security

Net-security

9.4.20

Third-party risk is broken, businesses unprepared for supply chain disruptions

Security

Net-security

9.4.20

APT attacks targeting Linux, Windows and Android remained undetected for nearly a decade

APT

Net-security

9.4.20

Pandemic driving global e-commerce growth, but fraud is on the increase too

Security

Net-security
8.4.20 Spam and phishing in 2019 Phishing  Spam Securelist
8.4.20 NASA warns of a significant increase in cyber attacks during Coronavirus outbreak Cyber Securityaffairs
8.4.20 NSO CEO claims Facebook wanted NSO surveillance tool to spy on users Social Securityaffairs
8.4.20 Dark Nexus, a new IoT botnet that targets a broad range of devices BotNet  IoT Securityaffairs
8.4.20 WhatsApp new policy limits forwarding of viral messages Social Securityaffairs
8.4.20 Maze ransomware gang discloses data from drug testing firm HMR Ransomware Securityaffairs
8.4.20 Cisco Research Shows High Success Rate in Bypassing Fingerprint Authentication Vulnerebility Securityweek
8.4.20 NASA Sees Increase in Cyberattacks During Coronavirus OutbreakHackers' New Target During Pandemic: Video Conference Calls Cyber Securityweek
8.4.20 Internet Overseers Seek Crackdown on Coronavirus Website Scams Spam Securityweek
8.4.20 Security, Privacy Issues Found in Government COVID-19 Mobile Apps Mobil Securityweek
8.4.20 Dark Nexus: A New Emerging IoT Botnet Malware Spotted in the Wild BotNet  IoT Thehackernews
8.4.20

Actively exploited MS Exchange flaw present on 80% of exposed servers

Exploit

Net-security
8.4.20 Official Government COVID-19 Apps Hide a Raft of Threats Security

Threatpost

8.4.20 xHelper: The Russian Nesting Doll of Android Malware Android

Threatpost

8.4.20 FIN6 and TrickBot Combine Forces in ‘Anchor’ Attacks CyberCrime

Threatpost

8.4.20 Serious Exchange Flaw Still Plagues 350K Servers Vulnerebility Threatpost
8.4.20 xHelper, the Unkillable Android malware that re-Installs after factory reset Android Securityaffairs
8.4.20 Increase in Exploited Zero-Days Shows Broader Access to Vulnerabilities Vulnerebility Securityweek
8.4.20 Free Security Tools, Resources Offered During Coronavirus Outbreak Security Securityweek
8.4.20 Enterprise Content Firewall Provider Accellion Raises $120 Million IT Securityweek
8.4.20 How Has the Coronavirus Pandemic Impacted Cybersecurity Professionals? Cyber Securityweek
8.4.20

German malspam pushes ZLoader malware

Spam  Virus

SANS
8.4.20

Cybersecurity during the pandemic: Try these security solutions for free!

Cyber

Net-security

8.4.20

Radio frequency: An invisible espionage threat to enterprises

CyberSpy

Net-security

8.4.20

Happy developers more likely to build secure apps

Mobil

Net-security
8.4.20

Encryption is finally being used primarily to protect personal data rather than just for compliance

Crypto

Net-security
8.4.20

On-demand webinar: Securing your remote workforce

Security

Net-security
7.4.20 Coronavirus: Europol arrests man behind €6M face masks and hand sanitisers scam BigBrothers Securityaffairs
7.4.20 Updated: Italian email provider Email.it hacked, data of 600k users available for sale Hacking Securityaffairs
7.4.20 WhatsApp Tightens Sharing Limits to Curb Virus Misinformation Social Securityweek
7.4.20 Russian Telco Hijacked Internet Traffic of Major Networks - Accident or Malicious Action? BigBrothers Securityweek
7.4.20 Healthcare Cybersecurity Firm CyberMDX Raises $20 Million IT Securityweek
7.4.20 Google Patches Critical RCE Vulnerabilities in Android's System Component Vulnerebility Securityweek
7.4.20 FBI Expects Increase in COVID-19-Themed BEC Scams BigBrothers  Spam Securityweek
7.4.20 Unveiled: How xHelper Android Malware Re-Installs Even After Factory Reset Android Thehackernews
7.4.20

Increase in RDP Scanning

Security

SANS
7.4.20

Spotting and blacklisting malicious COVID-19-themed sites

Virus

Net-security

7.4.20

Full-time bug hunting: Pros and cons of an emerging career

Vulnerebility

Net-security

7.4.20

Testing and Accountability

Security

Securelist
7.4.20

Unkillable xHelper and a Trojan matryoshka

Virus

Securelist
7.4.20

Italian email provider Email.it hacked, data of 600k users available for sale

Hacking

Securityaffairs
7.4.20 Government VPN Servers Targeted in Zero-Day Attack Attack  BigBrothers

Threatpost

7.4.20 Beyond Zoom: How Safe Are Slack and Other Collaboration Apps? Security

Threatpost

7.4.20 Apple Safari Flaws Enable One-Click Webcam Access Apple

Threatpost

7.4.20 A Brisk Private Trade in Zero-Days Widens Their Use Vulnerebility

Threatpost

7.4.20 FBI Threatens ‘Zoom Bombing’ Trolls With Jail Time BigBrothers

Threatpost

7.4.20 Interpol warns that crooks are increasingly targeting hospitals BigBrothers Securityaffairs
7.4.20 ENISA released a Tool to map dependencies to International Standards Security Securityaffairs
7.4.20 Key Ring digital wallet exposes data of 14 Million users in data leak Incindent Securityaffairs
7.4.20 DarkHotel APT uses VPN zero-day in attacks on Chinese government agencies APT  BigBrothers Securityaffairs
7.4.20 Pre-Installed Utility Renders HP Computers Vulnerable to Attacks Attack  Vulnerebility Sec