Calendar 2020 February- Home  2020  2019  2018  2017  2016  Articles

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2020 - January February March April May June July August September October November December


Date

Name

Category

Web

29.2.20

uBlock Origin 1.25 Now Blocks Cloaked First-Party Scripts, Firefox Only Security

Bleepingcomputer

29.2.20

Mozilla Enables DNS-over-HTTPS by Default for All USA Users Security

Bleepingcomputer

29.2.20

New Critical RCE Bug in OpenBSD SMTP Server Threatens Linux Distros Vulnerebility

Bleepingcomputer

29.2.20

Credit Card Skimmer Running on 13 Sites, Despite Notification CyberCrime

Bleepingcomputer

29.2.20

DoppelPaymer Ransomware Launches Site to Post Victim's Data Ransomware

Bleepingcomputer

29.2.20

PayPal Users Hit With Fraudulent 'Target' Charges via Google Pay Phishing

Bleepingcomputer

29.2.20

New Mozart Malware Gets Commands, Hides Traffic Using DNS Virus

Bleepingcomputer

29.2.20

WhatsApp, Telegram Group Invite Links Leaked in Public Searches Social

Bleepingcomputer

29.2.20

Malvertising in Govt, Enterprise Targets Old Software, Macs Apple

Bleepingcomputer

29.2.20

Racoon Malware Steals Your Data From Nearly 60 Apps Virus

Bleepingcomputer

29.2.20

Windows 10 Gets Temp Patch for Critical Flaw Fixed In Buggy Update OS

Bleepingcomputer

29.2.20

Google Brings Its Lighthouse Pagespeed Extension to Firefox Security

Bleepingcomputer

29.2.20

2019 TLS Telemetry Report Summary

Safety blog

F5 Labs

29.2.20

Application Protection Research Series—Summary 2nd Edition

Security blog

F5 Labs

29.2.20

The Perfect Cybersecurity Applicant is Likely a Veteran

Cyber blog

F5 Labs

29.2.20

Ransomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT

Ransomware blog

FireEye

29.2.20

CPR evasion encyclopedia: The Check Point evasion repository

Cyber blog

Checkpoint

29.2.20

New Research Paper: Prevalence and impact of low-entropy packing schemes in the malware ecosystem

Malware blog

Cisco Talos

29.2.20

Vulnerability Spotlight: Multiple vulnerabilities in Moxa AWK-3131A

Vulnerebility blog

Cisco Talos

29.2.20

Firefox turns on DNS over HTTPS by default for US users

Safety blog

Eset

29.2.20

Cyberbullying: How is it different from face‑to‑face bullying?

Cyber blog

Eset

29.2.20

Facial recognition company Clearview AI hit by data theft

Cyber blog

Eset

29.2.20

RSA 2020 – Hacking humans

Congress blog

Eset

29.2.20

Did someone file your taxes before you?

Security blog

Eset

29.2.20

Is bug hunting a viable career choice?

Vulnerebility blog

Eset

29.2.20

KrØØk: Serious vulnerability affected encryption of billion+ Wi‑Fi devices

Vulnerebility blog

Eset

29.2.20

Is your phone listening to you?

Hardware blog

Eset

29.2.20

RSAC 2020: Ransomware a ‘National Crisis,’ CISA Says, Ramps ICS Focus

Congress

Threatpost

29.2.20

Bruce Schneier Proposes ‘Hacking Society’ for a Better Tomorrow

Hacking

Threatpost

29.2.20

Patrick Wardle: Apple Devices Hit With Recycled macOS Malware

Apple

Threatpost

29.2.20

All versions of Apache Tomcat are affected by the Ghostcat flaw

Vulnerebility

Securityaffairs

29.2.20

Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates BigBrothers  Social Securityaffairs

29.2.20

Apache Tomcat Affected by Serious 'Ghostcat' Vulnerability Vulnerebility Securityweek

29.2.20

Microsoft Boosts PUA Protections in Edge Safety Securityweek

29.2.20

ProtonMail Fights Email Spoofing With New DKIM Key Management Feature Hacking  Safety Securityweek

29.2.20

Assange's UK Extradition Hearing Paused Until May BigBrothers Securityweek

29.2.20

GhostCat: New High-Risk Vulnerability Affects Servers Running Apache Tomcat Vulnerebility Thehackernews

28.2.20

Which are the most dangerous mobile app stores online? Mobil Securityaffairs

28.2.20

Cisco addresses vulnerabilities in FXOS, UCS Manager and NX-OS Software Vulnerebility Securityaffairs

28.2.20

NRC Health health care company hit with ransomware Ransomware Securityaffairs

28.2.20

Let's Encrypt Issues Over 1 Billion Certificates Safety Securityweek

28.2.20

Intel Patched Over 230 Vulnerabilities in Its Products in 2019 Vulnerebility Securityweek

28.2.20

Let's Encrypt Issued A Billion Free SSL Certificates in the Last 4 Years Safety Thehackernews

28.2.20

Hacking has become a viable career, according to HackerOne

Hacking

Net-security

28.2.20

What is plaguing public sector cyber readiness?

Cyber

Net-security

28.2.20

Photos: RSA Conference 2020, part 4

Congress

Net-security

28.2.20

2019 TLS TELEMETRY REPORT Report Report

28.2.20

IoT Insecurity: When Your Vacuum Turns on You

IoT

Threatpost

28.2.20

Google’s War on Android App Permissions, 60 Percent Successful

Android

Threatpost

28.2.20

RSAC 2020: GM’s Transportation Future Hinges on Cybersecurity

Congress

Threatpost

28.2.20

Facial recognition firm Clearview AI reveals intruders stole its client list Cyber Securityaffairs

28.2.20

Lampion malware origin servers geolocated in Turkey Virus Securityaffairs

28.2.20

Facebook Sues Analytics Firm for Data Misuse Social Securityweek

28.2.20

Cisco to Release Updates for Wireless Products Affected by Kr00k Vulnerability Vulnerebility Securityweek

28.2.20

Cybercriminals Target Lincoln Health Care Company CyberCrime Securityweek

28.2.20

Inside the Rising Cybercrime Threat in Latin America CyberCrime Securityweek

28.2.20

Show me Your Clipboard Data!

Security

SANS

28.2.20

Only 38% of US govt workers received ransomware prevention training

Ransomware

Net-security

28.2.20

Tiny cryptographic ID chip can help combat hardware counterfeiting

Crypto

Net-security

28.2.20

More than 40% of privacy compliance technology will rely on AI by 2023

Privacy

Net-security

28.2.20

Photos: RSA Conference 2020, part 3

Congress

Net-security

27.2.20

Roaming Mantis, part V APT Securelist

27.2.20

Hunting the coronavirus in the dark web CyberCrime Securityaffairs

27.2.20

QL Dump from popular Indian BGR tech site leaked online Incindent Securityaffairs

27.2.20

New strain of Cerberus Android banking trojan can steal Google Authenticator codes Android Securityaffairs

27.2.20

Data on Detection of Malicious Documents in Gmail are impressive Virus Securityaffairs

27.2.20

Threat actors scan Internet for Vulnerable Microsoft Exchange Servers Vulnerebility Securityaffairs

27.2.20

Cisco Patches Flaws in FXOS, UCS Manager and NX-OS Software Vulnerebility Securityweek

27.2.20

Hackers Looking for Exchange Servers Affected by Recently Patched Flaw Vulnerebility Securityweek

27.2.20

Less Than Half of Vulnerabilities in Popular Docker Images Pose Risk: Study Vulnerebility Securityweek

27.2.20

Framework Isolates Libraries in Firefox to Improve Security Security Securityweek

27.2.20

Online 'Impersonator' Tried to Contact Campaigns, DNC Says Security Securityweek

27.2.20

Hacker Earns $8,500 for Vulnerability in HackerOne Platform Security Securityweek

27.2.20

Facebook and Google Postpone Asia-Pacific Bug Hunting Conference Social Securityweek

27.2.20

CWE list now includes hardware security weaknesses

Vulnerebility

Net-security

27.2.20

RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks

Congress

Threatpost

27.2.20

Billions of Devices Open to Wi-Fi Eavesdropping Attacks

Attack

Threatpost

27.2.20

RSAC 2020: Smart Baby Monitor Vulnerable to Remote Hackers

Congress

Threatpost

27.2.20

Unpatched Security Flaws Open Connected Vacuum to Takeover

Vulnerebility

Threatpost

27.2.20

Hackers Cashing In On Healthcare Industry Security Weaknesses

Hacking

Threatpost

27.2.20

Iranian APT Targets Govs With New Malware

APT

Threatpost

27.2.20

Stalkerware Attacks Increased 50 Percent Last Year, Report

Attack

Threatpost

27.2.20

Offensive Tools Are For Blue Teams Too

Security

SANS

27.2.20

Kr00k Wi-Fi Encryption flaw affects more than a billion devices Vulnerebility Securityaffairs

27.2.20

Over 20 Zyxel Firewalls Impacted by Recent Zero-Day Vulnerability Vulnerebility Securityweek

27.2.20

Privacy Management Firm OneTrust Raises $210 Million at $2.7 Billion Valuation IT Securityweek

27.2.20

RSA Conference 2020: Product Announcement Summary (Day 3) Congress Securityweek

27.2.20

McAfee Buys Browser Isolation Firm Light Point Security Security Securityweek

27.2.20

New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices Vulnerebility Thehackernews

27.2.20

A new way for securing web browsers from hackers

Security

Net-security

27.2.20

Modern malware is increasingly leveraging evasive behaviors

Virus

Net-security

27.2.20

One in five SMBs use no endpoint security at all

Security

Net-security

27.2.20

What is driving the machine identity crisis?

Security

Net-security

27.2.20

Flaw affecting 1B+ Wi-Fi-enabled devices allows attackers to decrypt wireless network packets

Vulnerebility

Net-security

27.2.20

Photos: RSA Conference 2020, part 2

Congress

Net-security

27.2.20

Attackers probing for vulnerable Microsoft Exchange Servers, is yours one of them?

Vulnerebility

Net-security

27.2.20

Shadow IoT: A growing threat to enterprise security

IoT

Net-security

27.2.20

Google fixes another Chrome zero-day exploited in the wild

Exploit

Net-security

26.2.20

Kr00k Vulnerebility Papers Papers

26.2.20

Kr00k Vulnerebility Threats News Threats News

26.2.20

Reading Municipal Light Department, an electric utility in Massachusetts, hit by ransomware Ransomware Securityaffairs

26.2.20

Google Boosts Detection of Malicious Documents in Gmail Virus Securityweek

26.2.20

Kr00k Vulnerability Exposed Data From Over a Billion Wi-Fi Devices Vulnerebility Securityweek

26.2.20

Iranian Cyberspies Focus on Long-Running Operations BigBrothers  CyberSpy Securityweek

26.2.20

Intel Announces New Hardware-based Security Capabilities Security Securityweek

26.2.20

FBI Official: Russia Wants to See US 'Tear Ourselves Apart' BigBrothers Securityweek

26.2.20

New LTE Network Flaw Could Let Attackers Impersonate 4G Mobile Users Mobil  Vulnerebility Thehackernews

26.2.20

Google Advises Android Developers to Encrypt App Data On Device Android Thehackernews

26.2.20

Samsung leaked data of a few UK Customers

Incindent

Securityaffairs

26.2.20

Silence Hacking Crew threatens Australian banks of DDoS attacks

Attack  BigBrothers

Securityaffairs

26.2.20

New Cyber Attack Campaign Leverages the COVID-19 Infodemic

Virus

Securityaffairs

26.2.20

Fbot re-emerged, the backstage

Virus

Securityaffairs

26.2.20

Massachusetts Electric Utility Hit by Ransomware

Ransomware

Securityweek

26.2.20

OpenSMTPD Vulnerability Leads to Command Injection

Vulnerebility

Securityweek

26.2.20

UK Financial Regulator Admits to Data Breach

Incindent

Securityweek

26.2.20

Google Advises Android Developers to Encrypt App Data On Device

Android

Thehackernews

26.2.20

RSAC 2020: Blockchain is ‘Garbage In’, Voting Needs Paper Ballots

Congress

Threatpost

26.2.20

RSAC 2020 Keynote: Changing the World’s False Perception of Cybersecurity

Congress

Threatpost

26.2.20

Google Patches Chrome Browser Zero-Day Bug, Under Attack

Attack

Threatpost

26.2.20

Sen. Schumer Pushes for TSA Employee Ban on TikTok App at Work

BigBrothers

Threatpost

26.2.20

Decathlon Spain data leak exposed Spanish employees’ data & more Incindent Securityaffairs

26.2.20

Zyxel addresses Zero-Day vulnerability in NAS devices Vulnerebility Securityaffairs

26.2.20

Firefox Gets DNS-over-HTTPS as Default in U.S. Safety Securityweek

26.2.20

Samsung Says it Leaked Data on Handful of UK Customers Incindent Securityweek

26.2.20

RSA Conference 2020: Product Announcement Summary (Day 2) Congress Securityweek

26.2.20

Over 100 Vulnerabilities Patched in MyBB in Past 5 Years Vulnerebility Securityweek

26.2.20

Firefox enables DNS-over-HTTPS by default (with Cloudflare) for all U.S. users Safety Thehackernews

26.2.20

Almost three-quarters of all phishing sites now use SSL protection

Phishing

Net-security

26.2.20

Mixed-signal circuits can stop side-channel attacks against IoT devices

IoT

Net-security

26.2.20

Combat complexity to prevent cybersecurity fatigue

Cyber

Net-security

26.2.20

Healthcare industry at greatest risk of data breach

Incindent

Net-security

26.2.20

Photos: RSA Conference 2020, part 1

Congress

Net-security

25.2.20

IMP4GT: IMPersonation Attacks in 4G NeTwor Papers Papers

25.2.20

IMP4GT Attack Attack

25.2.20

Experts discovered a new critical OpenSMTPD RCE flaw exploited in the wild Exploit Securityaffairs

25.2.20

Google fixes Chrome zero-day flaw exploited in the wild Exploit Securityaffairs

25.2.20

European Commission has chosen the Signal app to secure its communications Security Securityaffairs

25.2.20

State-Sponsored Cyberspies Use Sophisticated Server Firewall Bypass Technique Vulnerebility Securityweek

25.2.20

Zyxel Patches Zero-Day Vulnerability in Network Storage Products Vulnerebility Securityweek

25.2.20

KPMG on Key Cybersecurity Considerations for 2020 Cyber Securityweek

25.2.20

HackerOne Surpasses $82 Million in Paid Bounties Security Securityweek

25.2.20

Mobile Networks Vulnerable to IMP4GT Impersonation Attacks Attack  Mobil Securityweek

25.2.20

Install Latest Chrome Update to Patch 0-Day Bug Under Active Attacks Attack Thehackernews

25.2.20

Infoblox announces enterprise best practices for DoT/DoH

Security

Net-security

25.2.20

Mobile malware evolution 2019 Analysis  Mobil Securelist

25.2.20

South Korea suffers from the spread of people infected with Corona 19 Virus Securityaffairs

25.2.20

Hacking campaign targets sites running popular Duplicator WordPress plugin Hacking Securityaffairs

25.2.20

Google Patches Chrome Vulnerability Exploited in the Wild Vulnerebility Securityweek

25.2.20

BEC Group Abuses Google G Suite in Scheme Targeting Thousands of Firms Security Securityweek

25.2.20

New OpenSMTPD RCE Flaw Affects Linux and OpenBSD Email Servers Vulnerebility Thehackernews

25.2.20

Why Minimizing Human Error is the Only Viable Defense Against Spear Phishing Phishing Thehackernews

25.2.20

A new RCE in OpenSMTPD’s default install, patch available

Vulnerebility

Net-security

25.2.20

Apple Takes Heat Over ‘Vulnerable’ iOS Cut-and-Paste Data

Apple

Threatpost

25.2.20

Data Breach Occurs at Agency in Charge of Secure White House Communications

Incindent

Threatpost

25.2.20

Researchers trick autonomous car autopilot with phantom images

Security

Net-security

25.2.20

ZyXEL NAS pre-authentication command injection in weblogin.cgi Alert Alert

25.2.20

Review: Specops Key Recovery

Security

Net-security

25.2.20

ENISA publishes procurement guidelines for cybersecurity in hospitals

Cyber

Net-security

25.2.20

Lampion malware v2 February 2020

Virus

Securityaffairs

25.2.20

Raccoon Malware, a success case in the cybercrime ecosystem

Virus

Securityaffairs

25.2.20

Slickwraps discloses data leak that impacted 850,000 user accounts

Incindent

Securityaffairs

25.2.20

SECURITI.ai Wins RSA Conference 2020 Innovation Sandbox Contest

Congress

Securityweek

25.2.20

Pentagon Adopts New Ethical Principles for Using AI in War

BigBrothers

Securityweek

25.2.20

RSA Conference 2020: Product Announcement Summary (Day 1)

Congress

Securityweek

25.2.20

Vulnerabilities in Moxa Networking Device Expose Industrial Environments to Attacks

Vulnerebility

Securityweek

25.2.20

Mismanagement of Device Identities Could Cost Businesses Billions: Report

Security

Securityweek

25.2.20

Canada Privacy Watchdog Probes Facial Recognition Startup

Privacy

Securityweek

25.2.20

Slickwraps Discloses Data Breach

Incindent

Securityweek

25.2.20

Cisco Unveils SecureX Security Platform

Security

Securityweek

25.2.20

Vulnerabilities Allow Hackers to Access Honeywell Fire Alarm Systems

Vulnerebility

Securityweek

25.2.20

Quick look at a couple of current online scam campaigns

Spam

SANS

25.2.20

Cybersecurity hiring challenges and retention issues demand new talent pipelines

Security

Net-security

25.2.20

Cloud-based collaboration tools are a major driver of data exfiltration

Security

Net-security

25.2.20

The importance of risk reduction for robotic process automation

Security

Net-security

25.2.20

eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

Security

Net-security

24.2.20

Windows 10 Privacy Guide: Settings Everyone Should Use OS

Bleepingcomputer

24.2.20

Privacy Concerns Raised Over New Google Chrome Feature Privacy

Bleepingcomputer

24.2.20

Windows 10 Gets Temp Fix for Critical Security Vulnerability OS

Bleepingcomputer

24.2.20

Extension Brings Internet Explorer Menu Bar to Microsoft Edge OS

Bleepingcomputer

24.2.20

Slickwraps Data Breach Exposes Financial and Customer Info Incindent

Bleepingcomputer

24.2.20

Android Malware: Joker Still Fools Google's Defense, New Clicker Found Android

Bleepingcomputer

24.2.20

Google Cleans Play Store of Nearly 600 Apps for Ad Policy Violation Privacy

Bleepingcomputer

24.2.20

New Mexico Sues Google for Mining Children's Data Privacy

Bleepingcomputer

24.2.20

Microsoft Unveils Their New Windows 10 System Icons OS

Bleepingcomputer

24.2.20

FTC Refunds Victims of Office Depot Tech Support Scam Spam

Bleepingcomputer

24.2.20

FBI recommends using passphrases instead of complex passwords

BigBrothers

Securityaffairs

24.2.20

FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019

Analysis

Securityaffairs

24.2.20

Man Tied to Ex-Congresswoman Campaign Arrested in Hack Spree

Crime

Securityweek

24.2.20

2016 Again? Russia Back to Stirring Chaos in U.S. Election

BigBrothers

Securityweek

24.2.20

OpenDXL Ontology: An open source language for connecting cybersecurity tools

Cyber

Net-security

24.2.20

ISS reveals malware attack impacted parts of the IT environment Virus Securityaffairs

24.2.20

Google sued by New Mexico attorney general for collecting student data through its Education Platform Privacy Securityaffairs

24.2.20

ObliqueRAT, a new malware employed in attacks on government targets in Southeast Asia Virus Securityaffairs

24.2.20

Maldoc: Excel 4 Macros in OOXML Format

Virus

SANS

24.2.20

By exploiting an LTE vulnerability, attackers can impersonate mobile phone users

Exploit  Mobil

Net-security

24.2.20

Changing the mindset of the CISO: From enforcer to enabler

Security

Net-security

24.2.20

Users still engaging in risky password, authentication practices

Safety

Net-security

24.2.20

Increased monetization means more ransomware attacks

Ransomware

Net-security

24.2.20

Organizations lack confidence in their network security

Security

Net-security

24.2.20

97% of IT leaders worried about insider data breaches

Security

Net-security

24.2.20

Download: The Ultimate Security Pros’ Checklist

Security

Net-security

23.2.20

WhatsApp Phishing URLs Skyrocket With Over 13,000% Surge Phishing  Social

Bleepingcomputer

23.2.20

Credit Card Skimmer Found on Nine Sites, Researchers Ignored CyberCrime

Bleepingcomputer

23.2.20 Hackers Share Stolen MGM Resorts Guest Database with 10M+ Records Incindent

Bleepingcomputer

23.2.20

Google Tells Microsoft Edge Users To Get Chrome for Better Security Security

Bleepingcomputer

23.2.20

Microsoft Defender ATP for Linux Now In Public Preview Safety

Bleepingcomputer

23.2.20 New Actors Attack Industrial Control Systems, Old Ones Mature ICS

Bleepingcomputer

23.2.20

Tesla Pays $10K for Microsoft SQL Server Reporting Services Bug Security

Bleepingcomputer

23.2.20

Microsoft Rolls Out New Windows 10 Optional Update Experience OS

Bleepingcomputer

23.2.20 Microsoft Adds Enterprise Windows 10 Tamper Protection Controls OS

Bleepingcomputer

23.2.20

Swiss Govt Says Ransomware Victims Ignored Warnings, Had Poor Security Ransomware

Bleepingcomputer

23.2.20 Windows 10 KB4532693 Update Bug Reportedly Deletes User Files OS

Bleepingcomputer

23.2.20

Zero-Day in WordPress Plugin Exploited to Create Admin Accounts Exploit  Vulnerebility

Bleepingcomputer

23.2.20

Over 20,000 WordPress Sites Run Trojanized Premium Themes Virus

Bleepingcomputer

23.2.20 DRBControl Espionage Operation Hits Gambling, Betting Companies CyberSpy

Bleepingcomputer

23.2.20

Dharma Ransomware Attacks Italy in New Spam Campaign Ransomware  Spam Bleepingcomputer
23.2.20 SonicWall Firewall Certified via NetSecOPEN Laboratory Testing, Earns Perfect Security Effectiveness Score Against Private CVE Attacks Safety blog Sonicwall

23.2.20

Hackers infect VPNs to plant hidden backdoors Hacking blog Avast blog
23.2.20 Can You Trust Your AutoIT Decompiler? Security blog Palo Alto Unity42

23.2.20

How to Use a Firewall for Network Traffic Analysis and Behavioral Detection Cyber blog

Palo Alto

23.2.20

What’s it Like Being a Woman in Cybersecurity? Cyber blog

Palo Alto

23.2.20 The Three T’s of Shift Left Security Cyber blog

Palo Alto

23.2.20

What the Cybersecurity Industry Needs to Discuss at the RSA Conference 2020 Cyber blog

Palo Alto

23.2.20

Book Review: “Cyber Smart” Cyber blog

Palo Alto

23.2.20 Tapping the True Potential of the 5G Digital Economy Cyber blog

Palo Alto

23.2.20

Holistic SDN Security Makes Security Comprehensive Everywhere Cyber blog

Palo Alto

23.2.20 Cloud Native Security Beyond Your Vendor’s Tools Cyber blog

Palo Alto

23.2.20

Simple but Efficient VBScript Obfuscation

Virus

SANS

23.2.20

Joker malware still able to bypass Google Play Store checks

Android

Securityaffairs
23.2.20

Google removed nearly 600 apps from the Play Store for ad policy violation

Android  Privacy

Securityaffairs

22.2.20

US Govt Warns of Ransomware Attacks on Pipeline Operations BigBrothers  Ransomware

Bleepingcomputer

22.2.20 Ring Forces 2FA On All Users to Secure Cameras from Hackers Hacking

Bleepingcomputer

22.2.20 Firefox 73.0.1 Released With Fixes for Linux, Windows Crashes Vulnerebility

Bleepingcomputer

22.2.20 AZORult Malware Infects Victims via Fake ProtonVPN Installer Virus

Bleepingcomputer

22.2.20 Phishing on Instagram Baits Russians With Free Money Promise Phishing

Bleepingcomputer

22.2.20 Windows, Linux Devices at Risk Due to Unsigned Peripheral Firmware OS

Bleepingcomputer

22.2.20 Hacker Group Catfishes Israeli Soldiers Into Installing Mobile RAT BigBrothers  Virus

Bleepingcomputer

22.2.20 Microsoft Surface Laptop 3 Screens Are Spontaneously Cracking Hacking

Bleepingcomputer

22.2.20 World Health Organization Warns of Coronavirus Phishing Attacks Phishing

Bleepingcomputer

22.2.20 Windows 10 Users Affected by New Shutdown Bug, How to Fix OS

Bleepingcomputer

22.2.20 Russia Blocks Tutanota Email, Service Still Usable Over Tor or VPN BigBrothers

Bleepingcomputer

22.2.20

Unsafe WordPress Plugin Installed on Nearly 200,000 Sites Vulnerebility

Bleepingcomputer

22.2.20 Windows 10X to Feature Faster Updates, Win32 Apps Support OS

Bleepingcomputer

22.2.20 Targeted Phishing Attack Aims For Well-Known Corporate Brands Phishing

Bleepingcomputer

22.2.20 Windows 10 Gets the Mac Hot Corners Feature With New App OS

Bleepingcomputer

22.2.20 How to See the First Show You Watched on Netflix IT Bleepingcomputer

22.2.20

CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II

Cyber blog

Mcafee blog
22.2.20

Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles

Security blog

Mcafee blog
22.2.20

Introduction and Application of Model Hacking

Security blog

Mcafee blog
22.2.20

CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I

Cyber blog

Mcafee blog
22.2.20

What Can Pandemics Teach Us About Cyber Security?

Cyber blog

F5 Labs
22.2.20

Prioritizing Vulnerability Management Using Machine Learning

Vulnerebility blog

F5 Labs
22.2.20

M-Trends 2020: Insights From the Front Lines

Cyber blog

FireEye
22.2.20

Managed Defense: The Analytical Mindset

Security blog

FireEye
22.2.20

"Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests

BigBrother blog

FireEye
22.2.20

The Missing LNK — Correlating User Search LNK files

Malware blog

FireEye
22.2.20

Hamas Android Malware On IDF Soldiers-This is How it Happened

OS Blog

Checkpoint

22.2.20

Android App Fraud – Haken Clicker and Joker Premium Dialer

OS Blog

Checkpoint
22.2.20

Mitigations are attack surface, too

Exploit blog

Project Zero
22.2.20

Escaping the Chrome Sandbox with RIDL

Exploit blog

Project Zero
22.2.20

ObliqueRAT: New RAT hits victims' endpoints via malicious documents

Malware blog

Cisco Talos

22.2.20

Vulnerability Spotlight: Memory corruption, DoS vulnerabilities in CoTURN

Vulnerebility blog

Cisco Talos

22.2.20

Building a bypass with MSBuild

Vulnerebility blog

Cisco Talos

22.2.20

Up close and personal with Linux malware

Malware blog

Eset

22.2.20

MGM Resorts data breach exposes details of 10.6 million guests

Incident blog

Eset

22.2.20

Linux and malware: Should you worry?

Malware blog

Eset

22.2.20

What DNS encryption means for enterprise threat hunters

Safety blog

Eset

22.2.20

Sensitive plastic surgery photos exposed online

Incident blog

Eset
22.2.20

Plugin flaw leaves up to 200,000 WordPress sites at risk of attack

Attack blog  Vulnerebility blog

Eset
22.2.20

FC Barcelona Twitter account hacked – again

Social blog

Eset

22.2.20

RSAC 2020: Editors’ Preview of Hottest Sessions, Speakers and Themes

Congress

Threatpost

22.2.20

New ‘Haken’ Malware Found On Eight Apps In Google Play Store

Android

Threatpost

22.2.20

ISS World Hit with Malware Attack that Shuts Down Global Computer Network

Virus

Threatpost

22.2.20

Burning Man Tickets for $225? Yep, Too Good to Be True

CyberCrime

Threatpost

22.2.20

Lawsuit Claims Google Collects Minors’ Locations, Browsing History

Privacy

Threatpost

22.2.20

Active Attacks Target Popular Duplicator WordPress Plugin

Attack

Threatpost
22.2.20

VMware addresses serious flaws in vRealize Operations for Horizon Adapter

Vulnerebility Securityaffairs
22.2.20

New Mexico Sues Google Over Collection of Children's Data

Privacy Securityweek
22.2.20

Google Removes 600 Android Apps for Displaying Disruptive Ads

Android Securityweek
22.2.20

Malware Attack Takes ISS World's Systems Offline

Virus Securityweek
22.2.20

Microsoft Brings Defender Antivirus for Linux, Coming Soon for Android and iOS

Safety Thehackernews

21.2.20

M-TRENDS 2020 FIREEYE MANDIANT SERVICES | SPECIAL REPORT

Report Report

21.2.20

Exclusive: Pakistan and India to armaments: Operation Transparent Tribe is back 4 years later BigBrothers Securityaffairs
21.2.20 DOD DISA US agency discloses a security breach BigBrothers  Incindent Securityaffairs
21.2.20 FireEye Spotted Over 500 New Malware Families in 2019 Virus Securityweek
21.2.20 VMware Patches Serious Flaws in vRealize Operations for Horizon Adapter Vulnerebility Securityweek
21.2.20 U.S. Combat Support Agency Discloses 2019 Data Breach BigBrothers Securityweek
21.2.20 Fraudulent Login Attacks Against Banks Surge: Akamai Attack Securityweek
21.2.20 20,000 WordPress Websites Infected via Trojanized Themes Virus Securityweek
21.2.20 Google Bans 600 Android Apps from Play Store for Serving Disruptive Ads Android Thehackernews

21.2.20

Cisco drops security fixes for Smart Software Manager, security appliances

Vulnerebility

Net-security

21.2.20

Critical Cisco Bug Opens Software Licencing Manager to Remote Attack

Attack  Vulnerebility

Threatpost

21.2.20

MGM Grand Breach Leaked Details of 10.6 Million Guests Last Summer

Incindent

Threatpost

21.2.20

Cybergang Favors G Suite and Physical Checks For BEC Attacks

CyberCrime  Spam

Threatpost

21.2.20

Google Bans 600 Android Apps for Obnoxious Ads

Android

Threatpost

21.2.20

Critical Adobe Flaws Fixed in Out-of-Band Update

Vulnerebility

Threatpost

21.2.20 2019 YEAR IN REVIEW ICS VULNERABILITIES Report Report
21.2.20 2019 YEAR IN REVIEW THE ICS L ANDSCAPE AND THREAT ACTIVIT Y GROUPS Report Report
21.2.20 2019 YEAR IN REVIEW LESSONS LEARNED FROM THE FRONT LINES OF ICS CYBERSECURITY Report Report
21.2.20

Quick Analysis of an Encrypted Compound Document Format

Crypto

SANS

21.2.20

Looking at the future of identity access management (IAM)

Security

Net-security

21.2.20 Dragos Report: Analysis of ICS flaws disclosed in 2019 ICS Securityaffairs
21.2.20 Croatia’s largest petrol station chain INA group hit by ransomware attack Ransomware Securityaffairs
21.2.20 UK, US and its allies blame Russia’s GRU for 2019 cyber-attacks on Georgia BigBrothers Securityaffairs
21.2.20 Adobe released out-of-band updates for After Effects and Media Encoder apps Vulnerebility Securityaffairs

21.2.20

Cisco fixes a static default credential issue in Smart Software Manager tool Vulnerebility Securityaffairs
21.2.20 Georgia Blames Russia for Cyberattack, US, UK Agree BigBrothers Securityweek
21.2.20 Cisco Patches Critical Flaw in Smart Licensing Solution Vulnerebility Securityweek
21.2.20 Over 400 ICS Vulnerabilities Disclosed in 2019: Report ICS Securityweek
21.2.20 Microsoft Threat Protection Now Generally Available Safety Securityweek

21.2.20

US, UK Blame Russia for 2019 Cyber Attacks in Georgia BigBrothers Securityweek
21.2.20 Fidelis Adds Risk Simulation and MITRE ATT&CK Mapping to Elevate Platform Security Securityweek
21.2.20 Cometdocs Threatens Legal Action Over Disclosure of Security Issues Security Securityweek
21.2.20

Whodat? Enumerating Who "owns" a Workstation for IR

Security

SANS

21.2.20

Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps

Security

Net-security

21.2.20

10 hot industry newcomers to watch at RSA Conference 2020

Congress

Net-security

21.2.20

High-risk vulnerabilities and public cloud-based attacks on the rise

Vulnerebility

Net-security

21.2.20

Worldwide ICT spending forecast to reach $4.3 trillion in 2020

Security

Net-security

20.2.20

Cybersecurity Research During the Coronavirus Outbreak and After

Cyber

Securelist

20.2.20

Personal details of 10.6M MGM Resorts guests leaked online

Incindent

Securityaffairs

20.2.20

ZeroFOX Raises $74 Million to Expand Social Media Threat Protection Business

IT

Securityweek

20.2.20

CrowdStrike Co-Founder and CTO Steps Down to Launch Nonprofit Policy Accelerator

IT

Securityweek

20.2.20

Ring Rolls Out Mandatory 2FA, New Privacy Controls

Safety

Securityweek

20.2.20

Scam Alert: You've Been Selected for 'Like of the Year 2020' Cash Prizes

Social  Spam

Thehackernews

20.2.20

Adobe Patches Critical Bugs Affecting Media Encoder and After Effects

Vulnerebility

Thehackernews

20.2.20

What is flowing through your enterprise network?

Security

Net-security

20.2.20

BlueKeep Flaw Plagues Outdated Connected Medical Devices

Vulnerebility

Threatpost

20.2.20

Latest Tax Scams Target Apps and Tax-Prep Websites

Spam

Threatpost

20.2.20

Hamas Ensnares Israeli Soldiers with Pretty ‘Ladies’

BigBrothers

Threatpost

20.2.20

U.S. Pipeline Disrupted by Ransomware Attack

Ransomware

Threatpost

20.2.20

SMS Attack Spreads Emotet, Steals Bank Credentials

Mobil  Virus

Threatpost

20.2.20

Hackers are actively exploiting a Zero-Day in WordPress ThemeREX Plugin to create Admin Accounts Vulnerebility Securityaffairs

20.2.20

DRBControl cyber-espionage group targets gambling, betting companies CyberSpy Securityaffairs

20.2.20

Trump 'Offered Pardon' to Assange If He Denied Russia Leak, Court Hears BigBrothers Securityweek

20.2.20

EU Proposes Rules for Artificial Intelligence to Limit Risks BigBrothers Securityweek

20.2.20

Vulnerable Out of Band Consoles Put Industrial Assets at Risk Vulnerebility Securityweek

20.2.20

Are CISOs ready for zero trust architectures?

Security

Net-security

20.2.20

Most credential abuse attacks against the financial sector targeted APIs

Attack

Net-security

20.2.20

Cloud misconfigurations surge, organizations need continuous controls

Security

Net-security

20.2.20

Number of records exposed in healthcare breaches doubled from 2018 to 2019

Incindent

Net-security

20.2.20

Factbook: Healthcare IT practices and cyber preparedness Cyber Net-security

19.2.20

Uncovering New Magecart Implant Attacking eCommerce CyberCrime Securityaffairs

19.2.20

5 Ways artificial intelligence Is Being Used to Keep Sensitive Information Secure Security Securityaffairs
19.2.20 SentinelOne Achieves Unicorn Status After $200 Million Funding Round IT Securityweek
19.2.20 WordPress Websites Hacked via Vulnerabilities in Two Themes Plugins Vulnerebility Securityweek
19.2.20 Google Brings Titan Security Keys to More Countries Security Securityweek
19.2.20 Huawei Loses Legal Challenge Against US Federal Purchase Ban BigBrothers Securityweek
19.2.20 ForgePoint Capital Announces $450 Million Cybersecurity Investment Fund IT Securityweek
19.2.20 Operations at U.S. Natural Gas Facilities Disrupted by Ransomware Attack Ransomware Securityweek
19.2.20 Ring Makes 2-Factor Authentication Mandatory Following Recent Hacks Hacking Thehackernews
19.2.20 US Govt Warns Critical Industries After Ransomware Hits Gas Pipeline Facility BigBrothers  Ransomware Thehackernews

19.2.20

Free trojanized WordPress themes lead to widespread compromise of web servers

Virus

Net-security

19.2.20

US gas pipeline shut down due to ransomware

Ransomware

Net-security

19.2.20 2019 Year End Report Vulnerability QuickView Report Report
19.2.20 AA20-049A : Ransomware Impacting Pipeline Operations CERT CERT
19.2.20 Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs Vulnerebility

Threatpost

19.2.20 Hacker Scheme Threatens AdSense Customers with Account Suspension Hacking

Threatpost

19.2.20 FC Barcelona Suffers Likely Credential-Stuffing Attack on Twitter Social

Threatpost

19.2.20 Ring Mandates 2FA After Rash of Hacks Safety

Threatpost

19.2.20 Iran-Backed APTs Collaborate on 3-Year ‘Fox Kitten’ Global Spy Campaign APT  BigBrothers

Threatpost

19.2.20 Active Exploits Hit Vulnerable WordPress ThemeGrill Plugin Exploit

Threatpost

19.2.20 US CISA warns of Ransomware attacks impacting pipeline operations BigBrothers  Ransomware Securityaffairs
19.2.20 Rise in Malware Using Encryption Shows Importance of Network Traffic Inspection Virus Securityweek
19.2.20 Google Removes Mideast Android App ToTok Android Securityweek
19.2.20 Over 22,000 Vulnerabilities Disclosed in 2019: Report Vulnerebility Securityweek
19.2.20 Dell to Sell RSA Security Unit for $2 Billion IT Securityweek
19.2.20

The top four Office 365 security pain points

Security

Net-security
19.2.20

Jon Callas: Encryption is a technology that rearranges power

Crypto

Net-security

19.2.20

A third of all vulnerabilities in 2019 had a CVSS v2 score of 7.0 and above

Vulnerebility

Net-security
19.2.20

8.4 million: Number of DDoS attacks researchers saw last year alone

Attack

Net-security

19.2.20

Researchers observed a 125% increase in malware targeting Windows 7

Analysis  Virus

Net-security
19.2.20

Test CISSP knowledge with interactive flash cards

Safety

Net-security
18.2.20

Unsigned Firmware running on peripherals could expose Windows, Linux systems to hack

Hacking  Vulnerebility

Securityaffairs
18.2.20

Hacking IoT devices with Focaccia-Board: A Multipurpose Breakout Board to hack hardware in a clean and easy way!

Hacking  IoT

Securityaffairs
18.2.20

Encryption Firm With NSA Roots Raises $10 Million

IT

Securityweek
18.2.20

F-Secure Patches Old AV Bypass Vulnerability

Vulnerebility

Securityweek
18.2.20

Egnyte Launches New Content Visibility and Control Platform

IT

Securityweek
18.2.20

ExtraHop Expands Enterprise IoT Security Features

IoT

Securityweek
18.2.20

Serious Vulnerabilities Expose SonicWall SMA Appliances to Remote Attacks

Vulnerebility

Securityweek
18.2.20

Microsoft Trials Election Security Solution in Wisconsin

Security

Securityweek
18.2.20

Peripherals With Unsigned Firmware Expose Windows, Linux Computers to Attacks

Attack  Vulnerebility

Securityweek
18.2.20

Iranian Hackers Exploiting VPN Flaws to Backdoor Organizations Worldwide

BigBrothers Exploit

Thehackernews
18.2.20 AZORult spreads as a fake ProtonVPN installer Virus Securelist
18.2.20 CVE-2019-0604 SharePoint Remote code execution (RCE) vulnerability Vulnerebility Securityaffairs
18.2.20 Flaw in WordPress ThemeGrill Demo Importer WordPress theme plugin expose 200K+ sites to hack Vulnerebility Securityaffairs
18.2.20 FC Barcelona and the International Olympic Committee Twitter accounts hacked Hacking Securityaffairs
18.2.20 Google Axes 500 Chrome Extensions Exfiltrating User Data Security Securityweek
18.2.20 Trump Threatens Intelligence Block Over Huawei: US Diplomat BigBrothers Securityweek
18.2.20 Critical Bug in WordPress Theme Plugin Opens 200,000 Sites to Hackers Vulnerebility Thehackernews
18.2.20 OpenSSH now supports FIDO U2F security keys for 2-factor authentication Safety Thehackernews
18.2.20

Discovering contents of folders in Windows without permissions

OS

SANS
18.2.20

The challenges of cyber research and vulnerability disclosure for connected healthcare devices

Cyber

Net-security
18.2.20

Sessions, events and seminars to check out at RSA Conference 2020

Congress

Net-security

18.2.20

Focus on cyber resilience increasing sharply as oil companies seek to protect their assets

Cyber

Net-security
18.2.20

IT and business process automation growing with cloud architectures

Security

Net-security

18.2.20

Cyber Guardian Network offers enhanced tools and technologies for MSSPs

Cyber

Net-security
17.2.20 Russian govn blocked Tutanota service in Russia to stop encrypted communication BigBrothers Securityaffairs
17.2.20 Launching the First “Yomi Hunting” Challenge! Security Securityaffairs
17.2.20 Cyberwarfare: A deep dive into the latest Gamaredon Espionage Campaign BigBrothers Securityaffairs
17.2.20 IDF soldiers tricked into installing malicious apps by Hamas operatives posing as attractive women BigBrothers Securityaffairs
17.2.20 Flaw in WordPress Themes Plugin Allowed Hackers to Become Site Admin Vulnerebility Securityweek
17.2.20 Iranian Hackers Exploited Enterprise VPN Flaws in Major Campaign BigBrothers Securityweek
17.2.20 Smartphone Voting Stirs Interest -- and Security Fears BigBrothers  Mobil Securityweek
17.2.20 Microsoft Pulls UEFI-Related Windows Update After Users Report Problems Vulnerebility Securityweek
17.2.20 A Dozen Vulnerabilities Affect Millions of Bluetooth LE Powered Devices Vulnerebility Thehackernews
17.2.20 Fox Kitten Campaign – Iranian hackers exploit 1-day VPN flaws in attacks BigBrothers Securityaffairs
17.2.20 US administration requests $9.8B for cyber 2021 budget for the Department of Defense BigBrothers Securityaffairs
17.2.20 Organizers of major hacking conferences in Asia put them on hold due to Coronavirus outbreak Hacking Securityaffairs
17.2.20 IOTA cryptocurrency shuts down entire network after a coordinated attack on its Trinity wallet Cryptocurrency Securityaffairs
17.2.20 Israeli Army: Hamas Hackers Tried to ‘Seduce’ Soldiers BigBrothers Securityweek
17.2.20

Three API security risks in the wake of the Facebook breach

Social

Net-security
17.2.20

SecOps teams face challenges in understanding how security tools work

Security

Net-security

17.2.20

Researchers design a tool to identify the source of errors caused by software update

Security

Net-security
17.2.20

Key technology trends that will redefine businesses over the next three years

Security

Net-security

17.2.20

SOAR or not to SOAR?

Security

SANS
16.2.20 Microsoft Confirms Windows 10 KB4524244 Issues and Pulls the Update OS

Bleepingcomputer

16.2.20 IRS Urges Taxpayers to Enable Multi-Factor Authentication Spam

Bleepingcomputer

16.2.20 Windows Terminal 0.9 Released with Command Line Arguments and More OS

Bleepingcomputer

16.2.20

Plastic Surgery Patient Photos, Info Exposed by Leaky Database Incindent

Bleepingcomputer

16.2.20 Mobile Phishing Campaign Uses over 200 Pages to Spoof Bank Sites Phishing

Bleepingcomputer

16.2.20 US Govt Updates Info on North Korean Malware BigBrothers

Bleepingcomputer

16.2.20 Tech Conferences in Asia On Hold Due To Coronavirus Outbreak Virus

Bleepingcomputer

16.2.20

Windows 10 KB4524244 Update Causes Freezes, Installation Issues OS

Bleepingcomputer

16.2.20 U.S. Store Chain Rutter’s Hit by Credit Card Stealing Malware Virus

Bleepingcomputer

16.2.20 Parallax RAT: Common Malware Payload After Hacker Forums Promotion Virus

Bleepingcomputer

16.2.20 Helix Bitcoin Mixer Owner Charged for Laundering Over $310 Million Cryptocurrency

Bleepingcomputer

16.2.20 US Charges Huawei With Conspiracy to Steal Trade Secrets, Racketeering BigBrothers

Bleepingcomputer

16.2.20 Sextortion Emails Sent by Emotet Earn 10 Times More Than Necurs Virus

Bleepingcomputer

16.2.20

Mozilla Firefox to Support Chrome's Image Lazy Loading Feature Security

Bleepingcomputer

16.2.20 SweynTooth Bug Collection Affects Hundreds of Bluetooth Products Vulnerebility

Bleepingcomputer

16.2.20

Ransom News Ransom Ransom
16.2.20 7 Factors to Consider When Evaluating Endpoint Protection Solutions Safety blog Sonicwall
16.2.20 A tale of two phishes: coronavirus safety and W-9 forms Malware blog Avast blog

16.2.20

Wireshark Tutorial: Examining Qakbot Infections Malware blog

Palo Alto Unity42

16.2.20 Unit 42 CTR: Leaked Code from Docker Registries Incident blog

Palo Alto Unity42

16.2.20 Unit 42 CTR: Sensitive Data Exposed in GitHub Incident blog

Palo Alto Unity42

16.2.20 Securing the Software Development Supply Chain Cyber blog

Palo Alto

16.2.20

Tapping the True Potential of the 5G Digital Economy Cyber blog

Palo Alto

16.2.20 Holistic SDN Security Makes Security Comprehensive Everywhere Cyber blog

Palo Alto

16.2.20 Cloud Native Security Beyond Your Vendor’s Tools Cyber blog

Palo Alto

16.2.20 Palo Alto Networks Executives Recognized as CRN Channel Chiefs  Cyber blog

Palo Alto

16.2.20 The Future of the Cloud Native Security Platform: Q&A with John Morell... Cyber blog

Palo Alto

16.2.20 Announcing Cortex XDR Managed Threat Hunting Service And New XDR Features Cyber blog

Palo Alto

16.2.20

Windows 10 KB4532693 Update Bug Hides User Data, Loads Wrong Profile OS

Bleepingcomputer

16.2.20 Windows 10 Insider Build 19564 Released With New Calendar App, GPU Settings OS

Bleepingcomputer

16.2.20 WordPress Cookie Consent Plugin Fixes Critical Flaw for 700K Users Vulnerebility

Bleepingcomputer

16.2.20 Microsoft Urges Exchange Admins to Disable SMBv1 to Block Malware Safety  Virus

Bleepingcomputer

16.2.20

Microsoft Posts Updated Dev Roadmap for the Edge Browser OS

Bleepingcomputer

16.2.20 Office 365 Users Get Automated Protection From Malicious Docs Virus

Bleepingcomputer

16.2.20 Google Play Protect Blocked 1.9 Billion Malware Installs in 2019 Android

Bleepingcomputer

16.2.20 BEC Fraud Profits from Gift Cards, Down 63% Over Holidays CyberCrime

Bleepingcomputer

16.2.20

Microsoft Releases February 2020 Office Updates With Security Fixes Vulnerebility

Bleepingcomputer

16.2.20 Amex, Chase Fraud Protection Emails Used as Clever Phishing Lure Phishing

Bleepingcomputer

16.2.20 FBI: Cybercrime Victims Lost $3.5 Billion in 2019 CyberCrime

Bleepingcomputer

16.2.20 Microsoft Patches Actively Exploited Internet Explorer Zero-Day Vulnerebility

Bleepingcomputer

16.2.20

Microsoft's February 2020 Patch Tuesday Fixes 99 Flaws, IE 0day Vulnerebility

Bleepingcomputer

16.2.20 Windows 10 Cumulative Updates KB4532693 & KB4532691 Released Vulnerebility

Bleepingcomputer

16.2.20 Adobe Releases the February 2020 Security Updates Vulnerebility

Bleepingcomputer

16.2.20 NextMotion plastic surgery tech firm data leak Incindent Securityaffairs
16.2.20 SweynTooth Bluetooth flaws affect devices from major system-on-a-chip (SoC) vendors Vulnerebility Securityaffairs
16.2.20 The cyber attack against Austria’s foreign ministry has ended BigBrothers Securityaffairs
16.2.20 USCYBERCOM Shares More North Korean Malware Samples BigBrothers Securityweek

15.2.20

Microsoft Backpedals on Forcing Bing Search for Office 365 Users OS

Bleepingcomputer

15.2.20 Microsoft Reveals More Windows 10X Details, Here's What we Know OS

Bleepingcomputer

15.2.20 Google Removes Dashlane Password Manager from Chrome Web Store Security

Bleepingcomputer

15.2.20 FTC Warns of Ongoing Scams Using Coronavirus Bait BigBrothers

Bleepingcomputer

15.2.20 Firefox 73 Released With Security Fixes, New DoH Provider, More Vulnerebility

Bleepingcomputer

15.2.20 SoundCloud Fixed API Flaws That Could Lead to Account Takeover Vulnerebility

Bleepingcomputer

15.2.20

StockX Adds 2-Step Verification for Better Security, Enable Now Security

Bleepingcomputer

15.2.20

Dell SupportAssist Bug Exposes Business, Home PCs to Attacks Vulnerebility

Bleepingcomputer

15.2.20 Windows Server 2008 Servers Don’t Boot After KB4539602 Update OS

Bleepingcomputer

15.2.20 Ragnar Locker Ransomware Targets MSP Enterprise Support Tools Ransomware

Bleepingcomputer

15.2.20 U.S. Charges Chinese Military Hackers for Equifax Breach BigBrothers

Bleepingcomputer

15.2.20 Improve Your Windows 10 PC With These Free Apps OS

Bleepingcomputer

15.2.20

NEW CYBER ESPIONAGE CAMPAIGNS TARGETING PALESTINIANS - PART 2: THE DISCOVERY OF THE NEW, MYSTERIOUS PIEROGI BACKDOOR BigBrother blog Cybereason
15.2.20 NEW CYBER ESPIONAGE CAMPAIGNS TARGETING PALESTINIANS - PART 1: THE SPARK CAMPAIGN BigBrother blog Cybereason
15.2.20 Knock, Knock – Who’s There? Security blog Mcafee blog
15.2.20 How Chinese Cybercriminals Use Business Playbook to Revamp Underground BigBrother blog Mcafee blog
15.2.20 Intelligence in the Enterprise Security blog Mcafee blog
15.2.20 Are Gen Z-ers More Security Savvy Online than Millennials? Security blog F5 Labs

15.2.20

Prioritizing Vulnerability Management Using Machine Learning Security blog F5 Labs

15.2.20

Top Attacks Against Service Providers 2017-2019 Attack blog F5 Labs
15.2.20 "Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests BigBrother blog F5 Labs
15.2.20 Managed Defense: The Analytical Mindset Security blog F5 Labs
15.2.20 A day^W^W Several months in the life of Project Zero - Part 2: The Chrome exploit of suffering Exploit blog Project Zero
15.2.20 A day^W^W Several months in the life of Project Zero - Part 1: The Chrome bug of suffering Exploit blog Project Zero
15.2.20 Mitigations are attack surface, too Exploit blog Project Zero

15.2.20

Threat actors attempt to capitalize on coronavirus outbreak Security blog

Cisco Talos

15.2.20 Loda RAT Grows Up Malware blog

Cisco Talos

15.2.20 Vulnerability Spotlight: Remote code execution vulnerability in Apple Safari Vulnerebility blog

Cisco Talos

15.2.20 Vulnerability Spotlight: Use-after-free vulnerability in Windows 10 win32kbase Vulnerebility blog

Cisco Talos

15.2.20 Vulnerability Spotlight: Code execution vulnerability in Microsoft Media Foundation Vulnerebility blog

Cisco Talos

15.2.20 Vulnerability Spotlight: Code execution vulnerability in Microsoft Excel Vulnerebility blog

Cisco Talos

15.2.20

Microsoft Patch Tuesday — Feb. 2020: Vulnerability disclosures and Snort coverage Vulnerebility blog

Cisco Talos

15.2.20 Vulnerability Spotlight: Information leak vulnerability in Adobe Acrobat Reader’s JavaScript function Vulnerebility blog

Cisco Talos

15.2.20 Introducing Cisco Talos Incident Response: Stories from the Field Security blog

Cisco Talos

15.2.20 Vulnerability Spotlight: Accusoft ImageGear library code execution vulnerabilities Vulnerebility blog

Cisco Talos

15.2.20 PayPal remains the most‑spoofed brand in phishing scams Phishing blog

Eset

15.2.20 How romance scammers break your heart – and your bank account Spam blog

Eset

15.2.20

FBI: Cybercrime losses tripled over the last 5 years Cyber blog

Eset

15.2.20 Almost 2 billion malware installs thwarted by Google Play Protect in 2019 Malware blog

Eset

15.2.20 Digital addiction: How to get your children off their screens Cyber blog Eset
15.2.20 Microsoft Patch Tuesday fixes IE zero‑day and 98 other flaws Vulnerebility blog Eset
15.2.20 Competing in esports: 3 things to watch out for

Cyber blog

Eset

15.2.20

AR20-045E : MAR-10271944-2.v1 – North Korean Trojan: ARTFULPIE

CERT Analysy

CERT Analysy
15.2.20

AR20-045D : MAR-10271944-1.v1 – North Korean Trojan: HOTCROISSANT

CERT Analysy

CERT Analysy
15.2.20

AR20-045C : MAR-10265965-3.v1 – North Korean Trojan: CROWDEDFLOUNDER

CERT Analysy

CERT Analysy
15.2.20

AR20–045B : MAR-10265965-2.v1 – North Korean Trojan: SLICKSHOES

CERT Analysy

CERT Analysy
15.2.20

AR20-045A : MAR-10265965-1.v1 – North Korean Trojan: BISTROMATH

CERT Analysy

CERT Analysy
15.2.20

AR20-045F : MAR-10271944-3.v1 – North Korean Trojan: BUFFETLINE

CERT Analysy

CERT Analysy

15.2.20

AR19-304A : MAR-10135536-8 – North Korean Trojan: HOPLIGHT

CERT Analysy

CERT Analysy

15.2.20

Hackers Can Seize Control of Ballots Cast Using the Voatz Voting App, Researchers Say

Hacking

Threatpost

15.2.20

SMS Phishing Campaign Targets Mobile Bank App Users in North America

Mobil  Phishing

Threatpost

15.2.20

Apple iPhone Users Targeted with Bogus Dating App for Valentine’s Day

Apple

Threatpost

15.2.20

News Wrap: Valentine’s Day Scams and Emotet’s Wi-Fi Hack

Security

Threatpost

15.2.20

Huawei Controversy Highlights 5G Security Implications

BigBrothers  Mobil

Threatpost

15.2.20

500 Malicious Chrome Extensions Impact Millions of Users

Virus

Threatpost

15.2.20

US Govt agencies detail North Korea-linked HIDDEN COBRA malware

BigBrothers

Securityaffairs
15.2.20

Russian watchdog fines Twitter, Facebook for not moving user data to local servers

BigBrothers  Social

Securityaffairs
15.2.20

3 Employees Suspended in $4M Puerto Rico Online Scam

Spam

Securityweek
15.2.20

SweynTooth: Bluetooth Vulnerabilities Expose Many Devices to Attacks

Attack  Vulnerebility

Securityweek
15.2.20

Many Upstream Oil and Gas Companies Invested in Cybersecurity in 2019: Survey

Cyber

Securityweek

14.2.20

Nedbank client data compromised in security breach at third-party provider Incindent Securityaffairs
14.2.20 PoS malware infected systems at 71 locations operated by US store chain Rutter’s Virus Securityaffairs
14.2.20 Facebook Spars With EU Regulator Over Dating App Delay Social Securityweek
14.2.20 Over 70 Rutter's Stores Hit by Payment Card Breach Incindent Securityweek

14.2.20

MIT Researchers Find Vulnerabilities in Voatz Voting App Vulnerebility Securityweek
14.2.20 Twitter, Facebook Fined for Not Moving User Data to Russia Social Securityweek
14.2.20 Microsoft Brings Safe Documents, Application Guard to More 365 ProPlus Users Security Securityweek
14.2.20 Official: Puerto Rico Govt Loses $2.6M in Phishing Scam Phishing Securityweek
14.2.20 U.S. Charges Huawei with Stealing Trade Secrets from 6 Companies BigBrothers Thehackernews

14.2.20

500 Chrome Extensions Caught Stealing Private Data of 1.7 Million Users Incindent Thehackernews

14.2.20

Puerto Rico Gov Hit By $2.6M Phishing Scam Phishing

Threatpost

14.2.20 Privacy Experts Skeptical of Proposed Data Protection Agency Privacy

Threatpost

14.2.20 Critical WordPress Plugin Bug Afflicts 700K Sites Vulnerebility

Threatpost

14.2.20 Google: Efforts Against Bad Android Apps on Play Store Are Working Android

Threatpost

14.2.20

Helix Bitcoin Mixer operator charged for laundering over $300M worth of Bitcoin Cryptocurrency Securityaffairs
14.2.20 Three Italian universities hacked by LulzSec_ITA collective Hacking Securityaffairs
14.2.20 Huawei Hit With New US Charges of Trade Secrets Theft BigBrothers Securityweek
14.2.20 New Backdoor Attacks Leverage Political Turmoil in Middle East Virus Securityweek
14.2.20 Profinet Vulnerability Exposes Siemens, Moxa Devices to DoS Attacks Attack  Vulnerebility Securityweek

14.2.20

Keep an Eye on Command-Line Browsers

Security

SANS
14.2.20

Seven cybersecurity and privacy forecasts for 2020

Cyber

Net-security
14.2.20

43% of IT professionals are still tracking assets in spreadsheets

Security

Net-security

14.2.20

Digital certificates still cause unplanned downtime and application outages

Security

Net-security
14.2.20

Global spending on smart cities initiatives to total nearly $124 billion in 2020

Security

Net-security

13.2.20

MoleRATs APT group targets Palestinian territories APT Securityaffairs

13.2.20

US officials claim Huawei Equipment has secret backdoor for spying BigBrothers Securityaffairs

13.2.20

Google: Protections Added by Samsung to Android Kernel Increase Attack Surface Android  Attack Securityweek

13.2.20

Threat Intelligence Company Sixgill Raises $15 Million IT Securityweek

13.2.20

Threat From Spoofed Emails Grows, While DMARC Implementation Lags Spam Securityweek

13.2.20

Google Play Protect prevented 1.9 billion malware installs from Third-party stores in 2019 Android Securityaffairs

13.2.20

WhatsApp Defends Encryption as It Tops 2 Billion Users Social Securityweek

13.2.20

Facebook Removes More State-Linked Misleading Accounts Social Securityweek

13.2.20

SOC-as-a-Service Company Cysiv Raises $26 Million IT Securityweek

13.2.20

2020 State of Malware Report Report Report

13.2.20

2020 SONICWALL CYBER THREAT REPORT Report Report

13.2.20

DDoS attacks in Q4 2019 Attack Securelist

13.2.20

600+ installs of WordPress Cookie Consent Plugin vulnerable to hack. Fix it now! Vulnerebility Securityaffairs

13.2.20

Microsoft recommends Exchange admins to disable the SMBv1 protocol Safety Securityaffairs

13.2.20

White House Claims Huawei Equipment Has Backdoor for Spying BigBrothers Securityweek

13.2.20

FBI: $3.5B Lost in 2019 to Known Cyberscams, Ransomware

CyberCrime

Threatpost

13.2.20

Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches

Attack

Threatpost

13.2.20

SoundCloud Tackles DoS, Account Takeover Issues

Attack

Threatpost

13.2.20

Katie Moussouris: The Bug Bounty Conflict of Interest

Security

Threatpost

13.2.20

Mozilla Firefox 73 Browser Update Fixes High-Severity RCE Bugs

Vulnerebility

Threatpost

13.2.20

Intel Patches High-Severity Flaw in Security Engine

Vulnerebility

Threatpost

13.2.20

Estée Lauder Exposes 440M Records, with Email Addresses, Network Info

Incindent

Threatpost

13.2.20

Adobe Addresses Critical Flash, Framemaker Flaws

Vulnerebility

Threatpost

13.2.20

Dell Patches SupportAssist Flaw That Allows Arbitrary Code Execution

Vulnerebility

Threatpost

13.2.20 2019 INTERNET CRIME REPORT Report Report

13.2.20

IBM ServeRAID Manager exposes unauthenticated Java Remote Method Invocation (RMI) service Alert Alert

13.2.20

Siemens fixed multiple DoS flaws in several products ICS Securityaffairs

13.2.20

SAP Releases 13 Security Notes on February 2020 Patch Day Vulnerebility Securityweek

13.2.20

Google Play Protect Scans 100 Billion Android Apps Daily Android Securityweek

13.2.20

Emotet Malware Now Hacks Nearby Wi-Fi Networks to Infect New Victims Virus Thehackernews

13.2.20

March Patch Tuesday is Coming - the LDAP Changes will Change Your Life!

Vulnerebility

SANS

13.2.20

Security pros anticipate automation will reduce IT security headcount, but not replace human expertise

Security

Net-security

13.2.20

A closer look at the global threat landscape

Security

Net-security

13.2.20

Cryptocurrency crime losses more than double to $4.5 billion in 2019

Cryptocurrency

Net-security

13.2.20

Employees aware of privacy risks, but unsure of how they affect the workplace

Security

Net-security

13.2.20

Crucial trends shaping the managed services market

Security

Net-security

13.2.20

Download: The (ISC)2 Exam Action Plan for CISSP, SSCP, or CCSP certification

Security

Net-security

13.2.20

Half of cybercrime losses in 2019 were the result of BEC scams

CyberCrime

Net-security
12.2.20 Reading the 2019 Internet Crime Complaint Center (IC3) report CyberCrime Securityaffairs

12.2.20

Crypto AG was spied for US, German intelligence agencies for decades BigBrothers Securityaffairs

12.2.20

Microsoft Patch Tuesday updates for February 2020 fix IE 0day flaw Vulnerebility Securityaffairs

12.2.20

440M records found online in unprotected database belonging to Estée Lauder Incindent Securityaffairs

12.2.20

Apple Joins FIDO Alliance Apple Securityweek

12.2.20

Siemens Patches Serious DoS Vulnerabilities in Several Products ICS Securityweek

12.2.20

Randori Arms Red Teams With New Automated Attack Platform Attack Securityweek

12.2.20

BEC Losses Surpassed $1.7 Billion in 2019: FBI Spam  Incindent Securityweek

12.2.20

Over 15.1 Billion Records Exposed in Data Breaches in 2019 Incindent Securityweek

12.2.20

KBOT Malware Shows Viruses Are Not Extinct Virus Securityweek

12.2.20

Deep Instinct Raises $43 Million in Series C Funding Round IT Securityweek

12.2.20

Emotet Malware Now Hacks Nearby Wi-Fi Networks to Infect New Victims Virus Securityweek
12.2.20 Adobe addresses 42 flaws in its five products Vulnerebility Securityaffairs

12.2.20

OT attacks increased by over 2000 percent in 2019, IBM reports Attack  ICS Securityaffairs

12.2.20

Coronavirus-Themed Emails Deliver Malware, Phishing, Scams Phishing  Spam  Virus Securityweek

12.2.20

Beauty and the Breach: Estée Lauder Exposes 440 Million Records in Unprotected Database Incindent Securityweek

12.2.20

Switzerland Investigating Alleged CIA, German Front Company BigBrothers Securityweek

12.2.20

Microsoft Patches IE Zero-Day, 98 Other Vulnerabilities Vulnerebility Securityweek

12.2.20

US, German Spies Plundered Global Secrets Via Swiss Encryption Firm: Report BigBrothers Securityweek

12.2.20

Equifax Breach is the Latest of Many Hacks Linked to China BigBrothers  Incindent Securityweek

12.2.20

Adobe Patches 42 Vulnerabilities Across Five Products Vulnerebility Securityweek

12.2.20

Update Microsoft Windows Systems to Patch 99 New Security Flaws Vulnerebility Thehackernews

12.2.20

Adobe Releases Patches for Dozens of Critical Flaws in 5 Software Vulnerebility Thehackernews

12.2.20

Malpsam pushes Ursnif through Italian language Word docs

Spam

SANS

12.2.20

Emotet: Crimeware you need to be aware of

Virus

Net-security

12.2.20

Credential exposure report: Poor password habits still pose a serious threat

Security

Net-security

12.2.20

Mac threats are growing faster than their Windows counterparts

Apple

Net-security

12.2.20

The rise of human-driven fraud attacks

Attack

Net-security

12.2.20

Download: IR Management and Reporting PowerPoint template

Security

Net-security

12.2.20

MorganFranklin names Jason Berland as Managing Director of its IAM service offering

Security

Net-security

12.2.20

February 2020 Patch Tuesday: Microsoft fixes 99 vulnerabilities, Adobe 42

Vulnerebility

Net-security
11.2.20 Dell SupportAssist flaw exposes computers to hack, patch it asap! Vulnerebility Securityaffairs
11.2.20 Safer internet day – Cybercrime facts Infographic CyberCrime Securityaffairs
11.2.20 Flaws in Accusoft ImageGear Expose Users to Remote Attacks Vulnerebility Securityweek
11.2.20 Another Flaw in Dell SupportAssist Allows Code Execution With Elevated Privileges Vulnerebility Securityweek
11.2.20 Firefox 74 Will Disable TLS 1.0 and TLS 1.1 by Default Safety Securityweek
11.2.20 Echobot Malware Drives Significant Increase in OT Attacks Virus Securityweek
11.2.20 App Used by Israel's Ruling Party Leaked Personal Data of All 6.5 Million Voters BigBrothers Thehackernews
11.2.20

The 25 most impersonated brands in phishing attacks

Attack  Phishing

Net-security

11.2.20

12,000+ Jenkins servers can be exploited to launch, amplify DDoS attacks

Attack

Net-security

11.2.20 South Korean Woori Bank is accused of unauthorized use of customer data Incindent Securityaffairs
11.2.20 The Altsbit exchange will exit in May following a hack Hacking Securityaffairs
11.2.20 China Denies U.S. Allegations Over Military 'Hackers' BigBrothers Securityweek
11.2.20 Emotet Now Hacks Nearby Wi-Fi Networks to Spread Like a Worm Virus

Threatpost

11.2.20 Docker Registries Expose Hundreds of Orgs to Malware, Data Theft Incindent  Virus

Threatpost

11.2.20 BYO-Bug Tactic Attacks Windows Kernel with Outdated Driver Attack

Threatpost

11.2.20 Active PayPal Phishing Scam Targets SSNs, Passport Photos Phishing

Threatpost

11.2.20 Equifax Breach: Four Members of Chinese Military Charged with Hacking Incindent Threatpost
11.2.20 Chinese Military personnel charged with hacking into credit reporting agency Equifax BigBrothers Securityaffairs
11.2.20 Unique Illinois Privacy Law Leads to $550M Facebook Deal Social Securityweek
11.2.20 Chinese Military Stole Masses of Americans’ Data, US Says BigBrothers Securityweek
11.2.20 Misconfigured Docker Registries Expose Thousands of Repositories Incindent Securityweek
11.2.20

Cybersecurity is a board level issue: 3 CISOs tell why

Security

Net-security

11.2.20

In 2019, a total of 7,098 reported breaches exposed 15.1 billion records

Incindent

Net-security

11.2.20

Organizations struggling to find skilled security staff, leaving 82% of security teams understaffed

Security

Net-security

11.2.20

eBook: 8 Real World Use Cases for SOAR

Security

Net-security

11.2.20

Ransomware uses vulnerable, signed driver to disable endpoint security

Ransomware

Net-security
10.2.20 U.S. Charges 4 Chinese Military Hackers Over Equifax Data Breach BigBrothers Thehackernews
10.2.20 Netanyahu’s party Elector app exposes data on over 6.5M Israelis BigBrothers  Social Securityaffairs
10.2.20 Presidential Candidates' Use of DMARC Improves, but Remains Short of Optimum BigBrothers Securityweek
10.2.20 Ransomware Hits North Miami Beach Police Department Ransomware Securityweek
10.2.20 Chinese Military Hackers Charged Over Equifax Data Breach BigBrothers  Incindent Securityweek
10.2.20 Netherlands University Pays $240,000 After Targeted Ransomware Attack Ransomware Securityweek
10.2.20 Facebook Paid $2.2 Million in Bug Bounty Rewards in 2019 Social Securityweek
10.2.20 KBOT: sometimes they come back Virus Securelist
10.2.20 1.2 million CPR numbers for Danish citizen leaked through tax service Incindent Securityaffairs
10.2.20 A sad story of pedophilia on how disgusting images fed the web BigBrothers  Cyber Securityaffairs
10.2.20 Malaysia’s MyCERT warns cyber espionage campaign carried out by APT40 BigBrothers Securityaffairs
10.2.20 A cyber-attack on major banks could trigger a liquidity crisis, ECB President Christine Lagarde warns Attack  BigBrothers Securityaffairs
10.2.20 Israel's Likud Party Exposed Details of Over 6 Million Voters BigBrothers Securityweek
10.2.20 Facebook's Twitter, Instagram Accounts Hacked Social Securityweek
10.2.20

Shadow IT accounts with weak passwords endanger organizations

Security

Net-security
10.2.20

The frequency of DDoS attacks depends on the day and time

Attack

Net-security

10.2.20

Current PayPal phishing campaign or "give me all your personal information"

Phishing

SANS
10.2.20 Massive DDoS attack brought down 25% Iranian Internet connectivity Attack Securityaffairs
10.2.20 The number of cyber attacks on Saudi Aramco is increasing Attack Securityaffairs
10.2.20 Maastricht University finally paid a 30 bitcoin ransom to crooks Ransomware Securityaffairs
10.2.20 Iran Says Foils Cyberattack Targeting Internet Providers BigBrothers Securityweek
10.2.20

5 tips for acquiring cyber talent in 2020

Cyber

Net-security

10.2.20

What the government infosec landscape will look this year

BigBrothers

Net-security

10.2.20

The future of DNS security: From extremes to a new equilibrium

Security

Net-security

10.2.20

Study: The Blind Spots of Email Security

Security

Net-security

9.2.20 Windows 10 Start Menu Suggests Firefox Users Switch to Edge OS

Bleepingcomputer

9.2.20 Microsoft’s Surface Duo Spotted in the Wild, Video Leaked OS

Bleepingcomputer

9.2.20 Lock My PC Used By Tech Support Scammers, Dev Offers Free Recovery Spam

Bleepingcomputer

9.2.20 Windows 7 Users Suddenly Can't Shut Down Their PCs, How to Fix OS

Bleepingcomputer

9.2.20 Twitter Outage Prevents Users From Sending New Tweets Social

Bleepingcomputer

9.2.20 TA505 Hackers Behind Maastricht University Ransomware Attack Ransomware

Bleepingcomputer

9.2.20 Microsoft Releases Windows 7 Update to Fix Wallpaper Bug OS

Bleepingcomputer

9.2.20 Misconfigured Docker Registries Expose Orgs to Critical Risks Incindent

Bleepingcomputer

9.2.20 Emotet Hacks Nearby Wi-Fi Networks to Spread to New Victims Virus

Bleepingcomputer

9.2.20 Critical Android Bluetooth Flaw Exploitable without User Interaction Android

Bleepingcomputer

9.2.20 Japanese Defense Contractors Kobe Steel, Pasco Disclose Breaches BigBrothers  Incindent

Bleepingcomputer

9.2.20 Google Chrome to Block Mixed Content Downloads, Prevents MiTM Attacks Attack

Bleepingcomputer

9.2.20 Phishing Attack Disables Google Play Protect, Drops Anubis Trojan Android  Phishing

Bleepingcomputer

9.2.20 DoJ Asks Victims of the Quantum DDoS Service to Come Forward BigBrothers

Bleepingcomputer

9.2.20 Ransomware Exploits GIGABYTE Driver to Kill AV Processes Ransomware

Bleepingcomputer

9.2.20 Oscar Nominated Movies Featured in Phishing, Malware Attacks Phishing  Virus

Bleepingcomputer

9.2.20 BEC Scammers’ Interest in the Real Estate Sector Rises Spam

Bleepingcomputer

9.2.20 Bug in Philips Smart Light Allows Hopping to Devices on the Network Vulnerebility

Bleepingcomputer

9.2.20 Medicaid CCO Vendor Breach Exposes Health, Personal Info of 654K Incindent

Bleepingcomputer

9.2.20 Mailto (NetWalker) Ransomware Targets Enterprise Networks Ransomware

Bleepingcomputer

9.2.20 Ransom News Ransom Ransom
9.2.20 Cisco Patches Critical CDP Flaws Affecting Millions of Devices Vulnerebility

Bleepingcomputer

9.2.20 Microsoft Starts Testing Hyper-V for Windows 10 ARM64 Devices OS

Bleepingcomputer

9.2.20 Charming Kitten Hackers Impersonate Journalist in Phishing Attacks Phishing

Bleepingcomputer

9.2.20 New Ransomware Strain Halts Toll Group Deliveries Ransomware

Bleepingcomputer

9.2.20 Windows 10 Search Is Broken and Shows Blank Results, How to Fix OS

Bleepingcomputer

9.2.20 Bitbucket Abused to Infect 500,000+ Hosts with Malware Cocktail Virus

Bleepingcomputer

9.2.20 Realtek Fixes DLL Hijacking Flaw in HD Audio Driver for Windows Hacking  Vulnerebility

Bleepingcomputer

9.2.20 Chrome 80 Released With 56 Security Fixes, Cookie Changes, More Vulnerebility

Bleepingcomputer

9.2.20 Emotet Gets Ready for Tax Season With Malicious W-9 Forms Virus

Bleepingcomputer

9.2.20 FBI Warns of DDoS Attack on State Voter Registration Site Attack  BigBrothers

Bleepingcomputer

9.2.20 WhatsApp Bug Allowed Attackers to Access the Local File System Social  Vulnerebility

Bleepingcomputer

9.2.20 Google Bug Sent Private Google Photos Videos to Other Users Vulnerebility

Bleepingcomputer

9.2.20 Inside Cybercriminal Inc.: SonicWall Exposes New Cyberattack Data, Threat Actor Behaviors in Latest Report Cyber blog Sonicwall
9.2.20 Unit 42 Cloud Threat Report: Spring 2020 Cyber blog

Palo Alto Unity42

9.2.20 Unit 42 CTR: Leaked Code from Docker Registries Cyber blog

Palo Alto Unity42

9.2.20 Unit 42 CTR: Sensitive Data Exposed in GitHub Cyber blog

Palo Alto Unity42

9.2.20 Actors Still Exploiting SharePoint Vulnerability to Attack Middle East Government Organizations Vulnerebility blog

Palo Alto Unity42

9.2.20 The Cloud’s Sunny Future: The Rewards of Working in Cloud Security Cyber blog

Palo Alto

9.2.20 Announcing Cortex XDR Managed Threat Hunting Service And New XDR Features Cyber blog

Palo Alto

9.2.20 The Road to 100 on the HRC’s 2020 Corporate Equality Index Cyber blog

Palo Alto

9.2.20 Book Review: “The Fifth Domain” Cyber blog

Palo Alto

9.2.20 Cyborgs, Trolls and Bots: A Guide to Online Misinformation BotNet Securityweek
9.2.20 IoT devices at major Manufacturers infected with crypto-miner Cryptocurrency  IoT Securityaffairs
9.2.20 Facebook’s official Twitter and Instagram accounts hacked by OurMine Social Securityaffairs
9.2.20 Group-IB detects Half a Million Indian Banks’ Cards on Joker’s Stash Cardshop CyberCrime Securityaffairs
8.2.20 Office 365 to Block Harmful Content Regardless of Custom Configs Security

Bleepingcomputer

8.2.20 New EmoCheck Tool Checks if You're Infected With Emotet Virus

Bleepingcomputer

8.2.20 Twitter Fixed Issue Exploited to Match Phone Numbers to Accounts Social

Bleepingcomputer

8.2.20 Nintendo Hacker Pleads Guilty to Child Porn Charges, Faces 25 Years IT

Bleepingcomputer

8.2.20 Bouygues Construction Shuts Down Network to Thwart Maze Ransomware Ransomware

Bleepingcomputer

8.2.20 DoD to Require Cybersecurity Certification From Defense Contractors BigBrothers

Bleepingcomputer

8.2.20 DoppelPaymer Ransomware Sells Victims' Data on Darknet if Not Paid Ransomware

Bleepingcomputer

8.2.20 'Hack' Creates Fake Google Maps Traffic Jams With 99 Cell Phones Mobil

Bleepingcomputer

8.2.20 38,000 Flash Games Archived for Offline Play and Preservation IT

Bleepingcomputer

8.2.20 Notepad and Paint Become Optional Features in Windows 10 OS

Bleepingcomputer

8.2.20 Tech Support Scam Hitting Microsoft Edge Start Page Takes a Break Spam

Bleepingcomputer

8.2.20 Pirated Software is All Fun and Games Until Your Data’s Stolen Hacking

Bleepingcomputer

8.2.20 THE HOLE IN THE BUCKET: ATTACKERS ABUSE BITBUCKET TO DELIVER AN ARSENAL OF MALWARE Malware blog Cybereason
8.2.20 U.S. Battleground County Website Security Survey BigBrother blog Mcafee blog
8.2.20 Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in December 2019 Security blog F5 Labs
8.2.20 STOMP 2 DIS: Brilliance in the (Visual) Basics Malware blog FireEye
8.2.20 Quarterly Report: Incident Response trends in fall 2019 Incident blog

Cisco Talos

8.2.20 Vulnerability Spotlight: Denial-of-service, information leak bugs in Mini-SNMPD Vulnerebility blog

Cisco Talos

8.2.20 Critical Bluetooth bug leaves Android users open to attack OS Blog  Vulnerebility blog

Eset

8.2.20 Facebook now lets parents monitor their children’s chats Social blog

Eset

8.2.20 How to catch a cybercriminal: Tales from the digital forensics lab Cyber blog

Eset

8.2.20 Electric scooters vulnerable to remote hacks Vulnerebility blog

Eset

8.2.20 Facebook privacy settings: Protect your data with these tips Social blog Eset
8.2.20 Would you get hooked by a phishing scam? Test yourself Phishing blog Eset
8.2.20 Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANs Vulnerebility

Threatpost

8.2.20 Magecart Gang Attacks Olympic Ticket Reseller and Survival Food Sites CyberCrime

Threatpost

8.2.20 Google Chrome To Bar HTTP File Downloads Security

Threatpost

8.2.20 Phishing Campaign Targets 250 Android Apps with Anubis Malware Android  Phishing

Threatpost

8.2.20 Wacom Tablet Data Exfiltration Raises Security Concerns Security

Threatpost

8.2.20 Critical Android Bluetooth Bug Enables RCE, No User Interaction Needed Android

Threatpost

8.2.20 RobbinHood ransomware exploit GIGABYTE driver flaw to kill security software Ransomware Securityaffairs
8.2.20 Chrome Will Block Insecure Downloads on HTTPS Pages Security Securityweek
8.2.20 IoT Devices at Major Manufacturers Infected With Malware via Supply Chain Attack Attack  IoT  Virus Securityweek
8.2.20 Organizations Quick to Patch Critical Citrix ADC Vulnerability Vulnerebility Securityweek
7.2.20 Japanese defense contractors Pasco and Kobe Steel disclose security breaches BigBrothers Securityaffairs
7.2.20 DoJ Looking for Victims of 'Quantum Stresser' DDoS Service BigBrothers Securityweek
7.2.20 Brazil Judge Rejects Hacking Accusation Against Greenwald Hacking Securityweek
7.2.20 Critical Bluetooth Vulnerability Exposes Android Devices to Attacks Attack  Vulnerebility Securityweek
7.2.20 Happy New Fear! Gift-wrapped spam and phishing Phishing  Spam Securelist
7.2.20 Iran-linked APT group Charming Kitten targets journalists, political and human rights activists APT Securityaffairs
7.2.20 Critical Android Bluetooth flaw CVE-2020-0022 could be exploited without user interaction Android Securityaffairs
7.2.20 Malicious Optimizers Hosted on Google Play Amassed 470,000 Downloads Android Securityweek
7.2.20 Japanese Defense Contractors Pasco, Kobe Steel Disclose Old Breaches Incindent Securityweek
7.2.20

Sandbox Detection Tricks & Nice Obfuscation in a Single VBScript

Virus

SANS

7.2.20

Phishers impersonate WHO, exploit coronavirus-related anxiety

Exploit  Phishing

Net-security

7.2.20

February 2020 Patch Tuesday forecast: A lot of love coming our way

Vulnerebility

Net-security

7.2.20 U.S. Finance Sector Hit with Targeted Backdoor Campaign Virus

Threatpost

7.2.20 Charming Kitten Uses Fake Interview Requests to Target Public Figures Security

Threatpost

7.2.20 Metamorfo Returns with Keylogger Trick to Target Financial Firms Virus

Threatpost

7.2.20 Dropbox Passes $1M Milestone for Bug-Bounty Payouts Security

Threatpost

7.2.20 Iranian Hackers Target Journalists in New Phishing Campaign BigBrothers  Phishing Securityweek
7.2.20

Review: Cyber Minds

Cyber

Net-security

7.2.20

Discrepancies between data sanitization policy creation and execution put data at risk

Security

Net-security

7.2.20

43% of cloud databases are currently unencrypted

Crypto

Net-security

7.2.20

In 2020, 5G deployments will continue at a frantic pace

Mobil

Net-security

6.2.20

cdpwn – Millions of devices at risk due to flaws in implementations of Cisco Discovery Protocol (CDP) Vulnerebility Securityaffairs

6.2.20

Hacking Wi-Fi networks by exploiting a flaw in Philips Smart Light Bulbs Exploit Securityaffairs

6.2.20

New Campaign Leverages BitBucket to Deliver Arsenal of Malware Virus Securityweek

6.2.20

DLL Hijacking Vulnerability Found in Realtek HD Audio Driver Hacking  Vulnerebility Securityweek

6.2.20

Cloud Security Firm Netskope Raises $340 Million at $3 Billion Valuation IT Securityweek

6.2.20

Forescout Technologies to be Acquired in $1.9 Billion Deal IT Securityweek

6.2.20

Patch Management Company Automox Raises $30 Million IT Securityweek

6.2.20

Louisiana Governor Urges Officials to Ready for Cyberattacks BigBrothers Securityweek

6.2.20

FBI Director Warns of Ongoing Russian 'Information Warfare' BigBrothers Securityweek

6.2.20

Emotet can spread to poorly secured Wi-Fi networks and computers on them

Virus

Net-security

6.2.20

Cisco Discovery Protocol (CDP) enabled devices are vulnerable to denial-of-service and remote code execution

Alert

Alert

6.2.20

CamuBot Banking Trojan Returns In Targeted Attacks

Attack  Virus

Threatpost

6.2.20

Critical Cisco ‘CDPwn’ Flaws Break Network Segmentation

Vulnerebility

Threatpost

6.2.20

New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers

IoT  Virus

Threatpost

6.2.20

Gamaredon APT Improves Toolset to Target Ukraine Government, Military

APT

Threatpost

6.2.20

WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE

Social  Virus

Threatpost

6.2.20

Critical Cisco ‘CDPwn’ Protocol Flaws Explained: Podcast

Vulnerebility

Threatpost

6.2.20

Chrome 80 Released With 56 Security Fixes

Security  Vulnerebility

Securityweek

6.2.20

Google Shared Private Videos With Wrong Users

Security

Securityweek

6.2.20

CERN Physics Lab Drops Facebook Over Data Concerns

Social

Securityweek

6.2.20

Hackers Can Steal Data From Air-Gapped Computers Via Screen Brightness

Attack

Securityweek

6.2.20

5 High Impact Flaws Affect Cisco Routers, Switches, IP Phones and Cameras

Vulnerebility

Thehackernews

6.2.20

Fake browser update pages are "still a thing"

Security

SANS

6.2.20

Honware: IoT honeypot for detecting zero-day exploits

Exploit  IoT

Net-security

6.2.20

Which vulnerabilities were most exploited by cybercriminals in 2019?

CyberCrime

Net-security

6.2.20

The Goldilocks principle for zero trust fraud prevention

Incindent

Net-security

6.2.20

Cyberattackers decreased their activity at the end of 2019, but only to change tactics

Cyber

Net-security

6.2.20

How IoT devices open a portal for chaos across the network

IoT

Net-security

6.2.20

CDPwn vulnerabilities open millions of Cisco enterprise devices to attack

Vulnerebility

Net-security

5.2.20 Microsoft detects 77,000 active web shells on a daily basis Security Securityaffairs
5.2.20 Expert released PoC exploit code for unpatched backdoor in HiSilicon chips Exploit Securityaffairs
5.2.20 Leidos Buys L3Harris Security and Automation Business for $1 Billion IT Securityweek
5.2.20 Cisco Discovery Protocol Flaws Expose Tens of Millions of Devices to Attacks Vulnerebility Securityweek
5.2.20 Vulnerability in WhatsApp Desktop Exposed User Files Social  Vulnerebility Securityweek
5.2.20 Smart Lightbulbs Used to Compromise Home and Business Networks Incindent Securityweek
5.2.20 Iowa Fiasco Highlights Security Risks in US Vote, Officials Say BigBrothers Securityweek
5.2.20