Calendar 2020 May- Home  2020  2019  2018  2017  2016

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2020 - January February March April May June July August September October November December


Date

Name

Category

Web

28.5.20

External attacks on cloud accounts grew 630 percent from January to April

Attack

Net-security
28.5.20

C-suite execs often pressure IT teams to make security exceptions for them

Security

Net-security

28.5.20

Operators rethinking security while making rapid progress toward 5G

Mobil

Net-security

27.5.20

Researchers dismantled ShuangQiang gang’s botnet that infected thousands of PCs BotNet

Securityaffairs

27.5.20

Boris Johnson to reduce Huawei’s role in national 5G network BigBrothers  Mobil

Securityaffairs

27.5.20

Apple Patches Over 40 Vulnerabilities in macOS Catalina Apple

Securityweek

27.5.20

The Security of Your Android Device May Depend on Where You Live Android Securityweek

27.5.20

French Privacy Watchdog Okays Coronavirus Tracing App BigBrothers Securityweek

27.5.20

US Lawmakers Push for Internet Privacy Amendments to USA Freedom Act BigBrothers

Securityweek

27.5.20

Turla's Updated ComRAT Malware Uses Gmail for C&C Communication APT Securityweek

27.5.20

Governments Asked to Stop Cyberattacks on Healthcare Systems BigBrothers Securityweek

27.5.20

Chinese Researchers Disrupt Malware Attack That Infected Thousands of PCs Virus Thehackernews

27.5.20

Frankenstein's phishing using Google Cloud Storage

Phishing

SANS

27.5.20

Account credentials of 26+ million LiveJournal users leaked online

Incindent

Net-security

27.5.20

Application threats and security trends you need to know about

Security

Net-security

27.5.20

What’s trending on the underground market?

Security

Net-security

27.5.20

The “Silent Night” Zloader/Zb Papers Papers

27.5.20

Turla APT Revamps One of Its Go-To Spy Tools APT

Threatpost

27.5.20

New iOS Jailbreak Tool Works on iPhone Models iOS 11 to iOS 13.5 Apple

Threatpost

27.5.20

StrandHogg 2.0 Critical Bug Allows Android App Hijacking Android Threatpost

27.5.20

StrandHogg 2.0 Android flaw affects over 1 Billion devices Android

Securityaffairs

27.5.20

New Turla ComRAT backdoor uses Gmail for Command and Control APT

Securityaffairs

27.5.20

Qatar Tracing App Flaw Exposed 1 Mn Users' Data: Amnesty BigBrothers

Securityweek

27.5.20

Hacker Behind 'Doxxing' of German Politicians Charged BigBrothers Securityweek

27.5.20

Silent Night: A New Malware-as-a-Service Banking Trojan Analyzed Virus Securityweek

27.5.20

StrandHogg 2.0 Vulnerability Allows Hackers to Hijack Android Devices Android Securityweek

27.5.20

Samsung Unveils New Security Chip for Mobile Devices Mobil

Securityweek

27.5.20

FTC Settles With Canadian Smart Lock Maker Over Security Practices BigBrothers Securityweek

27.5.20

Vulnerabilities Found in Emerson SCADA Product Made for Oil and Gas Industry ICS Securityweek

27.5.20

Jailbreak Tool Updated to Unlock iPhones Running iOS 13.5 Apple Securityweek

27.5.20

Internet Organizations Ask US House to Limit Access to Search, Browsing History BigBrothers Securityweek

27.5.20

New Android Flaw Affecting Over 1 Billion Phones Let Attackers Hijack Apps Android Thehackernews

27.5.20

iOS contains an unspecified kernel vulnerability Alert Alert

27.5.20

Seriously, SHA3 where art thou?

Crypto

SANS

27.5.20

Creating an emergency ready cybersecurity program

Cyber

Net-security

27.5.20

Maintaining the SOC in the age of limited resources

Security

Net-security

27.5.20

23% of leading banks had an exposed database with potential data leakage

Incindent

Net-security

27.5.20

GDPR enforcement over the past two years

Privacy

Net-security

27.5.20

Patented algorithms predict, identify, diagnose and prevent abnormalities in complex systems

Security

Net-security

26.5.20

Spam and phishing in Q1 2020

Analysis  Phishing  Spam

Securelist

26.5.20

Hangzhou could permanently adopt COVID-19 contact-tracing app

Mobil  Privacy

Securityaffairs

26.5.20

Bugs in open-source libraries impact 70% of modern software

Vulnerebility

Securityaffairs

26.5.20

UK Set to Scale Back Huawei Role in 5G Network: Report

BigBrothers

Securityweek

26.5.20

Malware opens RDP backdoor into Windows systems

Virus

Net-security

26.5.20

New ComRAT Malware Uses Gmail to Receive Commands and Exfiltrate Data

Virus

Thehackernews

26.5.20

70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs

Mobil

Threatpost

26.5.20

ThreatList: People Know Reusing Passwords Is Dumb, But Still Do It

Security

Threatpost

26.5.20

Cisco fixed a critical issue in the Unified Contact Center Express

Vulnerebility

Securityaffairs

26.5.20

Crooks hacked e-shops and threaten to sell SQL databases if ransom not paid

Ransomware

Securityaffairs

26.5.20

Top UN Official Warns Malicious Emails on Rise in Pandemic

Virus

Securityweek

26.5.20

Why building backdoors into encryption won’t make us safer

Virus

Net-security

26.5.20

IoT security: In 2020, action needs to match awareness

IoT

Net-security

26.5.20

How do I select a backup solution for my business?

Security

Net-security

26.5.20

What hinders successful threat hunting?

Security

Net-security

26.5.20

Global DX spending to grow 10.4% in 2020

Security

Net-security

25.5.20

Aggressive in-app advertising in Android

Android

Securelist

25.5.20

Ragnar Ransomware encrypts files from virtual machines to evade detection

Ransomware

Securityaffairs

25.5.20

Maze ransomware operators leak credit card data from Costa Rica’s BCR bank

Ransomware

Securityaffairs

25.5.20

3 hacking forums have been hacked and database have been leaked online

Incindent

Securityaffairs

25.5.20

New Tool Can Jailbreak Any iPhone and iPad Using An Unpatched 0-Day Bug

Apple

Thehackernews

25.5.20

Zloader Maldoc Analysis With xlm-deobfuscator

Virus

SANS

25.5.20 eBay port scans visitors' computers for remote access programs Security Bleepingcomputer
25.5.20 Hackers leak credit card info from Costa Rica's state bank Incindent

Bleepingcomputer

25.5.20 Microsoft's PowerToys gets two new features on Windows 10 OS

Bleepingcomputer

25.5.20 Discord client turned into a password stealer by updated malware Virus

Bleepingcomputer

25.5.20 How to download Google Chrome's offline installer IT Bleepingcomputer
25.5.20 25 million Mathway user records available for sale on the dark web Incindent

Securityaffairs

25.5.20 Unc0ver is the first jailbreak that works on all recent iOS versions since 2014 iOS Securityaffairs
25.5.20 Coronavirus Pandemic Claims Another Victim: Robocalls Security Securityweek
25.5.20

Wireshark 3.2.4 Released

Security

SANS

25.5.20

Reality bites: Data privacy edition

Privacy

Net-security

25.5.20

Organizations plan to migrate most apps to the cloud in the next year

Security

Net-security

25.5.20

In an increasingly 5G and edge world, DNS matters

Security

Net-security

24.5.20

Data breach at easyJet puts 9 million at risk

Incident blog

Avast blog

24.5.20

How to protect yourself from data breaches

Incident blog

Avast blog

24.5.20

The latest security trends from Verizon’s annual breach report

Incident blog

Avast blog

24.5.20

Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding

Cryptocurrency blog

Palo Alto Unity42

24.5.20

Mirai and Hoaxcalls Botnets Target Legacy Symantec Web Gateways

BotNet blog

Palo Alto Unity42

24.5.20

Updated BackConfig Malware Targeting Government and Military Organizations in South Asia

BigBrother blog

Palo Alto Unity42

24.5.20

Threat Brief: Maze Ransomware Activities

Ransomware blog

Palo Alto Unity42

24.5.20

SilverTerrier: New COVID-19 Themed Business Email Compromise Schemes

Spam blog

Palo Alto Unity42
24.5.20

Cooperation and Collaborative Partnerships are Key to Protect Businesses

Cyber blog

Palo Alto

24.5.20

FLEXWORK

Cyber blog

Palo Alto

24.5.20

Cortex XDR Managed Threat Hunting Is Available To All Customers

Cyber blog

Palo Alto

24.5.20

Vulnerabilities in Conferencing Tools: Much Ado about Something or Nothing?

Cyber blog

Palo Alto

24.5.20

Are We Prepared to Deal with the Impact of Cyber Threats on 5G?

Cyber blog

Palo Alto

24.5.20

Why DevOps Needs to Change Security

Cyber blog

Palo Alto

24.5.20

CRN Names 10 Leaders from Palo Alto Networks to Women of the Channel List

Cyber blog

Palo Alto
24.5.20 Personal details and documents for millions of Indians available in the deep web Incindent

Securityaffairs

24.5.20 Online education site EduCBA discloses data breach and reset customers’ pwds Incindent Securityaffairs
24.5.20 Experts observed a spike in COVID-19 related malspam emails containing GuLoader Spam

Securityaffairs

24.5.20 Voter information for 2 millions of Indonesians leaked online Incindent Securityaffairs
24.5.20 Silent Night Zeus botnet available for sale in underground forums BotNet Securityaffairs
24.5.20 Syrk Anti-Ramson Tool Anti-Ramson Tool
24.5.20 KokoKrypt Anti-Ramson Tool Anti-Ramson Tool
24.5.20 JavaLocker Anti-Ramson Tool Anti-Ramson Tool
24.5.20 Online education site EduCBA discloses data breach after hack Incindent Bleepingcomputer
24.5.20 Winget: How to use Windows 10's new native Package Manager OS

Bleepingcomputer

24.5.20 Windows 10 KB4556799 Update Breaks Wireless LTE Connectivity OS

Bleepingcomputer

24.5.20 Microsoft Edge 83 released with extension sync and auto-profiles OS

Bleepingcomputer

24.5.20 Microsoft is investigating issues in latest Windows 10 update OS

Bleepingcomputer

24.5.20 Voter info for millions of Indonesians shared on hacker forum Incindent

Bleepingcomputer

24.5.20 Docker fixes Windows client bug letting programs run as SYSTEM Vulnerebility

Bleepingcomputer

24.5.20 Ransomware encrypts from virtual machines to evade antivirus Ransomware

Bleepingcomputer

24.5.20 Mathway investigates data breach after 25M records sold on dark web Incindent

Bleepingcomputer

24.5.20 ZLoader banking malware is back, deployed in over 100 campaigns Virus

Bleepingcomputer

24.5.20 Windows Hello can now complete payments in Google Chrome OS

Bleepingcomputer

24.5.20 Microsoft releases Windows 10 Hyper-V VHDX for ARM64 devices OS

Bleepingcomputer

23.5.20 Hackers tried to use Sophos Firewall zero-day to deploy Ransomware Ransomware Bleepingcomputer
23.5.20 Microsoft Surface Book 3 is now available for purchase IT

Bleepingcomputer

23.5.20 Hacker shares 40 million Wishbone user records for free Incindent

Bleepingcomputer

23.5.20 Office 365 phishing uses Supreme Court theme and working CAPTCHA Phishing

Bleepingcomputer

23.5.20 New Windows 10 Intel microcodes released in forced KB4497165 update OS

Bleepingcomputer

23.5.20 New PipeMon malware uses Windows print processors for persistence Virus

Bleepingcomputer

23.5.20 Vigilante hackers target 'scammers' with ransomware, DDoS attacks Ransomware

Bleepingcomputer

23.5.20 How to use Google Chrome Tab Groups to stay organized IT

Bleepingcomputer

23.5.20 Snake ransomware leaks patient data from Fresenius Medical Care Ransomware

Bleepingcomputer

23.5.20 Adobe releases critical out-of-band security update Vulnerebility

Bleepingcomputer

23.5.20 GhostDNS exploit kit source code leaked to antivirus company Exploit

Bleepingcomputer

23.5.20 Microsoft issues mitigation for the NXNSAttack DNS DDoS attack Attack

Bleepingcomputer

23.5.20 NXNSAttack: Recursive DNS Inefficiencies and Vulnerability Papers Papers
23.5.20

Home Chef Serves Up Data Breach for 8 Million Records

Incindent

Threatpost

23.5.20

Chafer APT Hits Middle East Govs With Latest Cyber-Espionage Attacks

APT

Threatpost

23.5.20

‘Coronavirus Report’ Emails Spread NetSupport RAT, Microsoft Warns

Virus

Threatpost

23.5.20

NSO Group Impersonates Facebook Security Team to Spread Spyware — Report

CyberCrime  Social

Threatpost
23.5.20

The Florida Unemployment System suffered a data breach

Incindent

Securityaffairs

23.5.20

Experts found a Privilege escalation issue in Docker Desktop for Windows

Vulnerebility

Securityaffairs
23.5.20

Free ImmuniWeb Tool Allows Organizations to Check Dark Web Exposure

CyberCrime

Securityweek
23.5.20 IOCS VS. IOBS Cyber blog Cybereason
23.5.20 WHY A CLOUD-NATIVE EPP IS CRITICAL FOR FUTUREPROOF SECURITY OPERATIONS Cyber blog Cybereason
23.5.20 LEGACY A/V IS SO LAST YEAR Cyber blog Cybereason
23.5.20 How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner Malware blog Mcafee blog
23.5.20 Attacking the Organism: Telecom Service Providers Hacking blog F5 Labs
23.5.20 Using Real-Time Events in Investigations Security blog

FireEye

23.5.20 Analyzing Dark Crystal RAT, a C# backdoor Malware blog

FireEye

23.5.20 Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents Ransomware blog FireEye
23.5.20 Safe-Linking – Eliminating a 20 year-old malloc() exploit primitive Exploit blog Checkpoint
23.5.20 Vulnerability Spotlight: Memory corruption vulnerability in GNU Glibc leaves smart vehicles open to attack Vulnerebility blog Cisco Talos
23.5.20 Vulnerability Spotlight: Authentication bypass vulnerability in some Epson projectors Vulnerebility blog

Cisco Talos

23.5.20 The wolf is back... Security blog

Cisco Talos

23.5.20 Vulnerability Spotlight: Multiple vulnerabilities in Nitro Pro PDF reader Vulnerebility blog

Cisco Talos

23.5.20 Insidious Android malware gives up all malicious features but one to gain stealth OS Blog

Eset

23.5.20 How encryption can help protect your sensitive data Safety blog Eset
23.5.20 Chrome 83 arrives with enhanced security and privacy controls Security blog

Eset

23.5.20 No “Game over” for the Winnti Group APT blog Eset
23.5.20 These things may be cool, but are they safe? Security blog

Eset

23.5.20 Bluetooth flaw exposes countless devices to BIAS attacks Attack blog  Vulnerebility blog Eset
23.5.20 European supercomputers hacked to mine cryptocurrency Cryptocurrency blog

Eset

23.5.20

AgentTesla Delivered via a Malicious PowerPoint Add-In

Virus

SANS
22.5.20 Cyber-Criminal espionage Operation insists on Italian Manufacturing CyberSpy Securityaffairs
22.5.20 Microsoft warns of “massive campaign” using COVID-19 themed emails Spam

Securityaffairs

22.5.20 Winnti uses a new PipeMon backdoor in attacks aimed at the gaming industry Virus Securityaffairs
22.5.20 Ragnar Locker Ransomware Uses Virtual Machines for Evasion Ransomware Securityweek
22.5.20 Industry Reactions to Verizon 2020 DBIR: Feedback Friday Incindent Securityweek
22.5.20 Data Breach Hits Florida Unemployment System Incindent Securityweek
22.5.20 Hackers Attempted to Deploy Ransomware in Attacks Targeting Sophos Firewalls Ransomware Securityweek
22.5.20 Hackers Can Target Rockwell Industrial Software With Malicious EDS Files Virus Securityweek
22.5.20 Bitter Israel-Iran Rivalry Takes New Forms Online BigBrothers Securityweek
22.5.20

Cisco fixes critical RCE flaw in call center solution

Vulnerebility

Net-security
22.5.20

Critical Cisco Bug in Unified CCX Allows Remote Code Execution

Vulnerebility

Threatpost

22.5.20

Crooks Tap Google Firebase in Fresh Phishing Tactic

Phishing

Threatpost

22.5.20

Supreme Court Phish Targets Office 365 Credentials

Phishing

Threatpost

22.5.20

Silent Night Banking Trojan Charges Top Dollar on the Underground

Virus

Threatpost
22.5.20

Santander, one of the biggest European banks, was leaking sensitive data on their website

Incindent

Securityaffairs
22.5.20

Sophos blocked attacks exploiting XG Firewall zero-day to deploy Ransomware

Ransomware

Securityaffairs
22.5.20

Meal delivery service Home Chef discloses data breach

Incindent

Securityaffairs

22.5.20

Tens of thousands Israeli websites defaced

BigBrothers

Securityweek
22.5.20

Signal PINs Allow Users to Recover Data When Switching Phones

Mobil

Securityweek
22.5.20

Cisco Patches Critical Vulnerability in Contact Center Software

Vulnerebility

Securityweek
22.5.20

Surveillance Fears Drive Business Use of Secure Collaboration Tools

BigBrothers

Securityweek
22.5.20

Facebook Unveils Scam Warnings for Messenger Users

Social

Securityweek
22.5.20

Tools Used in GhostDNS Router Hijack Campaigns Dissected

Hacking

Securityweek
22.5.20

Hackers Start Leaking Files Stolen From Shipping Giant Toll

Incindent

Securityweek
22.5.20

Zoom to Provide Detailed Info on Upcoming End-to-End Encryption Feature

Safety

Securityweek
22.5.20

Create a safe haven for your customers to build loyalty

Security

Net-security
22.5.20

Integrating a SIEM solution in a large enterprise with disparate global centers

Safety

Net-security
22.5.20

The dark web is flooded with offers to purchase corporate network access

Cyber

Net-security
22.5.20

What can merchants do to avoid falling victim to large-scale ATO attacks?

Attack

Net-security
22.5.20

Number of active IoT devices expected to reach 24.1 billion in 2030

IoT

Net-security
22.5.20

Signal fixes location-revealing flaw, introduces Signal PINs

Mobil

Net-security
22.5.20

Beware of phishing emails urging for a LogMeIn security update

Phishing

Net-security
21.5.20 Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia Report Report
21.5.20 Iran-linked Chafer APT group targets governments in Kuwait and Saudi Arabia APT Securityaffairs
21.5.20 Japan suspects HGV missile data leak in Mitsubishi security breach Incindent

Securityaffairs

21.5.20 Israeli Websites Targeted in Major Cyber Attack BigBrothers Securityweek
21.5.20 Meal Kit Service Home Chef Confirms Data Breach Incindent Securityweek
21.5.20 Smarsh Adds Cybersecurity and Compliance to Archiving with Acquisition of Entreda Cyber Securityweek
21.5.20 XSS, Open Redirect Vulnerabilities Patched in Drupal Vulnerebility Securityweek
21.5.20 Cyber Insurance Provider Coalition Raises $90 Million IT Securityweek
21.5.20 Microsoft Announces New Security Features for Devs, Customers Security Securityweek
21.5.20 How Cybersecurity Enables Government, Health, EduTech Cope With COVID-19 Cyber Thehackernews
21.5.20 Iranian APT Group Targets Governments in Kuwait and Saudi Arabia APT Thehackernews
21.5.20 Home Chef announces data breach after hacker sells 8M user records Incindent Bleepingcomputer
21.5.20 How to enable the new Google Chrome 83 features now Security

Bleepingcomputer

21.5.20 Microsoft warns of 'massive' phishing attack pushing legit RAT Phishing  Virus

Bleepingcomputer

21.5.20 BEC Scammers target unemployment and CARES Act claims Spam

Bleepingcomputer

21.5.20 Windows 10 KB4556799 update won't install, has audio issues, bugs OS

Bleepingcomputer

21.5.20 Windows Terminal 1.0 is here with numerous improvements OS

Bleepingcomputer

21.5.20 EasyJet hacked: data breach affects 9 million customers Incindent

Bleepingcomputer

21.5.20 Google rolls out new Enhanced Safe Browsing security feature Safety

Bleepingcomputer

21.5.20 Chrome 83 released with massive security and privacy upgrades Security

Bleepingcomputer

21.5.20 NetWalker adjusts ransomware operation to only target enterprise Ransomware

Bleepingcomputer

21.5.20 Microsoft announces new Chromium Edge features at Build 2020 OS

Bleepingcomputer

21.5.20 New Microsoft Teams enhancements announced at Build 2020 IT

Bleepingcomputer

21.5.20

Verizon DBIR: Web App Attacks and Security Errors Surge

Attack

Threatpost

21.5.20

Fraudulent Unemployment, COVID-19 Relief Claims Earn BEC Gang Millions

Spam

Threatpost

21.5.20

NetWalker Ransomware Gang Hunts for Top-Notch Affiliates

Ransomware

Threatpost

21.5.20

Alleged Hacker Behind Massive ‘Collection 1’ Data Dump Arrested

Crime

Threatpost
21.5.20

VMware fixes CVE-2020-3956 Remote Code Execution issue in Cloud Director

Vulnerebility

Securityaffairs
21.5.20

Adobe fixed several memory corruption issues in some of its products

Vulnerebility

Securityaffairs
21.5.20

Israel is suspected to be behind the cyberattack on Iranian port

BigBrothers

Securityaffairs

21.5.20

Chrome 83 Brings Enhanced Safe Browsing, New Privacy and Security Controls

Security

Securityweek
21.5.20

Pandemic-related Supply Chain and Money Laundering Woes in the Dark Web

CyberCrime

Securityweek
21.5.20

Website Security Provider Source Defense Raises $10.5 Million

IT

Securityweek
21.5.20

Vulnerabilities Exposed Hundreds of Thousands of QNAP NAS Devices to Attacks

Vulnerebility

Securityweek
21.5.20

Japan Suspects Missile Data Leak in Mitsubishi Cyberattack

Incindent

Securityweek
21.5.20

Remote Code Execution Vulnerability Patched in VMware Cloud Director

Vulnerebility

Securityweek
21.5.20

Malware Triage with FLOSS: API Calls Based Behavior

Virus

SANS
21.5.20

The missing link in your SOC: Secure the mainframe

Security

Net-security
21.5.20

What do IGA solutions have in common with listening to music anywhere?

Security

Net-security
21.5.20

How secure are open source libraries?

Security

Net-security
21.5.20

Only 36% of critical infrastructures have a high level of cyber resilience

Security

Net-security
21.5.20

COVID-19 is driving diverging perspectives as enterprises decide which technologies to focus on

Security

Net-security
21.5.20

RedisAI and RedisGears address challenges customers have as they move AI into production

Security

Net-security
20.5.20 IT threat evolution Q1 2020 Analysis Securelist
20.5.20 IT threat evolution Q1 2020. Statistics Analysis Securelist
20.5.20 Researchers disclose five Microsoft Windows zero-days Vulnerebility Securityaffairs
20.5.20 Three flaws in Nitro Pro PDF reader expose businesses to hack Vulnerebility Securityaffairs
20.5.20 Canada Fines Facebook Over Misleading Privacy Claims BigBrothers

Securityweek

20.5.20 Container Security Company Aqua Raises $30 Million in Series D Round IT Securityweek
20.5.20 Tech-Assisted COVID-19 Tracking Is Having Some Issues Security Securityweek
20.5.20 Researcher Finds Memory Corruption Vulnerabilities in Several Adobe Products Vulnerebility

Securityweek

20.5.20 WordPress Malware Targets WooCommerce Stores Virus Securityweek
20.5.20 New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks Attack Thehackernews
20.5.20 Ukrainian Police Arrest Hacker Who Tried Selling Billions of Stolen Records Crime Thehackernews
20.5.20

Chrome 83: Enhanced Safe Browsing, Secure DNS, a Safety Check

Security

Net-security
20.5.20

Vulnerability in Qmail mail transport agent allows RCE

Vulnerebility

Net-security
20.5.20

EasyJet data breach: 9 million customers affected

Incindent

Net-security
20.5.20 2020-data-breach-investigations-report Report

Report

20.5.20

Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices

Attack

Threatpost

20.5.20

Verizon Data Breach Report: DoS Skyrockets, Espionage Dips

Incindent

Threatpost

20.5.20

WolfRAT Android Malware Targets WhatsApp, Facebook Messenger

Android

Threatpost

20.5.20

Adobe Patches Critical RCE Flaw in Character Animator App

Vulnerebility

Threatpost
20.5.20

EasyJet Hackers Take Off with Travel Details for 9M Customers

Incindent

Threatpost
20.5.20

Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials

Phishing

Threatpost
20.5.20

Security Service of Ukraine arrested the popular hacker Sanix who sold billions of stolen credentials

Incindent

Securityaffairs
20.5.20

Bluetooth BIAS attack threatens billions of devices

Attack

Securityaffairs
20.5.20

Easyjet hacked: 9 million customer’s data exposed along with 2,200+ credit card details

Incindent

Securityaffairs
20.5.20

Nitro Pro Vulnerabilities Expose Many Enterprises to Attacks

Vulnerebility

Securityweek

20.5.20

Researchers Divulge Details on Five Windows Zero Days

Vulnerebility

Securityweek
20.5.20

Verizon 2020 DBIR: More Extensive, More Detailed and More Thorough Than Ever

Incindent

Securityweek
20.5.20

NXNSAttack: New DNS Vulnerability Allows Big DDoS Attacks

Attack

Securityweek

20.5.20

Bluetooth Vulnerability Allows Attackers to Impersonate Previously Paired Devices

Vulnerebility

Securityweek
20.5.20

Brazil's Biggest Cosmetic Brand Natura Exposes Personal Details of Its Users

Incindent

Thehackernews
20.5.20

British Airline EasyJet Suffers Data Breach Exposing 9 Million Customers' Data

Incindent

Thehackernews
20.5.20

Microsoft Word document with malicious macro pushes IcedID (Bokbot)

BotNet

SANS
20.5.20

CEOs and CISOs disagree on cyber strategies

Security

Net-security
20.5.20

With the threat landscape continuously changing, businesses must be ready for anything

Security

Net-security
20.5.20

With increased DevOps adoption, roles in software development teams are changing

Security

Net-security
20.5.20

Technologies in all layers of the cloud stack are at risk

Security

Net-security
20.5.20

Over half of security leaders still rely on spreadsheets

Security

Net-security
19.5.20 REvil Ransomware found buyer for Trump data, now targeting Madonna Ransomware Bleepingcomputer
19.5.20 Google Chrome to tidy up tabs with Tab Groups Collapse feature IT

Bleepingcomputer

19.5.20 Hacker sells 129 million sensitive records of Russian car owners BigBrothers

Bleepingcomputer

19.5.20 Fake U.S. Dept of Treasury emails spreads new Node.js malware BigBrothers

Bleepingcomputer

19.5.20 Ransomware attack impacts Texas Department of Transportation Ransomware

Bleepingcomputer

19.5.20 Windows 10 Defender's hidden features revealed by this free tool OS

Bleepingcomputer

19.5.20 FBI warns of ProLock ransomware decryptor not working properly Ransomware

Bleepingcomputer

19.5.20 Microsoft Edge Canary now lets you read aloud your PDF files OS

Bleepingcomputer

19.5.20 European supercomputers hacked in mysterious cyberattacks Attack

Bleepingcomputer

19.5.20 Zoom global outage preventing meetings, video, and audio IT

Bleepingcomputer

19.5.20 What's new in Windows Subsystem for Linux 2.0, coming soon OS

Bleepingcomputer

19.5.20 Windows 10 quietly got a built-in network sniffer, how to use OS Bleepingcomputer
19.5.20

Australian product steel producer BlueScope hit by cyberattack

BigBrothers

Securityaffairs
19.5.20

Hackers Target Oil Producers During COVID-19 Slump

Hacking

Securityaffairs
19.5.20

Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways

BotNet

Securityaffairs
19.5.20

129 million records of Russian car owners available on the dark web

Incindent

Securityaffairs
19.5.20

Botnets Target Old Vulnerability in Symantec Secure Web Gateway

BotNet

Securityweek

19.5.20

EasyJet Reveals Cyber Attack on Nine Million Clients

Incindent

Securityweek
19.5.20

Court Curbs German Spies' Foreign Internet Surveillance

BigBrothers

Securityweek
19.5.20

DoJ Again Asks for Encryption Backdoors After Hacking US Naval Base Shooter's iPhones

BigBrothers

Securityweek

19.5.20

Increased Focus on iOS Hacking Leads to Drop in Exploit Prices

Apple

Securityweek
19.5.20

New Bluetooth Vulnerability Exposes Billions of Devices to Hackers

Vulnerebility

Securityweek
19.5.20

Phishers are trying to bypass Office 365 MFA via rogue apps

Phishing

Net-security
19.5.20

Money is still the root of most breaches

Incindent

Net-security
19.5.20 Bluetooth devices supporting LE and specific BR/EDR implementations are vulnerable to method confusion attacks Alert Alert
19.5.20 Bluetooth devices supporting BR/EDR are vulnerable to impersonation attacks Alert Alert
19.5.20

ProLock Ransomware Teams Up With QakBot Trojan to Infect Victims

Ransomware

Threatpost

19.5.20

Edison Mail iOS Bug Exposes Emails to Strangers

Apple

Threatpost

19.5.20

Verizon Data Breach Report: DoS Skyrockets, Espionage Dips

Incindent

Threatpost

19.5.20

Ransomware Gang Arrested for Spreading Locky to Hospitals

Ransomware

Threatpost
19.5.20

A bug in Edison Mail iOS app impacted over 6,400 users

Apple

Securityaffairs
19.5.20

Texas Department of Transportation (TxDOT) hit by a ransomware attack

Ransomware

Securityaffairs
19.5.20

Mandrake, a high sophisticated Android spyware used in targeted attacks

Android

Securityaffairs
19.5.20

Facebook Chief Wants EU Not China to Lead on Tech Rules

BigBrothers  Social

Securityweek

19.5.20

PE Firm Gets Cold Feet With $1.9 Billion Acquisition of Forescout Technologies

IT

Securityweek
19.5.20

Over 6,400 Edison Mail Users Hit by Security Bug in iOS App

Apple

Securityweek
19.5.20

Automating nmap scans

Security

SANS
19.5.20

CISOs are critical to thriving companies: Here’s how to support their efforts

Security

Net-security
19.5.20

Review: Kill Chain: The Cyber War on America’s Elections

Security

Net-security
19.5.20

How a good user experience brings the pieces of the enterprise IT jigsaw together

Security

Net-security
19.5.20

Mental Health Awareness Week: Coping with cybersecurity pressures amidst a global pandemic

Security

Net-security
19.5.20

How data intelligent organizations mitigate risk

Security

Net-security
18.5.20 FBI warns US organizations of ProLock ransomware decryptor not working BigBrothers Securityaffairs
18.5.20 Stored XSS in WP Product Review Lite plugin allows for automated takeovers Vulnerebility Securityaffairs
18.5.20 Australian Steel Maker BlueScope Hit by Cyberattack BigBrothers

Securityweek

18.5.20 Likely Breach Shuts Down Arkansas Unemployment Program Incindent Securityweek
18.5.20 Transportation Agency Hacked in 2nd Texas Government Attack BigBrothers Securityweek
18.5.20 Hackers Can Inject Code Into WordPress Sites via Flaw in Product Review Plugin Vulnerebility Securityweek
18.5.20 U.S. Restriction on Chipmakers Deals Critical Blow to Huawei BigBrothers Securityweek
18.5.20 Crypto-Mining Campaign Hits European Supercomputers Cryptocurrency Securityweek
18.5.20 'Mandrake' Android Spyware Remained Undetected for 4 Years Android Securityweek
18.5.20 France Says Breaks Up International ATM 'Jackpotting' Network CyberCrime Securityweek
18.5.20

Antivirus & Multiple Detections

Safety

SANS
18.5.20

Redefining business for a digital world with smart security decisions

Security

Net-security
18.5.20

Security threats associated with shadow IT

Security

Net-security
18.5.20

Security and the rapidly growing importance of mobile apps

Mobil

Net-security
18.5.20

Shifting responsibility is causing uncertainty and more security breaches

Security

Net-security
18.5.20

Identity-related breaches on the rise, prevention still a work in progress

Security Net-security
18.5.20

Less than a quarter of Americans use a password manager

Security

Net-security
17.5.20

Scanning for Outlook Web Access (OWA) & Microsoft Exchange Control Panel (ECP)

Vulnerebility

Net-security
17.5.20

Experts reported the hack of several supercomputers across Europe

Hacking

Securityaffairs
17.5.20

Coronavirus-themed attacks May 10 – May 16, 2020

Security

Securityaffairs
17.5.20

Elexon, a middleman in the UK power grid network hit by cyber-attack

BigBrothers

Securityaffairs
17.5.20

APT group targets high profile networks in Central Asia

APT

Securityaffairs
17.5.20

Microsoft is open-sourcing COVID-19 threat intelligence

Cyber

Securityaffairs
17.5.20

QNodeService Trojan spreads via fake COVID-19 tax relief

Virus

Securityaffairs
17.5.20 Ransom News Ransom Ransom
17.5.20 Thunderbolt flaw leads to Thunderspy exploit Vulnerebility blog

Avast blog

17.5.20 We never wanna repeat WannaCry Ransomware blog

Avast blog

17.5.20 Massive WordPress attack relies on old flaws Attack blog  Vulnerebility blog Avast blog
17.5.20 Gartner Market Guide for Cloud Workload Protection Platforms: Key Takeaways Cyber blog

Palo Alto

17.5.20 CRN Names 10 Leaders from Palo Alto Networks to Women of the Channel List Cyber blog

Palo Alto

17.5.20 Containers are inherently secure – Reality or myth? Cyber blog

Palo Alto

17.5.20 Palo Alto Networks Named Google Cloud Technology Partner of the Year Cyber blog

Palo Alto

17.5.20 Manage a Remote SOC: Micro-Surveys for Crisis Management Cyber blog Palo Alto
17.5.20 Scaling Security for Data Center Transformation: COVID-19 Amplifies Trends Cyber blog

Palo Alto

17.5.20 Bridging the DevOps and Security Divide with DevSecOps Cyber blog Palo Alto
17.5.20 WordPress malware finds WooCommerce sites for Magecart attacks Virus Bleepingcomputer
17.5.20 Critical WordPress plugin bug allows for automated takeovers Vulnerebility

Bleepingcomputer

17.5.20 Wannabe ransomware operators arrested before hospital attacks Ransomware

Bleepingcomputer

17.5.20 New BotSight browser extension reveals Twitter bots BotNet

Bleepingcomputer

17.5.20 RATicate drops info stealing malware and RATs on industrial targets Virus

Bleepingcomputer

17.5.20 Ransomware recruits affiliates with huge payouts, automated leaks Ransomware

Bleepingcomputer

17.5.20 Backdoors in recent espionage attempts link to Microcin malware Virus

Bleepingcomputer

17.5.20 Microsoft Office 365 ATP getting malware campaign analysis Virus

Bleepingcomputer

17.5.20 Free Grand Theft Auto V offer brings down Epic Games Store IT

Bleepingcomputer

17.5.20 New COMpfun malware variant gets commands from HTTP error codes Virus

Bleepingcomputer

17.5.20 New Microsoft 365 sign-in pages already spoofed for phishing Phishing

Bleepingcomputer

17.5.20 Hacker selling 550 million stolen user records on hacking forum Incindent

Bleepingcomputer

17.5.20 Google Chrome will block resource-heavy ads starting August Security

Bleepingcomputer

17.5.20 ProLock Ransomware teams up with QakBot trojan for network access Ransomware

Bleepingcomputer

17.5.20 Scammers steal $10 million from Norway's state investment fund Spam

Bleepingcomputer

17.5.20 Google WordPress plugin bug can be exploited for black hat SEO Exploit

Bleepingcomputer

17.5.20 RIP: Microsoft to drop support for Windows 10 on 32-bit systems OS

Bleepingcomputer

17.5.20 New Ramsay malware steals files from air-gapped computers Virus

Bleepingcomputer

17.5.20 Windows 10 gets DNS over HTTPS support, how to test OS

Bleepingcomputer

17.5.20 Microsoft: Fix for Outlook search failures coming later today OS

Bleepingcomputer

17.5.20 Microsoft warns of COVID-19 phishing spreading info-stealing malware Phishing

Bleepingcomputer

17.5.20 US warns of Chinese hackers targeting COVID-19 research orgs BigBrothers

Bleepingcomputer

17.5.20 Ransomware now demands extra payment to delete stolen files Ransomware

Bleepingcomputer

17.5.20 SAP May 2020 Security Patch Day delivers critical updates Vulnerebility

Bleepingcomputer

16.5.20 Healthcare giant Magellan Health hit by ransomware attack Ransomware

Bleepingcomputer

16.5.20 Windows 10 2004 improves potentially unwanted app protection OS

Bleepingcomputer

16.5.20 Windows 10 2004 is almost here, what developers need to know OS

Bleepingcomputer

16.5.20 US govt shares list of most exploited vulnerabilities since 2016 BigBrothers

Bleepingcomputer

16.5.20 May 2020 Patch Tuesday: Microsoft fixes 111 vulnerabilities, 13 Critical OS

Bleepingcomputer

16.5.20 Windows 10 Cumulative Updates KB4556799 & KB4551853 Released OS

Bleepingcomputer

16.5.20 Microsoft Edge rolls out in Windows 10 2004 via Windows Update OS

Bleepingcomputer

16.5.20 US govt exposes new North Korean malware, phishing attacks BigBrothers

Bleepingcomputer

16.5.20 Adobe fixes critical vulnerabilities in Acrobat, Reader, and DNG SDK Vulnerebility

Bleepingcomputer

16.5.20 Researcher finds 1,236 websites infected with credit card stealers Hacking

Bleepingcomputer

16.5.20 Five Clear Steps to Enhance SecOps with MITRE ATT&CK Report Cybereason
16.5.20 2019 APPLICATION PROTECTION REPORT 2ND EDITION Report F5 Labs
16.5.20 THE STATE OF RANSOMWARE 2020 Report SOPHOS
16.5.20 WHAT IS THE MITRE ATT&CK FRAMEWORK? Security blog Cybereason
16.5.20 2019 Application Protection Report Security blog

F5 Labs

16.5.20 Are You Ready for DoD CMMC Compliance? Security blog

F5 Labs

16.5.20 Reverse RDP – The Path Not Taken Attack blog Checkpoint
16.5.20 The basics of a ransomware infection as Snake, Maze expands Ransomware blog Cisco Talos
16.5.20 Microsoft Patch Tuesday — May 2020: Vulnerability disclosures and Snort coverage Vulnerebility blog Cisco Talos
16.5.20 Vulnerability Spotlight: Code execution vulnerability in Microsoft Excel Vulnerebility blog

Cisco Talos

16.5.20 Vulnerability Spotlight: Remote code execution vulnerabilities in Adobe Acrobat Reader Vulnerebility blog

Cisco Talos

16.5.20 Threat Spotlight: Astaroth — Maze of obfuscation and evasion reveals dark stealer Ransomware blog

Cisco Talos

16.5.20 Microsoft fixes vulnerability affecting all Windows versions since 1996 Vulnerebility blog

Eset

16.5.20 Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia APT blog Eset
16.5.20 Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks Malware blog

Eset

16.5.20 Thunderbolt flaws open millions of PCs to physical hacking Vulnerebility blog Eset
16.5.20 WannaCryptor remains a global threat three years on Ransomware blog

Eset

16.5.20 Lukas Stefanko: How we fought off a DDoS attack from a mobile botnet Attack blog Eset
16.5.20 Over 160 million user records put up for sale on the dark web Incident blog

Eset

16.5.20 Breaking news? App promises news feeds, brings DDoS attacks instead Attack blog Eset
16.5.20

Hoaxcalls Botnet Exploits Symantec Secure Web Gateways

BotNet  Exploit

Threatpost

16.5.20

RATicate Group Hits Industrial Firms With Revolving Payloads

Virus

Threatpost

16.5.20

News Wrap: Ransomware Extortion Tactics, Contact-Tracing App Security Worries

Security

Threatpost

16.5.20

Paying Ransomware Crooks Doubles Clean-up Costs, Report

Ransomware

Threatpost
16.5.20

Chinese APT Tropic Trooper target air-gapped military Networks in Asia

APT

Securityaffairs
16.5.20

Interserve UK defense contractor hacked, up to 100,000 past and present employees details exposed

BigBrothers

Securityaffairs
16.5.20

Microsoft Open-Sources COVID-19 Threat Intelligence

Cyber

Securityweek

16.5.20

NortonLifeLock Releases Free Tool for Detecting Bots on Twitter

Social

Securityweek
16.5.20

Chinese Hackers Target Air-Gapped Military Networks

BigBrothers

Securityweek
16.5.20

US Seeks to Cut Off China's Huawei From Global Chip Suppliers

BigBrothers

Securityweek
16.5.20

Mysterious Chinese APT Linked to Multiple Central Asian Campaigns

APT

Securityweek
16.5.20

SHA3 Hashes (on Windows) - Where Art Thou?

Crypto

SANS
15.5.20 Office 365 to let regular users revoke encrypted messages OS

Bleepingcomputer

15.5.20 Hackers' private chats leaked in stolen WeLeakData database Incindent

Bleepingcomputer

15.5.20 Texas Courts hit by ransomware, network disabled to limit spread Ransomware

Bleepingcomputer

15.5.20 Microsoft's Family Safety parental control app opens for testing OS

Bleepingcomputer

15.5.20 WordPress plugin bugs can let hackers take over almost 1M sites Hacking

Bleepingcomputer

15.5.20 Maze ransomware fails to encrypt Pitney Bowes, steals files Ransomware

Bleepingcomputer

15.5.20 New Thunderbolt security flaws affect systems shipped before 2019 Vulnerebility

Bleepingcomputer

15.5.20 Windows 10: Limiting the bandwidth used by Windows Update OS

Bleepingcomputer

15.5.20 ChatBooks discloses data breach after data sold on dark web Incindent

Bleepingcomputer

15.5.20 Sodinokibi ransomware can now encrypt open and locked files Ransomware

Bleepingcomputer

15.5.20

Hashes in PowerShell

Security

SANS
15.5.20

Criminals boost their schemes with COVID-19 themed phishing templates

Phishing

Net-security
15.5.20 Russian APT Turla’s COMpfun malware uses HTTP status codes to receive commands APT Securityaffairs
15.5.20 Palo Alto Networks addresses tens of serious issues in PAN-OS Security Securityaffairs
15.5.20 Threat actors are offering for sale 550 million stolen user records Incindent Securityaffairs
15.5.20 Vulnerabilities in SoftPAC Virtual Controller Expose OT Networks to Attacks Vulnerebility

Securityweek

15.5.20 Activists Allege TikTok Violated Agreement on Child Protection Privacy Securityweek
15.5.20 Venafi Acquires Kubernetes Services Provider Jetstack Security Securityweek
15.5.20 'Ramsay' Espionage Framework Can Exfiltrate Data From Air-Gapped Networks Virus Securityweek
15.5.20 UK Electricity Market Administrator Elexon Targeted by Hackers Hacking Securityweek
15.5.20 HTTP Status Codes Command This Malware How to Control Hacked Systems Virus Thehackernews
15.5.20

Utah Says No to Apple/Google COVID-19 Tracing; Debuts Startup App

Cyber

Threatpost

15.5.20

Login with Facebook Bug Earns $20K Bounty

Social

Threatpost

15.5.20

Microsoft Adds DNS-Over-HTTPS Support for Windows 10 Insiders

OS

Threatpost

15.5.20

BEC Gang Exploits G Suite, Long Domain Names in Cyberattacks

Attack

Threatpost
15.5.20

Innovative Spy Trojan Targets European Diplomatic Targets

Virus

Threatpost
15.5.20

TikTok Violated Children’s Privacy Law, FTC Complaint Says

Privacy

Threatpost
15.5.20

Crooks stole $10 million from Norway’s state investment fund Norfund

IT

Securityaffairs
15.5.20

Zerodium will no longer acquire certain types of iOS exploits due to surplus

iOS

Securityaffairs
15.5.20

Access to UK Supercomputer Suspended Following Cyberattack

Attack

Securityweek

15.5.20

Palo Alto Networks Patches Many Vulnerabilities in PAN-OS

Vulnerebility

Securityweek
15.5.20

China Rejects US Claim of Attempted Vaccine Theft as 'Smearing'

BigBrothers

Securityweek
15.5.20

Zerodium Expects iOS Exploit Prices to Drop as It Announces Surplus

Exploit

Securityweek
15.5.20 Samsung Qmage codec for Android Skia library does not properly validate image files Alert Alert
15.5.20

Base Conversions and Creating GUI Apps in PowerShell

Security

SANS
15.5.20

Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe

Vulnerebility

SANS
15.5.20

Modern crypto standards pave the way to stronger security

Crypto

Net-security
15.5.20

Windows 10 users get protection against PUAs

OS

Net-security

15.5.20

New software enables existing sensors to detect ransomware

Ransomware

Net-security

15.5.20

COVID-19 online fraud trends: Industries, schemes and targets

Security

Net-security

15.5.20

Businesses vulnerable to emerging risks have a gap in their insurance coverage

Security

Net-security

15.5.20

Educational organizations use cloud apps to share sensitive data outside of IT control

Security

Net-security
14.5.20

Cyberthreats on lockdown

Cyber

Securelist
14.5.20

COMpfun authors spoof visa application with HTTP status-based Trojan

APT  Virus

Securelist
14.5.20

China-linked hackers are attempting to steal COVID-19 Vaccine Research

BigBrothers

Securityaffairs
14.5.20

Google WordPress Site Kit plugin grants attacker Search Console Access

Attack

Securityaffairs
14.5.20

New Ramsay malware allows exfiltrating files from air-gapped computers

Virus

Securityaffairs
14.5.20

Senate Narrowly Rejects New Limits on Internet Surveillance

BigBrothers

Securityweek

14.5.20

VMware to Acquire Kubernetes Security Firm Octarine

IT

Securityweek
14.5.20

Flaw in WordPress Plugin Grants Access to Google Search Console

Vulnerebility

Securityweek
14.5.20

This Group of CISOs Is Pumping Their Own Money and Advice Into Security Startups

Security

Securityweek
14.5.20

Code Analysis Company SonarSource Acquires RIPS Technologies

IT

Securityweek
14.5.20

Effective Business Continuity Plans Require CISOs to Rethink WAN Connectivity

Security

Thehackernews
14.5.20

Improper Microsoft Patch for Reverse RDP Attacks Leaves 3rd-Party RDP Clients Vulnerable

Vulnerebility

Thehackernews
14.5.20

Fear the PrintDemon? Upgrade Windows to patch easily exploited flaw

Vulnerebility

Net-security
14.5.20

Ramsay Malware Targets Air-Gapped Networks

Virus

Threatpost

14.5.20

Paying the ransom = paying double

Ransomware

Net-security
14.5.20

Debunking myths related to client-side security and Magecart attacks

CyberCrime

Net-security

14.5.20

5 easy steps to immediately bolster cybersecurity during the pandemic

Cyber

Net-security
14.5.20

Eye-opening statistics about open source security, license compliance, and code quality risk

Security

Net-security

14.5.20

COVID-19 has contributed to record breaking cybercriminal activity

CyberCrime

Net-security
14.5.20

Unexpected downtime is crippling businesses, causing revenue losses

Security

Net-security

14.5.20

New features in Nutanix’s HCI platform simplify disaster recovery to protect business critical apps

Security

Net-security
14.5.20

Kali Linux 2020.2: New look, new packages, new installer options

OS

Net-security

13.5.20 Chancellor Merkel has ‘hard evidence’ of Russian hackers targeted her BigBrothers Securityaffairs
13.5.20 Healthcare giant Magellan Health discloses data breach after ransomware attack Ransomware Securityaffairs
13.5.20 Microsoft May 2020 Patch Tuesday fixes 111 flaws, 13 Critical Vulnerebility

Securityaffairs

13.5.20 Expert found 1,236 websites infected with Magecart e-skimmer CyberCrime Securityaffairs
13.5.20 USCYBERCOM shares five new North Korea-linked malware samples BigBrothers Securityaffairs
13.5.20 Trojan Lampion is back after 3 months Virus Securityaffairs
13.5.20 Adobe addresses critical issues in Acrobat, Reader, and DNG SDK Vulnerebility

Securityaffairs

13.5.20 Facebook Awards Researcher $20,000 for Account Hijacking Vulnerability Social

Securityweek

13.5.20 SAP's May 2020 Security Updates Include Six Critical Patches Vulnerebility Securityweek
13.5.20 Enterprise Identity Protection Firm Semperis Raises $40 Million IT Securityweek
13.5.20 CyberArk Acquires Identity as a Service Provider Idaptive for $70 Million IT Securityweek
13.5.20 Merkel Cites 'Hard Evidence' Russian Hackers Targeted Her BigBrothers

Securityweek

13.5.20 Siemens Says Power Meters Affected by Urgent/11 Vulnerabilities ICS Securityweek
13.5.20 Thousands of Android Apps Leak Data Due to Firebase Misconfigurations Android Securityweek
13.5.20 Microsoft's May 2020 Security Updates Patch 111 Vulnerabilities Vulnerebility Securityweek
13.5.20 Adobe Patches 36 Vulnerabilities in Acrobat, DNG SDK Vulnerebility Securityweek
13.5.20 U.S. Cyber Command Shares More North Korean Malware Variants BigBrothers Securityweek
13.5.20 Vulnerabilities in 'Page Builder' Plugin Expose 1 Million WordPress Websites Vulnerebility Securityweek
13.5.20 Researcher Spots New Malware Claimed to be 'Tailored for Air‑Gapped Networks' Virus Thehackernews
13.5.20 U.S Defense Warns of 3 New Malware Used by North Korean Hackers BigBrothers Thehackernews
13.5.20

Have you patched these top 10 routinely exploited vulnerabilities?

Vulnerebility

Net-security
13.5.20

How to implement least privilege in the cloud

Security

Net-security

13.5.20

Malspam with links to zip archives pushes Dridex malware

Spam  Virus

SANS
13.5.20

New third-party healthcare data rules: Increased access alongside privacy considerations

Privacy

Net-security
13.5.20

Advanced attack scenarios and sabotage of smart manufacturing environments

Attack  ICS

Net-security

13.5.20

Cybersecurity and compliance: Vital priorities for MSPs and their clients

Security

Net-security

13.5.20

Global remote work transitions fail to consider security gaps

Security

Net-security

13.5.20

May 2020 Patch Tuesday: Microsoft fixes 111 flaws, Adobe 36

OS

Net-security

12.5.20 Popular Page Builder WordPress plugin fixes critical issues. Update it now! Vulnerebility Securityaffairs
12.5.20 Patch now your vBulletin install before hacker will target your forum Vulnerebility Securityaffairs
12.5.20 A cyber attack hit a port on Strait of Hormuz, Iran said BigBrothers

Securityaffairs

12.5.20 Shipping Giant Toll Confirms Hackers Stole Data in Recent Attack Attack

Securityweek

12.5.20 Cybersecurity Threats to the Food Supply Chain Cyber Securityweek
12.5.20 Ransomware Forces Shutdown of Texas Judiciary Network Ransomware Securityweek
12.5.20 Researchers Analyze Entry Points, Vectors for Manufacturing System Attacks Attack Securityweek
12.5.20 Over 4000 Android Apps Expose Users' Data via Misconfigured Firebase Databases Android Thehackernews
12.5.20

Sphinx Malware Returns to Riddle U.S. Targets

Virus

Threatpost

12.5.20

Millions of Thunderbolt-Equipped Devices Open to ‘ThunderSpy’ Attack

Attack

Threatpost

12.5.20

Astaroth’s New Evasion Tactics Make It ‘Painful to Analyze’

Virus

Threatpost

12.5.20

Unpatched Bugs in Oracle iPlanet Open Door to Info-Disclosure, Injection

Vulnerebility

Threatpost
12.5.20

Zeus Sphinx continues to be used in Coronavirus-themed attacks

Attack

Securityaffairs
12.5.20

ATM vendor Diebold Nixdorf suffered a Ransomware attack

Ransomware

Securityaffairs

12.5.20

ATM Maker Diebold Nixdorf Hit by Ransomware

Ransomware

Securityweek

12.5.20

An Undisclosed Critical Vulnerability Affect vBulletin Forums — Patch Now

Vulnerebility

Thehackernews
12.5.20

Excel 4 Macro Analysis: XLMMacroDeobfuscator

Virus

SANS
12.5.20

Why a single online name and social cards will be the new norm

Social

Net-security
12.5.20

(ISC)2 Professional Development Institute: Timely and continuing education opportunities

Security

Net-security

12.5.20

Is remote work here to stay?

Security

Net-security

12.5.20

Total number of publicly reported breaches in Q1 2020 down 42% compared to last year

Incindent

Net-security

12.5.20

Home workplaces introduce new risks, poor password hygiene

Security

Net-security

12.5.20

Gain free access to Utilizing Big Data course, a $200 value

Security

Net-security

11.5.20

VMware is going to fix recent Salt issues in vROps

Vulnerebility

Securityaffairs
11.5.20

GDPR Data Security Checklist in the Age of COVID-19 and the Remote Workforce

Privacy

Securityaffairs

11.5.20

Experts disclose security flaws in Oracle’s iPlanet Web Server

Vulnerebility

Securityaffairs
11.5.20

STAMINA, a new approach to malware detection by Microsoft, Intel

Virus

Securityaffairs

11.5.20

Sodinokibi ransomware uses MS API to encrypt open and locked files

Ransomware

Securityaffairs
11.5.20

Blue Mockingbird Monero-Mining campaign targets web apps

Cryptocurrency

Securityaffairs

11.5.20

US Says Chinese Hacking Vaccine Research: Reports

BigBrothers

Securityweek

11.5.20

Hacker Group Advertises Data From Multiple Fresh Breaches

Incindent

Securityweek
11.5.20

VMware to Patch Recent Salt Vulnerabilities in vROps

Vulnerebility

Securityweek
11.5.20

Railway Vehicle Maker Stadler Hit by Malware Attack

Virus

Securityweek

11.5.20

Thunderspy: More Thunderbolt Flaws Expose Millions of Computers to Attacks

Vulnerebility

Securityweek
11.5.20

DigitalOcean Inadvertently Exposed Customer Data

Incindent

Securityweek
11.5.20

7 New Flaws Affect All Thunderbolt-equipped Computers Sold in the Last 9 Years

Vulnerebility

Thehackernews
11.5.20

vBulletin fixes critical vulnerability, patch immediately!

Vulnerebility

Net-security
11.5.20

Have you updated SaltStack Salt? Attacks are underway!

Attack

Net-security

11.5.20 Sodinokibi ransomware uses MS API to encrypt open and locked files Ransomware Securityaffairs
11.5.20 Blue Mockingbird Monero-Mining campaign targets web apps Cryptocurrency

Securityaffairs

11.5.20 Swiss rail vehicle manufacturer Stadler hit by a malware-based attack Virus Securityaffairs
11.5.20 Shiny Hunters group is selling data from 11 companies on the Dark Web Hacking

Securityaffairs

11.5.20 Coronavirus-themed attacks May 03 – May 09, 2020 Security

Securityaffairs

11.5.20 Microsoft, Intel Introduce 'STAMINA' Approach to Malware Detection Virus

Securityweek

11.5.20

YARA v4.0.0: BASE64 Strings

Virus

SANS
11.5.20

Leveraging automation to maximize security budgets

Security

Net-security
11.5.20

Are you sure you would never fall for a phishing scam?

Phishing

Net-security

11.5.20

FIRST releases updated coordination principles for Multi-Party Vulnerability Coordination and Disclosure

Vulnerebility

Net-security

11.5.20

Ransomware on the rise, companies prioritizing disaster recovery

Ransomware

Net-security

11.5.20

Biometric device shipments revenue to drop by $2 billion

Security

Net-security

11.5.20

Open source algorithms for network graph analysis help discover patterns in data

Security

Net-security

10.5.20 Hacker group floods dark web with data stolen from 11 companies Incindent

Bleepingcomputer

10.5.20 North Korean hackers infect real 2FA app to compromise Macs Apple  APT

Bleepingcomputer

10.5.20 Microsoft Edge is getting a new feature to reduce web spam Spam

Bleepingcomputer

10.5.20 Rail vehicle manufacturer Stadler hit by cyberattack, blackmailed Cyber

Bleepingcomputer

10.5.20 Surface Laptop 3 screens with spontaneous cracks now fixed for free Security

Bleepingcomputer

10.5.20 Black Hat and DEF CON security conferences go virtual due to pandemic Congress

Bleepingcomputer

10.5.20 Have fun learning robotics with a DIY Bionic Robot Lizard kit IT

Bleepingcomputer

10.5.20 Twitter warns of legacy site theme shutting down on June 1 Social

Bleepingcomputer

10.5.20 Windows 10 upgrade bug prevents HDR video streaming OS

Bleepingcomputer

10.5.20 Microsoft rolls out protection against Office 365 email storms OS

Bleepingcomputer

10.5.20 New Google Authenticator update makes it worth using again Security

Bleepingcomputer

10.5.20 Windows 10's Game Mode reportedly causing freezes, FPS issues OS

Bleepingcomputer

10.5.20 Firefox 76.0.1 released to fix broken Amazon extension, crashes Security

Bleepingcomputer

10.5.20 REvil ransomware threatens to leak A-list celebrities' legal docs Ransomware

Bleepingcomputer

10.5.20 Hackers sell stolen user data from HomeChef, ChatBooks, and Chronicle Incindent

Bleepingcomputer

10.5.20 Ruhr University Bochum shuts down servers after ransomware attack Ransomware

Bleepingcomputer

10.5.20 Unemployed Americans offered ‘remote jobs’ as money mules Security

Bleepingcomputer

10.5.20 Microsoft leak: Windows 10 2004 being released last week of May OS

Bleepingcomputer

10.5.20 Intel graphics drivers now officially support Windows 10 2004 OS

Bleepingcomputer

10.5.20 Microsoft Teams call drops on desktop caused by iOS bug iOS

Bleepingcomputer

10.5.20 Critical WordPress plugin bug lets hackers take over 1M sites Incindent

Bleepingcomputer

10.5.20 New "Aria-body" backdoor gets advanced hackers back in the spy game Virus

Bleepingcomputer

10.5.20 SilverTerrier BEC scammers target US govt healthcare agencies BigBrothers  Spam

Bleepingcomputer

10.5.20 Microsoft's GitHub account hacked, private repositories stolen Hacking

Bleepingcomputer

10.5.20 Cisco Webex phishing uses fake cert errors to steal credentials Phishing

Bleepingcomputer

10.5.20 Large scale Snake Ransomware campaign targets healthcare, more Ransomware

Bleepingcomputer

10.5.20 Windows 10 Build 19624 released with Windows Update fixes OS

Bleepingcomputer

10.5.20 Hackers use website favicon to camouflage credit card skimmer Crime

Bleepingcomputer

10.5.20 Hacker sells 22 million Unacademy user records after data breach Incindent

Bleepingcomputer

10.5.20 Critical Citrix ShareFile bugs could give access to private files Vulnerebility

Bleepingcomputer

10.5.20 SAP announces security issues in cloud-based products Security

Bleepingcomputer

10.5.20 Massive campaign targets 900,000 WordPress sites in a week Incindent

Bleepingcomputer

10.5.20 Cyber volunteers release blocklists for 26,000 COVID-19 threats Cyber

Bleepingcomputer

10.5.20 Microsoft releases May Office updates with fixes for auth issues Security

Bleepingcomputer

10.5.20 Toll Group hit by ransomware a second time, deliveries affected Ransomware

Bleepingcomputer

10.5.20

Why Securing Remote Work is Crucial To Ensuring Business Continuity

Security blog

Sonicwall

10.5.20

Remembering the ILOVEYOU virus twenty years later

Malware blog

Avast blog

10.5.20

New Android malware steals banking passwords

Malware blog

Avast blog

10.5.20

Massive WordPress attack relies on old flaws

Incident blog

Avast blog
10.5.20

Using a Full Lifecycle Approach to Secure Cloud Native Applications

Cyber blog

Palo Alto

10.5.20

The Right Approach to Securing 5G

Cyber blog

Palo Alto

10.5.20

Scaling Security for Data Center Transformation: COVID-19 Amplifies Trends

Cyber blog

Palo Alto

10.5.20

Power the New Normal with Prisma Access: Delivering Next-Gen Cybersecurity

Cyber blog

Palo Alto

10.5.20

Unit 42 Recognized by Microsoft on the MSRC Security Researcher Leaderboard

Cyber blog

Palo Alto
10.5.20

Nmap Basics - The Security Practitioner's Swiss Army Knife

Security

SANS
10.5.20 BDGoGoogleDecryptor Anti-Ransom Tool Anti-Ransom Tool
10.5.20 North Korea-linked Lazarus APT uses a Mac variant of the Dacls RAT APT Securityaffairs
10.5.20 3.68 Million MobiFriends User details leaked online Incindent Securityaffairs
10.5.20 Sodinokibi gang hacked law firm of the celebrities and threatens to release the docs Ransomware Securityaffairs
10.5.20 SilverTerrier gang uses COVID-19 lures in BEC attacks against healthcare, government organizations Spam Securityaffairs
9.5.20 Microsoft launches IoT-focused bounty program with $100K awards IoT

Bleepingcomputer

9.5.20

InfinityBlack hacker group dismantled by European authorities Hacking

Bleepingcomputer

9.5.20

Game patch gives hackers access to development content on Amazon S3 Hacking

Bleepingcomputer

9.5.20

Nation-state hackers are targeting COVID-19 response orgs BigBrothers

Bleepingcomputer

9.5.20

Firefox 76 released with integrated data breach alerts Incindent

Bleepingcomputer

9.5.20

GitHub shuts down Popcorn Time repositories due to MPA DMCA notice Security

Bleepingcomputer

9.5.20

GoDaddy notifies users of breached hosting accounts Incindent

Bleepingcomputer

9.5.20

LockBit ransomware self-spreads to quickly encrypt 225 systems Ransomware

Bleepingcomputer

9.5.20

Office 365 to stop data theft by disabling external forwarding Security

Bleepingcomputer

9.5.20

New VCrypt Ransomware locks files in password-protected 7ZIPs Ransomware

Bleepingcomputer

9.5.20

Hackers exploit Salt RCE bugs in widespread attacks, PoCs public Exploit

Bleepingcomputer

9.5.20

CAM4 adult cam site exposes 11 million emails, private chats Incindent

Bleepingcomputer

9.5.20

LineageOS outage caused by hackers breaching main infrastructure OS

Bleepingcomputer

9.5.20

Hacker sells 91 million Tokopedia accounts, cracked passwords shared Hacking

Bleepingcomputer

9.5.20

Debloating Windows 10 and increasing privacy with SharpApp OS

Bleepingcomputer

9.5.20 Ransom News Ransom

Ransom

9.5.20

TO PAY OR NOT TO PAY

Safety blog

Cybereason

9.5.20

CONVERGING ENDPOINT AND MOBILE SECURITY

Safety blog

Cybereason

9.5.20

2 METRICS TO EVALUATE MITRE ATT&CK RESULTS

Attack blog

Cybereason

9.5.20

EVENTBOT: A NEW MOBILE BANKING TROJAN IS BORN

Malware blog

Cybereason

9.5.20

ENS 10.7 Rolls Back the Curtain on Ransomware

Ransomware blog

Mcafee blog

9.5.20

Cybercriminals Actively Exploiting RDP to Target Remote Organizations

Cyber blog  Exploit blog

Mcafee blog

9.5.20

COVID-19 – Malware Makes Hay During a Pandemic

Malware blog

Mcafee blog

9.5.20

Tales From the Trenches; a Lockbit Ransomware Story

Ransomware blog

Mcafee blog

9.5.20

Is the Cloud Safe? Thinking About the Cloud Through a Security Lens

Security blog

F5 Labs

9.5.20

Demystifying API Attacks Using Gamification

Attack blog

F5 Labs

9.5.20

Excelerating Analysis, Part 2 — X[LOOKUP] Gon’ Pivot To Ya

Malware blog

FireEye

9.5.20

Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents

Ransomware blog

FireEye

9.5.20

Naikon APT: Cyber Espionage Reloaded

APT blog

Checkpoint

9.5.20

Bugs on the Windshield: Fuzzing the Windows Kernel

Vulnerebility blog

Checkpoint

9.5.20

Nazar: Spirits of the Past

APT blog

Checkpoint

9.5.20

First seen in the wild – Malware uses Corporate MDM as attack vector

Attack blog  Malware blog

Checkpoint

9.5.20

Vulnerability Spotlight: Code execution vulnerability in 3S CODESYS

Vulnerebility blog

Cisco Talos

9.5.20

Vulnerability Spotlight: Multiple code execution vulnerabilities in Accusoft ImageGear

Vulnerebility blog

Cisco Talos

9.5.20

Scams to watch out for not just this Mother’s Day

Spam blog

Eset

9.5.20

Digital transformation could be accelerated by COVID‑19

Security blog

Eset

9.5.20

5 common password mistakes you should avoid

Safety blog

Eset

9.5.20

Almost a million WordPress websites targeted in massive campaign

Cyber blog

Eset

9.5.20

Professional data leakage: How did that security vendor get my personal data?

Incident blog

Eset

9.5.20

Ghost blogging platform servers hacked to mine cryptocurrency

Cryptocurrency blog

Eset

9.5.20

It’s no time to let your guard down as coronavirus fraud remains a threat

Spam blog

Eset

9.5.20 Report: Microsoft’s GitHub Account Gets Hacked Hacking

Threatpost

9.5.20 Black Hat USA, DEF CON 28 Go Virtual Congress

Threatpost

9.5.20 Hackers Breach 3.5 Million MobiFriends Dating App Credentials Incindent

Threatpost

9.5.20 Naikon’s Aria APT Securelist
9.5.20 Microsoft investigates claims that its GitHub account has been hacked Hacking

Securityaffairs

9.5.20 Cloud Security Company Ermetic Emerges From Stealth Mode Security

Securityweek

9.5.20 DigitalOcean Data Leak Incident Exposed Some of Its Customers Data Incindent Thehackernews

8.5.20

H2 2019: Duration of phishing attacks grows, use of banking trojans wanes

Phishing  Virus

Net-security

8.5.20

GitHub Code Scanning aims to prevent vulnerabilities in open source software

Vulnerebility

Net-security

8.5.20

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Phishing

Securityaffairs
8.5.20

Massive cyber attack forced Ruhr University Bochum (RUB) to shut down its IT infrastructure

Attack

Securityaffairs

8.5.20

Cisco fixes High Severity issues in ASA and FTD products

Vulnerebility

Securityaffairs

8.5.20

Healthcare, Government Organizations Targeted in BEC Attacks With COVID-19 Lures

Spam

Securityweek

8.5.20

Google Authenticator Users Can Now Transfer 2SV Secrets Between Devices

Mobil

Securityweek

8.5.20

Industry Reactions to Alliance for Open 5G Systems: Feedback Friday

Mobil

Securityweek

8.5.20

Elementor Plugin Vulnerabilities Exploited to Hack WordPress Sites

Vulnerebility

Securityweek

8.5.20

Microsoft Investigating GitHub Account Hacking Claims

Hacking

Securityweek

8.5.20

Cisco Fixes High-Severity Flaws In Firepower Security Software, ASA

Vulnerebility

Threatpost

8.5.20

Naikon APT Hid Five-Year Espionage Attack Under Radar

APT

Threatpost

8.5.20

Zoom Beefs Up End-to-End Encryption to Thwart ‘Zoombombers’

Crypto

Threatpost

8.5.20

Blue Mockingbird Monero-Mining Campaign Exploits Web Apps

Cryptocurrency

Threatpost

8.5.20

Hackers Dumpster Dive for Taxpayer Data in COVID-19 Relief Money Scams

Spam

Threatpost
8.5.20

Issues in Elementor Pro and Ultimate Addons for Elementor exposed 1 Million WordPress sites at risk

Incindent

Securityaffairs

8.5.20

Poulight Stealer, a new Comprehensive Stealer from Russia

BigBrothers

Securityaffairs

8.5.20

Naikon APT is flying under the radar since 2015

APT

Securityaffairs

8.5.20

Zoom Agrees to Step Up Security After New York Probe

Security

Securityweek

8.5.20

Samsung Patches Critical 0-Click Vulnerability in Smartphones

Vulnerebility

Securityweek

8.5.20

Cisco Patches High Severity Vulnerabilities in Security Products

Vulnerebility

Securityweek

8.5.20

Critical Flaw in CODESYS Industrial Controller Software Allows Code Execution

Vulnerebility

Securityweek

8.5.20

Search Company Algolia Hacked via Recent Salt Vulnerabilities

Hacking

Securityweek

8.5.20

Using Nmap As a Lightweight Vulnerability Scanner

Safety

SANS

8.5.20

The new cyber risk reality of COVID-19 operating mode

Cyber

Net-security
8.5.20

99% of enterprise users reuse passwords across accounts

Safety

Net-security

8.5.20

How to increase cyber defense agility for the next lockdown

Cyber

Net-security

8.5.20

Financial services leading the way in adopting DevOps, still hurdles remain

Security

Net-security

8.5.20

Is the stress of card fraud worth the digital convenience?

Security

Net-security

7.5.20

Snake Ransomware hits Europe’s largest private hospital operator Fresenius during COVID-19 outbreak Ransomware Securityaffairs

7.5.20

Brazilian trojan banker is targeting Portuguese users using browser overlay Virus

Securityaffairs

7.5.20

Samsung fixes a zero-click issue affecting its phones Mobil

Securityaffairs

7.5.20

North Korean Hackers Release Mac Variant of Dacls RAT Virus

Securityweek

7.5.20

Recorded Future Releases Free Threat Intelligence Browser Extension Security

Securityweek

7.5.20

Chinese Naikon APT Rediscovered After New Five-year Stealth Campaign APT

Securityweek

7.5.20

Zoom Acquires Keybase to Bring End-to-End Encryption to Video Platform Crypto

Securityweek

7.5.20

Another Stuxnet-Style Vulnerability Found in Schneider Electric Software ICS

Securityweek

7.5.20

Czech, US to Cooperate on Security of 5G Networks BigBrothers

Securityweek

7.5.20

This Asia-Pacific Cyber Espionage Campaign Went Undetected for 5 Years CyberSpy Thehackernews

7.5.20

How a favicon delivered a web credit card skimmer to victims

CyberCrime

Net-security

7.5.20

Firefox 76 delivers new password security features and security fixes

Security

Net-security

7.5.20

Passwords still widely used, despite known weaknesses

Safety

Net-security

7.5.20

Scanning with nmap?s NSE scripts

Safety

SANS

7.5.20

Lazarus Group Hides macOS Spyware in 2FA Application CyberCrime

Threatpost

7.5.20

Attackers Claim Identity of Financial NGO to Steal Sharepoint, Office Credentials Incindent

Threatpost

7.5.20

Ransomware Attack Takes Down Toll Group Systems, Again Ransomware

Threatpost

7.5.20

InfinityBlack Dismantled After Selling Millions of Credentials Incindent

Threatpost

7.5.20

Microsoft Shells Out $100K for IoT Security IT Threatpost

7.5.20

Unacademy hacked, 22 million accounts offered for sale Incindent

Securityaffairs

7.5.20