Calendar 2019- Home  2019  2018  2017  2016  1  2  3  4  5  6  7

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


 


2019 - January  February  March  April  May  June  July  August  September  October  November  December

2018 - January  February  March  April  May  June  July  August  September  October  November  December


Date

Name

Category

Web

11.11.19

Apple Mail stores parts of encrypted emails in plaintext DB Apple

Securityaffairs

11.11.19 Major ASP.NET hosting provider SmarterASP hit by ransomware attack Ransomware

Securityaffairs

11.11.19 Twitter Spy Case Highlights Risks for Big Tech Platforms Social Securityweek

11.11.19

Did the recent malicious BlueKeep campaign have any positive impact when it comes to patching?

Vulnerebility  Virus

SANS

11.11.19

When is the right time to red team?

Security

Net-security

11.11.19

Believe the hype, but control the threat: Reducing the risk of ransomware

Ransomware

Net-security

11.11.19

Speeding MTTR when a third-party cloud service is attacked

Attack

Net-security

11.11.19

PayPal becomes phisher’s favorite brand, Office 365 phishing techniques evolve

Phishing

Net-security

11.11.19

Attackers continue to leverage greater levels of social engineering and sophistication

Security

Net-security

11.11.19

Do you think you can recognize fake news on Facebook?

Social

Net-security

10.11.19

Malware Meets Politics With Trump and Clinton Themed Infections Virus

Bleepingcomputer

10.11.19

US Govt Asks Users to Be Wary of Holiday Scams and Malware BigBrothers  Virus

Bleepingcomputer

10.11.19

QuikSilver and Billabong Affected by Ransomware Attack Ransomware

Bleepingcomputer

10.11.19

New Stealthy Backdoor Used by Platinum APT in Recent Attacks APT

Bleepingcomputer

10.11.19

Clever WebEx Spam Use Cisco Redirect to Deliver RAT Malware Spam  Virus

Bleepingcomputer

10.11.19

Bugcrowd Paid Over $500K in Bug Bounties in One Week Security

Bleepingcomputer

10.11.19

Ransom News Ransom Ransom

10.11.19

Bad News: AI and 5G Are Expected to Worsen Cybersecurity Risks Cyber

Securityaffairs

10.11.19

Boardriders and its subsidiarities QuikSilver and Billabong infected with ransomware Ransomware

Securityaffairs

10.11.19

Phishing scam issues fake court summons

Phishing blog

Avast blog

10.11.19

Facebook removes Russian propaganda networks

BigBrother blog  Social blog

Avast blog

10.11.19

A look inside the hack of a nuclear reactor’s computer network

BigBrother blog

Avast blog

10.11.19

Wireshark Tutorial: Examining Trickbot Infections

Malware blog

Palo Alto Unity42

10.11.19

Web-Based Threats: First Half 2019

Cyber blog

Palo Alto Unity42

10.11.19

Home & Small Office Wireless Routers Exploited to Attack Gaming Servers

Exploit blog

Palo Alto Unity42

10.11.19

The Next Generation of Network Security Is Cloud-Delivered

Safety blog

Palo Alto

10.11.19

New and Enhanced Palo Alto Networks Support Offerings Elevate the Customer ...

Safety blog

Palo Alto

10.11.19

Container Security: Vulnerability Management from Build to Run

Safety blog

Palo Alto

10.11.19

A Firewall Admin’s Introduction to Serverless Security

Safety blog

Palo Alto

10.11.19

Cyber Canon Candidate Book Review: A Sustainable Digital Economy: Not Fear,...

Safety blog

Palo Alto

10.11.19

Protecting Data Center Interconnect Links

Safety blog

Palo Alto

10.11.19

Palo Alto Networks Named a Leader in The Forrester ZTX Wave™

Safety blog

Palo Alto

10.11.19

Fake Netflix Update Request by Text

Mobil  Spam

SANS

10.11.19

The Platinum APT group adds the Titanium backdoor to its arsenal

APT

Securityaffairs

10.11.19

DHS CISA warns of Critical issues in Medtronic Medical equipment

BigBrothers

Securityaffairs

9.11.19

Spanish MSSP Targeted by BitPaymer Ransomware

Ransomware blog

Mcafee blog

9.11.19

Buran Ransomware; the Evolution of VegaLocker

Ransomware blog

Mcafee blog

9.11.19

Application Protection Research Series—Executive Summary

Security blog

F5 Labs

9.11.19

Make Sure You Keep an Eye on Your APIs

Security blog

F5 Labs

9.11.19

Adopt Insertion Point Security for a Microservices World

Security blog

F5 Labs

9.11.19

Xhelper: Persistent Android Dropper App Infects 45K Devices in Past 6 Months

OS Blog

Symantec

9.11.19

Nemty Ransomware Expands Its Reach, Also Delivered by Trik Botnet

Ransomware blog

Symantec

9.11.19

Vulnerability Spotlight: Code execution vulnerabilities in LEADTOOLS

Vulnerebility blog

Cisco Talos

9.11.19

Talos, Cisco Incident Response team up to offer more protection than ever

Safety blog

Cisco Talos

9.11.19

How adversaries use politics for compromise

BigBrother blog

Cisco Talos

9.11.19

C2 With It All: From Ransomware To Carding

Ransomware blog

Cisco Talos

9.11.19

The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to defend against encrypted DejaBlue

Vulnerebility blog

Cisco Talos

9.11.19

Vulnerability Spotlight: Two remote code execution vulnerabilities in Investintech Able2Extract

Vulnerebility blog

Cisco Talos

9.11.19

CISO Advisory: Security Architecture

Security blog

Cisco Talos

9.11.19

How much do data breaches affect stock prices?

Incident blog

Eset

9.11.19

Android keyboard app caught red‑handed trying to make sneaky purchases

OS Blog

Eset

9.11.19

Five ways to strengthen employee cybersecurity awareness

Cyber blog

Eset

9.11.19

Antimalware Day 2019: Building a culture of cybersecurity awareness

Malware blog

Eset

9.11.19

Microsoft Warns of More Harmful Windows BlueKeep Attacks, Patch Now OS  Vulnerebility

Bleepingcomputer

9.11.19

Australian Govt Warns of Active Emotet and BlueKeep Threats BigBrothers  Virus

Bleepingcomputer

9.11.19

QNAP Warns Users to Secure Devices Against QSnatch Malware Virus

Bleepingcomputer

9.11.19

Microsoft to Remove Downloads Folder from Disk Cleanup OS

Bleepingcomputer

9.11.19

Legitimate TDS Platform Abused to Push Malware via Exploit Kits Exploit

Bleepingcomputer

9.11.19

Specially Crafted ZIP Files Used to Bypass Secure Email Gateways Vulnerebility

Bleepingcomputer

9.11.19

NVIDIA Fixes Security Flaws in GPU Driver, GeForce Experience Vulnerebility

Bleepingcomputer

9.11.19

Google Allies With Security Companies to Boost Play Store Safety Android

Bleepingcomputer

9.11.19

Facebook Discloses Privacy Breach Caused by Groups API Bug Social

Bleepingcomputer

9.11.19 Subpoena Phishing Emails Serve Nasty Predator Thief Infection Phishing

Bleepingcomputer

9.11.19

News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine Fails Security

Threatpost

9.11.19

Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone Incindent

Threatpost

9.11.19

Pwn2Own Tokyo Roundup: Amazon Echo, Routers, Smart TVs Fall to Hackers Congress

Threatpost

9.11.19

Amazon Fixes Ring Video Doorbell Flaw That Leaked Wi-Fi Credentials Vulnerebility

Threatpost

9.11.19

Platinum APT Shines Up New Titanium Backdoor APT

Threatpost

9.11.19

Art Imitates Life: Lessons from the Final Season of Mr. Robot IT

Threatpost

9.11.19

Cisco Talos discovered multiple flaws in the LEADTOOLS toolkits Vulnerebility Securityaffairs

9.11.19

DHS Warns of Critical Flaws in Medtronic Medical Devices BigBrothers Securityweek

9.11.19

Cybersecurity Workforce Gap: 145% Growth Needed to Meet Global Demand Cyber Securityweek

8.11.19

Italian police shut down darkweb Berlusconi market and arrested admins BigBrothers Securityaffairs

8.11.19

Microsoft warns of more disruptive BlueKeep attacks and urges patch installation Attack Securityaffairs
8.11.19 Microsoft: BlueKeep Exploit Will Likely Deliver More Damaging Payloads Exploit Securityweek

8.11.19

Hackers Can Target LEADTOOLS Users With Malicious Image Files Virus Securityweek
8.11.19 Accenture Launches Cyber Ranges for Industrial Companies IT Securityweek
8.11.19 Sepio Systems Raises $6.5 Million to Defend Against Rogue Hardware IT Securityweek

8.11.19

Tech Firms React to Netizens' Digital Privacy Concerns Privacy Securityweek

8.11.19

Cisco fixes small business routers, kills eavesdropping vulnerability in conferencing devices

Vulnerebility

Net-security

8.11.19

Titanium: the Platinum group strikes again APT Securelist
8.11.19 Capesand is a new Exploit Kit that appeared in the threat landscape Exploit Securityaffairs

8.11.19

Amazon Kindle, Embedded Devices Open to Code-Execution

Vulnerebility

Threatpost

8.11.19

Why Big Breach Fines Don’t Equal Fewer Breaches

Incindent

Threatpost

8.11.19

Gamers Hit with Nvidia GPU Driver, GeForce Flaws

Vulnerebility

Threatpost

8.11.19

Google Enlists Help to Fight Bad Android Apps

Android

Threatpost

8.11.19

Ex-Twitter Employees Spied on Saudi Dissidents: DoJ

Social

Threatpost

8.11.19

How to Secure Critical Infrastructure When Patching Isn’t Possible

Vulnerebility

Threatpost

8.11.19

Pwn2Own Tokyo 2019 -Day2: experts hacked Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers

Congress

Securityaffairs
8.11.19 DNA-testing startup Veritas Genetics disclosed a security breach Incindent Securityaffairs
8.11.19 Amazon’s Ring Video Doorbell could open the door of your home to hackers Hacking Securityaffairs

8.11.19

Actively Developed Capesand Exploit Kit Emerges in Attacks Exploit Securityweek
8.11.19 Charges: Chinese Surveillance Goods Illegally Sold to US BigBrothers Securityweek
8.11.19 Bug Hunters Hack Samsung Galaxy S10, Xiaomi Mi9 at Pwn2Own Congress Securityweek
8.11.19 Cisco Patches Vulnerabilities in Small Business Routers, RoomOS Software Vulnerebility Securityweek

8.11.19

Microsoft Apps Diverted from Their Main Use

Security

SANS

8.11.19

Cybersecurity workforce skills gap rises to over 4 million

Cyber

Net-security

8.11.19

November 2019 Patch Tuesday Forecast: Out with the old, in with the new

Vulnerebility

Net-security

8.11.19

SIEM complexity and cloud visibility put companies at risk

Security

Net-security

8.11.19

Global internet freedom declines for the ninth consecutive year

Security

Net-security

8.11.19

Only 47% of cybersecurity pros are prepared to deal with attacks on their IoT devices

Security

Net-security

8.11.19

What financial records do companies need to keep, and for how long?

Security

Net-security

8.11.19

Mobile security firms will help protect Google Play

Safety

Net-security

7.11.19

TrendMicro Employee Sold Customer Info to Tech Support Scammers Spam

Bleepingcomputer

7.11.19

DarkUniverse APT Stayed Hidden for 8 Years, Updated Regularly APT

Bleepingcomputer

7.11.19

Microsoft Defender ATP Gets Advanced Hunting Capabilities, More Safety

Bleepingcomputer

7.11.19 Windows 10 Insider Build 19018 Released With New Quick Web Searches OS

Bleepingcomputer

7.11.19

Microsoft Issues November 2019 Office Updates With Memory Leak Fix OS

Bleepingcomputer

7.11.19

New Megacortex Ransomware Changes Windows Passwords, Threatens to Publish Data Ransomware

Bleepingcomputer

7.11.19

Tech Support Scammers Are Abusing a New Firefox Browser Lock Bug Vulnerebility

Bleepingcomputer

7.11.19 WordPress Admins Infect Their Sites With WP-VCD via Pirated Plugins Virus

Bleepingcomputer

7.11.19

Brooklyn Hospital Loses Patient Data In Ransomware Attack Ransomware

Bleepingcomputer

7.11.19

Using Light Beams to Control Google, Apple, Amazon Assistants Security

Bleepingcomputer

7.11.19

Chrome, Firefox to Hide Those Annoying Site Notification Prompts Security

Bleepingcomputer

7.11.19 Malwarebytes 4.0 Released With New UI and Scanning Engine Safety

Bleepingcomputer

7.11.19 Nemty Ransomware Now Spreads via Trik Botnet Ransomware

Bleepingcomputer

7.11.19 Ransomware Attacks Hit Everis and Spain's Largest Radio Network Ransomware

Bleepingcomputer

7.11.19

Specially Crafted ZIP archives allow bypassing secure email gateways Vulnerebility Securityaffairs

7.11.19

Two former Twitter employees charged of spying on Users for Saudi Arabian Government Social Securityaffairs

7.11.19

Saudi King Hosts CIA Chief for Talks BigBrothers Securityweek
7.11.19 eCommerce Fraud Prevention Firm Riskified Raises $165 Million IT Securityweek

7.11.19

Google Teams Up With Security Firms to Fight Bad Android Apps Android Securityweek

7.11.19

California Says Facebook Impeding Privacy Probe Privacy  Social Securityweek

7.11.19

NVIDIA Patches Flaws in GPU Display Driver, GeForce Experience Vulnerebility Securityweek
7.11.19 Amazon's Ring Video Doorbell Lets Attackers Steal Your Wi-Fi Password Attack Thehackernews
7.11.19 Gartner Says the Future of Network Security Lies with SASE Security Thehackernews
7.11.19 Rogue TrendMicro Employee Sold Customer Data to Tech Support Scammers Spam Thehackernews

7.11.19

Trend Micro rogue employee sold customer data to tech support scammers Spam Securityaffairs

7.11.19

Bug Hunters Earn $195,000 for Hacking TVs, Routers, Phones at Pwn2Own Tokyo 2019 Congress Securityaffairs

7.11.19

GUI Now Available for Kamerka ICS/IoT Reconnaissance Tool ICS  IoT Securityweek
7.11.19 Two Former Twitter Employees Caught Spying On Users For Saudi Arabia CyberSpy  Social Thehackernews

7.11.19

Apple details new Safari, Location Services, Sign in with Apple privacy features

Apple

Net-security

7.11.19

Facebook Privacy Breach: 100 Developers Improperly Accessed Data Social

Threatpost

7.11.19

Google Analytics Emerges as a Phishing Tool Phishing

Threatpost

7.11.19 Emotet Resurgence Continues With New Tactics, Techniques and Procedures Virus

Threatpost

7.11.19 DarkUniverse APT Emerges to Deliver Sophisticated, Targeted Spy Attacks APT

Threatpost

7.11.19 Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security Security Threatpost
7.11.19 You’ve Been Served…with Subpoena-Themed Phishing Emails Phishing

Threatpost

7.11.19 Rogue Trend Micro Employee Sold Customer Data for 68K Accounts Incindent  Virus Threatpost
7.11.19

Getting the best value out of security assessments

Security

SANS

7.11.19

A flaw in the Libarchive library impacts major Linux distros

Vulnerebility

Securityaffairs
7.11.19

‘Camgirl’ sites expose millions of members and users

Incindent

Securityaffairs
7.11.19

Facebook discloses a new leak that exposes group members’ data

Social

Securityaffairs
7.11.19

Documents Show Facebook Controlling Competitors With User Data: Report

Social

Securityweek
7.11.19

Three Charged in US With Spying on Twitter Users for Saudi Arabia

BigBrothers

Securityweek
7.11.19

More malspam pushing Formbook

Spam

SANS

7.11.19

5 factors to consider when choosing an encryption key management system

Crypto

Net-security

7.11.19

The promise and peril of post quantum computing

Security

Net-security

7.11.19

Cybercriminals are testing exposed credentials for future account takeover attacks

CyberCrime

Net-security

7.11.19

Phishing attacks at highest level in three years

Phishing

Net-security

7.11.19

Security and risk compliance: Still the most important part of IT strategy

Security

Net-security

6.11.19

Brooklyn Hospital lost patient records after a ransomware infection Ransomware Securityaffairs

6.11.19

Libarchive Vulnerability Impacts Multiple Linux Distributions Vulnerebility Securityweek

6.11.19

Bug Hunters Earn $195,000 for Hacking TVs, Routers, Phones at Pwn2Own Congress Securityweek

6.11.19

Immersive Labs Raises $40 Million for Cyber Skills Platform IT Securityweek

6.11.19

Google Announces Open Source Silicon Root-of-Trust Project IT Securityweek

6.11.19

The Future of Cyber Through the Eyes of an Intelligence Firm IT Securityweek

6.11.19

Trend Micro Employee Sold Customer Data to Scammers Spam Securityweek

6.11.19

Facebook: Third-Party App Developers Improperly Accessed User Information Social Securityweek

6.11.19

Google Patches Critical Flaws in Android's System Component Android Securityweek

6.11.19

Facebook Reveals New Data Leak Incident Affecting Groups' Members Social Thehackernews

6.11.19

Explained: How New 'Delegated Credentials' Boosts TLS Protocol Security Crypto  Hacking Thehackernews

6.11.19

Detecting and tracking phishing campaigns through web analytics identifiers

Phishing

Net-security

6.11.19

New, improved Microsoft 365 security and compliance features

Security

Net-security

6.11.19

Anonymous and LulzSecITA hacked professional orders and telephone operator Lyca Mobile APT Securityaffairs

6.11.19

Mysterious DarkUniverse APT remained undetected for 8 years APT Securityaffairs

6.11.19

Ransomware attack impacted government services in the territory of Nunavut, Canada Ransomware Securityaffairs

6.11.19

VMware Unveils New Security Features, Enhancements for NSX, SD-WAN, Secure State Safety Securityweek

6.11.19

DarkUniverse APT Uses Just-in-Time Malware Creation APT Securityweek

6.11.19

Microsoft Announces New Security Capabilities Across Platforms Security Securityweek

6.11.19

Hackers Can Use Lasers to Send Voice Commands to Phones, Smart Speakers Hacking  Mobil Securityweek

6.11.19

IBM: Face Recognition Tech Should be Regulated, Not Banned Security Securityweek

6.11.19

Sumo Logic Acquires JASK to Expand Cloud-Native Platform IT Securityweek

6.11.19

Snowden Warns of Web Giants' 'Irresistible Power' BigBrothers Securityweek

6.11.19

Broadcom Completes Acquisition of Symantec Enterprise Unit for $10.7 Billion IT Securityweek

6.11.19

More malspam pushing Formbook

Spam

SANS

6.11.19

Defining risk controls that actually work

Security

Net-security

6.11.19

Who is responsible for Active Directory security within your organization?

Security

Net-security

6.11.19

Most organizations plan to increase their cybersecurity budgets in 2020

Cyber

Net-security

6.11.19

As more companies deploy cloud apps, they must also implement security tools

Security

Net-security

6.11.19

Key predictions that will impact CIOs and IT pros over the next five years

Security

Net-security

6.11.19

Nikkei hit by BEC scammers, loses $29 million

Spam

Net-security

5.11.19

DarkUniverse – the mysterious APT framework #27 APT Securelist

5.11.19

‘Light commands’ attack: hacking Alexa, Siri, and other voice assistants via Laser Beam Hacking Securityaffairs

5.11.19

PoC Exploits Published for Unpatched RCE Bugs in rConfig Exploit Securityweek

5.11.19

Hackers Can Silently Control Your Google Home, Alexa, Siri With Laser Light Hacking Thehackernews

5.11.19

Critical Remote Code Execution Flaw Found in Open Source rConfig Utility Vulnerebility

Threatpost

5.11.19

Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam Hacking

Threatpost

5.11.19

BlueKeep Attacks Have Arrived, Are Initially Underwhelming Attack

Threatpost

5.11.19

Magecart Groups Attack Simultaneous Sites in Card-Theft Frenzy CyberCrime

Threatpost

5.11.19

Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANs Ransomware Threatpost

5.11.19

BEC Scam Costs Media Giant Nikkei $29 Million Spam Threatpost

5.11.19

Flaws in Able2Extract Professional tool allow hacking targeted machine with malicious image files

Virus

Securityaffairs

5.11.19

Everis and Spain’s radio network Cadena SER hit by ransomware

Ransomware

Securityaffairs

5.11.19

Microsoft Unveils New Security Tools for Azure

Security

Securityweek

5.11.19

Vendor Email Compromise is Latest Identity Deception Attack

Attack

Securityweek

5.11.19

Europol on Methodology Behind Successful Spear Phishing Attacks

Phishing

Securityweek

5.11.19

Proofpoint Acquires Insider Threat Management Firm ObserveIT for $225 Million

IT

Securityweek

5.11.19

Hackers Can Target Able2Extract Users With Malicious Image Files

Virus

Securityweek

5.11.19

Targeted Ransomware Attacks Hit Several Spanish Companies

Ransomware

Thehackernews

5.11.19

Bluekeep exploitation causing Bluekeep vulnerability scan to fail

Exploit

SANS

5.11.19

IoT is an ecosystem, as secure as its weakest link

IoT

Net-security

5.11.19

How can security teams effectively monitor OT and ICS networks?

ICS

Net-security

5.11.19

A continuous problem: Tackling the cybersecurity skills shortage

Cyber

Net-security

5.11.19

Researchers develop machine learning-based detector that stops lateral phishing attacks

Phishing

Net-security

5.11.19

50% of apps will not be migrated to the cloud

Security

Net-security

5.11.19

Employees know vulnerabilities exist, but they can’t resolve them quickly enough

Security

Net-security

5.11.19

The digital economy is approaching a critical tipping point

Security

Net-security

5.11.19

Europol: Spear phishing the most prevalent cyber threat affecting orgs across the EU

Phishing

Net-security

4.11.19 Office 365 to Prevent Malicious Docs From Infecting Windows Security

Bleepingcomputer

4.11.19

Microsoft 365 Helps Improve Orgs’ Security and Compliance Posture Security

Bleepingcomputer

4.11.19 Microsoft 365 Now Helps Find and Review Insider Security Threats Security

Bleepingcomputer

4.11.19

Office 365 Breach Detection Capabilities Now in Public Preview Security

Bleepingcomputer

4.11.19 First Microsoft Edge Stable Release Candidate Now Available Security

Bleepingcomputer

4.11.19 BEC Fraudsters Divert $742,000 from Ocala City in Florida Spam

Bleepingcomputer

4.11.19

GitLab plans to ban hires in China and Russia due to espionage concerns BigBrothers  CyberSpy Securityaffairs
4.11.19 Ocala City in Florida lost $742,000 following BEC attack Spam Securityaffairs

4.11.19

Cybersecurity Executives Say Cost of Security Reasonable: Survey Cyber Securityweek
4.11.19 Microsoft Office for Mac Users Exposed to Macro-Based Attacks Apple Securityweek
4.11.19 Two unpatched RCE flaws in rConfig software expose servers to hack Vulnerebility Securityaffairs

4.11.19

QSnatch malware already infected thousands of QNAP NAS devices Virus Securityaffairs
4.11.19 Mueller Documents: Manafort Pushed Ukraine Hack Theory BigBrothers  Hacking Securityweek

4.11.19

Midwest's 1st Cyber Battalion to Be Based in Indiana BigBrothers Securityweek
4.11.19 BlueKeep Vulnerability Exploited to Deliver Cryptocurrency Miner Cryptocurrency Securityweek
4.11.19

Exclusive – Analysis of the sample that hit the Kudankulam Nuclear Power Plant

BigBrothers

Securityaffairs

4.11.19

New Gafgyt botnet targets Gaming Servers

BotNet

Securityaffairs
4.11.19

rConfig Install Directory Remote Code Execution Vulnerability Exploited

Exploit  Vulnerebility

SANS

4.11.19

People are the very first element in a pragmatic cybersecurity strategy

Cyber

Net-security

4.11.19

Organizations fail to maximize use of Microsoft 365 security features

Security

Net-security

4.11.19

Companies should disclose cybersecurity risk management efforts

Cyber

Net-security

4.11.19

Risky transactions on mobile devices increase 138% since 2017

Mobil

Net-security

4.11.19

Together, AI and the IoT are having a bigger-than-expected impact

Security

Net-security

4.11.19

Whitepaper: SIEM + Threat Intelligence

Security

Net-security

3.11.19

First Cyber Attack ‘Mass Exploiting’ BlueKeep RDP Flaw Spotted in the Wild Attack  Exploit Securityaffairs

3.11.19

Controversial law entered into effect in Russia this week BigBrothers Securityaffairs

3.11.19

Watch Out IT Admins! Two Unpatched Critical RCE Flaws Disclosed in rConfig Vulnerebility Thehackernews

3.11.19

First Cyber Attack 'Mass Exploiting' BlueKeep RDP Flaw Spotted in the Wild Exploit Thehackernews

3.11.19

BlueKeep Remote Code Execution Bug in RDP Exploited En Masse Exploit

Bleepingcomputer

3.11.19

Windows 10 1903 Affected by New Setup Bug, Workaround Ready OS

Bleepingcomputer

3.11.19

Google Begins Testing Extension Manifest V3 in Chrome Canary IT

Bleepingcomputer

3.11.19

Office 365 Phishing Campaign Baits Employees with Pay Raises Phishing

Bleepingcomputer

3.11.19

US MS-ISAC Releases the October List of End of Support Software BigBrothers

Bleepingcomputer

3.11.19

Media Giant Nikkei Loses $29 Million to BEC Scammers Spam

Bleepingcomputer

3.11.19

Google Chrome is Getting the 'Close other tabs' Option Back IT

Bleepingcomputer

3.11.19

GandCrab RaaS Was a Training Ground for Malware Distributors Ransomware

Bleepingcomputer

3.11.19

Chrome Zero-Day Bug with Exploit in the Wild Gets A Patch Exploit  Vulnerebility

Bleepingcomputer

3.11.19

20 Companies Pledge Support for the Hack_Right Program Hacking

Bleepingcomputer

3.11.19

Ransom News Ransom Ransom

3.11.19

Ouroboros Decryptor Anti-Ransomware Tool  Anti-Ransomware Tool 

3.11.19

CVE-2019-2114 flaw allows hackers to plant malware on Android devices via NFC beaming Vulnerebility  Virus Securityaffairs

3.11.19

Proton Technologies makes the code of ProtonMail iOS App open source Apple Securityaffairs

3.11.19

Desjardins credit union data breach bigger than initially thought Incindent Securityaffairs

3.11.19

Remark on EML Attachments

Security

SANS

2.11.19 Marriott Reports Exposure of Associates' Social Security Numbers Incindent

Bleepingcomputer

2.11.19 Emotet Trojan Brings a Malware Scare with Halloween Emails Spam  Virus

Bleepingcomputer

2.11.19 Active Duty U.S. Military Now Gets Free Credit Monitoring BigBrothers

Bleepingcomputer

2.11.19 Microsoft Shares Solutions for Windows TLS Failures, Timeouts OS

Bleepingcomputer

2.11.19 Discord Abused to Spread Malware and Harvest Stolen Data Virus

Bleepingcomputer

2.11.19 Chinese Hackers Steal SMS Messages from Linux Routing Servers BigBrothers  Mobil

Bleepingcomputer

2.11.19 Microsoft Warns of Windows Slow Startup Due to Persistent Memory OS

Bleepingcomputer

2.11.19 QSnatch Malware Infects Thousands of NAS Devices, Steals Credentials Virus

Bleepingcomputer

2.11.19 New Gafgyt Variant Recruits Routers to DDoS Servers for Valve Games Attack

Bleepingcomputer

2.11.19 Phishing Campaign Targets Precision Engineering Company Phishing

Bleepingcomputer

2.11.19 Office 365 Users Targeted by Voicemail Scam Pages Spam blog Mcafee blog
2.11.19 Did You Check Your Quarantine?! Malware blog Mcafee blog
2.11.19 Using Expert Rules in ENS to Prevent Malicious Exploits Exploit blog  Malware blog Mcafee blog
2.11.19 Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in September 2019 Security blog F5 Labs
2.11.19 Three Ways to Hack the U.S. Election BigBrother blog F5 Labs
2.11.19 2019 Application Protection Report Podcast Series Security blog F5 Labs
2.11.19 MESSAGETAP: Who’s Reading Your Text Messages? Social blog FireEye
2.11.19 CertUtil Qualms: They Came to Drop FOMBs Security blog FireEye
2.11.19 The commoditization of mobile espionage software BigBrother blog

Cisco Talos

2.11.19 Vulnerability Spotlight: Denial-of-service in VMWare Fusion 11 Vulnerebility blog

Cisco Talos

2.11.19 Cisco Talos helps CISOs get back to basics with advisory series Security blog

Cisco Talos

2.11.19 Safe downloading habits: What to teach your kids Security blog

Eset

2.11.19 Deepfakes: When seeing isn’t believing Security blog

Eset

2.11.19 Facebook builds tool to confound facial recognition Social blog

Eset

2.11.19 What you may be getting wrong about cybersecurity Cyber blog Eset
2.11.19 Microsoft Office for Mac cannot properly disable XLM macros Alert Alert
2.11.19

News Wrap: APTs, Office 365 Voicemail Phish and Bed Bath & Beyond Breach

Security

Threatpost

2.11.19

Android Keyboard App Could Swindle 40M Users Out of Millions

Android

Threatpost

2.11.19

Stubborn Malware Targets QNAP NAS Hardware Specifically

Virus

Threatpost

2.11.19

Google Discloses Chrome Flaw Exploited in the Wild

Vulnerebility

Threatpost

2.11.19

Office for Mac Users Warned of Malicious SYLK Files

Apple

Threatpost

2.11.19

Solar, Wind Power Utility Disrupted in Rare Cyberattack

Attack

Threatpost

2.11.19

Global Crime Ring Bilks U.S. Military Members, Vets Out of Millions

BigBrothers

Threatpost

2.11.19

CVE-2019-13720 flaw in Chrome exploited in Operation WizardOpium attacks

Exploit

Securityaffairs
2.11.19

Canada Credit Union Data Breach Bigger Than First Thought: Desjardins

Incindent

Securityweek

2.11.19

Tip: Password Managers and 2FA

Safety

SANS

31.10.19

China-linked APT41 group targets telecommunications companies with new backdoor APT

Securityaffairs

31.10.19

21 Million stolen credentials from Fortune 500 companies available on the dark web Incindent Securityaffairs

31.10.19

Chinese Cyberspies Use New Malware to Intercept SMS Traffic at Mobile Operators BigBrothers  CyberSpy

Securityweek

31.10.19

Facebook Agrees to Pay Fine in Cambridge Analytica Scandal Social Securityweek

31.10.19

Norsk Hydro Receives First Insurance Payout Following Cyberattack Attack Securityweek

31.10.19

Chinese Hackers Compromise Telecom Servers to Spy on SMS Messages BigBrothers Thehackernews

31.10.19

EML attachments in O365 - a recipe for phishing

Phishing

SANS

31.10.19

Leading domain name registrars suffered data breach

Incindent

Net-security

31.10.19

Apple releases fresh security updates for macOS, iOS

Apple

Net-security

31.10.19

Windows 10 Build 19013 Out With New DirectX 12 Features for Insiders OS

Bleepingcomputer

31.10.19

Maze Ransomware Attacks Italy in New Email Campaign Ransomware

Bleepingcomputer

31.10.19

Microsoft Updates Windows 10 PowerToys with Batch Renamer Tool OS

Bleepingcomputer

31.10.19

xHelper Trojan Variant Reinstalls Itself After Removal, Infects 45K Virus

Bleepingcomputer

31.10.19

Europe's Electronic ID System Fixed Against Impersonation Risk Vulnerebility

Bleepingcomputer

31.10.19

NordVPN Plans Security and Privacy Upgrades After Hack Privacy  Security

Bleepingcomputer

31.10.19

Google Adds New Ways For IT Admins to Keep Enterprises Secure Security

Bleepingcomputer

31.10.19

Mozilla Provides Workaround for Firefox 70 Not Loading Sites Security

Bleepingcomputer

31.10.19

Ransomware Actor Starting Young Makes Big Money, Gets Arrested Ransomware

Bleepingcomputer

31.10.19

Blogger and WordPress Sites Hacked to Show Sextortion Scams Social

Bleepingcomputer

31.10.19

Israel is going to extradite to US the Russian hacker Alexei Bourkov BigBrothers

Securityaffairs

31.10.19

Hackers behind Uber and Lynda hacks plead guilty in data breaches Incindent Securityaffairs

31.10.19

eIDAS flaws allowed attackers to impersonate any EU citizen or business BigBrothers Securityaffairs

31.10.19

Israel Approves Extradition to US of Russian 'Hacker' BigBrothers

Securityweek

31.10.19

Corellium Responds to Apple's Copyright Infringement Lawsuit Apple Securityweek

31.10.19

Leading Web Domain Name Registrars Disclose Data Breach Incindent Thehackernews

31.10.19

Two Hackers Who Extorted Money From Uber and LinkedIn Plead Guilty Social Thehackernews

31.10.19

City of Johannesburg, on Second Hit, Refuses to Pay Ransom

Ransomware

Threatpost

31.10.19

WhatsApp Spyware Attack: Uncovering NSO Group Activity

CyberSpy

Threatpost

31.10.19

U.S. Universities Get Failing Grades for DMARC Adoption

BigBrothers  Spam

Threatpost

31.10.19

Android Malware Plaguing 45K Devices Remains a Mystery

Android

Threatpost

31.10.19

Insurance Pays Out a Sliver of Norsk Hydro’s Cyberattack Damages

Attack

Threatpost

31.10.19

Murky Details Surround Bed, Bath and Beyond Breach

Incindent

Threatpost

31.10.19

KTRW: The journey to build a debuggable iPhone

Vulnerebility blog

Project Zero

31.10.19

Network Solutions data breach – hacker accessed data of more 22 Million accounts Incindent

Securityaffairs

31.10.19

Emsisoft released a free decryption tool for Paradise ransomware Ransomware Securityaffairs

31.10.19

It’s official, administrative network at Kudankulam Nuclear Power Plant was infected with DTrack BigBrothers Securityaffairs

31.10.19

Hackers Plead Guilty in Data Breach that Uber Covered Up Incindent

Securityweek

31.10.19

Data Breach Hits 22 Million Web.com, Register.com, Network Solutions Accounts Incindent

Securityweek

31.10.19

Florida Elections Chief: State Systems Prepared for Hackers BigBrothers

Securityweek

31.10.19 21 Million Stolen Fortune 500 Credentials For Sale on Dark Web Incindent

Securityweek

31.10.19

Apple Patches Tens of Vulnerabilities in macOS Catalina, iOS 13 Apple Securityweek
31.10.19 Hackers Target Indian Nuclear Power Plant – Everything We Know So Far BigBrothers  Hacking Thehackernews

31.10.19

Office 365 users targeted with fake voicemail alerts in suspected whaling campaign

Phishing

Net-security

31.10.19

Container usage has grown in complexity, specific security controls are needed

Security

Net-security

31.10.19

Cybercriminals using custom phishing tools to target the world’s largest tech brands

CyberCrime  Phishing

Net-security

31.10.19

Most IT pros still haven’t migrated all their users to Windows 10

OS

Net-security

31.10.19

As the eSports industry grows, it becomes attractive for financially motivated cybercriminals

CyberCrime

Net-security

31.10.19

Whitepaper: Busting the myth that more threat intel feeds lead to better security

Security

Net-security

31.10.19

G Suite admins get context-aware access controls, rule-based automated actions and alerts

Security

Net-security

30.10.19

Paradise Decryptor Anti-ransom Tool Anti-ransom Tool

30.10.19

Xhelper, a new piece of Android malware that is infecting 2K+ devices each month Android

Securityaffairs

30.10.19

WhatsApp sued Israeli surveillance firm NSO Group and its parent Q Cyber Technologies BigBrothers  Social Securityaffairs

30.10.19

Thousands of Xiaomi FURRYTAIL pet feeders exposed to hack Mobil Securityaffairs

30.10.19

Can You Trust Security Vendor Surveys? Security

Securityweek

30.10.19

Nuclear Power Plant in India Hit by North Korean Malware: Report BigBrothers

Securityweek

30.10.19

Threat to US Elections Not Limited to Russia in 2020 BigBrothers

Securityweek

30.10.19

Austrian Post Fined Over Customer Data Misuse BigBrothers

Securityweek

30.10.19

NSO Group: Israeli Firm Accused of Cyberespionage BigBrothers  CyberSpy Securityweek

30.10.19

New Adwind Variant Targets Windows, Chromium Credentials

Virus

Threatpost

30.10.19

Facebook Sues NSO Group Over Alleged WhatsApp Hack

Social

Threatpost

30.10.19

Fancy Bear Targets Sporting, Anti-Doping Orgs As 2020 Olympics Loom

APT

Threatpost

30.10.19

Joker’s Stash Drops Largest-Ever Credit Card Cache on Dark Web

CyberCrime

Threatpost

30.10.19

Australia Proposes Facial Recognition for Adult Sites

BigBrothers

Threatpost

30.10.19

Country of Georgia Suffers Widespread Cyberattack

Attack

Threatpost

30.10.19

ThreatList: Most Retail Hardware Bug Bounty Flaws Are Critical

Vulnerebility

Threatpost

30.10.19

WhatsApp Sues Israeli Firm NSO Over Cyberespionage CyberSpy  Social

Securityweek

30.10.19

Critical Vulnerabilities Found in Rittal Cooling System Vulnerebility

Securityweek

30.10.19

Facebook Sues Israeli NSO Spyware Firm For Hacking WhatsApp Users Social Thehackernews

30.10.19

Mysterious malware that re-installs itself infected over 45,000 Android Phones Android Thehackernews

30.10.19

The Pirate Bay was recently down for over a week due to a DDoS attack Attack Thehackernews

30.10.19

The nastiest ransomware, phishing and botnets of 2019

Analysis

Net-security

30.10.19

Majority of 2019 breaches were the result of unapplied security patches

Incindent

Net-security

30.10.19

Examining security process maturity in 400 organizations

Security

Net-security

30.10.19

Global DX tech investments to total $7.4 trillion over the next four years

IT

Net-security

29.10.19

Users online claim Kudankulam nuclear power plant was hit by a cyber attack

BigBrothers

Securityaffairs

29.10.19

Details for 1.3 million Indian payment cards available on the dark web, its the biggest single card database ever Incindent Securityaffairs

29.10.19

MikroTik Router Vulnerabilities Can Lead to Backdoor Creation Vulnerebility

Securityweek

29.10.19

Slack Offers Bigger Rewards for Serious Vulnerabilities Vulnerebility

Securityweek

29.10.19

Aussie Consumer Watchdog Sues Google Over Location Data Use Privacy

Securityweek

29.10.19

China Slams US for 'Economic Bullying' of Huawei, ZTE BigBrothers

Securityweek

29.10.19

Russian Cyberspies Again Target Sporting, Anti-Doping Organizations BigBrothers  CyberSpy

Securityweek

29.10.19

U.S. Fast-Food Chain Krystal Investigating Payment Card Breach Incindent

Securityweek

29.10.19

Windows 10X Leak Reveals New Launcher, Taskbar, and Lock Screen OS

Bleepingcomputer

29.10.19

Sixth June Fashion Site Hacked to Steal Credit Cards CyberCrime

Bleepingcomputer

29.10.19

U.S. Food Chain Alerts Customers of Payment Card Incident CyberCrime

Bleepingcomputer

29.10.19

Microsoft Removes Windows 10 1903 Update Block After Bluetooth Fix OS

Bleepingcomputer

29.10.19

Pwn2Own Hacking Event Expands to Industrial Control Systems Congress

Bleepingcomputer

29.10.19

US Govt Grants Adobe a License to Continue Venezuela Business BigBrothers

Bleepingcomputer

29.10.19

How to Perform Windows Defender Offline Scan in Windows 10 OS

Bleepingcomputer

29.10.19

Windows 10 Start Menu, Search Issues Continue After KB4522355 Update OS

Bleepingcomputer

29.10.19

TrialWorks Ransomware Attack Disrupts Court Cases and Deadlines Ransomware

Bleepingcomputer

29.10.19

How to Get the Windows 10 November 2019 Update Now OS

Bleepingcomputer

29.10.19

Magecart Gang Targets Skin Care Site Visitors For 5+ Months

CyberCrime

Threatpost

29.10.19

Cybercriminals Impersonate Russian APT ‘Fancy Bear’ to Launch DDoS Attacks

APT

Threatpost

29.10.19

PHP Bug Allows Remote Code-Execution on NGINX Servers

Vulnerebility

Threatpost

29.10.19

Pwn2Own Expands Into Industrial Control Systems Hacking

Congress

Threatpost

29.10.19

UniCredit Suffers Third Breach Despite Investing Billions in Cybersecurity

Incindent

Threatpost

29.10.19

US Federal Communications Commission proposes cutting off funds for Chinese telecom equipment BigBrothers

Securityaffairs

29.10.19

Fancy Bear continues to target sporting and anti-doping organizations APT Securityaffairs

29.10.19

U.S. fast-food restaurant chain Krystal suffered a payment card incident Incindent Securityaffairs

29.10.19

Up to 2,000 Georgia websites have been hit by cyber attacks BigBrothers Securityaffairs

29.10.19

U.S. Proposes Cutting Off Funds for Chinese Telecom Equipment BigBrothers

Securityweek

29.10.19

Fortinet Acquires Endpoint Security Firm enSilo IT

Securityweek

29.10.19

Cloud Networking and Security Firm Aviatrix Raises $40 Million IT

Securityweek

29.10.19

City of Johannesburg Refuses to Pay Ransom to Hackers Ransomware

Securityweek

29.10.19

Russian Hackers Targeting Anti-Doping Agencies Ahead of 2020 Tokyo Olympics CyberCrime Thehackernews

29.10.19

UniCredit Bank Suffers 'Data Incident' Exposing 3 Million Italian Customer Records Incindent Thehackernews

29.10.19

Generating PCAP Files from YAML

Security

SANS

29.10.19

Is the enterprise on the brink of a global web supply chain attack?

Attack

Net-security

29.10.19

Exploring the benefits of cybersecurity certification

Cyber

Net-security

29.10.19

Companies unprepared to deal with mobile attacks, synthetic identity fraud, CCPA compliance

Security

Net-security

29.10.19

Investigations are an unfortunate fact of life for most corporations

Security

Net-security

29.10.19

Most decision makers expect AI and 5G to impact their cybersecurity strategy

Cyber

Net-security

28.10.19

UniCredit says personal data of 3 million customers was compromised

Incindent

Net-security

28.10.19

Steam-powered scammers Spam Securelist

28.10.19

New FuxSocy Ransomware borrows code from defunct Cerber Ransomware

Securityaffairs

28.10.19

UniCredit bank discloses a data breach that impacted 3 million of Italian clients Incindent Securityaffairs

28.10.19

SWEED targets precision engineering companies in Italy BigBrothers Securityaffairs

28.10.19

Raccoon info stealer already infected 100,000+ worldwide Virus Securityaffairs

28.10.19

2,000 Georgia Websites Hit by Cyber Attacks Attack

Securityweek

28.10.19

Millions Download Adware-Carrying Apps From Google Play Android

Securityweek

28.10.19

Data Breach at St. Louis Health Center Impacts up to 152,000 Incindent

Securityweek

28.10.19

New Jersey Man Pleads Guilty to Hacker Attack Involving Hardware Keyloggers Hacking

Securityweek

28.10.19

US Senators Call for Security Probe of TikTok BigBrothers

Securityweek

28.10.19

Adobe Exposed Creative Cloud Customer Information Incindent

Securityweek

28.10.19

PHP RCE flaw actively exploited to pop NGINX servers

Exploit

Net-security

28.10.19

Using scdbg to Find Shellcode

Exploit

SANS

28.10.19

Ransomware hit TrialWorks, law firms and lawyers were not able to access court documents Ransomware

Securityaffairs

28.10.19

Experts found 17 apps in the Apple App Store infected with clicker Trojan Android Securityaffairs

28.10.19

NCSC Report: U.K. neutralized over 600 cyber attacks this year BigBrothers Securityaffairs

28.10.19

Unusual Activity with Double Base64 Encoding

Security

SANS

28.10.19

DevOps firewall: How pre-configuring your cloud deployment can ensure compliance

Security

Net-security

28.10.19

New protocol extends Wi-Fi range, can be used with existing hardware

Security

Net-security

28.10.19

IaaS cloud vulnerabilities expected to increase 50% over 2018 figures

Vulnerebility

Net-security

28.10.19

Integrating security into IoT projects is not easy, but it’s increasingly urgent

IoT

Net-security

28.10.19

Despite enthusiasm for AI adoption, governments are experiencing challenges

Security

Net-security

28.10.19

Whitepaper: Building a Threat Intelligence Programme

Security

Net-security

27.10.19

Ransom News Ransom Ransom

27.10.19

SonicWall: Encrypted Attacks, IoT Malware Surge as Global Malware Volume Dips

Security blog

Sonicwall

27.10.19

MedusaLocker ransomware freezes files around the world

Ransomware blog

Avast blog

27.10.19

Practical Behavioral Profiling of PowerShell Scripts through Static Analysis (Part 3)

Malware blog

Palo Alto Unity42

27.10.19

Practical Behavioral Profiling of PowerShell Scripts through Static Analysis (Part 2)

Malware blog

Palo Alto Unity42

27.10.19

Practical Behavioral Profiling of PowerShell Scripts through Static Analysis (Part 1)

Malware blog

Palo Alto Unity42

27.10.19

A Year of Wins for the Palo Alto Networks LGBTQIA+ Employee Network

Security blog

Palo Alto

27.10.19

Cyber Canon Candidate Book Review: A Data-Driven Computer Security Defense:...

Security blog

Palo Alto

27.10.19

Palo Alto Networks Statement Regarding Tariffs

Security blog

Palo Alto

27.10.19

Introducing Cloud Managed Prisma Access!

Security blog

Palo Alto

27.10.19

New FuxSocy Ransomware Impersonates the Notorious Cerber

Ransomware

Bleepingcomputer

27.10.19

7.5 Million Records of Adobe Creative Cloud User Data Exposed

Incindent

Bleepingcomputer

27.10.19

Office 365 Enables ARC for Enhanced Anti-Spoofing Detection

Security

Bleepingcomputer

27.10.19

P&G Online Beauty Store Hacked to Steal Payment Info

Incindent

Bleepingcomputer

27.10.19

Microsoft Fixes Windows 10 1903 Network Issue, Update Block Stays

OS

Bleepingcomputer

27.10.19

Ransomware Attack Shuts Down City of Johannesburg's Systems

Ransomware

Bleepingcomputer

27.10.19

How To Fix "Aw Snap!" Crash in Google Chrome 78

Security

Bleepingcomputer

27.10.19

GitLab Backtracks on Forced Tracking After Negative Feedback

Security

Bleepingcomputer

27.10.19

CVE-2019-11043 exposes Web servers using nginx and PHP-FPM to hack

Vulnerebility

Securityaffairs

27.10.19

Unsecured ElasticSearch DB exposed data for 7.5M Adobe Creative Cloud Users

Incindent

Securityaffairs

27.10.19

New PHP Flaw Could Let Attackers Hack Sites Running On Nginx Servers

Vulnerebility

Thehackernews

26.10.19

P&G online beauty store First Aid Beauty hit by Magecart attack

CyberCrime

Securityaffairs

26.10.19

Encryption – A Feasible Savior against Prevalent Privacy Issues in Business Communication

Crypto  Privacy

Securityaffairs

26.10.19

HUNTING RACCOON: THE NEW MASKED BANDIT ON THE BLOCK

Malware blog

Cybereason

26.10.19

Using Expert Rules in ENS 10.5.3 to Prevent Malicious Exploits

Malware blog

Mcafee blog

26.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Crescendo

Malware blog

Mcafee blog

26.10.19

Shikata Ga Nai Encoder Still Going Strong

Cyber blog

FireEye

26.10.19

Inside the Hacking Community Market – Reselling RIG EK Services

Exploit blog

Checkpoint

26.10.19

TCP SACK Security Issue in OpenBSD – CVE-2019-8460

OS Blog

Checkpoint

26.10.19

Pony’s C&C servers hidden inside the Bitcoin blockchain

Cryptocurrency blog

Checkpoint

26.10.19

CISO Advisory: Governance & Risk Management

Security blog

Cisco Talos

26.10.19

Cisco Talos helps CISOs get back to basics with advisory series

Security blog

Cisco Talos

26.10.19

Gustuff return, new features for victims

Cyber blog

Cisco Talos

26.10.19

Your smart doorbell may be collecting more data than you think, study finds

Cyber blog

Eset

26.10.19

Facebook lays out plan to protect elections

Social blog

Eset

26.10.19

Tracking down the developer of Android adware affecting millions of users

OS Blog

Eset

26.10.19

Smart cities must be cyber‑smart cities

Cyber blog

Eset

26.10.19

NordVPN reveals breach at datacenter provider

Incident blog

Eset

26.10.19

Winnti Group’s skip‑2.0: A Microsoft SQL Server backdoor

Malware blog

Eset

26.10.19

News Wrap: Hotel Robot Hacks, FTC Stalkerware Crackdown

Security

Threatpost

26.10.19

Is AWS Liable in Capital One Breach?

Incindent

Threatpost

26.10.19

U.N., UNICEF, Red Cross Under Ongoing Mobile Attack

BigBrothers

Threatpost

26.10.19

Ransomware, Mobile Malware Attacks to Surge in 2020

Security

Threatpost

26.10.19

7M Adobe Creative Cloud Users Exposed to Hackers

Incindent

Threatpost

26.10.19

DDoS Attack on Amazon Web Services caused intermittently outage

Attack

Securityaffairs

25.10.19

VMware Patch Alert!

Vulnerebility

SANS

25.10.19

More on DNS Archeology (with PowerShell)

Security

SANS

25.10.19

Tortuga Crisis: Moonwalk, one of the biggest pirate CDNs eliminated dragging other big CDN-providers down Virus Securityaffairs

25.10.19

Palo Alto Networks Blames Tariffs for Firewall Price Hikes Security Securityweek
25.10.19 Major Florida Health System Fined $2M for HIPPA Breach Incindent Securityweek
25.10.19 The Threat to SoHo IoT Devices is Growing Rapidly IoT Securityweek
25.10.19 Raccoon Malware-as-a-Service Gains Momentum Virus Securityweek

25.10.19

Ransomware attack hit the City of Johannesburg municipality

Ransomware

Securityaffairs

25.10.19

Spear-phishing attacks target United Nations and NGOs

Phishing

Securityaffairs
25.10.19

Google addresses High-Severity sandbox escape issues in Chrome

Vulnerebility

Securityaffairs
25.10.19

Experts attribute NukeSped RAT to North Korea-Linked hackers

APT  Virus

Securityaffairs
25.10.19

United Nations Organizations Targeted in Ongoing Phishing Campaign

BigBrothers  Phishing

Securityweek

25.10.19

Verizon, AT&T, Sprint and T-Mobile to replace SMS with RCS Messaging in 2020

Mobil

Thehackernews
25.10.19

Phishers have been targeting UN, UNICEF, Red Cross officials for months – and still do

Phishing

Net-security

25.10.19

Windows 10 1903 KB4522355 Update Released with Start Menu Fixes OS

Bleepingcomputer

25.10.19 Microsoft Phishing Attacks Target United Nations and Charities Phishing

Bleepingcomputer

25.10.19 Cash App Scammers Deal Their Cons on Twitter, Instagram, YouTube Social

Bleepingcomputer

25.10.19 iOS Clicker Trojan Malware Found in 17 Apps in Apple's App Store Apple

Bleepingcomputer

25.10.19

Malicious Android Apps Hide Ads From Google Employees Android

Bleepingcomputer

25.10.19 Hacker Plants Keylogger Devices on Company Systems Faces 12yr in Jail Crime

Bleepingcomputer

25.10.19 FTC Issues Guidance On Protecting Against SIM Swap Attacks Attack  BigBrothers

Bleepingcomputer

25.10.19 Discord Turned Into an Info-Stealing Backdoor by New Malware Virus

Bleepingcomputer

25.10.19 FBI Updates Initiative to Protect U.S. Elections from Cyberattacks BigBrothers

Bleepingcomputer

25.10.19 FBI Warns Govt Agencies, SMBs to Defend Against E-Skimming Threats BigBrothers

Bleepingcomputer

25.10.19

ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones

Mobil

Threatpost
25.10.19

Samsung Rolls Out Fix For Galaxy S10 Fingerprint Sensor Glitch

Mobil

Threatpost
25.10.19

Apple Removes 17 Malicious iOS Apps From App Store

Apple

Threatpost
25.10.19

Religious Website Data Exposed for Months

Incindent

Threatpost

25.10.19

Raccoon Malware Scavenges 100,000+ Devices to Steal Data

Virus

Threatpost
25.10.19

Cash App Twitter Giveaway a Haven for Stealing Money

Social

Threatpost
25.10.19

Researchers Warn of New Cache-Poisoned DoS Attack Method

Attack

Securityweek

25.10.19

Micron Launches Silicon-Based Security-as-a-Service Platform

IT

Securityweek

25.10.19

Google Patches More High-Value Chrome Sandbox Escape Vulnerabilities

Vulnerebility

Securityweek
25.10.19

Security pros like their job, yet many struggle with burnout and work-life balance

Security

Net-security
25.10.19

Could lighting your home open up your personal information to hackers?

Security

Net-security
25.10.19

Blacklisted apps increase 20%, attackers focus on tax-branded key terms

Mobil

Net-security
25.10.19

CIO role remains critical in leading enterprises through crises and transformations

Security

Net-security

24.10.19

Office 365 Adds Malware ZAP Toggle to Security & Compliance Center Security

Bleepingcomputer

24.10.19

New CPDoS Web Cache Poisoning Attacks Impact Sites Using Popular CDNs Attack

Bleepingcomputer

24.10.19

Windows 10 Insider Build 19008 Released With Fixes OS

Bleepingcomputer

24.10.19

Chrome 78 Released With DoH Trial, Tab Hover Cards, and More Security

Bleepingcomputer

24.10.19

U.S. Superior Court Systems Hacked to Spread Phishing Emails Phishing

Bleepingcomputer

24.10.19

MedusaLocker Ransomware Wants Its Share of Your Money Ransomware

Bleepingcomputer

24.10.19

Scammers Behind €10 Million BEC Fraud Arrested in Spain Spam

Bleepingcomputer

24.10.19

Billing Provider Billtrust Suffers Outage After Malware Attack Virus

Bleepingcomputer

24.10.19

Firefox 70 Released with In-Browser Data Breach Notifications Security

Bleepingcomputer

24.10.19

Retina-X Banned by FTC From Selling Their ‘Stalking’ Apps Mobil

Bleepingcomputer

24.10.19

Researchers Analyze North Korea-Linked NukeSped RAT Virus

Securityweek

24.10.19

Click-Fraud Trojan Found in Apple App Store Apple

Securityweek

24.10.19

18 iOS apps with stealthy ad clicking code removed from App Store

Apple

Net-security

24.10.19

Swedish Government grants police the use of spyware against violent crime suspects BigBrothers Securityaffairs

24.10.19

Some ICS Security Incidents Resulted in Injury, Loss of Life: Survey ICS

Securityweek

24.10.19

Data Security Firm Very Good Security (VGS) Raises $35 Million IT

Securityweek

24.10.19

DDoS Attack Hits Amazon Web Services Attack Securityweek

24.10.19

42 Adware Apps with 8 Million Downloads Traced Back to Vietnamese Student Android Thehackernews

24.10.19

Samsung Galaxy S10 Banned by Banks Due to Buggy Fingerprint Reader Mobil

Bleepingcomputer

24.10.19

Malicious Apps on Alexa or Google Home Can Spy or Steal Passwords Android

Bleepingcomputer

24.10.19

Russian Hackers Use Iranian Threat Group's Tools, Servers as Cover CyberCrime

Bleepingcomputer

24.10.19

Hacker Breached Servers Belonging to Multiple VPN Providers Incindent

Bleepingcomputer

24.10.19

Office 365 Now Warns About Suspicious Emails with Unverified Senders Spam

Bleepingcomputer

24.10.19

New Windows 10 Secured-Core PCs Block Firmware-Level Attacks OS

Bleepingcomputer

24.10.19

Chinese Hackers Use New Malware to Backdoor Microsoft SQL Servers BigBrothers  Virus

Bleepingcomputer

24.10.19

Hackers Breach Avast Antivirus Network Through Insecure VPN Profile Incindent

Bleepingcomputer

24.10.19

Tools and Tactics of the Sodinokibi Ransomware Distributors Ransomware

Bleepingcomputer

24.10.19

How to Update Windows 10 Drivers Manually OS

Bleepingcomputer

24.10.19

Firefox, Chrome Bugs Allow Arbitrary Code-Execution

Vulnerebility

Threatpost

24.10.19

No ‘Silver Bullet’ Fix for Alexa, Google Smart Speaker Hacks

Hacking

Threatpost

24.10.19

Fujitsu Wireless Keyboard Plagued By Unpatched Flaws

Vulnerebility

Threatpost

24.10.19

Survey Finds People are Privacy Hypocrites

Privacy

Threatpost

24.10.19

Bedside Hotel Robot Hacked to Stream In-Room Video

Hacking

Threatpost

24.10.19

ThreatList: Google’s Advertising Network Dominates Global Data Collection

IT

Threatpost

24.10.19

15 Years Later, Metasploit Still Manages to be a Menace

Hacking

Threatpost

24.10.19

FTC Cracks Down on Stalkerware With Retina-X App Bans

BigBrothers

Threatpost

24.10.19

Open Redirect Bug in Bridge Theme Plugin Opens Admins to Spearphishing

Phishing

Threatpost

24.10.19

Magecart 5 Linked to Carbanak Gang

CyberCrime

Threatpost

24.10.19

FBI and DHS CISA issue alerts on e-skimming attacks

BigBrothers

Securityaffairs

24.10.19

Phishing attacks are a complex problem that requires layered solutions

Phishing

Net-security

24.10.19

Data collectors

Security

Securelist

24.10.19

Texas man sentenced to 145 months in federal prison for hacking Los Angeles Superior Court

Crime

Securityaffairs

24.10.19

Trend Micro Patches Code Execution Vulnerability in Anti-Threat Toolkit

Vulnerebility

Securityweek

24.10.19

Cyberattack Causes Serious Disruptions at German Automation Firm Pilz

CyberCrime

Securityweek

24.10.19

Multiple D-Link routers vulnerable to remote command execution

Alert

Alert

24.10.19

Your Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?

Security

SANS

24.10.19

VisibleV8: Stealthy open source tool for monitoring JavaScript in the wild

Security

Net-security

24.10.19

Top five tips for building smarter enterprise security

Security

Net-security

24.10.19

Rapid SaaS adoption compounds visibility concerns

Security

Net-security

24.10.19

5G adoption is expected to rapidly gather pace in North America

Mobil

Net-security

23.10.19

Experts found DLL Hijacking issues in Avast, AVG, and Avira solutions

Hacking

Securityaffairs

23.10.19

Robots at HIS Group are vulnerable to hack

Vulnerebility

Securityaffairs

23.10.19

Exploring the CPDoS attack on CDNs: Cache Poisoned Denial of Service

Attack  Exploit

Securityaffairs

23.10.19

Texas Man Gets 145 Months in Prison for Hacking LA Superior Court

Crime

Securityweek

23.10.19

Chrome 78 Released With DoH, 37 Security Patches

Security

Securityweek

23.10.19

Maxthon Browser Vulnerability Can Help Attackers in Post-Exploitation Phase

Exploit  Vulnerebility

Securityweek

23.10.19

Avast, Avira Products Vulnerable to DLL Hijacking Hacking Securityweek

23.10.19

Tech, Security Firms Launch Operational Technology Cyber Security Alliance Security Securityweek

23.10.19

New Cache Poisoning Attack Lets Attackers Target CDN Protected Sites Attack Thehackernews

23.10.19

Experts believe the Magecart Group 5 could be linked to the Carbanak APT APT Securityaffairs

23.10.19

Autoclerk travel reservations platform data leak also impacts US Government and military BigBrothers  Incindent Securityaffairs

23.10.19

pilz-ransomware-attack Ransomware Securityaffairs

23.10.19

Trend Micro Anti-Threat Toolkit could be used to run malware on Win PCs Safety Securityaffairs

23.10.19

New Variant of Gustuff Android Banking Trojan Emerges Virus Securityweek

23.10.19

Microsoft Invests in Securing Device Firmware Security Securityweek

23.10.19

New Winnti Backdoor Targets Microsoft SQL Virus Securityweek

23.10.19

Historical Breadcrumbs Link Magecart 5 to Carbanak Group CyberCrime Securityweek

23.10.19

Microsoft Launches ElectionGuard Bug Bounty Program Security Securityweek

23.10.19

New Azure AD Feature Detects Unauthorized Access Attempts Security Securityweek

23.10.19

Testing TLSv1.3 and supported ciphers

Crypto

SANS

23.10.19

How to remove human error from the cyber risk equation

Security

Net-security

23.10.19

Firefox 70 lets users track online trackers

Security

Net-security

23.10.19

How to reduce the risk posed by vulnerabilities in IoT/ICS networks?

ICS  IoT  Vulnerebility

Net-security

23.10.19

A data breach could be game over for a brand

Incindent

Net-security

23.10.19

Chance that flaws will ever be dealt with diminishes the longer they stick around

Security

Net-security

23.10.19

Analysts explore the top strategic technology trends for 2020

Security

Net-security

22.10.19

Microsoft debuts hardware-rooted security for foiling firmware attacks

Attack

Net-security

22.10.19

NordVPN, TorGuard, and VikingVPN VPN providers disclose security breaches Incindent

Securityaffairs

22.10.19

Outdated OSs Still Present in Many Industrial Organizations: Report ICS Securityweek

22.10.19

Stealthy Microsoft SQL Server Backdoor Malware Spotted in the Wild Virus Thehackernews

22.10.19

NordVPN Breach FAQ – What Happened and What's At Stake? Incindent Thehackernews

22.10.19

Turla Compromises, Infiltrates Iranian APT Infrastructure APT Threatpost

22.10.19

New Way Found to Use Alexa, Google to ‘Voice Phish’ and Eavesdrop on Users Phishing Threatpost

22.10.19

Avast Network Breached As Hackers Target CCleaner Again Incindent Threatpost

22.10.19

Gustuff Android Banker Switches Up Technical Approach Android Threatpost

22.10.19

U.S. Government, Military Personnel Data Leaked By Autoclerk BigBrothers Threatpost

22.10.19

Czech Police and Intelligence agency dismantled Russian Spy ring on its soil BigBrothers

Securityaffairs

22.10.19

Winnti APT group uses skip-2.0 malware to control Microsoft SQL Servers APT

Securityaffairs

22.10.19

Facebook Steps Up Security Amid Fresh Signs of Russia Meddling Social Securityweek

22.10.19

TorGuard, NordVPN Respond to Breach Reports Incindent Securityweek

22.10.19

Google Boosts Site Isolation in Chrome Security Securityweek

22.10.19

New Cybersecurity Bills Promote CISOs and Privacy Cyber Securityweek
22.10.19 Trend Micro Acquires Cloud Security Firm Cloud Conformity IT Securityweek

22.10.19

What's up with TCP 853 (DNS over TLS)?

Security

SANS

22.10.19

Why organizations must arm their SOCs for the future

Security

Net-security

22.10.19

Perceptions on the impact of data breaches and identity protection

Incindent

Net-security

22.10.19

How the under 30s expect new approaches to cybersecurity

Cyber

Net-security

22.10.19

How much organizations are investing in analytics and why

Security

Net-security

22.10.19

Targeted online messaging dissuading young gamers from getting involved in cybercrime

Security

Net-security
22.10.19

Whitepaper: Make smarter decisions by using orchestration with intelligence

Security

Net-security

21.10.19

Avast breached by hackers who wanted to compromise CCleaner again

Incindent

Net-security

21.10.19

Avast internal network breached for the second time by sophisticated hackers Incindent

Securityaffairs

21.10.19

UK/US investigation revealed that Russian Turla APT masqueraded as Iranian hackers APT  BigBrothers

Securityaffairs

21.10.19

Georgia County's Experience Shows Perils of Ransomware Ransomware Securityweek

21.10.19

Czech Police, Intelligence Bust Russian Spy Network Incindent Securityweek

21.10.19

Avast Discloses New Supply-Chain Attack Attempt Incindent Securityweek

21.10.19

US, UK: Russian Hackers Hijacked Iranian Malware, Infrastructure BigBrothers Securityweek

21.10.19

Public, Election Officials May Be Kept in the Dark on Hacks Cyber Securityweek

21.10.19

Hackers stole card details from BriansClub carding site Hacking

Securityaffairs

21.10.19

TA505 cybercrime group use SDBbot RAT in recent campaigns CyberCrime

Securityaffairs

21.10.19

US Army stopped using floppy disks as storage for SACCS system that manages nuclear weapons arsenal BigBrothers

Securityaffairs

21.10.19

Scanning Activity for NVMS-9000 Digital Video Recorder

Hacking

SANS

21.10.19

How cybersecurity accelerates business growth

Cyber

Net-security

21.10.19

Deepfakes and voice as the next data breach

Incindent

Net-security

21.10.19

AI and ML will become important for how organizations run their digital systems

Security

Net-security

21.10.19

Spending on security hardware, software, and services continues to increase

Security

Net-security

21.10.19

Webinar: Application Protection and Performance Monitoring Using Datadog + Signal Sciences

Security

Net-security

20.10.19

Hackers Backdoor Sites by Hiding Fake WordPress Plugins

Hacking

Bleepingcomputer

20.10.19

Maze Ransomware Now Delivered by Spelevo Exploit Kit

Ransomware

Bleepingcomputer

20.10.19

Microsoft 365 Authentication Outage, Users Unable to Login

Security

Bleepingcomputer

20.10.19

STOP Ransomware Decryptor Released for 148 Variants

Ransomware

Bleepingcomputer

20.10.19

REvil Ransomware Affiliates Partner with Corporate Intruders

Ransomware

Bleepingcomputer

20.10.19

Graboid: First-Ever Cryptojacking Worm Found in Images on Docker Hub

Cryptocurrency blog

Palo Alto Unity42

20.10.19

Blackremote: Money Money Money – A Swedish Actor Peddles an Expensive New RAT

Malware blog

Palo Alto Unity42

20.10.19

More xHunt – New PowerShell Backdoor Blocked Through DNS Tunnel Detection

Malware blog

Palo Alto Unity42

20.10.19

Exploits in the Wild for vBulletin Pre-Auth RCE Vulnerability CVE-2019-16759

Exploit blog

Palo Alto Unity42

20.10.19

PKPLUG: Chinese Cyber Espionage Group Attacking Asia

BigBrother blog

Palo Alto Unity42

20.10.19

Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)

Vulnerebility blog

Palo Alto Unity42

20.10.19

The Legend of Adwind: A Commodity RAT Saga in Eight Parts

Malware blog

Palo Alto Unity42

20.10.19

CCPA: What You Need to Know for Public Cloud

Security blog

Palo Alto

20.10.19

Analysis of Two Newly Patched Kubernetes Vulnerabilities

Vulnerebility blog

Palo Alto

20.10.19

Zingbox IoT Guardian: The Only IoT Cyber Insurance Winner Recognized in the...

IoT blog

Palo Alto

20.10.19

How to Protect Organizations, Customers and National Security: Federal Igni...

Security blog

Palo Alto

20.10.19

Cyber Canon Book Review: Avogadro Corp: The Singularity Is Closer than It A...

Security blog

Palo Alto

20.10.19

Introducing Demisto v5.0: SOAR Just Got Better

Security blog

Palo Alto

20.10.19

The Top 5 Mobile Security Threats and How to Mitigate Them

Hardware blog

Palo Alto

20.10.19

SSL/TLS Decryption Can Help with GDPR Compliance

Security blog

Palo Alto

20.10.19

Upgrade Notice for Customers Using PAN-OS 9.0 and VM-Series on Azure

Safety blog

Palo Alto

20.10.19

Fake iPhone jailbreaking scam sends users to click-fraud site

OS Blog

Avast blog

20.10.19

Iranian hackers host malicious ‘Hire Military Heroes’ site

BigBrother blog

Avast blog

20.10.19

Russian hacker pleads guilty in ‘massive’ stock market cyberattack

Cyber blog

Avast blog

20.10.19

Some medical devices could be hacked, FDA warns

Hacking blog

Avast blog

20.10.19

German ransomware victim hacks back

Ransomware blog

Avast blog

20.10.19

The good, the bad, and the ugly of Cybersecurity Awareness Month

Security blog

Avast blog

20.10.19

How to Protect Multi-Cloud Environments with a Virtual Firewall

Security blog

Sonicwall

20.10.19

What Assumptions Are You Making?

Cyber

SANS

20.10.19

Fake updraftplus wordpress plugins

Vulnerebility

Securityaffairs

20.10.19

A critical Linux Wi-Fi bug could be exploited to fully compromise systems

Vulnerebility

Securityaffairs

20.10.19

Hundreds of millions of UC Browser Android Users Exposed to MiTM Attacks. Again.

Android

Securityaffairs

20.10.19

Emsisoft released a free decryption tool for the STOP (Djvu) ransomware

Ransomware

Securityaffairs

19.10.19

STOP Djvu Decryptor

Anti-Ransom Tool

Anti-Ransom Tool

19.10.19

Windows 10 KB4520062 Update May Break Microsoft Defender ATP

OS

Bleepingcomputer

19.10.19

Malicious Tor Browser Steals Cryptocurrency from Darknet Market Users

Cryptocurrency

Bleepingcomputer

19.10.19

Fake WordPress Plugin Comes with Cryptocurrency Mining Function

Cryptocurrency

Bleepingcomputer

19.10.19

500+ Million UC Browser Android Users Exposed to MiTM Attacks. Again.

Android

Bleepingcomputer

19.10.19

Microsoft Adds Azure AD Sign-In History to Detect Unusual Activity

Security

Bleepingcomputer

19.10.19

Samsung to Patch Fingerprint Scanner Against Silicone Case Unlock Bug

Mobil

Bleepingcomputer

19.10.19

Google Chrome 77 Added New Site Isolation Security Features

Safety

Bleepingcomputer

19.10.19

European Airport Systems Infected With Monero-Mining Malware

Cryptocurrency

Bleepingcomputer

19.10.19

Cozy Bear Russian Hackers Spotted After Staying Undetected for Years

APT

Bleepingcomputer

19.10.19

Stripe Users Targeted in Phishing Attack That Steals Banking Info

Phishing

Bleepingcomputer

19.10.19

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Follow The Money Ransomware blog Mcafee blog

19.10.19

Definitive Dossier of Devilish Debug Details – Part Deux: A Didactic Deep Dive into Data Driven Deductions Security blog

FireEye

19.10.19

LOWKEY: Hunting for the Missing Volume Serial ID Security blog

FireEye

19.10.19

In the Footsteps of a Sextortion Campaign Cyber blog Checkpoint

19.10.19

Pony’s C&C servers hidden inside the Bitcoin blockchain Cryptocurrency blog Checkpoint

19.10.19

Vulnerability Spotlight: Multiple vulnerabilities in YouPHPTube Vulnerebility blog

Cisco Talos

19.10.19

Vulnerability Spotlight: Another fix for Adobe Acrobat Reader DC text field value remote code execution Vulnerebility blog

Cisco Talos

19.10.19

Checkrain fake iOS jailbreak leads to click fraud OS Blog

Cisco Talos

19.10.19 Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser Malware blog

Eset

19.10.19

What was wrong with Alexa? How Amazon Echo and Kindle got KRACKed Hacking blog

Eset

19.10.19

Operation Ghost: The Dukes aren’t back – they never left Hacking blog

Eset

19.10.19

Streaming devices track viewing habits, study finds Security blog Eset
19.10.19 Connecting the dots: Exposing the arsenal and methods of the Winnti Group

Hacking blog

Eset

19.10.19

Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise

Vulnerebility

Threatpost

19.10.19

Zappos Offers Users 10% Discount in 2012 Breach Settlement

Incindent

Threatpost

19.10.19

Major Airport Malware Attack Shines a Light on OT Security

Virus

Threatpost

19.10.19

Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent

Attack

Threatpost

19.10.19

Microsoft Tackles Election Security with Bug Bounties

Vulnerebility

Threatpost

19.10.19

Execs Could Face Jail Time For Privacy Violations

Privacy

Threatpost

19.10.19

Systems at Ingredients provider Ingredion infected with a Malware

Virus

Securityaffairs

19.10.19

Trojanized Tor Browser targets shoppers of Darknet black marketplaces

Virus

Securityaffairs
19.10.19

Microsoft to Reward Hackers for Finding Bugs in Open Source Election Software

Vulnerebility

Thehackernews

18.10.19

China-linked cyberspies Turbine PANDA targeted aerospace firms for years BigBrothers Securityaffairs

18.10.19

Pitney Bowes revealed that its systems were infected with Ryuk Ransomware Ransomware Securityaffairs
18.10.19 Ingredients Giant Ingredion Hit by Malware Virus Securityweek
18.10.19 Hackers Could Have Hijacked Trump Campaign Email Server BigBrothers Securityweek
18.10.19 Threat Intelligence Firm Flashpoint Raises $34 Million IT Securityweek

18.10.19

Cryptojacking worm compromised over 2,000 Docker hosts

Cryptocurrency

Net-security

18.10.19

Millions of Amazon Echo and Kindle Devices Affected by WiFi Bug Vulnerebility

Bleepingcomputer

18.10.19 Firefox 70 Address Bar Gets New Security Indicators, Shames Insecure Sites Security

Bleepingcomputer

18.10.19 Windows 10 1909 Is Almost Ready, What Developers Need to Know OS

Bleepingcomputer

18.10.19 Google News Is Experiencing Indexing Issues With New Content Security

Bleepingcomputer

18.10.19

Attackers Hide Backdoors and Cryptominers in WAV Audio Files Cryptocurrency

Bleepingcomputer

18.10.19 Security Health Analytics Helps Secure Google Cloud, Hits Beta Security

Bleepingcomputer

18.10.19 Unsecured Docker Hosts Attacked by New Graboid Cryptojacking Worm Cryptocurrency

Bleepingcomputer

18.10.19 Malware Uses Your PC to Send 30K Sextortion Emails Per Hour Spam  Virus

Bleepingcomputer

18.10.19 New SDBot Remote Access Trojan Used in TA505 Malspam Campaigns Spam  Virus

Bleepingcomputer

18.10.19 Domain Typosquatters Target the 2020 Presidential Election BigBrothers

Bleepingcomputer

18.10.19

Researcher released PoC exploit code for CVE-2019-2215 Android zero-day flaw Android Securityaffairs
18.10.19 Chinese Hackers Targeted International Aerospace Firms for Years BigBrothers Securityweek
18.10.19 Massachusetts Governor Announces New Cybersecurity Program BigBrothers Securityweek
18.10.19 Researcher Publishes PoC Exploit for Recent Android Zero-Day Android  Exploit Securityweek

18.10.19

Quick Malicious VBS Analysis

Virus

SANS

18.10.19

Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS

Attack  Vulnerebility

Threatpost
18.10.19

Trump Campaign Website Left Open to Email Server Hijack

BigBrothers  Hacking

Threatpost
18.10.19

Cisco Aironet Access Points Plagued By Critical, High-Severity Flaws

Vulnerebility

Threatpost
18.10.19

Phorpiex Botnet Shifts Gears From Ransomware to Sextortion

BotNet

Threatpost
18.10.19

Hacking Back? BriansClub Dark Web Attack a Boon for Banks

Hacking

Threatpost
18.10.19 Microsoft Ending Support for Windows 7 and Windows Server 2008 R2 CERT CERT
18.10.19 Cryptocurrency miners infected more than 50% of the European airport workstations Cryptocurrency Securityaffairs
18.10.19 Critical and high-severity flaws addressed in Cisco Aironet APs Vulnerebility Securityaffairs
18.10.19 Under New Ownership, DigiCert Expands into Verified Mark Certificates Security Securityweek
18.10.19 Pitney Bowes Says Disruptions Caused by Ryuk Ransomware Ransomware Securityweek
18.10.19 Indiana Hospital System Notifying Patients After Data Breach Incindent Securityweek
18.10.19 Russia's Security Service Says Rebuilding Ties With U.S. BigBrothers Securityweek
18.10.19 Chrome for Android Enables Site Isolation Security Feature for All Sites with Login BigBrothers Thehackernews
18.10.19

Six steps for implementing zero trust access

Security

Net-security
18.10.19

Security still top priority as more enterprises scale IoT solutions company-wide

IoT

Net-security
18.10.19

As car manufacturers focus on connectivity, hackers begin to exploit flaws

Exploit  Vulnerebility

Net-security
18.10.19

Review: The Great Hack

Security

Net-security
18.10.19

Companies are shifting spending to support their critical IT initiatives

Security Net-security
17.10.19 Facebook Encourages Bug Hunting in Third-Party Services Social

Bleepingcomputer

17.10.19 OnionShare Lets Anyone Host Anonymous Sites on the Dark Web Cyber

Bleepingcomputer

17.10.19 Symantec Fixes Bad IPS Definitions That Cause a Windows BSOD Vulnerebility

Bleepingcomputer

17.10.19 Windows 10 1809 Update KB4520062 Fixes a Startup Black Screen Issue OS

Bleepingcomputer

17.10.19 cammers Use Fake Checkra1n iOS Jailbreak in Click Fraud Campaign Apple

Bleepingcomputer

17.10.19

Adobe Fixes 45 Critical Vulnerabilities in Acrobat and Reader Vulnerebility

Bleepingcomputer

17.10.19 What Your Personal Information is Worth to Cybercriminals CyberCrime

Bleepingcomputer

17.10.19 Chinese Hackers Use New Cryptojacking Tactics to Evade Detection Cryptocurrency

Bleepingcomputer

17.10.19 Samsung Galaxy S10 Fingerprint Reader Defeated by Silicone Case Mobil  Privacy

Bleepingcomputer

17.10.19 Linux SUDO Bug Lets You Run Commands as Root, Most Installs Unaffected Hacking

Bleepingcomputer

17.10.19 Researcher releases PoC rooting app that exploits recent Android zero-da Android Net-security
17.10.19 International operation dismantled largest Dark Web Child abuse site Cyber Securityaffairs
17.10.19 Instagram Unveils New Security Controls for Third-Party Apps Social Securityweek
17.10.19 Dridex Operators Use SDBbot RAT in Recent Attacks Virus Securityweek
17.10.19 Baltimore to Buy $20M in Cyber Insurance Months After Attack Attack Securityweek

17.10.19

Russian Hackers Silently Hit Government Targets for Years BigBrothers Securityweek
17.10.19

Phishing e-mail spoofing SPF-enabled domain

Phishing

SANS
17.10.19

Cisco fixes serious flaws in enterprise-grade Catalyst and Aironet access points

Vulnerebility

Net-security
17.10.19 Graboid the first-ever Cryptojacking worm that targets Docker Hub Cryptocurrency Securityaffairs
17.10.19 M6 Group, largest France private multimedia group, hit by ransomware attack CyberCrime Ransomware Securityaffairs

17.10.19

Critical Flaw Allows Unauthorized Access to Cisco Aironet APs Vulnerebility Securityweek

17.10.19

Feds Shut Down Largest Dark Web Child Abuse Site; South Korean Admin Arrested BigBrothers Thehackernews
17.10.19

When MacOS Catalina Comes to Life: The First Few Minutes of Network Traffic From MacOS 10.15.

Apple

SANS

17.10.19 Multiple vulnerabilities in Pulse Secure VPN Alert Alert

17.10.19

.WAVs Hide Malware in Their Depths in Innovative Campaign

Virus

Threatpost

17.10.19

Podcast: Departing Employees Could Mean Departing Data

Security

Threatpost

17.10.19

Cybercrime Tool Prices Bump Up in Dark Web Markets

CyberCrime

Threatpost

17.10.19

10 Steps for Ransomware Protection

Ransomware

Threatpost

17.10.19

Silent Librarian Retools Phishing Emails to Hook Student Credentials

Phishing

Threatpost

17.10.19

Docker Containers Riddled with Graboid Crypto-Worm

Cryptocurrency

Threatpost

17.10.19

Huawei Lashes Out at Estonia for 'Unfounded' Security Claims

BigBrothers

Securityweek

17.10.19

German 5G Rules Avoid Huawei Ban; US Warns on Intel Sharing

BigBrothers

Securityweek

17.10.19

'Graboid' Crypto-Jacking Worm Targets Docker Hosts

Cryptocurrency

Securityweek

17.10.19

Oracle's October 2019 Critical Patch Update Includes 219 Fixes

Vulnerebility

Securityweek

17.10.19

Huawei Says Nine-Month Revenue Up Despite US Pressure

BigBrothers

Securityweek

17.10.19

Key challenges impacting IT audit pros navigating an evolving risk landscape

Security

Net-security

17.10.19

MSPs face increased risks and opportunities to rethink cybersecurity

Cyber

Net-security

17.10.19

1 in 5 SMBs have fallen victim to a ransomware attack

Ransomware

Net-security

17.10.19

Executives are not actively engaged in ensuring the effectiveness of cybersecurity strategy

Security

Net-security

17.10.19

Do digital architects have the tools to make the most of transformative technologies?

Security

Net-security

17.10.19

WAV files spotted delivering malicious code

Virus

Net-security

16.10.19

Signature update for Symantec Endpoint protection crashed many device Vulnerebility Securityaffairs

16.10.19

Approaching the Reverse Engineering of a RFID/NFC Vending Machine Security Securityaffairs

16.10.19

WordPress 5.2.4 Patches Six Vulnerabilities Vulnerebility Securityweek

16.10.19

Facebook Expands, Enhances Bug Bounty Programs Social Securityweek

16.10.19

Symantec Endpoint Protection Update Causes Many Devices to Crash Safety Securityweek

16.10.19

Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers BotNet Thehackernews

16.10.19

Security Monitoring: At Network or Host Level?

Security

SANS

16.10.19

Adobe splats bucketful of bugs in Acrobat and Reader

Vulnerebility

Net-security

16.10.19

APT trends report Q3 2019 APT Securelist

16.10.19

Hundreds of Fake Election Domains Target Democrats, Republicans BigBrothers Securityweek

16.10.19

Apple: Safari Does Not Send User Browsing History to China's Tencent Apple Securityweek

16.10.19

Facebook Now Pays Hackers for Reporting Security Bugs in 3rd-Party Apps Social Thehackernews

16.10.19

Fake iOS Jailbreak Site Lures in Apple Users

Apple

Threatpost

16.10.19

A Deepfake Deep Dive into the Murky World of Digital Imitation

Security

Threatpost

16.10.19

Sudo Bug Opens Root Access on Linux Systems

Vulnerebility

Threatpost

16.10.19

Pitney Bowes Hit with Ransomware Attack

Ransomware

Threatpost

16.10.19

Unencrypted Mobile Traffic on Tor Network Leaks PII

Crypto  Safety

Threatpost

16.10.19

On-Board ‘Mystery Boxes’ Threaten Global Shipping Vessels

Security

Threatpost

16.10.19

Chinese-speaking cybercrime gang Rocke changes tactics

BigBrothers  CyberSpy

Securityaffairs

16.10.19

Adobe out-of-band security updates address 82 flaws in 3 products

Vulnerebility

Securityaffairs

16.10.19

Click2Mail suffered a data breach that potentially impacts 200,000 registrants

Incindent

Securityaffairs

16.10.19

YARA's XOR Modifier

Security

SANS

16.10.19

Code dependency mapping’s role in securing enterprise software

Security

Net-security

16.10.19

Microsegmentation for refining safety systems

Safety

Net-security

16.10.19

Fake mobile app fraud tripled in first half of 2019

Mobil

Net-security

16.10.19

When properly managed, shadow IT can benefit your organization

Security

Net-security

16.10.19

How seriously are businesses taking their PKI security?

Security

Net-security

16.10.19

Consumer spending on technology forecast to reach $1.69 trillion in 2019

IT

Net-security

16.10.19

Download: IR Reporting for Management PPT template

Security

Net-security

16.10.19

Tamper Protection prevents malware from disabling Microsoft Defender AV

Safety  Virus

Net-security

16.10.19

“Smart city” governments should also be smart about security

BigBrothers

Net-security

15.10.19

Global Shipping and mailing services firm Pitney Bowes hit by ransomware attack

Ransomware

Securityaffairs

15.10.19

Adobe Patches Over 80 Vulnerabilities in Three Products

Vulnerebility

Securityweek

15.10.19

Fake 'checkra1n' iOS Jailbreak Offered in Click Fraud Scheme

Apple

Securityweek

15.10.19

Researchers Find New Backdoor Used by Winnti Hackers

Virus

Securityweek

15.10.19

Shadow IT Has Benefits Not Yet Fully Utilized by Business

Security

Securityweek

15.10.19

Microsoft Makes Tamper Protection in Defender ATP Generally Available

Security

Securityweek

15.10.19

Google's USB-C Titan Security Key Arrives in the U.S.

Security

Securityweek

15.10.19

Adobe Releases Out-of-Band Security Patches for 82 Flaws in Various Products

Vulnerebility

Thehackernews

15.10.19

Mozilla Rolls Out Code Injection Attack Protection in Firefox Hacking

Bleepingcomputer

15.10.19

Global Shipping Firm Pitney Bowes Affected by Ransomware Attack Ransomware

Bleepingcomputer

15.10.19

Facebook Users Being Locked Out After Reporting Fake Accounts Social

Bleepingcomputer

15.10.19

Microsoft Office 2010 to Reach End of Support in One Year Security

Bleepingcomputer

15.10.19

Winnti Group Uses New PortReuse Malware Against Asian Manufacturer CyberCrime  Virus

Bleepingcomputer

15.10.19

Microsoft Now Enables Windows 10 Tamper Protection By Default OS

Bleepingcomputer

14.10.19

Iranian Hackers Create Credible Phishing to Steal Library Access BigBrothers  Phishing

Bleepingcomputer

14.10.19

Sodinokibi Ransomware: Following the Affiliate Money Trail Ransomware

Bleepingcomputer

14.10.19

How to Make Windows 10 Pause Updates for a Period of Time OS

Bleepingcomputer

14.10.19

Creating Custom Windows Sandbox Configurations in Windows 10 OS

Bleepingcomputer

14.10.19

Alleged Hacker Arraigned on $1.4 Million Cryptocurrency Fraud Charges Cryptocurrency Securityweek

14.10.19

Majority of Simjacker Attacks Aimed at Mobile Phones in Mexico Attack  Mobil Securityweek

14.10.19

Thoma Bravo to Acquire Sophos for $3.9 Billion IT Securityweek

14.10.19

Analysis reveals the most common causes behind mis-issued SSL/TLS certificates

Crypto

Net-security

14.10.19

A glimpse into the present state of security in robotics

Security

Securelist

14.10.19

Imperva explains how hackers stole AWS API Key and accessed to customer data

Incindent

Securityaffairs

14.10.19

Talos experts found 11 flaws in Schneider Electric Modicon Controllers

ICS

Securityaffairs

14.10.19

Compromised AWS API Key Allowed Access to Imperva Customer Data

Incindent

Securityweek

14.10.19

Apple Under Fire Over Sending Some Users Browsing Data to China's Tencent

Apple

Thehackernews

14.10.19

Charming Kitten Campaign involved new impersonation methods CyberCrime

Securityaffairs

14.10.19

Alabama Hospital chain paid ransom to resume operations after ransomware attack Ransomware

Securityaffairs

14.10.19

A new Mac malware dubbed Tarmac has been distributed via malvertising campaigns Apple Securityaffairs

14.10.19

Amazon Calls for Government Regulation of Facial Recognition Tech Security Securityweek

14.10.19

5 things security executives need to know about insider threat

Security

Net-security

14.10.19

New data analysis approach could strengthen the security of IoT devices

IoT

Net-security

14.10.19

Researchers may have found a way to trace serial IP hijackers

Security

Net-security

14.10.19

70% of presidential campaigns fail to provide adequate online privacy and security protections

Security

Net-security

14.10.19

Consumers concerned about connected home privacy, still few implement safety practices

Privacy

Net-security

14.10.19

Webinar: Securing Web Layer Assets with Cloud WAF

Security

Net-security

13.10.19

Nitro PDF Pro to Get Micropatches for 7 Potential RCE Bugs

Vulnerebility

Bleepingcomputer

13.10.19

Attackers Create Elaborate Crypto Trading Scheme to Install Malware

Cryptocurrency

Bleepingcomputer

13.10.19

Windows 10 1903: Known Problems in the KB4517389 Update

OS

Bleepingcomputer

13.10.19

FIN7 Hackers Load New RAT Malware Into ATM Maker's Software

CyberCrime  Virus

Bleepingcomputer

13.10.19

Nemty 1.6 Ransomware Released and Pushed via RIG Exploit Kit

Ransomware

Bleepingcomputer

13.10.19

Windows 10 1909 is Getting "Ready for Release", Named November 2019 Update

OS

Bleepingcomputer

13.10.19

Ransom News Ransom Ransom

13.10.19

Leafly Cannabis information platform suffered a data leak Incindent

Securityaffairs

13.10.19

FIN7 Hackers group is back with a new loader and a new RAT CyberCrime  Virus

Securityaffairs

13.10.19

SIM cards used in 29 countries are vulnerable to Simjacker attack Attack  Mobil Securityaffairs

13.10.19

SIM Cards in 29 Countries Vulnerable to Remote Simjacker Attacks Attack  Mobil Thehackernews

13.10.19

YARA v3.11.0 released

Security

SANS

12.10.19

Attackers Use New, Sophisticated Ways to Install Cryptominers

Cryptocurrency blog

F5 Labs

12.10.19

Staying Hidden on the Endpoint: Evading Detection with Shellcode

Malware blog

FireEye

12.10.19

IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software

Security blog

FireEye

12.10.19

Living off the Orchard: Leveraging Apple Remote Desktop for Good and Evil

OS Blog

FireEye

12.10.19

Mahalo FIN7: Responding to the Criminal Operators’ New Tools and Techniques

Hacking blog

FireEye

12.10.19

7th October – Threat Intelligence Bulletin

Cyber blog

Checkpoint

12.10.19

The story of Adobe Reader symbols

Vulnerebility blog

Project Zero

12.10.19

New IDA Pro plugin provides TileGX support

Security blog

Cisco Talos

12.10.19

Talos takes home top research honors at Virus Bulletin conference

Security blog

Cisco Talos

12.10.19

Vulnerability Spotlight: Multiple remote code execution bugs in NitroPDF

Vulnerebility blog

Cisco Talos

12.10.19