Calendar - Home  2019  2018 

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus


2019

Date

Name

Category

Web

28.3.19

Two white hats hack a Tesla, get to keep it

Vulnerebility blog

Eset

28.3.19

Global police arrest dozens of people in dark web sting

Cyber blog

Eset

28.3.19

Cisco Talos adds new Content Category

Security blog

Cisco Talos

28.3.19

Vulnerability Spotlight: Multiple vulnerabilities in GOG Galaxy Games

Vulnerebility blog

Cisco Talos

28.3.19

Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.

APT blog

Symantec

28.3.19

ASUS Software Updates Used for Supply Chain Attacks

Attack blog

Symantec

28.3.19

Karta – Matching Open Sources in Binaries

BigBrother blog

Checkpoint

28.3.19

WinRAR Zero-day Abused in Multiple Campaigns

Vulnerebility blog

FireEye

28.3.19

SilkETW: Because Free Telemetry is … Free!

Security blog

FireEye

28.3.19

Cisco Releases Flood of Patches for IOS XE, But Leaves Some Routers Open to Attack

Vulnerebility

Threatpost

28.3.19

Grindr Poses National Security Risk, U.S. Gov Says

BigBrothers

Threatpost

28.3.19

Threat Landscape for Industrial Automation Systems in H2 2018

ICS

Securelist

28.3.19

ASUS fixes supply chain of Live Update tool hit in Operation ShadowHammer

CyberCrime

Securityaffairs

28.3.19

Microsoft Takes Control of 99 Domains Used by Iranian Cyberspies

CyberSpy

Securityweek

28.3.19

NVIDIA Patches Serious Flaw in GeForce Experience Software

Vulnerebility

Securityweek

28.3.19

New Settings Let Hackers Easily Pentest Facebook, Instagram Mobile Apps

Social

Thehackernews

28.3.19

When it comes to file sharing, the cloud has very few downsides

Security

Net-security

28.3.19

Security remains a top concern for IoT executives, but small fixes can shore up ecosystem resilience

IoT

Net-security

28.3.19

Algorithms can now find bugs in computer chips before they are made

Security

Net-security

28.3.19

Third-party cyber risk management is a burden on human and financial resources

Security

Net-security

28.3.19

SMBs willing to invest more to protect their businesses

Security

Net-security

28.3.19

Running your Own Passive DNS Service

Security

SANS

27.3.19

Operation SaboTor – Police arrested 61 vendors and buyers in the dark web

CyberCrime

Securityaffairs

27.3.19

LUCKY ELEPHANT campaign targets South Asian governments

BigBrothers

Securityaffairs

27.3.19

Norsk Hydro estimates losses between $35M – $41M in the first week after cyberattack

Attack

Securityaffairs

27.3.19

A new AZORult C++ variant can establish RDP connections

Virus

Securityaffairs

27.3.19

Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018

ICS

Securityweek

27.3.19

North Korea-Linked Hackers Target macOS Users

Apple

Securityweek

27.3.19

Hackers Are Loving PowerShell, Study Finds

Hacking

Securityweek

27.3.19

Iran-Linked Cyberspy Group APT33 Continues Attacks on Saudi Arabia, U.S.

APT

Securityweek

27.3.19

ASUS Patches Hijacked System Update Utility

Hacking

Securityweek

27.3.19

Ransomware Behind Norsk Hydro Attack Takes On Wiper-Like Capabilities

Ransomware

Threatpost

27.3.19

Cybercriminals Have a Heyday with WinRAR Bug in Fresh Campaigns

CyberCrime

Threatpost

27.3.19

Gamers Beware: Nvidia Fixes High-Severity GeForce Experience Bug

Vulnerebility

Threatpost

27.3.19

The ransomware attack cost Norsk Hydro $40 million so far

Ransomware

Net-security

27.3.19

ASUS confirms server compromise, releases fixed Live Update tool

Vulnerebility

Net-security

27.3.19

U.S. Federal Reserve System Exposed to Increased Risk of Unauthorized Access

BigBrothers

Bleepingcomputer

27.3.19

NVIDIA Patches High Severity GeForce Experience Vulnerability

Vulnerebility

Bleepingcomputer

27.3.19

UC Browser for Android, Desktop Exposes 500+ Million Users to MiTM Attacks

Attack

Bleepingcomputer

27.3.19

ASUS Admits Its Live Update Utility Was Backdoored by APT Group

APT

Bleepingcomputer

27.3.19

Microsoft's Leaked Edge Insider Browser Works on Windows 7

IT

Bleepingcomputer

27.3.19

iOS 12.2 Patches Over 50 Security Vulnerabilities

Apple

Bleepingcomputer

27.3.19

Skype Experiencing Global Instant Messaging Delays

IT

Bleepingcomputer

27.3.19

Firefox to Import Windows Root Certs To Avoid Antivirus SSL Scanning Issues

Safety

Bleepingcomputer

27.3.19

Apple Introduces New Products During 'It's Show Time' Event

Apple

Bleepingcomputer

27.3.19

Emsisoft has Released a Decryptor for the Hacked Ransomware

Ransomware

Bleepingcomputer

27.3.19

ASUS Live Update Infected with Backdoor in Supply Chain Attack

Attack

Bleepingcomputer

27.3.19

Tesla Model 3 Hacked on the Last Day of Pwn2Own

Congress

Bleepingcomputer

27.3.19

The AZORult Legacy Lives On. Hello AZORult++!

Virus

Bleepingcomputer

27.3.19

Telegram Now Lets You Delete a Received Message From Sender's Device

Social

Bleepingcomputer

27.3.19

Microsoft's Leaked Edge Browser Should Make Google Worried

IT

Bleepingcomputer

27.3.19

VirusTotal Goes Retro with New ASCII Site for Older Browsers

Security

Bleepingcomputer

27.3.19

Experts found 36 vulnerabilities in the LTE protocol

Mobil

Securityaffairs

27.3.19

Whitehat settings allow white hat hackers to Test Facebook mobile apps

Social

Securityaffairs

27.3.19

The Ursnif Gangs keep Threatening Italy

Virus

Securityaffairs

27.3.19

EU Presents Plan for Safe 5G Amid Huawei Suspicions

BigBrothers

Securityweek

27.3.19

AZORult Variant Can Establish RDP Connections

Virus

Securityweek

27.3.19

Norsk Hydro May Have Lost $40M in First Week After Cyberattack

Attack

Securityweek

27.3.19

Apple Patches Vulnerabilities in iOS, macOS, Safari

Apple

Securityweek

27.3.19

Cyber Risk Assessment Firm Sayata Labs Emerges From Stealth

Cyber

Securityweek

27.3.19

Facebook Blocks More Accounts Over Influence Campaigns

Social

Securityweek

27.3.19

Build-time security: Block risk and security issues from production rings

Security

Net-security

27.3.19

Weighing the options: The role of cyber insurance in ransomware attacks

Ransomware

Net-security

27.3.19

Encrypted attacks growing steadily, cybercriminals are increasingly targeting non-standard ports

CyberCrime

Net-security

27.3.19

New blockchain system uses reputation to fend off 51 percent attacks

Attack

Net-security

27.3.19

61% of CIOs believe employees leak data maliciously

Security

Net-security

27.3.19

Does siloed data negatively impact your organization?

Security

Net-security

26.3.19

Apple iOS 12.2 Patches 51 Serious Flaws

Apple

Threatpost

26.3.19

ASUS Patches Live Update Bug That Allowed APT to Infect Thousands of PCs

APT

Threatpost

26.3.19

Cryptocurrency businesses still being targeted by Lazarus

Cryptocurrency

Securelist

26.3.19

Some ASUS Updates Drop Backdoors on PCs in ‘Operation ShadowHammer’

Attack

Threatpost

26.3.19

Drones are Quickly Becoming a Cybersecurity Nightmare

Cyber

Threatpost

26.3.19

Malware Payloads Hide in Images: Steganography Gets a Reboot

Virus

Threatpost

26.3.19

FEMA Exposes PII for Millions of Hurricane, Wildfire Survivors

BigBrothers

Threatpost

26.3.19

ThreatList: Remote Workers Threaten 1 in 3 Organizations

Security

Threatpost

26.3.19

Bugs in Grandstream Gear Lay Open SMBs to Range of Attacks

Attack

Threatpost

26.3.19

Operation ShadowHammer

APT

Securelist

26.3.19

What you can expect at the 10th annual HITB Security Conference in The Netherlands

Congress

Net-security

26.3.19

PewCrypt Ranson Tool

Anti-Ramson Tool

Anti-Ramson Tool

26.3.19

iOS 12.2 update addresses some troubling vulnerabilities

Apple

Securityaffairs

26.3.19

How to get back files encrypted by the Hacked Ransomware for free

Ransomware

Securityaffairs

26.3.19

Microsoft experts found high severity flaws in Huawei PCManager

Vulnerebility

Securityaffairs

26.3.19

Operation ShadowHammer – Supply-Chain attack hit ASUS users

Attack

Securityaffairs

26.3.19

Anubis II – malware and afterlife

Virus

Securityaffairs

26.3.19

Free Tools: spotting APTs through Malware streams

APT

Securityaffairs

26.3.19

Hackers raised fake tornado alarms in two Texas towns

Hacking

Securityaffairs

26.3.19

PewDiePie ransomware oblige users subscribe to PewDiePie YouTube channel

Ransomware

Securityaffairs

26.3.19

New Settings Help Hackers Test Facebook Mobile Apps

Social

Securityweek

26.3.19

LockerGoga Ransomware Neutralized by Shortcut Files

Ransomware

Securityweek

26.3.19

Microsoft Finds Privilege Escalation, Code Execution Flaws in Huawei Tool

Vulnerebility

Securityweek

26.3.19

Researchers Uncover Vulnerabilities in LTE Wireless Protocol

Vulnerebility

Securityweek

26.3.19

Supply-Chain Attack Used to Install Backdoors on ASUS Computers

Attack

Securityweek

26.3.19

Major U.S. Chemical Firms Hit by Cyberattack

BigBrothers

Securityweek

26.3.19

DHS Warns of Vulnerabilities in Medtronic Defibrillators

BigBrothers

Securityweek

26.3.19

Industrial Cybersecurity Firm CyberX Raises $18 Million

IT

Securityweek

26.3.19

Second Critical Crypto Flaw Found in Swiss E-Voting System

Vulnerebility

Securityweek

26.3.19

Warning: ASUS Software Update Server Hacked to Distribute Malware

Virus

Thehackernews

26.3.19

Latest iOS 12.2 Update Patches Some Serious Security Vulnerabilities

Apple

Thehackernews

26.3.19

Insecure UC Browser 'Feature' Lets Hackers Hijack Android Phones Remotely

Android

Thehackernews

26.3.19

Apple fixed some interesting bugs in iOS and macOS

Apple

Net-security

26.3.19

How to build an effective vulnerability management program

Safety

Net-security

26.3.19

Cybercriminals are increasingly using encryption to conceal and launch attacks

Cyber

Net-security

26.3.19

Guilty by association: The reality of online retail third-party data leaks

Security

Net-security

26.3.19

Less than 20% of IT pros have complete access to critical data in public clouds

Security

Net-security

26.3.19

Most companies help employees cover costs to obtain professional certifications

Security

Net-security

26.3.19

CFOs and CIOs must collaborate on digital transformation to remain competitive

Cyber

Net-security

26.3.19

Attackers compromised ASUS to deliver backdoored software updates

Hacking

Net-security

26.3.19

Secure workloads without slowing down your DevOps flows

Vulnerebility

Net-security

25.3.19

Ransomware or Wiper? LockerGoga Straddles the Line

Ransomware blog

Cisco Talos

25.3.19

Vulnerability Spotlight: Multiple Vulnerabilities in CUJO Smart Firewall, Das U-Boot, OCTEON SDK, Webroot BrightCloud

Vulnerebility blog

Cisco Talos

25.3.19

IPv6 unmasking via UPnP

Security blog

Cisco Talos

25.3.19

Facebook exposed millions of user passwords to employees

Social blog

Eset

25.3.19

Most second-hand thumb drives contain data from past owners

Security blog

Eset

25.3.19

I Still Didn’t See What You Did

Spam blog

Eset

25.3.19

Google hit with €1.49 billion antitrust fine by EU

Incident blog

Eset

25.3.19

Fake or Fake: Keeping up with OceanLotus decoys

APT blog

Eset

25.3.19

You should pick your Android security app wisely, test shows

OS Blog

Eset

25.3.19

I didn’t see what you did, redux

Spam blog

Eset

25.3.19

Facebook suffer most severe outage ever

Social blog

Eset

25.3.19

Telegram allows users to delete any sent/received message from both sides with no time limit

Securityaffairs

25.3.19

Microsoft Defender APT now protects also macOS

Securityaffairs

25.3.19

Federal Emergency Management Agency’s (FEMA) data leak exposes data of 2.3M survivors

Securityaffairs

25.3.19

WordPress Social Warfare plugin zero-day exploited in attacks

Securityaffairs

25.3.19

Malware Static Analysis

Securityaffairs

25.3.19

Watchdog: FEMA Wrongly Released Personal Data of Victims

Securityweek

25.3.19

Cisco Patches High Severity Vulnerabilities in IP Phones

Securityweek

25.3.19

"VelvetSweatshop" Maldocs: Shellcode Analysis

SANS

25.3.19

Employee cybersecurity essentials part 1: Passwords and phishing

Net-security

25.3.19

What worries you the most when responding to a cybersecurity incident?

Net-security

25.3.19

Consumers willing to dump apps that collect private data, but can’t tell which are doing so

Net-security

25.3.19

2017 Cisco WebEx flaw increasingly leveraged by attackers, phishing campaigns rise

Net-security

25.3.19

The success of the digital workplace depends on the practical implementation of new technology

Net-security

24.3.19

Ransom News

Ransom

24.3.19

Chrome 74 Dark Mode Now Syncs with Windows 10 Color Settings

Bleepingcomputer

24.3.19

FEMA Data Leak Exposes Personal Info of 2.3M Disaster Survivors

Bleepingcomputer

24.3.19

70% of Ransomware Attacks Targeted SMBs, BEC Attacks Increased by 130%

Bleepingcomputer

24.3.19

Microsoft is Adding a Graphing Mode to the Windows 10 Calculator

Bleepingcomputer

24.3.19

Zero-Day WordPress Plugin Vulnerability Used to Add Malicious Redirects

Bleepingcomputer

24.3.19

Mozilla Firefox and Microsoft Edge Hacked on Second Day of Pwn2Own

Bleepingcomputer

24.3.19

2 Million Emails of 350K+ Clients Possibly Exposed in Oregon DHS Data Breach

Bleepingcomputer

24.3.19

Windows 7 Gets an Extra Life With Windows Virtual Desktop

Bleepingcomputer

24.3.19

13-Year-Old Allegedly Hacked Teacher Account to Create Student 'Hit List'

Bleepingcomputer

24.3.19

An Outage is Bad for Facebook, but Great for PornHub

Bleepingcomputer

24.3.19

Safari, Virtualbox, VMware Get Hacked During First Day of Pwn2Own 2019

Bleepingcomputer

24.3.19

Cisco Fixes High-Severity Vulnerabilities in IP Phone 77800, 8800

Bleepingcomputer

24.3.19

Facebook Employees Could Access Unencrypted Passwords for Millions of Users

Bleepingcomputer

24.3.19

Microsoft Defender ATP Brings Enterprise Protection to Macs

Bleepingcomputer

24.3.19

Fake CDC Emails Warning of Flu Pandemic Push Ransomware

Bleepingcomputer

24.3.19

"VelvetSweatshop" Maldocs

SANS

23.3.19

Pwn2Own 2019 Day 3: Experts hacked Tesla 3 browser

Congress

Securityaffairs

23.3.19

Russian APT groups target European governments ahead of May Elections

APT

Securityaffairs

23.3.19

Medtronic’s implantable heart defibrillators vulnerable to hack

Vulnerebility

Securityaffairs

23.3.19

Cisco addresses High-Severity flaws in IP Phone 8800 and 7800 series

Vulnerebility

Securityaffairs

23.3.19

Pwn2Own 2019 Day 2 – Hackers earned $270,000 for Firefox, Edge hacks

Congress

Securityaffairs

23.3.19

FIN7 is back with a previously unseen SQLRat malware

CyberCrime

Securityaffairs

23.3.19

Pwn2Own 2019: Researchers Win Tesla After Hacking Its Browser

Congress

Securityweek

23.3.19

UK Police Federation Hit by Ransomware

Ransomware

Securityweek

23.3.19

Russian Hackers Target European Governments Ahead of Elections: FireEye

BigBrothers

Securityweek

23.3.19

Industry Reactions to Norsk Hydro Breach: Feedback Friday

Incindent

Securityweek

23.3.19

Microsoft Launches Defender ATP Endpoint Security for macOS

Safety

Securityweek

23.3.19

D.C. Attorney General Introduces New Data Security Bill

Security

Securityweek

23.3.19

Critical DoS Bug Bubbles Up in Facebook Fizz TLS 1.3 Project

Vulnerebility

Threatpost

23.3.19

WordPress Plugin Patched After Zero Day Discovered

Vulnerebility

Threatpost

23.3.19

Medtronic Defibrillators Have Critical Flaws, Warns DHS

Vulnerebility

Threatpost

23.3.19

Firefox and Edge Fall to Hackers on Day Two of Pwn2Own

Congress

Threatpost

23.3.19

Spycams Secretly Live-Streamed 1,600 Motel Guests

Privacy

Threatpost

23.3.19

Google Play Touts Certs in Quest For Enterprise Security

Android

Threatpost

23.3.19

Analysis: Drone Tech Creates New Type of Blended Threat

Security

Threatpost

23.3.19

Medtronic's Implantable Defibrillators Vulnerable to Life-Threatening Hacks

Vulnerebility

Thehackernews

23.3.19

Microsoft Announces Windows Defender ATP Antivirus for Mac

Safety

Thehackernews

23.3.19

Introduction to analysing Go binaries

Security

SANS

22.3.19

Facebook Stored Passwords in Plain Text For Years

Social

Threatpost

22.3.19

WordPress Plugin Patched After Zero Day Discovered

Vulnerebility

Threatpost

22.3.19

MyPillow and Amerisleep Targeted in Magecart Group Attacks

Attack

Threatpost

22.3.19

Hackers Take Down Safari, VMware and Oracle at Pwn2Own

Congress

Threatpost

22.3.19

Cisco Patches High-Severity Flaws in IP Phones

Vulnerebility

Threatpost

22.3.19

AZORult++: Rewriting history

Virus

Securelist

22.3.19

Norsk Hydro cyber attack: What’s new?

Attack

Net-security

22.3.19

Hacking microcontroller firmware through a USB

Hacking

Securelist

22.3.19

Facebook passwords stored in plain text, hundreds of millions users affected

Social

Securityaffairs

22.3.19

South Korea – 1,600 guests at 30 motels secretly live streamed

Incindent

Securityaffairs

22.3.19

Researchers Earn $270,000 for Firefox, Edge Hacks at Pwn2Own 2019

Congress

Securityweek

22.3.19

Global Security Spend Set to Grow to $133.8 Billion by 2022: IDC

Security

Securityweek

22.3.19

Facebook Mistakenly Stored Millions of Users' Passwords in Plaintext

Social

Thehackernews

22.3.19

New Wave of Extortion Emails: Central Intelligence Agency Case

BigBrothers

SANS

22.3.19

Worldwide spending on security solutions expected to continue growing

Security

Net-security

22.3.19

The privacy risks of pre-installed software on Android devices

Android

Net-security

22.3.19

Cost of telecommunications fraud estimated at €29 billion a year

CyberCrime

Net-security

22.3.19

Businesses have cybersecurity best practice guidelines but fail in practice

Cyber

Net-security

22.3.19

Quality Assurance and Testing is a bottleneck to implementing DevOps for many organizations

Security

Net-security

22.3.19

Experts to help boards tackle cybersecurity threats

Net-security

21.3.19

Instagram Testing Anti-Squatting Feature that Locks Old Usernames

Social

Bleepingcomputer

21.3.19

Putty 0.71 Fixes Weakness That Allows Fake Login Prompts

Vulnerebility

Bleepingcomputer

21.3.19

Lithuanian Pleads Guilty to Stealing $100 Million From Google, Facebook

BigBrothers

Bleepingcomputer

21.3.19

KB4493132 Update Notifies Windows 7 Users of End of Support Date

Vulnerebility

Bleepingcomputer

21.3.19

Windows 10 Insider Preview Build 18362 (19H1) Fixes Autoupdate of Apps

Vulnerebility

Bleepingcomputer

21.3.19

1,600 Hotel Guests Secretly Live Streamed to 4,000+ Subscribers

Incindent

Bleepingcomputer

21.3.19

Microsoft Releases Windows 10 Build 18860 (20H1) With Swiftkey Enhancements

Vulnerebility

Bleepingcomputer

21.3.19

Google Fined $1.7 Billion for Anti-Competitive Practices in Online Advertising

Security

Bleepingcomputer

21.3.19

Payment Card Thieves Slip into MyPillow and AmeriSleep Bedding Sites

Cyber

Bleepingcomputer

21.3.19

Google Photos Bug Exposed the Location & Time of Your Pictures

Vulnerebility

Bleepingcomputer

21.3.19

Fake eBay Ad in Google Search Led to Tech Support Scams

Spam

Bleepingcomputer

21.3.19

Facebook Stored Passwords of Hundreds of Millions Users in Plain Text

Social

Securityweek

21.3.19

Multiple Vulnerabilities Patched in PuTTY and LibSSH2

Vulnerebility

Securityweek

21.3.19

Facebook Pays Big Bounty for DoS Flaw in Fizz TLS Library

Social

Securityweek

21.3.19

FIN7 Hackers Use New Malware in Recent Attacks

Virus

Securityweek

21.3.19

Finland to Investigate Suspected Nokia Chinese Data Breach

Incindent

Securityweek

21.3.19

Many Vulnerabilities Found in Oracle's Java Card Technology

Vulnerebility

Securityweek

21.3.19

Schneider Electric Working on Patch for Flaw in Triconex TriStation Emulator

ICS

Securityweek

21.3.19

Pwn2Own 2019 Day 1 – participants hacked Apple, Oracle, VMware products

Congress

Securityaffairs

21.3.19

Experts found a critical vulnerability in the NSA Ghidra tool

Vulnerebility

Securityaffairs

21.3.19

Apple, Oracle, VMware Software Hacked at Pwn2Own 2019

Congress

Securityweek

21.3.19

Researchers Use UPnP Protocol to Unmask IPv6 Address

Security

Securityweek

21.3.19

Windows Hello Support Added to Firefox 66

Security

Securityweek

21.3.19

Multiple Vulnerabilities Fixed in CUJO Smart Firewall

Vulnerebility

Securityweek

21.3.19

Authentication Bypass Vulnerability Found in SoftNAS Cloud

Vulnerebility

Securityweek

21.3.19

Vulnerability in NSA's Reverse Engineering Tool Allows Remote Code Execution

Vulnerebility

Securityweek

21.3.19

Man Pleads Guilty Over $100M BEC Scheme Targeting Google, Facebook

Spam

Securityweek

21.3.19

Google Photos Flaw Allowed Hackers to Track Users

Hacking

Securityweek

21.3.19

European Government Websites Are Delivering Tracking Cookies to Visitors

BigBrothers

Securityweek

21.3.19

Norsk Hydro Restoring Systems, But Not Paying Ransom

Ransomware

Securityweek

21.3.19

Webinar Today: Managing Cyber Threats in the Era of Industry 4.0

Cyber

Securityweek

21.3.19

EU Fines Google for Anti-trust Breach

BigBrothers

Securityweek

21.3.19

[SI-LAB] LockerGoga is the most active ransomware that focuses on targeting companies

Ransomware

Securityaffairs

21.3.19

MyPillow and Amerisleep are the latest victims of Magecart gangs

Cyber

Securityaffairs

21.3.19

Putty users have to download a new release that fixes 8 flaws

Vulnerebility

Securityaffairs

21.3.19

SimBad malware infected million Android users through Play Store

Android

Securityaffairs

21.3.19

New MageCart Attacks Target Bedding Retailers My Pillow and Amerisleep

Attack

Thehackernews

21.3.19

Years-Long Phishing Campaign Targets Saudi Gov Agencies

Phishing

Threatpost

21.3.19

Mac-Focused Malvertising Campaign Abuses Google Firebase DBs

Apple

Threatpost

21.3.19

Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats

Mobil

Threatpost

21.3.19

New Wave of Extortion Emails: Central Intelligence Agency Case

Spam

SANS

21.3.19

You may trust your users, but can you trust their files?

Security

Net-security

21.3.19

Breaking the cybersecurity stalemate by investing in people

Cyber

Net-security

21.3.19

Average DDoS attack sizes decrease 85% due to FBI’s shutdown of DDoS-for-hire websites

Attack

Net-security

21.3.19

CEOs more likely to receive pay rise after a cyber attack. Wait, what?

Attack

Net-security

21.3.19

Most IT and security professionals feel vulnerable to insider threats

Vulnerebility

Net-security

21.3.19

Latest tactics used by cybercriminals to bypass traditional email security

Security

Net-security

20.3.19

Fin7 Ramps Up Campaigns With Two Fresh Malware Samples

Virus

Threatpost

20.3.19

Uber Deployed ‘Surfcam Spyware’ in Australia to Crush the Competition – Report

Virus

Threatpost

20.3.19

Attackers are exploiting IMAP to bypass MFA on Office 365, G Suite accounts

Attack

Net-security

20.3.19

Norsk Hydro cyber attack: What happened?

Cyber

Net-security

20.3.19

KDE Connect Kicked From Google Play, Returns Less the App It Was

Android

Bleepingcomputer

20.3.19

Heeere's Clippy! He's Back, but Only for Microsoft Teams.

Security

Bleepingcomputer

20.3.19

Netflix and AMEX Customers Actively Targeted by Phishing Campaigns

Phishing

Bleepingcomputer

20.3.19

DDoS-for-Hire Crackdown Leads to 85% Drop in Attack Sizes

Attack

Bleepingcomputer

20.3.19

Windows 10 Insider Preview Build 18361 (19H1) Still Has Some Bugs to Fix

Vulnerebility

Bleepingcomputer

20.3.19

Microsoft Antimalware Crashing With Error 0x800106ba on Windows 7 & 8

Vulnerebility

Bleepingcomputer

20.3.19

80% of the Top Exploited Vulnerabilities Targeted Microsoft in 2018

Vulnerebility

Bleepingcomputer

20.3.19

Business Email Compromise (BEC) Attacks Moving to Mobile

Spam

Bleepingcomputer

20.3.19

LockerGoga Ransomware Sends Norsk Hydro Into Manual Mode

Ransomware

Bleepingcomputer

20.3.19

Assessing Internal Network with JavaScript, Despite Same-Origin Policy

Virus

Bleepingcomputer

20.3.19

Fraud, Cyber Attacks, and Phishing Follow Christchurch Attack

Attack

Bleepingcomputer

20.3.19

Microsoft Edge Insider Closer to Release With New Installers

Security

Bleepingcomputer

20.3.19

Google+ Gives Final Warning to Backup Data Before It's Deleted

Social

Bleepingcomputer

20.3.19

89% of EU Government Sites Infiltrated by Ad Tracking Scripts

BigBrothers

Bleepingcomputer

20.3.19

New HTTPS Interception Tools Available from Cloudflare

Safety

Bleepingcomputer

20.3.19

JNEC.a Ransomware Spread by WinRAR Ace Exploit

Ransomware

Bleepingcomputer

20.3.19

AMD Believes SPOILER Vulnerability Does Not Impact Its Processors

Vulnerebility

Bleepingcomputer

20.3.19

PuTTY Releases Important Software Update to Patch 8 High-Severity Flaws

Vulnerebility

Thehackernews

20.3.19

Google Will Prompt European Android Users to Select Preferred Default Browser

Android

Thehackernews

20.3.19

Google white hat hacker found new bug class in Windows

Vulnerebility

Securityaffairs

20.3.19

The Document that Microsoft Eluded AppLocker and AMSI

Safety

Securityaffairs

20.3.19

Kaspersky Files Complaint Against Apple Over App Store Policy

Apple

Securityweek

20.3.19

Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack

Attack

Threatpost

20.3.19

Cardinal RAT Resurrected to Target FinTech Firms

Virus

Threatpost

20.3.19

Host of Flaws Found in CUJO Smart Firewall

Vulnerebility

Threatpost

20.3.19

Using AD to find hosts that aren't in AD - fun with the [IPAddress] construct!

Security

SANS

20.3.19

How the Google and Facebook outages could impact application security

Social

Net-security

20.3.19

A network is only as strong as its weakest shard

Security

Net-security

20.3.19

Unsurprisingly, only 14% of companies are compliant with CCPA

Security

Net-security

20.3.19

Nearly half of organizations lack the necessary talent to maintain security measures

Security

Net-security

20.3.19

Fewer than 28% of gov.uk using DMARC effectively in line with guidelines

Spam

Net-security

20.3.19

(ISC)² brings its Secure Summit to The Hague

ICS

Net-security

19.3.19

Experts observed the growth of hi-tech crime landscape in Asia in 2018

Crime

Securityaffairs

19.3.19

Aluminum producer Norsk Hydro hit by a massive cyber attack

Ransomware

Securityaffairs

19.3.19

New JNEC.a Ransomware delivered through WinRAR exploit

Ransomware

Securityaffairs

19.3.19

EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks

BigBrothers

Securityaffairs

19.3.19

Old Tech Spills Digital Dirt on Past Owners

Security

Threatpost

19.3.19

Norsk Hydro Calls Ransomware Attack ‘Severe’

Ransomware

Threatpost

19.3.19

Researcher Says NSA’s Ghidra Tool Can Be Used for RCE

BigBrothers

Threatpost

19.3.19

ThreatList: DDoS Attack Sizes Drop 85 Percent Post FBI Crackdown

BigBrothers

Threatpost

19.3.19

Industrial Cybersecurity Firm Nozomi Launches Research Department

Cyber

Securityweek

19.3.19

Cloudflare Launches New HTTPS Interception Detection Tools

Safety

Securityweek

19.3.19

Mobile App Security Firm Blue Cedar Raises $17 Million

Mobil

Securityweek

19.3.19

Microsoft Dominates 2018's Most Exploited Vulnerabilities

Vulnerebility

Securityweek

19.3.19

Researcher Finds Novel Bug Class in Windows Kernel

Vulnerebility

Securityweek

19.3.19

Aluminum Giant Norsk Hydro Hit by Ransomware

Ransomware

Securityweek

19.3.19

Norway's Norsk Hydro Hit by 'Extensive' Cyberattack

BigBrothers

Securityweek

19.3.19

Android Q — Google Adds New Mobile Security and Privacy Features

Android

Thehackernews

19.3.19

Ransomware Attack Forces Aluminum Manufacturer to Shutdown Systems Worldwide

Ransomware

Thehackernews

19.3.19

Libssh Releases Update to Patch 9 New Security Vulnerabilities

Vulnerebility

Thehackernews

19.3.19

Mirai variant picks up new tricks, expands list of targeted devices

BotNet

Net-security

19.3.19

A new development shows a potential shift to using Mirai to target enterprises

BotNet

Securityaffairs

19.3.19

Slack Launched Encryption Key Addon For Businesses

Security

Securityaffairs

19.3.19

GCHQ implements World War II cipher machines in encryption app CyberChef

BigBrothers

Securityaffairs

19.3.19

Could Beto O’Rourke become the first US President with a past of hacking?

BigBrothers

Securityaffairs

19.3.19

Hackers used Scanbox framework to hack Pakistani Govt’s passport application tracking site

BigBrothers

Securityaffairs

19.3.19

Google Open Sources Sandboxed API

Security

Securityweek

19.3.19

New Mirai Variant Targets Enterprise IoT Devices

BotNet

Securityweek

19.3.19

Slack Introduces Enterprise Key Management Tool

Security

Securityweek

19.3.19

Mirai Variant Adds Dozen New Exploits to Target Enterprise IoT Devices

BotNet

Thehackernews

19.3.19

Wireshark 3.0.0 and Npcap: Some Remarks

Security

SANS

19.3.19

The art of securing ERP applications: Protecting your critical business processes

Security

Net-security

19.3.19

Four key security tips when using any collaboration technology

Security

Net-security

19.3.19

The modern threat landscape and expanding CISO challenges

Security

Net-security

19.3.19

Tax season scaries: How to keep your data safe from insider threats

Security

Net-security

19.3.19

G Suite admins can now disable SMS and voice 2FA

Mobil

Net-security

19.3.19

Cyber preparedness essential to protect EU from large scale cyber attacks

BigBrothers

Net-security

18.3.19

'Shameless' Scammers Seek to Cash in on Christchurch Massacre

Spam

Securityweek

18.3.19

Android Q Brings New Privacy and Security Features

Android

Securityweek

18.3.19

EU Adopts New Response Protocol for Major Cyberattacks

BigBrothers

Securityweek

18.3.19

Chrome, Firefox Get Windows Defender Application Guard Extensions

Safety

Securityweek

18.3.19

Australia's Intelligence Agency Publishes its Vulnerability Disclosure Process

BigBrothers

Securityweek

18.3.19

Beto O'Rourke 'Mortified' Over Articles Written as Teen Member of Cult of the Dead Cow Hacker Group

CyberCrime

Securityweek

18.3.19

Dragos Acquires NexDefense, Releases Free ICS Assessment Tools

ICS

Securityweek

18.3.19

New Mirai Variant Comes with 27 Exploits, Targets Enterprise Devices

BotNet

Bleepingcomputer

18.3.19

New Sextortion Email Uses CIA Investigation as Scare Tactic

BigBrothers

Bleepingcomputer

18.3.19

Privacy Regulations Needed for Next-Gen Cars

Privacy

Threatpost

18.3.19

Mirai Variant Goes After Enterprise Systems

BotNet

Threatpost

18.3.19

Google Gives Users More Choice with Location-Tracking Apps

Privacy

Threatpost

18.3.19

Fourth Major Credential Spill in a Month Hits DreamMarket

Incindent

Threatpost

18.3.19

Cryptojacking of businesses’ cloud resources still going strong

Cryptocurrency

Net-security

18.3.19

Android Q will come with improved privacy protections

Android

Net-security

18.3.19

Google took down 2.3 billion bad ads in 2018,including 58.8M phishing ads

Phishing

Securityaffairs

18.3.19

gnosticplayers offers 26 Million new accounts for sale on the Dark Web

Incindent

Securityaffairs

18.3.19

Unprotected Elasticsearch DB exposed 33 Million job profiles in China

Incindent

Securityaffairs

18.3.19

Experts uncovered a malspam campaign using Boeing 737 Max crashes

Spam

Securityaffairs

18.3.19

Massive attacks bypass MFA on Office 365 and G Suite accounts via IMAP Protocol

Attack

Securityaffairs

18.3.19

Ukraine Ready to Take on Russian Election Hackers

BigBrothers

Securityweek

18.3.19

EU to Slap Google With Fresh Fine: Sources

BigBrothers

Securityweek

18.3.19

Round 4 — Hacker Puts 26 Million New Accounts Up For Sale On Dark Web

Incindent

Thehackernews

18.3.19

Video: Maldoc Analysis: Excel 4.0 Macro

Virus

SANS

18.3.19

Latest trends in automated threat intelligence-driven network security

Security

Net-security

18.3.19

Meet the new generation of white hats

Security

Net-security

18.3.19

Current phishing defense strategies and execution are not hitting the mark

Phishing

Net-security

18.3.19

2019 may be a record year for enterprise breaches, but secure collaboration tools could help

Incindent

Net-security

18.3.19

Security fatigue leads many to distrust personal data protection, can you blame them?

Privacy

Net-security

17.3.19

“CryptoSink” Campaign Deploys a New Miner Malware

Cryptocurrency blog

F5 Labs

17.3.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in February 2019

Security blog

F5 Labs

17.3.19

Intentionally Insecure: Poor Security Practices in the Cloud

Security blog

F5 Labs

17.3.19

Good Bots, Bad Bots, and What You Can Do About Both

BotNet blog

F5 Labs

17.3.19

Dissecting a NETWIRE Phishing Campaign's Usage of Process Hollowing

Phishing blog

FireEye

17.3.19

Breaking the Bank: Weakness in Financial AI Applications

Security blog

FireEye

17.3.19

Going ATOMIC: Clustering and Associating Attacker Activity at Scale

Attack blog

FireEye

17.3.19

APT40: Examining a China-Nexus Espionage Actor

APT blog

FireEye

17.3.19

FLARE Script Series: Recovering Stackstrings Using Emulation with ironstrings

Malware blog

FireEye

17.3.19

New Zealand Mobile Carriers Block 8chan, 4chan, and LiveLeak

Mobil

Bleepingcomputer

17.3.19

Spam Warns about Boeing 737 Max Crashes While Pushing Malware

Spam

Bleepingcomputer

17.3.19

Windows 10 Insider Preview Build 18358 Fixes Poor Game Performance

Vulnerebility

Bleepingcomputer

17.3.19

18-Year Old Arrested in Japan for Stealing $130k in Cryptocurrency

Cryptocurrency

Bleepingcomputer

17.3.19

257K Legal Documents Leaked By Unprotected Elasticsearch Server

Incindent

Bleepingcomputer

17.3.19

Insecure Database Exposes 800,000 Singapore Blood Donors

Incindent

Bleepingcomputer

17.3.19

Over 100 Exploits Found for 19-Year Old WinRAR RCE Bug

Exploit

Bleepingcomputer

17.3.19

Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection

Vulnerebility

Threatpost

17.3.19

GlitchPOS Malware Appears to Steal Credit-Card Numbers

Virus

Threatpost

17.3.19

Lenovo Patches Intel Firmware Flaws in Multiple Product Lines

Vulnerebility

Threatpost

17.3.19

Threatlist: IMAP-Based Attacks Compromising Accounts at ‘Unprecedented Scale’

Attack

Threatpost

17.3.19

Insider Threats Get Mean, Nasty and Very Personal

Security

Threatpost

17.3.19

US-CERT warns of New Zealand mosque shooting scams and malware campaigns

BigBrothers

Securityaffairs

17.3.19

Israeli Candidate for PM Benny Gantz hacked by Iranian cyberspies

CyberSpy

Securityaffairs

17.3.19

Maldoc: Excel 4.0 Macros

Virus

SANS

16.3.19

EPIC Promises to Fix Game Launcher after Privacy Concerns

Hacking

Bleepingcomputer

16.3.19

Google Chrome Adding Support For Nintendo Switch Gamepads

IT

Bleepingcomputer

16.3.19

New Tune Extension Turns Google Chrome Into a Safe Space

Security

Bleepingcomputer

16.3.19

Google Now Lets G Suite Admins Disable Insecure Phone 2FA

Mobil

Bleepingcomputer

16.3.19

Unsecured Database Exposed 33 Million Job Profiles in China

Incindent

Bleepingcomputer

16.3.19

Students Hack School System to Change Grades and Attendance

Hacking

Bleepingcomputer

16.3.19

Intel Fixes High Severity Vulnerabilities in Graphics Driver for Windows

Vulnerebility

Bleepingcomputer

16.3.19

Multi-Factor Auth Bypassed in Office 365 and G Suite IMAP Attacks

Attack

Bleepingcomputer

16.3.19

Malicious Javascript Active on FILA UK and Other Websites

Virus

Bleepingcomputer

16.3.19

Pakistani Government Site Compromised, Logs Visitor Keystrokes

BigBrothers

Bleepingcomputer

16.3.19

Ransom News

Ransom

Ransom

16.3.19

Windows Kernel Logic Bug Class: Access Mode Mismatch in IO Manager

Vulnerebility blog

Project Zero

16.3.19

Google Took Down 2.3 Billion Bad Ads in 2018

Security

Securityweek

16.3.19

E-Commerce Company Gearbest Leaked User Information

Incindent

Securityweek

16.3.19

China Does Not Ask Firms to Spy on Others: Premier

BigBrothers

Securityweek

16.3.19

Hackers Bypass MFA on Cloud Accounts via IMAP Protocol

Attack

Securityweek

16.3.19

Recently Patched WinRAR Flaw Exploited in APT Attacks

APT

Securityweek

16.3.19

G Suite Admins Can Now Disable Phone 2-SV

Mobil

Securityweek

16.3.19

Leading Israeli Candidate for PM Targeted by Iranian Hackers

Hacking

Securityweek

16.3.19

Details of Actively Exploited Windows Flaw Made Public

Exploit

Securityweek

16.3.19

NATO Takes Huawei Security Concerns Seriously: Stoltenberg

BigBrothers

Securityweek

16.3.19

WordPress 5.1.1 Patches Remote Code Execution Vulnerability

Vulnerebility

Securityweek

16.3.19

Code Execution Flaw Found in Sonatype Nexus Repository Manager

Vulnerebility

Securityweek

16.3.19

U.S. Senators Want Transparency on Senate Cyberattacks

BigBrothers

Securityweek

16.3.19

US Warns of Sophisticated Cyberattacks From Russia, China

BigBrothers

Securityweek

16.3.19

Default Account in Cisco CSPC Allows Unauthorized Access

Hacking

Securityweek

16.3.19

German legislative body wants to tighten penalties against black marketplace operators

BigBrothers

Securityaffairs

16.3.19

Secur Solutions Group data leak exposes 800,000 Singapore blood donors

Incindent

Securityaffairs

15.3.19

It is the first time in the history that civic groups hold a protest against a national CERT

Security

Securityaffairs

15.3.19

Recently fixed WinRAR bug actively exploited in the wild

Vulnerebility

Securityaffairs

15.3.19

Experts published details of the actively exploited CVE-2019-0808 Windows Flaw

Vulnerebility

Securityaffairs

15.3.19

A few binary plating 0-days for Windows

Vulnerebility

Securityaffairs

15.3.19

GlitchPOS PoS Malware appears in the cybercrime underground

Virus

Securityaffairs

15.3.19

Payment data of thousands of customers of UK and US online stores could have been compromised

Incindent

Securityaffairs

15.3.19

Torrent Risks: How to get infected through torrent with a good reputation

Security

Securityaffairs

15.3.19

Cisco addresses a critical static credential flaw in Common Services Platform Collector

Vulnerebility

Securityaffairs

15.3.19

CSRF flaw in WordPress potentially allowed the hack of websites

Vulnerebility

Securityaffairs

15.3.19

Cisco Patches Critical ‘Default Password’ Bug

Vulnerebility

Threatpost

15.3.19

Zero-Days in Counter-Strike Client Used to Build Major Botnet

BotNet

Threatpost

15.3.19

GlitchPOS Malware Appears to Steal Credit-Card Numbers

Virus

Threatpost

15.3.19

Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection

Vulnerebility

Threatpost

15.3.19

Threatlist: IMAP-Based Attacks Compromising Accounts at ‘Unprecedented Scale’

Attack

Threatpost

15.3.19

Insider Threats Get Mean, Nasty and Very Personal

Safety

Threatpost

15.3.19

Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested

Hacking

Threatpost

15.3.19

Patched WinRAR Bug Still Under Active Attack—Thanks to No Auto-Updates

Vulnerebility

Thehackernews

15.3.19

Binary Analysis with Jupyter and Radare2

Security

SANS

15.3.19

90% of consumers value additional security measures to verify mobile-based transactions

Security

Net-security

15.3.19

Unsecured Gearbest server exposes millions of shoppers and their orders

Incindent

Net-security

15.3.19

Thinking of threat intelligence as a contributing member of your security team

Security

Net-security

15.3.19

The quantum sea change: Navigating the impacts for cryptography

Crypto

Net-security

15.3.19

Do people with malicious intent present the biggest threat to personal data?

Virus

Net-security

15.3.19

Is AI really intelligent or are its procedures just averagely successful?

Security

Net-security

15.3.19

Data breach reports delayed as organizations struggle to achieve GDPR compliance

Privacy

Net-security

14.3.19

SimBad: A Rogue Adware Campaign On Google Play

OS Blog

Checkpoint

14.3.19

Operation Sheep: Pilfer-Analytics SDK in Action

OS Blog

Checkpoint

14.3.19

Beware of Bitcoin Investment Emails Pushing Clipboard Hijackers

Hacking

Bleepingcomputer

14.3.19

Microsoft Edge Insider Addons Store Discovered, 84 Extensions

Security

Bleepingcomputer

14.3.19

39% of All Counter-Strike 1.6 Servers Used to Infect Players

Virus

Bleepingcomputer

14.3.19

DMSniff Point-of-Sale Malware Silently Attacked SMBs For Years

Virus

Bleepingcomputer

14.3.19

Microsoft Releases Windows 10 Build 18855 (20H1) to Skip Ahead Users With Bug Fixes

Vulnerebility

Bleepingcomputer

14.3.19

Facebook and Instagram Down in Global Outage

Social

Bleepingcomputer

14.3.19

Windows 10 Build 18356 Bug Opting Users Out of Insider Program

Vulnerebility

Bleepingcomputer

14.3.19

Chinese IT Services Giant Harvests Contacts, Tracks Users

Privacy

Bleepingcomputer

14.3.19

Wordpress 5.1.1 Fixes XSS Vulnerability Leading to Website Takeovers

Vulnerebility

Bleepingcomputer

14.3.19

SimBad Adware Found in 210 Android Apps With Over 150M Installs

Android

Bleepingcomputer

14.3.19

Windows 7 Gets SHA-2 Support To Enable Future Updates

Vulnerebility

Bleepingcomputer

14.3.19

Microsoft March 2019 Patch Tuesday Includes Fixes for 64 Vulnerabilities

Vulnerebility

Bleepingcomputer

14.3.19

Unsecured API Leads to 'Yelp for Conservatives' App Data Leak

Security

Bleepingcomputer

14.3.19

CCleaner Professional Adds Software Updater Feature

Security

Bleepingcomputer

14.3.19

Two thirds of Android antimalware apps are ineffective or unreliable

Android

Net-security

14.3.19

Public-interest technology: Why companies should get involved

Security

Net-security

14.3.19

Microsoft Patch Tuesday – March 2019

Vulnerebility blog

Symantec

14.3.19

Several Cryptojacking Apps Found on Microsoft Store Cryptocurrency blog Symantec

14.3.19

Whitefly: Espionage Group has Singapore in Its Sights BigBrother blog Symantec

14.3.19

GlitchPOS: New PoS malware for sale Malware blog Cisco Talos

14.3.19

Microsoft Patch Tuesday — March 2019: Vulnerability disclosures and Snort coverage Vulnerebility blog Cisco Talos

14.3.19

Vulnerability Spotlight: Privilege escalation bug in CleanMyMac X's helper service Vulnerebility blog Cisco Talos

14.3.19

The sights and sounds of Cisco Talos at RSA 2019 Exploit blog Cisco Talos

14.3.19

Vulnerability Spotlight: Multiple local vulnerabilities in Pixar Renderman Vulnerebility blog Cisco Talos

14.3.19

Cisco, Talos tout importance of IoT security at RSA keynote IoT blog Cisco Talos

14.3.19

Vulnerability Spotlight: Remote code execution vulnerability in Antenna House Rainbow PDF Office Server Document Converter Vulnerebility blog Cisco Talos

14.3.19

Cisco Talos Honeypot Analysis Reveals Rise in Attacks on Elasticsearch Clusters Attack blog Cisco Talos

14.3.19

39% of all existing Counter-Strike 1.6 game servers online are malicious

Virus

Securityaffairs

14.3.19

DMSniff POS Malware has flown under the radar for at least four years

Virus

Securityaffairs

14.3.19

Many Security Apps on Google Play Inefficient, Fake: Study

Android

Securityweek

14.3.19

Telegram Gained 3 Million New Users During WhatsApp, Facebook Outage

Social

Thehackernews

14.3.19

New WordPress Flaw Lets Unauthenticated Remote Attackers Hack Sites

Social

Thehackernews

14.3.19

Intel Windows 10 Graphics Drivers Riddled With Flaws

Vulnerebility

Threatpost

14.3.19

Threat Groups SandCat, FruityArmor Exploiting Microsoft Win32k Flaw

Exploit

Threatpost

14.3.19

MAGA ‘Safe Space’ App Developer Threatens Security Researcher

Security

Threatpost

14.3.19

Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested

Crime

Threatpost

14.3.19

Three Ways DNS is Weaponized and How to Mitigate the Risk

Security

Threatpost

14.3.19

CVE-2019-0797 Windows Zero-Day exploited by FruityArmor and SandCat APT Groups

APT

Securityaffairs

14.3.19

Modular Cryptojacking malware uses worm abilities to spread

Cryptocurrency

Securityaffairs

14.3.19

Russia attempts to prevent Russian citizens from using ProtonMail

BigBrothers

Securityaffairs

14.3.19

Facebook Faces Criminal Probe of Data Deals: Report

Social

Securityweek

14.3.19

Multiple Security Flaws Discovered in Visitor Management Systems

Vulnerebility

Securityweek

14.3.19

Serious Crypto Flaw Affects Swiss, Australian E-Voting Systems

BigBrothers

Securityweek

14.3.19

Windows Zero-Day Exploited by FruityArmor, SandCat Threat Groups

Exploit

Securityweek

14.3.19

Zero-Day Flaws in Counter-Strike 1.6 Let Malicious Servers Hack Gamers' PCs

Vulnerebility

Thehackernews

14.3.19

Firefox Send — Free Encrypted File Transfer Service Now Available For All

Security

Thehackernews

14.3.19

Tip: Ghidra & ZIP Files

Security

SANS

14.3.19

Malspam pushes Emotet with Qakbot as the follow-up malware

Virus

SANS

14.3.19

Moving from traditional on-premise solutions to cloud-based security

Security

Net-security

14.3.19

Protecting applications against DFA attacks

Attack

Net-security

14.3.19

Businesses recognize the need for AI & ML tools in cybersecurity

Cyber

Net-security

14.3.19

Companies unprepared for PSD2, stricter EU requirements will drive fraud to other regions

BigBrothers

Net-security

14.3.19

Urgent need for IT security legal framework in Europe

Net-security

13.3.19

Spam and phishing in 2018

Spam

Securelist

13.3.19

The fourth horseman: CVE-2019-0797 vulnerability

Vulnerebility

Securelist

13.3.19

Researchers expose massive mobile adware and data stealing campaigns with 250 million downloads

Incindent

Net-security

13.3.19

Mozilla releases Firefox Send, a free encrypted file transfer service

Security

Net-security

13.3.19

March 2019 Patch Tuesday: Microsoft patches two actively exploited Windows flaws

Vulnerebility

Net-security

13.3.19

Adobe Patches Critical Photoshop, Digital Edition Flaws

Vulnerebility

Threatpost

13.3.19

Microsoft Patches Two Win32k Bugs Under Active Attack

Attack

Threatpost

13.3.19

Unpatched Windows Bug Allows Attackers to Spoof Security Dialog Boxes

Vulnerebility

Threatpost

13.3.19

Federal Focus on Cyber Plays Out in President’s Budget, IoT Legislation

IoT

Threatpost

13.3.19

ThreatList: Phishing Attacks Doubled in 2018

Phishing

Threatpost

13.3.19

Microsoft Patch Tuesday updates for March 2019 patches two Windows flaws exploited in targeted attacks

Vulnerebility

Securityaffairs

13.3.19

Users claim Samsung Galaxy S10 Face Recognition can be bypassed

Mobil

Securityaffairs

13.3.19

Venezuelan 'Cyber-Attack' Possible But Unlikely, Experts Say

BigBrothers

Securityweek

13.3.19

Cloudflare Raises $150 Million

IT

Securityweek

13.3.19

New Variant of Ursnif Targeting Japan

Virus

Securityweek

13.3.19

Microsoft Patches Two Windows Flaws Exploited in Targeted Attacks

Exploit

Securityweek

13.3.19

F5 Networks to Acquire NGINX for $670 Million

IT

Securityweek

13.3.19

Malspam pushes Emotet with Qakbot as the follow-up malware

Virus

SANS

13.3.19

The threat of quantum computers and the solutions that can protect us today

Safety

Net-security

13.3.19

Network performance requirements grow in the era of 5G: Are your security processes ready?

Mobil

Net-security

13.3.19

How susceptible are hospital employees to phishing attacks?

Phishing

Net-security

13.3.19

Data management challenges are having a severe impact on profitability

Security

Net-security

13.3.19

Exploitation of vulnerabilities in Moxa industrial switches could disrupt communication between ICS components

ICS

Net-security

12.3.19

North Korean Hackers Behind $571M Crypto Heists Says UN Report

BigBrothers

Bleepingcomputer

12.3.19

Windows 10 Insider Preview Build 18356 Released Along With Phone Screen Feature

Vulnerebility

Bleepingcomputer

12.3.19

Windows 7 KB4489878 and Windows 8.1 KB4489881 Released

Vulnerebility

Bleepingcomputer

12.3.19

Windows 10 March 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

12.3.19

Microsoft Releases the March 2019 Updates for Office

Vulnerebility

Bleepingcomputer

12.3.19

Malware Spreads As a Worm, Uses Cryptojacking Module to Mine for Monero

Cryptocurrency

Bleepingcomputer

12.3.19

Microsoft Testing Android Screen Mirroring on Windows 10 PCs

Android

Bleepingcomputer

12.3.19

Adobe Releases March 2019 Security Fixes for Photoshop CC and Digital Editions

Vulnerebility

Bleepingcomputer

12.3.19

Yatron Ransomware Plans to Spread Using EternalBlue NSA Exploits

Ransomware

Bleepingcomputer

12.3.19

Adobe Patch Tuesday updates address critical in Photoshop, Digital Editions

Vulnerebility

Securityaffairs

12.3.19

Mysterious open database included ‘BreedReady’ status for 1.8 Million Women

Incindent

Securityaffairs

12.3.19

Apex Legends for Android: a Fake App could Compromise your Smartphone

Android

Securityaffairs

12.3.19

Senators Reintroduce IoT Cybersecurity Improvement Bill

BigBrothers

Securityweek

12.3.19

Germany to Consult US Over Huawei Security Fears: Merkel

BigBrothers

Securityweek

12.3.19

Box Enterprise Shared Links Leak Sensitive Information

Security

Securityweek

12.3.19

Ten Principles for a New Approach to Regulating the Internet

Security

Securityweek

12.3.19

Pro-Brexit Twitter Manipulation Continues

Social

Securityweek

12.3.19

Adobe Patches Flaws in Sandbox, Photoshop, Digital Editions

Vulnerebility

Securityweek

12.3.19

NASA's Cybersecurity Program Gets Failing Grade

BigBrothers

Securityweek

12.3.19

Microsoft Releases Patches for 64 Flaws — Two Under Active Attack

Vulnerebility

Thehackernews

12.3.19

Adobe Releases Patches for Critical Flaws in Photoshop CC and Digital Edition

Vulnerebility

Thehackernews

12.3.19

Windows 10 Now Automatically Uninstalls Updates That Cause Problems

IT

Thehackernews

12.3.19

Marriott CEO reveals more details about the massive data breach

Incindent

Net-security

12.3.19

Is your company leaking sensitive data via its Box account?

Security

Net-security

12.3.19

Cuckoo SandBox on AWS

APT blog

Checkpoint

12.3.19

Gaming industry still in the scope of attackers in Asia

Spam blog

Eset

12.3.19

Over 2 billion records exposed by email marketing firm

Incident blog

Eset

12.3.19

Windows 10 to Automatically Remove Updates That Cause Problems

IT

Bleepingcomputer

12.3.19

Google Chrome to Block Drive-By-Downloads from Ad Frames

Safety

Bleepingcomputer

12.3.19

NVIDIA Removing Support For 3D Vision in Game Ready Drivers

IT

Bleepingcomputer

12.3.19

Medical IoT Devices with Outdated Operating Sytems Exposed to Hacking

IoT

Bleepingcomputer

12.3.19

New "Final Warning" Sextortion Emails State Adult Sites Infected You

Spam

Bleepingcomputer

12.3.19

Samsung Galaxy S10 Face Recognition Can Easily Be Bypassed

Mobil

Bleepingcomputer

12.3.19

Creepy Database Lists 'BreedReady' Status for 1.8 Million Women

Incindent

Bleepingcomputer

12.3.19

Vulnerability research hub Crowdfense is willing to pay $3 Million for iOS, Android zero-day exploits

Android

Securityaffairs

12.3.19

Moxa Industrial Switches plagued with several flaws

ICS

Securityaffairs

12.3.19

Georgia County Criticized Over $400K Ransomware Payment

Ransomware

Securityweek

12.3.19

Researcher Claims Iranian APT Behind 6TB Data Heist at Citrix

APT

Threatpost

12.3.19

Google Patches Critical Bluetooth RCE Bug

Android

Threatpost

12.3.19

Facebook Alleges Two Ukrainians Scraped Data From 63K Profiles

Social

Threatpost

12.3.19

Forrester: Ransomware Set to Resurge As Firms Pay Off Attacks

Ransomware

Threatpost

12.3.19

What happened to trust and transparency in cybersecurity?

Cyber

Net-security

12.3.19

The reality of container escapes

Safety

Net-security

12.3.19

IT managers can’t ignore endpoints because most cyberattacks start ther

Safety

Net-security

12.3.19

Researchers unveil February 2019’s most wanted malware

Virus

Net-security

12.3.19

Hidden third-party tags could be leaving Fortune 100 companies at risk

Security

Net-security

11.3.19

Samsung Galaxy S10 Face Recognition Can Easily Be Bypassed

Vulnerebility

Securityaffairs

11.3.19

Creepy Database Lists 'BreedReady' Status for 1.8 Million Women

Incindent

Securityaffairs

11.3.19

Equifax Was Aware of Cybersecurity Weaknesses for Years, Senate Report Says

Analysis

Securityweek

11.3.19

GIF Attack on Facebook Messenger Earned Hacker $10,000

Social

Securityweek

11.3.19

Research Firm Offers $3 Million for iOS, Android 0-Days

Android

Securityweek

11.3.19

Mark Zuckerberg Describes a New Privacy-Centric Facebook

Social

Securityweek

11.3.19

BEWARE – New 'Creative' Phishing Attack You Really Should Pay Attention To

Phishing

Thehackernews

11.3.19

Game Development Companies Backdoored in Supply-Chain Attacks

Attack

Bleepingcomputer

11.3.19

Severe RCE vulnerability affected popular StackStorm Automation Software

Vulnerebility

Securityaffairs

11.3.19

STOP ransomware encrypts files and steals victim’s data

Ransomware

Securityaffairs

11.3.19

Google Launches New Cloud Security Services

Safety

Securityweek

11.3.19

Many Vulnerabilities Discovered in Moxa Industrial Switches

ICS

Securityweek

11.3.19

Microsoft Asks Users to Call Windows 10 Devs About ALT+TAB Feature

IT

Bleepingcomputer

11.3.19

STOP Ransomware Installing Password Stealing Trojans on Victims

Ransomware

Bleepingcomputer

11.3.19

A predatory tale: Who’s afraid of the thief?

Cyber

Securelist

11.3.19

Crooks use The Pirate Bay to spread PirateMatryoshka malware via reputed seeders

Virus

Securityaffairs

11.3.19

Severe Flaw Disclosed In StackStorm DevOps Automation Software

Vulnerebility

Thehackernews

11.3.19

Saudi caller ID Dalil app exposed data of more than 5 million users

Incindent

Securityaffairs

11.3.19

Venezuelan Minister declares Venezuela’s Blackout may be caused by cyberattack carried by US

BigBrothers

Securityaffairs

11.3.19

Attack on Software Giant Citrix Attributed to Iranian Hackers

Attack

Securityweek

11.3.19

Venezuela's Maduro Says Cyber Attack Prevented Power Restoration

Cyber

Securityweek

11.3.19

Citrix Data Breach – Iranian Hackers Stole 6TB of Sensitive Data

Incindent

Thehackernews

11.3.19

BigBobRoss Remove Tool

Anti-Ransom Tool

Anti-Ransom Tool

11.3.19

Wireshark 3.0.0 and Npcap

Safety

SANS

11.3.19

RSA Conference 2019: The Expanding Automation Platform Attack Surface

Congress

Threatpost

11.3.19

Free decrypters for BigBobRoss ransomware released

Ransomware

Net-security

11.3.19

Webinar – DevSecOps at Hulu: When security and DevOps meet

Security

Net-security

11.3.19

The impact of spear phishing on organizations and how to combat this growing threa

Phishing

Net-security

11.3.19

How can healthcare organizations remedy their cybersecurity ailments?

Cyber

Net-security

11.3.19

What can we expect of this March Patch Tuesday?

Vulnerebility

Net-security

11.3.19

Cybersecurity skills gap worsens, security teams are understaffed

Cyber

Net-security

10.3.19

Malicious HTA Analysis by a Reader

Virus

SANS

10.3.19

Jackson County paid $400,000 to crooks after ransomare attack

Ransomware

Securityaffairs

10.3.19

Stop Decryptor

Anti-Ransom Tool

Anti-Ransom Tool

10.3.19

RSA 2019 Presention

Conference

Conference

10.3.19

Ransomware Attack on Jackson County Gets Cybercriminals $400,000

Ransomware

Bleepingcomputer

10.3.19

Cookie Walls Do Not Comply with the GDPR According to Dutch Watchdog

Privacy

Bleepingcomputer

10.3.19

Vulnerabilities in car alarm systems exposed 3 million cars to hack

Vulnerebility

Securityaffairs

10.3.19

A Comparison Study of SSH Port Activity - TCP 22 & 2222

Security

SANS

9.3.19

Smart Car Alarms Ironically Expose Millions of Vehicles to Remote Hijacking

Hacking

Bleepingcomputer

9.3.19

Citrix Learns About Internal Network Security Breach from FBI

BigBrothers

Bleepingcomputer

9.3.19

1.8 Million Users Attacked by Android Banking Malware, 300% Increase Since 2017

Virus

Bleepingcomputer

9.3.19

Windows 10 Insider Preview Build 18353 Released With Sandbox Improvements

Vulnerebility

Bleepingcomputer

9.3.19

Insecure Database Leads to Over 800 Million Records Data Breach

Incindent

Bleepingcomputer

9.3.19

Ransom News

Ransom

Ransom

9.3.19

More than 2 billion records exposed online by email validation biz Verifications.io

Incindent

Securityaffairs

9.3.19

SLUB Backdoor leverages GitHub and Slack in targeted attacks

Virus

Securityaffairs

9.3.19

FBI informed software giant Citrix of a security breach

BigBrothers

Securityaffairs

9.3.19

Evading AV with JavaScript Obfuscation

Virus

Securityaffairs

9.3.19

Flaws in Smart Alarms Exposed Millions of Cars to Dangerous Hacking

Vulnerebility

Securityweek

9.3.19

How China Exploits Social Media to Influence American Public

Exploit

Securityweek

9.3.19

Slack, GitHub Abused by New SLUB Backdoor in Targeted Attacks

Virus

Securityweek

9.3.19

RSAC 2019: The Dark Side of Machine Learning

Hacking

Threatpost

9.3.19

RSA Conference 2019 Recap

Congress

Threatpost

9.3.19

RSA Conference 2019: Operational Technology Widens Supply Chain Attack Surface

Congress

Threatpost

9.3.19

Citrix Falls Prey to Password-Spraying Attack

Attack

Threatpost

9.3.19

RSA Conference 2019: Emotet Takes Aim at Latin America

Congress

Threatpost

9.3.19

RSA Conference 2019: Firms Continue to Fail at IoT Security

Congress

Threatpost

8.3.19

Android Messaging: A Few Bugs Short of a Chain

OS Blog

Project Zero

8.3.19

PXE Dust: Finding a Vulnerability in Windows Servers Deployment Services

Vulnerebility blog

Checkpoint

8.3.19

Flaws in smart car alarms exposed 3 million cars to hijack

Vulnerebility blog

Eset

8.3.19

RSA conference, USA 2019: Keynotes and key words

Security blog

Eset

8.3.19

RSA 2019: Protecting your privacy in a NIST and GDPR world

Security blog

Eset

8.3.19

International Women’s Day 2019: How can we be better allies?

Cyber blog

Eset

8.3.19

Latest Chrome update plugs a zero-day hole

Vulnerebility blog

Eset

8.3.19

RSA – IoT security meets SMB

IoT blog

Eset

8.3.19

Payment processors remain phishers’ favorites

Phishing blog

Eset

8.3.19

Teen earns US$1 million in bug bounties

Security blog

Eset

8.3.19

Researchers create system that predicts vulnerability severity from tweets

Vulnerebility

Net-security

8.3.19

Google discloses Windows zero-day actively exploited in targeted attacks

Vulnerebility

Securityaffairs

8.3.19

Zerodium $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Security

Securityaffairs

8.3.19

Google Discloses Actively Exploited Windows Vulnerability

Vulnerebility

Securityweek

8.3.19

Analysing meterpreter payload with Ghidra

Security

SANS

8.3.19

Zero-day Chrome/Windows combo actively exploited in the wild

Vulnerebility

Net-security

8.3.19

Growing mobile cybersecurity incidents spur plans for increased security investment

Cyber

Net-security

8.3.19

Google Advises Upgrade to Windows 10 to Fix Windows 7 Zero-Day Bug

Vulnerebility

Bleepingcomputer

8.3.19

What We Know About Microsoft’s Chromium-Based Edge Browser

IT

Bleepingcomputer

8.3.19

Russia Passes Bill That Outlaws Disrespecting Russian Officials Online

BigBrothers

Bleepingcomputer

8.3.19

Facebook Removes Campaigns Used to Sow Discord in UK and Romania

Social

Bleepingcomputer

8.3.19

Notepad++ No Longer Code Signed, Dev Won't Support Overpriced Cert Industry

IT

Bleepingcomputer

8.3.19

New SLUB Backdoor Uses Slack, GitHub as Communication Channels

Virus

Bleepingcomputer

8.3.19

Windows 10 KB4482887 Cumulative Update Causing Major Stuttering in Games

Vulnerebility

Bleepingcomputer

8.3.19

FTC Issue PSA on Social Security Number Scams

Social

Bleepingcomputer

8.3.19

#Opfail: Phisher Attaches Powershell Exec Instead of Malware

Phishing

Bleepingcomputer

8.3.19

Cisco security updates fix dozens of flaws in Nexus Switches

Vulnerebility

Securityaffairs

8.3.19

Zerodium Offers $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Security

Securityweek

8.3.19

Man Admits to Hacking Minnesota Databases Over Cop Acquittal

Hacking

Securityweek

8.3.19

RSA Conference 2019: Firms Continue to Fail at IoT Security

Congress

Threatpost

8.3.19

RSA Conference 2019: Ultrasound Hacked in Two Clicks

Congress

Threatpost

8.3.19

RSAC 2019: For Domestic Abuse, IoT Devices Pose New Threat

IoT

Threatpost

8.3.19

IoT devices using CoAP increasingly used in DDoS attacks

IoT

Net-security

7.3.19

12,449 Data Breaches Confirmed in 2018, a 424% Increase Over the Previous Year

Incindent

Bleepingcomputer

7.3.19

Unpatched UPnP-Enabled Devices Left Exposed to Attacks

Attack

Bleepingcomputer

7.3.19

StealthWorker Malware Uses Windows, Linux Bots to Hack Websites

Virus

Bleepingcomputer

7.3.19

Microsoft Releases Windows 10 Build 18850 (20H1) to Skip Ahead Users

Vulnerebility

Bleepingcomputer

7.3.19

Microsoft Open Sources the Windows 10 Calculator on GitHub

IT

Bleepingcomputer

7.3.19

Google Chrome Update Patches Zero-Day Actively Exploited in the Wild

Vulnerebility

Bleepingcomputer

7.3.19

NSA's Ghidra Reverse Engineering Framework Stirs Up Malware Researchers

BigBrothers

Bleepingcomputer

7.3.19

Hackers Revive Microsoft Office Equation Editor Exploit

Exploit

Bleepingcomputer

7.3.19

Adware Apps in Google Play Simulate Uninstall for Persistence

Android

Bleepingcomputer

7.3.19

Cloudflare Deploys Firewall Rule to Block New Drupal Exploits

Safety

Bleepingcomputer

7.3.19

Malicious Mobile Software Attacks Almost Doubled in 2018

Virus

Bleepingcomputer

7.3.19

Jokeroo Ransomware-as-a-Service Offers Multiple Membership Packages

Ransomware

Bleepingcomputer

7.3.19

Microsoft Releases Windows 10 Build 18351 (19H1) With Only Bug Fixes

Vulnerebility

Bleepingcomputer

7.3.19

Screenshots of Microsoft’s Chromium-Based Edge Browser Leaked Online

Incindent

Bleepingcomputer

7.3.19

Photo gallery: RSA Conference 2019 Expo, part four

Congress

Net-security

7.3.19

Windows Servers in danger of being compromised via WDS bug

Vulnerebility

Net-security

7.3.19

For enterprises, malware is the most expensive type of attack

Virus

Net-security

7.3.19

Users of Cisco switches, security appliances need to get patching

Vulnerebility

Net-security

7.3.19

StealthWorker Malware Uses Windows, Linux Bots to Hack Websites

Virus

Securityaffairs

7.3.19

Study Finds Rampant Sale of SSL/TLS Certificates on Dark Web

Security

Securityweek

7.3.19

Organizations Not Positioned for Success in Tackling Cyber Demands: Deloitte

Cyber

Securityweek

7.3.19

Hungarian Judge OKs Extradition of Portuguese Hacker

Crime

Securityweek

7.3.19

Financial Cyberthreats in 2018

CyberCrime

Securelist

7.3.19

Pirate matryoshka

Hacking

Securelist

7.3.19

Microsoft warns of economic damages caused by Iran-linked hackers

CyberSpy

Securityaffairs

7.3.19

Too much UPnP-enabled connected devices still vulnerable to cyber attacks

Attack

Securityaffairs

7.3.19

Cisco Patches Two Dozen Serious Flaws in Nexus Switches

Vulnerebility

Securityweek

7.3.19

Several Industrial Automation Products Affected by WibuKey DRM Flaws

ICS

Securityweek

7.3.19

How are execs tackling cyber risk that comes with digital transformation?

Cyber

Net-security

7.3.19

Keep an Eye on Disposable Email Addresses

Spam

SANS

7.3.19

Whitefly espionage group was linked to SingHealth Singapore Healthcare Breach

CyberSpy

Securityaffairs

7.3.19

Cybaz-Yoroi ZLAB shed the light on Op. ‘Pistacchietto’: An Italian Job

Cyber

Securityaffairs

7.3.19

Google Chrome Zero-Day Vulnerability CVE-2019-5786 actively exploited in the wild

Vulnerebility

Securityaffairs

7.3.19

Coinbase CEO confirms that Ex-Hacking Team members will ‘Transition Out’ of Neutrino

BigBrothers

Securityaffairs

7.3.19

Iranian Hackers Caused Losses in Hundreds of Millions: Report

CyberSpy

Securityweek

7.3.19

China's Huawei Sues US Over Federal Ban on Its Products

BigBrothers

Securityweek

7.3.19

Cybersecurity Startup PolySwarm Launches Malware Detection Marketplace

Security

Securityweek

7.3.19

Virsec Launches Application Memory Firewall

Safety

Securityweek

7.3.19

Fortanix Releases Open Source SDK for Intel SGX Enclaves

Safety

Securityweek

7.3.19

New CyberArk Solution Secures AWS Accounts

Safety

Securityweek

7.3.19

Google Patches Actively Exploited Chrome Vulnerability

Vulnerebility

Securityweek

7.3.19

Massive Singapore Healthcare Breach Linked to 'Whitefly' Cyberspy Group

Incindent

Securityweek

7.3.19

Secureworks Launches Orchestration and Automation Solution

Safety

Securityweek

7.3.19

NTT Acquires WhiteHat Security

BigBrothers

Securityweek

7.3.19

NSA Makes Reverse Engineering Tool Freely Available

BigBrothers

Securityweek

7.3.19

New Google Chrome Zero-Day Vulnerability Found Actively Exploited in the Wild

Vulnerebility

Thehackernews

7.3.19

RSA Conference 2019: UniKey Patches BleedingBit Flaws Granting Access To Hotel Rooms, Cars

Congress

Threatpost

7.3.19

RSA Conference 2019: Cryptographers’ Panel Decries Adi Shamir’s Visa Issues

Congress

Threatpost

7.3.19

RSA Conference 2019: The Sky’s the Limit For Satellite Hacks

Congress

Threatpost

7.3.19

RSA Conference 2019: How to Defend Against an AI vs AI ‘Flash War’

Congress

Threatpost

7.3.19

Organizations still ignoring a large piece of their cybersecurity defense

Cyber

Net-security

7.3.19

Photo gallery: RSA Conference 2019 Expo, part three

Congress

Net-security

6.3.19

RSA Conference 2019: Data-Wiping Cyberattacks Plague Financial Firms

Congress

Threatpost

6.3.19

RSA Conference 2019: Cryptographers’ Panel Decries Adi Shamir’s Visa Issues

Congress

Threatpost

6.3.19

RSA Conference 2019: Microsoft, Google, Twitter on Federal Privacy Regs

Congress

Threatpost

6.3.19

Google plugs Chrome zero-day exploited in the wild

Vulnerebility

Net-security

6.3.19

NSA unveils Ghidra reverse engineering tool at RSA Conference 2019

BigBrothers

Net-security

6.3.19

Sale of SSL/TLS certificates on the dark web is rampant

Security

Net-security

6.3.19

SPOILER CPU Vulnerebility

Papers

Papers

6.3.19

NSA released Ghidra, its multi-platform reverse engineering framework

BigBrothers

Securityaffairs

6.3.19

[SI-LAB] #OpJerusalem 2019 – JCry ransomware is now infecting Windows users

Ransomware

Securityaffairs

6.3.19

APT40 cyberespionage group supporting growth of China’s naval sector

APT

Securityaffairs

6.3.19

Iran-Linked Chafer APT recently used python-based backdoor

APT

Securityaffairs

6.3.19

Rockwell Automation Patches Critical DoS/RCE Flaw in RSLinx Software

Vulnerebility

Securityweek

6.3.19

BlackBerry Cylance Unveils Behavioral Analytics Solution

Mobil

Securityweek

6.3.19

Rush Health System Reports Data Breach Affecting 45,000

Incindent

Securityweek

6.3.19

Armor Scientific Emerges From Stealth With Wearable Authentication Solution

Security

Securityweek

6.3.19

Huawei Opens Brussels Security Lab in Bid to Reassure EU

BigBrothers

Securityweek

6.3.19

NSA Releases GHIDRA 9.0 — Free, Powerful Reverse Engineering Tool

BigBrothers

Thehackernews

6.3.19

Malspam with password-protected word docs still pushing IcedID (Bokbot) with Trickbot

Spam

SANS

6.3.19

RSA Conference 2019: How to Be Better, on Trust, AI and IoT

Congress

Threatpost

6.3.19

RSAC 2019: TLS Markets Flourish on the Dark Web

Security

Threatpost

6.3.19

RSA Conference: BEC Scammer Gang Takes Aim at Boy Scouts, Other Nonprofts

Congress

Threatpost

6.3.19

Users are too confident in their protection from threats

Security

Net-security

6.3.19

IoT automation platforms open smart buildings to new threats

IoT

Net-security

6.3.19

Attack traffic increased by 32 percent in 2018

Attack

Net-security

6.3.19

Photo gallery: RSA Conference 2019 Expo

Congress

Net-security

6.3.19

Key 2019 cybersecurity industry trends

Cyber

Net-security

5.3.19

Jmail Breaker: Profiting from Joomla’s Mail Service

Vulnerebility blog

Checkpoint

5.3.19

MacOS Malware Pedia

OS Blog

Checkpoint

5.3.19

A New InfoStealer Campaign Targets APAC Windows Servers

Malware blog

Checkpoint

5.3.19

Boost Windows 10 Performance with Retpoline Spectre Mitigation

Security

Bleepingcomputer

5.3.19

CryptoMix Clop Ransomware Says It's Targeting Networks, Not Computers

Ransomware

Bleepingcomputer

5.3.19

Vulnerable Docker Hosts Actively Abused in Cryptojacking Campaigns

Cryptocurrency

Bleepingcomputer

5.3.19

Windows 10 May Soon Run on the Nintendo Switch

IT

Bleepingcomputer

5.3.19

Microsoft Sees 250% Phishing Increase, Malware Decline by 34%

Phishing

Bleepingcomputer

5.3.19

#OpJerusalem Targeted Israeli Windows Users with JCry Ransomware

BigBrothers

Bleepingcomputer

5.3.19

Alphabet's Backstory Helps Enterprises Hunt Down Security Threats

Safety

Bleepingcomputer

5.3.19

Windows 10 IoT Core Test Interface Lets Attackers Take Over Devices

Attack

Bleepingcomputer

5.3.19

Mobile malware evolution 2018

Mobil

Securelist

5.3.19

Iran-Linked Hackers Use Python-Based Backdoor in Recent Attacks

BigBrothers

Securityweek

5.3.19

Secure Data Storage Provider RackTop Systems Raises $15 Million

IT

Securityweek

5.3.19

Comcast Acquires AI Cybersecurity Firm BluVector

Safety

Securityweek

5.3.19

New VMware Firewall Focuses on Known Good Behavior

Safety

Securityweek

5.3.19

State-Sponsored Hackers Supporting China’s Naval Modernization Efforts: Report

BigBrothers

Securityweek

5.3.19

Security Shifts Left to be Part of Software Development Best Practice: Report

Security

Securityweek

5.3.19

Alphabet's Chronicle Launches Security Telemetry Platform

Security

Securityweek

5.3.19

CrowdStrike Launches EDR Solution for Mobile Devices

Mobil

Securityweek

5.3.19

Huawei HCSTC centre opens in Brussels opens to build digital trust through verification standards

Cyber

Securityaffairs

5.3.19

Hundreds of Docker Hosts compromised in cryptojacking campaigns

Cryptocurrency

Securityaffairs

5.3.19

Google Chronicle announced Backstory to protect businesses

Safety

Securityaffairs

5.3.19

Microsoft enabled Retpoline mitigations against the Spectre Variant 2 for Windows 10

Vulnerebility

Securityaffairs

5.3.19

Annual RSA Conference Exclusive 2019 Edition of Cyber Defense Magazine is arrived

Congress

Securityaffairs

5.3.19

Google Project Zero discloses zero-day in Apple macOS Kernel

Apple

Securityaffairs

5.3.19

German police storing bodycam footage on Amazon servers

BigBrothers

Securityaffairs

5.3.19

Google Launches Backstory — A New Cyber Security Tool for Businesses

Safety

Thehackernews

5.3.19

Researchers Link 'Sharpshooter' Cyber Attacks to North Korean Hackers

Attack

Thehackernews

5.3.19

Teen Becomes First to Earn $1M in Bug Bounties with HackerOne

Security

Threatpost

5.3.19

BSides SF 2019: Remote-Root Bug in Logitech Harmony Hub Patched and Explained

Exploit

Threatpost

5.3.19

RSAC 2019: Joomla! Mail Flaw Exploited to Create Mass Phishing Infrastructure

Exploit

Threatpost

5.3.19

RSAC 2019: Most Consumers Say ‘No’ to Cumbersome Data Privacy Practices

Privacy

Threatpost

5.3.19

RSAC 2019: Picking Apart the Foreshadow Attack

Attack

Threatpost

5.3.19

Key 2019 cybersecurity industry trends

Cyber

Net-security

5.3.19

Powershell, Active Directory and the Windows Host Firewall

Attack

SANS

5.3.19

BSides SF 2019: Remote-Root Bug in Logitech Harmony Hub Patched and Explained

Congress

Threatpost

5.3.19

Teen Becomes First to Earn $1M in Bug Bounties with HackerOne

Security

Threatpost

5.3.19

Smart Ski Helmet Headphone Flaws Leak Personal, GPS Data

Vulnerebility

Threatpost

5.3.19

If an organization has been breached, it’s more likely to be targeted again

Incindent

Net-security

5.3.19

Phishers shift efforts to attack SaaS and webmail services

Phishing

Net-security

5.3.19

How malware traverses your network without you knowing about it

Virus

Net-security

5.3.19

The patterns of elite DevSecOps practices

Security

Net-security

5.3.19

Worldwide spending on public cloud services and infrastructure to increase 23.8% over 2018

Security

Net-security

4.3.19

Microsoft Rolls Out Spectre Variant 2 Mitigations for Windows 10

Security

Securityweek

4.3.19

Tripwire Launches Industrial Cybersecurity Assessment Service

Cyber

Securityweek

4.3.19

KnowBe4 Announces New Funding Round at $800 Million Valuation

Security

Securityweek

4.3.19

Eyeing Russia, EU Girds for Cyberthreats to Parliament Vote

BigBrothers

Securityweek

4.3.19

Better Security Not Sole Factor for Improved Breach Detection Times: FireEye

Incindent

Securityweek

4.3.19

Researchers Link 'Sharpshooter' Cyber Attacks to North Korean Hackers

BigBrothers

Thehackernews

4.3.19

Google Discloses Unpatched 'High-Severity' Flaw in Apple macOS Kernel

Apple

Thehackernews

4.3.19

Project Zero Discloses High-Severity Apple macOS Flaw

Apple

Threatpost

4.3.19

Traditional cybersecurity staff retention tactics becoming less effective

Cyber

Net-security

4.3.19

Container Escape Hack Targets Vulnerable Linux Kernel

Vulnerebility

Threatpost

4.3.19

RSAC 2019: 58% of Orgs Have Unfilled Cyber Positions

Cyber

Threatpost

4.3.19

Windows Exploit Suggester Lists Known Exploits for Your Windows Install

Exploit

Bleepingcomputer

4.3.19

Experts collect more evidence that link Op ‘Sharpshooter’ to North Korea

BigBrothers

Securityaffairs

4.3.19

NecursBotnet adopts a new strategy to evade detection

BotNet

Securityaffairs

4.3.19

Cisco Publishes Annual CISO Benchmark Study

Security

Securityweek

4.3.19

RSAC 2019: An Antidote for Tech Gone Wrong

Security

Threatpost

4.3.19

Visitor Kiosk Access Systems Riddled with Bugs

Vulnerebility

Threatpost

4.3.19

Ongoing global cyber espionage campaign broader that previously known

CyberSpy

Net-security

4.3.19

Enterprise ttitudes to cybersecurity: Strategies to balance risk and business acceleration

Cyber

Net-security

4.3.19

Human behavior can be your biggest cybersecurity risk

Cyber

Net-security

4.3.19

Operation Sharpshooter  pdf

Alert - Operation

McAfee

4.3.19

Open MongoDB Databases Expose Chinese Surveillance Data

BigBrothers

Bleepingcomputer

4.3.19

Op 'Sharpshooter' Connected to North Korea's Lazarus Group

CyberSpy

Bleepingcomputer

4.3.19

Windows 10 Update KB4482887 Released With Performance Fix for Spectre Bug

Vulnerebility

Bleepingcomputer

4.3.19

Threat actors using FrameworkPOS malware in POS attacks

Virus

Securityaffairs

4.3.19

The Wireshark Foundation released Wireshark 3.0.0

Security

Securityaffairs

4.3.19

Data Breach Cost Marriott $28 Million So Far

Incindent

Securityweek

4.3.19

How the Dark Web Data Bazaar Fuels Enterprise Attacks

Attack

Threatpost

4.3.19

RSAC 2019: New Operation Sharpshooter Data Reveals Higher Complexity, Scop

CyberSpy

Threatpost

4.3.19

A strong security posture starts with application dependency mapping

Security

Net-security

4.3.19

How cloud storage providers can preempt cyber attacks with business continuity

Cyber

Net-security

4.3.19

A third of 2018’s vulnerabilities have public exploits, 50% can be exploited remotel

Vulnerebility

Net-security

4.3.19

IT teams are struggling with network infrastructure challenges caused by the cloud

Security

Net-security

4.3.19

Organizations are seeing integration challenges hinder digital transformation initiatives

Security

Net-security

3.3.19

DJ Marshmello concert on Fortnite: An iconic event that also attracted scammers

Spam blog

Eset

3.3.19

ICAO victim of a major cyberattack in 2016

APT blog

Eset

3.3.19

Coinhive cryptocurrency miner to call it a day next week

Cryptocurrency blog

Eset

3.3.19

‘Highly critical’ bug exposes unpatched Drupal sites to attacks

Cryptocurrency blog

Eset

3.3.19

How to spot if your password was stolen in a security breach

Incident blog

Eset

3.3.19

Google aims for password-free app and site logins on Android

OS Blog

Eset

3.3.19

Escalating DNS attacks have domain name steward worried

Attack blog

Eset

3.3.19

Cyber-extortionists take aim at lucrative targets

Cyber blog

Eset

3.3.19

ML-era in cybersecurity: A step toward a safer world or the brink of chaos?

Cyber blog

Eset

3.3.19

How costly are sweetheart swindles?

Spam blog

Eset

3.3.19

Ransomware Pretends to Be Proton Security Team Securing Data From Hackers

Ransomware

Bleepingcomputer

3.3.19

Update ColdFusion Now, Critical Zero-Day Bug Exploited in the Wild

Vulnerebility

Bleepingcomputer

3.3.19

Phisher Announces More Attacks Against Hedge Funds and Financial Firms

Phishing

Bleepingcomputer

3.3.19

Chrome and Firefox Can Take Screenshots of Sites From the Command Line

Security

Bleepingcomputer

3.3.19

First Hacker Millionaire on HackerOne

Security

Bleepingcomputer

3.3.19

A Cobalt Strike flaw exposed attackers’ infrastructure

CyberCrime

Securityaffairs

3.3.19

The operator of DDoS-for-hire service pleads guilty

Attack

Securityaffairs

3.3.19

[SI-LAB] FlawedAmmyy Leveraging Undetected XLM Macros as an Infection Vehicle

Virus

Securityaffairs

3.3.19

DDoS-for-Hire Service Admin Pleads Guilty

Attack

Securityweek

2.3.19

Kaspersky AV Having Certificate Conflicts with Google Chromecast

Security

Bleepingcomputer

2.3.19

Wireshark 3 Released with New Npcap Windows Packet Capturing Driver

Security

Bleepingcomputer

2.3.19

App Security Improvement Alerts Android Devs of 6 New Vulnerabilities

Android

Bleepingcomputer

2.3.19

YouTube Disables Comments on Videos with Young Children

Security

Bleepingcomputer

2.3.19

Microsoft Releases Windows 10 Build 18845 (20H1) With Emoji 12.0 and Fixes

Vulnerebility

Bleepingcomputer

2.3.19

Cisco Fixes Critical RCE Vulnerability in RV110W, RV130W, and RV215W Routers

Vulnerebility

Bleepingcomputer

2.3.19

MageCart Group Evolves Tactics To Better Steal Your Credit Cards

Hacking

Bleepingcomputer

2.3.19

Microsoft Announces Azure Sentinel and Threat Experts Cloud-Based Tech

Security

Bleepingcomputer

2.3.19

Ransom News

Ransom News

Ransom

2.3.19

Cisco addressed CVE-2019-1663 RCE flaw in wireless routers

Vulnerebility

Securityaffairs

2.3.19

Emissary Panda updated its weapons for attacks in the past 2 years

Attack

Securityaffairs

2.3.19

Cybaze-Yoroi ZLab analyze GoBrut: A new GoLang Botnet

BotNet

Securityaffairs

2.3.19

Only now we known that International Civil Aviation Organization (ICAO) was hacked in 2016

BigBrothers

Securityaffairs

2.3.19

Analyzing the evolution of MageCart cybercrime groups’ TTPs

CyberCrime

Securityaffairs

2.3.19

Adobe Patches ColdFusion Vulnerability Exploited in the Wild

Vulnerebility

Securityweek

2.3.19

Two White Hats Earn Over $1 Million via Bug Bounty Programs

Security

Securityweek

2.3.19

Adobe Patches Critical ColdFusion Vulnerability With Active Exploit

Exploit

Threatpost

2.3.19

Necurs Botnet Evolves to Hide in the Shadows, with New Payload

BotNet

Threatpost

2.3.19

Podcast: RSA Conference 2019 Preview

Congress

Threatpost

2.3.19

RSA Conference 2019 Show Coverage

Congress

Threatpost

1.3.19

Cobalt Strike Bug Exposes Attacker Servers

Attack

Securityweek

1.3.19

Cisco Patches Critical Vulnerability in Wireless Routers

Vulnerebility

Securityweek

1.3.19

Wireshark 3.0.0 Released

Security

Securityweek

1.3.19

PoS Clients Targeted with Cobalt Strike, Card Scraping Malware

Virus

Securityweek

1.3.19

Magecart Hackers Change Tactics Following Public Exposure

Incindent

Securityweek

1.3.19

U.S. Government Says Thales Must Divest HSM Business Before Acquiring Gemalto

BigBrothers

Securityweek

1.3.19

China's APT27 Hackers Use Array of Tools in Recent Attacks

APT

Securityweek

1.3.19

Ireland's Data Protection Commission Reports Multiple GDPR Investigations on Tech Giants

Privacy

Securityweek

1.3.19

Bug in Cobalt Strike pentesting tool used to identify malicious servers

Virus

Net-security

1.3.19

Critical Cisco Wireless Patch for RV Series, CVE-2019-1663.

Vulnerebility

SANS

1.3.19

CoinHive Cryptocurrency Mining Service will shut down on March 8, 2019

Cryptocurrency

Securityaffairs

1.3.19

Ransomware, Trojan and Miner together against “PIK-Group”

Ransomware

Securityaffairs

1.3.19

Hackers Favorite CoinHive Cryptocurrency Mining Service Shutting Down

Cryptocurrency

Thehackernews

1.3.19

UN Aviation Agency Concealed Serious Hack: Media

BigBrothers

Securityweek

1.3.19

Cequence Security Secures $17 Million in Series B Funding

IT

Securityweek

1.3.19

Lawyer: Russian Cybercrime Suspect on Hunger Strike

CyberSpy

Securityweek

1.3.19

Application Security Firm Contrast Security Raises $65 Million

IT

Securityweek

1.3.19

Microsoft Unveils New Azure, Windows Defender ATP Tools

Security

Securityweek

1.3.19

Dow Jones Watchlist Found Exposed to Open Internet

Incindent

Securityweek

1.3.19

Cisco Fixes Critical Flaw in Wireless VPN, Firewall Routers

Vulnerebility

Threatpost

1.3.19

Coinhive to Mine Its Last Monero in March

Cryptocurrency

Threatpost

1.3.19

Enterprises are blind to over half of malware sent to their employees

Virus

Net-security

1.3.19

Businesses need to rethink security priorities due to shifting trends

Security

Net-security

1.3.19

Half of business leaders say a breach could end their business, others remain unaware

Incindent

Net-security

1.3.19

40% of malicious URLs were found on good domains

Virus

Net-security

1.3.19

By 2025 workforce most likely to consist of humans and bots

BotNet

Net-security

1.3.19

ENISA provides recommendations to improve the cybersecurity of EU electoral processes

BigBrothers

Net-security

1.3.19

Phishing, software supply chain attacks greatest threats for businesses

Phishing

Net-security

1.3.19

Cisco SOHO wireless VPN firewalls and routers open to attack

Exploit

Net-security

28.2.19

Topps.com Sports Collectible Site Exposes Payment Info in MageCart Attack

Attack

Bleepingcomputer

28.2.19

Coinhive In-Browser Cryptomining Service Shuts Down on March 8

Cryptocurrency

Bleepingcomputer

28.2.19

Outlook and Microsoft Account Phishing Emails Utilize Azure Blob Storage

Phishing

Bleepingcomputer

28.2.19

Social Media Attacks Generate $3.25 Billion for Crooks Each Year

Attack

Bleepingcomputer

28.2.19

Icons and Screenshots of Microsoft's Chromium-based Edge Browser Leaked Online

Security

Bleepingcomputer

28.2.19

New Elevation of Privilege Vulnerability Found in Cisco WebEx Meetings

Vulnerebility

Bleepingcomputer

28.2.19

AltFS Fileless File System Aims to Evade Detection by Security Software

Security

Bleepingcomputer

28.2.19

TLS 1.3 Support Coming to iOS 12.2, Enabled System-Wide in Beta Releases

Crypto

Bleepingcomputer

28.2.19

Cyber-Espionage Group Customizes Old, Public Tools

CyberSpy

Bleepingcomputer

28.2.19

Web Site for a Bangladesh Embassy Compromised with Malicious Docs

Virus

Bleepingcomputer

28.2.19

28 Billion Credential Stuffing Attempts During Second Half of 2018

Incindent

Bleepingcomputer

28.2.19

Google Enhances Google Play Protect on Android, but Is It Enough?

Android

Bleepingcomputer

28.2.19

Thunderclap Vulnerabilities Allow Attacks Using Thunderbolt Peripherals

Vulnerebility

Bleepingcomputer

28.2.19

Windows 10 Insider Preview Build 18346 Released With Bug Fixes

Vulnerebility

Bleepingcomputer

28.2.19

Adobe Sends Emails About Retirement of Shockwave on April 9th

Security

Bleepingcomputer

28.2.19

Malvertising Attack Sneaks JavaScript Payload in Polyglot Images

Virus

Bleepingcomputer

28.2.19

Intel SGX Card Extends Memory Protections to Existing Cloud Servers

Safety

Securityweek

28.2.19

Cisco WebEx Meetings affected by a new elevation of privilege flaw

Vulnerebility

Securityaffairs

28.2.19

PDF zero-day samples harvest user data when opened in Chrome

Vulnerebility

Securityaffairs

28.2.19

Multiple threat actors are targeting Elasticsearch Clusters

Security

Securityaffairs

28.2.19

Thunderclap vulnerabilities allows to hack most of moder computers

Vulnerebility

Securityaffairs

28.2.19

U.S. Cyber Command disrupted blocked Russian troll factory during 2018 midterms

BigBrothers

Securityaffairs

28.2.19

Experts devised 3 attacks Show Signed PDF Documents Cannot Be Trusted

Attack

Securityaffairs

28.2.19

Phishing impersonations

Phishing

SANS

28.2.19

Fighting credential stuffing attacks is an uphill battle

Attack

Net-security

28.2.19

Cloud business initiatives accelerating faster than security teams’ ability to secure them

Security

Net-security

28.2.19

Attackers continue to enhance their performance, apply smart business techniques

Attack

Net-security

28.2.19

Privileged credential abuse is involved in 74% of data breaches

Incindent

Net-security

28.2.19

Researchers and businesses need to work together to expose IoT vulnerabilities

IoT

Net-security

27.2.19

Facebook Says 'Clear History' Feature Ready This Year

Social

Securityweek

27.2.19

Identity Protection Firm Obsidian Security Raises $20 Million

IT

Securityweek

27.2.19

Swedish Police Arrest Russia Spy Suspect

BigBrothers

Securityweek

27.2.19

Elasticsearch Clusters Under Attack From Multiple Hacking Groups

Attack

Securityweek

27.2.19

US Lawmakers Kick Off Debate Over Online Privacy

BigBrothers

Securityweek

27.2.19

Chrome Zero-Day Exploited to Harvest User Data via PDF Files

Exploit

Securityweek

27.2.19

'Farseer' Backdoor Targets Users in South East Asia

Virus

Securityweek

27.2.19

Severe Flaws in SHAREit Android App Let Hackers Steal Your Files

Android

Thehackernews

27.2.19

Ring Doorbell Flaw Opens Door to Spying

Vulnerebility

Threatpost

27.2.19

Thunderclap Flaws Shatter Peripheral Security

Vulnerebility

Threatpost

27.2.19

Cisco Patches High-Severity Webex Vulnerability For Third Time

Vulnerebility

Threatpost

27.2.19

Card-Skimming Scripts Hide Behind Google Analytics, Angular

Hacking

Threatpost

27.2.19

Bronze Union APT Updates Remote Access Trojans in Fresh Wave of Attacks

APT

Threatpost

27.2.19

Modern browser APIs can be abused for hijacking device resources

Hacking

Net-security

27.2.19

Sessions and events to check out at RSA Conference 2019

Congress

Net-security

27.2.19

Recently disclosed Drupal CVE-2019-6340 RCE flaw exploited in the wild

Vulnerebility

Securityaffairs

27.2.19

The Arsenal Behind the Australian Parliament Hack

BigBrothers

Securityaffairs

27.2.19

Author of NeverQuest botnet pleads guilty to bank fraud

BotNet

Securityaffairs

27.2.19

'Thunderclap' Flaws Expose Computers to Attacks via Peripheral Devices

Vulnerebility

Securityweek

27.2.19

Neverquest Trojan Operator Pleads Guilty

Virus

Securityweek

27.2.19

Russia's Ex-Cybersecurity Chief Gets 22-Year Sentence in Jail

BigBrothers

Securityweek

27.2.19

New Attacks Show Signed PDF Documents Cannot Be Trusted

Attack

Securityweek

27.2.19

NVIDIA Patches High Risk Vulnerabilities in GPU Display Drivers

Vulnerebility

Securityweek

27.2.19

New Attack Runs Code After Closing Browser Tab

Attack

Securityweek

27.2.19

Hackers Exploit WinRAR Vulnerability to Deliver Malware

Vulnerebility

Securityweek

27.2.19

High-Severity SHAREit App Flaws Open Files for the Taking

Vulnerebility

Threatpost

27.2.19

‘Cloudborne’ IaaS Attack Allows Persistent Backdoors in the Cloud

Attack

Threatpost

27.2.19

How WebAuthn aims to solve the password problem

Security

Net-security

27.2.19

Social media-enabled cybercrime is generating $3.25 billion a year

CyberCrime

Net-security

27.2.19

Increasing security measures are driving cybercriminals to alter their techniques

Hacking

Net-security

27.2.19

Researchers eavesdrop on DNA synthesizer to steal genetic blueprint

IT

Net-security

27.2.19

Consumer attitudes towards security breaches are changing significantly

Incindent

Net-security

26.2.19

Hackers Backdoor Cloud Servers to Attack Future Customers

Attack

Bleepingcomputer

26.2.19

Apex Legends Fans Targeted with Malware and Scam Campaigns

Spam

Bleepingcomputer

26.2.19

Malspam Exploits WinRAR ACE Vulnerability to Install a Backdoor

Virus

Bleepingcomputer

26.2.19

Smart Homes at Risk Due to Unpatched Vulnerabilities, Weak Credentials

Vulnerebility

Bleepingcomputer

26.2.19

NVIDIA Patches Security Issues in GPU Display Driver for Windows, Linux

Vulnerebility

Bleepingcomputer

26.2.19

CyberSecurity Firm Darkmatter Request to be Trusted Root CA Raises Concerns

IT

Bleepingcomputer

26.2.19

B0r0nt0K Ransomware Wants $75,000 Ransom, Infects Linux Servers

Ransomware

Bleepingcomputer

26.2.19

LinkedIn Messaging Abused to Target US Companies With Backdoors

Virus

Bleepingcomputer

26.2.19

How to Attack and Defend a Prosthetic Arm

Hacking

Securelist

26.2.19

Huawei Says US Has 'No Evidence' of 5G Spying Allegations

BigBrothers

Securityweek

26.2.19

Backdoor Targets U.S. Companies via LinkedIn

Virus

Securityweek

26.2.19

Latest WinRAR Flaw Being Exploited in the Wild to Hack Windows Computers

Exploit

Thehackernews

26.2.19

Critical WinRAR Flaw Found Actively Being Exploited

Exploit

Threatpost

26.2.19

PDF viewers, online validation services vulnerable to digital signature spoofing attacks

Attack

Net-security

26.2.19

Latest WinRAR, Drupal flaws under active exploitation

Exploit

Net-security

26.2.19

The Dark Sides of Modern Cars: Hacking and Data Collection

Security

Threatpost

26.2.19

OSSPatcher: Automated mobile application patching for bugs in open source libraries

Mobil

Net-security

26.2.19

Many computers are vulnerable to hacking through common plug-in devices

Vulnerebility

Net-security

26.2.19