Home  2019  2018  2017  2016  0  1  2  3 

Date

Name

Category

Web

18.6.19

Android Apps uses a novel technique to by-pass 2FA and steal Bitcoin

Securityaffairs

18.6.19

Expert found a critical RCE zero-day in TP-Link Wi-Fi Extenders

Securityaffairs

18.6.19

Researcher leaked a dataset of over 7,000,000 transactions scraped from the Venmo public API

Securityaffairs
18.6.19

DHS also issued an alert for the Windows BlueKeep flaw

Securityaffairs
18.6.19

Multiple DoS vulnerabilities affect Linux and FreeBSD

Securityaffairs

18.6.19

Modular Backdoor Can Spread Over Local Network

Securityweek

18.6.19

Critical Flaw Exposes TP-Link Wi-Fi Extenders to Remote Attacks

Securityweek

18.6.19

Aptible Raises $12 Million to Launch Compliance Platform

Securityweek

18.6.19 Russia Says Victim of US Cyberattacks 'for Years' Securityweek
18.6.19 Facebook Open Sources CTF 2019 Challenges

Securityweek

18.6.19 Serious Vulnerabilities in Linux Kernel Allow Remote DoS Attacks Securityweek

18.6.19

SACK TCP flaws can crash, slow down Linux-based systems

Net-security

18.6.19

Vulnerable TP-Link Wi-Fi extenders open to attack, patch now!

Net-security

18.6.19

AA19-168A : Microsoft Operating Systems BlueKeep Vulnerability

CERT

18.6.19 A free Decryptor tool for GandCrab Ransomware released

Securityaffairs

18.6.19 Florida Effort to Block Election Hacking Gets Extra $2M

Securityweek

18.6.19 Mirai Offspring "Echobot" Uses 26 Different Exploits

Securityweek

18.6.19 Android Apps Target Bitcoin, By-Passing 2FA

Securityweek

18.6.19 Researcher Scrapes and Posts 7 Million Venmo Transactions Securityweek
18.6.19 DHS Issues Alert for Windows 'BlueKeep' Vulnerability Securityweek
18.6.19 Microsoft Pushes Azure Users to Patch Linux Systems

Threatpost

18.6.19 Irked Researcher Discloses Facebook WordPress Plugin Flaws

Threatpost

18.6.19 5,000 Twitter Accounts Linked to Disinformation Campaigns

Threatpost

18.6.19 A Spate of University Breaches Highlight Email Threats in Higher Ed

Threatpost

18.6.19

Malspam with password-protected Word docs pushing Dridex

SANS

18.6.19

Why phishing education has never been more critical to your business

Net-security

18.6.19

One year of GDPR application: Europeans well aware of their digital rights

Net-security

18.6.19

Researchers develop app to detect Twitter bots in any language

Net-security

18.6.19

How employees and their organizations are prioritizing data privacy

Net-security

18.6.19

Economic cycles and disruption are where top CFOs set their firms apart from the competition

Net-security

17.6.19

NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid

Securityaffairs

17.6.19

New phishing campaign targets bank customers with WSH RAT

Securityaffairs

17.6.19

From Targeted Attack to Untargeted Attack

Securityaffairs

17.6.19

Decryptor Released for Latest GandCrab Ransomware Variants

Securityweek

17.6.19

Push Technology Used in Mobile Attacks

Securityweek

17.6.19

Federal Agencies Still Using Knowledge-Based Identity Verification

Securityweek

17.6.19

U.S. Planted Powerful Malware in Russia's Power Grid: Report

Securityweek

17.6.19

Hackers Target Recent Vulnerability in Exim Mail Server Securityweek

17.6.19

Release of GandCrab 5.2 Decryptor Ends a Bad Ransomware Story

Bleepingcomputer

17.6.19

Microsoft Warns about Worm Attacking Exim Servers on Azure

Bleepingcomputer

17.6.19

Phishing Scam Asks You to Login to Read Encrypted Message

Bleepingcomputer

17.6.19

Bella Thorne Tweets Her Nude Photos After Threats From Hacker

Bleepingcomputer

17.6.19

Windows 10: The Upcoming Features and Improvements in 20H1

Bleepingcomputer

17.6.19

Google Chrome Canary Flag Makes The Browser a Colorful Mess

Bleepingcomputer

17.6.19

Three U.S. Universities Disclose Data Breaches Over Two-Day Span

Bleepingcomputer

17.6.19

Web-based DNA sequencers getting compromised through old, unpatched flaw

Net-security

17.6.19

Hacker is targeting DNA sequencer applications from Iranian IP address

Securityaffairs

17.6.19

Bella Thorne published her private nude photos before a hacker that was threatening her

Securityaffairs

17.6.19

New Echobot Botnet targets Oracle, VMware Apps and includes 26 Exploits

Securityaffairs

17.6.19

Linux worm spreading via Exim servers hit Azure customers

Securityaffairs

17.6.19

An infection from Rig exploit kit

SANS

17.6.19

What does runtime container security really mean?

Net-security

17.6.19

Are U.S. companies overpaying to attract new talent?

Net-security

17.6.19

Appliance upgrades and excessive network latency delaying Office 365 deployments

Net-security

17.6.19

New EU-funded project aims to disrupt wildlife cybercrime

CyberCrime

Net-security

17.6.19

Human error still the cause of many data breaches

Incindent

Net-security

17.6.19

Worldwide IoT spending forecast to reach $726 billion this year

IoT

Net-security

16.6.19

PYLOCKY DECRYPTOR

Anti-Ransom Tool

Anti-Ransom Tool

16.6.19

New Android Trojan Leads Users to Scam Sites via Notifications

Android

Bleepingcomputer

16.6.19

New WSH RAT Malware Targets Bank Customers with Keyloggers

Virus

Bleepingcomputer

16.6.19

Echobot Botnet Spreads via 26 Exploits, Targets Oracle, VMware Apps

BotNet

Bleepingcomputer

16.6.19

Exposed Docker APIs Abused by DDoS, Cryptojacking Botnet Malware

Cryptocurrency

Bleepingcomputer

16.6.19

AVG Password Protection Blocked Firefox's Access to Saved Passwords

Safety

Bleepingcomputer

16.6.19

Chrome 76 Beta Allows Sites to Use Your OS Dark Mode Settings

OS

Bleepingcomputer

16.6.19

Hackers Infect Businesses with CryptoMiners Using NSA Leaked Tools

Cryptocurrency

Bleepingcomputer

16.6.19

Twitter URLs Can Be Manipulated to Spread Fake News and Scams

Social

Bleepingcomputer

16.6.19

pyLocky Decryptor Released by French Authorities

Ransomware

Bleepingcomputer

16.6.19

Critical Bug in Infusion System Allows Changing Drug Dose in Medical Pumps

Vulnerebility

Bleepingcomputer

16.6.19

Millions of Exim Mail Servers Are Currently Being Attacked

Attack

Bleepingcomputer

16.6.19

Some YubiKey FIPS Keys Allow Attackers to Reconstruct Private Keys

Attack

Bleepingcomputer

16.6.19

Cisco IOS XE Software Receives Fix Against High-Severity Flaw

Vulnerebility

Bleepingcomputer

16.6.19

Windows Subsystem for Linux 2 (WSL 2) Released to Insiders

OS

Bleepingcomputer

16.6.19

Ramson News

Ransom

Ransom

16.6.19

XSS flaw would have allowed hackers access to Google’s network and impersonate its employees

Hacking

Securityaffairs

16.6.19

Crooks exploit exposed Docker APIs to build AESDDoS botnet

BotNet

Securityaffairs

15.6.19

Application Protection Report 2019, Episode 3: Web

Security blog

F5 Labs

15.6.19

Injection Attacks Get Meaner

Hacking blog

F5 Labs

15.6.19

What Are Security Controls?

Security blog

F5 Labs

15.6.19

What To Do When Your Company Tells You They're Making a Mobile App, Part 2

Security blog

F5 Labs

15.6.19

What To Do When Your Company Tells You They're Making a Mobile App, Part 1

Security blog

F5 Labs

15.6.19

Welcome to CISO to CISO 2.0

Security blog

F5 Labs

15.6.19

What is a DDoS Attack?

Attack blog

F5 Labs

15.6.19

Permission to Intrude: Hiring Hackers to Bolster Cyber Defenses

Cyber blog

F5 Labs

15.6.19

Regional Threat Perspectives: Canada

Cyber blog

F5 Labs

15.6.19

Shifting to DevSecOps Is as Much About Culture as Technology and Methodology

Security blog

F5 Labs

15.6.19

4 Areas Where Infosec Facts and Fiction Clash: Mind the Gap Pt. 3

Security blog

F5 Labs

15.6.19

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in April 2019

Security blog

F5 Labs

15.6.19

Putting Application Threat Intelligence Into Action

Security blog

F5 Labs

15.6.19

Regional Threat Perspectives: United States

Cyber blog

F5 Labs

15.6.19

Gozi Banking Trojan Pivots Towards Italian Banks in February and March

Malware blog

F5 Labs

15.6.19

Denial of Service Vulnerabilities Discovered in HTTP/2

Vulnerebility blog

F5 Labs

15.6.19

Hunting COM Objects (Part Two)

Security blog

FireEye

15.6.19

Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities

Vulnerebility blog

FireEye

15.6.19

Hunting COM Objects

Security blog

FireEye

15.6.19

Framing the Problem: Cyber Threats and Elections

Cyber blog

FireEye

15.6.19

Learning to Rank Strings Output for Speedier Malware Analysis

Malware blog

FireEye

15.6.19

Network of Social Media Accounts Impersonates U.S. Political Candidates, Leverages U.S. and Israeli Media in Support of Iranian Interests

Social blog

FireEye

15.6.19

Twitterbots: Anatomy of a Propaganda Campaign

Social blog

Symantec

15.6.19

Microsoft Patch Tuesday — June 2019: Vulnerability disclosures and Snort coverage

Vulnerebility blog

Cisco Talos

15.6.19

How Cisco Talos helped Howard County recover from a call center attack

Attack blog

Cisco Talos

15.6.19

Vulnerability Spotlight: Multiple vulnerabilities in Schneider Electric Modicon M580

Vulnerebility blog

Cisco Talos

15.6.19

It's alive: Threat actors cobble together open-source pieces into monstrous Frankenstein campaign

Cyber blog

Cisco Talos

15.6.19

Using Firepower to defend against encrypted RDP attacks like BlueKeep

Attack blog

Cisco Talos

15.6.19

10 years of virtual dynamite: A high-level retrospective of ATM malware

Malware blog

Cisco Talos

15.6.19

GDPR one year on: Most Europeans know at least some of their rights

Security blog

Eset

15.6.19

Spain’s top soccer league fined over its app’s ‘tactics’

Security blog

Eset

15.6.19

We Decide What You See: Remote Code Execution on a Major IPTV Platform

Vulnerebility blog

Checkpoint

15.6.19

French Authorities Release Free Decryptor for PyLocky Ransomware

Ransomware

Securityweek

15.6.19

Vulnerabilities Expose BD Infusion Therapy Devices to Attacks

Vulnerebility

Securityweek

15.6.19

Vulnerabilities in Thunderbird Email Client Allow Code Execution

Vulnerebility

Securityweek

15.6.19

Canadian City Loses $500,000 to Phishing Attack

Phishing

Securityweek

15.6.19

Hackers Behind 'Triton' Malware Target Electric Utilities in US, APAC

Virus

Securityweek

15.6.19

New API Changes How Ad Blockers Work in Chrome

Security

Securityweek

15.6.19

Amid Privacy Firestorm, Facebook Curbs Research Tool

Social

Securityweek

15.6.19

Ransomware: A Persistent Scourge Requiring Corporate Action Now

Ransomware

Threatpost

15.6.19

ThreatList: Ransomware Trojans Picking Up Steam in 2019

Ransomware

Threatpost

15.6.19

News Wrap: Amazon Privacy and Telegram DDoS Attack

Social

Threatpost

15.6.19

TRISIS Group, Known for Physical Destruction, Targets U.S. Electric Companies

BigBrothers

Threatpost

15.6.19

Xenotime threat actor now is targeting Electric Utilities in US and APAC

Security

Securityaffairs

14.6.19

Mozilla addressed flaws in Thunderbird that allow code execution

Vulnerebility

Securityaffairs

14.6.19

French authorities released the PyLocky decryptor for versions 1 and 2

Ransomware

Securityaffairs

14.6.19

Dissecting NanoCore Crimeware Attack Chain

Attack

Securityaffairs

14.6.19

High-Severity Cisco Flaw in IOS XE Enables Device Takeover

Vulnerebility

Threatpost

14.6.19

Telegram CEO Fingers China State Actors for DDoS Attack

Attack

Threatpost

14.6.19

Hackers Favor Weekdays for Attacks, Share Resources Often

Attack

Threatpost

14.6.19

Evernote Critical Flaw Opened Personal Data of Millions to Attack

Vulnerebility

Threatpost

14.6.19

Max-Severity Bug in Infusion Pump Gateway Puts Lives at Risk

Vulnerebility

Threatpost

14.6.19

Linux servers under attack via latest Exim flaw

Vulnerebility

Net-security

14.6.19

Vulnerabilities allow attackers to take over infusion pumps

Vulnerebility

Net-security

14.6.19

Windows 10 Insider Build 18917 Tests New Download Throttling Settings

OS

Bleepingcomputer

14.6.19

DDoS Attack on Telegram Messenger Leaves Users Hanging

Attack

Bleepingcomputer

14.6.19

Microsoft 365 Business Adds Granular Controls to Company Assets

IT

Bleepingcomputer

14.6.19

Windows 10 v1903, v1809 Updates Break Event Viewer Custom Views

Vulnerebility

Bleepingcomputer

14.6.19

Android’s Security Key Now Verifies Sign-Ins on iOS Devices

Android

Bleepingcomputer

14.6.19

Critical Flaw in Evernote Add-On Exposed Sensitive Data of Millions

Vulnerebility

Bleepingcomputer

14.6.19

Windows 10 v1903 Upgrade Blocked by USB Drives Partially Fixed

Vulnerebility

Bleepingcomputer

14.6.19

Intel Updates NUC BIOS, Raid Soft To Patch High Severity Bugs

Vulnerebility

Bleepingcomputer

14.6.19

Microsoft Releases Sysmon 10 With DNS Query Logging Feature

Vulnerebility

Bleepingcomputer

14.6.19

Bad Cert Vulnerability Can Bring Down Any Windows Server

Vulnerebility

Bleepingcomputer

14.6.19

MyBB Forum Patches Vulnerabilities That Allow Site Takeover

Vulnerebility

Bleepingcomputer

14.6.19

Apple’s New Windows 10 iCloud App Now Available in MS Store

Apple

Bleepingcomputer

14.6.19

The Official ISOs for Windows 10 20H1 Now Available

OS

Bleepingcomputer

14.6.19

Windows 10 April 2018 Update Support Ending in November 2019

Vulnerebility

Bleepingcomputer

14.6.19

Yubico is replacing for free YubiKey FIPS devices due to security weakness

Hacking

Securityaffairs

14.6.19

Millions of Exim mail servers are currently under attack

Attack

Securityaffairs

14.6.19

WAGO Industrial Switches affected by multiple flaws

ICS

Securityaffairs

14.6.19

Ransomware paralyzed production for at least a week at ASCO factories

Ransomware

Securityaffairs

14.6.19

Yubico Replacing YubiKey FIPS Devices Due to Security Issue

Virus

Securityweek

14.6.19

New Malware Lays P2P Network on Top of IPFS’

Virus

Securityweek

14.6.19

The Active Cyber Defense Bill is Back on the Table

Cyber

Securityweek

14.6.19

Surveillance-Savvy Hong Kong Protesters Go Digitally Dark

BigBrothers

Securityweek

14.6.19

Aircraft Parts Maker ASCO Severely Hit by Ransomware

Ransomware

Securityweek

14.6.19

Android’s Security Key Now Works with iOS Devices

Android

Securityweek

14.6.19

Critical Vulnerabilities Found in WAGO Industrial Switches

Vulnerebility

Securityweek

14.6.19

XSS Vulnerability Exposed Google Employees to Attacks

Vulnerebility

Securityweek

14.6.19

Blockchain Security Startup Fireblocks Emerges From Stealth With $16 Million in Funding

Cryptocurrency

Securityweek

14.6.19

Critical Flaw Reported in Popular Evernote Extension for Chrome Users

Vulnerebility

Thehackernews

14.6.19

Telegram Suffers 'Powerful DDoS Attack' From China During Hong Kong Protests

Attack

Thehackernews

14.6.19

A few Ghidra tips for IDA users, part 4 - function call graphs

Security

SANS

14.6.19

Organizations are advancing their efforts, investing in OT cybersecurity programs

Cyber

Net-security

14.6.19

Organizations need capabilities and practices to generate value from AI

Security

Net-security

14.6.19

The gaming community is a rising target for credential stuffing attacks

Attack

Net-security

14.6.19

5G subscriptions to reach 1.9 billion in 2024, critical IoT connections on the rise

IoT

Net-security

14.6.19

Significant trends are beginning to develop in the Government ID market

BigBrothers

Net-security

13.6.19

Microsoft Releases June 2019 Office Updates With Security Fixes

Vulnerebility

Bleepingcomputer

13.6.19

Microsoft Releases Windows 7 & 8.1 Cumulative Updates KB4503292 & KB4503276

Vulnerebility

Bleepingcomputer

13.6.19

Windows 10 June 2019 Cumulative Updates Released With Fixes

Vulnerebility

Bleepingcomputer

13.6.19

VIP WordPress Sites Currently Experiencing Availability Issues

Security

Bleepingcomputer

13.6.19

Microsoft's June 2019 Patch Tuesday Fixes 88 Vulnerabilities

Vulnerebility

Bleepingcomputer

13.6.19

Microsoft Blocks Some Bluetooth Devices Due to Security Risks

Security

Bleepingcomputer

13.6.19

Microsoft NTLM Flaws Expose All Windows Machines to RCE Attacks

Attack

Bleepingcomputer

13.6.19

RAMBleed Attack Can Steal Sensitive Data From Computer Memory

Attack

Bleepingcomputer

13.6.19

Adobe Releases Security Updates for Flash Player, ColdFusion, and Campaign

Vulnerebility

Bleepingcomputer

13.6.19

Radiohead Releases OK Computer Sessions After Hack, Won't Pay Ransom

Ransomware

Bleepingcomputer

13.6.19

Mozilla Makes Firefox its Own Brand Name, Releases New Logos

Security

Bleepingcomputer

13.6.19

Finding Windows Systems Affected by BlueKeep Remote Desktop Bug

Vulnerebility

Bleepingcomputer

13.6.19

Food Bank Hit By Ransomware, Needs Your Charity to Rebuild

Ransomware

Bleepingcomputer

13.6.19

WordPress Chat Plugin Bug Lets Hackers Inject Text, Steal Logs

Incindent

Bleepingcomputer

13.6.19

New Spam Campaign Controlled by Attackers via DNS TXT Records

Spam

Bleepingcomputer

13.6.19

Microsoft is Bringing Predictive Typing to All Windows 10 Apps

OS

Bleepingcomputer

13.6.19

FBI Issues Warning on ‘Secure’ Websites Used For Phishing

BigBrothers

Bleepingcomputer

13.6.19

'jesushelpme' Password Sums Up CyberSec Agency Security State

BigBrothers

Bleepingcomputer

13.6.19

MuddyWater Updates POWERSTATS Backdoor For Multi-Stage Attacks

APT

Bleepingcomputer

13.6.19

Gaming Site Emuparadise Suffered Data Breach of 1.1M Accounts

Incindent

Bleepingcomputer

13.6.19

RAMBleed Side-Channel Attack Exposes Privileged Memory

Attack

Threatpost

13.6.19

Linux Command-Line Editors Vulnerable to High-Severity Bug

Vulnerebility

Threatpost

13.6.19

New FormBook Dropper Harbors Obfuscation, Persistence

Security

Threatpost

13.6.19

Intel NUC Firmware Open to Privilege Escalation, DoS and Information Disclosure

Vulnerebility

Threatpost

13.6.19

Fishwrap Campaign Sways Social Media Users with Old News

Social

Threatpost

13.6.19

Data Breach Disclosed by Online Invitation Firm Evite

Incindent

Threatpost

13.6.19

Microsoft Patches Four Publicly-Known Vulnerabilities

Vulnerebility

Threatpost

13.6.19

Google Calendar Attacks Target Unwitting Mobile Users

Attack

Threatpost

13.6.19

Near-Ubiquitous Microsoft RCE Bugs Affect All Versions of Windows

Vulnerebility

Threatpost

13.6.19

Critical Adobe Flash, ColdFusion Vulnerabilities Patched

Vulnerebility

Threatpost

13.6.19

Troy Hunt Looks to Sell Have I Been Pwned

Incindent

Threatpost

13.6.19

Data Breach Exposes 100K U.S. Traveler Photos, License Plates

Incindent

Threatpost

13.6.19

Ransomware disrupts worldwide production for Belgian aircraft parts maker

Ransomware

Net-security

13.6.19

Evernote Chrome extension flaw could have allowed access to personal info

Vulnerebility

Net-security

13.6.19

Android's Built-in Security Key Now Works With iOS Devices For Secure Login

Android

Thehackernews

13.6.19

Massive DDos attack hit Telegram, company says most of junk traffic is from China

Attack

Securityaffairs

13.6.19

Flaw in Evernote Web Clipper for Chrome extension allows stealing data

Vulnerebility

Securityaffairs

13.6.19

Google expert disclosed details of an unpatched flaw in SymCrypt library

Vulnerebility

Securityaffairs

13.6.19

Majority of FTSE 250 Companies Expose Multiple Weaknesses to Internet: Analysis

Analysis

Securityweek

13.6.19

Cloud Visibility Firm Orca Security Emerges From Stealth Mode

Security

Securityweek

13.6.19

Senators Question FBI on Russian Hack of Voting Firm

BigBrothers

Securityweek

13.6.19

Telegram Hit by Cyber-attack, CEO Points to HK Protests, China

BigBrothers

Securityweek

13.6.19

What is "THAT" Address Doing on my Network

Security

SANS

13.6.19

GDPR implementation lessons can help with CCPA compliance

Privacy

Net-security

13.6.19

CISO do’s and don’ts for board reporting

Security

Net-security

13.6.19

Healthcare executives need to make cybersecurity a business priority

Security

Net-security

13.6.19

Code signing keys and certificates are crucial security assets, are you protecting them?

Security

Net-security

13.6.19

Personal security and national security concerns are back on the rise

Security

Net-security

13.6.19

Smart home security devices most at risk in IoT-targeted cyber attacks

IoT

Net-security

13.6.19

Whitepaper: Maturing a Threat Intelligence Program

Security

Net-security

12.6.19

Why cybercriminals are eyeing smart buildings

Cyber blog

Eset

12.6.19

Cyberattack exposes travelers’ photos, says US border agency

BigBrother blog

Eset

12.6.19

Critical bug found in popular mail server software

Vulnerebility blog

Eset

12.6.19

NSA joins chorus urging Windows users to patch ‘BlueKeep’

BigBrother blog

Eset

12.6.19

Wajam: From start-up to massively-spread adware

Malware blog

Eset

12.6.19

Hackers steal 19 years’ worth of data from a top Australian university

Incident blog

Eset

12.6.19

Over 2.3 billion files exposed online

Incident blog

Eset

12.6.19

The aftermath of a data breach: A personal story

Incident blog

Eset

12.6.19

A dive into Turla PowerShell usage

Malware blog

Eset

12.6.19

Microsoft Patches Critical Vulnerabilities in NTLM

Vulnerebility

Securityweek

12.6.19

Email Security Firm Vade Secure Raises $80 Million

IT

Securityweek

12.6.19

Awareness Training Firm CybeReady Opens U.S. Office With $5 Million Funding

IT

Securityweek

12.6.19

Flaw in Evernote Extension Allows Hackers to Steal Data

Vulnerebility

Securityweek

12.6.19

Security Awareness Training Firm KnowBe4 Raises $300 Million

IT

Securityweek

12.6.19

Malware Can Be Hidden in DICOM Medical Imaging Files, DHS Warns

Virus

Securityweek

12.6.19

Organizations Investing More in ICS Cyber Security: SANS Study

ICS

Securityweek

12.6.19

Microsoft Patches Privilege Escalation Flaws Disclosed by 'SandboxEscaper'

Vulnerebility

Securityweek

12.6.19

Facebook Launching App That Pays Users for Data on App Usage

Social

Securityweek

12.6.19

Radiohead Defies Hackers, Releases Trove of Stolen Music

Hacking

Securityweek

12.6.19

New RAMBleed Attack Allows Access to Sensitive Data in Memory

Attack

Securityweek

12.6.19

Microsegmentation Firm Edgewise Networks Raises $11 Million

IT

Securityweek

12.6.19

New Version of ShellTea Backdoor Used by FIN8 Hacking Group

Virus

Securityweek

12.6.19

RAMBleed attack

Papers

Papers

12.6.19

DDoS attacks in Q1 2019

Attack

Securelist

12.6.19

What kids get up to online

Security

Securelist

12.6.19

FIN8 Hacking Group is back with an improved version of the ShellTea Backdoor

CyberCrime

Securityaffairs

12.6.19

Radiohead releases a trove of stolen music in response to the hack

Hacking

Securityaffairs

12.6.19

RAMBleed, a new Side-Channel Attack that allows stealing sensitive data

Attack

Securityaffairs

12.6.19

Microsoft Patch Tuesday security updates for June 2019 fix 88 flaws

Vulnerebility

Securityaffairs

12.6.19

Adobe Patch Tuesday updates fix code execution issues in Campaign, ColdFusion, and Flash

Vulnerebility

Securityaffairs

12.6.19

Vulnerability in WordPress Live Chat Plugin allows to steal and hijack sessions

Vulnerebility

Securityaffairs

12.6.19

RAMBleed Attack – Flip Bits to Steal Sensitive Data from Computer Memory

Attack

Thehackernews

12.6.19

Microsoft Releases June 2019 Security Updates to Patch 88 Vulnerabilities

Vulnerebility

Thehackernews

12.6.19

The Cynet Free Visibility experience: Unmatched insight into IT assets and activities

Security

Net-security

12.6.19

Researchers devise RAMBleed attack to grab secret data from memory

Attack

Net-security

12.6.19

June 2019 Patch Tuesday: A little something for everybody

Vulnerebility

Net-security

12.6.19

First framework to score the agility of cyber attackers and defenders

Cyber

Net-security

12.6.19

MSFT June 2019 Patch Tuesday

Vulnerebility

SANS

12.6.19

Will self-driving cars represent a new mode for surveillance?

Security

Net-security

12.6.19

3.4 billion fake emails are sent around the world every day

Spam

Net-security

12.6.19

Vendor revenue in the worldwide server market increased to $19.8 billion in Q1 2019

IT

Net-security

12.6.19

Critical Microsoft NTLM vulnerabilities allow remote code execution on any Windows machine

Vulnerebility

Net-security

12.6.19

US border agency contractor breached, license plate and travelers’ photos stolen

BigBrothers

Net-security

11.6.19

Customs and Border Protection (CBP) confirms hack of a subcontractor

BigBrothers

Securityaffairs

11.6.19

How Ursnif Evolves to Keep Threatening Italy

Virus

Securityaffairs

11.6.19

FBI Warns of HTTPS Abuse in Phishing Campaigns

Phishing

Securityweek

11.6.19

Microsoft Pushing for a Passwordless Windows 10

OS

Securityweek

11.6.19

Adobe Patches Code Execution Flaws in Flash, ColdFusion, Campaign

Vulnerebility

Securityweek

11.6.19

Tool Links Internet-Exposed ICS to Google Street View

ICS

Securityweek

11.6.19

Artificial Intelligence Threat Detection Firm Vectra Raises $100 Million

Security

Securityweek

11.6.19

Critical Vulnerability Exposes Oil Tank Monitoring Devices to Attacks

Vulnerebility

Securityweek

11.6.19

Adobe Issues Critical Patches for ColdFusion, Flash Player, Campaign Software

Vulnerebility

Thehackernews

11.6.19

New Flaw in WordPress Live Chat Plugin Lets Hackers Steal and Hijack Sessions

Vulnerebility

Thehackernews

11.6.19

VLC Player Gets Patched for Two High-Severity Bugs

Vulnerebility

Threatpost

11.6.19

Mozilla Confirms Premium Firefox Browser With Security Features

Security

Threatpost

11.6.19

WordPress Sites Worldwide Hit with ‘Call-Girl’ Search-Engine Pollution

Security

Threatpost

11.6.19

How to Model Risk in an Apex Predator Cyber-World

Cyber

Threatpost

11.6.19

Microsoft Warns of Email Attacks Executing Code Using an Old Bug

Vulnerebility

Threatpost

11.6.19

MuddyWater APT group updated its multi-stage PowerShell backdoor Powerstats

APT

Securityaffairs

11.6.19

CVE-2019-2725 Oracle WebLogic flaw exploited in cryptojacking campaign

Vulnerebility

Securityaffairs

11.6.19

CVE-2019-12735 – opening a specially crafted file in Vim or Neovim Editor could compromise your Linux system

Vulnerebility

Securityaffairs

11.6.19

Your Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor

Hacking

Thehackernews

11.6.19

Huawei Denies Being Bound by Chinese Spy Laws

BigBrothers

Securityweek

11.6.19

Customs Says Hack Exposed Traveler, License Plate Images

Hacking

Securityweek

11.6.19

"MuddyWater" Cyberspies Update PowerShell Backdoor

CyberSpy

Securityweek

11.6.19

Europe’s online economy risks losing €57 billion as SCA is enforced

Security

Net-security

11.6.19

Hackproofing smart meters and boosting smart grid security

Security

Net-security

11.6.19

Analytics and automation solutions to help contact center IT staff ensure compliance

Security

Net-security

11.6.19

Lack of visibility and IT staff availability: The main challenges of enterprise decentralization

Security

Net-security

10.6.19

Shanghai Jiao Tong University data leak – 8.4TB in email metadata exposed

Incindent

Securityaffairs

10.6.19

CIA sextortion campaign, analysis of a well-organized scam

BigBrothers

Securityaffairs

10.6.19

Retro video game website Emuparadise suffered a data breach

Incindent

Securityaffairs

10.6.19

Spain extradites 94 Taiwanese to China phone and online fraud charges

CyberCrime

Securityaffairs

10.6.19

Critical Oracle WebLogic Vulnerability Exploited in Attacks

Vulnerebility

Securityweek

10.6.19

GoldBrute Botnet Brute-Force Attacking RDP Servers

BotNet

Securityweek

10.6.19

The Dark Net, a Major Threat but Also a Resource

Security

Securityweek

10.6.19

China Telecom Routes European Traffic to Its Network for Two Hours

BigBrothers

Securityweek

10.6.19

Interesting JavaScript Obfuscation Example

Virus

SANS

10.6.19

How human bias impacts cybersecurity decision making

Cyber

Net-security

10.6.19

Malware peddlers hit Office users with old but reliable exploit

Virus

Net-security

10.6.19

Sysmon Getting DNS Query Logging with Querying Process Name

Security

Bleepingcomputer

10.6.19

VLC 3.0.7 is Biggest Security Release Due to EU Bounty Program

Security

Bleepingcomputer

10.6.19

Google Chrome 75 Has a Working Tab Hover Card Feature

Security

Bleepingcomputer

10.6.19

New Extortion Scam Threatens to Ruin a Website's Reputation

Spam

Bleepingcomputer

10.6.19

China Routed Traffic from European Carriers for Two Hours

BigBrothers

Bleepingcomputer

10.6.19

Quest, LabCorp, AMCA Sued For Breach Impacting Over 19 Million

Incindent

Bleepingcomputer

10.6.19

Microsoft Issues Warning on Spam Campaign Using Office Exploits

Spam

Bleepingcomputer

10.6.19

Nine Major VPNs Could Get Blocked by Russia in 30 Days

Security

Bleepingcomputer

10.6.19

Google Search Ads Infiltrated Again by Tech Support Scams

Spam

Bleepingcomputer

10.6.19

Man Gets 51 Months in Prison for $10M BEC Fraud, Romance Scam

Spam

Bleepingcomputer

10.6.19

Microsoft warns of spam campaign exploiting CVE-2017-11882 flaw

Vulnerebility

Securityaffairs

10.6.19

Millions of Exim mail servers vulnerable to cyber attacks

Vulnerebility

Securityaffairs

10.6.19

Critical RCE affects older Diebold Nixdorf ATMs

Security

Securityaffairs

10.6.19

Facebook is going to stop Huawei pre-installing apps on mobile devices

Social

Securityaffairs

10.6.19

Hunting the ICEFOG APT group after years of silence

APT

Securityaffairs

10.6.19

Tip: Sysmon Will Log DNS Queries

Security

SANS

10.6.19

Is there a weak link in blockchain security?

Cryptocurrency

Net-security

10.6.19

New user keystroke impersonation attack uses AI to evade detection

Attack

Net-security

10.6.19

Most e-commerce websites running Magento at high risk of cybercrime

Security

Net-security

10.6.19

There’s a significant disconnect between DevOps capabilities and DevSecOps readiness

Security

Net-security

9.6.19

Ransom News

Ransom

Ransom

9.6.19

Google Chrome to Limit Referer Header Size to Block Attacks

Attack

Bleepingcomputer

9.6.19

New Windows 10 Zero-Day Bug Emerges From Bypassing Patched Flaw

Vulnerebility

Bleepingcomputer

9.6.19

Windows 10 1903 Now Available to Everyone Via Manual Update

Vulnerebility

Bleepingcomputer

9.6.19

Internet Explorer Mode Now Works in Microsoft Edge Dev Builds

Security

Bleepingcomputer

9.6.19

Google Chrome is Getting Closer to Working Tab Groups

Security

Bleepingcomputer

9.6.19

Tech Art Piece Delivers Quick Fix For Social Following Hoarders

Social

Bleepingcomputer

9.6.19

New GoldBrute Botnet is Trying to Hack 1.5 Million RDP Servers

BotNet

Bleepingcomputer

9.6.19

Three Hidden Features Found in Next Windows 10 Version

Vulnerebility

Bleepingcomputer

9.6.19

Phishing Email Warns: Add Recovery Number or Account Deleted

Phishing

Bleepingcomputer

9.6.19

Millions of Exim Mail Servers Exposed to Local, Remote Attacks

Incindent

Bleepingcomputer

9.6.19

Bug Breaks Internet Explorer 11 on Some Windows 10 Versions

Vulnerebility

Bleepingcomputer

9.6.19

Over 400,000 Opko Health Clients Impacted by AMCA Data Breach

Incindent

Bleepingcomputer

9.6.19

Microsoft Warns Against Bypassing Office 365 Spam Filters

Spam

Bleepingcomputer

9.6.19

Another Hacker Selling Access to Charity, Antivirus Firm Networks

IT

Bleepingcomputer

9.6.19

The MuddyWater APT Group Adds New Tools to Their Arsenal

APT

Bleepingcomputer

9.6.19

The RIG Exploit Kit is Now Pushing the Buran Ransomware

Ransomware

Bleepingcomputer

8.6.19

German intelligence agencies could hack servers

BigBrothers

Securityaffairs

8.6.19

Hunting the ICEFOG APT group after years of silence

APT

Securityaffairs

8.6.19

Recently a large chunk of European mobile traffic was rerouted through China Telecom

BigBrothers

Securityaffairs

8.6.19

Frankenstein campaign: threat actors put together open-source tools for highly-targeted attacks

CyberCrime

Securityaffairs

8.6.19

Critical Flaws in Amcrest HDSeries Camera Allow Complete Takeover

Vulnerebility

Threatpost

8.6.19

Forget BlueKeep: Beware the GoldBrute

Vulnerebility

Threatpost

8.6.19

SandboxEscaper Debuts ByeBear Windows Patch Bypass

Vulnerebility

Threatpost

8.6.19

News Wrap: Infosecurity Europe Highlights and BlueKeep Anxiety

Security

Threatpost

8.6.19

Threatlist: Targeted Espionage-as-a-Service Takes Hold on the Dark Web

CyberSpy

Threatpost

8.6.19

Troy Hunt: ‘Messy’ Password Problem Isn’t Getting Better

Security

Threatpost

8.6.19

Facebook to Cut off Huawei to Comply With U.S. Sanctions

Social

Securityweek

8.6.19

Spain Extradites 94 Taiwanese to China on Phone Scam Charges

CyberCrime

Securityweek

8.6.19

Attackers Piece Together Malicious Tools Used for Targeted Attacks

Virus

Securityweek

8.6.19

Hacker Discloses Second Zero-Day to Bypass Patch for Windows EoP Flaw

Vulnerebility

Thehackernews

8.6.19

New Brute-Force Botnet Targeting Over 1.5 Million RDP Servers Worldwide

BotNet

Thehackernews

8.6.19

Fort Worth IT Professionals Fired for Reporting Cybersecurity Issues: What We Know

Cyber

Securityaffairs

8.6.19

SandboxEscaper releases Byebear exploit to bypass patched EoP flaw

Exploit

Securityaffairs

8.6.19

Crooks stole about $10 million from GateHub cryptocurrency wallet service

Cryptocurrency

Securityaffairs

8.6.19

New GoldBrute Botnet is attempting to infect 1.5 Million RDP Servers

BotNet

Securityaffairs

8.6.19

Cryptocurrency startup Komodo hacks itself to protect its users’ funds from hackers

Cryptocurrency

Securityaffairs

8.6.19

Keep an Eye on Your WMI Logs

Safety

SANS

8.6.19

Two-thirds of iOS apps don’t use App Transport Security

Apple

Net-security

7.6.19

June Patch Tuesday forecast: Apply updates before BlueKeep hits the streets

Vulnerebility

Net-security

7.6.19

Critical Exim flaw exploitable locally and remotely, patch ASAP!

Vulnerebility

Net-security

7.6.19

Criminals are selling hacking services targeting world’s biggest companies

CyberCrime

Net-security

7.6.19

Global communications service providers struggling to fend off growing number of DDoS attacks

Attack

Net-security

7.6.19

Industrial cybersecurity strategies need a radical rethink and should be built from the ground up

Cyber

Net-security

7.6.19

Tor Browser 8.5.1 Released With WebGL Fingerprinting Fix

Vulnerebility

Bleepingcomputer

7.6.19

Cisco Fixes High Severity Flaws in Industrial, Enterprise Tools

Vulnerebility

Bleepingcomputer

7.6.19

LibreOffice Will No Longer Provide 32-bit Linux Binaries

IT

Bleepingcomputer

7.6.19

Windows 10 Insider Build 18912 Fixes win32k.sys GSOD Crashes

Vulnerebility

Bleepingcomputer

7.6.19

Fake Cryptocurrency Trading Site Pushes Crypto Stealing Malware

Cryptocurrency

Bleepingcomputer

7.6.19

Phishing Kits Add More Vulnerabilities to Hacked Servers

Phishing

Bleepingcomputer

7.6.19

Scattered Canary Evolves From One-Man Operation to BEC Giant

Spam

Bleepingcomputer

7.6.19

MetaSploit Module Created for BlueKeep Flaw, Private for Now

Vulnerebility

Bleepingcomputer

7.6.19

Microsoft Asking for Feedback on the Windows 10 Start Menu

OS

Bleepingcomputer

7.6.19

Chrome 75 Released with 42 Security Fixes and New Features

Security

Bleepingcomputer

7.6.19

New Privacy Features for Mozilla Firefox, Lockwise Is Live

Privacy

Bleepingcomputer

7.6.19

Attackers Stitch Together Frankenstein Campaign Using Free Tools

CyberCrime

Bleepingcomputer

7.6.19

Remote Desktop Zero-Day Bug Allows Attackers to Hijack Sessions

Vulnerebility

Bleepingcomputer

7.6.19

Private Info of Over 1.5M Donors Exposed by UChicago Medicine

Incindent

Bleepingcomputer

7.6.19

Romanian ATM Skimmer Gets Over 5 Years of Jail Time

CyberCrime

Bleepingcomputer

7.6.19

BlackSquid Uses 7 Exploits to Infect Web Servers with Miners

Exploit

Bleepingcomputer

7.6.19

AMCA Healthcare Hack Widens Again, Reaching 20.1M Victims

Incindent

Threatpost

7.6.19

High-Severity Bug in Cisco Industrial Enterprise Tool Allows RCE

Vulnerebility

Threatpost

7.6.19

Streaming Video Fans Open to TV Hijacking

Hacking

Threatpost

7.6.19

Help Keep Data and Systems Safe with Access Rights Manager (ARM)

Security

Threatpost

7.6.19

Tor Project released Tor Browser 8.5.1 for Windows, Mac, Linux, and Android

Security

Securityaffairs

7.6.19

VMware addressed flaws in its Workstation and Tools

Vulnerebility

Securityaffairs

7.6.19

Remote code execution flaw in Ministra IPTV Platform exposes user data and more

Vulnerebility

Securityaffairs

7.6.19

OMB Publishes Memorandum on U.S. Federal Data Strategy

BigBrothers

Securityweek

7.6.19

Rail System Cybersecurity Firm Cylus Raises $12 Million

IT

Securityweek

7.6.19

Many iOS Developers Don’t Use Encryption: Report

Apple

Securityweek

7.6.19

Cisco to Acquire OT Security Firm Sentryo

IT

Securityweek

7.6.19

VMware Patches Vulnerabilities in Tools, Workstation

Vulnerebility

Securityweek

7.6.19

GoldBrute Botnet Brute Forcing 1.5 Million RDP Servers

BotNet

SANS

7.6.19

Poor data management can cost organizations $20 million each year

Security

Net-security

7.6.19

Workforce diversity key to plugging the IT skills gap

Security

Net-security

6.6.19

IoT Security Regulation is on the Horizon

IoT

Threatpost

6.6.19

440 Million Android Users Plagued By Extremely Obnoxious Pop-Ups

Android

Threatpost

6.6.19

Streaming Video Fans Open to TV Hijacking

Hacking

Threatpost

6.6.19

Help Keep Data and Systems Safe with Access Rights Manager (ARM)

IT

Threatpost

6.6.19

Mozilla and Google Browsers Get Security, Anti-Tracking Boosts

Safety

Threatpost

6.6.19

Cisco disclosed several flaws in Cisco Industrial Network Director

Vulnerebility

Securityaffairs

6.6.19

Platinum APT and leverages steganography to hide C2 communications

APT

Securityaffairs

6.6.19

Analyzing the APT34’s Jason project

APT

Securityaffairs

6.6.19

0patch experts released unofficial Patch Available for Recent Windows 10 Task Scheduler Zero-Day

Vulnerebility

Securityaffairs

6.6.19

macOS Catalina Brings Several Security Improvements

Apple

Securityweek

6.6.19

Elastic to Acquire Endpoint Security Firm Endgame for $243 Million

IT

Securityweek

6.6.19

Cryptocurrency Firm Itself Hacked Its Customers to Protect Their Funds From Hackers

Cryptocurrency

Thehackernews

6.6.19

Critical Flaws Found in Widely Used IPTV Software for Online Streaming Services

Vulnerebility

Thehackernews

6.6.19

Several Vulnerabilities Found in Cisco Industrial Network Director

Vulnerebility

Securityweek

6.6.19

Platinum Hackers Use Steganography to Mask C&C Communications

CyberCrime

Securityweek

6.6.19

Critical Vulnerabilities Lead to Account Takeover in Major IPTV Streamer

Vulnerebility

Securityweek

6.6.19

Russia Effort in 2016 US Election Was 'Vast,' 'Professional'

BigBrothers

Securityweek

6.6.19

BlueKeep ‘Mega-Worm’ Looms as Fresh PoC Shows Full System Takeover

Virus

Threatpost

6.6.19

Newly-Identified BEC Cybergang Targets U.S. Enterprise Victims

BigBrothers

Threatpost

6.6.19

Why Election Trust is Dwindling in a Post-Cambridge Analytica World

Security

Threatpost

6.6.19

Buggy Phishing Kits Allow Criminals to Cannibalize Their Own

Phishing

Threatpost

6.6.19

Mozilla and Google Browsers Get Security, Anti-Tracking Boosts

Security

Threatpost

6.6.19

Infosecurity Europe: Easing the Clash Between IT and OT

Security

Threatpost

6.6.19

Getting (proper) value out of security assessments

Security

SANS

6.6.19

Trust nothing: A life in infosec is a life of suspicion

Security

Net-security

6.6.19

An intelligence-driven approach to cyber threats

Security

Net-security

6.6.19

How privileged insiders threaten the security of global organizations

Security

Net-security

6.6.19

Will biometrics replace passwords for online payment authentication?

Security

Net-security

6.6.19

How much do you know about your invisible workforce?

Security

Net-security

5.6.19

Older Windows 10 Versions Get Intel Microcode Updates for MDS Vulns

Vulnerebility

Bleepingcomputer

5.6.19

Windows 10 to Require 32GB of Storage Only on New OEM PCs

OS

Bleepingcomputer

5.6.19

New Email Hacking Tool from OilRig APT Group Leaked Online

Hacking

Bleepingcomputer

5.6.19

Headhunting Firm Leaks Millions of Resumes, Client Private Data

Incindent

Bleepingcomputer

5.6.19

Improper App Check Revives the Synthetic Clicks Issue in macOS Mojave

Apple

Bleepingcomputer

5.6.19

Windows 10 Apps Hit by Malicious Ads that Blockers Won't Stop

OS

Bleepingcomputer

5.6.19

Billing Details for 11.9M Quest Diagnostics Clients Exposed

Incindent

Bleepingcomputer

5.6.19

Microsoft Outlines Their Vision of a Modern Operating System

OS

Bleepingcomputer

5.6.19

Google Outage in Eastern U.S. Affecting Gmail, YouTube, and More

IT

Bleepingcomputer

5.6.19

How to Download a Windows 10 ISO By Impersonating Other Devices

OS

Bleepingcomputer

5.6.19

New Phishing Scam Asks You to Manage Your Undelivered Email

Phishing

Bleepingcomputer

5.6.19

Chrome Ad Blockers To Get Full API Access via Free Enterprise Policies

Safety

Bleepingcomputer

5.6.19

NSA urges Windows Users and admins to Patch BlueKeep flaw

Vulnerebility

Securityaffairs

5.6.19

Tens of Million patients impacted by the AMCA data breach

Incindent

Securityaffairs

5.6.19

Unofficial Patch Available for Recent Windows 10 Task Scheduler Zero-Day

Vulnerebility

Securityweek

5.6.19

Ransomware Attack Costs Norsk Hydro Tens of Millions of Dollars

Ransomware

Securityweek

5.6.19

Vietnam Cyber Threat: Government-Linked Hackers Ramping Up Attacks

Cyber

Securityweek

5.6.19

Endpoint Security Firm SentinelOne Raises $120 Million

IT

Securityweek

5.6.19

NSA Urges Windows Users to Patch 'BlueKeep' Vulnerability

Vulnerebility

Securityweek

5.6.19

Inside the Operations of a West African Cybercrime Group

CyberCrime

Securityweek

5.6.19

How Deception Technology Can Defend Networks and Disrupt Attackers

Safety

Securityweek

5.6.19

Spam and phishing in Q1 2019

Analysis  Spam

Securelist

5.6.19

Platinum is back

CyberCrime

Securelist

5.6.19

The Australian National University suffered a major, sophisticated attack

Attack

Securityaffairs

5.6.19

Expert developed a MetaSploit module for the BlueKeep flaw

Vulnerebility

Securityaffairs

5.6.19

BlackSquid malware uses multiple exploits to drop cryptocurrency miners

Cryptocurrency

Securityaffairs

5.6.19

CVE-2019-9510 flaw allows hackers to bypass Windows lock screen on RDP sessions

Vulnerebility

Securityaffairs

5.6.19

LabCorp Says 7.7 Million Patients Caught in AMCA Data Breach

Incindent

Securityweek

5.6.19

Source Code of New Iran-Linked Hacking Tool Posted Online

BigBrothers

Securityweek

5.6.19

NVIDIA Patches Command Execution Vulnerability in GeForce Experience

Vulnerebility

Securityweek

5.6.19

Hackers Can Bypass Windows Lockscreen on Remote Desktop Sessions

Hacking

Securityweek

5.6.19

Unpatched Bug Let Attackers Bypass Windows Lock Screen On RDP Sessions

Vulnerebility

Thehackernews

5.6.19

Firefox Web Browser Now Blocks Third-Party Tracking Cookies By Default

Security

Thehackernews

5.6.19

Is ‘Sign in with Apple’ Marketing Spin or Privacy Magic? Experts Weigh In

Privacy

Threatpost

5.6.19

Zero-Day No More: Windows Bug Gets a Fix

Vulnerebility

Threatpost

5.6.19

Zebrocy: A Russian APT Specializing in Victim Profiling, Access

APT

Threatpost

5.6.19

ISC snapshot: r-cyber with rud.is

Cyber

SANS

5.6.19

Advancing transparency and accountability in the cybersecurity industry

Cyber

Net-security

5.6.19

Embrace chaos to improve cloud infrastructure resilience

Security

Net-security

5.6.19

2018 in numbers: Data breaches cost $654 billion, expose 2.8 billion data records in the U.S.

Incindent

Net-security

5.6.19

Despite disclosure laws, cybercrime may be widely underreported

Cyber

Net-security

5.6.19

Unclassified data creates security blind spots for most companies

Security

Net-security

4.6.19

OilRig’s Jason email hacking tool leaked online

Hacking

Securityaffairs

4.6.19

A month later Gamaredon is still active in Eastern Europe

BigBrothers

Securityaffairs

4.6.19

macOS zero-day in Mojave could allow Synthetic Clicks attacks

Apple

Securityaffairs

4.6.19

Australian teenager hacked into Apple twice for a job

Apple

Securityaffairs

4.6.19

Apple Launches Privacy-Focused 'Sign in with Apple ID' Feature at WWDC 2019

Apple

Thehackernews

4.6.19

Top Russian Internet Firm Reportedly Under Pressure on Data

BigBrothers

Securityweek

4.6.19

Kaspersky Announces New Branding, Mission Statement

IT

Securityweek

4.6.19

Imperva to Buy Bot Detection Firm Distil Networks

IT

Securityweek

4.6.19

Aussie Police Raid Journalist's Home Over Secret Spying Report

BigBrothers

Securityweek

4.6.19

Privilege Escalation Vulnerability Found in Rapid7 InsightIDR

Vulnerebility

Securityweek

4.6.19

Apple Unveils Privacy-Focused Authentication System

Apple

Securityweek

4.6.19

Top Australian University Reports Vast, 'Sophisticated' Hack

BigBrothers

Securityweek

4.6.19

Inside GCHQ's Proposed Backdoor Into End-to-End Encryption

BigBrothers

Securityweek

4.6.19

Tap ‘n Ghost Attack Creatively Targets Android Devices

Android

Threatpost

4.6.19

AI Isn’t Good Enough When Lives Are on the Line, Experts Warn

Security

Threatpost

4.6.19

A New Approach for Combating Insider Threats

Cyber

Threatpost

4.6.19

Infosecurity Europe: Cryptojacking is Making a Comeback

Cryptocurrency

Threatpost

4.6.19

Smart-TV Bug Allows Rogue Broadcasts

Vulnerebility

Threatpost

4.6.19

GandCrab Ransomware Shutters Its Operations

Ransomware

Threatpost

4.6.19

Tip: BASE64 Encoded PowerShell Scripts are Recognizable by the Amount of Letter As

Virus

SANS

4.6.19

Apple debuts privacy-minded “Sign in with Apple” SSO

Apple

Net-security

4.6.19

Nearly 12 million Quest Diagnostics patients affected by data breach

Incindent

Net-security

4.6.19

Is your private equity firm exposed to these hidden IT risks?

Incindent

Net-security

4.6.19

Hack The Sea: Bridging the gap between hackers and the maritime sector

Hacking

Net-security

4.6.19

Is AI fundamental to the future of cybersecurity?

Cyber

Net-security

4.6.19

How organizations are managing vulnerability risks

Vulnerebility

Net-security

4.6.19

Qualys at Infosecurity Europe 2019: Hear best practices from industry leaders

Security

Net-security

3.6.19

AMCA Breach Hits 12 Million Quest Diagnostics Patients

Incindent

Securityweek

3.6.19

GandCrab Ransomware Authors Announce Shut Down

Ransomware

Securityweek

3.6.19

New Attack Targets the Touchscreen of Smartphones, Researchers Reveal

Mobil

Securityweek

3.6.19

Lab Testing Firm Eurofins Scientific Hit by Ransomware

Ransomware

Securityweek

3.6.19

macOS 0-Day Flaw Lets Hackers Bypass Security Features With Synthetic Clicks

Apple

Thehackernews

3.6.19

5G Security Challenges: A Vendor’s POV

Mobil

Threatpost

3.6.19

MacOS Zero-Day Allows Trusted Apps to Run Malicious Code

Apple

Threatpost

3.6.19

Zebrocy’s Multilanguage Malware Salad

Virus

Securelist

3.6.19

Gaining Root Access to Host through rkt Container hack

Hacking

Securityaffairs

3.6.19

Expert shows how to Hack a Supra Smart Cloud TV

Hacking

Securityaffairs

3.6.19

Google is taking action on deceptive installation tactics for Chrome Browser Extensions

Security

Securityaffairs

3.6.19

Google outages in Eastern US affected Gmail, G-Suite, YouTube, and more

Security

Securityaffairs

3.6.19

Serious Vulnerabilities Found in Kace K1000 Appliance

Vulnerebility

Securityweek

3.6.19

Hackers Can Bypass macOS Security Features With Synthetic Clicks

Apple

Securityweek

3.6.19

rkt Container Runtime Flaws Give Root Access to Host

Virus

Securityweek

3.6.19

SUPRA Smart TV Flaw Lets Attackers Hijack Screens With Any Video

Vulnerebility

Thehackernews

3.6.19

Hackers Stole Customers' Credit Cards from 103 Checkers and Rally's Restaurants

Incindent

Thehackernews

3.6.19

Threat actors abuse Microsoft Azure to Host Malware and C2 Servers

Virus

Securityaffairs

3.6.19

Leicester City Football Club disclosed a card breach

Incindent

Securityaffairs

3.6.19

ProtonMail denies that it spies on users for government agencies

CyberSpy

Securityaffairs

3.6.19

ESET analyzes Turla APT’s usage of weaponized PowerShell

APT

Securityaffairs

3.6.19

GandCrab operators are shutting down their operations

Ransomware

Securityaffairs

3.6.19

Apple updates address SQLite, WebKit issues in iTunes and iCloud for Windows

Apple

Securityaffairs

3.6.19

Cryptojacking campaign uses Shodan to scan for Docker hosts to hack

Cryptocurrency

Securityaffairs

3.6.19

How likely are weaponized cars?

Security

Net-security

3.6.19

Why zero trust is crucial to compliance

Security

Net-security

3.6.19

Growing reliance on open source libraries leaves many companies vulnerable

Vulnerebility

Net-security

3.6.19

Cloud migration journey is more complex than anticipated for innovation and efficiency

Security

Net-security

2.6.19

RansomNews

Ransom

Ransom

2.6.19

Microsoft Azure Being Used to Host Malware and C2 Servers

Virus

Bleepingcomputer

2.6.19

GandCrab Ransomware Shutting Down After Claiming to Earn $2.5 Billion

Ransomware

Bleepingcomputer

2.6.19

The Facebook CTF 2019 Event is Starting in 30 Minutes

Social

Bleepingcomputer

2.6.19

Maze Ransomware Says Computer Type Determines Ransom Amount

Ransomware

Bleepingcomputer

2.6.19

NVIDIA Fixes High Severity GeForce Experience Vulnerabilities

Vulnerebility

Bleepingcomputer

2.6.19

Sodinokibi Ransomware Pushed via Foreclosure Warning Spam

Ransomware

Bleepingcomputer

2.6.19

Citrix Sued For Not Securing Employee Info Before Data Breach

Incindent

Bleepingcomputer

2.6.19

Zero-Day Flaw in Windows 10 Task Scheduler Gets Micropatch

Vulnerebility

Bleepingcomputer

2.6.19

85.4GB Database Exposes Hotels' Internal Security Information

Incindent

Bleepingcomputer

2.6.19

Microsoft Warns Users Again to Patch Wormable BlueKeep Flaw

Vulnerebility

Bleepingcomputer

2.6.19

Phishing Email States Your Office 365 Account Will Be Deleted

Phishing

Bleepingcomputer

2.6.19

Windows 10 v1903 Upgrade Blocked Due to Some Intel Drivers

Vulnerebility

Bleepingcomputer

1.6.19

Compromised Docker Hosts Use Shodan to Infect More Victims

Incindent

Bleepingcomputer

1.6.19

Google Targeting Deceptive Install Tactics for Chrome Extensions

Security

Bleepingcomputer

1.6.19

WordPress Plugin Flaw Used for Malicious Redirects and Pop-Ups

Vulnerebility

Bleepingcomputer

1.6.19

Microsoft Windows Terminal YouTube Video Removed for Copyright Claim

IT

Bleepingcomputer

1.6.19

POS Malware Steals Payment Info From 103 Checkers Restaurants

Virus

Bleepingcomputer

1.6.19

Bitcoin Blender Exits Cryptocurrency Mixing On Its Own Terms

Cryptocurrency

Bleepingcomputer

1.6.19

Convert Plus Plugin Flaw Lets Attackers Become a Wordpress Admin

Vulnerebility

Bleepingcomputer

1.6.19

Windows 10 1903 Cumulative Update KB4497935 Released With Fixes

Vulnerebility

Bleepingcomputer

1.6.19

YouTube Cryptocurrency Videos Pushing Info-Stealing Trojan

Cryptocurrency

Bleepingcomputer

1.6.19

Gmail's Confidential Mode for G Suite Goes Live on June 25

Security

Bleepingcomputer

1.6.19

Google to Allow webRequest Ad Blocking for Enterprise Deployments

Security

Bleepingcomputer

1.6.19

Microsoft Boosts Shadow IT Discovery for Cloud Security

Security

Bleepingcomputer

1.6.19

Windows 10 Insider Build 18908 Brings Your Phone Improvements

Vulnerebility

Bleepingcomputer

1.6.19

Nansh0u Miner Attack Infects 50K MS-SQL, PHPMyAdmin Servers

Cryptocurrency

Bleepingcomputer

1.6.19

Wordpress Slick Popup Plugin Contains Vulnerable Support Backdoor

Vulnerebility

Bleepingcomputer

1.6.19

Russian military plans to replace Windows with Astra Linux

BigBrothers

Securityaffairs

1.6.19

0patch released micropatch for BearLPE Zero-Day flaw in Windows 10 Task Scheduler

Vulnerebility

Securityaffairs

1.6.19

Chrome Extensions Policy Hits Deceptive Installation Tactics

Security

Securityweek

1.6.19

Researchers Dissect PowerShell Scripts Used by Russia-Linked Hackers

APT

Securityweek

1.6.19

Microsoft Reminds Users to Patch Wormable 'BlueKeep' Vulnerability

Vulnerebility

Securityweek

1.6.19

Public Exposure of Sensitive Files on the Internet is Getting Worse

Security

Securityweek

1.6.19

Facebook Loses Bid to Block Landmark ECJ Data Security Hearing

Social

Securityweek

1.6.19

Cloud Data Protection Firm OwnBackup Raises $23 Million

IT

Securityweek

0  1  2  3