List  Articles  Page  2020  2019  2018  2017  2016  

Date

Name

Category

Web

27.1.20

Mozilla banned hundreds of malicious Firefox add-ons over the last weeks

Virus

Securityaffairs

27.1.20

A new piece of Ryuk Stealer targets government, military and finance sectors

BigBrothers  Ransomware

Securityaffairs

27.1.20

City of Potsdam offline following a cyberattack

Attack

Securityaffairs

27.1.20

Authorities arrest 3 Indonesian hackers behind many Magecart attacks

CyberCrime

Securityaffairs

27.1.20

Is Threat Hunting the new Fad?

Security

SANS

27.1.20

Recommendations for navigating the dynamic cybercrime landscap

CyberCrime

Net-security

27.1.20

You can upgrade Windows 7 for free! Why wouldn’t you?

OS

Net-security

27.1.20

Patients believe stronger privacy protections are more important than easier health data access

Privacy

Net-security

27.1.20

Top 10 policy trends to watch for globally in 2020

Cyber

Net-security

26.1.20

Patching the Citrix ADC Bug Doesn't Mean You Weren't Hacked Vulnerebility

Bleepingcomputer

26.1.20

PayPal, American Express Phishing Kits Added to 16Shop Service Phishing

Bleepingcomputer

26.1.20 10% of All Macs Shlayered, Malware Cocktail Served Apple

Bleepingcomputer

26.1.20 Microsoft To Fix Windows 7 Black Wallpaper Bug for ESU Customers OS

Bleepingcomputer

26.1.20 New Ryuk Info Stealer Targets Government and Military Secrets Ransomware

Bleepingcomputer

26.1.20 Citrix Releases Final Patch as Ransomware Attacks Ramp Up Ransomware

Bleepingcomputer

26.1.20 DoS Exploit PoC Released for Critical Windows RDP Gateway Bugs Exploit

Bleepingcomputer

26.1.20

City of Potsdam Servers Offline Following Cyberattack Attack

Bleepingcomputer

26.1.20

Microsoft is Adding Classic ‘Edge Mode’ to New Edge Browser OS

Bleepingcomputer

26.1.20

U.S. Govt Agency Hit with New CARROTBALL Malware Dropper BigBrothers

Bleepingcomputer

26.1.20 Sonos Backtracks: Legacy Devices Will Get Updates After May Security

Bleepingcomputer

26.1.20 Bipartisan Coalition Bill Introduced to Reform NSA Surveillance BigBrothers

Bleepingcomputer

26.1.20 TrickBot Now Steals Windows Active Directory Credentials BotNet

Bleepingcomputer

26.1.20 Buchbinder Car Renter Exposes Info of Over 3 Million Customers Incindent

Bleepingcomputer

26.1.20 Critical MDhex Vulnerabilities Shake the Healthcare Sector Vulnerebility Bleepingcomputer

26.1.20

LastPass Mistakenly Removes Extension from Chrome Store, Causes Outage Security Bleepingcomputer

26.1.20

Euro Cup and Olympics Ticket Reseller Hit by MageCart CyberCrime

Bleepingcomputer

26.1.20

Sodinokibi Ransomware Threatens to Publish Data of Automotive Group Ransomware

Bleepingcomputer

26.1.20 Maze Ransomware Not Getting Paid, Leaks Data Left and Right Ransomware

Bleepingcomputer

26.1.20 Thousands of WordPress Sites Hacked to Fuel Scam Campaign Spam

Bleepingcomputer

26.1.20 Citrix Releases Scanner to Detect Hacked Citrix ADC Appliances Safety

Bleepingcomputer

26.1.20 The Half-Life Series is Free to Play Until March 2020 IT

Bleepingcomputer

26.1.20 Twitter Releases Updated Android App to Fix Crashes Android  Social

Bleepingcomputer

26.1.20

Microsoft to Force Bing Search in Chrome for Office 365 ProPlus Users OS

Bleepingcomputer

26.1.20

Microsoft Exposes 250M Customer Support Records on Leaky Servers Incindent

Bleepingcomputer

26.1.20

Microsoft Starts Pushing Windows 10 1909 to More Devices OS

Bleepingcomputer

26.1.20 Final Windows 7 Update Breaks Desktop Wallpaper Functionality OS

Bleepingcomputer

26.1.20 Windows 10 PowerToy Quick Launcher to Simplify Launching Apps OS

Bleepingcomputer

26.1.20 ProtonVPN Apps Open Sourced for Added Transparency and Security Security

Bleepingcomputer

26.1.20 FBI Warns Job Applicants of Scams Using Spoofed Company Sites BigBrothers

Bleepingcomputer

26.1.20 This Citibank Phishing Scam Could Trick Many People Phishing Bleepingcomputer

26.1.20

Did the Saudi crown prince hack Jeff Bezos?

BigBrother blog

Avast blog

26.1.20

The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks

BigBrother blog

Palo Alto Unity42

26.1.20

Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices

BotNet blog

Palo Alto Unity42

26.1.20

3 SecOps Strategies To Enable Your Smart People To Focus on Smart Things

Cyber blog

Palo Alto

26.1.20

Cybersecurity Canon Candidate Book Review: Code Girls: The Untold Story of ...

Cyber blog

Palo Alto

26.1.20

5 Straight Years of Delighting Our Customers with Outstanding Customer Supp...

Cyber blog

Palo Alto

26.1.20

SC Media Names Prisma Cloud an Industry Innovator

Cyber blog

Palo Alto

26.1.20

Interpol Arrests 3 Indonesian Credit Card Hackers for Magecart Attacks

CyberCrime

Thehackernews

26.1.20

Visibility Gap of Your Security Tools

Security

SANS

26.1.20

Cisco Webex flaw allows unauthenticated remote attackers to join private meetings

Vulnerebility

Securityaffairs

26.1.20 Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack Exploit  Hacking  Vulnerebility Securityaffairs
26.1.20 For the second time in a few days, Greek Government websites hit by DDoS attacks Attack  BigBrothers Securityaffairs
26.1.20 Trump, Johnson Talk Security Ahead of Huawei Decision BigBrothers Securityweek
26.1.20 Cisco Webex Vulnerability Exploited to Join Meetings Without a Password Vulnerebility Securityweek
25.1.20 Wine 5.0 Released With Numerous Gaming Improvements for Linux OS

Bleepingcomputer

25.1.20 Phishing Incident at UPS Store Chain Exposes Customer Info Incindent  Phishing

Bleepingcomputer

25.1.20 Actively Exploited IE 11 Zero-Day Bug Gets Temporary Patch Exploit

Bleepingcomputer

25.1.20 Microsoft Tests Office 'Ads' in Windows 10 Wordpad OS

Bleepingcomputer

25.1.20 Windows EFS Feature May Help Ransomware Attackers Ransomware

Bleepingcomputer

25.1.20 BitPyLock Ransomware Now Threatens to Publish Stolen Data Ransomware

Bleepingcomputer

25.1.20 600 Computers Taken Down After Florida Library Cyberattack Attack

Bleepingcomputer

25.1.20 Infiltrating Networks: Easier Than Ever Due to Evil Markets CyberCrime

Bleepingcomputer

25.1.20 US Retailer Hanna Andersson Hacked to Steal Credit Cards CyberCrime

Bleepingcomputer

25.1.20 FTCode Ransomware Now Steals Saved Login Credentials Ransomware

Bleepingcomputer

25.1.20 Emotet Malware Dabbles in Extortion With New Spam Template Spam  Virus

Bleepingcomputer

25.1.20 Mitsubishi Electric Warns of Data Leak After Security Breach Incindent

Bleepingcomputer

25.1.20 Citrix Patches CVE-2019-19781 Flaw in Citrix ADC 11.1 and 12.0 Vulnerebility

Bleepingcomputer

25.1.20 New Nest Video Extortion Scam Plays Out Like a Spy Game Spam

Bleepingcomputer

25.1.20 An Inside Look into Microsoft Rich Text Format and OLE Exploits Exploit blog Mcafee blog
25.1.20 Attacking the Organism: Retail Attack blog  Hacking blog

F5 Labs

25.1.20 2020 Cybersecurity Trends and Resolutions Cyber blog

F5 Labs

25.1.20 Nice Try: 501 (Ransomware) Not Implemented Ransomware blog FireEye
25.1.20 Vulnerability Spotlight: Multiple vulnerabilities in some AMD graphics cards Vulnerebility blog

Cisco Talos

25.1.20 Breaking down a two-year run of Vivin’s cryptominers Cryptocurrency blog

Cisco Talos

25.1.20 Vulnerability Spotlight: Bitdefender BOX 2 bootstrap remote code execution vulnerabilities Vulnerebility blog

Cisco Talos

25.1.20 Google: Flaws in Apple’s privacy tool could enable tracking Vulnerebility blog

Eset

25.1.20 Microsoft exposed 250 million customer support records Incident blog

Eset

25.1.20 Dating apps share personal data with advertisers, study says Hardware blog

Eset

25.1.20 3 ways to browse the web anonymously Safety blog

Eset

25.1.20 New Internet Explorer zero‑day remains unpatched Vulnerebility blog

Eset

25.1.20 Expert released DOS Exploit PoC for Critical Windows RDP Gateway flaws Exploit  Vulnerebility Securityaffairs
25.1.20 NK CARROTBALL dropper used in attacks on U.S. Govn Agency BigBrothers  Virus Securityaffairs
25.1.20 Questions Linger Over Investigation Into Jeff Bezos' Hacking BigBrothers Securityweek
25.1.20 Greece: Government Websites Hit by Cyberattack BigBrothers Securityweek
25.1.20 Microsoft Releases Azure Security Benchmark Security Securityweek
25.1.20 Bipartisan Bill Aims to Reform NSA Surveillance of Americans BigBrothers Securityweek
25.1.20 Privacy Firm Finds Unsecured Cannabis Patient Information Privacy Securityweek
25.1.20 UK 'to Decide on Huawei 5G Next Week' BigBrothers Securityweek
25.1.20 Citrix Releases More Patches for Exploited Flaw, Tool to Detect Compromise Vulnerebility Securityweek
25.1.20 Researchers Earn $280,000 for Hacking Industrial Systems at Pwn2Own Miami Congress Securityweek
25.1.20

Fake Smart Factory Honeypot Highlights New Attack Threats

Attack

Threatpost

25.1.20

Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings

Vulnerebility

Threatpost

25.1.20

New Bill Proposes NSA Surveillance Reforms

BigBrothers

Threatpost

25.1.20

ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates

Ransomware

Threatpost

24.1.20

MDhex vulnerabilities open GE Healthcare patient monitoring devices to attackers

Vulnerebility

Net-security

24.1.20

Lessons from Microsoft’s 250 million data record exposure

Incindent

Net-security

24.1.20 Russian operator of Cardplanet carding site pleads guilty in the US BigBrothers  CyberCrime Securityaffairs
24.1.20 Cisco fixes critical issue in Cisco Firepower Management Center Vulnerebility Securityaffairs
24.1.20 Russian Pleads Guilty to Running 'CardPlanet' to Sell Stolen Credit Cards CyberCrime Thehackernews
24.1.20 THSuite data leak exposes cannabis users information Incindent Securityaffairs
24.1.20 Iran-Linked PupyRAT backdoor used in recent attacks on European energy sector Virus Securityaffairs
24.1.20

Cisco Warns of Critical Network Security Tool Flaw

Vulnerebility

Threatpost

24.1.20

Google: Flaws in Apple’s Private-Browsing Technology Allow for Third-Party Tracking

Apple

Threatpost

24.1.20

Shlayer, No. 1 Threat for Mac, Targets YouTube, Wikipedia

IT

Threatpost

24.1.20

Critical, Unpatched ‘MDhex’ Bugs Threaten Hospital Devices

Vulnerebility

Threatpost

24.1.20

U.S. Gov Agency Targeted With Malware-Laced Emails

BigBrothers

Threatpost

24.1.20 Russian Pleads Guilty in Virginia to Large-Scale Card Fraud BigBrothers  CyberCrime Securityweek
24.1.20 Safari's Intelligent Tracking Prevention Fails to Prevent Tracking BigBrothers Securityweek
24.1.20 Some Hackers Take the Ransom and Run: Researchers Ransomware Securityweek
24.1.20 Cisco Patches Critical Vulnerability in Network Security Tool Vulnerebility Securityweek
24.1.20 CloudKnox Security Raises $12 Million in Funding IT Securityweek
24.1.20 Vulnerabilities Found in GE Healthcare Patient Monitoring Products Vulnerebility Securityweek
24.1.20 Targeted Phishing Campaign Leverages Death of Iranian General Qasem Suleimani Phishing Securityweek
24.1.20 What We Know, And Don’t, About the Alleged Bezos Phone Hack BigBrothers  Mobil Securityweek
24.1.20

Why Phishing Remains So Popular?

Phishing

SANS
24.1.20

CISOs: Make 2020 the year you focus on third-party cyber risk

Cyber

Net-security

24.1.20

Over half of organizations were successfully phished in 2019

Phishing

Net-security

24.1.20

More authentication and identity tech needed with fraud expected to increase

Incindent

Net-security

23.1.20

IoC Scanner shows if Citrix appliances have been compromised via CVE-2019-19781

Vulnerebility

Net-security

23.1.20

It’s time to patch your Cisco security solutions again

Vulnerebility

Net-security

23.1.20

Cybercriminals using fake job listings to steal money, info from applicants

Cyber

Net-security

23.1.20 Data Security Startup Privafy Emerges From Stealth Mode Security Securityweek
23.1.20 Iran-Linked RAT Used in Recent Attacks on European Energy Sector BigBrothers  Virus Securityweek
23.1.20 Mastercard Opens New Intelligence and Cyber Center in Vancouver, Canada Cyber Securityweek
23.1.20 Serious Vulnerabilities Expose Honeywell Surveillance Systems to Attacks Vulnerebility Securityweek
23.1.20 US Presses France for 'Strong Security Measures' Against Huawei BigBrothers Securityweek
23.1.20 Shlayer Trojan attacks one in ten macOS users Apple Securelist
23.1.20 NIST PRIVACY FRAMEWORK Report Report
23.1.20

Microsoft Leaves 250M Customer Service Records Open to the Web

Incindent

Threatpost

23.1.20

PoC Exploits Do More Good Than Harm: Threatpost Poll

Exploit

Threatpost

23.1.20

sLoad Malware Revamped as Powerful ‘StarsLord’ Loader

Virus

Threatpost

23.1.20

New Muhstik Botnet Attacks Target Tomato Routers

BotNet

Threatpost

23.1.20

Pwn2Own Miami Contestants Haul in $180K for Hacking ICS Equipment

Congress

Threatpost

23.1.20

Vivin Nets Thousands of Dollars Using Cryptomining Malware

Cryptocurrency

Threatpost
23.1.20 250 Million Microsoft customer support records and PII exposed online Incindent Securityaffairs
23.1.20 Multiple Vulnerabilities Found in AMD ATI Radeon Graphics Cards Vulnerebility Securityweek
23.1.20 Wednesday is Deadline for Claims in 2017 Equifax Data Breach Incindent Securityweek
23.1.20

Complex Obfuscation VS Simple Trick

Virus

SANS

23.1.20

Zero Trust: Beyond access controls

Security

Net-security

23.1.20

There is no easy fix to AI privacy problems

Security

Net-security

23.1.20

CIOs using AI to bridge gap between IT resources and cloud complexity

Security

Net-security

22.1.20

Did Apple drop end-to-end encrypted iCloud backups because of the FBI?

Apple  BigBrothers

Net-security
22.1.20

Malware attack took down 600 computers at Volusia County Public Library

Virus

Securityaffairs
22.1.20

Cyber Insurance Provider Coalition Acquires BinaryEdge

IT

Securityweek
22.1.20

UN Experts Urge Probe Into Alleged Saudi Hacking of Bezos Phone

BigBrothers

Securityweek
22.1.20

Intezer Raises $15 Million in Series B Funding

IT

Securityweek
22.1.20

World Economic Forum Global Risks Report Highlights Dangers of Digital innovation

Security

Securityweek
22.1.20

Source Code Released for All ProtonVPN Apps

Security

Securityweek
22.1.20

250 Million Microsoft Customer Support Records Exposed Online

Incindent

Thehackernews
22.1.20

Saudi Prince Allegedly Hacked World's Richest Man Jeff Bezos Using WhatsApp

BigBrothers

Thehackernews
22.1.20 Jeff Bezos phone was hacked by Saudi crown prince BigBrothers Securityaffairs
22.1.20 OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propaganda BigBrothers Securityaffairs
22.1.20 Microsoft Exposed 250 Million Customer Support Records Incindent Securityweek
22.1.20 Unofficial Patch Released for Recently Disclosed Internet Explorer Zero-Day Vulnerebility Securityweek
22.1.20 Secure DevOps Company Sysdig Raises $70 Million IT Securityweek
22.1.20 French Spy Suspected of Selling Data on Darknet BigBrothers Securityweek
22.1.20 Saudi Dismisses Link to Hack of Amazon Owner Bezos BigBrothers Securityweek
22.1.20

Honeywell Maxpro VMS/NVR systems vulnerable to hijacking

Vulnerebility

Net-security
22.1.20 Citrix Accelerates Patch Rollout For Critical RCE Flaw Vulnerebility

Threatpost

22.1.20 Hacker Leaks More Than 500K Telnet Credentials for IoT Devices IoT

Threatpost

22.1.20 Microsoft Zero-Day Actively Exploited, Patch Forthcoming Exploit

Threatpost

22.1.20 FTCODE Ransomware Now Steals Chrome, Firefox Credentials Ransomware

Threatpost

22.1.20 16Shop Phishing Gang Goes After PayPal Users Phishing

Threatpost

22.1.20 Yomi Hunter Catches the CurveBall Exploit Securityaffairs
22.1.20 The Mystery of Fbot BotNet Securityaffairs
22.1.20 US-based children’s clothing maker Hanna Andersson discloses a data breach BigBrothers  Incindent Securityaffairs
22.1.20 Design Weaknesses Expose Industrial Systems to Damaging Attacks ICS Securityweek
22.1.20 Brazilian Prosecutors Accuse Glenn Greenwald in Hacking Case Hacking Securityweek
22.1.20 Snyk is Latest Cybersecurity Unicorn After Adding $150 Million in Funding IT Securityweek
22.1.20 FireEye Acquires Cloud Governance Firm Cloudvisory Safety Securityweek
22.1.20

German language malspam pushes Ursnif

Spam

SANS

22.1.20

Container security requires continuous security in new DevSecOps models

Security

Net-security

22.1.20

Companies risk revenue growth due to innovation achievement gap

Security

Net-security

22.1.20

Email security industry miss rates when encountering threats are higher than 20%

Security

Net-security

22.1.20

State CIOs see innovation as critical priority, only 14% report extensive innovation

Security

Net-security

22.1.20

Download: State of Breach Protection 2020 survey results

Safety

Net-security
21.1.20 Advanced "16Shop" Phishing Kit Expands Offerings Phishing Securityweek
21.1.20 US Military Claimed 'Success' in Hacking ISIS: Documents BigBrothers Securityweek
21.1.20 Hackers Steal Employee and Corporate Information From Mitsubishi Electric Incindent Securityweek
21.1.20 New Ransomware Process Leverages Native Windows Features Ransomware Securityweek
21.1.20 Georgia Man Admits to Launching DDoS Attack Attack Securityweek
21.1.20 Realistic Factory Honeypot Shows Threats Faced by Industrial Organizations Security Securityweek
21.1.20

Micropatch simulates workaround for recent zero-day IE flaw, removes negative side effects

Vulnerebility

Net-security

21.1.20

First patches for the Citrix ADC, Gateway RCE flaw released

Vulnerebility

Net-security

21.1.20

Researchers create OT honeypot, attract exploits and fraud

Security

Net-security

21.1.20

Mitsubishi Electric discloses data breach, possible data leak

Incindent

Net-security

21.1.20 AA20-020A : Critical Vulnerability in Citrix Application Delivery Controller, Gateway, and SD-WAN WANOP CERT CERT
21.1.20 NIST releases version 1.0 of the Privacy Framework Safety Securityaffairs
21.1.20 Expert found a hardcoded SSH Key in Fortinet SIEM appliances Safety Securityaffairs
21.1.20 Mitsubishi Electric discloses data breach, media blame China-linked APT APT Securityaffairs
21.1.20 Hardcoded SSH Key Found in Fortinet SIEM Appliances Safety Securityweek
21.1.20 Hanna Andersson Data Breach: Hackers Compromise Website of Children's Clothier Incindent Securityweek
21.1.20

DeepBlueCLI: Powershell Threat Hunting

Security

SANS

21.1.20

Data-driven vehicles: The next security challenge

Security

Net-security

21.1.20

Review: Enzoic for Active Directory

Security

Net-security

21.1.20

Techniques and strategies to overcome Kubernetes security challenges

Security

Net-security

21.1.20

Revenue from cloud IT infrastructure products declines

Security

Net-security

21.1.20

A look at cybersecurity for rail systems, building automation and the future of critical infrastructure

Cyber

Net-security

20.1.20 NATO will send a counter-hybrid team to Montenegro to face Russia’s threat BigBrothers Securityaffairs
20.1.20 Apple Received Tens of Thousands of Government Requests in H1 2019 Apple Securityweek
20.1.20 NIST Releases Framework for Privacy Risk Management Safety Securityweek
20.1.20 Citrix Releases First Patches for Critical ADC Vulnerability Vulnerebility Securityweek
20.1.20 Citrix Releases Patches for Critical ADC Vulnerability Under Active Attack Vulnerebility Thehackernews
20.1.20 Citrix releases permanent fixes for CVE-2019-19781 flaw in ADC 11.1 and 12.0 Vulnerebility Securityaffairs
20.1.20 WP Database Reset WordPress plugin flaws allow website takeover Vulnerebility Securityaffairs
20.1.20 JhoneRAT uses Google Drive, Twitter, ImgBB, and Google Forms to target countries in Middle East Virus Securityaffairs
20.1.20 Microsoft to Patch Internet Explorer Vulnerability Exploited in Targeted Attacks Exploit Securityweek
20.1.20 Bot list with Telnet credentials for more than 500,000 servers and IoT devices leaked online BotNet  IoT Securityaffairs
20.1.20 Hackers patch Citrix servers to deploy their own backdoor Virus Securityaffairs
20.1.20

Citrix ADC Exploits Update

Exploit

SANS

20.1.20

NIST Privacy Framework 1.0: Manage privacy risk, demonstrate compliance

Safety

Net-security

20.1.20

Business units and IT teams can no longer function in silos

Security

Net-security

19.1.20

New Jersey Synagogue Suffers Sodinokibi Ransomware Attack Ransomware

Bleepingcomputer

19.1.20

Microsoft Issues Mitigation for Actively Exploited IE Zero-Day Exploit

Bleepingcomputer

19.1.20 New US Bill Wants to Assign State Cybersecurity Coordinators Cyber

Bleepingcomputer

19.1.20 How Malware Gains Trust by Abusing the Windows CryptoAPI Flaw Vulnerebility  Virus

Bleepingcomputer

19.1.20 FBI Says State Actors Hacked US Govt Network With Pulse VPN Flaw BigBrothers

Bleepingcomputer

19.1.20

Hackers Are Securing Citrix Servers, Backdoor Them for Access Hacking  Vulnerebility

Bleepingcomputer

19.1.20 Fraudsters Set Up Site Selling Temporary Social Security Numbers CyberCrime

Bleepingcomputer

19.1.20 WeLeakInfo.com Seized For Selling Info from Data Breaches, 2 Arrested Incindent

Bleepingcomputer

19.1.20 Dutch Govt Suggests Turning Off Citrix ADC Devices, Mitigations May Fail BigBrothers  Vulnerebility

Bleepingcomputer

19.1.20 Windows 10 Insider Build 19546 Adds Graphing Mode to Calculator OS

Bleepingcomputer

19.1.20 FBI to Warn State Officials of Election Infrastructure Cyber Threats BigBrothers

Bleepingcomputer

19.1.20 Google Chrome Adds Protection for NSA's Windows CryptoAPI Flaw BigBrothers  Safety

Bleepingcomputer

19.1.20

WordPress Plugin Bugs Let Hackers Wipe or Takeover Your Site Hacking

Bleepingcomputer

19.1.20

TrickBot Now Uses a Windows 10 UAC Bypass to Evade Detection BotNet  OS

Bleepingcomputer

19.1.20 PoCs for Windows CryptoAPI Bug Are Out, Show Real-Life Exploit Risks Exploit

Bleepingcomputer

19.1.20 Google to Kill Chrome Apps Across All Platforms Security

Bleepingcomputer

19.1.20 Customer-Owned Bank Informs 100k of Breach Exposing Account Balance, PII Incindent

Bleepingcomputer

19.1.20 Ako Ransomware Uses Spam to Infect Its Victims Ransomware

Bleepingcomputer

19.1.20

Online Pharmacy PlanetDrugsDirect Discloses Security Breach Incindent

Bleepingcomputer

19.1.20

iPhones Can Now Double As a Security Key for Google Accounts Apple

Bleepingcomputer

19.1.20 Microsoft's Indexer Diagnostics Helps Troubleshoot Windows Search OS

Bleepingcomputer

19.1.20 Microsoft's New Edge Browser Released, What You Need to Know OS

Bleepingcomputer

19.1.20 Microsoft Office January Security Updates Fix Code Execution Bugs OS

Bleepingcomputer

19.1.20 Windows 7 Begins to Show Full Screen Windows 10 Upgrade Alerts OS

Bleepingcomputer

19.1.20

Google Chrome Aims to Make Browser User-Agents Obsolete Security

Bleepingcomputer

19.1.20

Ransom News Ransom Ransom
19.1.20 Windows BSOD Betrays Cryptominer Hidden in WAV File Cryptocurrency  OS

Bleepingcomputer

19.1.20 Intel Patches High Severity Flaw in VTune Performance Profiler Vulnerebility

Bleepingcomputer

19.1.20 Windows Terminal Adds Retro CRT Effects and Console Search OS

Bleepingcomputer

19.1.20 NSA's First Public Vulnerability Disclosure: An Effort to Build Trust BigBrothers

Bleepingcomputer

19.1.20

Windows 7 Gets Final Monthly Rollup Update Before End Of Life Vulnerebility

Bleepingcomputer

19.1.20 Microsoft's January 2020 Patch Tuesday Fixes 49 Vulnerabilities Vulnerebility

Bleepingcomputer

19.1.20 Windows 10 Cumulative Updates KB4528760 & KB4534273 Released Vulnerebility

Bleepingcomputer

19.1.20 Microsoft Fixes Windows CryptoAPI Spoofing Flaw Reported by NSA Vulnerebility

Bleepingcomputer

19.1.20 Critical WordPress Plugin Bug Allows Admin Logins Without Password Vulnerebility

Bleepingcomputer

19.1.20 Adobe Releases Their January 2020 Security Updates Vulnerebility

Bleepingcomputer

19.1.20 United Nations Targeted With Emotet Malware Phishing Attack Phishing  Virus

Bleepingcomputer

19.1.20

Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices Ransomware

Bleepingcomputer

19.1.20

Windows 7 Reaches End of Life Tomorrow, What You Need to Know OS

Bleepingcomputer

19.1.20 Microsoft to Support the New Edge Browser After Windows 7 EOL OS

Bleepingcomputer

19.1.20 CISA Releases Test Tool for Citrix ADC CVE-2019-19781 Vulnerability Vulnerebility

Bleepingcomputer

19.1.20 BEC Scammers Use Aging Report Phishing to Find New Targets Phishing  Spam

Bleepingcomputer

19.1.20

Nemty Ransomware to Start Leaking Non-Paying Victim's Data Ransomware

Bleepingcomputer

19.1.20 Emotet Malware Restarts Spam Attacks After Holiday Break Spam  Virus

Bleepingcomputer

19.1.20 Android Trojan Steals Your Money to Fund International SMS Attacks Android

Bleepingcomputer

19.1.20 Windows 7 Reminder: Get a Free Windows 10 Upgrade While You Can OS

Bleepingcomputer

19.1.20 The Worst Cyberattacks and Data Breaches of 2019 Incident blog Sonicwall
19.1.20 Bett 2020: SonicWall Showcases Cybersecurity Solutions for Educational Institutions Cyber blog Sonicwall
19.1.20 Answers to 5 key questions about highly publicized NSA-Microsoft story BigBrother blog Avast blog

19.1.20

The 12 weirdest cybersecurity stories you haven't heard about Cyber blog Avast blog

19.1.20

New phishing tactics bait victims Phishing blog Avast blog
19.1.20 Threat Brief: Windows CryptoAPI Spoofing Vulnerability CVE-2020-0601 Vulnerebility blog Palo Alto Unity42
19.1.20 Exploits in the Wild for Citrix ADC and Citrix Gateway Directory Traversal Vulnerability CVE-2019-19781 Exploit blog Palo Alto Unity42
19.1.20 Getting Cloud Smart: Security for Hybrid and Public Federal Clouds Cyber blog

Palo Alto

19.1.20 Your SaaS Security Checklist Cyber blog Palo Alto
19.1.20 Do Your SOC Metrics Incentivize Bad Behavior? Cyber blog

Palo Alto

19.1.20 Why Cloud Security Seems So Hard, and How to Overcome These Challenges Cyber blog Palo Alto

19.1.20

Microsoft provides mitigation for actively exploited CVE-2020-0674 IE Zero-Day Exploit Securityaffairs

18.1.20

Turkish Hackers hit Greek Government websites and local stock exchange BigBrothers  Hacking Securityaffairs

18.1.20

Cybercrime Statistics in 2019 CyberCrime

Securityaffairs

18.1.20

Microsoft Warns of Unpatched IE Browser Zero-Day That's Under Active Attacks Vulnerebility Thehackernews

18.1.20

Turkish Hackers Target Greek Government Websites, Stock Exchange BigBrothers Securityweek

18.1.20

FBI Takes Down Site Selling Subscriptions to Stolen Data BigBrothers Securityweek

18.1.20

Microsoft Introduces Free Source Code Analyzer Security Securityweek

18.1.20

Attacker Installs Backdoor, Blocks Others From Exploiting Citrix ADC Vulnerability Exploit  Vulnerebility Securityweek

18.1.20

New Legislation Would Require a Cybersecurity Coordinator in Every State Cyber Securityweek

18.1.20

Data Security Startup Cyral Emerges From Stealth Mode Security Securityweek

18.1.20

Industry Reactions to Crypto Vulnerability Found by NSA: Feedback Friday Crypto Securityweek

18.1.20

IS CYBER RETALIATION FROM IRAN IMMINENT? BigBrother blog

Cybereason

18.1.20

6 OF THE BEST MALICIOUS LIFE CYBERSECURITY HISTORY STORIES FROM 2019 Malware blog

Cybereason

18.1.20

CurveBall – An Unimaginative Pun but a Devastating Bug Vulnerebility blog

Mcafee blog

18.1.20

What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process Vulnerebility blog

Mcafee blog

18.1.20

Security Lessons from Across the Pond: Local Government Ransomware Attacks BigBrother blog  Ransomware blog F5 Labs

18.1.20

Recommended Security Controls for 2020 Security blog

F5 Labs

18.1.20

404 Exploit Not Found: Vigilante Deploying Mitigation for Citrix NetScaler Vulnerability While Maintaining Backdoor Exploit blog FireEye

18.1.20

JhoneRAT: Cloud based python RAT targeting Middle Eastern countries Malware blog

Cisco Talos

18.1.20

Vulnerability Spotlight: Multiple remote code execution vulnerabilities in Foxit PDF Reader Vulnerebility blog

Cisco Talos

18.1.20

Stolen emails reflect Emotet's organic growth Malware blog

Cisco Talos

18.1.20

Microsoft Patch Tuesday — Jan. 2020: Vulnerability disclosures and Snort coverage Vulnerebility blog

Cisco Talos

18.1.20

New Snort rules protect against recently discovered Citrix vulnerability Vulnerebility blog

Cisco Talos

18.1.20

Vulnerability Spotlight: Code execution vulnerability in E2fsprogs Vulnerebility blog

Cisco Talos

18.1.20

What the continued escalation of tensions in the Middle East means for security BigBrother blog

Cisco Talos

18.1.20

Vulnerability Spotlight: Two buffer overflow vulnerabilities in OpenCV Vulnerebility blog Cisco Talos

18.1.20

FBI shuts down website selling billions of stolen records BigBrother blog

Eset

18.1.20

You can now turn your iPhone into a Google security key Hardware blog

Eset

18.1.20

Cyberawareness in Australia: The good and the bad BigBrother blog

Eset

18.1.20

Google to end support for third‑party cookies in Chrome Security blog Eset

18.1.20

Microsoft patches severe Windows flaw after tip‑off from NSA BigBrother blog  Vulnerebility blog

Eset

18.1.20

Millions of modems at risk of remote hijacking Hacking blog

Eset

18.1.20

Windows 7 end of life: Time to move on OS Blog

Eset

18.1.20

5 major US wireless carriers vulnerable to SIM swapping attacks Hardware blog Eset

18.1.20

Threatpost Poll: Are Published PoC Exploits a Good or Bad Idea? Exploit

Threatpost

18.1.20

New JhoneRAT Malware Targets Middle East Virus

Threatpost

18.1.20

News Wrap: PoC Exploits, Cable Haunt and Joker Malware Security

Threatpost

18.1.20

Mobile Carrier Customer Service Ushers in SIM-Swap Fraud Mobil

Threatpost

18.1.20

Feds Cut Off Access to Billions of Breached Records with Site Takedown BigBrothers  Incindent

Threatpost

18.1.20

FBI Plans to Inform States of Election Breaches BigBrothers Threatpost

18.1.20

Hack the Army bug bounty program paid $275,000 in rewards Security Securityaffairs

17.1.20

Chinese police arrested the operator of unauthorized VPN service that made $1.6 million from his activity BigBrothers

Securityaffairs

17.1.20

Hackers Earn $275,000 for Vulnerabilities in U.S. Army Systems BigBrothers Securityweek
17.1.20 Expert: Georgia Election Server Showed Signs of Tampering Security Securityweek
17.1.20 Siemens Warns of Security Risks Associated With Use of ActiveX Security Securityweek

17.1.20

Microsoft Application Inspector: Check open source components for unwanted features

Security

Net-security

17.1.20

Law enforcement seized WeLeakInfo.com for selling access to data from data breaches

Incindent

Securityaffairs

17.1.20 U.S. Girds for Cyber Threats From Iran as Military Clash Fears Ebb BigBrothers Securityweek
17.1.20 Cloudflare Announces Free Security Services for Political Campaigns Security Securityweek
17.1.20 FBI Plans to Notify States About Local Election Breaches BigBrothers  Incindent Securityweek
17.1.20 Peter Leav Named CEO of McAfee IT Securityweek
17.1.20 PoC Exploits Published For Microsoft Crypto Bug Exploit

Threatpost

17.1.20 ‘Fleeceware’ Apps Downloaded 600M Times from Google Play Android

Threatpost

17.1.20 Critical Cisco Flaws Now Have PoC Exploit Exploit  Vulnerebility

Threatpost

17.1.20 Google Account Security Keys Launch for iPhone Apple

Threatpost

17.1.20 Satan Ransomware Reborn to Torment Businesses Ransomware

Threatpost

17.1.20 Expert released PoC exploits for recently disclosed Cisco DCNM flaws Exploit  Vulnerebility Securityaffairs
17.1.20 Many High-Risk Users Have Bad Security Habits: Google Survey Security Securityweek
17.1.20 Facebook Introduces New Login Alerts Social Securityweek
17.1.20 PoC Exploits Released for Cisco DCNM Vulnerabilities Exploit  Vulnerebility Securityweek
17.1.20 Equifax Ordered to Spend $1 Billion on Data Security Under Data Breach Settlement Incindent Securityweek
17.1.20

Summing up CVE-2020-0601, or the Let?s Decrypt vulnerability

Vulnerebility

SANS

17.1.20

IoT cybersecurity’s worst kept secret

IoT

Net-security

17.1.20

How to govern cybersecurity risk at the board level

Cyber

Net-security
17.1.20

Worldwide IT spending to total $3.9 trillion in 2020

IT

Net-security
17.1.20

White Ops appoints Rhushabh ‘Rush’ Mehta as Sr. VP of Engineering

Security

Net-security
17.1.20

Facebook users will be notified when their credentials are used for third-party app logins

Social

Net-security
16.1.20 Hundreds of million users installed Android fleeceware apps from Google Play Android Securityaffairs
16.1.20 Two PoC exploits for CVE-2020-0601 NSACrypto flaw released Exploit Securityaffairs
16.1.20 Rights Group Demands Israel Rein in Murky Spyware Company BigBrothers Securityweek
16.1.20 Unprotected Medical Systems Expose Data on Millions of Patients Incindent Securityweek
16.1.20 PoC Exploits Released for Crypto Vulnerability Found by NSA Exploit Securityweek
16.1.20 Use iPhone as Physical Security Key to Protect Your Google Accounts Apple Thehackernews
16.1.20 Equifax Settles Class-Action Breach Lawsuit for $380.5M Incindent

Threatpost

16.1.20 U.N. Weathers Storm of Emotet-TrickBot Malware BigBrothers  BotNet  Virus

Threatpost

16.1.20 Podcast: NSA Reports Major Crypto-Spoofing Bug to Microsoft BigBrothers

Threatpost

16.1.20 Critical WordPress Bug Leaves 320,000 Sites Open to Attack Vulnerebility

Threatpost

16.1.20 A Practical Guide to Zero-Trust Security Security

Threatpost

16.1.20 Trump Slams Apple for Refusing to Unlock Suspected Shooter’s iPhones Apple  BigBrothers

Threatpost

16.1.20

Oski Data-Stealing Malware Emerges to Target North America, China Virus Threatpost

16.1.20

Critical auth bypass issues affect InfiniteWP Client and WP Time Capsule WordPress plugins Vulnerebility Securityaffairs
16.1.20 5ss5c Ransomware emerges after Satan went down in the hell Ransomware Securityaffairs
16.1.20 VMware addresses flaws in VMware Tools and Workspace ONE SDK Vulnerebility Securityaffairs
16.1.20 P&N Bank Data Breach Exposes Trove of User Data Incindent Securityweek
16.1.20 Public Bug Bounty Program Launched for Kubernetes Security Securityweek
16.1.20 Organizations Feel Threat of Nation-State Attacks, Survey Shows Attack Securityweek
16.1.20 Google Simplifies Enrollment Process for Advanced Protection Program Security Securityweek

16.1.20

Picks of 2019 malware - the large, the small and the one full of null bytes

Virus

SANS

16.1.20

Embedding security, the right way

Security

Net-security

16.1.20

Emotet remains the dark market leader for delivery-as-a-service

CyberCrime  Virus

Net-security
16.1.20

Six trends attracting the attention of enterprise technology leaders

Security

Net-security
16.1.20

Global security services industry to experience spend growth of more than $80 billion

Security

Net-security

15.1.20

P&N Bank data breach may have impacted 100,000 West Australians Incindent Securityaffairs
15.1.20 Trusona Raises $20 Million in Series C Funding Round IT Securityweek
15.1.20 New 5ss5c Ransomware Likely Readied to Replace Satan Ransomware Securityweek

15.1.20

Hacker offers for sale 49 million user records from US data broker LimeLeads Incindent Securityaffairs
15.1.20 Iranian Threat Actors: Preliminary Analysis BigBrothers Securityaffairs
15.1.20 Microsoft addresses CVE-2020-0601 flaw, the first issue ever reported by NSA Vulnerebility Securityaffairs

15.1.20

Vulnerabilities Found in VMware Tools, Workspace ONE SDK Vulnerebility Securityweek

15.1.20

Oracle's January 2020 CPU Delivers 334 New Patches Vulnerebility Securityweek

15.1.20

High-risk Google account owners can now use their iPhone as a security key

Apple

Net-security
15.1.20

Kubernetes bug bounty program open to anyone, rewards up to $10,000

Security

Net-security
15.1.20 Adobe Patches Five Critical Illustrator CC Flaws Vulnerebility

Threatpost

15.1.20

Microsoft Patches Major Crypto Spoofing Bug Vulnerebility

Threatpost

15.1.20

Google to Nix Chrome Support for Third-Party Cookies by 2022 Privacy

Threatpost

15.1.20

Apple Denies FBI Request to Unlock Shooter’s iPhone—Again Apple  BigBrothers

Threatpost

15.1.20

Oracle Ties Previous All-Time Patch High with January Updates Vulnerebility

Threatpost

15.1.20

Intel Fixes High-Severity Flaw in Performance Analysis Tool Vulnerebility

Threatpost

15.1.20 Card Skimmer Hits Australian Bushfire Donation Site CyberCrime

Threatpost

15.1.20

Public Bug Bounty Takes Aim at Kubernetes Container Project Security

Threatpost

15.1.20 January 2020 Adobe Patch Tuesday updates fix issues in Illustrator, Experience Manager Vulnerebility Securityaffairs

15.1.20

Why Russian APT Fancy Bear hacked the Ukrainian energy firm Burisma? APT Securityaffairs

15.1.20

SAP Releases 6 Security Notes on January 2020 Patch Day Vulnerebility Securityweek

15.1.20

Encryption Battle Reignited as US Govt at Loggerheads With Apple BigBrothers  Crypto Securityweek

15.1.20

NSA Discloses Serious Windows Vulnerability to Microsoft BigBrothers  Vulnerebility Securityweek

15.1.20

Google Says it Will Phase Out Web-Tracking 'Cookies' Privacy Securityweek
15.1.20 "KRYPTOGRAFIE OKOLO NÁS", KAREL BURDA Knihy Knihy

15.1.20

AA20-014A : Critical Vulnerabilities in Microsoft Windows Operating Systems CERT CERT

15.1.20

Multiple caching service providers are vulnerable to HTTP cache poisoning Alert Alert

15.1.20

Microsoft Windows Remote Desktop Gateway allows for unauthenticated remote code execution Alert Alert

15.1.20

Microsoft Windows CryptoAPI fails to properly validate ECC certificate chains Alert Alert

15.1.20

Microsoft Patch Tuesday for January 2020

Vulnerebility

SANS

15.1.20

Companies increasingly reporting attacks attributed to foreign governments

BigBrothers

Net-security

15.1.20

Cyber attackers turn to business disruption as primary attack objective

Cyber

Net-security

15.1.20

Budgetary, policy, workforce issues influencing DOD and intelligence community IT priorities

BigBrothers

Net-security

15.1.20

January 2020 Patch Tuesday: Microsoft nukes Windows crypto flaw flagged by the NSA

Vulnerebility

Net-security

14.1.20

Google Researchers Detail Critical iMessage Vulnerability Vulnerebility Securityweek

14.1.20

Go Huawei: UK PM Challenges US Critics of China Firm BigBrothers Securityweek

14.1.20

Tinder, Grindr Accused of Illegally Sharing User Data Social Securityweek

14.1.20

Major U.S. Mobile Carriers Vulnerable to SIM Swapping Attacks Mobil Securityweek
14.1.20 Adobe Patches Vulnerabilities in Illustrator, Experience Manager Vulnerebility Securityweek

14.1.20

Hundreds of Millions of PCs Remain Vulnerable as Windows 7 Reaches End of Life Vulnerebility Securityweek
14.1.20 Phishing Campaign Targeting Ukrainian Firm Burisma Linked to Russian Cyberspies CyberSpy  Phishing Securityweek

14.1.20

Update Windows 10 Immediately to Patch a Flaw Discovered by the NSA Vulnerebility Thehackernews

14.1.20

Adobe Releases First 2020 Patch Tuesday Software Updates Vulnerebility Thehackernews

14.1.20

Cisco addressed a high-severity bug in Webex that could allow Remote Code Execution Vulnerebility Securityaffairs

14.1.20

Security pitfalls to avoid when programming using an API

Security

Net-security

14.1.20

2020 forecast: Attackers will target non-traditional systems

Attack

Net-security

14.1.20

Unpatched Citrix Flaw Now Has PoC Exploits Vulnerebility

Threatpost

14.1.20 ‘Cable Haunt’ Bug Plagues Millions of Home Modems Vulnerebility

Threatpost

14.1.20

Joker Android Malware Snowballs on Google Play Android

Threatpost

14.1.20 Scammers Dupe Texas School District Out of $2.3M Spam

Threatpost

14.1.20

CES Surveillance Hype Worries Privacy Advocates IT

Threatpost

14.1.20

China-linked APT40 group hides behind 13 front companies APT Securityaffairs
14.1.20 US officials meet UK peers to remark the urgency to ban Huawei 5G tech BigBrothers  Mobil Securityaffairs

14.1.20

Facebook quickly fixed a bug exploited in attacks that exposed Page Admins info Exploit  Social Securityaffairs
14.1.20 Russia Hacked Ukrainian Gas Firm at Center of Trump Impeachment BigBrothers Securityweek

14.1.20

NortonLifeLock to Sell ID Analytics Business to LexisNexis Risk Solutions IT Securityweek
14.1.20 US, UK Officials Meet as PM Johnson's Huawei Decision Nears BigBrothers Securityweek

14.1.20

A 101 guide to mobile device management

Mobil

Net-security

14.1.20

Fraud prevents a third of businesses from expanding digital capabilities

Crime

Net-security

13.1.20

Hacker that hit UK National Lottery in 2016 was sentenced to prison Crime Securityaffairs

13.1.20

Oski Stealer Targets Browser Data, Crypto Wallets in U.S. Cryptocurrency Securityweek

13.1.20

Facebook Rushes to Patch Bug Exposing Page Admins Social Securityweek

13.1.20

Exploits Published for Citrix ADC Vulnerability, Patches Coming Soon Exploit Securityweek

13.1.20

Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking

Hacking

Net-security

13.1.20

Exploits for Citrix ADC and Gateway flaw abound, attacks are ongoing

Exploit

Net-security

13.1.20

Number of 5G connections to reach 1.5 billion globally by 2025

Mobil

Net-security

13.1.20

A case for establishing a common weakness enumeration for hardware security

Security

Net-security

13.1.20 5G – The Future of Security and Privacy in Smart Cities Mobil Securityaffairs
13.1.20 Maze Ransomware operators leak 14GB of files stolen from Southwire Ransomware Securityaffairs
13.1.20 New Bill prohibits intelligence sharing with countries using Huawei 5G equipment BigBrothers  Mobil Securityaffairs
13.1.20 MageCart attack hit Australia bushfire Donors CyberCrime Securityaffairs
13.1.20 Google removed 1.7K+ Joker Malware infected apps from its Play Store Android Securityaffairs
13.1.20 UK National Lottery Hacker Sentenced to Prison BigBrothers Securityweek
13.1.20 Google Removes Trove of Risky 'Bread' Apps From Play Store Android Securityweek
13.1.20

Citrix ADC Exploits: Overview of Observed Payloads

Exploit

SANS

13.1.20

Transact with trust: Improving efficiencies and securing data with APIs

Security

Net-security

12.1.20 Ransom News Ransom Ransom

12.1.20

Spear-Phishing Attacks Targeting Office 365 Users, SaaS Applications

Phishing blog

Sonicwall

12.1.20

Homeland Security warns of Iranian cyberattacks

BigBrother blog

Avast blog

12.1.20

Threat Brief: Iranian-Linked Cyber Operations

APT blog

Palo Alto Unity42

12.1.20

Harnessing the Power of User and Entity Behavior Analytics (UEBA) for Cloud Security

Cyber blog

Palo Alto

12.1.20

Prisma SaaS: An Octopus That Secures App Ecosystems

Cyber blog

Palo Alto

12.1.20

The Six Pillars of Effective Security Operations

Cyber blog

Palo Alto

12.1.20

Zero Trust Network Access: Build Your SASE on a Solid Foundation

Cyber blog

Palo Alto
12.1.20

Improve How You Enforce Security Policies with the Panorama Plugin for Cisc...

Cyber blog

Palo Alto

12.1.20

Cybersecurity Canon Candidate Book Review: Tribe of Hackers

Cyber blog

Palo Alto
12.1.20 Sodinokibi Ransomware Publishes Stolen Data for the First Time Ransomware

Bleepingcomputer

12.1.20 Android Trojan Kills Google Play Protect, Spews Fake App Reviews Android

Bleepingcomputer

12.1.20 Citrix ADC CVE-2019-19781 Exploits Released, Fix Now! Exploit

Bleepingcomputer

12.1.20 Australia Bushfire Donors Affected by Credit Card Skimming Attack CyberCrime

Bleepingcomputer

12.1.20 Maze Ransomware Publishes 14GB of Stolen Southwire Files Ransomware

Bleepingcomputer

12.1.20 Sodinikibi Ransomware Hits New York Airport Systems Ransomware

Bleepingcomputer

12.1.20 Beware of Amazon Prime Support Scams in Google Search Ads Spam

Bleepingcomputer

12.1.20 US Govt Warns of Attacks on Unpatched Pulse VPN Servers BigBrothers

Bleepingcomputer

12.1.20 VVVVVV Source Code Released to Mark 10th Anniversary IT

Bleepingcomputer

12.1.20 Microsoft Enables Security Defaults in Azure Active Directory Security

Bleepingcomputer

12.1.20 Google Chrome Will Support Windows 7 After End of Life OS

Bleepingcomputer

12.1.20 Ako Ransomware: Another Day, Another Infection Attacking Businesses Ransomware

Bleepingcomputer

12.1.20 Card-Stealing Scripts Infect Perricone's European Skin Care Sites CyberCrime  Virus

Bleepingcomputer

12.1.20 Google Removed Over 1.7K Joker Malware Infected Apps from Play Store Android  Virus

Bleepingcomputer

12.1.20 KDE Plasma Welcomes Windows 7 Refugees to the Linux Side OS

Bleepingcomputer

12.1.20 Windows 10 Feature Updates Stop Including Drivers Needing Approval OS

Bleepingcomputer

12.1.20 Sodinokibi Ransomware Says Travelex Will Pay, One Way or Another Ransomware

Bleepingcomputer

12.1.20 TrickBot Gang Created a Custom Post-Exploitation Framework BotNet  Exploit

Bleepingcomputer

12.1.20 Cryptojacking Drops by 78% in Southeast Asia After INTERPOL Action BigBrothers  Cryptocurrency

Bleepingcomputer

12.1.20 Windows 10 Insider Build 19541 Warns If Apps Are Using Your Location OS

Bleepingcomputer

12.1.20 Mozilla Firefox 72.0.1 Patches Actively Exploited Zero-Day Exploit  Vulnerebility

Bleepingcomputer

12.1.20 Attackers Are Scanning for Vulnerable Citrix Servers, Secure Now Vulnerebility

Bleepingcomputer

12.1.20 TikTok Flaws Allowed Hackers to Delete Videos, Steal User Info Vulnerebility

Bleepingcomputer

12.1.20 SNAKE Ransomware Is the Next Threat Targeting Business Networks Ransomware

Bleepingcomputer

12.1.20 Tails 4.2 Fixes Numerous Security Flaws, Improves Direct Upgrades OS

Bleepingcomputer

12.1.20 Microsoft Releases January 2020 Office Updates With Crash Fixes OS  Vulnerebility

Bleepingcomputer

12.1.20 Medical Info of Roughly 50K Exposed in Minnesota Hospital Breach Incindent

Bleepingcomputer

12.1.20 Go-Based LiquorBot Adapts Cryptomining Payload to Infected Host Cryptocurrency

Bleepingcomputer

12.1.20

PoC exploits for Citrix ADC and Gateway CVE-2019-19781 flaw released online

Exploit

Securityaffairs
12.1.20

Citrix ADC Exploits are Public and Heavily Used. Attempts to Install Backdoor

Exploit

SANS
11.1.20 Iran Cyber Threat Update BigBrother blog

Mcafee blog

11.1.20

We Be Jammin’ – Bypassing Chamberlain myQ Garage Doors Vulnerebility blog

Mcafee blog

11.1.20

The Cloning of The Ring – Who Can Unlock Your Door? Security blog

Mcafee blog

11.1.20

The Tradeoff Between Convenience and Security – A Balancing Act for Consumers and Manufacturers Cyber blog

Mcafee blog

11.1.20 Black Friday, Cyber Monday and the Seasonal E-Commerce Onslaught Cyber blog F5 Labs

11.1.20

Build Your Immunity Across All App-Security Insertion Points Security blog

F5 Labs

11.1.20

Is the Cloud Safe? Part 2: Breach Highlights for the Past 3 Years Safety blog

F5 Labs

11.1.20 SAIGON, the Mysterious Ursnif Fork Malware blog

FireEye

11.1.20

Tik or Tok? Is TikTok secure enough? BigBrother blog Checkpoint

11.1.20

Remote iPhone Exploitation Part 3: From Memory Corruption to JavaScript and Back -- Gaining Code Execution Exploit blog Project Zero

11.1.20

Remote iPhone Exploitation Part 2: Bringing Light into the Darkness -- a Remote ASLR Bypass Exploit blog Project Zero
11.1.20 Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641 Exploit blog Project Zero

11.1.20

Policy and Disclosure: 2020 Edition Cyber blog Project Zero

11.1.20

Connected cars: How to improve their connection to cybersecurity Cyber blog

Eset

11.1.20

Mozilla rushes out patch for Firefox zero‑day Vulnerebility blog

Eset

11.1.20

CES – Taking a smart city for a test drive Security blog

Eset

11.1.20

Facebook bans deepfakes but not all altered content Social blog Eset
11.1.20 PoC Exploits Released for Citrix ADC and Gateway RCE Vulnerability Exploit  Vulnerebility Thehackernews
11.1.20 FBI Tightening Up Wiretap Protocols After Watchdog Report BigBrothers Securityweek

11.1.20

Pulse Secure VPN Vulnerability Still Widely Exploited, CISA Warns Vulnerebility Securityweek

11.1.20

Dixons Fined by UK Regulator Over Data Breach BigBrothers  Incindent Securityweek

11.1.20

Christmas Ransomware Attack Hit New York Airport Servers Ransomware Securityweek
11.1.20 New Bill Would Prohibit Intelligence Sharing With Countries That Use Huawei BigBrothers Securityweek

11.1.20

Remote Code Execution Flaw Impacts E2fsprogs Filesystem Utility Vulnerebility Securityweek

11.1.20

Cable Haunt: Millions of Cable Modems With Broadcom Chips Vulnerable to Attacks Attack  Vulnerebility Securityweek

11.1.20

Pwn2Own 2020: Researchers Again Invited to Hack Tesla Congress Securityweek
11.1.20 AA20-010A : Continued Exploitation of Pulse Secure VPN Vulnerability CERT CERT

11.1.20

Cable Haunt flaw exposes 200M+ Broadcom-based cable modems at remote hijacking Incindent Securityaffairs

11.1.20

CISA warns that Pulse Secure VPN issue CVE-2019-11510 is still exploited Exploit  Vulnerebility Securityaffairs

11.1.20

Albany County Airport authority hit by a ransomware attack Ransomware Securityaffairs
11.1.20 Two MageCart groups competed to steal credit cards data from Perricone MD ‘s European skincare sites CyberCrime Securityaffairs

11.1.20

Oil-and-Gas APT Pivots to U.S. Power Plants

APT

Threatpost

11.1.20

Cisco Webex Bug Allows Remote Code Execution

Vulnerebility

Threatpost

11.1.20

Lifeline Assistance Phone Users Targeted with ‘Uninstallable’ Adware

Mobil  Virus

Threatpost

10.1.20 Microsoft Phishing Scam Exploits Iran Cyberattack Scare Phishing

Bleepingcomputer

10.1.20

Firefox 72 Out With Fingerprinter Blocking, Hidden Notification Prompts Safety

Bleepingcomputer

10.1.20

MageCart Attackers Steal Card Info from Focus Camera Shoppers CyberCrime

Bleepingcomputer

10.1.20 MP Says Austria Unprepared After Cyberattack on Foreign Ministry BigBrothers

Bleepingcomputer

10.1.20 Fake Windows 10 Desktop Used in New Police Browser Lock Scam OS

Bleepingcomputer

10.1.20

InfoTrax Gets Slap on The Wrist After Being Breached 20+ Times Incindent

Bleepingcomputer

10.1.20

Nvidia CES Game Ready Driver Adds a Maximum Frame Rate Setting IT

Bleepingcomputer

10.1.20 IT Executive Steals $6 Million, Busted by Word Doc Metadata CyberCrime

Bleepingcomputer

10.1.20 Sodinokibi Ransomware Hits Travelex, Demands $3 Million Ransomware

Bleepingcomputer

10.1.20

US Govt Says Iran's Cyberattacks Can Disrupt Critical Infrastructure BigBrothers

Bleepingcomputer

10.1.20

How to Stop Microsoft From Testing New Features in Edge OS

Bleepingcomputer

10.1.20 BusKill Cable Starts a Self-Destruct Routine on Stolen Laptops Safety

Bleepingcomputer

10.1.20

Kali Linux to Default to Non-Root User With 2020.1 Release OS

Bleepingcomputer

10.1.20 Linux Gamers Banned in Battlefield V if Using Wine and DXVK IT

Bleepingcomputer

10.1.20

Exploit Fully Breaks SHA-1, Lowers the Attack Bar

Attack  Exploit

Threatpost

10.1.20

TrickBot Adds Custom, Stealthy Backdoor to its Arsenal

Virus

Threatpost

10.1.20

4 Ring Employees Fired For Spying on Customers

CyberSpy

Threatpost

10.1.20

California’s Tough New Privacy Law and Its Biggest Challenges

BigBrothers  Incindent

Threatpost

10.1.20

56.25 million US residents records collected by CheckPeople exposed on a Chinese server

Incindent

Securityaffairs

10.1.20

North Korea-linked Lazarus APT continues to target cryptocurrency exchanges APT  Cryptocurrency Securityaffairs

10.1.20

Experts warn of ongoing scans for Citrix servers affected by CVE-2019-19781 Vulnerebility Securityaffairs
10.1.20 TrickBot gangs developed the PowerTrick backdoor for high-value targets Virus Securityaffairs
10.1.20 Hackers Scan for Vulnerable Citrix ADC Systems Vulnerebility Securityweek

10.1.20

Connected Cars Moving Targets for Hackers Hacking Securityweek

10.1.20

More Threat Groups Target Electric Utilities in North America Hacking Securityweek
10.1.20 North Korean Hackers Continue to Target Cryptocurrency Exchanges Cryptocurrency Securityweek

10.1.20

Threat From Pre-Installed Malware on Android Phones is Growing Android Securityweek
10.1.20 PayPal Patches Vulnerability That Exposed User Passwords Vulnerebility Securityweek
10.1.20

More Data Exfiltration

Security

SANS

10.1.20

Companies: Lean into consumer privacy to win

Privacy

Net-security

10.1.20

January 2020 Patch Tuesday forecast: Let’s start the new decade right

Vulnerebility

Net-security

10.1.20

What students think about university data security

Security

Net-security

9.1.20 Interpol: Goldfish Alpha operation reduces cryptojacking by 78% BigBrothers  CyberCrime Securityaffairs

9.1.20

TrickBot Operators Create New Backdoor for Important Targets Virus Securityweek

9.1.20

Rockwell Automation to Acquire Cybersecurity Firm Avnet IT Securityweek
9.1.20 Critical Firefox 0-Day Under Active Attacks – Update Your Browser Now! Vulnerebility Thehackernews
9.1.20

Quick Analyzis of a(nother) Maldoc

Virus

SANS

9.1.20

Attackers exploiting critical Citrix ADC, Gateway flaw, company yet to release fixes

Vulnerebility

Net-security

9.1.20

Mozilla patches actively exploited Firefox zero-day

Exploit  Vulnerebility

Net-security

9.1.20 Smartphone shopaholic Mobil Securelist

9.1.20

Google Ditches Patch-Time Bug Disclosure in Favor of 90-Day Policy

Vulnerebility

Threatpost

9.1.20

TikTok Riddled With Security Flaws

Vulnerebility

Threatpost

9.1.20

Liverpool Voyeur Used IM-RAT to Video Women at Home

Virus

Threatpost

9.1.20

Mozilla Releases Firefox 72: High-Severity Bugs Patched, Fingerpinting Nixed

Vulnerebility

Threatpost

9.1.20

Drake Lyrics Used as Calling Card in Malware Attack

Virus

Threatpost

9.1.20

Man Sentenced in ATM Skimming Conspiracy

CyberCrime

Threatpost

9.1.20 Mozilla addresses CVE-2019-17026 Firefox Zero-Day exploited in targeted attacks Exploit  Vulnerebility Securityaffairs

9.1.20

The city of Las Vegas announced it has suffered a cyber attack Attack Securityaffairs
9.1.20 MITRE presents ATT&CK for ICS, a knowledge base for ICS ICS Securityaffairs
9.1.20 Shambles Attack Attack Attack

9.1.20

Shambles  Attack Papers Papers
9.1.20 Citrix Application Delivery Controller and Citrix Gateway web server vulnerability Alert Alert

9.1.20

Mozilla Patches Firefox Zero-Day Exploited in Targeted Attacks Exploit  Vulnerebility Securityweek

9.1.20

Nepal Deports 122 Chinese Nationals After Cyber Raid BigBrothers  CyberCrime Securityweek

9.1.20

FBI Asks Apple for Phone Data From Saudi Shooting Suspect Apple  BigBrothers Securityweek
9.1.20 Interpol Announces Successful Operation Against Cryptojacking in Southeast Asia BigBrothers  Cryptocurrency Securityweek

9.1.20

Google Project Zero Updates Vulnerability Disclosure Policy Vulnerebility Securityweek

9.1.20

Kuwait Denies US Troop Pullout, Says News Agency Hacked BigBrothers Securityweek

9.1.20

Firefox 72 Blocks Fingerprinting Scripts by Default Safety Securityweek
9.1.20 Travelex Says Financially Unaffected by Hacking Hacking Securityweek

9.1.20

BlackBerry Announces Automotive Security Solution Mobil Securityweek

9.1.20

China-Made TikTok App Riddled With Security Holes: Researchers BigBrothers Securityweek

9.1.20

Las Vegas Reports Cyber Attack; Extent of Breach Unclear Attack  Incindent Securityweek
9.1.20 Threat Posed by Iran to Industrial Systems After Killing of Top General ICS Securityweek

9.1.20

Windows 7 - End of Life

Safety

SANS

9.1.20

California’s IoT cybersecurity bill: What it gets right and wrong

IoT

Net-security

9.1.20

When do you plan to upgrade to 5G?

Mobil

Net-security

9.1.20

eBook: How Hackers Plan Their Attacks

Security

Net-security

8.1.20

Security flaws allowed hijacking any TikTok account

Vulnerebility

Securityaffairs

8.1.20

MITRE Releases ATT&CK Knowledge Base for Industrial Control Systems

ICS

Securityweek

8.1.20

App on Google Play exploited Android bug to deliver spyware

Android

Net-security

8.1.20

Travelex extorted by ransomware gang, services still offline a week after the hit

Ransomware

Net-security

8.1.20

ATT&CK for ICS: Knowledge base of techniques used by cyber adversaries

ICS

Net-security

8.1.20 Operation AppleJeus Sequel Apple Securelist
8.1.20 SNAKE Ransomware is targeting business networks Ransomware Securityaffairs
8.1.20 Researchers Demonstrate How to Hack Any TikTok Account by Sending SMS Hacking  Mobil Thehackernews
8.1.20

Facebook Cracks Down on Deepfake Videos

Social

Threatpost

8.1.20

Google Fixes Critical Android RCE Flaw

Android

Threatpost

8.1.20

Sodinokibi Ransomware Behind Travelex Fiasco: Report

Ransomware

Threatpost
8.1.20

FBI Taps Apple to Unlock Pensacola Shooter’s iPhone

Apple  BigBrothers

Threatpost

8.1.20 Facebook declares war to Deepfake videos Social Securityaffairs
8.1.20 Medical info of 49,351 patients exposed in Alomere Health hospital breach Incindent Securityaffairs
8.1.20 MageCart gang compromised popular Focus Camera website CyberCrime Securityaffairs
8.1.20 Google blocks Xiaomi integrations on Nest hub over privacy concerns Mobil  Privacy Securityaffairs
8.1.20 China-based Bronze President APT targets South and East Asia APT Securityaffairs
8.1.20 Malicious app exploiting CVE-2019-2215 zero-day available in Google Play since March Android  Exploit Securityaffairs
8.1.20 Chinese Cyber-Espionage Group Targeted NGOs for Years APT Securityweek
8.1.20 Iran Strikes Back at US With Missile Attack at Bases in Iraq BigBrothers Securityweek
8.1.20

Why the 2020 US presidential election is still vulnerable to foreign interference

BigBrothers

Net-security
8.1.20

Smart cities are on the rise, what are the dangers?

Security

Net-security
8.1.20

Trends that will shape the 2020 technology market

IT

Net-security
8.1.20

Are you ready for the end of Windows 7 support?

Safety

Net-security
7.1.20 Mimecast Acquires Threat Protection Provider Segasec Security Securityweek
7.1.20 Microsoft Access Files Could Include Unintentionally Saved Sensitive Data Security Securityweek
7.1.20 Are Overlapping Security Tools Adversely Impacting Your Security Posture? Security Securityweek
7.1.20 Accenture to Acquire Symantec's Security Services Unit from Broadcom IT Securityweek
7.1.20 Android's January 2020 Update Patches 40 Vulnerabilities Android Securityweek
7.1.20 Facebook, Samsung, Ring Unveil New Privacy, Security Tools at CES 2020 Social Securityweek
7.1.20 3 Google Play Store Apps Exploit Android Zero-Day Used by NSO Group Android Thehackernews
7.1.20

A Quick Update on Scanning for CVE-2019-19781 (Citrix ADC / Gateway Vulnerability)

Vulnerebility

SANS
7.1.20

PCs still running Windows 7 will soon be significantly more at risk of ransomware

Ransomware

Net-security
7.1.20

Facial recognition hardware to reach over 800 million devices by 2024

IT

Net-security
7.1.20

Burner phones are an eavesdropping risk for international travelers

Mobil

Net-security
7.1.20

Data ownership vs. data processing: A moral dilemma?

IT

Net-security
7.1.20

Cisco Data Center Network Manager flaws fixed, Cisco ASA appliances under attack

Attack

Net-security
7.1.20

ToTok Returned to Google Play Despite ‘Spy Tool’ Claims

Android  BigBrothers  CyberSpy

Threatpost

7.1.20

Hackers Deface U.S. Gov Website With Pro-Iran Messages

BigBrothers

Threatpost

7.1.20

DeathRansom Campaign Linked to Malware Cornucopia

Ransomware  Virus

Threatpost
7.1.20

Magecart Hits Parents and Students via Blue Bear Attack

Hacking

Threatpost

7.1.20 Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad CERT CERT
7.1.20 HappyHotel, popular search engine for love hotels in Japan discloses data breach Incindent Securityaffairs
7.1.20 Microsoft report: around 0.08% of RDP brute-force attacks are successful Attack Securityaffairs
7.1.20 DHS warns of Iran-linked attacks in a National Terrorism Advisory System bulletin BigBrothers Securityaffairs
7.1.20 School software provider Active Network discloses data breach Incindent Securityaffairs
7.1.20 App Found in Google Play Exploits Recent Android Zero-Day Android  Exploit Securityweek
7.1.20 Insight Partners Acquires IoT Security Firm Armis at $1.1 Billion Valuation IT Securityweek
7.1.20 Antivirus Vendors Patch Bug First Discovered 10 Years Ago Vulnerebility Securityweek
7.1.20 Google Blocks Xiaomi Integrations Over Privacy Concerns Privacy Securityweek
7.1.20 Pulse Secure VPN Vulnerability Exploited to Deliver Ransomware Exploit  Ransomware  Vulnerebility Securityweek
7.1.20 DHS Warns of Possible Iranian Cyberattacks After Killing of Qassem Soleimani BigBrothers Securityweek
7.1.20 'Serious' Cyber Attack Hits Austrian Ministry BigBrothers Securityweek
7.1.20

SNMP service: still opened to the public and still queried by attackers

Attack

SANS
6.1.20 Clop Ransomware Now Kills Windows 10 Apps and 3rd Party Tools Ransomware

Bleepingcomputer

6.1.20 Microsoft Products Reaching End of Life in 2020 IT

Bleepingcomputer

6.1.20 FBI Warns of Maze Ransomware Focusing on U.S. Companies BigBrothers  Ransomware

Bleepingcomputer

6.1.20 U.S. Government Issues Warning About Possible Iranian Cyberattacks BigBrothers

Bleepingcomputer

6.1.20 Colorado Town Wires Over $1 Million to BEC Scammers Spam

Bleepingcomputer

6.1.20 Maze Ransomware Sued for Publishing Victim's Stolen Data Ransomware

Bleepingcomputer

6.1.20 Python 2.7 Reaches End of Life After 20 Years of Development IT

Bleepingcomputer

6.1.20 Poloniex Forces Password Reset After Data Leak Found Online Incindent

Bleepingcomputer

6.1.20 Popular U.S. Restaurant Owner Hit by Credit Card Stealing Malware Virus

Bleepingcomputer

6.1.20 Ransomware Attackers Offer Holiday Discounts and Greetings Ransomware

Bleepingcomputer

6.1.20 Austria’s foreign ministry is facing a ‘serious cyberattack’ BigBrothers Securityaffairs
6.1.20 California IT service provider Synoptek pays ransom after Sodinokibi attack Ransomware Securityaffairs
6.1.20 Federal Depository Library Program Govn agency breached by Iranian hackers BigBrothers Securityaffairs
6.1.20 DeathRansom ransomware evolves encrypting files, but experts identified its author Ransomware Securityaffairs
6.1.20 Popular Mideast App Accused of Spying Back on Google Play Android Securityweek
6.1.20 'Iranian Hackers' Claim Breach of US Govt Website BigBrothers Securityweek
6.1.20 Iranian Cyberattacks Feared After Killing of Top General BigBrothers Securityweek
6.1.20

Increase in Number of Sources January 3rd and 4th: spoofed

Security

SANS
6.1.20

Modern security product certification best practices

Security Net-security
6.1.20

Five cyber risks that will define 2020

Cyber

Net-security
6.1.20

RSA Conference 2020 USA: What you can expect at this year’s event

Congress

Net-security
6.1.20

Automotive cybersecurity incidents doubled in 2019, up 605% since 2016

Incindent

Net-security
5.1.20 Ransom News Ransom Ransom
5.1.20 Ransomware attackers wish victims happy holidays, offer discounts Ransomware blog Avast blog
5.1.20 9 Cybersecurity Predictions for Europe, the Middle East and Africa in 2020 Cyber blog

Palo Alto

5.1.20 Improve How You Enforce Security Policies with the Panorama Plugin for Cisc... Cyber blog

Palo Alto

5.1.20 Cybersecurity Canon Candidate Book Review: Tribe of Hackers Cyber blog

Palo Alto

5.1.20 10 Articles from Security Roundtable That You Shouldn’t Miss Cyber blog Palo Alto
5.1.20 Cybersecurity Canon Candidate Book Review: Defensive Security Handbook – Be... Cyber blog Palo Alto
5.1.20

KringleCon 2019

Congress

SANS

5.1.20 U.S. CISA Agency warns of possible cyber attacks from Iran BigBrothers Securityaffairs
5.1.20 BusKill, a $20 USB Dead Man’s Switch for Linux Laptop Security Securityaffairs
4.1.20 Facebook fined $1.65 by Brazil Governenment over Cambridge Analytica Social Securityaffairs
4.1.20 Cisco Talos discovered 2 critical flaws in the popular OpenCV library Vulnerebility Securityaffairs
4.1.20 US Army banned the popular TikTok app over China security concerns BigBrothers Securityaffairs
4.1.20 Travelex currency exchange suspends services after malware attack Virus Securityaffairs
4.1.20 MOBILE MALWARE: FROM CONSUMER FRAUD TO ENTERPRISE ESPIONAGE Malware blog

Cybereason

4.1.20 IS CYBER RETALIATION FROM IRAN IMMINENT? BigBrother blog

Cybereason

4.1.20 Google disables Xiaomi smart home integration after camera bug Vulnerebility blog

Eset

4.1.20 Simple steps to protect yourself against identity theft Cyber blog

Eset

4.1.20 20 tips for 2020: Be smarter with your smartphone Cyber blog

Eset

4.1.20 20 tips for 2020: Mistakes to avoid Cyber blog Eset
4.1.20 Iran May Respond With Cyberattacks to Killing of Qassem Soleimani BigBrothers Securityweek
4.1.20 How Will Iran Retaliate to Soleimani Killing? BigBrothers Securityweek
4.1.20 Cyberattack Forces Currency Exchange Giant Travelex Offline Attack Securityweek
4.1.20 Serious Vulnerabilities Patched in OpenCV Computer Vision Library Vulnerebility Securityweek
4.1.20 Apple Targets Jailbreaking in New Complaint Against Corellium Apple Securityweek
4.1.20 Firefox 72 Will Let Users Delete Telemetry Data Privacy Securityweek
4.1.20 Landry's Discloses Payment Card Incident Incindent Securityweek
4.1.20

3 Critical Bugs Allow Remote Attacks on Cisco NX-OS and Switches

Vulnerebility

Threatpost

4.1.20

Google Boots Security Camera Maker From Nest Hub After Private Images Go Public

Privacy  Security

Threatpost

4.1.20

Cybercriminals Fill Up on Gas Pump Transaction Scams Ahead of Oct. Deadline

Spam

Threatpost
4.1.20

Travelex Knocked Offline by System-Wide Malware Attack

Virus

Threatpost

4.1.20

Ransomware Attack Topples Telemarketing Firm, Leaving Hundreds Jobless

Ransomware

Threatpost
3.1.20

TikTok Banned By U.S. Army Over China Security Concerns

BigBrothers

Threatpost

3.1.20

California Adopts Strictest Privacy Law in U.S.

Privacy

Threatpost

3.1.20

Data Breach Affects 63 Landry’s Restaurants

Incindent

Threatpost
3.1.20 Cisco addresses several flaws in its DCNM product Vulnerebility Securityaffairs
3.1.20 Remote Command Execution and Information disclosure flaws affect dozens of D-Link routers Vulnerebility Securityaffairs
3.1.20 US restaurant chain Landry’s discloses payment card breach Incindent Securityaffairs
3.1.20 Poloniex forces password reset following a data leak Incindent Securityaffairs

3.1.20

Crooks use Star Wars saga as bait in Phishing and malware attacks Phishing  Virus Securityaffairs
3.1.20 Watch out, sextortion scammers are using a new tactic Spam Securityaffairs
3.1.20 Cisco DCNM Users Warned of Serious Vulnerabilities Vulnerebility Securityweek
3.1.20 Critical Vulnerabilities Impact Ruckus Wi-Fi Routers Vulnerebility Securityweek
3.1.20 Unprotected Database Leaks Data of Wyze Users Incindent Securityweek

3.1.20

ProtonMail Launches Encrypted Calendar Application Safety Securityweek
3.1.20 Remote Command Execution Vulnerability Affects Many D-Link Routers Vulnerebility Securityweek
3.1.20 Xiaomi Cameras Connected to Google Nest Expose Video Feeds From Others Hacking Thehackernews
3.1.20 Landry's Restaurant Chain Suffers Payment Card Theft Via PoS Malware Virus Thehackernews

3.1.20

CCPA - Quick Overview

Privacy

SANS

2.1.20

High Risk Vulnerabilities Addressed in Big Monitoring Fabric Vulnerebility Securityweek

2.1.20

Facebook Fined $1.65 Mn by Brazil Social Securityweek

2.1.20

Feds: No Evidence Hackers Disrupted North Carolina Voting BigBrothers Securityweek

2.1.20

Microsoft Seizes Web Domains Used by North Korean Hackers APT Securityweek
2.1.20 Wawa Facing Lawsuits Over Data Breach at All of its Stores Incindent Securityweek

2.1.20

UN Backs Russia on Internet Convention, Alarming Rights Advocates BigBrothers Securityweek

2.1.20

UAE Denies Developing Popular Mideast App as Spy Tool BigBrothers Securityweek

2.1.20

Nepal Arrests 122 Chinese Over Suspected Cyber Scam BigBrothers Securityweek

2.1.20

Thai Officials Say Prison Cameras Were Hacked, Broadcast BigBrothers Securityweek

2.1.20

Evolution of OpenSSL Security After Heartbleed Crypto Securityweek

2.1.20

Popular Mideast App Pulled After Report it Was Spying Tool Android Securityweek
2.1.20 Mastercard to Buy Supply Chain Monitoring Firm RiskRecon IT Securityweek

2.1.20

British Hacker Sentenced for Blackmailing Apple Apple Securityweek

2.1.20

Citrix Vulnerability Leaves 80,000 Companies at Risk Vulnerebility Securityweek

2.1.20

Three GozNym Malware Operators Sentenced Virus Securityweek

2.1.20

Twitter, Facebook Target State-Linked Accounts Made to Manipulate Social Securityweek

2.1.20

As US Congress Delays on Privacy, California Law in Focus BigBrothers Securityweek

2.1.20

Over 50 Islands Restaurants Hit by Payment Card Breach Incindent Securityweek

2.1.20

Data of Honda Owners in North America Exposed Online Incindent Securityweek
2.1.20 Vulnerability in Twitter App Enabled Hackers to Obtain Information, Control Accounts Social Securityweek

2.1.20

Shitcoin Wallet Chrome extension steals crypto-wallet private keys and passwords

Cryptocurrency

Securityaffairs

2.1.20

Ransomware in Node.js

Ransomware

SANS

1.1.20

Mariah Carey ‘s Twitter Hacked on New Year’s Eve Social Securityaffairs

1.1.20

Irish National Cyber Security Strategy warns of ​attacks on Irish data centres BigBrothers Securityaffairs

1.1.20

"Nim httpclient/1.0.4"

Security

SANS

1.1.20

Expert finds Starbucks API Key exposed online Incindent Securityaffairs

1.1.20

7 Tips for Maximizing Your SOC

Security

Threatpost

1.1.20

2020 Cybersecurity Trends to Watch

Cyber

Threatpost

1.1.20

Starbucks Devs Leave API Key in GitHub Public Repo

Security

Bleepingcomputer

1.1.20

Sextortion Email Scammers Try New Tactics to Bypass Spam Filters

Spam

Bleepingcomputer

1.1.20

How to Join the Windows Insider Program with a Local Account

OS

Bleepingcomputer

1.1.20

Special Olympics New York Hacked to Send Phishing Emails

Phishing

Bleepingcomputer

1.1.20

Microsoft Takes North Korean Hacking Group Thallium to Court

APT

Bleepingcomputer

1.1.20

Wyze Exposes User Data via Unsecured ElasticSearch Cluster

Incindent

Bleepingcomputer

1.1.20

Dark web Grey Market still down, users speculate possible Exit Scam

CyberCrime

Securityaffairs