Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Virus  Vulnerebility Calendar - 2020  2019  2018  2017  2016 


2020 - January  February  March  April  May  June  July  August  September  October  November  December


Date

Name

Category

Web

24.5.20

Data breach at easyJet puts 9 million at risk

Incident blog

Avast blog

24.5.20

How to protect yourself from data breaches

Incident blog

Avast blog

24.5.20

The latest security trends from Verizon’s annual breach report

Incident blog

Avast blog

24.5.20

Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding

Cryptocurrency blog

Palo Alto Unity42

24.5.20

Mirai and Hoaxcalls Botnets Target Legacy Symantec Web Gateways

BotNet blog

Palo Alto Unity42

24.5.20

Updated BackConfig Malware Targeting Government and Military Organizations in South Asia

BigBrother blog

Palo Alto Unity42

24.5.20

Threat Brief: Maze Ransomware Activities

Ransomware blog

Palo Alto Unity42

24.5.20

SilverTerrier: New COVID-19 Themed Business Email Compromise Schemes

Spam blog

Palo Alto Unity42
24.5.20

Cooperation and Collaborative Partnerships are Key to Protect Businesses

Cyber blog

Palo Alto

24.5.20

FLEXWORK

Cyber blog

Palo Alto

24.5.20

Cortex XDR Managed Threat Hunting Is Available To All Customers

Cyber blog

Palo Alto

24.5.20

Vulnerabilities in Conferencing Tools: Much Ado about Something or Nothing?

Cyber blog

Palo Alto

24.5.20

Are We Prepared to Deal with the Impact of Cyber Threats on 5G?

Cyber blog

Palo Alto

24.5.20

Why DevOps Needs to Change Security

Cyber blog

Palo Alto

24.5.20

CRN Names 10 Leaders from Palo Alto Networks to Women of the Channel List

Cyber blog

Palo Alto
24.5.20 Personal details and documents for millions of Indians available in the deep web Incindent

Securityaffairs

24.5.20 Online education site EduCBA discloses data breach and reset customers’ pwds Incindent Securityaffairs
24.5.20 Experts observed a spike in COVID-19 related malspam emails containing GuLoader Spam

Securityaffairs

24.5.20 Voter information for 2 millions of Indonesians leaked online Incindent Securityaffairs
24.5.20 Silent Night Zeus botnet available for sale in underground forums BotNet Securityaffairs
24.5.20 Syrk Anti-Ramson Tool Anti-Ramson Tool
24.5.20 KokoKrypt Anti-Ramson Tool Anti-Ramson Tool
24.5.20 JavaLocker Anti-Ramson Tool Anti-Ramson Tool
24.5.20 Online education site EduCBA discloses data breach after hack Incindent Bleepingcomputer
24.5.20 Winget: How to use Windows 10's new native Package Manager OS

Bleepingcomputer

24.5.20 Windows 10 KB4556799 Update Breaks Wireless LTE Connectivity OS

Bleepingcomputer

24.5.20 Microsoft Edge 83 released with extension sync and auto-profiles OS

Bleepingcomputer

24.5.20 Microsoft is investigating issues in latest Windows 10 update OS

Bleepingcomputer

24.5.20 Voter info for millions of Indonesians shared on hacker forum Incindent

Bleepingcomputer

24.5.20 Docker fixes Windows client bug letting programs run as SYSTEM Vulnerebility

Bleepingcomputer

24.5.20 Ransomware encrypts from virtual machines to evade antivirus Ransomware

Bleepingcomputer

24.5.20 Mathway investigates data breach after 25M records sold on dark web Incindent

Bleepingcomputer

24.5.20 ZLoader banking malware is back, deployed in over 100 campaigns Virus

Bleepingcomputer

24.5.20 Windows Hello can now complete payments in Google Chrome OS

Bleepingcomputer

24.5.20 Microsoft releases Windows 10 Hyper-V VHDX for ARM64 devices OS

Bleepingcomputer

23.5.20 Hackers tried to use Sophos Firewall zero-day to deploy Ransomware Ransomware Bleepingcomputer
23.5.20 Microsoft Surface Book 3 is now available for purchase IT

Bleepingcomputer

23.5.20 Hacker shares 40 million Wishbone user records for free Incindent

Bleepingcomputer

23.5.20 Office 365 phishing uses Supreme Court theme and working CAPTCHA Phishing

Bleepingcomputer

23.5.20 New Windows 10 Intel microcodes released in forced KB4497165 update OS

Bleepingcomputer

23.5.20 New PipeMon malware uses Windows print processors for persistence Virus

Bleepingcomputer

23.5.20 Vigilante hackers target 'scammers' with ransomware, DDoS attacks Ransomware

Bleepingcomputer

23.5.20 How to use Google Chrome Tab Groups to stay organized IT

Bleepingcomputer

23.5.20 Snake ransomware leaks patient data from Fresenius Medical Care Ransomware

Bleepingcomputer

23.5.20 Adobe releases critical out-of-band security update Vulnerebility

Bleepingcomputer

23.5.20 GhostDNS exploit kit source code leaked to antivirus company Exploit

Bleepingcomputer

23.5.20 Microsoft issues mitigation for the NXNSAttack DNS DDoS attack Attack

Bleepingcomputer

23.5.20 NXNSAttack: Recursive DNS Inefficiencies and Vulnerability Papers Papers
23.5.20

Chafer APT Hits Middle East Govs With Latest Cyber-Espionage Attacks

APT

Threatpost

23.5.20

‘Coronavirus Report’ Emails Spread NetSupport RAT, Microsoft Warns

Virus

Threatpost

23.5.20

NSO Group Impersonates Facebook Security Team to Spread Spyware — Report

CyberCrime  Social

Threatpost
23.5.20

The Florida Unemployment System suffered a data breach

Incindent

Securityaffairs

23.5.20

Experts found a Privilege escalation issue in Docker Desktop for Windows

Vulnerebility

Securityaffairs
23.5.20

Free ImmuniWeb Tool Allows Organizations to Check Dark Web Exposure

CyberCrime

Securityweek
23.5.20 IOCS VS. IOBS Cyber blog Cybereason
23.5.20 WHY A CLOUD-NATIVE EPP IS CRITICAL FOR FUTUREPROOF SECURITY OPERATIONS Cyber blog Cybereason
23.5.20 LEGACY A/V IS SO LAST YEAR Cyber blog Cybereason
23.5.20 How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner Malware blog Mcafee blog
23.5.20 Attacking the Organism: Telecom Service Providers Hacking blog F5 Labs
23.5.20 Using Real-Time Events in Investigations Security blog

FireEye

23.5.20 Analyzing Dark Crystal RAT, a C# backdoor Malware blog

FireEye

23.5.20 Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents Ransomware blog FireEye
23.5.20 Safe-Linking – Eliminating a 20 year-old malloc() exploit primitive Exploit blog Checkpoint
23.5.20 Vulnerability Spotlight: Memory corruption vulnerability in GNU Glibc leaves smart vehicles open to attack Vulnerebility blog Cisco Talos
23.5.20 Vulnerability Spotlight: Authentication bypass vulnerability in some Epson projectors Vulnerebility blog

Cisco Talos

23.5.20 The wolf is back... Security blog

Cisco Talos

23.5.20 Vulnerability Spotlight: Multiple vulnerabilities in Nitro Pro PDF reader Vulnerebility blog

Cisco Talos

23.5.20 Insidious Android malware gives up all malicious features but one to gain stealth OS Blog

Eset

23.5.20 How encryption can help protect your sensitive data Safety blog Eset
23.5.20 Chrome 83 arrives with enhanced security and privacy controls Security blog

Eset

23.5.20 No “Game over” for the Winnti Group APT blog Eset
23.5.20 These things may be cool, but are they safe? Security blog

Eset

23.5.20 Bluetooth flaw exposes countless devices to BIAS attacks Attack blog  Vulnerebility blog Eset
23.5.20 European supercomputers hacked to mine cryptocurrency Cryptocurrency blog

Eset

23.5.20

AgentTesla Delivered via a Malicious PowerPoint Add-In

Virus

SANS
22.5.20 Cyber-Criminal espionage Operation insists on Italian Manufacturing CyberSpy Securityaffairs
22.5.20 Microsoft warns of “massive campaign” using COVID-19 themed emails Spam

Securityaffairs

22.5.20 Winnti uses a new PipeMon backdoor in attacks aimed at the gaming industry Virus Securityaffairs
22.5.20 Ragnar Locker Ransomware Uses Virtual Machines for Evasion Ransomware Securityweek
22.5.20 Industry Reactions to Verizon 2020 DBIR: Feedback Friday Incindent Securityweek
22.5.20 Data Breach Hits Florida Unemployment System Incindent Securityweek
22.5.20 Hackers Attempted to Deploy Ransomware in Attacks Targeting Sophos Firewalls Ransomware Securityweek
22.5.20 Hackers Can Target Rockwell Industrial Software With Malicious EDS Files Virus Securityweek
22.5.20 Bitter Israel-Iran Rivalry Takes New Forms Online BigBrothers Securityweek
22.5.20

Cisco fixes critical RCE flaw in call center solution

Vulnerebility

Net-security
22.5.20

Critical Cisco Bug in Unified CCX Allows Remote Code Execution

Vulnerebility

Threatpost

22.5.20

Crooks Tap Google Firebase in Fresh Phishing Tactic

Phishing

Threatpost

22.5.20

Supreme Court Phish Targets Office 365 Credentials

Phishing

Threatpost

22.5.20

Silent Night Banking Trojan Charges Top Dollar on the Underground

Virus

Threatpost
22.5.20

Santander, one of the biggest European banks, was leaking sensitive data on their website

Incindent

Securityaffairs
22.5.20

Sophos blocked attacks exploiting XG Firewall zero-day to deploy Ransomware

Ransomware

Securityaffairs
22.5.20

Meal delivery service Home Chef discloses data breach

Incindent

Securityaffairs

22.5.20

Tens of thousands Israeli websites defaced

BigBrothers

Securityaffairs
22.5.20

Signal PINs Allow Users to Recover Data When Switching Phones

Mobil

Securityweek
22.5.20

Cisco Patches Critical Vulnerability in Contact Center Software

Vulnerebility

Securityweek
22.5.20

Surveillance Fears Drive Business Use of Secure Collaboration Tools

BigBrothers

Securityweek
22.5.20

Facebook Unveils Scam Warnings for Messenger Users

Social

Securityweek
22.5.20

Tools Used in GhostDNS Router Hijack Campaigns Dissected

Hacking

Securityweek
22.5.20

Hackers Start Leaking Files Stolen From Shipping Giant Toll

Incindent

Securityweek
22.5.20

Zoom to Provide Detailed Info on Upcoming End-to-End Encryption Feature

Safety

Securityweek
22.5.20

Create a safe haven for your customers to build loyalty

Security

Net-security
22.5.20

Integrating a SIEM solution in a large enterprise with disparate global centers

Safety

Net-security
22.5.20

The dark web is flooded with offers to purchase corporate network access

Cyber

Net-security
22.5.20

What can merchants do to avoid falling victim to large-scale ATO attacks?

Attack

Net-security
22.5.20

Number of active IoT devices expected to reach 24.1 billion in 2030

IoT

Net-security
22.5.20

Signal fixes location-revealing flaw, introduces Signal PINs

Mobil

Net-security
22.5.20

Beware of phishing emails urging for a LogMeIn security update

Phishing

Net-security
21.5.20 Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia Report Report
21.5.20 Iran-linked Chafer APT group targets governments in Kuwait and Saudi Arabia APT Securityaffairs
21.5.20 Japan suspects HGV missile data leak in Mitsubishi security breach Incindent

Securityaffairs

21.5.20 Israeli Websites Targeted in Major Cyber Attack BigBrothers Securityweek
21.5.20 Meal Kit Service Home Chef Confirms Data Breach Incindent Securityweek
21.5.20 Smarsh Adds Cybersecurity and Compliance to Archiving with Acquisition of Entreda Cyber Securityweek
21.5.20 XSS, Open Redirect Vulnerabilities Patched in Drupal Vulnerebility Securityweek
21.5.20 Cyber Insurance Provider Coalition Raises $90 Million IT Securityweek
21.5.20 Microsoft Announces New Security Features for Devs, Customers Security Securityweek
21.5.20 How Cybersecurity Enables Government, Health, EduTech Cope With COVID-19 Cyber Thehackernews
21.5.20 Iranian APT Group Targets Governments in Kuwait and Saudi Arabia APT Thehackernews
21.5.20 Home Chef announces data breach after hacker sells 8M user records Incindent Bleepingcomputer
21.5.20 How to enable the new Google Chrome 83 features now Security

Bleepingcomputer

21.5.20 Microsoft warns of 'massive' phishing attack pushing legit RAT Phishing  Virus

Bleepingcomputer

21.5.20 BEC Scammers target unemployment and CARES Act claims Spam

Bleepingcomputer

21.5.20 Windows 10 KB4556799 update won't install, has audio issues, bugs OS

Bleepingcomputer

21.5.20 Windows Terminal 1.0 is here with numerous improvements OS

Bleepingcomputer

21.5.20 EasyJet hacked: data breach affects 9 million customers Incindent

Bleepingcomputer

21.5.20 Google rolls out new Enhanced Safe Browsing security feature Safety

Bleepingcomputer

21.5.20 Chrome 83 released with massive security and privacy upgrades Security

Bleepingcomputer

21.5.20 NetWalker adjusts ransomware operation to only target enterprise Ransomware

Bleepingcomputer

21.5.20 Microsoft announces new Chromium Edge features at Build 2020 OS

Bleepingcomputer

21.5.20 New Microsoft Teams enhancements announced at Build 2020 IT

Bleepingcomputer

21.5.20

Verizon DBIR: Web App Attacks and Security Errors Surge

Attack

Threatpost

21.5.20

Fraudulent Unemployment, COVID-19 Relief Claims Earn BEC Gang Millions

Spam

Threatpost

21.5.20

NetWalker Ransomware Gang Hunts for Top-Notch Affiliates

Ransomware

Threatpost

21.5.20

Alleged Hacker Behind Massive ‘Collection 1’ Data Dump Arrested

Crime

Threatpost
21.5.20

VMware fixes CVE-2020-3956 Remote Code Execution issue in Cloud Director

Vulnerebility

Securityaffairs
21.5.20

Adobe fixed several memory corruption issues in some of its products

Vulnerebility

Securityaffairs
21.5.20

Israel is suspected to be behind the cyberattack on Iranian port

BigBrothers

Securityaffairs

21.5.20

Chrome 83 Brings Enhanced Safe Browsing, New Privacy and Security Controls

Security

Securityweek
21.5.20

Pandemic-related Supply Chain and Money Laundering Woes in the Dark Web

CyberCrime

Securityweek
21.5.20

Website Security Provider Source Defense Raises $10.5 Million

IT

Securityweek
21.5.20

Vulnerabilities Exposed Hundreds of Thousands of QNAP NAS Devices to Attacks

Vulnerebility

Securityweek
21.5.20

Japan Suspects Missile Data Leak in Mitsubishi Cyberattack

Incindent

Securityweek
21.5.20

Remote Code Execution Vulnerability Patched in VMware Cloud Director

Vulnerebility

Securityweek
21.5.20

Malware Triage with FLOSS: API Calls Based Behavior

Virus

SANS
21.5.20

The missing link in your SOC: Secure the mainframe

Security

Net-security
21.5.20

What do IGA solutions have in common with listening to music anywhere?

Security

Net-security
21.5.20

How secure are open source libraries?

Security

Net-security
21.5.20

Only 36% of critical infrastructures have a high level of cyber resilience

Security

Net-security
21.5.20

COVID-19 is driving diverging perspectives as enterprises decide which technologies to focus on

Security

Net-security
21.5.20

RedisAI and RedisGears address challenges customers have as they move AI into production

Security

Net-security
20.5.20 IT threat evolution Q1 2020 Analysis Securelist
20.5.20 IT threat evolution Q1 2020. Statistics Analysis Securelist
20.5.20 Researchers disclose five Microsoft Windows zero-days Vulnerebility Securityaffairs
20.5.20 Three flaws in Nitro Pro PDF reader expose businesses to hack Vulnerebility Securityaffairs
20.5.20 Canada Fines Facebook Over Misleading Privacy Claims BigBrothers

Securityweek

20.5.20 Container Security Company Aqua Raises $30 Million in Series D Round IT Securityweek
20.5.20 Tech-Assisted COVID-19 Tracking Is Having Some Issues Security Securityweek
20.5.20 Researcher Finds Memory Corruption Vulnerabilities in Several Adobe Products Vulnerebility

Securityweek

20.5.20 WordPress Malware Targets WooCommerce Stores Virus Securityweek
20.5.20 New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks Attack Thehackernews
20.5.20 Ukrainian Police Arrest Hacker Who Tried Selling Billions of Stolen Records Crime Thehackernews
20.5.20

Chrome 83: Enhanced Safe Browsing, Secure DNS, a Safety Check

Security

Net-security
20.5.20

Vulnerability in Qmail mail transport agent allows RCE

Vulnerebility

Net-security
20.5.20

EasyJet data breach: 9 million customers affected

Incindent

Net-security
20.5.20 2020-data-breach-investigations-report Report

Report

20.5.20

Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices

Attack

Threatpost

20.5.20

Verizon Data Breach Report: DoS Skyrockets, Espionage Dips

Incindent

Threatpost

20.5.20

WolfRAT Android Malware Targets WhatsApp, Facebook Messenger

Android

Threatpost

20.5.20

Adobe Patches Critical RCE Flaw in Character Animator App

Vulnerebility

Threatpost
20.5.20

EasyJet Hackers Take Off with Travel Details for 9M Customers

Incindent

Threatpost
20.5.20

Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials

Phishing

Threatpost
20.5.20

Security Service of Ukraine arrested the popular hacker Sanix who sold billions of stolen credentials

Incindent

Securityaffairs
20.5.20

Bluetooth BIAS attack threatens billions of devices

Attack

Securityaffairs
20.5.20

Easyjet hacked: 9 million customer’s data exposed along with 2,200+ credit card details

Incindent

Securityaffairs
20.5.20

Nitro Pro Vulnerabilities Expose Many Enterprises to Attacks

Vulnerebility

Securityweek

20.5.20

Researchers Divulge Details on Five Windows Zero Days

Vulnerebility

Securityweek
20.5.20

Verizon 2020 DBIR: More Extensive, More Detailed and More Thorough Than Ever

Incindent

Securityweek
20.5.20

NXNSAttack: New DNS Vulnerability Allows Big DDoS Attacks

Attack

Securityweek

20.5.20

Bluetooth Vulnerability Allows Attackers to Impersonate Previously Paired Devices

Vulnerebility

Securityweek
20.5.20

Brazil's Biggest Cosmetic Brand Natura Exposes Personal Details of Its Users

Incindent

Thehackernews
20.5.20

British Airline EasyJet Suffers Data Breach Exposing 9 Million Customers' Data

Incindent

Thehackernews
20.5.20

Microsoft Word document with malicious macro pushes IcedID (Bokbot)

BotNet

SANS
20.5.20

CEOs and CISOs disagree on cyber strategies

Security

Net-security
20.5.20

With the threat landscape continuously changing, businesses must be ready for anything

Security

Net-security
20.5.20

With increased DevOps adoption, roles in software development teams are changing

Security

Net-security
20.5.20

Technologies in all layers of the cloud stack are at risk

Security

Net-security
20.5.20

Over half of security leaders still rely on spreadsheets

Security

Net-security
19.5.20 REvil Ransomware found buyer for Trump data, now targeting Madonna Ransomware Bleepingcomputer
19.5.20 Google Chrome to tidy up tabs with Tab Groups Collapse feature IT

Bleepingcomputer

19.5.20 Hacker sells 129 million sensitive records of Russian car owners BigBrothers

Bleepingcomputer

19.5.20 Fake U.S. Dept of Treasury emails spreads new Node.js malware BigBrothers

Bleepingcomputer

19.5.20 Ransomware attack impacts Texas Department of Transportation Ransomware

Bleepingcomputer

19.5.20 Windows 10 Defender's hidden features revealed by this free tool OS

Bleepingcomputer

19.5.20 FBI warns of ProLock ransomware decryptor not working properly Ransomware

Bleepingcomputer

19.5.20 Microsoft Edge Canary now lets you read aloud your PDF files OS

Bleepingcomputer

19.5.20 European supercomputers hacked in mysterious cyberattacks Attack

Bleepingcomputer

19.5.20 Zoom global outage preventing meetings, video, and audio IT

Bleepingcomputer

19.5.20 What's new in Windows Subsystem for Linux 2.0, coming soon OS

Bleepingcomputer

19.5.20 Windows 10 quietly got a built-in network sniffer, how to use OS Bleepingcomputer
19.5.20

Australian product steel producer BlueScope hit by cyberattack

BigBrothers

Securityaffairs
19.5.20

Hackers Target Oil Producers During COVID-19 Slump

Hacking

Securityaffairs
19.5.20

Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways

BotNet

Securityaffairs
19.5.20

129 million records of Russian car owners available on the dark web

Incindent

Securityaffairs
19.5.20

Botnets Target Old Vulnerability in Symantec Secure Web Gateway

BotNet

Securityweek

19.5.20

EasyJet Reveals Cyber Attack on Nine Million Clients

Incindent

Securityweek
19.5.20

Court Curbs German Spies' Foreign Internet Surveillance

BigBrothers

Securityweek
19.5.20

DoJ Again Asks for Encryption Backdoors After Hacking US Naval Base Shooter's iPhones

BigBrothers

Securityweek

19.5.20

Increased Focus on iOS Hacking Leads to Drop in Exploit Prices

Apple

Securityweek
19.5.20

New Bluetooth Vulnerability Exposes Billions of Devices to Hackers

Vulnerebility

Securityweek
19.5.20

Phishers are trying to bypass Office 365 MFA via rogue apps

Phishing

Net-security
19.5.20

Money is still the root of most breaches

Incindent

Net-security
19.5.20 Bluetooth devices supporting LE and specific BR/EDR implementations are vulnerable to method confusion attacks Alert Alert
19.5.20 Bluetooth devices supporting BR/EDR are vulnerable to impersonation attacks Alert Alert
19.5.20

ProLock Ransomware Teams Up With QakBot Trojan to Infect Victims

Ransomware

Threatpost

19.5.20

Edison Mail iOS Bug Exposes Emails to Strangers

Apple

Threatpost

19.5.20

Verizon Data Breach Report: DoS Skyrockets, Espionage Dips

Incindent

Threatpost

19.5.20

Ransomware Gang Arrested for Spreading Locky to Hospitals

Ransomware

Threatpost
19.5.20

A bug in Edison Mail iOS app impacted over 6,400 users

Apple

Securityaffairs
19.5.20

Texas Department of Transportation (TxDOT) hit by a ransomware attack

Ransomware

Securityaffairs
19.5.20

Mandrake, a high sophisticated Android spyware used in targeted attacks

Android

Securityaffairs
19.5.20

Facebook Chief Wants EU Not China to Lead on Tech Rules

BigBrothers  Social

Securityweek

19.5.20

PE Firm Gets Cold Feet With $1.9 Billion Acquisition of Forescout Technologies

IT

Securityweek
19.5.20

Over 6,400 Edison Mail Users Hit by Security Bug in iOS App

Apple

Securityweek
19.5.20

Automating nmap scans

Security

SANS
19.5.20

CISOs are critical to thriving companies: Here’s how to support their efforts

Security

Net-security
19.5.20

Review: Kill Chain: The Cyber War on America’s Elections

Security

Net-security
19.5.20

How a good user experience brings the pieces of the enterprise IT jigsaw together

Security

Net-security
19.5.20

Mental Health Awareness Week: Coping with cybersecurity pressures amidst a global pandemic

Security

Net-security
19.5.20

How data intelligent organizations mitigate risk

Security

Net-security
18.5.20 FBI warns US organizations of ProLock ransomware decryptor not working BigBrothers Securityaffairs
18.5.20 Stored XSS in WP Product Review Lite plugin allows for automated takeovers Vulnerebility Securityaffairs
18.5.20 Australian Steel Maker BlueScope Hit by Cyberattack BigBrothers

Securityweek

18.5.20 Likely Breach Shuts Down Arkansas Unemployment Program Incindent Securityweek
18.5.20 Transportation Agency Hacked in 2nd Texas Government Attack BigBrothers Securityweek
18.5.20 Hackers Can Inject Code Into WordPress Sites via Flaw in Product Review Plugin Vulnerebility Securityweek
18.5.20 U.S. Restriction on Chipmakers Deals Critical Blow to Huawei BigBrothers Securityweek
18.5.20 Crypto-Mining Campaign Hits European Supercomputers Cryptocurrency Securityweek
18.5.20 'Mandrake' Android Spyware Remained Undetected for 4 Years Android Securityweek
18.5.20 France Says Breaks Up International ATM 'Jackpotting' Network CyberCrime Securityweek
18.5.20

Antivirus & Multiple Detections

Safety

SANS
18.5.20

Redefining business for a digital world with smart security decisions

Security

Net-security
18.5.20

Security threats associated with shadow IT

Security

Net-security
18.5.20

Security and the rapidly growing importance of mobile apps

Mobil

Net-security
18.5.20

Shifting responsibility is causing uncertainty and more security breaches

Security

Net-security
18.5.20

Identity-related breaches on the rise, prevention still a work in progress

Security Net-security
18.5.20

Less than a quarter of Americans use a password manager

Security

Net-security
17.5.20

Scanning for Outlook Web Access (OWA) & Microsoft Exchange Control Panel (ECP)

Vulnerebility

SANS
17.5.20

Experts reported the hack of several supercomputers across Europe

Hacking

Securityaffairs
17.5.20

Coronavirus-themed attacks May 10 – May 16, 2020

Security

Securityaffairs
17.5.20

Elexon, a middleman in the UK power grid network hit by cyber-attack

BigBrothers

Securityaffairs
17.5.20

APT group targets high profile networks in Central Asia

APT

Securityaffairs
17.5.20

Microsoft is open-sourcing COVID-19 threat intelligence

Cyber

Securityaffairs
17.5.20

QNodeService Trojan spreads via fake COVID-19 tax relief

Virus

Securityaffairs
17.5.20 Ransom News Ransom Ransom
17.5.20 Thunderbolt flaw leads to Thunderspy exploit Vulnerebility blog

Avast blog

17.5.20 We never wanna repeat WannaCry Ransomware blog

Avast blog

17.5.20 Massive WordPress attack relies on old flaws Attack blog  Vulnerebility blog Avast blog
17.5.20 Gartner Market Guide for Cloud Workload Protection Platforms: Key Takeaways Cyber blog

Palo Alto

17.5.20 CRN Names 10 Leaders from Palo Alto Networks to Women of the Channel List Cyber blog

Palo Alto

17.5.20 Containers are inherently secure – Reality or myth? Cyber blog

Palo Alto

17.5.20 Palo Alto Networks Named Google Cloud Technology Partner of the Year Cyber blog

Palo Alto

17.5.20 Manage a Remote SOC: Micro-Surveys for Crisis Management Cyber blog Palo Alto
17.5.20 Scaling Security for Data Center Transformation: COVID-19 Amplifies Trends Cyber blog

Palo Alto

17.5.20 Bridging the DevOps and Security Divide with DevSecOps Cyber blog Palo Alto
17.5.20 WordPress malware finds WooCommerce sites for Magecart attacks Virus Bleepingcomputer
17.5.20 Critical WordPress plugin bug allows for automated takeovers Vulnerebility

Bleepingcomputer

17.5.20 Wannabe ransomware operators arrested before hospital attacks Ransomware

Bleepingcomputer

17.5.20 New BotSight browser extension reveals Twitter bots BotNet

Bleepingcomputer

17.5.20 RATicate drops info stealing malware and RATs on industrial targets Virus

Bleepingcomputer

17.5.20 Ransomware recruits affiliates with huge payouts, automated leaks Ransomware

Bleepingcomputer

17.5.20 Backdoors in recent espionage attempts link to Microcin malware Virus

Bleepingcomputer

17.5.20 Microsoft Office 365 ATP getting malware campaign analysis Virus

Bleepingcomputer

17.5.20 Free Grand Theft Auto V offer brings down Epic Games Store IT

Bleepingcomputer

17.5.20 New COMpfun malware variant gets commands from HTTP error codes Virus

Bleepingcomputer

17.5.20 New Microsoft 365 sign-in pages already spoofed for phishing Phishing

Bleepingcomputer

17.5.20 Hacker selling 550 million stolen user records on hacking forum Incindent

Bleepingcomputer

17.5.20 Google Chrome will block resource-heavy ads starting August Security

Bleepingcomputer

17.5.20 ProLock Ransomware teams up with QakBot trojan for network access Ransomware

Bleepingcomputer

17.5.20 Scammers steal $10 million from Norway's state investment fund Spam

Bleepingcomputer

17.5.20 Google WordPress plugin bug can be exploited for black hat SEO Exploit

Bleepingcomputer

17.5.20 RIP: Microsoft to drop support for Windows 10 on 32-bit systems OS

Bleepingcomputer

17.5.20 New Ramsay malware steals files from air-gapped computers Virus

Bleepingcomputer

17.5.20 Windows 10 gets DNS over HTTPS support, how to test OS

Bleepingcomputer

17.5.20 Microsoft: Fix for Outlook search failures coming later today OS

Bleepingcomputer

17.5.20 Microsoft warns of COVID-19 phishing spreading info-stealing malware Phishing

Bleepingcomputer

17.5.20 US warns of Chinese hackers targeting COVID-19 research orgs BigBrothers

Bleepingcomputer

17.5.20 Ransomware now demands extra payment to delete stolen files Ransomware

Bleepingcomputer

17.5.20 SAP May 2020 Security Patch Day delivers critical updates Vulnerebility

Bleepingcomputer

16.5.20 Healthcare giant Magellan Health hit by ransomware attack Ransomware

Bleepingcomputer

16.5.20 Windows 10 2004 improves potentially unwanted app protection OS

Bleepingcomputer

16.5.20 Windows 10 2004 is almost here, what developers need to know OS

Bleepingcomputer

16.5.20 US govt shares list of most exploited vulnerabilities since 2016 BigBrothers

Bleepingcomputer

16.5.20 May 2020 Patch Tuesday: Microsoft fixes 111 vulnerabilities, 13 Critical OS

Bleepingcomputer

16.5.20 Windows 10 Cumulative Updates KB4556799 & KB4551853 Released OS

Bleepingcomputer

16.5.20 Microsoft Edge rolls out in Windows 10 2004 via Windows Update OS

Bleepingcomputer

16.5.20 US govt exposes new North Korean malware, phishing attacks BigBrothers

Bleepingcomputer

16.5.20 Adobe fixes critical vulnerabilities in Acrobat, Reader, and DNG SDK Vulnerebility

Bleepingcomputer

16.5.20 Researcher finds 1,236 websites infected with credit card stealers Hacking

Bleepingcomputer

16.5.20 Five Clear Steps to Enhance SecOps with MITRE ATT&CK Report Cybereason
16.5.20 2019 APPLICATION PROTECTION REPORT 2ND EDITION Report F5 Labs
16.5.20 THE STATE OF RANSOMWARE 2020 Report SOPHOS
16.5.20 WHAT IS THE MITRE ATT&CK FRAMEWORK? Security blog Cybereason
16.5.20 2019 Application Protection Report Security blog

F5 Labs

16.5.20 Are You Ready for DoD CMMC Compliance? Security blog

F5 Labs

16.5.20 Reverse RDP – The Path Not Taken Attack blog Checkpoint
16.5.20 The basics of a ransomware infection as Snake, Maze expands Ransomware blog Cisco Talos
16.5.20 Microsoft Patch Tuesday — May 2020: Vulnerability disclosures and Snort coverage Vulnerebility blog Cisco Talos
16.5.20 Vulnerability Spotlight: Code execution vulnerability in Microsoft Excel Vulnerebility blog

Cisco Talos

16.5.20 Vulnerability Spotlight: Remote code execution vulnerabilities in Adobe Acrobat Reader Vulnerebility blog

Cisco Talos

16.5.20 Threat Spotlight: Astaroth — Maze of obfuscation and evasion reveals dark stealer Ransomware blog

Cisco Talos

16.5.20 Microsoft fixes vulnerability affecting all Windows versions since 1996 Vulnerebility blog

Eset

16.5.20 Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia APT blog Eset
16.5.20 Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks Malware blog

Eset

16.5.20 Thunderbolt flaws open millions of PCs to physical hacking Vulnerebility blog Eset
16.5.20 WannaCryptor remains a global threat three years on Ransomware blog

Eset

16.5.20 Lukas Stefanko: How we fought off a DDoS attack from a mobile botnet Attack blog Eset
16.5.20 Over 160 million user records put up for sale on the dark web Incident blog

Eset

16.5.20 Breaking news? App promises news feeds, brings DDoS attacks instead Attack blog Eset
16.5.20

Hoaxcalls Botnet Exploits Symantec Secure Web Gateways

BotNet  Exploit

Threatpost

16.5.20

RATicate Group Hits Industrial Firms With Revolving Payloads

Virus

Threatpost

16.5.20

News Wrap: Ransomware Extortion Tactics, Contact-Tracing App Security Worries

Security

Threatpost

16.5.20

Paying Ransomware Crooks Doubles Clean-up Costs, Report

Ransomware

Threatpost
16.5.20

Chinese APT Tropic Trooper target air-gapped military Networks in Asia

APT

Securityaffairs
16.5.20

Interserve UK defense contractor hacked, up to 100,000 past and present employees details exposed

BigBrothers

Securityaffairs
16.5.20

Microsoft Open-Sources COVID-19 Threat Intelligence

Cyber

Securityweek

16.5.20

NortonLifeLock Releases Free Tool for Detecting Bots on Twitter

Social

Securityweek
16.5.20

Chinese Hackers Target Air-Gapped Military Networks

BigBrothers

Securityweek
16.5.20

US Seeks to Cut Off China's Huawei From Global Chip Suppliers

BigBrothers

Securityweek
16.5.20

Mysterious Chinese APT Linked to Multiple Central Asian Campaigns

APT

Securityweek
16.5.20

SHA3 Hashes (on Windows) - Where Art Thou?

Crypto

SANS
15.5.20 Office 365 to let regular users revoke encrypted messages OS

Bleepingcomputer

15.5.20 Hackers' private chats leaked in stolen WeLeakData database Incindent

Bleepingcomputer

15.5.20 Texas Courts hit by ransomware, network disabled to limit spread Ransomware

Bleepingcomputer

15.5.20 Microsoft's Family Safety parental control app opens for testing OS

Bleepingcomputer

15.5.20 WordPress plugin bugs can let hackers take over almost 1M sites Hacking

Bleepingcomputer

15.5.20 Maze ransomware fails to encrypt Pitney Bowes, steals files Ransomware

Bleepingcomputer

15.5.20 New Thunderbolt security flaws affect systems shipped before 2019 Vulnerebility

Bleepingcomputer

15.5.20 Windows 10: Limiting the bandwidth used by Windows Update OS

Bleepingcomputer

15.5.20 ChatBooks discloses data breach after data sold on dark web Incindent

Bleepingcomputer

15.5.20 Sodinokibi ransomware can now encrypt open and locked files Ransomware

Bleepingcomputer

15.5.20

Hashes in PowerShell

Security

SANS
15.5.20

Criminals boost their schemes with COVID-19 themed phishing templates

Phishing

Net-security
15.5.20 Russian APT Turla’s COMpfun malware uses HTTP status codes to receive commands APT Securityaffairs
15.5.20 Palo Alto Networks addresses tens of serious issues in PAN-OS Security Securityaffairs
15.5.20 Threat actors are offering for sale 550 million stolen user records Incindent Securityaffairs
15.5.20 Vulnerabilities in SoftPAC Virtual Controller Expose OT Networks to Attacks Vulnerebility

Securityweek

15.5.20 Activists Allege TikTok Violated Agreement on Child Protection Privacy Securityweek
15.5.20 Venafi Acquires Kubernetes Services Provider Jetstack Security Securityweek
15.5.20 'Ramsay' Espionage Framework Can Exfiltrate Data From Air-Gapped Networks Virus Securityweek
15.5.20 UK Electricity Market Administrator Elexon Targeted by Hackers Hacking Securityweek
15.5.20 HTTP Status Codes Command This Malware How to Control Hacked Systems Virus Thehackernews
15.5.20

Utah Says No to Apple/Google COVID-19 Tracing; Debuts Startup App

Cyber

Threatpost

15.5.20

Login with Facebook Bug Earns $20K Bounty

Social

Threatpost

15.5.20

Microsoft Adds DNS-Over-HTTPS Support for Windows 10 Insiders

OS

Threatpost

15.5.20

BEC Gang Exploits G Suite, Long Domain Names in Cyberattacks

Attack

Threatpost
15.5.20

Innovative Spy Trojan Targets European Diplomatic Targets

Virus

Threatpost
15.5.20

TikTok Violated Children’s Privacy Law, FTC Complaint Says

Privacy

Threatpost
15.5.20

Crooks stole $10 million from Norway’s state investment fund Norfund

IT

Securityaffairs
15.5.20

Zerodium will no longer acquire certain types of iOS exploits due to surplus

iOS

Securityaffairs
15.5.20

Access to UK Supercomputer Suspended Following Cyberattack

Attack

Securityweek

15.5.20

Palo Alto Networks Patches Many Vulnerabilities in PAN-OS

Vulnerebility

Securityweek
15.5.20

China Rejects US Claim of Attempted Vaccine Theft as 'Smearing'

BigBrothers

Securityweek
15.5.20

Zerodium Expects iOS Exploit Prices to Drop as It Announces Surplus

Exploit

Securityweek
15.5.20 Samsung Qmage codec for Android Skia library does not properly validate image files Alert Alert
15.5.20

Base Conversions and Creating GUI Apps in PowerShell

Security

SANS
15.5.20

Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe

Vulnerebility

SANS
15.5.20

Modern crypto standards pave the way to stronger security

Crypto

Net-security
15.5.20

Windows 10 users get protection against PUAs

OS

Net-security

15.5.20

New software enables existing sensors to detect ransomware

Ransomware

Net-security

15.5.20

COVID-19 online fraud trends: Industries, schemes and targets

Security

Net-security

15.5.20

Businesses vulnerable to emerging risks have a gap in their insurance coverage

Security

Net-security

15.5.20

Educational organizations use cloud apps to share sensitive data outside of IT control

Security

Net-security
14.5.20

Cyberthreats on lockdown

Cyber

Securelist
14.5.20

COMpfun authors spoof visa application with HTTP status-based Trojan

APT  Virus

Securelist
14.5.20

China-linked hackers are attempting to steal COVID-19 Vaccine Research

BigBrothers

Securityaffairs
14.5.20

Google WordPress Site Kit plugin grants attacker Search Console Access

Attack

Securityaffairs
14.5.20

New Ramsay malware allows exfiltrating files from air-gapped computers

Virus

Securityaffairs
14.5.20

Senate Narrowly Rejects New Limits on Internet Surveillance

BigBrothers

Securityweek

14.5.20

VMware to Acquire Kubernetes Security Firm Octarine

IT

Securityweek
14.5.20

Flaw in WordPress Plugin Grants Access to Google Search Console

Vulnerebility

Securityweek
14.5.20

This Group of CISOs Is Pumping Their Own Money and Advice Into Security Startups

Security

Securityweek
14.5.20

Code Analysis Company SonarSource Acquires RIPS Technologies

IT

Securityweek
14.5.20

Effective Business Continuity Plans Require CISOs to Rethink WAN Connectivity

Security

Thehackernews
14.5.20

Improper Microsoft Patch for Reverse RDP Attacks Leaves 3rd-Party RDP Clients Vulnerable

Vulnerebility

Thehackernews
14.5.20

Fear the PrintDemon? Upgrade Windows to patch easily exploited flaw

Vulnerebility

Net-security
14.5.20

Ramsay Malware Targets Air-Gapped Networks

Virus

Threatpost

14.5.20

Texas Courts Won’t Pay Up in Ransomware Attack

Ransomware

Threatpost

14.5.20

Leaked NHS Docs Reveal Roadmap, Concerns Around Contact-Tracing App

Incindent

Threatpost

14.5.20

Healthcare Giant Magellan Struck with Ransomware, Data Breach

Ransomware

Threatpost
14.5.20

Feds Reveal Hidden Cobra’s Trove of Espionage Tools

BigBrothers

Threatpost
14.5.20

Crooks continues to use COVID-19 lures, Microsoft warns

Cyber

Securityaffairs
14.5.20

Intel Improves Hardware Shield in New 10th Gen Core vPro Processors

Safety

Securityweek

14.5.20

U.S. Government Issues Alert on Most Exploited Vulnerabilities

BigBrothers

Securityweek
14.5.20

US Says China Trying to Steal COVID-19 Vaccine Research

BigBrothers

Securityweek
14.5.20

Paying the ransom = paying double

Ransomware

Net-security
14.5.20

Debunking myths related to client-side security and Magecart attacks

CyberCrime

Net-security

14.5.20

5 easy steps to immediately bolster cybersecurity during the pandemic

Cyber

Net-security
14.5.20

Eye-opening statistics about open source security, license compliance, and code quality risk

Security

Net-security

14.5.20

COVID-19 has contributed to record breaking cybercriminal activity

CyberCrime

Net-security
14.5.20

Unexpected downtime is crippling businesses, causing revenue losses

Security

Net-security

14.5.20

New features in Nutanix’s HCI platform simplify disaster recovery to protect business critical apps

Security

Net-security
14.5.20

Kali Linux 2020.2: New look, new packages, new installer options

OS

Net-security

13.5.20 Chancellor Merkel has ‘hard evidence’ of Russian hackers targeted her BigBrothers Securityaffairs
13.5.20 Healthcare giant Magellan Health discloses data breach after ransomware attack Ransomware Securityaffairs
13.5.20 Microsoft May 2020 Patch Tuesday fixes 111 flaws, 13 Critical Vulnerebility

Securityaffairs

13.5.20 Expert found 1,236 websites infected with Magecart e-skimmer CyberCrime Securityaffairs
13.5.20 USCYBERCOM shares five new North Korea-linked malware samples BigBrothers Securityaffairs
13.5.20 Trojan Lampion is back after 3 months Virus Securityaffairs
13.5.20 Adobe addresses critical issues in Acrobat, Reader, and DNG SDK Vulnerebility

Securityaffairs

13.5.20 Facebook Awards Researcher $20,000 for Account Hijacking Vulnerability Social

Securityweek

13.5.20 SAP's May 2020 Security Updates Include Six Critical Patches Vulnerebility Securityweek
13.5.20 Enterprise Identity Protection Firm Semperis Raises $40 Million IT Securityweek
13.5.20 CyberArk Acquires Identity as a Service Provider Idaptive for $70 Million IT Securityweek
13.5.20 Merkel Cites 'Hard Evidence' Russian Hackers Targeted Her BigBrothers

Securityweek

13.5.20 Siemens Says Power Meters Affected by Urgent/11 Vulnerabilities ICS Securityweek
13.5.20 Thousands of Android Apps Leak Data Due to Firebase Misconfigurations Android Securityweek
13.5.20 Microsoft's May 2020 Security Updates Patch 111 Vulnerabilities Vulnerebility Securityweek
13.5.20 Adobe Patches 36 Vulnerabilities in Acrobat, DNG SDK Vulnerebility Securityweek
13.5.20 U.S. Cyber Command Shares More North Korean Malware Variants BigBrothers Securityweek
13.5.20 Vulnerabilities in 'Page Builder' Plugin Expose 1 Million WordPress Websites Vulnerebility Securityweek
13.5.20 Researcher Spots New Malware Claimed to be 'Tailored for Air‑Gapped Networks' Virus Thehackernews
13.5.20 U.S Defense Warns of 3 New Malware Used by North Korean Hackers BigBrothers Thehackernews
13.5.20

Have you patched these top 10 routinely exploited vulnerabilities?

Vulnerebility

Net-security
13.5.20

How to implement least privilege in the cloud

Security

Net-security

13.5.20

Malspam with links to zip archives pushes Dridex malware

Spam  Virus

SANS
13.5.20

New third-party healthcare data rules: Increased access alongside privacy considerations

Privacy

Net-security
13.5.20

Advanced attack scenarios and sabotage of smart manufacturing environments

Attack  ICS

Net-security

13.5.20

Cybersecurity and compliance: Vital priorities for MSPs and their clients

Security

Net-security

13.5.20

Global remote work transitions fail to consider security gaps

Security

Net-security

13.5.20

May 2020 Patch Tuesday: Microsoft fixes 111 flaws, Adobe 36

OS

Net-security

12.5.20 Popular Page Builder WordPress plugin fixes critical issues. Update it now! Vulnerebility Securityaffairs
12.5.20 Patch now your vBulletin install before hacker will target your forum Vulnerebility Securityaffairs
12.5.20 A cyber attack hit a port on Strait of Hormuz, Iran said BigBrothers

Securityaffairs

12.5.20 Shipping Giant Toll Confirms Hackers Stole Data in Recent Attack Attack

Securityweek

12.5.20 Cybersecurity Threats to the Food Supply Chain Cyber Securityweek
12.5.20 Ransomware Forces Shutdown of Texas Judiciary Network Ransomware Securityweek
12.5.20 Researchers Analyze Entry Points, Vectors for Manufacturing System Attacks Attack Securityweek
12.5.20 Over 4000 Android Apps Expose Users' Data via Misconfigured Firebase Databases Android Thehackernews
12.5.20

Sphinx Malware Returns to Riddle U.S. Targets

Virus

Threatpost

12.5.20

Millions of Thunderbolt-Equipped Devices Open to ‘ThunderSpy’ Attack

Attack

Threatpost

12.5.20

Astaroth’s New Evasion Tactics Make It ‘Painful to Analyze’

Virus

Threatpost

12.5.20

Unpatched Bugs in Oracle iPlanet Open Door to Info-Disclosure, Injection

Vulnerebility

Threatpost
12.5.20

Zeus Sphinx continues to be used in Coronavirus-themed attacks

Attack

Securityaffairs
12.5.20

ATM vendor Diebold Nixdorf suffered a Ransomware attack

Ransomware

Securityaffairs

12.5.20

ATM Maker Diebold Nixdorf Hit by Ransomware

Ransomware

Securityweek

12.5.20

An Undisclosed Critical Vulnerability Affect vBulletin Forums — Patch Now

Vulnerebility

Thehackernews
12.5.20

Excel 4 Macro Analysis: XLMMacroDeobfuscator

Virus

SANS
12.5.20

Why a single online name and social cards will be the new norm

Social

Net-security
12.5.20

(ISC)2 Professional Development Institute: Timely and continuing education opportunities

Security

Net-security

12.5.20

Is remote work here to stay?

Security

Net-security

12.5.20

Total number of publicly reported breaches in Q1 2020 down 42% compared to last year

Incindent

Net-security

12.5.20

Home workplaces introduce new risks, poor password hygiene

Security

Net-security

12.5.20

Gain free access to Utilizing Big Data course, a $200 value

Security

Net-security

11.5.20

VMware is going to fix recent Salt issues in vROps

Vulnerebility

Securityaffairs
11.5.20

GDPR Data Security Checklist in the Age of COVID-19 and the Remote Workforce

Privacy

Securityaffairs

11.5.20

Experts disclose security flaws in Oracle’s iPlanet Web Server

Vulnerebility

Securityaffairs
11.5.20

STAMINA, a new approach to malware detection by Microsoft, Intel

Virus

Securityaffairs

11.5.20

Sodinokibi ransomware uses MS API to encrypt open and locked files

Ransomware

Securityaffairs
11.5.20

Blue Mockingbird Monero-Mining campaign targets web apps

Cryptocurrency

Securityaffairs

11.5.20

US Says Chinese Hacking Vaccine Research: Reports

BigBrothers

Securityweek

11.5.20

Hacker Group Advertises Data From Multiple Fresh Breaches

Incindent

Securityweek
11.5.20

VMware to Patch Recent Salt Vulnerabilities in vROps

Vulnerebility

Securityweek
11.5.20

Railway Vehicle Maker Stadler Hit by Malware Attack

Virus

Securityweek

11.5.20

Thunderspy: More Thunderbolt Flaws Expose Millions of Computers to Attacks

Vulnerebility

Securityweek
11.5.20

DigitalOcean Inadvertently Exposed Customer Data

Incindent

Securityweek
11.5.20

7 New Flaws Affect All Thunderbolt-equipped Computers Sold in the Last 9 Years

Vulnerebility

Thehackernews
11.5.20

vBulletin fixes critical vulnerability, patch immediately!

Vulnerebility

Net-security
11.5.20

Have you updated SaltStack Salt? Attacks are underway!

Attack

Net-security

11.5.20 Sodinokibi ransomware uses MS API to encrypt open and locked files Ransomware Securityaffairs
11.5.20 Blue Mockingbird Monero-Mining campaign targets web apps Cryptocurrency

Securityaffairs

11.5.20 Swiss rail vehicle manufacturer Stadler hit by a malware-based attack Virus Securityaffairs
11.5.20 Shiny Hunters group is selling data from 11 companies on the Dark Web Hacking

Securityaffairs

11.5.20 Coronavirus-themed attacks May 03 – May 09, 2020 Security

Securityaffairs

11.5.20 Microsoft, Intel Introduce 'STAMINA' Approach to Malware Detection Virus

Securityweek

11.5.20

YARA v4.0.0: BASE64 Strings

Virus

SANS
11.5.20

Leveraging automation to maximize security budgets

Security

Net-security
11.5.20

Are you sure you would never fall for a phishing scam?

Phishing

Net-security

11.5.20

FIRST releases updated coordination principles for Multi-Party Vulnerability Coordination and Disclosure

Vulnerebility

Net-security

11.5.20

Ransomware on the rise, companies prioritizing disaster recovery

Ransomware

Net-security

11.5.20

Biometric device shipments revenue to drop by $2 billion

Security

Net-security

11.5.20

Open source algorithms for network graph analysis help discover patterns in data

Security

Net-security

10.5.20 Hacker group floods dark web with data stolen from 11 companies Incindent

Bleepingcomputer

10.5.20 North Korean hackers infect real 2FA app to compromise Macs Apple  APT

Bleepingcomputer

10.5.20 Microsoft Edge is getting a new feature to reduce web spam Spam

Bleepingcomputer

10.5.20 Rail vehicle manufacturer Stadler hit by cyberattack, blackmailed Cyber

Bleepingcomputer

10.5.20 Surface Laptop 3 screens with spontaneous cracks now fixed for free Security

Bleepingcomputer

10.5.20 Black Hat and DEF CON security conferences go virtual due to pandemic Congress

Bleepingcomputer

10.5.20 Have fun learning robotics with a DIY Bionic Robot Lizard kit IT

Bleepingcomputer

10.5.20 Twitter warns of legacy site theme shutting down on June 1 Social

Bleepingcomputer

10.5.20 Windows 10 upgrade bug prevents HDR video streaming OS

Bleepingcomputer

10.5.20 Microsoft rolls out protection against Office 365 email storms OS

Bleepingcomputer

10.5.20 New Google Authenticator update makes it worth using again Security

Bleepingcomputer

10.5.20 Windows 10's Game Mode reportedly causing freezes, FPS issues OS

Bleepingcomputer

10.5.20 Firefox 76.0.1 released to fix broken Amazon extension, crashes Security

Bleepingcomputer

10.5.20 REvil ransomware threatens to leak A-list celebrities' legal docs Ransomware

Bleepingcomputer

10.5.20 Hackers sell stolen user data from HomeChef, ChatBooks, and Chronicle Incindent

Bleepingcomputer

10.5.20 Ruhr University Bochum shuts down servers after ransomware attack Ransomware

Bleepingcomputer

10.5.20 Unemployed Americans offered ‘remote jobs’ as money mules Security

Bleepingcomputer

10.5.20 Microsoft leak: Windows 10 2004 being released last week of May OS

Bleepingcomputer

10.5.20 Intel graphics drivers now officially support Windows 10 2004 OS

Bleepingcomputer

10.5.20 Microsoft Teams call drops on desktop caused by iOS bug iOS

Bleepingcomputer

10.5.20 Critical WordPress plugin bug lets hackers take over 1M sites Incindent

Bleepingcomputer

10.5.20 New "Aria-body" backdoor gets advanced hackers back in the spy game Virus

Bleepingcomputer

10.5.20 SilverTerrier BEC scammers target US govt healthcare agencies BigBrothers  Spam

Bleepingcomputer

10.5.20 Microsoft's GitHub account hacked, private repositories stolen Hacking

Bleepingcomputer

10.5.20 Cisco Webex phishing uses fake cert errors to steal credentials Phishing

Bleepingcomputer

10.5.20 Large scale Snake Ransomware campaign targets healthcare, more Ransomware

Bleepingcomputer

10.5.20 Windows 10 Build 19624 released with Windows Update fixes OS

Bleepingcomputer

10.5.20 Hackers use website favicon to camouflage credit card skimmer Crime

Bleepingcomputer

10.5.20 Hacker sells 22 million Unacademy user records after data breach Incindent

Bleepingcomputer

10.5.20 Critical Citrix ShareFile bugs could give access to private files Vulnerebility

Bleepingcomputer

10.5.20 SAP announces security issues in cloud-based products Security

Bleepingcomputer

10.5.20 Massive campaign targets 900,000 WordPress sites in a week Incindent

Bleepingcomputer

10.5.20 Cyber volunteers release blocklists for 26,000 COVID-19 threats Cyber

Bleepingcomputer

10.5.20 Microsoft releases May Office updates with fixes for auth issues Security

Bleepingcomputer

10.5.20 Toll Group hit by ransomware a second time, deliveries affected Ransomware

Bleepingcomputer

10.5.20

Why Securing Remote Work is Crucial To Ensuring Business Continuity

Security blog

Sonicwall

10.5.20

Remembering the ILOVEYOU virus twenty years later

Malware blog

Avast blog

10.5.20

New Android malware steals banking passwords

Malware blog

Avast blog

10.5.20

Massive WordPress attack relies on old flaws

Incident blog

Avast blog
10.5.20

Using a Full Lifecycle Approach to Secure Cloud Native Applications

Cyber blog

Palo Alto

10.5.20

The Right Approach to Securing 5G

Cyber blog

Palo Alto

10.5.20

Scaling Security for Data Center Transformation: COVID-19 Amplifies Trends

Cyber blog

Palo Alto

10.5.20

Power the New Normal with Prisma Access: Delivering Next-Gen Cybersecurity

Cyber blog

Palo Alto

10.5.20

Unit 42 Recognized by Microsoft on the MSRC Security Researcher Leaderboard

Cyber blog

Palo Alto
10.5.20

Nmap Basics - The Security Practitioner's Swiss Army Knife

Security

SANS
10.5.20 BDGoGoogleDecryptor Anti-Ransom Tool Anti-Ransom Tool
10.5.20 North Korea-linked Lazarus APT uses a Mac variant of the Dacls RAT APT Securityaffairs
10.5.20 3.68 Million MobiFriends User details leaked online Incindent Securityaffairs
10.5.20 Sodinokibi gang hacked law firm of the celebrities and threatens to release the docs Ransomware Securityaffairs
10.5.20 SilverTerrier gang uses COVID-19 lures in BEC attacks against healthcare, government organizations Spam Securityaffairs
9.5.20 Microsoft launches IoT-focused bounty program with $100K awards IoT

Bleepingcomputer

9.5.20

InfinityBlack hacker group dismantled by European authorities Hacking

Bleepingcomputer

9.5.20

Game patch gives hackers access to development content on Amazon S3 Hacking

Bleepingcomputer

9.5.20

Nation-state hackers are targeting COVID-19 response orgs BigBrothers

Bleepingcomputer

9.5.20

Firefox 76 released with integrated data breach alerts Incindent

Bleepingcomputer

9.5.20

GitHub shuts down Popcorn Time repositories due to MPA DMCA notice Security

Bleepingcomputer

9.5.20

GoDaddy notifies users of breached hosting accounts Incindent

Bleepingcomputer

9.5.20

LockBit ransomware self-spreads to quickly encrypt 225 systems Ransomware

Bleepingcomputer

9.5.20

Office 365 to stop data theft by disabling external forwarding Security

Bleepingcomputer

9.5.20

New VCrypt Ransomware locks files in password-protected 7ZIPs Ransomware

Bleepingcomputer

9.5.20

Hackers exploit Salt RCE bugs in widespread attacks, PoCs public Exploit

Bleepingcomputer

9.5.20

CAM4 adult cam site exposes 11 million emails, private chats Incindent

Bleepingcomputer

9.5.20

LineageOS outage caused by hackers breaching main infrastructure OS

Bleepingcomputer

9.5.20

Hacker sells 91 million Tokopedia accounts, cracked passwords shared Hacking

Bleepingcomputer

9.5.20

Debloating Windows 10 and increasing privacy with SharpApp OS

Bleepingcomputer

9.5.20 Ransom News Ransom

Ransom

9.5.20

TO PAY OR NOT TO PAY

Safety blog

Cybereason

9.5.20

CONVERGING ENDPOINT AND MOBILE SECURITY

Safety blog

Cybereason

9.5.20

2 METRICS TO EVALUATE MITRE ATT&CK RESULTS

Attack blog

Cybereason

9.5.20

EVENTBOT: A NEW MOBILE BANKING TROJAN IS BORN

Malware blog

Cybereason

9.5.20

ENS 10.7 Rolls Back the Curtain on Ransomware

Ransomware blog

Mcafee blog

9.5.20

Cybercriminals Actively Exploiting RDP to Target Remote Organizations

Cyber blog  Exploit blog

Mcafee blog

9.5.20

COVID-19 – Malware Makes Hay During a Pandemic

Malware blog

Mcafee blog

9.5.20

Tales From the Trenches; a Lockbit Ransomware Story

Ransomware blog

Mcafee blog

9.5.20

Is the Cloud Safe? Thinking About the Cloud Through a Security Lens

Security blog

F5 Labs

9.5.20

Demystifying API Attacks Using Gamification

Attack blog

F5 Labs

9.5.20

Excelerating Analysis, Part 2 — X[LOOKUP] Gon’ Pivot To Ya

Malware blog

FireEye

9.5.20

Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents

Ransomware blog

FireEye

9.5.20

Naikon APT: Cyber Espionage Reloaded

APT blog

Checkpoint

9.5.20

Bugs on the Windshield: Fuzzing the Windows Kernel

Vulnerebility blog

Checkpoint

9.5.20

Nazar: Spirits of the Past

APT blog

Checkpoint

9.5.20

First seen in the wild – Malware uses Corporate MDM as attack vector

Attack blog  Malware blog

Checkpoint

9.5.20

Vulnerability Spotlight: Code execution vulnerability in 3S CODESYS

Vulnerebility blog

Cisco Talos

9.5.20

Vulnerability Spotlight: Multiple code execution vulnerabilities in Accusoft ImageGear

Vulnerebility blog

Cisco Talos

9.5.20

Scams to watch out for not just this Mother’s Day

Spam blog

Eset

9.5.20

Digital transformation could be accelerated by COVID‑19

Security blog

Eset

9.5.20

5 common password mistakes you should avoid

Safety blog

Eset

9.5.20

Almost a million WordPress websites targeted in massive campaign

Cyber blog

Eset

9.5.20

Professional data leakage: How did that security vendor get my personal data?

Incident blog

Eset

9.5.20

Ghost blogging platform servers hacked to mine cryptocurrency

Cryptocurrency blog

Eset

9.5.20

It’s no time to let your guard down as coronavirus fraud remains a threat

Spam blog

Eset

9.5.20 Report: Microsoft’s GitHub Account Gets Hacked Hacking

Threatpost

9.5.20 Black Hat USA, DEF CON 28 Go Virtual Congress

Threatpost

9.5.20 Hackers Breach 3.5 Million MobiFriends Dating App Credentials Incindent

Threatpost

9.5.20 Naikon’s Aria APT Securelist
9.5.20 Microsoft investigates claims that its GitHub account has been hacked Hacking

Securityaffairs

9.5.20 Cloud Security Company Ermetic Emerges From Stealth Mode Security

Securityweek

9.5.20 DigitalOcean Data Leak Incident Exposed Some of Its Customers Data Incindent Thehackernews

8.5.20

H2 2019: Duration of phishing attacks grows, use of banking trojans wanes

Phishing  Virus

Net-security

8.5.20

GitHub Code Scanning aims to prevent vulnerabilities in open source software

Vulnerebility

Net-security

8.5.20

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Phishing

Securityaffairs
8.5.20

Massive cyber attack forced Ruhr University Bochum (RUB) to shut down its IT infrastructure

Attack

Securityaffairs

8.5.20

Cisco fixes High Severity issues in ASA and FTD products

Vulnerebility

Securityaffairs

8.5.20

Healthcare, Government Organizations Targeted in BEC Attacks With COVID-19 Lures

Spam

Securityweek

8.5.20

Google Authenticator Users Can Now Transfer 2SV Secrets Between Devices

Mobil

Securityweek

8.5.20

Industry Reactions to Alliance for Open 5G Systems: Feedback Friday

Mobil

Securityweek

8.5.20

Elementor Plugin Vulnerabilities Exploited to Hack WordPress Sites

Vulnerebility

Securityweek

8.5.20

Microsoft Investigating GitHub Account Hacking Claims

Hacking

Securityweek

8.5.20

Cisco Fixes High-Severity Flaws In Firepower Security Software, ASA

Vulnerebility

Threatpost

8.5.20

Naikon APT Hid Five-Year Espionage Attack Under Radar

APT

Threatpost

8.5.20

Zoom Beefs Up End-to-End Encryption to Thwart ‘Zoombombers’

Crypto

Threatpost

8.5.20

Blue Mockingbird Monero-Mining Campaign Exploits Web Apps

Cryptocurrency

Threatpost

8.5.20

Hackers Dumpster Dive for Taxpayer Data in COVID-19 Relief Money Scams

Spam

Threatpost
8.5.20

Issues in Elementor Pro and Ultimate Addons for Elementor exposed 1 Million WordPress sites at risk

Incindent

Securityaffairs

8.5.20

Poulight Stealer, a new Comprehensive Stealer from Russia

BigBrothers

Securityaffairs

8.5.20

Naikon APT is flying under the radar since 2015

APT

Securityaffairs

8.5.20

Zoom Agrees to Step Up Security After New York Probe

Security

Securityweek

8.5.20

Samsung Patches Critical 0-Click Vulnerability in Smartphones

Vulnerebility

Securityweek

8.5.20

Cisco Patches High Severity Vulnerabilities in Security Products

Vulnerebility

Securityweek

8.5.20

Critical Flaw in CODESYS Industrial Controller Software Allows Code Execution

Vulnerebility

Securityweek

8.5.20

Search Company Algolia Hacked via Recent Salt Vulnerabilities

Hacking

Securityweek

8.5.20

Using Nmap As a Lightweight Vulnerability Scanner

Safety

SANS

8.5.20

The new cyber risk reality of COVID-19 operating mode

Cyber

Net-security
8.5.20

99% of enterprise users reuse passwords across accounts

Safety

Net-security

8.5.20

How to increase cyber defense agility for the next lockdown

Cyber

Net-security

8.5.20

Financial services leading the way in adopting DevOps, still hurdles remain

Security

Net-security

8.5.20

Is the stress of card fraud worth the digital convenience?

Security

Net-security

7.5.20

Snake Ransomware hits Europe’s largest private hospital operator Fresenius during COVID-19 outbreak Ransomware Securityaffairs

7.5.20

Brazilian trojan banker is targeting Portuguese users using browser overlay Virus

Securityaffairs

7.5.20

Samsung fixes a zero-click issue affecting its phones Mobil

Securityaffairs

7.5.20

North Korean Hackers Release Mac Variant of Dacls RAT Virus

Securityweek

7.5.20

Recorded Future Releases Free Threat Intelligence Browser Extension Security

Securityweek

7.5.20

Chinese Naikon APT Rediscovered After New Five-year Stealth Campaign APT

Securityweek

7.5.20

Zoom Acquires Keybase to Bring End-to-End Encryption to Video Platform Crypto

Securityweek

7.5.20

Another Stuxnet-Style Vulnerability Found in Schneider Electric Software ICS

Securityweek

7.5.20

Czech, US to Cooperate on Security of 5G Networks BigBrothers

Securityweek

7.5.20

This Asia-Pacific Cyber Espionage Campaign Went Undetected for 5 Years CyberSpy Thehackernews

7.5.20

How a favicon delivered a web credit card skimmer to victims

CyberCrime

Net-security

7.5.20

Firefox 76 delivers new password security features and security fixes

Security

Net-security

7.5.20

Passwords still widely used, despite known weaknesses

Safety

Net-security

7.5.20

Scanning with nmap?s NSE scripts

Safety

SANS

7.5.20

Lazarus Group Hides macOS Spyware in 2FA Application CyberCrime

Threatpost

7.5.20

Attackers Claim Identity of Financial NGO to Steal Sharepoint, Office Credentials Incindent

Threatpost

7.5.20

Ransomware Attack Takes Down Toll Group Systems, Again Ransomware

Threatpost

7.5.20

InfinityBlack Dismantled After Selling Millions of Credentials Incindent

Threatpost

7.5.20

Microsoft Shells Out $100K for IoT Security IT Threatpost

7.5.20

Unacademy hacked, 22 million accounts offered for sale Incindent

Securityaffairs

7.5.20

Shipping Giant Toll suffered a second ransomware attack in a few months Ransomware

Securityaffairs

7.5.20

Nearly 1 Million WordPress Sites Targeted via Old Vulnerabilities Vulnerebility

Securityweek

7.5.20

New GitHub Features Help Find Vulnerabilities and Secrets in Code Vulnerebility

Securityweek

7.5.20

Firefox 76 Brings Security Patches, Breached Password Alerts Vulnerebility

Securityweek

7.5.20

Seventy Percent of Firms Sacrifice Security for Faster Innovation Security

Securityweek

7.5.20

Two Popular VPNs Exposed Users to Attacks Via Fake Updates Attack

Securityweek

7.5.20

Facebook Launches 'Discover,' A Secure Proxy to Browse the Internet for Free Social Thehackernews

7.5.20

Destination Cyberlandia: 3 keys to cyber happiness amid COVID-19

Cyber

Net-security

7.5.20

Shifts in device usage have large security implications

Security

Net-security

7.5.20

Most attacks successfully infiltrate production environments without detection

Attack

Net-security

7.5.20

Software vulnerabilities sometimes first announced on social media

Vulnerebility

Net-security

7.5.20

Worldwide IT spending expected to decline 5.1% in 2020

IT

Net-security

7.5.20

Get official CCSP online self-paced training

Security

Net-security

7.5.20

Adult live streaming site CAM4 found leaking data of millions of users

Incindent

Net-security

6.5.20

DDoS attacksReport: Microsoft’s GitHub Account Gets Hacked in Q1 2020

Attack

Securelist

6.5.20

9% of SAP’s 440,000 customers impacted by security bugs in some cloud products

Vulnerebility

Securityaffairs

6.5.20

Data belonging 44 Million Pakistani mobile users leaked online

Incindent

Securityaffairs

6.5.20

Law enforcement agencies dismantled Infinity Black hacker group

Hacking

Securityaffairs

6.5.20

Citrix ShareFile Vulnerabilities Expose User Files

Vulnerebility

Securityweek

6.5.20

Australian Shipping Giant Toll Hit by Ransomware for Second Time

Ransomware

Securityweek

6.5.20

SAP Alerts Customers of Vulnerabilities in Cloud Products

Vulnerebility

Securityweek

6.5.20

Nearly a million WordPress sites targeted in extensive attacks

Attack

Net-security

6.5.20

Microsoft announces limited Azure Sphere bug bounty program

Security

Net-security

6.5.20

AA20-126A : APT Groups Target Healthcare and Essential Services

CERT

CERT

6.5.20

GoDaddy Hack Breaches Hosting Account Credentials

Incindent

Threatpost

6.5.20

Google Android RCE Bug Allows Attacker Full Device Access

Android

Threatpost

6.5.20

New Kaiji Botnet Targets IoT, Linux Devices

BotNet  IoT

Threatpost

6.5.20

Spear-Phishing Attack Spoofs EE To Target Executives

Phishing

Threatpost

6.5.20

Recorded Future to Provide Free Access to Elite Intelligence Through New Browser Extension

Security

Securityaffairs

6.5.20

CAM4 adult cam site leaked 11M database records including emails, private chats

Incindent

Securityaffairs

6.5.20

New 'Kaiji' Botnet Attacks Linux, IoT Devices via SSH Brute Force

BotNet  IoT

Securityweek

6.5.20

US and UK Warn of Adversaries Targeting COVID-19 Responders

BigBrothers

Securityweek

6.5.20

More Than 30 Firms Join Alliance Calling for 'Open' 5G systems

Mobil

Securityweek

6.5.20

Microsoft Offering Up to $100,000 for Vulnerabilities in Azure Sphere

Vulnerebility

Securityweek

6.5.20

Warning: Citrix ShareFile Flaw Could Let Attackers Steal Corporate Secrets

Incindent

Thehackernews

6.5.20

Keeping an Eye on Malicious Files Life Time

Virus

SANS

6.5.20

Helping healthcare combat cyber attackers

Attack

Net-security

6.5.20

Future of work: Delivering a modern workspace

Security

Net-security

6.5.20

Password psychology: People aren’t protecting themselves even though they know better

Crypto

Net-security

6.5.20

Is your smartphone pushing you to overshare?

Mobil

Net-security

6.5.20

Sensitive data is piling up on enterprise devices, Windows 10 machines behind on patching

OS

Net-security

5.5.20

GoDaddy discloses a data breach, web hosting account credentials exposed

Incindent

Securityaffairs

5.5.20

Expert released PoC exploit for CVE-2020-1967 DoS flaw in OpenSSL

Exploit  Vulnerebility

Securityaffairs

5.5.20

Kaiji, a new Linux malware targets IoT devices in the wild

Virus

Securityaffairs

5.5.20

European Authorities Dismantle 'InfinityBlack' Hacker Group

BigBrothers

Securityweek

5.5.20

European Virus Tracing Apps Highlight Battle for Privacy

Privacy

Securityweek

5.5.20

Most Attacks Don't Generate Security Alerts: Mandiant

Attack

Securityweek

5.5.20

Android's May 2020 Patches Fix Critical System Vulnerability

Android

Securityweek

5.5.20

Virtualized Cloud Visibility Firm Orca Security Raises $20.5 Million

IT

Securityweek

5.5.20

GoDaddy Informs Users of Data Breach

Incindent

Securityweek

5.5.20

PoC Exploit Released for DoS Vulnerability in OpenSSL

Exploit  Vulnerebility

Securityweek

5.5.20

Change This Browser Setting to Stop Xiaomi from Spying On Your Incognito Activities

Mobil

Thehackernews

5.5.20

Can you trust attachments with unfamiliar extensions?

Spam

Net-security

5.5.20

Phishers target investment brokers, aim for Office, SharePoint login credentials

Phishing

Net-security

5.5.20

Oracle: Unpatched Versions of WebLogic App Server Under Active Attack

Attack

Threatpost

5.5.20

Hackers Exploit Critical Flaw in Ghost Platform with Cryptojacking Attack

Cryptocurrency  Exploit

Threatpost

5.5.20

Airplane Hack Exposes Weaknesses of Alert and Avoidance Systems

Hacking

Threatpost

5.5.20

Microsoft spotted multiple malspam campaigns using malware-laced ISO and IMG files

Spam  Virus

Securityaffairs

5.5.20

Nation-state actors are targeting UK universities to steal info on COVID-19 research

BigBrothers

Securityaffairs

5.5.20

Firm's MDM Server Abused to Deliver Android Malware to 75% of Its Devices

Android

Securityweek

5.5.20

Power Supply Can Turn Into Speaker for Data Exfiltration Over Air Gap

Attack

Securityweek

5.5.20

COVID-19 Contact Tracing Apps: Effective Virus Risk Management Tools or Privacy Nightmare?

Security

Securityweek

5.5.20

Most Malicious Coronavirus-Related Domains Located in U.S.

Virus

Securityweek

5.5.20

Cloud Security Features Don't Replace the Need for Personnel Security Capabilities

Security

SANS

5.5.20

How to prevent permission bloat: Overlooked and hidden access

Security

Net-security

5.5.20

Why you should be rushing to deploy multi-factor authentication to support remote work

Safety

Net-security

5.5.20

Preventing account takeover and social engineering attacks

Attack

Net-security

5.5.20

Half of IT pros believe their cybersecurity teams are ready to detect attacks

Cyber

Net-security

5.5.20

Online learning surges as people look for ways to be productive at home

Security

Net-security

4.5.20

DHS CISA alert provides recommendations on securing Office 365 installs

BigBrothers

Securityaffairs

4.5.20

Hackers are scanning the internet for vulnerable Salt installs, Ghost blogging platform hacked

Vulnerebility

Securityaffairs

4.5.20

LineageOS servers hacked, attackers exploited unpatched Salt issues

Vulnerebility

Securityaffairs

4.5.20

TP-Link Patches Multiple Vulnerabilities in NC Cloud Cameras

Vulnerebility

Securityweek

4.5.20

New Executive Order Aims to Protect U.S. Power Grid From Backdoored Equipment

BigBrothers

Securityweek

4.5.20

Flaws in Ninja Forms, LearnPress Plugins Exposed WordPress Sites to Attacks

Vulnerebility

Securityweek

4.5.20

Recent Salt Vulnerabilities Exploited to Hack LineageOS, Ghost, DigiCert Servers

Vulnerebility

Securityweek

4.5.20

New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers

Attack  Virus

Thehackernews

4.5.20

Hackers Breach LineageOS, Ghost, DigiCert Servers Using SaltStack Vulnerability

Vulnerebility

Thehackernews

4.5.20

Fake Microsoft Teams notification emails are hitting inboxes

Phishing

Net-security

4.5.20

SaltStack Salt vulnerabilities actively exploited by attackers, patch ASAP

Exploit

Net-security

4.5.20

Help your helpdesk: Empower employees to self-reset their AD account password

Security

Net-security

4.5.20

India’s Jio Coronavirus symptom checker exposed test results

Incindent

Securityaffairs

4.5.20

Coronavirus-themed attacks April 26 – May 02, 2020

Cyber

Securityaffairs

4.5.20

Cyber Threats Observatory Gets Improvements

Cyber

Securityaffairs

4.5.20

TOKOPEDIA e-commerce hacked, 91 Million accounts available on the darkweb

Incindent

Securityaffairs

4.5.20

ZIP & AES

Virus

SANS

4.5.20

Protecting corporate data in popular cloud-based collaborative apps

Safety

Net-security

4.5.20

CCPA privacy requests cost business up to $275k per million consumer records

Privacy

Net-security

4.5.20

Consumers will opt for competitors after a single ransomware-related service disruption

Ransomware

Net-security

4.5.20

Despite spending more on compliance, businesses still have basic IT weaknesses

Security

Net-security

4.5.20

5G infrastructure market estimated to reach $44.9 billion by 2025

Mobil

Net-security

4.5.20

CISSP online self-paced training only $561 for a limited time

Security

Net-security

3.5.20

Xiaomi tracks private browser and phone usage, defends behavior

Privacy

Bleepingcomputer

3.5.20

Sodinokibi, Ryuk ransomware drive up average ransom to $111,000

Ransomware

Bleepingcomputer

3.5.20

Opening 100 tabs in Google Chrome Mobile gets you a smiley face

Mobil

Bleepingcomputer

3.5.20

Microsoft Edge getting improved security, work at home features

Security

Bleepingcomputer

3.5.20

FCC: No more warnings for robocallers before fines

BigBrothers

Bleepingcomputer

3.5.20

Hackers breach company’s MDM server to spread Android malware

Android

Bleepingcomputer

3.5.20

New phishing campaign packs an info-stealer, ransomware punch

Phishing

Bleepingcomputer

3.5.20

Convincing Office 365 phishing uses fake Microsoft Teams alerts

Phishing

Bleepingcomputer

3.5.20

French daily Le Figaro database exposes users’ personal info

Incindent

Bleepingcomputer

3.5.20

Hackers say they stole millions of credit cards from Banco BCR

Incindent

Bleepingcomputer

3.5.20

US govt agencies to disable DoH until federal service is ready

BigBrothers

Bleepingcomputer

3.5.20

Ninja Forms WordPress plugin patch prevents takeover of 1M sites

Vulnerebility

Bleepingcomputer

3.5.20

Shade Ransomware Decryptor can now decrypt over 750K victims

Ransomware

Bleepingcomputer

3.5.20

New Android malware steals financial information, bypasses 2FA

Android

Bleepingcomputer

3.5.20

Microsoft Sway abused in PerSwaysion spear-phishing operation

Phishing

Bleepingcomputer

3.5.20

Clop ransomware leaks ExecuPharm's files after failed ransom

Ransomware

Bleepingcomputer

3.5.20

Bugs in WordPress plugins for online courses let students cheat

Vulnerebility

Bleepingcomputer

3.5.20

US govt updates Microsoft Office 365 security best practices

BigBrothers

Bleepingcomputer

3.5.20

Google updates Chrome Web Store policy to block extension spam

Security

Bleepingcomputer

3.5.20

Windows 10 Search now gives easy access to COVID-19 info

OS

Bleepingcomputer

3.5.20

Microsoft releases Windows 10 Build 19619 with freeze fixes

OS

Bleepingcomputer

3.5.20

Numerous sites leak user emails to advertising, analytics services

Privacy

Bleepingcomputer

3.5.20

Microsoft releases Sysmon 11 with auto-backup of deleted files

OS

Bleepingcomputer

3.5.20

RDP brute-force attacks are skyrocketing due to remote working

Attack

Bleepingcomputer

3.5.20

Microsoft warns of malware surprise pushed via pirated movies

Cryptocurrency

Bleepingcomputer

3.5.20

Securing Telecommuters with Expanded Endpoint Visibility and Control

Cyber blog

Sonicwall

3.5.20

Why Securing Remote Work is Crucial To Ensuring Business Continuity

Cyber blog

Sonicwall

3.5.20

Apple flaw puts iPhones & iPads at risk

OS Blog