Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Thinking of a cybersecurity career? Read this
- Smartphone usage patterns can reveal your personality type
- How one company collected browsing data via Android apps
- AI system detects posts by foreign ‘trolls’ on Facebook and Twitter
- Russia-aligned hackers running anti-Nato fake news campaign
- Snowden: The age of mass surveillance will not last forever
- Amazon CEO Jeff Bezos ‘can’t guarantee’ policy against using seller specific data hasn’t been violated
- Tech unicorn Dave admits to security breach impacting 7.5 million users
- Cosmetics giant Avon leaks 19 million records
- Twitter’s security woes included broad access to user accounts
- How did the Casio F91W become a terrorist icon?
- The cold war bunker that became home to a dark-web empire
- Offensive OSINT – Human trafficking investigation
- German police can access any WhatsApp message without any malware
- IBM Report: Compromised employee accounts led to most expensive data breaches over past year
- A massive leak of Nintendo source code is causing chaos in video games
- Twitter: An update on our security incident
For the more technical
- Detection deficit: A year in review of 0-days used in-the-wild in 2019
- Exploiting popular macOS apps with a single “.terminal” file
- CVE-2020-13777 GnuTLS audit: be scared
- Potential legacy risk from malware targeting QNAP NAS devices (PDF)
- VPN security flaws pose cyber risk to organizations with remote OT personnel
- Zoom Security Exploit – Cracking private meeting passwords
- Tor 0day: Stopping Tor connections
- Tor 0day: Burning bridges
- There’s a hole in the boot
- Critical arbitrary file upload vulnerability patched in wpDiscuz plugin
- Watch your containers: Doki infecting Docker servers in the cloud
- Vulnerabilities found on popular OkCupid dating app
- Threat report Q2 2020 by ESET (PDF)
- APT trends report Q2 2020 by Kaspersky
- The hacker infrastructure and underground hosting
- Operation North Star a job offer that’s too good to be true?
- Lazarus on the hunt for big game
- Chinese state-sponsored group ‘RedDelta’ targets the Vatican and catholic organizations
- Russia’s GRU hackers hit US government and energy targets
- Iran group claim attacks on 28 Israeli railway stations
- Hacker leaks 386 million user records from 18 companies for free
- A vigilante is sabotaging the Emotet botnet by replacing malware payloads with GIFs
- Emotet malware now steals your email attachments to attack contacts
- Anchor_dns malware goes cross platform
- Cerberus Android malware source code offered for sale for $100,000
- ChartreuseBlur: Bringing blur apps into focus
- Abnormal attack stories: Sharepoint attacks
- Threat actors bypass gateways with Google Ad redirects
- The rise of synthetic audio deepfakes
- Malware Reverse Engineering Handbook (PDF)
- Bcrypt password cracking extremely slow? Not if you are using hundreds of FPGAs!
- Cracking the uncrackable: Cybercriminals deploy EMV-bypass cloning
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.