IT Security Weekend Catch Up – October 19, 2024

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Jessikka Aro echoes the Smolensk conspiracy. How did she get upon this false lead?
  2. ‘It’s mindblowing’: US meteorologists face death threats as hurricane conspiracies surge
  3. Using ChatGPT to make fake social media posts backfires on bad actors
  4. How to stop advertisers from tracking your teen across the Internet
  5. These car brands are collecting and sharing your data with third parties
  6. Chinese researchers break RSA encryption with a quantum computer
  7. Startup can identify deepfake video in real time
  8. Matt Mullenweg’s crusade undermines open source
  9. Hackers breach Pokémon game developer, source code and personal information leaks online
  10. Two Sudanese nationals indicted for alleged role in Anonymous Sudan cyberattacks
  11. Web of crime exposed: 5,100 arrests in illegal football gambling crackdown
  12. Sweden, Finland partner to take down Sipulitie criminal marketplace
  13. Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach

For the more technical

  1. How low can you go? An analysis of 2023 time-to-exploit trends
  2. Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass
  3. How to install Windows 11 on supported and unsupported PCs, 24H2 edition
  4. Unpatched Veeam and VPNs leveraged in recent ransomware attacks
  5. Should we chat, too? Security analysis of WeChat’s MMTLS encryption protocol
  6. Fake LockBit, real damage: Ransomware samples abuse AWS S3 to steal data
  7. ClickFix deception: A social engineering tactic to deploy malware
  8. Technical analysis of a novel IMEEX framework
  9. Silent threat: Red Team tool EDRSilencer disrupting endpoint security solutions
  10. Exfiltration over Telegram Bots: Skidding infostealer logs
  11. FASTCash for Linux
  12. Water Makara uses obfuscated JavaScript in spear phishing campaign, targets Brazil with Astaroth malware
  13. Expanding the investigation: Deep dive into latest TrickMo samples
  14. Malware by the (Bit)Bucket: Unveiling AsyncRAT
  15. HORUS Protector: The new malware distribution service [part 1] [part 2]
  16. Iranian cyber actors access critical infrastructure networks
  17. IcePeony with the ‘996’ work culture
  18. UAT-5647 targets Ukrainian and Polish entities with RomCom malware variants
  19. Fraudulent North Korean IT worker schemes: From insider threats to extortion

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *