IT Security Weekend Catch Up – November 30, 2024

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Sell Chrome to end search monopoly, Google told
  2. TikTok CEO summoned to European Parliament over role in shock Romania election
  3. Police find SMS blaster that sent a million smishing messages in 3 days
  4. Phobos ransomware administrator extradited from South Korea to face cybercrime charges
  5. European law enforcement stops illegal IPTV service providers
  6. Major cybercrime operation nets 1,006 suspects
  7. Bologna FC confirms data breach after RansomHub ransomware attack
  8. Cloned customer voice beats bank security checks
  9. Microsoft says it’s not using your Word, Excel data for AI training

For the more technical

  1. Python crypto library updated to steal private keys
  2. 200,000 WordPress sites affected by unauthenticated critical vulnerabilities in Anti-Spam by CleanTalk WordPress plugin
  3. When guardians become predators: How malware corrupts the protectors
  4. Targeting the cybercrime supply chain
  5. Guess who’s back – the return of ANEL in the recent Earth Kasha spear-phishing campaign in 2024
  6. Rockstar 2FA: A driving force in Phishing-as-a-Service (PaaS)
  7. Gaming engines: An undetected playground for malware loaders
  8. SpyLoan: A global threat exploiting social engineering
  9. Matrix unleashes a new widespread DDoS campaign
  10. New “CleverSoar” installer targets Chinese and Vietnamese users
  11. Bootkitty: Analyzing the first UEFI bootkit for Linux
  12. PSLoramyra: Technical analysis of fileless malware loader
  13. RomCom exploits Firefox and Windows zero days in the wild
  14. Financially motivated threat actor leveraged Google Docs and Weebly services to target telecom and financial sectors
  15. Seeing through a GLASSBRIDGE: Understanding the digital marketing ecosystem spreading pro-PRC influence operations
  16. The nearest neighbor attack: How a Russian APT weaponized nearby Wi-Fi networks for covert access
  17. Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
  18. Russia-aligned TAG-110 targets Asia and Europe with HATVIBE and CHERRYSPY
  19. CyberVolk: A deep dive into the hacktivists, tools and ransomware fueling pro-Russian cyber attacks
  20. Game of emperor: Unveiling long term Earth Estries cyber intrusions

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *