Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Whistleblowers take note: Don’t trust cropping tools
- The DEA bought customer data from rogue employees instead of getting a warrant
- Clearview AI used nearly 1m times by US police, it tells the BBC
- Biden executive order bans federal agencies from using commercial spyware
- NCA infiltrates cyber crime market with disguised DDoS sites
- ‘This is like a movie’: Ukraine’s secret plan to convince 3 Russian pilots to defect with their planes
- Telegram, the free zone for disinformation and conspiracies
- A scammer who tricks Instagram into banning influencers has never been identified. We may have found him
- The dirty secrets of a smear campaign
- Florida city water cyber incident allegedly caused by employee error
For the more technical
- About the security content of iOS 16.4 and iOS 15.7.4
- Guidance for investigating attacks using CVE-2023-23397
- Spyware vendors use 0-days and n-days against popular platforms
- Amnesty International uncovers new hacking campaign linked to mercenary spyware company
- BingBang: AAD misconfiguration led to Bing.com results manipulation and account takeover
- InjectGPT: the most polite exploit ever
- Building a DOS ChatGPT client in 2023
- Remote code execution vulnerability in Azure Pipelines can lead to software supply chain attack
- Active intrusion campaign targeting 3CXDesktopApp customers
- SmoothOperator: Ongoing campaign trojanizes 3CXDesktopApp in supply chain attack
- How scammers employ IPFS for email phishing
- Framing frames: Bypassing Wi-Fi encryption by manipulating transmit queues (PDF)
- Malicious actors use Unicode support in Python to evade detection
- Clipboard-injecting malware disguises itself as Tor browser, steals cryptocurrency
- MacStealer: New macOS-based stealer malware identified
- Moobot strikes again – Targeting Cacti and RealTek vulnerabilities
- Fork in the ice: The new era of IcedID
- Shining light on Dark Power: Yet another ransomware gang
- Mélofée: a new alien malware in the Panda’s toolset targeting Linux hosts
- Winter Vivern uses known Zimbra vulnerability to target webmail portals of NATO-aligned governments in Europe
- Dissecting AlienFox: The cloud spammer’s Swiss army knife
- With KeyPlug, China’s RedGolf spies on, steals from wide field of targets (PDF)
- APT43: North Korean group uses cybercrime to fund espionage operations (PDF)
- Contracts identify cyber operations projects from Russian company NTC Vulkan
- A look inside Putin’s secret plans for cyber-warfare
- ‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.