IT Security Weekend Catch Up – April 23, 2022

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Okta says two customers breached during January security incident
  2. T-Mobile confirms Lapsus$ breach, says no customer or government info accessed
  3. I’m a security engineer and I still almost got scammed
  4. A $3 billion Silk Road seizure will erase Ross Ulbricht’s debt
  5. New Industrial Spy stolen data market promoted through cracks, adware

For the more technical

  1. A year in review of 0-days used in-the-wild in 2021
  2. CISA warns of attackers now exploiting Windows Print Spooler bug
  3. When “secure” isn’t secure at all: High‑impact UEFI vulnerabilities discovered in Lenovo consumer laptops
  4. AWS’s Log4Shell hot patch vulnerable to container escape and privilege escalation
  5. Blinding Snort: Breaking the Modbus OT preprocessor
  6. Vulnerability in Atlassian Jira Core
  7. CVE-2022-21449: Psychic signatures in Java
  8. Oracle critical patch update advisory – April 2022
  9. CatalanGate: Extensive mercenary spyware operation against Catalans using Pegasus and Candiru
  10. Largest mobile chipset manufacturers used vulnerable audio decoder, 2/3 of Android users’ privacy around the world were at risk
  11. Hackers earn $400K for zero-day ICS exploits demoed at Pwn2Own
  12. Attack campaign involving stolen OAuth user tokens issued to two third-party integrators
  13. Trivy – scanner for vulnerabilities in container images, file systems, and Git repositories
  14. Are you really muted?: A privacy analysis of mute buttons in video conferencing apps (PDF)
  15. New stealthy BotenaGo malware variant targets DVR devices
  16. Warez users fell for Certishell
  17. Hackers spearphish corporate hiring managers with poisoned resumes, infecting them with the more_eggs malware
  18. How to recover files encrypted by Yanlouwang
  19. Current trends in ransomware with special notes on Monero usage (PDF)
  20. Hive ransomware analysis
  21. PYSA (Mespinoza) in-depth analysis (PDF)
  22. Conti ransomware group behind the Karakurt hacking team
  23. FBI shares information on BlackCat ransomware attacks (PDF)
  24. REvil’s TOR sites come alive to redirect to new ransomware operation
  25. “Haskers Gang” introduces new ZingoStealer
  26. TraderTraitor: North Korean state-sponsored APT targets blockchain companies
  27. Shuckworm: Espionage group continues intense campaign against Ukraine
  28. A deeper look at the malware being used on Ukrainian targets
  29. Russian state-sponsored and criminal cyber threats to critical infrastructure
  30. LemonDuck targets Docker for cryptomining operations

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *