Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- ‘Zoombombing’: When video conferences go wrong
- ‘War Dialing’ tool exposes Zoom’s password problems
- Zoom iOS app sends data to Facebook even if you don’t have a Facebook account
- Personal details for the entire country of Georgia published online
- Hacker selling data of 538 million Weibo users
- Marriott discloses new data breach impacting 5.2 million hotel guests
- Medical and military contractor Kimchuk hit by data-stealing ransomware
- Paris hospitals target of failed cyber-attack, authority says
- Phish of GoDaddy employee jeopardized Escrow.com, among others
- A new breed of drug dealer has turned buying drugs into a treasure hunt
- Rare cybercrime enforcement in Russia yields 25 arrests, shutters ‘BuyBest’ marketplace
- Ungodly espionage: Russian hackers targeted Orthodox clergy
- Saudis suspected of phone spying campaign in US
- An elite spy group used 5 zero-days to hack North Koreans
- Identifying vulnerabilities and protecting you from phishing
For the more technical
- Zero-day vulnerabilities in Adobe Type Manager Library affects multiple Windows OSs
- Micropatching unknown 0days in Windows Type 1 Font Parsing
- CVE-2019-1433: Going from ‘in the wild report’ to PoC
- CVE-2020-0729: Remote Code Execution through .LNK files
- Linux kernel bug – all kernels insufficiently restrict exit signals
- VPN bypass vulnerability in Apple iOS
- A vulnerability in Safari that allowed unauthorized websites to access your camera on iOS and macOS
- Slack, Zoom, Google Hangouts: Are your remote work apps spying on you?
- Zoom meetings aren’t end-to-end encrypted, despite misleading marketing
- A quick look at the confidentiality of Zoom meetings
- Analyzing WhatsApp calls with Wireshark, radare2 and Frida
- Imperva WAF bypass
- CVE-2020-0796 – Windows SMBv3 LPE exploit
- Attacking helpdesks part 1: RCE chain on DeskPro, with Bitdefender as a case study
- Applying a Stuxnet type attack to a Modicon PLC
- Monitoring ICS cyber operation tools and software exploit modules to anticipate future threats
- With IoT, common devices pose new threats
- Rare BadUSB attack detected in the wild against US hospitality provider
- Would you exchange your security for a gift card?
- Booz Allen analyzed 200+ Russian hacking operations to better understand their tactics
- TrickBot pushing a 2FA bypass app to bank customers in Germany
- iOS exploit chain deploys LightSpy feature-rich malware
- APT41 initiates global intrusion campaign using multiple exploits
- WildPressure targets industrial-related entities in the Middle East
- Loncom packer: from backdoors to Cobalt Strike
- On the Royal Road
- Zeus Sphinx trojan awakens amidst coronavirus spam frenzy
- Kwampirs malware employed in ongoing cyber supply chain campaign targeting global industries (PDF)
- The Vollgar campaign: MS-SQL servers under attack
- Full Operational Shutdown – another cybercrime case from the Microsoft Detection and Response Team
- Analysis of an attempted attack against Intel 471
- SilverTerrier: 2019 Nigerian Business Email Compromise update
- Holy water: ongoing targeted water-holing attack in Asia
- How we recovered over $300K of Bitcoin
- Be careful what you OSINT with
- Experimental security assessment on Lexus cars
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.