Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- WikiLeaks: The Intolerance Network – over 17,000 documents from HazteOir and CitizenGO
- AI wrote better phishing emails than humans in a recent test
- Apple: Expanded Protections for Children. Frequently Asked Questions (PDF)
- Anti-piracy firm asks Google to block 127.0.0.1
- Seeking change, anti-Lukashenka hackers seize senior Belarusian officials’ personal data
- The lost tablet and the secret documents. Clues pointing to a shadowy Russian army
- One million stolen credit cards leaked to promote carding market
- Notorious AlphaBay darknet market comes back to life
- Motherboard vendor GIGABYTE hit by RansomExx ransomware gang
- Kaseya’s universal REvil decryption key leaked on a hacking forum
- Google discontinues Bluetooth security keys to focus on NFC versions
- NortonLifeLock and Avast to merge in $8 billion transaction
For the more technical
- Microsoft August 2021 Patch Tuesday
- Microsoft confirms another Windows print spooler zero-day bug
- Magniber ransomware uses PrintNightmare vulnerability to infect victims in South Korea
- Vice Society leverages PrintNightmare in ransomware attacks
- Escaping from a truly air gapped network via Apple AWDL
- Do you like to read? I can take over your Kindle with an e-book
- Freshly disclosed vulnerability CVE-2021-20090 exploited in the wild
- Bypassing authentication on Arcadyan routers with CVE-2021–20090 and rooting some Buffalo
- Reproducing the ProxyShell Pwn2Own exploit
- Massive new AdLoad campaign goes entirely undetected by Apple’s XProtect
- CobaltSpam tool can flood Cobalt Strike malware servers
- Over $600 million reportedly stolen in cryptocurrency hack
- Poly Network hacker has now returned almost all the $600m in crypto taken
- Glowworm Attack: Optical TEMPEST sound recovery via a device’s power indicator LED (PDF)
- You’re doing IoT RNG
- Firewalls and middleboxes can be weaponized for gigantic DDoS attacks
- Attackers use Morse code, other encryption methods in evasive phishing campaign
- IIStealer: A server‑side threat to e‑commerce transactions
- IISerpent: Malware‑driven SEO fraud as a service
- Cinobi banking trojan targets cryptocurrency exchange users via malvertising
- FlyTrap Android malware compromises thousands of Facebook accounts
- Linux version of BlackMatter ransomware targets VMware ESXi servers
- New eCh0raix ransomware variant targets QNAP and Synology network-attached storage devices
- Cryptominer ELFs using MSR to boost mining process
- IT threat evolution Q2 2021 + PC statistics + Mobile statistics
- UNC215: Spotlight on a Chinese espionage campaign in Israel
- The Lazarus heist: Where are they now?
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.