IT Security Weekend Catch Up – August 13, 2021

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. WikiLeaks: The Intolerance Network – over 17,000 documents from HazteOir and CitizenGO
  2. AI wrote better phishing emails than humans in a recent test
  3. Apple: Expanded Protections for Children. Frequently Asked Questions (PDF)
  4. Anti-piracy firm asks Google to block
  5. Seeking change, anti-Lukashenka hackers seize senior Belarusian officials’ personal data
  6. The lost tablet and the secret documents. Clues pointing to a shadowy Russian army
  7. One million stolen credit cards leaked to promote carding market
  8. Notorious AlphaBay darknet market comes back to life
  9. Motherboard vendor GIGABYTE hit by RansomExx ransomware gang
  10. Kaseya’s universal REvil decryption key leaked on a hacking forum
  11. Google discontinues Bluetooth security keys to focus on NFC versions
  12. NortonLifeLock and Avast to merge in $8 billion transaction

For the more technical

  1. Microsoft August 2021 Patch Tuesday
  2. Microsoft confirms another Windows print spooler zero-day bug
  3. Magniber ransomware uses PrintNightmare vulnerability to infect victims in South Korea
  4. Vice Society leverages PrintNightmare in ransomware attacks
  5. Escaping from a truly air gapped network via Apple AWDL
  6. Do you like to read? I can take over your Kindle with an e-book
  7. Freshly disclosed vulnerability CVE-2021-20090 exploited in the wild
  8. Bypassing authentication on Arcadyan routers with CVE-2021–20090 and rooting some Buffalo
  9. Reproducing the ProxyShell Pwn2Own exploit
  10. Massive new AdLoad campaign goes entirely undetected by Apple’s XProtect
  11. CobaltSpam tool can flood Cobalt Strike malware servers
  12. Over $600 million reportedly stolen in cryptocurrency hack
  13. Poly Network hacker has now returned almost all the $600m in crypto taken
  14. Glowworm Attack: Optical TEMPEST sound recovery via a device’s power indicator LED (PDF)
  15. You’re doing IoT RNG
  16. Firewalls and middleboxes can be weaponized for gigantic DDoS attacks
  17. Attackers use Morse code, other encryption methods in evasive phishing campaign
  18. IIStealer: A server‑side threat to e‑commerce transactions
  19. IISerpent: Malware‑driven SEO fraud as a service
  20. Cinobi banking trojan targets cryptocurrency exchange users via malvertising
  21. FlyTrap Android malware compromises thousands of Facebook accounts
  22. Linux version of BlackMatter ransomware targets VMware ESXi servers
  23. New eCh0raix ransomware variant targets QNAP and Synology network-attached storage devices
  24. Cryptominer ELFs using MSR to boost mining process
  25. IT threat evolution Q2 2021 + PC statistics + Mobile statistics
  26. UNC215: Spotlight on a Chinese espionage campaign in Israel
  27. The Lazarus heist: Where are they now?

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *