Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- [VIDEO] CNN interviews Twitter whistleblower about what he saw inside the company
- The story of the first “computer bug”… is a pile of lies
- Two years on, Apple iOS VPNs still leak IP addresses + more information
- Sharing is NOT caring: Android apps that can’t get enough of you
- A hospital center targeted by a cyberattack, a ransom of 10 million dollars demanded
- Greek gas operator refuses to negotiate with ransomware group after attack
- Streaming media platform Plex warns users to reset passwords after data breach
For the more technical
- Dirty Cred: No pipe but as nasty as Dirty Pipe
- Experts warn of widespread exploitation involving Hikvision cameras
- Palo Alto warns of firewall vulnerability used in DDoS attack on service provider
- An in-depth study of Java deserialization remote-code execution exploits and vulnerabilities (PDF)
- Gairoscope: Injecting data from air-gapped computers to nearby gyroscopes (PDF)
- EtherLED: Sending covert Morse signals from air-gapped devices via network card (NIC) LEDs (PDF)
- Generate your own hash sets with HashR
- An encrypted ZIP file can have two correct passwords — here’s why
- Microsoft Edge password manager security
- Replay of Primary Refresh (PRT) and other issued tokens from an Azure AD joined device
- Roasting 0ktapus: The phishing campaign going after Okta identity credentials
- You can’t audit me: APT29 continues targeting Microsoft 365
- Bumblebee loader – the high road to enterprise domain control
- MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone
- HavanaCrypt ransomware masquerading as Google Update
- New ‘Donut Leaks’ extortion gang linked to recent ransomware attacks
- Ransomware actor abuses Genshin Impact anti-cheat driver to kill antivirus
- Fake DDoS pages on WordPress sites lead to drive-by-downloads
- Fake Chrome extension ‘Internet Download Manager’ has 200,000 installs
- Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks
- Making victims pay, infostealer malwares mimick pirated-software download sites
- Grandoreiro banking trojan with new TTPs targeting various industry verticals
- New Iranian APT data extraction tool
- Kimsuky’s GoldDragon cluster and its C2 operations
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.