Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- 15 years of the Zero Day Initiative
- What it’s like for a hacker to get back online after a two-year Internet ban
- San Jose man pleads guilty to damaging Cisco’s network
- Database of 530,098 clients of Utair airline has been exposed
- Free photos, graphics site Freepik discloses data breach impacting 8.3M users
- Justice Department demands forfeiture of 280 cryptocurrency addresses associated with North Korea exchange hackers
- DDoS extortionists target NZX, Moneygram, Braintree, and other financial services
- Top torrent website, YTS is sharing user emails and IP addresses with anti-piracy law firm
- New Australian regulation will have negative consequences for the YouTube Community: what you need to know
- Apple’s new iPhone operating system is making it harder for Facebook to track people, and Facebook says it will decimate part of its business
For the more technical
- Stealing local files using Safari Web Share API
- Use-after-free vulnerability in Google Chrome WebGL could lead to code execution
- Google Project Zero expert found 3 flaws in Apache Web Server
- A Google Drive ‘feature’ could let attackers trick you into installing malware
- Microsoft manages to stop mysterious ‘FCM Messages’ notifications that were bombarding Teams users
- Flaws in DVB-T2 set-top boxes exposed
- We hacked 28,000 unsecured printers to raise awareness of printer security issues
- The EMV standard: Break, fix, verify (PDF)
- Gozi: The malware with a thousand faces
- An old bot’s nasty new tricks: Exploring Qbot’s latest attack methods
- SourMint: malicious code, ad fraud, and data leak in iOS
- xHelper/Triada malware pre-installed on thousands of low cost Chinese Android devices in emerging markets
- Threat landscape trends – Q2 2020
- APT hackers for hire used for industrial espionage
- Transparent Tribe: Evolution analysis, part 2
- SunCrypt Ransomware sheds light on the Maze ransomware cartel
- Ryuk successor Conti Ransomware releases data leak site
- Cybercriminal greeners from Iran attack companies worldwide for financial gain
- UltraRank hackers steal credit cards from hundreds of stores
- FASTCash 2.0: North Korea’s BeagleBoyz robbing banks
- Lifting the veil on DeathStalker, a mercenary triumvirate
- Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors (PDF)
- Dracula’s botnet
- Dark web market Empire down for days from DDoS attack
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.