IT Security Weekend Catch Up – August 28, 2020

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. 15 years of the Zero Day Initiative
  2. What it’s like for a hacker to get back online after a two-year Internet ban
  3. San Jose man pleads guilty to damaging Cisco’s network
  4. Database of 530,098 clients of Utair airline has been exposed
  5. Free photos, graphics site Freepik discloses data breach impacting 8.3M users
  6. Justice Department demands forfeiture of 280 cryptocurrency addresses associated with North Korea exchange hackers
  7. DDoS extortionists target NZX, Moneygram, Braintree, and other financial services
  8. Top torrent website, YTS is sharing user emails and IP addresses with anti-piracy law firm
  9. New Australian regulation will have negative consequences for the YouTube Community: what you need to know
  10. Apple’s new iPhone operating system is making it harder for Facebook to track people, and Facebook says it will decimate part of its business

For the more technical

  1. Stealing local files using Safari Web Share API
  2. Use-after-free vulnerability in Google Chrome WebGL could lead to code execution
  3. Google Project Zero expert found 3 flaws in Apache Web Server
  4. A Google Drive ‘feature’ could let attackers trick you into installing malware
  5. Microsoft manages to stop mysterious ‘FCM Messages’ notifications that were bombarding Teams users
  6. Flaws in DVB-T2 set-top boxes exposed
  7. We hacked 28,000 unsecured printers to raise awareness of printer security issues
  8. The EMV standard: Break, fix, verify (PDF)
  9. Gozi: The malware with a thousand faces
  10. An old bot’s nasty new tricks: Exploring Qbot’s latest attack methods
  11. SourMint: malicious code, ad fraud, and data leak in iOS
  12. xHelper/Triada malware pre-installed on thousands of low cost Chinese Android devices in emerging markets
  13. Threat landscape trends – Q2 2020
  14. APT hackers for hire used for industrial espionage
  15. Transparent Tribe: Evolution analysis, part 2
  16. SunCrypt Ransomware sheds light on the Maze ransomware cartel
  17. Ryuk successor Conti Ransomware releases data leak site
  18. Cybercriminal greeners from Iran attack companies worldwide for financial gain
  19. UltraRank hackers steal credit cards from hundreds of stores
  20. FASTCash 2.0: North Korea’s BeagleBoyz robbing banks
  21. Lifting the veil on DeathStalker, a mercenary triumvirate
  22. Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors (PDF)
  23. Dracula’s botnet
  24. Dark web market Empire down for days from DDoS attack

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *