Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Inside EasyList, the community-run ad-blocking list disrupting the internet
- Learn how to be a spy from previously unpublished KGB training manuals
- The model Estonian soldier who spied for Russia
- Pentagon testing mass surveillance balloons across the US
- After two years, MalwareTech is a free man + more information
- The secret history of the U.S. intelligence community’s battle with Iran’s Revolutionary Guard
- How over 25 people got scammed into working at a nonexistent game company
- Cisco ‘knowingly’ sold hackable video surveillance system to U.S. government
- US$1.7 million stolen from North Carolina county after BEC scammers posed as contractor
- The alleged Capital One hacker didn’t cover her tracks
- Capital One data theft impacts 106 million people
- What we can learn from the Capital One hack
- Facebook connected her to a tattooed soldier in Iraq. Or so she thought
- America’s DIY phone farmers
For the more technical
- Google Project Zero: 95.8% of all bug reports are fixed before deadline expires
- Critical flaws found in VxWorks RTOS that powers over 2 billion devices
- Apple iMessage flaw lets remote attackers read files on iPhones
- Apple bleee. Everyone knows what happens on your iPhone
- New Dragonblood vulnerabilities found in WiFi WPA3 standard
- Say hello to Lord Exploit Kit
- Report shows 32% of businesses still use Windows XP (PDF)
- Cryptographic attacks: A guide for the perplexed
- One misconfig (JIRA) to leak them all- including NASA and hundreds of Fortune 500 companies
- Investigating and reversing avionics CAN bus systems
- Android ransomware is back
- Attackers are wiping Iomega NAS devices, leaving ransom notes
- No More Ransom: 108 million reasons to celebrate its third anniversary
- Financial threats in H1 2019
- Everything you need to know about ATM attacks and fraud – part 1 & 2
- The evolution of cyber attacks in 2019 (PDF)
- MyDoom: The 15-year-old malware that’s still being used in phishing attacks in 2019
- Dridex’s bag of tricks: An analysis of its masquerading and code injection techniques
- New TrickBot version focuses on Microsoft’s Windows Defender
- Fake Google domains used in evasive Magento skimmer
- Watching the WatchBog: New BlueKeep scanner and Linux exploits
- New Mirai botnet lurks in the Tor network to stay under the radar
- FIN8 reemerges with new PoS malware Badhatch
- Rocke’in the NetFlow
- New activity group Hexane targets oil and gas, telecommunications providers
- A potentially state-sponsored hacking campaign tried to phish U.S. utilities in July
- Honda Motor Company leaks database with 134 million rows of employee computer data
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.