IT Security Weekend Catch Up – August 3, 2019

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Inside EasyList, the community-run ad-blocking list disrupting the internet
  2. Learn how to be a spy from previously unpublished KGB training manuals
  3. The model Estonian soldier who spied for Russia
  4. Pentagon testing mass surveillance balloons across the US
  5. After two years, MalwareTech is a free man + more information
  6. The secret history of the U.S. intelligence community’s battle with Iran’s Revolutionary Guard
  7. How over 25 people got scammed into working at a nonexistent game company
  8. Cisco ‘knowingly’ sold hackable video surveillance system to U.S. government
  9. US$1.7 million stolen from North Carolina county after BEC scammers posed as contractor
  10. The alleged Capital One hacker didn’t cover her tracks
  11. Capital One data theft impacts 106 million people
  12. What we can learn from the Capital One hack
  13. Facebook connected her to a tattooed soldier in Iraq. Or so she thought
  14. America’s DIY phone farmers

For the more technical

  1. Google Project Zero: 95.8% of all bug reports are fixed before deadline expires
  2. Critical flaws found in VxWorks RTOS that powers over 2 billion devices
  3. Apple iMessage flaw lets remote attackers read files on iPhones
  4. Apple bleee. Everyone knows what happens on your iPhone
  5. New Dragonblood vulnerabilities found in WiFi WPA3 standard
  6. Say hello to Lord Exploit Kit
  7. Report shows 32% of businesses still use Windows XP (PDF)
  8. Cryptographic attacks: A guide for the perplexed
  9. One misconfig (JIRA) to leak them all- including NASA and hundreds of Fortune 500 companies
  10. Investigating and reversing avionics CAN bus systems
  11. Android ransomware is back
  12. Attackers are wiping Iomega NAS devices, leaving ransom notes
  13. No More Ransom: 108 million reasons to celebrate its third anniversary
  14. Financial threats in H1 2019
  15. Everything you need to know about ATM attacks and fraud – part 1 & 2
  16. The evolution of cyber attacks in 2019 (PDF)
  17. MyDoom: The 15-year-old malware that’s still being used in phishing attacks in 2019
  18. Dridex’s bag of tricks: An analysis of its masquerading and code injection techniques
  19. New TrickBot version focuses on Microsoft’s Windows Defender
  20. Fake Google domains used in evasive Magento skimmer
  21. Watching the WatchBog: New BlueKeep scanner and Linux exploits
  22. New Mirai botnet lurks in the Tor network to stay under the radar
  23. FIN8 reemerges with new PoS malware Badhatch
  24. Rocke’in the NetFlow
  25. New activity group Hexane targets oil and gas, telecommunications providers
  26. A potentially state-sponsored hacking campaign tried to phish U.S. utilities in July
  27. Honda Motor Company leaks database with 134 million rows of employee computer data

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *