Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- France formally charges Telegram founder, Pavel Durov, over organized crime on messaging app (PDF)
- Is Telegram really an encrypted messaging app?
- Telegram is neither “secure” nor “encrypted”
- Typing these four characters could crash your iPhone
- Android malware steals payment card data using previously unseen technique
- Researchers find SQL injection to bypass airport TSA security checks
- Chrome VRP reward updates to incentivize deeper research
- Judge dismisses majority of GitHub Copilot copyright claims
- Researcher sued for sharing data stolen by ransomware with media
- US offers $2.5 million reward for information on Belarusian hacker
For the more technical
- AutoIT bot targets Gmail accounts first
- Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
- Cryptojacking via CVE-2023-22527: Dissecting a full-scale cryptomining ecosystem
- Phishing in style: Microsoft Sway abused to deliver quishing attacks
- How 1 exposed Honeywell API gave us control over an internal engineering system
- Beware the unpatchable: Corona Mirai botnet spreads via zero-day
- Malware infiltrates Pidgin messenger’s official plugin repository
- Rocinante: The trojan horse that wanted to fly
- BlackSuit ransomware
- PeakLight: Decoding the stealthy memory-only malware
- The malware that must not be named: Suspected espionage campaign delivers “Voldemort”
- Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations
- Advanced persistent threat targeting Vietnamese human rights defenders
- Operation Oxidový: Sophisticated malware campaign targets Czech officials using NATO-themed decoys
- Taking the crossroads: The Versa Director zero-day exploitation
- North Korean threat actor Citrine Sleet exploiting Chromium zero-day
- Uncovering an Iranian counterintelligence operation
- State-backed attackers and commercial surveillance vendors repeatedly use the same exploits
- From Cobalt Strike to Mimikatz: A deep dive into the SlowTempest campaign targeting Chinese users
- The EV code signature market for eCrime
- Greasy Opal: Greasing the skids for cybercrime
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.