Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Telegram moderation overview
- Kremlin doubled its blocking of independent media sites this year, researchers say
- [VIDEO] How China hacked America’s phone network
- Chatbots urged teen to self-harm, suggested murdering parents, lawsuit says
- Back where it started: “Do Not Track” removed from Firefox after 13 years
- PIN number analysis
- Law enforcement shuts down 27 DDoS booters ahead of annual Christmas attacks
- International operation against ‘phone phishing’ gang in Belgium and the Netherlands
For the more technical
- [VIDEO] CONFidence 2024 conference recordings
- “Pwned”, the book, is now available for free
- Microsoft Patch Tuesday: December 2024
- Microsoft Warbird and PMP security research + more information
- Oasis security research team discovers Microsoft Azure MFA bypass
- BadRAM: Breaching processor security via rogue memory modules
- Supply-chain attack analysis: Ultralytics
- (QR) coding my way out of here: C2 in browser isolation environments
- Where there’s smoke, there’s fire – Mitel MiCollab CVE-2024-35286, CVE-2024-41713 and an 0day
- Compromising OpenWrt supply chain via truncated SHA-256 collision and command injection
- Unauthorized plugin installation/activation in Hunk Companion
- Black Basta ransomware campaign drops Zbot, DarkGate, and custom malware
- Inside Zloader’s latest trick: DNS tunneling
- Meeten malware: A cross-platform threat to crypto wallets on macOS and Windows
- Declawing PUMAKIT
- The stealthy stalker: Remcos RAT
- PROXY.AM powered by Socks5Systemz botnet
- The fascinating security model of dark web marketplaces
- New Chinese surveillance tool used by public security bureaus
- Operation Digital Eye: Chinese APT compromises critical digital infrastructure via Visual Studio Code tunnels
- Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.