Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
On the non-technical side
- Democratic House candidates were also targets of Russian hacking
- A few words about infosec news overhype
- A billion Yahoo accounts stolen
- Verizon explores exit from Yahoo deal
- Yahoo database allegedly sold for $300k
- Mikko Hypponen AMA on Quora
- Uber accused of abusing personal information of customers
- Multiple DDoSers arrested or warned
- Kaspersky’s cyber pew pew pew map
- Critical data leak due to unprotected home backup drive
- Manipulating Reddit with $200
On the more technical side
- BSides Lisbon – slides and videos
- Kaspersky’s 2016 summary
- NIST draft of password rules
- Electronic BLE safe locks analysis
- Internet census 2016 – all SSH services
- Cisco provides a list of top 1 million websites
- macOS FileVault2 password retrieval
- Detecting hthe usage of binary instrumentation utility PIN
- Mirai DGA analysis
- RCE in Ubuntu desktop
- Very clever exploit for ChromeOS
- More exploits offered by Shadow Brokers
- RCE in Netgear routers
- How Nymaim avoids virtual machines
- JScript dropeer with UAC bypass
- Serious Joomla vulnerability
- Using PLCs as a payload/shellcode distribution system
- Analysis of attacks against financial institutions in Ukraine
- Malvertising atacks on home routers
- Nagios RCE
- Dropbox H1 2016 transparency report
- “Backdoor” in Skype for Mac OS X
- iPhones patched to stop reading your passwords aloud
- Malware detected in firmware of cheap Android devices
- Microsoft’s analysis of Shamoon 2 attacks
- Analysis of Buhtrap malware
- Multiple vulnerabilities in McAfee VirusScan Enterprise for Linux
- Sophos Web Appliance multiple vulnerabilities
- SQLi in Teampass
- The state of WordPress security
- Cracking passwords on a 5k USD budget
- Escaping a restricted shell
- Disassembling Mirai
- Building botnet on ServiceWorkers
- Rig Exploit Kit campaign analysis
- Attacks of malicious Zcash miners
- Sofacy campaign analysis
- [PDF] Gamification of DDoS attacks
- Samsa ransomware analysis
- Analysis of a multi-malware campaign against financial institutions
- How scammers abuse Baidu search results
- TrickBot’s new campaign
- [PDF] Hiding pictures using conductive ink
- [PDF] Latest McAfee Threats Report
- Certificate Transparency monitoring tool
- Home routers security issues
- Reversing Huawei firmware
- [PDF] ENISA’s opinion paper on encryption
- Exploring 2FA by Apple
- Bypassing 2FA by Apple
- Rooting iOS 10.1.1
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.