IT Security Weekend Catch Up – December 20, 2020

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. The mosque shooter exploited the power of the Internet + The report
  2. Israeli spy firm suspected of accessing global telecoms via Channel Islands
  3. Spy companies using Channel Islands to track phones around the world
  4. FBI & Interpol disrupt Joker’s Stash, the internet’s largest carding marketplace
  5. More annoying than crippling: Joker’s Stash takedown is temporary
  6. German secure email provider Tutanota forced to monitor an account, after regional court ruling
  7. FSB team of chemical weapon experts implicated in Alexey Navalny Novichok poisoning

For the more technical

  1. WordPress plugin with 5 million installs has a critical vulnerability
  2. Third party browser extensions for Instagram, Facebook, Vimeo and others infected with malware
  3. Academics turn RAM into Wi-Fi cards to steal data from air-gapped systems (PDF)
  4. Spear phishing: Top threats and trends (PDF)
  5. Widespread ‘doc(s) delivery’ spear-phishing campaign targets enterprises with hundreds of compromised accounts
  6. Highly evasive attacker leverages SolarWinds supply chain to compromise multiple global victims with SUNBURST backdoor
  7. A moment of reckoning: the need for a strong and global cybersecurity response
  8. Microsoft confirms it was also breached in recent SolarWinds supply chain hack
  9. Nuclear weapons agency breached amid massive cyber onslaught
  10. Operation SignSight: Supply‑chain attack against a certification authority in Southeast Asia
  11. New spyware used by sextortionists to blackmail iOS and Android users
  12. Massive fraud operation facilitated by evil mobile emulator farms
  13. Increase in attack: SocGholish
  14. Recent ransomware wave targeting Israel linked to Iranian threat actors
  15. Exponential growth in DDoS attack volumes

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *