Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Serbia used Israeli firm’s tech to enable spy campaign, Amnesty says
- Researchers find security flaws in Skoda cars that may let hackers remotely track them
- Russia bans Viber, claiming app facilitates terrorism and drug trafficking
- Digital threat report: Telegram’s toxic recommendations perpetuate extremism
- Ukraine’s state registers hit with one of Russia’s largest cyberattacks, officials say
- Ukrainian national sentenced to federal prison in “Raccoon Infostealer” cybercrime case
- How to lose a fortune with just one bad click
- 2.2 billion stolen from crypto platforms in 2024, but hacked volumes stagnate toward year-end as DPRK slows activity post-July
- Cyborg cockroach armies can now be mass-produced at a rate of one every 68 seconds
- More than a quarter of new code at Google is generated by AI
- Indiana bakery still using Commodore 64s originally released in 1982 as cash registers
For the more technical
- AV Lab Cybersecurity Foundation advanced in-the-wild malware test November 2024
- Security review for Mullvad VPN AB (PDF)
- VBSpam email security comparative review – December 2024
- Google Calendar notifications bypassing email security policies
- Exploit attempts inspired by recent Struts2 file upload vulnerability (CVE-2024-53677, CVE-2023-50164)
- 300,000+ Prometheus servers and exporters exposed to DoS attacks
- How threat actors exploit brand collaborations to target popular YouTube channels
- Recent cases of watering hole attacks
- Effective phishing campaign targeting European companies and organizations
- Hidden in plain sight: TA397’s new attack chain delivers espionage RATs
- A look back: The evolution of Latin American eCrime malware in 2024
- New I2PRAT communicates via anonymous peer-to-peer network
- Earth Koshchei coopts red team tools in complex RDP attacks
- VIPKeyLogger infostealer in the wild
- Technical analysis of RiseLoader
- Spyware distributed through Amazon Appstore
- Crypted hearts: Exposing the HeartCrypt packer-as-a-service operation
- Under the Sadbridge with Gosar: Quasar gets a Golang rewrite
- Russia’s sovereign RuNet: A challenge to the cybercrime underworld?
- Tracking the FBI’s most wanted: “RedLine” info-stealer creator Maxim Rudometov
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.