Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- [AUDIO] Algorithms of Trauma 2. How Facebook feeds on your fears
- Musk’s X hit with first EU probe under new disinformation rules
- Scammers are tricking anti-vaxxers into buying bogus medical documents
- The names of thousands of neo-Nazi music fans just got leaked
- Ten years later, new clues in the Target breach
- AlphV ransomware site is “seized” by the FBI. Then it’s “unseized.” And so on
- Lapsus$: GTA 6 hacker handed indefinite hospital order
- USD 300 million seized and 3,500 suspects arrested in international financial crime operation
For the more technical
- Critical RCE vulnerability discovered in Perforce Helix Core Server
- 3CX warns customers to disable SQL database integrations
- [VIDEO] CONFidence 2023 conference recordings
- Spoofing DNS records by abusing DHCP DNS dynamic updates
- Novel Terrapin attack uses prefix truncation to downgrade the security of SSH channels
- Honeypot recon: MySQL malware infection via user-defined functions
- New process injection techniques using Windows thread pools
- Paged Out! #3 – a free experimental technical magazine
- SMTP smuggling – spoofing e-mails worldwide
- Fake VPN Chrome extensions force-installed 1.5 million times
- BazarCall attack leverages Google Forms to increase perceived credibility
- Getting gooey with GuLoader: deobfuscating the downloader
- PikaBot distributed via malicious search ads
- OilRig’s persistent attacks using cloud service-powered downloaders
- Qbot malware returns in campaign targeting hospitality industry
- “Inhospitality” malspam campaign targets hotel industry
- Zimperium’s 2023 Mobile Banking Heists Report
- Android banking trojan Chameleon can now bypass any biometric authentication
- Routers roasting on an open firewall: The KV-Botnet investigation
- Rhadamanthys v0.5.0 – a deep dive into the stealer’s components
- Smoke and mirrors: Understanding the workings of Wazawaka
- Akira, again: The ransomware that keeps on taking
- CryptoGuard: An asymmetric approach to the ransomware battle
- Lets open(dir) some presents: An analysis of a persistent actor’s activity
- Gaza Cybergang: Unified front targeting Hamas opposition
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.