Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- 228 arrests and over 3800 money mules identified in global action against money laundering
- 30 506 internet domain names shut down for intellectual property infringement
- FBI asked Sony for data on user who allegedly used PlayStation Network to sell cocaine
- Evernote gave Dark Web dealer’s notes to the DEA
- Alleged Russian hacker behind $100 million Evil Corp indicted
- BMW infiltrated by hackers hunting for automotive trade secrets
- Millions of Americans at risk after huge data and SMS leak
- New Chair of EFF’s Board of Directors: Renowned legal expert Pamela Samuelson
For the more technical
- A full browser compromise exploit chain targeting Firefox on Windows
- Severe auth bypass and priv-esc vulnerabilities disclosed in OpenBSD
- StrandHogg Android vulnerability allows malware to hijack legitimate apps
- StrandHogg was misused by the BankBot Android banking trojan
- Android Security Bulletin—December 2019
- Pixel Update Bulletin—December 2019
- An update on Android TLS adoption
- The iPhone 11 Pro’s location data puzzler
- Apple explains mysterious iPhone 11 location requests
- Inferring and hijacking VPN-tunneled TCP connections
- Vulnerability in Aviatrix VPN
- Two malicious Python libraries caught stealing SSH and GPG keys
- Breaking the rules: A tough Outlook for home page attacks (CVE-2017-11774)
- The most copied StackOverflow snippet of all time is flawed
- BlackDirect: Microsoft Azure account takeover
- Mobile cyberespionage campaign distributed through CallerSpy mounts initial phase of a targeted attack
- Lazarus group goes ‘fileless’
- New version of IcedID Trojan uses steganographic payloads
- New destructive wiper “ZeroCleare” targets energy sector in the Middle East (PDF)
- Biometric data processing and storage system threats
- APT review: what the world’s threat actors got up to in 2019
- xHunt actor’s cheat sheet
- Cloning EMV cards with the pre-play attack (PDF)
- New vulnerabilities in Contactless Payments (PDF)
- PCI Contactless Payments on COTS
- HackerOne breach lets outside hacker read customers’ private bug reports
- A successful BEC leveraging lookalike domains
- Stealthy attacks against robotic vehicles protected by control-based techniques (PDF)
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.