Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
On the non-technical side
- ThyssenKrupp secrets stolen in cyber attack
- China stole data from major U.S. law firms
- Spy agencies targeted in-flight mobile phone use
- Britain allegedly spied on OVH CEO
- Germany points fingers to Russian cyber
- Someone took over Israeli news program to broadcast the Muslim call to prayer
- Criminal group leader escapes justice
- McDonald’s drive-thru intercom hacked
- Large DDoS attack on Russian banks
- FB, Twitter, Microsoft and YouTube fighting terrorist content
- Fake US Embassy shut down in Ghana
- International telephony fraud case study
- Afghanistan government impostor story
- How a hacking campaign helped shut down an award-winning news site
On the technical side
- Battery status information used for fraud detection
- [PDF] Rise of the machines – an excellent report on the threats from IoT
- [PDF] Patchwork – a report on copy – paste APT
- Yahoo Mail stored XSS
- Facebook spam campaign with nude celebrity PDFs
- [PDF] Anatomy of IoT security
- Analysis of a simple userland rootkit
- Floki Bot analysis plus the second article
- TrickBot analysis
- A brief history of DDoS attacks
- Why Filippo Valsorda is giving up on PGP
- Roundcube RCE via email
- HP disables FTP and telnet in printers – in 2016…
- [PDF] Defeating sandbox evasion
- Malvertising using steganography
- AdGholas analysis
- Backdoor in Sony IPELA Engine IP Cameras
- Taking over 120k orphaned domains
- Vulnerabilities in a smart home device
- British ISP customers get their WiFi passwords stolen
- New race condition vulnerability in Linux kernel
- 1.4 billion records from Have I been pwned up for analysis
- Malware anti-detection techniques collection
- Vulnerabilities in SAP security software
- Description of a few DDoS attacks on a Cloudflare customer
- Secure Rom extraction on iPhone 6s
- Analysis of TR-064 attacks
- CVE-2016-0189 used in targeted attacks
- Shortcut files used in actual attacks
- Please reboot your Boeing 787 on a regular basis
- [PDF] Robust VISA credit card guessing attacks (plus summary)
- Bluescreen via WebGL
- Alcatel Lucent Omnivista RCE
- CVE-2016-7255 (Windows) analysis
- Bypassing Apple’s System Integrity Protection
- Using EventViewer to bypass UAC locally
- Visbot Magento malware
- WeChat censorship system
- New hashcat: 3.20
- War stories from Google VRP
- Belarus blocks Tor
- Continuous pwning of the top 1000 WordPress plugins
- New Mirai variant with DGA
- Hiding malware in PNG files
- RedStarOS 3.0 RCE
- A closer look at Mamba ransomware
- Authentication improvement at ProtonMail
- Hash encryption in Windows 10 Anniversary Update
- ImageMagick convert Tiff out of bounds write
- Malicious authentication bypass in OpenCart
- Spoofing the Edge address bar with the malware warning
- Further analysis of Shamoon 2
- Mobile ransomware
- Ransomware in 2016 – report
- Private Internet Access funds OpenVPN 2.4 audit
- Get a free decryption of your files if you infect others
Did you enjoy this list? Retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.