IT Security Weekend Catch Up – February 17, 2017

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Ukraine charges Russia with new cyberattacks
  2. Snowden fightng for reporters’ security and privacy
  3. Tracking users in London’s Undergroud
  4. A very well prepared campaign against activists in Quatar and Nepal
  5. About a man who bought all the tickets

For the more technical

  1. Technical analysis of the attack on Polish banks by:
    1. ESET
    2. BAE
    3. Cyber4Sight
    4. Symantec
  2. Bypassing free hotspot limitations
  3. RiseUp starts to encrypt email
  4. Vulnerabilities in mobile apps for connected cars
  5. Cable modem producer’s private key leak 
  6. An ex-employee remotely damaged ICS systems
  7. Multiple vulnerabilities in QNAP QTS 4.2
  8. Xen Project suggests limiting bug disclosure
  9. Using Signal pseudonymously
  10. Changes and new functions in Signal
  11. Analysis of an attack on Israeli soldiers’ mobile phones
  12. ViperRAT used in attacks on Israeli soldiers
  13. From SIEM to domain admin
  14. Attacks on Saudi targets
  15. Analysis of big Ursnif campaign
  16. Who was behind LeakedSource.com
  17. [PDF] Excellent 2016 report from F-Secure
  18. Xagent Mac malware linked to APT28
  19. About real impact of popular Android bugs
  20. [PDF] Google report on APT28 tools
  21. Unpacking Dridex loader
  22. Analysis of Rambo backdoor
  23. RCE in node-serialize
  24. Beating ASLR plus explanation and limitations
  25. Password guessing approach
  26. Conflict between NSS Labs and CrowdStrike
  27. SchoolBell botnet analysis
  28. Malicious JavaScript leads to techsupport scam
  29. Dumping LUKS key from memory
  30. Protecting your data at a border crossing
  31. January global threat impact index by Check Point
  32. Google Drive blocks sharing of copyrighted files
  33. Spoofing emails in Gmail
  34. Local Priviledge Escalation in Ubuntu 16.10
  35. Online PCAP analysis
  36. Ticketbleed detection
  37. Analysis of Marcher Android trojan
  38. New DHS report on Russian attacks
  39. Analysis of Russian-speaking ransomware ecosystem
  40. The decline of top exploit kits
  41. Have I Been Compromised – new search engine
  42. Microsoft about trends in ransomware
  43. New Cerber ransomware variant
  44. Tracking Iranian hackers
  45. Ransomware-as-a-service review
  46. Credentials theft attack techniques
  47. Combatting phishing

Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *