IT Security Weekend Catch Up – February 19, 2022

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Lurk: an exemplary Cybercrime Inc.
  2. The elite hackers of the FSB
  3. A network of fake test answer sites is trying to incriminate students
  4. AI-synthesized faces are indistinguishable from real faces and more trustworthy
  5. Mexican businessman admits to brokering spyware used to monitor political and business rivals
  6. How Roblox ‘beamers’ get rich stealing from children
  7. BlackCat (ALPHV) claims Swissport ransomware attack, leaks data

For the more technical

  1. A technique to semi-automatically discover new vulnerabilities in WordPress plugins
  2. Vulnerability in UpdraftPlus allowed subscribers to download sensitive backups
  3. Emergency Magento update fixes zero-day bug exploited in attacks
  4. Researchers create exploit for critical Magento bug, Adobe updates advisory
  5. Hacker could’ve printed unlimited ‘Ether’ but chose $2M bug bounty instead
  6. How everything we’re told about website identity assurance is wrong
  7. Never, ever, ever use pixelation for redacting text
  8. Mozilla warns Chrome, Firefox ‘100’ user agents may break sites
  9. A walk through Project Zero metrics
  10. Introducing the Privacy Sandbox on Android
  11. SMS PVA services’ use of infected Android phones reveals flaws in SMS verification
  12. Attackers increasingly adopting regsvr32 utility execution via Office documents
  13. A method for decrypting data infected with Hive ransomware (PDF)
  14. ESET Threat Report T3 2021 (PDF)
  15. Threat Horizons. Cloud Threat Intelligence. February 2022 (PDF)
  16. Evasive Trickbot attacks customers of 60 high-profile companies
  17. Meet Kraken: A new Golang botnet in development
  18. Charting TA2541’s flight
  19. Cyber-attack on ICRC: What we know
  20. Moses Staff campaigns against Israeli organizations span several months
  21. Iranian-aligned threat actor “TunnelVision” actively exploiting VMware Horizon
  22. Russian state-sponsored cyber actors target cleared defense contractor networks
  23. Russian cybercriminals drive significant ransomware and cryptocurrency-based money laundering activity

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *