IT Security Weekend Catch Up – February 26, 2017

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Surveillance and covert operations – movies vs reality
  2. Analysis of spy tech export licences in EU
  3. The next stage of Russian information warfare
  4. Cyberespionage expected to expand
  5. Ex-Googler accused of stealing self-driving technology blueprints
  6. [PDF] Look behind ransomware customer service
  7. Person behind one of Miari variants arrested
  8. Yahoo’s systems might still be compromised
  9. On marketing in cybersecurity

For the more technical

  1. OS X malware used Hacking Team’s leaked source code
  2. About pasting passwords
  3. How a phishing site avoids search engine crawlers
  4. 5 bugs chained to get RCE
  5. Sandbox evasion techniques
  6. OAuth 2.0 security
  7. About the security of software libraries in Android apps
  8. Simple LTE/4G IMSI Catcher
  9. Phishing websites with valid SSL certificates
  10. Cellular re-broadcast over satellite
  11. 4096 votes suddenly appeared in the system
  12. [PDF] Akamai report on 2016 attacks
  13. Cloudflare data still present in some search engines
  14. MiTM proxies hang on TLS 1.3
  15. Create your own SHA-1 colliding PDF files
  16. Apple rejected servers after malware found in firmware
  17. Banking botnet identified in Google Play store
  18. Detailed Shamoon analysis
  19. Dyzap – trojan horse stealing secrets
  20. Analysis of Quadars banking trojan
  21. Local DoS on Windows kernel from j00ru
  22. Windows hardening tools
  23. Data exfiltration via drone and blinking led
  24. Criminals targeting remote banking systems
  25. Rooting a less popular Android phone
  26. Guessing phone number on Facebook
  27. Excellent Dridex campaign analysis
  28. Hacking Google and IE redirects
  29. Fingerprinting Firefox users
  30. Log monitoring tool used in attacks
  31. Why it’s hard to be a security researcher
  32. RCE in handheld radio
  33. APT28 samples collection
  34. Using Yubikey everywhere
  35. Curious case of Ramnit removing its webinjects
  36. Zombie window in IE11
  37. Interesing SQLi bug
  38. Spam and phishing in 2016 – summary
  39. Interesting WordPress attack
  40. Mirai Windows spreader analysis
  41. Annotator for Binary Ninja
  42. CVE-2017-6074 – local root in Linux kernel
  43. Campaign against Mongolian government employees
  44. Campaign against South Korean government employees
  45. Android malware analysis

Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *